You are on page 1of 265

27/2/2009

Initiation | Eduardo Cebrones Alonso BAJA CALIFORNIA PROFESSIONAL


SERVICES TERRORISM AND URBAN GUERRILLA MANUAL EVASION AND
FOLLOW-UP TECHNIQUES MANUAL SUMMARY TO THE QAEDA Page | 2
Page | 3 INTRODUCTION ------------------------------------------------ --------------------------------
------------------ -------- 14 EVOLUTION OF TERRORISM -------------------------------------- ----
-------------------------------------------- 14 EL TERRORIST -----------------------------------------------
-- -------------------------------------------------- ----------- fifteen
SIGNIFICANT FORCES IN THE PRODUCTION OR MAINTENANCE OF
TERRORIST ORGANIZATIONS ----------- 17
CLASSIFICATION OF ORGANIZATIONS ACCORDING TO THE SCOPE OF
THEIR OPERATIONS. ------------------------ 17
TERRORIST STRATEGY ----------------------- -------------------------------------------------- ---------
---------------- 19
FEATURES ----------------------- -------------------------------------------------- -----------------------------
----- 20
METHOD OF OPERATION OF THE TERRORISTS --------- -----------------------------------
--------------- --------------- 21
STRUCTURE OF TERRORIST ORGANIZATIONS ----------------------------- -----------------
--------------------- twenty-one
TERRORIST TACTICS ------------------------------------------------ --------------------------------------
------------ - 21
TARGET SELECTION -------------------------------------------- -------------------------------------------
------- ------ 22
WEAPONS OF TERROR --------------------------------------- --------------------------------------------
------ ----- 23
INTRODUCTION ------------------------------------------- --------------------------------------------------
---------------- 23
FIRE -------------------------------- -------------------------------------------------- ------------------------------
------- 23
PUMPS ----------- -------------------------------------------------- ----------------------------------------------
---- ------ 24
OTHER WEAPONS AND ACCESSORIES --------------------------------------- -------------------
------------------------------- ---- 25
THE FIVE PHASES OF A TERRORIST INCIDENT -------------------------------------- -------
-------------- 31
INTRODUCTION ------ -------------------------------------------------- -------------------------------------
------------- --- 31
THE BASIC TERRORIST STRATEGY ------------------------------------------ ----------------------
----------------------- 31
THE MAJOR PHASES OF TERRORIST OPERATIONS ---------------------------------------
--------- ------------------ 32
PRE-INCIDENT PHASE -------------------------- -------------------------------------------------- -------
---------------- 32
INITIATION PHASE ----------------------- -------------------------------------------------- ---------------
----------------- 36
NEGOTIATION PHASE -------------- -------------------------------------------------- -------------------
------------------ 39
Page | 4

CLIMAX PHASE ---------------------------------------------- ------------------------------------------------


-- ------------- 39
POST-INCIDENT PHASE -------------------------------- --------------------------------------------------
--------------------- 39
NEW INTERNATIONAL TERROR ------------------------- --------------------------------------------
------ ------- 40
INTRODUCTION ----------------------------------------- -------------------------------------------------- --
---------------- 41
SOVIET INVOLVEMENT IN THE EVOLUTION OF TERRORISM. ------------------------
-------------------------- ------ 41
THE PLO AND GLOBAL TERRORISM. -------------------------------------------------- -----------
----------------------- 42
PROFILE OF TERRORISM SUPPORTED BY STATE. ------------------------------------------
-------- -------------------- 47
TERRORISM IN LATIN AMERICA ------------------------ --------------------------------------------
------ - 51
INTRODUCTION ---------------------------------------------- ------------------------------------------------
-- ------------- 51
CENTRAL AMERICA ---------------------------------- -------------------------------------------------- ---
------------------- 51
PANAMA -------------------------- -------------------------------------------------- ----------------------------
------------ 51
NICARAGUA -------- -------------------------------------------------- -----------------------------------------
--------- ----- 51
EL SALVADOR ------------------------------------------ -------------------------------------------------- ----
--------------- 52
HONDURAS ----------------------------- -------------------------------------------------- ---------------------
-------------- 52
GUATEMALA AND COSTA RICA ---------- ---------------------- ------------------------------------
-------------- -------------- 52
GUATEMALA ---------------------------------- -------------------------------------------------- --------------
-------------- 52
HONDURAS -------------------- -------------------------------------------------- ------------------------------
-------------- 53
EL SALVADOR --- -------------------------------------------------- -------------------------------------------
------- -------- 53
PANAMA ---------------------------------------- -------------------------------------------------- --------------
------------ 53
COLOMBIA ---------------------- -------------------------------------------------- -----------------------------
-------------- 53
PERU ----- -------------------------------------------------- -------------------------------------------------- ----
------------ 54
CHILE -------------------------------- -------------------------------------------------- ---------------------------
------------ 54
ARGENTINA --------- ------------------ -------------------------------------------------- ---------------------
--------------- 55
Page | 5

URUGUAY ------------------------------------------------- -------------------------------------------------- ----


------------ 55
BRAZIL -------------------------------- -------------------------------------------------- -------------------------
------------ 55
MEXICO ----------- -------------------------------------------------- --------------------------------------------
------ ------- 56
CUBA ----------------------------------------- -------------------------------------------------- ------------------
------------ 56
PUERTO RICO ----------------- -------------------------------------------------- -----------------------------
--------------- 57
RIGHT TERRORISM --- -------------------------------------------------- -----------------------------------
--------- 57
SUMMARY ---- -------------------------------------------------- -----------------------------------------------
--- ------------ 58
TERRORISM IN CONTEMPORARY SOCIETY ------------------------------- --------------------
---- 59
INTR ODUCTION AND HISTORICAL PERSPECTIVE -----------------------------------------
----- --------------------------------- 59
THE FRENCH REVOLUTION. -------------------------------------------------- -------------------------
-------------------- 59
ALEJANDRO II - -------------------------------------------------- ---------------------------------------------
----- --------- 60
MUNICH --------------------------------------- -------------------------------------------------- ----------------
------------ 60
IRAN -------------------- -------------------------------------------------- -----------------------------------------
--------- - 61
GENERAL KROSEN'S CAR ------------------------------------------- ------------------------------------
---- 61
THE NAVY INFANTRY HEADQUARTERS IN BEIRUT -----------------------------------------
-------- ----- 61
NIGHTCLUB IN BERLIN ----------------------------------------- ------------------------------------------
-------- ----------- 61
COUNTER-TERRORISM PROGRAM --------------------------------- --------------------------------
------------------ 61
CHARACTERIZATION OF A TERRORIST ACT - -------------------------------------------------
- ------------------------- 62
CHARACTERISTICS OF TERRORISM --------------------- -----------------------------------------
--------- --------------- 62
LONG RANGE OBJECTIVES ------------------------------ ----------------------------------------------
---- ----------- 63
THE MEDIA AND ITS USE BY TERRORISTS TO OBTAIN THEIR OBJECTIVES --
-------------- 64
DEFINITION OF A TERRORIST GROUP - -------------------------------------------------- --------
---------------------- 65
DEFINITION OF A TERRORIST --------------- -------------------------------------------------- ------
-------------------- 66
Page | 6

TYPOLOGY OF TERRORISM ---------------------------------------------- ------------------------------


------------------ 66
ANALYSIS INTELLIGENCE OF TERRORISM ---------------------------------------------- ------
--------------- 67
INTRODUCTION --------------------------- -------------------------------------------------- ----------------
---------------- 67
PATTERNS AND TERRORIST BEHAVIOR. -------------------------------------------------- -----
------------------- 67
ESSENTIAL INGREDIENTS FOR AN ACCURATE TERRORISM ANALYSIS: --------
-------- --------------------------- 69
SPECIALIZED COLLECTION. -------------------------------------------------- -------------------------
------------------ 69
INTRODUCTION TO "ANALYTICAL TOOLS "------------------------------------------------- ----
------------- 71
CONSTRUCTION AND HANDLING OF DIES. -------------------------------------------------- -
-------------------- 72
BUILDING AN ASSOCIATION ANALYSIS. -------------------------------------------------- ------
----------------- 74
TIME CHARTS BY EVENTS (GTE). -------------------------------------------------- ----------------
----------- 75
SUMMARY --------------------- -------------------------------------------------- ------------------------------
--------------- 76
COUNTERING THE TERRORIST THREAT -------------------------------------------------- ------
------ 76
INTRODUCTION ------------------------------------ -------------------------------------------------- -------
---------------- 76
TERRORIST CONTRACTION COMPONENTS ---------------------- ----------------------------
---------------------- - 77
FEEDBACK ----------------------------------------------- -------------------------------------------------- ----
-------------- 78
PREDICTION ------------------------------ -------------------------------------------------- ------------------
--------------- 78
DECISION MODEL ------------- -------------------------------------------------- ---------------------------
----------- 79
COUNTERINTELLIGENCE SUPPORT IN COUNTERINSURGENCY
OPERATIONS - ------------------- 79
INTRODUCTION ----------------------------- -------------------------------------------------- --------------
---------------- 79
FUNCTIONS. -------------------------------------------------- -------------------------------------------------
- ------------- 79
POPULATION AND RESOURCES CONTROL. -------------------------------------------------- -
-------------------------------- 82
THE POPULATION AND RESOURCES CONTROL PROGRAM (PCPR) ----- --------
--------------------------------------- 82
MATERIAL RESOURCES . -------------------------------------------------- ------------------------------
------------------- 83
Page | 7

LIST OF CRITICAL ELEMENTS. -------------------------------------------------- ---------------------


-------------------- 84
MATERIAL BRIDGES. -------------------------------------------------- ------------------------------------
----------- 84
MEASURES OF POPULATION AND RESOURCES CONTROL. ---------------------------
----------------------- ----------------- 84
INTRODUCTION ------------------------------- -------------------------------------------------- ------------
------------- 87
URBAN GUERRILLA ---------------------- -------------------------------------------------- ----------------
---------------- 87
URBAN GUERRILLA MINI MANUAL ------------ -------------------------------------------------- -
------ 88
INTRODUCTION ----------------------------------------- -------------------------------------------------- --
---------------- 88
HOW THE URBAN GUERRILLA SHOULD LIVE AND SUPPLY ----------------------- ----
---------------------------------- 90
TECHNICAL PREPARATION OF THE URBAN GUERRILLA ------ -------------------------
------------------------- ------------ 91
THE WEAPONS OF THE URBAN GUERRILLA -------------------------------- ------------------
-------------------------------- 92
THE SHOOT: THE REASON FOR THE EXISTENCE OF THE URBAN
GUERRILLA -------------------------------------- - ---------- 94
THE FIRE GROUP ----------------------------------- -------------------------------------------------- ------
------------ 94
THE LOGISTICS OF THE URBAN GUERRILLA -------------------------- -----------------------
--------------------------- ---- 95
THE URBAN GUERRILLA TECHNIQUE ---------------------------------------- --------------------
---------------------- 97
CHARACTERISTICS OF THE GUERRILLA TECHNIQUE ------------------------------------
-------------- ----------------- 97
THE INITIAL ADVANTAGE OF THE URBAN GUERRILLA ------------------------- --------
---------------------------------------- 97
SURPRISE -------------------------------------------------- -------------------------------------------------- --
------------- 98
GROUND KNOWLEDGE ------------------------------- -------------------------------------------------- -
----------- 98
MOBILITY AND SPEED ---------------------------------- --------------------------------------------------
------------- 99
INFORMATION -------------------------------------------------- ----------------------------------------------
---- -------- 101
DECISION ---------------------------------------- -------------------------------------------------- -------------
----------- 102
OBJECTIVES FOR URBAN GUERRILLA ACTIONS ------------------ -------------------------
------------------ 103
ON THE TYPES AND NATURE OF MODELS OF ACTION FOR URBAN
WARRIORS ---------------- 104
Page | 8

THE BANK ROBBERY AS A POPULAR MODEL ------------------------------------------ ------


--------------------- 106
PENETRATIONS --------------------- -------------------------------------------------- ----------------------
------------- 106
OCCUPATIONS ------------- -------------------------------------------------- --------------------------------
------------- 107
AMBUSH --- -------------------------------------------------- --------------------------------------------------
------- 107
STREET TACTICS --------------------------------------- -------------------------------------------------- --
------------ 108
WORK STOPS AND INTERRUPTIONS ------------------------------ -------------------------------
------------------- 109
RELEASE OF PRISONERS ---------------------------------------------- ---------------------------------
------------- 111
EXECUTIONS - -------------------------------------------------- ----------------------------------------------
---- -------- 111
KIDNAPPING ---- -------------------------------------------------- --------------------------------------------
------ ------- 112
SABOTAGE ----------------------------------------- -------------------------------------------------- ----------
------------- 112
TERRORISM ------------------------- -------------------------------------------------- ------------------------
----------- 114
ARMED PROPAGANDA ------------ -------------------------------------------------- --------------------
--------------- 114
WAR OF NERVES ----------- -------------------------------------------------- ------------------------------
---------- 115
HOW TO CARRY OUT THE ACTION --- -------------------------------------------------- ----------
----------------------- 116
RESCUE OF THE WOUNDED ------------- -------------------------------------------------- -----------
--------------------------- 118
GUERRILLA SECURITY ------- -------------------------------------------------- --------------------------
-------- 119
THE SEVEN SINS OF THE URBAN GUERRILLA ------------------------------------------------
----------------------- 120
POPULAR SUPPORT ------------------------ -------------------------------------------------- ------------
------------------- 121
URBAN GUERRILLA WAR, SCHOOL TO SELECT THE GUERRILLA -------- ----------
--------------- 122
EVASION AND ESCAPE --------------------- -------------------------------------------------- -----------
------------------ 126
1. EVASION ----------------- -------------------------------------------------- ---------------------------------
------------ 126
2. EXHAUST - -------------------------------------------------- ------------------------------------------------
-- ------------ 132
PREAMBLE ------------------------------------ -------------------------------------------------- --------------
-------- 136
Page | 9

DIVERSITY FOR THE SAME PURPOSE -------------------------------------------- ----------------


------------------- 137
BREAKDOWN OF CONCEPTS ----------- -------------------------------------------------- -----------
------ 139
LINEAR CHASE ------------------------------ -------------------------------------------------- --------------
------- 140
THE RHYTHM -------------------------- -------------------------------------------------- --------------------
------------------ 144
PANORAMIC PERSECUTION --------- -------------------------------------------------- ---------------
------------------ 145
A SUMMARY ... --------- -------------------------------------------------- ---------------------------------
150
PREAMBLE --------------- -------------------------------------------------- -----------------------------------
-------- 154
SUPRA-PANORAMIC PERSECUTION ---- -------------------------------------------------- -------
------------------------ 154
A SUMMARY MODE ... ----------- ---------- -------------------------------------------------- -----------
--------------- 156
INTRODUCTION ---------------------- -------------------------------------------------- ---------------------
----------- 159
PRINCIPLES OF ORGANIZATION -------------- -------------------------------------------------- ---
---------------- 161
PRINCIPLES OF MILITARY ORGANIZATION: ------------------------- -------------------------
------------------------- ---- 161
MILITARY REQUIREMENTS OF THE ORGANIZATION: -------------------------------------
-- ---------------------------------- 161
REQUIRED MISSIONS OF THE MILITARY ORGANIZATION: -------- --------------------
------------------------------ ---- 161
IMPORTANCE OF THE MILITARY ORGANIZATION: --------------------------------------- -
--------------------------------- 162
QUALIFICATIONS AND CHARACTERISTICS REQUIRED FOR MEMBERS OF
THE ORGANIZATION
----- -------------------------------------------------- -------------------------------------------------- --------------
------ 163
QUALIFICATIONS REQUIRED FOR MEMBERS OF THE ORGANIZATION ----------
--------------------------------- ---- 163
1 - ISLAM: ----------------------------------------- -------------------------------------------------- -----------
----------- 163
2 - COMMISSION WITH IDEOLOGY OF THE ORGANIZATION: ---------------- --------
------------------------------------ 163
3 - MATURITY: - -------------------------------------------------- ---------------------------------------------
----- -------- 163
4 - SACRIFICE: ------------------------------------- -------------------------------------------------- ---------
------------ 163
5 - LISTENING AND OBEDIENCE: -------------------- ------------------------------------------------
-- ---------------- 163
6 - COMBINATION OF SECRETS AND DISSIMULATION INFORMATION ----------
------------- ----------------------- 163
Page | 10

7 - FREE FROM DISEASE -------------------------------------------- -------------------------------------


------------- - 164
8 - PATIENCE --------------------------------------------- -------------------------------------------------- ---
----------- 164
9 - PEACE OF MIND AND IMPASSIBILITY ------------------------------ -------------------------
------------------------- ----- 164
10 - INTELLIGENCE AND PENETRATION --------------------------------------- -----------------
------------------------------ 164
11 - CAUTION AND PRUDENCE ----------------------------------------------- -----------------------
------------------- 164
12 - TRUTH AND ADVICE - -------------------------------------------------- ----------------------------
------------------ 164
13 - CAPACITY TO OBSERVE AND TO ANALYZE ---------------------------------------------
----------------------------- 164
14 - ABILITY TO ACT, CHANGE POSITIONS AND COVER -------- -----------------------
------------- 164
DOCUMENTATION AND FON TWO OF OPERATION ----------------------------------------
------- ---------------- 165
FINANCIAL SECURITY PRECAUTIONS: --------------------------- -------------------------------
-------------- 165
DOCUMENTS FORGED - -------------------------------------------------- --------------------------------
------------ 165
SAFETY PRECAUTIONS -------------------------------------------------- --------------------------------
166
OPERATIONAL BASES --------------- -------------------------------------------------- ------------------
---------------- 166
DEFINITION OF BASES: ----------- -------------------------------------------------- ---------------------
------------------ 166
APARTMENT RELATED SAFETY PRECAUTIONS: - -------------------------------------
166
MEANS OF COMMUNICATION AND TRANSPORTATION ------- ------------------------
-------------------------- -------- 168
MEDIA -------------------------------------- ----------------------------------- -------------------- 168
INTRODUCTION: --------------------------- -------------------------------------------------- ---------------
--------------- 168
MEDIA: --------------- -------------------------------------------------- ---------------------------- 168
SECRET COMMUNICATION IS LIMITED TO THE FOLLOWING TYPES: -----------
------------------------------------------- 168
COMMUNICATION METHOD BETWEEN MEMBERS FROM THE
ORGANIZATION: ----------------------------------------- 169
Telephone: - -------------------------------------------------- --------------------------------------------------
--------- 169
In person: (Meeting) ---------------------------------- -------------------------------------------------- --
---------- 170
Page | 11

The messenger: ---------------------------------------------- ------------------------------------------------


-- ----------- 173
Letters: ------------------------------------ -------------------------------------------------- ---------------------
--------- 173
Facsimile and radio: --------------- -------------------------------------------------- ----------------------
----------------- 173
MEANS OF TRANSPORTATION: ------ -------------------------------------------------- -------------
--------------------------- 174
SAFETY PRECAUTIONS TO BE OBSERVED IN THE PUBLIC
TRANSPORTATION: ----------------------------------- 174
SECURITY MEASURES TO BE OBSERVED IN PRIVATE TRANSPORTATION : ---
-------------------------------- 174
TRAINING ------------ -------------------------------------------------- ---------------------------------------
175
SAFETY PRECAUTIONS THAT: ---- -------------------------------------------------- ----------------
--------- 175
THE PLACE: --------------------- ---- -------------------------------------------------- -----------------------
--------------- 175
THE LEARNERS: -------- -------------------------------------------------- -----------------------------------
------------- 176
LOS TRAINERS: ------------------------------------------------ -----------------------------------------------
--- - 176
WEAPONS ---------------------------------------------- -------------------------------------------------- ------
------------- 176
MEASURES RELATED TO PURCHASE AND TRANSPORTATION ----------------------
---------------------------------- 176
1. BEFORE PURCHASE STAGE: ------ -------------------------------------------------- --------------
--------------- 176
2. THE PURCHASE STAGE: ------------ -------------------------------------------------- --------------
----------------- 177
3. THE STAGE OF TRANSPORTATION: ----------- ------------------------------------------------
-- ------------------------------ 177
4. THE STORAGE STAGE: ------------ -------- -------------------------------------------------- --------
------------- 177
MEMBER SAFETY ------------------------- -------------------------------------------------- -------------
178
DEFINITION OF MEMBER SECURITY: ----------------------------- --------------------------------
----------- 178
MEASURES TO BE TAKEN BY THE OPEN MEMBER: ---------------------------------------
------- ---------- 178
MEASURES TO BE TAKEN BY THE SECRET MEMBER: ----------------------------- ------
--------------------- 179
MEASURES TO BE TAKEN BY THE COMMANDER: ------------- ----------------------------
-------------------- 180
NOTE IMPORTANT: ------------------------------------------------ -----------------------------------------
--------- ---- 180
Page | 12

SAFETY PLAN ---------------------------------------------- --------------------------------------------------


- 180
DEFINITION ----------------------------------------------- -------------------------------------------------- ---
------------ 180
IMPORTANCE OF THE SAFETY PLAN: --------------------------- --------------------------------
----------------- 180
SECURITY POLICY SPECIFICATIONS: ------------------------------------------- ------------------
------- 181
THE METHOD OF EXECUTING THE SAFETY PLAN: -------------- -------------------------
------------------------ 181
THE MEETING : ----------------------------------------------- ------------------------------------------------
-- ------------- 183
Security measures needed before stationary meeting: -------------------------- --------
--------- 183
Security measures needed before mobile meeting: ---------------------- -----------------
------- 184
The stationary meeting location: --------- -------------------------------------------------- --------
--------- 184
The mobile location of the meeting (meeting): ---------------------- ------------------------
---------------- 184
DURING THE MEETING: ----- -------------------------------------------------- --------------------------
------------------ 185
After completion of the meeting: ----------------------------------------------- ---------------------
----- 185
Attacking and capturing one of the members. ------------------------------------------------
-- ------------ 185
In case an individual is caught, the following should be done: --------------------- --
--------------- 185
ESPIONAGE ------------------------------- -------------------------------------------------- ------------------
----------- 187
INTRODUCTION: ------------------ -------------------------------------------------- ------------------------
-------------- 188
IMPORTANCE OF INFORMATION: ------ -------------------------------------------------- ---------
------------------- 189
SOURCES OF INFORMATION: ----------------- -------------------------------------------------- -----
--------------------- 189
METHODS OF COLLECTING INFORMATION USING SECRET MEANS: ------------
-- ------------------------------- 193
A. Surveillance, intelligence, and observation: --------- ---------------------------------------
----------- ------------ 193
BIBLIOGRAPHY ------------------------------------ -------------------------------------------------- ---- ---
------------- 199

Page | 13

Reviewed and updated by Eduardo Cebrones Alonso as of February / 2009.

Urban Terrorism

Page | 14

Introduction to terrorism, its


organizations, operations and
development

Introduction
With the worldwide resurgence in terrorism it is becoming more important
that
you become familiar with the role that intelligence plays in combating
terrorism. This
instructional module in combination with other modules you receive will
help you achieve this goal.
Evolution of Terrorism
Contemporary and modern terrorism evolved from political problems, the
needs for change, and the aspirations of the population. Many of these
legitimate causes
have been subverted from nonviolent legal processes to violent actions and
terrorism. The only
essential ingredient is a well-trained, dedicated and charismatic leader to
turn the tables
completely. Many patriotic people with good intentions have been seduced
by
popular movements that have later turned out to be the opposite of what
they really wanted.
The post-World War II era produced a large number of
radical causes , liberation wars, and political alliances, which in turn created
a romantic attraction
to revolutionary criminals, interpreting them as champions of popular
causes.
Along with the romantics, the movements also attracted large numbers of
radicals,
professional criminals, avengers, and subversive agents. The student
revolts of the 1960s
and 1970s produced large numbers of radicals and idealists, some of whom
remained
in dissident movements and switched from one movement to another.
Others, who still felt sympathy
for their movements, were integrated into normal life in their respective
societies where they worked
until reaching positions of responsibility or higher levels within the same
government.
Some of these people at present form the basis for the perimeter support of
these
radical terrorist organizations. Terrorism is said to be the weapon of the
weak, the
Page | 15

radicals and psychopaths. Terrorism can be seen as an embryonic stage of


an
insurgency, a starting point. In fact, an analysis of recent insurgencies in the
Americas,
France, Russia, and Cuba shows that terrorism played an important role in
the
early days of the movement. In many cases, terrorist tactics were used to
obtain
funds, weapons, ammunition, and explosives. In most cases, as in the
Vietnam War, terrorism played a vital role from the beginning, even though
the latter part of
the insurgency was fought in a more organized and conventional way,
conventional units and tactics
. The terrorist infrastructure that harassed and terrorized the population
succeeded in
separating the population from the government, and thus destabilizing it as
a consequence. This was
the most powerful weapon of the insurgents. Unfortunately, in most cases,
the terror
that reigned during the insurgency was later replaced by institutional terror
(terror
by the government), creating more oppression than that of the previous
regime. It is also worth mentioning that
with few exceptions most of the terrorists were eliminated from their
positions of power
once the insurrection ended.
Terrorists such as Stalin, Lenin, Trotsky, Guevara, Marighella and others left
a legacy
of violence that in the name of the oppressed masses and just causes are
shaking the
world. The advent of international and transnational terrorism has brought
with it numerous
groups of revenge and hatred to third world countries, ideological
mercenaries who have lent
their experience and knowledge, bombs and weapons to their political and
ideological allies in
any part of the world.
Most terrorist organizations differ from one another as much as their
different
ideologies. To begin our study of international terrorism, we will first
examine
some of the factors that have contributed to the development of terrorism.
1. Success breeds more terrorism. Brutality is often rewarded
with publicity and more prestige.
2. Relative apathy of some people towards terrorism and associated
violence. The
governments tend to forget as soon as it is finished the act of terrorism.
Many
assume that the absence of evidence means the absence of a threat.
3. The popular fascination with the terrorist. People tend to admire
"fighters against tyranny." Many people give
terrorists romantic qualities as freedom fighters or heroes when in reality
they are little more than
criminals.
4. Terrorism as a tool in support of conventional warfare. Many
insurrections have started with high levels of terrorist activity. Terror has
been used
successfully to support conventional operations and to subvert
conventional morality, the laws
of diplomacy, and the laws of war.
Terrorist
Frederick Hacker has classified terrorist groups into various categories
according to
your requirements, missions and goals. A well organized terrorist group can
contain one of
three categories:
Page | 16

Criminals. They generally know the consequences and are more predictable.
A
criminal in the process of robbing a bank can be caught by the police. In
reaction the criminal takes the closest person hostage, threatening to take
his
life to influence the authorities to provide him free passage from his
predicament. The use
of innocent hostages constitutes an act of criminal terrorism. The terrorist
in this case
does not want to stay in the area and usually does not hurt the hostages.
Political Defenders. Political defenders are much more complex. Their
supreme mission is to publicize their cause and to impress those whom
they
are supposedly representing. Since political defenders believe that what
they
are doing is correct, that the end justifies the means, and that what they are
doing is
on behalf of the oppressed masses, they are much less predictable. The
fact
that in most cases the terrorists do not have the support of the majority of
the
population does not seem to matter to them. Political terrorists establish
their ideas with some
well-published and alarming act that they use for additional veracity in
threats,
negotiations, and pressure for their causes. Terrorist political organizations
are rarely suicidal. There are cases in which terrorists take high risks or
commit suicide, but these cases are rare. To combat political terrorism all
motivational factors, ideology and personalities have to be carefully
examined and analyzed.
Psychopathic Terrorists (Crazy). The psychopathic terrorist is possibly the
most
dangerous and unpredictable. There are some cases of organizations that
are run by
psychopathic killers. But in most cases these people act
independently, trying to correct some real or imagined wrong. Some want to
make a public statement, while others want to influence events. In
most cases, psychiatric support is essential to neutralize the incident. The
psychopathic terrorist can harm his hostage especially if the hostage (the
hostages)
are identified as part of the problem or as the enemy. There are numerous
examples of
mixed terrorist groups. It is worth mentioning that all terrorist acts are
considered
criminal acts and therefore all terrorists are criminals. In many
cases, political terrorist organizations have to provide for their needs
with criminal acts.
Bank robberies, called by Lenin as "expropriations" are a common means of
obtaining operational and subsistence funds. In many cases, the
most sophisticated terrorist organizations have special supply groups
that specialize in these activities. Terrorist support provides
terrorists with many of their requirements which in some cases eliminates
the
need for such dangerous activities.
The German faction of the Red Army, also known as the Baader-
Mienhof Group , used psychopaths in their operations. Some of these
Assassins were
organized into special groups that used terrorist activity as a form of
therapy.One of the best known groups of this nature was the
Heidelberg Collective Patients , sometimes known as the "Mad Squad" by
the
terrorists themselves. This group consisted of ex-patients who had been
evaluated and released by a who m sympathetic edico (with the help of
sympathetic lawyers) and programmed for murder and destruction.
Profile. Another way to study the terrorist is through careful studies of
published data on terrorists and terrorist organizations and then try to form
a
general profile of the terrorist. For the purposes of this class, we will study a
compilation and
analysis of published data on 350 members of terrorist organizations from
11
nations that includes the period from 1966-76 to try to draw a "
sociological portrait " of the profile of a modern urban terrorist.

Age. The usual urban terrorist usually has an age ranging between
22 - 25 years.
Page | 17

Sex. Urban terrorism continues to be a predominantly


male phenomenon . Female membership constitutes less than 16 percent
(based on arrests / identification of terrorist personnel). Their role is
largely confined to gathering intelligence, messengers, nurses, or
medical personnel , and maintaining terrorist shelters.
Marital status. The terrorist is usually single. The
movement and flexibility requirements prevent the terrorist from having time
to worry about
family responsibilities. Statistics indicate that 75 - 80% of the
captured terrorists were single.
Origin Urban Vs Rural. The terrorist has to be closely related
to the terrain in which he is operating. According to Carlos Maríghella (the
best known theorist and practitioner of urban terrorism) "the urban terrorist
can easily evade the
police, or catch them in a trap or ambush. If he knows the terrain well ... he
will always be able to escape arrest.

Significant Forces in The Production or Maintenance of


Terrorist Organizations
A. Evolution as a Result of Needs People are frequently
ignored in the government process (or simply not allowed to participate). As
a
result, some will use violence as a last resort
B. Low unification Pressure. The existence of a foreign threat (real or
imagined)
unifies group members against the threat. Charismatic leaders generally
encounter a foreign threat to justify their actions.
C. Weakening when Inactive. Inactivity for any reason can cause
unrest within terrorist organizations
D. Political and Ideological Internal Struggles. s the main cause of
separation
within terrorist organizations.
E. They Generate Their Own Moment. Terrorist organizations have trouble
maintaining their own moment. A successful operation can be exploited
and followed by other
activities, propaganda, and recruitment.
F. Perpetuation And Promotion. Terrorists have to prove their credibility by
creating the
belief that they have more power, more popular support, and more influence
than they
actually do.
Classification of organizations according to the scope of their
operations.
A. Nationals (Domestic Terrorists). They generally aspire to political
influence and
power, operate within their own countries, and can receive outside help. Any
activity
outside their own country places these groups in another category.
Page | 18

B. Transnational Terrorists. They operate across national borders, outside of


government control, and can receive support and sanctuary from countries
sympathetic to their causes. Most
of the current groups fall under this category.
C. International Terrorists. They are under the control of a government, they
operate across
international borders, and their actions represent the national interests of a
sovereign country or state .
V. Classification of Terrorist Groups according to their Motivation.
A. Minority and Nationalist Groups. They generally struggle to establish a
nationalist identity or to improve their conditions. Colonial wars are the best
example
of these categories. The Tupamaros in Uruguay started as an Indian
movement to
improve their conditions. Generally the same conditions exist in other
countries where there is
discrimination and poverty.
B. Separatists. They fight for a separate administration or country for their
people. Many
of these movements have been subverted and countries oppressed once
their status of
freedom has been granted. The Organization for National Liberation (Puerto
Rico) in the United
States is an example of an organization that fights for a separatist status
for Puerto Rico, even
though this proposal is not viewed favorably by more than 1% of the
population.
C. Revolutionary Marxist Terrorists. They are responsible for most of the
terrorist acts prepared throughout the world. Many legitimate movements
started by other
groups are subverted by a system whose main purpose is to subvert and
oppress. The situation in
Angola is an excellent example. The use of Marxist troops from Cuba
stationed in Angola is
present in various parts of Central and South America. The violence that is
preached by the
revolutionary Marxist doctrine is very appealing to many terrorist groups
and groups prone to
violence, government system or to establish free institutions without any
purpose other system
of order. Anarchists are generally apolitical. In most cases
anarchist terrorists seek some kind of ideology to associate with that
provides them with reasons and
excuses for their terrorist activities. Marxism is generally the most ideal
cause for
this purpose.
D. Anarchists. They generally fight to destabilize and destroy the present
E. Ideological Mercenaries. They are generally transnational terrorists who
travel
to provide their services and weapons to friendly or ideologically
compatible revolutionary groups . The Revolutionary Coordination Board, an
international terrorist support group,
is considered an ideological group.
F. Terrorists Counterterrorists. They use terrorism to fight terrorism.
Many of these groups emerged in response to terrorist activities. These
groups
are more common than previously thought. The death squads and the
White Hand Organization in Central and South America are considered
counter- terrorist terrorists.
G. Neo-Fascist Terrorists. They operate globally, in most cases without
any international organizational cohesion. The Hoffman Military Sports
Group in
West Germany is one of the most dangerous organizations in Europe.
E. Ultra-rightist terrorists. They operate worldwide. Most of them are
primarily concerned with their own countries and hardly ever meddle in the
affairs of
Page | 19

other nations, unless they think their country is threatened. These groups
generally
try to influence the government to maintain the status quo, avoid liberal
influences, or
prevent international agreements. The factions fighting in El Salvador are an
example of one
trapped in the center receiving terrorism from both directions.
I. Establishment Terrorists. They operate with the permission of the
government or even with its
support. This form of terror is generally used to keep the population
submissive or
to keep the existing regime in power. The secret police organs employed by
the
Soviet Union and its satellites can be considered as establishment
terrorists. In
some cases the government denies any responsibility for the incidents.
J. Religious Zealots. They are found all over the world. Many atrocities and
terrorist acts have been committed in the name of religion. Some groups
exist outside of
government control and could be considered radical religious cults, while
others exist
as part of national or international organized religions.
K. Narco Terrorists. For years drug trafficking has been linked exclusively to
professional criminal elements. In more recent years a new influence has
moved
into the world of drugs, motivated not by greed but by a determination to
destabilize Western society. His method: trading weapons for drugs. The
central operator : Bulgaria. There is established evidence that the
government of Cuba facilitates drug trafficking
to the United States by allowing drug traffickers to use Cuban ports to
disembark ships from Colombia, (as payment to the government of Cuba,
the traffickers then
carry weapons and food), for delivery. after groups such as the M-19.
Additionally, studies have shown that the FARC, a Colombian terrorist
organization,
uses the sale of drugs as its main method to finance its terrorist activities.
Terrorist Strategy
It is a common strategy of terrorists to commit acts of violence that will
attract the
attention of the people, the government, and the rest of the world to
demonstrate the political goals of
the terrorists or in some cases to publicize the terrorist cause. We are going
to discuss seven
of the general factors that will contribute to terrorist violence.
A. Politics. Terrorists want the masses to believe that the violence is
directed at a
government perceived as corrupt or repressive. Violence against the
government also
demonstrates that the government has no control which ideally causes the
government to take a
repressive stance which gives the terrorist "cause to celebrate."
B. Social. The absence of a middle class, the concentration of wealth in a
few
influential families, and poverty are definite factors that can cause violence.
The
discrimination and violation of basic human rights are also influential
factors in
the production of violence.
C. Economic. Extreme poverty with no hope of being able to improve your
position can
breed violence.
D. Ideological. Violently opposing political philosophies can lead to violence.
E. Geopolitical. The presence of large foreign groups in the population
working
to improve their economic position tends to use many valuable resources,
particularly
jobs, land, etc., which causes the local population to be unable to have
those resources and result in
Page | 20

violence. Border disputes over land, islands, or the ability to control borders
also contribute to violence.
F. Religious. Conflicts and differences can result as a result of
religious differences that can be exploited by those who want to destabilize
the social order.
Some religions condone violence and use religious reasons to justify their
violent actions .
G. Foreign Influences. There are groups in the world that would be violent if
they had
training, money, and weapons. What they need is a "sponsor". If someone
wants to
become a terrorist there is no lack of groups willing to train, indoctrinate
politically and
support economically.
Characteristics
Studies of terrorist incidents from 1946 - 1980 have identified several
characteristics of
terrorist incidents that contrast with the nature of other crisis-type events.
1. Terrorist crises are of very short duration.
2. Pre-crisis activities tend to be routine.
3. Relatively little anticipation of terrorist acts.
4. The threat in terrorist crises develops faster than in other crises.
V. Marxist Revolutionaries. There is no doubt that revolutionary Marxist
groups
dominate the world of terrorist activities. The Marxist ideology of starting
and supporting
wars of liberation is known as one of the major catalysts for
terrorism. The main mission of Marxism remains unchanged, only the
tactics and
strategies have changed depending on the people and the area. All the
Marxist factions
claim to be true Marxists.
A. Marxist-Leninist. It uses the traditional approaches of infiltration and
subversion.
Peaceful coexistence is professed when it brings benefit. Lenin's political
terrorism places
politics prior to terrorism. Terrorism in the quest for power is used to
emphasize
political points and is used very selectively. But once control of the
government is
secured, the dictatorship of the proletariat takes control. In subversive and
terrorist activities
the Marxist-Leninists make maximum use of front organizations.
B. Troskista. Based on the Marxist philosophies of Leon Trotsky and his
Fourth International.
The Trotskyists advocate international revolutionary terror and the
unification of
terrorist groups wherever possible. According to this system, each political
party has a
terrorist arm that operates clandestinely, destabilizing the government to
the point where a
spontaneous revolution can be started. Terror has to be used as part of any
revolutionary enterprise and the use of indiscriminate terrorism is used to
emphasize the point. The
terrorist joint planning, mutual support, and training in multiple disciplines
are
integral parts of the Trotskyist system. The revolution kills individuals to
intimidate thousands.
C. Maoist. Based on the political and terrorist philosophies of Mao Tse-tung.
The phrase "
politics grows out of the barrel of a gun" is explained in people who are
forced to be submissive
and kept that way by continuous and indiscriminate terror. Political
organizations
and politicians have to be involved in terrorism. There can be no truce or
accommodation with the enemy.
Page | 21

D. Castro-Guevarista. The revolution begins with a physical uprising of the


masses (the people). Terror is used to prepare the masses for change.
Terrorism is
used selectively and for political reasons. Revolutionary activities have to
start
in rural areas, thus isolating cities and forcing urban populations to
rise up against the government. This system was only successful in Cuba.
Ernesto "Che"
Guevara tried a similar system in Bolivia without success, he was captured
and shot in September
1967. This method is being modified for other Latin and Central American
countries as
well as Angola and Ethiopia.
Terrorists Method of Operation
The terrorist Modus Operandi is predictable. In most cases, they operate in
small bands of two to six well-trained individuals. Your mission and your
target will dictate the weaponry and
equipment the terrorists carry to use. Generally, activities and targets are
limited only by the terrorist's ability to communicate, control the operation,
and
general security. Terrorists will generally use some communication
equipment to follow
the reaction of the population and the activities of the authorities. They will
dress appropriately so that they
can easily hide in their environment. The team consists of command and
control,
intelligence, support, and the combat element. They can also include a
diversionary element
to launch an attack of diversion to steer the authorities in another direction.
All
elements of the terrorist organization are actively involved in the security
role.

Structure of Terrorist Organizations


Most terrorist organizations are structured to operate in
small cells . The infiltration of these organizations is extremely difficult.
Therefore, very little is
known about the structure. Security and communications are the first
considerations in the
structure of a terrorist organization. As in most military units, the
basic elements are: the command group, the intelligence section, the
support section, and the
assault section. Secrecy is the main ingredient for terrorist success and can
only be maintained through individual discipline, good organization, and
solid support.
Terrorist Tactics
Finally we will mention some of the most common terrorist tactics.
A. Bombardment. This is the most commonly used attack method. Placing
pre-positioned bombs allows the terrorist to be far away when the
detonation occurs. Other
bombs can be detonated by electronic commands, remote control, time, or
artifacts
activated by altitude, movement, pressure, etc ... Most bombs are
manufactured
specifically for the mission or target. Some of the most common types are:
tube bombs (Nipple), box explosives, dynamite, vehicles and anti-personnel.
The bombs are an
effective way to attract the attention of journalists and they are dramatic.
B. Murders. Murders are the oldest method of terrorist attack and the
second most used contemporary method. It is relatively easy to carry out,
and can be
done effectively from a distance with a variety of weaponry and ordnance.
Page | 22

C. Aero-hijacking. Aero hijackings and attacks on commercial aircraft in the


air and on
the ground (at airports) have emerged as one of the newest terrorist tactics
and a
threat against one of the most vulnerable modes of transportation.
Although
hijacking has been documented since the 1930s, it has been on the rise
since the end of World
War II.
D. Kidnapping. Kidnapping to win some kind of concession is also not a
new tactic for terrorists. It has been practiced in one form or another for
centuries. But kidnapping for
purely political reasons did not show a significant increase until the 1960s.
E. Armed Assaults. Armed assaults on static installations is an indication of
advanced stages of terrorist operations. It is a reflection of a refinement of
tactics, training,
and accessibility to more sophisticated weaponry, communications, and
command and control. Although
many of these attacks occur in rural areas, an increase in this type of
activity in
urban settings is being reported.
F. Ambushes. Ambushes and other traps can be used to kill
personnel, destroy vehicles, hijack, capture weapons, ammunition, radios,
and other equipment. The
ambushes are also used to prevent reinforcements arrive for another
operation.
G. Street Tactics. These are among the most important facets of
terrorist operations in the urban environment at all stages of an
insurrection. With the use of all the
front and political organizations combined with a sufficiently "angry"
masses,
the terrorists can gain popular support while support for the authorities
diminishes.
H. Occupations. Occupation of strategic facilities, buildings, or schools is
used primarily for dramatic effect, propaganda, or news coverage. All
occupations have defined start and end times.
Target Selection
Basically, all terrorist targets can be classified as symbolic or
pragmatic. In most cases, terrorist targets are symbolic in nature,
designed to carry a message to the target audience, create a climate of fear,
insecurity, and
even panic. Terrorists generally select their targets for their symbolic value,
their
publicity and projection power, influence over the public, and to demonstrate
that
the authorities are incapable of providing adequate protection for their
citizens.
Pragmatic targets include destruction, assassination of powerful officers,
robbery,
revolutionary activities , etc. Ideal targets are both pragmatic and symbolic
and could include the
destruction of utilities, dams, transportation systems, and other services.
The benefits
that terrorists derive from these acts are varied. It denies the authorities the
use of the
destroyed facilities , creates publicity, especially when accompanied by a
statement, and causes inconvenience to the population, disrupting the
normal order of life and
eroding public confidence in the government's ability to govern effectively. .
Targets
include:
Military
Targets Human Targets
Utilities, Engineering, Energy
Communications
Logistics
Page | 23

Transportation
Commerce
Structures
Weapons of Terror

Introduction
Weapons of Terror have three essential requirements: simplicity, efficiency
and
availability. There are other less essential but important requirements for
terrorists such
as the need to kill large numbers of people from a distance, so the power
of weaponry has become important. This involves the use of automatic
weapons that do not have
an overly accelerated rate of fire (due to the limited amount of ammunition
they
carry on their missions). In this class they will recognize the mentality of the
terrorist, the use of
different weapons by the terrorists, fire, drugs and material in a destructive
role.
Fire
Through time fire has proven to be one of the elements that
causes the most fear in man, which is why it is one of the preferred
weapons of terrorists. The
following are examples of the possible ways that terrorists can use fire for
their terrorist operations.
1. Incendiary Box. A cigarette pack is used to hide the following
ingredients. Sulfuric acid, potassium chlorate, and sugar. Sulfuric acid is
placed in a tube
Page | 24

test sealed and placed in a condom. The sugar and potassium chlorate are
placed in a
second condom, then the first condom is placed in the second, which
contains the sugar and
potassium chlorate. To activate the content, the test tube containing the
sulfuric
acid is broken . It will take 30 minutes for the sulfuric acid to penetrate the
first condom. When the acid
comes into contact with the other ingredients it causes an instantaneous
combustion. This type of
incendiary device was used by the Armed Forces of National Liberation of
Puerto Rico
to cause several fires in department stores in New York and Puerto Rico.
The pack
of cigarettes was placed together with some material that could be
combustible (such as
clothes) and wait for the fire.
2. Light Bulbs. An ordinary light bulb can be used as an
incendiary device. Using a high speed drill a small hole is made in a
common light bulb, without damaging the filaments inside the light bulb.
Gasoline is injected into the bulb with a syringe and the hole is sealed with
glue. The bulb is then placed in
a receptacle making sure the switch is in the off position. An explosive fire
will
result when turning on the light.
3. Molotov pumps. One of the most effective incendiary devices developed
during
World War II was the Molotov Bomb. The bomb was extremely effective
against armed vehicles and other vehicles. It consists of a mixture of
gasoline and oil in
a glass bottle. A cloth wick is soaked in gasoline and inserted into the
bottle. To
attack a target, the fuse is lit and it is thrown towards the target, when the
bottle breaks, the
gasoline / oil mixture is exposed to the open flame causing an
instantaneous fire. You
can also make one that ignites on contact with the target without having to
light the
wick. The most common would be to mix potassium chlorate with sugar
and water to form a
semi-thick liquid . Strips of cloth are soaked in this liquid and allowed to dry.
Adhere
these dry strips with adhesive tape after filling the bottle with the mixture of
petrol
and oil. Carefully add an ounce or two of sulfuric acid. The acid will not mix
with the mixture and will go to the bottom of the bottle. When breaking the
bottle against the target the acid will come
into contact with the cloth impregnated with the potassium chlorate and
sugar causing an
instantaneous fire and the combustion of the gasoline and oil mixture.
4. Gasoline Tank Pumps. Gas tank pumps can be made
in various ways, we will discuss two ways briefly.
to. Using a high-speed drill, a small hole is made in a
ping-pong ball. Using a hypodermic needle, the ball is filled with liquid
Drano. The hole
in the ball is sealed with glue. The ball is then introduced into the gas tank
of the car in
question. In 30 minutes the gasoline will destroy the ping pong ball allowing
the Drano to come
into contact with the gasoline causing an explosive reaction.
b. Gelatin capsules are obtained and a small ammunition is added to make
it
sink. Then small pieces of sodium and calcium carbonate are added to the
capsules. The
capsules are then kept in a plastic bag to keep them dry and free from
moisture. Three or four capsules are introduced to the tank of the car in
question, and in minutes
the capsules will disintegrate producing an explosive gas that in turn causes
an explosion.
5. Others. Many products such as phosphorus, when not in water, can cause
fires. A few drops of oil in chlorine can cause a fire within 20 minutes
or sooner depending on the freshness of the chlorine.
Pumps
Page | 25

The use of bombs by terrorists has been effective due to their low cost, the
availability of materials for their construction, and their simplistic method of
construction.
Its use is also attractive due to the attraction that the elements of the press
have to
attacks where explosive devices are involved. The terrorist can detonate a
bomb by
many methods, such as remote control, pressure or pressure release, time,
etc. In
most cases the bombs are detonated at the most propitious moment to
cause the greatest
amount of damage, death and press attention possible.
A. Car bombs. Car / truck bombs are used due to the weight of dynamite
that these bombs can carry and their capacity for destruction. In many
cases,
propane gas has been used to increase the explosive power of dynamite.
Nails, glass, steel, or
other abrasive materials are added to increase the deadly power of your
bombs. Since
the fragments produced by these explosions are not controllable, the
victims in all
cases include children, women and the elderly.
B. Tube Pumps (Nipple). Tube bombs are also a favorite
of terrorist groups. These makeshift artifacts can be made into many
different shapes, such as a tube filled with black powder, a small clock, a
small
battery, and a camera flash bulb without the glass and filaments intact. This
is a
relatively effective and inexpensive device that can cause great damage to
buildings, cars, or personnel.
Any type of explosive can be used to fill the bombs, but
care must be taken when filling the tubes to avoid premature explosion of
the contents.
C. Letters-Bombs. The letter bomb is another dangerous weapon that has
been used by
terrorist groups. The letter bomb can be made using a regular envelope or
they can be made
using a small box. In most cases a small clock battery is used to
power the electrical circuit needed to explode the explosive charge, which
could be
crushed C4 so as not to take up too much space in the envelope. A new
innovation using this
same technique has recently been introduced. When the package is opened,
the sulfuric acid
mixes with a cyanide tablet that causes a chemical reaction where an
extremely toxic gas is produced , poisoning the victim.
The use of this type of weapon by terrorists is limited only by their ability to
use their imagination.
Other Weapons and Accessories We
mentioned earlier that terrorist weapons have three basic requirements:
simplicity, efficiency, and availability. In addition to these three
characteristics, weapons and
ammunition must have power, since it is dangerous for a victim to have the
opportunity to
shoot in defense after being knocked down. A well placed bullet by a victim
that has not
been properly neutralized can have serious consequences. For the conduct
of
urban terrorism, weapons have to be easy to conceal, so miniaturization is
essential. When these features are combined with accessibility to
appropriate weapons and
ammunition and simplicity that prevents the weapon from being damaged
at an
inopportune moment, the perfect weapon of terror is born.
A. Weapons. The following weapons have the above requirements, more or
less to
some degree. Some are more efficient than others but all carry the same
guarantee of use.
These are the weapons of terrorism.
1. Kalashnikov or AK47 (Plate 1). The success of this weapon is based on
its reliability.
It worked well in Vietnam under conditions that caused damage to the M-
16. Can be covered
Page | 26

completely out of mud, sand, or mud and still function properly. An


improved version, the
AK74 entered service in 1980. It fires a smaller bullet (5.45mm vs. 7.62),
which
starts to flip faster than the larger bullet when it hits its target, making it
more lethal. It also has less kickback and does not "climb" like the AK47
when fired on
automatic. This weapon is excellent and reliable. Although it has a shorter
barrel than
western rifles it is no less accurate.
2. VZ58 Assault Rifle (plate 2). This weapon of Czechoslovakian design and
manufacture was
used by the three terrorists of the Japanese Red Army when they carried out
their massacre at
Lod airport in 1972. They used VZ58s without butts that they hid in their
luggage. It is
sold commercially by Omnipol, the Czechoslovak arms manufacturer. This
effective weapon looks like an AK47 at first glance, but differs dramatically
in design and workmanship. It
is not as reliable as the AK47 but can be armed and fired without the belay
piece,
causing an explosion in the chamber. It can fire the same bullets as the
AK47 but the
magazine is not interchangeable.
3. Scorpion VZ61 (plate 3). This small automatic weapon of
Czechoslovak manufacture is one of the most popular weapons of
terrorism. The magazine for this weapon is
unique for weapons manufactured in communist countries because it is of
North American design.
This weapon has all the necessary qualities for a terrorist weapon. It is so
small and light
that it can easily be hidden. The Scorpion has a high rate of fire (840
rounds / minute) and is deadly at close range. It can also be fitted with a
very
effective silencer . The silencer reduces the effective range to about 100
yards, but since
terrorist operations rarely exceed 10 yards, this is of no consequence.
4. Heckler and Koch MP5 (sheet 4). This weapon was developed from the
G3 rifle which is the
standard weapon in West Germany and 34 other countries. The MP5
machine gun has been
universally accepted by terrorists. It is probably the most efficient weapon in
production.
5. Armalite-AR-15 (sheet 5). Originally produced as the successor to the AR-
16, the
standard weapon for the American infantry in Vietnam, it was not adopted
by the US military because
too many were produced (?). It is the weapon of choice for the IRA in
Ireland. It has killed more
British soldiers than any other weapon in Northern Ireland. The accuracy
and penetrating power
of this weapon make it deadly. The bullet can penetrate steel helmets,
medium armor and
bulletproof vests from 500 meters away and leave a devastating wound.
The shock associated
with a wound from these high velocity munitions can kill. It is a very large
weapon to be
used in most terrorist operations. It has to be armed to be
smuggled into the location of the mission.
6. Thompson machine gun (plate 6). Originally designed by General John
Thompson as a way to break the western frontier tie in World War
I by giving the Allies enough portable firepower for their attacks on
German positions. It is too big for modern terrorist operations.
7. Sten machine gun (plate 7). Mass produced for the Army of England and
resistance movements during WWII. It is estimated that in
excess of two million of these weapons were produced. Since a large
number of these weapons were distributed
throughout the world, they have reached terrorist hands. The Sten has
several flaws that make it
somewhat dangerous. It tends to frize in such a way that it does not fire
even on automatic. A
strong blow to the butt can also cause the weapon to fire without warning.
8. Beretta Model 12 machine gun (plate 8). This compact and precise
weapon is the
latest addition to the Berreta series and is used by commando units of the
Italian army.
Page | 27
This weapon compares with the Scorpion as one of the most efficient
automatic weapons. It is
simple, elegant, and has two safety systems, it also has a 40-round
magazine which
gives the terrorist a high concentration of firepower in an urban guerrilla
situation. With
a retractable metal stock it can also be used at longer distances.
9. Astra Magnum .357 (plate 9). Made in Spain. The size of the bullet and its
tremendous power almost ensure death at close range. The only
shortcoming of this
brutally efficient weapon is its size.
10. Browning High Power Pistol (plate 10). Possibly the best known of
all automatic pistols. This reliable and effective weapon is used for short-
range work and its ammunition is easily obtained. One of its advantages is
that its magazine has a
capacity of 13 rounds.
11. SAM-7 Strela (Arrow) (plate 11). The SAM-7 is the seventh model of the
surface-to-air projectiles produced by the Soviet Union. This weapon has an
automatic infrared targeting system that follows the heat emitted by high-
speed fighter jet engines. Its
downside is that its high-powered warhead is not particularly powerful and
a
large, well-built aircraft could survive if it is not hit in a vital area.
12. M26 grenade (plate 12). Known as the grading of fragmentation. The
internal detonation of this grenade, adducted under tension, makes it a
deadly anti-personnel weapon , ideal for the use of terrorists in crowded
places where the
maximum number of wounded and terror can be caused. It has safe safety
devices and its
16-ounce weight gives it the right balance for your launch.
13. RPG-7 Portable Rocket Launcher (plate 13). This Russian weapon is the
artillery of
terrorism. It was used extensively by the Vietcong and was feared by
American soldiers for its uses both as an antipersonnel fragmentation
weapon and as
an anti-tank rocket that could blow up the top of a modern tank. This is not
a
particularly accurate weapon , especially at long range and in extreme
winds. However, it
can do an incredible amount of damage. It is easy to build and fire, but it
must be
ensured that no one is behind the rocket when firing as the gases from
the rocket engine can do as much damage as the grenade itself. It gives the
individual the ability to
launch an explosive charge equivalent to a medium capacity bomb. In
urban guerrilla actions, it gives the terrorist an artillery capability that
security forces do not have in the early stages of a confrontation.
14. M60 General Purpose Machine Gun (plate 14). It is an
excellent infantry weapon , but as a terror weapon it has serious
disadvantages. Most of the weapons of
terrorism are used for ambushes and in urban environments. The M60 has a
very fast rate of fire, is very heavy and too long to be used as an
urban terror weapon . It is essential that in this type of war the weapon is
light, simple and does not require more
than one person to handle it. It can be deadly if used against helicopters.
15. Ingram M-10 (No sheet available). With its 10.5 "dimensions and
efficient silencer , this weapon promises to be a favorite weapon of
terrorists. With the stock retracted and the
magazine removed it fits easily into a coat pocket, it is little larger than a
.45 automatic. This weapon designed to fire silently when on automatic.
Possibly its main disadvantage is its rate of fire, 1000 rounds per minute,
too fast for normal terrorist work.
Page | 28

Lamina # 1
AK47 Kalashnikov Assault Rifle
Weight 9.5 pounds (Downloaded) 11.31 lbs. (Loaded with full magazine)
Length 34.2 inches 27.5 inches with stock retracted
Curved magazine with metal case holds 30 rounds
Barrel Velocity 2330 ft / second
Rate of Fire 100 rounds per minute automatic 40 rounds per minute single
shot
Maximum Range 330 yards Cash
[no sheet shown]
Sheet # 2 VZ58 Assault Rifle
Weight 6.9 pounds (unloaded) 8.4 pounds (loaded with full magazine)
Length 33.2 inches 25 inches tail butt retracted
Magazine 30 round capacity curved metal case 7.62mm cartridge
Barrel velocity 2330 ft / second
Rate of fire 90 rounds per minute automatic 40 rounds per minute single
shot
Maximum Range 440 yards effective
[not stated
Sheet ] Sheet # 3 Scorpion VZ61
Weight 3.5 pounds 4.4 pounds (loaded with full magazine, 20 rounds)
Length 20.2 inches 10.6 with steel stock folded over the barrel
Magazine Slightly curved metal cleat holds 10 to 20 rounds
.32 cartridge ( 7.65mm) automatic pistol cartridge
Barrel velocity 1040 ft / second
Rate of fire 840 rounds per minute automatic 40 rounds per minute single
shot
Maximum Range 219 yards with stock Effective 55 yards with stock
retracted

Sheet 04 Heckler & Koch MP5


Weight 5.4 lbs. ( Unloaded) 6.48 lbs. (Loaded with 30 round magazine)
Length 26.77 inches 19.29 inches, with telescopic stock retracted Metal Box
Magazine
Rec Holds 10, 15, or 30 rounds
Cartridge 9mm Parabellum
Barrel Velocity 1312 ft / second
Rate of Fire 100 rounds per minute automatic 40 rounds per minute single
shot
Maximum Effective Range 220 yards

Sheet # 5 Armalite AR-18


Weight 7 lbs. (
Unloaded ) 7.75 lbs. (Loaded with full magazine) Length 36.38 inches
Page | 29

Magazine Straight Metal Case that holds 20 rounds


Cartridge 5.56mm (.223)
Barrel Velocity 3,250 ft / second
Rate of Fire 80 rounds per minute automatic 40 rounds per minute single
shot
Maximum Effective Range 500 Yards

Sheet # 6 Thompson Machine Gun


Weight 10.5 lbs. (Unloaded) 12.1 lbs. (Loaded with full magazine - 30
rounds)
Length 32 inches
Straight metal magazine that holds 20 to 30 rounds
Cartridge .45 automatic pistol cartridge
Barrel Velocity 920 ft / second
Rate of Fire 120 rounds per minute automatic 40 rounds per minute single
shot
Maximum Effective Range 220 yards
Sheet # 7 Sten Machine Gun
Weight 6.65 pounds (Unloaded) 8.05 pounds (Loaded with full magazine)
Length 30.00 inches
Straight metal magazine that holds 32 rounds feeding horizontally to the left
side
of the weapon
speed Barril 1200 ft / sec
speed automatic shooting 128 rounds per minute 40 rounds per minute
single shot
Maximum Effective Range 200 yards

Sheet # 8 Beretta Model 12 Machine Gun


Weight 6,625 lbs. (Unloaded) 8,125 lbs. (Loaded with 30-round magazine)
Length 16.4 inches
Magazine Metal holding 20, 30, or 40 rounds that slide into a holder
9mm Parabellum Cartridge
Velocity Barrel 1250 ft / second
Rate of Fire 120 rounds per minute automatic 40 rounds per minute single
shot
Maximum Effective Range 220 yards
[no foil listed]
Sheet # 9 Astra Magnum .357
Weight 2 lbs. with 6-inch barrel (unloaded)
Length 11.25 inches with 6-inch barrel other barrel lengths are 3.4, and 8.5
inches
Magazine Six cylinder
.357 cartridge of various types
Barrel speed 1410-1550 feet / second depending on cartridge used
Maximum Effective Range 55 yards depending on length of the barrel
Page | 30

[no foil listed]


# 10 Browning High Power Foil
Weight 1.94 pounds (unloaded) 2.44 free (loaded with full magazine)
Cartridge Metal case 13 rounds
Barrel velocity 1150 ft / sec
Rate of fire 40 rounds per minute
Maximum Effective Range 50 yards
[not shown]
Sheet # 11 SAM-7 Strella
Trigger Weight 20.3 lbs.
Projectile Weight 20.25 lbs.
Trigger
Length 53 inches Projectile Length 51.2 inches
Rocket Engine Three-Stage Solid Fuel
Maximum Range 3792 yards
Maximum Height 6560 feet
Infrared Guidance System
[does not include sheet]
Sheet # 12 M26 Granada
Weight 1 pound
Length 3.9 inches
Diameter 2.25 inches
Color Olive Green with yellow letters
Explosive 155 grams of composition-B TNT
Electric Impact Wick
[does not include sheet]
Sheet # 13 RPG-7 Launcher Portable Rocket
Trigger Weight 15.40 pounds (unloaded)
Grenade Weight 4.95 pounds Trigger Length 39.00 inches Trigger Gauge 1.5
inches s Projectile Caliber 3.3 inches Range / Static Target 555.0 yards
Range /
Moving Target 330.0 yards Armor Penetration 12.6 inches
[no sheet metal]
Sheet # 14 M-60 General Purpose Machine Gun
Weight 23.09 pounds
Length 43.5 inches
Fed Disintegrating link belt
Speed Barrel 2900 ft / sec.
Rate of Fire 550 rounds per minute cyclic 200 rounds per minute automatic
Maximum Range 2000 yards with tripod
Effective 1000 yards with bipod

Page | 31
The Five Phases of a Terrorist Incident

Introduction
The Basic Terrorist Strategy Terrorist
tactics and strategies have evolved by the revolutionary activities
over many years of terrorists such as Robespiere, Lenin, Stalin, Trotsky, Mao
Tse-tung,
Castro, Guevara, and Arafat. Grand strategies were established for the
contemporary terrorist by writers such as Marx, Engels, Marighella, Fanon,
Marcuse, Guillen, and others
who attempted political change by way of violence.
Page | 32

Contemporary terrorists generally support the same theories evolved


years ago but advances in technology, availability of money, and political
motivation have
driven terrorists down conventional and traditional military and political
paths. The
advanced communications, access to means of global communications
and the
availability of sophisticated weapons and equipment have become terrorist
organizations
in an effective and formidable enemy.
Tactics and methods have to vary from site to site depending heavily on
political, social, historical, and geographic factors. Tactics that sometimes
appear
disorganized are actually patterns that when examined provide a lot of
information
about how terrorists live and how they plan and execute their missions.
The common strategy of every terrorist is to commit acts of violence to get
the
attention of the people, the government, and the rest of the world, to
demonstrate political objectives or
other causes. Virtually every terrorist takes advantage of the modern
system of
instant communication and the means of communication. The basic
strategy of the terrorist is intimidation by
means of influencing the government for political, social, or other changes.
The victim is
usually not the real target of the terrorist. The terrorist act draws the
attention of the people and the
government that is responsible for the protection of its citizens. Fear and
intimidation
influence people to rush the government to accept terrorist demands. In
most cases the terrorist's target is the general public, a specific sector of
society, or an international diplomat. By threatening or committing violent
acts against a
victim the terrorist produces fear in the victim and the target who depend on
the government for
protection. At the same time the terrorist directly or indirectly makes
demands on the government, which
instead has to react in some way with respect to the terrorist, the target and
the
victim. The media obviously play an important role in transmitting
demands between the different parties involved in the incident, but their
most important role is
communication between the terrorist and his target.
Major Phases of Terrorist Operations
Pre-Incident Phase
Includes intelligence, reconnaissance, planning and testing activities.
Virtually
all terrorist operations are intelligence and security based.
Terrorist organizations typically use well-trained intelligence gathering
agents. The
selection of intelligence agents is a careful process that includes
loyalty investigations , and constant surveillance by security personnel
without the
intelligence agent's knowledge . The terrorist intelligence agent normally
only has contact with a
limited number of people at the head of the organization. Two or three
intelligence agents can
work together but no more than three agents should know each other or
know what
the mission is. Intelligence agents are generally located in the
Direct Terrorist Support Section .
General intelligence is continuously collected. Operations, plans and
locations
are selected depending on general intelligence. Information is collected on
all
opposition, potential targets, potential kidnap victims, and murders. In many
cases
cameras are used for the purpose of target identification and preparation.
Political and
civic bosses are always targets of terrorist intelligence as well as police
officers,
military chiefs, and members of counterintelligence organizations and
teams.
Intelligence reports are continually sent to bosses and serve as the basis for
terrorist plans.
Page | 33

The intelligence of a target is directed towards a specific target, it can be a


building,
factory, person, vehicular ambush, or an aerial hijacking. In many cases, for
security reasons, intelligence is collected on several targets simultaneously.
In some cases the
boss can select a secondary objective in case the first mission is aborted.
The
intelligence on a target also includes a variety of methods. This includes the
use of
cameras, clandestine electronic listening devices, wiretapping,
recording, and observation. In any case, intelligence on a target is a
careful, repeated, and in many cases very professional process. In many
cases the
terrorist intelligence agent penetrates the target area to reconnoitre the
personnel and the area. The agent
can befriend the target and in certain cases can join the opposition for
the purpose of collecting information. Many terrorist organizations operate
based on objectives
of opportunity and their political objectives are achieved through constant
pressure on
the government. For example, the Jewish Defense League (LDJ) collects
intelligence on the Nazis,
White Supremacy and Rights Groups, Ku Klux Klan, Arab organizations, the
Soviets
and their satellites. Instead the Ku Klux Klan collects information about their
opposition. The terrorists
who aim to overthrow a government have different
information needs . Most Marxist organizations have also established
alliances with
other terrorist groups and even with foreign diplomats and ethnic
communities. Libya, for
example, finances terrorist operations worldwide including operations in the
United
States. A number of North American terrorist groups have contacts with the
Cuban diplomatic mission at the United Nations. This information is
normally collected by
terrorist intelligence agents but the intelligence collection of a target can be
directed
and supervised by terrorist personnel but the actual collection can be done
by
internal operatives (members and non-members), employee informants,
undercover agents, or other personnel
who, knowing or not knowing, provide the terrorists with intelligence on the
target.
Some of the informants may be blackmailed into cooperating. Some
terrorist groups
actively recruit computer students who can later be infiltrated into
computer companies under municipal, state, or federal contracts. Other
specialists recruited for intelligence include telephone specialists,
alarm systems specialists , electronic and electrical engineers, and other
professionals and
technicians who can be infiltrated without suspicion. The Black September
terrorists, prior to their
execution of the Munich massacre, had information about the Olympian
people. They received
information from a Lebanese architect and Arabs working inside the camp.
They also
had the support of the Red Army Faction the Baader-Meinhof Group. The
New World Liberation Front has also used undercover agents for its attacks
on
Pacific Gas and Electric power substations . The OLP frequently uses
undercover agents. An example
occurred in 1977 when an American woman from San Antonio Texas was
recruited to travel
to Tel Aviv and Haifa as a tourist and take pictures of a certain "type of
architecture", which
were actually terrorist targets. There were a few others who came at
different times to
provide the same information. The woman was arrested by Israeli
counterintelligence agents.
Schedules and Movement Patterns are provided by terrorist intelligence
personnel in
great detail. Documents captured in a terrorist safe house indicated
annotations
on movements, measurements and schedules covering a long period of
time. The Turkish TPLA and other
organizations known for their detailed surveillance of their targets, which in
most
cases are United States service personnel. The patterns set by many of
the victims facilitated their murder. Various intelligence sources were used
to do
surveillance or a portion of surveillance for a target, with rotation of people
to avoid
detection. Surveillance of the target and the resulting intelligence is
continually renewed and
maintained until several hours before the attack. The decision to attack the
primary target or
a secondary target is based on the latest intelligence received. Vehicle
attacks and
ambushes require more careful planning and vigilance. The surveillance by
the
Red Brigades of Italy is reported to be one of the most comprehensive.
During the kidnapping of Aldo Moro, the
Page | 34

primary target of the BR was Enrico Berlinguer, Secretary of the Italian


Communist Party. But
BR intelligence reported that Berlinguer's security was too strong.
Intelligence information uses various types of communications. Letter
delivery
is almost never used due to its time requirements and poor security. Most
of the
terrorist intelligence is passed on through meetings and direct contacts. In
some cases
complete codes are developed and telephones can be used. Keeping in
mind that the
methods used are continually changed to avoid detection. Intelligence that
is
disseminated through such an elaborate and complex system is often
misunderstood, not
interpreted, or lost. As a consequence, most terrorist failures have been
attributed to the loss of intelligence information.
Planning terrorist operations is one of the most important facets of the
pre-operational phase. It is done by the most competent leaders in the
organization. The evaluation
of political possibilities in most cases takes precedence over all other
considerations. Terrorist training camps and schools, including
Patrice Lumumba University in Moscow, devote extensive time to
planning instruction . At the Matanzas Camp in Cuba, the group of terrorists
are trained in
planning procedures for all facets of terrorist operations. The
terrorist operations coordinated, either in conjunction with another terrorist
group or individual,
are the most complex and planning must be detailed and complete. In the
United States
the organization Weather Underground and Students for a Society.
Democratic (ESD), they
have stood out for their complete and detailed planning. With few
exceptions, these
organizations have been successful in completing their missions with
precision. Most of the base
of these groups have been trained in Cuba with the Venceremos Brigades, in
PLO camps in the Middle East and some in the Soviet Union. Tom Haden, a
former member of the
ESD, is regarded as one of the master terrorist planners.
Terrorist planners and strategists have also been trained in Vietnam and
North Korea. Mar
Ruad, another leader in the ESD-Weathermen, received his planning and
strategy training in
Cuba and Hanoi. The complex operations and coordinated attacks by the
Weather-
Underground organization were reflected in their coordinated offensives in
the bombing of the Pentagon, May 19
, 1972, and the situation of riots on the National Mall in Washington DC
along with
simultaneous attacks on offices. of government in New York, Chicago, and
Los Angeles. Another
coordinated attack with divergent tactics was planned by the Weather-
Underground organization, on
October 8 , 1970. It was the bombing of the Marin County courthouse, which
the WU published, in
advance. At the same time, the WU bombed the National Guard armory in
Santa
Barbara, California and the ROTC facilities at the University of Washington in
Seattle.
Activities coordinated by international terrorist groups such as the Carlos
Group planned
several attacks with the Japanese Red Army in the Hague, Holland, Paris
and Marseille.
The estimation of objectives is done to increase the effects and minimize
the risks.
All targets are analyzed and evaluated in light of the advantages,
disadvantages and the benefit
obtained. Although some terrorist activities appear to be an unnecessary
loss of
life, property and money, the terrorist can obtain some positive advantages
such as
propaganda and publicity. The Munich Olympic Massacre in September
1972 was a
general disaster for everyone. Eleven athletes died as well as ten
Black September guerrillas , three captured, one police officer killed and two
wounded. The PLO firmly believes that this act was
the turning point in the Palestinian debates and that the act alone resulted
in the recognition of
the PLO by the United Nations. Despite the fact that Arafat himself
condemned the act as a
senseless display of brutality, the political results were to his liking. The
same
is true in the case of the kidnapping of Aldo Moro. None of the demands
were met,
but the BR terrorists declared the incident a complete victory and success.
Page | 35

Coordination as well as planning is done in total secrecy and in great detail.


The
majority of the coordination is done through intermediaries, messengers
and special contacts.
The true target is generally not disclosed until shortly before the action. The
combat elements are only partially informed. Archives, plans, lists of
Latin America and also North America. Since the organization's expansion,
contingent plans and
operations are even more complex and involve international marketing,
finance, and
political maneuvering . Modern communication and easy access to
sophisticated electronic equipment are of great
value to authorities and terrorists. Advanced communications provide
authorities with the ability to react quickly, in some cases arriving at the
same time
the incident is occurring. This situation often causes problems such as
hostage- taking , kidnappings and sieges where it would normally have been
a simple robbery. Instead,
sophisticated radio equipment provides terrorists with the ability to
intercept communications from
authorities and even deliver false reports and orders. The organization the
New World Liberation Front (FLNM) intercepts police communications and
transmits
false reports to deceive the police. In an attack on an FLNM safe house in
Oakland,
California authorities uncovered plans for a deception plan. On several
occasions, this
organization has published plans on a specific operation, while attacking a
completely different target.
Security is one of the most important considerations for
terrorist organizations . For this reason, the disclosure of the information is
limited to only those individuals who
have a need to know the information. But unfortunately for
terrorist organizations , this procedure causes some operations to be
canceled.
Reconnaissance of the target zone is initially done by intelligence teams
and
later by the leadership or possibly the assault team. This aspect of the
operation is
very important requiring patience and skill. Several terrorist operations were
discovered by the unusual amount of movement around the target caused
by
reconnaissance personnel. Recognition should be done over a long period
of time
by different people to avoid detection. In cases of complex operations,
terrorists obtain blueprints of certain facilities.
The operation, at this time, is being studied within the political context and
possible
outcomes. When applicable, propaganda is used to prepare the population
and those who
support the organization for terrorist action. The FLMN has
effectively used preparatory propaganda against utility companies, Safeway
stores,
degenerate building owners before taking action. The Revista Del Guerrillero
Urbano began each
propaganda campaign several weeks in advance to prepare its followers for
an
eminent attack . The OWU published its targets in underground newspaper
stories. The
Baader-Meinhof group at the beginning of its career published its
campaigns in the Lonkret newspaper.
Many terrorist attacks could have been predicted and possibly prevented if
the
authorities had read the terrorist literature and correctly analyzed these
messages.
Operational rehearsals are normally carried out outside the target area, on
terrain similar to the target itself. Several different situations are developed
to allow
detailed testing of all contingency plans and possibilities. Palestinian
terrorists
generally rehearse their attacks very well, they have the advantage of safe
areas and
military training camps . Other groups, such as the Baader-Meinhof
organization, had to
rehearse their operations in remote areas with strict security. It is also
common for
terrorist organizations based in the United States to rehearse in the cities
where the
operation will take place. In the case of the Tupamaros of Uruguay, they
practiced their
kidnapping operation with their target. They approached their target, such
was the case of Mr. Jeffrey
Jackson in 1971. The terrorists actually did test runs with cars and
Page | 36

trucks on his official car in various areas, checking the possibilities and
reactions of the
driver and his escort.
Initiation Phase
The initiation phase represents the stage where the operation begins.
Generally, once this stage begins it is almost impossible to abort unless it is
included
as part of the mission. This stage includes movement towards the target
and initiation of the
attack.
The special equipment is prepared by the supporting elements and carefully
checked.
Normally, the support elements prepare the team independent of the
attack elements . Special equipment may include bombs, explosives, anti-
aircraft missiles, and
large-caliber weapons used as support fire. Special pumps are prepared and
delivered to
a location designated by the support element. The Red Brigades of Italy
transported
weapons and grenades for the Black September terrorists that they used in
the
Munich Massacre in 1972. The terrorist Carlos transported weapons for the
JRA terrorists used in the
operation at Lod Airport. There are quite a few incidents in which
terrorist groups provide help among themselves.
The mode of transport is chosen according to the needs of the mission.
Cars belonging to the organization or its members are registered several
times and
different names are used to evade the vehicle's trace. In some cases, the
vehicles have been
painted to avoid identification by witnesses. In other cases, stolen plates,
possibly plates from another region, are used to avoid identification. Groups
like the
Red Army Faction and the Baader-Meinhof have their own team of
personnel who change the
engine number , paint and equip the car, remove all identifiable traces, and
provide various license plates from
foreign countries. This includes license plates that belong to the US Army.
Normally,
only fast cars in good condition are used. When terrorists use
public transportation, tickets are obtained by the support section.
Documentation,
passport and identification cards are delivered a little before the start of the
operation.
Documents can be stolen or altered, falsified by a specialist, or obtained
from a
government that supports terrorists. Many terrorists travel using passports
from Libya, Syria,
Iraq or Ethiopia. Several members of the Baader-Meinhof group tried to
enter the United States
from Canada using Iranian passports. At the international level,
documentation is generally
prepared by the Board for Revolutionary Coordination. The terrorist Carlos
had at least
five passports with his own photograph but different names and
nationalities. Some of
these passports were found in London and Paris with a large quantity of
weapons and
explosives hidden by Carlos in a friend's apartment.
Specialists, if needed for an operation, are obtained from outside and their
part of the operation is explained to them . To these specialists, if they are
not completely trustworthy or members of
another closely allied terrorist group, only their part of the operation is
explained. Experts in
electronics and weapons practice the operation with the strike team. If they
are not available
locally, snipers from other organizations are recruited. The Red Army
Faction
contributed weapons and explosives specialists to Latin American terrorists
and
probably the Irish Republican Army (Provisional). As already mentioned, the
Board for
Revolutionary Coordination is normally in charge of providing these different
specialists.
Safety is one of the most important aspects in the final coordination. This is
the
time when all the elements are close together and their vulnerability is
greatest. Several
meetings may be necessary to ensure safety. Various groups meet at
different locations and the final meeting is announced at the last minute
possible. Various places for
Page | 37

meetings are selected but the current location is kept secret until the last
moment. In the final meetings, all the points related to the charges and
positions of
each member are discussed. Pseudonyms and cover names are used to
hide the
names of the leaders.
The vehicles are brought in and the drivers are informed and arms are
handed over. The
weapons and explosives are examined. Explosives with detonators and
incendiary devices are
assembled and stored in final storage areas separate from the main group.
Special equipment and personnel, most of which are not local, are put into
position. All
personnel generally stay in the same area for security reasons. This is also
a very vulnerable time. Several members of the Baader-Meinhof group were
arrested during
this final coordination period prior to their planned operation. The arrival of
many
people from other organizations in other areas, sometimes without the
knowledge of the
terrorist leaders, presents a security danger and is vulnerable to infiltration.
Special papers and
cards are distributed for the operation. Appropriate clothing for the
operation is brought, this may
include local clothing which is very important in international and
transnational operations . Other items may include special uniforms such as
police uniforms or work clothes previously obtained by support personnel.
The
Italian Red Brigades used uniforms of the Italian Air Force Band for the
assault team
during the kidnapping of Moro. The Baader-menhof group wear
communication and maintenance personnel uniforms quite frequently. Latin
American terrorists like
the Vietcong have worn government military uniforms. This type of
deception is used to enter
facilities or go through security sections without raising suspicions. Leaders
receive their final instructions from their agents on site. Some agents will be
withdrawn at this
time, others can remain in the target area and then join the operation. If it is
believed that
the agent on site has not been compromised, he will stay. Other infiltrated
agents may be
those who remain in the target area to open gates, doors, turn off
alarm systems , or generally help terrorists penetrate the target.
Final coordination begins when objectives are assigned. In
more complex operations , terrorists put together a command post exercise
for final coordination.
Special codes and saints and signs are disseminated. The Baader-Meinhof
group and the
Red Army faction almost always use this time for the final reallocation of
personnel and the
final assignment of objectives. Members may be reassigned for security
reasons to avoid the
ease of compromise or betrayal. The George Jackson Brigade failed in a
robbery in Tukwila,
Washington Bank mainly because some of the terrorists were not informed.
Movement towards the target indicates the beginning of the active phase.
Generally this phase
is considered to be the breaking point. In most cases all elements and
supporting elements are already in place or moving and the only way to
change or modify the
operation is by communication. Depending on the objective, the mission,
and the surroundings the
terrorists move towards the objective in small groups, usually between two
and three at a time.
If they are not in the immediate area of ​​the target, the terrorists move
clandestine routes,
sometimes returning to detect the possibility of surveillance. Security
personnel are
normally located along the route. In missions such as assassinations or
bombings, the
terrorists move individually and gather close to the target. When the mission
is to
ambush a vehicle, the terrorists mount their vehicles in a pre-assigned zone
with
security and lockdown teams meeting elsewhere.
When applicable, a home or security zone can be used for final
coordination.
There may be a change of clothes at the safe house and new
identity cards and special equipment may be distributed . In many cases
where vehicles are used, cars in
previous positions driven by other drivers can be used to avoid the path of
vehicles
from the target area to the safe house. Support and blocking vehicles are
Page | 38

generally located on alternate streets using the same infiltration techniques


as the
assault teams. In the event of an ambush, the ambush teams move into the
kill zone. In abduction cases, support teams and vehicles are put in
place ahead of time, using many of the other techniques. Members of the
Baader-Meinhof group
typically travel individually or in teams of two towards their initial
transportation and then
switch to pre-positioned vehicles at least once before reaching the target.
The ESL
typically traveled individually from the safe house to their transport,
generally using the same vehicle until removal. All elements are normally
gathered individually so as not to have too large a group in a specific area
and cause
suspicion. As all the members do not know each other, special clothing or
some brand is used for
identification purposes. Identical clothing is not worn. The BR of Italy are
well known for their
wearing of suits. During the time of Moro's kidnapping there were a number
of spring festivals
in Rome and it was not uncommon to see musical bands gathering in the
streets.
Additionally, members of Carlos's group donned athletic apparel at the
1975 OPEC ministers kidnapping . At this time, there were several athletic
events in Vienna.
At the international level, diplomatic bags can be used to transport
weapons. These sacks range in size from a small sack to a full ship. Libya,
Syria and Iraq and many other nations support terrorism to take advantage
of this
international privilege . It has been concluded that the Soviet SAM-7
projectiles were brought to Nairobi,
Kenya through the diplomatic bag system and delivered to the Red Army
Faction. The
same situation with the SAM-7 shells was true in Rome, with the
Black September terrorists . It has also been documented that supporters of
the Irish Republican Army have
brought weapons and explosives directly to users in boats, ships and
planes.
The most important factor in terrorist attacks is the element of surprise.
Extreme security precautions are taken and all movements and business
are
carried out in total secrecy. The attack has to be carried out with violence
and drama if it
is to be successful. Since in most cases the government forces outnumber
the terrorists, the target has to be taken as quickly as possible. To
avoid injuries and defeat it is essential to have a precise schedule and
speed in taking position.
The execution of the ambush can be the detonation of a roadside bomb
, the destruction of a vehicle, or the assassination of a leader.
The execution of a murder can be the sound of a gunshot, the detonation of
a
booby trapper in a vehicle, or any other method used by terrorists to kill one
or
more people. Again, where possible the terrorists will select the site and
time that brings the
most publicity possible. The assassination of Pope John Paul II by Melmet
Ali Agca on
May 13 , 1981 in St. Peter's Square was televised around the world. There
were
special programs reviewing the event of the assassinated attack. This
ensured even more publicity.
Bombing is one of the easiest ways for terrorists to attack. The bombs
can be located and detonated with remote control or they can be timed. As
we already
mentioned, the time can vary from minutes to days. In 1974 the
Red Army Faction planted a 15 kg bomb in a column of a bank under
construction. The bomb
exploded 120 days after they had finished construction of the building and it
was full of
people. Other methods of bombing may include car bombs designed to
assassinate
occupants as well as authorities, investigation teams, innocent witnesses,
or
facilities and structures.

Page | 39

Negotiation Phase
The negotiation phase is applicable when the terrorists have something in
their control to
negotiate, and if there is a possibility of an exchange between the terrorists
and the authorities. The
terrorists make their claims directly, by special messenger or by means of
communication. Negotiators must have knowledge of procedures to
combat
terrorism. Intelligence is the most important factor in the negotiation phase.
The "
tradable items " can be held hostage as part of a mission, or they can be
taken by
terrorists as a contingent. Negotiable items can also be facilities,
explosives, chemical agents, or other things. The negotiation phase is as
important as the
other phases and depending on the value of the negotiable items they can
bring a lot of attention
to the terrorists and their cause. Terrorist demands can include the release
of
imprisoned terrorists , money, political recognition, or transportation out of
the country. Terrorists
negotiate under the threat of death to their hostages. Compromises are
made when the
survival of the terrorists is the most important factor in the negotiations.
The most
important point in hostage negotiations is saving lives.
Climax Phase
The climax phase can follow the initiation phase if the negotiation phase is
not
implemented. This is the case in murders when a single shot is fired, or the
detonation of
a bomb when there is no long detonation time. In this phase, security is at
its
highest level and authorities' radios are carefully listened to. There is no
specific duration for this phase.
Post-Incident
Phase This phase includes the evacuation of the target (not applicable in
cases of bombs already in
position, incendiaries or other explosives), the occupation of a safe house
or
intermediate area and movement towards the hiding place, and in some
cases the return to normal life if the
terrorist is not clandestine. Criticism and self-criticism is done in small
groups. This phase is as
important to terrorists as the pre-incident phase. The terrorists make a
withdrawal from the target
zone that is pre-planned and coordinated. Contingencies are planned in
case you find
witnesses or bystanders. Hostages or incidental people can be used as
shields. If
the terrorists are not discovered, cunning and maximum use of cover are
employed. If the
terrorists are withdrawing under pressure, the weaponry will be visible.
Withdrawal can be done
individually or in small groups by dispersing in various directions. In most
cases, the terrorists will wear a different change of clothing and
documentation.
Transportation is very important in removal operations. In a local operation,
the vehicles used in the recall can be pre-positioned and changed. The first
vehicle or
vehicles used are stolen while those used in the end may
belong to the terrorists. The terrorists meet in a predetermined location but
not
initially in the safe house in case they were followed. After safety is
guaranteed, the terrorists gather at the safe house to rearm. If necessary,
terrorists can take several days of inactivity before leaving the country.
If hostages are taken, they are generally incarcerated in "popular prisons"
normally not located in the safe house. Negotiations are conducted from
the
safe house. Requests for equipment and weapons are made at higher
echelons. The
leaders make the criticisms, the individuals who participated in the
operation make a self-criticism.
Criticisms contribute to lessons learned and serve as the basis for
future operations . New methods, tactics and strategies are formed based
on the lessons learned
Page | 40

from past operations. The most sophisticated terrorist organizations have a


complex reporting and recording system for their subordinate groups.

New international terror

Page | 41

Introduction
Recent history has established that the most unpredictable but enduring
threat within
most counterterrorism programs are organizations that operate
transnationally, independently or with the help or support of
international organizations . Such groups have consistently demonstrated
their ability to attack and
disappear where their threat is considered minimal or nonexistent. For this
reason it is
essential that analysts and officials can examine those organizations that
operate within
their area and those that have demonstrated an interest (established
through the analysis of
ideologies and strategies) and potential (established by the analysis of
networks of
international support ) to select targets in your particular area.
When beginning the analysis of international terrorism, two points of
caution must be kept in mind . First, despite the fact that there is much
confirmed data that defines the relationship between
terrorist groups throughout the world, it is incorrect to assume that there is
a concerted and
coordinated effort against the West by terrorist groups. Many of the
relationships
established and much of the coordination between terrorist organizations
serve the purpose of
facilitating operations and do not result from ideological solidarity. So in
most cases
the ties between these organizations are only as strong as the individual
benefits that will
result from such membership. Second, there has been much discussion
about the
Soviet Union's contribution to international terrorism, but there is no
substantial evidence to indicate that they
control or direct individual actions of any terrorist movement. So if we
assume
this to be true it would be an oversimplification of the problem. But given
the evidence
indirectly implicating the USSR with international terrorism, and the
relationship of
Soviet foreign policy through the years to the development of terrorist
movements throughout the world,
an examination of the USSR-terrorism relationship it could serve as the
basis for a
threat analysis.
Soviet Involvement in the Evolution of Terrorism.
A. Since the introduction of nuclear weapons to conventional warfare,
international conflict has taken the form of mass destruction. Due to the
latest
technological advances in strategic military weapons systems, the world's
super-powers have
recognized that a conventional war could only result in almost
complete destruction . This fact has resulted in the evolution of the Low
Intensity Conflict (CBI) as a
"cheap" means or system of conflict between East and West. The Soviet
Union has enjoyed
its strategy of diminishing US influence and increasing its own influence
through
CBI with little threat of overt military attack. This strategy has been
constantly escalated
since World War II and has emerged as an integral part of
Soviet foreign policy .
Communist countries are masters of propaganda. Throughout the twentieth
century they have
interpreted and published the Marxist / Leninist ideology to serve their
present political interests . While Lenin proposed that an anti-imperialist
united front of nations would "triumph
in the end" after a "disastrous clash" with the capitalist states, Nikita
Khrushcev
realized that this strategy would result in a nuclear war with the west. As a
result the
communist party came to new formulations during the 20th Party Congress
in February
1956. They declared that war was not inevitable, and that communist
victory would come as a
result of the class conflicts that would result in capitalist nations and
support.
Soviet of any just war of national liberation. This policy established the
objective of
undermining the stability of pro-western regimes in third world nations,
especially
those that were rich in minerals which were crucial to the industrial west, by
training and arming communist groups for sabotage, guerrilla warfare and
the
Page | 42

terrorism. Its main objective was to defeat capitalism through economic


isolation.
From that point on, the foreign policy of the Soviet countries has been to
support a wide variety
of extremist groups for political reasons rather than ideological solidarity.
Many movements
began to adopt Marxist ideology primarily as a "flag of convenience." The
Marxism provided a model for revolution against the state, denying the legal
authority
of the government and ensuring a sense of legitimacy through identification
with the support with
the Soviet Union.
The policy established in 1956 has continued to be pursued more
aggressively.
At the XXIV congress of the Communist Party (March 1971) they reaffirmed
their support for this policy by
declaring that the success of world communism depended on the
cohesiveness of anti-
imperialist forces (including terrorist movements). The decision was made
possible due to the fact
that in the 1970s the USSR had come to terms with the west in strategic and
conventional terms . Therefore, his leadership had fewer restrictions in
proclaiming its right to
project its power to conflicts in third world countries. In 1974 Soviet leaders
proclaimed that the responsibilities of the armed forces were no longer
restricted to the
defense of their country and other socialist countries. They declared that
imperialist aggression would be
rejected where it was found. From that point on, Soviet military might has
been used
to support revolutions and exert control over the new governments that
result.
With a publicized policy of active intervention when circumstances warrant,
the
Soviet Union has long recognized the most efficient way to create such
circumstances is terrorism. Terrorism, small numbers of individuals,
properly indoctrinated , trained, financed and armed can effectively
demonstrate to an
international audience the face of a popular movement against an unstable
government. This
perception can open the door to Soviet military intervention in "Just Wars"
of
"National Liberation" or to liberate the masses from their "oppressive
capitalist governments".
In 1958, Khrushcev founded the Patrice Lumumba Friendship University in
Moscow to
serve as a basis for the doctrination and training of potential "freedom
warriors" who
were from third world countries that were not active members of the
Communist Party. The KGB
soon established courses to train terrorists not only in the Soviet Union but
also
in other Eastern Bloc countries. By establishing contact with numerous
liberation movements in third world countries the Soviet Union provided
them
with tools with a way to deny most training activities. This is only one of
the strategic purposes of the relations established by the Soviet Union and
the organization
for the Liberation of Palestine (PLO).
The PLO and World Terrorism.
A. From its beginnings, the PLO has declared itself to be a guerrilla political
organization
destined to liberate Historic Palestine and create an Arab state. But its
actions have
proven that it is actually a front organization for a large diversified number
of
Palestinian groups, supported by different states and leaders, each with
their own ideology and
having basically two factors in common: the desire to control the refugees.
of Palestine,
and if possible, to exercise control over the entire Middle East through the
use of terrorism wherever
possible. The PLO developed into a professional
terrorist organization with great financial help from various state leaders,
each paid for
different reasons and in pursuit of their own ends. The recognition of the
PLO as the sole
representative of the Palestinian Arabs is also another farce as the PLO is
actually
representative of a large number of Palestinian terrorists who cannot and
do not want to find
a common language or national purpose. The OLP, through its
component organizations, has played a great role in establishing mutual
cooperation between the
Page | 43

terrorist organizations throughout the world, thus presenting themselves as


a
major element of the international terrorist network.
B. The Soviet-PLO connection has been established by facts and documents
found
in the 1982 Israeli invasion of Lebanon. Such evidence establishes that the
PLO has served as a
conduit for the export of KGB terrorism techniques to other regions and
therefore
constitutes an essential element in the USSR's regional and strategic
strategy. The PLO helps
in the transmission of doctrines and skills to promote destabilization
campaigns by
other terrorist groups in Europe, Latin America, the Caribbean, Asia and
Africa.
As a result of the humiliating defeat of the Soviet Union during the
1967 Six Day War, the Soviets lost prestige and expensive weaponry in the
Middle East. The
immediate need to increase its power in the region resulted in the strategy
of trying to isolate
Israel and the US by exploiting the Arab-Israeli conflict. The main reason for
the instability
and conflict in the Middle East had been and would continue to be the
Palestinian resistance movements . After the Six Day War, various factions
emerged that professed
Marxism / Leninism as their ideological justification for revolution and
terrorism.
The Soviet Union recognized the Palestinian resistance as an integral part
of its
global anti-imperialist struggle in order to justify its support for the PLO as
consistent with its
foreign policy of obtaining the communist destiny for the whole world.
D. The first Marxist / Leninist faction within the PLO, the Popular Front for
the
Liberation of Palestine (PFLP), served as the basis for internationalizing
terrorist operations throughout the 1970s. It was founded in 1967 by Dr.
George
Habash. The PFLP rose to fame due to its special "foreign operations"
involving countries not directly involved in the Middle East conflict. The
PFLP
justified its acts of international terrorism 'by stating that the Palestinian
conflict did not have the
necessary elements for a mass war like that of Algeria or Vietnam and as a
result it needed more spectacular methods to publicize itself and cause
harm to its
enemies. A guerrilla war in historic Palestine could only be limited in
scope. Making the whole world as its battlefield the PFLP wanted to "force
international opinion to realize that if there was a Palestinian cause and that
there was a people
who had been driven from their lands fighting in foreign lands because they
had been denied
their own lands. " The PFLP argued that foreign operations served to keep
the
problem present in a way that limited guerrilla operations could not. To
expand its operations around the world, the PFLP actively established
relationships with
foreign terrorist movements to coordinate the necessary support for
international terrorism . The FPLF used its international connections to
organize and execute some of the
most spectacular operations in modern terrorism.
E. One of the main forces in establishing relations between the PLO and
other terrorist groups throughout the world was the Chief of Operations of
the PFLP, DR Wadi
Haddad. Their main vehicle for establishing these ties was a network of
operatives in
Europe made up of the Mohammad Boudia Group. This group was led by
Mohammad
Boudia and was based in Paris. Boudia, based in Paris, laid the foundation
for
mutual support between the PLO and European terrorist organizations.
Boudia was assassinated in 1973 by
an Israeli Secret Service team as part of their "Wrath of God" operation. With
his death, the
leadership of the Boudia Group was given to a Venezuelan-born terrorist
named Ilych
Ramírez Sánchez.
F. Ilych Ramírez Sánchez (known by the pseudonym Carlos) operated as
an
ideological mercenary and played a leading role in establishing international
ties.
Page | 44

among terrorist organizations. There are strong indications that Carlos


always operated as an
international terrorist in the service of the KGB. Carlos was recruited by the
KGB in Venezuela and
sent to Cuba in the 1960s where he was trained in terrorist tactics at Camp
Matanzas. From Cuba he was sent to Moscow for further training at Patrice
Lumumba University from where he was expelled in 1969. His loud
expulsion from the university in 1969
is perceived by many as a hoax or an attempt to cover up other more
clandestine motivations . After taking the leadership of the Mohammad
Boudia Group in 1973
Carlos quickly established a relationship between Dr. Haddad and the Red
Army Faction (FER),
the Red Brigades (BR), and the Turkish People's Liberation Army (EPLT),
thus gaining
the name of the "International Jacal". During his short but active career, he
coordinated and supported some
of the most successful terrorist acts of the 70s.
F. As a result of the leftist orientation taken by the PFLP, Ahmad Jibril
(formerly a Syrian officer), one of its military leaders, broke away to form the
General Command of the Popular Front for the Liberation of Palestine (CG-
PFLP). Jibril established contacts
with the Bulgarian Intelligence Service, which from 1972-1982 acted as a
sub-agency of the
KGB for the international support of the PLO terrorist operations. The CG-
PFLP has strong
ties to Libya and Syria. Both countries have provided them with financial
support, training, and
weapons. In addition, Kuwait-based Palestinians and Syrian army officers
who
knew Jibril from his days in service support the CG-PFLP.
G. The second and most serious division of the PFLP occurred in 1969
when Nayef Hawatmeh
established the Popular Democratic Front for the Liberation of Palestine
(FPDLP). Seeking a
more rigorous Marxist approach, Hawatmeh had ties to the subversive
factions of the
extreme left, the Communist Party of Iraq, and revolutionary movements in
the Gulf and
Lebanon. He made international contacts with groups that were also
working with the
world revolution, notably Trotskyists and new leftists in Europe.
H. In addition to the PFLP and its two groups, the largest Palestinian group,
Al Fatah (founded
by Yasir Arafat), was involved in international terrorism using the name of
the
Black September Organization (OSN) during the period 1971- 1974. Using
Fatah's international support structure with the help of the Bulgarian
intelligence service, the
OSN was responsible for numerous operations including the assassination
of the Prime Minister
of Jordan and the attack on Israeli athletes at the Munich Olympics in 1972.
Throughout from
the PLO's desire to impose the Palestinian struggle on the Western world
and through its vast
organizational structure the Soviet Union has used them as a link in the
Eastern bloc's support for Western Terrorist organizations. The PLO has
enjoyed
special diplomatic status in the USSR, moving freely through the eastern
bloc like no
other diplomatic representative. This has resulted in the PLO's use of
diplomatic
and intelligence channels through Western countries.
I. Throughout the 1970s, coordinated support links and mutual cooperation
were
established and exploited as the main cause of Western destabilization. It is
apparent
that the largest terrorist organizations throughout the world could not
continue to scale their
activities without the support of states through the support network. This
has been substantiated with the
available data that identifies the links between the countries of the Eastern
bloc and the
international terrorist infrastructure . The PLO's coordination has resulted in
relationships between states that
support militants and such groups as the Irish Republican Army (ERI), the
Red Army Faction (FER), the Red Brigade (BR), Direct Action (AD), the
Homeland Basque and the
Liberation Party (ETA), the Communist Combat Cells (CCC), the Japanese
Red Army (ERJ), the
Armenian Secret Army for the Liberation of Armenia (ESALA), the Turkish
People's
Liberation Army Revolutionary Coordinating Board ( JCR) and the
Sandinistas, among others.
Page | 45

J. The Irish Republican Army (ERI): The terrorist arms of the ERI, mainly
the provisional arm (ERIP), are determined to achieve the complete
withdrawal of British troops
from Northern Ireland (Ulster) and the establishment of a socialist country
with 32 counties or a
social democratic republic on the entire island. The ERI terrorism is
designed to motivate the
people of Ulster, Ireland and England to pressure the British government to
withdraw from the
area and also to allow Catholics and Protestant Irish to resolve their conflict
without
outside interference. Using terrorism the ERI hopes to focus world attention
on the
Irish struggle for independence against the oppression of the British
government and in this way
generate international pressure on the British government. The relationship
between the ERI and the OLP began
shortly after the reorganization of the ERI in 1976. In 1968 members of the
ERI began
training in camps in Jordan controlled by the PFLP. In May 1972 the ERI
organized
a conference in Dublin for international terrorists and was attended by
representatives of
the PFLP and the JRJ. This conference resulted in a campaign of "joint
military operations on
British territory against Zionist targets" by the PLO. and the ERI. From this
point on,
there has been a direct relationship between the terrorist campaigns of the
ERI and the weapons received from the
PLO.
The head of the PLO, Yasser Arafat now says that the relationship between
the PLO and the ERI does not
exist. This change in attitude is largely due to the recognition of their cause
by the
European Economic Community (EEC), but many terrorist factions identified
with the PLO
do not take their orders from Arafat. The ERI also has links with FER, with
BR and with ETA.
K. Red Army Faction (ERF): Essentially Marxist / Leninist. The
original group proclaimed that since the state was a system of rule by class
and suppression, the
government, its institutions and its bosses had to be rejected by all political
and
violent means available . Throughout their history they have received
support from the
East German security forces , "Carlos" and the PLO. East Germany has
allowed various members of the
ERF to use East Berlin as a starting point on their world travels knowing that
they
are being pursued by West German police. "Carlos" was an important
element in
establishing a system of cooperation between the ERF and the OLP.
Members of the ERF have traveled to
countries such as Lebanon, Syria, Iraq, Kuwait for training purposes as well
as a
refuge for the West German authorities. It is very likely that the ERF received
much of its weaponry from Palestinian sources. In the past the PFLP and
Fatah cultivated
contacts with ERF members and supporters and at various times the ERF
was associated with the
PFLP faction of the late Wadi Haddad. The first ERF / PLO operation was an
attack on a
Jewish home for the elderly in West Germany. The 1972 Munich massacre
on
Israel's Olympic team was organized by the PLO together with the ERF, who
provided
logistical support and safe houses. Other joint operations include the 1976
attack on the
OPEC conference by the Mohammad Boudia Command led by Carlos. This
group consisted
of Lebanese, Palestinians, and two members of the ERF. The 1976 hijacking
of the plane in Entebbe
was also a joint operation between the PLO and the FER (there were two
members of the FER at the
hijacking). The FER is suspected of having ties to the ERI, ETA, the BR, and
the October 1 Group
of Anti-Fascist Resistance. Recent events have resulted in an anti-NATO
alliance between the
ERF, AD, and the CCC. This topic will be discussed in more detail later.
L. Red Brigade (BR): The BR is the most violent and ultra-left group that has
operated in
Italy. The BR is essentially an anarchist group although it subscribes to
Marxist / Leninist rhetoric . Its objective is to overthrow the Italian
government by revolutionary means. Anti-
American and anti-NATO, the BR is dedicated to the fight against Western
imperialism. The BR
has a treaty with the PLO on weapons. The PLO obtains weapons from the
BR for use in
its operations against Israel and American citizens in Italy. The BR also
hides
weapons in Italy for Palestinian groups operating in Europe. The last
arms treaty with the PLO was made for Arafat (through Abu Iuad) in 1979. In
fact, the relationship
between Arafat and the BR was so close that Arafat was asked to intervene
in the liberation of
Page | 46

Aldo Moro during his two months of kidnapping. In September 1984 the
judicial authorities
in Venice issued an arrest warrant for Arafat accusing him of smuggling
arms into Italy. The BR has received most of its training in boot camps
in Libya. Complicity in BR activities by Czechoslovakian agents indicates
direct support from the Eastern bloc. There is a strong relationship between
the BR and the FER, the ERI, AD and
the ETA.
K. Direct Action (AD): The AD proclaims a leftist anarchist ideology aimed at
increasing the class confrontation by armed means against Western
imperialism. The group
also seeks to retaliate against what they perceive as a repressive policy of
the
French state . There is no information indicating whether AD members
receive training of any
kind. As there is evidence of a link between AD and Lebanese terrorist
groups operating in
France, it is possible that some of its members have received training in the
Middle East. AD is suspected of having contact with the FER, BR, ETA, and
CCC. The relationship between DA,
FER, and CCC will be discussed in another section.
L. The Basque Homeland and Freedom (ETA -Euskadi Ta Askatasuna): ETA
is a
terrorist / militant separatist organization. The group is divided into two
factions, the Military Front
(ETA-M) and the Political-Military Front (ETA-PM). The common objective of
the two factions is to
establish an independent territory (Euskadi) in the four Spanish Basque
provinces
Vizcaya, Álava, Guipúzcoa, and Navarra. The first Basque terrorists to
receive
foreign training were sent to Cuba in 1964. After this, a wave of
violence occurred in Spain that suggests the application of a plan rather
than a spontaneous occurrence.
It seems that in the case of the ETA those in charge of its training made the
decision to
exploit the hostile feelings of the ETA and influence them towards a violent
path. ETA continues to
have contact with the Cuban government and this has developed relations
with the Sandinistas.
The PLO and Czechoslovakia have trained ETA members. The Spanish
government thinks that
there is probably a relationship between ETA terrorist activities and
activities by
the Soviet Union and the Eastern bloc. ETA has received weapons through
OLP channels and has
had contact with Carlos, the FER, the ERI and the BR.
M. The Japanese Red Army (JRJ). Since its inception in 1971 the ERJ has
operated
as a transnational terrorist group with the goal of a simultaneous world
revolution.
During the 1970s the JRJ worked with and for the PFLP in its conflict
against Israel as
"a voluntary army dependent on the Palestinian revolution." Since its
founding the ERJ has
been based and has operated mainly outside of Japan. In addition to its
transnational operations in support of the PLO, the ERJ has the objective of
establishing a people's republic in
Japan by joining those sectors oppressed by Japanese imperialism. They
seek to create a "
united front " of all leftist forces throughout Japan. Despite this objective,
the
ERJ's intentions to conduct operations in Japan have not been carried out
by the internal security of
Japan. The need to establish a secure base of operations outside of Japan
resulted in a
treaty between the ERJ and the PLO where the ERJ would work on behalf of
the PLO, receiving
weapons, explosives, military training, and a base of operations in exchange
. Beginning with the
operation at the Lod airport near Tel Aviv, Israel, the history of the JRA
reflects
highly successful international operations , dramatic and famous for their
level of indiscriminate violence. The
ERJ has confirmed contacts with the ERF. Furthermore, Carlos was
responsible for the liaison between
the PFLP and the ERJ in Europe. It can be assumed that the ERJ obtained
great benefit from
Carlos's network .
N. Armenian Secret Army for the Liberation of Armenia (ESALA). ESALA is a
transnational ethnic terrorist group that proclaims a Marxist / Leninist
policy and solidarity with
global leftist and separatist movements. The main objective is the re-
establishment of
the historical homeland of Armenia, an area that included most of Eastern
Turkey, Northern
Iran, and the Armenian Soviet Socialist Republic in the USSR. ESALA also
requires an admission
Page | 47

of guilt of the Turkish nation for the organized massacres of Armenians that
took
place between 1894 and 1915 and an immediate end to the modern
discrimination of the Turks
against the Armenians. A division against in 1983 in ESALA did not alter the
objectives of
either faction, but did cause a change in the use of violence by each group.
The most extreme faction, ESALA-Militant (ESALA-M) has expanded its
Turkish targets and
initiated indiscriminate violence against non-Turks, ESALA-Revolutionary
Movement
(ESALA-RM) is expected to limit its attacks only to Turks. Since its founding
ESALA has
expressed complete solidarity with any terrorist and separatist group
fighting against
"imperialism" throughout the world. ESALA was based in Beirut prior to the
1982 Israeli invasion of Lebanon, which forced the groups to move, possibly
into Syria. There are
unconfirmed reports of ESALA bases in Athens, southern Cyprus, France,
and Iran. Prior to 1982,
ESALA members received training in Syria in Syrian camps operated by the
PFLP. The training camps used at present by ESALA are located in
the Syrian-controlled portion of Lebanon in the Békka Valley. ESALA
terrorists also
receive training in Iran. Since their departure from Lebanon, ESALA
elements have had
a working association with the radical Palestinian anti-PLO group Abu Nidal.
As a result,
the PLO's support has evaporated and the PLO is said to have started
working against
ESALA.
Profile of State-Supported Terrorism.
State support for terrorism ranges from moral and diplomatic
support to material assistance through weapons, training, funds, and
sanctuary. State-
supported terrorism is characterized by several common factors and
characteristics. It is almost
always conducted clandestinely and terrorist states always deny
responsibility
for specific terrorist acts. Terrorist states use their intelligence and
security agencies or other intermediaries, and state-backed terrorists have
more
advanced and lethal access to material than independent groups.
As previously discussed, the Soviet Union, Eastern Bloc countries, and
USSR client countries (Cuba, Nicaragua, North Korea, Vietnam, Angola, and
Ethiopia) have
been instrumental in maintaining and perpetuating
revolutionary / terrorist movements. of the world. The emphasis in the
analysis of state-supported terrorism is
concentrated on those states that are less consciously submissive to the
USSR but that
have their own incentives to export violence across the world. Until recently,
Iraq was one of the most aggressive defenders of terrorism. But recent
events in the
Iran / Iraq war have resulted in a decline in their support for terrorism to
ensure
continued Western support for the war. In addition, southern Yemen is
considered a state
that supports international terrorism but the support will not be discussed
here as it is only limited
to providing training bases and shelter, which is minimal considering the
three
major directors of international terrorism. The three states that correspond
to the profile of
supporting- states are Syria, Libya and Iran.
A. Libya: Libya's support of terrorism began soon after COL
Mu'ammar Gaddafi assumed power in 1969. Gaddafi immediately took a
radical international stance against Western influence in the Middle East. As
a
strong proponent of the Palestinian movement, Libya in the 1970s started a
so-called "Jihad fund" to finance
Palestinian groups involved in terrorism, and to provide them with
sanctuary, training camps and
weapons. Later in the decade, Libya provided similar services to other
terrorists of
various nationalities. Gaddafi never sought to hide his support for these
groups, but he did
justify them as an element in the battle against imperialism and for national
liberation.
Its campaign of international terrorism against opposing regimes combined
with several
specific incidents has highlighted Libya as a major proponent of terrorism.
Page |

June 48 -11, 1984, Gaddafi says "We are now in a position to export
terrorism,
fires and liquidation to the heart of America, and we will do so if necessary."
-March 28, 1985, Gaddafi announces that "The lesson is that America was
driven out
of Lebanon when an individual Arab was able to kill 300 Americans ... an
armed people
will never be defeated, but regular armies are not reliable."
B. Syria: Syria has established an extensive infrastructure for the
recruitment and
training of terrorists operating against Israel, the US, Lebanon, Turkey and
the
Arab Middle East. They provide diplomatic assistance to terrorist groups
such as Abu Nidal, Sa'iqa,
Hezballa, the PFLP and the PFLP-CG. These organizations maintain offices
in Damascus and receive
weapons through Syrian diplomatic packages when abroad. By contrast the
use of terrorism by Iran and Libya, Syrian-backed terrorism appears to be
more institutional than
personal. Syria uses terrorism more directly in its efforts to coerce
PLO leaders to keep its police in line with Syrian targets in Lebanon. To this
end, Syria
has apparently reached an understanding with Abu Nidal for him to carry
out
terrorist operations against moderate Arab and Palestinian leaders. Nidal
has carried out
such operations at the request of Syria while Syrian-backed terrorism has
largely been confined to the Middle East. Western authorities think that a
liaison office established by the Syrian defense ministry in 1983 in Athens is
actually a
front to support a number of terrorist activities in Western Europe.
C. Iran: In 1981 the government of Ayatollah Khomeini established an
Islamic Revolutionary Council to spread the Islamic revolution throughout
the Middle East. The nations identified by the
Council to commit terrorist acts are Lebanon, Iraq, Kuwait, Tunisia and
Morocco. The
radical clergy who control the Iranian government think that the values
​​of the western and eastern
(Soviet) world are corrupt. They think that many Middle Eastern
governments are Islamic in
name only and as they are instruments of the USSR or the US they have to
be overthrown and
replaced by authentically Islamic regimes. To this end Iran has
internationalized its
revolution by providing support and direction to terrorists throughout the
Middle East. Under the name
of the Islamic Jihad Organization (OJI) front, several Shi'a extremist groups
receive
training in Iran and in Baalbek, in the Bekka Valley of eastern Lebanon.
Operational support
for terrorist activities comes from the Iranian Revolutionary Guards based in
Baalbek. At
the national level, these terrorist groups have quite a lot of support and to
some extent are led
from the Ministry of Islamic Revolution in Tehran, the chief being Ayatollah
Montazeri,
Khomeini's personal candidate to take power after Khomeini. Iran also
actively employs recruitment and training programs for Muslims in the
Persian Gulf,
Africa and Asia. The intention is to make these individuals available for
subversion or
terrorist operations in the future, particularly in the area of ​​the Gulf
states (
oil- exporting countries ). There is considerable evidence to suggest that
Iranian-led terrorism is
increasing in effectiveness and scope in Western Europe. Terrorists have
operated
using Iranian Embassies, Islamic cultural centers and study centers as
bases in
various European countries and this practice is expected to continue.
D. In addition to the individual threats that these three countries pose, there
is a
strange and worrying alliance between Syria and Iran in the Syrian-
controlled areas in the
Bekka Valley of Lebanon, there is a military contingent of the Iranian
Revolution Guards including
camps. training for terrorists. Revolutionary Guards regularly travel between
these locations and Tehran. The understanding between Syria and Iran in
their support for terrorism is
symbiotic for several reasons. Iran needs allies, and in today's Arab world,
given
Ayatollah Khomeini's fundamentalism, they are hard to find. The moderate
countries
consider Iran's fundamentalism as threatening as Marxism. Khomeini also
wants the support of the fundamentalist Shi'ites outside of Iran because he
sees them as an instrument
to expand his philosophy and they represent the fifth column to overthrow
anti-Shi'ite regimes.
Page | 49
From the point of view Syrian Assad needs help to manage the fragmented
Muslim communities in Lebanon and Iran can help to this end, specifically
by countering
terrorist activities against Syria. Islamic Jihad activities against the US have
been a
convenient method of putting pressure against US policy in Lebanon with
little
risk towards Damascus.
E. The Abu Nidal Group - (also known as Al Fatah - The Revolutionary
Council; the
Black June Organization): Rejects any effort towards a political solution in
the Middle
East and believes that the armed struggle against the Zionist enemy should
be the priority of
the Palestinian resistance movement. Simultaneously, he has called for the
destruction
of the reactionary regimes in Egypt, Jordan, Kuwait, Saudi Arabia, and the
Persian Gulf and
criticized the restraint of the PLO and its absence of revolutionary fervor.
Consequently, the
Abu Nidal group thinks that Arab and Palestinian terrorism are necessary to
precipitate an
Arab revolution that is the only solution for the liberation of Palestine. The
Abu Nidal group is
important on the issue of state-supported international terrorism because
several countries have
used this organization as a vehicle for their terrorist activities. Originally
used
by Iraq against moderate Arabs and Palestinians, the group had ties to Iraq's
Ba'th party
and Iraq's intelligence system and to the politics of these two institutions. In
1981 the group
distanced itself from Iraq and established relations with Syria. After moving
between Damascus and Baghdad
from 1981-1983 (being in the unique position of receiving support and Iraq)
the group was expelled from
Baghdad in late 1983. The actions taken by the group are for the purpose of
embarrassing
the PLO because many of their terrorist activities are identified as acts
committed by the
PLO (the Abu-Nidal group is Palestinian although it is not a member of the
PLO). These activities damage
the PLO's effort to reach a negotiated solution to the Palestinian problem.
Since
1980 the group has attacked Jewish targets in Austria, the country that
supports the PLO most in
Western Europe . The assassination attack on the Israeli Ambassador in
London in 1982 was in
reaction to Israel's invasion of Lebanon in June of that same year. This is
important
because the invasion resulted in a direct alignment of many factions of the
PLO with
radical Arab countries (mainly Syria and Iraq) after their expulsion from
Lebanon. This act put
the various Arab countries in control of the PLO. Also this series of acts
increased the
influence and power of Syria in Lebanon, something that helped the Abu
Nidal group to achieve its
objectives. Claims associating the Abu Nidal Group with the BR, FER, AD,
and ESALA are
reliable but poorly defined. Nidal relies heavily on Palestinian students in
Europe as a recruiting and operational support base for its international
network.
F. European United Front: For several years several
leftist European terrorist groups have supported the establishment of an
international united front against
"Western imperialism" and particularly against its most powerful symbols -
NATO and the
American presence in Europe. Since the summer of 1984, at least three of
these groups - the
Western Al Faction of the Red Army, the French group Direct Action, and the
Communist Combatant Cells of Belgium - have apparently collaborated in a
communist offensive
against NATO that came to fruition. to a high level of violence in February
1985. In January of that same
year a joint proclamation by AD and FER indicated the importance of
preventing the installation of the
"Cruise" and "Pershing" projectiles in Europe. On January 15, 1985 the AD
and the FER
officially announced their operational union. There is enough evidence
based on documentation and
arrests to indicate that NATO military installations are important targets for
the FER, AD and CCC. As mentioned above, the Italian Red Brigade has
committed
terrorist acts against NATO during the 1980s with operational ties to the
ERF and AD. Although
there is no evidence to indicate that the BR intends to join the United Front
of the FER, AD and CCC, in
the future, this kind of alliance may be ideologically and operationally
advantageous for all
four groups.
As this discussion has indicated, the analyst is faced with a difficult job in
developing the information necessary to effectively identify terrorist groups.
Page | 50

transnationals. But with an understanding of the latest developments in the


international cooperation of terrorist organizations, this will provide the
analyst with the
necessary information to determine the potential bases of support that
extend to his area of
responsibility. By understanding the ability of these groups to carry out
attacks in their areas, the
analyst can progress with a specific threat development program given the
general threat of transnational / international terrorism.

Page | 51
Terrorism in Latin America

Introduction
To better understand the situation that exists today in Latin America, one
has to have
knowledge of its history and the relationship between this history and that
of the United States.
Central America
Studying the history of United States intervention in Central America, one
has
to consider the North American need to acquire a sea route between the
east coast and the
west coast and the logical location of a canal to obtain this result. Taking
this into
account, there have been three geographic locations that have played an
important role in
North American policy toward Central America: the Strait of Tehuantepec in
Mexico; the Rio San José and
Lake Nicaragua in Nicaragua and the Isthmus of Panama in Panama. At one
point, each
site was considered the place to build a canal. Sure, as is known, the canal
was
built in Panama, but great consideration was given to building the canal
elsewhere.
For example, in the case of Mexico, there is still a railway system located
where
the canal was considered to be built. The canal was not built in Nicaragua
for reasons of opposition in
the North American Congress and for fear of earthquakes in that area. Now,
we are going to study the
historical importance of some countries in the area:
Panama
Panama was voluntarily annexed to Colombia in 1821. Around 1890, the
United
States tried to ratify a treaty that would have allowed it to build a canal but
the treaty was
rejected by the Colombian Senate. The situation resulted in a revolution and
Panama won its
independence from Colombia in 1903. A new treaty between the United
States and Panama
allowed the United States to build and maintain control of the new canal.
Nicaragua
Relations between Nicaragua and the United States worsened in the early
1900s when the United States decided to build the canal in Panama. The
situation got
even worse when several American citizens were killed and, as a result, the
United States sent the Marines. The North American presence continued
until 1923 when a
treaty allowed the United States the right to build a canal and maintain
bases in
Nicaragua. In 1927, responding to domestic problems and to prevent a plan
to build a
canal by an English-Chinese company, the United States again sent 2,000
Marines to
Nicaragua. This time, the Marines faced Augusto Sandino, a local hero, who
was
fighting against the North American intervention. In 1934, the commander
of the National Guard,
Anastasio Somoza, established a ceasefire and invited Sandino to negotiate
peace. Sandino
obeyed the cease-fire and when he returned from the mountains to
negotiate, he was assassinated by
Somoza's men. Soon after, Somoza seized power and established a
government that he ruled
for fifty years under the control of the Somoza family.

Page | 52

El Salvador
At the end of the nineteenth century, El Salvador applied to the United States
Congress for
permission to incorporate as part of the Union. From 1920 to 1930, El
Salvador was
ruled by a series of military dictatorships. During World War II, El Salvador
initially supported the Nazis before changing its alliance to the Allies.
Unemployment and lack of
land forced 300,000 Salvadorans to move to Honduras. The mistreatment
they received in
Honduras and a series of hectic soccer matches between the two countries
resulted in the
Soccer War . The war was an economic disaster for both countries.
Honduras
During 1911 and 1912, the internal problems of Honduras forced President
Taft to
send the Marines to protect North American economic interests (the
banana industry ). The United States presence remained for two years until
calm settled down, but in reality the situation in Honduras never improved.
In 1969, the economy
seriously worsened as a result of the Soccer War with El Salvador.
Guatemala and Costa Rica
Historically, the United States has had very little relationship with Guatemala
and Costa
Rica. Generally, Costa Rica has always been a model of a stable democracy.
In
the mid-1950s, Guatemala was ruled by a communist government. A coup
led by the United States replaced the government. At this time,
the international communist Ernesto "Che" Guevara appeared in Guatemala.
Apparently, the head of the CIA in
Guatemala, HR Alderman, had Guevara in detention but was released
thinking that he did not have much importance in the communist
movement. The rest is for the
story; Guevara went to Mexico where he joined the forces of Fidel Castro for
the invasion
of Cuba. Now that we know a little about the history of Central America, we
are going to study each
country from a terrorism point of view.
Guatemala
1. FAR (Revolutionary Armed Forces): The FAR is a
Marxist-Leninist terrorist organization with a Castroist orientation that is
violently opposed to the interests of the
United States. Its objective is to seize power to carry out a "Socialist"
revolution. The FAR was
formed "in 1968 when it broke with the Guatemalan Communist Party.
Between 1968 and 1970, the
group suffered many losses as a result of military operations by the
Guatemalan army.
In 1971, the group split into two - one of them is the EGP
2. EGP (Guerrilla Army of the Poor): The EGP defines itself as a
Marxist-Leninist political-military organization ". The group takes Cuba and
Vietnam as
revolutionary models and has proclaimed "a war to the death against US
imperialism
and its representatives." The objective of this group is "to destroy the army
and other
repressive bodies of the ruling classes that are supported by imperialism"
and to seize
political, military and political power through a "people's revolutionary war."
The EGP has suffered
many losses through government actions.
3. ORPA (Revolutionary Organization of the Armed People): The ORPA is
quite
different from the other Marxist-Leninist groups. ORPA practices a new
theory of liberation
trying to involve the Indian sector.
Page | 53

Communicating with the Indians in their own dialect, the ORPA describes
the
Guatemalan army as the army of the rich that kills, tortures, and kidnaps
innocent civilians. The
ORPA evades political rhetoric about the evil of private property knowing
that the Indians
appreciate their tiny lands. Up to this point, the ORPA has been successful in
overcoming the
traditional resistance and passivity of the Indians. ORPA was formed in
1979 beginning with
attacks on different towns in the latter part of 1979. ORPA has probably
received
help from Cuba and Nicaragua in the form of weapons, logistics, and
training. ORPA has contact
with terrorists in El Salvador.
Honduras
1. Cinchoneros: Los Cinchoneros is a group of the extreme left that
supports the use
of violence and that had been part of the pro-Soviet Honduran Communist
Party. It has a
Marxist-Leninist orientation against the interests of the United States. The
objective of the
Cinchoneros is the seizure of power. The group's name comes from a
peasant who died in the
nineteenth century for refusing to pay taxes to the Catholic Church. Since
their formation in 1980, the
Cinchoneros have been the most active group in Honduras and at this time
they are more dangerous due to
the help they receive from Cuba.
El Salvador
1. FMLN (Farabundo Marti for National Liberation): The FMLN is a
Marxist-Leninist terrorist organization with a Castroist orientation that
supports the "prolonged war" against
"Yankee imperialism" and the Salvadoran oligarchy. When it was founded in
1970, most of
its members were university students. Farabundo Martíwas a communist
who died in a
peasant demonstration in 1932. The FMLN has been the most active
terrorist group in El Salvador,
made up of university, peasant and union groups. The FMLN is made up of
five
Marxist-Leninist organizations: the Popular Liberation Forces (FPL), the
People's Revolutionary Army, the National Resistance Armed Forces (FARN),
the
Central American Workers' Revolutionary Party (PRTC) and the Liberation
Armed Forces.
(FAL) which is the armed wing of the Salvadoran Communist Party. The
FMLN directs all
terrorist activity in El Salvador and represents a powerful group because of
the help it receives from Nicaragua and
Cuba.
Panama
At this moment there are no terrorist groups in Panama, but there is a
criminal group
called Uno Indio. An Indian has no political or military objectives; the only
thing that interests him is
material gain. Although there are no terrorist groups in Panama, this does
not mean that there is
no threat. There is a large presence of Cubans, Nicaraguans, North Koreans,
and
Soviets in Panama. The Cubans have one of the largest missions in Panama
and the
Soviets have a large number of "technicians" at the assembly plant for the
Soviet Lada automobile . It is interesting to note that this plant is located
next to a
residential area of the North American Army and is close to one of the naval
bases.
SOUTH AMERICA
Colombia
1. FARC (Colombian Revolutionary Armed Forces): The FARC is a
Marxist-Leninist terrorist group with Soviet orientation. The group
represents the armed wing of the
Page | 54

Colombian Communist Party. During its history, it has suffered quite a few
losses, but because it
has remote hideouts, the FARC remains the most powerful group in
Colombia. There
is also evidence that the FARC are involved in drug trafficking to obtain
money and
weapons.
2. M-19 (April 19 Movement): The ideology of the M-19 is described as "
Scientific Socialism " and combines elements of the ideology of Castro,
Guevara, Mao and Trotsky. A faction
of the M-19,CNB / M-19, is a fanatically revolutionary group and very against
the interests
from United States. The group emerged in 1974 when he stole Simón Bolí‐
var's sword from a
museum. The kidnapping and murder of an American citizen was one of the
reasons for the
division between the two groups. At first, the M-19 was assisted by exiled
members of the
Montoneros / Tupamaros. This increased the size and capacity of the M-19
enormously. The
M-19's capacity was greatly reduced as a result of anti-terrorist actions by
the
army, but in 1980, the group emerged once again by taking control of the
Embassy of the
Dominican Republic. During the early 1980s, the M-19 continued to suffer
losses and a Cuban connection was discovered that forced the Colombian
government to
temporarily break diplomatic relations with Cuba.
Like the FARC, the M-19 receives money through robbery and drug
trafficking. The M-
19 has also been associated with other groups in South America.
3. EPL (People's Liberation Army): The EPL is the military arm of the
Colombian Communist Party . The PLA is extremely anti-American. His
original group was trained in
China and North Korea; but, most of its members have been killed by
government troops . It does not present a serious threat.
4. ELN (National Liberation Army): The ELN is a Castro, anti-
American organization that has a strong following among Marxist-oriented
Catholic priests,
many of whom have served as leaders. Like the EPL, it does not pose a
threat.
Peru
1. SL (Shining Path): The SL is a Marxist-Leninist terrorist organization
against the government of Peru and the United States that follows the
classic teachings of Mao Tse-
Tung and that closely follows the ideology of Pol Pot's Khmer Rouge. Unlike
the
Peruvian guerrillas of the 1960's that imitated Fidel Castro and Che Guevara,
the SL proclaim
that the rightful leaders of Peru are the Indians. It evolved from a Maoist
group known as
La Bandera Roja that split from the Moscow line in 1964.
Chile
1. MIR (Movimiento Izquierdista Revolucionario): The MIR was founded by
Chilean Trotskyists in 1965. It subsequently emphasized its Trotskyists to
accommodate an orientation
Castroist. It has carried out sporadic terrorist acts between 1969 and 1970.
During
Allende's presidency in 1970-73, the MIR was active in promoting agrarian
reforms and led
military occupations of rural states. After the military coup in 1973, most of
the
members of the MIR were forced to leave the country. Since then the MIR
has
been sporadically active. In the early 1980's, the MIR suffered a series of
delays and
has not been able to recover from the losses. Currently the total
membership is less than one hundred.
Page | 55

2. FMR (Manuel Rodríguez Front): The FMR is the military arm of the
Chilean communist party . As such it has been involved in many anti-
government activities. It does not pose
a considerable threat.
Argentina
1. Los Montoneros: Los Montoneros is an
urban- oriented terrorist organization , anti-Argentine government and
oligarchy whose ideology is a mixture of Peronism and
Marxism / Leninism. Together with their mass-based political organization,
the
Montonero Peronist Movement (MPM), they are involved in a "national
liberation movement" that aims
to reunify the fragmented Peronist movement and provide opposition to the
Argentine military . The Montoneros, organized as a legal Peronist group in
1968, emerged
as a terrorist organization in 1970 when they executed a former Argentine
president. He adopted
a Marxist / Leninist line after his union with the Revolutionary Armed Forces
(FAR).
In 1974, the Montoneros absorbed a faction of the Peronist Armed Forces
(FAP) and the
Armed Forces of Liberation (FAL - Maoist-oriented). During 1976 and 1978,
the.,
Montoneros were the most active and dangerous terrorist organization in
the Western Hemisphere.
It also became the most prosperous, accumulating millions of dollars
through kidnapping,
including $ 60 million in 1975. The Montoneros suffered a series of defeats
at the hands of
local security forces during the late 1970s. In 1977, the Montoneros
went into exile and by 1980 the group had been reduced to only 300
members. Since
then, the Montoneros have been inactive in Argentina.
2. ERP (People's Revolutionary Army The ERP was a Trotskyist group that
was
extremely active from the mid-1960s to the mid-1970s. The organization
disappeared when its leader was liquidated in 1976. Portions have merged
with the
Montoneros.
Uruguay
1 MNL (National Liberation Movement - Tupamaros): The name Tupamaros
was derived from Tupac Amaru, a Peruvian Indian leader, who claimed Inca
descent and who
led an Indian revolt in the late 18th century, was eventually captured and
burned at the
stake. The Tupamaros were founded in the early 1960s by a Uruguayan
law student , Raúl Sendic, who was responsible for the group's initial
success. The group was one of the
first to implement guerrilla operations in urban areas based on theory.
developed by Abraham Guillen, a Spanish ideologist of urban terrorism who
has
recommended a strategy of small guerrilla actions to force the forces of
security to hand over land, and also establishment of small cédulas that
could act
without reference to a high command, this strategy would be forced by
political work in order to
win the popular support of the masses. The downfall of the Tupamaros
came in 1972 when they
began indiscriminately killing individuals they held responsible for the
increase in victims of right-wing death squads. A declaration of internal war
was
forthcoming, this allowed any part of the country to be under military
jurisdiction. This step
proved to be the beginning of the end. By the end of 1972, two thousand six
hundred had been imprisoned
and forty-two dead; and movement had failed.
Brazil
1. ALN (National Liberation Alliance): In 1968, the Brazilian Communist
Party expelled
the notorious Carlos Marighella due to his radical views. Marighella in turn
created the ALN. The
militants ALN began to rob banks to finance their operations since they
believed that the
Page | 56

action creates the organization. During the period from 1969 to 1970 ALN
kidnapped the
US and Swedish ambassadors in exchange for a number of "political"
prisoners. For all her
actions, Marighella received extensive support from Cuba. The group
ceased to exist after the
death of Marighella during an exchange of fire with the Brazilian police.
Mexico
Terrorist activity in Mexico began in 1968 when a strike of 150,000 students
developed into a larger-scale revolt against the establishment by
leftist students . This revolt was suppressed by the armed forces with
substantial loss of
life and hundreds of arrests. Almost all terrorist / guerrilla groups can trace
their
origins to the events of 1968.
1. MAR (Revolutionary Action Movement): This movement, which emerged
after
a bank robbery, consisted of around 60 trained men and women in
communist ideology . Some of them had formed the MAR when they
attended
Patrice Lumumba University in Moscow. In 1974 the group was almost
completely destroyed by the
Mexican authorities.
2. Communist League September 23: An extremely violent group made up
of
elements of the MAR and the Popular Party of the Poor. Responsible for
attacks on police and
soldiers. The group ended its operation in 1968 when its boss Carlos
Jiménez Sarmiento was
killed by the police. The high level of training of this group is attributed to
the training
given by the MAR members trained in Moscow.
And continues….
Cuba
Before the revolution there were many indicators for a successful revolution
under
the military dictatorship of Fulgencio Batista, formerly a sergeant in the
Cuban army. During
the Batista regime, corruption, criminality and institutional terrorism
abounded,
peasant property was forcibly confiscated and a 30% commission on public
works contracts
was stolen by Batista. The creation of a National Revolutionary Movement
was logical given the
circumstances. This original movement eventually morphed into Castroism,
later
known as Cuban communism ideologically and intellectually. Fidel Castro
the
most influential personality in Cuba was born in 1926 and graduated as a
lawyer in 1950, two
important events in Castro's life should be mentioned. As early as 1943,
certain
Cuban intelligence reports said that Castro had been recruited by the KGB.
The other
incident occurred in Bogotá, Colombia during the 1948 Pan-American
meeting. Fidel and other
Cubans participated in violent riots and distributed communist propaganda
against
the United States. On July 26, 1953, Castro attempted a revolution by
attacking the hospital and
military barracks in the city of Santiago. This unsuccessful attack was
brutally
crushed by Batista's forces, killing quite a few innocent people in the
process. This
repression caused a supportive reaction in favor of the Fidel Castro
movement. The repression and the
Castro trial made Castro appear like a hero. In 1955, Batista, to gain
popular support , decided to grant a general amnesty to political prisoners.
Immediately, Castro
traveled to Cuba where he joined Guevara's forces and the preparation for
the invasion of Cuba
began. The invasion of Cuba was launched from Mexico and consisted of
82
poorly armed revolutionaries . Within just two weeks of his arrival, Castro's
forces had
dwindled to just nine men. But in the end, Guevara's revolutionary theory
proved
correct: if the situation is appropriate, a small group of guerrillas can
destabilize
the existing government through the use of rural guerrilla operations.
Page | 57

With Castro now firmly in power, we have to consider one factor to explain
Soviet-Cuban influence in the Americas. The factor is the introduction of the
KGB to the
Cuban intelligence system . Since 1961, the Kremlin had doubts about its
ability to control
Castro and his government. Repeatedly, the Soviets tried unsuccessfully to
control their behavior,
therefore a plan was formulated to replace Castro with a pro-Soviet leader.
In 1961,
an attack was made to carry out this plan, but Cuba's internal security
system
discovered the plan and Castro was notified. The conspirators were quickly
eliminated and the
Soviet ambassador was asked to leave Cuba. In 1968, a second plot against
Castro was discovered but this time the Soviets played their cards better
and stopped the flow of
oil to Cuba and effectively created an economic crisis. Castro had no
alternative but to
listen to the Soviet demands. Castro would permanently stop criticizing the
Soviet Union
and make the Directorate General of Intelligence (DGI) subordinate to the
KGB. To enforce
their demands the Soviets placed a KGB colonel within the Cuban DGI. Since
1970, all Cuban embassies have Cuban DGI agents supervised by the KGB.
Puerto Rico
1. FALN (Armed Forces of National Liberation): The FALN is a
Marxist organization dedicated to the independence of Puerto Rico, but
after adopting some
radical Trotskyist principles and aid from Cuba, it changed its goals towards
world revolution. The FALNs
operate in New York, Chicago, Miami, Los Angeles, and Washington DC
Historically, the FALNs are
the largest group that resulted from the division of the Nationalist Party. The
FALNs have taken
responsibility for numerous bombs in federal buildings and department
stores. The
groups were extremely active from 1975 to 1977. In 1978, a
homemade device explosion blew away portions of the hands and faces of
bomb maker Willie Morales
(Morales escaped custody and was recaptured in 1983 while planning
another bomb attack
in Mexico. ). The loss of Morales was a serious handicap for the FALN but in
1980, while
in the initial stages of another bombing campaign, twelve members were
arrested by
Chicago police.
2. Macheteros: Los Macheteros are a conglomerate of four groups: Los
Macheteros,
the Popular Boricua Army (EPB), the Popular Revolutionary Movement and
the
Revolutionary Party of Puerto Rican Workers. Together they form a
well-trained and organized terrorist organization; most of its members have
been trained in Cuba. It is
also through Cuba that the Macheteros have established connections with
other
terrorist organizations. Traditionally, Macheteros have attacked federal
buildings and
recruiting stations for the United States armed forces. Several devices
exploded in 1979 and a naval bus was ambushed in the same year. In 1981,
the Macheteros
destroyed $ 40 million worth of jet planes at the
Puerto Rico Air National Guard base . During this incident the terrorists were
so confident that they recorded the operation
and a copy of the recording was sent to local television stations for
propaganda purposes . Los Macheteros are still the most dangerous active
Puerto Rican group.
Rightist Terrorism
In Latin America there is an abundance of far-right groups. They generally
begin when the government or the military is confronted with illegal
activities that they
can not legally control. Most of these groups are made up of
police or military personnel and generally have the tacit support of the
establishment. Right-wing groups
apart from being very anti-communist have names that explain their
ideologies. Some groups
found in Latin America have names like the White Hand, Death to the
Kidnappers, etc. Of all the right-wing groups in Latin America, there are only
a few
that operate within the United States. From these groups we will discuss
about Cubans.
Page | 58

Alpha 66
This group was formed by 66 Cuban refugees in Miami in 1962 with the
purpose of
overthrowing the Castro government. The group trains in South Florida and
has had several
armed incursions from Cuba. Its leadership is composed mainly of veterans
from
Playa de Girón.
Omega 7
This terrorist group split from Alpha 66. It is a more violent group and
responsible for
numerous bombs inside and outside the United States. Its targets are
people or
organizations that have contact with the Cuban government.
The Board for Revolutionary Coordination (JCR)
On February 13, 1974, four Latin American terrorist groups founded a
coalition
to offer between both weapons, sanctuary, and financial support. The
original groups
involved in this coalition were the Tupamaros of Uruguay, Los Montoneros
of Argentina, the MIR
of Chile, and the ELN of Bolivia. The success of the JCR can be measured
by tracing the life of one of its
most famous recruits Elich Ramírez Sánchez (Carlos). Sánchez, born in
Venezuela, approached
the local communist party with the purpose of dedicating his life to the
benefit of Marxist idealism. The
Venezuelan Communist Party, on the other hand, approached the JCR. The
JCR was put in charge of
financing Sánchez's trip from Venezuela to Mexico and Cuba and finally to
the
Patrice Lumumba University in Moscow. We know Sánchez as "Carlos the
Jackal". The first funds
used to establish the organization came mainly from bank robberies and
kidnappings
for money carried out by the Tupamaros and the Montoneros.
Summary
The threat to Latin American interests continues to be a potentially
dangerous one
for the region; recent activity has done nothing to lessen this threat. The
potential
for the threat has increased tremendously all over the world including
countries
that traditionally have good relations with the United States.
This chapter has illustrated the role that terrorism has played in almost
every
country in the world.

Page | 59

Terrorism in Contemporary Society

Introduction and Historical Perspective


There are few things that can create as much fear in a society as
terrorist violence . This brutal phenomenon is not new. Terrorism has been
practiced for many reasons
and with varying degrees of success since the beginning of history. The
intrigue, plans, and
brutality of terrorism are as much a part of the production of the story as
the invention of the
wheel. Just as society has progressed throughout history,
terrorism has also progressed . Terrorism has become sophisticated and in
many cases has gained legitimacy.
History has many examples of terrorism and its influence during the course
of
human development .
Whereas in ancient times terrorism was exclusively associated with the
sword, bow and arrow, and poison, the invention of gunpowder changed
terrorism to the use of
bombs. Bombs have turned out to be the most common tactic employed by
terrorists. Risk
International, an organization located in Washington DC, determined that
in the 15 since 1970 approximately 75% of all terrorist incidents involved the
use
of bombs.
The history of terrorism can be divided into three major periods. The old
form of
terrorism generally lacked unity or clear ideology. It may be that the terrorist
incidents
had been motivated by plots, divided loyalties, and in many cases to
assassinate an
oppressor. The "legal" murder of a tyrant became a legitimate process in
which the murderers
were glorified as liberation heroes. Terrorist pressures on leaders and
society forced leaders to adopt stronger defensive measures that resulted
in even
more repression. This vicious cycle usually creates more dissatisfaction,
which is precisely what
the terrorists needed to destabilize the social system. This is still the
principle today
. For example, William Tell lived in the 14th century in Sweden, which was
ruled
by Austria at that time . William Tell was an insurgent who successfully
fought for the independence of Sweden.
The French Revolution.
The period between the use of gunpowder in war and the American and
French revolutions
can be characterized as a period of transition ending with the founding of a
true
revolutionary terrorism. During the American Revolution (1775-1783), the
colonists used
guerrilla warfare against the British, while the Loyalists (Torries) used
guerrilla warfare against the continental army and terror against the
colonists, hostile Indian groups were
used by both sides to terrorize the population. As a result of the war, the
French Revolution and political activities created a division between the
right and the left, quite
evident in terrorist activities today. In June 1793, the leftist
liberal French government of elected representatives was overthrown by
Marat, beginning an era of violence and
anarchism that lasted for a year until the fall of Robespierre. An estimated
17,000 people
Page | 60

lost their lives during this period. Since then numerous terrorist activities
have
been noted but few had a major impact on world order until the next
century.
Alexander II
The origin of contemporary terrorism can be traced to philosophical
terrorists such as
Bakunin, Nechayev, Morozov, from the 19th century in Russia. 'Serge
Nechayev's revolutionary catechism illustrates the philosophy of
revolutionary terror. Mikhaíl Bakunin exported the
revolutionary philosophy of terrorism from Russia to Central and Western
Europe with little success but he
managed to sow the seeds of terrorism that now produces high violence.
When Tsar
Alexander II was assassinated by a revolutionary group, this event caused a
series of incidents
that culminated in the Russian revolution and the murder of the royal family
in Ekaterinenburg. When
Gavril Princip, the Serbian revolutionary assassinated Archduke Franz
Ferdidnand in Sarajevo, it was a
terrorist act motivated by nationalism. This assassination started World
War I,
caused millions of deaths, destroyed three royal dynasties, and influenced
the formation of a
new Europe that instead contributed to another World War.
Countries, colonial wars and the fervor of liberation after World War II
The radical political movement of the students of the 1960s contributed to
this
phenomenon. The increase in the military power of the Soviet Union and its
activities outside its
borders gave the terrorists an ideological base, material, and training
support
as well as hideouts and operational bases. Many legitimate movements for
national liberation,
colonial wars and insurgencies were infiltrated and subverted by
revolutionary Marxists,
becoming more oppressive regimes than previous regimes. The
constant troubles in the Middle East created numerous terrorist
organizations that are
responsible for the most brutal acts known to man. Leftist groups
supported
by the Marxist / Communist Revolutionary Movement continue to terrorize
free societies on
all continents. At the same time, right-wing terrorism is increasing and
represents a threat to the stability of free societies. Advances in technology
allow terrorist organizations to communicate, travel, organize and operate
on a
global scale . As parasites, terrorists take advantage and exploit the laws of
democratic institutions to destroy the very societies in which they operate.
Today terrorism is
one of the most dangerous threats to the existence of any free country.
A quick review of some incidents of terrorism will help to better understand
terrorism in our contemporary society.
Munich
On September 5, 1972, at the Olympic games in Munich, the
Black September Organization carried out an operation that has become the
famous "Munich Massacre".
Seven terrorists seized control of the Israeli athletes' dormitory in the
Olympic village,
killing two athletes and taking nine hostages. Israel rejected the group's
demands
to release 200 Palestinian prisoners but at the West German
Furstnfeldbruck airport,
snipers opened fire. The result that all the hostages, five terrorists and one
police officer
were killed. The incident focused world attention on the Palestinian cause. It
was later discovered
that this was a truly international operation. There was assistance from the
BR of Italy, the
terrorists Baader-Kienhof from Germany and Palestinian terrorists. Less
than two months later,
on October 29, a Lufthansa plane was hijacked by two terrorists who
threatened to
destroy the plane mid-flight if the terrorist survivors of the Munich incident
were not released. They were released.
Page | 61

Iran
On November 5, 1979, in Tehran, the American embassy was taken over by
the
Revolutionary Guards, with the knowledge and help of the new Iranian
government.
Fifty-two American hostages were taken for four hundred and forty-four
days. The situation
resulted in the aborted rescue attempt in April 1980. This incident is a
classic example
of media manipulation. An
extensive media campaign was declared by the Iranian Information Ministry
denouncing the United States
as the evildoers. It was apparent that the embassy seizure was done with
the knowledge and support
of the Iranian government who could have ended the situation if they
wanted. The negotiations were
designed to embarrass the United States and to make the Iranian
government appear as if it
were fighting for their freedom. This incident is full of mistakes made by the
US government.
General Krosen's Automobile
On September 15, 1981 in Heidelberg, West Germany, General Frederik
Krosen was ambushed by terrorists from the Red Army Faction. Two RPG-
7s were launched
against his armored car. One failed but the other hit the rear of the
car but did not explode. Krosen, very fortunate, escaped with very little
damage. This incident
is important because it was planned in a professional way. The location of
the ambush was
well selected, the route and the general's routine was known and as a
security measure to
ensure success the ambush site was covered by small-caliber weapons.
The Headquarters of the Marine Corps in Beirut
On October 23, 1983, in Beirut, Lebanon, the Headquarters of a battalion
of marine infantry that also served as barracks was bombed. A building
made of
reinforced concrete was completely destroyed. An extremist Muslim
terrorist, who had attended
his own funeral the night before the bombing, drove a yellow Mercedes
truck to
headquarters. The Mercedes had a gas-augmented explosive charge that
was later estimated
by FBI experts to be equivalent to 12,000 pounds of TNT. They also
estimated that if the truck
had been parked outside the concertina wire, on the highway, more than 330
feet from
headquarters, the result would have been the same. There were 241
Marines killed and more than
100 wounded in this suicide attack. This incident caused a change in US
policy
towards Lebanon.
Disco in Berlin
Two soldiers of the American army died in April 1986 in a discotheque in
Berlin,
East Germany when it was bombed. The United States through
intelligence sources were able to link Libya to the bombing. President
Reagan on
national television directly accused Colonel Gaddafi for being responsible
for the bombing. In reaction
and as a counter-terrorism measure, the United States launched an airstrike
on Libya.
Counter-terrorism Program
Intelligence is the first line of defense in a counter-terrorism program. It is
necessary to have a systematic and well planned program using intelligence
from various sources.
The role of intelligence in a counterterrorism program is to identify the
threat and provide
intelligence on the threat in a timely manner. This includes evaluating the
capabilities of the
Page | 62

terrorists, their tactics, the strategy they use in identifying their targets and
the dissemination
of this information. Intelligence serves as the foundation of operations and
preventive measures . A complete understanding of terrorism, ideological
motivation,
terrorist organization , modus operandi, and indicators at all levels is
necessary for the production of
intelligence in support of anti-terrorism and counter-terrorism.
Threat analysis is the process of compiling and examining all available
information to
develop intelligence indicators on possible terrorist activities. The
threat analysis is the first step in determining our vulnerability to attack
terrorists.
The ability of an intelligence system to provide critical and timely
information to the
user depends not only on the ability to collect and process, but also
depends on the
ability to organize, store, and retrieve information quickly. This capability, in
conjunction with early warning, careful observation, and threat analysis, aids
the
intelligence analyst's ability to predict the types of terrorist attacks and the
timing of these
attacks.
Implementing a successful counterterrorism program using intelligence
requires doing so in support of government policy on terrorism. An example
of this policy
would be:
Every terrorist act is criminal and intolerable, regardless of its motives and
should be
condemned.
All legal measures will be taken to prevent such acts and to bring justice to
those who commit such acts.
No concessions will be made to terrorist extortion, as it would invite the
request for more
demands.
During an incident, close and continued contact will be maintained with the
countries
involved, supporting them with all practical intelligence and technical
services, advice
will be provided on how to respond to specific terrorist acts and demands.
International cooperation to combat terrorism is a fundamental aspect, all
governments are vulnerable and all avenues to strengthen such cooperation
must
be pursued.
Characterization of a Terrorist Act
To play an effective role, intelligence has to understand the characteristics
of
terrorism, its objectives, its strategies, as well as having an understanding
of
terrorist groups and their members. It is through this avenue that
intelligence will be able to support
counter-terrorism programs.
Characteristics of Terrorism
Terrorism is a way to achieve fear.
Page | 63

The fear of the general population also as the declared enemy of the
terrorist
strengthens him more than his own capacity.
Victims of terrorism are not necessarily the target of terrorists. The
terrorist's target will often be selected for its symbolic value.
Terrorists want publicity. This topic will be discussed further in our
discussion
of the terrorists' goals later.
Tactical success and strategic mission are not necessarily related. A
particular mission may fail but at the same time it can contribute to long-
range goals.
Terrorist incidents are frequently used as armed propaganda and use
violence for impact value. The Palestinian saying "if one individual is
punished, then a hundred
will be afraid" is applicable.
Terrorist attacks are rarely suicidal. They are professionally planned and the
terrorist is committed and prepared to die for their cause, but they do not
normally
plan to die in the execution of their mission.
The numerical number of terrorists does not normally matter. A small group,
well organized, armed, and with good leadership can cause a lot of damage.
Contemporary transportation systems provide terrorists with the means to
increase their attacks anywhere in the world.
Terror is a cheap and effective form of warfare. It is not necessary to have a
well-equipped armed force to implement a successful terrorist operation.
Terrorism can be used by a poor country as its way of war. It may be
that terrorism is the only way that a poor country can attack a
modern superpower .
Most contemporary terrorists are well motivated, trained and
equipped.
In many cases the terrorists are supported internationally. They can be
supplied with weapons, money, equipment, intelligence, and even
propaganda from other nations. The
Soviet Union, East Germany, North Korea, Cuba, Libya, Iran, and Syria are
renowned for
the support they provide to different terrorist groups.
Long Range Objectives
Cause a dramatic change in government, such as the overthrow of a
government or a
significant change in its policy.
Cause a constant disinformation campaign to unbalance and misinform the
general population and the government.
Destabilize the government.
Page | 64

Create a climate prone to revolution.


A violent overthrow of the government by revolution, civil war, insurrection
or the
creation of an international conflict.
Prevent international events, treaties or programs.
Establish an international reputation or gain political, domestic or
international recognition .
Establish international links with other terrorist groups or countries that
support
terrorism.
Immediate Pragmatic Objectives Freeing
prisoners, obtaining money from hostages, obtaining ransom for hostages.
Theft of money, weapons or explosives.
Destruction of property and buildings.
Force the government to increase its security and thus limit the freedoms of
the
people.
Ensure transportation outside the country.
The adoption and manipulation of causes to increase support and
membership.
Armed propaganda to discredit the government. Show that the government
cannot
maintain order.
Occupying government resources to wear them down and make them
ineffective.
Revenge satisfaction.
Increase discontent and dissatisfaction.
Attack symbolic targets.
Destroy the social structure of a society to produce chaos and confusion.
The Media and Their Use by Terrorists to
Achieve Their Objectives
Many of the immediate objectives can be achieved by the use of the media
or propaganda. Publicity and propaganda coming from the media
are important targets for the contemporary terrorist. The media
, especially in democratic societies, can greatly assist
terrorists in achieving publicity. It is through the use of the media that
terrorists can:
Page | 65

Gain the attention of those groups that terrorists claim they are fighting for.
Gain the attention of the opposition.
Proclaim your cause.
Rushing the government.
Cause government international embarrassment.
Prove your power and establish your credibility.
The media can be used by terrorist groups to learn from
the experiences of other terrorist groups.
It can be used to demonstrate the ineptitude and failure of the government.
Definition of a Terrorist Group Terrorist
groups can be categorized as: not supported by a country, led
by a country or supported by a country. They can also be categorized
according to their
national / domestic, transnational and international way of operating.
National / Domestic. Terrorist groups that generally want political influence
and
power, operate within their own country and can receive external support.
The Symbiotic
Liberation Army is an example of this group, also like the Arian Nation.
Transnational. Terrorist groups that operate across international borders
outside
the reach of the government and that can receive support and sanctuary
from countries sympathetic to their
cause. Most terrorist groups are in this category. The PLO is the largest
transnational terrorist group . Others include the Red Army Faction, the Red
Brigade, the
Irish Republican Army (Provisional), and the Armenian Secret Liberation
Army.
International. Groups that are under the control of the government, operate
across
international borders , and their actions represent the national interests of
that government. The
murderers squads trying to assassinate Iranian ex-official Iranian people
and anti -
Khomeini are classified as international terrorists. The assassin squads
sent
by COL Gaddafi are also classified.
There is another category but few groups are classified within this category.
This
category is extra-territorial and consists of groups operating against targets
in a third country.
The Japanese Red Army fell into this category when in May 1972 three of its
members were
involved in an incident at Lod airport in Israel. This group operated under the
control of
the Popular Front for the Liberation of Palestine. They planted weapons in
their luggage in Rome and
proceeded on a plane from El AL to Tel Aviv. After claiming their luggage at
the
Lod airport, they removed the weapons and fired indiscriminately at the
public. The result was that
28 people died and 67 were injured. Most of the dead were
Puerto Rican pilgrims visiting the Holy Land.
Page | 66

Definition of a Terrorist
A terrorist is distinguished by his use of innocent victims to achieve his
objective.
There are several names associated or equivalent to the word terrorist.
These are:
Saboteur: Individuals or groups involved in the interruption, damage or
destruction of production, transportation, communication or other services
or
military operations .
Guerrillas: Para - or quasi - military organizations involved in an
armed conflict within their own country or in a foreign conflict.
Partisans: A military organization separated from your command to fight,
disrupt, disturb, and destroy through unconventional means.
There may be many names, but the categories of terrorists are well defined
by
Dr. Frederick Hacker. He categorizes them as: insane, criminals, political
defenders. The most
dangerous for any country is the political defender.
To better understand terrorism, it is necessary to have a good
understanding of the
individual terrorist and his psychology. Some examples are:
Ilych Ramírez Sánchez, known as Carlos the Jackal. He is possibly the
most notorious terrorist today.
Carlos Marighella: A contemporary terrorist known more for his
literary work than for his involvement in terrorist incidents. This Brazilian
Marxist author
wrote "The Mini Manual for the Urban Guerrilla", a book that has become the
manual for contemporary terrorists.
Dr. George Habash: This Christian Palestinian along with Dr. Wadi Haddad
was the author of some of the bloodiest incidents in the 1970s including the
1972 Lod airport attack .
Typology of Terrorism
Terrorism can be used in various ways. situations and directed towards
different objectives. The
following typology of terrorism provides the context under which terrorism
can be used:
Revolutionary: Terror used as an instrument to overthrow a government.
Examples include the FMLN of El Salvador and the Vietcong of Vietnam.
Subrevolutionary: Terrorism used to gain influence within the government.
Examples include the Red Army Faction in Germany and the Red Brigades in
Italy.
Repressive: The use of terror against sectors of society, ethnic groups,
or religious groups. Generally, there is no conflict with the government. An
example includes the
Ku Klux Klan of the United States.
Establishment: Terror used by a government-supported or tolerated group
against government opposition. Examples include the KGB in the Soviet
Union and the
DGI in Cuba.

Page | 67

Terrorism Intelligence Analysis

Introduction
Although terrorism appears to be a meaningless activity, a random activity
with
no possibility of prediction, it is actually an activity with a directed purpose,
and it lends itself
to systematic analysis. This chapter will deal with various techniques to
solve this
analytical problem . Keep in mind that these techniques are just a few of the
various
possible combinations of techniques that could be used to solve the
problem.
Terrorist Behavior and Patterns.
A thorough knowledge of terrorism, the motivators of terrorism, the tactics,
and the
ways of operating are essential for the analysis of terrorism. Terrorism is a
complex and
dynamic issue. It has to be continuously studied since it is a type of crisis
that contrasts
sharply with other crises of a more conventional nature.
Most terrorist incidents are public-oriented, violent, and
short-lived.
Generally, terrorists know more about authorities than
authorities do about terrorists.
Terrorist attacks are conducted with the element of surprise and there is
generally
very little warning, therefore pre-incident activities by authorities are routine.
Terrorist incidents develop faster than
conventional incidents .
Page | 68

Terrorists operate in small, clandestine cells placed among the


civilian population . This makes conventional investigations sensitive and
analysis difficult.
Responsive tactics of authorities, communications and investigations are
unconventional (negotiations, international sensitivities, news, victims,
political considerations , etc.)
Responses to terrorist acts may require multidisciplinary support such as
intelligence, logistics, psychology, special reaction teams , diplomatic
transportation, etc.
Studies and Analysis of Terrorist Incidents.
Studies and analysis of past terrorist incidents have shown some
significant ways and tactics within terrorist groups.
The selection of targets can be pragmatic or symbolic.
Similarity in tactics, strategies and purposes.
Training.
Weapons, explosives, bomb manufacturing, and logistics procurement.
Date selection according to events and special dates.
Joint terrorist operations.
International terrorist incident connection.
Terrorist Intelligence Analysis.
The analysis of terrorist intelligence is a systematized procedure to provide
information to the commander so that he can select the most effective
alternative or the
fastest option to reduce or prevent terrorist attacks by individuals against
terrorists.
Terrorist intelligence analysis must go beyond merely stating the facts. You
have to be able to
hypothesize the act and evaluate the situation to explain the act in a logical
way that
the commander can understand. The criterion for evaluation is relevance.
There are no terrorist incidents that are planned or perpetuated in a
vacuum. There
are always gaps or traces left by people or objects, with the use of the
database in conjunction
with recent information the terrorist group can be located, evaluated, traced
and its
future activities predicted.
Analysis has been defined as the process of dividing a problem into its
different
components and then studying the different components separately. With
this in mind, let us
consider the application of analytical tools to the terrorist problem.
Induction: Induction is the intellectual process of formulating a hypothesis
based on the
observation of other information. Induction occurs when one learns from
experience and is
best characterized as the discovery process when the analyst can establish
the
relationship of events he is studying. Induction or plausible reasoning
usually
precedes deduction and is the type of reasoning that the analyst uses most
frequently.
Deduction: Deduction is the process of reasoning from general rules to
particular cases . The analyst has to analyze the premises to form a
conclusion. Deduction
works best when used in conjunction with other systems such as
mathematics,
formal logic , or in certain types of games (such as computer games played
on a
computer). The deduction is also known as demonstrative reasoning
because it is
used to demonstrate the truth and validity of a conclusion, giving certain
premises.
Page | 69

The Theory of Game: The game is basically a theory of making decisions by


having the participants participate in a conflictive or competitive situation.
In a competitive situation,
each participant tries to "influence the action" in such a way that the result
is an optimal one for him
. Game theory allows the decision maker to select an
optimal course of action from a number of possible alternatives available to
each player and in light of the
number of options available to each player. An optimal course of action is
one that increases
the player's chance of success. Three topics are commonly used in the
discussion
of game theory: games, models, and simulations. A game is a competition
played
according to rules and decided by skill, strength, or luck. Games are
essentially
symbolic conflicts. No one is hurt in symbolic conflicts, but, nevertheless,
lessons can be learned from this type of conflict. A model is a
representation of an
object or process. Simulations are dynamic imitations of processes.
Essential Ingredients for an Accurate Terrorism Analysis:
1. Planning: Planning must be detailed, based on
organizational needs , situation, environment, and capabilities.
2. Collection Effort: Information collection should reflect the
specific problem , requirements, and objective. The collection processes
should include the
following:
3. Surveillance to identify the key elements of the organization, its
internal and external connections , support, safe houses, vehicles, disguises,
mail, etc.
The collection of photographs to develop a reference archive.
Investigators-agents to infiltrate movements or external support groups.
Informants to identify key members, locations of possible
future targets , modes of transportation, political and local contacts,
support, etc.
Collection of information from open sources, social research, publications,
news.
Specialized collection.
Database: A comprehensive database is absolutely essential for
effective analysis. Information has to be systematically organized to provide
Coding of information
Quick access
Effective analysis
A minimum of four types of information files are required:
1. Regional files for quick access to factors that may affect groups, country
relations and interconnections. group. This file should contain:
Page | 70

Significant activities, names and dates.


Safe Shelter Status.
Travel procedures, restrictions.
2. Group information files should include substantial information on the
ideology of the groups, government, political fronts, regional and local
support, population-
terrorist relationship , logistics system, training sites, and financing.
Additionally, these
files should contain:
Past incidents, pre-incident situations, factors that contributed to the
incident, the
incident description, outcome, and a post-incident analysis.
Estimated capacity based on past incidents, present status of personnel,
training, explosives / weapons, security, counterterrorism effectiveness, and
leadership.
Tables of events by time that reflect all the significant events in the history
of the
group from its history to its activities.
Association analysis reflecting the connections between individuals, cell
formation, and
organizations. The technique requires the preparation of an association
matrix and an
association diagram based on the matrix. Association analysis can be used
for
differential structures or for organizations or interactions that can be tested
later.
Key membership matrices that can be used to demonstrate individual
and group membership, individual -group incident relationships, and the
number of contacts. Target
information indicating the nature of the targets, the intelligence used, the
reason for the attack on the target, etc.
3. Incident files should include detailed information on terrorist attacks,
victims, weapons used, timing, dates, location of releases, demands,
methods of operation, and end result. Incidents should be organized into the
following
categories:
Shelling
Assassinations
Aerosecuestro
Hostage
Kidnapping
Fires intentional
Assaults armed
tactics street / violence group
Page | 71

Theft / robbery
4. Biographical information files should allow the identification of
key terrorists , characteristics, capabilities, training, connections, political
affiliations and
motivations, travel abroad, documentation, etc. The following database
must be
included in the biographical information:
Real name, date / place of birth
False names / nicknames
Identification numbers, passports, driver's licenses, local identification etc.
Physical description
Known addresses, shelters
Examples of the subject's handwriting
Psychological profile data
Participation in terrorist organizations
The Database should be referenced laterally to maximize its flexibility and
data removal.
Introduction to "Analytical Tools"
Time and information are the analyst's most precious elements. The
situation
demands that the analyst maximize the usefulness of information while
placing serious limits on the
time allowed for collection, organization, and analysis. This portion of the
module deals with a
number of techniques and tools available to the analyst to help them
combine
pieces of information, to obtain the greatest amount of information from
their content, and at the same time
obtain the most benefit from the time spent in their analysis. There are three
basic analysis techniques
that are particularly effective in the investigation of the activities of terrorist
groups, these
are the following:
Manipulation of matrices
Analysis of associations
Time graphs
Each of these tools involves the processing of information to obtain or
create a graph make it easy to read. They take bits of information and
organize them using
symbols so that true and implied consequences hidden among the pieces
become
more apparent.
Page | 72

Construction and Manipulation of Matrices.


Constructing a matrix is ​​the best way to demonstrate connections
between a number
of data. In the analysis of terrorism, matrices are usually used to
demonstrate or
identify "who knows whom" or "who has been where" in a clear and concise
way. A
matrix is ​​a rectangular arrangement of numbers or symbols in which
information is
stored in columns (vertical) and rows (horizontal). There are no limits on the
number of
columns or rows that appear in the matrix. Their number and content are
determined by the type
and quality of information available to the investigation. Arrays take many
forms and serve a variety of purposes. The simplest matrix is ​​a list of
suspects
arranged in one column. A single column matrix is ​​called a vector
column. Another
simple matrix can be a list of actions or incidents known to be the product
of a
particular group.
Arranged in a row, the single row matrix is ​​known as a vector row. If
an
investigation finds that the list of suspects has participated in the actions,
then
a more complex matrix can be created. A matrix where the column
represents the operations and the
rows represent the suspects. A "1" at the intersection of any column with a
row
indicates that the suspect participated in the operation. A "0" indicates that
the suspect did not participate.
Arrays store a considerable amount of information about a group. For
example,
a matrix can show that everyone has participated in at least one operation
and that certain
individuals have participated in at least two operations. Then studying the
columns
can determine the number of people used in each operation or activity. The
matrix
can also indicate which group of people acted as a group on more than one
occasion.
1. Matrix of Association. The connection between suspects can be
demonstrated in another
type of matrix, an association matrix. It is a representation of "who knows
whom" within
a group, based on the premise that people who operate together know each
other. The
association matrix is ​​a Square Matrix, in which it has the same
number of columns and rows. It is
also symmetrical. The columns and rows of a matrix are organized from a
single list, both
halves, divided by the diagonal, are exactly the same. The intersection of the
first column
with the third row with has the same infmation as the intersection of the
third column and the
first row. Since both sides are symmetric, the information has to be stored
only on one side of the matrix. The matrix also reveals substantial amounts
of information
about the groups. With the exception of one individual, everyone in the
group must know at least
two people. One person knows four and another person knows three.
Communications
within the operational network would flow well, since all are connected from
at least one
person. If necessary, a person who does not know another person, can
communicate with
him through a third person. Within a group of six members, organized in this
way, communications and operations would be severely damaged by
removing two
people. Only one contact among the six would remain. What the matrix
would reveal would be the
operational structure of the cell.
Starting with piecemeal information from four seemingly
unrelated incident reports , a trained analyst can build the basic matrices
and quickly discover:
The organizational structure.
The size of the teams.
The communications network.
Page | 73 By

reading the matrix, the analyst can then identify the optimal suspects for
ongoing surveillance, identify crucial suspects within the organization, and
greatly increase
the analyst's understanding of the group and how it is structured. The
technique
can also be used to present evidence to superiors, new investigators or
analysts
in a concise and concise manner. The examples that we have presented are
a bit simplistic
in scope, but if the investigation is of a group that has participated in 60 or
70 incidents,
involving 100 or 200 people, it would be very useful for the analyst. The
technique cannot
replace normal operating procedures for reporting, subject biocards, or
incident analysis, but it can be used to store crucial information that is
immediately available to the investigator when needed.
2. Association Analysis. There is another option to display the information
that has been
organized in matrices like those mentioned. This option is called the
association analysis . This technique has been used in a number of logical
scientific investigations.
Using the matrix, the relationship between individuals or places is
represented with numbers. In this
analysis, portraits or symbols are used to demonstrate relationships. "The
relationship between matrices and
the association analysis is the same as that between a mileage graph and a
road map . The mileage graph shows the connections between cities. using
numbers that
represent travel distances. The map uses symbols that represent cities,
locations, and other roads that show how two or more cities are connected.
Different symbols on the map have different meanings, and it's easy to
figure out the best route between
two locations as well as identifying obstacles that separate them.
The same is the case in association analysis. Different symbols are used to
identify different things. Obstacles, indirect routes or connections, and
suspected connections
can be easily and clearly demonstrated. In many In some cases, portraits
are easier
to interpret and work with than matrices. it is presented in a way that
emphasizes clarity. By using symbols instead of numbers, the results of
association analysis
cannot be manipulated mathematically in the way that matrices are
manipulated, so
the researcher interested in mathematical experimentation should use both
association analysis and matrices together. . The symbols used in
association analysis are easy
to describe and explain. Circles are used to represent people. Each subject
is
represented by a circle. Lines are used to demonstrate connections
between people. A
solid line indicates a confirmed relationship. A dashed line represents a
suspected relationship that has not been confirmed. For clarity, the circles
can be marked to show
who the individual is. In some cases, researchers may find a
relationship of two individuals who they believe to be one person using two
names. In
spite of his suspicions have not been confirmed, physical descriptions,
behavior,
method of operation, or other indications may lead researchers to believe
it's the same
person. For these cases intersecting circles are used. The use of
intersecting circles
allows researchers to pursue the analysis as if the two circles were one
person, while reminding them that this fact has not been confirmed.
to. Rules. There are several rules that have to be used when preparing
association analysis diagrams . Each individual is assigned a circle. The
circles and lines are
arranged so that no lines cross. Often, especially when dealing with
fairly large groups , it is very difficult to construct line diagrams where lines
do not cross. In these
extraordinary and complex cases, every effort should be made to keep the
number of lines to
a minimum. Association diagrams can also be constructed to teach
organizations,
cells, or action teams. These are represented by placing each individual
belonging to
each organization in a rectangle. Each rectangle. , represents an
organization or cell, or
action team.
Page | 74

There may be individuals who belong to more than one organization or


team. In
these cases, the rectangles overlap. On the surface the overlapping of
rectangles indicates that
an individual belongs to more than one organization or cell. It also indicates
a connection between the
organizations to which the individual belongs. A final set of rules apply to
the
construction of association diagrams. These rules are for, cases where
individuals
are connected to a cell, but are not members of that cell. Two possibilities
exist.
First, the researchers may know that you have contacts in that cell, but they
do n't know who the point of contact is. Here a line is drawn outside the cell
to the rectangle
representing the cell. In the second possibility, the individual outside the cell
may have
confirmed contacts with identified individuals within the cell. In this case,
the rule for
person-to-person contact applies, and a line between the circles is drawn
representing each individual.
Building an Association Analysis.
Keeping in mind the information discussed above, the association analysis
can
be done effectively. Since it is a complex form of analysis, it may take a
little more effort and time. The benefit is obtained with the impact of the
results.
Association diagrams are built in three stages:
The "raw" information or pieces of information are organized in logical
order. The
names of individuals, suspects, organizations, and operations are listed.
An association matrix is ​​built, teaching "who knows whom." An
activity matrix showing "who participated in what" can also be constructed.
By deducing relationships from the matrices, individuals are then grouped
into
organizations or cells based on information or joint activities or
membership. The
lines represent connections between individuals or organizations are drawn
to complete
the diagram. The finished product clearly demonstrates the associations
between individuals,
cells, or other organizations.
In practice, the construction of association diagrams consists of the
following
sequential exercise .
All information related to the investigation is organized in a logical way. This
can be placed in a narrative or report form. This step is especially important
since basic information can come from multiple sources.
Relevant points of interest are identified. In this case, the
relevant information points are the suspects, the people they know, phone
numbers they call, places
they frequent, organizations to which they belong, or activities in which they
have been
involved.
Arrays of these lists are constructed. The information points (suspects)
are then organized in rows and columns.
The points of contact or association are placed in the matrix where the
corresponding rows or columns intersect. If the analyst is working with
confirmed and unconfirmed information
from suspect contacts, different symbols can be used to represent
the strength of the evidence. Use a "1" for a confirmed contact. Use a "2" or
any other
Page | 75

symbol for unconfirmed contacts. Zero can be used at the intersection of


the matrix
where contacts are not known or suspected.
The matrix is ​​analyzed to determine the number of associations
related to each
activity of each suspect. Count each column to find how many entries are in
each
. Do the same for each row.
An initial association diagram is drawn that groups the suspects together
into
rectangles that represent cells, actions, or organizations. Start with
individuals who
have the largest number of contacts and work your way out. Use circles to
represent
individuals and rectangles for organizations or cells. Additional
sketches of association diagrams are drawn to clarify the relationship and
to avoid crossing lines.
A final diagram is prepared. Examine the relationships that appear. Study
the diagram
carefully and make estimates of
cell membership and contact patterns . Is there a uniform cell size, or do
they vary in size? Do the subjects belong to more
than one cell? Are the cells strongly related, sharing a number of
suspects, or are they scattered with few connections?
Recommendations are made regarding the structure of the organization.
Areas for further investigation are identified . There are suspicious
connections that need verification. Are there
people who appear to be central in the organization, without whom the
organization would
collapse? Are there few individuals with contacts to many individuals who
would be a good target
for surveillance? You have to be prepared to logically substantiate the
conclusions and
estimates that have been taken from the association analysis.
A well-drawn association diagram and the complete analysis it contains can
reveal a
lot about an organization. Group leadership, strategic and tactical, can be
identified.
Its strengths and weaknesses can be located. Operation patterns can be
found. Predictions of future behavior can be made.
Time by Event Charts (GTE).
The last two techniques discussed, Association Analysis and Matrix
Manipulation,
are the most difficult tools to handle of the five tools discussed in this
module.
They require the most skill and possibly the most time to
prepare. They are also the most abstract to interpret. The next technique we
will cover is
Graph by Time of Events (GTE). It is the easiest to prepare, understand, and
use. The GTE
is a timeline. It is a method of placing and representing the activities of a
group
chronologically. Like analysis by association, a GTE uses symbols. In this
case,
the symbols represent events, dates, and the flow of time. GTEs also share
another
similarity with association diagrams and matrices. They are all designed to
store
information and to display a large amount of information in a minimum of
space. The
symbols used in creating a GTE are easy.
Circles are used to represent terrorist incidents or major events.
Each incident is represented by a circle. The circles are drawn with enough
circumference to fit inside the incident date, a few words are used
for identification purposes and are placed at the bottom of the circle. The
circles are
arranged on a page from left to right in columns, running from top to
bottom,
with arrows drawn to demonstrate the flow of time. Using this abbreviated
format, many
events can be displayed on a single page. The GTE follows the group
transitions
from its beginnings as a simple movement to its periods of terrorist action.
Page | 76

(ideally). In many cases, the circles can be accompanied by textual


descriptions that
refer the analyst to a particular file on the incident. These references tell the
analyst / researcher where to look in the group's existing file for more
information on
specific actions without cluttering the page with details. GTEs are great for
reporting.
The format is flexible. Other symbols such as triangles, squares, or
pentagons can be
used in conjunction with circles to distinguish between different types of
events.
Tactical changes can be represented with a symbol, while others can be
used to
represent logistical changes, intelligence operations, and to distinguish
between
major and minor events . By using a variety of different symbols the analyst
can better
display the changes that have occurred during the history of a group.
Analysts are
limited only by the number of symbols they can draw and the reader's ability
to
remember each symbol and what they represent.
Summary
During this chapter you have been exposed to some aids used to analyze
the
terrorist threat.

Countering the terrorist threat

Introduction
Basically, terrorist countering programs consist of four elements:
Prevention, Prevention, Reaction, and Prediction. For the reason that
terrorist organizations are
clandestine, identification and prediction are the most difficult factors.
Terrorism information , tactics, strategies, method of operation and history
of different groups is
of primary importance in countering terrorism. To run a successful anti-
terrorist program, it is necessary to have a full understanding of the political,
economic, social,
psychological, and ideological factors that motivate the individual terrorist
or terrorist groups. The
intelligence serves as the basis of all anti-terrorist program. All the different
stages such as
threat analysis, prevention, planning and crisis management depend
directly on accurate and timely intelligence.
The primary mission of intelligence is to provide information that satisfies
the
basic questions: who, what, where, when, how and why. In many cases,
traditional intelligence methods such as penetration, infiltration, and
surveillance are impractical
because many terrorist organizations operate in cells of three to six
members. Thus, the
ability to provide intelligence to prevent or prevent attacks decreases. The
estimation of the
terrorist capabilities to attack or the estimation of the different courses of
action have to
Page | 77

be subjective and based on information about terrorism, organizations,


ideology,
methods of operation, past activities, communications and the quality of
our
security. As terrorists rely heavily on publicity and propaganda, many
times the information can be found in open sources and in some cases, the
information
can come from terrorist sources. The intelligence role does not end with the
pre-incident phase,
but continues throughout the counter-terrorist operation. Intelligence is
especially
important in hostage-taking and negotiation where the lives of innocent
civilians are at
risk. It is obvious that intelligence in anti-terrorist programs is not only for
the use of the
specialist, intelligence is for the use of all. Popular knowledge about
terrorism and
indicators will definitely enhance counter-terrorism efforts and serve as the
foundation
for individual and organizational security against attacks.
Objectives in the Counter-Action of Terrorism
Protect lives, property and operations.
Prevent the escalation of terrorism.
Separate the terrorists from your support.
Provide a measured response to terrorist actions.
Manage crises effectively.
Keep terrorists disoriented.
Increase target security.
Do not grant the terrorists their demands.
Denial of hiding places.
Failure to recognize terrorist organizations as legal or political groups.
Eliminate terrorism.
Components of Terrorist Contraction
1. Prevention: While total prevention of terrorist acts is nearly impossible,
eliminating the causes that terrorists exploit may be the most important
factor in
preventing terrorism. Often times, the causes of public disorder come from
political corruption , social discrimination, economic deprivation, ideological
differences,
religious differences , and foreign influences. All these causes help in the
development of violence
and terrorist activities. Eliminating these problems may require
government intervention . In this way, the government takes away their
cause from the terrorists. The terrorist is not
perceived as the crusader, the liberator or the defender of the interests of
the poor. With the
absence of the terrorist mystique, the population can recognize the terrorist
for what he
truly is - a common criminal. Many of the terrorist activities can be
prevented by eliminating some of the causes of discontent and situations
that
end in violence. At the international level, diplomatic efforts and
international cooperation are important factors in prevention. If a terrorist
incident occurs, you have
Page | 78

to react with measured action. Too strong a reaction can cause as much
damage to the
government as no reaction. One of the terrorists' goals is to cause incidents
where government authorities are forced to use too much force. In this way,
terrorists can use this as propaganda against the government. An effective
counter-
terrorism program depends on the timely identification of problems which
can develop into
violence and confrontations.
Indicators, produced from analyzes of past terrorist incidents, are valuable
tools in threat analysis and intelligence estimation. In many cases,
these indicators can appear as the normal exercise of democratic rights.
It should also be noted that many terrorists are well trained in subversion of
the
democratic process and use the system to advance their causes. This
manipulation, in the end, ends
with the destruction of the democratic system. The concern that can lead to
political violence
can be caused by the political, social and economic activities of terrorists
operating within the democratic system. As was the experience in
numerous conflicts,
terrorist violence indicates the initiation of an insurgency. Even when the
situation progresses to an
open insurgency situation, terrorist activities can play an important role.
There are numerous examples of this situation. Terrorism, which existed in
abundance during the
time of conflict before the 1950s, continued after the division of the country,
the only difference
being that the whites were different.
Reaction
One has to remember that one of the objectives of the terrorists is to
establish doubt
about the government in power. The ultimate goal of a terrorist may be the
overthrow of the
present government and the imposition of their own ideas through the use
of violence and threat.
But it is the nature of Western societies to listen to the arguments. The first
response to terrorist acts is to ask if the terrorists had reasonable demands,
and if
this is the case, if they should listen and try to solve the problem. Obviously,
this
puts us in direct conflict with the society we have.
The terrorist knows this contradiction and also realizes that any restriction
imposed by the government gives him propaganda to point out the
oppression of the government. While these
issues are important and have been studied at the national level by
countries of the Western world, they do not
deal with the appropriate reaction to terrorist acts. Most western countries
have special forces, well trained and equipped, to provide a tactical reaction
to these
incidents. In the past, these forces have been used successfully to minimize
loss of
life and destruction of property. But they have been forced to operate within
a legal framework and
under strong government control. While the use of these forces will always
be an
alternative, it is important not to react with these forces in the same way
every time.
There is plenty of evidence that the terrorist is adapting to the tactics
employed by these
special forces. Equipment that intercepts police communications and
machines to reproduce
official documents have been confiscated in terrorist hiding places.
Terrorists have used
counter surveillance and counterintelligence measures to disrupt detection
of their activities.
While a tactical reaction is a necessity in some cases, the character of the
reaction
has to be based on the type of terrorist action.
Prediction
Special forces trained in countering terrorist tactics are useless without
good
intelligence that gives them the ability to prevent attacks, arrest terrorists, or
react quickly
if an incident occurs. The traditional functions of the intelligence
community are
integral parts of every phase of a terrorist contraction program.
Page | 79

Terrorist Contraction Model


Intelligence
Threat analysis
Prevention
Physical
security Personal
security Operational security
Authority and jurisdiction
Planning and management
Crisis management
Decision Model
Phase I: Local response. Incident reported. The appropriate law
enforcement agencies
react. Isolate, contain, evacuate civilians and local personnel. Collect
additional information.
Try to solve the problem. Determine the meaning of the terrorist act. Notify
the
higher headquarters
Phase II: More reaction. Police teams can react. Military troops from the
area
can be employed. An attempt is made to solve the problem at this level.
Phase III: National reaction. The use of special forces or equipment.
Support counterintelligence operations
counterinsurgency

Introduction
Counterinsurgency operations are oriented towards the population and the
insurgents and the government established are competing for the support
of the indigenous population.
To fully understand and be effective in the application of CI techniques, CI
personnel
must be thoroughly familiar with their role within a counterinsurgency
environment.
Functions.
1. The first function of a CI agent is that she has to be completely familiar
with identifying indicators (signs) of an insurgency. These indicators are
born from the
Page | 80

political, economic, and social conditions of the nation and therefore the
roots of an
insurrection are based on these conditions.
2 The insurgency indicators are divided into three stages. The first stage
describes
the conditions that tend to nurture an insurrection, such as large social,
economic, and
political gaps between the small power structure and the majority. These
are
legitimate problems that insurgents can try to exploit and turn into
complaints against the
government. The second stage consists of those indicators such as the
murder and kidnapping
of local government officials that clearly indicate that there is an active
insurgency.
3. CI's effective operations in an insurgency environment are based on
building an operational information base. Accurate intelligence that is used
in
time is key to an insurrection. Like a conventional war, the intelligence for
an insurrection is collected, processed, integrated, and disseminated.
to. In addition to documenting the database, there is a requirement for
accurate and current intelligence of subversive activities and the
development of insurrections.
b. Such advisory data is essential for contingency planning,
training reorientation , and initiation of preliminary operational plans. This
type of intelligence is
collected by CI via the multidisciplinary method. Ordinary intelligence
combined with foundation
It would document the operational database of the CI agent. The
operational database
provides CI staff with an expedient method of analyzing patterns in an
insurrection.
Includes information regarding political, social, economic,
geographic, and military insurrection intelligence . From this database, CI
targets are selected and
recommendations such as population and resource control measures are
made.
4. Another mission for which the CI agent is responsible is to analyze the
database that he
has created. The constant renewal of the database is of extreme
importance in the
analysis and understanding of the insurgent organizations and their goals.
Areas of
concern when analyzing the database are: changes in boundaries, changes
in
organization diagrams, changes in the method of operation, and changes in
the subject of
propaganda.
to. Insurgent borders reflect organization, strength, weaknesses, and
priority areas . They differ from government borders as their borders reflect
their own
needs. In addition, these borders are political borders rather than
military operations borders . The support apparatus has political boundaries
within which it functions to support
the insurgent unit for that particular area.
b. The transfer of command and organizational changes may be the most
revealing in terms of the internal development of insurgent organizations.
Command transferred
from a higher level may be an indication of problems in subordinate
elements, and the
command was sent to solve the problems. Members may be elevated within
the
insurgent organization based on successes. By studying these changes,
subordination
within the infrastructure can be determined.
c. When insurgents change their methods of operation,
conclusions can be made regarding their capabilities. Specific operations
can be based
on your understanding of the enemy's method of operation. Insurgents
usually reveal
their general objectives in propaganda, delivered to their own personnel or
to the population.
Page | 81
5. Another function of CI agents is to recommend CI targets for
neutralization.
CI targets can include personalities, facilities, organizations, and documents
and
materials. A CI target is someone or something that fits into one of the
categories described
above, may or may not be hostile.
to. Personality targets often prove to be valuable sources of intelligence.
Some examples of these targets are government officials, political leaders,
and members of the
infrastructure. Installation targets are a serious threat to the security of the
armed
forces. If properly exploited, these facilities can provide information of
significant value. The continued operation of these facilities during combat
can
jeopardize the commander's mission. Some facility-type targets of interest
to the commander,
and of immediate importance to CI, can be found in any town or city
regardless
of their location. Some examples are operational bases,
communication centers , and shelters. Organizations or groups that could
be a
potential threat to the government also have to be identified as targets.
Although the
threat may not be apparent, insurgents frequently hide
subversive activity behind front organizations. Examples of hostile
organizations or groups
are paramilitary groups, labor organizations, and dissident groups.
b. CI agents also have to be able to exploit targets that are known or
suspected
to have documents, equipment, or materials of intelligence value. These
articles of
intelligence value are the archives of insurgent operational bases, training
centers;
manufactured products or other materials that can provide support to
hostile elements in the
rear.
5. After the targets have been identified, the CI agent will recommend
specific operations for these targets. Recommendations can result in
special, tactical, or joint operations.
to. CI agents are also involved in recommending control
and population measures to the authorities. These recommendations are
based on indigenous and
external support to the insurgents as well as the capacities to carry them
out.
b. These measures are divided into three forms of control: surveillance,
restriction, and coercion.
These measures are designed primarily to detect and control the movement
of
human and material resources. The proper application of these measures
will break the supportive relationship between
the population and the insurgent and at the same time provide a safe
physical and physiological environment for the
population.
6. CI plays a great role in recommending positive courses of action to
improve facility security in an environment of insurrection. Human
intelligence
is the one that is the greatest threat to the security of the facilities.
to. The signal intelligence threat ranges from the interception
of radio communications to the interception of telephones. The imaging
intelligence threat is typically
limited to handheld camera photography, and gives the insurgent the ability
to
analyze security weaknesses.
b. To neutralize these threats, the CI agent has to employ the
appropriate countermeasures to be able to properly estimate enemy
capabilities. In other words, the
key to achieving this is the development and implementation of effective
measures to deny
insurgents information regarding our operations. Areas of Interest on a
Page | The

insurrectionary environment are: physical, personnel, and information


security; control of visits;
profile of own forces; and disappointment operations.
7. CI elements may also carry out special CI operations in
support of their own forces. An example is the operation of defensive
informant networks that
are comprised of individuals who are paid (or unpaid) as informants to
intelligence personnel . These individuals provide information on
personalities and activities that they obtain
as a result of their daily occupations. Again the purpose of these activities
is to
detect security threats and operations against our personnel.
to. To counter the insurgent threat, CI elements have to be
dedicated to the problem from its earliest stages. Once used, the
proper execution of the mission will result in the desired results of
stabilizing the situation of the country so
that the political, social, and economic development of the country can
progress.
Only through understanding our mission can we hope to
effectively implement countermeasures that will identify and neutralize a
revolutionary movement.
Population and Resource Control.
Historically, insurgents have used the general population to carry out
many services for them. The reason for this is obvious: Insurgent
organizations, political
and military, do not have the time, personnel, or capacity to carry out their
insurrection without the
assistance of the local population. It is therefore characteristic that the
population is the basis for the
strength of any insurgent movement.
Beginning. We will briefly discuss the nature of government action and
related problem areas. But before starting this discussion, it is necessary to
establish
exactly what we mean when we say population and resource control
measures.
They are measures designed to:
1. Mobilize material and human resources for the government.
2. Detect and neutralize the activities of insurgent organizations.
3. Provide a physical and physiological environment according to the
population.
4. Breaking the supportive relationship between the population and the
insurgent.
The Population and Resource Control Program (PCPR)
is designed to control the movement of human and material resources. If
we can
control the movement of the human element, the individuals who provide
support to the
insurgents, then we can eliminate the sources of support among the
population for the insurgent.
Any insurgent movement depends on the local population for intelligence,
money, food, and
recruits. In addition to human resources, the guerrilla requires logistical
support in the form of
ammunition, explosives, food, communications equipment, and anything
else that can
help him in his fight against the government.
Page | 83

1. Human Resources. Among the services that the local population provide
to the
insurgents are recruits, intelligence, manual labor, guides, and couriers.
2. Recruits. Traditionally, insurgent groups have had to depend on the
local population, to supply them with the personnel required by the
expansion of
political and military organizations . No matter whether they are recruited
voluntarily or by force, the insurgents
depend on a continuous supply of recruits from the local population for the
success of their
insurrection.
3. Intelligence. Insurgent military and political organizations cannot operate
effectively without good intelligence. In a situation of internal attack,
insurgents can
collect this information, either through established informant networks or by
routine interrogation of local inhabitants. Due to their status as non-
combatants, the local inhabitants
enjoy the ability to obtain intelligence from government forces that would be
impossible for the insurgents to obtain.
4. Manual work. Traditionally, the insurgents have depended on the
inhabitants
to do various manual tasks that range from filling sandbags to
building casemates at operating bases; the transportation of supplies and
the
evacuation of the wounded. The need for these services is obvious because
the insurgents do not have
the staff or the time to do these activities.
5. Posts and Guides. The locals are good couriers and guides, not only
because they are civilians, but because of their knowledge of the area. In
addition, due to their position outside
the insurgents' political and military organization, they are not in a position
to engage others.
Material resources.
By developing a list of critical items it becomes obvious that the insurgent
needs to
have certain items such as food, water, and clothing. They have to discover
which element or
elements are absolutely essential to the effective operations of the
insurgent.
A typical list of critical materials for insurgents should contain at least the
following items:
1. Food. The insurgents' ability to acquire food is a critical factor in
any insurrection.
2. Salt In any country with a tropical climate, salt is a critical element in the
insurgent diet .
3. Clothes. Clothing is a material that varies in importance according to the
location of the world.
4. Weapons, ammunition and explosives. Any insurgent group has a
critical need for these elements. They can range from the use of very
primitive weapons to
reliance on highly sophisticated weapons, equipment and ammunition.
5. Transportation Equipment. Insurgents must have some way of moving
supplies from production points to storage sites and from storage sites to
the
units for which they are intended.
Page | 84

6. Reproduction Equipment. Any insurgent relies heavily on the use of


propaganda to gain a greater base of popular support and discredit the
government. While
this propaganda can be disseminated by radio, film, or speeches, it is
frequently
disseminated by written material.
7. Funds. Since the insurgent cannot always obtain all of his
critical elements from the population, he has to buy many items, such as
weapons, ammunition, and
even food in the local economy, the black market, or the international
market. You also
need to pay your troops and informants.
8. Medical Supplies. No matter the nature of the insurrection or its
geographic location in the world, the need for medical supplies is critical for
any
insurgent group .
List of Critical Elements.
The specific needs of the insurgents are
priority intelligence requirements for the defense forces. These elements
must be specified in the list of
critical elements. Include in your list all human services and support
services materials without
which the insurgents cannot operate effectively. Naturally, the critical
elements of
the insurgents will vary.
Bridges of Materials.
Since we have an understanding of the support that we have to deny the
insurgents, we now have to study how they obtain this support, without this
knowledge
we cannot implement the resource and population control measures to
deny them their support.
1. Military Action. Initially in the movement, most insurgents rely
on military actions such as isolated raids on small government posts and
patrols
to obtain such things as weapons, ammunition, medical supplies, and
communications equipment . Acquisition of resources through continuous
military action throughout the conflict.
2. Infiltration. One of the things that an insurgent group seeks to conduct an
internal attack is the location of a base for operations and supplies in a third
country. A
less harsh alternative is the infiltration of supplies and personnel into the
country by land and sea. Where
insurgents have been denied this external support, such as in Malaysia, the
Philippines, and in their
later stages in Greece, insurgent forces have been contained and eventually
destroyed.
3. Acquisition and Local Manufacturing. As the insurgent movements grow
and
begin to establish safe areas, the insurgents will begin to produce their own
weapons, propaganda sheets, food, and whatever else they require. Safe
areas
where things that can be produced normally will not exist until after the
insurgent is strong enough or is in an advanced Phase I or Phase
II situation. In areas that are in dispute, the insurgent who needs to acquire
it through
tax programs, purchases, or if necessary, through confiscation or theft.
Population and Resource Control Measures.
1. Surveillance. To control the movement of supplies, equipment, and
personnel, it will be
necessary to control and / or monitor the activities of the population.
Surveillance measures are
Page | 85

used to identify insurgents, identify those who support insurgents, and


identify how aid is passed to insurgents. Restrictive measures are
those that seek to isolate the insurgent from the general population,
physically and psychologically,
denying him his main source of supply.
ID cards. An effective identification system is essential to
the population and resource control program.
Record. A family registration program is used to supplement the
ID card system . East. This is the system of inventorying all the families per
household,
making a list of all the family members that live in the house along with
the family's resources. The presence of insurgent tendencies and affiliations
among the population are also noted .
Control by blocks. The purpose of control by blocks is to detect the
individuals who
are supporting or sympathizing with the insurgents and the type of support
that is being provided.
Police patrols. Police patrols can be compared to
reconnaissance patrols . Its purpose is to detect sources of insurgent
support, sympathizers, and
routes used by insurgent forces for intelligence, logistics, and routine
activities and
to act to prevent these activities.
Restrictive Measures. Once the collection of information concerning the
insurgent supply system is effective, government forces can efficiently
implement the restrictive measures.
Travel and Transportation Controls. A population and resource control
program
must include a permit system.
Curfew. Curfews can be an effective way of restricting
movement between specific hours through a specific area or between
specified routes. The
purpose is to allow authorities the ability to identify violators and take
action based on the premise that anyone found violating the curfew
is an insurgent or sympathizer with the insurgents until they can prove
otherwise.
Review Points. It is of little value to establish pass, permit, and
identification programs unless there is a system to verify these official
papers. Therefore, the
establishment of checkpoints on all travel routes is necessary once the use
of passes has begun. After an evaluation of the area, the checkpoints are
placed in strategic places. Factors to consider include:
defense skills; View of the road, enough space to stop vehicles and check
them
without interrupting the traffic, the number of detours available to avoid the
check point, and
good communications.
Page | 86 Urban

Guerrilla Manual
Urban Guerrilla

Warfare
Page | 87

Introduction
Urban Guerrilla Urban
violence has always been a part of revolutionary struggle, but since
1968 the world has become familiar with a new aspect of revolutionary
warfare. This is the
systematic employment of guerrilla tactics in an urban setting as part of a
coordinated strategy designed to secure revolutionary objectives.
Marighella tried to solve the problem of how to promote the revolution when
all
the political and social advantages were with the counterrevolutionaries.
His answer was
relatively straightforward, but no less powerful for this. The insurgents had
not been able to
establish themselves in rural areas because the security forces were so
strongly established
in the countryside. This grip of the security forces had to be broken by
attracting
the security forces to urban areas to deal with a deteriorating situation. In
this way, rural guerrillas could establish themselves in the resulting vacuum
and
urban and rural guerrillas would then complement their efforts.
By doing this, they would keep the security forces out of balance, unable to
concentrate to deal with either threat (urban or rural) and would
subsequently be
defeated. Both revolutionary efforts would have to develop simultaneously;
one
without the other would be defeated.
What Marighella proposes is the polarization of society where public
support for
an increasingly repressive regime wanes and popular support and sympathy
for the
insurgents increases. In this way, through the production of a crisis of trust
in
society, Marighela believed that the conditions needed for the overthrow of
an
established order would be achieved. To accomplish this, Marighella
devised a list of tactics that could
be used to ridicule and discredit the authorities. These tactics range from
assassination and bombings to barricading the street; anyone could pick it
up and use it.
We can summarize the importance of Carlos Marighela by saying that he
combined a number of
ideas and produced a new concept of revolutionary warfare.
Below we have translated the Mini-Manual of the Urban Guerrilla that has
assured
Carlos Marighela the fame, notoriety, and influence that have lasted beyond
his death in
1969. Its study is essential for anyone who wants to achieve a better
understanding of the guerrilla revolutionary war.

Page | 88

Mini Manual of the Urban Guerrilla

Introduction
A definition of the Urban Guerrilla
The chronic structural crisis characteristic of Brazil today, and its resulting
political instability , are the reasons for the abrupt emergence of the
revolutionary war in the country The
revolutionary war manifests itself in the form urban guerrilla warfare,
psychological warfare, or
rural guerrilla warfare. Urban guerrilla warfare or psychological warfare in
the city depend on the
urban guerrilla.
The urban guerrilla is a man who fights against a military dictatorship with
weapons, using unconventional methods. A political revolutionary and
ardent patriot, he
is a fighter for the liberation of his country, a friend of his people, and of
freedom. The area in
which the urban guerrilla acts is in the big Brazilian cities. There are also
many
bandits, known as criminals, who work in the big cities. Often times
assaults by criminals are interpreted as actions by guerrillas.
The urban guerrilla, however, differs radically from the criminals. The
offender
personally benefits from his actions, and attacks indiscriminately without
distinction between the
exploited and the exploiters, which is why there are so many everyday men
and women among his
victims. The urban guerrilla pursues a political goal and only attacks the
government, the big
capitalists, the US imperialists.
Another element equally harmful than the criminal, and that also operates in
the
urban environment is the rightist counter-revolutionary who creates
confusion, robs banks, drops
bombs, kidnaps, assassinates, and commits the most heinous crimes
imaginable against
urban guerrillas. the revolutionary priests, students, and citizens who
oppose fascism and seek freedom.
The urban guerrilla is an implacable enemy of the government and inflicts
systematic damage on the
authorities and the men who hold power and exercise power. The main job
of the
urban guerrilla is to distract, tire, and demoralize the militarists, the military
dictatorship, and the
repressive forces, as well as to attack and demoralize the militarists, the
military dictatorship, and the
repressive forces, as well as to attack and destroy the wealth of the
Americans,
foreign managers, and the Brazilian upper class.
The urban guerrilla is not afraid of dismantling or destroying the present
Brazilian economic, political, and social system, since his goal is to help the
rural guerrilla and collaborate in the creation
of a totally new system and a revolutionary social and political structure,
with the
armed masses in power.
The urban guerrilla must have a certain minimum of political understanding.
To achieve
this you have to read certain printed or mimeographed works such as:
Guerrilla War
by Che Guevara Memoirs of a Terrorist, Some Questions from
Brazilian Guerrillas , Guerrilla Operations and Tactics, On Problems and
Strategic Principles , Certain Tactical Principles for Comrades Carrying out
Guerrilla Operations , Organizational Questions, O Guerrilheiro, Newspaper
of the
Brazilian Revolutionary Groups , Personal Qualities of an Urban Guerrilla
Page | 89

The urban guerrilla is characterized by his courage and decisive nature. You
have to
be good tactically and be a skilled leader. The urban guerrilla has to be a
smart person
to compensate for the fact that he does not have enough weapons,
ammunition and equipment.
The career military or government police have modern weapons and
transportation and
can travel freely, using the force of their power. The urban guerrilla has no
such
resources at his disposal and leads a clandestine life. Sometimes he is a
sentenced person
or is on probation, and is forced to use false documents.
However, the urban guerrilla has a certain advantage over the conventional
army or the
police. This is, that while the police and the military act in favor of the
enemy, whom the
people hate, the urban guerrilla defends a just cause, which is the cause of
the people.
The urban guerrilla's weapons are inferior to those of his enemy, but seen
from a
moral point of view, the urban guerrilla has an advantage that cannot be
denied. This
moral superiority is what sustains the urban guerrilla. Thanks to it, the urban
guerrilla can carry
out his main job, which is to attack and survive.
The urban guerrilla has to capture or divert weapons from the enemy in
order to fight.
Because their weapons are not uniform, since what they have has been
taken or has come into their
hands in different ways, the urban guerrilla is faced with the problem that he
has a variety
of weapons and a shortage of ammunition. Furthermore, he has nowhere to
practice shooting.
These difficulties have to be conquered, which forces the urban guerrilla to
be
imaginative and creative, qualities that without which it would be impossible
for him to carry out his role
as a revolutionary.
The urban guerrilla has to possess initiative, mobility, and flexibility, as well
as
versatility and command of any situation. Initiative is an especially
indispensable quality . It is not always possible to anticipate everything, and
the urban guerrilla cannot be
confused, or wait for orders. Your duty is to act, to find adequate solutions
for each problem you encounter, and not to withdraw. It is better to make
mistakes by acting than to
do nothing for fear of making mistakes. Without the initiative there can be
no
urban guerrilla warfare.
Other important qualities in the urban guerrilla are the following: that he can
walk a lot, that is resistant to fatigue, hunger, rain, and heat, know how to
hide
and watch, conquer the art of having unlimited patience, staying calm and
quiet in the
worst conditions and circumstances, never leaving footprints or traces, not
being discouraged .
In the face of the almost impossible difficulties of urban warfare, many
comrades
weaken, leave, or leave revolutionary work.
The urban guerrilla is not a businessman in a commercial firm nor is he an
artist
in a work. Urban guerrilla warfare, like rural guerrilla warfare, is a promise
that the guerrilla makes to himself. When you can no longer cope with
difficulties, or you
recognize that you lack patience to wait, then it is best to surrender your
position before
betraying your promise, as you lack the basic qualities necessary to be a
guerrilla.
Page | 90

How the Urban Guerrilla Should Live and Survive


The urban guerrilla must know how to live among people and take care not
to
appear to be strange or separated from the ordinary life of the city.
You should not wear clothing that is different from what other people wear.
Expensive and
elaborate clothing for men or women can be an impediment to the urban
guerrilla if
his work takes him to neighborhoods where this type of clothing is not
common. The same is true if you work
in reverse.
The urban guerrilla has to live by his work or professional activity. If you are
known or
wanted by the police, if you have been sentenced or are on probation, you
have to live
clandestinely. Under such conditions, the urban guerrilla cannot reveal his
activities to
anyone, since that is always and solely the responsibility of the
revolutionary organization to
which he belongs.
The urban guerrilla has to have a great capacity for observation, he has to
be
well informed regarding everything, in particular the movements of his
enemy, he has to
be constantly alert, searching, and have great knowledge of the area in
which he lives, operates, or
through which it travels.
But the fundamental and decisive characteristic of the urban guerrilla is that
he is a man
who fights with weapons; Given this condition, there is little probability that
he will be able to continue his
normal profession for long or as a reference to the class struggle, since it is
inevitable and
necessarily exacerbates , the armed conflict of the urban guerrilla points
towards two essential objectives:
a. The physical liquidation of the chiefs and assistants of the armed forces
and the police.
b. The expropriation of the resources of the government and of those that
belong to the
big capitalists, landowners, and imperialists, with small expropriations used
for the
maintenance of the individual urban guerrilla and large expropriations for
the maintenance of
the revolution itself.
It is clear that the armed conflict of the urban guerrilla also has another
objective. But
here we refer to two basic objectives, especially expropriations. It is
necessary for every
urban guerrilla to keep in mind that he can only survive if he is willing to kill
the police and all those dedicated to repression, and if he is truly dedicated
to
expropriating the wealth of the big capitalists, the landowners, and the
imperialists.
One of the fundamental characteristics of the Brazilian revolution is that
since its
beginnings it has developed, around the expropriation of the wealth of the
major,
imperialist bourgeoisie , and the latifundist interests, without the exclusion
of the richest
elements and the most commercial elements. powerful involved in import-
export business.
And by expropriating the wealth of the main enemies of the people, the
Brazilian revolution was able to hit them in their vital centers, with
preferential and
systematic attacks on the banking network, that is, the most forceful blows
were against the
capitalist nervous system. .
Bank robberies carried out by Brazilian urban guerrillas hurt
big capitalists such as Moreira Salles and others, the foreign firms that
insure and
Página | 91

reinsure the bank capital, the imperialist companies and the state and
federal governments,
all of them systematically expropriated from now on.
The fruits of these expropriations have been dedicated to the work of
learning and
perfecting urban guerrilla techniques, the purchase, production, and
transportation of
arms and ammunition from rural areas, the security apparatus of the
revolutionaries, the
daily maintenance of soldiers, those who have been released from prison by
the armed
forces and those who have been injured or persecuted by the police, or from
any type of
problem that concerns comrades who have been released from prison, or
killed by police and
the dictatorship military.
In Brazil, the number of violent actions carried out by urban guerrillas,
including deaths, explosions, seizures of arms, ammunition, and explosives,
robberies of banks and
prisons, etc., is significant enough to leave no doubt about the
true intentions of the revolutionaries. The execution of the CIA spy Charles
Chandler,
a member of the US Army who came from the Vietnam War to infiltrate the
Brazilian student movement , the lackeys of the military killed in bloody
encounters with the
urban guerrillas, all are witnesses to the fact that we are in a
complete revolutionary war and that war can only be fought by violent
means.
This is the reason why the urban guerrilla uses the struggle and why he
continues to
concentrate his activity on the physical extermination of the agents of
repression, and to dedicate 24
hours a day to the expropriation of the exploiters of the population.
Technical Preparation of the Urban Guerrilla
No one can become an urban guerrilla without paying particular attention to
technical preparation.
This technical preparation of the urban guerrilla stems from his concern for
physical preparation, his knowledge and learning in professions and skills of
all kinds,
particularly manual skills.
The urban guerrilla can have strong physical endurance only if he trains
systematically. He cannot be a good soldier if he has not studied the art of
fighting. For this
reason the urban guerrilla has to learn and practice various types of fighting,
attack, and
personal defense.
Other useful forms of physical preparation are hiking, camping, and
practicing
forest survival, climbing mountains, rowing, swimming, diving,
frogman training , fishing, harpooning, and hunting birds, and large and
small animals.
It is very important to learn to drive, pilot an aircraft, handle a small boat,
understand mechanics, radio, telephone, electricity, and have some
knowledge of
electronic techniques .
It is also important to have knowledge of topographic information, to be
able to locate the
position by instruments or other available resources, to calculate distances,
make maps and
plans, draw to scale, take times, work with scales, compass, etc.
A knowledge of chemistry and color matching, stamp making,
mastery of the art of calligraphy and letter copying along with other skills
are part of the
Page | 92

technical preparation of the urban guerrilla, who is obliged to falsify


documents in order to
live within a society that he seeks to destroy.
In the area of ​​auxiliary medicine he has the special role of being a
doctor or understanding
medicine, nursing, pharmacology, drugs, elementary surgery, and
emergency first aid.
The basic question in the technical preparation of the urban guerrilla is the
handling of weapons
such as the machine gun, the automatic revolver, FAL, various types of
shotguns, carbines,
mortars, bazookas, etc.
A knowledge of various types of ammunition and explosives is another
aspect to consider.
Among explosives, dynamite has to be well understood. The use of
incendiary
bombs, smoke bombs, and other types are essential prior knowledge.
To learn how to make and build weapons, prepare Molotov cocktails,
grenades, mines,
homemade destructive devices, how to destroy bridges, and destroy train
rails,
the technical preparation of the guerrilla is indispensable knowledge
The highest level of preparation of the urban guerrilla is the center for
technical training . But only the guerrilla who has passed the preliminary
examination can attend
this school, that is, one who has passed the acid test in revolutionary action,
in
real combat against the enemy.
The Weapons of the Urban Guerrilla
The weapons of the urban guerrilla are light weapons, easily exchanged,
usually captured from the enemy, bought, or made on the spot.
Light weapons have the advantage that they are quick to handle and easy to
transport.
In general, light weapons are characterized by being short barrels. This
includes many
automatic weapons.
Automatic and semi-automatic weapons considerably increase the
firepower
of the urban guerrilla. The downside of this type of weapon for us is the
difficulty in
controlling it, resulting in wasted ammunition, offset only by its
optimal accuracy . Men who are poorly trained turn automatic weapons into
an
ammunition drain.
Experience has shown that the basic weapon of the urban guerrilla is the
light machine gun. This weapon, in addition to being efficient and easy to
fire in an urban area,
has the advantage of being highly respected by the enemy. The guerrilla has
to know
completely how to handle the machine gun, which is now very popular and
indispensable to the
Brazilian urban guerrilla.
The ideal machine gun for the urban guerrilla is the INA .45 caliber. Other
types of
machine guns of different calibers can be used with the understanding, of
course,
of ammunition problems. It is preferable that the industrial potential of the
urban guerrilla allows the
production of only one type of machine gun, so that the ammunition used
can be
standardized.
Each shooting group of urban guerrillas has to have a machine gun
manned by a good marksman. The other components of the groups have to
be armed with
Page | 93

revolver .38 caliber, our "standard" weapon. The .32 caliber is also useful for
those who
want to participate. But the .38 is preferable as its impact usually puts the
enemy out
of action.
Hand grenades and conventional smoke bombs can be considered
light weapons. With defensive power for concealment and withdrawal.
Long-barrel weapons are more difficult to transport for the urban guerrilla
since
they attract a lot of attention due to their size. Long-barrel weapons include
the FAL, Mauser
guns and rifles, hunting weapons such as the Winchester, and others.
Shotguns can be useful if they are used at short distances. They are useful
even for
people with very poor aim, especially at night when accuracy is not of much
help. Bazookas and mortars can be used in action but the conditions for
using them
have to be prepared and the people who are going to use them have to be
trained.
The urban guerrilla should not try to base his actions on the use of heavy
weapons,
which have serious disadvantages in the type of fight that demands light
weapons that ensure
mobility and speed.
Homemade weapons are often as efficient as the best weapons produced
in conventional factories, and even a sawed-off shotgun is a good weapon
for an
urban guerrilla .
The role of the urban guerrilla as a producer of weapons is of fundamental
importance.
Take care of your weapons, know how to repair them, and in many cases
you can establish a small
station to improvise the production of small and efficient weapons.
The work in metallurgy and on the mechanical lathe are basic skills that the
urban guerrilla must incorporate in his industrial planning, which is the
planning of homemade weapons.
These constructions and courses in explosives and sabotage must be
organized. The
primary materials for practice in these courses must be obtained ahead of
time to
avoid incomplete learning, that is, not to leave enough space for
experimentation.
Molotov cocktails, gasoline, and household gadgets such as boxes of tubes
and cans,
smoke bombs, mines, conventional explosives such as dynamite and
potassium chloride,
plastic explosives, gelatin capsules, and ammunition of all kinds are
necessary for success.
of the mission of the urban guerrilla.
The method of obtaining the necessary materials and ammunition will be to
buy them or
take them by force in specially planned and carried out expropriations.
The urban guerrilla will be careful not to keep explosives and materials for
too
long as they can cause accidents, but he will try to use them immediately on
pre-selected targets .
The urban guerrilla's weapons and his ability to maintain them constitute his
firepower. Taking advantage of the use of modern weapons and
ammunition and introducing innovations
in his firepower and his use of certain weapons, the urban guerrilla can
change many
of his urban warfare tactics. An example of this was the innovation made by
urban guerrillas in Brazil when they introduced the use of the machine gun
in bank attacks.
Page | 94

When the massive use of machine guns, uniforms becomes possible, there
will be new
changes in urban warfare tactics. The firing group that uses uniform
weapons and
corresponding ammunition, with reasonable support for their maintenance,
will reach a
considerable level of efficiency. The urban guerrilla increases his efficiency
as his
shooting potential increases .
The Shot: The Reason for the Existence of the Urban Guerrilla
The reason for the existence of the urban guerrilla, the basic condition for
which he acts and
survives, is to shoot. The urban guerrilla has to know how to shoot well
because it is
required by this type of combat.
In conventional warfare, combat is generally ranged with long-
range weapons . In unconventional warfare, in which urban guerrilla warfare
is included, the
combat is at close range, very short. To avoid his own extinction, the urban
guerrilla has
to shoot first and cannot make a mistake in his shot. You can't waste your
ammunition
because you don't have large amounts of it, so you have to save it. Nor can
he replace his
ammunition quickly, because he is part of a small group in which each
guerrilla has to
take care of himself. The urban guerrilla cannot waste time and must be
able to shoot in one shot
.
A fundamental fact, which we want to fully emphasize and whose
fundamental importance cannot be overestimated, is that the urban
guerrilla must not shoot
continuously, using all his ammunition. It may be that the enemy is not firing
precisely, he is waiting until the guerrilla's ammunition has been used up. At
such a
time, without having time to replace their ammunition, the urban guerrilla
will face a
rain of enemy fire and can be taken prisoner or killed.
Despite the value of the surprise factor that often makes it unnecessary for
the
urban guerrilla to have to use his weapons, he cannot be allowed the luxury
of entering combat without knowing
how to shoot. Face to face with the enemy, he has to be in constant
movement from one
position to another, because staying in one position makes him a fixed
target and, as such,
very vulnerable.
The life of the urban guerrilla depends on shooting, on his ability to handle
small arms well as well as on avoiding being targeted. When we talk about
shooting,
we talk about marksmanship as well. The aim must be learned until it
becomes a
reflection on the part of the urban guerrilla.
To learn how to shoot and have good aim, the urban guerrilla has to
train systematically, using each learning method, shooting at targets, even
in amusement parks and at home.
Shooting and aiming are the water and air of an urban guerrilla. His
perfection in the art
of shooting makes him a special type of urban guerrilla, that is, a sniper, a
category of
solitary combatant indispensable in isolated actions. The sniper knows how
to shoot, at
close range or at long range, and his weapons are suitable for any type of
shot.
The Fire Group
In order to function, the urban guerrilla has to be organized into small
groups,
directed and coordinated by one or two people, this is what constitutes a
fire group.
Page | 95
Within the firing group there must be full trust between the comrades. The
best
shot and the one who knows how to handle the machine gun is the person
in charge of
operations.
When there are tasks planned by the strategic command, these tasks take
precedence. But there is no such thing as a fire group without your own
initiative. For this reason it
is essential to avoid any rigidity in the organization to allow as much
initiative as possible on the part of the firing group. The old type of
hierarchy, the
traditional leftist style, does not exist in our organization.
This means that, except for the priority of objectives designated by the
strategic command , any group of fire can decide to rob a bank, kidnap or
execute an
agent of the dictatorship, a figure, identified with the reaction, or a North
American spy, and it can
carry out any kind of propaganda or nerve warfare against an enemy
without the
need to consult with the general command.
No fire group can remain idle awaiting orders from "above." Your
obligation is to act. Any urban guerrilla who wants to establish a fire group
and
begin action can do so and thus become part of the organization.
This method of action eliminates the need to know who is carrying out what
actions since there is free initiative and the only point of importance is to
substantially increase the
volume of guerrilla activity to wear down the government and force it on the
defensive. The
fire group is the instrument of organized action.
With it, guerrilla operations and tactics are planned, launched, and carried
out successfully.
The general command relies on the fire group to carry out its objectives of
a strategic nature, and to do so in any part of the country. For his part, he
helps the
fire groups with their difficulties and needs.
The organization is an indestructible network of fire groups, and of
coordination among
them, that works simply and practically with the general command and that
also participate in the
attacks; and organization that exists for the sole purpose, simple and pure,
of revolutionary action.
Urban Guerrilla
Logistics Conventional logistics can be expressed with the simple CCEM
formula:
C - Food
C - Fuel
E - Equipment
M - Ammunition
Conventional logic refers to maintenance problems for a
regular army of the armed forces, transported in vehicles with fixed bases
and supply lines.
The urban guerrillas, on the other hand, are not an army but a small armed
group,
intentionally fragmented. They do not have vehicles or fixed bases. Their
supply lines are
precarious and insufficient, and they have no established foundations
except in the rudimentary sense of an
arms factory with a house.
Page | 96

While the objective of conventional logistics is to supply the


army's war needs to suppress the rural and urban rebellion, the logistics of
the urban guerrilla
aim to sustain operations and tactics that have nothing in common with the
conventional war and that are directed against the military dictatorship and
the
North American domination of the country.
For the urban guerrilla, who starts from nothing and has no support at the
beginning, logistics
are expressed by the MDAME formula which is:
M - mechanization
D - money
A - weapons
M - ammunition
E - explosives
Revolutionary logistics take mechanics as a of its bases. However, the
mechanics are inseparable from the driver. The urban guerrilla driver is as
important as
the urban guerrilla machine gun expert. Without one, machines don't work,
and things
like cars and machine guns don't work and become dead objects. An
experienced driver is not done in a single day, and learning begins at an
early
age. Every good urban guerrilla has to be a good driver. With regard to the
vehicle, the
urban guerrilla has to expropriate what he needs.
When he already has the resources, the urban guerrilla can combine the
expropriation of
vehicles with other acquisition methods.
Money, weapons, ammunition and explosives, as well as vehicles have to be
expropriated. The urban guerrilla has to rob banks and armories and take
explosives and
ammunition wherever he finds them.
None of these operations is carried out for a single purpose. Even though
the assault
is only for the money the guards' weapons are also taken. The expropriation
is the
first step for the organization of our logistics, which in itself assumes an
armed and
permanently mobile character.
The second step is to reinforce and extend logistics, depending on the
ambushes
and traps in which the enemy will be surprised and their weapons,
ammunition, vehicles, and other
resources captured.
Once the urban guerrilla has the weapons, ammunition, and explosives, one
of the
most serious logistical problems that he will have in any situation is to find
a
hiding place in which to leave the material and to appropriate the means of
transporting it and assembling it where
is needed. This has to be accomplished even when the enemy is watching
and has
blocked roads.
The knowledge that the urban guerrilla has of the terrain, and the devices
that he uses or is
capable of using, such as the guides specially prepared and recruited for
this mission,
are the basic elements in solving the eternal problem of logistics of the
revolutionary forces .
Page | 97

The Urban Guerrilla Technique


In its most general sense, technique is the combination of methods that
man uses
to carry out any activity. The activity of the urban guerrilla consists of
carrying out
guerrilla warfare and psychological warfare.
The urban guerrilla technique has five basic components:
a. One part is related to characteristics
b. One part is related to the requirements that are coupled with these
characteristics,
requirements represented by a series of initial advantages without which
the urban guerrilla
can not achieve his objectives;
c. One part concerns certain definitive objectives in the actions initiated by
the
urban guerrilla ;
d. One part is related to the characteristic types and modes of action of
urban guerrillas;
and. One part concerns the urban guerrilla's method of carrying out
specific actions .
Characteristics of the Guerrilla
Technique The urban guerrilla technique has the following characteristics:
a. It is an aggressive technique, that is, it has an offensive character. As is
well known,
defensive action means death for us. Since we are inferior to the enemy in
firing power and have neither his resources nor his might, we cannot defend
ourselves against an
offensive or a concentrated attack by the army. And this is the reason why
urban technique
can never be permanent in nature, nor can it defend a fixed base or remain
in one
place waiting to repel the circle of reaction;
b. It is a technique of attack and retreat by which we preserve our forces.
c. It is a technique that seeks the development of urban guerrilla warfare,
whose function
is to wear down, demoralize, and distract enemy forces, allowing the
development and
survival of rural guerrilla warfare that is destined to play a decisive role in
the
revolutionary war. .
The Initial Advantage of the Urban Guerrilla
The dynamics of urban guerrilla warfare are based on the violent clashes of
the
urban guerrilla with the military and police forces of the dictatorship. In
these clashes, the
police have the upper hand. The urban guerrilla has inferior forces. The
paradox is that the
urban guerrilla, although weaker, is nevertheless the attacker.
The military and police forces, for their part, respond to the attack with the
mobilization and
concentration of infinitely superior forces in the pursuit and destruction of
the forces.
Page | 98

of urban guerrilla. You can only avoid defeat if you have the initial
advantages and
know how to exploit them in order to compensate for your vulnerabilities
and lack of equipment.
The initial advantages are: You
have to take the enemy by surprise;
You have to know the terrain of the encounter better than the enemy;
It must have greater mobility and speed than the police and other repressive
forces;
Your intelligence service has to be better than the enemy's;
You have to be in command of the situation and demonstrate such great
confidence that
everyone on our side is inspired and never thinks to waver, while those on
the other side
are stunned and unable to respond.
Surprise
To compensate for his general weakness and lack of weapons compared to
the enemy, the
urban guerrilla uses surprise. The enemy has no way of fighting against
surprise and becomes confused or destroyed.
When urban guerrilla warfare broke out in Brazil, experience showed that
surprise was essential to the success of any guerrilla operation.
The surprise technique is based on four essential requirements:
a. we know the situation of the enemy that we are going to attack usually by
means of
precise information and meticulous observation, while the enemy does not
know if he is going to
be attacked or if he does not know anything about the attacker;
b. We know the force of the enemy that is going to be attacked and the
enemy does not know anything
about ours;
c. attacking by surprise, we save ourselves and conserve our forces, while
the
enemy is not able to do the same and is left at the mercy of events;
d. we determine the time and place of the attack, arrange its duration, and
establish its
objective. The enemy remains ignorant of all this.
Knowledge of the Terrain
The guerrilla's best ally is the terrain because he knows it like the palm of
his hand.
Having the terrain as an ally means knowing how to use its irregularities
intelligently, its highest and lowest points, its curves, its regular and secret
passages,
abandoned areas , vacant lots, etc., taking the maximum window of all this
to the success of
armed actions, escapes, withdrawals, cover, and hiding places.
Page | 99

The impenetrable places and the narrow places, the, streets under
construction,
police checkpoints, military zones and closed streets, entrances and exits of
tunnels and those that the
enemy can block, viaducts that have to be crossed, corners controlled by
the
police or guarded, their lights and signals, all this has to be completely
studied in
order to avoid fatal errors.
Our problem is to pass and know where and how to hide, leaving the enemy
confused in areas that he does not know.
The urban guerrilla familiar with the difficult and uneven terrain, avenues,
streets, corridors,
entrances and exits, the corners of urban centers, their passages and
shortcuts, the empty lots, their
underground passages, their pipes and sewer systems can cross with
security on
unfamiliar terrain to the police, where they can be caught in a fatal ambush
at
any time.
Because he knows the terrain, the guerrilla can go through it on foot, by
bicycle, by car,
4x4, or truck and never be caught. Acting in small groups with a few people,
the guerrillas can meet at an anticipated time and place in advance,
following the attack,
with new guerrilla operations, or evading the circle of the police and
disorienting the enemy
with their unprecedented audacity.
It is an unsolvable problem for the police in the maze-like terrain of the
urban guerrilla , to catch someone they cannot see, or to try to make contact
with someone they cannot
find.
Our experience is that the ideal urban guerrilla is someone who operates in
his own
city ​​and who knows completely the city and its streets, its
neighborhoods, its
traffic problems , and other peculiarities.
The foreign guerrilla, who comes to the city in which the terrain is unfamiliar
to him, is
a weak point and if assigned to certain operations, he can endanger them.
To avoid
serious mistakes, it is necessary for the first to know well the location of the
different streets.
Mobility and Speed
To ensure mobility and speed that the police cannot achieve, the
urban guerrilla needs the following prerequisites:
a. mechanical;
b. knowledge of the terrain;
c. a breakdown or suspension of enemy communications and
transportation;
d. light weaponry.
Care must be taken when carrying out operations that only last a few
moments, and leaving the place in vehicles, the urban guerrilla makes a
quick retreat,
escaping the pursuit.
Page | 100

The urban guerrilla has to know the road in detail and, in this sense, he has
to
practice the itinerary ahead of time as training to avoid roads that have no
exit, or ending in traffic blocks, or ending up paralyzed by constructions of
the
Department of Transit.
The police pursue the urban guerrilla blindly without knowing which road to
take to escape.
While the urban guerrilla fled quickly because he knew the terrain, the police
lost
track and ended the chase.
The urban guerrilla must launch his operations far from the logistical bases
of the police.
An initial advantage of this method of operation is that it places us at a
reasonable distance from the
possibility of pursuit, which facilitates evasion.
In addition to this necessary precaution, the urban guerrilla has to be
concerned
with the enemy's communication system. The telephone is the primary
target to prevent the
enemy from accessing information by breaking down their communications
system.
Even with knowledge of the guerrilla operation, the enemy depends on
modern transportation for its logistical support, and its vehicles necessarily
lose time carrying it through
heavy traffic in large cities.
It is clear that tangled and dangerous traffic is a disadvantage for the
enemy, as
it would also be for us if we were not ahead of the enemy.
If we want a margin of safety and be sure not to leave traces for the future,
we can adopt the following measures:
a. purposely intercepting the police with other vehicles or for accidental
inconvenience or
damage; but in this case the vehicle in question must not be legal or have
real license plates ;
b. obstructing the road with downed trees, stones, gutters, false traffic
signs,
obstructed roads or detours, and other ingenious means;
c. planting homemade mines in the way of the police, using gasoline, or
throwing
Molotov cocktails to set their vehicles on fire;
d. fire a burst of machine gun bullets or weapons such as the FAL at the
engine
or tires of the vehicles involved in pursuit.
With the typical arrogance of the fascist police and military authorities, the
enemy
will come to fight with heavy weapons and equipment, and with elaborate
maneuvers by men armed
to the teeth. The urban guerrilla has to respond to this with light weapons
easily
carried, so that he can always escape with maximum speed, without
accepting an
open fight . The urban guerrilla has no other mission than to attack and
retreat.
We would expose ourselves to the most overwhelming defeats if we
overloaded ourselves with
heavy weaponry and the tremendous weight of ammunition needed to fire
them, at the same time
losing the precious gift of mobility.
Page | 101
When the enemy fights against us riding have not always a disadvantage
and when we have vehicles. The car travels faster than the horse. From
inside the
car we also have the target of the mounted policeman, knocking him down
with the machine gun and
revolver fire or with Molotov cocktails and grenades.
On the other hand, it is not so difficult for an urban guerrilla on foot to make
a target of a
policeman on horseback. Most of all, ropes strung along roads, marbles,
and corks
are very efficient methods of making both fall. The great disadvantage of
the mounted police
is that it presents the urban guerrilla with two excellent targets: the horse
and its rider.
Aside from being faster than a horse, the helicopter has no better chances
in
pursuit. If the horse is very slow compared to the car of the urban guerrilla,
the
helicopter is very fast. Moving at 200 kilometers per hour you will never
succeed in hitting
a target lost in crowds and street vehicles from above, nor can you
land on the streets to catch someone. Furthermore, when it tries to fly low it
becomes
extremely vulnerable to the fire of the urban guerrilla.
Information
The possibilities that the government has to discover and destroy the urban
guerrilla
diminish as the potential of the dictator's enemies becomes greater and
more
concentrated among the popular masses.
The concentration of the opponents of the dictatorship plays a very
important role in
providing information on the movements of the police and men in the
government, as well as
hiding our activities. The enemy can be deceived by false information, which
is worse
for him because regardless of their meaning, the sources of information at
the disposal of the
urban guerrilla are potentially better than those of the police. The enemy is
observed
by the population, but he does not know who among the population passes
information to the
urban guerrillas . The military and the police are hated for the injustices and
violence they have committed
against the population, and this facilitates obtaining information harmful to
the activities of
enemy agents.
Information, which is only a small part of popular support, represents
extraordinary potential in the hands of the urban guerrilla. The creation of an
intelligence service with an organized structure is a basic need for us. The
urban guerrilla has to have essential information on the enemy's plans and
movements, where he
is, and how they move, the resources of the banking network, the media, and
their
secret movements.
The reliable information passed on to the urban guerrilla represents a well-
targeted blow
to the dictatorship. You have no way of defending yourself in the face of a
significant loss of
information that endangers your interests and facilitates our destructive
attack.
The enemy also wants to know what steps we are taking so that he can
destroy us or prevent us from acting. In this sense, the danger of betrayal is
present and the enemy
encourages and nurtures it or infiltrates spies into the organization. The
techniques of the urban guerrilla against
this tactic of the enemy is to publicly denounce traitors, spies, informants,
and
provocateurs.
Since our struggle takes place among the masses and depends on their
sympathy - while
the government has a bad reputation due to its brutality, corruption and
incompetence - the
Page | 102

informants, spies, traitors, and the police become the enemies of the
population without supporters,
denounced to the urban guerrillas, and in many cases, duly punished.
For their part, the urban guerrillas should not evade their responsibility -
once they
know who the spy or informant is - to kill him. This is the correct method,
approved by the
population, and considerably minimizes the incidence of enemy infiltration
or espionage.
For complete success in the battle against spies, the organization of
a counterintelligence or counterintelligence service is essential . However,
when it comes to information, it
can not be reduced to just knowing the enemy's movements and avoiding
the infiltration of their
spies. The information has to be comprehensive, it has to include
everything, including the most
significant data . There is a technique of obtaining information and the
urban guerrilla has to master it.
By following this technique, information is obtained naturally, as a part of
people's lives .
The urban guerrilla, living in the middle of the population and moving among
them, has to
pay attention to all kinds of conversation and human relationships, learning
to hide his
interests with great judgment and skill. In places where people work, study,
live, it is
easy to obtain all kinds of information about payments, businesses, points
of view, opinions, people's state of
mind, travel, interiors of buildings, offices and rooms, operations centers
etc. Observation, investigation, reconnaissance, and field exploration are
also
excellent sources of information. The urban guerrilla never goes anywhere
without paying attention and without
revolutionary precaution, always on the alert in case something happens.
Eyes and ears open, senses
alert, the memory recorded with everything necessary for now or for the
future, and the activity without
interrupting the soldier.
Careful reading of the press with particular attention to the organs of
mass communication , the investigation of accumulated information, the
transmission of news and everything of
importance, a persistence in being informed in the information of others, all
these make up the
question. intricate and immensely complicated information that gives the
urban guerrilla the
decisive advantage.
Decision
It is not enough for the urban guerrilla to have in his favor his command of
any
situation and a capacity for decision without which all other advantages will
be useless.
It is impossible to carry out any action, no matter how well planned, if the
urban guerrilla turns out to be indecisive, uncertain, or irresolute.
Even a successful action that has been started can end in defeat without
command of the situation and the ability to make decisions fails in the
middle of the execution of the
plan. When this situation command and the capacity for decision are
absent, this void is
filled by hesitation and fear. The enemy takes advantage of this failure and
is capable of
liquidating us.
The secret to any operation, simple or complicated, easy or difficult, is to
depend
on certain men. Strictly speaking, there is no such thing as an
easy operation. Everything has to be carried out with the same care
practiced in the
most difficult cases , starting with the choice of the human element, which
means relying on
leadership and decision-making capacity in any trial.
Page | 103

One can anticipate the outcome of an action by the way the participants
act during the preparatory phase. Those who are behind, who do not make
designated contacts , are easily confused, forget things, fail to complete the
basics
of work, are possibly indecisive men, and can be a danger. It is better not to
include them.
Decision means putting into practice the plan that has been devised with
determination, with
boldness, and with absolute firmness. It only takes a person who hesitates
to lose everything.
Objectives for Urban Guerrilla Actions
With his developed and established techniques, the urban guerrilla is based
on
action models that lead him to attack and, in Brazil, with the following
objectives:
a. threaten the triangle in which the systems of domination of the Brazilian
and
North American state are maintained in Brazil, a triangles whose points are
Rio, Sao Paulo, and Bello
Horizonte and whose base is the Rio-Sao Paolo axis, where the giant
industrial complex- economic-
political-cultural-military-police that supports the decisive power of the
country is located;
b. weaken the local guards or the dictatorship's security systems, given the
fact
that we are attacking and the military defending, which means trapping
government forces in defensive positions, with their troops immobilized in
defense of the
entire national maintenance complex , and with his ever-present fear of an
attack on his own
strategic nerve centers, and not knowing where, how, and when the attack
will come;
c. attack on all sides, with many different armed groups, small in numbers,
each independent and operating separately, to disperse government forces
in
pursuit of an extremely fragmented organization rather than offer the
dictatorship
the opportunity to concentrate its forces repressive in the destruction of a
highly
organized and structured system operating throughout the country;
d. give proof of their combativeness, decision, firmness, determination, and
persistence in the
attack of the military dictatorship to allow all the nonconformists to follow
our example and
fight with urban guerrilla tactics. Meanwhile, the government, with all its
problems,
unable to stop the guerrilla operations in the city, will waste time and suffer
endless losses which will cause them to withdraw their troops to be able to
watch over the banks,
industries, armories, barracks. military, television, American firms,
gas storage tanks , oil refineries, ships, airplanes, ports, airports, hospitals,
health centers, blood banks, shops, garages, embassies, residences of
prominent members of the regime, such as ministers and generals, police
stations, and
official organizations , etc .;
and. Increase urban guerrilla riots gradually in
endless descent such that government troops cannot leave the urban area
to
pursue the guerrilla without risking leaving the city, and allow the rebellion to
increase on the
coast as well as in the interior of the country;
F. to force the army and the police, with the commanders and their
assistants, to change the
accommodation and relative tranquility of the barracks and their relative
rest, for a state of
alarm and tension that increases the expectation of attack or the search for
traces that they
fade without leaving any trace;
Page | 104
g. to avoid open battles and decisive combat with government forces,
limiting the
fight to quick and brief attacks with lightning results;
h. to ensure for the urban guerrillas a maximum of freedom of action and
movement without having to avoid the use of armed violence, remaining
firmly oriented
towards the beginning of the rural guerrilla war and supporting the
construction of a
revolutionary army for national liberation.
On the Types and Nature of Action Models for
Urban Guerrillas
In order to achieve the previously enumerated objectives, the urban guerrilla
is
obliged, in his technique, to follow an action whose nature is as different
and diversified as
possible. The urban guerrilla does not arbitrarily choose this or that model
of action.
Some actions are simple, others are complicated. The inexperienced urban
guerrilla has
to be gradually incorporated into actions or operations that range from the
simplest
to the most complicated. He starts with missions and small jobs until he
becomes
fully an experienced urban guerrilla.
Before any action, the urban guerrilla has to think about the methods and
personnel available to carry out the action. The operations and actions that
the
technical preparation of the urban guerrilla demands cannot be carried out
by someone who lacks
technical skills. With these precautions, the models of action that the urban
guerrilla
can carry out are the following:
Assaults
Penetrations
Occupations
Ambushes
Street tactics Strikes
and work interruptions
Desertions, diversions, seizures, expropriations of weapons, ammunition,
and explosives
Release of prisoners
Executions
Kidnappings
Sabotage
Terrorism
Armed propaganda
Page | 105

War of nerves
Assaults
The assault is the armed attack with which we make expropriations, free
prisoners,
capture explosives, machine guns, and other typical weapons and
ammunition.
The assaults can be carried out at night or during the day. The night assault
is usually the
most advantageous to urban guerrillas. The idea is that the assault takes
place at night when
the conditions for a surprise attack are more favorable and the darkness
facilitates the escape and
hides the identity of the participants. The urban guerrilla has to prepare,
however,
to act under any conditions, night or day.
The most vulnerable targets for assault are the following:
Credit establishments
Commercial or industrial businesses, including the production of weapons
and explosives
Military establishments
Police stations and police station
Jails
Government property
Mass media
North American firms and property
Government vehicles, including military and police vehicles, trucks, armored
vehicles
, money loaders, trains, ships, and airplanes.
The assault on establishments is of the same nature because in each case
the property
and buildings represent a fixed target.
The assaults on buildings conceived as guerrilla operations vary according
to
whether they are banks, commercial businesses, industries, military camps,
commissariats, prisons,
radio stations, warehouses for imperialist firms, etc.
Assaults on vehicles - armored cars, trains, ships, planes - are of another
nature as they involve a moving target. The nature of the operation varies
according to the situation and the possibility - that is, whether the target is
stationary or mobile.
Armored cars, including military vehicles, are not immune to mines.
Obstructed roads, traps, deception, interception of other vehicles, Molotov
cocktails,
shooting with heavy weapons are all efficient methods of assaulting
vehicles.
Page | 106

Heavy vehicles, planes on the ground, ships at anchor, can be seized and
crews captured. Airplanes in flight can be diverted from their course by
guerrilla action or by a person.
Ships and trains in motion can be attacked or taken over by
guerrilla operations in order to capture weapons and ammunition or to
prevent the movement of troops.
The Bank Assault as a Popular Model
The most popular model of assault is the bank robbery. In Brazil, the urban
guerrilla has
started a type of organized assault on the banks as a guerrilla operation.
Today this
type of assault is commonly used and has served as a type of preliminary
examination for
the urban guerrilla in his learning process of revolutionary warfare.
Important innovations have been developed in the technique of bank
robbery, which
ensures the flight, the withdrawal of money, and the anonymity of the people
involved. Among these
innovations we have shooting car tires to prevent us from being persecuted,
locking people in bank bathrooms, forcing them to sit on the bathroom floor;
immobilize the bank guards and take their weapons, force someone to open
the safe; and
the use of costumes.
Attempts to install bank alarms, or to use American guards or
electronic detection devices , are of little use when the assault is of a
political nature and
carried out according to urban guerrilla warfare techniques. This technique
tries to use
new resources to achieve the tactical changes of the enemy, has access to
firepower
that is growing every day, becomes more cunning and daring, and uses a
large number of
revolutionaries every time, all to guarantee the success of planned
operations down to
the last detail.
Bank robbery is the typical expropriation. But, as is true for any type of
armed expropriation, the revolutionary is disadvantaged by two competitors:
a. competition for criminals;
b. competition for right-wing counterrevolutionaries;
This competition produces confusion, which is reflected in the uncertainty
of the population.
It is up to the urban guerrilla to prevent this from happening, and to achieve
this he uses two methods;
to. he has to avoid the bandit technique, which is one of unnecessary
violence and the
appropriation of merchandise and possessions from the population;
b. has to use the assault for propaganda purposes, at the very moment it
is happening, and then distribute material, papers, and every possible
means of explaining the
objectives and principles of the urban guerrilla as expropriator of the
government, the
ruling classes , and The imperialism.
Penetrations
Penetrations are rapid attacks on establishments located in neighborhoods
or
even in the center of the city, such as small military units, police stations,
hospitals, for
Page | 107

cause trouble, take up arms, punish and terrorize the enemy, retaliate, or
rescue
wounded prisoners, or those hospitalized under police surveillance.
The penetrations are also launched in garages and parking lots to destroy
vehicles and damage facilities, especially if they are North American firms
and properties.
When they take place on certain stretches of highway or in certain distant
neighborhoods,
the attacks can serve to force the enemy to move large numbers of troops,
a
totally futile effort since they will not find anyone with whom to fight.
When they are carried out in certain houses, offices, archives, or public
offices, their
purpose is to capture or search for secret papers and documents with
which to denounce the
involvement, commitments, and corruption of men in government, their
dirty businesses. and criminal transactions with Americans. Penetrations
are most
effective if they are carried out at night.
Occupations
Occupations are a type of attack carried out when an urban guerrilla is
stationed at established businesses and locations for temporary resistance
against the
enemy or for some propaganda purpose.
The occupation of factories and schools during strikes or at other times is a
method
of protest or of distracting the enemy's attention.
The occupation of radio stations is for propaganda purposes.
Occupation is a very effective method of action but, to prevent losses and
material damage to our ranks, it is always a good idea to have the possibility
of withdrawal.
It always has to be meticulously planned and carried out in a timely manner.
Occupancy always has a time limit and the faster it is done, the
better.
Ambush
Ambushes are attacks typified by surprise when the enemy is caught on
a road or when he causes a network of police to surround a house or
property. A
false message can bring the enemy to the place where he falls into the trap.
The main object of the ambush tactic is to capture the weapons and punish
him with
death.
Ambushes to stop passenger trains are for propaganda purposes, and
when they are troop trains, the objective is to eliminate the enemy and take
their weapons.
The urban guerrilla sniper is the type of fighter specially devised for
ambush because he can easily hide in uneven terrain, on the roofs
of buildings and apartments under construction. From windows and dark
places you can take
careful aim at your chosen target.
Page | 108

Ambushes have devastating effects on the enemy, leaving him nervous,


insecure
and full of fear.
Street Tactics Street
tactics are used to fight the enemy in the streets, using the
participation of the masses against him.
In 1968, Brazilian students used excellent street tactics against
police troops, such as marching through the streets against traffic, and
using slingshots and
marbles against the mounted police.
Other street tactics consist of building barricades, throwing bottles,
bricks, and other projectiles from the roofs of apartments and business
buildings against the
police; using buildings under construction for their escape, to hide, and to
support
surprise attacks.
It is equally necessary to know how to respond to the enemy's tactics. When
the police troops come protected with helmets to defend themselves from
thrown objects, we
divided into two teams; one to attack the enemy head-on, the other to attack
from the
rear, retreating one as the other advances to prevent the former from
becoming
a target of projectiles fired by the latter.
In the same way, it is important to know how to respond to a police network.
When the
police designate a certain area for their men to enter en masse to arrest a
demonstrator, a larger group of urban guerrillas have to surround the police
group,
disarm them, beat them, and at the same time allow the prisoner to escape.
This
urban guerrilla operation is called a network within a network.
When the police network is formed in a school building, a factory, a place
where the
masses congregate, or some other point, the urban guerrilla must not allow
himself to surrender or be
taken by surprise. To ensure that his network works, the enemy will be
forced to
transport the police in special vehicles and cars to occupy strategic points
on the
streets to invade selected buildings or premises. The urban guerrilla, for his
part, should never
leave a building or an area or enter it without first knowing all the exits, how
to
break the circle, the strategic points that the police could occupy, and the
roads that
inevitably They lead towards the net, and must seize other strategic points
from
which it can hit the enemy.
Roads followed by police vehicles have to be mined at
key points and at forced stopping points. When the mines explode, the
vehicles will fly in the air.
The policemen will fall into the trap and suffer losses or be victims of an
ambush. The network
has to be broken by escape routes unknown to the police. Without any
possibility of an
escape plan , the urban guerrilla should not call meetings, or do anything
else since
doing so will prevent his possibility of breaking the enemy's net that the
enemy will surely try to
throw around him.
Street tactics have revealed a new type of urban guerrilla, the urban guerrilla
who participates in mass demonstrations. This is the type that we will
designate as the
demonstrator urban guerrilla , who joins the ranks and participates in
popular marches for
specific and definitive purposes.
Page | 109

These purposes consist of throwing stones and projectiles of all kinds,


using gasoline to
start fires, using the police as targets for their firearms, capturing the
policemen's weapons, kidnapping enemy agents and provocateurs,
carefully shooting at the heads of police who come in special cars with
false plates so as not to
attract attention.
The urban guerrilla demonstrator teaches groups in mass demonstrations
the
escape routes if necessary. Lay mines, drop Molotov cocktails, set up
ambushes and
explosions.
The urban guerrilla demonstrator also has to initiate the network within the
network,
searching government vehicles, official cars, and police vehicles to see if
they
have money or weapons before turning and setting them on fire.
Snipers are very good at mass demonstrations and, together with
urban guerrilla demonstrators, can play a key role. Hidden in
strategic points , the snipers are completely successful, using shotguns,
machine guns, etc.,
whose fire and ricochet cause losses among the enemies.
Strikes and Work Interruptions
The strike is the action model used by the urban guerrilla in work centers
and
schools to harm the enemy by stopping work and study activities.
Since he is one of the most feared mistresses by the exploiters and
oppressors, the enemy uses
tremendous offensive power and incredible violence against him. The
strikers are thrown in
jail, beaten, and many are killed.
The urban guerrilla has to prepare the strike in such a way as not to leave
traces or
clues that the leaders of the action can identify. A strike is successful when
it is organized
through the action of a small group, if it is carefully prepared in secret and
by the
most clandestine methods.
Weapons, ammunition, Molotovs, homemade weapons of destruction and
attack, all this has
to be supplied in advance to anticipate the enemy. In order for you to cause
as
much damage as possible, it is a good idea to study and put a sabotage
plan into effect.
Work and study interruptions, although short-lived, cause
severe damage to the enemy. It is enough for them to emerge at different
points and in different
sections in the same areas, disrupting daily life, happening endlessly one
day after the
other, in an authentic guerrilla fashion.
In strikes or simple work interruptions, the urban guerrilla has the recourse
to
occupy or penetrate the premises or simply carry out an attack. In that case,
your objective is to take
hostages, capture prisoners or capture enemy agents and propose a
prisoner exchange (to free the strikers).
In certain cases, strikes and brief traffic interruptions can offer an
excellent opportunity for the preparation of ambushes or traps whose
purpose is the
physical liquidation of the cruel and bloodthirsty police.
The basic fact is that the enemy suffers personal and material losses and
morale damage,
and is weakened by action.
Page | 110

Desertions, Amusements, Confiscations, Expropriations of Arms,


Ammunition,
Explosions
Desertions and the diversion of weapons are actions carried out in military
camps, military
hospitals, and so on. The urban guerrilla soldier, the chief, sergeant, non-
commissioned officer, and the
officer must desert at the most opportune moment with modern weapons
and ammunition at hand
for one in the Brazilian revolution.
One of the most opportune moments is when the urban military guerrilla is
called in to
pursue and fight his guerrilla comrades outside the military barracks.
Instead of following
the orders of the officers, the urban military guerrilla must join with the
revolutionaries by
giving them the weapons and ammunition that they carry.The
advantage of this method is that the revolutionaries receive the arms and
ammunition from the
army, the navy, the air force. , the police, the civil guard, or the firefighter
without any job,
because it reaches them by means of government transport.
Other opportunities can occur in the barracks, and the urban military
guerrilla must
be alert to this. In case of carelessness on the part of the commanders or in
other
favorable conditions , as well as the bureaucratic activities and the behavior
and relaxation of discipline on the
part of the non-commissioned officers or other internal personnel, the urban
military guerrilla cannot wait any longer
but has to try to notify organizations and desert alone or accompanied, but
with
as large a quantity of weapons as possible.
With the information and participation of the urban military guerrilla, attacks
on barracks
and other military establishments for the purpose of seizing weapons can
be organized.
When there is no possibility of deserting and taking up arms, the urban
guerrilla must
enter into sabotage, starting with explosions and fires, in ammunition and
gunpowder.
This technique of deserting with weapons and ammunition, attacking and
sabotaging
military centers , is the best way to tire and demoralize soldiers, leaving
them confused.
The purpose of the urban guerrilla is to disarm the individual enemy to
capture his
weapon. These weapons are usually in the hands of the sentries and others
who are executing the
guard or repression.
The capture of weapons can be completed by violent means or by cunning
or
cheating or games. When the enemy is unarmed, he must be searched for
weapons other than those that have already been taken from him. If we are
not careful, he can use those
weapons to shoot the urban guerrillas.
The confiscation of arms is an effective method of acquiring machine guns,
the most
important weapon of the guerrilla.
We can carry out small operations to confiscate weapons or supplies from
the firing groups.
The need to provide firepower for the urban guerrilla is so great that,
in order to start from zero, we sometimes have to buy a weapon, entertain,
or capture
a single weapon. The basic point is to start, and start with great decisive
and effective spirit. The
possession of a simple weapon multiplies our forces.
Page | 111

In a bank robbery, we must be careful to confiscate the guards' weapons.


The
rest of the weapons will be found with the treasurer, the cashier, or the
administrator, they
must also be confiscated ahead of time.
The other method that we can use is the preparation of ambushes against
the
police and the cars they use to get around.
Sometimes we succeed in seizing weapons in police stations as a result of
attacks.
The expropriation of arms, ammunition, and explosives is the goal of the
urban guerrilla in
assaulting commercial houses, industries, and barracks.
Prisoner Release Prisoner
release is an armed operation designed to release
imprisoned urban guerrillas . In the daily fight against the enemy, the urban
guerrillas are subject to arrest
and can be sentenced to endless limited years in jail. This does not mean
that the
revolutionary battle stops here. For the guerrilla, his experience is deepened
by the prison and
even the dungeons where prisoners are held.
The imprisoned urban guerrilla sees the prison as a terrain that he must
master and
understand in order to free himself through a guerrilla operation. There is no
prison, not on an island, or
in a city penitentiary, or on a farm, that is impregnable by the cunning,
perseverance, and fiery potential of the revolutionaries.
The urban guerrilla who is free sees the enemy's penal establishments as
an
inevitable site of guerrilla action designed to liberate his ideological
brothers who are
imprisoned.
The guerrilla operations that can be used to free prisoners are
prisoners are as follows:
Attacks on penal establishments, on correctional colonies or islands, or on
prisoner ships or transports ;
Assaults on rural or urban prisons, detention houses, commissariats,
prisoner depots , or other permanent, occasional, or temporary places
where the
prisoners are kept.
Assaults on prisoner transport, trains and automobiles;
Prisoner attacks and penetrations;
Ambush guards who are moving prisoners.
Executions
Execution is to kill an American spy, an agent of the dictatorship, a
police torturer , or a fascist figure in the government who is involved in
crimes and
Page | 112

persecutions against patriots, or a tell-all, informant, police officer, or a


police provocateur.
Those who go to the police of their own free will to make complaints and
accusations,
who supply the police with clues and information and target the people,
must also be
executed when they are seized by the guerrillas.
The execution is a secret action in which a small number of
guerrillas are involved. In many cases, the execution can be carried out by
a sniper, patient, alone and unknown, and operating in absolute secrecy and
in cold blood.
Kidnapping
Kidnapping is capturing and holding in a secret place a police agent, an
American spy , a political personality, or a notorious and dangerous enemy
of the
revolutionary movement .
Kidnapping is used to change or free imprisoned revolutionary comrades, or
to force the suspension of torture in the prisons of a military dictatorship.
The kidnapping of personalities who are well-known artists, sports figures,
or who
are great in some field, but have no evidence of a political interest, can be
as a form of propaganda for the patriotic and revolutionary principles of the
urban guerrilla providing that occurs under special circumstances, and the
kidnapping is manipulated in
a way that the public sympathizes with and accepts.
The kidnapping of North American residents or visitors in Brazil constitutes
a form of
protest against the penetration and domination of US imperialism in
our country.
Sabotage
Sabotage is a highly destructive type of attack using only several people
and
sometimes requiring only one to complete the desired result. When the
urban guerrilla
uses sabotage, the first phase is devastating sabotage. Then comes the
dispersed or generalized sabotage phase , carried out by the people.
A well-executed sabotage plan demands study, planning, and careful
execution. A
characteristic form of sabotage is explosion using dynamite, fire, and the
raising of mines.
A little sand, a trick of any kind of fuel, or little lubrication, a short
circuit, pieces of wood or iron, can cause irreparable damage.
The objective of sabotage is to hurt, damage, render useless, and to destroy
vital points
of the enemy as well as the following:
The economy of a country;
Agricultural and industrial production;
Communication and transportation systems;
Page | 113

Police and military systems and their establishments and warehouses;


The repressive system of the military-police system;
Signatures and properties of North Americans in the country.
The urban guerrilla must endanger the country's economy, particularly its
financial and economic aspects , as well as domestic and foreign
commercial networks, its changes in
banking systems, its tax collection system, and others.
Public offices, government service centers, government warehouses, are
easy targets for sabotage.
It will not be easy to prevent the sabotage of agricultural and industrial
production by the
urban guerrillas , with their full knowledge of the situation.
Industrial workers acting as urban guerrillas are excellent for
industrial sabotage since they know, better than anyone, they understand
the industry, the factory, the machinery,
and perhaps they can destroy the entire operation, doing more harm than a
misinformed person.
Regarding the enemy's communication and transportation systems, starting
with railroad traffic, it is necessary to systematically attack him with the
weapons of sabotage.
The only precaution is against causing death or fatal injury to passengers,
especially those who regularly ride commuter or long-distance trains.
Attacks on freight trains, running or stationary, shutdown of
communications systems
and military transport, are the main targets of sabotage in this area.
Wagons can be damaged and pulled, as well as tracks. A blocked tunnel
after
an explosion, an obstruction from a derailed car, cause tremendous
damage.
The derailment of a freight train containing fuel is one of the greatest
damages that can be done to the enemy. As well as blowing up rail bridges.
In a system
where the weight and size of the rolling equipment is enormous, it takes
months for workers to
repair or rebuild the destruction or damage.
Highways can be obstructed by trees, stationary vehicles, ditches,
dynamite dislocation of barriers, and bridges blown up by explosions.
Ships can be damaged while anchored in sea or river ports or
in shipyards. Airplanes can be destroyed or sabotaged on the runway.
Telephone and telegraph lines can be systematically damaged, their towers
blown up, and their lines rendered unused.
Communications and transportation must be sabotaged quickly because
the
revolutionary war has started in Brazil and it is essential to prevent the
movement of
enemy troops and ammunition.
Page | 114

Oil pipelines, fuel plants, bomb and ammunition depots,


gunpowder warehouses and arsenals, military camps, commissariats, must
be targets of
sabotage operations par excellence, while army vehicles, trucks, and other
military and police cars they can be destroyed when found.
The military and police repression centers and their specific and specialized
organs
must also draw the attention of the urban guerrilla saboteur.
American firms and properties in the country, for their part, must be
such frequent targets of sabotage that the volume of actions directed
towards the enemy exceeds the
total of all other actions against the enemy's vital points.
Terrorism
Terrorism is an action, usually using a bomb or an explosion of fire
of great destructive power, which is capable of inflicting irreparable losses
on the enemy.
Terrorism requires that the urban guerrilla must have a theoretical and
practical wisdom
on how to make explosives.
The act of terrorism, apart from the apparent ease in which it can be carried
out,
is not different from the other acts of the urban guerrilla and actions in
which the triumph depends on the
plan and the determination of the revolutionary organization. It is an action
that the urban guerrilla
must execute with great calm, determination, and cold blood.
Although terrorism generally involves an explosion, there are cases in which
it can be
carried out by execution and the systematic burning of
North American facilities, properties, warehouses , plantations, and so on. It
is essential to point out the importance of fires and the
construction of incendiary bombs such as gasoline bombs in the technique
of
revolutionary terrorism . Another thing that is important is the material that
the urban guerrillas can persuade
people to expropriate in times of hunger and scarcity resulting from big
business interests
.
Terrorism is a weapon that the revolutionary cannot abandon.
Armed Propaganda
The coordination of the actions of the urban guerrilla, including each armed
action, is
the main way of carrying out armed propaganda.
These actions, done with certain and specific objectives, inevitably
become propaganda material for the mass communication system.
Bank robberies, ambushes, desertions, prisoner rescue, executions,
kidnappings, sabotage, terrorism, and the war of nerves are in all cases on
point.
Airplanes changed course in flight by revolutionary action, ships and trains
in
motion assaulted and trapped by guerrillas, can only be used for
propaganda purposes .
Page | 115

But the urban guerrilla must never fail to install a clandestine press and
must be
able to make mimeographed copies using alcohol or electric irons or other
duplicating devices , expropriating what it cannot, but in order to produce a
small newspaper,
pamphlets, flyers, and stamps for propaganda and agitation against the
dictatorship.
The urban guerrilla stuck in clandestine printing facilities greatly facilitates
the
incorporation of large numbers of people into the revolutionary battle,
opening a
permanent job for those who wish to work with revolutionary propaganda,
even though
doing so means working alone and risking his life as a revolutionary. .
With the existence of clandestine propaganda and agitator material, the
inventive spirit of the
urban guerrilla expands and creates catapults, artifacts, mortars, and other
instruments with
which self-government is attributed to the pamphlets.
Tape recordings, the occupation of radio stations, the use of loudspeakers,
drawings
on the wall and in other inaccessible places are other forms of propaganda.
In using them, the
urban guerrilla must give them the character of armed operations.
A consistent propaganda of letters sent to specific addresses,
armed actions of the urban guerrilla, this produces considerations to
influence certain segments of the
population.
If this influence is exercised in the hearts of the people by every possible
propaganda mechanism revolving around the activity of the urban guerrilla,
this does not indicate that
our forces have the support of all.
It is enough to win the support of the people and this can be done by
popularizing
a phrase: "Let the one who does not want to do anything for the
revolutionaries, do nothing
against it."
War of Nerves
War of nerves or psychological warfare is an aggressive technique, based
on the direct or
indirect use of the mass media and orally transmitted news for the
purpose of demoralizing the government.
In psychological warfare, the government is always at the disadvantage
because it imposes censorship
on the masses and ends up in a defensive position by leaving nothing
against leaking.
At this point he despairs, becomes involved in greater contradictions and
loss of
prestige, loses time and energy in a tiring effort to control, which is subject
to breaking at
any moment.
The object of the war of nerves is to misinform, spread lies in the
authorities, which everyone can participate, thus creating an air of
nervousness, discredit,
insecurity, and concern on the part of the government.
The best methods used by the urban guerrilla in the war of nerves are the
following:
a. using the phone and the mail to post false leads to the police and the
government,
including information on the planting of bombs and any other acts of
terrorism in offices
Page | 116

publicas and other places, kidnapping and murder plans, etc., to force the
authorities to
tire themselves out, following up on the information that is being supplied to
them;
b. allowing false plans to fall into the hands of the police to divert their
attention;
c. plant rumors to make the government nervous;
d. exploiting every possible means of corruption, errors, and failures of the
government and its
representatives, forcing them to demoralizing explanations and
justifications in
the mass media that they keep under censorship;
and. presenting complaints to foreign embassies, the United Nations, the
pope's nunciature , and international judicial commissions defending human
rights and freedom of the
press, each exposing each specific violation and use of violence by the
military dictatorship and
making it known that the war Revolutionary is going to continue its course
with serious dangers to the
enemies of the people.
How to carry out the Action
The urban guerrilla who correctly goes through his learning and training
must give great importance to his method of carrying out his action, for that
reason he should not make
the smallest mistake.
Any carelessness in the assimilation of the method and its use invites a
certain disaster, just as
experience teaches us every day.
Bandits frequently make mistakes because of their methods, and this is one
of the
reasons why the urban guerrilla must be so intensely concerned with
following the law.
revolutionary technique and not bandit technique.
There is no urban guerrilla worthy of the name that ignores the revolutionary
method of
action and fails to practice it rigorously in the planning and execution of its
activities.
The giant is known for his fingers. The same can be said of the urban
guerrilla that
is known as far as its correct methods and its absolute fidelity to the
principles.
The revolutionary method if you take action is strongly based on wisdom
and
the use of the following elements:
research information;
observation and monitoring;
reconnaissance or exploration of the terrain;
study and time of the routes;
maps;
mechanization;
Page | 117

personnel selection and replacement;


selection of the capacity of shooters;
Study and practice in complement;
Complement;
Cover;
Withdrawal;
Disperse;
Release and exchange of prisoners;
Fingerprint removal;
Rescue of the injured.
Some Observations in the Method
When there is no information, the starting point of the action plan should be
research,
observation, or follow-up. This method also works well.
In any event, including when there is information, it is essential to take
observation or
follow-up, to see if the information is the same with the observation or vice
versa.
Reconnaissance or exploration of the terrain, study and the time taken on
the routes,
are so important that if they are omitted it would be like trying to stab in the
dark.
Mechanization, in general, is a low estimated factor in the method of
conducting an action.
Mechanization is often left to last, before you do something about it.
This is a mistake. Mechanization must be considered seriously, it must be
taken with a broad view and according to a careful plan, also based on
information,
observation, or monitoring, and it must be carried out with rigorous care and
precision. The
care, conservation, maintenance, and camouflage of expropriated vehicles
are very
important details of mechanization.
When transportation fails, the main action fails with serious moral and
material consequences for urban guerrilla activity.
The selection of personnel requires great care to avoid the intervention of
personnel who
are indecisive and hesitant with the danger of contaminating the other
participants, a difficulty that must
be avoided.
Retirement is equal to or more important than the operation itself, to the
point that it must be
rigorously planned, including the possibility of failure.
Page | 118

One should avoid rescuing or exchanging prisoners with children present, or


anything that attracts the attention of people passing casual in the area.
The best thing is to make the
rescue as natural as possible, always passing around, or using different
routes or
narrow streets that hardly allow passage on foot, to avoid the meeting of
two cars. The
elimination of tracks is obligatory and demands great caution to hide traces
the
digital and other types of signs that give information to the enemy. Lack of
care in
removing tracks and tracks is a factor that increases nervousness in our
ranges that
the enemy sometimes exploits.
Wounded Rescue
The problem of wounded in urban guerrilla warfare merits special attention.
During guerrilla operations in urban areas it may happen that a comrade is
accidentally injured or shot by the police. When one of the guerrillas is in a
group of
shooters, he has the wisdom of first aid and can do something for the
wounded comrade. Under
no circumstances can the guerrilla of the urban guerrilla be abandoned and
be left at the
hands of the enemy.
One of the precautions we must take is to train men and women in
nursing courses, in which urban guerrillas can enroll and learn
first aid techniques .
The urban guerrilla doctor, medical student, nurse, pharmacist, or
simply a person trained in first aid, is a necessity in a
modern revolutionary battle .
A small first aid manual for the urban guerrilla, printed or
mimeographed, could be understood by a person who has enough wisdom.
When planning or compiling an armed action, the urban guerrilla cannot
forget the
medical logistics organization. This can be completed by means of a mobile
or
motorized clinic . You can also set up a first aid station, using the
knowledge of a guerrilla comrade who waits with his bag of equipment at a
designated site where the wounded are brought in.
The ideal would be to have a well-equipped clinic, but it is very expensive
unless we do not
use expropriated materials.
When all else fails, it is sometimes necessary to go to legal clinics, using
force if
necessary to demand the help of doctors treating the injured.
In the event that we go to blood banks to buy whole blood or plasma
, we should not use legal addresses and certainly addresses where the
injured
could be found, because we are in charge of their protection and care. Nor
should we give
addresses of those who are involved in the clandestine work of the
organization who work
in the hospitals and clinics where we take them. Those concerns are
essential to
cover any footprint or track.
The houses where the wounded are staying cannot be known to anyone
with the sole and
exclusive exception of a small group of comrades who are in charge of their
treatment and
transportation.
Page | 119

Sheets, bloody clothing, medicine, and other indications of treatment for a


comrade wounded in combat with the police must be completely eliminated
from the places
they visit for treatment.
Guerrilla Security
The urban guerrilla lives in constant danger of the possibility of being
discovered or
denounced. The security chief's problem is to make sure that we are well
hidden
and well guarded, and that there are safe methods of staying out of the
reach of the police.
The guerrilla's worst enemy and the greatest danger we run is the infiltration
of our
organization by a spy or an informant.
The spy trapped within our organization will be punished to death. The
same goes
for those who defect and report to the police.
Good security is the assurance that the enemy does not have spies or
infiltrated agents in our midst and cannot receive information from us by
distant or
indirect means. The fundamental way to make sure of this is to be strict.
Nor is it permissible for anyone to know all or all. Each person should only
know
what is related to their work. This rule is the fundamental point in the ABC's
of
urban guerrilla security .
The battle in which we are facing the enemy is arduous and difficult
because it is
a fight of the masses. Each class fights a life and death battle when the
classes are
antagonistic.
The enemy wants to annihilate us and fight to find us and destroy us, so our
great weapon consists of hiding from him and attacking him by surprise.
The danger of the urban guerrillas that he can reveal through recklessness
or through
the lack of a vigilante class. The urban guerrillas are not allowed to give
their own or another
clandestine direction to the enemy or to talk a lot. Annotations in the margin
of newspapers,
lost documents, calling cards, letters or notes, these are all fingerprints for
the police.
Addresses and phone books must be destroyed and one must not write or
keep
papers; it is necessary to avoid keeping files of legal or illegal names,
biographical information , maps, and plans. Contact points should not be
written down but memorized.
The urban guerrilla who violates these rules must be warned by the first to
be
aware of it , and if he persecutes, they must stop working with him.
The need for the urban guerrilla to move constantly and in relative proximity
to
the police, given the circumstances of a strategic police network that is
around the
city, forces that adopt variable security methods depending on the
enemy's movements .
For this reason it is necessary to maintain a daily news service about what
the
enemy appears to be doing, where the police network is operating, and
where
strangulation sites they monitor. The daily reading of the police news in the
newspapers is a great
foundation of information in such cases.
Page | 120

The most important lesson of struggle, under no circumstances, allow the


slightest
hint of relaxation with the maintenance of security measures and
regulations within the
organization.
The security of the guerrillas must be maintained also and mainly in cases
of
arrest. The arrested guerrilla cannot reveal anything to the police that could
harm the
organization. He cannot say anything that will give him clues, as a
consequence, to the arrests of other
comrades, the discovery of addresses and hiding places, the loss of
weapons and
ammunition.
The Seven Sins of the Urban Guerrilla
Just as the urban guerrilla applies its revolutionary techniques with rigor
and precision and
obeys the security rules, he is still vulnerable to mistakes. There is no
perfect urban guerrilla . The most you can do is keep trying to decrease your
margin for
error because it is not perfect.
One of the methods that we can use to reduce the margin of error is to
know the
seven sins of the urban guerrilla and try to avoid them.
The first sin of the urban guerrilla is lack of experience. The urban guerrilla,
blind
by his sin, thinks that the enemy is stupid, does not consider his intelligence,
believing that everything
is easy and, as a result, leaves traces that can cause his disaster.
Due to their little experience, the urban guerrilla can overestimate the
enemy's forces,
believing that he is stronger than them. Allowing themselves to be mocked
by their presumption, the urban guerrillas are
then intimidated, left insecure and indecisive, paralyzed and lacking in
audacity.
The second sin of the urban guerrilla is to praise themselves for their
actions that they have completed
and tell them to the four winds.
The third sin of the urban guerrilla is vanity. The urban guerrilla that suffers
from this
sin tries to solve their problems of the revolution with actions starting in the
city, but
without worrying about the principles and survival of the guerrilla in rural
areas.
Blinded by his triumph, he begins by organizing and putting all the forces
and resources
of the organization into play. Since the police that we cannot evade or break
while the war
has not yet started and is not at the point of triumph, we always make the
fatal mistake of
allowing the enemy to attack us with decisive blows.
The fourth sin of the urban guerrilla is to exaggerate their strength and try to
carry out
projects that lack strength and, still, do not have the required infrastructure.
The fifth sin of the urban guerrilla is hasty action. The urban guerrilla who
commits this sin loses patience, suffers a nervous breakdown, does not
wait for anything, and
impetuously jumps into action, suffering setbacks that need not be
mentioned.
The sixth sin of the urban guerrilla is to attack the enemy when he is most
angry.
The seventh sin of the urban guerrilla is not planning things, and acting
improvised.
Page | 121

Popular Support
One of the main problems of the guerrilla is his identification with
popular causes in order to win popular support.
When government actions become corrupt and inept, the urban guerrilla
should not hesitate to show that he opposes the government and wins the
sympathy of the masses.
The present government, for example, imposes heavy financial
responsibilities on the population
in the form of taxes. It is then the responsibility of the urban guerrilla to
attack the
tax payment system and to obstruct his financial activity, pulling all the
weight of the
revolutionary activity against it.
The urban guerrilla fights not only to upset the
tax collection system ; the arm of revolutionary violence also has to be
directed against the
government bodies that raise prices and those who direct them, as well as
against
the richest of national and foreign capitalists and the owners of
important properties ; in short, all those who accumulate excessive fortunes
out of the high cost of
excessive debits, prices and rents.
Foreign monopolies, such as refrigeration and other North American plants
that
monopolize the market and the manufacture of general food supplies, have
to be
systematically attacked by the urban guerrilla.
The rebellion of the urban guerrilla and his persistence in the intervention of
public questions is the best way to ensure popular support for the cause we
defend. We repeat
and insist on repeating: it is the best way to ensure popular support. As
soon as a
reasonable section of the population begins to take the action of the urban
guerrilla seriously, their
success is guaranteed.
The government has no alternative except to identify the repression. The
police network , the house searches, the arrest of innocent people and
suspects, the closing of the
streets, and making the city unbearable. The military dictatorship embarks
on political persecution. The
political assassinations and police terror become routine.
Despite all this, the police consistently lose. The armed forces, navy, and
air force are mobilized to carry out routine policing functions. Yet they do
not
find a way to stop guerrilla operations, nor to end the
revolutionary organization with its fragmented groups that move and
operate through the
national territory contagiously and persistently.
People refuse to collaborate with the authorities, and the general feeling is
that
the government is unfair, incapable of solving problems, and resorts only to
the liquidation of its
opponents.
The political situation in the country is transformed into a military situation
in which the
military appears to be more and more responsible for mistakes and
violence, while the
problems in people's lives become truly catastrophic.
When they see that the militarists and the dictatorship are on the verge of
the abyss, and fearing the
consequences of the revolutionary war that is already there, which are
always found within
the ruling classes, and the opportunists of the right wing, friends of the
struggle without violence , se
Page | 122

unite and begin to circulate rumors behind "the curtains", asking the
executioner for elections,
"redemocratization", constitutional reforms, and other
Simplicities designed to confuse the masses and make them stop the
revolutionary rebellion
in the cities and rural areas of the country.
But, observing the revolutionaries, people now understand that it would be a
sham to
vote in elections whose sole objective is to guarantee the continuation of
the
military dictatorship and to cover the crimes of the state.
By fully attacking this false election and the so-called "political solution" so
appealing to opportunists, the urban guerrilla has to become more
aggressive and violent,
turning towards sabotage, terrorism, expropriations, assaults, kidnappings,
executions, etc.
This would answer any attempt to deceive the masses with the opening of a
Congress
and the reorganization of the political parties - government parties and
those of the opposition that it
allows - when all the time the parliament and the so-called political parties
function thanks
to a license of the military dictatorship in a real show of puppets and dogs
on a
string.
The role of the urban guerrilla, in order to win the support of the people, is to
continue fighting, keeping in mind the interests of the masses and the
worsening of a
disastrous situation in which the government has to act. These are the
circumstances,
disastrous for the dictatorship, that will allow the revolutionaries to open the
rural guerrilla war in the middle of an uncontrollable expansion of the urban
rebellion.
The urban guerrilla is involved in revolutionary action in favor of the people
and seeks
in it the participation of the masses in a struggle against the military
dictatorship and for the
liberation of the country from the yoke of the United States. Starting with
the city and with the support of the
people, the rural guerrilla war unfolds rapidly, establishing its infrastructure
carefully while the urban area continues its rebellion.
Urban Guerrilla Warfare, School to Select the Guerrilla
The revolution is a social phenomenon that depends on men, weapons, and
resources. Arms and resources exist in the country and can be taken and
used, but to
do this it is necessary to count on men. Without them, weapons and
resources have neither use
nor value.
For their part, men must have two basic and indispensable qualities:
a. they have to have a political-revolutionary motivation;
b. they have to have the necessary technical-revolutionary preparation.
Men with the political-revolutionary preparation are among the
vast and conscientious contingents of the enemies of the military
dictatorship and the domination
of US imperialism.
Page | 123

Almost daily such men gravitate towards urban guerrilla warfare, and it is
for this
reason that as soon as the opposition announces that it has already beaten
the revolution that it has to
see it rise again from its own ashes.
The men who are best trained, most experienced, and dedicated to
urban guerrilla warfare, constitute the basis for the revolutionary war, and
therefore, of the
Brazilian revolution. It is from this base that the nucleus of the revolutionary
army of
national liberation arises , rising from the revolutionary war.
This is the central core, not of bureaucrats and opportunists hidden in the
organizational structure , not of empty lecturers, of resolution writers who
remain on
paper, but of men who fight. Men who from the beginning have been
determined and ready for anything, who personally participate in
revolutionary actions, who have no doubts or deceit.
This is the indoctrinated and disciplined nucleus with a long-range strategy
and a
tactical vision consistent with the application of Marxist theory, of the
developments of Leninism and
Castro-Guevaristas, applied to the specific conditions of the revolutionary
situation. This is
the nucleus that will lead the rebellion to the guerrilla war phase.
From it, men and women with political-military development will emerge,
one and indivisible,
whose work will be that of future leaders after the triumph of the revolution,
in the construction
of a new Brazilian society.
From now on, the men and women chosen for urban guerrilla warfare are
workers; peasants whom the city has attracted for their work potential and
who
returned to a completely indoctrinated and technically prepared rural area;
students,
intellectuals, and priests. This is the material with which we are building -
starting the
guerrilla war - the armed alliance of workers and peasants, with students,
intellectuals and priests.
The workers have infinite knowledge of the industrial sphere and are the
best in
urban revolutionary jobs. The urban guerrilla worker participates in the
struggle by
building weapons, sabotaging and preparing saboteurs and dynamiters, and
personally
participating in actions involving handguns, or organizing strikes and partial
paralysis
with the characteristic mass violence in factories, work centers, and other
workplaces.
The peasants have an extraordinary intuition of knowledge of the land,
judgment in the
confrontation of the enemy, and the indispensable ability to communicate
with the humble masses. The
peasant guerrilla is already participating in our struggle and he is the one
who reaches the nucleus of the
guerrilla, establishes support points in rural areas, finds places to hide
individuals, weapons, ammunition, supplies, organizes the planting or
harvesting of grains used in
guerrilla warfare, chooses transportation points, cattle-raising points, and
meat supply sources , trains guides who show the urban guerrilla the roads,
and creates
an information system in rural areas.
Students are noted for being politically crude and rude and therefore break
all the rules. When they are integrated into urban guerrilla warfare, as is
happening
now on a large scale, they teach a special talent for revolutionary violence
and soon
acquire a high level of political-technical-military prowess. The students
have a lot of
free time on their hands because they are systematically separated,
suspended and thrown out of school
by the dictatorship and thus begin their time advantageously in favor of the
revolution.
Page | 124

Intellectuals constitute the vanguard of the resistance to arbitrary acts,


social injustices, and the terrible inhumanity of the guerrilla dictatorship.
They spread the
revolutionary call and have a great influence on the population. The
intellectual urban guerrilla
is the most modern adherent of the Brazilian revolution.
The men of the church, that is, those ministers or priests of various
hierarchies and
denominations, represent a sector that has a special ability to communicate
with the
people, particularly workers, peasants, and Brazilian women. The priest who
is an
urban guerrilla is a powerful ingredient in the Brazilian revolutionary war, and
constitutes
a powerful weapon against the military power and North American
imperialism.
With regard to Brazilian women, their participation in the revolutionary war,
in
particular the urban guerrilla war, has been distinguished by their fighting
spirit and limitless tenacity
, it is not only by luck that so many women have been accused of
participation in the
actions of guerrillas against banks, military centers, etc., and that so many
are in prison
while so many others are still wanted by the police. As a school for
choosing the
guerrilla, urban guerrilla warfare prepares and places at the same level of
responsibility and
efficiency men and women who share the same dangers of fighting,
foraging for supplies,
serving as messengers or runners, or drivers, or navigators, or airplane
pilots, obtaining
secret information, and assisting with propaganda or doctrinal work.
Carlos Marighella
June 1969
Page | 125

Evasion and Escape

Page | 126

EVASION AND ESCAPE

Author: Lt. LEONARDO DE BENEDICTIS - RI M 10

A combatant is making the necessary preparations for his next


operation when he is suddenly surprised by an enemy patrol. In those
moments he realizes
that things did not happen as he had planned.
In a very short time he realizes that he is a prisoner of war; And endless
concerns begin to invade your mind.
This situation that we have just seen is a real fact in combat operations.
And you could go through this situation when you least expect it.
That is why you must be ready to execute the evasion and escape
techniques that
we will discuss below .
1. Evasion:
a. Situations in which you may have to escape:
After escaping from a camp or prisoner gathering place.
After escaping from a surrounded position.
Lose contact and be in enemy territory.
After executing an infiltration into enemy territory.
After being overwhelmed by the enemy, being isolated in the field of
combat.
b. Basis for survival during evasion:
A soldier in an evasion situation will know that he will have to walk perhaps
hundreds of
kilometers over a period of months and this can be daunting.
The prospect of having to survive alone in a strange environment for so long
can make death seem like an easier option.
The determination to survive must be maintained by willpower and serenity,
many
obstacles must be faced and these can be more psychic than physical.
Page | 127

Their conduct must be based on the following:


- Sense of responsibility: Being loyal to their Unit, the Institution and their
Homeland.
- Think of your family and your sentimental ties, people for whom it is worth
not
abandoning your fight.
- Self-control: Do not panic.
- Prepare a plan with all the resources available.
- Strength: Pain, discomfort and other unfavorable conditions should be
assumed
as normal.
- Knowledge of escape and survival techniques.
c. Equipment for evasion:
Generally when carrying out an evasion you can have enough equipment or
not (in case
it has been captured and escaped), what you can never lack is the ingenuity
to use the
available resources.
Obviously the most difficult case will be when he is recaptured, since it is
most
likely that his weapons and equipment have been taken from him, after
being searched and
they have removed everything he had in his pockets.
It is obvious that if he is taken prisoner, the men who register him will be
interested above all
in his most relevant objects, such as the notebook with the notes, the maps,
and weapons that he
may use against him. They may not even think about searching your entire
body for small objects
that you can carefully hide.
The most suitable places to hide small things that serve for
survival and evasion, are not as some think of the strap or the backpack.
Quite the contrary, it is more convenient to hide them in shirts, T-shirts and
pants (inside the hems).
These objects can be the following:
- A wire saw.
- A button-type compass.
- Fishing tools.
- Needle and thread.
- Condoms
- Escarpment leaves.
Page | 128

- A map.
- Lockpicks.
Note: A prior preparation of both the clothing and the equipment to be
hidden must be carried out,
since this can cause some damage such as hooks or be damaged as is the
case with condoms.
You should take into account the power to use everything you have
managed to
hide in evasion .
You can also carry other not-so-essential gear in your backpack and leash.
The
selection of this equipment will depend on the environment in which it
moves. Always when preparing the
equipment choose things that you can use for more than one purpose.
For example:
- First aid items.
- Signaling instruments.
- Water and means of purification.
- Elements to light the fire.
- Food and how much helps you get it.
- Equipment to prepare shelters.
- Weapons.
Combat boots are another very useful place to hide some very small and
very short things, (since they could be damaged when flexing the foot). If
you wear
thick cushioning insoles , you should monitor their condition regularly and
monitor wear on the
insoles.
d. Types of evasion: For a better analysis we could establish the following
classification:
1) Based on time, it can be:
a) Short-term evasion:
This can occur at different times, such as: they can be
recently captured prisoners who have just escaped They can be shooters
who were isolated within
enemy lines and lost contact with their fraction or who are survivors of an
enemy attack that killed their entire fraction.
In short-term escape, escapees may be armed and carry equipment to
assist them , but they act out of improvisation and lack an escape plan.
b) Long-term evasion:
Page | 129

This can occur when one is a prisoner of war who has escaped from a
prison camp in enemy territory or has become isolated while conducting an
operation
deep within the enemy device.
In this area, the escapees often find themselves hundreds of kilometers
from the lines of their
own troops. However, they do have time to plan and prepare clothes and
equipment that will help them,
as well as the way in which they will carry out the escape.
2) Based on cooperation, it can be:
a) Assisted:
When one maneuvers through an evasion and escape corridor where he has
help from
TOE or unconventional troops (guerrilla / special operations forces).
At the same time, it is also likely that there has been a previous territorial
preparation where
supplies can be found to facilitate evasion.
Aspect to take into account to carry out an assisted escape:
- Time of entry and time of departure to the contact point.
b) Unassisted:
This type of evasion is the most difficult to achieve and can only be
implemented in the
early stages of capture.
3) By the area in which it takes place:
a) Urban
evasion : (1) Urban evasion will vary according to different factors:
(a) The climate: Since, for example, in cold climates, people do not walk
through streets. If you do not get in contact with someone or find a place to
stay, you will be cold and this will
most likely affect your health.
In addition, he must be made of more clothes than normal to go unnoticed.
(b) Level of wealth: This will give you a guideline of what role to adopt to go
unnoticed.
(c) Level of development: In more developed urban areas, their presence will
go
unnoticed and will have places where they can escape.
(d) Society: This can cause problems in the role that you play due to the
characteristics of the
inhabitants of the place, as well as their customs.
(e) Language: This can facilitate or limit it in your movements. You should
avoid
communicating if you are not very fluent in the local language.
Page | 130

(2) Figures that you can adopt:


You can generally adopt two figures: The respectable citizen or the
marginalized,
obviously both have their advantages and disadvantages:
(a) The figure of the respectable citizen will force you to:
 Stay in good condition grooming, this will include shaving and
polishing.
You must have a good command of the local language.
 He will get tired of keeping moving on the street.
 You must get documents, money and permits.
You should also move during the day as respectable people do not
wander the streets
at night.
(b) The figure of the marginalized in turn can give him problems with the
rest of the
marginalized, who in many cities form a separate underworld where their
presence will not
go unnoticed.
Among such beings there will be informants and drug addicts, people who
have
too frequent a relationship with the security forces and the police.
If it can degenerate to a very low level it will hardly be suspected,
but this life can bring you health problems.
Finding food is easy in a developed society as long as you are willing to
rummage through the garbage cans at food places.
Abandoned houses can be a good place to rest, but be careful,
vagrancy is not socially accepted as a way of life. Civilians can expose him,
abandoned houses are regularly patrolled by the security forces.
(3) The movements should be carried out at night and during the day you
should rest adopting the
typical behavior of the homeless man who goes out to check the garbage
just when it is getting dark:
(a) Daytime urban movement:
- Be relaxed and look as if you know where you are directs.
- Get normal clothes and try to assume an unambiguous identity.
- Stay clean.
- Do not go near the stations or bus terminals.
- Avoid children and dogs.
Page | 131

(b) Night urban movement:


- Learn the streets (route to follow).
- Unless you have the indicated clothing, with the corresponding
documentation and speak
the language well, avoid places where there may be checkpoints.
- Move like you have a purpose.
- You can pretend to be drunk or crazy.
b) Evasion in the field:
For your pursuers it may or may not be very difficult to find you, everything
will depend
on your preventive measures to make a good escape.
To carry out this type of evasion, the following factors must be taken into
account:
- Particular geographical environment
- Climate
- Water courses
- Villages
- Enemy troops.
The enemy will try to cut off the path of withdrawal towards his forces or
towards a
passable border or the coast. It will also cover all easy routes such as roads
and
waterways.
and. General aspects to take into account to make a good escape:
1) Avoid contact with Civilians: It is advisable not to go to civilians, since it
is most likely
that if you are in enemy territory they will end up giving you away in
exchange for obtaining some benefit.
Besides, your way of life can be totally strange to you. A gesture that in your
country may be
welcoming, in other lands, may mean the opposite.
2) Contact local resistance groups: If you are lucky enough to contact a
local resistance group, let them help you, always maintaining the
necessary degree of caution . But remember, they do not have the benefits
of the Geneva Conventions
(Statute for the Prisoner of War). Don't bond too much with the people who
help you. If you are traveling with a member of the local resistance, do not
sit or sleep with them.
Establish a code of signals by which they can be understood without the
need to speak.
You must be prepared to go solo at any time.
Do not carry anything that could give away those who helped you.
Page | 132

3) Avoid losing the identification: Since this can be used to search for it in
case
the enemy finds it.
4) Know the ground-air communication signals: You may have the need to
use it
to perform an extraction by air.
5) Avoid cities, towns and crowded places: In these there is more possibility
of
enemy presence.
6) Avoid children: Since these are more spontaneous, and it would not be
strange that when they see
something peculiar they shout and point at it.
7) Avoid traveling on roads: Since these are very likely to have a lot
of enemy traffic.
8) Try to stay abreast of events: You may be hiding for
nothing.
9) Do not cross bridges: Since they are likely to be under strict control of the
enemy domain , with security posts.
2. Escape:
In the event that you are taken prisoner by the enemy, you must remember
your duty to try
to rejoin their forces.
The only data you can mention are:
- NI.
- Name and surname.
- Degree.
Remember that the most favorable opportunities will arise during the early
stages of your
capture.
Then physical wear and tear and increased security measures will hinder
their mission.
to. In his place of detention, he must take into account the following
aspects:
1) Do not give information about his own troops.
2) Find out the identities and / or training of the other POWs.
3) Know the moral state of the troop.
4) Know the enemy's activities, security system, number of interrogations,
security personnel replacements.
Page | 133

5) Characteristics and training of enemy personnel who provide security to


the field.
6) Number of successful and unsuccessful escape attempts.
7) Means available to the enemy: Transport (air, land and amphibians),
communications, night vision, etc.
8) Vulnerable sectors of the security perimeter.
9) Alarm systems.
10) Location of the Reten or Reserve Group, considering its reaction time.
b. The sequence of activities may be the following:
1) Information meeting.
2) Developing an escape and distraction plan.
3) Preparation and enlistment of means, personnel and escape routes to be
used.
4) Implementation of the distraction plan.
5) Execution of the escape operation.
6) Evasion into one's own territory.
3. Final conclusions:
It is important to carry out evasion and escape instructions. This will allow a
better
performance in case the war plays a trick on us.
The two-game exercises are an especially useful tool, since with scarce
resources they achieve great motivation. These exercises also make it
possible to cover aspects that are not
always included in the training plans: The organization of the prisoner of
war system of the Unit and the circuit they must follow.
This will undoubtedly help us to become aware of the importance of
permanent preparation for combat.
We must bear in mind that the training must be comprehensive, since an
indomitable spirit and its iron will will be the fundamental tool for the
achievement of a
successful escape and escape.

Page | 134

Monitoring techniques I
Page | 135

© L. Domelhajer. All rigts reserved. All rights reserved.


This work enjoys a Creative Commons license: copying and distribution is
allowed as
long as the source of origin and its author are cited. However, it is expressly
Page | 136

the sale of part or all of this material is prohibited, as well as its use for
purposes other
than those exclusively educational.

Tracking techniques are commonly used all over the world for the most
diverse purposes: from following any person to the pursuit of criminals
or kidnappers to find out where the person is being kidnapped or where they
keep
their weapons.
Many of these techniques are developed and kept in the deepest secrecy by
security agencies, and have remained until today in the most absolute
secrecy,
only in the hands of espionage professionals and terrorist groups.
With this first approach to this text (which is an extract from a more
developed book)
I want to bring these techniques to the general public, so that, knowing
them, they can
defend themselves and, knowing how they can be followed, they can avoid it
and feel that way more insurance.
It is from this point of view that I distribute to the public and put this first
copy in your hands .

Preamble

Page | 137

There are many techniques to follow a subject, each with its own
particularity
and definition.

To classify them, we can group them into the different means they use,
based on
them there are infinity, but we can say the main ones on land, in which the
subject or cause of
persecution moves:
· On foot
· By car.

There is also water pursuit, radar tracking and various technologies ...
electronics and modern espionage have a very extensive range of elements
for all
fields and for all tastes.

But leaving aside all that paraphernalia, we are going to analyze a type of
monitoring that
can be done anywhere and without the need for great gadgets. We mean
the
chase on foot.
This will be the subject of the current study.
Note: It is clear that both the techniques and
various elements related in this text are merely
informative and indicative. The author leaves
the use that such knowledge can be made to his entire responsibility , and
declines any
fact that may arise in the exercise of said knowledge . The
present study should be taken:
- As an essay of techniques.
- As a text only and exclusively informative, not
being its task to train or train anyone.
This study is 100% original, books on this
subject are not sold to people on the street ...

At present, persecution on foot is not taken into account and


ordinary people generally ignore it They even ignore that there are specific
techniques for it; the
movies, for example, give us other more spectacular track, which is that of
the car. And
modern techniques allow certain devices to be able to detect certain
people in a much easier way. But what would happen if
many of these devices were not available, for one reason or another -
accident, breakdown ...? or who knows, at any given moment,
the techniques necessary to follow a person without being discovered? That
is what it is intended to
study.

Of course, the knowledge related here must be used with sufficient


common sense , and without violating the freedom of any person. A misuse
of these simple rules can
lead to serious problems, and, furthermore, only in certain circumstances
should it be appropriate to pursue
a person: bear in mind that if we are discovered, putting ourselves in an
extreme case,
following a criminal, we may be in danger of death . For this reason, these
techniques should not be
taken as a simple game, since they are professional tools, not for novices.

Warned of this, let's get into the matter:

Diversity for the same purpose


Page | 138

In the follow-up of a person, people, etc. (subject, we will call from now on)
there
can be many cases and variants, among the most important we have:
-Know the area. A lack of knowledge of it is, depending on the situations, an
added difficulty , since it forces us to shorten the distance, to continue with
more fixation on the subject and where it
travels, perhaps, even, we lose ourselves.
-Being known: If knowing the area is a plus, being known in it (for example:
living
in the neighborhood) can be against us. Whoever calls us, entertains us with
greetings, etc.

Also, if they discover us, the subject could ask for "who was following him",
and
then we would be lost.

These points may seem very superficial to the common mortal, and besides,
experts will never allow themselves to be discovered in such a childish way,
but they should not be
underestimated for that. On many, many occasions what seems most
obvious to us is what leads us to
defeat. Let's keep in mind that we are tracking (or, perhaps, they are
following us). Someone may have hired a professional to monitor us
(our wife, our employee ...). At other times, we are the ones who are
forced to pursue.

Many accidents (especially escort) would have been avoided if


professionals
knew these techniques well.

Now let's get into a nuclear issue for follow-up, which is speed. When
we follow a subject, the rhythm of our steps should almost always go to the
beat of him, during the
time when the street is longest. The same steps, the same speed, yes, but
at what
distance?

A difficult question to answer, and the answer to which experience will give
us. In any
case, the distance is not marked to pleasure, it depends on many factors:
knowledge or not of the
area, how populated or not it is; the type of street or sidewalk, the type of
persecution used, the
rectitude or not of the street ... For all this, and perhaps more, an adequate
and
generic answer cannot be given . The ten, fifteen or twenty meters are never
constant, and also, of course, always
correct.

In the next few lines we will try to clarify the point of speed and the distance
factor more,
but as a general rule we point out that: the distance will be greater the less
the subject "runs", and
less when the steps are more accelerated. But of course: not so far that we
hardly see it and the
first corner is lost, not so close that just by turning the head it discovers our
presence.

Another very important point within a follow-up on foot is its type, which can
be, in general terms, three:
-Linear
pursuit
-Panoramic pursuit -Supra-panoramic pursuit

Perhaps we, anyone, have followed another on the street, for fun or to see
"where it goes". Almost certainly the persecution that we will have adopted
would be the linear one. In reality,
in a serious follow-up, all three are usually carried out, depending on the
route and, above all, the
first two .

Depending on the distance and the chase time, we could say that a
two-hour walking track has 60% linear chase, 30% panoramic and around
10% supra
panoramic. By cons, a short space follow-up (about ten minutes) would
have with it a
Page | 139

100% of the technique or type adopted at the beginning of it, perhaps 5% of


the pursuit of another
style.

Or, in other words: we see the subject in question and we follow him in
linear pursuit , once in it, perhaps because of the loneliness of the street, or
because the extension allows us,
we adopt p. panorama. As the time that we follow him grows, the type of
persecution will change.

Before going on to analyze each persecution individually, we must bear in


mind that
the rules must not always be strictly adhered to, because the more alert the
subject is,
we may have to adopt different techniques that, otherwise, would not be
adopted.

This also works if, for example, we are following an expert person, or
someone who
runs ...
Concept breakdown

Page | 140

Linear Pursuit

It is also known as "sidewalk pursuit", as it is usually carried out on the


same line
as the subject, behind him, of course. This technique is usually used for
subjects who
do not know us, or who do not want them, under any circumstances, to lose.
It has the disadvantage
that we can be discovered more quickly than with the other two, but if the
pursuer
mixes with people on the same street, or in lonely streets, it does not arouse
the attention of the other (for
example, blowing his shoes) or it is changed from time to time to another
type of technique, it is usually a
fairly safe system.

As already mentioned, on p. linearly, we will keep our distance from the


subject, and we take the
rhythm of our steps to his. This should not be done for a long time, if we do
not want
people who look at us from afar (at windows, or policemen watching, etc.)
to realize that
we are following "that" subject. The rhythm of our steps grows when the
subject approaches the
sharp corners of the buildings, and our gaze, in no case, should seem
attentive to the subject.
You can also resort to small tricks, such as changing the sidewalk to look at
shop windows
when the streets are wide and straight and allow it, in this way, we will not
only
ensure more our discretion, but we will mislead possible third parties who
are
attentive to us.

In the P. linear, and in general in all, the view, as has been said, does not stay
on the
subject, as many people mistakenly believe. This would cause that, when
we ended up in an avenue
full of people, we would attract a lot of attention. It would not be the first
time that someone has
approached us, after spending a while following a subject with an attentive
gaze on him, saying
something like "why are you following that one?" aloud. In addition, if we
keep our eyes on the
subject all the time , we will not have enough agility to see if someone is
following us at the same time.

Keeping the distance, the view moves, from time to time, to the shop
windows and the entire
length of the street. That is to say: the closest thing to walking normally.
Any
anything out of normal draw attention. And we must not allow that.

Page | 141

Although we should not look from one side to the other all the time,
because that would betray
nervousness.

We must maintain a cursory vigilance on: if someone follows us, the next
streets
that come (especially if we do not know the area), traffic for possible
crossings and
traffic light positions , and, by the looks of the people, if they have already
found out what we are doing ... that will
give us an idea of ​​how terrible we are doing the follow-up.

And from time to time, backwards in case someone follows us, resorting, as
is already known,
whenever we can to shop windows, car windows and portals, etc.

Well, we are chasing the subject, maintaining the right distance and the
rhythm of his
steps, we do not look at him so intently that no one notices or so "from time
to
time" as to lose him or for pedestrians to discover that we are very
"weirdos". Now
a corner arrives, we know the city and we know that there is only one street
behind it, so we
accelerate our pace and count five at the approximate rate of its steps
[Actually this is a
methodical rule, the time to wait depends on many factors and of the
subject, but we must allow
a reasonable time for the space, since we cannot meet the subject just
around
the corner]. When we turn the corner, if we see the subject we return to the
normal distance.
But we do not know the city, behind that corner there may be a network of
streets ... what do
we do then? The same as before:

The corner must be anticipated in advance, looking at what comes to us so


as not to have to
run around to get behind the subject to the corner, which could give us
away.

Now we have faced the corner, the subject continues on his way, we follow
him with
the pursuit that we deem correct:

But ... What if the subject does not appear?


Page | 142

1: We look, at a quick glance, at all the shop windows, shops and portals,
turning our
heads (we are supposed to know the subject's clothing well enough to see it
behind them,
right?):
2- In the shop windows that Let's not reach with our eyes, we will go through
them moving
circularly to the network of streets, also looking at the sidewalks of them,
starting with the
closest to the furthest:

Then, it may be the case that the subject is in a store, or behind Some
vehicle, or that, due to traffic, has had to run to cross and get a few
steps away from us , being on a street far from our sight. Point 2 must have
been enough
to get him back on track.
Otherwise, we will be able to retrace our own steps and resume the search
in the
shop windows and intersections, perhaps a store or bar has a lot of people
and takes our vision away. Or he
has entered a portal and climbed the stairs. We can wait for them to turn on
a light.
We can also walk through the adjacent streets, it is not the first time that a
subject has
discovered our presence and is in a portal of another nearby street, waiting.
In short:
speed in these first moments is important. If, despite this, we cannot find it,
we will
do everything again slowly. At this point our presence may begin to arouse
curiosity, so we should consider the possibility of monitoring from a nearby
site and
covering the area or the exit of people, such as a park, a bar or our parked
car.

At this point, if the above fails, we will consider the possibility of having
definitely lost him, since he may have entered a building near another
corner, or that he
lives in a truly difficult area. Hence, in subsequent follow-ups of the subject,
Page | 143

let us take into account the possibility of having lost him definitively, since
he may have entered
a building near another corner, or that he lives in a truly difficult area. Hence,
in subsequent follow-ups of the subject, we take into account the possibility
of using
another technique, such as p. supra panoramic, which will give us a follow-
up "
ahead" and with much more field of vision:

We must take into consideration in this type of actions the direction of


traffic, since, if
the subject is about to cross and traffic comes " towards "us, the danger of
him seeing us is
much less than if the traffic comes" from "us, since he will look towards us
to see
the cars approaching, and we can give ourselves away. Hence, the site we
choose for p.
panoramic is crucial.

There are many remedies, and this rule is well known to all. Among the
basic actions regarding traffic we can choose to:
-Change to another sidewalk where the traffic comes towards us.
-Change to the other side, where traffic and people would make it difficult
for the subject to see us (
especially if he
does not know us), but we would see him.

In this regard, the difficulties that would entail


regaining the linear tracking speed, etc. , should also be considered in all
cases , so that then it would go from p.
panoramic to linear, which would be the most convenient.

P. Linear is also suitable for streets where traffic is not high, because even if
there are a
lot of people, we will always stay behind the subject. If the street, on the
other hand, is
narrow and with almost no pedestrians, then we will have to move the
following distance very far,
which would lead us to adopt p. panorama.

Rain, hail, wind, works in the streets ... facilitate p. linear, on the contrary, the
sun (which can make us cast long shadows forward and give us away),
loneliness, the
night ... make it difficult.

It should also be clarified that monitoring with different means, for example,
car following
someone on foot, may be a good thing in rural areas and where the subject
can be followed
from a high and relatively close place, covering large areas of free space
without drawing
too much attention, but in the city something like this is useless, since we
will only reach a few meters
before it discovers us, even with binoculars or other methods (except radio
or
micro transmitters, of course).

Page | 144

Another technique used by espionage agencies and specialists is to use


several
individuals, changing between all of them p. linear, thereby increasing the
chances of
success, since one person may doubt that another will follow him, but
doubting that four,
five or even more individuals follow him is rarely believed, since he tends to
think that it is "
his paranoia ".

In this aspect, if we locate someone from a car, the best thing would be to
get off and take a
walkyetalky with hands-free equipment while someone else drives the car, in
order to inform them of
where we are from time to time and, if the subject takes in turn a vehicle,
make ours come
to follow him.

Let's take a break here to dedicate ourselves a little more to a facet that is
common to any type of follow-up: rhythm.

The Rhythm

It has already been said that we must harmonize our steps with those of the
subject to follow, except
in certain circumstances and incidents it must be varied, but even this is not
a
fixed rule , especially taking into account the steps of the people to follow.

The above is effective for normal walking, but what happens when the
person is
older, elderly or walks very slowly? Wouldn't it give away, if we mold our
steps to
his, our presence? And what would happen if the other person's walking is
very great,
that is , with great speed? Those are the two extremes we can run into.

For someone who wants to know if they are being persecuted, it is best to
adopt the fast pace: it gives away
the persecution better. But aside advice, let's analyze each one:

-Slowness: Given the slowness we have already said that one should move
away, because in a few
strides, if necessary, we can cut the distance in a relatively short time.
Another technique, which should blend very well with the previous one -that
is why the qualities of each
one- is to stop looking at shop windows, landscapes, looking at the clock,
talking on the mobile,
writing text messages, tying the shoe, buying the newspaper ... there are
multitude of
resources to leave us behind and continue with what we have to pretend: a
quiet and relaxed
walk. Under no circumstances, and especially if the subject is old, should
we approach at a
normal distance and maintain the rhythm, even at the cost of losing it, if we
do not want to
discover ourselves and, at the same time, discover ourselves in front of
passers-by: imagine someone young , with the
same step and at a short distance, on p. linear, behind an old man ... it
would be quite noticeable,
right? Before we do that, let's move on to p. panoramic or even supra
panoramic, which, at
slow speed, and especially if the area is known, gives excellent results.
In any case, slow tracking tends to attract attention and is somewhat
complicated ... I remember
that I lost a subject precisely because I was walking very slowly and, at the
same time, stopped,
looked ... this made me take a lot of distance, excessive, which I couldn't
recover afterwards.
For this reason, I advise that whenever possible, follow the subject with p.
linear, because it tends to
stop, look ... and it is better to hide taking advantage of the circumstances
of the moment and
exchange it, when curves or loose distances arrive, with p. panorama.
Finally, it should be noted that the distance that this "slow" walking forces
us to can make us lose the subject if we do not follow him more
conscientiously than at a normal distance,
with our eyes.
Let us remember that, at a greater distance, the more we must attend to
him, without falling into extremism.
-Speed: If the p. supra panoramic was good for slowness, for fast walking it
is practically ruled out, unless we know the area well and know more or
more
Page | 145

minus, the direction the subject is heading. Here the distance is reduced,
not
excessively, but quite a lot; This is because a fast person can give us a
slip in the blink of an eye.
We must also pay attention to the street: if there is a lot of atmosphere,
"hide" behind
people, and, if it is empty, walk as if we were not chasing them, but as if we
were
afraid; or go to panoramic ... well, I already said at the beginning that if the
slowness is
complicated, the speed much more.
On the other hand, we have in our favor that a subject who walks fast
through the streets is
usually quite busy in what is in front of him than in making sure if they
follow him.
In this type of fast follow-up, it is usually almost exclusive to adopt p. linear,
except in
clear or uncrowded areas. Take care, as always, not to look at the subject
too much so as
not to give ourselves away, and to also look at what comes to us: next
streets, traffic, etc.

Panoramic Pursuit

Yes on p. linear it was developed by the same imaginary "line" (hence the
name)
as the subject, on p. Panoramic monitoring is carried out by the immediate
opposite side:

This type of pursuit has some drawbacks that must be taken into account
before carrying it out:

-From a simple turn of the head, the subject may see us. Therefore, p.
panoramic is not
usually used, eg. In narrow streets: nearby shop windows, doorways on
opposite sidewalks that open, etc., invite us to look and, incidentally, can
give us away.

This is a very important inconvenience, but there is also the one that, for
example, the
person has to change the sidewalk or immediately go to a street very far
from
us, which, in certain cities, is not difficult to find.

Hence it is necessary to foresee what comes to us to change to p. linear as


the
circumstances so advise:

In these cases, the same method of p. linear to get him back, but without
stopping at the corner and following the last line (heading) marked by the
subject. Let's look
Page | 146

also on the other side of the street: on many occasions, the confusion
comes to us simply because the
subject crossed the street.

Among the advantages that make p. Panoramic is one of the most preferred
and used
are:

-To be able to see the other person's street from afar, perhaps preventing
changes in grade,
traffic lights, sharp corners, accidents, etc. Above all, if the corners are open
(
that is to say: greater field of vision):

This technique is also formidable in large avenues, as long as the distance


between sidewalk and sidewalk is not excessive (we will then talk about p.
Supra panoramic), since the fumes
from the cars, the traffic itself, the remoteness of the buildings, do not invite
us to look the other way, but rather
back, betraying a possible p. linear. In the event that we perform p.
panoramic on
multi-lane avenues, the distance will decrease; Of course , we will never
chase the subject at his
side (in parallel):

But we will shorten the distance as we see fit, although staying


behind at all times.

We must foresee with our eyes if there are dangerous corners or alleys that
would make us
lose the subject, to, as far as possible, cross in time and pursue on p. linear.

In this class of avenues, if it is shady on our side, we will walk along it, that
is,
next to the buildings or trees. This will make it even more difficult for the
subject to see us. The techniques
of not always looking at the subject etc. they are still valid here, because if
we keep our eyes on the
persecutor, third parties will betray us, as has already been said.

Another modality that includes p. panoramic view, and that can be done if
the area is known,
is through adjacent streets:

Page | 147

This makes it almost impossible for us to be discovered, but the danger of


losing the subject
increases exponentially. To "hunt" it again (or "synchronize" with it) we will
go down the street
and return to the opposite sidewalk. We will adopt the same sequence of
steps as the subject,
changing them between building and building to wait for him at the end of
these and, if necessary, watch him arrive
from afar. Let us also remember that, in this pursuit, depending on the
narrowness of the street,
the glazed surfaces can betray us (especially if the person being pursued is
an expert). And that, in a few
meters, the traffic lights, crossroads, etc. they can take us too far away from
the subject or bring us
dangerously close to him.

In the event that the subject crosses towards our sidewalk, we have the
options of
distraction (from a later study) or we will also wait by looking at shop
windows, etc. If the subject
crosses and addresses us, once we are seen we must not allow him to see
us again:
we will follow him with p. linear if necessary until we can cross again and
follow him with, now,
a better and more masterful p. panoramic ... since our failure reveals our
poor
concentration:

1- If the traffic is dense, we will shorten the distance if necessary forward,


crossing and
retracing our steps.
2- If not, we will again adopt a prudent distance crossing backwards without
paying
too much attention to the subject to allow him to stay ahead again and we
are behind
at the disposal of p. panoramic:

Page | 148

What we must not do in any case, is turn in front of him. It is much better to
bump into him head-on than to turn your back on his face. For this case, we
can
also go into a store to buy a magazine, bar ... as long as our action does not
lose it,
any of these actions are valid.

If despite all our attempts the subject has seen us clearly and realizes
that we are following him, we must surrender to the evidence: abandon or
follow him with supra-
panoramic persecution , perhaps in this way he will regain the confidence
that no one is following him.

Another variant is, for example, roundabouts or squares. They are never
surrounded by p. panoramic, because
we can find the subject or lose it (unless they are very small) but with
p.linear
and, again, we redo the panoramic:

This is correct:

Or, even, make the linear before:

Page | 149

p. Panoramic is also very effective if the subject is chased through a park or


green area , as long as it is wide enough and we keep the distance
conscientiously behind. It is also good in large industrial centers, ports, etc.

What is not good is hiding in each portal or behind the subject, as


seen in some cinematographic fictions, that not only draws the subject's
attention, but also alerts
everyone around. Unless the site is clear and the distance is not very short,
for this there is the "hidden linear p." (Lo), an issue that will be addressed in
future developments.

So far the main points on p. linear and p. panoramic,


within the scope of the chase on foot. I hope they have served you as
initialization and
knowledge to this attractive world.

Therefore, they remain to contemplate in future deliveries on monitoring,


develop
aspects such as:
-PLO (Hidden Linear Pursuit)
-P. Supra panoramic
-Distraction techniques
-Vehicle tracking
techniques
-Group chase -Stripping
techniques -Protection against tracking
-etc.
Page | 150

In summary ...

Any movement that is not in accordance with its environment will give you
away. If you walk in a
slow crowd, for example, rushing, you will quickly attract attention.
You must know how to blend in with the environment in which you move to
go unnoticed.

Your clothes must be neutral, (not black, as many might mistakenly think.
For example:
wearing black in summer, in a beach area, where everyone goes in color, is a
big mistake).
Most people wear muted colors in their usual clothing, so stay in
that social environment of the majority. That is to say: where you are going
to move.
Likewise, in Western societies, people, in more or
less crowded avenues and streets , almost always walk following the traffic
pattern: they go from their right and
come from your left:

Do the same to mix with the people, no you want to go following someone
and, at the same time,
stumbling over everyone who comes before, because they would soon
notice you.
Take advantage of the environment to stay invisible: parked and unloading
vehicles,
billboards, trees, ornaments ...

Do not run out of doors, always keep escape routes, foresee the future: the
possibility
that the subject will turn around suddenly, from difficult roundabouts, from
uninhabited or
multi-lane passages , to take them, if necessary, from another side.

At crowded traffic lights, stand on the extreme side of the subject's


intersection, protected by
people, and better backwards than forwards, outside than inside:

Page | 151

If the traffic light is empty, wait to cross far from where you can be seen or
opt
for another type of pursuit that allows you to do so.

Do not let yourself get against the ropes: they can ambush you.

And remember: practice. Tell your friends that you are going to follow them,
do not tell them when or where,
but be forewarned. It is the best way to gain experience.
Page | 152
Monitoring techniques II

Page | 153

© L. Domelhajer. All rigts reserved. All rights reserved.


This work enjoys a Creative Commons license: copying and distribution is
allowed as long
as the source of origin and its author are cited. However,
the sale of part or all of this material, as well as its use for purposes other
than those
exclusively educational , is expressly prohibited.Tracking
techniques are commonly used around the world for the most
diverse purposes: from following to a any person, up to the persecution of
criminals
or kidnappers to find out the place where the person is being kidnapped or
where they keep
their weapons.
Many of these techniques are developed and kept in the deepest secrecy
by security agencies, and have remained until today in the most absolute
secrecy,
only in the hands of espionage professionals.
With this first approach to this text (which is an extract from a more
developed book ) I want to bring these techniques to the general public, so
that, knowing them, they
can defend themselves and, knowing how they can be followed, they can
avoid it and feel that way more
insurance.
It is from this point of view that I distribute to the public and put this
first copy in your hands .

Page | 154

Preamble

Supra-panoramic Pursuit
This type of follow-up is ideal when the other person knows us, or knows
that they are already
following them. The great distances that usually occur in this type of pursuit
require a
concise practice of it, and only expert people can develop a good follow-up
without losing
the subject.
But as it also serves as a complement to the other two, I think it is
necessary to point something out
about it. I must clarify before entering the subject that I will not discover the
entire strategy of this
technique, simply because used for evil purposes it can cause a lot of harm
to
innocent people . In addition, it could be used for terrorist purposes to flee
an area, escape the
city ​​... or crime, so I will only expand on it just enough.

Let us bear in mind that Supra Panoramic Pursuit (PS) has the particularity
of
traveling a long distance in a relatively short time, destroying other
monitoring or surveillance techniques , even from vehicles, since as it can
be used to pursue,
also on the contrary: to escape.

Studied with time and with the help of plans, it can give extraordinary
results.

That is why I am not going to break it down here, I am just going to point out
some nuances. I think that a
"normal" person, with the techniques developed in the first chapter of this
series, has more than
enough. In addition, for when they need to do a follow-up, the ordinary
citizen
is enough and has plenty to resort to the PL and PP and the notes of the PS,
with that it should help them
to carry out a successful follow-up, especially if they are trained.

From a high place we will monitor the movements of the subject, allowing
us once he
is moving away, to carry out another type of pursuit:

Page | 155

Parks, elevated areas of a city: as the subject moves away, we


descend and / or approach, maintaining the distance that in the SP can
become very
large, so that, as we get closer, we move on to another type of persecution.

In PS, the gaze is not kept on the subject either, but it does for longer than
in Linear Pursuit and Panoramic Pursuit (see previous chapter).

Experience will tell us the time, and it will depend on many conditions
(zonal,
climatic, environmental ...).

The steps are usually of the 2-2-1 type (see previous chapter), accelerating
speed when
we start the PS technique and maintaining it as we approach.

Thanks to the PS we will have much more field of vision, and we will know
well in
advance the movements of the subject.

We both left from one p. linear or p. panorama.

The subject goes to a store and we "shorten" with ps, this can
also be done not only with this example, the city and rural areas, if they are
known and anticipated - for this reason,
look not only at the subject, but at what "Comes" - they offer many fields of
action. Here the PS
is maintained for a short time, simply the one that the favorable zone offers
us.

Let us remember that the SP, since we are sometimes on a high place, can
give us away, therefore agreeing with the environment and walking,
depending on how far and, if necessary,
behind the trees or other objects that are in the environment :
Page | 156 PS

is also ideal for locating and tracking goods that are being moved from
person to person
, especially if, for example, the person who has just passed the
“package” watches
for some time to see if someone is chasing their buddy.
As a summary ...

We have seen a short introduction to take the first steps as far as


Supra panoramic persecution is concerned.

We have also highlighted, once again, the importance of our position and
prevention in the area in which we find ourselves, as well as to anticipate
the next
movements that the subject makes.

With such well-learned and experienced steps, we will achieve a high degree
of success
and be able to easily follow almost any subject.

In the next chapter we will touch on another attractive follow-up point:


distraction techniques .

Page | 157
Page | 158

Al Qaeda Handbook

Page | 159

Modified and revised version of the original translation by Eduardo


Cebrones Alonso
Introduction

The martyrs were killed, the women were widows, the children were
orphaned, the
men were imprisoned, the heads of chaste women were shaved, the heads
of the traitors were crowned, atrocities were inflicted on the innocent, gifts
were
given to the traitor, virgins were raped in prostitution, altered ...
After the fall of our Orthodox caliphates on March 3.1924 and after
expelling the colonialists, our Islamic nation was afflicted with the rulers of
the apostates
who took over in the Muslim nation. These turned out to be more infidel and
criminal than
the colonialists themselves. Muslims have endured all kinds of harm,
oppression, and
torture at their hands.
Thousands of young people from the Haraka al-Islamyia
(Islamic movement) were thrown into prisons by those apostates rulers and
the detention centers were equipped with the
most modern devices and experts on oppression and torture. Thus the
youth had refused to
move in the orbit of the rules, obscure matters to the youth, and oppose the
idea of
rebellion against the rules. But [the rules] didn't stop there; they began to
fragment the
essence of the Islamic nation trying to suppress its Muslim identity. Thus,
they began to
spread atheistic views among the youth. We found some who claimed that
socialism was
from Islam, democracy was the council and communist propaganda made
prophet-God.
Colonialism and its followers, the rulers of the apostates, then started to
openly erect centers, societies, and crusader organizations like
Masonic lodges , lions and revolving clubs, and foreign schools. They aimed
to produce
a lost generation that pursued everything that is Western and produced
rulers, ministers, leaders,
doctors, engineers, businessmen, politicians, journalists, and
information specialists .
The rulers tried, using all means and kinds of seduction, to produce a
generation of young men who did not know except what they want, did not
say except what
the rulers think, did not live unless according to the way of the government,
and He did not get dressed
except in his closet. However, majestic Allah turned their deception behind
them,
as a large group of those young men, who were raised by them [the rulers]
woke up from
their sleep and returned to Allah, lamenting and repenting.
The young men returning to Allah announced that Islam is not the
performance of
rituals but a complete system: Religion and government, worship and Jihad
[holy war], ethics
and the dealing of people, the Koran and the sword. The bitter situation that
the nation has reached is a
result of its divergence from the course of Allah and his law honored in all
places and times.
That bitter situation occurred as a result of their children's love for the world,
their
disgust for death, and their abandonment of Jihad [holy war].
The disbelief remains the same. He pushed Abou Jahl and the valiant
infidels of Kureish
to fight the prophet and torture his companions. It is the same disbelief that
led to
Sadat, Hosni Mubarak, Gadhafi, Hafez Assad, Saleh, and all the apostate
Arab rulers to
torture, kill, imprison, and torment Muslims.
Page | 160

These young men announced that they would never establish an Islamic
government
except by the bomb and the rifle. Islam does not agree or make a truce with
disbelief, but
something confronts it.
The confrontation that Islam calls for with these atheist and apostate
regimes does not know
Socratic discussions, Platonic ideals or Aristotelian diplomacy. But he
knows the dialogue of
bullets, the ideals of assassination, bombardment, and destruction, and the
diplomacy of cannon and
automatic weapons .
Young people came to prepare for Jihad [holy war], ordered by the order of
the
majestic Allah in the Holy Koran. Qur'anic verse: "Against them make ready
your strength to the maximum
of your energy, including steeds of war, to strike terror in the hearts of the
enemies of Allah and their enemies, and others besides who cannot be
known, but who knows
the point of Allah. "
I present this humble endeavor to these young Muslim men who are pure,
believing, and fighting for the cause of Allah. It is my contribution towards
paving the
path that leads to majestic Allah and that establishes a caliphate according
to prophecy.
According to Imam Ahmad's account.

THIS MANUAL WAS FOUND BY THE MANCHESTER METROPOLITAN


POLICE (ENGLAND)
DURING A SEARCH FOR AN “AL” (HOME OF THE MEMBERS OF
QAEDA).
Page | 161

THE MANUAL WAS FOUND IN AN ELECTRONIC FILE DESCRIBED AS


“THE MILITARY SERIES”
RELATED TO THE “JIHAD STATEMENT. “THE MANUAL WAS
TRANSLATED
INTO ENGLISH AND WAS INTRODUCED EARLY THIS YEAR IN THE
EMBASSY BOMBING TRIAL IN NEW
YORK.
Principles of Organization

Principles of military organization:


The military organization has three fundamental principles without which it
cannot be
established.
1. Military Commander and Advisory Council of the organization
2. The soldiers (individual members)
3. A well-defined strategy
Military requirements of the organization:
The military organization dictates a number of requirements to assist you in
confrontation and
resistance. These are:
1. Forged documents and location currency
2. Apartments and hiding places
3. Means of communication
4. Means of transportation
5. Information
6. Arms and ammunition
7. Transportation
Required missions of the military organization:
The main mission of which the military organization is responsible for is:
The overthrow of atheist regimes and their replacement with an Islamic
regime.
Other missions consist of the following:
1. Gathering information about the enemy, the land, the facilities, and the
neighbors.
2. Kidnap enemy personnel, documents, secrets, and arms.
3. Murder of enemy personnel as well as foreign tourists.
4. Freeing the brothers who are captured by the enemy.
5. Rumors and spreading statements of writing that instigate people against
the
enemy.
6. Ruining and destroying the places of fun, immorality, and sin; not
a vital target.
7. Ruining and destroying embassies and attacking vital economic centers.
8. Blasting and destroying bridges leading into and out of cities.
Page | 162

Importance of the military organization:


1. Withdrawal of those personalities that block the path of the call. All types
of intellectuals and military and civilian thinkers for the state.
2. Appropriate utilization of the unusual capacities of the individuals.
3. Accuracy in the execution of tasks, and use collective opinions about the
performance of a
job from all points of view, not just one.
4. Control the work and not make fragments of it or the deviation of it.
5. Realization of long-term goals such as the establishment of an Islamic
state and
short-term goals such as operations against
enemy individuals and sectors .
6. Establishment of the conditions for the possible confrontation with
regressive regimes and their persistence.
7. Achieving discipline in secret and with homework.
Page | 163

Qualifications and Characteristics Needed for Members


of the Organization

Qualifications Needed for Members of the Organization


1 - Islam:
The member of the organization must be Muslim. How can a non-believer,
someone of a revealing religion [Christian, Jewish], a secular person, a
communist, etc.,
protect Islam and Muslims and defend their goals and secrets when he
does not believe in that
religion? The Israeli army requires that a fighter be in the Jewish religion.
Likewise,
command leadership in the Afghan and Russian armies requires
being a member of the Communist Party to achieve the position of officer .
2 - Commission with the organization's ideology:
This commission frees the members of the organization from conceptual
problems.
3 - Maturity:
The work requirements of the military are numerous, and a minor cannot
perform them. The nature of hard and continuous work in hazardous
conditions requires a great deal
of psychological, mental, and intellectual aptitude, which are not generally
found in a minor
.
4 - Sacrifice:
He [the member] has to be willing to do the work and experience martyrdom
in
order to achieve the goal and establish the religion of majestic Allah on
earth.
5 - Listening and obedience:
In the military, this is known today as discipline. It is expressed by how the
member
obeys the orders given to him. That is what drives our religion
6 - Combination of secrets and dissimulation information
This secret must be used even with the closest people, because the
deception of the
enemies is not easy.
Page | 164

7 - Free from disease


The member of the military organization must satisfy this important
requirement.
8 - Patience
The member must have a lot of patience to endure the afflictions if the
enemies overcome it. You must not abandon this great path and your
religion to enemies for
your freedom. He must be patient in carrying out the work, even if it takes a
long time.
9 - Calmness and Impassivity
The member must have a calm personality that allows him to endure
psychological traumas such as those involving killing, murder, arrest,
imprisonment, and
adverse psychological traumas such as the killing of one or several of the
comrades of
your organization. He must be able to get the job done.
10 - Intelligence and penetration
The member must know how to penetrate the enemy territory with
intelligence, using all his
resources of camouflage and observation to obtain the greatest amount of
information with the
least risk.
11 - Caution and prudence
The member must act with caution, including admitting vexations that in
normal situations he would not admit in order not to be discovered and to
be able to fulfill his mission.
12 - Truth and advice
The commander of the faithful, al-Khattab states that this characteristic is
vital in those who
collect information and work as spies against the enemies of Muslims.
Choose
those that you find suitable for your truth and advice, whether the Arabs or
the inhabitants of
that land. The stories of the liars would not benefit him, even if some of
them were
true; he liar is a spy against you and not for you.
13 - Ability to observe and analyze
You must have the ability to observe and analyze the environment. A voice,
an object
that can go unnoticed by anyone, can be the difference between achieving
the
goal or falling into the nets of traitors.
14 - Ability to act, change positions and cover up
Controlling their reactions and skillfully managing their role. Without
showing inconsistency, you will show your concern and zeal for those
around you once and your
concern for the group on another.

Page | 165

Documentation and operating funds

Financial security precautions:


1. Division of operating funds into two parts: One part should be invested in
projects that offer financial return, and the other should be saved and not
circulated except
during operations.
2. Placing operational funds in one place.
3. Not telling the members of the organization about the location of the
funds.
4. Have proper protection while carrying large amounts of money.
5. Leave the money with non-members and circulate it as needed.
Forged
documents "identity documents, record books, passports" The following
security precautions should be taken:
1. Keep the passport in a safe place to avoid being located by the
security apparatus , and the brother to which it belongs would have to
negotiate his back (I will give him his
passport if you give me the information)
2. All documents of the secret brother, such as identity documents and
passport, must be falsified.
3. When the secret brother is traveling with a certain identity document or
passport, he must know all the pertinent, for example the name, the
profession, and the
address.
4. The brother who has a special job status (commander,
communications liaison ,…), must have more than one identity document
and passport. He must
learn the content of each, the nature of the profession, and the dialect of the
area of
residence listed in the document.
5. The photograph of the brother in these documents must be without a
beard. It is preferable that the
public photograph of the brother [in these documents] is also without a
beard. If he already has
a bearded photo document, he should replace it.
6. When using identity documents under multiple names, no more should
one document be carried
under one name at a time.
7. The validity of the forged travel document must always be confirmed.
8. All matters of counterfeiting must be done with command and not by
choice and
own method.
Page | 166

9. Married brothers should not add their wives to their passports.


10. When a brother is carrying the forged passport of a certain country, he
should not travel to
that country. Counterfeiting is easy to spot at the airport, and the brother's
dialect is
different from that of the people in that country.
Safety precautions
Related to the given names of the organizations:
1. The name given by the organization [to the brother] should not be odd in
comparison with
other names used around it.
2. The brother should not have more than one name in the area where he
lives (the
secret workplace ).
Operational

bases Definition of bases:


These are the apartments, the hiding places, the command centers, etc. in
which secret operations are carried out against the enemy.
These bases can be in cities, and then they are called homes or
apartments. They can be in rough, mountainous terrain far from the enemy,
and are then
called bases of concealment.
During the initial stages, the military organization generally uses the
apartments
in cities as places to carry out assigned missions, such as collecting
information, observing the members of the regime in their facets of action,
etc.
Hiding places and bases in mountains and rough terrain are used in the
advanced state, from which Jihad groups are sent to execute operations of
the
assassination of enemy individuals, to bombard their centers, and to
capture their weapons.
In some Arab countries such as Egypt, where there are no mountains or
rough terrain,
all stages of Jihad work would take place in cities. The opposite was true in
Afghanistan,
where Jihad work was initially in the cities, then the warriors shifted
to the mountains and rough terrain. There, they began to fight the
communists.
Safety precautions related to apartments:
1. Choose the apartment carefully up to the location, adjusting the size for
the
work needed (meetings, storage, arms, runaways, job preparation).
2. It is preferable to rent the apartments on the ground floor to facilitate
escape and
excavation of pits.
3. Prepare secret locations in the apartment to secure documents,
records, arms, and other important items.
4. Prepare ways to vacate the apartment in case of a surprise attack
(supports, wooden ladders).
Page | 167

5. Under no circumstances should the apartment be disclosed except those


who
use it.
6. Provide the necessary cover for the people who frequent the apartment
(students, workers, employees, etc.)
7. Avoid withdrawal and isolation of the population and refrain from going to
the apartment at
suspicious hours.
8. It is preferable to rent these apartments using false names, proper
housing, and
non-Muslim appearance.
9. A sibling should not rent more than one apartment in the same area, from
the same agent,
or use the same rental office.
10. Care should be exercised not to rent apartments that are known to the
security apparatus [for example] those used for immoral or former Jihad
activities.
11. Avoid police stations and government buildings. Apartments should not
be
rented near these places.
12. When renting these apartments, one should avoid isolated or
abandoned locations
so those living there cannot easily be caught by the enemy.
13. It is preferable to rent the apartments in newly developed areas where
people do not know each other. Generally, in older rooms people know that
they
identify one another and strangers easily, especially since these rooms
have many informants.
14. Make sure there has been no surveillance before members enter the
apartment.
15. Agreement between those who live in the apartment in special ways of
knocking on the
door and special signs before entry into the main building access, to
indicate to those who wish to enter that the place is safe and unsupervised.
Such signs
include hanging out from a towel, opening a curtain, placing a
cushion in a special way, etc.
16. If there is a telephone in the apartment, calls must be answered in a
manner
agreed upon by those who use the apartment. That would prevent mistakes
that would otherwise
lead to disclosing the names and nature of the tenants.
17. For apartments, replace locks and keys with new ones. As for the
other entities (camps, shops, mosques), appropriate safety precautions
should be taken depending on the entity's importance and role at work.
18. Apartments used for undercover work should not be visible from
higher apartments so as not to expose the nature of the work.
19. In a newer apartment, avoid talking loudly because the pre-fab ceilings
and walls [used in apartments] are not the same thickness as in the old
ones.
20.
11. It is necessary to have current documents to support the member's
secrecy. In the case
of a physician, there must be an actual medical diploma, membership in the
medical union,
government permission, and all other routine procedures known in that
country.
12. The cover should blend in well with the environment. For example,
selecting
a doctor's clinic in an area where there are clinics, or in a convenient
location for it.
13. The deck of those who frequent the location must match the deck of
that
location. For example, a common worker should not enter a luxury hotel
because
that would be suspicious attention and would lead to discovering the
operation.

Page | 168

Means of communication and transportation

Means of communication
Introduction:
It is well known that in secret operations, communication is the mainstay of
the
movement for rapid completion. However, it is a double-edged sword: It can
be in
our favor if we use it well and it can be a knife stuck in our back if we do not
consider and do not take the necessary security measures.
Media:
The military organization in any Islamic group can, with its modest
capabilities,
use the following means:
1. The telephone,
2. In person,
3. Messenger,
4. Letters,
5. Some modern devices, such as the internet, facsimile and radio
communication.
The communication can be within the county, state, or even the country, in
this case it is
called local communication. When it spreads between countries, then it is
called
international communication .
Secret communication is limited to the following types:
Common, Wait, Alarm
Page | 169

1. Common communication:
It is a communication between two members of the organization without
supervision by the
security apparatus that opposes the organization. The joint communication
must be
made under a certain cover and after examining the situation of the
surveillance by the
enemy.
2. Standby communication:
This replaces joint communication when one of the two parties cannot
communicate with the other for some reason.
3. Alarm communication:
This is used when the opposing security apparatus discovers a secret
activity
or some secret members. According to this communication, the activity is
terminated for some time, everything important related to the activity is
abandoned,
and the members of the organization are hidden from the security
personnel.
Method of communication between members of the organization:
1. Communication about secret activity should be done using a good cover;
It must
also be prompt, explicit, and relevant. That is, just to speak only.
2. Before contacting members,
a. The cell commander must agree with each one of them
separately (the members of the cell must never all meet in one place and
they
must not know each other) with a system and means of communication
appropriate
to each one. Also, the head of the organization uses a similar technique
with
the branch commanders.
b. Cell or cluster methods must be adopted by the organization. It must
be composed of many cells whose members do not know each other,
so that if one member of the cell is taken other cells will not be affected,
and
the work would proceed normally.
3. A senior commander determines the type and method of communication
with
lower-ranking leaders.
The telephone:
Due to significant technological advances, security measures for monitoring
the
telephone and disseminating information have increased. The supervision
can be done by installing a
secondary line or a wireless device in a telephone that relays the calls to a
remote location ... this will be a method of the organization as a security
measure between the
members who use this means of communication.
1. Communication must take place in public places. One should select the
phones
that are less suspicious to the security apparatus and are more difficult to
monitor. It is
preferable to use the telephones in booths and on the main streets.
2. The conversation should be encrypted or generally so as not to alert and
cause monitoring
of the phone.
3. Periodically examination of the telephone system and the receiver.
4. Telephone numbers must be memorized and not registered. If the brother
has
to write them, he must do so with a code so that those who see it do not
appear as
telephone numbers (figures of a shopping list, etc.)
5. The caller and the person called must mention some words or sentences
before
bringing up the intended topic. The brother who is calling can dial one of the
digits and actually call someone else. The called person may claim that the
call is for him, and the calling sibling may start telling him about work-
related matters
and revealing many things due to a minor mistake.
6. In telephone conversations about secret work, the voice must be
changed.
Page | 170

7. When feasible, it is preferable to switch phone lines to allow direct access


to local and international calls. That and the appropriate cover facilitate
communications and provide security protection.
8. When a telephone line is identified by the security apparatus, the
command and all
the brothers who used it must be notified as soon as possible to take
appropriate measures .
9. When the command is sure that a
particular phone line is being monitored , it can exploit it by providing
information that misleads the enemy and
benefits the work plan.
10. If the organization manages to gain benefit from device monitoring, it
should
use it immediately.
In person: (Meeting)
This is direct communication between the commander and a member of the
organization.
During the meeting the following activities are carried out:
1. Information exchange,
2. Orders and instructions are given,
3. Funding,
4. Member follow-up letter
Stages of the meeting:
A. Before the meeting,
B. The meeting in herself,
C. After the meeting.
A. Before the meeting:
The following steps should be taken:
1. Designate the location of the meeting,
2. Find an appropriate cover for the meeting,
3. Specify the date and time of the meeting,
4. Defining special signs among which are.
Identification of the meeting location:
If the meeting location is stationary, the following matters should be noted:
1. The location should be away from police stations and security centers.
2. Ease of transportation to the location.
3. Select the location before the meeting and learn all its details.
4. If the meeting location is an apartment, it should not be an outside room,
but one somewhere in the center.
5. The availability of many roads leading to the meeting location. That
would
provide easy escape in case goods or meeting staff
are attacked by security personnel.
6. The location should not be under suspicion by the security apparatus.
7. The apartment where the meeting takes place should be on the ground
floor, facilitate escape.
8. The ability to detect any surveillance of that location.
9. When using public transportation, one should get off at a certain distance
from the meeting location and continue on foot. In the case of a private
vehicle, one must
Page | 171

park it far away or in a safe place to be able to maneuver it quickly at any


time.
If the meeting location is not stationary, the following matters should be
noted:

1. The meeting location should be at the intersection of a large number of


side streets to facilitate entry, exit, and escape.
2. The meeting location (such as a cafeteria) should not have members who
were able to deal with the security apparatus.
3. The meeting should not be held indoors as this would allow
security personnel to hide and supervise those gathered.
4. It is imperative to agree on an alternative location for the meeting in case
the meeting at the first is unworkable. This will always be necessary
whether the
meeting place is immobile or not.
Those in the meeting should do the following:

1. Verify the security situation of the location prior to the meeting.


2. Make sure there are no security personnel behind them or at the meeting
place.
3. Do not go to the location directly.
4. Clothing and appearance must be appropriate to the meeting location.
5. Verifying that the private documents carried by the brother have
proper cover .
6. Before the meeting, design a security plan that specifies what they would
say to the
security personnel in case the location was attacked by them, and what they
will
resort to in dealing with the security personnel (flight, driving ... )
Finding an appropriate cover for the meeting:

1. Blend well with the venue.


2. In case the place is attacked, the security personnel must create the
cover.
3. It should not arouse the curiosity of those present.
4. You must match your own appearance to the place and appearance of
the people indicated on the
cover documentation (financial and academic training).
5. You must have supporting documents.
6. Provide the reasons for the meeting of two parties (for example, one of
the two
parties must have proof that he is an architect. The other must have
documents as
proof that he is a land owner. The architect has produced a plan of
construction
for the land)
Specify the date and time of the meeting:

1. Specify the time of the meeting as well as the date.


2. Specifying the time of the arrival of both parties as well as the departure
of the first
group.
3. Specify how long the meeting will last.
4. Specify an alternative date and time.
5. Do not allow a long period of time between making the arrangements and
the meeting itself
.
Mark special signals between those who meet

If the encounter is between two individuals who know each other, it is


sufficient to use a single
safety sample. In that case, individuals sit down and are informed on arrival
that there is no
Page | 172

enemy surveillance. The sample can be keys, beads, a newspaper, or a


scarf. The two
individuals would agree to conduct the meeting in a special way so as not to
attract the attention of those present.
If the two individuals do not know each other, they should do the following:
1. The initial sample for getting to know each other may be that they both
wear a certain type of clothing or carry a
certain item. These samples must be appropriate for the place, allowing
easy identification. The initial sample is to get to know each other, this does
not make a
complete identification of the other person.
2. Security signal: It is given by the individual who first accessed the
location
of the meeting to inform the second individual that the place is safe. The
second
person would answer through signals to inform the first that they are not
supervising. The signals are agreed in advance and should not cause
suspicion.
3. A second cue is used to get full recognition of the person and
is used by the second finisher and is used while sitting down. The
signal can be a certain clause, word, sentence, or gesture
previously agreed upon , and should not cause suspicion for those who hear
or see it.

B. The stage of the meeting:

The following steps should be taken:


1. Caution during the meeting.
2. Do not act artificially during the meeting so as not to raise suspicion.
3. Do not speak with loud or very low voices, it should be moderate.
4. Don't write anything that has to do with the meeting.
5. Agreeing with a security plan in case the enemy attacks the
location.
C. After the meeting:
The following measures should be taken:
1. Not going out together, only each one separately.
2. Not heading directly to the main road, but to the secondary ones.
3. Do not leave anything in the meeting place that might indicate the identity
or nature
of those who were found.
Meeting in person has disadvantages, for example:
1. Allowing the enemy to capture those who are meeting.
2. Allowing the enemy to take photos of those they meet, record their
conversation, and collect evidence against them.
3. Reveal the appearance of the commander to the other person. However,
that can be avoided by
taking the previously mentioned measures such as disguise.
Page | 173

The messenger:
This is an intermediary between the sender and the receiver. The messenger
must possess all
the characteristics mentioned in the first chapter regarding the member of
the
military organization .
These are the security measures that a messenger must take:
1. Knowledge of the person to whom he will deliver the message.
2. Agreement on special signs, exact date, and specific time.
3. Selecting a street or a public place that does not raise suspicion.
4. Passing through a secondary road that has no checkpoints.
5. Using public transport (train, bus,…) and disembarking before the
main station . Likewise, boarding should not be done at the main station
either, there
are a lot of security personnel and informants.
6. Fully know the location you are going to.
Letters:
This means that it can be used as a method of communication between
members and
the organization on condition that the following security measures are
taken:
1. It is forbidden to write any secret information in the letter. If one is to
communicate
like this, the writing must be done in a general way.
2. The letter should not be sent from a post office near the sender's
residence,
but rather distant.
3. The letter should not be sent directly to the recipient's address but to a
discreet location where there are many workers from your country. The
letter will then be forwarded to
the intended recipient.
4. The name and return address on the envelope must be fictitious. Should
the letters and their content be discovered, the security apparatus would not
be able to determine
the sender and address.
5. The envelope must not be transparent to reveal the letter inside.
6. The included pages should not be many, so as not to raise suspicion.
7. The recipient's address must be clearly written so that the letter is not
returned.
Facsimile and radio:
In view of its modest capabilities and the search by the security apparatus
of
its members and forces, the Islamic military organization cannot obtain the
devices of the
theses. In case the organization can obtain them, firm security measures
must be carried out to secure communication between members at home
and command abroad. These
measures are:
1. The duration of the transmission should not exceed five minutes to
prevent the enemy from
clearly establishing the location of the device.
2. The device must be placed in a location with wireless high frequency,
such as
near a television station, embassies, and consulates to prevent the enemy
from
identifying your location.
3. The brother, using the wireless device to contact his command
outside the country, must disguise his voice.
4. The time of communication should be carefully specified.
Page | 174

5. The frequency should be changed from time to time.


6. The device must be frequently moved from one location to another.
7. Do not reveal your location to the entity for which you are reporting.
8. The conversation should be in a general way so as not to raise suspicion.
Means of transport:
Members of the organization can move from one location to another
using one of the following means:
A. Public transport,
B. Private transport
Safety measures to be observed in public transport:

1. One must select public transportation that is not subject to


frequent checking along the route, such as crowded trains or public buses.
2. Boarding should be done at a secondary station, as major stations
undergo more careful surveillance. Also, boarding should not be done at
the main stations.
3. The cover must match the general appearance (tour bus, first class
train, second class train, etc.).
4. The existence of the documents that support the cover.
5. Placing important luggage among passengers' luggage without the
identification of
the person who placed it. If discovered, their owner would not be arrested.
On trains, luggage
must be placed in a different car than its owner's.
6. The brother who is traveling on a “special mission” must not be
involved in
religious issues or everyday matters (seat reservation,…).
7. The brother who travels on a mission should not arrive in the country of
destination
overnight because then the travelers are few, and there are search parties
and
checkpoints along the route.
8. When using taxis, the conversation should not start with the driver
because
many taxi drivers work for the security apparatus.
9. The brother should exercise extreme caution and apply all security
measures
to the members.
Safety measures to be observed in private transport: Private
transport includes:
A. cars,
B. motorcycles
Cars and motorcycles used in open activity:
1. One must possess the appropriate permit and not violate traffic rules to
avoid trouble with
police.
2. The location of the vehicle must be secure so that the security device will
not
confiscate it.
3. The vehicle make and model must be appropriate for the sibling deck.
4. The vehicle should not be used in special military operations unless the
organization has no other option.
Page | 175

Cars and motorcycles used in secret activity:


1. Attention must be paid to permits and obeying traffic rules to avoid
trouble and reveal your real mission.
2. The vehicle should not be left in suspicious places (deserts, mountains,
etc.). If it
must be, then the work must be done at convenient times when no one
is closely watching or following it.
3. The vehicle must be purchased using forged documents so that getting
to its
owners would be prevented once it is discovered.
4. For continuity, have only one brother in charge of the sale.
5. While parking somewhere, one must be in a position willing to
move quickly and flee in case of danger.
6. The color of the car or motorcycle should be changed before operation
and back to
original after operation.
7. The license plate number and county name must be falsified. In addition,
the
digits must be numerous to prevent anyone from locating and memorizing
it.
8. The operation vehicle should not be taken to large gas stations so
that it would not be detected by the security apparatus.

Training

Safety precautions that:


The place:
The place must have the following specifications:
1. Distance from populated areas with the availability of living needs.
2. Availability of medical services during training.
3. The location must be suitable for the type of training (training, shooting,
tactic).
4. No one except trainers and trainees should know about the venue.
5. The place must have many paths and entrances.
6. The place must be visited at convenient hours.
7. Hiding any traces of training immediately after miso.
8. Save the place during training.
9. Suitability of existing facilities for the number of
training members .
10. Exclusion of any person who is not connected with the training.
11. Take all security measures with respect to the establishment.
12. Distance from the place of police stations, public establishments, and
the eyes
of informants.
Page | 176

13. The venue should not be located in such a way that the training and
trainees can
be seen from another location.
The trainees:
1. Before proceeding to the training site, all security measures connected
with a secret individual must be taken. Meanwhile, during on-site training
, the safety of personnel must be ensured.
2. Selecting trainees carefully.
3. The trainees must not know each other.
4. The size of the groups that should be during the training (7-10
individuals).
5. The trainees must not know the place of training.
6. Establish a training plan for each apprentice.
The trainers:
All the measures taken with respect to the commanders also apply to the
trainers. Also, the following should be applied:
1. Safety of the trainers in the training place. Only those
conducting the training should be there, so as not to subject the training
team to the
risk of safety exposure.
2. Do not reveal the identity of the trainer to the trainees.
3. Keeping a small group of trainees for each trainer.
4. Training team members should not know each other.

Weapons

Measures related to purchase and transportation


Before dealing with weapons, whether you buy, transport, or store them, it is
essential to establish
a careful, systematic and firm plan of assurance that the plan addresses all
stages.
It is necessary to divide this task into stages:
First phase: Before purchase;
Second stage: Purchase;
Third stage: Transportation;
From the fourth floor: Storage.
1. Before purchase stage:
It is necessary to take the following measures:
1. In-depth knowledge of the place where the weapons will be purchased,
along with their
inputs and outputs.
2. Verify that there are no informants or security personnel in the place
where the
purchase will take place.
Page | 177

3. The place must be protected from police and government agents.


4. Not proceeding to the place of purchase directly by the main road, but by
the
secondary streets .
5. Execution of exercises to detect surveillance.
6. Your appearance and clothing must be appropriate for the place where
the purchase will take place.
7. The place of purchase must not be situated in such a way that the seller
and the buyer
can be seen from another location. Rather, the place of purchase must be
such
that both the seller and the buyer can see the surroundings.
8. Determination of a suitable cover to be in that place.
9. The place should not be closed because that makes it easier for the
police to hide among the people,
supervising the arms they receive, and therefore canceling the brother's
purchase.
10. In case one of the parties cannot arrive, it is essential to pre-arrange an
alternative time and place with the seller.
11. Selecting a suitable time for purchase so that it does not raise
suspicion.
12. Before the purchase, the seller must be tested to ensure that he is not
an
agent of the security apparatus.
13. Preparing a place for storage before purchase.
2. The purchase stage:
1. Verifying that the weapons are in working condition.
2. Not paying the seller the price for the weapons before viewing, examining,
and testing them.
3. Not telling the seller about the mission for which the weapons are being
purchased.
4. Extreme caution should be used during the purchase transaction in case
of
any strange behavior by the seller or around you.
5. Not lengthening the time spent with the seller. It is important to leave
immediately
after purchasing the weapons.
3. The stage of transportation:
1. Avoid main roads where checkpoints are common.
2. Choose a convenient time to transport the weapons.
3. Observers must precede the road ahead of the transport vehicle for
early detection in the event of an emergency.
4. Do not proceed directly to the storage place until after verifying that there
is no surveillance there.
5. During the transportation stage, weapons must be hidden in a way that is
inconspicuous and difficult to find.
6. The route to transport the weapons must be determined very carefully.
7. Verifying the legality of the vehicle, performing its maintenance, checking
its
gasoline and water levels, etc.
8. Drive the car normally to prevent accidents.
4. The storage stage:
1. To avoid repeated transportation, storage places should be selected. In
case the materials are bombs or detonators, they must be protected against
extreme heat and humidity.
2. Explosive materials and detonators must be separated and stored apart
from each
other.
3. Caution must be exercised when placing detonators in the array.
4. Lubrication of weapons and placing them in wooden or plastic drawers.
The
ammunition should be treated separately.
Page | 178

When selecting an array, consider the following:


1. The array should not be in protected areas, or near parks or public places.
2. The armory must not be in a secluded location
3. The armory must not be in an apartment previously used for
suspicious activity and often frequented by security personnel.
4. The armory should not be a room that is used normally and can be
located by
other people.
5. The apartment selected as an arsenal must be owned by the organization
or
rented on a long-term basis.
6. The brother responsible for storage should not visit the armory frequently,
or play
with weapons.
7. The arsenal manager must record all weapons, explosive materials,
and ammunition in a book . The book must be encrypted and well secured.
8. Only the Armory Manager and Commander should know the location of
the
Armory.
9. It is necessary to prepare alternative arsenals and not leave any clues in
the
original arsenals about the alternatives.

Member

security Definition of member security:


This is a system of measures taken by members who perform undercover
missions
to prevent enemies from consigning them.
It is necessary for any party that adopts the work of Jihad and has many
members, to subdivide its members into three groups, which have their own
security measures.
The three groups are:
1. The open member,
2. The secret member,
3. The commander
Measures to be taken by the open member:

1. He must not be curious and inquisitive about matters that do not concern
him.
Page | 179

2. He should not be talkative and talk about everything he knows or hears.


3. He should not comment on the names and addresses of members he
knows. If he
has knowledge of other members, that information should be kept safe.
4. During times of security problems and arrest campaigns and
especially if his appearance is Islamic, he should reduce his visits to
dangerous areas
and stay at home in a hidden place.
5. When conversing on the phone, he should not speak of any information
that could be of
use to the enemy.
6. When sending letters, he should not mention any information that could
be of use to the
enemy. When receiving letters, he should burn them immediately after
reading and
pour water on them to prevent the enemy from reading them. Furthermore,
he must destroy
any trace of fire so the enemy would not discover that something was
burned.

Steps to be taken by the secret member:


In addition to the above steps, the member should…

1. Not reveal their real name to members of the organization who are
working
with them.
2. Has a general appearance that does not indicate Islamic orientation.
3. Be careful not to mention common siblings, expressions, or displays of
their behaviors.
4. Avoid visiting famous Islamic places.
5. Bring forged personal documents and know all the information they
contain.
6. Have protection preceding your visit to any place while moving
around (apartment, province, means of transportation, etc.).
7. Have complete and accurate knowledge of the state of safety related to
those
places, around you, at your place of work and residence, so that no
danger or damage would catch you unprepared.
8. Maintain your family and neighborhood relationships and you must not
show any change
towards them so that they do not discover your membership in the
organization.
9. Do not resort to using letters and messengers except in an emergency.
10. Don't speak out loud.
11. Not being involved in acts of reporting so as not to attract attention.
12. Break up the daily routine, especially when carrying out a secret mission.
For example,
changing the departure and return routes, the arrival and departure times,
and the
store where he buys his goods.
13. Do not cause any trouble in the neighborhood where he lives or in the
place of work.
14. Use the telephone using special code so that it does not attract
attention.
15. Not coming into contact with open members except when necessary.
Such contacts should be brief.
16. Do not fall into the trap of the enemy's enthusiasm, with the praise or
criticism of your
organization.
17. Execution of exercises to detect surveillance whenever a task must be
carried out.
18. Do not park in prohibited areas and do not take photographs where it is
prohibited.
19. Close everything that must be closed before leaving the place, whether it
is at home or your
secret place of work.
20. Do not experience a sudden change in your daily routines or any
relationship that
denotes your Jihad involvement. Also, you should not be motivated to
separate from your
previous relationships.
Page | 180

21. Do not find yourself in places where there are informants, such as
cafeterias, and do not live in
areas near the residences of personalities, government establishments, and
important police stations. There is greater vigilance in hunting season by
the police.
22. Do not write down in any medium, especially on paper, that you could
show traces
and written words by rubbing the paper with lead dust.

Measures to be taken by the commander:


The security of the commander in open or secret work is of special
importance for
the following reasons:
1. The large amount of information that he possesses.
2. The difficulty of the command in replacing the commander.
3. Therefore, all of the previously mentioned safety precautions
regarding limbs should be increased for the commander. Many resources
must be
reserved to protect commanders.
Important note:
Married brothers should observe the following:
1. Do not talk to their wives about Jihad work.
2. Members with safety risks must not travel with their wives. A
wife with an Islamic appearance (veil) attracts attention

Security Plan

Definition
This is a system of coordinated, cohesive, and integrated measures that
relate
to certain activity and designed to confuse and surprise the enemy, and if
discovered, to
minimize job loss as much as possible.
Importance of the safety plan:
The stronger the safety plan, the safer the work and the less the
losses. The less robust the security plan, the less secure the job and the
greater
the losses.
Page | 181

Security Policy Specifications:


A number of conditions must be met to help the security plan to
be successful.
These are:
1. It must be realistic and fact-based to be credible to the enemy before and
after
work.
2. Coordinated, integrated, cohesive, and exact, seamless, to give the enemy
the
impression of a continuous and linked chain of events.
3. Simple so that members can assimilate it.
4. Creative.
5. Flexible.
6. Secret.
The method of executing the security plan:
There should be a security plan for each activity that is subject to discovery
by the enemy. For example, the brother who is in charge of a certain mission
could be arrested. It is,
therefore, essential that a security plan is designed for him with which he
will be able to deny
any accusation. Also, for the group assigned to a collective mission, there
should be a
safety plan in which all members are safe. Each member then works,
learns, and trains in their role to ensure assimilation.
We will cover many examples of safety plans related to certain
matters:
1. Safety plan for an individual mission.
2. Safety plan for a group (important meeting, mission, operation).
3. Security plan for a group
1. Example of a security plan for an individual mission (training in
Afghanistan):
Before departure:
Traveling through an airport, the brother might be subjected to interrogation.
It is
essential that you are taught the answers to the following anticipated
questions:
A. What are the reasons for your travel?
B. How did you get the money for the tour?
C. How long will the tour last?
D. Who will meet you at the place of arrival?
E. Where will you stay at the destination?
F. What will you do at the duty station?
(There are varying degrees of questioning)

During the journey (country of transit):


The brother should be taught the answers to the following questions:
Page | 182

A. Why are you going to Pakistan?


B. Do you belong to religious organizations?
C. How did you get the money for the tour?
D. Who processed your visa for Pakistan?
E. What will you do in Pakistan?
F. Who will you stay with in Pakistan?
Country of arrival (Pakistan):
Brother should be taught the answers to the following questions:

A. Why did you come to Pakistan?


B. How long will you stay in Pakistan?
C. Where will you reside?
Country of transit (return):
The brother should be taught the answers to the following questions:
A. What were you doing in Pakistan?
B. Are you a Jihad fighter?
C. Do you belong to religious organizations in your country?
D. Why did you come to our country in particular?
E. How long will you stay?
F. Where will you stay during your stay?
Return country (Return to your country):

A. What were you doing in the country of transit?


C. Addresses and telephone numbers of those who received you during your
stay?
D. Who did you visit in your group, and for how long?
When your travel to Pakistan is discovered:

A. What were you doing in Pakistan or Afghanistan?


B. What camp were you trained in?
C. Who trained you? What weapons did they train you in?
D. Who assigned you to go to Afghanistan?
E. Who will you come into contact with in your country?
F. What are the tasks and missions that you intend to carry out in your
country?
G. Who trained with you in Afghanistan?
H. How many of your countrymen are in that field and in Afghanistan?
I. What are their names?
J. Who are the group's commanders there [in Pakistan]? Where do they
reside and what
do they do?
K. What do the commanders talk about and what things?

An example of a safety plan for a group mission (important meeting).


Page | 183

The meeting:
A. A meeting was held by those responsible for the open work. This meeting
is held
in public and private places.
B. A meeting was held by those responsible for the secret work. For that
meeting, there will be
great effort on our part, it must be exercised to ensure your safety.
We will discuss that meeting and what makes it safe from enemy spies.
The security plan for that meeting is divided into several stages:
1. Before the meeting,
2. The location of the meeting,
3. During the meeting,
4. After the conclusion of the meeting,
5. In case of have security personnel storm the meeting place and capture
one of the
members.

1. Before the meeting:


Here the meeting for secret work is divided into:
Meeting in a stationary location: A meeting where more than three members
gather to
discuss a plan or prepare for an activity.
Mobile meeting (meeting): A meeting between a small number of members,
no more than three,
reporting [one by one] of a certain issue.
Necessary security measures before the immobile meeting:
1. Establishing a convenient plan for the members if any of them are
arrested.
It consists of:
Who is the owner of the apartment?
What was discussed at the meeting?
Who was with you?
What was agreed on?
2. Specifying the timing of the meeting in such a way that it does not raise
suspicion of members
' movements.
3. Not giving a long period of time between specifying the time and the
meeting itself.
4. Securing the location of the meeting and the routes leading to it by the
following:
A. Ensuring the security status via telephone.
B. Assigning members to supervise the venue before and during the
meeting.
C. Establishment of a member near the nearest enemy security point
(police station, security administration) to communicate the first sight
of security movement.
D. Setting up an armed guard to stop any attacks and to give space and a
chance
to escape.
Page | 184

5. Specifying what would happen in the event the police storm the place.
6. Those members going to the meeting should consider the following:
A. Making sure the enemy is not behind them while entering the
meeting place .
B. Do not go directly to the meeting place but through secondary places.
C. Not going to the meeting place as a group but individually, with periods of
time
between them.
D. Clothing and appearance must be suitable for the meeting place.
E. If the brother uses public transportation, he must get off before or after
the meeting location. In case he has a private car, he should park it
in a safe place not near the location that allows him to maneuver quickly at
all times.
F. Checking the proper cover for the documents you have with him.
G. If a member is armed, he must ensure that the weapon is in good
working condition.
Necessary security measures before the mobile meeting:
When a brother goes to a certain meeting (mobile meeting), he should go
over these things:
A. Is he sure that the enemy is not behind him or in the meeting place?
B. Who will find it?
C. Is there anything that might arouse suspicion?
D. Is this the first date or the second (alternative, changed)?
E. Does he know the meeting place in detail?
F. Are your appearance and clothing suitable for the meeting location?
G. Is your firearm in good working condition?
H. What is the alternative for each action?
I. Not going directly to the person he would like to meet, checking the
person's appearance and characteristics.

The immobile location of the meeting:


It is necessary that it have special characteristics to face any danger to the
members of the meeting:
1. The location should be in the middle of a group of houses, not at the
beginning.
2. Have many routes that lead to that location. That would assist getting in
and out to a great
extent. Therefore, it makes it difficult to go around the place and makes it
easier to escape from danger.
3. The location should not be close to suspicious locations where
individuals or establishments work with the security apparatus.
4. It is preferable that the apartment is on the ground floor and has a
telephone.

The mobile meeting (rendezvous) location:


1. The meeting location should be at the intersection of many roads where it
is easy to
come, go, and flee.
2. The meeting should be held away from places where some of the
elements are believed to deal with the security apparatus.
3. The place should not be crowded because that allows security personnel
to go
unnoticed.
Page | 185

4. It is necessary to have alternative locations and times. That would make


it difficult for
security personnel to monitor the place.
During the meeting:
The following should be observed:
1. Establishing a security plan consisting of the following:
a. Appropriate cover for the presence of the members (students, for
example, it is
necessary to have books, notebooks,…)
b. Verifying that the personal documents match the agreed cover.
c. Writing the address to the meeting place. If that is necessary, it must be
encrypted.
d. Not having or not leaving food or others that would reveal the presence of
many people.
and. Surrounding the place with the security system. That depends on the
importance of the meeting
and if there are items that cannot be carried during escape.
After the conclusion of the meeting:
1. Going out alone or in pairs, depending on the number of members
present.
2. Not driving directly on the main roads but the secondary ones.
3. Not talking about what was discussed in the meeting, during or after
dismissal.
4. Removing all observers after the departure of the members.
5. Not leaving anything that would lead to the discovery of people staying in
the
place except the owner.
Attacking and capturing one of the members.
1. Establishing a plan to repel the attack, which consists of the following:

a. Who will counterattack the enemy?


b. Who will flee with the important, the documents and who will burn the
rest?
c. Do not go directly to other locations in the organization.
d. Specify the roads and streets of the escape.
and. If the place is surrounded by the security system, make sure all
members
have left.
In case an individual is caught, the following must be done:
Executing what was agreed with the brother in the security plan.
If the brother has important job position (commander, one who knows the
locations of the arsenal, ...), whatever is necessary must be done before the
enemy
discovers anything.
Instruct all members not to go to the meeting location.
Inform all members of the phone number of that apartment to deceive the
enemy.
An example of a security plan for a group mission.
Page | 186

The assassination is a military means and basic security operation.


Therefore, it
is essential that commanders who establish plans related to the
assassination pay
attention to two issues:
First Edition: The importance of establishing a careful, systematic, and solid
security plan, concealing the operation from the enemy until the time of its
execution, which would
minimize losses should the execution attempt be discovered.
Second edition: The importance of establishing a tactical plan for the
assassination operation consisting of the operational factors, themselves
(the members, the
weapons, the hiding places ...) and the operation factors (time, place). In
this
example, we will explain the part related to the security plan in detail.
Security plan for the assassination operation:
The security plan should consider the following matters:
A. The commander:
The security apparatus should not know your whereabouts and movements.
All
security measures and arrangements related to members of the military
organization (soldiers,
commanders) apply to him.
B. The members:
1. Are the elements that are selected from various zones and are suitable
for
operation.
2. During the selection process, members must not know one another. They
must not
know the original planners of the operation. In case they do, the
commander must be notified. He must then modify the plan. It is also
possible to
say “kidnap an important person”. All security measures and
arrangements in
murder and kidnapping are the same.
3. They must be distributed as small groups (3 members) in the apartments
without
knowing except their owners. Field names must also be given.
4. During the selection process, consider whether your absence from your
families and jobs
would clearly attract attention. We also apply to them all the
security measures related to the individuals of the organization.
C. Method of operation:
1. About the weaponry and financing should not be known to anyone except
the commander.
2. The apartments must not be rented under real names. The apartments
must
undergo all the security measures related to the fields of the
military organization.
3. Before executing an operation, falsified documents must be produced for
the
participating individuals.
4. Documents related to the operation should be hidden in a safe place and
burned immediately after the operation, and traces of the fire should be
removed.
5. The means of communication between the operation commander and
the
participating brothers must be established.
Page | 187

6. Before the operation, the apartments should be prepared to hide the


brothers
who participate in it. These apartments are not to be known except to the
commander and
his soldiers.
7. Reliable means of transportation must be made available. It is essential
that before
the operation, these means are properly checked and maintained.
D. Interrogation and investigation:
Before executing an operation, the commander must instruct his soldiers on
what to say if they are captured. He must explain that more than once, to
make sure they have
assimilated it. They must, in turn, explain it back to the commander. The
commander should
also meet with each of them individually and go over the agreed upon
matters that
would be brought up during the interrogation:
1. The person who conceived, planned, and executed this operation was a
brother who has a
record of those matters.
2. During the questioning, each brother would mention a story that suits his
personal status and the province of his residence. The story must be agreed
with the
commander.
3. Each brother who is subjected to interrogation and torture, must indicate
everything that he
agreed with the commander and not deviate from it. Coordination must be
maintained with
all the siblings connected with the operation.
Note: The fictional brother who the brothers say conceived, planned, trained,
and executed the
operation, must be sent away on a trip out of the country.

Espionage

Page | 188

COMPILATION OF INFORMATION USING OPEN METHODS


Introduction:
Definition of espionage:
* It is the secret search for the examination of news and information of the
enemy
in order to use them when devising a plan.
* For details, refer to Spy Diary: Religious Duty and Human Necessity.
Principle of Muslims
spying on their enemies: Spying on the enemy is allowed and may even be a
duty in the event of war
between Muslims and others. Winning the battle is dependent on knowing
the secrets,
movements, and plans of the enemy. Since Islam is superior to all
human conditions and earthly religions, it allows spying for oneself but not
for others.
Majestic Allah says, "Not the same are the companions of the fire and the
companions of the garden," and of the
prophet it says, "Islam is supreme and there is nothing about it. Islam,
therefore, fights so that the
word of Allah can become supreme. Others fight for worldly and low gains
and
inferior goals.
An important question: How can a Muslim spy live among enemies if he
maintains his Islamic characteristics? How can he perform his duties to
Allah and not want to
appear Muslim?
Regarding the application of clothing and appearance Ibn Taimia has said,
“if a Muslim is in
a combat or an atheistic area, he does not force himself to look different
from his surroundings. The
Muslim man may prefer or even be compelled to resemble them, provided
their action brings them
a religious preaching benefit, learning their secrets and informing Muslims,
preventing their harm, or some other beneficial goal. "
Resembling the polytheist in religious aspect is a kind of "
need permits forbidden" even though the prohibited acts are basically
forbidden. As for
visible duties, such as fasting and praying, he can fast using any
justification for
not eating with them. As for the prayer, the book (al-Manhaj al-Haraki Lissira
al-Nabawiya)
quotes al-Bakhari that "he can combine the noon and evening [prayers],
sunset and
evening [prayers ]. That is based on the fact that the prophet - Allah bless
him and keep him - has
combined [the prayers] in Medina without fear or hesitation. "
Although scholars have disagreed on the interpretation of that tradition, it is
that the
Muslim spy combines the prayers. It is noted, however, that what is
prohibited to do is
illegal, such as consuming wine or fornicating. There is nothing that allows
those.

Guidelines for Beating and Killing Hostages:


Page | 189

Religious scholars have allowed defeat. In tradition, we find permission


to interrogate the hostage in order to obtain the information. It is allowed to
strike the non-believer
who has no covenant until he reveals the news, information, and secrets of
his
people.
Religious scholars have also allowed the killing of a hostage if he insists on
withholding information from Muslims. They allowed his slaughter so that
he did not inform
his people what he learned about the Muslim condition, number, and
secrets.
Scholars have also allowed the exchange of hostages for money, services,
and expertise, as well as secrets of the army, plans, and enemy numbers.
Importance of information:
1. Based on the enemy's up-to-date information, capabilities, and plans,
the organization's command can design good quality and safe plans.
2. Information on the enemy's intention provides
early warning signs for the command, which in turn makes proper
preparation and thwarts the
enemy's opportunity.
3. Information benefits the organization's command by providing
information
about the enemy's strengths and weaknesses.
4. Information benefits the organization's command by providing
information
about the movements of the enemy and its members.
Information requirements include:
1. Novelty,
2. Reliability,
3. Proximity,
4. Security,
5. Confirmation.
General Mahmoud Sheet Khattab said, “The nation that wants to achieve
victory over its
enemy must know that enemy very well. You must also know the battle site
in
detail. Those who fight an enemy that they do not know, do not win because
a
successful military plan must be built on clear and trustworthy information.
The commander who fights
an enemy and does not know his strength (number and material) is lost and
destined to fail. ''
Information sources:
Any organization wishing to raise the flag of Islam and proud, should
collect as much information as possible about the enemy.
The information has two sources:
1. Public
source : Using this public source openly and without recourse to illegal
means, it is
possible to collect at least 80% of information about the enemy. The
percentage
varies depending on the government's policy on freedom of the press and
publication.
It is possible to collect the information from newspapers, magazines,
books,
Page | 190

newspapers, official publications, and enemy broadcasts. Attention should


also be paid to the opinion, comments, and jokes of the people.
Truman, past American president, said, "We attribute our breakthrough to
our
press, because it gives America's enemies the ability to learn what we have
not
officially published about our plans and even our establishments."
In 1954, Allan Dulles, director of American intelligence [CIA], said, “I am
ready to
pay any amount of money to obtain information about the Soviet Union,
even
knowing that the Soviet Union obtains information simply by reading
American newspapers . "
The gathering of public information should be done by a regular person (
trained university graduate ) who examines the primary sources of
information published by the
enemy (newspapers, magazines, radio, TV, etc.). He must search for
information
directly related to the task of the moment.
Information gathering with this public method does not expose you to any
danger.
Any brother can collect the information from those sources already
mentioned. We cannot
label that brother a "Muslim spy" because he makes no effort to obtain the
unpublished and secret information.
2. Secret sources:
It is possible, with these secret and dangerous methods, to obtain 20% of
the information that
is considered secret.
The most important of these sources are:
A. Individuals recruiting as volunteers or for other reasons
B. Recording and supervision
C. Photograph
D. Interrogation
E. Documents: For burglary or recruitment
F. The drugging
G. Surveillance, espionage, and observation

Information it collects using public media:


A. Newspapers, Magazines, and Official Publications:
To collect enemy information:
The organization may use means such as magazines, publications,
newspapers, and
official printed matter . Through these media, it is possible to learn about
important
government events and about the news, meetings, and travel of presidents,
ministers, and
commanders.
The information can be:
Page | 191

1. Names and photographs of important government figures,


police commanders, and security leaders.
2. Published meetings. With these, one can learn about important decisions
and
issues that are discussed.
3. Future plans for the meeting.
4. Present and future enemy capabilities through current photographs of
projects and strategic sites or through meetings with senior officials.
5. Beneficial news about your present and future enemy plans and
diplomacy.
6. Tourism news and arrival times of foreign tour groups.
7. Ads about apartments for rent, vacant positions, or anything else
that is useful.
8. Ads about sale, rental of new and used car. These can be used in
assassination, kidnapping, and the overthrow of the government.
9. Learning of the enemy position regarding current Islamic issues (veil,
beard, dedication, Jihad, ...).
B. Radio and television:
The military organization can use these important public sources to collect
information all day and night.
The importance of these media is explained below.
1. Visual and audible news help the organization determine its
present and future plans .
2. Interviews can help identify government policy and its
general directories .
3. Staining the appearance of those who occupy high positions.
4. Learning the prevailing information diplomacy and its position on
contemporary issues.
5. Learning about the interior of important
government places and establishments during their opening ceremonies or
through advertisements.

Page | 192

COMPILATION OF INFORMATION USING SECRET METHODS


The necessary information from secret means:
The information needed to be gathered with secret means is of only two
types:
First: Information about government personnel, officials,
important personalities , and all related important information to those
(residence, place of work,
times to leave and return, wives and children, places visited)
Second: Information on strategic buildings, important establishments, and
military bases . Examples are important ministries such as those of defense
and
internal security , airports, ports, land border points, embassies, and radio
and
television channels.
General security measures that must be taken by the person who collects
the
information:
During the process of collecting the information, whether about
personalities or
government establishments , the person holding the meeting must take the
following security measures:
1. Execution of exercises to detect surveillance while executing the mission.
These
exercises are not well defined, but are dependent on time, place, and
ability to be creative.
These exercises include the following:
i. Walking down a cul-de-sac and observing who is walking
behind you. Beware of traps.
ii. Occasionally drop something from your pocket and watch who will pick it
up.
iii. Walking quickly then suddenly stopping in a corner and
observing who will be affected.
iv. Stopping in front of warehouse windows and observing who is looking at
you.
v. Getting off a bus, then getting on another, observing who performs the
same operation.
saw. Agreeing with one of his brothers to look for who is looking at him.
2. Upon receiving the collected information, let the informants travel as far
as possible from
your home and yours. Let each of them get there using the
secondary roads , preferably at night.
3. Gather as much information as you can without accentuating any
particular cue. Don't rush
or show urgency because your enthusiasm can uncover you and the
importance
of the information.
4. Avoid anything that reveals your identity quickly. Don't try to be too
creative or inventive.
5. Move slowly and travel a long distance. The person who is successful in
gathering the information is the person who is not known or visible.
6. Don't accept events at face value. Don't overlook a quick friendship or
an obvious conflict. Evaluate the importance of events and do not judge
them by their
appearance.
Page | 193

7. Don't talk vague or act mysterious unless wanting to get a “talker”


to
talk about what he knows.
8. Wear personal credentials and know all your content.
9. Before collecting information, make sure that all the needs related
to the mission, especially money, are ready.
10. Study the area where information gathering occurs carefully: Open to
closed streets, residents' manners, dress, and accent
11. No weapons are allowed during the information gathering process.
12. Find a cover before collecting the information.
Also, review all the security measures for members of the organization
covered in previous topics.
Methods of gathering information using secret means:
The military organization can obtain secret information using:
A. Surveillance, intelligence, and observation;
B. Theft:
C. Interrogation;
D. Enthusiasm;
E. Drugging;
F. Recruitment.
A. Surveillance, intelligence, and observation:
Civilian and military targets (personalities). Monitoring can be done on foot
or by car.
Surveillance on foot:
1. The brother or brothers who carry out the surveillance operation on foot
studies the
information available on the target (height, weight, the way of walking,
looking at a
recent photograph)
2. Knowing the habits, the places that he visits, and the target's
communications
3. Carefully study the area where the observation will occur: direct
and dead-end street names, residents' habits, and dress code.
4. Before the start of the surveillance mission, making sure of everything
you need
related to the mission, especially the money is resolved.
5. Agreeing on how communications with leaders will occur in the event of
that the surveillance plan (telephone, a person used for that purpose) is
uncovered.
The phone number should not be written but must be memorized.
6. Agreeing with special signals to exchange orders and
instructions between members of the surveillance team.
7. Know the steps to be taken when the target is lost, such as
contacting the leaders or something else agreed to.
8. It is not allowed to carry any weapon during the
information gathering process .
9. It is preferable to have a camera with the surveillance man in case the
target comes
into personal contact with others.
Car surveillance:
Page | 194
Car surveillance requires taking certain measures:
1. Inspecting the fuel, water, and lights of the car.
2. The car should be of a common type so it would not attract people's
attention.
3. The car must be in good condition and the driver must be experienced.
4. License plates must not contain real numbers. It is important to use a
false license plate and small numbers to prevent anyone from locating and
memorizing it.
5. The interior light of the car should be disabled to hide the identity
of the surveillance team members sitting inside.
6. The number and appearance of the car surveillance team members
should
match those of the target car.
Surveillance performance by car:
1. The car that is used for surveillance should follow the target's car during
surveillance operation, especially in crowded areas and on back streets.
The distance between the two cars depends on the circumstances.
2. If the target gets out of his car and starts walking, one of the
surveillance team members should get out and observe him.
3. Follow all measures already mentioned for foot surveillance.
Exercises to detect surveillance in car:
1. The surveillance car accelerates making sudden stops while observing
which vehicle is affected (this is done where there is not much traffic).
2. The surveillance car enters a cul-de-sac.
3. The surveillance car enters the opposite direction of traffic.
4. The surveillance car stops and goes backwards.
5. The surveillance car parks and leaves immediately.
6. The surveillance car takes a side road and stops.
A. Surveillance, intelligence, and observation (information on enemy
locations)
The organization's command needs detailed information on
vital enemy establishments , be they civilian or military, to make safe plans,
reach
firm decisions , and avoid surprises. Thus, the individual who collects
information about a
desired location must, in addition to drawing a diagram, describe it in all its
details.
Drawing: The sibling should draw a diagram of the area, street, and location
of the information gathering target. He must describe its shape and
characteristics. The
drawing must be realistic so that someone who has never seen the location
can
visualize it. It is preferable also to put the drawing the directions of traffic,
police stations, and security centers.
Description: You need to gather as much information about the location as
possible. For example:
a. Traffic directions and how wide the streets are
b. Transportation leading to the location
c. The area, appearance, and setting of the venue
d. Traffic signs and pedestrian areas
e. Security Personnel Centers and State Agencies
Page | 195

f. Embassies and consulates


g. The economic characteristics of the area and traffic congestion times
h. Public parks
i. Amount and location of lighting
It is preferable to photograph the area as a whole first, then the street of the
desired location . If possible, panoramic photographs should be taken. That
is, the collection of
photographs must be continuous in such a way that all photographs are
taken from one
location and that the conclusion of one photograph is the beginning of the
next. The photographer must
be experienced and knowledgeable in development work. When observing a
military installation or
field, we discourage taking photographs where it is prohibited. The sibling /
photographer should
use a modern camera that can photograph at night or from a distance, and
only the
camera lens should be visible. In gathering information about a military
camp, the brother
should draw a diagram of the total area of ​​the field, of the field itself,
and of its interior, if
possible.
The description of the base or the field should contain the following:
1. Location
2. Exterior form
3. Transportation to the place
4. Space (area)
5. The weapons used
6. Unit used in the field
7. Fortifications and tunnels
8. Protection poles and wire fences
9. Number and periods of illumination
10. Number of soldiers and officers.
11. Ammunition depot locations
12. Vehicles and automobiles
13. Commander's arrival and departure times
14. Degree and speed of mobilization
15. Brigades and company names
16. Sleeping hours and target
17. Telephone lines and means of communication
The brother who collects the information can begin a friendship with one of
the
soldiers or officers of that base. Information can be gradually and
easily collected from soldiers on field trips to bus or train stations, etc.
B. Gathering information with interrogation:
Security personnel in our countries arrest brothers and obtain the
necessary information through interrogation and torture.
Information is collected in this method by kidnapping an enemy individual,
interrogating him, and torturing him.
This source of information is not permanent. Also, caution should be
exercised
about deception by misinformation from enemy individuals. Thus, the
brother who interrogates
the hostage must possess the following characteristics:
1. He must have knowledge and mastery over the behavior and reactions of
people.
Page | 196

2. Must have a strong personality.


3. Must possess a sixth sense based on practice and experience.
4. You must be extremely patient.
5. Must be able to act, pretend, and mask.
6. Must be intelligent, observant, analytical, and deductive.
7. Must be able to establish an investigative plan.

C. Gathering Information with Recruitment:


Recruiting agents is the most dangerous task a sibling can perform.
Due to this dangerous task, the brother can be killed or imprisoned. Thus,
the task of
recruitment must be carried out by special members.
There are a number of reasons that could tempt a noncommittal person to
engage in intelligence work. These motives are:
1. Coercion and entanglement
2. Greed and love of money
3. Display of courage and the love of adventure
4. Love of fun and delirium
5. Mental and political orientation
6. Fear of being harmed
La organization can use motives No. 2, 3, 5, and 6 in recruiting.
Candidates for recruitment are:
1. Smugglers
2. Those seeking political asylum
3. Adventurers
4. Workers in cafeterias, restaurants, and hotels
5. People in need
6. Employees at borders, airports, and ports
Types of agents preferred by the American intelligence agency [CIA]:
1. Foreign officials who are disenchanted with the policies of their country
and are looking
towards the US ..
2. They consider the ideologue (who is in their county but against their
government ) a
valuable checkpoint and a good candidate for the American intelligence
agency [CIA].
3. Officials who have a lavish lifestyle and cannot continue to use their
regular wages, or those who have weaknesses for women, other men, or
alcoholic beverages. The agent who can be bought using the
aforementioned means is an easy target, but the agent who considers what
he does a
noble cause is difficult to recruit by enemy intelligence.
4. For that purpose, students and soldiers in third
world countries are considered valuable targets. Soldiers are the dominant
and controlling elements in
those countries.
Stages of recruitment:
Page | 197

Suppose the Islamic organization, with its modest capabilities, wants to


obtain
information about an important target (important personality, building, field,
agency,
ministry).

You have to do the following:


1. Find the agent: At this stage, the organization chooses the right person to
provide the information. The organization learns about that person: their
financial condition , their family status, their position with respect to the
government, and their weaknesses and
strengths.
2. Agent evaluation: In this stage, the agent is placed under continuous
observation to
learn the times of his departure and return from work, the places he visits,
the individuals he frequents, and his social interaction with others. which he
meets in
coffee shops, clubs, etc.
3. Approach to the agent: After gathering the information about him, a
relationship with him
develops under a certain cover, for example:
a. Family connection and tribal relationships.
b. Develop a friendship with him at the club, coffee shop, and
workers union . The [recruiting] brother develops the friendship as if it were
modest and unforeseen. The relationship should develop naturally and
gradually attract the attention of the target. Important note: In cases where
the first
sibling is unable to develop a friendship with the target, another sibling
takes
over after learning from the first about the target's weaknesses
(motives that can be exploited) such as his love for money,
opposition to the government, love of adventure, or the value of the
exhibition.
4. Recruitment of the agent: After finding, evaluating, and approaching a
target, comes
the second stage of recruiting him. Recruitment can be direct, that is, telling
the
agent frank about the job for the organization with a specific and agreed
salary.
A promise is secured in writing or verbally. Recruitment can be
indirect, that is, information can be taken from the target without
information that he is
an agent. That can be accomplished by giving her gifts, sharing her joys and
sorrows, and trying to solve her problems.
5. Agent test: In this stage, the agent is assigned certain tasks to test his
ability, loyalty, and dependability. The agent does not know that the
organization already has the
information sought. If the information supplied by the agent does not match
the
existing information of the organization, then the agent may be an
unreliable source of information or may attempt to mislead the
organization. During the
testing stage , the agent must remain under careful observation, monitoring
his every
move.
6. Agent training: This stage applies to the recruited agent, that is, the agent
who
has been directly recruited is aware that a certain organization for money or
other causes has recruited him. That agent: can be trained in the following:
i. Work secrecy and the means of gathering and hiding information
ii. The method of passing the information to officials
iii. Concealment and disguise
iv. Interrogation and resistance of interrogation
v. Explanation of the assigned mission in extreme detail
vi. Photography
Page | 198

7. There could be no training at all. The agent can be given freedom in his
work, relying on his instincts, talents, background, and the abilities of his
superior brother .
8. Treat the agent: The brother who manages the agent must possess the
qualifications of a
perfect spy, psychiatrist, and interrogator. There are two points of view in
dealing with the
agent:
First point of view: Maintain a strong personal relationship with the agent.
This
technique provides the agent with the motivation that tempts him to make
decisions to
satisfy his friend with the information. However, this technique has
disadvantages. The barriers between the agent and his superiors are
removed, and the agent
can ask for many things that were not agreed upon.
Second point of view: The person handling the agent treats him harshly and
pushes him to the limits in order to get as much information as possible.
This technique uses harshness, cruelty, and threats to constantly keep the
agent active.

The military organization can combine the two techniques. The agent may
be treated
in a thorough Islamic manner, while the managing brother appeals to his
Islamic agent association to conscience and through work for the religion of
Majestic Allah. He tricks the agent out of money and gifts, and uses
cruelty and kindness when appropriate.

9. Terminating agent services: This should occur when the following


events occur :
a. The recruitment mission ends,
b. Inability to work due to illness or changes in work situation,
c. Repeated errors in security measures,
d. The agent asks for termination.
Means to test the recruit:
1. By asking for the specific information that the organization knows well,
2. Supervision while doing his work,
3. Paying him excessively to know his reliability,
4. Giving him an opportunity to try to tamper with the work documents (
unimportant documents ).
Important advice on dealing with agents:
1. Do not send sealed packages to the agent or receive them from him.
These could be booby traps
.
2. Leaving something for the agent should be done as quickly as possible.
When the transport
and donor of an item are located in the exchange, it must not attract
attention
and lead to the arrest of the agent.
3. The financial status of the agent should be so controlled that the agent
does not
suddenly show great wealth. One portion of the payment must be given in
cash, while
the other must be deposited into a bank account.
4. When wishing to recruit an agent, you must follow a protocol. You can
arrange with
a friend that he invites, the person who is recruited, for dinner, or something
similar. While
that intermediary person is talking to him, he notices your friend's arrival,
greets you, starts talking with you, and invites you to sit down with the
person
you want to recruit.
Page | 199

5. When meeting with the agent, make sure that neither he nor the meeting
place is
supervised. Do not go into a place to meet with an agent before he does.
There could be a catch for you.
6. If you wait for your agent at the agreed location, you could be a target for
him.
Be especially careful if he goes to the bathroom. Once, in Belgium, an
Israeli Mossad officer recruited an Arab agent. A few minutes after they sat
down,
the Arab agent said he had to go do something. When he returned, the Arab
agent pulled out
a pistol and shot the Mossad agent several times.
7. To communicate with the agent, it is necessary to specify locations such
as parks,
an area of ​​the university campus, and so on.
8. It is necessary to communicate with the agent, learn about his problems
and requests,
help him as much as possible, raise his morale, and continually renew his
confidence.

Bibliography

 Edition of the Army of the United States of North America, published and
edited by the
University of the Americas, published digitally by Equipo Nizkor and
Derechos
Humanos Rights, on 4 / nov. / 01.
 Escape and Escape, Lt. Leonardo de Benedictis - RI M 10
 Mini Manual of the Urban Guerrilla Carlos Marighella / June 1969
 Follow-up techniques on foot I, L. Domelhajer
 Follow-up techniques on foot II, L. Domelhajer
 Manual “El al” or Manual de Al Qaeda published by the FBI on its
official website
http://www.fbi.gov
 Al-Morabitoun Magazine, Issue No. 6
 Abdullah Ali's Al-Salama: Military Espionage in Islam, pp. 253-258.

You might also like