Download as pdf or txt
Download as pdf or txt
You are on page 1of 169

SS Werwolf

Combat Instruction Manual

Translation by Lt, Michael C. Fagnon


Werewolf
Werewolf
Tips for Guerrilla Units

Contents
Contents
I. The Guerrilla
Guerrilla War
A. Nature
Nature of Guerrilla
Guerrilla Warfare………………………….
Warfare ............................... 01
01
B.
B. Organization……………………….............................
Organization ........................... 02
C.
C. Command
D.
D. Prospects
Principles
Prospects of Success
..........................
Command Principles……………….............................
Success and Boundaries………………..
03
03
Boundaries .................... 06

Leaders
II.
II. Formation
Formation of Guerrilla
Guerrilla Units
A. General
General Requirements……………………………….
Requirements ..................................... 07
B.
B. Leaders……………………………............................ 07
C.
C. Men………………………………………………….
Men .......................................................... 07
D.
D. Order of Battle……………………............................
Battle ............................. .. 07
E.
E. Armament…………………………............................
Armament .............................. 08
F.
F. Equipment…………………………………………..
Equipment .................................................. 09
G.
G. Clothing……………………………………………..
Clothing ..................................................... 09

III. Training
Training
A. Fundamentals……………………………………….
Fundamentals .............................................. 10
10
B.
B. Utilization
Utilization of Terrain
Terrain and Camouflage……………..
Camouflage ................. 10 10
C.
C. Navigation
Navigation in Terrain……………………………….
Terrain ..................................... 15
15
D.
D. Reporting
Reporting and Communications……………………
Communications ........................ 17 17
E.
E. Close-Quarter Battle………………………………..
Close-Quarter Battle ...................................... 18
18
F.
F. Roadblocks…………………………………………
Roadblocks ................................................ 19
19

IV. Tactics
Tactics
A. Reaching
Reaching the Operational
Operational Areas……………………..27
Areas ..........................27
B.
B. Selection
Selection of Targets
Targets for Destruction
Destruction and Combat….
Combat. . .. 29
C.
C. Reconnaissance
Reconnaissance and Intelligence…………………...
Intelligence ........................ 29
D.
D. The March………………………………………….
March ................................................. 31 31
E.
E. Checkpoints
Checkpoints for Planning…………………………..
Flaming ................................ 33
F. Interdiction
Interdiction Operations……………………………..
Operations ................................... 33
G.
G. Ambush……………………………………………..
Ambush ..................................................... 35
H.
H. Raids…………………………………………………
Raids ......................................................... 39
I. Disengagement……………………………………..
Disengagement ............................................ 40
Securing the Rest Area
J. Securing Area……………………………..
................................... 42
K.
K. Protection Against Countermeasures………………
Protection Against Countermeasures .................. 43

V.
V. Action Against Enemy
Action Against Enemy Agitation……………………....
Agitation ............................ 44

VI. Accommodation
Accommodation and Food Supply Supply
A. Shelters……………………………………………..
Shelters ..................................................... 46
B.
B. Heating
Heating and Cooking
Cooking Fires…………………………
Fires .............................. 50
C.
C. Water……………………………………………….
Water ....................................................... 51
51
D.
D. Latrine
Latrine and Waste………………………………….
Waste ........................................ 5151
E.
E. Food Supply,
Supply, Sustenance………………………….
Sustenance ............................... 51 51
F. Emergency
Emergency Rations………………………………..
Rations ...................................... 54

Appendix 1:
Appendix 1: Guidelines
Guidelines for the Equipment
Equipment of the Guerrilla
Guerrilla

Soldier………………………………………………………………..
Soldier .......................................................................... 55
55

Appendix 2:
Appendix 2: Instructions of the March
Instructions for the Use of March Compass……….
Compass .......... 57

Appendix 3:Airborne
Appendix 3: Airborne Operations……………………………............
Operations.........................r................... 58

Appendix A: Digital
Appendix Digital and Modern
Modern Methods………………………….
Methods ............................... 59
59

Appendix B: Modern
Appendix Modern Weapons
Weapons Outline
Outline

Appendix C: Enemy
Appendix Enemy Tactics
Tactics and Guerrilla
Guerrilla War
Guerrilla War
I. The Guerrilla
of Guerrilla Warfare
11.. Nature of

The guerrilla
guerrilla war that is conducted
conducted in a hard, determined
determined fashion,
fashion, and with
with clear political
political aims, is
an effective
effective means
means to assist one’s own military,
military, and political
political struggle,
struggle, and to harass
harass and paralyze
paralyze
the enemy’s
enemy’s war effort,
effort, economy
economy and politics
politics through
through military
military subsidiary
subsidiary actions.
actions. In the guerrilla
guerrilla
of numbers
war the lack of numbers and material
material is compensated
compensated for through
through special
special combat tactics, better
combat tactics, better
knowledge of the land, daring
knowledge daring decisions,
decisions, cunning
cunning deception
deception and utmost
utmost determination.
determination.

The guerrilla
guerrilla war is not a momentary
momentary substitute,
substitute, but an essential part of modern
essential part warfare. In
modern warfare.
desperate
desperate situations
situations it is the ultimate
ultimate means
means to defend
defend freedom
freedom and life of nation
nation to the utmost.
utmost.
Conducted
Conducted conjunction with general
conjunction with general military
military operations,
operations, clear political
political objectives
objectives and qualified
qualified
means
means the guerrilla
guerrilla war can lead to success
success of decisive
decisive importance.
importance. This is particularly
particularly the case
in a long war and in times
times of political upheaval.
political upheaval.

The guerrilla
guerrilla war is conducted
conducted in the frontline, flanks, but most of all in the rear
frontline, the flanks, rear of the enemy
enemy
and his country,
country, in enemy
enemy occupied
occupied areas and in countries
countries that are allied with
with the enemy
enemy or are
important
important to his war effort,
effort, economy
economy and politics.
politics.

Aims of guerrilla
Aims of warfare are:
guerrilla warfare

a) To harass,
harass, lie down
down and destroy
destroy enemy
enemy forces.
forces.

b) To harass
harass and destroy
destroy the enemy’s
enemy’s supplies,
supplies, his transport
transport means,
means, his communications
communications
network, and his industrial
network, industrial and supply facilities.
facilities.

c) To exterminate
exterminate all the enemy’s
enemy’s helpers
helpers and frustrate
frustrate all enemy
enemy measures through ruthless
measures through ruthless
combat.
combat. Violence
Violence against
against terror!
terror!

d) To support
support any regular army
any regular army reconnaissance,
reconnaissance, intelligence
intelligence and espionage.
espionage.

1
2. Organization
The organization
organization of guerrilla
guerrilla warfare
warfare has to adapt to the war situation,
situation, the terrain
terrain and the extent
extent
of control
control that the enemy
enemy exerts over the operational
operational area.
a) The guerrilla
guerrilla war is supported
supported by frontline troops through
frontline troops through raids,
raids, reconnaissance
reconnaissance patrols
patrols
and special assault
assault detachments.
detachments. Cut off off units,
units, groups
groups of stragglers
stragglers and soldiers
soldiers on
evasive
evasive action also support.
support.
These
These missions
missions in the frontline
frontline area are mostly
mostly of short duration.
duration. Every
Every arising
arising
opportunity
opportunity for such guerrilla
guerrilla action must be exploited
exploited quickly
quickly and skillfully
skillfully by all units
units
of the Wehrmacht.
Wehrmacht. The troopstroops are to be educated
educated to solve these
these tasks by resourceful
resourceful
improvisation.
improvisation.

b) It is the task of special


special assault
assault detachments
detachments to bring combat
combat action
action to the enemy’s
enemy’s rear
area through
through carefully planned and far-sighted
carefully planned far-sighted missions.
missions. These
These missions
missions are the backbone
backbone
of guerrilla
guerrilla warfare.
warfare. Special
Special assault detachments are also used
assault detachments used to unleash
unleash and support
support the
fight of local resistance
resistance groups.
groups.

c) Originating
Originating out of the population,
population, the guerrilla
guerrilla war is conducted
conducted by local resistance
resistance
movements.
movements. Without
Without support
support from the population
population or an armed power resistance
armed power resistance groups
groups
cannot
cannot sustain
sustain themselves
themselves for long. This support must therefore
therefore be achieved
achieved and held by all
means.
means.

The strength
strength of employed units must be kept limited
employed units limited so that maneuverability
maneuverability as well as the
potential to hide camouflage
potential camouflage and rigidly
rigidly direct
direct command
command and control
control are maintained.
maintained. It is
therefore better
therefore better to form new
new independent units instead
independent units instead of enlarging
enlarging existing
existing ones.
Guerrilla
Guerrilla warfare executed with a large number
warfare can only be executed number of small units independently
independently
employed,
employed, but under
under one command.
command.

2
3. Command Principles
The most important
important command
command principles
principles for guerrilla
guerrilla warfare
warfare are the combination
combination of of clear
methodical
methodical planning
planning with ruthless
ruthless daring
daring in the execution
execution of an operation.
operation. Careful
Careful and thorough
thorough
examination
examination of the possibilities necessary when
possibilities for success is necessary when initiating
initiating the guerrilla
guerrilla war.
The guerrilla
guerrilla war is executed
executed in 3 stages:

a) When
When beginning
beginning the guerrilla
guerrilla war,
war, it is necessary
necessary to limit action
action to passive
passive resistance,
resistance,
one-man
one-man operations,
operations, or smallest
smallest size guerrilla
guerrilla groups,
groups, especially
especially if the situation
situation is
unclear, the terrain
unclear, terrain unfavorable,
unfavorable, or it the enemy
enemy exerts tight observation
exerts tight control. At
observation and control.
this stage secret harassment
harassment and destruction
destruction missions
missions have the priority
priority over combat
combat
actions.
actions.
b) Missions
Missions of guerrilla
guerrilla groups,
groups, and guerrilla
guerrilla platoons
platoons in the strength
strength ofof several
several guerrilla
guerrilla
groups, with combat
groups, with combat and larger destruction missions are only possible
destruction missions possible in favorable
favorable terrain
terrain
with the support
with support of the population
population and when
when the general
general situation
situation is clearly
clearly understood.
understood.
c) The last stage of the guerrilla
guerrilla war is the deployment
deployment of the guerilla
guerilla task forces.
forces. This is
possible in weakly
possible weakly secured
secured areas,
areas, with the help of the population
population or the regular
regular army,
army, or
with enduring
with enduring support
support and resupply
resupply by air.

Larger
Larger unit stages
stages must include
include the foregoing.
foregoing. It must be avoided, when operations
avoided, that when operations of larger
larger
units are instituted,
units instituted, that those
those of the small and smallest units are stopped.
smallest units stopped.
Greatest
Greatest care must be taken
taken when
when converting
converting from the combat
combat form ofof the last siege of guerrilla
guerrilla
war to the general
general uprising
uprising of the population,
population, and thus to the form and style of regular
regular war.
war.
Premature
Premature timing
timing for the uprising
uprising of the concentrated
concentrated popular
popular masses
masses can destroy
destroy all
achievements
achievements that have been won by guerrilla
been won warfare up
guerrilla warfare up till then.
then.

In general planning as well


general planning well as with
with each mission,
mission, the command
command must be dedicated
dedicated to avoiding
avoiding
serious
serious setbacks, because in guerrilla
setbacks, because guerrilla warfare
warfare setbacks
setbacks are much graver
graver than in regular
regular warfare.
warfare. It
is especially
especially important
important to avoid open
open confrontation with the superior
confrontation with superior enemy forces. After
enemy forces. After a
successful
successful raid and immediate
immediate far-reaching withdrawal is advised.
far-reaching withdrawal advised.

Thorough reconnaissance is the prerequisite


Thorough reconnaissance prerequisite in order to avoid
avoid superior
superior enemy
enemy forces
forces and choose
choose
profitable targets.
profitable targets. The guerrilla
guerrilla war can only be conducted
conducted if one’s own reconnaissance
reconnaissance is
superior
superior to that of the enemy.
enemy. This is ensured
ensured by skillful of scouts, through
skillful use of through help from the
population, but most of
population, of all by using informants along with an excellent
using informants excellent information
information and
communications
communications network.
network. Knowledge
Knowledge of the country
country and local area will
will simplify reconnaissance
simplify reconnaissance
and often make
make difficult
difficult and enduring
enduring exploration unnecessary.
exploration unnecessary.
Careful planning must unite
Careful planning itself with ruthless
unite itself ruthless and daring
daring boldness when carrying
boldness when carrying out a mission.
mission.
Untiring
Untiring and never
never lessening
lessening aggressiveness
aggressiveness and activity
activity are the most
most important prerequisites of
important prerequisites
success.
success. The enemy
enemy must be hit, and the initiative taken again and again.
initiative taken again. Defensive
Defensive actions
actions are
only a last means
means of self-defense
self-defense in guerrilla warfare.
guerrilla warfare.

3
Surprise
Surprise over the enemy
enemy is achieved
achieved by secrecy,
secrecy, cunning
cunning in planning
planning and daring raids. Surprise
daring raids. Surprise is
the queen
queen of the art of the guerrilla
guerrilla warfare.
warfare. Greatest possible maneuverability
Greatest possible maneuverability of the small
guerrilla
guerrilla units,
units, avoiding
avoiding all patterns, using tricks
patterns, using tricks and ruses,
ruses, exploitation
exploitation of darkness
darkness and terrain,
terrain,
quick
quick comprehension
comprehension and mastering
mastering of of situations,
situations, careful
careful camouflage,
camouflage, ambushes, raids and secret
ambushes, raids
destruction
destruction missions
missions are the means
means by which
which surprise
surprise is achieved.
achieved.

Psychological
Psychological warfare
warfare must
must go
go hand-in-hand
hand-in-hand with combat
combat activities.
activities. Every possibility
possibility to waken
waken
and strengthen
strengthen the will for resistance
resistance in the population,
population, to wear
wear down the enemy’s
enemy’s morale
morale and
undermine his prestige
undermine prestige must
must be used.
used. The choice
choice of the operational
operational area for guerrilla
guerrilla units
units is the
task of the higher
task higher command.
command. Points to be considered
considered are:

a) The requirements
requirements of the political
political and regular
regular army
army high command;
command;
b) The result of reconnaissance
result of reconnaissance and intelligence;
intelligence;
c) The suitability
suitability of terrain;
terrain;
d) The possibilities
possibilities for resupply.
resupply.
a) The requirements
requirements of the regularregular army
army high command
command are the most important
important
considerations
considerations in guerilla warfare.
guerilla warfare.
The following
following tasks
tasks may
may be assigned:
assigned:
aa) To initiate
initiate and support
support the local guerrilla warfare ambitions
guerrilla warfare ambitions in the enemy’s
enemy’s sphere of
influence as a means
influence means of political
political pressure
pressure and to disrupt
disrupt his war industry.
industry.
bb) Obstruction
Obstruction of the enemy’s troop deployment.
enemy’s troop deployment.
cc) Preparation
Preparation of the guerrilla unit’s own,
guerrilla unit’s own, far-reaching
far-reaching attack operations
operations through
through local
reconnaissance, harassment of the rearward
reconnaissance, as well as harassment rearward connections
connections of the enemy.
enemy. In the last days
and hours before
before the attack, these activities
attack, these activities should be increased up to a temporary
increased up temporary paralyzation
paralyzation of
enemy
enemy command,
command, control
control and communications
communications centers
centers as well
well as massive
massive interruption
interruption of
trafficways. In the further
trafficways. further course
course of the attack,
attack, the guerrilla units can be of valuable
guerrilla units valuable assistance
assistance to
the advancing
advancing friendly troops.
fiiendly troops.
dc) Cover
Cover of retrograde
retrograde operations of the friendly
operations of friendly forces through
through actions
actions against flanks
against the flanks
of pursuing
pursuing enemy
enemy attack
attack spearheads,
spearheads, and against enemy, that are
against the supply lines of the enemy,
lengthened
lengthened in the course
course of his attack,
attack, and thus are vulnerable targets.
vulnerable targets.

ee) Combat with all means


Combat with means to gain time in periods
periods of weakness
weakness and after serious attacks
attacks in
regular After a collapse
regular war. After collapse and in seemingly
seemingly hopeless
hopeless situations,
situations, this fight
fight in the areas where
where
the enemy
enemy is most vulnerable
vulnerable must under ruthless self-sacrifice
under ruthless self-sacrifice be increased
increased to the utmost
utmost
effectiveness.
effectiveness.

b) The result their own and the regular


result of their regular army reconnaissance gives the guerrilla
army reconnaissance guerrilla command
command
information
information as to how far the requirements
requirements of the regular
regular war high command
command can be
satisfied
satisfied and where
where especially
especially valuable targets are found.
valuable targets found. Often the guerrilla
guerrilla command
command
will exploit political or military
exploit political possibilities for combat
military possibilities combat actions
actions independently.
independently.
c) The sustainability
sustainability of terrain
terrain in the planned
planned operational
operational area must be determined
determined through
through
reconnaissance or judged by men familiar
reconnaissance familiar with the country,
country, because
because it strongly
strongly
determines
determines the combat possibilities and combat
combat possibilities combat forms.
forms.

4
d) The attitude
attitude of the population
population is of equally
equally large importance
importance for the choice
choice of the
operational
operational area. A hostile
hostile attitude
attitude can make
make operations
operations even against
against important
important targets,
targets,
almost
almost impossible.
impossible. Sufficient
Sufficient support
support from the population
population on the other hand makes
missions
missions against
against a number
number of less valuable
valuable targets
targets profitable
profitable because
because of the accumulating
accumulating
effect.
effect.
e)
6) The possibilities of resupply,
possibilities of resupply, by land, by sea or by air, must
must be considered
considered thoroughly.
thoroughly.
They are contributory
contributory factors
factors for the choice
choice of the operational
operational area and ofof prime
prime
important
important for the length
length of operations.
operations.

5
4. Prospects
Prospects of Success and Boundaries
Boundaries
The prospects
prospects of success
success by means
means of guerrilla warfare are determined
guerrilla warfare determined by the political,
political, military
military
and economic
economic situation,
situation, the terrain,
terrain, population
population density,
density, traffic
traffic infrastructure, national
infrastructure, national
characteristics
characteristics and religious
religious habits,
habits, the attitude
attitude of the population
population and most of all, by the
toughness and combat
toughness combat effectiveness
effectiveness of the employed
employed guerrilla units.
guerrilla units.
Without
Without a clear political
political will,
will, the guerrilla
guerrilla war can achieve
achieve only temporary
temporary success,
success, even if
conducted with tactical
conducted with tactical skill. On the other hand, quick
quick and lasting
lasting consequences
consequences can be expected,
expected,
if the political
if political and military
military high command recognize and exploit
command recognize exploit the advantages
advantages that the guerrilla
guerrilla
operations
operations have achieved.
achieved. This must be done in timely
timely fashion
fashion and with utmost determination.
with utmost determination.

The necessity
necessity of a reliable
reliable support network through
support network through secret assistance
assistance by the population
population in the
operational
operational area,
area, dependence
dependence on help through
through strong friendly
friendly forces
forces or continuous resupply by
continuous resupply
air, sets certain
certain boundaries
boundaries for the prospects
prospects of success of guerilla
guerilla warfare.
warfare.

The terrain
terrain strongly
strongly determines possibilities and combat
determines the possibilities combat means
means of the guerrilla war. Covered
guerrilla war. Covered
strongly
strongly undulated
undulated terrain
terrain with insufficient traffic
with insufficient traffic infrastructure,
infrastructure, poorly
poorly passable terrain, and
passable terrain,
most of all wooded
most wooded areas and mountains
mountains assist guerilla
guerilla missions.
missions. Open terrain
terrain with high
population density
population density and a well-developed
well-developed traffic
traffic infrastructure presents great problems
infrastructure presents problems for the
conduct
conduct of guerrilla
guerrilla warfare.
warfare. Large cities and industrial
industrial areas offer after adequate
adequate adaptation of
adaptation of
the organization
organization forms,
forms, good possibilities
possibilities for guerrilla
guerrilla actions.
actions. This is especially
especially the case in the
ruins of destroyed
ruins destroyed larger settlements.
settlements.

6
II. Formation of Guerrilla Units
General Requirements
1. General Requirements
In the guerrilla war, it is not the strength
guerrilla war, strength of the employed units and the mass of their weapons
employed units weapons
that give success,
success, but the inner strength
strength of the guerrillas,
guerrillas, their daring
daring craftiness
craftiness and ingenuity
ingenuity in
exploiting
exploiting all favors
favors of the terrain
terrain and helpful means. When
helpful means. When forming
forming and reinforcing
reinforcing guerrilla
guerrilla
units, consideration
units, consideration must be taken taken of these
these factors.
factors. Still able are volunteers
volunteers who besides
besides
enthusiasm
enthusiasm and willingness
willingness have the doggedness,
doggedness, toughness
toughness and ingenuity needed. Gaps in their
ingenuity needed. their
military training
military training can be closed.
closed. The variety
variety of tasks performed
performed by a guerrilla makes it
guerrilla unit makes
necessary that it not only include
necessary include good soldiers,
soldiers, but also men with technical
technical and practical
practical skills,
and such with political
political and propagandistic
propagandistic abilities.
abilities.

2. Leaders
The correct
correct choice
choice and training
training of the leaders
leaders is of decisive
decisive importance.
importance. The leader of a guerrilla
guerrilla
unit should be demanding himself and others,
demanding of himself when conducting
others, when conducting his mission.
mission. On the other
hand, he must provide
provide never-ending
never-ending concern
concern for the welfare
welfare of his men,
men, this maintaining
maintaining the
battle-worthiness
battle-worthiness of his unit.
unit. His daringness
daringness as a combatant,
combatant, his leadership
leadership success
success and his
unconditional fairness
unconditional fairness must waken
waken confidence.
confidence. Confidence
Confidence is the fundamental
fundamental of leadership
leadership in
guerrilla
guerrilla units.
units. The authority
authority of the leader personality, not on rank
rests solely on his personality,
leader rests rank and
insignia.
insignia. The leader
leader of a guerrilla
guerrilla unit carries
carries a high
high measure
measure of responsibility.
responsibility. He has the same
rights as the commander
rights commander of an independently
independently operation battleship, and he may
operation battleship, may impose
impose any
any
punishment -- even death
punishment death -- to keep
keep up
up discipline.
discipline.
Besides
Besides military proficiency and personality,
military proficiency personality, a feeling
feeling for political
political and propagandistic
propagandistic
possibilities is of high value for the leader
possibilities leader of a guerrilla unit.
guerrilla unit.

3. The Men
The guerrilla
guerrilla must be an excellent
excellent soldier and unite
unite the capabilities
capabilities of an infantry
infantry man with
with those
those
of an engineer.
engineer. Furthermore,
Furthermore, his mission requires from him a close relationship
mission requires relationship to nature,
nature,
frugality
frugality and ingenuity
ingenuity in the exploitation
exploitation of all means
means and makeshifts
makeshifts available.
available. Through
Through his
behavior towards the population,
behavior towards population, he must win the confidence
confidence and respect
respect of all freedom-loving
freedom-loving
people. Weaklings
people. Weaklings and traitors
traitors fear him like the plague.
plague. It is important
important that a large number
number of the
men know
know the operational
operational area and are in command
command of the language
language of the country, yes even of
country, yes
the local dialect. Acquiring and training
dialect. Acquiring training radio
radio operators
operators in due time
time must not be neglected
neglected in any
any
case. Even women
women may
may be suitable.
suitable.

of Battle
4. Order of Battle
The strength
strength of the guerilla
guerilla unit must adjust itself to the enemy
adjust itself enemy situation,
situation, the mission
mission and the
terrain. In areas under
terrain. tight observation
under tight observation and with insufficient cover and concealment,
with insufficient concealment, it is only
possible to operate
possible operate in smallest-size
smallest-size groups,
groups, which
which at the utmost
utmost may temporarily be united
may temporarily united for a
common
common mission.
mission. In sparsely
sparsely occupied
occupied areas or terrain with good possibilities
terrain with possibilities for cover
cover and
concealment,
concealment, stronger
stronger units can hold themselves.
themselves. But even these
these units must always
always be structured
structured

7
into groups
groups and platoons.
platoons. The smallest
smallest independently
independently operating unit is the guerrilla
operating unit guerrilla group.
group. It
consists
consists of 11 leader and 4 guerrillas.
guerrillas. Under
Under difficult
difficult circumstances
circumstances and for special tasks, tasks,
reconnaissance or destruction
reconnaissance destruction missions,
missions, even smaller
smaller guerrilla teams may
guerrilla teams may be employed.
employed.
Formation
Formation of stronger
stronger groups of doubtful
groups is of doubtful usefulness.
usefulness. The guerrilla
guerrilla platoon
platoon consists
consists of several
guerrilla
guerrilla groups
groups and a command
command squad with an overall
overall strength
strength of 1010 leaders
leaders and 40 guerrillas.
guerrillas.
Guerrilla platoons are to be employed
Guerrilla platoons employed where
where terrain
terrain and the enemyenemy situation permit it.
situation permit it. In
especially
especially favorable
favorable situations,
situations, for example
example in poorly
poorly secured,
secured, densely wooded, or mountainous
densely wooded, mountainous
areas and when
when the guerrilla unit’s effect on the situation
guerrilla unit’s situation in the operational
operational are has progressed
progressed
sufficiently,
sufficiently, guerilla task forces
guerilla task forces which
which consist
consist of several
several platoons,
platoons, are to be formed.
formed. The
following
following assignment
assignment of command tasks has proven
command tasks itself effective
proven itself effective for larger guerrilla platoons
guerrilla platoons
and guerrilla task forces.
guerrilla task forces.

a) Leader
Leader
b) Leader
Leader of the reconnaissance
reconnaissance service
service and the command
command squad
c) Leader
Leader for political
political questions
questions
d) Leader
Leader of the signals squad
e) Weapons
Weapons and material warder
material warder
f) Doctor
Doctor or medical
medical orderly
orderly
g) Cook
h) Mess sergeant
sergeant and accountant
accountant

In smaller
smaller guerrilla
guerrilla platoons,
platoons, several tasks
tasks must be united.
united. A back-up
back-up must be named
named and
instructed
instructed in the tasks
tasks so that casualties
casualties do not cause interruptions.
interruptions. When
When the guerrilla
guerrilla
warfare has grown
warfare grown to have even greater
greater importance
importance in an area a local secret command
command
staff must be set up.
staff up. Liaison
Liaison officers
officers are to be attached
attached to it.
it.

5. Armament
The armament
armament of the guerrilla units must be light. It must not hinder
guerrilla units hinder maneuverability,
maneuverability, but
on the other hand should enable enable a destructive
destructive firepower
firepower in worthwhile
worthwhile close-range
close-range
targets. In the guerrilla
targets. guerrilla groups
groups some of the guerrillas
guerrillas must be therefore
therefore equipped
equipped with
rifles. Pistols
rifles. Pistols and daggers
daggers may
may also be of value.value. Hand grenades
grenades are indispensable.
indispensable.
Additionally, depending
Additionally, upon the mission,
depending upon mission, explosives
explosives are added to the equipment.
equipment. It is
very
very advantageous
advantageous to use a suppressed
suppressed weapon
weapon and to have a sniper rife. rife. Also,
Also, some of
weapons should be equipped
the weapons with luminous
equipped with luminous sights. It may
may become necessary to equip
become necessary equip
the guerrilla
guerrilla platoons
platoons with several
several machine
machine guns
guns and bazookas
bazookas for certain
certain missions.
missions.
Especially
Especially in the mountains,
mountains, it is advantageous
advantageous to take along
along mortars.
mortars. Depending
Depending uponupon
the situation
situation and the mission,
mission, guerrilla
guerrilla task forces
forces must carry
carry heavier
heavier high angle-
angle- and
anti-tank weapons. A uniform
anti-tank weapons. uniform caliber
caliber of the armament
armament is important
important because
because of
ammunition resupply. Especially
ammunition resupply. Especially suited are all weapons calibers that are common
weapons with calibers common in
the operational
operational area. Supplementation
Supplementation and replacement
replacement of arms through
through procurement
procurement of
enemy weapons is always
enemy weapons always a good policy.
policy. In difficult
difficult supply situations, raids to obtain
situations, raids obtain
weapons and ammunition
weapons ammunition must be conducted.
conducted.

8
6. Equipment
Equipment
The equipment of the guerrilla
equipment of guerrilla soldier and the whole
whole guerrilla unit must be adapted
guerrilla unit adapted to the
circumstances
circumstances and the situation
situation in the operational
operational area. It must be so light that
maneuverability
maneuverability is not restricted. Appendix 11 may
restricted. Appendix may serve as a guideline.
guideline. It is best to carry
carry
most necessary
the most necessary equipment
equipment pieces
pieces directly
directly on the body,
body, so that the guerrilla
guerrilla is still
combat ready after losing
combat ready losing or having
having to temporarily
temporarily hide his rucksack. of
pieces of
rucksack. All pieces
equipment
equipment that are not constantly
constantly carried
carried along must be hidden
hidden in concealed
concealed caches
caches in the
operational
operational area. Suitable waterproof containers
Suitable waterproof containers are needed, therefore.
needed, therefore.

7. Clothing
Clothing
The clothing
clothing must be adapted
adapted to the climate
climate of the operational
operational area,
area, the task, and the
duration
duration of the mission.
mission. The uniform common with the infantry
uniform common infantry ranger
ranger units of the Army
Army
is best suited. Except
Except in large towns,
towns, the clothing
clothing of the peasant
peasant population
population in the
operational
operational area may
may always used in emergencies.
always be used emergencies. Kidney warmers are good to keep
Kidney warmers keep
healthy.
healthy. It has proven
proven useful
useful to take along
along several thin undergarments instead of one thick
undergarments instead thick
one. Thus, several different
different layers
layers can be worn
worn over each other,
other, enabling
enabling a better
better
adaption
adaption to the existing weather. The clothes
existing weather. clothes must
must be impregnated
impregnated against
against lice. Shoes
with rubber
with rubber soles, or sports shoes, are useful
useful for special
special missions.
missions.

9
III.
111. Training

Fundamentals
1. Fundamentals
Good infantry training is of great value to the guerrilla.
infantry training guerrilla. Where
Where it is lacking,
lacking, the most
important
important branches
branches must be taught
taught to mend. Weapons training, marksmanship,
Weapons training, marksmanship, utilization
utilization
of the terrain
terrain and combat
combat training, close-quarter tank destruction
training, close-quarter destruction and guerrilla battle
guerrilla battle
techniques in squad, group
techniques group and platoon
platoon formations must be taught.
formations must taught. Furthermore,
Furthermore, engineer
engineer
training is necessary
training necessary to the extent that each guerrilla
guerrilla has a basic
basic knowledge
knowledge of installing
installing
barriers obstacles and can work
barriers and obstacles work with demolitions.
demolitions. As manymany guerrillas
guerrillas as possible
possible
must be instructed
instructed in the special field of destruction
special field destruction and sabotage techniques. A practical
sabotage techniques. practical
instruction first aid is indispensable
instruction in first indispensable because of the possibilities
because of of becoming
possibilities of becoming wounded.
wounded.
The following
following principles valid for all training
principles must be held as valid phases:
training phases:

All branches
branches must be adapted
adapted to the special
special requirements
requirements of guerrilla
guerrilla warfare,
warfare, living in
field and night
the field night combat.
combat. Everything
Everything not necessary
necessary must be dispensed
dispensed with.
with. Important
Important
aspects
aspects must be repeated
repeated again and again.
again. It is more important
important to maximize
maximize
maneuverability, the capacity
maneuverability, capacity to adapt,
adapt, the ingenuity
ingenuity and the “hunter”
“hunter” instinct than it is to
instinct than
drill the men.
2. Utilization
Utilization of of Terrain and Camouflage
Camouflage
Proper
Proper utilization
utilization of the terrain
terrain and camouflage will enable
camouflage will find concealment
enable one to find concealment form
the enemy
enemy in order to deceive,
deceive, dupe and surprise
surprise him. One must offer only the very very
smallest
smallest and poorly visible target
poorly visible target possible
possible in case ofof discovery.
discovery. Camouflage
Camouflage against
against air
view must never
view never be forgotten.
forgotten. Utilization
Utilization of the terrain requires the skillful
terrain requires skillful use of all
possibilities of cover and concealment,
possibilities concealment, and consideration
consideration of the color of the back and
underground.
underground.

Sunlight
Sunlight and shadows
shadows must also be considered.
considered. The guerrilla
guerrilla must always
always be intent on
offering
offering only a small target.
target. Camouflage
Camouflage is achieved
achieved by adapting
adapting to the surroundings
surroundings with
the help of natural
natural and artificial
artificial means
means and by avoiding noticeable movements.
avoiding noticeable movements. The
following points concerning
following points concerning cover and concealment
concealment must be remembered:
remembered:
a) Cover
Cover for campsites,
campsites, halt and rest areas during
during the march
march and when
when advancing
advancing is
offered
offered by mountains,
mountains, hills, boulders,
boulders, valleys,
valleys, gulches,
gulches, forests,
forests, hedges,
hedges, bushes,
bushes, corn-
fields,
fields, houses,
houses, barns,
barns, walls,
walls, fences
fences ditches,
ditches, dirt piles
piles etc.
The guerrilla
guerrilla sneaking
sneaking up
up on enemy
enemy guards
guards must make use of even the smallest
smallest
depressor,
depressor, furrow,
furrow, dirt and rock-pile,
rock-pile, mole mound
mound and grass
grass bundle
bundle for cover and
concealment
concealment (Picture
(Picture 1).
1).

10
10
Right! Wrong!

Picture 1.
Picture 1. Utilization of small cover
Utilization of cover
b) Consideration of the color of
Consideration of of the back and underground
underground is necessary:
necessary: for example,
example, the
grey-green uniform offers no camouflage
grey-green uniform camouflage against
against light yellow-colored
yellow-colored sand.
Especially
Especially to be considered
considered is the contour against the sky which
contour against which the guerrilla
guerrilla offers to
the eye enemy when
eye of the enemy when advancing
advancing over hills
hills and even the smallest
smallest elevations.
elevations.
This contour
contour effect is not only a give-away daytime, but also during
give-away at daytime, during bright nights
bright nights
(Picture
(Picture 2).

Right! Wrong!

Picture
Picture 2.
2. Consideration of back
Consideration of back and underground
underground

11
1]
a) Every
Every shadow
shadow offers good camouflage
camouflage (Picture
(Picture 3).

V—.-P.‘
—_'¢~ - .-_' fi‘ I
7'
-

'..- ‘7’. -01,"


j- ( _. _.2
| ‘
n
‘.--l - l 'I‘

W
~
..._I[“" Hn'
I

F-‘V a-' -
- x ‘
-
‘.x.~n--~u"..w"\.
nib... ‘
Picture 3. Shadows
Picture Shadows as camouflage
“"'
I‘A- ..‘
camouflage against

against air observation
observation

b) The guerrilla
guerrilla must always take care that he offers
always take offers only as small a target
target as possible
possible
(Picture
(Picture 4).

12
12
Right! Wrong!

Picture
Picture 4.
4. Minimizing target
Minimizing the target
c)
C) The most
most important natural camouflage
important natural means are: small trees,
camouflage means twigs, grass,
trees, twigs, moss,
grass, moss,
wheat, herbs,
wheat, herbs, leaves etc. Face and handshands must
must be subdued
subdued withwith dirt, soot or grease
grease
paint winter, with
paint in the winter, with blackboard
blackboard chalk
chalk or flour.
flour. When camouflaging
camouflaging campsites,
campsites, it
is advisable replant small
advisable to replant trees, bushes,
small trees, bushes, grass
grass and moss.
moss. The camouflage
camouflage thus
becomes more
becomes natural and does not wither
more natural wither as fast.
d)
01) The most common
common artificial
artificial camouflage
camouflage meansmeans are: the tent canvas, blankets,
canvas, blankets,
camouflaged
camouflaged uniforms,
uniforms, camouflaged poncho shirts, large camouflaged
camouflaged poncho camouflaged nets to cover cover
foxholes
foxholes etc.. and small camouflage
camouflage nets to cover cover the face and the shoulders.shoulders.
Camouflage poncho shirts and snow poncho
Camouflage poncho poncho shirts are easily self-made.
self-made. Old clothing
clothing
pieces, fishing
pieces, nets and rope
fishing nets of value.
rope are also of value. These
These artificial
artificial camouflage
camouflage means
means maymay
supplemented with
be supplemented with natural means like twigs,
natural means grass etc. Different
twigs, grass Different colored rags,
colored rags,
bundles of bush
bundles of bush and paper
paper can be tied to nets.
nets. It is useful
useful eyelets
eyelets and bands
bands to the cap,
cap,
so that camouflage
camouflage may may be quickly
quickly attached
attached and changed
changed (Picture
(Picture 5).5).

13
13
Picture
Picture 5. Small camouflage
camouflage net
e) Avoiding all sudden movements
6) Avoiding movements is part ofof camouflaging.
camouflaging. At dusk and in the dark only
quick movements
movements and sounds
sounds are noticeable.
noticeable. The following
following rules must
must be followed:
followed:
Always remember: How
Always remember: enemy now see me? Don’t
How does the enemy Don’t forget to adapt your
your
camouflage
camouflage to youryour surroundings!
surroundings! Avoid
Avoid sudden movements!
movements! They destroy
destroy all
camouflage efforts. And
camouflage efforts. And pay
pay attention
attention to shape,
shape, shine and shadow.
shadow.

14
14
Terrain
1. Navigation in Terrain
The simplest way to navigate
simplest way navigate in terrain
terrain is to know
know the operational
operational area thoroughly.
thoroughly. The
guerrilla must therefore
guerrilla must taught to remember
therefore be taught remember special
special orientation
orientation features that are easily
features that
recognized by day (dominant
recognized (dominant heights,
heights, church
church towers,
towers, factory
factory chimneys,
chimneys, single trees, field
trees, field
barns,
barns, groups
groups of boulders
boulders etc.). In order to orientate himself at dusk and in the night.
orientate himself night. He
remember their
must remember their contours.
contours. He must also memorize
memorize dominant
dominant lines which
which can serve
him as conduction
conduction lines during
during night
night marches.
marches. Such lines are fences, walls, hedges,
fences, walls, hedges,
waterways, high-tension
waterways, high-tension power
power lines, forest
forest edges,
edges, dams,
dams, railways,
railways, streets, tracks
tracks etc.
When
When conduction
conduction lines and orientation
orientation points
points can easily be mistaken
mistaken for others,
others,
additional
additional features
features must be memorized verification so that mistakes
memorized for verification mistakes are ruled
ruled out. In
uniform terrain,
uniform terrain, especially
especially in forests,
forests, orientation
orientation points
points and conduction
conduction lines are very very
important.
important. At cross-roads,
cross-roads, for example,
example, the guerrilla
guerrilla must memorize
memorize the specific
specific features
features
find the right way.
in order to find way. Gaps in the skyline,
skyline, dominant
dominant treetops,
treetops, path starting points
starting points
etc. serve as additional reference verification
additional reference verification signs at uniform
uniform forest edges.
edges. Certain
Certain
important
important distances
distances should always
always be estimated
estimated and memorized
memorized together with the
together with
conduction
conduction lines and orientation points. Evaluation
orientation points. Evaluation of the number
number of steps
steps from one
orientation
orientation point
point to the next also is a good means means of easily
easily finding
finding the right way at night.
right way night.
When using a map
When using map to plan a night march,
march, orientation
orientation points
points and conduction
conduction lines can be
memorized
memorized with its help. This helps to avoid having having to use a light when
when referring
referring to the
map
map in the dark. If the terrain
terrain is totally
totally unknown,
unknown, or if the guerrilla first step in
guerrilla is lost, the first
find the right
order to find right way
way is to determine
determine the navigational
navigational directions.
directions. The following
following
principles may
principles may be used:
used:
a) The position
position of the sun is fairly accurately
accurately in the east at 0600
0600 hours,
hours, in the southwest
southwest at
1500
1500 hours and in the west west at 1800 hours.
hours.
b) A good method
method to determine
determine the southern
southern direction
direction is by the use of the watch.
watch. Hold the
watch
watch level and point
point the small hand towards
towards the sun. When
When the angle between
between the hour-
hour-
hand and the 12 12 is cut in half, this line, extended
extended forward before noon
forward before noon and backward
backward in
the afternoon,
afternoon, points
points south (Picture
(Picture 6).

15
15
Picture
Picture 6. Determining Southern Directionwith
Determining the Southern Direction with the Pocket
Pocket Watch
Watch
Left: Morning 0600h 1500h
Right: Afternoon 1500h

night the northern


c) At night direction is found with
northern direction with the help of the North
help of North Star. It is found
found
by extending distance between
extending the distance between the rear two stars of the Big Dipper
Dipper approximately
approximately
5 times
times (Picture
(Picture 7)

Picture
Picture 7.
7. North
North Star and Big Dipper
Dipper
1.
1. North Star 2. Big Dipper

d) At night
night the directions
directions can also be determined
determined by the position
position of the moon:
moon: the full
moon is exactly
moon exactly opposite
opposite the sun and thus
thus in the southwest
southwest at 0300 hours
hours and in the
west at 0600 hours.
west first quarter
hours. The first quarter of a waxing
waxing moon
moon stands where
where the sun was 6

16
16
hours ago:
hours ago: for example,
example, in the west at 2400 hours. The last quarter quarter of a waxing
waxing moon
moon
stands where
where the sun will stand after 6 hours; hours; for example,
example, in the east at 2400 hours.hours.
In order to determine
determine one’s own position with the help of a map,
position with map, it must first be
aligned
aligned with the true north
north with the help of of the sun or one of the other means;
means; then the
surrounding
surrounding area is checked
checked for terrain
terrain features
features that are easily foundfound on the map map
(streets,
(streets, churches,
churches, dominant
dominant hills etc.). TheseThese points
points are then compared
compared with the
picture of the map
picture of map so that one’s own position
position can be ascertained.
ascertained. Determination
Determination of a
certain terrain point
certain terrain point is achieved
achieved as follows:
follows: Mark your your own position
position on the map,
map,
choose
choose a clearly visible terrain
clearly visible terrain feature that is not too near
feature that near (e.g. church)
church) and align the
map
map to it.it. The upper
upper edge of the map now points
map now points north.
north. If other terrain
terrain features
features are
sighted
sighted along a line markedmarked from one’s own position position with the help of a ruler ruler or
pencil, the line on the map
pencil, map must lead to the wanted wanted terrain
terrain point.
point. The difficulties
difficulties of
navigating in unknown
navigating unknown terrain,
terrain, especially
especially in forests
forests and at night,
night, make it necessary
necessary
that every
every guerrilla
guerrilla learn how to use a compass.
compass. When using using a compass,
compass, hold it away
away
from steel and iron objectsobjects (e.g. gun) as far as possiblepossible because needle will
because the needle
otherwise
otherwise be deflected.
deflected. With the help of of the compass,
compass, maps
maps can be aligned with true
aligned with
north, directions
north, directions maymay be determined,
determined, and a plotted
plotted course
course can be maintained with the
maintained with
help of a compass
compass bearing.
bearing. The compass,
compass, next to the sun is the most practical
practical means
by which
which to navigate.
navigate. Each guerrilla therefore be trained
guerrilla must therefore trained in its use. Help
therefore is given
therefore Appendix II.
given in Appendix

5. Reporting
Reporting and Communications
Communications
Reliable, quickly
Reliable, quickly transmitted
transmitted reports
reports and messages
messages are fundamental
fundamental to the security
security
and command
command of the guerrilla
guerrilla unit. The guerrilla
guerrilla must be taught
taught to observe
observe attentively
attentively
and to avoid unclear and exaggerated
avoid unclear exaggerated statements.
statements. He must transmittransmit or deliver
deliver
important
important messages
messages quickly. Signals that are clearly
quickly. Signals clearly visible
visible or well
well understood
understood over
long distances
distances are best suited to transmit
transmit simple messages,
messages, warnings
warnings and orders.
orders. They
must be arranged
must arranged well in advance
advance and changed
changed from time to time. Too many many signals
with various
with various meanings
meanings are to be avoided. confusion rather
avoided. They can cause more confusion rather than
help. It is especially
especially important
important to arrange
arrange signals withwith the sympathizers
sympathizers in the
population. These
population. These signals mostly
mostly serve as a warning.
warning. Such signals may may be: opening
opening or
closing
closing certain
certain attic hatches,
hatches, windows
windows or shutters,
shutters, opening
opening or closing
closing of curtains,
curtains,
hanging out of wash
hanging wash or unsuspicious
unsuspicious clothes,
clothes, putting
putting on lights
lights in certain
certain rooms
rooms and so
on. These signs can mean: “Danger
“Danger of Enemy.”
Enemy.” “No danger.”
danger.” “Enemy
“Enemy in the village.”
village.”
Or “Enemy
“Enemy in the house.”
house.” They can also indicateindicate that the sympathizer
sympathizer has an
important
important message
message for the unit.
unit. All guerrillas
guerrillas acting
acting as observers,
observers, scouts or guards
guards
must consider
must consider the following
following points
points when
when reporting:
reporting: Can the message
message be given with a
signal?
signal? Is it necessary
necessary to send a messenger?
messenger? Is it necessary
necessary to draw a sketch?
sketch? All oral
or written
written messages
messages must be checked
checked for the possibility
possibility of sending
sending a part
part of the
message
message immediately with a simple sign.
immediately with

17
17
This is especially
especially important
important for warnings.
warnings. Written
Written messages
messages must be avoidedavoided as much much as
possible. All messages
possible. messages must clearly clearly state: What have I seen myself? myself? What has a comrade comrade
noticed? Which
noticed? Which reports
reports are from the population? population? What is speculation?
speculation? Reports
Reports fromfiom the
population must
population must have indication
indication as to how trustworthy
trustworthy the message
message seems; presumptions must be
seems; presumptions
explained.
explained. It must always
always be considered
considered that even calm men cannot cannot observe
observe clearly
clearly during
during a
combat
combat situation
situation and tend tend to exaggerate
exaggerate due to excitation.
excitation. The following
following points must be
points must
followed:
followed: When was the observation
observation made? made? What
What was observed
observed (e.g. a platoon,
platoon, 2 cannons
cannons etc.)?
etc.)?
Which
Which enemy
enemy activity was observed
activity was observed (determine
(determine the exact position)?
position)? The further
further intention
intention of the
message’s
message’s sender must always always be included.
included. Each messenger
messenger and courier
courier must know to whom
must know whom the
message
message is addressed, where he will
addressed, where find the addressee,
will find what he must do if he cannot
addressee, and what find
cannot find
him, and respectfully
respectfully after he has delivered
delivered the message. must memorize
message. He must memorize the contents
contents ofof the
message so that he can destroy
message destroy the message
message whenwhen in danger.
danger. The messenger
messenger must not give away away
the position
position of the leader’s perimeter through
leader’s perimeter through wrong
wrong conduct.
conduct. He must detour
detour and cut back very very
often.
often. Written
Written messages
messages should not be signed nor have an address address on them.
them. Simple signs are
sufficient.
sufficient. Code names
names and abbreviations
abbreviations used used in the guerrilla
guerrilla unit may
may also be employed.
employed.
Messages
Messages fromfiom helpers
helpers out in the population
population can be hiddenhidden in predetermined
predetermined “mailboxes,”
“mailboxes,” Well
suited for this purpose
purpose are: hollow trees, cracks
hollow trees, walls etc. When using
cracks in walls using such mailboxes,
mailboxes, it is
advisable
advisable to agree
agree on a sign in the vicinity
vicinity indicating
indicating that a message
message has been left. This helps to
avoid
avoid having
having to check
check the dead mailbox.mailbox. Use of flashing
flashing signal lights is only possiblepossible if the
enemy
enemy situation
situation permits
permits it. it. In the mountains,
mountains, they are of use in order to avoid difficult, difficult, time-
time-
consuming
consuming message
message deliveries
deliveries through
through to the valleys.
valleys. Care must be taken
taken that these
these flashing
flashing
messages are coded.
messages coded. It is best to use only short signs. Long enduring enduring blinking
blinking should be avoided.
avoided.
Pigeons
Pigeons maymay be given to reconnaissance
reconnaissance patrols patrols in order to bring important
important messages
messages to the
higher
higher command.
command. Radio Radio transmission
transmission is indispensable
indispensable in a guerrilla
guerrilla war whenwhen lacking
lacking other
technical means
technical means of communications.
communications. Training Training of good radio
radio operators
operators in due time
time and far-sighted
far-sighted
acquisition
acquisition of replacements
replacements must never neglected, even when
never be neglected, when lacking
lacking sufficient
sufficient number
number of
radio sets at the moment.
radio moment. Employment
Employment of women women for this task is possible.
possible.

5. Close-Quarter
Close-Quarter Battle
Battle
The training
training in close-quarter
close-quarter battle
battle must be conducted
conducted in a guerrilla-like,
guerrilla-like, sporting way. It should
sporting way.
enable
enable the guerilla
guerilla to: a) fight with the spade, dagger
fight with dagger or without
without a weapon
weapon and not depend
depend solely
upon his firearm.
upon firearm. b) overwhelm
overwhelm an enemy enemy silently
silently when
when encountering
encountering him unexpectedly
unexpectedly
(especially
(especially at night).
night). c) overwhelm
overwhelm a guard silently.
silently. d)
d) break
break a hold and deliver
deliver defensive
defensive blows
blows
and punches.
punches. Often the whole
whole mission
mission depends upon overcoming
depends upon overcoming the enemyenemy silently,
silently, during
during an
unexpected encounter
unexpected encounter or when
when disposing
disposing of a guard.
guard. Close-quarter
Close-quarter battle
battle must therefore
therefore be
practiced again and again.
practiced again. Strict regulations
regulations cannot
cannot be given,
given, but when
when disposing
disposing of a guard,
guard, the
following points must
following points must be observed:
observed: Only specifically
specifically skillful guerrilla
guerrilla should be employed
employed for
task. Leave
the task. unnecessary equipment.
Leave unnecessary equipment. Wear
Wear shoes with
with rubber
rubber soles or sports off
sports shoes or take off
your boots.
your boots. Sneak to a secure position
position near the guard and study his habits, then sneak to the place
habits, then place
best suited for the attack.
attack. When jumping
jumping on the guard and hitting
hitting him, make sure he cannot
cannot cry
cry
out. Depending
Depending upon
upon orders,
orders, drag the guard away
away or dispose
dispose of him. Take awayaway papers, weapons,
papers, weapons,

18
18
equipment
equipment etc. Disappear
Disappear quickly
quickly or carry with your
carry on with your mission.
mission. When
When practicing
practicing breaking
breaking a
hold, it is important
hold, important that the guerrilla
guerrilla learns to react energetically
energetically and quickly
quickly so that he is able to
overwhelm
overwhelm an enemy
enemy who is superior
superior in constitution.
constitution. It is not necessary
necessary for the guerilla
guerilla to know
know
a large variety
variety of close-quarter methods. It is better that those
battle methods.
close-quarter battle which suit him best become
those which become
second nature. Blows
second nature. Blows and punches
punches against
against vulnerable parts of the body
vulnerable parts body are mostly
mostly executed with
executed with
of the hand.
the fist or the edge of hand. Kicks
Kicks against
against the knee
knee or shins can drop an enemy
enemy to the ground
ground
before he is able to react.
before react. The following
following parts
parts of the body
body are best
best attacked with blows
attacked with blows and
punches: Temple,
punches: Temple, base of the nose,
nose, upper
upper lip, neck, Adam’s apple and back
neck, Adam’s back of the neck;
neck; Main
Main
arteries,
arteries, heart,
heart, kidneys,
kidneys, groin.
groin.

6. Roadblocks
Roadblocks
Roadblocks are an important
Roadblocks important means
means ofof guerrilla
guerrilla warfare.
warfare. They are employed with
together with
employed together
ambushes
ambushes to hinder pursuit by motorized
hinder pursuit motorized troops harass enemy
troops and to harass traffic. The effectiveness
enemy traffic. effectiveness ofof
obstacles
obstacles can be multiplied through the use of
multiplied through of hidden
hidden explosive
explosive charges.
charges. The guerrilla
guerrilla group
group
must always
must always be able to set up roadblocks with the means
up simple roadblocks means available.
available. Training
Training must enable
enable
the guerrillas choose and build
guerrillas to choose build an obstacle number of
obstacle best suited for the number of men and means
means
available.
available. When ambushing
ambushing on heavily
heavily frequented roads, obstacles
frequented roads, obstacles in the form of mines
mines must be
employed.
employed. These
These should be detonated
detonated electrically
electrically or by trip wire
wire (Picture
(Picture 8).

Picture
Picture 8. Single Tree Blockade
Blockade

19
19
To hinder
hinder pursuit
pursuit or in harassment
harassment operations,
operations, antitank
antitank mines
mines or improvised
improvised mines
mines with pressure
With pressure
or relief—pressure.
relief-pressure.

Picture
Picture 9.
9. Notches
Notches for the Direction
Direction of Fall
Fall

20
Picture 10.
Picture 10‘ Tree Blockade
Blockade

21
21
Detonators may
Detonators used successfully.
may be used Mines must always
successfully. Mines always be carefully
carefully camouflaged. Destruction
camouflaged. Destruction
of bridges
of bridges made
made of of iron, masonry,
masonry, or wood
wood by demolition,
demolition, requires
requires considerable
considerable amounts
amounts ofof
explosives
explosives and a thorough
thorough instruction
instruction in handling
handling ofof explosives
explosives and fuses and in calculating
calculating the
charges.
charges. This is a subject of special
special instructions
instructions and regulations.
regulations. Even without
without explosives
explosives and
mines, guerrilla
mines, guerrilla groups
groups can set up
up obstacles efficientlyhinder
that will efficiently
obstacles that hinder the enemy:
enemy:
a) Single trees are chopped
chopped down so that a stump of about 11 to 11 ½ ‘/2 meter’s
meter’s height
height is left
standing.
standing. The treetop
treetop must
must fall in the direction
direction of the enemy,
enemy, and the whole
whole width
width of the
street must
must be obstructed
obstructed (Picture
(Picture 9).

Picture
Picture 11.
11. Wire Cable Blockade
Blockade

direction in which
The direction which the tree should fall is determined
determined by a notch
notch (1/5 to 1/3 of the diameter).
1/3 of diameter).
Saw cuts should end in this notch.
notch. Jamming
Jamming ofof the saw is avoided using a wedge.
avoided by using wedge.

22
The growth
growth ofof the tree and branches of other trees may
branches of influence the direction
may influence direction in which
which the tree
falls. In this case, push with sticks or pull
case, push pull with
with ropes
ropes in the direction
direction necessary.
necessary. (Picture
(Picture 9)

b) Tree blockades
blockades are made
made by cutting
cutting down trees
trees over a distance of 20 to 30 meters.
distance of meters. The trees
trees
should
should fall crosswise with the treetops
crosswise over each other, with treetops towards
towards the enemy
enemy and outwards
outwards so that
visibility into the obstacle
Visibility obstacle is obstructed.
obstructed. Only tress
tress in favorable
favorable positions
positions are cut (Picture
(Picture 10).
10).

c) Wire obstacles up at an angle to the road axis with


obstacles are set up with the height of 11 to 1.20
height of meters using
1.20 meters using
strong trees with additional
trees and with additional anchorage
anchorage by strong pegs. Wire obstacles
strong pegs obstacles are very efficient
very efficient
against
against cars and motorcycles
motorcycles (Picture
(Picture 11).
11).

Picture 12.
Picture Destroying a Road
12. Destroying Road

23
d) Destroying road: The road is dug out over its complete
Destroying a road: complete width,
width, 2 to 3 meters
meters wide
Wide and 11
meter deep.
meter deep. The earth is thrown
thrown down the embankment
embankment (Picture
(Picture 12).
12). This obstacle
obstacle is very
very
effective
effective in mountains
mountains on roads
roads that run along slopes. Repair
Repair of the street is complicated
complicated if the
bottom
bottom ofof the ditch is angled
angled downhill
downhill (Picture
(Picture 13).
13).

-.

M‘
”$3
63%}; LF"'k.5.}
‘_
r
'- l

..‘...',‘
-
L‘\\‘ a y -

Picture 13.
Picture Destroying a Road
13. Destroying Road
e) Wrecking
Wrecking of wooden
wooden bridges
bridges is sufficiently
sufficiently effective
effective if the planks
planks and support
support beams
beams of some
parts of the whole
parts whole bridge
bridge are removed.
removed. Destruction
Destruction is completed
completed by sawing through
through or removing
removing
the supports. wood must
supports. The wood must be removed rendered useless
removed or rendered useless by chopping
chopping or cutting
cutting it.
it. Against
Against
armored
armored vehicles
vehicles and light reconnaissance
reconnaissance tanks, wrecking can be camouflaged
tanks, the wrecking camouflaged by sawing
beams only halfway
the beams through. The bridge
halfway through. bridge will
will collapse
collapse after a vehicle
vehicle has driven
driven on it.
it.

f) It requires
requires a long time to prepare
prepare the incendiary
incendiary destruction
destruction of wooden
wooden bridges.
bridges. The fire must
fire must
be nourished
nourished from below.
below. Therefore,
Therefore, a large quantity
quantity of inflammable
inflammable material
material like tar, pitch,
pitch, oil,
gasoline, petroleum, straw etc. is necessary
gasoline, petroleum, necessary and must be fastened
fastened under
under every beam and all
every beam
supports.
supports. Hanging
Hanging or setting
setting up
up containers
containers (barrels,
(barrels, Jerry cans) filled with
with tar, petroleum,
petroleum, oil etc..
directly under
directly under the planks,
planks, pouring
pouring engine
engine oil over the bridge
bridge before
before igniting
igniting it and so forth,
forth,
accelerate
accelerate the destruction.
destruction. Sufficient
Sufficient draft is created
created by removing
removing some planks.
planks. Destruction
Destruction ofof a
bridge by burning
bridge burning it down requires
requires 5 to 10
10 hours. Long lasting obstruction of a road
lasting obstruction road is achieved
achieved
by erecting
erecting several
several echelons
echelons of barriers
barriers in depth.
depth. The effect of barriers
barriers is multiplied
multiplied by phony
phony

24
obstacles.
obstacles. They must be identical
identical to real barriers.
barriers. Phony
Phony barriers
barriers should be erected
erected in connection
connection
with the real ones or in alternation
with alternation with real ones. A phony
phony barrier
barrier will only be effective
effective if the
enemy notices it and if he has encountered
enemy notices encountered a similar real obstacle
obstacle before.
before. If mines have
have already
already
exploded
exploded in the direction of the enemy,
direction of enemy, motor
motor vehicles
vehicles will be easily stopped
stopped by a simple wire
wire or
wire rope,
Wire rope, a conspicuous
conspicuous sign on the road,road, fresh tar spots on the asphalt
asphalt of the road,
road, brushed
brushed
spots on cobblestones,
cobblestones, freshly
freshly repositioned
repositioned cobblestones,
cobblestones, dug up refilled holes,
up and refilled holes, iron pieces
pieces or
pieces of wooden
pieces wooden planks
planks placed
placed on earth, wires
Wires leading
leading into the earth near chopped
chopped down trees.
trees.

25
When
When setting up phony
setting up phony barriers,
barriers, a great variety
variety should be tried.
tried. In general,
general, the following
following
fundamentals
fundamentals must be observed when setting up
observed when up barriers:
barriers:

a) It should
should not be possible
possible to bypass
bypass the barrier.
barrier.
b) The enemy
enemy should come upon
upon the barrier unexpectedly (behind
barrier unexpectedly (behind curves,
curves, bushes
bushes etc.)
c) The barrier watched and be under
barrier should be watched under control
control by one’s
one’s own fireteam
fireteam or reinforced
reinforced
through hidden
through hidden charges.
charges.
Large
Large barriers
barriers (tree blockades,
blockades, destruction
destruction of roads, wrecking and burning
roads, wrecking burning of bridges)
bridges)
which require
which require more men and longer time can only be accomplished
longer time accomplished under
under favorable
favorable
circumstances.
circumstances. Help of the population
population is mostly
mostly necessary.
necessary. When laying
laying mine barriers,
barriers,
care must be taken
taken that other persons
persons do not observe
observe the work.
work.

26
IV. Tactics
1. Reaching
Reaching the Operational Areas Areas
a) By staying
staying behind
behind operations.
operations. This possibility
possibility is only given
given in mobile warfare and
mobile warfare
during
during enemy
enemy offensives.
offensives. It is most favorable
favorable if the guerrilla
guerrilla unit can stay
stay behind
behind in
predetermined operational
the predetermined operational area. If this is not possible,
possible, it is very
very important
important to
choose
choose an area within
within the battle zone out of whichwhich the guerrilla
guerrilla unit can march
march into
operational area under
the operational under greatest
greatest possible
possible cover and concealment.
concealment. It is very difficult
very difficult
or almost
almost impossible
impossible to stay behind
behind in areas where points of main battle effort
where the points effort are.
Supply
Supply and weapons
weapons caches
caches must be set up up in due time.
time. The guerrilla itself
guerrilla unit hides itself
in well-camouflaged
well-camouflaged fox-holes
fox-holes (Picture
(Picture 14),
14), dense,
dense, vast pine forests,
forests, field-ruins,
field-ruins,
cellars
cellars etc. in order to stay
stay behind.
behind.
b) Secret passage
passage through
through enemy
enemy lines in times
times of static battle action.
action. If circumstances
circumstances
permit, the whole
permit, whole guerrilla infiltrate to a favorable
guerrilla unit must infiltrate favorable sector at a favorable
favorable
time. Friendly
time. troops must support
Friendly troops them with all means
support them means available.
available. Suited therefore
therefore are
quiet sectors of of the front line that are secured
secured mainly fortified strongpoints,
mainly by fortified strongpoints,
densely
densely wooded
wooded terrain,
terrain, out of which
which concealed
concealed routes
routes into the operational
operational area can
be found.
found. Dark nights
nights and favorable
favorable weather: rain, fog, snow and gusty winds,
weather: rain, winds, must
be exploited.
exploited. Field-ruins,
Field-ruins, mining
mining installations
installations and other complex
complex build-up
build-up industrial
industrial
districts
districts are hard to oversee
oversee and also favor infiltration. rendezvous point
infiltration. A rendezvous point (RV) with
good cover and concealment
concealment must be arranged
arranged if the guerrillas
guerrillas are to pass
pass through
through
enemy their own. A RV is also important
enemy lines on their important and therefore
therefore must be ordered
ordered if the
unit is forced
forced to disperse.
disperse.

27
Picture 14.
Picture 14. Foxhole
Foxhole

28
A certain
certain waiting period must be ordered
waiting period ordered for the RV. Instructions
Instructions must be given in the case that a
guerrilla
guerrilla comes
comes late. After
After the successful passage through
successful passage through enemy
enemy lines, the guerrilla
guerrilla unit must
cautiously
cautiously advance
advance into the enemy’s rear area as far as possible
enemy’s rear possible and lay up
up in a good hide-out
hide-out
before
before dawn.
dawn.

c) Forced passage.
Forced passage.

Where
Where a secret passage through enemy
passage through enemy lines is not possible,
possible, an attack
attack of temporarily
temporarily united
united
guerrilla
guerrilla units through
through enemy
enemy lines maymay be in order.
order. In some cases,
cases, such attacks
attacks may
may be
conducted
conducted solely for this purpose.
purpose. Daring
Daring thrusts tank packs
thrusts of tank packs into the enemy’s
enemy’s rear promise
promise
success
success in some cases. The guerrillas
guerrillas will dismount where there
dismount where there is possible
possible undercover.
undercover. All
forced passages are difficult
forced passages therefore only to be used as a last possibility.
difficult and therefore possibility.
d) Over water
water or through
through the air by parachute
parachute drop or air landing
landing in the operational
operational area or near it
(See Appendix
Appendix 4). All identification
identification papers,
papers, letters,
letters, photos
photos and anything
anything else that may
may give the
enemy
enemy intelligence
intelligence clues must be turned
turned in prior
prior to the mission.
mission. False, misleading
misleading documents
documents and
papers may
papers may be taken
taken along. It is also necessary
necessary that the guerrilla
guerrilla memorize
memorize a well-planned
well-planned cover
cover
story
story (past life, family,
family, mission,
mission, own unit)
unit) so as to deceive
deceive the enemy’s
enemy’s intelligence.
intelligence.

of Targets for Destruction


2. Selection of Combat
Destruction and Combat
In most cases,
cases, the leader of a guerilla
leader of unit has the freedom
guerilla unit freedom to choose
choose his targets
targets within
within the
boundaries
boundaries drawn
drawn by his mission.
mission. In unclear
unclear situations,
situations, he will restrict himself to small actions
restrict himself actions in
find out how the enemy
order to find enemy reacts,
reacts, and which
which attitude
attitude the population
population takes.
takes. With greater
greater
knowledge about
knowledge about the enemy
enemy and the attitude
attitude of the population,
population, he will
will go
go on to larger
larger actions.
actions.
These
These must stay within
within the boundaries
boundaries set by his mission,
mission, his unit’s
unit’s strength,
strength, the enemy
enemy situation
situation
and the terrain.
terrain. The golden
golden rule that severe setbacks
setbacks must avoided
avoided in guerrilla warfare must
guerrilla warfare
never be forgotten.
never forgotten. Several successful
successful small actions
actions hurt the enemy
enemy more than a half half successful
successful
large operation.
operation. An unsuccessful
unsuccessful operation
operation often leads to total destruction
destruction of the unit;
unit; thus, the
intention
intention connected with its mission
connected with mission would
would not be fulfilled.
fulfilled.

3. Reconnaissance
Reconnaissance and Intelligence
Intelligence
Careful reconnaissance must give the leader of a guerrilla
Careful reconnaissance unit the fundamental
guerrilla unit fundamental information
information he
needs to make decisions.
needs decisions. It may
may also be of importance
importance for the general
general planning
planning of the guerrilla
guerrilla
unit and the regular
regular war command.
command. The general
general aim of reconnaissance
reconnaissance is to determine
determine the enemy
enemy
situation
situation in respect
respect to strength,
strength, location
location of staffs and units,
units, movements,
movements, intentions
intentions and combat
combat
strength.
strength. Guerrilla
Guerrilla warfare
warfare targets
targets require
require careful reconnaissance and observation
carefiil reconnaissance observation of the troop
troop
barracks, officer and functionary
barracks, officer functionary quarters,
quarters, fuel, ammunition
ammunition and foodfood depots
depots of the enemy
enemy his
security
security measures
measures and habits,
habits, his traffic
traffic routes
routes and communication
communication installations.
installations. Furthermore,
Furthermore, the
attitude
attitude of the population
population in the operational
operational area and the effect of the guerrilla
guerrilla unit’s
unit7s activity
activity on
the enemy
enemy and the population
population is of importance.
importance.

29
The main effort lies on the detection
detection and reconnaissance
reconnaissance of suitable
suitable targets
targets and gapsgaps in the
enemy’s
enemy’s security
security measures.
measures. Immediate
Immediate guerrilla
guerrilla warfare
warfare reconnaissance
reconnaissance is conducted
conducted by scouts
and small reconnaissance
reconnaissance parties,
parties, but most of all by men of confidence
confidence and occasional
occasional helpers
helpers
out of the population.
population. The results of reconnaissance
results of reconnaissance will be insufficient
insufficient without willing and
without the willing
understanding help of the population.
understanding population. This help must therefore
therefore be sought after. The scout should
see everything
everything without himself being
without himself being seen. Besides
Besides his special mission,
mission, he must always
always keep
keep the
security of his unit
security of unit in mind; he must give warningwarning in due time
time if danger
danger threatens.
threatens. If the scout
cannot
cannot avoid
avoid combat,
combat, he must
must strive to destroy
destroy the enemy
enemy quickly.
quickly. The dead enemy
enemy is searched
searched
identificationpapers,
for identification papers, letters,
letters, notebooks
notebooks and other sources of information;
information; his corpse
corpse hidden
is hidden
to prevent
prevent early discovery
discovery and pursuit.
pursuit. It is often favorable
favorable for scouts to disguise themselves as
disguise themselves
local inhabitants.
inhabitants. Greatest caution must be taken
Greatest caution taken when
when questioning residents. The important
questioning local residents. important
questions
questions must
must be placed
placed unsuspiciously
unsuspiciously among
among other unimportant
unimportant ones. Precautions
Precautions must also
be taken when preparing
taken when preparing to move
move on: asking
asking misleading
misleading questions
questions about
about routes
routes and locations
locations that
the scout never
never intends
intends to take, turning away
take, turning away from the intended route, and cutting
intended route, cutting back to deceive
deceive
possible pursuers
possible pursuers are all in order here. It is very
very important
important that the scout avoids
avoids leaving tracks or
leaving tracks
covers
covers those
those that he has made.
made. He avoids
avoids enemy
enemy controls
controls by bypassing
bypassing them
them on hidden paths.
hidden paths.
Occasionally right to boldly
Occasionally it is right boldly mingle with the traffic
mingle in with traffic on a busy
busy main road.
main road.

Permanent
Permanent informants
informants and occasional
occasional helpers
helpers out of the population
population will often deliver
deliver the most
valuable
valuable information
information because
because they can constantly
constantly observe
observe the enemy
enemy activities
activities without
without difficulty.
difficulty.
The most
most important
important task of the reconnaissance
reconnaissance service therefore
therefore is to install a network
network of
informants.
informants. A continuous
continuous surveillance
surveillance must be ensured
ensured in the cities, command-centers
command-centers and traffic
traffic
injunctions.
injunctions. Well suited as informants
informants and occasional
occasional helpers
helpers are persons
persons that are in contact
contact with
the occupation
occupation forces.
forces. This is especially
especially the case if they
they have access
access to the camps
camps and barracks
barracks
like innkeepers,
innkeepers, door-to-door
door-to-door salesmen,
salesmen, barbers,
barbers, and personnel
personnel from stores delivering
delivering goods.
goods. It
will be of greatest value if individual
greatest value individual soldiers dissatisfied or ideologically
soldiers that are dissatisfied ideologically close to the
guerrilla
guerrilla unit or persons
persons attached
attached to the enemy’s
enemy’s army
army can be won as informants.
informants. Untrained
Untrained
informants
informants must be given exact instructions
instructions as to which
which information
information is of value.
value. In order to avoid
avoid
endangering
endangering the informant,
informant, a “mailbox”
“mailbox” is agreed
agreed upon.
upon. This means that he is ordered
ordered to leave
his observations
observations and information
information at a certain
certain hiding place. Occasionally
hiding place. Occasionally an unsuspicious
unsuspicious
rendezvous is arranged
rendezvous arranged with him. This may may be in the traffic
traffic stream of a busy street on market
market
days, in front of food distribution points, stores, and in heavily
distribution points, heavily frequented
frequented public
public offices.
offices. Usable
Usable
reconnaissance results
reconnaissance results are often only obtained
obtained after long and patient
patient observation.
observation. If other sources
sources
bring no results,
results, it may
may become necessary to take
become necessary take a prisoner
prisoner in order to question
question him. The best
time therefore
time therefore is during
during a rainy night.
rainy night.

30
Usable results are often obtained
Usable results obtained by listening
listening in on the enemy’s radio communication
enemy’s radio communication and
tapping his telephone
tapping telephone wires.
wires. See special instructions
instructions for this. The reliability
reliability of all reconnaissance
reconnaissance
elements
elements and sources
sources must be constantly
constantly controlled
controlled by comparison
comparison and rechecking.
rechecking. Important
Important
decisions must only be based
decisions based on information
information that has been verified through
been verified through several independent
independent
sources. After
sources. After the target
target has been
been determined,
determined, the information
information obtained
obtained by intelligence must be
intelligence must
supplemented
supplemented by a thorough
thorough reconnaissance
reconnaissance of of the terrain
terrain around target. It is very
around the target. very important
important
find concealed
to find routes for the approach
concealed routes approach and withdrawal.
withdrawal. A sketch of the area is of value.
value. Often
Often
reconnaissance activity
the reconnaissance activity will be determined
determined by orders
orders from the Wehrmacht.
Wehrmacht.

4. The March
Guerrilla units almost
Guerrilla units almost always
always march
march at night.
night. Bad weather must be exploited.
weather must exploited. They avoid
avoid
dwellings, roads and paths
dwellings, roads paths that are often used.
used. When forced
forced to use paths
paths and tracks,
tracks, greatest
greatest
caution
caution must be exercised;
exercised; marching
marching at the edge or parallel
parallel to the path
path lessens
lessens the danger.
danger. The
march of the guerrilla
march of guerrilla unit must be a steady cautious
cautious advance
advance (Picture
(Picture 15).
15).

Q“: ' I 'uwl';


n.1, MI
1

‘. Him?” "'5: a: .

Picture
Picture 15. Noiseless walking
15. Noiseless walking
Left: On soft ground
ground
Middle:
Middle: On hard ground
ground
Right:
Right: On grass
grass

31
31
It is best to advance
advance from sector to sector with with frequent
frequent silent halts in order to listen and observe.
observe.
The march
march of the guerrilla
guerrilla platoon
platoon is secured by advance
advance scouts. Larger
Larger units employ
employ an advance
advance
party and a rear guard.
party guard. In general,
general, it is not necessary
necessary to secure the flanks,
flanks, spreading
spreading out too much
much
attracts
attracts the attention
attention of of the enemy.
enemy. The advance
advance party must always
party must always be intent to avoid
avoid terrain
terrain that
makes
makes a silent advance
advance impossible.
impossible. Before
Before reaching
reaching defiles
defiles and areas with with little cover and
concealment,
concealment, scouts are sent out to reconnoiter
reconnoiter and secure the march march route
route and the flanks.
flanks. The
guerrilla
guerrilla unit waits
waits in combat readiness until
combat readiness until they return.
return. These scouts must must also advance
advance from
Communication between
sector to sector. Communication between the scouts and the unit achieved with the help of
unit is achieved
unsuspicious signs (animal
unsuspicious (animal sounds, visual signs). The meanings
sounds, visual meanings of these
these signs must often be
changed.
changed. Greatest
Greatest care mustmust be taken
taken to avoid, or respectively,
respectively, to cover tracks.
tracks. Where
Where this is not
possible, the enemy
possible, enemy must be deceiveddeceived withwith false tracks
tracks and by cutting
cutting back. It is strictly
forbidden
forbidden to smoke during during the march.
march. Marches will only be conducted
Marches will conducted at daytime when it is
daytime when
absolutely necessary, in this case,
absolutely necessary, case, every possibility for cover and concealment
every possibility must be used in
concealment must
order to avoid
avoid detection
detection by ground
ground or air surveillance.
surveillance. Long detours
detours are often unavoidable.
unavoidable. The
behavior
behavior of domestic animals, wild
domestic animals, wild beasts
beasts and birds must
must be observed
observed because
because it is often possible
possible
to draw conclusions
conclusions as to the presence
presence of humans
humans out of it. If the unit comes
it. If comes upon
upon single local
inhabitants,
inhabitants, they must must be taken
taken along under pretense that they are needed
under the pretense needed as couriers
couriers or
guides.
guides. While
While theythey are with
with the unit, they must be questioned
questioned and deceived
deceived as to the real
intentions
intentions of the unit through
through conversation
conversation conducted
conducted for this purpose between members
purpose between members of the
unit. Finally,
unit. they must be sent off
Finally, they off in a misleading
misleading direction.
direction. Security
Security measures
measures must be taken taken
immediately
immediately during
during longer march rest periods.
longer march periods. The guerrillas
guerrillas securing
securing the area must be able to
provide heavy
provide heavy firepower.
firepower. Before
Before resting,
resting, the unit must cut back.
back. The area for the rest must offer
good cover
cover and concealment
concealment as well well as fields
fields of fire
fire against
against any
any enemy
enemy following
following the tracks
tracks of
the unit (Picture
(Picture 18).
18). When
When continuing
continuing the march,
march, even after a short rest, a personnel
personnel check
check must
be made
made so that nobody
nobody is left behind.
behind.

1 4 "
.k _,-’
‘* ‘

A A.

\ x i 13/ .L"
" d I’—/
A A

\ n
A.
k
A_ A
_' .- o.
A
_>_7‘nn
_ '
A ‘-
u‘l
L
‘ f.
-

f /'
,.
'
"
z

" '
'
1
1' Il

1
"
A

//
‘ 5" I‘
“n : ' A
n
/.’. n/
I
n k 4

_
-
.

"
V

an A
—:
-, - _ —.—‘
- 1‘ o ——
7
—- 3
0
.
"‘zV-V’ a 1

Picture 16.
Picture 16. Cutting
Cutting Back Before
Before Resting
Resting
The rest area is designated by the circle.

32
5. Checkpoints
Checkpoints for Planning
Planning
Preparatory
Preparatory intelligence
intelligence and reconnaissance
reconnaissance give the leader
leader the information
information he needs
needs in order to
plan an operation.
plan operation. When
When he has reached
reached a decision,
decision, he must reconsider
reconsider the plan
plan of operation
operation he
intends
intends to conduct
conduct and talk it over with
with his men. Where possibility is given,
Where the possibility given, he must practice
practice
important
important details
details with them.
them. When planning
planning the following points must be observed:
following points observed:

a) Place!
Place! 7– Where?
Where? Where
Where is the target?
target? Which routes of approach?
Which routes approach? Which routes for
Which routes
withdrawal? Which
withdrawal? Which advantages
advantages ofof the terrain
terrain can I exploit?
exploit?
b) Time!
Time! – 7 When?
When? When operation? At night?
When is the best time for the operation? night? During
During the day?
During
During moon-light?
moon-light? During
During complete
complete darkness?
darkness? When
When do the guards
guards change?
change? When
When is the
target
target not secured
secured strongly?
strongly?
c)
C) Forces!
Forces! 7 – Who?
Who? Who is guarding/securing
guarding/securing the target?
target? Regular
Regular army?
army? A special unit?
unit?
Language?
Language? How strong?
strong? Positions
Positions of guards?
guards? Attitude
Attitude of the population
population living near the
target? Who will execute
target? execute the operation?
operation? Required
Required strength?
strength? Distribution
Distribution of tasks.
tasks.
d) Combat
Combat means!
means! – 7 What?
What? What means
means for destruction
destruction are necessary
necessary in order to conduct
conduct
the operation?
operation? Amount
Amount of explosives
explosives and incendiaries?
incendiaries? Which
Which type of weapons?
weapons? Which
Which
type of special clothing?
type clothing? Which
Which equipment?
equipment? Which
Which helpful
helpful aids will I find at the target?
target?
e)
6) Execution!
Execution! – 7 How? How will I execute
execute the operation?
operation? Combat plan? Demolitions
Combat plan? plan?
Demolitions plan?
Possibilities
Possibilities to infiltrate
infiltrate secretly?
secretly? Preparation, jump-off position?
Preparation, jump-off position? Deception
Deception of of the
enemy?
enemy? How do I avoid the security
security elements?
elements? How do I avoidavoid or break resistance?
break resistance?

key-words, “Where?
The key-words, “Where? – 7 When?
When? 7 – Who? – What?
Who? 7 What? –7 How?”
How?” are mainly
mainly intended
intended for the
planning of interdiction
planning interdiction operations.
operations. Used accordingly,
accordingly, they may
may also be considered
considered when
when
planning other operations.
planning operations.

6. Interdiction Operations
Operations
In the first phase
phase of guerrilla warfare, interdiction
guerrilla warfare, interdiction operations
operations are of prime
prime importance.
importance.
The parts
parts of this phase
phase are directed
directed against targets in the enemy’s
against targets rear:
enemy’s rear:

a) Supply
Supply of the enemy’s
enemy’s attack
attack spearheads:
spearheads: fuel, ammunition,
ammunition, equipment,
equipment, maintenance
maintenance
services;
services;
Railway installations:
b) Railway installations: rails, railway
railway bridges,
bridges, train stations,
stations, signal boxes,
boxes, turntables,
turntables,
switch points,
points, communication
communication and signal means, means, repair
repair shops;
c) Bridges
Bridges on supply routes;
routes;
d) Transport
Transport facilities: trucks, cars,
facilities: trucks, cars, trailers, tractors, locomotives,
trailers, tractors, locomotives, railway wagons,
railway wagons,
airplanes,
airplanes, horse-drawn
horse-drawn carts;
e) Air traffic:
traffic: airports,
airports, airfields,
airfields, hangars;
hangars;
f) Oil pipelines,
pipelines, fuel dumps,
dumps, tank trucks,
trucks, filling
filling stations;
stations;
g) Ammunition
Ammunition dumps,
dumps, food stores, equipment
equipment stores;
h) Communication
Communication installations:
installations: Telegraph
Telegraph and telephone
telephone lines and transmitting
transmitting stations,
stations,
broadcasting stations,
broadcasting stations, radio
radio communication
communication installations;
installations;
i)
i) Installations
Installations at waterways,
waterways, floodgates,
floodgates, lifting
lifting tackles;
tackles;
j) Powerplants,
Powerplants, gasgas and waterworks,
waterworks, dams;
dams;

33
k) Mines
Mines and industrial plants of all sorts.
industrial plants

They are executed


executed through
through demolitions,
demolitions, incendiaries,
incendiaries, and as a last resort,
resort, by other
mechanical means.
mechanical means. Thorough
Thorough instruction means used
instruction on the means used for destruction
destruction is a
prerequisite to success.
prerequisite success. Technical
Technical instructions therefore must be extracted
instructions therefore extracted from
engineer
engineer manuals
manuals and special handbooks.
handbooks. The tactical planning and the execution
tactical planning of
execution of
interdiction
interdiction operations
operations requires
requires caution,
caution, cunning
cunning and ingenuity.
ingenuity. When
When preparing
preparing such
an operation,
operation, the following
following must be considered:
considered:
a) Which
Which is the most
most vulnerable part of the target?
vulnerable part target?
b) Which
Which essential part of the installation
essential part installation can be destroyed,
destroyed, and which
which means
means are
necessary 7
necessary – gunfire,
gunfire, demolition,
demolition, or incendiaries? Therefore, what
incendiaries? Therefore, what is needed
needed and
what
what strength
strength is necessary?
necessary?
C) At which
c) time of the day should the raid be conducted
which time conducted – 7 daytime,
daytime, in the night,
night, or
at dawn?
dawn?
d) Which
Which signs will signal the beginning
beginning and the end of of the attack
attack on the enemy
enemy
installation?
installation?
e)
6) Which routes are best suited for approach
Which routes withdrawal? Where
approach and withdrawal? Where is the
rendezvous point
rendezvous point (RV) after the execution
execution of the operation?
operation?

Surprise
Surprise is the main prerequisite
prerequisite for success.
success. Therefore,
Therefore, absolute
absolute secrecy
secrecy of all
preparations is necessary.
preparations necessary. All communication
communication lines leading
leading away
away from the enemy
enemy
installation
installation are severed
severed when
when the raid starts. Even in small-scale
small-scale operations,
operations, a
clear distribution
distribution of destruction,
destruction, security
security and combat tasks is necessary.
combat tasks necessary. A
security party secures,
security party secures, protects
protects or warns
warns against
against surprise:
surprise: a destruction
destruction party
party
destroys
destroys the target.
target. Small units
units must avoid
avoid combat.
combat. In large-scale
large-scale operations
operations a
reserve is held back
reserve back in order
order to break unforeseen
unforeseen resistance
resistance and cover
cover the
withdrawal of the unit after execution
withdrawal execution of the operation.
operation. The reserve
reserve should
primarily be equipped
primarily equipped with a sufficient
sufficient number
number of automatic
automatic weapons.
weapons. The
reserve party
reserve party can cover the withdrawal
withdrawal with
with gunfire
gunfire and by laying
laying out mines
mines or
booby traps.
booby traps. With the latter, it is possible
possible to gain a considerable
considerable amount
amount of time.
time.
In larger scale operations,
operations, simultaneous
simultaneous diversionary
diversionary and feint attacks,
attacks, ambushes
ambushes
along the roads
roads leading
leading to the target,
target, or mining
mining of the routes
routes can occasionally
occasionally be
advantageous.
advantageous. When strong strong enemy
enemy firepower
firepower can be expected,
expected, his possible fire
possible fire
plan must be considered
plan considered during
during the planning.
planning. The instructions
instructions under number 9 are
under number
withdrawal.
valid for the withdrawal.

34
7. Ambush
Ambush
Next
Next to interdiction
interdiction operations,
operations, the ambush
ambush is one of the most promising
promising means
means of waging
waging
guerrilla warfare. It is successful
guerrilla warfare. successful if the enemy
enemy is completely
completely surprised.
surprised. This can be achieved
achieved
through careful
through planning and occasionally
careful planning occasionally by skillful
skillful and quick improvisation.
improvisation. The smaller the
operation,
operation, the easier its execution
execution and the larger
larger the possibility
possibility of avoiding
avoiding failure.
failure. The approach
approach
to the ambush
ambush site must be unnoticed
unnoticed by the enemy
enemy and the population.
population. Enemies
Enemies met by chance
chance
must be killed
killed inconspicuously.
inconspicuously. Local inhabitants
inhabitants must be detained
detained for the duration
duration of the
operation. If necessary,
operation. If necessary, the operation
operation must be cancelled.
cancelled. The ambush
ambush must be set up up in suitable
suitable
terrain. Areas
terrain. Areas that are too obvious
obvious as ambush
ambush sites like defiles,
defiles, hollows
hollows etc. must be avoided.
avoided.
Well suited on the other hand are inconspicuous positions in hedges,
inconspicuous positions hedges, forest edges,
edges, cornfields,
cornfields,
settlements
settlements and gardens,
gardens, especially
especially if they offer possibilities
possibilities of covered
covered and concealed
concealed
withdrawal. Patient,
withdrawal. noiseless, and motionless
Patient, noiseless, motionless waiting,
waiting, often over a longer
longer period
period of time,
time, are
necessary when
necessary when laying
laying in ambush.
ambush. Fire only opens
opens upup when
when the order or predetermined
predetermined sign is
given.
given. In larger scale ambushes
ambushes the advance
advance party
party of the enemy
enemy should be allowed
allowed to passpass in
order to hit the more valuable
valuable targets
targets following.
following. If sufficient
sufficient forces
forces are available,
available, a separate
separate
ambush
ambush maymay be set upup for the expected
expected advance
advance party.
party. Fire on the advance
advance party
party may
may open
open upup
only after the main ambush
ambush is sprung.
sprung. In smaller operations,
operations, only weaker
weaker enemy units, that can
enemy units,
be completely
completely destroyed,
destroyed, are ambushed.
ambushed. The most effective
effective arms in ambushes
ambushes are automatic
automatic
weapons. Their effect is greatly
weapons. multiplied if mortars
greatly multiplied mortars etc. can also be employed.
employed. Where
Where it is
possible, the ambush
possible, ambush should be combined
combined with minefields.
minefields. The pictures
pictures 17,
17, 18
18 and 1919 give a
guideline
guideline as to how ambushes
ambushes maymay be set up.
up.

Ambushes are set up


Ambushes up
a) at roads
roads
b) at railways
railways

Hereby
Hereby the following
following peculiarities
peculiarities must be observed.
observed.
a) In ambushes
ambushes at streets, it must always
always be considered
considered that the enemy will secure his
enemy will
march
march routes
routes and watch
watch over them, with patrols,
them, with patrols, security
security elements, reconnaissance
elements, reconnaissance
parties and airplanes.
parties airplanes.
The ambush
ambush must therefore
therefore be camouflaged
camouflaged so well that that enemy
enemy security
security elements
elements and stronger
stronger
enemy
enemy units that are allowed
allowed to pass
pass do not notice
notice it.
it. Reconnaissance
Reconnaissance must be continued
continued during
during a
larger
larger operation
operation in order to make
make an unexpected
unexpected enemy
enemy attack
attack impossible.
impossible. The tasks
tasks of security
security
and reconnaissance
reconnaissance elements,
elements, on one side, and combat
combat and reserve
reserve elements,
elements, on the other, must
be closely
closely and carefully
carefully defined.
defined.

35
Picture 17.
Picture Road Ambush
17. Road of a Guerrilla
Ambush of Guerrilla Group
Group
These guerrillas open up fire
open up fire from the flanks.
flanks. A machine gungun or two guerrillas then fire
fire on and along the road and
especially into the road-ditches.

36
When
When ambushing
ambushing motorized march columns,
motorized march of the column
columns, the front of column must
must be forced
forced to stop. This
is done by using barriers. Only then is fire
using barriers. fire opened
opened up
up on the vehicles.
vehicles.

Picture 18.
Picture 18. Road Ambush
Ambush of a Guerrilla Platoon
Guerrilla Platoon

It is very
very advantageous
advantageous ifif a small guerrilla
guerrilla unit can execute
execute ambushes
ambushes at various
various roads
roads in short
order.
order. The enemy
enemy is thus deceived
deceived into thinking
thinking that the area is infested
infested with
with guerrilla
guerrilla units. This
units.
forces
forces the enemy
enemy to employ
employ intensive
intensive security measures and ties up
security measures up a larger
larger number
number of of his
troops. When this has been
troops. When been achieved,
achieved, the main
main effort of the guerrilla
guerrilla unit is shifted
shifted to other
operations.
operations.
b) In ambushes
ambushes it railways,
railways, the aim is to completely
completely destroy
destroy as much material and enemy
much material enemy
personnel as possible.
personnel possible. Ambushes
Ambushes at railways
railways are the task ofof larger guerrilla units, platoons
guerrilla units, platoons or
corps.
corps. Smaller
Smaller units may
may conduct
conduct demolition of rails
demolition of rails and harassment
harassment by occasional
occasional gunfire.
gunfire.
Ambushes at downhill
Ambushes downhill sections of the railway,
sections of if possible,
railway, and if possible, at a curve
curve in connection with
connection with
mines, are potentially
mines, worthwhile.
potentially worthwhile.

37
Obstructions
Obstructions of longer
longer durations
durations are thus
thus achieved;
achieved; also, the curve can be covered more easily by
covered more
gunfire.
gunfire.

I‘ A "L
(.1 \- L
L .J

Picture
Picture 19. Railway Ambush
19. Railway Ambush of a Guerrilla
Guerrilla Platoon
Platoon

The ambush
ambush site should be away away from fortifications, rail-way stations,
fortifications, rail-way stations, and junctions
junctions as far as
possible in order to avoid quick intervention
possible intervention by enemy
enemy security
security forces.
forces. Communication
Communication wireswires
must also be cut. Before
must Before the operation,
operation, intelligence
intelligence and reconnaissance
reconnaissance must concentrate
concentrate on
observing traffic
observing traffic density
density protective
protective measures,
measures, and whowho occupies
occupies the trains.
trains. During
During the operation,
operation,
every
every guerrilla
guerrilla group
group and every
every single
single guerrilla
guerrilla must know exactly which
know exactly which task they
they have been
given. After
given. After successful
successful demolitions,
demolitions, the main impact of the gunfire
impact of gunfire must
must be directed
directed against
against the
cars that are damaged
damaged least. Soldiers jumping out of
Soldiers jumping of the train
train must be taken
taken with
with fire
fire from the
flanks.
flanks. Possible near the train must be controlled
Possible cover near controlled by gunfire.
gunfire. In most cases a sign for the
opening
opening of fire
fire is not necessary.
necessary. It is opened
opened up with the explosion
up with explosion of the mines
mines and the derailing
derailing
of the train.
train.

38
It is very
very important
important that a sign for cease-fire
cease-fire be predetermined
predetermined in order to avoid
avoid endangering
endangering the
guerrilla
guerrilla groups
groups that have
have been assigned
assigned the task of destroying remains of the train and
destroying the remains
salvaging usable booty (weapons,
salvaging the usable (weapons, ammunition,
ammunition, food, medicine,
medicine, clothing).
clothing).

8. Raids
Raids
By fully exploiting
exploiting the surprise
surprise element
element of a raid,
raid, it is possible
possible to destroy
destroy an enemy
enemy that is
superior
superior in numbers
numbers or weapons.
weapons. But if the raid is unsuccessful,
unsuccessful, the operation
operation often
often ends withwith
high losses.
losses. If the enemy
enemy has a great numerical
numerical superiority
superiority and fights
fights with tactical
tactical skill, this can
lead to the destruction
destruction ofof the guerrilla
guerrilla unit. Therefore,
Therefore, the decision
decision to raid a superior
superior or stronger
stronger
enemy,
enemy, for example,
example, a strongpoint,
strongpoint, an enemy-occupied
enemy-occupied village,
village, a staff, an airport,
airport, a camp,
camp, a
railway station,
railway station, should
should be considered
considered very thoroughly. All circumstances
very thoroughly. circumstances must be checked.checked.
Reliable
Reliable and secure routes
routes of withdrawal
withdrawal in case of failure
failure are a prerequisite.
prerequisite. Only a leader
leader with
very
very good tactical training will be able to plan and conduct
tactical training conduct a raid or a well-defended
well-defended larger
larger
target. Improvised
target. Improvised raids at each possible
possible opportunity
opportunity are far more
more promising
promising and muchmuch easier
easier
than attacks
than attacks against difficult targets.
against such difficult targets. Even smaller
smaller guerrilla
guerrilla units can achieve
achieve good results.
results.
possibilities are given
Such possibilities given by chance
chance when
when coming stragglers, wood
upon stragglers,
coming upon wood collection
collection parties,
parties,
messengers,
messengers, lone vehicles,
vehicles, staff
staff on reconnaissance.
reconnaissance. They may
may also be sought or created:
created: for
example,
example, by guerrillas
guerrillas hiding
hiding on a traintrain and attacking personnel on the locomotive.
attacking the personnel locomotive. Or by
burglarizing
burglarizing the apartment
apartment of a functionary killing him, or attacking
functionary and killing attacking enemy
enemy duty offices,
offices,
powerplants, out-posts
powerplants, out-posts that are insufficiently
insufficiently secured.
secured. Skillful exploitation
exploitation of such possibilities
possibilities is
the nature of guerrilla
nature of warfare. They offer good chances
guerrilla warfare. chances of success
success at little risk.
risk.
The raid of a larger
larger target
target that is easy
easy to defend
defend and well
well secured,
secured, for example,
example, an enemy-
enemy-
occupied
occupied dwelling,
dwelling, requires
requires careful
careful planning.
planning. Sufficient
Sufficient forces
forces must also be available.
available. This is
only possible
possible for larger guerrilla units. The aim is the destruction
guerrilla units. destruction of the important
important enemy
enemy
installations
installations that are set up up there, i.e. powerplants,
powerplants, fuel dumps,
dumps, staffs etc. Thorough
Thorough
reconnaissance and intelligence
reconnaissance intelligence must be conducted
conducted before planning. Strength,
before planning. Strength, order of battle,
battle,
armament
armament and deployment
deployment of of the enemy,
enemy, his security
security and defense
defense instructions,
instructions, defensive
defensive
installations,
installations, barriers,
barriers, communication
communication lines to neighboring
neighboring villages,
villages, immediate
immediate security
security at the
operation
operation target,
target, must be established
established in advance.
advance. In order to achieve
achieve a certain
certain familiarity
familiarity with the
habits
habits of the enemy,
enemy, intelligence
intelligence and reconnaissance
reconnaissance must be conducted
conducted over a longer period of
longer period
time. The help of the inhabitants
time. inhabitants is absolutely necessary. The combat
absolutely necessary. plan is made according
combat plan according to
the results of the intelligence
results of intelligence and reconnaissance.
reconnaissance. It must primarily
primarily contain:
contain:

a) Disposition
Disposition of forces,
forces, combat
combat means
means and equipment;
equipment;
b) Order of battle,
Order of battle, allocation
allocation of security, relief assault
security, relief assault and destroy
destroy groups;
groups;
c) Assignment
Assignment of the attack and destroy targets; instructions
destroy targets; security and relief
instructions to the security relief
groups;
groups;
d) Support
Support on the part
part of the inhabitants
inhabitants or through
through guerrillas
guerrillas that have infiltrated;
infiltrated;
e) March
March and approach
approach
of attack (if necessary,
f) Time of necessary, attack signal) watch word,
signal) watch word, recognition
recognition signals
signals
g) Orders
Orders for withdrawal,
withdrawal, immediate,
immediate, secondary
secondary rendezvous points
rendezvous points
h) Place of the leader
leader during
during the attack
attack

39
The raid must start by surprise.
surprise. The operation
operation must be called off if the element
called off element of surprise
surprise
is lost before
before the attack.
attack. The execution
execution of a raid requires
requires ruthless
ruthless daring,
daring, energetic
energetic
momentum and flexible
momentum flexible improvising.
improvising. Unexpected
Unexpected enemy
enemy defense
defense must be broken. broken.
Surprise
Surprise over the defenders
defenders must always
always be taken
taken into consideration when raiding
consideration when raiding large
objects,
objects, even after very
very thorough
thorough reconnaissance.
reconnaissance. The first, most important
important aim is the
simultaneous
simultaneous destruction
destruction of all securing
securing elements if this is possible.
elements if possible. This is best achieved
achieved
through guerrillas
through infiltrated into the village
guerrillas that have infiltrated before the raid and attack
village before attack the
sentries
sentries or guards predetermined time or signal. At the same time
guards at a predetermined time all communication
communication
wires leading
wires leading from the village
village are cut. The second
second aim is to seize the most important
important key
positions before
positions before the alarmed
alarmed defenders
defenders can man themthem and at the same time attack attack the
barracks, where
barracks, where the soldiers must be killed
soldiers must killed or contained.
contained. The most important rules of
important rules
street combat
combat must be observed:
observed: containing
containing enemy resistance pockets
enemy resistance pockets through
through automatic
automatic
weapons and mortars;
weapons mortars; avoiding
avoiding open places and the middle
open places middle of the street, usingusing all
possible cover that doors,
possible doors, corners,
comers, columns
columns etc. offer: smoking
smoking out houses
houses that are
stubbornly
stubbomly defended with hand grenades,
defended with if necessary,
grenades, if necessary, by demolitions
demolitions or by burning
burning them
them
out. Only after successful paralyzation of the defenders
successful paralyzation defenders can the planned
planned destruction
destruction be
executed.
executed.

40
40
Unexpected
Unexpected disturbances
disturbances must be quieted relief groups
quieted by the relief groups held in readiness.
readiness. Unceasing
Unceasing
reconnaissance during
reconnaissance during the execution
execution of the raid must not be neglected.
neglected. Elements
Elements must secure
against
against neighboring
neighboring villages.
villages. Streets, on which
which enemy
enemy reinforcements
reinforcements may may arrive,
arrive, must be sealed
with barriers. After
with barriers. After execution
execution of the operational
operational aims on which
which the raid
raid was based,
based, the groups
groups
withdraw in predetermined
withdraw predetermined order after the signal to do so has been given. relief groups
given. The relief groups that
were held in readiness
were readiness cover the withdrawal
withdrawal and disengagement
disengagement from the enemy.enemy. Raids against
against
weaker objects,
weaker objects, train stations,
stations, depots
depots and supply and industrial
industrial installations
installations outside
outside of enemy
enemy
guarded
guarded settlements
settlements can be conducted
conducted by small guerrilla
guerrilla units.
units. These
These must be planned
planned according
according
to the same basic tactical
tactical rules
rules that are valid for operations
operations against
against strongly
strongly secured
secured settlements.
settlements.
They promise
promise easier success.
success.

8. Disengagement
Disengagement

Skillful
Skillful disengagements
disengagements from the enemy enemy and withdrawal
withdrawal after the execution
execution of an operation,
operation, or
when breaking
when breaking off of an operation,
operation, is a tactical
tactical component
component of guerrilla
guerrilla warfare.
warfare. Successful
Successful
withdrawal secures
withdrawal secures the possibility
possibility of landing
landing new new surprising
surprising blows
blows against
against the enemy.
enemy.
Withdrawal
Withdrawal is easiest
easiest if it is possible
possible to completely
completely destroy
destroy the enemy.
enemy. This must be considered
considered
when choosing
when choosing a target.
target. Operations
Operations in which
which the guerrilla
guerrilla unit could be engaged
engaged in a long-lasting
long-lasting
fight
fight with superior
superior enemy
enemy forces must be avoided.
forces must avoided. They do not fit fit in with the character
character ofof
guerrilla warfare because
guerrilla warfare they make withdrawal
because they withdrawal extremely
extremely difficult.
difficult. Concealed
Concealed routes
routes of
withdrawal must always
withdrawal always be reconnoitered
reconnoitered even if complete
complete success
success can be expected.
expected. Orders
Orders for
withdrawal along these
the withdrawal routes must be given in advance.
these routes advance. The withdrawal
withdrawal from the enemyenemy is
conducted
conducted individually
individually or in small groups.
groups. Rendezvous
Rendezvous pointspoints and waiting
waiting times
times must always
always be
ordered
ordered beforehand.
beforehand. In most cases, cases, it is appropriate
appropriate to determine
determine an immediate
immediate RV (1-3
kilometers) with a short waiting
kilometers) waiting time (1-3 hours)
hours) and a secondary
secondary RV withwith a longer
longer waiting
waiting time
(about
(about 24 hours).
hours). The RV points
points should offer good cover cover and concealment,
concealment, close observation
observation
posts, and concealed
posts, concealed routes
routes of withdrawal.
withdrawal. It is absolutely
absolutely necessary
necessary to secure the RV. The
possibility that the enemy
possibility enemy may find the RV by treason
may find treason must always
always be considered.
considered. The rest area
of the unit must therefore
therefore be away
away from the RV point.
point. Only a guide remains
remains at the RV. Groups
Groups
must always
always be ordered
ordered to cover
cover the withdrawal
withdrawal of the guerrilla
guerrilla unit with gunfire
gunfire and barriers
barriers if
the operation
operation is conducted
conducted by a larger
larger guerrilla unit.
guerrilla unit.

40
40
y
I
"'23::
0—:1’
n~--—--""
,.'
n
#--
s’ G-
a
F‘"
i’—
- .
"
-
nA n & n
‘ ~ :i" r—fl
'
,
I 1 A
.' - - " - :‘r - '\ ('1
I i (I
,1.
:1 .l (I

:
‘. _
‘ A.
- _,.-— . 1] -~ 2. .1 i n
Picture 20. Backtracking
Picture Backtracking and Jumping Off the Track
Jumping Off
off his tracks into a group
The guerrilla first went to the forest edge where he backtracked and jumped off of bushes.
group of
He waded through a creek in order to further conceal his tracks.

41
41
It is best to give this task relief groups
task to the relief groups held in readiness.
readiness. Pursuit
Pursuit from skillful
skillful scouts,
tracking dogs, and trackers
tracking trackers must always
always be expected. possibilities to deceive
expected. All possibilities deceive them and
conceal
conceal one’s own tracks
tracks must be used.
used. Such possibilities
possibilities are: backtracking,
backtracking, cutting
cutting back,
jumping off the track
jumping track at suitable places, wading
suitable places, wading through
through streams.
streams. Setting
Setting up
up ambushes
ambushes along the
route of withdrawal
route withdrawal now and then after a successful
successful operation
operation can lead to new
new success
success and make
further withdrawal easier.
further withdrawal easier.

Securing the Rest Area


10. Securing
Permanent
Permanent camps
camps can only be set up up in very
very favorable
favorable terrain
terrain such as widespread
widespread forests,
forests,
moorlands
moorlands and mountains.
mountains. Care must be takentaken to camouflage
camouflage the camp trails leading
camp and the trails leading to it
very
very well. measure is to only walk
well. A sure and safe measure walk on hard, rocky rocky underground.
underground. It must be
avoided
avoided that beaten trails come into being.
beaten trails being. Care must
must be taken
taken to secure the encamped
encamped guerrilla
guerrilla
unit even where
where permanent
permanent camps
camps cannot
cannot be erected.
erected. An effective
effective security
security measure
measure is to change
change
hideouts, which
the hideouts, which can be in isolated
isolated farms,
farms, cellars,
cellars, ruins, hunting cabins,
ruins, hunting barns, dense pine
cabins, barns,
groves,
groves, as often as possible.
possible. Immediate
Immediate security
security is ensured
ensured by listening
listening and observation posts.
observation posts.
These
These are supplemented
supplemented by a constant reconnaissance of the surrounding
constant reconnaissance surrounding area. The best security
security
is achieved with the help of the populator.
achieved with populator. Women
Women and children
children maymay be ofof useful
useful service.
service. Certain
Certain
unsuspicious signals for warning
unsuspicious warning and alarming
alarming the guerrilla
guerrilla unit must be ordered
ordered in advance.
advance. The
same holds true for changing
changing codewords identification signals.
codewords and identification signals. Hideouts
Hideouts should
should have an
emergency
emergency exit. Good protection
protection can be achieved
achieved where
where it is possible
possible to mine the approaches
approaches or
set up booby traps using
up booby using hand grenades
grenades with trip wires.
wires. Each guerrilla
guerrilla must always
always have his
weapon within
weapon reach even when
within reach when resting.
resting.

42
42
Protection Against
11. Protection Countermeasures
Against Countermeasures
The following
following countermeasures
countermeasures may
may be expected
expected from the enemy:
enemy:
a) Use of informants
informants and provocateurs.
provocateurs.
b) Employment
Employment of special hunter forces.
forces.
c) Encirclement
Encirclement and search of the operational
operational area.
d) Securing
Securing and guarding
guarding of all war-vital
war-vital installations.
installations.
a) The use of informants
informants and provocateurs
provocateurs forces the guerrilla reinforce their
guerrilla unit to reinforce their
observation
observation teams
teams and use special precautions when contracting
precautions when contracting civilians.
civilians. Men of of
confidence
confidence and sympathizers
sympathizers must be ordered
ordered to observe
observe the enemy
enemy agency
agency that recruits
recruits
and employs
employs the informants
informants against
against guerrilla units. Informants
guerrilla units. Informants that have been uncovered
uncovered
must be destroyed.
destroyed.
b) The employment
employment of special hunterhunter forces
forces by the enemy
enemy is a considerable
considerable problem
problem for
guerrilla
guerrilla fighters.
fighters. It is the mission of these
mission of these hunter
hunter forces
forces to detect, pursue and fight
detect, pursue fight the
guerrilla units with
guerrilla units with the same means
means and methods
methods 7– cunning,
cunning, camouflage,
camouflage, surprise
surprise –
7 that
the guerrillas
guerrillas use. Because
Because of this, the enemy
enemy hunter
hunter forces, which consist
forces, which consist of specially
specially
picked men,
picked men, are particularly
particularly dangerous.
dangerous. Only untiring
untiring watchfulness
watchfulness and never
never lessening
lessening
caution
caution can protect
protect against
against surprise
surprise attacks
attacks from enemy
enemy hunter
hunter forces.
forces.

It may
may become necessary to concentrate
become necessary concentrate the complete
complete guerrilla
guerrilla war effort in an
operational
operational area on destroying
destroying an especially
especially dangerous
dangerous enemy
enemy hunter
hunter force.
c)
C) Encirclement
Encirclement and search of the operational
operational area requires
requires a large number
number of troops.
troops. If the
enemy
enemy sees himself
himself forced
forced to employ
employ such measures
measures that tie down a large number
number of his
forces,
forces, this is already
already a success.
success. Such large-scale
large-scale operations feared less than the
operations must be feared
employment
employment of hunter
hunter forces because there
forces because there always
always are sure possibilities
possibilities to evade:
evade:
aa) Withdraw
Withdraw from the operational
operational area when
when the enemy
enemy intention
intention of encirclement
encirclement has
been detected;
been detected;
bb) Exfiltrate through enemy
Exfiltrate through enemy lines where
where they are very thin at the beginning
very thin beginning of the
encirclement
encirclement in favorable terrain;
favorable terrain;
cc) Stay behind
behind the lines in well-camouflaged
well-camouflagedfoxholes
foxholes or similar hideouts;
hideouts;
dd) Break
Break out of the encirclement
encirclement at a weak
weak point
point in the line.

d) The securing
securing a guarding
guarding of the land and of all-important
all-important installations
installations by the enemy
enemy makes
careful
careful reconnaissance
reconnaissance and planning
planning for guerrilla
guerrilla actions
actions but does not make the actions
actions
impossible.
impossible. There
There is no countermeasure
countermeasure of the enemy enemy that cannot
cannot be rendered
rendered useless
useless
through skillful
through skillful adaption
adaption to it.
it. The attitude
attitude of the population
population and the amount
amount of assistance
assistance
it is willing
willing to give to the guerrilla
guerrilla unit is of great importance.
importance.

43
43
V. Action Against Enemy Agitation
Because
Because of the close
Close relationship
relationship of guerrilla
guerrilla warfare
warfare and politics,
politics, action against
against enemy
enemy agitation
agitation
is a task that is just as important
important as interdiction
interdiction and combat
combat actions. means must be used to
actions. All means
ward
ward off enemy
enemy influence
influence and waken
waken and maintain
maintain a clear political
political will.
will. Tactical
Tactical activities
activities must
always
always take consideration
consideration of this necessity.
necessity. It is essential
essential for the guerrilla unit to have constant
guerrilla unit constant
news of the general
news general situation.
situation.

The intellectual-political
intellectual-political instruction
instruction is intended
intended for:

a) the guerrilla units


guerrilla units
b) the population
population
c) the enemy
enemy

Because of their
a) Because their strenuous
strenuous combat
combat activity,
activity, the guerrilla themselves need
guerrilla units themselves need special
intellectual-political
intellectual-political care and leadership.
leadership. Guerrilla
Guerrilla warfare
warfare is not possible
possible without
without a
clear political will. The guerrilla
political will. guerrilla not only submits
submits to extreme
extreme hardships
hardships and constant
constant
danger,
danger, but also to the intellectual
intellectual influences
influences that are predominant
predominant in the rear area of
the enemy.
enemy. His political
political will must be strengthened
strengthened and hardened
hardened against these
against these
wearing influences,
wearing influences, and his spirit challenged
challenged to constant
constant watchfulness.
watchfulness. The most
effective
effective means
means of intellectual-political
intellectual-political instruction
instruction for the guerrilla unit is the
guerrilla unit
example
example of of their leader.
leader. IfIf he is filled
filled with
with a glowing
glowing love for the fatherland, prepared
fatherland, prepared
to make any
any sacrifice
sacrifice for the freedom
freedom of his peoples
peoples and willing
willing to bear any
any hardship,
hardship,
then his guerrillas
guerrillas will also. Warding
Warding off off enemy
enemy agitation
agitation is an easy
easy task then.
then. The
guerrilla
guerrilla must be enabled
enabled to express
express his political belief clearly
political belief clearly and convincingly
convincingly
through the intellectual
through training. He must be able to argue
intellectual training. argue the cause
cause of his fatherland,
fatherland,
0f truthfulness
of truthfulness and justness
justness with
with wit.

44
44
b) The population
population in the operational
operational area sees the guerrilla
guerrilla as a representative
representative of the nationhood
nationhood
from which
which they have been cutoff.
been cut off. His attitude,
attitude, his confidence
confidence and unyielding
unyielding will to fight
fight must
be a stimulus
stimulus to all those
those with a positive
positive attitude.
attitude. The leader
leader in charge
charge of political
political questions
questions has
the important
important duty of establishing
establishing and maintaining
maintaining contact
contact with the population.
population. This must be
under consideration
done under consideration of all precautions.
precautions. He must find find out their
their sufferings,
sufferings, worries,
worries, and
opinions,
opinions, and observe
observe all measures
measures of of the enemy
enemy command
command and administration
administration attentively.
attentively. Every
Every
possibility must be used to unmask
possibility unmask enemy
enemy agitation
agitation and lies, to supply the population
population with
with true
news, reminding
news, reminding them
them of the eternal
eternal values
values of nationhood,
nationhood, and root root out cowardly
cowardly servility.
servility. All
means
means to reliably
reliably spread news
news is good.
good. Often the simplest
simplest is the most effective
effective (mouth-to-mouth,
(mouth-to-mouth,
chain and ring
ring letters,
letters, inscriptions with chalk, paint,
inscriptions with paint, and stamps on walls,
walls, enemy
enemy billboards
billboards and
proclamations, pamphlets from hand
proclamations, pamphlets hand to hand).
hand). It maymay become necessary for larger units
become necessary units to
acquire
acquire a duplicating
duplicating machine
machine or a printing
printing press,
press, and also material
material needed
needed to make simple
stamps.
stamps. The achievements
achievements of the guerrilla unit must be made public
guerrilla unit public without restraint. Friend
without restraint. Friend and
foe should talk of them. disadvantage if the unit is credited
them. It is no disadvantage credited with deeds
deeds and capabilities
capabilities
that exceed
exceed its potential.
potential. It is wise to show restraint
restraint when
when requisitioning
requisitioning and demanding
demanding support
support
from the population.
population. All unnecessary
unnecessary inconveniences
inconveniences and danger danger to the population
population should be
avoided.
avoided. The guerrilla unit must try to help and protect
guerrilla unit protect as far as this is possible within their
possible within their
mission.
mission. Traitors
Traitors must be rooted
rooted out without pity.
without pity.

c) If it is possible
possible to point
point out the true situation
situation and the unavoidable results of the enemy’s
unavoidable results enemy’s
policy, in addition
policy, addition to the initial mission,
mission, then
then this should be done. Suited here are pamphlets,
pamphlets,
handbills,
handbills, and inscriptions
inscriptions on walls.
walls. It can also be of use to let a prisoner
prisoner free if he spontaneously
spontaneously
shows signs of individual
individual and political
political insight.
insight. The political
political leader
leader of the unit must have the
opportunity
opportunity to instruct influence him before
instruct and influence before this is done.
done. Caution
Caution must be exercised.
exercised. The
tactical mission
tactical mission and the security
security of the unit have priority.
priority.

45
45
VI. Accommodation and Food Supply
1. Shelters
Shelters
Permanent camps
Permanent camps withwith bunkers,
bunkers, log cabins, permanent tents
cabins, permanent tents or light emergency
emergency shelters
shelters
may be built
may built if the general
general situation
situation permits
permits it, and the terrain
terrain offers sufficient
sufficient cover and
concealment.
concealment. Such camps camps offer the advantage
advantage of a certain
certain level of comfort.
comfort. Their
detection
detection by the enemy,
enemy, on the other hand, cannot avoided, even with
cannot be avoided, with very
very good
camouflage, because of the beaten
camouflage, because trails that have
beaten trails have come into existence.
existence.

‘3
¢
Picture
Picture 21a. Earth
Earth bunker
bunker (cutaway)
(cutaway)

Temporary
Temporary protection
protection is achieved
achieved by choosing
choosing the construction
construction site in unpassable
unpassable terrain,
terrain,
far off from the settlements,
settlements, in dense undergrowth.
undergrowth.
a) Bunkers cabins are built with simple
Bunkers and log cabins means that are adapted
simple means adapted to the available
available
material of the constructors.
material and the skill of Fanciness must
constructors. Fanciness must be avoided.
avoided.

46
46
Adaptation to the surrounding
Adaptation surrounding terrain
terrain through
through camouflage
camouflage and avoiding
avoiding beaten tracks are the best
beaten tracks
protection for a bunker
protection bunker (Picture
(Picture 21).

TL—n 33:.
:6
£3
If}
,’
,_.____._._ ‘
.
\\ j
-
.\
‘u
,
v5
I,‘
"
. .a
o I .2
. .1
l

"
:
. ——l P“ \
I -"
v
”I:
,_
s
\\'b
\‘N
i

"’1
. 04‘1““
o -

.4

$3.- .
...... ”WEI—1
« -
v-------c--‘,OO ~o-.....-.-«.-I

Picture 21b. Earth bunker


Picture bunker (Layout)
(Layout)
Construction of bunkers
Construction of bunkers or huts
huts can become
become absolute
absolute necessity
necessity during
during long missions
missions in winter
winter
work must start in due time
and in some areas work time in autumn.
autumn.

b) Tents and emergency


emergency shelters
shelters are sufficient
sufficient in summer.
summer. By using
using some poles
poles and braces,
braces,
larger tents in square
larger tents square or circular
circular form can be easily built. They offer the advantage
easily built. advantage of a certain
certain
living
living comfort.
comfort. The principles of careful
principles of careful camouflage
camouflage and adaption
adaption to the surrounding
surrounding terrain
terrain are
valid for tents.
also valid tents. Twig huts
huts or twig walls combined with canvas
walls combined comply with
roofs comply
canvas roofs with the
principles of camouflage
principles of camouflage very well.
very well.

47
47
They are set up very easily
up very easily and quickly.
quickly. In addition, more space
addition, more space is achieved with the same
achieved with
number of tent canvas
number of canvas pieces.
pieces. Twig huts may built in umbrella,
may be built umbrella, half-tent,
half-tent, or house
house form.
form.
Guidelines
Guidelines here are given in the pictures
pictures 22 and 23.

Picture 23. Round


Picture Round Twig Hut
1.
1. Lashing 4.
4. Fireplace
2. Flue 5. Air inlet
3. Twigs 6.
6. Sleeping place

Spruce
Spruce and pine branches
branches are fastened spars with wire,
fastened to spars wire, string, or flexible
flexible twigs.
twigs. Their needles
needles
must hang
must hang downwards
downwards in order to drain off rain.
rain. They must
must be packed
packed one upon
upon the other from
bottom
bottom to top. A clean and accurate
accurate packing of pine twigs
packing of twigs also makes
makes a good sleeping place.
sleeping place.
Picture 22 and 24. Twig Hut and Twig Roof
Picture Roof
It cushions
cushions and protects
protects against
against cold and moisture
moisture from the ground.
ground. Twig huts may built
may be built
halfway ground. They can then
halfway into the ground. then be camouflaged
camouflagedmore easily
easily and are much
much warmer.
warmer. The
dug-up
dug-up ground must be carefully
ground must advantageous to cover the roof with
hidden, it is advantageous
carefully hidden, with a layer of earth
or snow and maybe
maybe some leaves
leaves as camouflage. Permanent shelters
camouflage. Permanent shelters cannot
cannot be erected where the
erected where
terrain does not offer adequate
terrain adequate cover and concealment.
concealment. In this case,
case, suitable
suitable emergency hideouts
emergency hideouts
like lone farms,
farms, animal
animal sheds, barns,
barns, hay lofts and ruins
ruins must
must be chosen.
chosen. With some skill, it will
possible to arrange
be possible arrange warm
warm pieces
pieces in them,
them, even during
during winter.
winter.
2. Heating
Heating and Cooking
Cooking Fires
Fires
It is necessary guerrilla to build
necessary for the guerrilla fires as a source of warmth
build fires warmth and to cook. Matches must
Matches must
always
always be protected
protected against moisture and used very
against moisture very sparingly.
sparingly. It is a good idea to keep
keep a small
emergency
emergency supply in a waterproof
waterproof separate
separate container
container (bullet
(bullet casing
casing closed with wax).
closed with wax). Moist
Moist
matches will
matches will light more rubbed in the hair before
more easily if they are rubbed before striking
striking them.
them. If matches
matches are
missing, it is possible
missing, fire in the following
possible to shoot fire way: remove
following way: remove the bullet, pourpour most
most ofof the
powder on a piece
powder piece of paper
paper or bark; add paper wads, dry grass
paper wads, grass or similar material;
material; stick a soft
loose paper
paper plug
plug in the shell, fire at the prepared
prepared ignition
ignition material,
material, and blow softly. “Shooting”
“Shooting” a
fire is not very easy
very easy in humid
humid air. It works
works better
better if a teaspoon
teaspoon of
of the filling
filling from a flare
flare is added
added
to the paper.
paper. In strong sunlight,
sunlight, the fire material
material that was prepared ignited with the help of
prepared can be ignited
a lens. After ignition, the fire is nourished
After ignition, further by small sticks with shavings
nourished further shavings (Picture
(Picture 25), dry
pine twigs
pine twigs and dry grass.
grass.

Picture 25, 26a. Star-Shaped


Picture Star-Shaped Fire, with Shavings
Fire, Pit Fire Sticks with Shavings

50
Campfires
Campfires are only allowed if the enemy
allowed if enemy situation permits it.
situation permits it. The most advantageous
advantageous types
types are
shown
shown in picture
picture 26.

"(L h. 1.
w
‘€\&
7‘.‘(“

_ .
s

Picture 26b. Log-Fire


Picture Log-F ire and Invisible
Invisible Fire

Care must be taken


taken to always
always avoid
avoid treacherous
treacherous smoke
smoke and glow from a fire.
fire. It is best to cook at
night. If it is possible
night. build a stove, the smoke
possible to build must be conducted
smoke must conducted in such a way,
way, that it
disperses between the trees.
disperses between trees.

3. Water
Surface
Surface water
water out of streams
streams of all kinds
kinds should always be boiled
should always boiled before
before use.
use. Water
Water purification
purification
tablets may
tablets may replace measure in emergencies.
replace this measure emergencies.

4. Latrine and Waste


Waste
Where
Where it is not possible
possible to use an existing
existing latrine,
latrine, it must
must be avoided
avoided that latrines
latrines are set up
up near
the camp
camp so that the enemy’s
enemy’s attention
attention is not drawn
drawn to the site. The same applies
applies to urinating
urinating and
dumping
dumping of waste
waste near
near camp.
camp.

5. Food Supply, Subsistence


Subsistence
Where
Where the guerrilla
guerrilla units must
must live off the land, they
they must requisition from villages
requisition their food from villages
that are far away
away from the camp.
camp.

51
51
Staple rations must always
rations must always be saved. More insufficiencies do not allow for them
More insufficiencies them to be touched.
touched.
They may only be used when
may only when under
under enemy
enemy pressure
pressure or when
when all other possibilities
possibilities to acquisition
acquisition
food are blocked.
blocked. Concentrated
Concentrated food that is supplied
supplied by air must used very
must be used very sparingly.
sparingly. The
mess sergeant
mess sergeant must know
know which
which amount
amount ofof food is needed
needed by the unit. He must then determine
must then determine
type, amount and work
type, amount work out a plan
plan 7– the acquisition
acquisition debit –
7 to get it.
it. He is responsible
responsible for the
execution of the acquisition.
execution of acquisition.

.‘l.‘3” .- '{"‘"."?\.-
av V".
‘ ‘o 5

Picture
Picture 27. Foxhole
Foxhole for Wounded
Wounded

Bread
Bread or flour,
flour, groats,
groats, vegetables
vegetables or white
white cabbages,
cabbages, fat and meat
meat and salt are mainly
mainly needed.
needed.
Ready-made grots
Ready-made grots may
may be replaced
replaced by barley,
barley, wheat,
wheat, rye
rye or oats in emergencies.
emergencies.

52
Calculating
Calculating an amount of 2-3-kilograms
amount of 2-3-kilograms raw weight
weight of food per
per man and day adds upup to about 50
kilos for a 20-man
kilos unit. That is about 300 to 400
20-man unit. 400 kilos
kilos per
per weeks,
weeks, which
which is the equivalent
equivalent of one
or two horse
horse drawn
drawn carts. The acquisition
acquisition plan must be based
plan must based on such calculations.
calculations. No more than
more than
one week’s
week’s supply should be kept
kept openly
openly in permanent
permanent camp.
camp.

Picture
Picture 26. Sledge for Wounded
Wounded

Staple supplies
supplies of long-lasting
long-lasting food (bacon,
(bacon, smoked meat, groats,
smoked meat, groats, salt, honey
honey etc.), if possible
possible to
last for one month,
month, should be scattered throughout the operational
scattered throughout must be taken
operational area. Care must taken that it
way that it is safe from wild animals
is stored in such a way animals and rats. The food that is constantly
constantly
needed is stored in well-camouflaged
needed well-camouflagedfoxholes
foxholes near the accommodation. sufficient
accommodation. It should be sufficient
for about one month.
month. Potatoes
Potatoes can be kept
kept in holes and covered.
covered. Wheat,
Wheat, groats
groats and so forth are
best buried
best buried in wooden
wooden barrels
barrels or boxes
boxes and sealed from the top with a water-proof
top with water-proof wooden
wooden lid
and a thin layer of clay etc. and then
then camouflaged.
camouflaged.
Vegetables
Vegetables may
may be buried
buried in the same way
way as potatoes.
potatoes. Cabbage
Cabbage is best kept in wooden
wooden barrels:
barrels:
bacon
bacon may
may be kept along
along with wheat.
wheat. Fat and butter should be well well salted and poured
poured into small
wooden kegs.
wooden kegs. The opening
opening is sealed by nailing
nailing a lid on. The kegskegs are buried
buried or hung in the trees
trees
in dense pine groves.
groves. In summer,
summer, meat will
will only keep if if it is heavily if possible,
heavily salted and, if possible,
smoked.
smoked. In winter,
winter, meat will keep
keep almost
almost indefinitely
indefinitely if it is frozen.
frozen. Tea can be made out of lime
blossoms,
blossoms, blackberry
blackberry leaves, young leaves
leaves, young wild strawberries
leaves of wild strawberries and others.
others. Roasted
Roasted acorns,
acorns,
barley, wheat and so on may
barley, wheat may serve as coffee
coffee substitutes.
substitutes.

5. Emergency
Emergency Rations
Rations
Wooden flour is a good emergency
Wooden flour ration. It is best acquired
emergency ration. young pine or birch
acquired from young birch trees
trees in
the following way: remove
following way: remove the outer rough
rough bark; separate
separate the soft, moist layer underneath
underneath and
cut it into small pieces;
pieces; changing water several
changing the water times, cook it until the resin
several times, resin taste is lessened;
lessened;
carefully
carefully dry the pieces
pieces until they
they are dry and brittle; pulverize them
brittle; grind down and pulverize them into flour.
flour.
The yellow-brown
yellow-brown wooden flour that has been
wooden flour been obtained
obtained in this wayway can be used extend wheat
used to extend wheat
or rye
rye flour.
flour. It may
may also be eaten pure.
pure. To do this, prepare
prepare a dough
dough using
using milk or water,
water, roll it out
very
very flat,
flat, cut it into pieces
pieces and roast these
these on tin or iron pans.
pans. Very young
young spruce
spruce sprouts
sprouts can be
eaten raw
raw or cooked.
cooked. Edible
Edible mushrooms
mushrooms are good food, berries berries also. Mushrooms
Mushrooms become
become
poisonous after a frost, whereas
poisonous whereas many
many berries,
berries, like mountain
mountain ash and barberries,
barberries, only become
become
edible
edible and tasty
tasty after they
they have been frozen.
frozen. Cranberries,
Cranberries, whortleberries,
whortleberries, elderberries,
elderberries, and
hawthorn, which are found
hawthorn, which found in moorlands,
moorlands, are very
very nutritious
nutritious and tasty.
tasty. Lime buds and most moss
(with the exception
exception of the yellowish
yellowish ones), especially
especially the greyish
greyish white
white well-known reindeer
well-known reindeer
moss,
moss, are edible.
edible. The bitter taste that is inherent
inherent in them removed by soaking
them can be removed soaking them for
several
several hours in water which wood
water to which wood ash has been added. After
been added. After that you
you can cook them into a
mash that is fairly tasty.
mash tasty. In emergencies,
emergencies, you
you can eat mossmoss raw after washing thoroughly. At
washing it thoroughly.
the banks
banks of rivers
rivers and lakes you
you can dig out the thick roots
roots of calamus reeds. They can be eaten
calamus reeds.
raw, cooked
raw, cooked or baked.
baked.

54
Appendix I
of the Guerrilla
Guideline for the Equipment of Guerrilla
Each guerrilla seeds:
Rucksack
Rucksack or pack

Haversack
Haversack or hunting
hunting pouch
pouch
Canvas
Canvas piece
piece
Blanket
Blanket or sleeping
sleeping bag
Webbing
Webbing or belt
Ammunition pouch
Ammunition pouch
Mess kit
Canteen
Canteen with cup
cup
Cutlery
Cutlery
Hunting
Hunting knife
knife or dagger
dagger
Compass
Compass
Lighter,
Lighter, matches,
matches, magnifying firestone
magnifying lens, firestone
Weapons cleaning kit
Weapons cleaning
Pencil
Pencil and paper
paper
Calendar with rising
Calendar with rising and setting times
times of sun and moon

Camouflage
Camouflage net
Mosquito
Mosquito net

First-aid equipment:
equipment:
first-aid kit with basic
Small first-aid first-aid instructions
basic first-aid instructions

Dressing
Dressing (in the uniform)
uniform)
Chinin
Chinin

Aspirin
Aspirin Tannalbin
Tannalbin Vitamin
Vitamin drops

Prontosil
Prontosil Pervitin
Pervitin Water purification
purification tablets
tablets

55
Each group
group needs:
needs:
Binoculars
Binoculars

Flashlights
Flashlights
Map case and maps
maps
Shovel
Shovel

Claw axe
Saw
Isolated
Isolated pliers
pliers and wire
Wire cutters
cutters

Collapsible
Collapsible stoves for solid fuel
Whistle
Whistle

56
Appendix II
11

Instructions for the Use of the March Compass


Instructions
1. March Compass
Compass and Map Map
First line upup the orienting
orienting arrow
arrow with the “N” and the index mark.
mark. Then lay the compass
compass
on the map
map (on maps maps with grid lines parallel north-south line) so that the index
parallel to the north-south index
mark points
points to the upper
upper edge of the mapmap (north).
(north). Now the map map with the compass
compass is
turned
turned till the magnetic
magnetic needle with the orienting
needle is in line with orienting arrow. The declination
declination
(difference
(difference between
between magnetic
magnetic and geographic north) does not have
geographic north) have to be considered. Now
considered. Now
the map
map is oriented
oriented (north).
(north). Facing
Facing in this direction,
direction, south is behind
behind you,
you, east is to the
right, west
right, After having
west to the left. After having determined
determined your
your position
position by comparing
comparing the map
map with
the surrounding
surrounding terrain,
terrain, all points
points away
away from this position
position are in the same direction
direction as on
the map.
map.
2. Determining
Determining a Bearing
Bearing
a) Determining
Determining a bearing with the help of a map
bearing with map and compass.
compass.
aa) Connect
Connect the departure with the destination
point with
departure point point.
destination point.
ruler edge of the compass
bb) Lay the ruler compass along this line so that the arrow points
points to the
destination
destination point.
point.
cc) 1.1. On maps with grid lines, rotate
maps with rotate the turntable
turntable of the compass
compass so that it is parallel
parallel
with the nearest
with nearest North-South
North-South grid line.
2.
2. On maps
maps without
without grid lines, it is sufficient
sufficient to bring the East-West
East-West line on the
turntable parallel
turntable parallel to the names
names of the dwellings
dwellings on the map.map. Memorize
Memorize the number
number that
the index mark points
points to. You now have your your bearing.
bearing. When using the compass
When using compass in the
terrain you
terrain you must align with with the magnetic needle with the arrow “N.”
magnetic needle

If the destination
b) If point is visible
destination point Visible from the departure
departure point,
point, then you
you must:
must:

aa) Sight the destination


destination points
points over back –
7 and fore-sight with the mirror
fore-sight with mirror up.
up.
bb) Turn the turntable
turntable so that the magnetic needle points
magnetic needle points to the declination
declination mark
(which you can now see in the mirror).
(which you mirror). The index
index mark now
now points
points to the bearing.
bearing.
c) Marching
Marching by bearing.
bearing.
Turn the turntable
turntable so that the index mark points
points to the number
number of the bearing.
bearing. Now
Now turn the
compass
compass so that the magnetic
magnetic needle points to the declination
needle points declination mark. The march
march route
route and
destination
destination point
point are along the extension
extension of the index mark.

57
Appendix III
Airborne
Airborne Operations
General
1. General
Insertion
Insertion and resupply
resupply by air is conducted
conducted by parachute
parachute drop or by air landing
landing with
motor-planes
motor-planes or gliders.
gliders. Both types
types of operations
operations need to be prepared
prepared by experts.
experts.
Everyone
Everyone who has to consider possibility of air insertion
consider the possibility insertion or resupply
resupply must know
know the
following
following basic principles.
principles. The airborne
airborne operation
operation is dependent
dependent upon
upon the weather,
weather,
especially
especially in respect
respect to visibility
visibility at the drop zone or landing
landing site, motor
motor failures
failures and other
circumstances.
circumstances. Therefore,
Therefore, it cannot
cannot be planned
planned very
very far in advance
advance as to a certain time. In
certain time.
resupply operations
resupply operations that serve an existing
existing ground
ground organization
organization in the operational
operational area,
area, a
possible operations
possible operations period
period of at least 8 days must be agreed
agreed upon.
upon. The path-finder
path-finder group
group
responsible for the landing
responsible landing light signals or beacons
beacons must be ready
ready during
during this period of
period of
time. The time
time. time of arrival
arrival may
may be later in case of enemy
enemy contact
contact or unfavorable
unfavorable weather,
weather, or
earlier
earlier in case of strong tail wind.
wind.

2. Parachute Drop Drop


The static-line parachute is used when
static-line parachute when dropping
dropping persons.
persons. The parachute
parachute opens
opens
automatically.
automatically. The chute is absolutely
absolutely safe if maintained properly, and there
maintained properly, there is no danger
danger
to life even with inexperienced
inexperienced men. The impactimpact on the ground
ground at a rate of descent
descent of
about 6 meters/second,
meters/second, is no greater
greater than when
when jumping
jumping from a height
height of 2 meters.
meters. It is
essential
essential that the chutist keeps his feet together
chutist keeps together so that the impact
impact is absorbed
absorbed by both
feet. Special gymnastics
gymnastics are not necessary.
necessary. Cargo
Cargo drops are conducted using special
conducted using
weapons, and equipment
weapons, equipment containers
containers and automatic parachutes. Cargo
automatic parachutes. Cargo may
may be dropping
dropping by
itself or combined
itself combined withwith personnel.
personnel. The parachutist
parachutist can carry
carry only that equipment
equipment with
him that he urgently needs, such as rations,
urgently needs, weapons (pistol,
rations, weapons (pistol, hand grenades),
grenades), and other
material needed
material needed for the mission.
mission. This can be done by carrying
carrying the equipment
equipment on the man,man,
in the pockets,
pockets, in a pack
pack tied in front of the chest, or in a bag.
bag. Untrained
Untrained men are easily
easily
hurt when
when carrying rifles or submachine
carrying rifles submachine guns
guns during
during the jump. This is especially
especially the case
at night.
night. This equipment
equipment should be attached
attached to the webbing
webbing and lowered
lowered by a rope
rope so that
it hangs
hangs underneath.
underneath. All other material
material should be dispatched
dispatched separately.
separately. Cargo-load
Cargo-load drops
drops
are subject to technical
technical considerations.
considerations. They are conducted under the supervision
conducted under supervision of
experienced
experienced specialists.
specialists. Of course,
course, every
every member
member of the guerrilla
guerrilla unit going into action
action
must know
know the contents
contents of each load. The loads should be plainlyplainly marked with luminous
marked with luminous
paint. The flight
paint. flight route
route must be clearly
clearly visible.
visible. This is achieved
achieved by using dominant
dominant
navigation points
navigation points like bays, rivers, railways, streets, that are easily seen. Larger
rivers, railways, Larger
settlements
settlements should be avoided.
avoided. Mountains
Mountains generally
generally are not suited as navigation
navigation points.
points.
Insertion
Insertion is mainly
mainly conducted
conducted at night.
night. The navigation
navigation points
points are recognized best between
recognized best between
th day before
the 88‘h before and after full moon.

The drop zone should be sparsely populated and easily


sparsely populated easily accessible
accessible to the flight’s position-
flight’s position-
finding
finding means.
means. A large dispersion
dispersion of men and material
material must be considered when
considered when

58
choosing
choosing the drop zone. Large pastures that are fenced
Large pastures fenced in by forests
forests or hills, and cannot
cannot
be viewed
viewed from the sides, are best suited.

59
They should
should not have ditches,
ditches, boulders
boulders or other natural
natural or artificial
artificial obstructions
obstructions on them.
them. The
size should be approximately
approximately 2000 by 500 meters. meters. Dispatching
Dispatching is conducted
conducted according
according to the
technical and tactical
technical tactical instructions
instructions of an experienced jump-master. The best
experienced jump-master. best flight
flight level is at 300
meters. In order to ensure
meters. ensure a dense landing
landing when
when dispatching whole units,
dispatching whole units, it is necessary
necessary that the
men jump in close and fast sequencesequence (each ½ V2 second).
second). Delays
Delays during
during the dispatch
dispatch may
may endanger
endanger
the complete
complete mission.
mission. When having
having to approach repeatedly there
approach repeatedly there is no guarantee
guarantee that the unit
will land close together.
together. If the unit was dropped
dropped into an area that was not foreseen
foreseen for it, due to
incorrect navigation or an emergency,
incorrect navigation emergency, it still must be able to operate operate from there
there and reach
reach the
operational
operational area. Appropriate
Appropriate supplies with maps
supplies with maps and march
march compass
compass must be provided.
provided. When
When
planning the mission,
planning considered that radio
mission, it must also be considered radio communications
communications may may not work,
work,
(Determination
(Determination of land messengermessenger routes,
routes, or mail deposit link-up with existing
deposit sites, link-up radio
existing radio
installations
installations in the operational
operational area.)
area.) A drop zone with the same characteristics
characteristics as for paratrooper
paratrooper
landing
landing zones
zones is agreed upon for resupply
agreed upon resupply operations.
operations. The procedure
procedure for the assembly
assembly of the
groups
groups after landing
landing must be ordered
ordered in detail.
detail. First contact
contact is made using
using inconspicuous
inconspicuous sound
signals
signals (animal
(animal voices,
voices, clapping
clapping hands).
hands). Depending
Depending on the situation,
situation, the group
group gathers
gathers from the
first to the last or vice-versa.
first vice-versa. If If cargo
cargo has been dispatched
dispatched before
before the men,
men, the group
group gathers
gathers
towards first man. An alternate
towards the first alternate assembly
assembly point
point or RV must be ordered
ordered in all situations
situations so that
men whowho have been carried
carried away fiom the drop zone can join their
away from their group
group later on. In order to
assist the airplane
airplane in finding
finding the drop zone,zone, the unit already
already in the operational
operational are uses directions,
directions,
finding
finding equipment
equipment or sets up up visual
visual signs that were
were agreed upon. These signs must consist
agreed upon. consist of a
simple,
simple, clearly
clearly visible
visible geometrical
geometrical symbol
symbol that rules out anyany confusion.
confusion. (Example:
(Example: an isosceles
isosceles
triangle with
triangle with a base of 70 metersmeters and two sides of 100 100 meters.)
meters.) While
While sheets are laid out in
daytime
daytime at the corner points. At night,
corner points. fires are lighted
night, fires lighted that are prepared
prepared by heaping
heaping up wood.
up wood.
Incendiaries should be used to light them
Incendiaries should them quickly.
quickly. They are lighted
lighted as soon as the listening
listening post
first motor
hears the first motor noises.
noises. It must be possible
possible to keep
keep the fire
fire burning
burning for a longer period. As
longer period.
soon as the airplane
airplane has reached
reached the drop zone,zone, a flashing
flashing light should be shined.
shined. Flares
Flares may
may only
be used if if the enemy
enemy cannot
cannot see them.
them.

3. Air Landings
Landings
Air landings
landings are dependent
dependent upon
upon a number
number of very
very different
different and variable
variable conditions
conditions from case to
case. There
There will always
always be the exception.
exception. Landings
Landings of airplanes
airplanes are only to be planned
planned if
preparations are possible
preparations possible by an organization
organization already
already in the operational
operational area in genera.,
genera., an expert
may
may be dropped
dropped in to check the suitability
suitability of the site for landing
landing and starting.
starting. Where
Where this is not
possible, the following
possible, following guidelines
guidelines must be used:
used: A motor vehicle
vehicle should be able drive over the
field at a speed of approximately
field approximately 60 kilometers/hour.
kilometers/hour. The landing
landing site should be completely flat
completely flat
without natural
without natural or artificial
artificial obstacles.
obstacles. It should not be too soft. Also,
Also, the immediate
immediate surrounding
surrounding
terrain should not have any
terrain any high obstacles
obstacles in order to ensure
ensure low entry and exit. The landing
landing site
is marked
marked with lights
lights or white
white sheets according
according to the agreed
agreed sign. In general, of 2000 x
general, a site of
2000 meters
meters will be required.
required. The same rules as for airplanes
airplanes also apply
apply to gliders.
gliders. But the
distance needed
distance needed for landing
landing may
may be reduced
reduced to approximately
approximately 30 meters
meters through
through the use of
braking parachutes or rockets.
braking parachutes rockets. Night
Night landings
landings without
without preparation
preparation by an existing
existing organization
organization are
not possible,
possible, even for gliders.
gliders. In general,
general, the insertion will be in the early hours
insertion will hours of dawn.
dawn. But
even then considerable
considerable casualties
casualties must be expected
expected in case of ground
ground fog. The execution
execution of a

59
glider
glider insertion
insertion is extremely
extremely dependent
dependent upon
upon the careful
careful choice
choice of the glider pilot.
pilot. He must stay
with the guerrilla
with guerrilla unit after the landing should be used as an expert
landing and should expert on all questions
questions
concerning
concerning air operations.
operations.

60
Appendix A: Digital and Modern Methods

1. Operational Security
Security (OPSEC)
(OPSEC)
Introduction to OPSEC:
Introduction Paranoia
OPSEC: A Caution Against Paranoia
The following
following summary
summary of the modern
modern state of the surveillance
surveillance network
network is provided
provided to make the
reader
reader aware
aware of one thing:
thing:
PERFECT OPSEC IS AN ILLUSION. THE ONLY PATH TO VICTORY IS THROUGH
DETERMINED ACTION AND AND MILITARY PROWESS. It is highly highly encouraged
encouraged to assign
assign
certain
certain people
people within
within your
your combat
combat unit the role of maintaining
maintaining OPSEC/INFOSEC
OPSEC/INFOSEC and
developing
developing this understanding
understanding among rest, not through
among the rest, through constant
constant discussion,
discussion, but through
through
timely updates,
timely should their behaviors
updates, should behaviors deviate
deviate from agreed
agreed upon procedures. Ultimately,
upon procedures. Ultimately, the
modern
modern revolutionary
revolutionary must be agile and aware, Appendix is a collection
aware, this Appendix collection of modern tools to
modern tools
supplement
supplement a strident
strident behavioral sufficientdegree
behavioral style. A sufficient degree of OPSEC
OPSEC to provide reassurance and
provide reassurance
guide
guide actions
actions is to be weighed
weighed against paranoia and inaction.
against paranoia inaction. Ultimately, it is preferential
preferential to
discount OPSEC in favor of revolutionary action and a coherent understandingunderstanding of National
Socialist principles, especially
Socialist especially as they apply to continuous improvement. In practice practice this
means:
means: „Keep
,,Keep Calm and Carry On “! “!

I. TOR
As a very
very long time Tor user,
user, the most surprising
surprising part of the NSA
NSA documents
documents was how
little progress
progress they have made against
against Tor. Despite
Despite its known weaknesses, it's still the
known weaknesses,
best thing provided it's used
thing we have, provided used properly,
properly, and you
you make no mistakes.
mistakes. If seeking
seeking
security
security of "the greatest
greatest degree technically feasible"
degree technically feasible" such as when
when facing ZOG or an
facing ZOG
enemy
enemy well-funded
well-funded government with significant
government with visibility or control
significant visibility control of the Internet
Internet you
you
must take into consideration
consideration the warnings
warnings that Tor is not sufficient
sufficient to protect
protect you
you from
such an actor. Consider whether you you truly need this level of protection. If having
having your
your
activity
activity discovered
discovered does not putput your
your life or liberty
liberty at risk, then
then you
you probably
probably do not need
to go
go to all of this trouble.
trouble. But if it does, then you
you absolutely
absolutely must be vigilant you wish
vigilant if you wish
remain alive and free.
to remain

Contents
1)
1) Your Computer
Computer
2) Your
Your Environment
Environment
3) Your Mindset
Mindset
4) Hidden
Hidden Services
Services
5) Conclusion
Conclusion
6) Source
Source
1) Your Computer2
1)
To date, the NSANSA and FBI's primary attacks
FBI's primary attacks on Tor users
users have been Man-in-the
Man-in-the Middle
Middle
(MITM)
(MITM) attacks
attacks (NSA)
(NSA) and hiddenhidden service web server compromises
compromises (FBI) which which either
sent tracking
tracking data to the Tor user'suser's computer,
computer, compromised
compromised it, or both. Thus, you need
Thus, you need a
reasonably secure system from which
reasonably which youyou can use Tor and reducereduce your of being
your risk of being
tracked or compromised.
tracked compromised.
1) Don't use Windows. Just don't. This also means
1) means don't use the Tor BrowserBrowser Bundle
Bundle on
Windows. Vulnerabilities in the software
Windows. Vulnerabilities software in Tor browser button figure
browser button prominently in
figure prominently
both the NSA slides and FBI's recent
both takedown of Freedom
recent takedown Freedom Hosting.
Hosting.
2) If you
you can't construct
construct youryour own workstation
workstation capable
capable ofof running
running Linux
Linux and carefully
carefully
configured
configuredto run the latest availableavailable versions
versions of Tor, a proxy
proxy such as Privoxy,
Privoxy, and a web
browser
browser (with all outgoing Cleamet access
outgoing Clearnet access firewalled),
firewalled), consider using Tails or Whonix
consider using Whonix
instead,
instead, where
where most of of this work
work is done for you. you. It's absolutely
absolutely critical
critical that outgoing
outgoing
access firewalled, so that third party
access be firewalled, party applications
applications cannot
cannot accidentally
accidentally leak data about
your location.
your location.
3) If you
you are using
using persistent
persistent storage of any kind, ensure
any kind, ensure that it is encrypted.
encrypted. Current
Current
versions of LUKS
versions LUKS are reasonably
reasonably safe, and major Linux distributions
distributions will offer to set it
up for you
up you during their installation.
during their installation. True CryptCrypt
2 Note:
Note: Burner
Burner phones,
phones, Signal Jammers
J ammers and EM weaponsweapons are not discussed
discussed however
however are
recommended for further
recommended further personal
personal study. Burner
Burner phones
phones (both old and new) new) especially
especially
present an attractive
present attractive option
option for revolutionaries
revolutionaries with access
access to expansive
expansive financial
financial options
options
and are ideal for communications.
communications. Might Might be safe, though
though it's not nearly
nearly as well-integrated
well-integrated
into the OS. BitLocker
BitLocker might
might be safe as well, thoughthough youyou still shouldn't running
shouldn't be running
Windows.
Windows. Even if if you
you are in a country
country where
where rubber
rubber hosing
hosing is legal, such as the UK,
encrypting
encrypting your
your data protects
protects youyou from a variety
variety of other threats.
threats.
4) Remember
Remember that your your computer
computer must be kept up up to date. Whether
Whether you you use Tails or
build
build your
your own workstation
workstation from scratch or with with Whonix, update frequently
Whonix, update frequently to ensure
ensure
you are protected
you protected from the latestlatest security
security vulnerabilities.
vulnerabilities.
Ideally,
Ideally, you
you should update each time you
should update you begin a session,
session, or at least daily. Tails will
notify you
notify you at startup
startup if an update
update is available.
available.
5) Be very
very reluctant
reluctant to compromise
compromise on JavaScript,
J avaScript, Flash and Java. Disable them all by
Disable them
default.
default. If a site requires
requires anyany of these,
these, visit somewhere
somewhere else. Enable
Enable scripting
scripting only as a
last resort,
resort, only temporarily,
temporarily, and only to the minimum minimum extent necessary to gain
extent necessary
functionality of a web site that you
functionality you have no alternative
alternative for.
6) Viciously
Viciously drop cookies
cookies and local data data that sites send you.
you. Neither
Neither the Tor browser
browser
button nor Tails do this well
button well enough
enough for my my tastes;
tastes; consider
consider using
using an addon
addon such as Self-
Destructing
Destructing Cookies
Cookies to keep keep your
your cookies
cookies to a minimum
minimum (0).
7) Your workstation
workstation should be a laptop; it must be portable portable enough
enough to be carried with
carried with
you and quickly
you quickly disposed
disposed of or destroyed.
destroyed.
8) Don't
Don't use Google
Google to search the Internet.
Internet. A good alternative
alternative is Startpage;
Startpage; this is the
default
default search engine
engine for Tor browser
browser button,
button, Tails, and Whonix. Another is
Whonix. Another
DuckDuckGo
DuckDuckGo which which also has a hidden service. Plus, it won't
hidden service. won't call you
you malicious
malicious or ask
you to fill
you fill out CAPTCHAs.
CAPTCHAs.
2) Your Environment
Tor contains weaknesses which
contains weaknesses which can only be mitigated through actions
mitigated through actions in the physical
physical
world. An attacker
world. who can view both
attacker who both your
your local Internet
Internet connection,
connection, and the connection
connection
of the site you
you are visiting,
visiting, can use statistical
statistical analysis
analysis to correlate them.
correlate them.
1) Never
1) Never use Tor from home, home, or near home. Neverwork
near home. Never work on anythinganything sensitive
sensitive enough
enough to
require Tor from home,
require home, even if you remain offline.
you remain offline. Computers
Computers have a funny habit of of
liking
liking to be connected.
connected. This also applies
applies to anywhere
anywhere you you are staying
staying temporarily,
temporarily, such as
a hotel.
hotel. Never
Never performing these activities
performing these activities at home helps to ensure ensure that they cannotcannot be tied
those locations.
to those locations. (Note that this applies people facing
applies to people facing advanced
advanced persistent
persistent threats.
threats.
Running
Running Tor from home is reasonable
reasonable and useful
useful for others,
others, especially
especially people
people who aren't
doing
doing anything
anything themselves
themselves but wish wish to help by running
running an exit node, node, relay,
relay, or bridge.
bridge.
2) Limit
Limit the amount
amount of timetime you
you spend using Tor at any any single location.
location. While
While these
these
correlation
correlation attacks
attacks do take
take some time,
time, they
they can in theory
theory be completed
completed in as little as a
And while
day. And while the enemy
enemy are very very unlikely
unlikely to show up up the same day you you fire up Tor at
fire up
Starbucks,
Starbucks, they might
might show up up the next day. I recommend
recommend for the truly truly concerned
concerned to
never use Tor more than
never than 24 hours
hours at anyany single physical
physical location;
location; after that, consider
consider it
burned and go
burned go elsewhere.
elsewhere. This will help you
you even if the enemy
enemy show up
up six months
months later;
it's much easier to remember
remember a regular
regular customer
customer than someone
someone who who showed
showed up up one day
and never
never came back.
back. This does mean you will have to travel
you will travel farther
farther afield,
afield, especially
especially if
you
you don't live in a large city, but it will
will help to preserve
preserve youryour ability
ability to travel
travel freely.
freely.
3) When
When youyou go
go out to perform
perform these
these activities,
activities, leave youryour cell phone
phone
turned
turned on and at home.
home.
3) Your Mindset
Many
Many Tor users
users get caught
caught because
because they made a mistake, posting their
mistake, such as posting their real E-mail
E-mail
address
address in association
association with their activities.
with their activities. You must avoid avoid this as muchmuch as possible,
possible, and
the only way
way to do so is withwith careful
careful mental
mental discipline.
discipline.
1)
1) Think
Think of your
your Tor activity
activity as pseudonymous
pseudonymous and create create in your
your mind a virtual
virtual identity
identity
to correspond with the activity.
correspond with virtual person
activity. This virtual person does not know know you you and will never never
meet you
you and wouldn't
wouldn't even like you you if he knew
knew you.
you. He must be kept kept strictly
strictly mentally
mentally
separated.
separated.
2) If you
you must use public
public Internet
Internet services,
services, create
create completely
completely new accountsaccounts for this this
pseudonym. Never
pseudonym. Never mix them;
them; for instance,
instance, do not browse
browse Facebook
Facebook with your your real E-mail
E-mail
address
address after having used Twitter
having used Twitter with your your pseudonym's
pseudonym's E-mail E-mail on the same computer.computer.
until you
Wait until you get home.
home.
3) By the same token,
token, never
never perform
perform actions related to your
actions related your pseudonymous
pseudonymous activity activity via
the Clearnet, unless you
Cleamet, unless you have no other choice choice (e.g.
(e. g. to sign up up for a provider
provider who who blocks
blocks
Tor) and take extra precautions
precautions regarding
regarding your
your
location when doing so.
location when so.
you need to make and receive
4) If you receive phone
phone calls, purchase
purchase an anonymous
anonymous prepaid prepaid phone
phone
for the purpose. difficult in some countries,
purpose. This is difficult countries, but it can be done if you you are creative
creative
enough.
enough. Pay cash; never
never use a debit or credit card to buy the phone top-ups. Never
phone or top-ups. Never
insert its battery
battery or turn it on if youyou are within
within 10
10 miles (16 km) of your your home, nor use a
phone from which
phone which the battery
battery cannot removed. Never
cannot be removed. Never place
place a SIM card previously
previously
used
used in one phone
phone into another phone. Never
another phone. Never give its number
number or even admit its existence
existence
to anyone who knows
anyone who knows youyou by youryour real identity.
identity. This maymay need
need to include
include your
your family
family
members.
members.
Services
4) Hidden Services
These
These are big in the news news lately, withwith the recent takedown of at least two high-profile
recent takedown high-profile
hidden
hidden services,
services, Silk Road and Freedom Freedom Hosting.
Hosting. The bad news news is, hidden
hidden services
services are
much weaker than
much weaker than they could
could or should be. The good news news is, the NSANSA doesn't
doesn't seem to
have done much with them (though
much with (though the NSA NSA slides mention
mention a GCHQ program named
GCHQ program named
ONIONBREATH
ONIONBREATH which which focuses
focuses on hidden
hidden services,
services, nothing
nothing
else is yet known
known about it)3. In addition,
addition, since hidden
hidden services must often run under
services must under
someone
someone else's physical
physical control, they are vulnerable
control, they vulnerable to being compromised
compromised via that other
party. Thus,
party. Thus, it's even moremore important
important to protect
protect the anonymity
anonymity of the service,
service, as once it is
compromised
compromised in this manner, manner, it's pretty
pretty much game game over. 3 Verify
Verify the most current
current state
of intelligence
of intelligence on any any enemy
enemy intelligence
intelligence network.
network.
The advice
advice given above sufficientif
above is sufficient if you
you are merely
merely visiting
visiting a hidden
hidden service. If you
you
need
need to run a hidden
hidden service,
service, do all of the above, above, and in addition
addition do the following. Note
following. Note
that these tasks require
these tasks require an experienced
experienced systemsystem administrator; performing them
administrator; performing them without
without
relevant experience
the relevant difficult or impossible.
experience will be difficult impossible.
1)
I) Do not run a hidden
hidden service
service in a virtual
virtual machine unless you
machine unless you also control
control the physical
physical
host. Designs
Designs in which
which Tor and a service run in firewalled firewalled virtual
virtual
machines firewalledphysical
machines on a firewalled physical host are OK, provided provided it is the physical
physical host which
which you
you
are in control
control of, and you you are not merely
merely leasing
leasing cloud
cloud space.
space.
2) A better
better design
design for a Tor hiddenhidden service consists
consists of two physical
physical hosts,
hosts, leased
leased from
two different providers though
different providers though they may may be in the same datacenter. first physical
datacenter. On the first physical
host, a single virtual
host, virtual machine
machine runs runs with
with Tor. Both firewalledto
Both the host and VM are firewalled
prevent outgoing traffic
prevent outgoing traffic other thanthan Tor traffic
traffic and traffic
traffic to the second physical
physical host. The
second
second physical
physical host will then contain contain a VM with with the actual hidden
hidden service. Again,
Again, these
these
firewalled in both directions.
will be firewalled directions. The connection
connection between
between them shouldshould be secured
secured
with IPSec,
with IPSec, OpenVPN,
OpenVPN, etc. If it is suspected
suspected that the host runningrunning Tor may may be
compromised,
compromised, the service on the second second server may may be immediately
immediately movedmoved (by copying
copying
the virtual
virtual machine
machine image)
image) and both both servers
servers decommissioned.
decommissioned. Both of these these designs
designs can
be implemented
implemented fairly easily easily with Whonix.
Whonix.
3) Hosts
Hosts leased from third third parties
parties are convenient
convenient but especially vulnerable to attacks
especially vulnerable attacks
where the service
where service provider takes a copy
provider takes drives. If the server is virtual,
copy of the hard drives. virtual, or it is
physical but uses
physical uses RAID
RAID storage,
storage, this can be done without taking the server offline.
without taking Again,
offline. Again,
do not lease cloud
cloud space,
space, and carefully
carefully monitor
monitor the hardware
hardware of the physical
physical host. If the
RAIDarray
RAIDarray shows as degraded,degraded, or if the server is inexplicably
inexplicably down for more than a few
moments,
moments, the server should be considered considered compromised,
compromised, since there there is no way
way to
distinguish
distinguish between
between a simple hardware failure
simple hardware failure and a compromise
compromise of this nature.
nature.
4) Ensure
Ensure that your
your hosting provider offers
hosting provider offers 24x7 access
access to a remote
remote console
console (in the
hosting
hosting industry
industry this is often called a KVM KVM thoughthough it's usually
usually implemented
implemented via IPMI
which can also install
which install the operating
operating system).
system). Use temporary
temporary
passwords/passphrases during
passwords/passphrases during the installation
installation and change
change them
them all after you
you have Tor up up
and running
running (see below).
below). The remote
remote console
console also allows
allows you
you to run a fully encrypted
encrypted
physical host, reducing
physical reducing the risk of data loss through physical compromise;
through physical compromise; however,
however, in
this case the passphrase
passphrase must be changed
changed every
every time the system
system is booted
booted (even this does
not mitigate possible attacks,
mitigate all possible attacks, but it does buy you time).
you time).
5) Your initial setup of the hosts whichwhich will
will run the service must be over Clearnet,
Clearnet, albeit
albeit
via SSH; however,
however, to reiterate,
reiterate, they must not be done from home or from a location location you
you
have ever visited
have visited before.
before. As we have seen,seen, it is not sufficient
sufficient to simply use a VPN. This
may
may cause you you issues with actually
actually signing
signing upup for the service due to fraud protection
protection that
such providers
providers maymay use. How to deal with with this
this is outside
outside the scope
scope of this
this answer,
answer, though.
though.
6) Once
Once youyou have Tor up up and running,
running, never
never connect
connect to any
any of the servers or virtual
virtual
machines via Clearnet
machines Clearnet again. Configure
Configure hidden
hidden services
services which
which connect
connect via SSH to each
host and each of the virtual
virtual machines,
machines, and always
always use them.
them. If you
you must connect
connect via
Clearnet
Clearnet to resolve
resolve a problem,
problem, again,
again, do so from a location
location you
you will never
never visit again.
again.
7) Hidden
Hidden services
services must be moved
moved regularly,
regularly, even if compromise
compromise is not suspected.
suspected. A
2013 paper
paper described
described an attack which
which can locate
locate a hidden
hidden service
service in just a few months
months for
around
around $10,000
$10,000 in cloud compute
compute charges,
charges, which well within
which is well budget of even some
within the budget
individuals.
individuals. It is safer, though
though not at all convenient,
convenient, to move the hidden hidden service
service at least
monthly.
monthly. Ideally,
Ideally, it should be moved
moved as frequently
frequently as possible,
possible, though
though this quickly
quickly veers
into the impractical. Note that it will take
impractical. Note take approximately
approximately an hour for the Tor network network to
recognize the new location
recognize location of a moved
moved hidden
hidden service.
service.
5) Conclusion
Anonymity is hard. Technology
Anonymity Technology alone, no mattermatter how good it is, will will never
never be enough.
enough. It
requires a clear mind and careful
requires careful attention
attention to detail, as well
well as real-world
real-world actions
actions to
mitigate weaknesses that cannot
mitigate weaknesses cannot be addressed
addressed through
through
technology alone.
technology alone. As has been so frequently mentioned, the attackers
frequently mentioned, attackers can be bumbling
bumbling
fools who only have sheer luck to rely on, on, but you
you only have to make one mistake
mistake to be
ruined. We call them
ruined. them "advanced persistent threats"
"advanced persistent threats" because,
because, in part,
part, they are persistent.
persistent.
They won't
won't give up, you must not.4
up, and you not.4
II. TOR + VPN and Advanced Considerations5
ConsiderationsS
If you
If you wish
wish to proceed past this point
proceed past point you
you will need to have a deep understanding
understanding ofof
exactly
exactly what a VPN intemet connections
VPN is and how internet connections operate
operate on a fundamental
fundamental level. If
any
any of the terminology
terminology used before
before confuses find somebody
you then find
confuses you somebody more competent
competent to
interpret
interpret the following
following section.
section. Now for those
those who are still reading,
reading, Stallman
Stallman may
may be
some goony
goony beard guy who supports
beard guy supports some commie
commie BS and is constantly
constantly crying
crying about
Trump
Trump but his website's pretty decent
website's pretty decent to dig through
through for info. His long term
term link is a good
place to dig for sites that may
place may house
house some decent
decent info: https://stallman.org/longterm.html
https://stallman.org/longterm.html
1] Assorted
1) Considerations
Assorted Topics and Considerations
i) „I've
..['ve got nothing to hide!“
'I've Got Nothing
Nothing to Hide'
Hide' and Other Misunderstandings of Privacy
Misunderstandings of Privacy
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565&
https://papers.ssm.com/sol3/papers.cfm?abstract_id=998565&
Matters -- Ted Talk
Why Privacy Matters
https://www.ted.com/talks/glenn_greenwald_why_privacy_matters
https://www.ted.com/talks/glenn_greenwald_why_privacy_matters
4 https://www.torproject.org/download/download-easy.html.en#warning
https://www.torproject.org/download/download—easy.html.en#warning
55 Additionally,
Additionally, this is old information,
information, but still relevant:
relevant: Hacker
Hacker OPSEC
OPSEC --
http://grugq.github.io/
http://grugq.github.io/

break -- https://prism-break.org/
Prism break https://prism-break.org/
ii) „What
,,What about TOR+VPN or TOR+proxies, is it worse than plain TOR?“
provide a benefit
It can provide benefit in certain
certain circumstances.
circumstances.
You-to-Tor-to-VPN-to-Clearnet will let you you use sites that block Tor exits (unless
(unless they
also block your vpn
block your provider). You-to-VPN-to-Tor
vpn provider). You-to-VPN-to-Tor will prevent prevent anyone
anyone observing your
observing your
local traffic
traffic from knowing
knowing that you you are connecting
connecting to the Tor network
network (though
(though obviously
obviously
they will know
they know youyou are connecting
connecting to the VPN) VPN) Source:
Source:
https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
https://trac.torproj ect.org/proj ects/tor/wiki/doc/TorPlusVPN
You -> VPN/SSH
You VPN/SSH -> Tor
You can route
route Tor through
through VPN/SSH
VPN/SSH services.
services. That might prevent your
might prevent your ISP etc. from
seeing that you're using Tor (VPN/SSH
you're using (VPN/SSH Fingerprinting
Fingerprinting below).
below). On one hand, VPNs VPNs are
more popular
popular than
than Tor, so you won't stand out as much, on the other hand, in some
you won't
countries replacing an encrypted
countries replacing encrypted Tor connection
connection with with an encrypted
encrypted VPNVPN or SSH
connection,
connection, willwill be suspicious
suspicious as well.
well. SSH tunnels
tunnels are not so popular.
popular. Once the VPN
client has connected,
connected, the VPN tunnel tunnel will be the machine's
machine's default
default Internet
Internet connection,
connection,
and TBB (Tor Browser
Browser Bundle)
Bundle) (or Tor client)client) will route
route through
through it. fine
it. This can be a fine
idea, assuming
assuming youryour VPN/SSH
VPN/SSH provider's
provider's network
network is in fact sufficiently
sufficiently safer than
than your
your
own network.
network. Another
Another advantage
advantage here is that it prevents
prevents Tor from seeing who who you
you are
behind the VPN/SSH.
behind VPN/ SSH. So if somebody
somebody does manage manage to break
break Tor and learn the IP address
address
your traffic
your traffic is coming
coming from, but your your VPN/SSH
VPN/ SSH was actually
actually following through on their
following through
promises (they won't
promises watch, they
won't watch, they won't
won't remember,
remember, and they they will somehow
somehow magically
magically
make it so nobody
nobody else is watching
watching either),
either), then you'll
you'll be better off.
You VPN/SSH
You -> Tor -> VPN/SSH
You can also route
route VPN/SSH
VPN/SSH services
services through
through Tor. That hides and secures your Internet
secures your Internet
activity
activity from Tor exit nodes.
nodes. Although
Although you you are exposed
exposed to VPN/SSH
VPN/SSH exit nodes,nodes, you
you at
least get to choose
choose them.
them. If you're using VPN/SSHs
you're using VPN/SSHs in thisthis way,
way, you'll want to pay
you'll want pay for
them anonymously
them anonymously (cash in the mail [beware [beware of youryour fingerprint
fingerprintand printer
printer fingerprint6],
fingerprint6],
Liberty
Liberty Reserve,
Reserve, well-laundered
well-laundered Bitcoin,
Bitcoin, etc.). However,
However, youyou can't readily
readily do this without
without
using virtual
using machines. And
virtual machines. you'll need
And you'll need to use TCP mode for the VPNs VPNs (to route
route through
through
Tor). In our experience,
experience, establishing
establishing VPN connections
connections through
through Tor is chancy,
chancy, and
requires much tweaking.
requires tweaking. Even if you you pay
pay for them
them anonymously, you're making
anonymously, you're making a
bottleneck where
bottleneck where all your
your traffic
traffic goes
goes 7– the VPN/SSH
VPN/ SSH can build a profile
profile of everything
everything
you do, and over time
you time that will probably
probably be really
really dangerous.
dangerous.
VPN/SSH
VPN/SSH Fingerprinting
Fingerprinting
Using
Using a VPN or SSH does not provide provide strong guarantees
guarantees of hiding
hiding the fact you
you
(6 WARNING:
WARNING: Your printer printer may
may leave identifying
identifying microdots
microdots on the page)
page)
are using
using Tor from your your ISP. VPN's
VPN's and SSH's are vulnerable
vulnerable to an attack called Website
Website
traffic
traffic fingerprinting
fingerprinting
1)
1) Very briefly,
briefly, it's a passive
passive eavesdropping
eavesdropping attack,
attack, although
although the adversary
adversary only watches
watches
encrypted
encrypted traffic
traffic from the VPN or SSH, the adversary
adversary can still guess what website
guess what website is
being visited,
visited, because
because all websites specific traffic
websites have specific traffic patterns.
patterns. The content
content of the
transmission is still hidden,
transmission hidden, but to which
which website
website one connects
connects to isn't secret anymore.
anymore.
There
There are multiple research papers
multiple research papers on that topic
topic (See footnote).
footnote).
2) Once the premise
premise is accepted,
accepted, that VPN's
VPN's and SSH's can leak which which website
website one is
visiting with a high accuracy,
visiting difficult to imagine,
accuracy, it's not difficult encrypted Tor traffic
imagine, that also encrypted traffic
hidden by a VPN's
hidden VPN's or SSH's could be classified.
classified. There
There are no research papers on that
research papers
topic7.
topic7.
What about Proxy Fingerprinting?
Fingerprinting? It has been said above already, already, that connections
connections to
proxies are not encrypted,
proxies therefore this attack
encrypted, therefore attack isn't even required
required against proxies, since
against proxies,
proxies cannot
proxies cannot hide the fact that you're
you're using
using Tor anyway.
anyway.
iii) Chain VPNs and Metadata:
Metadata:
Unlike what is often wrongly
Unlike what wrongly assumed,
assumed, metadata
metadata is extremely powerful, and chaining
extremely powerful, chaining
multiple VPNs or using
multiple VPNs using simply a VPN
VPN or Tor is not that safe. The following
following may
may allow
you to better
you better evade detection via Metadata:
evade detection Metadata:
https://security.stackexchange.com/questions/121733/how-can-meta-data-beused-to-
https://security.stackexchange.com/questions/ 1 2 1 7 33/how-can-meta-data-beused-to-

identify-users-through-chained-vpns/121738#121738
identify-users-through-chained-vpns/1 21 738#12 173 8
7 Examining research papers
Examining research papers on related topics is a must for SS members
related topics members in charge
charge of
INFOSEC
INFOSEC and/orand/or OPSEC.
OPSEC.

2) Best Linux distro


Due to constant
constant debate
debate and fanboyism
fanboyism regarding
regarding various
various distributions
distributions of the Linux
Linux
OS no one version
version is to be entirely
entirely recommended8.
recommendedS. The user is asked asked to look at the
features
features of each distribution
distribution and the intention
intention behind
behind using it and hardware
hardware it will
be booted
booted on. You can dual boot boot most Linux
Linux distributions boot them
distributions or live boot them from a
USB or CD/DVD.
CD/DVD.
III. Operating
Operating „in ,,in the Open ““
INFOSEC only part of
INFOSEC is of OPSEC.
OPSEC. OPSECOPSEC largely
largely relies on your
your behavioral patterns. A
behavioral patterns.
vital part of those
those patterns
patterns is your
your shopping
shopping decisions
decisions and daily routine.
routine. Consider
Consider the
following
following section
section to be a warning
warning against
against short-sighted
short-sighted and enemy-supporting
enemy-supporting
consumerist
consumerist choices.
choices. The ideal revolutionary National Socialist
revolutionary National Socialist WILL
WILL NEVER
NEVER BETRAY
BETRAY
HIS RACE
RACE OR NATION NATION FOR CREATURE CREATURE COMFORTS!
COMFORTS!
1) ruminations by An Anon With a Clue™
l) OPSEC ruminations ClueTM
If every
If every tree falling
falling in every
every forest might soon be heard
forest might heard by an internet-connected
internet-connected
microphone, what
microphone, what hope is there
there for our privacy?9
privacy?9 When you’re sitting in a room with an
When you’re
iPhone
iPhone (spy phones),
phones), an Apple
Apple Watch
Watch (spy watches)
watches) and a smart assistant
assistant like Amazon
Amazon
Echo or Google
Google HomeHome (spy appliances), you’re surrounded
appliances), you’re surrounded by a dozen microphones.
dozen microphones.
(Newer
(Newer iPhones
iPhones have four and the Echo has seven, while the smartwatch
seven, while smartwatch has just one,
one, for
now.) Add in the latest smart wireless
now.) wireless headphones
headphones (bug phones) 7
phones) — Apple’s
Apple’s expected
expected
next-generation Air Pods (spypods)
next-generation
talking microwave
talking
(spypods) or competing
microwave ovens (spy ovens) ovens) and TVs (spy TVs) from Samsung,
7
competing ones from Bose or Shure — along
Samsung, LG and others,
with
along with
others,
and anyone
anyone at home or in an open-plan
open-plan office
office could soon be within
within earshot
earshot of hundreds
hundreds of
microphones.
microphones.
The roadmaps
roadmaps of tech giants
giants and startups
startups alike show how sound is poisedpoised to become
become the
first ubiquitous
first ubiquitous connection
connection between users and the artificial
between users artificial intelligence
intelligence hive mind the
internet
internet is becoming.
becoming. Driving
Driving this change
change are massive
massive volumes
volumes ofof components,
components, originally
originally
designed
designed for smartphones
smartphones and other mobile
mobile devices.
devices. Cancer
Cancer grows
grows after all. For a
hundred
hundred years,
years, microphones
microphones consisted
consisted of a relatively
relatively large membrane whose vibrations
membrane whose vibrations
were converted
were converted to electrical
electrical impulses.
impulses. But starting
starting in the 1980s,
1980s, engineers
engineers worked
worked out
ways to make microphones
ways tiny, bordering
microphones tiny, bordering on microscopic.
microscopic. Most
Most still have a pocket
pocket of air
trapped behind
trapped behind a vibrating
vibrating element,
element, but now theythey can be carved
carved out of silicon, just like
the microchips which they’re
microchips to which they’re attached.
attached. Smartphones,
Smartphones, smart speakers
speakers and any
any other
gadget
gadget that listens
listens for your
your voice
voice all use these
these kinds of microphones.
kinds of microphones.

8 Ubuntu or Mint
9 https://archive.fo/jv0qa
ht_tps://archive.fo/jv09a

One ongoing
ongoing challenge
challenge for microphones
microphones has been physics: physics: The smaller microphones
microphones get,
the more of them you you need
need to capture
capture a sound, and the more processing
processing of that
that sound is
required. Startups
required. Startups such as Boston-based
Boston-based VesperVesper Technologies, 7
Technologies, Inc. — which
which has received
received
money from Baidu,
money
even tinier, yet
yet more capable
Amazon’s Alexa
Baidu, Bose and Amazon’s
capable designs
designs built around
7
Alexa Fund — are meeting
around minuscule
meeting the challenge
minuscule flaps of silicon
flaps of
with
challenge with
silicon that generate
generate
electric
electric current when bent by sound waves.
current when waves. Vesper claims this gives their
Vesper claims their microphone
microphone
unique capabilities,
unique capabilities, like understanding
understanding your your voice even in windy
windy conditions,
conditions, and drawing
drawing
zero power
power when
when awaiting
awaiting a “wake word,” since sound itself
‘Vvake word,” itself generates
generates the power
power the
microphone needs. We’re
microphone needs. We’re moving toward a world
moving toward world in which
which everything with a plug or
everything with
battery can respond
battery respond to a voice command.
command. Apple’s
Apple7s next Air Pods (spypods)
(spypods) could
could have
many
many of the capabilities
capabilities that Vesper
Vesper claims
claims its microphones
microphones will enable,
enable, such as built-in
built-in
noise cancellation.
noise cancellation. (In the past, Apple used several
Apple has used several suppliers
suppliers for its microphones.)
microphones.)
Meanwhile,
Meanwhile, the CEO of Samsung’s
Samsung’s consumer-electronics
consumer-electronics division recently told The Wall
division recently
Street Journal
Journal that by 2020 his company
company plans
plans to equip every
every single device sellsifrom
device it sells—from
TVs to refrigerators—with
refrigeratorsiwith microphones.
microphones. It could be unnerving to be surrounded surrounded by
listening devices,
devices, but the paradox is that as the technologytechnology develops,
develops, so does our
ability to free these gadgets from having to connect to the internet. internet.
Consider
Consider the voice-controlled trash can (spy cans) from Simple human.
voice-controlled trash human. Say “Open
“Open can”
opensiand then closes
and it opens—and closes on its own once the user walks walks away.
away. That’s
That’s it. It’s easy
easy to
make fun of a high-tech
high-tech trash
trash can,
can, especially
especially one that costs $200. As anyone anyone who lives
with multiple
with multiple virtual
virtual assistants attest, it is tricky to talk to one without
assistants can attest, without inadvertently
inadvertently
involving whole crowd.
involving the whole crowd.
Consumers must do everything to stop this from happening and BOYCOTT all
these spy
spy products.10
2) Physical OPSEC and Usage Behaviourll
Usage Behaviour11
The following
following list of 17
17 points
points was written
written with the absolute
absolute human
human limits
limits of OPSEC
OPSEC in
mind.
mind. It is to be followed
followed by the most
most committed
committed of resistance warriors.
resistance warriors.
1)
1) Don't
Don't use social media.
media. Avoid
Avoid Facebook/Myspace/
Facebook/Myspace/ Twitter/
Twitter/ Snapchat/etc.
Snapchat/etc.
2) Forward
Forward secrecy
secrecy (keep your
your mouth
mouth shut about
about any personal info if you
any personal you don't want
want to
expose
expose yourself)
yourself)
3) Use a cheap private VPN (w/ no IP logging)
cheap private logging) and Tor browser!
browser!
Always disconnect
4) Always disconnect your intemet (physically)
your internet (physically) when you are not going
when you going to use it!
it! Make
sure Bluetooth
Bluetooth and Wi-Fi is physically
physically disabled.
disabled. Don't keep it online time! If you
online all the time! you
do, you
you are asking
asking to be hacked!
hacked!
10
10 https://archive.fo/u2rcj
https://archive.fo/u2rcj
11
11 http://archive.is/lM6ZA
hflp://archive.is/1M6ZA

5) Use an old "flipper"


"flipper" phone. AKA a jitterbug.
phone. AKA jitterbug. Cover
Cover upup any
any camera
camera if has one.
Jitterbugs
J itterbugs are basic cellphones
cellphones for the disabled/senior citizens. Just a bare basic cell
disabled/senior citizens.
phone where
phone where you you can take out the battery. intemet platform.
battery. Has no internet platform.
6) Flock
Flock to flea flea markets,
markets, garage thrift shops to buy older electronics!
garage sales, thrift electronics! Do not buy
'smart'
'smart' or 'green'
'green' appliances!
appliances! Learn how to maintain
maintain and fixfix older products/utilities
products/utilities too!
All IoT (Internet
(Internet of Things)
Things) tech can be used used to spy
spy on you,
you, avoid IoT! 7) Never
Never put your
put your
real name
name or personal
personal info into your
your computer,
computer, always
always use FAKE
FAKE names
names / aliases12.
aliases12.
8) Face-to-face relationships are the best kind.
Face-to-face relationships kind. Don't be afraid
afraid to hang with
with your
your friends
friends
now and then.
now then.
9) Always
Always bleachbleach your browser cache / cookies
your browser cookies / web logs! 35x Gutmann
Gutmann style (See
footnote)!
footnote)! (Bleach
(Bleach bit, CCleaner,
CCleaner, etc.)
10)
10) No OS is safe. Just exclude exclude as much
much personal
personal information
information youyou can from youryour
Operating
Operating System.System. Make
Make sure its disconnected
disconnected offline
offline when
when not being used!
used! Make
Make sure
Bluetooth
Bluetooth and Wi-Fi Wi-Fi is also physically
physically disabled when not in use.
disabled when
11)
11) Browser
Browser Security:
Security: Use Noscript
Noscript add-on. Noscript is a must: make sure to block all
add-on. Noscript
global
global scripts, wipe the whitelist
scripts, wipe whitelist in Noscript re-configure the whitelist
Noscript and re-configure whitelist that
that best
best fits
fits
your
your browser
browser habits.
habits. IPFlood
IPFlood is also a useful
useful add-on
add-on to
obfuscate
obfuscate IP GET requests. requests. You should use Random Random Agent
Agent Spoofer
Spoofer (or Blender)
Blender) to spoof
spoof
your browser
your browser & OS metadata while you
metadata while surf the web,
you surf web, making
making it a lot harder
harder to track
track your
your
activity.
activity. Tin Foil Foil is another
another great security
security addon.
addon.
12) computers, rather
12) It's best to have two computers, rather than
than just one. For example,
example, have one just for
banking/legit LEGAL
banking/legit purposes. Have
LEGAL purposes. Have another
another one (completely
(completely separated)
separated) just for private
private
or illegal
illegal activity.
activity. Make
Make sure youyou don't put
put any
any personal
personal info in the private computer.
private computer.
13)
13) Use encryption
encryption and strong passwords!
passwords! Write them them down on a piecepiece of paper
paper or
memorize
memorize them. them. DO NOT NOT store passwords
passwords on a computer
computer file.
file. That is a big no-no!
no-no! Try
easy
easy to remember
remember long sentences
sentences for passwords
passwords and combine
combine all the words
words together.
together. The
more characters
characters used,used, the harder
harder it is for hackers break the passwords.
hackers to break passwords.
14)
14) Have separate
separate email accounts
accounts for each kind kind of activity.
activity.
15)
15) Make sure you physically disconnect
you physically disconnect youryour web cam
cam or cover it up up with black
black
electrical
electrical tape.tape. Most laptops
laptops these
these days come with web web cams attached
attached above
above or below
below the
monitor. Make
monitor. Make sure the camera
camera cannot used to identify
cannot be used you or spy
identify you spy on you
you in any
any way.
way.
16) Avoid
16) Avoid new new "Smart TVs"!TVs"! If you
you have a newernewer TV, make sure you you cover
cover upup or unplug
unplug
the camera
camera and microphone. offline and disconnected
microphone. Or, keep it offline disconnected from the cable box
when
when not in use.
use. You could cancel
cancel cable and rip DVDs
DVDs of your
your favorite
favorite movies
movies and
shows instead
instead (See footnote), using it for offline
footnote), using purposes only.
offline purposes
12 Note: the person
12 Note: person who
who wrote
wrote this was too paranoid.
paranoid. Take the information provided as
information provided
the absolute
absolute highest possible safety standards,
highest possible standards, beyond
beyond what is reasonable.
reasonable.
17) Avoid
17) Avoid all new
new digitized
digitized vehicles.
vehicles. They can easily hacked, used
easily be hacked, used to spy
spy on you
you and
even be remotely
remotely hijacked
hijacked by criminal
criminal entities/governments!
entities/ governments!

3) Meta data usage


usage
i) Examples of Meta data usage usage
The following
following list may
may be written
written in a humorous
humorous manner,
manner, but the information
information contained
contained
within is dead serious.
within serious. Do not let your
your operation
operation get blown
blown up
up by metadata
metadata leakages
leakages or
anomalies.
anomalies.
1)
1) When
When 2 phones
phones go go offline
offline simultaneously
simultaneously and then then go
go online
online again simultaneously,
simultaneously,
then the likelihood
then likelihood that those
those 2 individuals
individuals have just met, and are engagedengaged in a secret
enterprise,
enterprise, is high.
2) One number
number goes
goes offline
offline and then another
another goes
goes online
online (sim switching).
switching).
Uncle Ahmed
3) Uncle Ahmed calls Afghanistan
Afghanistan suddenly
suddenly every week; perhaps
every week; perhaps this
this means uncle
means uncle
Ahmed decided
Ahmed decided he wants
wants to be famous
famous and fuck goats in heaven.heaven.
4) Keywords being heard
Keywords being heard on the mic (processed
(processed locally
locally by the user's
user's device)
device) are a good
way
way to efficiently
efficiently gather
gather intel.
5) Jake scored very
very high on the online
online IQ test: searches
searches for keywords
keywords like "terrorist
"terrorist
attacks",
attacks", "explosives", watches goat-porn-in-heaven
"explosives", watches goat-porn-in-heaven vids, visits extremist
extremist sites, uses
uses Tor,
honeypot-VPNs;
honeypot—VPNs;well well Jake must be monitored.
monitored.
6) AI has made similar
similar surveillance
surveillance extremely
extremely effective.
effective.
7) Since AI have made it harderharder to hide,
hide, it's important
important to be clean when using the internet
when using internet
without prior
without procedures. That way
prior procedures. way even if they ever decide
decide to pin something
something on you
you to
neutralize you,
neutralize they can't do so easily.
you, they easily.
8) Another
Another exploit
exploit they can use (if theythey have access
access to ISP logs) is meta data from Tor
usage.
usage. E.g. you
you start using
using Tor at about
about 6:00am
6:00am every
every night,
night, and at 6:05am
6:05am there is only
one person
person posting
posting on a revolutionary
revolutionary forum
forum for 30'. Then the moment posting stops,
moment the posting
you close Tor and start browsing
you browsing the internet
internet normally.
normally.
These are all examples of meta data which can be used by the enemy enemy to identify youryour
online presence.
presence.
Further OPSEC related resources
4) Further
Prevent yourself from being doxed -- http://archive.is/deaBB
http://archive.is/deaBB
https://pastebin.com/8zGxwtEB
https://pastebin.com/8szthB
Further anti-dox OPSEC procedures -- http://archive.is/lgJCN
Further http://archive.is/ngCN
Removing
Removing exifexif and meta data
data - http://archive.is/Cf2Sf
http://archiveis/Cf28f
hng/archiveis/hlem
Create false leads -- http://archive.is/hP1wm
5) Secret Meetings
Secret Meetings Guide
A security
security service like the FBI can only achieveachieve its objectives
objectives by intercepting
intercepting
communication
communication betweenbetween people.
people. This means
means you beat the security
you can beat security service
service if you
you can
them the ability
deny them ability to overhear
overhear your meetings with
your meetings with your
your contacts.
contacts. Of course,
course, this guide
guide
is to be interpreted
interpreted not through
through an American
American lens but withwith the correct
correct local political
political
dynamics
dynamics in mind.
mind.
Does your Socialist security agency
your local anti-National Socialist agency rely on SIGINT or HUMINT
more? Are you you unsure? Study your your enemy.
enemy.
Contents
1)
1) What
What you'll here...
you'll learn here…
2) Step-by-step instructions...
Step-by-step instructions…
a) Step 11
b) Step 2
c) Step 3
d) Step 4
e) Step 5
f) Step 6
g) Step 7
3) Spook talk.
talk… ..
1) What you'll learn here… here...
This section teaches
teaches youyou how to check for surveillance
surveillance before
before you
you meet with a
clandestine
clandestine contact.
contact. You'll
You'll learn a protocol that will beat security services services like the FBI,
BATF,
BATF, DEA, and others. others. The method
method is particularly
particularly effective
effective against
against standard
standard police
police
surveillance.
surveillance. It also works
works against
against the so-called
so-called inspection
inspection teams
teams of the IRS.
Tradecraft origins: The method
Tradecraft method described
described in this article
article was originally
originally devised
devised in 1943-
1943-
1944
1944 by countersurveillance
countersurveillance expert Anthony Blunt for Britain's
expert Anthony Britain's MI.5.
MI.5. Unfortunately
Unfortunately for
the British,
British, Blunt was a deep-cover
deep-cover agent for the KGB. Six years years later, Blunt taught
taught the
protocol to his new KGB
protocol KGB controller,
controller, Yuri Modin.
Modin. Together
Together they perfected
perfected the technique
technique
as it is known
known today. successfully thwarted
today. They successfully thwarted MI.5 surveillance
surveillance for three
three years,
years,
sometimes
sometimes even meetingmeeting daily to exchange
exchange information
information and top-secret
top-secret documents.
documents. In
effect,
effect, Blunt was usingusing his inside knowledge of MI.5's
inside knowledge MI.5's surveillance techniques to beat
surveillance techniques
them at their own game.
them game.
Proliferation: This countersurveillance
Proliferation: countersurveillance method
method has since been adopted
adopted by Israel's
Israel's
Mossad,
Mossad, Germany's
Germany's BND, Russia'sRussia's KGB (now the SVR), the American American CIA, and many many
others.
others. The protocol
protocol is taught
taught by intelligence agencies to their
intelligence agencies their controllers
controllers -- these
these are the
intelligence
intelligence officers
officers whowho manage
manage and meet with deep cover cover agents
agents in foreign
foreign countries.
countries.
The method being used today
method is also being today by resistance
resistance movements
movements and urban urban guerrilla
guerrilla groups.
groups.
When
When this countersurveillance
countersurveillance protocol
protocol is methodically
methodically applied,
applied, it is extremely
extremely difficult
difficult
for a security
security service to breach
breach your
your security.
security.
instructions. . .
2) Step-by-step instructions…
Here's
Here's a hypothetical
hypothetical situation.
situation. Assume
Assume that youyou and I wish to meet clandestinely.
clandestinely.
We wish
wish to ensure
ensure thatthat our meeting
meeting is not observed
observed by a surveillance team. You and I
surveillance team.
have previously
previously agreed
agreed uponupon a place,
place, date, and time. In addition,
addition, we are familiar
familiar with
each other's
other's appearance
appearance -- we can recognize
recognize each other on sight.
Step 1: You and I independently
independently arrivearrive at the previously
previously agreed-upon
agreed-upon general
general location.
location.
Rather
Rather than fixing
fixing a specific
specific location,
location, we agree
agree to be only in the general
general vicinity.
vicinity. This is
an important principle. This might be a large park,
important principle. park, a residential
residential district,
district, etc. The location
location
must be outdoors
outdoors and free of video video surveillance
surveillance cameras.
cameras. It should
should also be selected
selected with
the intention
intention of thwarting
thwarting telephoto
telephoto lenses. You and I should each know
lenses. You know the area well.well.
The location
location should provide reasonable
should provide reasonable cover
cover for each of us being
being there
there - strolling
strolling in the
park, walking
park, walking through
through a residential
residential area to a bus stop, convenience
convenience store, etc.
Step 2: You and I will eventuallyeventually make eye eye contact
contact at some distance
distance from each other.
other. We
do this discretely,
discretely, so others
others are unaware.
unaware. I use a pre-arranged
pre-arranged signal to alert you you that I
have spotted you. you. Perhaps
Perhaps I'll throw
throw mymy jacket over my my shoulder,
shoulder, or remove
remove and clean my my
sunglasses,
sunglasses, etc. The signal must be a natural natural movement
movement that does not attractattract unwanted
unwanted
attention.
attention.
first: Even though
Safety first: though you you and I have seen each other, we do NOT NOT approach
approach each
other.
other. This is an important
important safety valve.valve. If either of us has grown
grown a tail we do not want want to
compromise
compromise the other other person.
person.
BACKGROUND: The phrase
BACKGROUND: phrase grown
grown a tail is spy-talk being under
spy-talk for being under surveillance.
surveillance. The
phrase is somewhat
phrase somewhat inaccurate, because they don't just follow
inaccurate, because follow you, they often surround
you, they surround
you.
you.
Step 3: When you you see my my signal you walk off. Then I follow
you simply walk follow you
you in order to
ensure
ensure that you're
you're not being watched.
watched. I carefully
carefully check for the presence
presence of a floating-box
floating-box
foot surveillance
surveillance team.
team. I check for agents fixed observation
agents at fixed posts. I also watch
observation posts. watch for
drive-by
drive-by support
support from a floating-box vehicle surveillance
floating-box vehicle team.
surveillance team.
BACKGROUND: In particular,
BACKGROUND: particular, I may
may follow
follow you, may walk
you, I may walk parallel
parallel to you,
you, I may
may
occasionally walk
occasionally walk ahead
ahead of you.you. The goal is simply
simply to be nearby
nearby so I'm in a position
position to
detect
detect surveillance
surveillance around you. I always
around you. remain at a distance
always remain distance from you,
you, of course, never
course, never
approaching
approaching too closely.
closely.
Step 4: WhenWhen I have satisfied
satisfied myself
myself that you
you are clean,
clean, I again signal you.
you. Perhaps
Perhaps I re-
tie my
my shoe laces.
Step 5: Now reverse roles
Now we reverse roles and this time it is I who
who simply walks
walks off.
You begin to followfollow me in order order to ensure
ensure that I'm not being watched. You check
being watched. check for
floating-box
floating-box foot surveillance, fixed observation
surveillance, fixed post foot surveillance,
observation post surveillance, and drive-by
drive-by
support
support by a vehicle
vehicle surveillance team. What to look for. You
surveillance team. You carefully watch for persons
carefully watch persons
who are pacing
who pacing me or moving parallel with me. You check for persons
moving parallel persons loitering
loitering at
positions with
positions with a good line-ofline-of sight to mymy location.
location. You watch
watch for an ongoing pattern of
ongoing pattern
people coming
people coming and going going
that results
results in someone
someone always being in a position
always being position to monitor
monitor me. You watchwatch for vehicles
vehicles
dropping
dropping someone
someone off off ahead
ahead of me.
Step 6: When you you are satisfied
satisfied that I am clean, you signal me that I'm not being watched.
clean, you watched.
(On the other hand,hand, if you
you suspect
suspect that a surveillance
surveillance team
team is in the
vicinity, you simply abort the operation
vicinity, you operation and walkwalk away.)
away.)
BACKGROUND: You must trust your
BACKGROUND: your instincts,
instincts, because
because if something
something seems not quite
right it's better to be safe than
right than sorry.
sorry. Many people
people are surprised
surprised to learn that it is not
difficult to detect a surveillance
difficult surveillance team watching
watching someone
someone else. This is the subtle elegance
elegance
of Blunt's
of Blunt's countersurveillance
countersurveillance system.system. And the goonsgoons are helpless
helpless against
against it.
Step 7: You and I can now approach approach each other and meet. After After our discussion
discussion we agree
agree
upon the date, time,
upon time, and location
location of our next
next clandestine
clandestine meeting
meeting - as well as two
two backup
backup
plans in case the meeting
plans meeting is thwarted
thwarted by surveillance.
surveillance. If we are unable first
unable to meet at the first
venue
venue we will use our fallback
fallback position
position and we willwill meet at the same time and placeplace one
week
week later.
later. If we are unable
unable to make that meeting
make that meeting happen,
happen, we will shift to a previously
previously
agreed-upon
agreed-upon failsafe
failsafe plan and we will will meet at a different
different location
location at an agreed-upon
agreed-upon date
and time. Neither
Neither you you nor I1 writes
writes down particulars of our next meeting.
down the particulars meeting. We commit
commit
the details
details to memory.
memory.
BACKGROUND 1: If you
BACKGROUND you have any any documents
documents to give me, me, I will not accept
accept those
those
documents
documents until the final final moments
moments of our meeting.
meeting. I will have already
already started making
making my my
getaway when I accept
getaway when accept the documents. reduces the chance
documents. This reduces chance of discovery
discovery and arrest by
a surveillance
surveillance teamteam that has managed
managed to elude
elude our countersurveillance
countersurveillance protocol.
protocol. If the
security
security service acts too quickly, they will have no evidence
quickly, they evidence against
against me,
me, because
because the
documents
documents have not yet yet been passed to me.
been passed
BACKGROUND 2: The best agents
BACKGROUND never mix discussion
agents never discussion and documents.
documents. If a document
document
is to be passed,
passed, no discussion
discussion occurs.
occurs. The entire contact takes only a moment
contact takes moment -- the perfect
perfect
brush pass. The principle
brush pass. principle is simple. It is foolhardy
foolhardy to stand around
around holding
holding incriminating
incriminating
documents.
documents.
talk. . .
Spook talk…
Spies in North America call this seven-step
North America seven-step protocol
protocol for countersurveillance
countersurveillance dry-cleaning.
dry-cleaning.
In Europe,
Europe, it is called parcours
parcours de sécurité
sécurité - a French
French phrase
phrase which can be translated
which translated as
security
security run or security
security circuit.
circuit.

5) USB dead drops


Create a USB Dead Drop in Nature by DIY Hacks and How To’s
Dead drop is an anonymous,
anonymous, offline,
offline, peer-to-peer
peer-to-peer file
file sharing network
network in public
public space.
space.
This network
network is made
made up
up of USB drives
drives that
that are embedded
embedded in walls,
walls, buildings
buildings and other
public places.
public places. Anyone
Anyone is free to access,
access, download,
download, and upload.
upload. It is very
very similar
similar to
geocaching
geocaching but with first USB dead drop network
with data. The first network of five
five locations
locations was created
created
by Berlin-based
Berlin-based artist Aram
Aram Bartholl
Bartholl in 2010. Since then,
then, there
there have been over 1,000
1,000
dead drop locations
locations that have been registered
registered at deaddrops.com
deaddropscom (WARNING:
deaddrops.com is as of July 2018 a 3rd party,
ofJuly he sure to make yourself aware of
party, be
whether their status has changed politically).
politically).
For a walk
walk through
through of how to set up up a standard
standard USB dead drop, check out this instruction
instruction
by user frenzy.
frenzy. Up until
until now, mostly restricted
now, this has been mostly restricted to urban
urban locations.
locations. In this
instruction,
instruction, I1 am going
going to attempt
attempt to expand
expand this project
project beyond
beyond city limits by showing
showing
everyone
everyone how to embed
embed USB drives
drives in natural
natural fixtures
fixtures such as trees
trees and rocks.
rocks.
Contents
1)
1) Materials
Materials
2) Remove
Remove the Housing
Housing of the USB Drive
3) Wrap
Wrap the USB Drive in Plumber'sPlumber's Tape
4) Select a Dead Tree or Stump as a Dead Dead Drop LocationLocation
5) Drill Holes in the Trunk Trunk to Make Room for Your USB Drive
6) Apply
Apply the Wood
Wood Glue and Insert the USB Drive Drive
7) Finished
Finished Dead
Dead Drop Site
8) Stone Dead
Dead Drop Location
Location
1)
1) Materials
To install
install a USB drive in a tree, you will need
tree, you need the following
following materials:
materials:
Materials: USB flash
Materials: flash drive, Plumber's tape, Wood
Plumber's tape, Wood Glue
Tools:
Tools: Cordless
Cordless Drill, Drill bit, set Screwdriver,
Screwdriver, or other tool to pry pry open flash drive
open the flash
Remove the Housing of the USB Drive
2) Remove
first step is to open
The first open up up the housing flash drive and remove
housing of the flash remove all the unnecessary
unnecessary
plastic. You can usually
plastic. usually prypry open
open the housing
housing with a small screw driver driver or knife.
knife. Another
Another
option
option is to just squeeze
squeeze the housing with a pair
housing with pair of pliers
pliers at the seam. Continue
Continue removing
removing
parts until
parts until only the USB connector
connector and the circuit
circuit board
board remain.
remain.
3) Wrap
Wrap the USB Drive in Plumber's Plumber's Tape
Applying a layer of plumber's
Applying plumber's tape around
around the circuit
circuit board
board of the drive
drive helps to keep it a
little more
more protected.
protected. Don't go go overboard,
overboard, one or two layers
layers is plenty.
plenty.
Select a Dead Tree or Stump as a Dead Drop Location
4) Select
Select a dead tree to locatelocate your
your dead drop. I do not recommend
recommend using using a healthy
healthy tree for
this project.
project. In addition
addition to the damage
damage caused
caused by drilling,
drilling, the cavity
cavity that youyou create
create also
provides a potential
provides potential site for mold, rot and insects insects to take
take upup residence.
residence. Because
Because of this, I
recommend using
recommend using a tree that is obviously
obviously dead, fallenfallen over,
over, or just a stump.
stump.
5) Drill Holes
Holes in the TrunkTrunk to Make Room for Your USB Drive
connector and board
The USB connector board of a typical
typical USB drive is about 0.51inch 0.51inch (13mm) wide x
(13mm) wide
0.20inch
0.20inch (5mm)
(5mm) thick.
thick. There are a number
number of ways ways that you you can drill out a slot to
accommodate
accommodate for it. it. The simplest
simplest and fastest
fastest method
method is to drill a single hole that is large
enough
enough to fit fit the whole
whole drive inside of it. it. A 1/2"
1/2" drill bit will usually
usually suffice
suffice for this.
If you
you want
want to make
make a smaller
smaller imprint
imprint on the surface
surface and make the end product product look a
little cleaner, you can drill a series of smaller
cleaner, you smaller holes in a line to make a slot. Each hole
should be the same thickness
thickness as the USB drive (about (about 0.64cm).
0.64cm). Then you you can finish
finish the
shaping
shaping with a knife
knife or file.
file.
Be sure to drill your
your hole is a part part of the tree that is solid and free from rot.
6) Apply the Wood Glue and Insert Insert the USB Drive
Clear the saw dust and wood
Clear shavings from the hole by blowing
wood shavings blowing on it.it. Then fill
fill the hole
most of the wayway with
with wood
wood glue. Slowly
Slowly insert
insert the USB drive into the hole until
until the back
edge of the metal
metal on the connector port is even with the surface of the tree. Some of the
connector port
glue will squeeze
squeeze out around
around the edges. Wipe off off the excess
excess using
using some nearby
nearby leaves.
leaves.
Once the glue dries, you you have
have a USB dead drop site out in nature. nature. If you
you wish
wish to prolong
prolong
the life of the drive, you you can put a capcap on it (or over it) to at least partially
partially protect
protect it from
weather.
the weather.
7) Finished Dead Drop Site
The last step is to upload
upload the instruction
instruction text files
files and any
any other files you want
files that you want to
share.13
share.13 To document
document the dead drop location, if you
location, it helps if you take three
three pictures of the
pictures of
location
location (up close medium
medium and far away).
away). This makes
makes it easier
easier for others find your
others to find your
dead drop.
8) Stone Dead Drop Location
need to limit yourself
You don't need trees. You can also setup a dead drop in stone.
yourself to just trees.
The process
process for this variation
variation is identical
identical to the original procedure that is used
original procedure used for brick
brick
and mortar
mortar locations. find a relatively
locations. Just find relatively soft rock,
rock, drill the hole with a mortar
mortar drill bit
and use a concrete patch or fast drying
concrete patch drying cement
cement instead fill the hole.14
instead of glue to fill hole. 14
13 Reminder: deaddrops.com is a 3rd party
13 Reminder: party
find the readme
You can find readme file
file here: http://deaddrops.com/download/readme.txt
http://deaddrops.com/download/readme.txt
l4 http://www.instructables.com/id/Create-a-USB-Dead-Drop-in-Nature/
14 http://www.instructables.com/id/Create-a-USB-Dead-Drop-in-Nature/

6) Party
Party van with Pirate Box and Botnet
This concept
concept is only for the most dedicated technically capable.
dedicated and technically capable. Implementing
Implementing it
requires determination,
requires determination, good driving
driving and an intimate
intimate knowledge
knowledge of INFOSEC.
INFOSEC. It has
been dubbed
dubbed the „Party
,,Party van“ since inside of it youyou will be having
having a continuous party, but
continuous party,
there is another
there another Party Van which
which has letters
letters belonging
belonging to an „Alphabet
,,Alphabet Soup“ agency
agency
attached
attached to it awaiting
awaiting you if you
you if you go
go for this method.
method.
Are you
you mentally strong enough to becoming a bit buccaneer?
What you need:
What you need:
1)
1) A van or truck.
truck. A rental
rental vehicle
vehicle is recommended,
recommended, though security thereof
though the security thereof is
questionable.
questionable. Intimate knowledge of the vehicle
Intimate knowledge vehicle and any
any digital
digital subsystems
subsystems it may have
may have
is a necessity.
necessity.
2) A „pirate
,,pirate box“ hacked router and antenna
hacked router antenna set-up.
3) A small team
team of 2-5 revolutionaries
revolutionaries who are all skilled drivers.
drivers.
4) Food
Food rations,
rations, as you will be driving
you will driving almost
almost continuously
continuously for the entire
entire operation.
operation.
5) A route
route plan -- DO NOT NOT DIGITIZE
DIGITIZE THE ROUTE ROUTE PLAN!
PLAN!
6) A „zero-day“,
,,zero-day“, or list of common
common Wi-Fi exploits,
exploits, in order to hack nearby
nearby Wi-Fi
modems.
modems.
7) Knowledge
Knowledge of how to maintain
maintain and operate
operate a botnet, which is the product
botnet, which product of this
endeavor
endeavor and can then be used used against
against enemy
enemy digital
digital networks.
networks. The concept
concept is simple.
simple.
You buy rations
rations and get your other supplies
get your supplies stocked up.
stocked up.
Then you
you drive along
along your route at a leisurely
your route leisurely pace
pace hacking
hacking as many
many Wi-Fi
Wi-F i routers
routers
(automatically!
(automatically! Write
Write the script yourself!)
yourselfl) along the wayway as come into range
range of your
your
signal. Law enforcement
enforcement will not identify you as long as you
identify you you stay on the move
move and avoid
avoid
boosting your signal too strongly.
boosting your strongly. Ideally,
Ideally, your
your connection
connection request
request should
should not be visible
visible
nearby Wi-Fi
to nearby users. Ultimately
Wi-Fi users. Ultimately this method
method depends
depends greatly
greatly on personal
personal computer
computer and
communications proficiency and is recommended
communications proficiency recommended in order to build a botnet week
within a week
botnet within
or so of continuous
continuous driving
driving (take shifts, make sure proper
proper vehicle maintenance is
vehicle maintenance
observed prior to departure
observed prior departure and use cash at gasgas stations).
stations).
The success
success of such a mission
mission depends
depends on careful planning of digital
careful planning resources and
digital resources
knowledge of both cellular
knowledge cellular and 2G/3G/4G networks. If
2G/3G/4G networks. If your
your ISP notices
notices irregular
irregular
behavior
behavior and decides
decides to remove
remove you from their
you from their system youyou must have plans
plans around
around this
eventuality.
eventuality. Dynamic
Dynamic IPs and multiple
multiple (or spoofed)
spoofed) device
device IDs are essential
essential to maintain
maintain
connectivity
connectivity to the network,
network, or it is entirely possible to perform
entirely possible perform the operation
operation „offline
,,offline “if
your configuration
your configuration settings
settings are adequate
adequate and you
you do not plan
plan on immediately
immediately activating
activating
the botnet.
botnet. The topic
topic of botnet
botnet management
management should
should be carefully planned and directly
carefully planned directly
connected
connected to the following
following attacks
attacks on enemy
enemy network
network infrastructure.
infrastructure.
You
You may
may picture yourself as a pirate, but first
first and foremost you
you are a National
Socialist and any
Socialist any use of the botnet for personal gain will be identified and punished
by your
your allies.
allies.

Officers
IV. Tactics against Law Enforcement Officers
Enforcement
1) Dealing with Law Enforcement
Golden Rule: Ask for a lawyer immediately upon upon contact and say say nothing.
Do not fall for the tricks
tricks which
which enemy
enemy law enforcement
enforcement may play. Nothing
may play. you say
Nothing you say
can help you.
you. Law enforcement
enforcement officers
officers are not in a position
position to offer you
you a plea
plea
deal, only the prosecution
prosecution is, and even then you you are guaranteed
guaranteed a politicized
politicized
verdict
verdict for having opposed their
having opposed their Jew cabal and stood for the liberty
liberty of your
your Volk.
Judges
Judges do not need to accept
accept the plea bargain
bargain either.
either. Law enforcement
enforcement use
various
various techniques
techniques to trytry and get
get a confession.
confession. They will trytry to minimize your
minimize your
behavior
behavior and make it seem wise to agree with them.
agree with them. This is a trick.
trick. An in-depth
in-depth
guide to law enforcement
enforcement interrogation techniques is not required,
interrogation techniques required, because
because all of
their
their techniques
techniques can be countered
countered by refusing
refusing to speak and asking
asking for a lawyer.
lawyer.
Contents
1) LE knocked
1) knocked on my my door
2) I am being offered
offered a deal if I turn states witness
witness
3) LE is requesting
requesting to search my my house
house or car
4) I got arrested
arrested and am being
being interrogated
interrogated
5) If I ask a cop
cop if they are a cop,
cop, do they have to tell me
6) Do LE smoke weed weed or use other drugs
7) I am non-important/don't
non-important/don't do anything
anything wrong
wrong
8)
8) When
When I talk online
online I like to say
say SWIM (someone
(someone whowho isn't me)
So LE knocked on my my door and asked to talk to me. They say say that they know I
have been up up to no good, better for me if I talk to them.
good, and that it will be better
What should I do?
You should under circumstances talk to LE. They are not your
under no circumstances your friends
friends 15,
15, although
although
they may pretend to be. Anything
may pretend Anything youyou say will be used against
say can and will against you
you in court. In
fact, anything
anything you
you say will be twisted
say will twisted to put you
you in the worst possible light. Even if you
worst possible you
think
think you
you are saying something
something innocent, twist it against
innocent, LE can twist you. So, it is best to say
against you. say
absolutely
absolutely nothing.
nothing. Don't try to outsmart
outsmart them
them in an interrogation,
interrogation, this is not a game,
game, if
they think
they think you
you are the sort ofof person
person that sees things
things as a game
game they will try
try and make
make
you feel smarter than
you than them when they
them when they question you, but in reality
question you, they are just getting
reality they getting
you to talk more. When
you When questioned
questioned by LE, you you should immediately request to talk to your
immediately request your
lawyer,
lawyer, and nothing
nothing more.
more. Everything you say
Everything you say to LE should be said through
through a lawyer,
lawyer, in
all cases.
cases. 15
15 Unless
Unless the officer
officer makes they are an SS member
makes it clear that they member and
investigating
investigating the enemy.
enemy. Then discretion
discretion should be used,
used, though
though generally
generally LE are to be
treated politely
treated with support for their
politely and with their role in maintaining
maintaining societal
societal integrity.
integrity. However,
However,
many understand the war effort.
many LE do not understand effort. Reading
Reading the body language
language of an LE will help
you determine
you their intentions
determine their towards you
intentions towards you and the cause.
cause.

Additionally, remember
Additionally, remember that destruction
destruction of evidence
evidence is a crime in many
many
places (like the United
places United States).
States). Turning
Turning your
your computer off is not destruction of
evidence,
evidence, even if youyou are using whole
whole disc
disc encryption (and thus having
having the computer
computer
turned
turned off makes
makes the data inaccessible
inaccessible to the investigators);
investigators); hitting your computer
hitting your with a
computer with
hammer,
hammer, shooting
shooting it with
with you
you gun,
gun, or throwing
throwing it into your
your swimming
swimming pool whenwhen you
you see
police walking
the police walking to your
your door is destruction
destruction of evidence,
evidence, and youyou could be sent to
prison for it (even
prison (even if you
you are found "not guilty"
guilty" of the crime itself). You can face a
crime itself).
destruction
destruction of evidence
evidence charge
charge even if the investigators
investigators manage recover the evidence
manage to recover evidence
you tried to destroy.
you tried destroy. If you
you have incriminating
incriminating evidence your hard drive,
evidence on your you should
drive, you
using encryption,
be using encryption, not relying
relying on your
your ability
ability to destroy
destroy your
your computer.
computer.
So it is looking
looking like I am going to be doing a bid in prison, but I am being offered a
witness. Should I do this?
deal if I turn states witness.
It is true that you
you can in some cases get get reduced
reduced sentences
sentences by becoming
becoming a confidential
confidential
informant.
informant. But wouldwould you
you rather
rather spend five years
years in prison
prison getting
getting abused
abused and spit on,
on,
possibly killed,
possibly killed, or spend ten years
years in prison
prison being left alone for the most part? part? Snitches
Snitches
are despised
despised more than than anyone
anyone else in prison,
prison, and some of the peoplepeople youyou will be locked
up
up with
with (Communists,
(Communists, Life-sentence
Life-sentence etc.) have nothing
nothing to lose. Guards
Guards are known
known to
reveal information
reveal information on inmates
inmates to other inmates,
inmates, so don't think you you are going keep your
going to keep your
snitch status secret. EvenEven if you
you are kept protective custody
kept in protective custody you will not be safe, when
you will when
prison riots
prison riots happen
happen the first thing
thing that happens
happens is the inmates
inmates kill everyone
everyone in protective
protective
custody.
custody. In addition putting your
addition to putting your life in serious danger,
danger, helping
helping the enemy
enemy makes you a
makes you
coward
coward and a hypocrite. mind that even if you
hypocrite. Keep in mind take a deal to snitch, that has no
you take
legally
legally binding power, your
binding power, your sentence
sentence is still up
up to the judge.
judge. Although
Although the mandatory
mandatory
minimum
minimum is erasederased when
when you
you take a deal, youyou can still get the maximum
maximum sentence
sentence if the
judge says
says so,
so, even after you
you already snitched. This has been
already snitched. been known
known to happen.
happen. Even if
you
you get put in the witness
witness protection
protection program
program and given a new
new identity,
identity, people
people in witness
witness
protection can be traced.
protection traced. Snitching
Snitching is never
never worth
worth it,
it, and it is never
never the right
right thing
thing to do.
Don't do the crime if you you can't do the
time without
time without snitching.16
snitching. 16
So I got pulled over,over, or got a knock on my my door, and LE is requesting to search my my
house or car. What should I do?
them no. Never
Tell them Never consent
consent to be searched
searched or have your
your vehicle
vehicle or house searched.
searched. Make
them get a warrant.
them warrant. Even if youyou have nothing
nothing on youyou and your
your vehicle
vehicle and house are
clean, you should make them
clean, you them get
get a warrant.
warrant. You don't want
want to make their job easier.
make their easier. If
you don't consent
you consent to a search and they search anywaysanyways with no warrant then any
warrant then any evidence
evidence
they gather cannot
they used in court. If you
cannot be used you consent, they don't even need
consent, they need a warrant.
warrant.
16
16 This advice
advice is mainly
mainly for your protection. Cooperation
your protection. Cooperation withwith SS aligned
aligned LE is perfectly
perfectly
valid, AFTER
AFTER the Zionist
Zionist Occupational
Occupational Government
Government in your your Nation
Nation or local area is
ousted.
ousted. You must assumeassume that LE willwill not protect
protect you
you adequately.
adequately.
arrested and am being interrogated,
So I got arrested interrogated, what do I do? They say don't
say if I don't
cooperate they are going going to make things hell for me and put me in a holding cell
with a bunch of gang gang members! But if I confess confess they will make things
very
very easy
easy for me.
me.
Ask for your
your lawyer.
lawyer. If they
they don't immediately
immediately stopstop questioning
questioning you,you, continue
continue asking
asking for
your lawyer.
your lawyer. You don't ever want want to say
say anything
anything to cops.
cops. Even
Even if they put you you in a
holding
holding cell full of gang
gang members,
members, it is probably
probably better to be therethere for a day than than to
confess
confess and get sent withwith the same gang gang members
members for ten years.years. Anyways,
Anyways, most most ganggang
members
members are unlikely
unlikely to mess with
with you
you if you
you just keep to yourself
yourself and don't cause any any
trouble with them.
trouble them. Keep
Keep in mind: police
police lie, secret service
service lie, they
they want you to confess,
want you confess,
confessing
confessing or giving
giving any
any information
information up up is going
going to hurt youyou it is under no circumstances
circumstances
going
going to ever help you.you.
If I ask a cop
cop if they are a cop,
cop, they have to tell me right?
No, cops
cops do not have to tell youyou they are cops, neither do secret service.
cops, neither service. Undercovers
Undercovers lie
all the time.
time. So, do confidential
confidential informants. careful who you
informants. Be careful you trust,
trust, even friends you
friends you
have known your entire life can turn.
known your
But what about smoking weed weed or using other drugs? Can they do this too?
Undercovers
Undercovers can smoke weed, weed, and I am sure theythey will have no issues using using other drugs
either.
either. Someone using drugs does not mean that
Someone using that they
they are not a cop cop or secret service
service agent.
agent.
It also doesn't
doesn't mean
mean they are not a confidential
confidential
informant.
informant.
But I am non-important
non-important / don'tdon't do anything wrong wrong / am small time
Even if youyou do nothing wrong, most LE wants
nothing wrong, wants to screw you.you. The majority
majority of themthem are not
trying to protect
trying protect and serve but are trying
trying to meet
meet some alpha
alpha male requirement
requirement they they
subconsciously
subconsciously have.have. They feel important when they bring you
important when you down. people tend
Also, people
down. Also,
minimize what
to minimize what they do, so youyou are probably bigger than you
probably bigger you would
would like to admit.
admit. Be
proud but silent of your
proud your achievements
achievements for the revolution.
revolution.
When I talk online I like like to say
say SWIM (someone
(someone who isn't me) me) instead of me or I.
This keeps me safe safe right?
right?
No, this offers youyou no protection
protection at all. People
People who say say SWIM are just fooling fooling
themselves. People tend to like to have "security
themselves. People "security blanket
blanket security" where they convince
security" where convince
themselves they are safe as long as they do some simple ritual
themselves ritual (as opposed
opposed to takingtaking
actual
actual security precautions, which
security precautions, which are a bit more difficult).
difficult). Security
Security blanket
blanket security
security is
dangerous,
dangerous, as it doesn't
doesn't offer real security
security but makes you act as if
makes you if you
you are secured.
secured.
Appendix B: Modern Weapons Outline
Blunderbusses,
Blunderbusses, and other homemade
homemade gunsguns can be researched
researched online,
online, as well
well as slingshots
slingshots
and various
various low-tech
low-tech „fool proof “weapons.
,,fool proof “weapons. It is also possible
possible to create basic projectile
projectile
weapons and guns
weapons guns through
through experimentation, though care is to be taken
experimentation, though taken when
when testing
testing and
using said guns
using unrifled barrels
guns as unrifled barrels or explosions
explosions in the firing
firing chamber
chamber may prove highly
may prove highly
dangerous.
dangerous. They fall outside scope of this guide due to their
outside of the scope their variety
variety and
abundance.
abundance. Local factors
factors and ammunition types are to be carefully
ammunition types carefully considered when
considered when
manufacturing
manufacturing or acquiring
acquiring guns
guns (projectile
(projectile weapons)
weapons) and ammunition
ammunition (projectiles).
(projectiles).
In the original Werwolfguide this is explained
original SS Werwolf explained in detail.
detail. Other military
military manuals
manuals and
gun
gun manufacturing
manufacturing guides17
guidesl7 can be acquired
acquired online
online or via associates
associates who participate
participate in
related activities.
related activities.
Described
Described in this Appendix
Appendix are modern
modern weapons
weapons which
which are not commonly
commonly found,
found, or mass
produced. Additionally,
produced. Additionally, explosives,
explosives, molotov
molotov cocktails
cocktails and swiss army
army knives
knives are
detailed.
detailed.

I. Modern Weapons
1. Modern Shortlist
Weapons Shortlist
1)
1) Microwave gun gun
This gun classified as a directed
gun can be classified directed energy
energy weapon.
weapon. It is known
known colloquially
colloquially as the
Poor man's Ray Gun “as it is a simple microwave microwave oven conversion.
conversion. Microwave
Microwave oven
magnetrons
magnetrons are inexpensive
inexpensive and easyeasy to manipulate,
manipulate, though
though extreme
extreme caution
caution should be
used
used as the voltages
voltages involved
involved are lethal.
lethal. A grounded
grounded understanding
understanding of electrical
electrical
engineering
engineering is recommended before construction,
recommended before though ultimately
construction, though ultimately it is up
up to the risk
tolerance of the individual
tolerance individual to engage
engage in the manufacturing
manufacturing of such a weapon.
weapon. As with the
Laser gun
gun manual
manual below,
below, the intention
intention should be to burn the enemy enemy (or drone)
drone) to the
death, not maim their eyesight.
death, eyesight. This should aiming at the neck
should be done by aiming neck or head
depending
depending on the powerpower of said beam.
beam. Skin will char so to achieve
achieve the desired
desired lethal
lethal
effect
effect it is important
important to maintain
maintain aim. Alternatively, seriously wound
Alternatively, it can be used to seriously wound the
enemy
enemy by targeting
targeting either
either exposed
exposed regions
regions of
skin, light clothing
clothing or grenades/explosives
grenades/explosives attached
attached to their utility
utility belt. Other
Other longer
longer
wavelengths than
wavelengths than the two mentioned,
mentioned, can be engineered
engineered in order to
penetrate and boil enemies
penetrate enemies alive though power consumption
though the power consumption for this and potential
potential for
melting
melting of components
components hinders
hinders the effectiveness
effectiveness of these weapons.
these weapons.
Ultimately,
Ultimately, it is upup to the individual
individual in order to determine
determine the best radiation
radiation frequency
frequency
and amplitude
amplitude to employ
employ in the field.
field. Caution and careful operation of such guns guns is
vital to prevent loss of good will and morale among among friendly forces.
forces.
17
17 An excellent
excellent collection
collection of gun
gun related
related materials: http://archive.is/yAjQi
materials: hgpM/archiveis/ijf 2i
„Poor Microwave oven conversion:
,,Poor man's Ray Gun“ -- Microwave
https://www.yumpu.com/en/document/view/33249254/the-poor-mans-raygunpdf
https://www.yumpu.com/en/document/view/33249254/the-poor-mans-raygunpdf

2) Laser gun
gun
How to Make a Laser
WARNING: Lasers cause blindness or eye eye damage and, as with Microwave guns, guns,
civilians or children is strictly forbidden and those who do so will be
using it near civilians
executed either by the enemy enemy or by friendly forces.
First of all, let's review
review the Laser concept:
concept: L.A.S.E.R.
L.A.S.E.R. stands for Light
Light Emission
Emission by
Stimulated
Stimulated Emission
Emission of Radiation.
Radiation. Lasers work, basically,
Lasers work, basically, like this:
this:
1.
1. A substance
substance (usually
(usually a gas,
gas, although
although crystal
crystal lasers
lasers are made as well)
well) is heated
heated to the
point where
point where it begins
begins to emit Photons.
Photons. This substance
substance is held in a tube.
tube.
2.
2. The Photons reflect off mirrors
Photons reflect mirrors on either
either side of the tube.
3.
3. Eventually,
Eventually, the focused Photons will break
focused Photons break through
through one of the mirrors
mirrors and the actual
actual
laser beam
beam will emit from the front of the tube. tube. Although Lasers are used
Although Lasers used in multiple
multiple
types of light, we will be focusing
types focusing on the Visible
Visible Spectrum.
Spectrum. The Visible
Visible Spectrum
Spectrum of
Light varies
varies for each person,
person, but generally
generally extends
extends from around
around 380 nm (Violet)
(Violet) to
around
around 700 nm (Red). Red (600-700 nm) are some of the most common
(600-700 nm) common lasers.
lasers. They are
also some of the
easiest
easiest to obtain.
obtain.
Some
Some recommended materials:materials:
1-Adjustable
l-AdjustableVoltage
Voltage Regulator
Regulator LM317T
LM317T
1-
1- 100
100 ohm Potentiometer
Potentiometer
2- 1010 ohm Resistors
Resistors
1-
1- 1N4001 Rectifier Diode
1N4001 Rectifier Diode
1- 47uf 35v Capacitor
1- Capacitor
1- Any Size PCB Board
1- Any Board
1- Any Solder
1- Any
1- Any Soldering
1- Any Soldering Iron
1-
1- Power
Power Switch
Switch (I(1 like momentary
momentary push buttons)
buttons)
1- l2x30mm Aixiz
1- 12x30mm Aixiz laser housing
housing Click
Click Here
2- Spools
Spools of wire (Red and Black)
Black)
You will need
need at least a 6 volt Power
Power source.
source.
need something
You will also need something to put everything
everything in when
when you
you are done. (a flashlight works
flashlight works
if you
you can make
make the circuit
circuit small enough fit in it) If you
enough to fit you do not use a flashlight you will
flashlight you
need
need some form of of battery
battery holder.
holder.
Optional:
Optional: Digital
Digital Multimeter
Multimeter
(may be needed
needed if you
you run into problems
problems during
during construction
construction or prototyping).
prototyping).

Diodes
i) Laser Diodes
Laser Diodes
Diodes are tiny.
tiny. Creating
Creating them
them in a DIY setting is costly
costly and time-consuming
time-consuming and
they are usually
they usually manufactured
manufactured by precision
precision machines.
machines. Harvesting
Harvesting a laser diode can be a
tricky process as they tend to be very
tricky process very fragile
fragile and sensitive
sensitive to static and other forms
forms of
shock. It is very
very important take your
important to take your time
time in harvesting your precious
harvesting your precious diode.
diode. Do not
ever drop it!
it!
Below
Below is an image
image of a Diode:
Diode:

You will need


need an old DVD
DVD Writer.
Writer. Blu-Ray works as well
Blu-Ray works well (you will
will have a violet laser
instead
instead of red, but it does work).
work). You can extract from an old computer.
extract one from computer. Also,
Also, the
Writer
Writer must have AT LEAST
LEAST 16X Writing
Writing Speed. If you
you use a Reader,
Reader, or anything
anything less
than 16X
than 16X Speed, you
you will end up with a weak
up with weak red laser.
laser.
first step
The first step in harvesting
harvesting your
your laser diode is to disassemble
disassemble your
your DVD drive.
drive. There will
There will
be 4 or more screws
screws on the bottom
bottom side that you need to remove.
you will need remove.
Remove
Remove the plate back of the writer
plate on the back writer remove
remove any circuit board under
any circuit under that until
until you
you
see the sled.

(Inside
(Inside the Drive)
Drive)
(Typical
(Typical Drive)
Drive)
Inside you will need to locate
Inside you locate the laser assembly.
assembly. It will be on 2 metal
metal rails. At the ends
of those
of those rails will be more
more screws
screws to remove.
remove Once they removedyou
they are removed you will be able to
lift the rails
rails and slide the laser assembly
assembly right
right off.
On the right of the page
right side of page is a picture of the exact component
picture of you should be removing
component you removing
from your
your drive at this point.
point.

Get the smallest


smallest screwdriver
screwdriver you
you can find.
find. The sled consists of lots of small (very small)
consists of
screws,
screws, usually
usually glued
glued in.
in. Remove
Remove every
every screw
screw you possibly can,
you possibly can, some won't
won't come out,
but get most
most ofof them.
them. Remove
Remove any any parts you can. There will be TWO
parts you TWO diodes,
diodes, and they
they
will not look like the above picture at first.
above picture three pins
first. There will be three pins on each one, with
one, with
solder
solder connecting them to something
connecting them something resembling
resembling a circuit board.
board. They are attached
attached to a
small metal
metal heat-sink
heat-sink and the lens on glass end will will be facing
facing the series of mirrors
mirrors and
lenses
lenses focusing beams to the center lens of
focusing the beams of the sled. The following procedure is
following procedure
VERY delicate.
VERY need Solder wick,
delicate. You need wick, a Soldering,
Soldering, Iron, and Pliers,
Pliers. Place
Place the Solder
wick
wick directly of the three
directly on top of three pins.
pins. Heat upup the wick
wick and remove off
remove all of the solder off
both
both of the diodes.
diodes. Remove
Remove the circuit-board-like thing from the pins.
circuit-board-like thing pins. BE CAREFUL,
CAREFUL,
those pins
those pins MUST
MUST stay intact. The more
more you
you can keep
keep on the better.
better.

may need
Once it is off (you may need to use forceps
forceps to wrestle
wrestle it off, eventually
eventually it will come,
come, just
keep you will need
keep at it), you need to remove heat-sinks. There
remove the heat-sinks. There is an opaque
opaque glue connecting
connecting
them
them to the sled. Insert your
your screwdriver
screwdriver (smaller
(smaller
better) on the glue and pry
the better) go under
pry it off. Try to go under the base on the glue.

Once all 4 corners


comers are off, remove
remove the heat-sink/diode.
heat-sink/diode. Get both both of them
them off. Now,
Now, this is
the hardest
hardest part. If you
part. If you are doing it right,
right, it still seems
seems like you
you are going to break
break the
diode.
diode. Do not be afraid,
afraid, but do not be reckless
reckless either.
either. Take your
your pliers
pliers in your
your hand. You
hand. You
need wire
may need
may wire cutters. Press down on the heat-sink
cutters. Press heat-sink on one of If you
of the sides. If you need
need a vise
or other support,
support, use it.
it. Eventually, heatsink will
Eventually, the heatsink will split in half and the diode will
will pop
pop
off.

You will have


have to prypry the diode out. It may
may be easier remove the whole
easier to remove whole part that
that the
laser in encased
encased in, it is usually
usually a metal of some sort. After
metal heat sink of After you
you do that you
you can
use pliers hold the metal
pliers to hold metal part
part and use wire cutters
cutters or
another
another pair ofof pliers
pliers to pry
pry it away
away from the diode.
diode. In some cases,
cases, you will get lucky and
you will
the diode will pop
pop right out very
very easily without anything
easily without anything else.
Be careful the diode is fragile!
Once the diode
diode is out, you need to solder the ribbon
you will need ribbon or whatever
whatever is soldered
soldered on to it.
it.
When
When that is done take youryour diode and place
place it somewhere
somewhere safe and static free. If If you
you
have bought
have bought any
any pcpc components recently they probably
components recently probably came in a static protective
protective bag. if
bag. if
you have
you have one you
you can store your
your diode
diode in it for extra safety.
safety. Ideally you would
Ideally you would want
want to
use an anti-static wrist band
anti-static wrist band while
while removing
removing and handling
handling the diode.
diode. But don't worry
worry too
much
much about if you
about it if you don't have
have one.

ii) Control Circuit18


Although it can technically
Although technically be done, do not "direct drive". Direct driving
drive". Direct driving involves
involves
hooking up
hooking up a diode directly
directly to a battery
battery or other power
power source.
source. This will usually
usually kill your
your
diode.
diode. Thus, you need a circuit
you will need circuit to regulate your power.
regulate your power.
18
1 8 http://showsyouhow.blogspot.com/2007/12/diy-dvd-burner-laserpointer-proper-

mm
http://showsyouhow.blogspot.com/2007/1 2/diy—dvd—burner-laserpointer-proper—
way_18.html


3
5

s s l
:5 £5
5%
fig Eu 3.
g in}
5533?:
gsagé
- 3
5
E

—-§
mg; l!
—U
a
§§§§2 i
2
ilagg g
5

Mia: -

4!

IL;
——_‘

You will need


need the following
following parts:
parts:
1)
1) LM317T
LM3 17T
2) Switch work, I used
Switch (Any will work, used a switch but a button
button works
works equally
equally well)
well)
3) Potentiometer,
Potentiometer, 100 ohm (It can vary,
100 ohm vary, but keep on track
track as much
much as
possible)
possible)
4) 10 ohm resistors
10 ohm need two of
resistors (You need of these)
these)
5) Board
Board (PCB Boards work
(PCB Boards work excellent
excellent for this)
6) Wire
7) 47uf35v
47uf35v Capacitor
Capacitor
8) 1N4001 Rectifier Diode
1N4001 Rectifier Diode
9) 5/6 Volt Power
Power Source
course need
You will also of course need more solder and your trusty soldering
your trusty soldering iron.

l'mili\ «-

Ni-gnln c

Vol I'm-d

Now, first look at the laser diode


Now, let's first diode itself.
Align the pins as shown and identify
identify each one. Place
Place the LM317T
LM317T face up up
on the table.
table. The far-left needs to connect
far-left pin needs connect to the POSITIVE
POSITIVE laser diode pin, but
diode pin,
do not do the diode connection
connection until
until last. Along
Along the way
way it needs
needs to connect
connect to the 2
Resistors,
Resistors, the Capacitor, Rectifier Diode.
Capacitor, and the Rectifier Diode.
Lay your
your potentiometer face up up with the pins facing you.you. The middle
middle
pin of the LM317T
LM317T needs needs to connect
connect to the far right AND middle
right AND middle pins of the
potentiometer. Then, connect
potentiometer. connect a wire
wire from the left potentiometer
potentiometer pin too the other
end of the two resistors.
resistors.
Connect the last (right) to the POSITIVE end of the batteries. Lastly, Lastly,
run a wire
wire from the negative
negative power
power end to the negative
negative diode pin, connecting
connecting to
the capacitor rectifier diode along
capacitor and rectifier way.
along the way.
Switch either on the main
Connect a Switch positive or negative
main positive negative rail.
Is your
your circuit
circuit finished? Great! Now we need
finished? Great! need the 6 Volt power
power source.
used a Battery
I used tray with 4 D batteries,
Battery tray batteries, but you
you can even use an old.
Computer power supply if you
Computer power you want
want (although
(although that may
may require
require extra
modification).
modification). Pick up up a Project
Project Box (You know,
know, the plastic
plastic black
black boxes with
screws in the corners.)
comers.) Make
Make sure it is big enoughenough to fit fit your
your entire Circuit.
Circuit.
Connect the wires leading Batteries to their respective
leading from the D Batteries respective
positions. DO NOT
positions. NOT PUT BATTERIES
BATTERIES IN YET. This is just an added safety precaution, precaution,
and I never
never have the batteries my laser when
batteries in my when it's not in use, use, even when
when off.
Take the project
project box and drill two two holes
holes in the top: One for the
potentiometer and one for the switch.
potentiometer switch. Make sure they fit snugly. Insert
they fit Insert the parts into the
holes you
you drilled
drilled and screw them them in with the partsparts it came with.with. You probably need a
probably need
wrench for this. Make
wrench Make sure theythey are in tightly.
tightly.
Do not enclose
enclose it with a lid until you you have verified it works (DO NOT
turn it on.)
on.) It is at this point where you you are most likely likely to ruin youryour diodes so BE
CAREFUL.
Take your
your soldering
soldering iron and solder the positive wire to the positive
positive wire positive pin and the negative
negative
wire to the negative
wire negative pin. Again,
Again, be careful:
careful: Too much heat will snap snap the pins. Also,
Also, do
not short out the circuit
circuit against
against the base of the diode. Apply Apply it as fast as possible
possible without
without
rushing so as to not weaken
rushing weaken the pins. If If you
you chose correctly
correctly picked the red diode, you
and picked you
are done with
with the solder. If youyou chose the infrared,
infrared, youyou will to remove place the red
remove it and place
diode
diode
instead. And there
instead. And there is only one way way to tell. Test it! it! Do you
you have Laser protection
protection glasses?
glasses?
They need to be the kind that can resist resist the type
type of light the red diode is emitting
emitting (600-
700
7 00 nm). This testing
testing process
process is described
described in more detail below. below.
SAFETY WARNING!
SAFETY WARNING!
1. If you
you do not use glasses,
glasses, you
you are an idiot and should not be building a laser.
BLIND you.
These things BLIND you. How would you you feel never seeingseeing again, EVER? Wear
protection glasses.
glasses.
2. NEVER stare directly into the laser diode. This could blind you you even with the
glasses
glasses on.
Please go
go up
up and memorize the two two safety steps.
Now you
Now you will need a Laser Module. A company
will need company calledcalled AixiZ
AixiZ makes
makes these,
these, or you
you can
just buy on eBay, whichever
whichever is cheaper.
cheaper. If youyou don't
don't know,
know, a module
module is a small shiny tube tube
that holds the diode.
diode. It also contains
contains a lens to focus the laser. They generally generally cost around
around
$5.
$5. Once your
your module
module arrives,
arrives, do not do anything
anything withwith it.
it. We have testing to do. Take
your circuit
your circuit connected
connected to the diodediode along withwith the 4 D Batteries
Batteries (Not in the tray).
tray). Go into
a small, dark room
room (lock on the door is best so someone someone doesn't accidentally walk
doesn't accidentally walk in and
damage
damage their eyes) and set up up a piece
piece of white
white paper
paper against
against the wall.
wall. Make
Make sure the
your goggles
switch is off. Put your goggles on and pointpoint the
diode at the paper.
paper. Flip
Flip the switch. If you you see a red glow on the paper, you are set! Of
paper, you
course,
course, it will not burn anything yet, it isn't focused.
anything yet, focused. If you you see nothing, move the paper
nothing, move paper
closer.
closer. If you
you see a faint white
white dot, turn it off!
offl You did not choose wisely and rigged
choose wisely rigged the
Infrared.
Infrared. If this happens
happens to you,
you, remove
remove the infrared
infrared diode and solder the other one into
place.
place.
If you
you see nothing, nothing
nothing at all, it could be one of two things. things. It could
could just be the
infrared, or it could be that your
infrared, your circuit
circuit is wired
wired wrong.
wrong. Double
Double check everything.
everything. If you
you
need
need too, use a Voltmeter
Voltmeter to detect if your your circuit
circuit is indeed
indeed running.
running.
Is your
your red diode glowing brightly? Excellent.
glowing brightly? Excellent. Utilize
Utilize the potentiometer
potentiometer at this point
point to
fine-tune
fine-tune the system.
system. Now, off the circuit
Now, turn off circuit and remove
remove one or more more batteries,
batteries, just in
need to obtain
case. You will need obtain a vise and your
your module. Flip the back end of
module. Flip of the diode and
place the small hole over the diode so that the pins are sticking
place sticking out. Place
Place the other
module section with
module with the small hole over the pins.
pins.
Push together with the vise (keep it straight!)
Push it together straight!) until the diode is snug
snug inside the lens
section
section of the module
module (the small end). Chop the wireswires connecting your diode
connecting your diode to the rest of
your circuit
your circuit in half and slip the wires
wires through
through the small holehole in the back of the module.
back of module.
Screw the module
module back together
together so that
that the wires
wires are leading
leading out ofof the hole.
hole. Now,
Now, solder
wires back
the wires back to the circuit
circuit and wrap
wrap electrical tape around
electrical tape around the soldered
soldered part. Make
Make sure
everything ready. IT'S TIME!!!
everything is ready. TIME!!!
Replace your
Replace your goggles
goggles and make
make sure that nobody will walk
that nobody walk in and accidentally
accidentally look at the
Batteries back in and flip
laser. Put the D Batteries flip the switch. If all went
switch. If went well you
you should have a
laser! Now,
Now, turn the lens to focus the laser.
laser. Move
Move the paper find the point
paper close and far to find point
where the point
where point the laser makes smallest. Place a match
makes is smallest. match in that spot and it will burn.19
burn. 19

Above: an example laser system


system without casing

19 Additional devices
19 Additional devices and EM based
based gadgets:
gadgets: https://diymaketech.blogspot.com/2012
https://diymaketech.blogspot.com/20l2

3) Railgun (copper coil gun)


1)
I) The Theory
A coil gun
gun works
works on the principle
principle ofof electromagnetic
electromagnetic attraction.
attraction. The coil gun itself is akin
gun itself
to an air cored
cored solenoid.
solenoid. A ferromagnetic
ferromagnetic armature
armature is placed
placed at the breach
breach of the coil and
is electromagnetically
electromagnetically attracted
attracted towards
towards the center of the coil when
center of when a current
current is passed
passed
though the coil. When
though When the armature of the coil it will start actively
reaches the center of
armature reaches actively
decelerating if the current
decelerating if current is still passing
passing through
through the coil as it is magnetically
magnetically attracted
attracted to
the midpoint
midpoint of the coil. This meansmeans that the current pulse length
current pulse needs to be of a finite
length needs finite
length
length in order for the armature
armature to be accelerated up to the center
accelerated up center of the coil and not
‘sucked back’ as it tries to leave the coil via the other end. This is more specifically
specifically a
‘reluctance
‘reluctance coil gun’, a diagram
diagram is shown below.
below. This is the biggest
biggest disadvantage
disadvantage to coil
guns;
guns; the current pulse length
current pulse needs to be controlled
length needs controlled in order to cut the power
power when
when the
armature reaches the middle
armature reaches middle of the coil. The second largest
largest challenge
challenge to overcome with
overcome With
coil guns
guns is delivering
delivering the electricity
electricity as quickly
quickly as possible.
possible. It stands to reason
reason that the
more energy you can put onto the coil gun,
energy you gun, the more energy transferred into
energy will be transferred
kinetic energy
kinetic energy in the armature.
armature.
The main losses
losses in this system
system are the eddy currents
currents in the flyway tube and the
flyway tube
projectile/armature, these
projectile/annature, these can be minimized
minimized by slotting
slotting the flyway
flyway tube or using
using a non-
conductive
conductive material.
material. The projectile
projectile must be ferromagnetic thus this means
ferromagnetic thus that limiting
means that limiting
eddy currents
currents cannot
cannot be achieved
achieved by using a non-conductive
non-conductive material.
material. The best solution
solution
to this is to use a powdered
powdered Iron in epoxy resin matrix.
epoxy resin Although this improves
matrix. Although improves initial
initial
efficiency
efficiency it also removes
removes the ability
ability for the gun
gun to be operated
operated as an ‘inductance
‘inductance coil
gun’.
2) Things to Consider When Designing Designing
i) Projectiles
For further
further physics
physics and test results
results regarding
regarding the projectiles
projectiles please
please consult
consult the following
following
guide:
guide:
https://www.instructables.com/id/Coil-Gun-Projectiles/
https://www.instructables.com/id/Coil-Gun-Projectiles/

ii) Coil
Coil Length
The longer
longer the coil is the more time
time it has to drag the projectile
projectile to the center
center and the more
wraps of wire
wraps fitted into the solenoid
wire can be fitted solenoid increasing
increasing magnetic
magnetic flux
flux density.
density. The longer
longer
piece of wire the coil is made of and the higher
the piece higher the inductance
inductance of the coil the higher
higher
reluctance of the coil is so the longer
the reluctance longer the current pulse length
current pulse will be. This means
length will means that
the rate of change
change of current
current is lower and so will not reach
reach as high a peak
peak value.
value. Since the
current
current effects
effects the magnetic field density
magnetic field density a high current
current is desirable
desirable so the coil should
should be
tuned so that it makes
tuned makes the strongest
strongest magnetic field in the time
magnetic field time available.
available.
The coil length
length is directly
directly linked to the projectile
projectile length
length as they should
should be roughly
roughly equal
as mentioned
mentioned previously.
previously.

iii) Number of layers in the coil


More
More layers
layers mean
mean a stronger
stronger magnetic field but it also means
magnetic field means higher
higher impedance
impedance and so a
longer pulse length.
longer pulse If the pulse
length. If pulse length
length is too long then the projectile
projectile will experience”
experience”
suck back”
back” and have a lower
lower exit velocity,
velocity, optical triggering can be used to solve this
optical triggering
problem.
problem.
Too many
many layers
layers will mean that the magnetic field of the outer layers adds no strength
magnetic field strength the
magnetic
magnetic flux
flux density
density in the center where
where the projectile
projectile is and so the energy
energy is wasted.
wasted. It
also means
means that the pulse
pulse length
length is unnecessarily
unnecessarily long so the current will not rise as
current will
sharply
sharply as otherwise
otherwise possible.
possible.
iv) Thickness of coil wire
Thicker
Thicker wire means
means lower
lower impedance
impedance so a faster pulse
pulse length
length and higher peak current.
higher peak current.
This means
means less wraps
wraps in the coil per
per unit
unit area,
area, so the flux
flux density
density is potentially
potentially reduced
reduced
if the current
if current isn’t significantly
significantly increased
increased by the lower
lower
impedance.
impedance. If the wire is too thin
thin it will
will have too high a resistance
resistance and get unnecessarily
unnecessarily
hot. In extreme burn out on firing.
extreme cases it can burn firing.

v)
V) Pulse Length
The pulse
pulse length
length should be exactly
exactly the same length
length as the amount
amount of time it takes
takes to pull
projectile from the breach
the projectile breach to the center of the coil and return
return to zero. The pulse
pulse length
length
is affected
affected by a myriad
myriad of variables
variables including,
including, capacitor
capacitor voltage,
voltage, capacitor
capacitor capacity,
capacity,
circuit
circuit resistance,
resistance, and coil inductance which varies
inductance which varies dynamically
dynamically during
during use as there
there is
initially
initially an air core which
which is soon replaced
replaced with an iron core as the projectile
projectile slides in not
to mention
mention depending
depending on how many many turns, what gauge
turns, layers and what gauge of wire is used.
used. This
problem is solved by fixing
problem fixing as many
many variables
variables as possible
possible such as capacitor
capacitor voltage
voltage and
size, projectile
projectile dimensions which in turn fix
dimensions which fix the coil length
length and internal
internal diameter.
diameter. Then
remaining variables
the remaining variables are varied
varied until
until the optimal
optimal combination
combination is found.
found. The remaining
remaining
variables are most importantly
variables importantly wire gauge
gauge and number
number of layers. Assuming a suitable
layers. Assuming suitable
switch can be usedused the wire gauge
gauge is usually
usually the largest
largest available.
available.
Switch bounce/resistance
vi) Switch
Mechanical
Mechanical switches
switches can arc and bounce
bounce which
which lengthens pulse and lowers
lengthens the pulse lowers the
average
average flux
flux density
density experienced
experienced in the tubetube during
during firing.
firing. This is overcome
overcome by the use of
solid-state
solid-state switches
switches such as SCR’s, MOSFET’s
MOSFET’s or IGBT’s IGBT’s which
which experience
experience none
none of the
arcing
arcing issues.
issues. They are not perfect
perfect solutions though as they
solutions though they have several
several flaws
flaws such as
requiring a switching
requiring switching current/voltage
current/voltage to work,
work, and SCR’s
SCR’s cannot
cannot be switched off until the
switched off
source-drain
source-drain current
current drops below
below zero so require
require “v-switching”.
“v-switching”. V-switching where a
V—switching is where
second
second SCR and cap cap bank of the same or higher
higher voltage
voltage is discharged
discharged through first
through the first
SCR dropping
dropping the voltage below zero and switching
voltage below switching the switch off.
MOSFET’s
MOSFET’s are generally
generally quite low power
power so are of no use to coil guns of a decent
guns of decent scale
and a suitable
suitable one can be expensive
expensive but a solution
solution is to use a bank of themthem is parallel
parallel to
spread the current
current over several
several less expensive
expensive devises.
devises. IGBT’s
IGBT’s are much betterbetter solutions
solutions
as they
they can be switched
switched on and off at will and can handlehandle far higher power than
higher power than
MOSFET’s.
MOSFET’s. It is also important
important that the solid state switch can operate
operate fast enough
enough to turn
the device
device on and offoff in the desired frame, Most
desired time frame, Most IGBT’s
IGBT’s are capable
capable of this as well.
well.

vii) Capacitor
Capacitor Voltage
The higher
higher the capacitor
capacitor voltage
voltage the higher
higher the projectile
projectile velocity
velocity since the stored energy
energy
in a capacitor
capacitor is equal half the capacitance
equal to half capacitance multiplied
multiplied by the voltage
voltage squared
squared as long as
the switching
switching capabilities
capabilities are there then this is one of the more favorable
favorable variables
variables to
choose
choose to increase
increase as each extra volt makes
makes a big difference.
difference.

viii) Capacitor
Capacitor Capacitance
The higher
higher the capacitance
capacitance the larger
larger the volume
volume of stored energy
energy in line with:
with:
Energy stored in a capacitor=1/2 CV"2
capacitor=l/2 CV^2

4) Coil Flux Linkage (external Iron)


Adding an external
Adding external iron shell to the coil can improve
improve the fluxflux linkage
linkage between
between the coil
and the projectile
projectile but care must be taken
taken to eliminate
eliminate Eddie current
current losses.
losses. A powdered
powdered
iron matrix
matrix or ceramic
ceramic ferrite
ferrite is therefore
therefore the best option.
option. The External
External iron must not have
too much mass as the extra iron material will slow the magnetic
material will magnetic flux build up
flux build up and the coil
gun
gun may
may not saturate
saturate as not all of the ferrous
ferrous material
material is magnetized which means
magnetized which means it is
dead weight
weight and just slows the fluxflux density
density increase rate. This would
increase rate. would mean that the
mean that
magnetic
magnetic flux
flux would
would not increase
increase as rapidly
rapidly and not reach
reach as high peak
peak value. Too little
ferrous
ferrous material means it is potentially
material means potentially wasting
wasting the magnetic
magnetic fluxflux available.
available. The External
External
iron must therefore
therefore be optimized
optimized so that it does not saturate
saturate and yet there is enough
enough to
enhance
enhance the magnetic
magnetic flux
flux density.
density. It will affect
affect the inductance
inductance of the coil and so the
current
current pulse
pulse length
length so the coil may
may need to be of of a slightly
slightly different
different shape to gain
optimal
optimal performance.
performance.
i) Minimize connecting wire length
All connecting
connecting wires
wires between
between the coil and the capacitors
capacitors should
should be as short and thick
thick as
possible to reduce
possible reduce resistive
resistive losses and inductance.
inductance.
5) The Design
Design
i) Capacitor
Capacitor bank size
A bank of 40 330v photoflash
photoflash capacitors
capacitors of 100uF
lOOuF capacity
capacity where used giving
where used giving a total
total
energy
energy capacity
capacity of 217.8J:
217.8J:
E=l/2 CV^2
E=1/2 CV"2
E=1/2*4000x10^(-6)*330^2
E=l/2*4000x10"(-6)*330"2
E=217.8J
ii) Switching
Switching
Only solid state switches
switches would work for this project
would work project as any switches would
any other switches would arc. I
was supplied with an IGBT capable
supplied with capable of handling up to 1200V
handling up 1200V and 800A Peak and a
maximum
maximum full switching off time
switching on and off time of 1300ns. This is fast enough
enough and can handle
handle
far more volts than needed
needed but the current
current is only just enough.
enough. It
switches
switches at up
up to +/- 20v.

iii) Charging
A 1.5v 400-volt inverter
1.5V to 400-volt inverter has been included
included in the enclosure
enclosure to enable
enable the device
device to be
charged
charged of AA batteries would be slow and would
batteries but this would would use several
several batteries
batteries per
per shot.
The main charging
charging comes half rectified
comes from half rectified mains using a light bulb as a charging
mains using charging
resistor to give non-linear
resistor non-linear resistance
resistance through
through the charge
charge cycle. UK mains electricity
electricity is
240v RMS, which
which when half wave
when half rectified using
wave rectified using a diode
diode comes
comes out at 336v. My
capacitors
capacitors charge
charge up
up to 330 volts so 336 is perfect
perfect and mains will allow me to charge
mains will charge the
bank cheaply
cheaply and quickly
quickly when
when compared
compared to the battery
battery solution.
solution. A resistor
resistor was placed
placed
across
across the capacitor
capacitor bank to slowly discharge
discharge it to make
make sure it is always
always left uncharged.
uncharged.

iv) Voltage Monitoring


simple voltmeter
A simple voltmeter has been mountedto the enclosure
been mounted enclosure so that the voltage
voltage on the capacitor
capacitor
bank
bank can be monitored
monitored in real time
time to check the charge
charge state and double
double check prevention
check prevention
of overcharging
of overcharging

v) Projectile dimensions
Through trial and error and parameter
Through trial parameter sweeps
sweeps I found
found the optimum
optimum set up
up for several
several
different
different diameters of proj
diameters of projectile.
ectile. The important
important results
results are below;
below; all were
were limited
limited to
roughly 800Amps
roughly 800Amps so my my IGBT handle the current.
IGBT could handle current.

6mm Diameter
The standard
standard 6mm coil gun with the predetermined
gun with above would
predetermined limits from above would give a rough
rough
maximum
maximum of of 33.5m/s
33‘5m/s and 3.6J kinetic
kinetic energy
energy on 15
15 layers
layers of
of 14AWG
14AWG 30mm
30mm length.
length. The
capacitor bank
capacitor bank was evidently too much
was so large this was evidently much power
power to dump
dump into such a small
projectile in one stage. The projectile
projectile projectile size was too small,
small, and a larger projectile
projectile was
needed. The simulation
needed. simulation graph
graph is below
below

10mm Projectile
Using a 10mm
Using 10mm projectile found that a 40mm
projectile it was found length coil would
40mm length would be best
best using
using 10
10
layers of wire
layers of wire and producing
producing 25.4m/s
25.4m/s but a more
more reasonable
reasonable 7.6J of kinetic
7 .6J of kinetic energy.
energy‘

12mm Projectile
12mm
Using a 12mm
Using 12mm projectile
projectile an optimum
optimum length of 45mm
length of found with 9 layers
45mm was found of
layers of
14AWG.
14AWG. This gave
gave a velocity of 22.7m/s
velocity of 22.7m/s and a kinetic
kinetic energy of 9.9J with
energy of with a peak
peak current
current
of 811Amps.
of 81 lAmps‘

15mm Projectile
Using a 15mm
Using 15mm projectile
projectile an optimum
optimum set up
up was found to be 7 layers of 50mm length
layers of length
14AWG.
14AWG. This gave
gave a velocity of 16.65m/s
velocity of 16.65m/s and a kinetic
kinetic energy
energy of 9.15J.
9.15J. This was less
than the 12mm
12mm so the 12mm
12mm was used.
used.

Picture above are examples


Picture ammunition used
examples of ammunition used with the coil gun.
gun.
More details
More details can be found
found at: https://www.instructables.com/id/Coil—Gun-Projectiles/
https://www.instructables.com/id/Coil-Gun-Projectiles/
Heart attack
4) Heart attack gun
gun (with optional umbrella enclosure)
This gun used for stealthy
gun is used stealthy assassination
assassination missions.
missions. It shoots a poison
poison pellet
pellet or other
poison contained
poison contained within
within a projectile.
projectile. It is also called
called the „Bulgarian
,,Bulgarian Umbrella
Umbrella “. A
Bulgarian umbrellais an umbrellawith
Bulgarian umbrella umbrella with a hidden
hidden pneumatic
pneumatic mechanism
mechanism which
which injects
injects a
small poisonous
poisonous pellet
pellet containing
containing ricin.
ricin. It has a hollowed
hollowed stalk into which
which the pellet
pellet
neatly sits.
neatly

f\
K1 @

@ C5)

This is a basic schematic thereof:


schematic thereof:
This is a diagram
diagram of the firing mechanism of the umbrellaused
firing mechanism umbrella used to assassinate
assassinate Bulgarian
Bulgarian
dissident
dissident Georgi Markov. The trigger
Georgi Markov. trigger is in the umbrella
umbrella handle,
handle, the umbrella
umbrella handle
handle
pushes a spring which
pushes which pushes
pushes the linkage
linkage system.
system. The
linkage
linkage system links the trigger
trigger to the valve of of the Cylinder
Cylinder of compressed
compressed air. The
switch then
then activates
activates the valve. fires the ricin
valve. The valve fires ricin (or other poison)
poison) pellet
pellet through
through
the 'barrel'
'barrel' of the umbrella.
umbrella.
Learning from Past Failures (1980's) (1980‘s) using this Tactic
„The plot was described
,,The plot described by Trevor
Trevor Floyd,
Floyd, a member
member of the innocuously-named
innocuously-named
Civil Co-operation Bureau (CCB), (CCB), a <South African> defense force hit-squad.
The targets
targets were Dr. Pallo
Pallo Jordan,
Jordan, an MP and a former minister in Nelson
former minister Nelson Mandela's
Mandela's
Cabinet,
Cabinet, and South Africa's
Africa's Minister
Minister of Water
Water Affairs
Affairs and Forestry,
Forestry, Ronnie And
Kasrils. And
Ronnie Kasrils.
proposed murder
the proposed murder weapon
weapon was an umbrella.
umbrella.
Mr. Floyd
Floyd told the court that, having read of
that, having of a similar ploy used
used by Bulgarian
Bulgarian assassins
assassins to
kill the dissident
dissident BBC World
World Service journalist Georgi
Service journalist Georgi Markov,
Markov, he decided
decided to use an
umbrella fire darts laced with
umbrella to fire with poison.
poison. Having
Having been
been
given the go-ahead
go-ahead by his boss, CCB'sCCB's "managing
"managing director",
director", Colonel
Colonel Joe Verster,
Verster, he duly
acquired an umbrella
acquired umbrella from Europe,
Europe, presumably killer being traced
prevent the killer
presumably to prevent traced to South
Africa. Mr. Floyd,
Africa. Floyd, a self-confessed
self-confessed State killer,
killer, said he was instructed
instructed to fly
fly to London,
London,
where he would
where would be given
given the umbrella
umbrella after its transformation.
transformation. He duly linked up up in
Britain with a man who had identified
Britain identifiedhimself
himself as Jan Lourens,
Lourens, a Special Forces
Forces agent,
agent,
and who was supply him with
was to supply with the umbrella.
umbrella.
They drove to a farm that Mr. Lourens said was used by people including Dr.
Basson while
while they were in England.
Mr. Floyd
Floyd told Mr. Justice Hartzenberg: "He went into the house and brought
Justice Hartzenberg: brought the gadget
gadget
out. When you you pressed
pressed it against
against skin, the spikes shot into the body and, if if filled
filled with
with the
poison substance,
poison substance, they could be deadly."
deadly." It was then that
that the assassination
assassination bid started
coming off the rails.
coming off rails. As Mr.
demonstrated how to use the umbrella, some of the poison spilled onto his
Lourens demonstrated
finger. thought he was going to die. I told him to drink milk and to lie
finger. Mr. Floyd said: "I thought
down for a while
while because know the area and I would
because I did not know would not be able to rush
rush him to
hospital."
hospital." But Mr. Lourens fine after about 10
Lourens felt fine minutes. Armed
10 minutes. Armed with
with his umbrella,
umbrella, Mr.
Floyd set off back
Floyd back to London.
London. He soon found he had another
another problem
problem -- the killing
attachment made the umbrella too long and there was
attachment was a real danger of the tip
accidentally hitting the ground and dispensing its poison spikes prematurely.
prematurely. So, he
carried
carried out his own modification,
modification, attaching the gadget to the umbrella with a "hair- "hair-
curling tongs".
Now Mr. Floyd
Now was armed
Floyd was armed and in place.
place. But the intended victims were not. Dr Jordan Jordan
had moved,
moved, and Mr. Kasrils
Kasrils was not often "at his place".
place". The plot was
was abandoned,
abandoned, and
the umbrella thrown into the Thames. “20 We can identify identify multiple
multiple points
points of failure
failure
which the SS member
which member must avoid:
avoid:
1)
1) The agent
agent was ferried
ferried to a safe house which was
house which was in continuous use. Should he have
continuous use.
had a tail then
then the safe
safe house would be compromised.
2) A demonstration
demonstration was bungled
bungled leading
leading to the accidental poisoning
poisoning of a team member.
member.
3) The weapon
weapon waswas poorly designed and made in a hurriedhurried manner without prior
manner without testing.
prior testing.
4) The attempts to repair field were poor
repair it in the field poor and would
would have resulted
resulted in the
identity
identity of the assassin
assassin being
being compromised
compromised due to the incredibly
incredibly obvious
obvious nature
nature of the
modification.
modification.
5) The weapon
weapon was was not properly disposed of. Throwing
Throwing it away
away into nearby nature is
nearby nature
stupid, especially
especially in a large city where
where such an action
action would
would attract attention.
attention. Clearly
Clearly the
agent was
was acting
acting in frustration
frustration and not planning
planning ahead.
ahead. The SS member
member is recommended
recommended
to develop
develop or utilize
utilize further
further designs
designs in consultation weaponry experts.
consultation with SS weaponry pretty,
experts. A pretty,
but ineffective
ineffective and overly costly
costly weapon
weapon is damaging
damaging to the overall
overall war effort.
effort. It is much
more efficient
efficient to mass produce
produce simpler designs
designs for your
your formation than spend months
formation than months on
a single prototype.
prototype. The goal and usageusage of the weapons
weapons is to be considered:
considered: are they the
correct
correct tool for the job?
20 https://www.independent.co.uk/news/world/africa/how-an-assassin-bungleda-deadly-
https://www.independent.co.uk/news/world/africa/how-an-assassin-bungleda-deadly-
umbrella-plot-276370.html
umbrella-plot-276370.html

II. Home-made
Home-made explosives
perfect world
In a perfect world the National Socialist would
National Socialist would not need
need to manufacture
manufacture bombs
bombs at home,
home,
however perfect world
however a perfect world must be forged Blood, which
through our Iron and Blood,
forged through which starts in the
household.
household.
1)
1) Bomb making intro
Contents
1) Applied Chemistry
1) Applied Chemistry
2) Bomb
Bomb fuels
a) ROCKET
ROCKET ENGINE
ENGINE POWDER
POWDER
b) RIFLE/SHOTGUN
RIFLE/ SHOTGUN POWDER
POWDER
c) FLASH
FLASH POWDER
POWDER
3) See also
1)
1) Applied Chemistry
Bomb
Bomb making
making is a topic many
many darknet people are very
darknet people very interested
interested in, because with little
because with
effort and money
money some impressive
impressive devices
devices can be made.
2) Bomb fuels
a) ROCKET ENGINE POWDER
One of the most exciting
exciting hobbies nowadays is model
hobbies nowadays model rocketry.
rocketry. Estes is the largest
largest
producer of model rocket
producer rocket kits and engines.
engines. Rocket
Rocket engines
engines are composed
composed of a single large
grain of propellant.
propellant. This grain is surrounded
surrounded by a fairly
fairly heavy cardboard tubing. One gets
cardboard tubing.
propellant by slitting the tube lengthwise
the propellant lengthwise and unwrapping
unwrapping it like a paper
paper towel
towel roll.
roll.
When
When this is done,
done, the grey
grey fire
fire clay at either
end of the propellant
propellant grain must be removed.
removed. This is usually
usually done gently with a plastic
gently with plastic or
brass knife.
brass knife. The material
material is exceptionally
exceptionally hard and must be crushed
crushed to be used.
used. By
gripping
gripping the grain on the widest
widest setting
setting on a set of pliers
pliers and putting
putting the grain and
powder in a plastic
powder plastic bag, powder will not break
bag, the powder break apart and shatter
shatter all over. This should
be done to all the large chunks
chunks of powder, crushed like black
powder, and then it should be crushed black
powder. Rocket
powder. Rocket engines
engines come in various
various sizes, ranging
ranging from 1/41/4 A -- 2T to the incredibly
incredibly
powerful D engines.
powerful engines. The larger the engine,
engine, the more expensive.
expensive. D engines
engines come in
packages of three,
packages three, and cost about $5.00 per per package.
package. Rocket
Rocket engines
engines are perhaps
perhaps the
terrorist, since they can be used
single most useful item sold in stores to a terrorist, used as is, or can be
cannibalized for their
cannibalized their explosive powder.
explosive powder.

b) RIFLE/SHOTGUN POWDER
Rifle powder
Rifle powder and shotgun powder are really
shotgun powder really the same from a practical
practical standpoint.
standpoint. They
are both nitrocellulose-based propellants. They will be referred
nitrocellulose-based propellants. referred to as gunpowder
gunpowder in all
future references. Gunpowder
future references. Gunpowder is mademade by the action
action of
concentrated nitric and sulfuric
concentrated nitric upon cotton.
sulfuric acid upon material is then
cotton. This material then dissolved
dissolved by
solvents and then reformed
solvents reformed in the desired dealing with gunpowder,
desired grain size. When dealing gunpowder, the
grain size is not nearly
nearly as important
important as that of of black powder.
powder. Both large and small grained
grained
gunpowder burn fairly slowly
gunpowder burn slowly compared
compared to black powder when unconfined,
powder when unconfined, but when
when it is
confined,
confined, gunpowder
gunpowder burns
burns both hotter with more gaseous
hotter and with gaseous expansion, producing
expansion, producing
more pressure.
pressure. Therefore,
Therefore, the grinding process that is often necessary
grinding process necessary for other
propellants is not necessary
propellants necessary for gunpowder.
gunpowder. Gunpowder
Gunpowder costs about
about $9.00 per
per pound.
pound.

c) FLASH POWDER
Flash powder is a mixture
Flash powder mixture of powdered
powdered zirconium
zirconium metal and various
various oxidizers.
oxidizers. It is
extremely sensitive to heat or sparks and should be treated
extremely sensitive treated with
with more care than black
powder, with which
powder, which it should NEVER
NEVER be mixed.
mixed. It is sold in small containers
containers which
which must
be mixed
mixed and shaken before
before use. It is very
very finely
finely powdered,
powdered, and is available
available in three
three
speeds:
speeds: fast, medium, flash powder
medium, and slow. The fast flash powder is the best for using
using in explosives
explosives
or detonators.21
detonators.21
21
21 See also: http://qx7j2selmom4ioxf.onion/files.html#new
http://qx7j2selmom4ioxf.onion/files.html#new
http://parazite.nn.fi/roguesci/index.php/f-18.html
http://parazite.nn.fi/roguesci/indexphp/f—l8.html

bomb/molotov etc.
3) Pipe bomb/molotov etc.
i) EXPLOSIVE CONTAINERS
This section will
will cover
cover everything
everything from making
making a simple firecrackerto a complicated
simple firecracker complicated
scheme
scheme for detonating
detonating an insensitive
insensitive high explosive,
explosive, both of which
which are methods
methods that
that
could be utilized
utilized by freedom
freedom fighters.
fighters.

ii) PAPER CONTAINERS


Paper first container
Paper was the first used for explosives,
container ever used explosives, since it was first used
was first used by the
Chinese
Chinese to make fireworks.
fireworks. Paper containers
containers are usually
usually very
very simple to make
make and are
certainly
certamly the cheapest.
cheapest. There
There are many possible uses
many possible uses for paper
paper in containing
containing explosives,
explosives,
and the two most
most obvious firecrackers and rocket
obvious are in firecrackers rocket engines.
engines. Simply by rolling
rolling up
up a
of paper,
long sheet of paper, and gluing
gluing it together,
together, one can make a simple rocket
rocket engine.
engine. Perhaps
Perhaps
a more
more interesting
interesting and dangerous
dangerous use is in the firecracker. firecracker shown here is
firecracker. The firecracker
one of Mexican
Mexican design.
design. It is called
called a "polumna",
"polumna", meaning
meaning "dove".
"dove". The process of their
process of
manufacture
manufacture is not unlike
unlike that of making
making a paper
paper football.
football. If one takes
takes a sheet of paper
paper
about
about 16
16 inches
inches in length by 1.51.5 inches wide, and fold one corner
inches wide, comer so that
that it looks
looks like this:

and then fold it again so that it looks like this:

A pocket
pocket is formed.
formed. This pocket filled with
pocket can be filled with black
black powder, pyrodex, flash
powder, pyrodex, flash powder,
powder,
gunpowder,
gunpowder, rocket
rocket engine powder, or any
engine powder, any of the quick-burning
quick-burning fuel oxidizer
oxidizer mixtures
mixtures that occur
occur
fine powder.
in the form of a fine powder. A fuse is then
inserted,
inserted, and one continues
continues the triangular
triangular folds, being careful
folds, being careful not to spill out any
any of the
explosive.
explosive. When
When the polumna
polumnais finished,
finished, it should be taped
taped together
together very tightly, since this will
very tightly,
increase
increase the strength
strength of the container,
container, and produce
produce a louder
louder and more
more powerful
powerful explosion when it
explosion when
finished polumna
is lit. The finished polumnashould look like a 1/4
1/4 inch - 1/3-inch-thick triangle, like the one
1/3-inch-thick triangle,
shown below:
below:

Mann mm .m .I-nn'vx

iii) METAL CONTAINERS


The classic
classic pipe bomb
bomb is the best-known
best-known example
example of a metal-contained
metal-contained explosive.
explosive.
Idiot anarchists
anarchists take white
white tipped
tipped matches
matches and cut off off the matchheads.
matchheads. They poundpound one end of a
pipe closed
pipe closed with a hammer,
hammer, pour pour in the white
white tipped
tipped matches,
matches, and then pound
pound the other end
closed.
closed. This process
process often kills the fool, since when when he pounds
pounds the pipe
pipe closed,
closed, he could very
very
easily
easily cause
cause enough
enough friction
friction between
between the match
match heads
heads to cause them
them to ignite
ignite and explode
explode the
unfinished
unfinished bomb.
bomb. By using pipe caps,
using pipe process is somewhat
caps, the process somewhat safer, and the less stupid anarchist
anarchist
would
would never
never use white
white tipped
tipped matches
matches in a bomb.
bomb. He wouldwould buy two pipe pipe caps
caps and threaded
threaded pipe
(fig. 1). First, he would
(fig. 1). would drill a hole in one pipepipe cap,
cap, and putput a fuse in it so that it will
will not come
out, and so powder
powder will not escape
escape during handling. The fuse would
during handling. would be at least 3/4 an inch long
inside bomb. He would
inside the bomb. would then screw the cap cap with the fuse in it on tightly, possibly putting
tightly, possibly putting a
drop of super
super glue on it to hold it tight.
tight. He would
would then pour pour his explosive
explosive powder
powder in the bomb.
bomb.
To pack
pack it tightly,
tightly, he would
would take a large wad of tissue tissue paper
paper and, after filling
filling the pipe to the very
very
top, pack
top, powder down,
pack the powder down, by usingusing the paper
paper as a ramrod
ramrod tip, and pushing
pushing it with a pencil
pencil or
other wide ended
ended object,
object, until it would
would not move
move any any further. Finally, he would
further. Finally, would screw the other
pipe cap
pipe cap on,
on, and glue it.
it. The tissue paper would
tissue paper would help prevent
prevent some of the powder
powder from being
caught
caught in the threads
threads of the pipe
pipe or pipe cap
cap from being
being crushed
crushed and subject
subject to friction,
friction, which
which
might
might ignite
ignite the powder,
powder, causing
causing an explosion
explosion during
during manufacture.
manufacture.

(An assembled
assembled bomb is presented
presented in fig.
fig. 2.)
..............
It I
lth‘lt‘k’J 9 N u-n
:u c»

wimp 7m- r"; ;,—

lg 1 \ncrmnd my my ,.

This is one possible


possible design
design that a mad bomber
bomber would
would use. If, however,
however, he did not have access
access to
threaded
threaded pipe with endcaps,
endcaps, he could
could always
always use a piece
piece of copper
copper or aluminum pipe, since it is
aluminum pipe,
easily bent into a suitable
easily position. A major
suitable position.
problem with copper
problem piping, however,
copper piping, however, is bending
bending and folding
folding it without
without tearing
tearing it;
it; if too much
used when
force is used when folding
folding and bending
bending copper pipe, it will split along
copper pipe, along the fold. The safest
method for making
method making a pipe
pipe bomb out of copper
copper or aluminum
aluminum pipe is similar
similar to the method
method with
pipe and endcaps.
pipe endcaps.

First, one flattens


flattens one end of a copper
copper or aluminum
aluminum pipe carefully,
carefully, making
making sure not to tear or rip
the piping. flat end of the pipe should
piping. Then, the flat should be folded
folded over at least once,
once, if this does not rip
pipe. A fuse hole should be drilled
the pipe. drilled in the pipe
pipe near
near the now closed
closed end, and the fuse should
be inserted.
inserted. Next,
Next, the bomb-builder
bomb-builder would
would fill
fill the bomb with a low order explosive,
explosive, and pack
pack it
with a large wad of tissue
with tissue paper.
paper. He would
would then flatten
flatten and fold the other end of the
pipe of pliers.
pipe with a pair of pliers. If he was
was not too dumb,
dumb, he would
would do this slowly, since the process
process of
folding
folding and bending metal gives off heat, which
bending metal off the explosive.
which could set off explosive. A diagram
diagram is
presented below:
presented C02 cartridge
below: A CO2 BB gun
cartridge from a B.B gun is another
another excellent
excellent container
container for a low-order
low-order
explosive.
explosive. It has one minor
minor disadvantage:
disadvantage: it is time consuming
consuming to fill. rectified by
fill. But this can be rectified
widening the opening
widening opening of the cartridge with a pointed
cartridge with pointed tool. Then,
Then, all that would
would have to be
fill the CO2
done is to fill C02 cartridge
cartridge with any
any low-order
low-order explosive,
explosive, or
any
any of the fast burning
burning fuel oxidizer
oxidizer mixtures
mixtures and insert a fuse.
These
These devices
devices are commonly
commonly called "crater
"crater makers". C02 cartridge
makers". A CO2 cartridge

11g I
puma-1H: an «)4 *Lv'ux; 9.: :_~. h‘ . d1! [,4 my now

Lu 3
pux .wl: m l «1 1h I, an: x '1 Jul ll my... ,.-

1y up." .url-Ilw w um
' w M; .M.

mm
mm ,, rm. “MK”-.. ‘7

in 4 .nl!\|\luk\l
l “d; x“
x
«m M r.;‘ .w- 3.x:- ml r,._ .m mm {-

also works well as a container


works well container for a thermite
thermite incendiary
incendiary device,
device, but it must be modified.
modified. The
opening
opening in the end must
must be widened,
widened, so that the ignition mixture, such as powdered
ignition mixture, powdered magnesium,
magnesium,
does not explode.
explode. The fuse will ignite the powdered
powdered magnesium, which, in turn, would
magnesium, which, would ignite
ignite the
thermite.
thermite.
The previously
previously mentioned
mentioned designs
designs for explosive
explosive devices
devices are fine
fine for low order explosives,
explosives, but
are unsuitable
unsuitable for high-order
high-order explosives,
explosives, since the latter requires
requires a shockwave
shockwave to be detonated.
detonated. A
design
design employing
employing a smaller low-order
low-order explosive
explosive device
device inside a larger
larger device
device containing
containing a high-
high-
explosive would
order explosive would
probably used. It would
probably be used. would look something
something like:
If the large high explosive
explosive container C02 cartridge,
container is small, such as a CO2 then a segment
cartridge, then segment of a
hollow radio antenna
hollow radio antenna can be made
made into a low-order pipe bomb,
low-order pipe bomb, which fitted with
which can be fitted with a fuse,
and inserted C02 cartridge.
inserted into the CO2 cartridge.

iv) PLASTIC CONTAINERS


Plastic
Plastic containers
containers are perhaps
perhaps the best containers
containers for explosives,
explosives, since they can be anyany size or
shape, and are not fragile
fragile like glass. Plastic piping can be bought
Plastic piping bought at hardware
hardware or plumbing
plumbing stores,
and a device much like the ones used for
device much
metal containers
metal containers can be made.
made. The high-order
high-order version works well
version works well with plastic
plastic piping.
piping.
If the entire
entire device
device is made
made out of plastic,
plastic, it is not detectable
detectable by metal
metal detectors.
detectors. Plastic
Plastic
containers
containers can usually
usually be shaped by heating
heating the container
container and bending
bending it at the appropriate
appropriate place.
place.
They can be glued
glued closed with
with epoxy
epoxy or other
cement
cement for plastics.
plastics. Epoxy
Epoxy alone used as an endcap,
alone can be used if a wad of tissue
endcap, if tissue paper
paper
cpm)

“sun: l

paper
l

v-v-vnyuwwtq-v.‘
civic-Icon00-OI‘
:ttutntuatxtttl
‘uv-v-o-onovn..‘
" cxplomr ‘ '
cotton-luaclloc‘
sloututntu‘ _______________________ “he
noose-t-katnncn‘
.\.\.-'\,\.\.\.‘\,\.\.\:\;\.\.\,\

[Inuc l

paper

cprn)

is placed
placed in the piping.
piping. Epoxy with a drying
Epoxy with drying agent works
works best
best in this type of device.
device. One end
must be made first and be allowed
allowed to dry completely
completely before
before the device filled with powder
device can be filled powder
and fused. Then, with another
fused. Then, piece of tissue
another piece tissue paper,
paper, pack
pack the powder
powder tightly,
tightly, and cover
cover it with
plenty of epoxy.
plenty PVC pipe works
epoxy. PVC works well for this type of device,
device, but it cannot used if the pipe
cannot be used
had an inside
inside diameter greater than 3/4 of an inch. Other
diameter greater Other plastic used in this type
putties can be used
plastic putties type
of device,
of device, but epoxy with a drying
epoxy with drying agent works
works best.
best.

v) ADVANCED
ADVANCED USES USES FOR EXPLOSIVES
The techniques
techniques presented those that could be used by a person
presented here are those person who
who had some degree of
degree of
knowledge of the use of explosives.
knowledge explosives. Some of this information
information comes
comes from demolitions
demolitions books,
books, or
from military
military handbooks.
handbooks. Advanced
Advanced uses for explosives
explosives usually
usually involved
involved shaped charges
charges or
utilize a minimum
utilize minimum amount
amount of explosive
explosive to do a maximum
maximum amount
amount of damage.
damage. They almost
almost
always
always involve
involve high order explosives.
explosives.

vi) SHAPED CHARGES


Vi) SHAPED
A shaped charge
charge is an explosive
explosive device that, upon
device that, upon detonation,
detonation, directs
directs the explosive
explosive force of
detonation
detonation at a small target
target area. This process used to breach
process can be used breach the strongest
strongest armor,
armor, since
forces
forces of literally
literally millions
millions of pounds
pounds of pressure
pressure
per square
per square inch can be generated.
generated. Shaped
Shaped charges
charges employ
employ high-order
high-order explosives,
explosives, and usually
usually
electric
electric ignition
ignition systems.
systems.
An example of a shaped charge is shown below.
below.
~

“m- H'rr

xgmm

pnmulg mm.-
Imckul} Inlnmmm

\‘ mum hm.
Pugh
upl....u-
Jul-fr

I
: mm
"Ink we!
[‘I[‘\'

hnk [m Imlc lnl


xi rm u rm
\

\ unhu

vii) TUBE EXPLOSIVES


A variation
variation on shaped charges, explosives can be used
charges, tube explosives used in ways
ways that shaped charges
charges cannot.
cannot.
If a piece of 1/2 inch plastic
piece of plastic tubing filled with a sensitive
tubing was filled sensitive high explosive
explosive such as R.D.X.
R.D.X. and
prepared as the plastic
prepared plastic explosive
explosive container
container in section iv), a different of shaped charge
different sort of charge could
could
be produced;
produced; a charge that directs
charge that directs explosive
explosive force in a circular
circular manner.
manner. This type
type of explosive
explosive
could
could be wrapped
wrapped around
around a column,
column, or a doorknob,
doorknob, or a telephone
telephone pole.
pole. The explosion
explosion would
would be
directed
directed in and out, and most likely destroy whatever
likely destroy whatever it was
was wrapped
wrapped around.
around. In an unbent
unbent state,
explosive would
a tube explosive would look like this:
this:
When
When an assassin
assassin or terrorist
terrorist wishes
wishes to use a tube bomb,
bomb, he must wrap around whatever
wrap it around whatever thing
he wishes
wishes to destroy
destroy and epoxy
epoxy the ends of the tube bomb together. After
bomb together. After it dries, he/she
he/she can
connect
connect wires
Wires to the squib wires,
Wires, and detonate
detonate the bomb, with any
bomb, with method of electric
any method electric detonation.
detonation.

(pm)

II!~\HC l

Mm

Imuc
mpn

cpm)

-
uuc

A
\\ Irc

viii) MOLOTOV COCKTAILS


used by Russians
First used Russians against
against German
German tanks,
tanks, the Molotov
Molotov cocktail exclusively used by
cocktail is now exclusively
terrorists worldwide.
terrorists worldwide. They are extremely
extremely simple to make and can produce
produce devastating results. By
devastating results.
taking any
taking any highly
highly flammable
flammable material,
material, such as gasoline,
gasoline, diesel
diesel fuel, kerosene,
kerosene, ethyl or methyl
methyl
alcohol,
alcohol, lighter
lighter fluid,
fluid, turpentine,
turpentine, or any
any mixture
mixture of the above,
above, and putting
putting it into a large glass
bottle,
bottle, anyone
anyone can make an effective firebomb. After
effective firebomb. After putting flammableliquid
putting the flammable liquid in the bottle,
bottle,
simply put a piece
simply put piece of cloth that is soaked in the liquid in the top of the bottle so that it fitsfits tightly.
tightly.
Then, around the neck
wrap some of the cloth around
Then, wrap neck and tie it, but be sure to leave a few inches of lose
inches of
cloth to light. Light the exposed
exposed cloth and throw
throw the bottle.
bottle. If the burning
burning cloth does not go go out,
and if the bottle
bottle breaks
breaks on impact,
impact, the contents
contents of the bottle
bottle will spatter
spatter over a large area near the
site of impact
impact and burst into flame.
flame. Flammable
Flammable mixtures
mixtures such as kerosene
kerosene and motor oil should
be mixed with a more volatile
mixed with volatile and flammable
flammable liquid,
liquid, such as gasoline,
gasoline, to insure
insure ignition.
ignition. A
mixture
mixture such as tar or grease
grease and gasoline
gasoline will stick to the surface
surface that it strikes, hotter,
strikes, and burn hotter,
difficult to extinguish.
and be more difficult extinguish. A mixture
mixture such as this must be shaken well beforebefore it is lit and
thrown.
thrown.
Special
Special care must be taken to maintain good will and support support of the local populace.
terrorist should be reserved for Leftists. We are freedom fighters.
Remember: the term terrorist fighters.
Further
Further designs
designs can be found in the „Terrorist's
,,Terrorist's Handbook
Handbook “by Gunzenbomz PyroTechnologies,
Gunzenbomz PyroTechnologies,
a division
division of Chaos
Chaos Industries
Industries (CHAOS)
(CHAOS)

4) Swiss army
army knife blueprint
blueprint
No modern
modern fighter
fighter is complete without a Swiss Army
complete without Army Knife, referred to as a Multitool.
Knife, also referred Multitool. It is
recommended to acquire
recommended acquire a Victorinox
Victorinox Spartan
Spartan or Deluxe
Deluxe Tinker.
Tinker. In lieu of these
these a simple guide
guide
for DIY construction
construction of your
your own Swiss Army
Army Knife (different
(different attachments
attachments approximated
approximated as
keys) is included
keys) included below,
below, the SS member
member is recommended
recommended to creatively work around
creatively work resource
around resource
limitations
limitations relating tools and materials:
relating to tools materials:

i) Materials
1) pieces of wood
1) Two pieces wood (about
(about 1"
1" x 3.75"
3.7 5" x 1/8"
1/8" each)
2) Thin sheet metal (about
(about 2" x 3.75")
3.75")
3) Two #8 machine
machine screw lock nuts
4) Two #8 machine
machine screws, 3/ " long
screws, 3/4"
5) Ten #8 machine
machine screw washers
washers
6) Glue that's
that's able to bond wood to metal
bond wood metal
7) Wood
Wood stain (optional)
(optional)
8) Polyurethane
Polyurethane (optional)
(optional)
5)
[
ii) Tools
1)

5) Pencil
Pencil
6) Ruler
Ruler
Tip: Paint
39 CU
e“l (x‘3 D DC)

Tools
C)

1) Drill and bit set


2) Tin snips
3) Sand paper/sanding
paper/sanding block
4) Small binder
binder clamps

paint section
the paint
at Dollar
clamps

Paint stir sticks are a good size to be used


section of most hardware
Dollar Tree for $1.
$1. This yields
yields about
about 13"
used for the wood

13" x 9"
wood pieces.
hardware stores. For the sheet metal,
9" of metal.
metal.
pieces. These are generally
used a baking
metal, I used
generally free at
baking sheet that I found
found

iii) Cut the Wood and Metal to t0 Shape


Use whatever
whatever rounded
rounded object
object you have readily
you have readily available
available to trace
trace a semicircle
semicircle onto each end of
the wood
wood pieces.
pieces. Then using
using a saw or knife,
knife, cut along
along the outline.
outline. Trace
Trace the shape of these wood
these wood
pieces onto the sheet metal.
pieces metal.
Using
Using a pair of tin snips
cut out two pieces
pieces of sheet metal smaller than the outlines.
metal that are a little smaller outlines.

iv) Drill the Bolt Holes


Holes
Make a stack of
Make of the two
two wood
wood pieces
pieces and the two metal
metal pieces.
pieces. Make
Make sure all the pieces
pieces are
centered and hold them
centered them together with a binder
together with clamp. Mark
binder clamp. Mark the centers of the semicircle
centers of semicircle on each
end. They should
should be about
about 2.75 inches
inches apart. Using
Using a 3/16 drill bit, drill through
through all four layers
layers at
of these
one of these points.
points. Insert screw into this hole to help
Insert a screw help keep the layers
layers lined up.
up. Then drill the
second hole. Remove
second hole. Remove the two metal
metal pieces
pieces and re-drill holes in the wood
re-drill the holes wood pieces
pieces so that the
holes are wide
holes wide enough accommodate the head
enough to accommodate head of the machine
machine screw
screw and the lock nut
respective. You may
respective. You wish to wrap
may wish wrap the wood
wood pieces
pieces in tape
tape to prevent them from splitting
prevent them splitting when
when
drilling holes. When
drilling larger holes. When you're
you're done cutting
cutting and drilling,
drilling, sand all
the surfaces
surfaces and edges
edges smooth.
smooth.

v) Assemble
Assemble the Frame
Insert machine screws
Insert the machine through the holes
screws through holes in the metal
metal plates.
plates. Then add the washers
washers and keys.
keys.
Four
Four keys and five
five washers fit perfectly
washers will fit perfectly on a 3/4-inch
3/4-inch screw
screw in the sequence
sequence (sheet metal,
metal,
washer, key, washer,
washer, washer, key,
key, washer, key, washer,
washer, key, key, washer,
washer, key, washer, sheet metal). Using this
metal). Using this sequence,
sequence,
two keys
keys and three
three washers fit on a3 1/2-inch
washers will fit 1/2-inch screw.
screw. Likewise,
Likewise, six keys and seven
seven washers
washers
fit on a 1-inch
will fit 1-inch screw.
screw.
A
d 1114
Alternatively, you
Alternatively, you can conserve
tend to stick on each other.
washers. When you're
washers. you're done adding
space a little bit by eliminating
conserve space
If you
other. If have an odd number
you have
eliminating the washers,
number of
keys and washers,
adding keys
of keys you
washers, but the keys will
you can fill
washers, add the second
fill the space
piece of
second piece
space with
of sheet metal.
will
with two
metal. Then,
tighten everything
tighten together with the two lock nuts.
everything together nuts.
vi) Glue the Wooden Panels
Apply a thin layer of glue to the outside
Apply outside of one plate
plate and press
press on the wooden
wooden panel.
panel. Do the same
for the second panel,
panel, then binder clips to hold
then use binder hold everything
everything in place while the glue dries. You
place while
may wish to add a layer or two
may wish of card stock to prevent
two of prevent the clamps
clamps from denting your wood
denting your wood
panels. Victorinox
panels. Victorinox Spartan. Victorinox Deluxe
Spartan. Victorinox Deluxe Tinker.
Tinker.

Guerrilla War
Appendix C: Enemy Tactics and Guerrilla
I.
1. War Tactics of the Enemy
This section was based
section was based on the Brazilian22-communist tactics which
Brazilian22-communist war tactics which saw success
success in the 70's.
Clear differences
differences and yet large similarities
similarities are apparent.
apparent. The largest
largest difference
difference occurs
occurs in the war
philosophy of each individual
philosophy of individual fighter,
fighter, or rather
rather the lack thereof,
thereof, especially
especially from the ethical
ethical and
leadership
leadership perspective, of the leftists.
perspective, of leftists.
On the other hand it is helpful
helpful to learn the bulk of these
bulk of these tactics off by-heart
tactics off by-heart in order to improve
improve
your own war effort and to encircle,
your encircle, lure and destroy
destroy the enemy
enemy in the field.
field.
I. Mini-Manual of the Urban Guerrilla by Carlos Marighella
Urban Guerrilla
Contents23
1)
1) A DEFINITION
DEFINITION OF THE URBAN URBAN GUERRILLA
GUERRILLA
2) PERSONAL
PERSONAL QUALITIES
QUALITIES OF THE URBAN URBAN GUERRILLA
GUERRILLA
3) HOW
HOW THE URBAN
URBAN GUERRILLA
GUERRILLA LIVES LIVES
4) TECHNICAL PREPARATION OF THE URBAN
TECHNICAL PREPARATION URBAN GUERRILLA
GUERRILLA
5) THE URBAN
URBAN GUERRILLA'S
GUERRILLA‘S WEAPONSWEAPONS
6) THE SHOT; THE URBANURBAN GUERRILLA'S
GUERRILLA‘S REASON REASON FOR FOR EXISTENCE
EXISTENCE
7) THE FIRING
FIRING GROUP
GROUP
8) THE LOGISTICS
LOGISTICS OF THE URBAN
URBAN GUERRILLA
GUERRILLA
9) CHARACTERISTICS
CHARACTERISTICS OF THE URBAN URBAN GUERRILLA'S
GUERRILLA'S TACTICS
TACTICS
10)
10) THE INITIAL
INITIAL ADVANTAGES
ADVANTAGES OF THE URBAN URBAN GUERRILLA
GUERRILLA
11)
1
l) SURPRISE
SURPRISE
12)
12) KNOWLEDGE
KNOWLEDGE OF THE TERRAIN
TERRAIN
13)
l3) MOBILITY AND SPEED
MOBILITY AND SPEED
14)
14) INFORMATION
INFORMATION
15)
15) DECISIVENESS
DECISIVENESS
16)
16) OBJECTIVES
OBJECTIVES OF THE GUERRILLA'S ACTIONS
GUERRILLA'S ACTIONS
17)
17) ON THE TYPES
TYPES AND NATURE OF MISSIONS
AND NATURE MISSIONS FORFOR THE URBAN
URBAN
GUERRILLA
GUERRILLA
18) ASSAULTS
18) ASSAULTS
19)
19) THE BANK ASSAULT AS POPULAR
BANK ASSAULT POPULAR MISSION
MISSION
20) RAIDS
RAIDS AND
AND PENETRATIONS
PENETRATIONS
21) OCCUPATIONS
OCCUPATIONS
22 Tactics are adapted
adapted to the Brazil's environment -- this must be considered.
considered.

23 See also: http://kpvz7ki2lzvnwve7.onion/wiki/index.php/Main_Page


http://kpvz7ki2lzvnwve7.onion/wiki/index.php/Main Page

22) AMBUSH
AMBUSH
23) STREET
STREET TACTICS
TACTICS
24) STRIKES AND WORK
STRIKES AND WORK INTERRUPTIONS
INTERRUPTIONS
25) DESERTIONS,
DESERTIONS, DIVERSIONS,
DIVERSIONS, SEIZURES,
SEIZURES, EXPROPRIATION
EXPROPRIATION OF
AMMUNITION AND
AMMUNITION AND EXPLOSIVES
EXPLOSIVES
26) LIBERATION
LIBERATION OF PRISONERS
PRISONERS
27) EXECUTIONS
EXECUTIONS
28) KIDNAPPING
KIDNAPPING
29) SABOTAGE
SABOTAGE
30) TERRORISM
TERRORISM
31) ARMED
ARMED PROPAGANDA
PROPAGANDA
32) THE WAR
WAR OF NERVES
NERVES
33) HOW
HOW TO CARRY
CARRY OUT THE ACTION
ACTION
34) SOME OBSERVATIONS
OBSERVATIONS ON TACTICS
TACTICS
35) RESCUE
RESCUE OF THE WOUNDED
WOUNDED
36) GUERRILLA
GUERRILLA SECURITY
SECURITY
37) THE SEVEN
SEVEN SINS OF THE URBAN
URBAN GUERRILLA
GUERRILLA
38) POPULAR
POPULAR SUPPORT
SUPPORT
39) See also

1)
1) A DEFINITION OF THE URBAN URBANGUERRILLA
GUERRILLA
The urban
urban guerrilla
guerrilla is a person
person who
who fights
fights the military
military dictatorship with weapons,
dictatorship with weapons, using
using
unconventional methods.
unconventional methods. A revolutionary
revolutionary and an ardent
ardent patriot,
patriot, he is a fighter
fighter for his country's
country's
liberation,
liberation, a friend
friend of the people freedom. The area in which
people and of freedom. which the urban
urban guerrilla
guerrilla operates
operates
is in the large Brazilian
Brazilian cities.
cities. There
There are also criminals outlaws who work
criminals or outlaws work in the big cities.
cities.
Many times, actions
Many times, actions by criminals
criminals are taken
taken to be actions urban guerrillas.
actions by urban guerrillas. The urban
urban guerrilla,
guerrilla,
however,
however, differs radically from the criminal.
differs radically criminal benefits
criminal. The criminal benefits personally fiom his actions,
personally from actions,
and attacks
attacks indiscriminately
indiscriminately without
without distinguishing
distinguishing between
between the exploiters
exploiters and the exploited,
exploited,
which is why there
which there are so many
many ordinary people among
ordinary people among his victims.
victims. The urban
urban guerrilla
guerrilla follows
follows a
political goal, and only attacks
political attacks the government, businesses and the foreign
government, the big businesses foreign imperialists.
imperialists.
Another element
Another element just as harmful
harmful to the guerrillas
guerrillas as the criminal, operating in the urban
criminal, and also operating urban
area,
area, is the counterrevolutionary,
counterrevolutionary, who
who creates
creates confusion,
confusion, robs banks,
banks, throws
throws bombs, kidnaps,
bombs, kidnaps,
assassinates,
assassinates, and commits
commits the worst
worst crimes
crimes imaginable
imaginable against urban guerrillas,
against urban revolutionary
guerrillas, revolutionary
priests, students,
priests, students, and citizens
citizens who oppose
oppose tyranny
tyranny and seek liberty. urban guerrilla
liberty. The urban guerrilla is an
implacable
implacable enemyenemy of the regime,
regime, and systematically
systematically inflicts
inflicts damage
damage on the authorities
authorities and on the
people who
people who dominate
dominate the country
country and exercise
exercise power.
power. The primary
primary task of the urban
urban guerrilla
guerrilla is
to distract,
distract, to wear
wear down,
down, to demoralize
demoralize the military
military regime
regime and its repressive
repressive forces,
forces, and also to
attack
attack and destroy
destroy the wealth
wealth and property
property of the foreign managers and the Brazilian
foreign managers Brazilian upper
upper class.
The urban
urban guerrilla
guerrilla is not afraid
afraid to dismantle
dismantle and destroy
destroy the present Brazilian economic,
present Brazilian economic,
political and social system,
political system, for his aim is to aid the rural guerrillas
guerrillas and to help in the creation
creation of a
totally new
totally new and revolutionary
revolutionary social and political
political structure,
structure, with the armed population
population in power.
power.

2) PERSONAL QUALITIES OF THE URBAN URBAN GUERRILLA


The urban
urban guerrilla
guerrilla is characterized
characterized by his bravery
bravery and his decisive
decisive nature.
nature. He must be a good
tactician, and a good marksman.
tactician, marksman. The urbanurban guerrilla
guerrilla must
must be a person
person of great cleverness
cleverness to
compensate
compensate for the fact that he is not sufficiently
sufficiently
strong in weapons,
weapons, ammunition
ammunition and equipment.
equipment. The career military officers
career military officers and the government
government
police have modern
police weapons and transport,
modern weapons transport, and can go go about
about anywhere
anywhere freely, using the force of
freely, using
their
their own strength. urban guerrilla
strength. The urban guerrilla does not have such resources
resources at his disposal
disposal and leads a
clandestine
clandestine existence.
existence. The guerrilla
guerrilla may
may be a convicted
convicted person
person or one who is out on parole
parole and
must then use false documents.
documents. Nevertheless, urban guerrilla
Nevertheless, the urban guerrilla has an advantage
advantage over the
conventional military or the police.
conventional military that, while
police. It is that, while the military
military and the police behalfof
police act on behalf of
the enemy,
enemy, whom
whom the people
people hate, the urban
urban guerrilla
guerrilla defends
defends a just cause, which is the people's
cause, which people's
cause.
cause. The urban
urban guerrilla's weapons are inferior
guerrilla's weapons inferior to the enemy's,
enemy's, but from the moral point point of
view, the urban
urban guerrilla
guerrilla has an undeniable
undeniable superiority.
superiority. This moral superiority is what
moral superiority what sustains
sustains
urban guerrilla.
the urban guerrilla. Thanks
Thanks to it, the urban
urban guerrilla
guerrilla can accomplish
accomplish his principle
principle duty, which
which is
survive. The urban
to attack and survive. urban guerrilla
guerrilla has to capture
capture or steal weapons
weapons from the enemy
enemy to be
able to fight.
fight. Because
Because his weapons uniformisincewhat
weapons are not uniform—since what he has are expropriated
expropriated or have
fallen
fallen into his hands in various
various ways—the
waysithe urban
urban guerrilla
guerrilla faces the problem
problem of a variety
variety of
weapons and a shortage
weapons shortage of ammunition. Moreover, he has no place
ammunition. Moreover, place in which
which to practice
practice shooting
shooting
and marksmanship.
marksmanship. These difficulties
difficulties have to be overcome,
overcome, forcing urban guerrillas
forcing the urban guerrillas to be
imaginative creativei qualities
imaginative and creative— without which
qualities without which it would
would be impossible
impossible for him to carry
carry out
his role as a revolutionary.
revolutionary. The urban
urban guerrilla
guerrilla must possess
possess initiative, mobility and flexibility,
initiative, mobility flexibility, as
well as versatility
well versatility and a command
command of any any situation.
situation. Initiative
Initiative especially
especially is an indispensable
indispensable
quality.
quality. It is not always possible to foresee
always possible foresee everything,
everything, and the urbanurban guerrilla
guerrilla cannot himself
cannot let himself
become confused or wait for instructions.
become confused instructions. His duty is to act, to find find adequate
adequate solutions
solutions for each
problem he faces, and to retreat.
problem retreat. It is better
better to err acting than to do nothing
acting than nothing for fear of making
making a
mistake. Without
mistake. Without initiative,
initiative, there
there is no urban
urban guerrilla
guerrilla warfare.
warfare. Other important
important qualities
qualities in the
urban guerrilla
urban guerrilla are the following:
following: to be a good walker,
walker, to be able to stand upup against
against fatigue,
fatigue,
hunger,
hunger, rain or heat. To knowknow how to hide, and how to be vigilant.
vigilant. To conquer
conquer the art of
dissembling. Never
dissembling. Never to fear danger.
danger. To behave
behave the same by day as by night.night. Not to act
impetuously.
impetuously. To have unlimited
unlimited patience.
patience. To remain
remain calm and cool in the worst of conditions
worst of conditions
and situations.
situations. Never
Never to leave a track or trail.
trail. Not
Not to get discouraged.
discouraged. In the face ofof the almost
almost
insurmountable
insurmountable difficulties urban guerrilla
difficulties in urban warfare, sometimes
guerrilla warfare, sometimes comrades weaken and give up
comrades weaken up
the fight.
fight. The urban
urban guerrilla
guerrilla is not a businessman
businessman in an urban
urban company,
company, nor is he an actor in a
play. Urban
play. Urban guerrilla
guerrilla warfare,
warfare, like rural guerrilla warfare, is a pledge
guerrilla warfare, pledge which
which the guerrilla
guerrilla makes
makes
to himself.
himself. When
When he can no longerlonger face the difficulties,
difficulties, or if he knows
knows that he lacks the patience
patience
to wait, then it is better for him to relinquish
relinquish his role before
before he betrays
betrays his pledge,
pledge, for he clearly
Clearly
lacks the basic qualities necessary to be a guerrilla.
qualities necessary guerrilla.

3) HOW THE URBAN URBAN GUERRILLA LIVES


The urban
urban guerrilla
guerrilla must know
know how to live amongamong the people,
people, and he must be careful
careful not to
appear
appear strange
strange and different
different from ordinary
ordinary city life. He should not wear wear clothes
clothes that are different
different
from those
those that other people
people wear.
wear. Elaborate
Elaborate and high-fashion
high-fashion clothing
clothing for men or womenwomen maymay
often be a handicap
handicap if the urban
urban guerrilla's
guerrilla's mission takes him into working
mission takes working class neighborhoods,
neighborhoods,
or sections
sections where
where such dress
dress is uncommon.
uncommon. The same care has to be taken if the urban
taken if urban guerrilla
guerrilla
must move from the South of the country country to the North,
North, and vice versa.
versa. The urban
urban guerrilla
guerrilla must
make his living through
make through his job or his professional
professional activity.
activity. If he is known
known and sought by the
police, he must
police, must go
go underground,
underground, and sometimes
sometimes must live hidden. Under such circumstances,
hidden. Under circumstances, the
urban guerrilla
urban guerrilla cannot reveal his activity
cannot reveal activity to anyone,
anyone, since this information
information is always
always and only the
responsibility of the revolutionary
responsibility revolutionary organization
organization in which
which he is participating.
participating.
The urban
urban guerrilla
guerrilla must have a greatgreat ability
ability for observation.
observation. He must be well-informed
well-informed about
everything,
everything, particularly
particularly about the enemy's
enemy's movements,
movements, and he must be very very inquisitive
inquisitive and
knowledgeable
knowledgeable about the area in which which he lives,
operates,
operates, or travels through. But the fundamental
travels through. fundamental characteristic
characteristic ofof the urban
urban guerrilla
guerrilla is that he is
a man who
who fights with weapons;
fights with weapons; given
given these
these circumstances,
circumstances, there
there is very
very little likelihood
likelihood that he
will be able to follow
follow his normal
normal profession
profession for long without identified by the police.
without being identified police. The
role of expropriation thus looms
expropriation thus looms as clear as high noon.noon. It is impossible
impossible for the urban
urban guerrilla
guerrilla to
exist and survive without
without fighting
fighting to expropriate.
expropriate. Thus, the armed
armed struggle
struggle of the urban
urban guerrilla
guerrilla
points towards
points towards two essential
essential objectives:
objectives:
1) physical elimination
1) the physical elimination of of the leaders
leaders and assistants of the armed
assistants of armed forces
forces and of of the police;
police;
2) the expropriation
expropriation of government
government resources
resources and the wealth
wealth belonging
belonging to the rich
businessmen24,
businessmen24, the large landowners
landowners and the imperialists, expropriations used
with small expropriations
imperialists, with used for the
sustenance
sustenance of the individual
individual

24 Here we see already


already the absence
absence of Sabbatean-Frankist
Sabbatean-Frankist Jewish
Jewish humanity,
humanity, no difference
difference is
made between
between the rich who
who were
were born poor their fortune
poor and built their fortune and those who parasitically
those who parasitically
exploited working class.
exploited the working
guerrillas
guerrillas and large ones for the maintenance
maintenance of the revolutionary
revolutionary organization
organization itself.
itself. It is clear
that the armed
armed struggle
struggle of the urban
urban guerrilla
guerrilla also has other objectives.
objectives. But here we are referring
referring
to the two basic objectives,
objectives, above
above all expropriation.
expropriation. It is necessary
necessary for every
every urban
urban guerrilla
guerrilla to
always
always keep
keep in mind that he can only maintainmaintain his existence
existence if he is able to kill the police
police and
those dedicated
those dedicated to repression,
repression, and if he is determined—truly determineditoexpropriate
determineditruly determined—to expropriate the
wealth of the rich businessmen,
wealth businessmen, landowners
landowners and imperialists.
imperialists. One of the fundamental
fundamental
characteristics
characteristics of the Brazilian revolution is that,
Brazilian revolution that, from the beginning,
beginning, it developed
developed around
around the
expropriation
expropriation of the wealthwealth of the
major
major business,
business, imperialist
imperialist and landowning
landowning interests,
interests, without
without excluding
excluding the largest and most
powerful commercial
powerful commercial elements
elements engaged
engaged in the import-export business. And by expropriating
import-export business. expropriating the
wealth
wealth of the principle
principle enemies
enemies of the people,
people,
the Brazilian revolution was able to hit them
Brazilian revolution them at their vital center, with preferential
center, with preferential and systematic
systematic
attacks banking networkithat
attacks on the banking network—that is to say, most telling
say, the most telling blows were levelled
blows were levelled at the
businessman's
businessman's nervenerve system.
system. The bank robberies
robberies carried
carried out by the Brazilian urban guerrillas
Brazilian urban guerrillas
hurt big businesses
businesses and others,
others, the foreign
foreign companies
companies whichwhich insure
insure and re-insure
re-insure the banking
banking
capital,
capital, the imperialist
imperialist companies,
companies, the federal
federal and state governments—all
govemmentsiall of them them are
systematically
systematically expropriated
expropriated as of now.now. The fruit of thesethese expropriations
expropriations has been devoted
devoted to the
tasks of learning
tasks learning and perfecting urban guerrilla
perfecting urban techniques, the purchase,
guerrilla techniques, purchase, production
production and
transportation of weapons
transportation weapons and ammunition
ammunition for the rural areas, areas, the security precautions of the
security precautions
guerrillas,
guerrillas, the daily maintenance
maintenance of of the fighters, those who have been
fighters, those been liberated
liberated from prison
prison by
armed
armed force, those who have been wounded,
force, those wounded, and thosethose whowho are being persecuted
persecuted by the police,
police,
any kind
and to any kind of problem
problem concerning
concerning comrades
comrades liberated
liberated from jail or assassinated
assassinated by the police
police
and the military
military dictatorship.
dictatorship. The tremendous
tremendous costs of the revolutionary
revolutionary war must fall upon upon the
big businesses,
businesses, on the imperialists,
imperialists, on the large landowners,
landowners, and on the government tooiboth
government too—both
federal stateisince they are all exploiters
federal and state—since exploiters and oppressors
oppressors of the people.
people. Men of of the
government,
government, agents
agents of the dictatorship
dictatorship and of foreign
foreign imperialism,
imperialism, especially,
especially, must pay with
pay with
their
their lives for the crimes
crimes they have committed
committed against
against the Brazilian
Brazilian people.
people. In Brazil, number
Brazil, the number
of violent
violent actions
actions carried
carried out by urban
urban guerrillas,
guerrillas, including
including executions,
executions, explosions,
explosions, seizures
seizures of
weapons, ammunition
weapons, ammunition and explosives,
explosives, assaults
assaults on banks and prisons,prisons, etc., is significant
significant enough
enough
to leave no room
room for doubt
doubt as to the actual aims of the revolutionaries;
revolutionaries; all are witnesses
witnesses to the
fact that we are in a full revolutionary
revolutionary war and that this war can be waged waged only by violent
violent means.
means.
reason why the urban
This is the reason urban guerrilla
guerrilla uses armed
armed struggle,
struggle, and whywhy he continues
continues to
concentrate
concentrate his efforts
efforts on the physical
physical extermination
extermination of the agents of repression,
agents of repression, and to dedicate
dedicate
24 hours
hours a day to expropriations
expropriations from the people's
people's
exploiters.
exploiters.

TECHNICAL PREPARATION
4) TECHNICAL THE URBAN GUERRILLA
PREPARATION OF THE GUERRILLA
No one can become
become an urban
urban guerrilla
guerrilla without paying special attention
without paying attention to technical
technical preparation.
preparation.
The technical
technical preparation urban guerrilla
preparation of the urban guerrilla runs from a concern
concern for his physical
physical condition
condition to
a knowledge
knowledge of and apprenticeship
apprenticeship in professions
professions and skills of all kinds,
kinds, particularly
particularly manual
manual
skills. The urban
urban guerrilla
guerrilla can have a strong physical
physical constitution
constitution only if he trains
trains systematically.
systematically.
He cannot
cannot be a good fighter
fighter if he has not learned
learned the art of fighting.
fighting. For that reason,
reason, the urban
urban
guerrilla
guerrilla must learn and practice
practice the various
various forms
forms of unarmed
unarmed fighting,
fighting, of attack,
attack, and of
personal defense.
personal defense. Other useful
useful forms
forms of physical preparation are hiking,
physical preparation hiking, camping, practice of
camping, the practice
survival
survival in the woods,
woods, mountain
mountain climbing,
climbing, rowing,
rowing, swimming,
swimming, skin diving
diving and training
training as a
frogman,
frogman, fishing,
fishing, harpooning,
harpooning, and the hunting
hunting of birds
birds and of small and big game. game. It is very
very
important
important to learn how to drive a car, car, pilot a plane,
plane, handle
handle a motor boat and a sailboat,
sailboat,
understand mechanics,
understand radio, telephone,
mechanics, radio, telephone, electricity
electricity and have some knowledge
knowledge of electronics
electronics
techniques 25.
techniques
It is also important
important to have a knowledge
knowledge of topographical
topographical information,
information, to be able to determine
determine
one's position
position by instruments
instruments or other available resources, to calculate
available resources, calculate distances,
distances, make maps maps and
plans, draw to scale, make timings,
plans, work with
timings, and work with an angle protractor,
protractor, a compass,
compass, etc. A
knowledge of chemistry,
knowledge chemistry, of color combination
combination and of stamp-making, mastery of the skills of
stamp-making, the mastery
calligraphy
calligraphy and the copying
copying of letters,
letters, and other techniques
techniques are part of the technical
technical preparation
preparation
of the urban
urban guerrilla,
guerrilla, who is obliged
obliged to falsify
falsify documents
documents in order
order to live within
within a society that he
seeks to destroy.
destroy. In the area of "makeshift"
"makeshift" medicine,
medicine, the urban
urban guerrilla
guerrilla has the special role role of
being
being a doctor
doctor or understanding
understanding medicine,
medicine, nursing, pharmacology, drugs,
nursing, pharmacology, drugs, basic surgery
surgery and
emergency first aid. The basic
emergency first basic question
question in the technical
technical preparation
preparation of the urban
urban guerrilla
guerrilla is,
nevertheless, to know
nevertheless, know how to handle
handle weapons
weapons such as the submachine
submachine gun, revolver, automatic
gun, revolver, automatic
pistol, FAL, various
pistol, types of shotguns,
various types shotguns, carbines,
carbines, mortars, bazookas, etc. A knowledge
mortars, bazookas, knowledge of various
various
types of ammunition
types ammunition and explosives
explosives is another
another aspect
aspect to consider. Among the explosives,
consider. Among explosives,
dynamite
dynamite must be well well understood.
understood. The use of incendiary
incendiary bombs,
bombs, smoke
smoke bombs,
bombs, and other types types
is also indispensable
indispensable prior
prior training.
training. To know
know how to improvise
improvise and repair
repair weapons,
weapons, prepare
prepare
Molotov
Molotov cocktails,
cocktails, grenades,
grenades, mines,
mines, homemade
homemade destructive
destructive devices,
devices, how-to
how-to blow-up
blow-up bridges,
bridges,
tear up
up and put out of service railroads and railroad
service railroads railroad cars, these are necessities
cars, these necessities in the technical
technical
preparation of the urban
preparation urban guerrilla
guerrilla that can never
never be considered
considered unimportant.
unimportant. 25 Note Note here that the
enemy rarely follows
enemy rarely follows this advice, preferring to engage
advice, preferring engage in carnal pleasures
pleasures and merely
merely learning
learning a
singular
singular role to a good degree.
degree. The list of skills mentioned
mentioned is recommended
recommended as you you have the
willpower and strength
willpower strength to better
better yourself
yourself as compared
compared to their slovenliness.
slovenliness. That being said,
underestimate your
NEVER underestimate your enemy.
enemy. The highest
highest level of preparation
preparation for the urban
urban guerrilla
guerrilla is
training camp
the training camp for technical
technical training.
training. But only the guerrilla who has already
guerrilla who passed a
already passed
preliminary examination
preliminary examination can go schoolithat is to say,
go to this school—that say, one who
who has passed
passed the test of fire
fire
in revolutionary
revolutionary action,
action, in actual
actual combat
combat against
against the enemy.
enemy.

URBANGUERRILLA'S
5) THE URBAN GUERRILLA'S WEAPONS
The urban
urban guerrilla's weapons are light arms,
guerrilla's weapons arms, easily
easily obtained,
obtained, usually
usually captured
captured from the enemy,
enemy,
purchased, or made
purchased, made on the spot. Light weapons
weapons have the advantage
advantage of fast handling
handling and easyeasy
transport. In general,
transport. general, light weapons
weapons are
characterized
characterized as being
being short-barreled.
short-barreled. This includes many automatic
includes many weapons. Automatic
automatic weapons. Automatic and
semi-automatic weapons considerably
semi-automatic weapons considerably increase
increase the firepower
firepower of the urban
urban guerrilla.
guerrilla. The
disadvantage
disadvantage of this type
type of weapon,
weapon, for us,
us, is the difficulty
difficulty in controlling
controlling it,
it, resulting
resulting in wasted
wasted
rounds or a wasteful
rounds ammunitionicorrected for only by a good aim and precision
wasteful use of ammunition—corrected precision firing.
firing.
Men who are poorly
poorly trained
trained convert
convert automatic weapons into an ammunition
automatic weapons ammunition drain.
drain. Experience
Experience
has shown that the basic weapon
weapon of the urban
urban guerrilla
guerrilla is the light submachine
submachine gun.gun. This weapon,
weapon,
in addition
addition to being efficient
efficient and easy
easy to shoot in an urban
urban area,
area, has the advantage
advantage of of being
being
greatly
greatly respected
respected by the enemy.
enemy. The guerrilla
guerrilla must thoroughly
thoroughly know
know how to handle
handle the
submachine
submachine gun, now so popular
gun, now popular and indispensable
indispensable to the Brazilian urban guerrillas.
Brazilian urban guerrillas. The ideal
submachine
submachine gun gun for the urban
urban guerrilla
guerrilla is the INA .45.45 caliber.
caliber. Other types of submachine
Other types submachine gunsguns of
different
different calibers
calibers can also be used—understanding
usediunderstanding of course, problem of ammunition.
course, the problem ammunition. Thus,
it is preferable
preferable that the manufacturing
manufacturing capabilities
capabilities of the urban guerrillas be used for the
urban guerrillas
production of
production of one type ofof submachine
submachine gun,gun, so that the ammunition
ammunition to be usedused can be
standardized.
standardized. Each firing
firing group
group of urban
urban guerrillas
guerrillas must have a submachine
submachine gungun handled
handled by a
good marksman.
marksman. The other members
members of the group armed with .38 revolvers,
group must be armed revolvers, our standard
standard
weapon.
weapon. The .32 is also useful
useful for those
those who want
want to participate.
participate. But the .38 is preferable
preferable since
its impact usually puts
impact usually puts the enemy
enemy out of action.
action. Hand
Hand grenades
grenades and conventional
conventional smoke bombs bombs
can also be considered weapons, with defensive
considered light weapons, defensive power
power for cover and withdrawal.
withdrawal. Long-Long-
barreled
barreled weapons
weapons are more difficult
difficult for the urban
urban guerrilla
guerrilla to transport,
transport, and they attract
they attract much
attention because of their
attention because their size. Among
Among the long-barreled weapons are the FAL, the Mauser
long-barreled weapons Mauser guns
guns
or rifles,
rifles, hunting
hunting guns
guns such as the Winchester,
Winchester, and others.
others. Shotguns useful if used
Shotguns can be useful used at close
range and point
range point blank.
blank. They are useful
useful even for a poor
poor shot, especially
especially at night when precision
night when precision
isn't much
much help. A pressure
pressure air-gun
air-gun can be useful
useful for training
training in marksmanship.
marksmanship. Bazookas
Bazookas and
mortars
mortars can also be usedused in action,
action, but the conditions
conditions for using them have to be prepared
using them prepared and the
people who use them
people who them must be trained.
trained. The urban
urban guerrilla
guerrilla should not attempt
attempt to base his actions
actions
on the use of heavy weapons, which
heavy weapons, which have major
major drawbacks
drawbacks in a type of fighting
fighting that demands
demands
lightweight
lightweight weapons
weapons to insure mobility and speed. Homemade
insure mobility Homemade weapons
weapons are often efficient as
often as efficient
the best weapons
weapons produced
produced in conventional
conventional factories,
factories, and even a sawed-off
sawed-off shotgun
shotgun is a good
weapon for the urban guerrilla
weapon guerrilla fighter.
fighter.

i) Weapons
Weapons
The urban
urban guerrilla's role as a gunsmith
guerrilla's role gunsmith has a basic importance.
importance. As a gunsmith,
gunsmith, he takes
takes care of
weapons, knows
the weapons, knows how to repairrepair them,
them, and in many
many cases
cases can setup a small shop for
improvising
improvising and producing
producing effective
effective small arms. Experience
Experience in metallurgy
metallurgy and on the
mechanical
mechanical lathe are basic
basic skills the urban
urban guerrilla
guerrilla should incorporate
incorporate into his manufacturing
manufacturing
plans for the construction
plans construction of homemade weapons. This production,
homemade weapons. production, and courses
courses in explosives
explosives and
sabotage,
sabotage, must be organized.
organized. The primary
primary materials
materials for practice
practice in these
these courses
courses must be
obtained
obtained ahead
ahead of time, prevent an incomplete
time, to prevent incomplete apprenticeship—that
apprenticeshipithat is to say,say, so as to leave no
room for experimentation.
room experimentation. Molotov
Molotov cocktails,
cocktails, gasoline,
gasoline, homemade
homemade contrivances
contrivances such as
catapults
catapults and mortars
mortars for firing
firing explosives,
explosives, grenades
grenades made of pipespipes and cans,
cans, smoke bombs,
bombs,
mines,
mines, conventional
conventional explosives
explosives such as dynamite
dynamite and potassium
potassium chlorate,
chlorate, plastic
plastic explosives,
explosives,
gelatin
gelatin capsules,
capsules, and ammunition
ammunition of of every kind are indispensable
every kind indispensable to the success of the urban
urban
guerrilla's
guerrilla's mission.
mission. The methods
methods of of obtaining
obtaining the necessary
necessary materials
materials and munitions
munitions will be to
buy them
them or to take them
them by force in expropriation
expropriation actions
actions specially planned and carried
specially planned carried out. The
urban guerrillas
urban will be careful
guerrillas will keep explosives
careful not to keep explosives and other materials
materials that can cause
accidents
accidents around
around for very
very long but will always
always try
try to use them immediately on their intended
them immediately intended
targets. The urban
targets. urban guerrilla's
guerrilla's weapons
weapons and his ability
ability to maintain
maintain them
them constitute
constitute his firepower.
firepower.
By taking
taking advantage
advantage of modern
modern weapons
weapons and introducing
introducing innovations
innovations in his firepower
firepower and in the
use of certain weapons, the urban
certain weapons, urban guerrilla
guerrilla can improve
improve many
many of the tactics
tactics of urban
urban warfare.
warfare. An
example
example of this was the innovation
innovation made by the Brazilian urban guerrillas
Brazilian urban when they
guerrillas when they introduced
introduced
the use of the submachine
submachine gungun in their attacks
attacks on banks.
banks. When
When the massive
massive use of uniform
uniform
submachine
submachine guns
guns becomes possible, there will be new
becomes possible, new changes
changes in urban
urban guerrilla warfare tactics.
guerrilla warfare tactics.
The firing
firing group utilizes uniform
group that utilizes weapons and corresponding
uniform weapons corresponding ammunition, with reasonable
ammunition, with reasonable
care for their maintenance,
maintenance, will reach
reach a considerable of effectiveness.
considerable level of effectiveness. The urban
urban guerrilla
guerrilla
increases
increases his effectiveness
effectiveness as he increases
increases his firepower.
firepower.

6) THE SHOT; THE URBAN URBAN GUERRILLA'S REASON REASON FOR EXISTENCE
The urban
urban guerrilla's
guerrilla's reason
reason for existence,
existence, the basic condition
condition in which
which he acts and survives,
survives, is to
shoot. The urban
urban guerrilla
guerrilla must know
know how to shoot well, well, because
because it is required
required by this typetype of
combat.
combat. In conventional warfare, combat
conventional warfare, combat is generally
generally at a distance
distance with long-range weapons. In
long-range weapons.
unconventional warfare, in which
unconventional warfare, which urban
urban guerrilla
guerrilla warfare
warfare is included,
included, combat
combat is at short range
range
and often very
very close. To prevent
prevent his own death, urban guerrilla
death, the urban guerrilla must shoot first,
first, and he
cannot
cannot err in his shot. He cannot
cannot waste
waste his ammunition
ammunition because
because he does not possess
possess large
amounts,
amounts, and so he must conserve
conserve it. Nor can he replace
it. Nor replace his ammunition
ammunition quickly,
quickly, since he is a
part of a small team in which
part which each guerrilla himself The urban
guerrilla has to be able to look after himself. urban
guerrilla
guerrilla can lose no time, thus has to be able to shoot at once. One basic
time, and thus basic fact, which
which we
want to emphasize
want emphasize completely,
completely, and whose whose importance
importance cannot
cannot be overestimated,
overestimated, is that the urban
urban
guerrilla
guerrilla must not fire
fire continuously,
continuously, usingusing up
up his ammunition.
ammunition. It may may be that the enemy
enemy is
responding to this fire
responding fire precisely
precisely because
because he is waiting
waiting until the guerrilla's
guerrilla's ammunition used
ammunition is all used
up.
up. At such a moment,
moment, without
without having
having the opportunity
opportunity to replace
replace his ammunition,
ammunition, the guerrilla
guerrilla
faces a rain of enemy
enemy fire,
fire, and can be takentaken prisoner
prisoner or killed.
killed. In spite of the value
value of the surprise
surprise
factor, which
factor, which many
many times
times makes unnecessary for the urban
makes it unnecessary urban guerrilla
guerrilla to use his weapons,
weapons, he
cannot
cannot be allowed
allowed the luxury
luxury of entering
entering combat knowing how to shoot. And when
without knowing
combat without when face-
to-face with the enemy,
to-face enemy, he must alwaysalways be moving
moving from one position
position to another,
another, since to stay in
one place
place makes fixed target
makes him a fixed target and, as such, very very vulnerable.
vulnerable. The urban
urban guerrilla's
guerrilla's life
depends
depends on shooting,
shooting, on his ability
ability to handle
handle his weapons
weapons well
well and to avoid
avoid being
being hit. When we
speak of shooting,
shooting, we speak of accuracy
accuracy as well.well. Shooting
Shooting must be practiced
practiced until it becomes
becomes a
reflex
reflex action part of the urban
action on the part urban guerrilla.
guerrilla. To learn how to shoot and have have good aim, the
urban guerrilla
urban guerrilla must train himself systematically,
train himself utilizing every
systematically, utilizing practice method
every practice method shooting
shooting at
targets, even in amusement
targets, amusement parksparks and at home.home. Shooting
Shooting and marksmanship
marksmanship are the urban urban
guerrilla's
guerrilla's water perfection of the art of shooting
water and air. His perfection shooting may
may make him a special type of
special type
urban guerrilla—
urban guerrillai that is, a sniper, a category
category of solitary
solitary combatant
combatant indispensable
indispensable in isolated
isolated
actions.
actions. The sniper knows
knows how to shoot at close range range and at long range,
range, and his weapons
weapons are
appropriate
appropriate for either type of shooting.
shooting.

7) THE FIRING GROUP


In order
order to function, urban guerrillas
function, the urban guerrillas must be organized
organized into small groups.
groups. A team
team of no more
than four or five
than five is called a firing
firing group.
group. A minimum
minimum of two firing
firing groups,
groups, separated
separated and
insulated
insulated from other firing
firing groups,
groups, directed
directed and
coordinated persons, this is what
coordinated by one or two persons, what makes
makes a firing team. Within
firing team. Within the firing
firing group,
group,
there must be complete
there complete confidence
confidence among
among the members.
members. The best shot, and the one who
who knows
knows
best how to handle
handle the submachine
submachine gun,gun, is the person
person in charge
charge of operations.
operations. The firing
firing group
group
plans and executes
plans urban guerrilla
executes urban guerrilla actions,
actions, obtains
obtains and stores weapons,
weapons, and studies and corrects
corrects
its own tactics.
tactics. When there
there are tasks
tasks planned
planned by the strategic
strategic command,
command, these tasks take
these tasks take
preference. But there
preference. there is no such thing
thing as a firing
firing group
group without
without its own initiative.
initiative. For this reason,
reason,
it is essential
essential to avoid any
any rigidity
rigidity in the guerrilla
guerrilla organization,
organization, in order to permit
permit the greatest
greatest
possible initiative
possible initiative on the part of the firing
firing group.
group. The old-type
old-type hierarchy,
hierarchy, the style ofof the
traditional revolutionaries,
traditional revolutionaries, doesn't
doesn't exist in our organization.
organization. This means that, except
means that, except for the
priority of the objectives
priority objectives set by the strategic
strategic command,
command, any any firing
firing group decide to raid a
group can decide
bank, to kidnap
kidnap or execute
execute an agent
agent of
of the dictatorship,
dictatorship, a figure
figure identifiedwith
identified with reaction, or a
the reaction,
foreign
foreign spy,
spy, and can carry
carry out any type of propaganda
any type propaganda or war of nerves
nerves against
against the enemy,
enemy,
without need to consult
without the need with the general
consult with general command.
command.

No firing
firing group
group can remain
remain inactive
inactive waiting
waiting for orders
orders from above.
above. Its obligation
obligation is to act. Any
Any
single urban
urban guerrilla
guerrilla who wants
wants to establish
establish a firing
firing group
group and begin action
action can do so,so, and thus
becomes
becomes a part of of the organization.
organization. This method
method of action eliminates the need for knowing
action eliminates knowing whowho
is carrying
carrying out which
which actions,
actions, since there
there is free initiative
initiative and the only important
important point
point is to
greatly
greatly increase
increase the volume
volume of urban
urban guerrilla
guerrilla activity wear out the government
activity in order to wear government and
force it onto the defensive.
defensive. The firing
firing group
group is the instrument
instrument of organized
organized action.
action. Within
Within it,
it,
guerrilla
guerrilla operations
operations and tactics
tactics are planned,
planned, launched
launched and carried through to success.
carried through success. The general
general
command
command counts
counts on the firing
firing groups
groups to carry
carry out objectives of a strategic
objectives of nature, and to do so in
strategic nature,
any part of the country.
any part country. For its part,
part, the general
general command
command helps the firing
firing groups with their
groups with
difficulties and with carrying
difficulties carrying out objectives
objectives of a strategic
strategic nature,
nature, and to do so in anyany part of the
country.
country. The organization
organization is an indestructible network of firing
indestructible network firing groups,
groups, and of coordination’s
coordination’s
among
among them,
them, that functions
functions simply and practically
practically within
within a general
general command
command that also
participates attacksian organization
participates in attacks—an organization that exists
exists for no other purpose than that of pure
purpose than pure and
simple revolutionary
revolutionary action.
action.

8) THE LOGISTICS OF THE URBAN URBAN GUERRILLA


Conventional
Conventional logistics expressed with the formula FFEA:
logistics can be expressed
F—food
F—food
F—fuel
F—fuel
E—equipment
A—ammunition

Conventional
Conventional logistics
logistics refer
refer to the maintenance problems for an army
maintenance problems army or a regular
regular armed
armed force,
force,
transported in vehicles,
transported vehicles, with fixed bases
with fixed bases and supply lines. Urban
Urban guerrillas,
guerrillas, on the contrary,
contrary, are
not an army
army but small armed groups,
groups, intentionally
intentionally fragmented.
fragmented. They have neither
neither vehicles
vehicles nor
rear areas. Their supply lines are precarious
precarious and insufficient, fixed bases
they have no fixed
insufficient, and they bases except
except
in the rudimentary
rudimentary sense of a weapons
weapons factory
factory within
within a house.
house. While
While the goal of
conventional
conventional logistics
logistics is to supply the war needs "gorillas" who are used to repress
needs of the "gorillas" repress rural
rural
and urban
urban rebellion,
rebellion, urban
urban guerrilla
guerrilla logistics
logistics aim at sustaining
sustaining operations
operations and tactics
tactics which
which have
nothing in common
nothing with conventional
common with conventional warfare
warfare and are directed
directed against
against the government
government and
foreign
foreign domination
domination of the country.
country. For the urban
urban guerrilla, who starts from nothing
guerrilla, who nothing and who
who has
no support
support at the beginning,
beginning, logistics
logistics are expressed
expressed by the formula MMWAE, which
which is:
M—mechanization
M—money
M—money
W—weapons
W—weapons
A—ammunition
E—explosives
E—explosives

Revolutionary
Revolutionary logistics takes mechanization
logistics takes mechanization as one of its bases.
bases. Nevertheless,
Nevertheless, mechanization
mechanization is
inseparable
inseparable from the driver.
driver. The urban
urban guerrilla
guerrilla driver
driver is as important
important as the urban
urban guerrilla
guerrilla
machine
machine gunner.
gunner. Without
Without either,
either, the machines
machines do
work, and the automobile,
not work, automobile, as well
well as the submachine
submachine gun gun becomes
becomes a dead thing. An
experienced
experienced driver
driver is not made in one day, and apprenticeship
apprenticeship mustmust begin
begin early. Every good
urban guerrilla
urban guerrilla must be a driver.
driver. As to the vehicles,
vehicles, the
urban guerrilla
urban expropriate what
guerrilla must expropriate what he needs.
needs. When
When he already
already has resources,
resources, the urban
urban
guerrilla
guerrilla can combine
combine the expropriation
expropriation of vehicles with his other methods
vehicles with methods of acquisition.
acquisition.
Money,
Money, weapons,
weapons, ammunition
ammunition and explosives,
explosives, and automobiles
automobiles as well, must be expropriated.
expropriated.
The urban
urban guerrilla
guerrilla must rob banks
banks and armories
armories and seize explosives
explosives and ammunition wherever
ammunition wherever
finds them.
he finds them. None
None of these
these operations
operations is carried
carried out for just one purpose.
purpose. Even whenwhen the raid is
to obtain money, weapons that the guards
money, the weapons guards carry
carry must be taken
taken as well.
well. Expropriation
Expropriation is the
first step in organizing logistics, which
organizing our logistics, itself assumes
which itself assumes an armed
armed and permanently
permanently mobile
mobile
character.
character. The second step step is to reinforce
reinforce and expand
expand logistics,
logistics, resorting
resorting to ambushes
ambushes and traps
traps
in which
which the enemy
enemy is surprised,
surprised, and his weapons,
weapons, ammunition,
ammunition, vehicles
vehicles and other resources
resources are
captured.
captured. Once
Once he has weapons,
weapons, ammunition
ammunition and explosives,
explosives, one of the most serious
serious logistics
logistics
problems facing
problems urban guerrilla
facing the urban guerrilla is a hiding
hiding place
place in which
which to leave the material,
material, and
appropriate
appropriate means
means of of transporting
transporting it and assembling
assembling it where
where it is needed.
needed. This has to be
accomplished
accomplished even when when the enemy
enemy is alerted
alerted and has the roads
roads blocked.
blocked. The knowledge
knowledge thatthat the
urban guerrilla
urban guerrilla possesses
possesses of the terrain,
terrain, and the devices
devices he uses
uses or is capable
capable of using,
using, such as
scouts specially prepared and recruited
specially prepared recruited for this mission,
mission, are the basic
basic elements
elements in solving
solving the
eternal
eternal logistics
logistics problems
problems faced by the guerrillas.
guerrillas.

9) CHARACTERISTICS OF THE URBAN URBAN GUERRILLA'S TACTICS


The tactics
tactics of the urban
urban guerrilla
guerrilla have the following
following characteristics:
characteristics:
1)
1) It is an aggressive tactic, or,
aggressive tactic, or, in other words,
words, it has an offensive
offensive character.
character. As is well
well known,
known,
defensive
defensive action
action means
means death for us. Since we are inferior
inferior to the enemy
enemy in firepower
firepowerand have
neither his resources
neither resources nor his power
power base, we cannot
cannot defend
defend ourselves
ourselves against
against an offensive
offensive or a
concentrated
concentrated attack
attack by the "gorillas".
"gorillas". That is the reason
reason why
why our urban
urban technique
technique can never
never be
permanent, can never
permanent, never defend fixed base nor remain
defend a fixed remain in anyany one spot waiting
waiting to repel
repel the circle
circle
of repression.
repression.
2) It is a tactic
tactic of attack
attack and rapid withdrawal, by which
rapid withdrawal, which we preserve
preserve our forces.
forces.
3) It is a tactic that aims at the development
development of urban
urban guerrilla
guerrilla warfare, whose function
warfare, whose will be to
function will
wear out, demoralize
wear demoralize and distract
distract the enemy
enemy forces, permitting the emergence
forces, permitting emergence and survival
survival of
rural guerrilla
rural warfare, which
guerrilla warfare, which is destined play the decisive
destined to play role in the revolutionary
decisive role revolutionary war.
10) THE INITIAL ADVANTAGESOF
ADVANTAGES OF THE URBAN URBAN GUERRILLA
The dynamics
dynamics of urban
urban guerrilla
guerrilla warfare
warfare lie in the guerrilla's
guerrilla's violent
violent clash with
with the military
military and
police forces
police forces of the dictatorship.
dictatorship. In this conflict, police have superiority.
conflict, the police superiority. The urban
urban guerrilla
guerrilla
has inferior
inferior forces.
forces. The paradox
paradox is that the urban
urban guerrilla
guerrilla is nevertheless
nevertheless the attacker.
attacker. The
military
military and police forces, for their part, respond
police forces, conflict by mobilizing
respond to the conflict mobilizing and concentrating
concentrating
greatly
greatly superior
superior forces
forces in the pursuit
pursuit and destruction
destruction of the urban guerrilla.
guerrilla. The guerrilla
guerrilla can only
avoid
avoid defeat
defeat if he depends
depends on the initial advantages
advantages he has and knows
knows how to exploit
exploit them to the
end, to compensate
compensate for his weakness
weakness and lack of material.
material.
The initial advantages
advantages are:
1)
1) He must take the enemy
enemy by surprise.
surprise.
2) He must know terrain of the encounter.
know the terrain encounter.
3) He must have greater
greater mobility
mobility and speed than the police
police and other repressive
repressive forces.
forces.
4) His information
information service must be better than than the enemy's.
enemy's.
5) He must be in command
command of the situation,
situation, and demonstrate
demonstrate a decisiveness
decisiveness so great
great that
everyone
everyone on our side is inspired
inspired and never
never thinks
thinks of hesitating,
hesitating, while
while on the other
other side the enemy
enemy
is stunned
stunned and incapable
incapable of acting.
acting.

l l) SURPRISE
11)
To compensate
compensate for his general weakness and shortage
general weakness shortage of weapons
weapons compared
compared to the enemy,
enemy, the
urban guerrilla
urban guerrilla uses surprise.
surprise. The enemy
enemy has no wayway to combat
combat surprise
surprise and becomes
becomes confused
confused
and is destroyed.
destroyed. When urban guerrilla
When urban guerrilla warfare
warfare broke
broke out in Brazil,
Brazil, experience proved that
experience proved
surprise
surprise was essential
essential to the success
success of any
any guerrilla
guerrilla operation.
operation. The technique
technique of surprise
surprise is based
upon four essential
upon requirements:
essential requirements:
1)
1) We know
know the situation
situation of the enemy
enemy we are going
going to attack, usually by means
attack, usually means of precise
precise
information
information and meticulous
meticulous observation, while the enemy
observation, while enemy does not knowknow he is going to be
attacked knows nothing
attacked and knows nothing about
about the attackers.
attackers.
2) We know
know the strength
strength of the enemy
enemy we are going to attack,
attack, and the enemy
enemy knows
knows nothing
nothing
about
about our strength.
strength.
3) Attacking
Attacking by surprise,
surprise, we save and conserve
conserve our forces, while the enemy
forces, while enemy is unable
unable to do the
same,
same, and is left at the mercy
mercy of events.
events.
4) We determine
determine the time and placeplace of the attack,
attack, fix
fix its duration
duration and establish
establish its objectives.
objectives. The
enemy remains ignorant
enemy remains ignorant of all of this information.
information.

12) KNOWLEDGE OF THE TERRAIN


The urban
urban guerrilla's
guerrilla's best ally is the terrain,
terrain, and because
because this is so he must know know it like the palm
palm
of his hand.
hand. To have the terrain
terrain as an ally means know how to use with
means to know with intelligence
intelligence its
unevenness, its high and low points,
unevenness, points, its turns,
turns, its
irregularities, fixed and secret passages,
irregularities, its fixed passages, its abandoned
abandoned areas,
areas, its thickets,
thickets, etc., taking
taking
maximum
maximum advantage
advantage of all of this for the success
success of armed
armed actions,
actions, escapes,
escapes, retreats,
retreats, covers,
covers, and
hiding places. Impasses
hiding places. Impasses and narrow
narrow spots,
spots, gorges,
gorges, streets under repair,
repair, police
police checkpoints,
checkpoints,
military closed-offstreets,
military zones and closed-off streets, the entrances
entrances and exits to tunnels
tunnels and those
those that the enemy
enemy
can close off, corners controlled or watched
comers controlled watched by the police,
police, traffic
traffic lights
lights and signals;
signals; all this must
be
thoroughly known
thoroughly known and studied in order to avoid avoid fatal errors.
errors. Our problem
problem is to get through
through and to
know where
know where and how to hide, leaving
leaving the enemy
enemy bewildered
bewildered in areas he doesn't know. Being
doesn't know. Being
familiar
familiar with the avenues,
avenues, streets, alleys,
alleys, ins and outs, the corners
comers of the urban
urban centers,
centers, its paths
paths
and shortcuts,
shortcuts, its empty
empty lots, its underground
underground passages,
passages, its pipes
pipes and sewer systems,
systems, the urban
urban
guerrilla
guerrilla safely crosses through the irregular
crosses through irregular and difficult terrain unfamiliar
difficult terrain unfamiliar to the police, where
police, where
police can be surprised
the police surprised in a fatal ambush
ambush or trap at any moment. Because
any moment. Because he knows
knows the
terrain, the urban
terrain, urban guerrilla
guerrilla can pass
pass through
through it on foot, on bicycle,
bicycle, in a car,
car, jeep or small truck,
truck,
never be trapped.
and never trapped. Acting
Acting in small
groups with only a few people,
groups with people, the guerrillas
guerrillas can rendezvous
rendezvous at a time and place
place determined
determined
beforehand,
beforehand, following
following upup the initial
initial attack with new guerrilla
attack with guerrilla operations,
operations, or evading
evading the police
police
cordon
cordon and disorienting
disorienting the enemy with their unexpected
enemy with unexpected audacity.
audacity. It is an impossible problem
impossible problem
for the police,
police, in the labyrinthian
labyrinthian terrain
terrain of the urban
urban guerrilla,
guerrilla, to catch someone
someone they cannot
cannot see,
see,
to repress
repress someone they cannot
someone they cannot catch, and to close in on someone they cannot
someone they cannot find.
find. Our
experience
experience is that the ideal guerrilla
guerrilla is one who operates
operates in his own city and thoroughly
thoroughly knows
knows
its streets,
streets, its neighborhoods,
neighborhoods, its transit
transit problems,
problems, and its other peculiarities.
peculiarities. The guerrilla
guerrilla
outsider, who comes
outsider, comes to a city whose unfamiliar to him, is a weak
whose streets are unfamiliar weak spot,
spot, and if he is
assigned
assigned certain
certain operations,
operations, he can endanger them. To avoid
endanger them. avoid grave
grave mistakes, necessary for
mistakes, it is necessary
him to get to know
know the layout of the streets.

13) MOBILITY AND AND SPEED


To insure
insure a mobility
mobility and speed that the police
police cannot
cannot match,
match, the urban
urban guerrilla
guerrilla
needs the following:
needs following:
1)
1) Mechanization
Mechanization
2) Knowledge
Knowledge of of the terrain
terrain
3) A disruption
disruption or suspension
suspension of enemy
enemy transport
transport and communications
communications
4) Light
Light weapons
weapons
By carefully
carefully carrying
carrying out operations that last only a few moments,
operations that moments, and leaving
leaving the site in
mechanized
mechanized vehicles,
vehicles, the urban
urban guerrilla beats a rapid
guerrilla beats retreat, escaping
rapid retreat, escaping capture.
capture. The urban
urban
guerrilla
guerrilla must know way in detail,
know the way detail, and, in this manner, must go
manner, must go through
through the schedule
schedule ahead
ahead
of time
time as a training,
training, to avoid
avoid entering
entering alleyways
alleyways that running into traffic
that have no exit, or running traffic jams,
or being
being stopped
stopped by the Transit Department's traffic
Transit Department's traffic signals.
signals. The police
police pursue
pursue the urban
urban
guerrilla
guerrilla blindly, without knowing
blindly, without which road he is using
knowing which using for his escape.
escape. While urban
While the urban
guerrilla
guerrilla escapes
escapes quickly because he knows
quickly because terrain, the police
knows the terrain, police lose the trail and give up up the
chase.
chase. The urban
urban guerrilla
guerrilla must launch
launch his operations
operations far from the logistical
logistical centers
centers of of the police.
police.
A primary
primary advantage
advantage of this method
method of operation
operation is that it places
places us at a reasonable
reasonable distance
distance from
possibility of capture,
the possibility which facilitates
capture, which facilitates our evasion.
evasion. In addition
addition to this necessary
necessary precaution,
precaution,
urban guerrilla
the urban guerrilla must be concerned with the enemy's
concerned with enemy's communication
communication system.
system. The telephone
telephone is
primary target
the primary target in preventing
preventing the enemy
enemy from accessaccess to information,
information, by knocking
knocking out his
communications
communications systems.
systems. Even if he knows
knows about
about the guerrilla
guerrilla operation,
operation, the enemy
enemy depends
depends on
modern transportation
modern transportation for his logistics
logistics support,
support, and his vehicles necessarily lose time
vehicles necessarily time carrying
carrying
him through
through the heavy traffic
traffic of the large cities.
cities. It is clear that the tangled treacherous traffic
tangled and treacherous traffic
is a disadvantage
disadvantage for the enemy,
enemy, as it would
would be for us if we were
were not ahead of him. If we want to
have a safe margin
margin of security
security and be certain
certain to leave no tracks
tracks for the future,
future, we can adopt the
following
following methods:
methods:
1)
1) Deliberately
Deliberately intercept
intercept the police
police with
with other vehicles,
vehicles, or by seemingly
seemingly casual
casual inconveniences
inconveniences
and accidents;
accidents; but in this case the vehicles
vehicles in question
question should neither be legal nor have real
should neither
license
license numbers
numbers
2) Obstruct
Obstruct the roads with fallen trees,
roads with trees, rocks,
rocks, ditches,
ditches, false traffic
traffic signs, dead ends or detours,
detours, or
other clever methods
methods
3) Place
Place homemade
homemade mines
mines in the way
way of the police;
police; use gasoline
gasoline or throw
throw Molotov
Molotov cocktails
cocktails to
set their
their vehicles
vehicles on fire
fire
4) Set off a burst of submachine
submachine gungun fire
fire or weapons
weapons such as the FAL aimedaimed at the motor
motor and
tires of the cars engaged
tires engaged in the pursuit
pursuit

With the arrogance


arrogance typical
typical of the police
police and the military
military authorities,
authorities, the enemy will come to fight
enemy will fight
us equipped
equipped with heavy
heavy guns
guns and equipment,
equipment, and with with elaborate
elaborate maneuvers
maneuvers by men men armed
armed to the
teeth. The urban
teeth. urban guerrilla
guerrilla must respond
respond to this with
with light weapons
weapons that can be easily transported,
transported,
so he can always
always escape
escape with maximum
maximum speed without
without ever accepting
accepting openopen fighting.
fighting. The urban
urban
guerrilla
guerrilla has no mission
mission other than to attack
attack and quickly withdraw. We would
quickly withdraw. would leave ourselves
ourselves
open
open to the most crushing
crushing defeats
defeats if we burdened
burdened ourselves with heavy
ourselves with weapons and with
heavy weapons with the
tremendous weight
tremendous weight of the ammunition
ammunition necessary
necessary to use them,
them, at the same time losing our
precious gift of mobility.
precious mobility. When
When our enemy
enemy fights
fights against with the cavalry,
against us with cavalry, we are at no
disadvantage
disadvantage as long as we are mechanized.
mechanized. The automobile
automobile goesgoes faster than the horse.
faster than horse. From
within
within the car,
car, we also have the target
target of the mounted
mounted police,
police, knocking
knocking him down with
with
submachine
submachine gun gun and revolverfire
revolver fire or with Molotov
Molotov cocktails
cocktails and hand grenades.
grenades. On the other
difficult for an urban
hand, it is not so difficult urban guerrilla
guerrilla on foot to make a targettarget of a policeman
policeman on
horseback.
horseback. Moreover,
Moreover, ropes
ropes across
across the street, marbles,
marbles, and cork stoppers
stoppers are very efficient
very efficient
methods making them
methods of making them fall. The great disadvantage
disadvantage faced
faced by the mounted policeman is that he
mounted policeman
presents the urban
presents urban guerrilla
guerrilla with two excellent
with two targets—the horse
excellent targetsithe rider.
horse and its rider.
Apart from being
Apart being faster than
than the horseman, helicopter has no better
horseman, the helicopter better chance
chance in pursuit. If the
pursuit. If
horse is too slow compared
compared to the urbanurban guerrilla's
guerrilla's automobile,
automobile, the helicopter
helicopter is too fast. Moving
Moving
at 200 kilometers
kilometers an hour, it will never
never succeed
succeed in hitting
hitting from above a target
target that is lost among
among
the crowds
crowds and street vehicles,
vehicles, nor can the helicopter
helicopter land in public
public streets in order to capture
capture
someone. At the same time,
someone. time, whenever
whenever it flies
flies too low, it will be excessively fire
vulnerable to the fire
excessively vulnerable
of the urban
urban guerrillas.
guerrillas.

l4) INFORMATION
14)
chances that the government
The chances government has for discovering
discovering and destroying urban guerrillas
destroying the urban guerrillas lessens
lessens
as the power
power of the dictatorship's
dictatorship's enemies
enemies becomes
becomes greater
greater and more concentrated
concentrated among
among the
population. This concentration
population. concentration of of the opponents
opponents of the dictatorship plays a very
dictatorship plays very important
important role in
providing information
providing information about the actions
actions of the police
police and government
government officials,
officials, as well
well as hiding
hiding
the activities
activities of the guerrillas.
guerrillas. The enemy
enemy can also be thrown
thrown off with
with false information,
information, which
which is
worse for him because
worse because it is a tremendous waste. By whatever
tremendous waste. whatever means,
means, the sources
sources of information
information
at the disposal
disposal of the urban guerrilla
guerrilla are potentially
potentially better than those
better than those of the police.
police. The enemy
enemy is
observed
observed by the people,
people, but he does not know
know who among
among the people
people transmits
transmits information
information to
urban guerrillas.
the urban guerrillas. The military police are hated
military and the police hated by the people
people for the injustices
injustices and
violence
violence they have committed,
committed, and this
this facilitates
facilitates obtaining
obtaining information which is damaging
information which damaging to
the activities
activities of government
government agents.
agents. Information,
Information, which
which is only a small segment
segment of popular
popular
support,
support, represents
represents an extraordinary
extraordinary potential
potential in the hands ofof the urban
urban guerrilla.
guerrilla.

The creation of an intelligence


intelligence service,
service, with an organized structure,
structure,
is a basic need for us [26].
[26].

The urban
urban guerrilla
guerrilla has to have vital information
information about the plans
plans and movements
movements of the enemy;
enemy;
where they
where they are,
are, how they
they move, resources of their
move, the resources their banking network, their
banking network, their means
means of
communication,
communication, and the secret activities
activities they carry
carry out. The reliable
reliable information passed on to the
information passed
guerrillas represents a well-aimed
guerrillas represents well-aimed blow at the dictatorship.
dictatorship. The dictatorship
dictatorship has no way
way to defend
defend
itself in the face of an important
itself important leak which
which facilitates
facilitates our destructive
destructive attacks.
attacks. The enemy
enemy also
wants to know
wants what actions
know what actions we are planning
planning so he can destroy
destroy us or prevent
prevent us from acting.
acting. In
this sense,
sense, the danger of betrayal
danger of betrayal is present,
present, and the enemy
enemy encourages
encourages betrayal infiltrates
betrayal and infiltrates
spies into the guerrilla
guerrilla organization.
organization. The urban
urban guerrilla's
guerrilla's technique
technique against
against this enemy
enemy tactic
tactic is
to denounce publicly the spies, traitors,
denounce publicly traitors, informers
informers and provocateurs.
provocateurs. Since our struggle takes
struggle takes
place among
place people and depends
among the people depends on their sympathy—while
sympathyiwhile the government
government has a bad
reputation because
reputation because of its brutality,
brutality, corruption
corruption and incompetence—the
incompetenceithe informers,
informers, spies, traitors
traitors
and the police
police come to be enemies
enemies of the people,
people, without
without supporters,
supporters, denounced
denounced to the urban
urban
guerrillas
guerrillas and, in many
many cases,
cases, properly
properly punished.
punished. For his part, urban guerrilla
part, the urban guerrilla must not evade
evade
the duty—once
dutywnce he knows knows who the spy spy or informer iswf
informer is—of physically
physically wiping
wiping him out. This is the
proper
proper

[26]
[26] This is to be exploited via infiltrations and counter-surveillance.

method,
method, approved
approved by the people,
people, and it minimizes
minimizes considerably
considerably the incidence
incidence of infiltration
infiltration or
enemy
enemy spying.
spying. For complete
complete success
success in the battle
battle against
against spies and informers,
informers, it is essential
essential to
organize
organize a counter-espionage
counter-espionage or counter-intelligence
counter-intelligence service. Nevertheless, as far as information
service. Nevertheless, information
is concerned,
concerned, it cannot
cannot all be reduced
reduced to a matter
matter of knowing
knowing the enemy's
enemy's moves
moves and avoiding
avoiding the
infiltration
infiltration of spies. Intelligence
Intelligence information broadiit must embrace
information must be broad—it embrace everything,
everything,
including most insignificant
including the most insignificant material.
material. There is a technique
technique of obtaining
obtaining information,
information, and the
urban guerrilla
urban guerrilla must master
master it.
it. Following
Following this technique,
technique, intelligence
intelligence information
information is obtained
obtained
naturally, as a part
naturally, part of the life of the people.
people. The urban
urban guerrilla,
guerrilla, living
living in the midst of the
population and moving
population moving about
about among them, must
among them, must be attentive types of conversations
attentive to all types conversations and
human relations, learning
human relations, learning how to disguise
disguise his interest
interest with great skill and judgement.
judgement.
In places
places where
where people
people work,
work, study, and live, it is easy
easy to collect
collect all kinds
kinds of information
information on
payments, business,
payments, business, plans
plans of all kinds,
kinds, points of view, opinions,
points of people's state of mind, trips,
opinions, people's trips,
interior
interior layout
layout of buildings,
buildings, offices
offices and rooms,
rooms, operations
operations centers,
centers, etc. Observation,
Observation,
investigation, reconnaissance, and exploration
investigation, reconnaissance, exploration of the terrain
terrain are also excellent
excellent sources
sources of
information.
information. The urban
urban guerrilla
guerrilla never
never goes
goes anywhere
anywhere absentmindedly
absentmindedly and withoutwithout revolutionary
revolutionary
precaution, always
precaution, always on the alert lest something
something occurs.
occurs. Eyes and ears open,open, senses alert, his
memory
memory is engraved with everything
engraved with necessary, now or in the future,
everything necessary, future, to the continued
continued activity of
activity of
the guerrilla
guerrilla fighter.
fighter. Careful reading of the press
Careful reading press with
with particular
particular attention
attention to the mass
communication
communication media, research of accumulated
media, the research accumulated data, the transmission
transmission of news
news and
everything
everything of note,
note, a persistence
persistence in being informed
informed and in informing
informing others,
others, all this makes up the
makes up
intricate
intricate and immensely
immensely complicated
complicated question of information
question of which gives
information which gives the urban
urban guerrilla
guerrilla a
decisive
decisive advantage.
advantage.

DECISIVENESS
15) DECISIVENESS
It is not enough
enough for the urban
urban guerrilla
guerrilla to have in his favor surprise,
surprise, speed, knowledge
knowledge of of the
terrain, and information.
terrain, information. He must also demonstrate
demonstrate his command
command of any any situation
situation and a capacity
capacity
for decisiveness, without which
decisiveness, without which all other advantages
advantages will prove
prove to be useless.
useless. It is impossible
impossible to
carry
carry out any
any action,
action, however well-planned, if the urban
however well-planned, urban guerrilla turns out to be indecisive,
guerrilla turns indecisive,
uncertain, irresolute.
uncertain, irresolute. Even an action successfully
successfully begun
begun can end in defeat
defeat if command
command of the
situation
situation and the capacity
capacity for decision
decision falter in the middle
middle of the execution
execution of the plan.
plan. When
When this
command
command of of the situation
situation and a capacity
capacity for decision
decision are absent, filled with hesitation
absent, the void is filled hesitation
and terror.
terror. The enemy takes advantage
enemy takes advantage ofof this failure
failure and is able to liquidate
liquidate us. The secret of the
success
success of anyany operation,
operation, simple or complex,
complex, easy
easy or difficult,
difficult, is to rely on determined
determined men.
Strictly
Strictly speaking,
speaking, there
there are no simple operations: carried out with the same care taken
operations: all must be carried taken
in the most difficult,
difficult, beginning
beginning with the choice
choice of the human elementsiwhich means
human elements—which relying on
means relying
leadership
leadership and the capacity
capacity for decision
decision in every
every situation.
situation. One can see ahead of time whether
ahead of whether an
action
action will be successful
successful or not by the wayway its participants
participants act during
during the preparatory
preparatory period.
period.
Those
Those whowho fall behind,
behind, whowho fail to make
make designated
designated contacts,
contacts, are easily
easily confused,
confused, forget things,
forget things,
fail to complete
complete the basic tasks
tasks of the work,
work, possibly
possibly are indecisive
indecisive men and can be a danger.
danger. It is
better
better not to include them. Decisiveness
include them. Decisiveness means
means to put into practice
practice the plan
plan that has been
been devised
devised
with determination,
with with audacity,
determination, with audacity, and with an absolute
absolute firmness.
firmness. It takes
takes only one person
person who
who
hesitates
hesitates to lose all.

16) OBJECTIVES OF THE GUERRILLA'S ACTIONS


With his tactics
tactics developed
developed and established,
established, the urban
urban guerrilla himself in methods
trains himself
guerrilla trains methods of
action
action leading
leading to attack,
attack, and, in Brazil,
Brazil, has the following
following objectives:
objectives:
1) threaten the triangle
1) To threaten triangle within which the Brazilian
within which Brazilian state and North
North American
American domination
domination are
maintained, a triangle
maintained, whose points
triangle whose points are Rio, Sao Paulo
Paulo and Belo Horizonte,
Horizonte, and whose
whose base
base is
RioiSan Paulo,
the axis Rio—San Paulo, where
where the giant
industrial,
industrial, financial,
financial, economic,
economic, political,
political, cultural,
cultural, military,
military, and police
police complex
complex that holds
holds the
decisive
decisive power
power of the country
country is located.
located.
2) To weaken
weaken the local militia
militia and the security
security systems
systems of the dictatorship,
dictatorship, given
given the fact that we
are attacking
attacking and the "gorillas"
"gorillas"
defending,
defending, which
which means
means catching
catching the government
government in a defensive
defensive position with its troops
position with troops
immobilized
immobilized in the defense
defense of the entire
entire complex
complex of national
national maintenance, with its ever-present
maintenance, with ever-present
fears of an attack
attack on its strategic
strategic nerve
nerve centers,
centers, and without
without ever knowing
knowing where,
where, how or whenwhen
the attack
attack will come.
3) To attack
attack every
every area with
with many
many different
different armed
armed groups,
groups, small in size, each self-contained
self-contained and
operating
operating independently,
independently, to disperse
disperse the government forces in their
government forces their pursuit
pursuit of a thoroughly
thoroughly
fragmented
fragmented organization,
organization, instead
instead of offering
offering the dictatorship
dictatorship the opportunity
opportunity to concentrate
concentrate its
forces
forces in the destruction
destruction of one tightly
tightly organized
organized system
system operating
operating throughout
throughout the country.
country.
4) To give proof of its combativeness,
proof of combativeness, decision,
decision, firmness,
firmness, determination,
determination, and persistence
persistence in the
attack
attack on the military
military dictatorship,
dictatorship, in order to allow all rebels
rebels to follow
follow in our example
example and to
fight with urban
fight urban guerrilla tactics. Meanwhile,
guerrilla tactics. Meanwhile, the government
government withwith all ofof its problems,
problems, incapable
incapable
of halting
halting guerrilla
guerrilla action within
within the cities, will lose time and suffer endless
endless attrition,
attrition, and will
finally
finally be forced pull back
forced to pull back its repressive
repressive forces
forces in order
order to mount
mount guard over all the banks, banks,
industries,
industries, armories,
annories, military
military barracks, prisons, public
barracks, prisons, public offices, radio and television
offices, radio television stations,
stations,
North American
North American firms,
firms, gasgas storage tanks, oil refineries,
storage tanks, refineries, ships, airplanes,
airplanes, ports,
ports, airports,
airports, hospitals,
hospitals,
health
health centers,
centers, blood
blood banks,
banks,
stores, garages,
garages, embassies, residences of high-ranking
embassies, residences members of the regime
high-ranking members regime such as ministers
ministers
and generals, police stations,
generals, police stations, official
official organizations,
organizations, etc.
5) To increase
increase urban
urban guerrilla
guerrilla actions
actions gradually
gradually into an endless
endless number
number of surprise raids, such
surprise raids,
that the government
government cannot
cannot leave the urban
urban area to pursue
pursue guerrillas
guerrillas in the rural
rural interior without
interior without
running the risk of abandoning
running abandoning the cities and permitting
permitting rebellion
rebellion to increase
increase on the coast as well well
as the interior
interior of the country.
country.
6) To force the Army
Army and the police,
police, their commanders
commanders and theirtheir assistants,
assistants, to give up up the
relative comfort
relative tranquility of their barracks
comfort and tranquility their usual
barracks and their usual rest, for a state of fear and
growing
growing tension
tension in the expectation
expectation of of attack,
attack, or in a search for trails
trails which
which vanish
vanish without
without a
trace.
trace.
7) To avoid
avoid open battle and decisive
open battle decisive combat with the government,
combat with government, limiting
limiting the struggle
struggle to brief,
rapid attacks with lightning
rapid attacks lightning results.
results.
8) insure for the urban
8) To insure urban guerrilla
guerrilla a maximum
maximum freedom
freedom of of movement
movement and of action,action, without
without
ever relinquishing
relinquishing the use of of armed action, remaining firmly
action, remaining firmly oriented towards helping
oriented towards helping the
formation
formation of rural
rural guerrilla
guerrilla warfare
warfare and supporting
supporting
the construction
construction of a revolutionary
revolutionary armyarmy for national
national liberation.
liberation.

17) ON
ON THE TYPES AND AND NATURE MISSIONS FOR THE URBAN
NATURE OF MISSIONS URBAN GUERRILLA
In order
order to achieve
achieve the objectives previously listed,
objectives previously listed, the urban
urban guerrilla
guerrilla is obliged,
obliged, in his tactics,
tactics,
to follow
follow missions
missions whose
whose nature
nature is as different diversifiedas possible.
different or diversified urban guerrilla
possible. The urban guerrilla
does not arbitrarily
arbitrarily choose
choose this or that mission.
mission. Some actions
actions are simple;
simple; others are complicated.
complicated.
The inexperienced
inexperienced guerrilla
guerrilla must be gradually
gradually introduced
introduced into actions
actions and operations
operations which
which run
from the simple to the complex.
complex. He begins missions and tasks
begins with small missions until he becomes
tasks until becomes
completely
completely experienced.
experienced. Before
Before any
any action, guerrilla must think
urban guerrilla
action, the urban think of the methods
methods and the
personnel at his disposal
personnel disposal to carry
carry out the mission.
mission. Operations
Operations and actions
actions that demand urban
demand the urban
guerrilla's
guerrilla's technical
technical preparation
preparation cannot
cannot be carried someone who lacks the technical
carried out by someone technical skill.
With these
these precautions,
precautions, the missions which the urban
missions which urban guerrilla
guerrilla can undertake
undertake are the following:
following:
1) Assaults
1) Assaults
2) Raids
Raids and penetrations
penetrations
3) Occupations
Occupations
Ambushes
4) Ambushes
5) Street tactics
tactics
Strikes and work
6) Strikes work stoppages
stoppages
7) Desertions,
Desertions, diversions,
diversions, seizures,
seizures,
8)
8) Expropriation
Expropriation of of weapons,
weapons,
9) Ammunition
Ammunition and explosives
explosives
10)
10) Liberation
Liberation of prisoners
prisoners
11)
1 1) Executions
Executions
12)
12) Kidnappings
Kidnappings
13)
13) Sabotage
Sabotage
14)
14) Terrorism
Terrorism
15) Armed propaganda
15) Armed propaganda
16)
16) War of nerves
nerves

18) ASSAULTS
ASSAULTS
Assaults are the armed
Assaults armed attacks which we make
attacks which make to expropriate
expropriate funds,
funds, liberate prisoners, capture
liberate prisoners, capture
explosives,
explosives, submachine
submachine guns,
guns, and other types
types of
of weapons
weapons and ammunition.
ammunition. Assaults can take
Assaults
place in broad daylight
place daylight or at night.
night. Daytime
Daytime assaults
assaults are made when
when the objective
objective cannot
cannot be
achieved
achieved at anyany other
other hour, such as the transport
transport of money
money by banks, which is not done
banks, which done at night.
night.
Night assault
Night assault is usually
usually the most advantageous
advantageous for the guerrilla.
guerrilla. The ideal is for all assaults
assaults to
take place
take place at night,
night, when
when conditions
conditions for a surprise
surprise attack are most favorable
favorable and the darkness
darkness
facilitates
facilitates escape
escape and hides
hides the identity
identity of the participants.
participants. The urban
urban guerrilla must prepare
guerrilla must prepare
himself,
himself, nevertheless, under all conditions,
nevertheless, to act under conditions, daytime
daytime as well
well as night.
night.
The most vulnerable
vulnerable targets
targets for assaults
assaults are the following:
following:
1)
1) Credit
Credit establishments
establishments
2) Commercial
Commercial and industrial
industrial enterprises,
enterprises, including plants for the manufacture
including plants manufacture of of weapons
weapons and
explosives
explosives
3) Military
Military establishments
establishments
4) Commissaries
Commissaries and policepolice stations
stations
5) Jails
6) Government
Government property
property
7) Mass
Mass communications
communications media
8) North
North American
American firms
firms and properties
properties
9) Government
Government vehicles,
vehicles, including
including military
military and police
police vehicles,
vehicles, trucks,
trucks, armored vehicles, money
armored vehicles, money
carriers,
carriers, trains,
trains, ships, and airplanes.
airplanes. The assaults
assaults on businesses
businesses use the same tactics,
tactics, because
because in
every
every case the buildings
buildings represent fixed target.
represent a fixed target. Assaults
Assaults on buildings
buildings are planned
planned as guerrilla
guerrilla
operations,
operations, varied
varied according
according to whether
whether they are against
against banks,
banks, a commercial
commercial enterprise,
enterprise,
industries,
industries, military
military bases,
bases, commissaries, prisons, radio
commissaries, prisons, radio stations, warehouses for foreign
stations, warehouses foreign firms,
firms,
etc. The assault
assault on vehiclesimoney-carriers,
vehicles—money-carriers, armoredarmored vehicles, trains, ships, airplanes—are
vehicles, trains, airplanesiareof
another
another nature,
nature, since they are moving targets. The nature
moving targets. nature of the operation
operation varies
varies according
according to the
situation circumstancesithat is, whether
situation and the circumstances—that whether the vehicle
vehicle is stationary
stationary or moving.
moving. Armored
Armored
cars,
cars, including
including military vehicles, are not immune
military vehicles, immune to mines.
mines. Roadblocks, traps, ruses,
Roadblocks, traps, ruses, interception
interception
by other vehicles,
vehicles, Molotov
Molotov cocktails,
cocktails, shooting
shooting with heavy efficient methods
weapons, are efficient
heavy weapons, methods of
assaulting
assaulting vehicles. Heavy vehicles,
vehicles. Heavy vehicles, grounded
grounded airplanes
airplanes and anchored
anchored ships can be seized,
seized, and
their
their crews and guards
guards overcome. Airplanes in flight
overcome. Airplanes flight can be hijacked
hijacked by guerrilla
guerrilla action or by
one person.
person. Ships and trains
trains in motion
motion can be assaulted
assaulted or captured
captured by guerrilla
guerrilla operations
operations in
order to obtain
obtain weapons
weapons and ammunition
ammunition or to prevent troop movements.
prevent troop movements.

19) THE BANKBANK ASSAULT


ASSAULT AS POPULAR MISSION
The most popular
popular mission
mission is the bank assault.
assault. In Brazil,
Brazil, the urban
urban guerrillas
guerrillas have begun
begun a type of
organized
organized assault
assault on the banks
banks as a guerrilla
guerrilla operation.
operation. Today,
Today, this type
type of assault
assault is widely
widely used,
used,
and has served as a sort of of preliminary
preliminary test for the urban
urban guerrilla
guerrilla in his training tactics of
training in the tactics
urban guerrilla
urban guerrilla warfare.
warfare. Important
Important innovations
innovations in the tactics
tactics of assaulting
assaulting banks
banks have developed,
developed,
guaranteeing
guaranteeing escape,
escape, the withdrawal
withdrawal of money,
money, and the anonymity
anonymity of those
those involved.
involved. Among
Among
these innovations,
these innovations, we cite the shooting
shooting of tires
tires of cars to prevent pursuit, locking
prevent pursuit, locking people
people in the
bank bathroom,
bathroom, making them sit on the floor,
making them immobilizing the bank
floor, immobilizing bank guards taking their
guards and taking their
weapons, forcing
weapons, forcing someone
someone to openopen the safe or the strong
strong box, and using
using disguises.
disguises. Attempts
Attempts to
install bank
install bank alarms,
alarms, to use guards
guards or electronic
electronic detection
detection devices fruitless when
prove fruitless
devices prove when the assault
assault
is political
political and is carried
carried out according
according to urban
urban guerrilla
guerrilla warfare techniques. This guerrilla
warfare techniques. guerrilla
method
method uses new new techniques
techniques to meet the enemy's tactical changes,
enemy's tactical changes, has access
access to firepower
firepower that is
growing
growing every
every day, becomes
becomes increasingly
increasingly more experienced
experienced and more confident,
confident, and usesuses a
larger number of guerrillas
larger number guerrillas every time; all to guarantee
every time; guarantee the success of operations planned down
operations planned down
to the last detail.
detail. The bank assault
assault is a typical
typical expropriation.
expropriation. But, as is true with any any kind
kind of
armed
armed expropriator
expropriator action,
action, the guerrilla
guerrilla is handicapped
handicapped by a two-fold
two-fold competition:
competition:
1)
1) competition
competition from the outlaw
outlaw
2) competition
competition from the right-wing
right-wing counter-revolutionary
counter-revolutionary

This competition
competition produces
produces confusion,
confusion, which reflected in the people's
which is reflected people's uncertainty.
uncertainty. It is up
up to the
urban guerrilla
urban guerrilla to prevent
prevent this from happening,
happening, and to accomplish
accomplish this he must use two methods:
methods:
1)
1) He must avoid the outlaw's
outlaw's technique,
technique, which
which is one of unnecessary
unnecessary violence
violence and the
expropriation
expropriation of goods
goods and possessions
possessions belonging
belonging to the people.
people.
2) He must
must use the assault
assault for propaganda
propaganda purposes
purposes at the very
very moment
moment it is taking
taking place,
place, and
later distribute
distribute material,
material, leaflets—every
leafletsieverypossible
possible means
means of explaining
explaining the objectives
objectives and the
principles of the urban
principles of urban guerrillas,
guerrillas, as expropriator
expropriator
of the government
government and the ruling
ruling elite.

20) RAIDS ANDAND PENETRATIONS


Raids penetrations are rapid
Raids and penetrations rapid attacks
attacks on establishments
establishments located neighborhoods, or even in
located in neighborhoods,
the center
center of the city, such as small military units, commissaries,
military units, commissaries, hospitals,
hospitals, to cause trouble, seize
cause trouble,
weapons, punish
weapons, punish and terrorize
terrorize the enemy,
enemy, take reprisals, rescue wounded
reprisals, or to rescue wounded prisoners
prisoners or those
those
hospitalized under
hospitalized under police
police guard.
guard. Raids
Raids and penetrations
penetrations are also made on garages
garages and depots
depots to
destroy
destroy vehicles
vehicles and damage
damage installations,
installations, especially
especially if they
they are North
North American firms and
American firms
property. When
property. they take
When they take place
place on certain
certain stretches
stretches of highway
highway or in certain
certain distant
distant
neighborhoods, these
neighborhoods, raids can serve to force the enemy
these raids enemy to move great numbers
numbers of troops,
troops, a
totally useless
totally useless effort since when
when they get there they will
get there
find nobody
find nobody to fight.
fight. When they are carried
When they carried out on certain
certain houses,
houses, offices,
offices, archives
archives or public
public
offices, their purpose
offices, their purpose is to capture
capture or search for secret papers
papers and documents with which
documents with which to
denounce
denounce deals,
deals, compromises
compromises and the corruption government, their
corruption of men in government, their dirty deals and
criminal
criminal transactions.
transactions. Raids
Raids and penetrations
penetrations are most effective
effective if they are carried
carried out at night.
night.

21) OCCUPATIONS
Occupations
Occupations are a type of attack carried
carried out when
when the urban
urban guerrilla
guerrilla stations himselfin specific
stations himself specific
establishments
establishments and locations,
locations, for a temporary
temporary action against
against the enemy
enemy or for some propaganda
propaganda
purpose. The occupation
purpose. occupation ofof factories
factories and schools
schools during
during strikes, or at other times,
times, is a method
method of
protest or of distracting
protest distracting the enemy's
enemy's attention.
attention. The occupation
occupation of radio
radio stations
stations is for propaganda
propaganda
purposes. Occupation
purposes. Occupation is a highly
highly effective
effective model
model for action
action but, in order to prevent
prevent
losses
losses and material
material damage
damage to our forces,
forces, it is always
always a good idea to plan on the possibility
possibility of a
forced withdrawal. It must always
forced withdrawal. always be meticulously planned and carried
meticulously planned carried out at the opportune
opportune
moment.
moment. Occupations
Occupations always
always have a time
time limit, and the swifter they
they are completed,
completed, the better.
better.

22) AMBUSH
AMBUSH
Ambushes are attacks,
Ambushes attacks, typified
typified by surprise, when the enemy
surprise, when road or when
trapped on the road
enemy is trapped when he
makes a police
makes police net surrounding
surrounding a house or estate.
estate. A false alarm
alarm can bring
bring the enemy
enemy the spot,
to
where he falls into a trap.
where trap. The principle
principle object of the ambush
ambush is to capture
capture enemy
enemy weapons
weapons and to
punish him with
punish with death. Ambushes to halt passenger
death. Ambushes passenger trains
trains are for propaganda
propaganda purposes,
purposes, and,
when they are troop
when trains, the object
troop trains, object is to annihilate
annihilate the enemy
enemy and seize his weapons.
weapons. The
urban guerrilla sniper is the kind
urban guerrilla kind of fighter
fighter especially
especially suited for ambush,
ambush, because
because he can hide
easily
easily in the irregularities
irregularities of the terrain,
terrain, on the roofs
roofs and the tops ofof buildings
buildings and apartments
apartments
under
under construction.
construction. From
From windows
windows and dark places,
places, he can take careful
careful aim at his chosen target.
chosen target.
Ambush has devastating
Ambush devastating effects
effects on the enemy,
enemy, leaving
leaving him unnerved,
unnerved, insecure
insecure and fearful.
fearful.

23) STREET TACTICS


Street tactics used to fight
tactics are used fight the enemy
enemy in the streets, utilizing
utilizing the participation
participation of the
population against
population against him. In 1968, Brazilian students
1968, the Brazilian used excellent
students used excellent street tactics
tactics against police
against police
troops, such as marching
troops, marching down streets against traffic and using
against traffic using slingshots
slingshots and marbles
marbles against
against
mounted police. Other
mounted police. Other street tactics
tactics consist
consist of constructing
constructing barricades; pulling up
barricades; pulling up paving
paving blocks
blocks
and hurling
hurling them
them at the police;
police; throwing
throwing bottles,
bottles, bricks,
bricks, paperweights
paperweights and otherother projectiles
projectiles at the
police from the top
police top of office
office and apartment buildings; using
apartment buildings; using buildings
buildings and other structures
structures for
escape,
escape, for hiding
hiding and for supporting
supporting surprise
surprise attacks.
attacks. It is equally
equally necessary
necessary to know
know how to
respond to enemy
respond enemy tactics.
tactics. When police troops
When the police troops come wearing helmets
come wearing helmets to protect
protect them
them against
against
flying
flying objects,
objects, we have to divide ourselves into two teamswne
divide ourselves teams—one to attack
attack the enemy
enemy from the
front, the other to attack him in the reariwithdrawing
rear—withdrawing one as the other goes goes into action
action to
prevent first from being struck by projectiles
prevent the first projectiles hurled
hurled by the second.
second. By the same token, token, it is
important know how to respond
important to know police net. When
respond to the police police designate
When the police certain of their
designate certain
men to go
men go into the crowd
crowd and arrest a demonstrator,
demonstrator, a larger group group ofof urban
urban guerrillas
guerrillas must
surround
surround the police
police group,
group, disarming
disarming and beating them and at the same time
beating them time allowing
allowing the
prisoner to escape.
prisoner escape. This urban
urban guerrilla
guerrilla operation
operation is called
called "the net within
within a net".
net". When
When the
police net is formed
police formed at a school building,
building, a factory,
factory, a place
place where
where demonstrators
demonstrators gather,
gather, or some
other point,
point, the urban
urban guerrilla
guerrilla must not give up up or allow himself to be taken
allow himself taken by surprise.
surprise. To
make his net effective,
effective, the enemy
enemy is obliged
obliged to transport
transport his troops
troops in vehicles
vehicles and special
special cars to
occupy
occupy strategic points in the streets, in order to invade
strategic points invade the building
building or chosen locale. The urban
chosen locale. urban
guerrilla, part, must never
guerrilla, for his part, never clear a building
building or an area and meet in it without first knowing
without first knowing
its exits, the way
way to break
break an encirclement,
encirclement, the strategic points that the police
strategic points police must occupy,
occupy, and
roads that inevitably
the roads inevitably lead into the net, and he must hold other strategic points from which
strategic points which to
strike at the enemy.
enemy. The roads
roads followed
followed by police
police vehicles
vehicles must be minedmined at key points
points along the
way and at forced
way forced roadblocks.
roadblocks. When
When the mines
mines explode,
explode, the vehicles will be knocked
vehicles will knocked into the air.
The police
police will be caught
caught in the trap
trap and will
will suffer losses
losses and be victims
victims of an ambush.
ambush. The net
must be broken
broken by escape routes which
escape routes which are unknown
unknown to the police.police. The rigorous
rigorous planning
planning of a
withdrawal is the best way
withdrawal fiustrate any
way to frustrate any encircling
encircling effort on the part of the enemy. enemy. When there
When there
is no possibility
possibility of an escape plan, the urban
escape plan, urban guerrilla
guerrilla must not hold hold meetings,
meetings, gatherings
gatherings or do
anything,
anything, since to do so will prevent
prevent him from breaking
breaking through
through the net whichwhich the enemy
enemy will
surely try
try to throw
throw around tactics have revealed
around him. Street tactics revealed a new type type of urban guerrilla who
urban guerrilla
participates in mass
participates protests. This is the type we designate
mass protests. designate as the "urban guerrilla
guerrilla demonstrator",
demonstrator",
who joins the crowds
who crowds and participates
participates in marches
marches with specific
specific and definite
definite aims in mind.mind. The
urban guerrilla
urban guerrilla demonstrator
demonstrator must initiate
initiate the "net within
within the net",
net", ransacking
ransacking government
government
vehicles,
vehicles, official
official cars and police
police vehicles
vehicles before turning them
before turning them over or setting fire fire to them,
them, to see
if any
any of them money or weapons.
them have money weapons.

Snipers are very


very good
good for mass demonstrations, and along with the urban
urban guerrilla
demonstrator can play a valuable role. Hidden at strategic points, the snipers have
demonstrator
complete success
success using shotguns or submachine guns,
guns, which can easily
easily cause losses
losses among
among
the enemy.
enemy.

24) STRIKES AND AND WORK INTERRUPTIONS


INTERRUPTION S
The strike is a model
model of action
action employed
employed by the urban guerrilla in work
urban guerrilla work centers
centers and schools
schools to
damage
damage the enemy
enemy by stopping work and study activities.
stopping work activities. Because
Because it is one of the weapons
weapons most
feared
feared by the exploiters
exploiters and oppressors,
oppressors, the enemy uses tremendous
enemy uses tremendous firepower
firepowerand incredible
incredible
violence
violence against
against it. strikers are taken
it. The strikers taken to prison,
prison, suffer beatings,
beatings, and many them wind
many of them wind up
up
killed. The urban
killed. urban guerrilla
guerrilla must prepare way as to leave no track
prepare the strike in such a way track or clue that
that
can identify
identify the leaders
leaders of such an action.
action. A strike is successful
successful when
when it is organized
organized by a small
group,
group, if it is carefully prepared in secret using
carefully prepared using the most clandestine
clandestine methods.
methods. Weapons,
Weapons,
ammunition,
ammunition, Molotov
Molotov cocktails,
cocktails, homemade
homemade weapons
weapons of destruction
destruction and attack,
attack, all of these
these must
be supplied
supplied beforehand
beforehand in order to meet the enemy.
enemy. So that the action
action can do the greatest
greatest
possible amount
possible amount of damage, idea to study and put into effect
damage, it is a good idea effect a sabotage
sabotage plan.
plan. Strikes
Strikes
and study interruptions,
interruptions, although
although they brief duration,
they are of brief duration, cause
cause severe
severe damage
damage to the enemy.
enemy. It
is enough
enough for them
them to crop up at different
crop up different locations
locations and in differing
differing sections
sections of the same area,
area,
disrupting
disrupting daily life, occurring
occurring endlessly,
endlessly, one after the other, in true guerrilla
guerrilla fashion.
fashion. In strikes
strikes
or in simple work interruptions,
interruptions, the urban guerrilla
guerrilla has recourse
recourse to the occupation
occupation or penetration
penetration
of the site, or he can simply make a raid.
raid. In that case,
case, his objective
objective is to take captives,
captives, to capture
capture
prisoners, or to capture
prisoners, capture enemy
enemy agents
agents and propose
propose an exchange
exchange for arrested
arrested strikers.
strikers. In certain
certain
cases, briefwork
cases, strikes and brief work interruptions
interruptions can offer an excellent
excellent opportunity
opportunity for preparing
preparing
ambushes
ambushes or traps,
traps, whose
whose aim is the physical
physical destruction
destruction of the police.
police. The basic
basic fact is that the
enemy
enemy suffers losses as well
well as material
material and moral
moral damage
damage and is weakened
weakened by the action.
action.

25) DESERTIONS, DIVERSIONS,


DIVERSIONS, SEIZURES, EXPROPRIATION OF
AMMUNITION AND AND EXPLOSIVES
Desertion
Desertion and the diversion
diversion of weapons
weapons are actions
actions carried
carried out in military
military bases, ships, military
military
hospitals,
hospitals, etc. The urban
urban guerrilla
guerrilla soldier officer must desert at the most opportune
soldier or officer moment
opportune moment
with modern
with weapons and ammunition,
modern weapons ammunition, to hand them them over to the guerrillas.
guerrillas. One of the most
opportune
opportune moments
moments is when
when the urban
urban guerrilla
guerrilla soldier
soldier is called
called upon
upon to pursue
pursue his guerrilla
guerrilla
comrades
comrades outside
outside the military base. Instead
military base. Instead of following
following the orders
orders of the "gorillas",
"gorillas", the military
military
urban guerrilla
urban guerrilla must join the ranks
ranks of the revolutionaries
revolutionaries by handing
handing over the weapons
weapons and
ammunition
ammunition he carries,
carries, or the military
military vehicle
vehicle he operates.
operates. The advantage
advantage of this method
method is that
rebels receive
the rebels receive weapons
weapons and ammunition
ammunition from the Army,
Army, Navy,
Navy, Air Force,
Force, Military
Military Police,
Police,
Civilian
Civilian Guard or the Police
Police without
without any
any great work, reaches their hands by government
work, since it reaches government
transportation. Other opportunities
transportation. opportunities maymay occur
occur in the barracks,
barracks, and the military urban guerrilla
military urban guerrilla
must always
must always be alert to this. In case of carelessness
carelessness on the part of of commanders
commanders or in other
favorable conditionsisuch as bureaucratic
favorable conditions—such bureaucratic attitudes
attitudes or the relaxation
relaxation ofof discipline
discipline on the part of
part of
lieutenants
lieutenants or other internal personnel—the military
internal personnelithe urban guerrilla
military urban longer wait but must
guerrilla must no longer
try to inform
try inform the guerrillas
guerrillas and desert with as large a supply of weapons
desert with weapons as possible.
possible. When there
there
is no possibility
possibility of deserting
deserting with weapons
weapons and ammunition,
ammunition, the military urban guerrilla
military urban guerrilla must
engage
engage in sabotage,
sabotage, starting fires and explosions
starting fires explosions in munitions
munitions dumps.
dumps. This technique
technique of deserting
deserting
with weapons
weapons and of raiding
raiding and sabotaging
sabotaging the military
military centers
centers is the best way
way of wearing
wearing out
and demoralizing
demoralizing the enemy
enemy and leaving
leaving them confused.
confused. The urbanurban guerrilla's
guerrilla's purpose
purpose in
disarming
disarming an individual
individual enemy
enemy is to capture
capture his weapons.
weapons. These weapons
weapons are usually
usually in the
hands
hands of of sentinels
sentinels or others whose task is guard duty. The capture
others whose capture ofof weapons
weapons maymay be
accomplished
accomplished by violent
violent means
means or by cleverness
cleverness and tricks
tricks or traps.
traps. When the enemy
enemy is
disarmed,
disarmed, he must be searched weapons other
searched for weapons other than those
those already fiom him. If we are
taken from
already taken
careless,
careless, he can use the weapons
weapons that werewere not seized to shoot the urban guerrilla.
guerrilla. The seizure of
seizure of
weapons efficient method
weapons is an efficient method of acquiring
acquiring submachine
submachine guns,guns, the urban
urban guerrilla's most
guerrilla's most
important weapon. When
important weapon. When we carry
carry out small operations
operations or actions
actions to seize weapons
weapons and
ammunition,
ammunition, the material
material captured
captured may
may be for personal
personal use or for armaments
armaments and supplies
supplies for the
firing teams. The necessity
firing teams. necessity to provide
provide firepower
firepower for the urbanurban guerrillas
guerrillas is so great that, in order
great that,
to take off from the zero point,
point, we often have to purchase
purchase one weapon,
weapon, divert
divert or capture
capture a single
gun.
gun. The basic point
point is to begin,
begin, and to begin with
with a spirit of decisiveness
decisiveness and boldness.
boldness. The
possession of a single submachine
possession submachine gun gun multiplies
multiplies our forces.
forces. In a bank assault,
assault, we must be
careful
careful to seize the weapons
weapons of the bank guard.
guard. The rest of the weapons
weapons will be found with
with the
treasurer, the bank
treasurer, bank tellers
tellers or the manager,
manager, and must also be seized. Quite often, we succeed
succeed in
capturing weapons in police
capturing weapons stations, as a result
police stations, result of raids.
raids. The capture
capture of weapons,
weapons, ammunition
ammunition
and explosives
explosives is the urban
urban guerrilla's
guerrilla's goal in assaulting
assaulting commercial
commercial businesses,
businesses, industries
industries and
quarries.
quarries.

26) LIBERATION OF PRISONERS


The liberation
liberation of prisoners
prisoners is an armed
armed action
action designed urban guerrillas.
designed to free jailed urban guerrillas. In daily
struggle
struggle against
against the enemy,
enemy, the urban
urban guerrilla
guerrilla is subject to arrest,
arrest, and can be sentenced
sentenced to
unlimited
unlimited years
years in jail. mean that the battle ends here. For the guerrilla,
jail. This does not mean guerrilla, his
experience
experience is deepened
deepened by prison,
prison, and struggle
struggle continues
continues even in the dungeons where he is held.
dungeons where
The imprisoned
imprisoned guerrilla
guerrilla views the prisons
prisons of the enemy
enemy as a terrain
terrain which
which he must
must dominate
dominate and
understand himself by a guerrilla
understand in order to free himself guerrilla operation.
operation. There is no jail, either on an island,
island,
in a city penitentiary,
penitentiary, or on a farm,
farm, that is impregnable
impregnable to the slyness,
slyness, cleverness
cleverness and firepower
firepower
of the rebels.
of rebels. The urban guerrilla who is free views
urban guerrilla views the jails of the enemy
enemy as the inevitable of
inevitable site of
guerrilla
guerrilla actions
actions designed
designed to liberate
liberate his ideological
ideological comrades
comrades from prison.
prison. It is this combination
combination
of the urban
urban guerrilla
guerrilla in freedom urban guerrilla
freedom and the urban guerrilla in jail that results
results in the armed
armed
operations refer to as "liberation
operations we refer "liberation of prisoners".
prisoners".

The guerrilla
guerrilla operations used in liberating
operations that can be used prisoners are the following;
liberating prisoners following;
1)
1) Riots
Riots in penal
penal establishments,
establishments, in correctional
correctional colonies
colonies or camps,
camps, or on transport
transport or prison
prison
ships;
2) Assaults
Assaults on urban
urban or rural
rural prisons,
prisons, detention
detention centers, prison camps,
centers, prison camps, or any permanent or
any other permanent
temporary place
temporary place where
where prisoners
prisoners are held;
3) Assaults
Assaults on prisoner transport trains
prisoner transport trains or convoys;
convoys;
4) Raids penetrations of prisons;
Raids and penetrations prisons;
5) Ambushing
Ambushing of of guards who move prisoners.
guards who prisoners.

27) EXECUTIONS
Execution
Execution is the killing
killing of a foreign
foreign spy,
spy, of an agent of the dictatorship,
dictatorship, of a police
police torturer,
torturer, of a
dictatorial
dictatorial personality
personality in the government
government involved
involved in crimes
crimes and persecutions
persecutions against patriots, of
against patriots,
a stool pigeon,
pigeon, informer,
informer, police
police agent or police
police provocateur.
provocateur. Those
Those who go go to the police their
police of their
own free will
will to make denunciations
denunciations and accusations,
accusations, who supply information
information and who finger
finger
people, must be executed
people, executed when
when they are caught
caught by the urban
urban guerrillas.
guerrillas. Execution
Execution is a secret
action, which the least possible
action, in which number of
possible number of urban
urban guerrillas
guerrillas are involved.
involved. In many
many cases,
cases, the
execution
execution can be carried
carried out by a single sniper,
sniper, patient,
patient, alone and unknown,
unknown, and operating
operating in
absolute
absolute secrecy
secrecy and in cold blood.
blood.

28) KIDNAPPING
Kidnapping
Kidnapping is capturing
capturing and holding
holding in a secret place
place a spy,
spy, political personality or a notorious
political personality notorious
and dangerous
dangerous enemy
enemy of the revolutionary
revolutionary movement.
movement. Kidnapping used to exchange
Kidnapping is used exchange or liberate
liberate
imprisoned
imprisoned revolutionaries
revolutionaries or to force the
suspension of torture
suspension of torture in jail by the military
military dictatorship.
dictatorship. The kidnapping
kidnapping of personalities
personalities who are
well-known artists,
well-known figures or who are outstanding
artists, sports figures outstanding in some other field,
field, but who
who have
evidenced
evidenced no political
political interest,
interest, can be a useful
useful form of propaganda
propaganda for the guerrillas,
guerrillas, provided
provided it
occurs under
occurs under special
special circumstances,
circumstances, and is handled
handled so the public
public understands
understands and sympathizes
sympathizes
with it.
with it. The kidnappings
kidnappings of of foreigners
foreigners or visitors
visitors constitutes
constitutes a form of protest
protest against
against the
penetration and domination
penetration domination of imperialism
imperialism in our country.
country.

SABOTAGE
29) SABOTAGE
Sabotage
Sabotage is a highly
highly destructive
destructive type of attack
attack using
using very persons—and sometimes
very few personsiand sometimes requiring
requiring
oneito
only one—to accomplish
accomplish the desired
desired result.
result. When
When the urban
urban guerrilla
guerrilla uses sabotage,
sabotage, first step
the first step
is isolated
isolated sabotage.
sabotage. Then comes
comes the step of dispersed
dispersed and general
general sabotage,
sabotage, carried
carried out by the
population. Well-executed
population. Well-executed sabotage
sabotage demands
demands study, planning
planning and careful
careful action.
action. A characteristic
characteristic
form of sabotage
sabotage is explosion, using dynamite,
explosion, using dynamite, fire
fire or the placing
placing of mines.
mines. A little sand, a trickle
trickle
any kind of combustible,
of any combustible, a poor
poor lubrication
lubrication job, a screw removed,
removed, a short circuit,
circuit, inserted
inserted
pieces of wood
pieces wood or iron, can cause
cause irreparable
irreparable damage.
damage. The objective
objective of sabotage
sabotage is to hurt, to
damage,
damage, to make useless
useless and to destroy
destroy vital enemy points such as the following:
enemy points following:
1)
1) the economy
economy of of the country
country
2) agricultural
agricultural or industrial
industrial production
production
3) transport
transport and communication
communication systems
systems
4) military
military and police systems and their
police systems their establishments
establishments and depots
depots
5) the repressive
repressive military-police
military-police system
system
firms and properties
6) the firms properties of exploiters
exploiters in the country
country

The urban
urban guerrilla
guerrilla should
should endanger
endanger the economy
economy of the country, particularly its economic
country, particularly economic and
financial aspects,
financial aspects, such as its domestic
domestic and foreign
foreign banking network, its exchange
banking network, exchange and credit
systems,
systems, its tax collection
collection system,
system, etc. Public
Public offices,
offices, centers
centers of government
government and government
government
depots
depots are easy targets for sabotage.
easy targets sabotage. Nor will it be easy easy to prevent
prevent the sabotage
sabotage of agricultural
agricultural
and industrial production27 by the urban
industrial production27 urban guerrilla, with his thorough
guerrilla, with thorough knowledge
knowledge of the local
situation.
situation. Factory
Factory workers
workers acting
acting as urban
urban guerrillas
guerrillas are excellent
excellent industrial
industrial saboteurs,
saboteurs, since they,
they,
better than anyone,
better than anyone, understand
understand the industry,
industry, the factory,
factory, the machinery
machinery or the part part most likely to
destroy
destroy an entire operation,
operation, doing much more damage damage than a poorly-informed
poorly-informed laymanlayman could
could do.
27 Do not emulate
emulate needless
needless destruction
destruction of private property. A factory
private property. factory is just a building.
building. A factory
factory
owner,
owner, however,
however, is an individual,
individual, whowho may
may be held liable
liable to any
any crimes which he has committed
crimes which committed
of the Zionist
in service of Zionist menace.
menace. Sabotage
Sabotage is only a valid tactic tactic against
against factories of the enemy.
factories of enemy.
Choose
Choose your
your targets wisely with respect
targets wisely respect to the enemy's transport and communications
enemy's transport communications systems,
systems,
beginning with railway
beginning with traffic, it is necessary
railway traffic, attack them
necessary to attack them systematically
systematically with sabotage.
sabotage. The
only caution
caution is against
against causing
causing death and injury
injury to passengers,
passengers, especially
especially regular
regular commuters
commuters on
suburban
suburban and long-distance
long-distance trains. Attacks on freight
trains. Attacks freight trains,
trains, rolling
rolling or stationary
stationary stock, stoppage
stoppage
of military
military transports
transports and communications
communications systems, these are the major objectives
systems, these objectives in this area.
Sleepers
Sleepers can be damaged
damaged and pulled
pulled up,
up, as can rails.
rails. A tunnel
tunnel blocked
blocked by a barrier
barrier of explosives,
explosives,
or an obstruction
obstruction caused
caused by a derailed
derailed car,
car, causes
causes enormous
enormous harm. The derailment
derailment of a train
carrying
carrying fuel is of major damage
damage to the enemy.
enemy. So is dynamiting
dynamiting a railroad
railroad bridge.
bridge. In a system
system
where the size and weight
where weight of the rolling
rolling equipment
equipment is enormous,
enormous, it takes
takes months
months for workers
workers to
repair or rebuild
repair rebuild the destruction
destruction and damage.
damage. As for highways,
highways, they they can be obstructed with trees,
obstructed with trees,
stationary
stationary vehicles,
vehicles, ditches,
ditches, dislocation
dislocation of barriers
barriers by dynamite,
dynamite, and bridges
bridges destroyed
destroyed by
explosions.
explosions. Ships can be damaged
damaged at anchor
anchor in seaports
seaports or riverports,
riverports, or in the shipyards. Aircraft
shipyards. Aircraft
can be destroyed
destroyed or damaged
damaged on the ground.
ground. Telephone
Telephone and telegraph
telegraph lines can be systematically
systematically
damaged, their
damaged, their towers
towers blown up, and their lines made
blown up, made useless.
useless. Transport
Transport and communications
communications
must be sabotaged
sabotaged immediately
immediately because revolutionary movement
because the revolutionary movement has already
already begun
begun in
Brazil,
Brazil, and it is essential
essential to impede
impede the enemy's
enemy's movement
movement of troops
troops and munitions.
munitions. Oil lines,
fuel plants,
plants, depots
depots for bombs
bombs and ammunition
ammunition arsenals,
arsenals, military
military camps
camps and bases must become
become
targets for sabotage
targets sabotage operations,
operations, while
while vehicles,
vehicles, army trucks and other military
army trucks military or police
police vehicles
vehicles
must be destroyed
destroyed wherever
wherever they are found.
found. The military
military and police
police repression centers and their
repression centers their
specialized
specialized organs
organs must also claim the attention
attention of the guerrilla
guerrilla saboteur.
saboteur. Foreign firms and
Foreign firms
properties in the country,
properties part, must become
country, for their part, become such frequent
frequent targets
targets of sabotage
sabotage that the
volume
volume of actions
actions directed
directed against
against them
them surpasses
surpasses the total of all other actions
actions against
against enemy
enemy
vital points.
points.

30) TERRORISM
Terrorism
Terrorism is an action,
action, usually
usually involving placement of an explosive
involving the placement explosive or firebomb
firebomb of great
destructive
destructive power,
power, which
which is capable
capable of effecting
effecting irreparable
irreparable loss against
against the enemy.
enemy. Terrorism
Terrorism
requires that the urban
requires urban guerrilla
guerrilla should
should have adequate
adequate theoretical
theoretical and practical
practical knowledge
knowledge of
how to make
make explosives.
explosives. The terrorist
terrorist act, apart from the apparent
apparent ease with
with which
which it can be
carried
carried out, is no different
different from other guerrilla
guerrilla acts and actions
actions whose
whose success
success depends
depends on
planning and determination.
planning determination. It is an action which the urban
action which urban guerrilla
guerrilla must execute with the
execute with
greatest
greatest calmness
calmness and determination. Although terrorism
determination. Although terrorism generally
generally involves
involves an explosion, there
explosion, there
are cases in which
which it may
may be carried
carried out through
through executions
executions or the systematic
systematic burning
burning of
installations, properties, plantations,
installations, properties, plantations, etc. It is essential
essential to point
point out the importance fires and the
importance of fires
construction
construction of incendiary
incendiary devices
devices such as gasoline
gasoline bombs
bombs in the technique
technique of guerrilla terrorism.
guerrilla terrorism.
Another thing
Another thing is the importance
importance of the material
material the urban guerrilla
guerrilla can persuade people to
persuade the people
expropriate
expropriate in the moments
moments of hunger
hunger and scarcity
scarcity brought
brought about by the greed
greed of the big
commercial
commercial interests28.
interests28. Terrorism
Terrorism is a weapon
weapon the revolutionary
revolutionary can never
never relinquish.
relinquish.

31) ARMED PROPAGANDA


PROPAGANDA
The coordination
coordination ofof urban
urban guerrilla
guerrilla activities,
activities, including
including each armed
armed action,
action, is the primary
primary wayway of
making
making armed
armed propaganda.
propaganda. These
These actions
actions carried
carried out with specific
specific objectives
objectives and aims in mind,
mind,
inevitably
inevitably become propaganda material
become propaganda material for the mass communication
communication system. robberies,
system. Bank robberies,
ambushes,
ambushes, desertions
desertions and the diverting
diverting of weapons,
weapons, the rescue
rescue of prisoners,
prisoners, executions,
executions,
kidnappings, sabotage,
kidnappings, sabotage, terrorism
terrorism and the war of nerves
nerves are all cases in point.
point. Airplanes
Airplanes diverted
diverted
in flight
flight by guerrilla
guerrilla action,
action, ships and trains
trains assaulted
assaulted and seized by armed
armed guerrillas,
guerrillas, can also be
carried propaganda effect. But the urban
carried out solely for propaganda urban guerrilla
guerrilla must never
never fail to install
install a
clandestine
clandestine press
press and must be able to turnturn out mimeographed
mimeographed copies using alcohol
copies using alcohol or electric
electric
plates and other duplicating
plates duplicating apparatus,
apparatus, expropriating what he cannot
expropriating what cannot buy in order to produce
produce
small clandestine
clandestine newspapers,
newspapers, pamphlets,
pamphlets, flyers
flyers and stamps for propaganda
propaganda and agitation
agitation against
against
the dictatorship.
dictatorship. The urban
urban guerrilla
guerrilla engaged
engaged in clandestine printing facilitates
clandestine printing facilitates enormously
enormously the
incorporation
incorporation of large numbers
numbers of people
people into the struggle,
struggle, by opening permanent work
opening a permanent work front
for those
those willing
willing to carry
carry on propaganda,
propaganda, even when
when to do so means
means to act alone and risk their
lives. With the existence
existence of clandestine propaganda and agitational
clandestine propaganda agitational material,
material, the inventive
inventive spirit
of the urban
of urban guerrilla
guerrilla expands
expands and creates
creates catapults,
catapults, artifacts, mortars and other instruments
artifacts, mortars instruments with
which
which to distribute
distribute the anti-government
anti-government propaganda
propaganda at a distance.
distance. Tape recordings,
recordings, the
occupation
occupation of radio
radio stations,
stations, the use of loudspeakers,
loudspeakers, graffiti
graffiti on walls
walls and other inaccessible
inaccessible
places are other forms
places forms of propaganda.
propaganda. A consistent propaganda by letters
consistent propaganda letters sent to specific
specific
addresses,
addresses, explaining
explaining the meaning
meaning of the urban
urban guerrilla's
guerrilla's armed
armed actions, produces considerable
actions, produces considerable
results and is one method
results method of influencing
influencing certain
certain segments
segments of
of the population.
population. Even this
influenceiexercised in the heart of the people
influence—exercised people by every
every possible propaganda device,
possible propaganda device, revolving
revolving
around
around the activity of the urban
activity of urban guerrilla—does
guerrillaidoesnot indicate that our forces
indicate that forces have everyone's
everyone‘s
support.
support. It is enough
enough to win the support
support of a portion
portion of the population,
population, and this can be done by
popularizing the motto,
popularizing motto, "Let he who does not wish to do anythinganything for the guerrillas
guerrillas do nothing
nothing
against
against them."
them."

32) THE WAR OF NERVES


The war of nerves
nerves or psychological warfare is an aggressive
psychological warfare technique, based
aggressive technique, based on the direct or
indirect
indirect use of mass media
media and rumors
rumors in order to demoralize
demoralize the government.
government. In psychological
psychological
warfare, the government
warfare, government is always
always at a disadvantage because it imposes
disadvantage because censorship on the media
imposes censorship media
and winds
winds up
up in a defensive position by not allowing
defensive position allowing anything
anything against filter through.
against it to filter through. At this
point, it becomes
point, becomes

28 Who the National


National Socialist recognizes are controlled
Socialist recognizes controlled by the Council
Council of 300 and the
International
International Jew, among
among other helper
helper golems.
golems. WE SHALL
SHALL SEVER
SEVER THE HEADHEAD OF THE
SNAKE!
SNAKE!

desperate,
desperate, is involved
involved in greater
greater contradictions
contradictions and loss of prestige,
prestige, and loses time and energy
energy in
an exhausting
exhausting effort at control which is liable to be broken
control which broken at any
any moment.
moment. The objective
objective of the
war of nerves
nerves is to mislead,
mislead, spreading
spreading lies among
among the authorities
authorities in which
which everyone
everyone can
participate, thus creating
participate, creating an atmosphere
atmosphere of nervousness,
nervousness, discredit,
discredit, insecurity, uncertainty and
insecurity, uncertainty
concern
concern on the part of the government used by urban
methods used
government 29. The best methods urban guerrillas
guerrillas in the war
of nerves
of nerves are the following:
following:
1)
1) Using
Using the telephone
telephone and the mail to announce
announce false clues to the police
police and government,
government,
including
including information
information on the planting
planting ofof bombs
bombs and anyany other act ofof terrorism
terrorism in public
public offices
offices
and other placesikidnapping
places—kidnapping and assassination
assassination plans. etcito
plans. etc.—to force the authorities
authorities to wear
wear
themselves out by following
themselves following up
up on the false information
information fed to them;
them;
2) Letting plans fall into the hands of the police
Letting false plans divert their
police to divert their attention;
attention;
3) Planting
Planting rumors
rumors to make the government
government uneasy;
uneasy;
4) Exploiting
Exploiting by every
every means
means possible
possible the corruption,
corruption, the mistakes
mistakes and the failures
failures of the
government
government and its representatives,
representatives, forcing
forcing them
them into demoralizing
demoralizing explanations
explanations and
justifications in the very
justifications communication media
very communication media they maintain under
they wish to maintain under censorship;
censorship;
5) Presenting
Presenting denunciations
denunciations to foreign
foreign embassies,
embassies, the United Nations, the papal
United Nations, papal enunciator,
enunciator, and
the international
international commissions
commissions defending
defending human
human rights
rights or freedom
freedom of the press,
press, exposing
exposing each
concrete
concrete violation
violation and each use of violence
violence by the military
military dictatorship
dictatorship and making
making it known
known that
revolutionary war will continue
the revolutionary with serious danger
continue with danger for the enemies
enemies of the population.
population.

33) HOW TO CARRY OUT THE ACTION


The urban
urban guerrilla who correctly
guerrilla who correctly carries
carries through
through his apprenticeship
apprenticeship and training
training must give the
greatest
greatest possible
possible importance
importance to his methodmethod of carrying
carrying out actions,
actions, for in this he cannot
cannot commit
commit
the slightest
slightest error.
error. Any carelessness
carelessness in learning tactics and their
learning tactics their use invites
invites certain
certain disaster,
disaster, as
experience
experience teaches
teaches us every
every day. Common
Common criminals
criminals commit
commit errors
errors frequently because of their
frequently because their
tactics, and this is one of the reasons
tactics, reasons why
why the urban
urban guerrillas
guerrillas must be so insistently
insistently preoccupied
preoccupied
with following
following revolutionary
revolutionary tactics, of bandits.
tactics of
tactics, and not the tactics And not only for that reason.
bandits. And reason.
There
There is no urban
urban guerrilla worthy of the name
guerrilla worthy name who ignores
ignores the revolutionary
revolutionary method
method of action
and fails to practice
practice it rigorously
rigorously in the planning
planning and execution
execution of his activities.
activities. 29 Note
Note here
again the indiscriminate terrorism of the evil lunatic
indiscriminate terrorism lunatic Jew-lover.
J ew-lover. All members
members of the government
government
are condemned,
condemned, even those those whowho were deceived.
deceived. The SS strives for justice and truth. truth. Do NOT
NOT
terrorize or attack without
terrorize without identifying
identifying the target!
target! "The giant is known
known by his toe."
toe." The same can
be said of the urban guerrilla, who is known
urban guerrilla, known from afar by his correct tactics and his absolute
correct tactics absolute
fidelity
fidelity to principle.
principle. The revolutionary
revolutionary method
method of carrying
carrying out actions
actions is strongly
strongly and forcefully
forcefully
based
based on the knowledge
knowledge and use of the followingfollowing elements;
elements;
1)
1) Investigation
Investigation and intelligence
intelligence gathering
gathering
2) Observation
Observation and vigilance
vigilance
3) Reconnaissance,
Reconnaissance, or exploration
exploration of the terrain
terrain
4) Study and timing
timing of routes
routes
5)
5) Mapping
Mapping
6) Mechanization
Mechanization
7) Careful
Careful selection
selection of personnel
personnel
8) Selection
Selection of firepower
firepower
9) Study and practice
practice in success
success
10)
10) Success
Success
11)
11) Use of cover
12)
12) Retreat
Retreat
13)
13) Dispersal
Dispersal
14)
14) The liberation
liberation or transfer
transfer of prisoners
prisoners
15)
15) The elimination
elimination of evidence
evidence
l6)
16) The rescue wounded
rescue of wounded

OBSERVATIONS ON
34) SOME OBSERVATIONS ON TACTICS
When there is no information,
When there point of departure
information, the point planning the action
departure for planning action must be
investigation,
investigation, observation
observation and vigilance.
vigilance. This method produces good results.
method produces results. In any
any event,
event, even
when there
when there is information,
information, it is essential
essential to make observations
observations to see that information
information is not at
with observation
odds with observation or vice versa. Reconnaissance
Reconnaissance or exploration
exploration of the terrain
terrain and the study
and timing
timing of routes
routes are so important
important that to omit them
them is to make a stab in the dark.
Mechanization,
Mechanization, in general,
general, is an underestimated
underestimated factor
factor in the tactics
tactics of conducting
conducting an action.
action.
Frequently,
Frequently, mechanization
mechanization is left to the end, on the eve of the action, before anything
action, before anything is done
about
about it.
it. This is a mistake.
mistake. Mechanization
Mechanization must be seriously
seriously considered.
considered. It must be undertaken
undertaken
with considerable
with considerable foresight
foresight and with careful
careful planning,
planning, based on careful
careful and precise
precise information.
information.
The care,
care, conservation,
conservation, maintenance
maintenance and camouflaging
camouflaging of of stolen vehicles
vehicles are very
very important
important
details of mechanization.
details of mechanization. When transportation
transportation fails, the primary
primary action fails, with serious
material and morale
material morale problems
problems for the urban
urban guerrillas.
guerrillas. The selection of personnel
selection of personnel requires
requires great
care in order to avoid
avoid the inclusion
inclusion ofof indecisive
indecisive or wavering
wavering persons
persons who
who present
present the danger
danger of
contaminating
contaminating others,
others, a danger
danger that must be avoided.
avoided. The withdrawal
withdrawal is equally
equally or more
important than the operation
important operation itself,
itself, to the point
point that it must be rigorously planned, including
rigorously planned, including the
possibility of defeat.
possibility defeat. One must avoid
avoid rescue
rescue or transfer prisoners with children
transfer of prisoners children present,
present, or
anything
anything to
attract
attract the attention
attention of people
people passing
passing through
through the area. The best thing
thing is to make the rescue
rescue
appear
appear as natural
natural as possible,
possible, winding through different
winding through different routes
routes or narrow
narrow streets that scarcely
scarcely
permit passage
permit passage on foot, in order
order to avoid an encounter
encounter between two cars. The elimination
between two elimination of
tracks is obligatory
tracks obligatory and demands
demands the greatest cautionialso in removing
greatest caution—also removing fingerprints
fingerprints and anyany
other sign that could give the enemy
enemy information.
information. Lack of care in the elimination
elimination of evidence
evidence is a
factor
factor that increases
increases nervousness
nervousness in our ranks,ranks, which
which the enemy
enemy often exploits.
exploits.

35) RESCUE OF THE WOUNDED WOUNDED


problem of the wounded
The problem wounded in urbanurban guerrilla warfare merits
guerrilla warfare merits special attention.
attention. During
During guerrilla
guerrilla
operations
operations in the urban
urban area, it
area, may may happen
happen that some comrade
comrade is wounded
wounded by the police.
police. When
When a
guerrilla
guerrilla in the firing
firing group
group has a knowledge first aid, he can do something
knowledge of first something for the wounded
wounded
comrade
comrade on the spot. Under Under no circumstances woundedguerrilla
circumstances should the wounded guerrilla be abandoned
abandoned at the
of the battle or left in the enemy's
site of enemy's hands.
hands. One of of the precautions
precautions we must take take is to set up
up
first-aid courses
first-aid courses for men and women,women, courses
courses in which
which guerrillas
guerrillas can learn the rudiments
rudiments of
emergency
emergency medicine.
medicine. The urban
urban guerrilla
guerrilla who
who is a doctor, nurse, med student,
doctor, nurse, pharmacist or who
student, pharmacist
simply
simply has had firstfirst aid training
training is a necessity
necessity in modern
modern guerrilla
guerrilla struggle.
struggle. A small manual
manual of
first aid for urban
first urban guerrillas,
guerrillas, printed
printed on mimeographed
mimeographed sheets, can also be produced producedby anyone
anyone
who has enough
who knowledge. In planning
enough knowledge. planning and carrying
carrying out an armed action, the urban
armed action, urban guerrilla
guerrilla
cannot
cannot forget
forget the organization
organization of medical
medical support.
support. This must be accomplished
accomplished by means means of a
mobile or motorized
mobile clinic. You can also set up
motorized clinic. up a mobile first aid station.
mobile first station. Another
Another solution
solution is to
utilize the skills of a medical
utilize medical comrade,
comrade, who who waits
waits with his bag of equipment
equipment in a designated
designated
house
house to which
which the wounded brought. The ideal would
wounded are brought. would be to have our own well-equipped
well-equipped
clinic,
clinic, but this is very
very expensive
expensive unless
unless we expropriate
expropriate all of our materials.
materials. When all else fails, it
is often necessary
necessary to resort
resort to legal clinics, armed force if necessary
using armed
clinics, using necessary to force a doctor
doctor to
treat our wounded.
wounded. In the eventuality
eventuality that we fall back back upon
upon blood banks
banks to purchase
purchase blood or
plasma, we must not use legal addresses
plasma, addresses and certainly
certainly no addresses where the wounded
addresses where wounded can
really found, since they are under
really be found, under our care and protection. Nor should we supply the addresses
protection. Nor addresses
of those
those involved
involved in the guerrilla
guerrilla organization
organization to the hospitals
hospitals and health
health care clinics where we
clinics where
may take them.
may them. Such caution
caution is indispensable
indispensable to covering
covering our tracks.
tracks. The houses
houses in which
which the
wounded
wounded stay cannotcannot be known
known to anyone
anyone but the small groupgroup of comrades
comrades responsible their
responsible for their
care and transport.
transport. Sheets, bloody
bloody clothing,
clothing, medicine
medicine and any any other indications
indications of treatmentof
treatment of
comrades wounded
comrades wounded in combat
combat must be completely
completely eliminated
eliminated from any any place they visit to receive
place they receive
treatment.
treatment.

36) GUERRILLA SECURITY


The urban
urban guerrilla
guerrilla lives in constant
constant danger
danger of the possibility
possibility of being
being discovered
discovered or denounced.
denounced.
The primary
primary security
security problem
problem is to make certain
certain that we are well hiddenhidden and well-guarded,
well-guarded, and
that there are secure methods
methods to keep the policepolice from locating
locating us. The worst
worst enemy
enemy of the urban
urban
guerrilla,
guerrilla, and the major dangerdanger that we run into, is infiltration
infiltration into our organization
organization by a spy spy or
informer.
informer. The spy spy trapped
trapped within
within the organization
organization willwill be punished
punished withwith death.
death. The same goesgoes
those who desert
for those desert and inform police. A well-laid
inform to the police. well-laid security
security means
means there are no spies or
agents infiltrated into our midst,
agents infiltrated midst, and the enemy
enemy can receive
receive no information
information about
about us even
through indirect
through means. The fundamental
indirect means. fundamental way way to insure
insure this is to be strict and cautious
cautious in
recruiting. Nor is it permissible
recruiting. permissible for everyone
everyone to know
know everything
everything and everyone.
everyone. This rulerule is a
fundamental
fundamental ABC ABC of urbanurban guerrilla
guerrilla security.
security. The enemy wants to annihilate
enemy wants annihilate us and fights
fights
relentlessly find us and destroy
relentlessly to find us, so our greatest
destroy us, weapon lies in hiding
greatest weapon hiding from him and
attacking
attacking by surprise.
surprise. The danger urban guerrilla
danger to the urban guerrilla is that
that he may himself through
reveal himself
may reveal through
carelessness himselfto be discovered
carelessness or allow himself discovered through
through a lack of vigilance.
vigilance. It is impermissible
impermissible for
urban guerrilla
the urban guerrilla to give out his own or any any other clandestine
clandestine address
address to the police,
police, or to talk
too much. Notations in the margins
much. Notations margins of newspapers,
newspapers, lost documents,
documents, calling
calling cards,
cards, letters
letters or notes,
notes,
all these
these are evidence that the police
evidence that police never
never underestimate. Address and telephone
underestimate. Address telephone books
books must be
destroyed,
destroyed, and one must not write write or hold anyany documents. necessary to avoid keeping
documents. It is necessary keeping
archives
archives of legal or illegal
illegal names,
names, biographical
biographical information,
information, maps
maps or plans.
plans. Contact numbers
Contact numbers
should not be written
written down,
down, but simply committed
committed to memory.
memory. The urban urban guerrilla who violates
guerrilla who violates
these rules
these rules must be warned first one who notes
warned by the first notes this infraction
infraction and, if he repeats
repeats it, we
must avoid working
must with him in the future.
working with future. The urban guerrilla's need to move about constantly
urban guerrilla's constantly
with the police
with police nearby—given
nearbyigiventhe fact that the police police net surrounds
surrounds the city—forces
cityiforces him to adoptadopt
various
various security precautions depending
security precautions depending uponupon the enemy's movements. For this reason,
enemy's movements. reason, it is
necessary to maintain
necessary maintain a daily information service about what
information service what the enemy
enemy appears
appears to be doing,
doing,
where the police
where operating and what
police net is operating what points
points are being watched.
watched. The daily reading
reading of the
police news
police news in the newspapers
newspapers is a fountain
fountain of information these cases. The most important
information in these important
lesson
lesson for guerrilla
guerrilla security
security is never,
never, under
under any
any circumstances,
circumstances, to permit
permit the slightest
slightest laxity
laxity in the
maintenance of security
maintenance security measures
measures and precautions
precautions within
within the organization. Guerrilla security
organization. Guerrilla
must also
also be maintained in the case of an arrest. arrested guerrilla must reveal nothing
arrest. The arrested
to the police
police that will jeopardize
jeopardize the organization. He must say nothing that will lead, as a
say nothing
consequence,
consequence, to the arrest of of other comrades,
comrades, the discovery
discovery of of addresses
addresses or hiding places, or the
hiding places,
loss of weapons
weapons and ammunition.
ammunition.

SEVEN SINS
37) THE SEVEN SINS OF THE URBANURBAN GUERRILLA
Even when
when the urban
urban guerrilla
guerrilla applies
applies proper
proper tactics
tactics and abides
abides by its security
security rules,
rules, he can still
be vulnerable
vulnerable to errors.
errors. There
There is no perfect
perfect urban
urban guerrilla.
guerrilla. The most he can do is make every
every
effort
effort to diminish
diminish the margin
margin of error,
error, since he cannot
cannot be perfect.
perfect. One of the means
means we should
use to diminish
diminish the possibility
possibility of error is to know thoroughly the seven deadly
know thoroughly deadly sins of the urban
urban
guerrilla
guerrilla and try to avoid
avoid them. first sin of the guerrilla
them. The first guerrilla is inexperience.
inexperience. The urban
urban guerrilla
guerrilla
blinded
blinded by this sin, thinks
thinks the enemy
enemy is stupid, underestimates
underestimates the enemy's
enemy's intelligence,
intelligence, thinks
thinks
everything
everything is easy
easy and, as a result,
result, leaves
leaves evidence
evidence that can lead to disaster. Because of his
disaster. Because
inexperience,
inexperience, the urban
urban guerrilla may also overestimate
guerrilla may overestimate the forces of the enemy,
enemy, believing them
believing them
to be stronger than they really
stronger than really are. Allowing himself to be fooled
Allowing himself fooled by this presumption,
presumption, the urban
urban
guerrilla
guerrilla becomes
becomes intimidated
intimidated and remains
remains insecure
insecure and indecisive, paralyzed and lacking
indecisive, paralyzed lacking in
audacity.
audacity. The second sin of the urban urban guerrilla
guerrilla is to boast about the actions
actions he has undertaken
undertaken
broadcast them
and to broadcast winds. The third
them to the four winds. third sin of the urban
urban guerrilla
guerrilla is vanity.
vanity. The
guerrilla who suffers from this sin tries
guerrilla tries to solve the problems
problems of the revolution
revolution by actions
actions in the
city, but without bothering about the beginnings
without bothering beginnings and survival
survival of other guerrillas
guerrillas in other areas.
areas.
Blinded
Blinded by success,
success, he winds
winds up
up organizing
organizing an action that he considers
considers decisive
decisive and that puts
puts
into play the entire resources of the organization.
entire resources organization. Since we cannot
cannot afford to break
break the guerrilla
guerrilla
struggle
struggle in the cities while
while rural guerrilla warfare has not yet erupted,
guerrilla warfare erupted, we always
always run the risk ofof
allowing
allowing the enemy
enemy to attack
attack us with
with decisive
decisive blows.
blows. The fourth
fourth sin of the urban
urban guerrilla
guerrilla is to
exaggerate
exaggerate his strength
strength and to undertake
undertake actions
actions for which
which he, as yet, lacks sufficient
sufficient forces and
required infrastructure.
the required fifth sin of the urban
infrastructure. The fifth urban guerrilla
guerrilla is rash action.
action. The guerrilla
guerrilla who
commits
commits this sin loses patience, nerves, does not wait
patience, suffers an attack of nerves, wait for anything,
anything, and
impetuously
impetuously throws himself into action,
throws himself action, suffering
suffering untold
untold defeats.
defeats. The sixth sin of the urban
guerrilla
guerrilla is to attack
attack the enemy when they
enemy when they are most angry. seventh sin of the urban
angry. The seventh urban guerrilla
guerrilla
is to fail to plan things,
things, and to act spontaneously.
spontaneously.

38) POPULAR SUPPORT


One of the permanent
permanent concerns
concerns of the urban
urban guerrilla
guerrilla is his identification
identification with popular
popular causes
causes to
win public
public support.
support. Where
Where government
government actions
actions become
become inept and corrupt,
corrupt, the urban guerrilla
guerrilla
should
should not hesitate
hesitate to step in and show that he opposes
opposes the government,
government, and thus thus gain popular
popular
sympathy.
sympathy. The present
present government,
government, for example,
example, imposes
imposes heavy financial
financial burdens
burdens and
excessively
excessively high taxes
taxes on the people.
people. It is up urban guerrilla
up to the urban guerrilla to attack the dictatorship's
dictatorship's tax
collection
collection system
system and to obstruct
obstruct its financial
financial activities, throwing all the weight
activities, throwing weight of armed
armed action
action
against
against it.
it. The urban
urban guerrilla
guerrilla fights
fights not only to upset
upset the tax collection
collection system—the
systemithe weapon of
weapon
armed
armed action
action must also be directed
directed against
against those
those government
government agencies that raise
agencies that raise prices
prices and those
those
who direct them
who them as well as against wealthiest of
against the wealthiest of the national
national and foreign profiteers and the
foreign profiteers
important property owners.
important property owners. In short, against
against all those
those who accumulate
accumulate huge fortunes
fortunes out of the
high cost of living,
living, the wages
wages of hunger,
hunger, excessive
excessive prices
prices and high
high rents.
rents. Foreign
Foreign industries,
industries, such
as refiigeration
refrigeration and other North
North American
American plants
plants that monopolize
monopolize the market
market and the
manufacture of
manufacture of general
general food supplies, must be systematically
supplies, must systematically attacked
attacked by the urban
urban guerrillas.
guerrillas.
The rebellion
rebellion of the urban
urban guerrilla
guerrilla and his persistence
persistence in intervening
intervening in political
political questions
questions is the
best way
way of insuring popular support
insuring popular support for
the cause which
which we defend.
defend. We repeat
repeat and insist on repeatingiit
repeating—it is the wayway of of insuring
insuring popular
popular
support.
support. As soon as a reasonable portion of the population
reasonable portion population begins
begins to take
take seriously
seriously the actions
actions of
the urban
urban guerrilla,
guerrilla, his success is guaranteed.
guaranteed. The government
government has no alternative
alternative except
except to
intensify
intensify its repression.
repression. The police
police networks,
networks, house
house searches,
searches, the arrest
arrest of suspects
suspects and innocent
innocent
persons, and the closing
persons, closing off of streets make
make life in the city unbearable.
unbearable. The military
military dictatorship
dictatorship
embarks
embarks on massive political persecution.
massive political persecution. Political
Political assassinations
assassinations and police
police terror
terror become
become
routine. In spite of all this, the police
routine. police systematically
systematically fail. The armed
armed forces, navy and the air
forces, the navy
force are mobilized undertake routine
mobilized to undertake routine police
police functions,
functions, but even so they find no way
they can find way to
halt guerrilla
guerrilla operations
operations or to wipe out the revolutionary
revolutionary organization,
organization, withwith its fragmented
fragmented groups
groups
that move around
around and operate throughout the country.
operate throughout country. The people refuse to collaborate
people refuse with the
collaborate with
government,
government, and the general
general sentiment
sentiment is that this government
government is unjust,
unjust, incapable
incapable of solving
problems, and that it resorts
problems, resorts simply to the physical
physical liquidation
liquidation of its opponents30.
opponents30. The political
political
situation
situation in the country
country is transformed
transformed into a military
military situation which the "gorillas"
situation in which "gorillas" appear
appear
more and more to be the ones responsible
more responsible for violence, while the lives of the people
violence, while people grow worse.
grow worse.
When they see the military
When they military and the dictatorship
dictatorship on the brink of the abyss, abyss, and fearing
fearing the
consequences
consequences of a civil war which which is already well underway,
already well pacifiers (always
underway, the pacifiers (always to be found
found
within the ruling
within ruling elite) and the opportunists
opportunists (partisans
(partisans of nonviolent
nonviolent struggle)
struggle) join hands and
circulate rumors behind
circulate rumors behind the scenes begging
begging the hangmen
hangmen for elections,
elections, "re-democratization",
"re-democratization",
constitutional
constitutional reforms,
reforms, and other tripetripe designed people and make them
designed to fool the people them stop the
rebellion. But, watching
rebellion. watching the guerrillas, people now understand
guerrillas, the people understand that it is a farce to vote in any any
elections which have as their
elections which their sole objective
objective guaranteeing
guaranteeing the survival
survival of the dictatorship
dictatorship and
covering
covering upup its crimes. Attacking wholeheartedly
crimes. Attacking wholeheartedly this election
election farce and the so-called
so-called "political
"political
solution",
solution", which
which is so appealing
appealing to the opportunists,
opportunists, the urban
urban guerrillas
guerrillas must become
become even moremore
aggressive
aggressive and active,
active, resorting
resorting without pause to sabotage,
without pause sabotage, terrorism,
terrorism, expropriations,
expropriations, assaults,
assaults,
kidnappings, executions,
kidnappings, executions, etc. This action
action answers
answers any any attempt people with
attempt to fool the people with the opening
opening
of Congress
Congress and the reorganization
reorganization of political
political parties—parties
partiesiparties of the government
government and of the
positions which
positions which the government allowsiwhenall the time
government allows—when time parliament
parliament and the so-called
so-called "parties"
"parties"
only function
function thanks permission of the military
thanks to the permission military dictatorship,
dictatorship, in a true spectacle
spectacle of puppets
puppets
or dogs on a leash. The role of the urban urban guerrilla,
guerrilla, in order to win the support
support of the population,
population,
is to continue
continue fighting, keeping in mind the interests
fighting, keeping interests of the people
people and heightening
heightening the disastrous
disastrous
situation within which
situation within which the government
government mustmust act. These
These are the conditions,
conditions, harmful
harmful to the
dictatorship, which permit
dictatorship, which permit the guerrillas
guerrillas to open
open rural warfare in the middle
rural warfare middle ofof an uncontrollable
uncontrollable
urban rebellion.
urban rebellion. 30 Note
Note here the delusional
delusional assumption
assumption of popular
popular support.
support. The leftist worm
worm
crawls forth under
crawls under the Jewish
Jewish paradigm
paradigm never
never pausing
pausing to let righteous
righteous actions
actions drum up up support.
support.
The main goal of the SS should be to seek virtue and learn. The urban urban guerrilla
guerrilla is engaged
engaged in
revolutionary action
revolutionary action for the people, with them
people, and with them seeks the participation
participation of the people
people in the
struggle
struggle against
against the dictatorship
dictatorship and the liberation
liberation of the country. Beginning with the city and the
country. Beginning
support
support of the people,
people, the rural guerrilla
guerrilla war develops
develops rapidly,
rapidly, establishing
establishing its infrastructure
infrastructure
carefully while the urban
carefully while urban area continues
continues the rebellion.
rebellion.

II. JJihadist
ihadist Training Manual
The following
following are relevant
relevant (non-Koran
(non-Koran based)
based) excerpts
excerpts from a training
training manual
manual from the Islamic
Islamic
Jihadist
J ihadist Group
Group “Al Qaeda”,
Qaeda”, special care should be taken
taken to avoid replication
replication of the tactics
tactics
involving religious zealotry
involving religious zealotry and suicide
suicide bombing.
bombing. These
These tactics
tactics are rarely
rarely effective
effective and lead to a
clouded
clouded mind which
which will result
result in poor
poor battle
battle decisions.
decisions. The leadership
leadership is advised
advised to only use
religion to maintain
religion maintain order
order in the direst of circumstances,
circumstances, where
where perhaps
perhaps men,
men, on the brink
brink of
death,
death, might reconnect with
might reconnect with their religiosity
religiosity regardless. Additionally, it should be considered
regardless. Additionally,
natural allies
that Muslims are our natural allies against the Jewish threat,
threat, care should
should be taken
taken not to
conform
conform to alien ideologies,
ideologies, however
however cooperation
cooperation and diplomacy
diplomacy is proven
proven to be more effective
effective
than fighting
than private religious
fighting private religious wars
wars on the battlefield.
battlefield. The National
National Socialist
Socialist is committed
committed not to
factionism
factionism but to the right
right for all peoples security for their nation
peoples to have security nation and race,
race, even if the
recent Islamic
recent Islamic invasion
invasion of Europe
Europe may
may result
result to mixed
mixed alliances
alliances and perspectives
perspectives among
among the
men. All Muslims
men. Muslims who agree
agree to join the war effort
effort and fight their own freedom
fight for their freedom against
against the
international
international Jew and his terrorist
terrorist allies should
should be treated
treated as allies. Any Muslims
Muslims claiming
claiming to
have a birthright
birthright to European
European soil are traitors their Volk
traitors to their Volk and Nations
Nations and must be immediately
immediately
expelled
expelled from anyany National
National Socialist
Socialist military
military formation.
formation. Care should be taken
taken to identify
identify the use
of Taqiyyah
Taqiyyah – religiously condoned
7 religiously condoned lying, comparable
comparable to Jew pilpul
pilpul 7– and alliances
alliances and
communications
communications clearly
clearly monitored
monitored if said member
member is a newnew recruit
recruit or has not yet
yet been proven
proven in
battle with his allies (or blood
battle with blood brothers,
brothers, in the case of Islamic National Socialist
Islamic National Socialist formations).
formations).

As is the case with the prior manual, many


many of these tactics are
outdated and should serve only as a reference point.

Sanitized excerpts from the AQ Manual


I)
1) Principles of Military Organization
Military
Military Organization
Organization has three
three main principles
principles without
without which
which it cannot
cannot be established.
established.
1)
1) Military
Military Organization
Organization commander
commander and advisory
advisory council
council
2) The soldiers
soldiers (individual
(individual members)
members)
3) A clearly defined strategy
clearly defined strategy

Military Organization
Organization Requirements:
Requirements:
The Military
Military Organization
Organization dictates
dictates a number
number of requirements
requirements to assist
assist it in confrontation
confrontation and
endurance.
endurance. These
These are:
1)
1) Forged
Forged documents
documents and counterfeit
counterfeit currency
currency
2) Apartments
Apartments and hiding places
places
3) Communication
Communication means
means
4) Transportation
Transportation means
means
5) Information
Information
6) Arms
Arms and ammunition
ammunition
7) Transport
Transport

Missions Required of the Military Organization:


Missions Organization:
The main mission
mission for which
which the Military
Military Organization
Organization is responsible
responsible is:
is: The overthrow
overthrow of the
godless regimes and their
godless regimes their replacement
replacement with an Islamic
Islamic regime.
regime. Other missions
missions consist
consist of the
following:
following:
1)
1) Gathering
Gathering information
information about the enemy,
enemy, the land, the installations,
installations, and the neighbors.
neighbors.
2) Kidnapping
Kidnapping enemy
enemy personnel,
personnel, documents,
documents, secrets,
secrets, and arms.
3) Assassinating
Assassinating enemy personnel as well
enemy personnel well as foreign tourists.
foreign tourists.
4) Freeing
Freeing the brothers
brothers who are captured
captured by the enemy.
enemy.
5) Spreading rumors and writing
Spreading rumors writing statements
statements that instigate
instigate people
people against
against the enemy.
enemy.
6) Blasting
Blasting and destroying
destroying the places
places of amusement,
amusement, immorality,
immorality, and sin; not a vital target.
target.
7) Blasting
Blasting and destroying
destroying the embassies
embassies and attacking
attacking vital economic
economic centers.
centers.
8) Blasting
Blasting and destroying
destroying bridges
bridges leading
leading into and out of the cities.
cities.

Importance
Importance of the Military Organization:
Organization:
1)
1) Removal
Removal of those personalities that block
those personalities block the call's path.
path. [A different
different handwriting:]
handwritingz] All types
types
of military
military and civilian
civilian intellectuals
intellectuals and thinkers
thinkers for the state.
2) Proper
Proper utilization
utilization of the individuals' unused capabilities.
individuals' unused capabilities.
3) Precision
Precision in performing
performing tasks,
tasks, and using
using collective views on completing
collective views completing a job from all aspects,
aspects,
not just one.
notjust
Controlling the work
4) Controlling work and not fragmenting
fragmenting it or deviating
deviating from it.
it.
5) Achieving
Achieving long-term
long-term goals such as the establishment
establishment of an Islamic
Islamic state and short-term
short-term goals
such as operations
operations against
against enemy
enemy individuals
individuals
and sectors.
sectors.
6) Establishing
Establishing the conditions
conditions for possible
possible confrontation
confrontation with the regressive
regressive regimes their
regimes and their
persistence.
persistence.
7) Achieving
Achieving discipline
discipline in secrecy through tasks.
secrecy and through tasks.

Precautions:
Financial Security Precautions:
1)
1) Dividing
Dividing operational
operational funds parts: One part is to be invested
funds into two parts: projects that offer
invested in projects
financial return,
financial return, and the other is to be saved and not spent except
spent except during
during operations.
operations.
2) Not placing
placing operational
operational funds
funds [all]
[all] in one place.
place.
3) Not telling
telling the Organization
Organization members
members about
about the location
location of the funds.
funds.
4) Having proper protection
Having proper protection while
while carrying
carrying large amounts
amounts ofof money.
money.
5) Leaving
Leaving the money
money with non-members
non-members and spending
spending it as needed.
needed.

2) Forged Documents (Identity-Cards,


(Identity-Cards, Records Books,Books, Passports) The following security
followingsecurity
precautions should be taken:
taken:
1)
1) Keeping
Keeping the passport
passport in a safe place
place so it would
would not be seized by the security
security apparatus,
apparatus, and
the brother belongs to would
brother it belongs would have to negotiate
negotiate its return
return (I'll give you your
you your passport
passport if you
you give
me information)
information)
2) All documents
documents of the undercover
undercover brother,
brother, such as identity
identity cards
cards and passport,
passport, should be
falsified.
falsified.
3) When
When the undercover
undercover brother
brother is traveling with a certain
traveling with certain identity
identity card or passport,
passport, he should
know all pertinent
know pertinent [information]
[information] such as the name,
name, profession, place of residence.
profession, and place residence.
4) The brother special work
brother who has special work status (commander,
(commander, communication
communication link,…)
link,. . .) should have
more than one identity
identity card and passport.
passport. He should learn the contents
contents of each, the nature
nature of the
[indicated]
[indicated] profession,
profession, and the dialect
dialect of the
residence area listed in the document.
residence document.
5)
5) The photograph
photograph of the brother
brother in these
these documents
documents should be without
without a beard.
beard. It is preferable
preferable
that the brother's
brother's public photograph [on these
public photograph these documents]
documents] be also without
without a beard.
beard. If he already
already
has one [document]
[document] showing
showing a photograph
photograph with a beard,
beard, he should replace
replace it.
it.
6) When
When using
using an identity
identity document
document in different names, no more than
different names, than one such document
document should
be carried
carried at one time.
time.
7) The validity falsified travel
validity of the falsified travel documents
documents should
should always
always be confirmed.
confirmed.
8) All falsification
falsification matters
matters should be carried
carried out through
through the command
command and not haphazardly
haphazardly
(procedure
(procedure control)
control)
9) Married
Married brothers
brothers should their wives
should not add their their passports.
wives to their passports.
10)
10) When
When a brother
brother is carrying
carrying the forged
forged passport
passport of a certain
certain country,
country, he should
should not travel
travel to
that country.
country. It is easy
easy to detect forgery
forgery at the airport,
airport, and the dialect
dialect of the brother
brother is different
different
from that of the people
people from that country.
country.

Organizations' Given Names:


Security Precautions Related to the Organizations'
1) name given
1) The name given by the Organization
Organization [to the brother]
brother] should not be odd in comparison
comparison with
names used around
other names around him.
2) A brother
brother should not have more than one name
more than name in the area where
where he lives {the undercover
{the undercover
work
work place)
place)

3) FOURTH LESSON -- Organization MILITARY BASES


BASES
"APARTMENTS PLACES" -- HIDING
Definition of Bases:
Definition Bases:
These
These are apartments,
apartments, hiding places, command
hiding places, command centers,
centers, etc. in which
which secret operations
operations are
executed
executed against
against the enemy.
enemy. These
These bases
bases may
may be in cities
cities and are [then] called
called homes
homes or
apartments.
apartments. They may
may be in mountainous,
mountainous, harsh terrain
terrain far from the enemy,
enemy, and are [then] called
called
hiding places or bases.
hiding places bases. During
During the initial
initial stages, the Military
Military Organization
Organization usually uses
usually uses
apartments
apartments in cities
cities as places
places for launching
launching assigned missions, such as collecting
assigned missions, collecting information,
information,
observing
observing members
members of the ruling
ruling regime,
regime, etc. Hiding
Hiding places
places and bases in mountains
mountains and harsh
terrain used at later stages, from
terrain are used fiom which
which Jihad [holy war] groupsgroups are dispatched
dispatched to execute
execute
assassination
assassination operations
operations of enemy
enemy individuals,
individuals, bomb their centers,
bomb their centers, and capture weapons. In
capture their weapons.
some Arab countries
countries such as Egypt, where there
Egypt, where there are no mountains
mountains or harsh
harsh terrain,
terrain, all stages of
Jihad work would
would take place
place in cities. The opposite
opposite was true
true in Afghanistan,
Afghanistan, where
where initially
initially Jihad
work
work was in the cities, then the warriors
cities, then warriors shifted to mountains
mountains and harshharsh terrain.
terrain. There, they
There, they
started battling
battling the Communists.
Communists.

Security Precautions Related to Apartments:


Apartments:
1)
1) Choosing
Choosing the apartment
apartment carefully location, the size for the work
carefully as far as the location, work necessary
necessary
(meetings,
(meetings, storage,
storage, arms, fugitives, work
arms, fugitives, work preparation).
preparation).
2) It is preferable
preferable to rent apartments
apartments on the ground floor to facilitate
ground floor facilitate escape
escape and digging
digging of
trenches.
trenches.
3) Preparing
Preparing secret locations
locations in the apartment
apartment for securing
securing documents,
documents, records,
records, arms,
arms, and other
important
important items.
items.
4) Preparing
Preparing ways
ways of vacating
vacating the apartment
apartment in case of a surprise
surprise attack
attack (stands,
(stands, wooden
wooden
ladders).
ladders).
5) Under
Under no circumstances
circumstances should anyone know about
anyone know about the apartment
apartment except
except those who use it.
those who it.
6) Providing necessary cover
Providing the necessary people who frequent
cover for the people frequent the apartment
apartment (students, workers,
(students, workers,
employees,
employees, etc.)
7) Avoiding
Avoiding seclusion
seclusion and isolation
isolation from the population
population and refraining
refraining from goinggoing to the
apartment
apartment at suspicious times.
suspicious times.
8) It is preferable
preferable to rent these
these apartments
apartments usingusing false names,
names, appropriate
appropriate cover,
cover, and non-Moslem
non-Moslem
appearance.
appearance.
9) A single brother
brother should
should not rent more than than one apartment
apartment in the same area, area, from the same
agent,
agent, or using the same rental rental office.
office.
10)
10) Care should be exercised
exercised not to rent apartments
apartments that are knownknown to the security
security apparatus
apparatus
[such as] those used for immoral
those used immoral or priorprior Jihad
Jihad activities.
activities.
11)
1 1) Avoiding police stations
Avoiding police stations and government
government buildings. Apartments should not be rented
buildings. Apartments rented near
near
those places.
those places.
12)
12) When
When renting
renting these
these apartments,
apartments, one shouldshould avoid
avoid isolated
isolated or deserted
deserted locations,
locations, so the enemy
enemy
wouldnot
would not be able to catch those those living there
there easily.
easily.
13)
13) It is preferable
preferable to rent apartments
apartments in newly
newly developed
developed areas where where people
people do not knowknow one
another.
another. Usually,
Usually, in older quarters people know
quarters people know one another
another and strangers
strangers are easily
easily identified,
identified,
especially
especially since thesethese quarters
quarters have manymany informers.
informers.
14)
14) Ensuring that there
Ensuring that there is has been no surveillance prior to the members
surveillance prior members entering
entering the apartment.
apartment.
15) Agreement among
15) Agreement those living in the apartment
among those apartment on special ways ways of knocking
knocking on the door and
special
special signs prior
prior to entry into the building’s
building’s main gate to indicate
indicate to those
those who wishwish to enter
that the place
place is safe and not being being monitored.
monitored. Such signs include include hanging
hanging out a towel,
towel, opening
opening a
curtain,
curtain, placing
placing a cushion
cushion in a special way, etc.
special way,
16)
16) If there
there is a telephone
telephone in the apartment,
apartment, calls should be answeredanswered in an agreed-upon
agreed-upon manner
manner
among those who use the apartment.
among those apartment. That would would prevent
prevent mistakes
mistakes that would,
would, otherwise,
otherwise, lead to
revealing the names
revealing names and nature
nature of the occupants.
occupants.
17)
17) For apartments, replacing the locks and keys with
apartments, replacing with new ones. As for the other entities entities (camps,
(camps,
shops, mosques),
mosques), appropriate
appropriate security
security precautions
precautions should be taken taken depending
depending on the entity’s
entity’s
importance
importance and role role in the work.
work.
18) Apartments used for undercover
18) Apartments undercover work work should not be visiblevisible from higher
higher apartments
apartments in order
not to expose nature of the work.
expose the nature work.
19)
19) In a newer
newer apartment,
apartment, avoid talking
talking loud because prefabricated ceilings
because prefabricated walls [used in
ceilings and walls
the apartments]
apartments] do not have the same thickness thickness as those
those in old ones.
20) It is necessary
necessary to have at hand documentsdocuments supporting
supporting the undercover
undercover [member].
[member]. In the case of
a physician, there should be an actual
physician, there actual medical
medical diploma,
diploma, membership
membership in the [medical][medical] union,
union, the
government
government permit,
permit, and the rest of of the routine
routine procedures known in that country.
procedures known country.
21) The cover should blend well well [with the environment].
environment]. For example,
example, selecting
selecting a doctor’s
doctor’s clinic
in an area where
where there
there are clinics,
clinics, or in a location
location suitable
suitable for it.
it.
22) The cover of those those who frequent
frequent the location
location should matchmatch the cover of of that location.
location. For
example,
example, a common
common laborer
laborer should not enter a fancy hotel because because that would
would be suspicious
suspicious and
draw attention.
attention.

MEANS OF COMMUNICATION AND


4) FIFTH LESSON -- MEANS AND
TRANSPORTATION
In the name
name of Allah,
Allah, the merciful
merciful and compassionate
compassionate
Means of Transportation
Transportation
Introduction:
Introduction:
It is well known
known that in undercover
undercover operations,
operations, communication
communication is the mainstay
mainstay of the movement
movement
for rapid
rapid accomplishment.
accomplishment. However,
However, it is a double-edged
double-edged sword: It can be to our advantage
advantage if we
use it well and it can be a knife
knife dug into our back if we do not consider
consider and take
take the necessary
necessary
security
security measures.
measures.
Communication Means:
The Military
Military Organization
Organization in any
any Islamic
Islamic group
group can, with its modest
can, with modest capabilities,
capabilities,
use the following
following means:
means:
1)
1) The telephone,
telephone,
2) Meeting
Meeting in-person,
in-person,
3) Messenger,
Messenger,
4) Letters,
Letters,
5) Some modern
modern devices,
devices, such as the facsimile
facsimile and wireless
wireless [communication].
[communication].
Communication
Communication may within the county,
may be within county, state, or even the country,
country, in which
which case it is called
called
local communication.
communication. WhenWhen it extends
extends expanded
expanded between
between countries,
countries, it is then
then called international
international
communication.
communication.

Secret Communication is Limited to the Following


Following Types:
Common, standby, alarm alarm
1)
1) Common Communication:
Communication: It is a communication
communication between two members
between two members of the Organization
Organization
without being monitored
without monitored by the security
security apparatus
apparatus opposing
opposing the Organization.
Organization. The common
common
communication should be done under
communication should under a certain
certain cover
cover and after inspecting
inspecting the surveillance
surveillance
situation
situation [by the enemy].
enemy].
2) Standby Communication:
Communication: This replaces
replaces common
common communication
communication when
when one of the two parties
parties
is unable
unable to communicate with the other for some reason.
communicate with reason.
3) Alarm Communication: used when
Communication: This is used when the opposing
opposing security
security apparatus
apparatus discovers
discovers an
undercover activity
undercover activity or some undercover
undercover members.
members. Based
Based on this communication,
communication, the activity
activity is
stopped
stopped 'for a while, matters related
while, all matters related to the activity
activity are abandoned,
abandoned, and the Organization's
Organization's
members
members are hidden
hidden from the security personnel.
security personnel.

Method of Communication Among Members of the Organization: Organization:


1)
1) Communication
Communication aboutabout undercover
undercover activity
activity should be done using
using a good cover;
cover; it should also
be quick,
quick, explicit,
explicit, and pertinent.
pertinent. That is, just for talking
talking only.
2) Prior
Prior to contacting members, the commander
contacting his members, commander of the cell [2][2] should
should agree of them
with each of
agree with them
separately
separately (the cell members
members should never
never meet all in one place
place and should not know
know one
another)
another) on a manner
manner and means
means of communication
communication with each other. Likewise, chief of the
Likewise, the chief
Organization
Organization should
should [use a similar technique] with the branch
similar technique] branch commanders.
commanders.
3) A higher-ranking
higher-ranking commander
commander determines
determines the type and method communication with
method of communication with lower-
lower-
ranking leaders.
ranking leaders.

First Means: The Telephone:


Because
Because of significant technological advances,
significant technological advances, security
security measures
measures for monitoring telephone
monitoring the telephone
and broadcasting
broadcasting equipment
equipment havehave increased.
increased. Monitoring
Monitoring may may be done by installing
installing a secondary
secondary
line or wireless
wireless broadcasting
broadcasting device
device on a telephone
telephone thatthat relays
relays the calls to a remote
remote
location…That
location. . .That is why
why the Organization
Organization takes security measures among
security measures among its members
members who use this
means of
means of communication
communication (the telephone).
telephone).
1)
1) Communication
Communication should should be carried
carried out from public
public places.
places. One should select telephones
telephones that
are less suspicious
suspicious to the security
security apparatus
apparatus and are more difficult
difficult to monitor.
monitor. It is preferable
preferable to
telephones in booths
use telephones booths and on main streets.
streets.
[2)] Cell or cluster
cluster methods
methods should be adopted
adopted by the Organization.
Organization. It should
should be composed
composed of
many
many cells whose
whose members
members do not know
know one another,
another, so that if
if a cell member
member is caught
caught the other
cells would
would not be affected, work would
affected, and work would proceed
proceed normally.
normally.
2) Conversation
Conversation should
should be coded or in general
general terms
terms so as not to alert the person
person monitoring
monitoring [the
telephone].
telephone].
3) Periodically
Periodically examining telephone wire
examining the telephone wire and the receiver.
receiver.
4) Telephone numbers should
Telephone numbers should be memorized
memorized and not recorded.
recorded. If the brother
brother has to write
write them,
them,
he should
should do so using
using a code, so they do not appearappear as telephone
telephone numbers
numbers (figures
(figures from a
shopping
shopping list, etc.)
5) The telephone
telephone caller person called
caller and person called should mention
mention some wordswords or sentences
sentences prior to
bringing
bringing upup the intended
intended subject.
subject. The brother
brother who
who is calling
calling may
may misdial
misdial one of the digits and
actually
actually call someone
someone else. The person
person ‘called may may claim that the call is for him, and the calling calling
brother
brother may telling him work-related
may start telling work-related issues reveal many
issues and reveal many things
things because
because of a minor
minor
error.
6) In telephone
telephone conversations
conversations about undercover work,
about undercover work, the voice should be changedchanged and distorted.
distorted.
7) When
When feasible,
feasible, it is preferable
preferable to change telephone lines to allow
change telephone allow direct
direct access
access to local and
international
international calls. That and proper
proper cover facilitate
facilitate communications
communications and provide
provide security
security
protection not available
protection available when
when the central telephone station in the presence
central telephone presence of manymany employees
employees is
used.
used.
8) When
When a telephone identified[by the security
telephone [line] is identified security apparatus],
apparatus], the command
command and all parties
parties
who were
who using it should be notified
were using notified as soon as possible
possible in order to take appropriate
appropriate measures.
measures.
9) When
When the command
command is certain
certain that a particular
particular telephone
telephone [line] is being monitored,
monitored, it can
exploit
exploit it by providing
providing information
information that misleads
misleads the enemyenemy and benefits
benefits the work
work plan.
10)
10) If the Organization
Organization manages
manages to obtain jamming devices,
obtain jamming devices, it should them immediately.
should use them immediately.

Second Means: Meeting in-person: ½


Second ‘/2

This is direct
direct communication
communication between
between the commander
commander and a member
member of the Organization.
Organization. During
During
the meeting
meeting the following
following are accomplished:
accomplished:
1)
1) Information
Information exchange,
exchange,
2) Giving
Giving orders
orders and instructions,
instructions,
3) Financing,
Financing,
4) Member
Member follow-up
follow-up

Stages of the In-Person Meeting:


A) Before meeting,
Before the meeting,
B) The meeting
meeting [itself],
C) After
After the meeting
meeting

A. Before the Meeting:


The following
following measures
measures should be taken:
taken:
1)
1) Designating
Designating the meeting
meeting location,
location,
2) Finding
Finding a proper
proper cover
cover for the meeting,
meeting,
3) Specifying
Specifying the meeting
meeting date and time,
time,
4) Defining
Defining special signals
signals between those who
between those who meet.

1)
1) Identifying the meeting location
If the meeting
meeting location
location is stationary,
stationary, the following
following matters
matters should
should be observed:
observed:
i) The location
location should be far fromfiom police
police stations
stations and security
security centers.
centers.
ii) Ease of transportation
transportation to the location.
location.
iii) Selecting
Selecting the location
location prior
prior to the meeting
meeting and learning
learning all its details.
details.
If the meeting
iv) If meeting location
location is an apartment, first one,
apartment, it should not be the first one, but one somewhere
somewhere in
the middle.
middle.
v) The availability
availability of many roads leading
many roads leading to the meeting
meeting location.
location. That would
would provide
provide easy
easy
escape
escape in case the location
location ware
ware raided
raided by security
security personnel.
personnel.
location should not be under
vi) The location under suspicion
suspicion (by the security
security [apparatus])
[apparatus])
vii) The apartment where the meeting
apartment where takes place
meeting takes place should be on the ground
ground floor,
floor, to facilitate
facilitate
escape.
escape.
Viii) The ability
ability to detect
detect any
any surveillance
surveillance from that location.
location.
ix) When public transportation
When public transportation is used,
used, one should alight at some distance
distance from
from the meeting
meeting
location
location and continue
continue on foot. In the case of a private
private vehicle,
vehicle, one should park
park it far away
away or in a
secure place
place so as to be able to maneuver
maneuver it quickly
quickly at any time.
any time.

If the meeting location is not stationary,


stationary, the following
following matters
matters should be
observed:
i) The meeting
meeting location
location should be at the intersection
intersection of a large number
number of main
main and side streets to
facilitate
facilitate entry,
entry, exit, and escape.
escape.
ii) The meeting
meeting location
location (such as a coffee shop) should not have members
members that might be dealing
dealing
with the security
with security apparatus.
apparatus.
iii) The meeting
meeting should not be held in a crowded
crowded place
place because
because that would
would allow the security
security
personnel to hide and monitor
personnel those who meet.
monitor those
iv) It is imperative
imperative to agree
agree on an alternative
alternative location
location for the meeting
meeting in case meeting first
meeting in the first
is unfeasible.
unfeasible. That holds
holds whether
whether the meeting place is stationary
meeting place stationary or not.

Those who meet in-person


in—person should do the following:
following:
i) Verifying
Verifying the security
security situation
situation of the location before the meeting.
location before meeting.
ii) Ensuring
Ensuring that there are no security personnel behind
security personnel them or at the meeting
behind them place.
meeting place.
iii) Not heading
heading to the location
location directly.
directly.
iv) Clothing
Clothing and appearance
appearance should be appropriate
appropriate for the meeting
meeting location.
location.
v) Verifying
Verifying that private
private documents
documents carried
carried by the brother
brother have appropriate
appropriate cover.
cover.
vi) Prior to the meeting,
meeting, designing
designing a security plan that specifies
security plan specifies what the security
security personnel
personnel
would
would be told in case the location were raided
location were what [the brothers]
raided by them, and what brothers] wouldresort
would resort to
in dealing with the security
dealing with personnel (fleeing,
security personnel (fleeing, driving
driving back ,, .. .. .. ))

2) Finding a proper
proper cover for the meeting [The [The cover]
cover]
i) should blend well with
with the nature
nature of the location.
location.
ii) In case they
they raid the place,
place, the security personnel should believe
security personnel believe the cover.
cover.
iii) should
should not arouse
arouse the curiosity
curiosity of those
those present.
present.
iv) should match
match the person's
person's appearance financial and educational
appearance and his financial educational background.
background.
v) should
should have documents that support
documents that support it.
it.
vi) provide
provide reasons
reasons for the two parties'
parties' meeting
meeting (for example,
example, one of the two parties
parties should
should have
proof that he is an architect.
proof architect. The other should have documents
documents as proof
proof that he is a land owner.
owner.
The architect
architect has produced
produced a construction plan for the land)
construction plan

3) Specifying
Specifying the Meeting Date and Time
i)
i) Specifying
Specifying the hour of the meeting
meeting as well as the date.
ii) Specifying time of both parties'
Specifying the time parties' arrival
arrival ana the time
time of the first party's
party's departure.
departure.
iii) Specifying
Specifying how long the meeting
meeting will last.
iv) Specifying
Specifying an alternative
alternative date and time.
time.
v) Not allowing period of time between
allowing a long period between making
making the meeting
meeting arrangements
arrangements and the
meeting
meeting itself.

4) Designating special signals between those who meet


If the two
If two individuals
individuals meeting know one another's
meeting know another's shape and appearance,
appearance, it is sufficient
sufficient to use a
single safety sign. [In that case,]
case,] the sitting and arriving
arriving individuals
individuals inform
inform each other that there
there
is no enemy
enemy surveillance.
surveillance. The sign may
may be
keys, beads,
keys, beads, a newspaper,
newspaper, or a scarf. The two parties
parties would
would agree
agree on moving
moving it in a special way
special way
so as not to attract
attract the attention
attention of those
those present.
present. If the two
two individuals
individuals do not know
know one another,
another,
they should do the following:
they following:

a) The initial sign


sign for becoming
becoming acquainted
acquainted may
may be that both of them wear
wear a certain
certain type of
clothing
clothing or carry
carry a certain
certain item.
item. These signs should be appropriate place, easily
appropriate for the place, easily identified,
identified,
and meet the purpose.
purpose. The initial
initial sign
for becoming
becoming acquainted
acquainted does not [fully] identify
identify one person
person by another.
another. It does that at a rate
rate of
30%.
30%.
b) Safety Signal:
Signal: It is given by the individual
individual sitting in.
in. the meeting
meeting location
location to inform
inform the
second
second individual
individual that the place person would
place is safe. The second person would reply
reply through
through signals
signals to inform
inform
the first that he is not being monitored.
monitored. The signals are agreed upon previously
agreed upon previously and should not
cause
cause suspicion.
suspicion.
c) A second signal for getting
getting acquainted
acquainted is one in which
which the arriving
arriving person
person uses while
while sitting
down.
down. That signal may may be a certain
certain clause,
clause, a word,
word, a sentence,
sentence, or a gesture
gesture agreed upon
agreed upon
previously, and should not cause suspicion
previously, suspicion for those
those who hear it or see it.
it.
B. The Stage of the Meeting [itself]
[itself]
The following
following measures should be taken:
1)
1) Caution
Caution during
during the meeting.
meeting.
2) Not acting unnaturally during
acting unnaturally during the meeting
meeting in order not to raise
raise suspicion.
suspicion.
3) Not talking
talking with either loud or very
either loud very low voices
voices ([should
( [should be] moderate).
moderate).
4) Not writing anything that has to do with the meeting.
writing anything meeting.
5) Agreeing
Agreeing on a security
security plan in case the enemy raids the location.
enemy raids location.

C. After the Meeting


The following
following measures should be taken:
1) Not departing
1) together, but each one separately.
departing together, separately.
2) Not heading directly to the main road
heading directly road but through
through secondary
secondary ones.
3) Not leaving
leaving anything
anything in the meeting place that might indicate
meeting place indicate the identity
identity or nature
nature of those
who met. Meeting
who Meeting in-person
in-person has disadvantages,
disadvantages, such as:

1) Allowing the enemy


1) Allowing enemy to capture those who are meeting.
capture those meeting.
2) Allowing
Allowing them
them [the enemy] pictures of those
enemy] to take pictures meeting, recordtheir
who are meeting,
those who record their
conversation,
conversation, and gather
gather evidence
evidence against them.
against them.
3) Revealing
Revealing the appearance
appearance of the commander
commander to the other person.
person. However,
However, that may
may be
avoided
avoided by taking
taking the previously
previously mentioned
mentioned measures
measures such
as disguising himself well and changing
disguising himself changing his appearance
appearance (glasses, wig, etc.)
(glasses, wig,

Third Means: The Messenger:


Third
This is an intermediary between the sender and the receiver.
intermediary between receiver. The messenger
messenger should possess
possess all
characteristics
characteristics mentioned first chapter
mentioned in the first regarding the Military
chapter regarding Military Organization’s
Organization’s member.
member.
These
These are the security
security measures that a messenger
measures that messenger should take:
should take:
1)
1) Knowledge
Knowledge of the person
person to whom
whom he will deliver
deliver the message.
message.
2) Agreement
Agreement on special signals,
signals, exact date, and specific
specific time.
time.
3) Selecting
Selecting a public
public street or place
place that does not raise
raise suspicion.
suspicion.
4) Going
Going through secondary road that does not have check points.
through a secondary points.
5) Using
Using public
public transportation
transportation (train,
(train, bus,…)
bus,. . .) and disembarking
disembarking before
before the main station.
station.
Likewise,
Likewise, embarking
embarking should not be done at the main station either, either, were there
there are a lot of
security
security personnel
personnel and informants.
informants.
6) Complete knowledge of
Complete knowledge of the location
location to which
which he is going.
going.

Fourth Means: Letters:


Fourth Letters:
This means
means (letters) may be used
(letters) may used as a method communication between
method of communication between
members
members and the Organization
Organization provided
providedthat the following
following security
security measures
measures are
taken:
taken:
1)
1) It is forbidden write any
forbidden to write any secret information
information in the letter.
letter. If one must do so, writing
so, the writing
should be done in general
general terms.
terms.
2) The letter should not be mailed
mailed from a post office
office close to the sender's
sender's residence,
residence, but from a
distant
distant one.
3) The letter should not be sent directly
directly to the receiver's address but to an inconspicuous
receiver's address inconspicuous location
location
where there
where there are many
many workers
workers from your
your country.
country.
Afterwards, the letter will be forwarded
Afterwards, forwarded to the intended receiver. (This
intended receiver. (This is regarding
regarding the overseas-
overseas-
bound
bound letter).
letter).
4) The sender's name and address
sender's name address on the envelope
envelope should be fictitious.
fictitious. In case the letters
letters and
their
their contents
contents are discovered,
discovered, the security apparatus would
security apparatus would not be able to determine
determine his [the
sender's]
sender's] name and address.
address.
5) The envelope
envelope should transparent so as to reveal
should not be transparent reveal the letter
letter inside.
inside.
6) The enclosed pages should
enclosed pages should not be many,
many, so as not to raise
raise suspicion.
suspicion.
7) The receiver's
receiver's address
address should be written clearly so that the letter would
written clearly would not be returned.
returned.
8) Paying
Paying the post office box fees should
post office should not be forgotten.
forgotten.

Facsimile and Wireless:


Fifth Means: Facsimile
Considering
Considering its modest
modest capabilities
capabilities and the pursuit
pursuit by the security
security apparatus
apparatus of its members
members and
forces,
forces, the Islamic
Islamic Military
Military Organization
Organization cannot
cannot obtain these devices.
obtain these devices. In case the Organization
Organization is
able to obtain
obtain them, firm security
them, firm security measures
measures
should taken to secure communication
should be taken communication between
between the members
members in the country
country and the command
command
outside.
outside. These measures
measures are:
1)
1) The duration
duration of transmission
transmission should not exceed
exceed five
five minutes
minutes in order to prevent
prevent the enemy
enemy
from pinpointing
pinpointing the device
device location.
location.
2) The device
device should be placed
placed in a location with high wireless
location with wireless frequency,
frequency, such as close to a TV
station,
station, embassies,
embassies, and consulates
consulates in order
order to prevent
prevent the enemy
enemy from identifying
identifying its location.
location.
3) The brother,
brother, using
using the wireless
wireless device
device to contact
contact his command
command outside
outside the country,
country, should
disguise
disguise his voice.
4) The time
time of communication
communication should be carefully
carefirlly specified.
specified.
5) The frequency
frequency should be changed time to time.
changed from time time.
6) The device
device should be frequently
frequently moved
moved from one location
location to another.
another.
7) Do not reveal
reveal your
your location
location to the entity
entity for which
which you
you report.
report.
8)
8) The conversation
conversation should
should be in general terms so as not to raise
general terms raise suspicion.
suspicion.

Transportation
Transportation Means:
The members
members of the Organization
Organization may
may move
move from one location
location to another using
another using
of the following
one of means:
following means:
a) Public
Public transportation,
transportation,
b) Private transportation
Private transportation

Security Measures that Should be Observed in Public


Transportation:
Transportation:
1)
1) One should select public
public transportation
transportation that is not subject
subject to frequent
frequent checking
checking along the way,
way,
such as crowded trains or public
crowded trains public buses.
buses.
2) Boarding
Boarding should be done at a secondary
secondary station, as main
main stations undergo more
stations undergo more careful
careful
surveillance.
surveillance. Likewise,
Likewise, embarkment
embarkment should not be done at main stations.
stations.
3) The cover should
should match
match the general
general appearance
appearance (tourist
(tourist bus, first-class
first-class train,
train, second-class
second-class
train, etc.).
train,
4) The existence
existence of documents
documents supporting
supporting the cover.
cover.
5) Placing
Placing important
important luggage
luggage among
among the passengers'
passengers' luggage without identifying
luggage without identifying the one who
who
placed it.
placed If it is discovered,
it. If discovered, its owner
owner would
would not be arrested.
arrested. In trains,
trains, it [the luggage]
luggage] should be
placed in a different
placed different car than that of its owner.
owner.
6) The brother
brother traveling
traveling on a "special
"special mission"
mission" should not get involved
involved in religious
religious issues
(advocating
(advocating good and denouncing
denouncing evil) or day-to-day
day-to-day matters reservation). The brother
matters (seat reservation). brother
traveling on a mission
traveling mission should not arrive in the [destination]
[destination] country
country at night
night because then
because then
travelers are few, and there
travelers there are [search] parties
parties and check points along
check points along the way.
way.
7)
8) When
When cabs are used, used, conversation any kind should not be started with
conversation of any with the driver
driver because
because
many
many cab drivers
drivers work
work for the security
security apparatus.
apparatus.
9) The brother
brother should exercise
exercise extreme
extreme caution
caution and apply
apply all security
security measures
measures to the members.
members.

Security Measures that Should be Observed in Private Transportation: Transportation:


Private transportation
transportation includes: cars, cars, motorcycles
motorcycles
A) Cars and motorcycles used in overt activity:
1)
1) One should possess
possess the proper
proper permit
permit and not violate
violate traffic
traffic rules in order to avoid trouble
trouble
with the police.
police.
2) The location
location of the vehicle
vehicle should
should be secure so that the security
security apparatus
apparatus would
would not
confiscate
confiscate it.it.
3) The vehicle
vehicle make and model model should be appropriate
appropriate for the brother’s
brother’s cover.
cover.
4) The vehicle
vehicle should not be used used in special military
military operations unless the Organization
operations unless Organization has no
other choice.
choice.
B) Cars and motorcycles used in covert activity:
1) Attention
1) Attention should be given to permits [obeying] the traffic
permits and [obeying] traffic rules
rules in order
order to avoid trouble
trouble
reveal their
and reveal their actual
actual mission.
mission.
2) The vehicle
vehicle should not be left in suspicious
suspicious places
places (deserts,
(deserts, mountains,
mountains, etc.). If it must be,
then the work
work should be performed
performed at suitable
suitable times when no one would
times when would keep
keep close watch
watch or
follow
follow it.
it.
3) The vehicle
vehicle should be purchased
purchased using
using forged
forged documents
documents so that getting
getting to its owners
owners would
would
prevented once it is discovered.
be prevented discovered.
4) For the sake of continuity,
continuity, have only one brother
brother in charge
charge ofof selling.
5) While parking somewhere,
While parking somewhere, one should be in a position
position to move quickly
quickly and flee
flee in case of
danger.
danger.
6) The car or motorcycle
motorcycle color should be changed
changed before operation and returned
before the operation returned to the
original
original after the operation.
operation.
7) The license
license plate number and county
plate number county name
name should be falsified.
falsified. Further,
Further, the digits
digits should be
numerous in order
numerous order to prevent
prevent anyone
anyone from spotting
spotting and memorizing
memorizing it.
it.
8)
8) The operation
operation vehicle
vehicle should not be taken
taken to large gasoline stations so that it wouldnot
gasoline stations would not be
detected
detected by the security
security apparatus.
apparatus.

5) SIXTH LESSON -- TRAINING


The following
following security precautions should be taken during the training: training:
The Place
The place should have the following
following specifications:
specifications:
1)
1) Distance
Distance from the populated
populated areas with
with the availability
availability of of living necessities.
living necessities.
2) Availability
Availability of medical
medical services
services during
during the training.
training.
3) The place
place should be suitable
suitable for the type of training
training (physical
(physical fitness,
fitness, shooting,
shooting, tactics).
tactics).
4) No one except
except the trainers
trainers and trainees
trainees should knowknow about the place.
place.
5) The place
place should
should have many
many roads
roads and entrances.
entrances.
6) The place
place should be visited
visited at suitable times.
suitable times.
7) Hiding
Hiding any training traces
any training traces immediately
immediately after the training.
training.
8) Guarding place during
Guarding the place during the training.
training.
9) Appropriateness
Appropriateness of the existing
existing facilities
facilities for the number
number of training members.
training members.
10)
10) Exclusion
Exclusion of anyone
anyone who is not connected with the training.
connected with training.
11)
1 1) Taking all security measures regarding the establishment.
Taking security measures regarding establishment.
12)
12) Distance
Distance ofof the place
place from police
police stations,
stations, public
public establishments,
establishments, and the eyes eyes of informants.
informants.
13)
13) The place
place should not be situated
situated in such a way that the training
way that training and trainees
trainees can be seen from
another
another location.
location.

The Trainees:
1)
1) Before proceeding to the training
Before proceeding training place,
place, all security
security measures
measures connected with an undercover
connected with undercover
individual
individual should be taken.
taken. Meanwhile,
Meanwhile, during
during training
training at the place, personnel safety should be
place, personnel
ensured.
ensured.
2) Selecting trainees carefully.
Selecting the trainees carefully.
3) The trainees
trainees should not know
know one another.
another.
4) The small size of groups
groups that should be together
together during
during the training
training (7-10 individuals).
individuals).
5) The trainees
trainees should not know
know the training place.
training place.
6) Establishing
Establishing a training
training plan for each trainee.
trainee.

Trainers:
The Trainers:
measures taken
All measures taken with regard
regard to the commanders
commanders apply
apply also to the trainers.
trainers. Also,
Also, the following
following
should be applied:
1)
1) Fewness
Fewness of the trainers
trainers in the training
training place.
place. Only those
those conducting training should be
conducting the training
there, in order not to subject the training
there, team to the risk of security
training team security exposure.
exposure.
2) Not revealing
revealing the identity
identity of the trainer
trainer to trainees.
trainees.
3) Keeping
Keeping a small ratio
ratio of trainees
trainees to trainer.
trainer.
4) The training
training team members
members should not know know one another.
another.

SEVENTH LESSON
6) SEVENTH LESSON -- WEAPONS: MEASURES MEASURES RELATED TO
BUYING AND
BUYING AND TRANSPORTING THEM
Prior to dealing with weapons,
dealing with whether buying,
weapons, whether buying, transporting,
transporting, or storing them, it is essential
storing them, essential to
establish
establish a careful,
careful, systematic firm security
systematic and firm plan that plan deals with
security plan with all stages.
stages. It is
necessary to divide
necessary divide that task
task into stages:
stages:
Prior to Purchase;
First Stage: Prior Purchase;

Second Stage: Purchasing;


Second Purchasing;

Third Stage: Transport;


Third Transport;

Fourth Stage: Storage.


Fourth

1) Prior to Purchase Stage


1) Prior
It is necessary
necessary to take the following
following measures:
measures:
a) In-depth
In-depth knowledge
knowledge of the place
place where weapons will
where weapons will be purchased, together with its entrances
purchased, together entrances
and exits.
b) Verifying
Verifying there are no informants
informants or security personnel at the place
security personnel place where
where purchasing will
purchasing will
take place.
take place.
c)
0) The place
place should be far from police
police stations
stations and government
government establishments.
establishments.
d) Not proceeding
proceeding to the purchasing
purchasing place
place directly
directly by the main road,
road, but on secondary
secondary streets.
streets.
e) Performing
Performing the exercises
exercises to detect
detect the surveillance.
surveillance.
f) One’s appearance
appearance and clothing
clothing should be appropriate
appropriate for the place where purchasing
place where purchasing will take
take
place.
place.
g) The purchasing
purchasing place
place should not be situated
situated in such a way
way that the seller and buyer can be
seen from another
another location.
location. To the contrary,
contrary, the purchasing
purchasing place
place should be such that the seller
and buyer can see the surrounding
surrounding area.
h) Determining
Determining a suitable
suitable cover for being in that
that place.
place.
i)
i) The place
place should
should not be crowded because that would
crowded because would facilitate
facilitate the police
police hiding
hiding among people,
among people,
monitoring
monitoring the arms receiving,
receiving, and consequently
consequently arresting
arresting the brother purchasing.
brother purchasing.
j) In case one of the parties
parties is unable
unable to arrive,
arrive, it is essential
essential to prearrange
prearrange an alternative place
alternative place
and time
time with
with the seller.
k) Selecting
Selecting a time suitable purchase so that it does not raise
suitable for the purchase raise suspicion.
suspicion.
l)
1) Prior to purchasing,
purchasing, the seller should be tested
tested to ensure
ensure that he is not an agent of the security
security
apparatus.
apparatus.
m) Preparing
Preparing a place
place for storage
storage prior to purchasing.
purchasing.

2) The Purchase Stage


a) Verifying
Verifying that
that the weapons
weapons are in working
working condition.
condition.
b) Not paying
paying the seller the price
price for the weapons
weapons before
before viewing,
viewing, inspecting, testing them.
inspecting, and testing them.
c) Not telling
telling the seller about the mission
mission for which
which the weapons
weapons are being purchased.
being purchased.
d) Extreme caution should be used during
Extreme caution during the purchasing
purchasing operation
operation in the event of any unnatural
any unnatural
behavior
behavior by the seller or those
those around
around you.
you.
e) Not lengthening time spent with
lengthening the time with the seller. It is important
important to depart
depart immediately
immediately after
purchasing the weapons.
purchasing weapons.

3) The Transport
TransportStage
a) Avoid
Avoid main roads where check
roads where points are common.
check points common.
b) Choose
Choose a suitable time for transporting
suitable time weapons.
transporting the weapons.
c) Observers
Observers should proceed road ahead
proceed on the road ahead of the transportation
transportation vehicle
vehicle for early warning
warning in
case of an emergency.
emergency.
d) Not proceeding
proceeding directly
directly to the storage place until after verifying
storage place verifying there is no surveillance.
surveillance.
e) During transport stage, weapons
During the transport weapons should be hidden
hidden in a way they are inconspicuous
way that they inconspicuous
difficult to find.
and difficult find.
f)
i) The route
route for transporting
transporting the weapons
weapons should be determined
determined very
very carefully.
carefully.
g) Verifying
Verifying the legality
legality of the vehicle,
vehicle, performing
performing its maintenance,
maintenance, checking
checking its gasoline
gasoline and
water levels,
water levels, etc.
h) Driving
Driving the car normally
normally in order
order to prevent
prevent accidents.
accidents.

4) The Storage Stage


a) In order to avoid repeated
repeated transporting,
transporting, suitable
suitable storage places
places should
should be selected.
selected. In case the
materials
materials are bombs
bombs or detonators, they should be protected
detonators, they protected from extreme
extreme heat and humidity.
humidity.
b) Explosive
Explosive materials
materials and detonators
detonators should be separated
separated and stored apart from each other.
c) Caution
Caution should be exercised when putting
exercised when putting detonators
detonators in the arsenal.
arsenal.
d) Lubricating
Lubricating the weapons
weapons and placing
placing them wooden or plastic
them in wooden plastic crates.
crates.

ammunition should be treated


The ammunition treated likewise.
likewise. When
When selecting
selecting an arsenal,
arsenal, consider
consider the following:
following:
1)
1) The arsenal
arsenal should not be in well-protected
well-protected areas,
areas, or close to parks
parks or public
public places.
places.
2) The arsenal
arsenal should not be in a "no-man's-land."
"no-man's-land."
3) The arsenal
arsenal should not be in an apartment used for suspicious
previously used
apartment previously suspicious activities
activities and often
frequented
frequented by security personnel.
security personnel.
4) The arsenal
arsenal should not be a room
room that is constantly
constantly used and cannot
cannot be given upup by family
family
members
members who who do not know nature of the father
know the nature father or husband's work.
husband's work.
5) The apartment
apartment selected
selected as an arsenal
arsenal should be owned Organization or rented
owned by the Organization rented on a
long-term
long-term basis.
6) The brother
brother responsible
responsible for storage
storage should not visit the arsenal
arsenal frequently,
frequently, nor toy
toy with the
weapons.
weapons.
7) The arsenal
arsenal keeper
keeper should record
record in a book all weapons,
weapons, explosive
explosive materials,
materials, and ammunition.
ammunition.
That book should be coded coded and well
well secured.
secured.
8) Only the arsenal
arsenal keeper
keeper and the commander
commander should know the location
should know location of the arsenal.
arsenal.
9) It is necessary
necessary to prepare
prepare alternative
alternative arsenals
arsenals and not leave any
any leads in the original
original arsenals
arsenals to
the alternative
alternative ones.

LESSON- MEMBER SAFETY


7) EIGHT LESSON- SAFETY
Defining
Defining Members Safety:
This is a set of measures
measures taken
taken by members perform undercover
members who perform undercover missions prevent
missions in order to prevent
the enemies
enemies from getting
getting to them.
them. It is necessary
necessary for any
any party
party that has many
many members
members to
subdivide
subdivide its members
members into three groups,
groups, each of which
which has its own security
security measures.
measures. The three
three
groups
groups are:
1)
1) The overt member,
member,
2) The covert
covert member,
member,
3) The commander.
commander.

Measures that Should be Taken by the Overt Member:


1)
1) He should
should not be curious
curious and inquisitive
inquisitive about
about matters
matters that do not concern
concern him.
2) He should
should not be chatty
chatty and talkative
talkative about
about everything
everything he knows
knows or hears.
hears.
3) He should
should not carry
carry on him the names
names and addresses
addresses of those
those members
members he knows.
knows. IfIf he has to,
he should keep them
should keep them safe.
4) During times of security
During times security concerns
concerns and arrest
arrest campaigns
campaigns and especially
especially if his appearance
appearance is
Islamic,
Islamic, he should reduce
reduce his visits to the areas of trouble
trouble and remain
remain at home
home instead.
instead.
5) When
When conversing
conversing on the telephone,
telephone, he should not talk about
about any information that might
any information might be of
use to the enemy.
enemy.
6) When
When sending
sending letters,
letters, he should not mention
mention anyany information
information that might be of use to the
enemy.
enemy. When receiving
receiving letters,
letters, he should burn them
them immediately
immediately after reading them and pour
reading them pour
water on them to prevent
water prevent the enemy
enemy from reading
reading them.
them. Further,
Further, he should destroy
destroy any traces of
any traces
fire so the enemy
fire enemy would
would not findfind out that something
something waswas burned.
burned.

Measures that Should be Taken by the Undercover Member:


In addition
addition to the above
above measures,
measures, the member should...
member should…
1) Not reveal
1) reveal his true name
name to the Organization's
Organization's members
members who are working
working with him, nor to the
[Islamic]
[Islamic] Da'wa
Da'wa [Call].
2) Have
Have a general
general appearance
appearance that does not indicate
indicate Islamic
Islamic orientation
orientation (beard, toothpick, book,
(beard, toothpick,
[long] shirt, small Koran).
Koran).
3) Be careful mention the brothers'
careful not to mention brothers' common
common expressions
expressions or show their behaviors
behaviors (special
(special
praying appearance,
praying appearance, "may Allah
Allah reward
reward you",
you", "peace be on you"
you" while
while arriving
arriving and departing,
departing,
etc.)
4) Avoid
Avoid visiting
visiting famous
famous Islamic
Islamic places
places (mosques,
(mosques, libraries,
libraries, Islamic
Islamic fairs, etc.) Carry
Carry falsified
falsified
personal documents
personal documents and know know all the information
information they contain.
contain.
5)
5)
6)
7)
8)
9) Not resort
resort to utilizing
utilizing letters
letters and messengers
messengers except
except in an emergency.
emergency. Have
Have protection
protection
preceding his visit to any
preceding any place
place while
while moving
moving about (apartment,
(apartment, province,
province, means
means ofof
transportation, etc.). Have complete
transportation, complete and accurate knowledge of the security
accurate knowledge security status related
related to
those around
those place of work
around him in his place work and residence, danger or harm would
residence, so that no danger would catch
catch him
unaware. Maintain
unaware. Maintain his family
family and neighborhood
neighborhood relationships
relationships and should not show any any changes
changes
towards them
towards them so that they
they would
would not attempt
attempt to bring him back [from the Organization]
Organization] for
security
security reasons.
reasons.
10)
10) Not speak loudly.
loudly.
11)
1 1) Not get involved
get involved in advocating
advocating good and denouncing
denouncing evil in order not to attract
attract attention
attention to
himself.
himself.
12)
12) Break
Break the daily routine,
routine, especially when performing
especially when performing an undercover
undercover mission.
mission. For example,
example,
changing
changing the departure
departure and return
return routes,
routes, arrival
arrival and departure
departure times,
times, and the store where
where he
buys his goods.
goods.
13)
13) Not causing
causing any
any trouble
trouble in the neighborhood
neighborhood where
where he lives or at the place
place of work.
work.
14)
14) Converse
Converse on the telephone
telephone using
using special code so that he does not attract
attract attention.
attention.
15)
15) Not contacting
contacting the overt members
members except
except when necessary. Such contacts
when necessary. contacts should be brief.
16)
16) Not fall into the enemy's
enemy's excitement trap, either through
excitement trap, praising or criticizing
through praising criticizing his
Organization.
Organization.
17)
17) Performing
Performing the exercises
exercises to detect surveillance whenever
detect surveillance whenever a task is to be performed.
performed.
18)
18) Not park
park in no-parking
no-parking zones take photographs
zones and not take where it is forbidden.
photographs where forbidden.
19)
19) Closing
Closing all that should be closed
closed before
before departing
departing the place,
place, whether
whether at home
home or his place of
place of
undercover work.
undercover work.
20) Not undergo
undergo a sudden
sudden change
change in his daily routine
routine or any
any relationships precede his Jihad
relationships that precede
involvement.
involvement. For example, there should not be an obvious
example, there obvious change
change in his habits
habits of conversing,
conversing,
movement, presence,
movement, presence, or disappearance.
disappearance. Likewise,
Likewise, he should not be hasty to sever his previous
previous
relationships.
relationships.
21) Not meet in places where there
places where there are informers,
informers, such as coffee
coffee shops, and not live in areas
close to the residences
residences ofof important personalities, government
important personalities, government establishments,
establishments, and police
police
stations.
stations.
22) Not write
write down on anyany media,
media, especially
especially on paper,
paper, that could show the traces
traces and words
words of
pen by rubbing
the pen rubbing the paper
paper with lead powder.
powder.

Commander:
Measures that Should be Taken by the Commander:
The commander,
commander, whether
whether in overt or covert work,
work, has special
special importance
importance for the following
following
reasons:
reasons:
1)
1) The large amount
amount of information
information that he possesses.
possesses.
2) The difficulty
difficulty of the command
command in replacing
replacing the commander.
commander.
3) Therefore, previously mentioned
Therefore, all previously mentioned security precautions regarding
security precautions regarding members
members should
should be
heightened
heightened for the commander. resources should be reserved
commander. Many resources reserved for protecting
protecting the
commanders.
commanders.

Importance Information:
Importance of Information:
1)
1) Based
Based on the enemy's up-to-date information,
enemy's up-to-date information, his capabilities,
capabilities, and plans,
plans, the Organization's
Organization's
command
command can design
design good-quality
good-quality and secure plans.
plans. [7]
[7] Abdullah Al-Salama: Military
Abdullah Ali Al-Salama: Military
Espionage
Espionage in Islam, pp. 253- 258.
Islam, pp.
2) Information
Information about the enemy's
enemy's intention provides early warning
intention provides warning signs for the command, which
command, which
in turn makes
makes appropriate preparation and thwarts
appropriate preparation thwarts the enemy's
enemy's opportunity.
opportunity.
3) Information
Information benefits
benefits the Organization's
Organization's command
command by providing
providing information
information about the enemy's
enemy's
strengths
strengths and weaknesses.
weaknesses.
4) Information
Information benefits
benefits the Organization's
Organization's command
command by providing
providing information
information about
about movements
movements
of the enemy
enemy and his members.
members.

Information requirements
Information requirements include:
Newness, Trustworthiness,
Newness, Trustworthiness, Forthcoming,
Forthcoming, security,
security, and confirmation.
confirmation. General Mahmoud Sheet
General Mahmoud
Khattab nation that wants
Khattab said, "The nation wants to achieve
achieve victory
victory over its enemy
enemy must know
know that enemy
enemy
very
very well.
well. It also must know
know the site of the battle in detail.
detail. Those
Those who fight
fight an enemy
enemy that they
they
do not know,
know, do not win because
because a successful
successful military plan must
military plan built on clear and
must be built
trustworthy information.
trustworthy information. The commander
commander who fights
fights an enemy
enemy and does not know
know his strength
strength
(number
(number and material)
material) is blind and destined
destined to fail and fall.

Information Sources:
Information
Any organization
Any organization that desires
desires to raise the flag
flag of Islam high and proud,
proud, must gather
gather as much
much
information
information as possible
possible about
about the enemy.
enemy. Information two sources:
Information has two sources:

1)
1) Public Source: Using this publicpublic source openly
openly and without
without resorting
resorting to illegal
illegal means,
means, it is
possible to gather
possible gather at least 80% of information about the enemy. percentage varies
enemy. The percentage varies
depending
depending on the government's policy on freedom
government's policy freedom of the press
press and publication.
publication. It is possible
possible to
gather
gather information
information through newspapers, magazines,
through newspapers, magazines, books,
books, periodicals,
periodicals, official publications, and
official publications,
enemy
enemy broadcasts.
broadcasts. Attention
Attention should
should also be given to the opinion,
opinion, comments,
comments, and jokes of of
common people. Truman,
common people. Truman, a past
past American
American President,
President, said, "We attribute
attribute our great advance
advance to
our press,
press, because
because it gives America's
America's enemies
enemies the capability
capability ofof learning
learning what
what we have not
officially publicized about our plans
officially publicized establishments. " In 1954,
plans and even our establishments." 1954, Allan
Allan Dulles
Dulles [PH],
Director
Director of American
American Intelligence
Intelligence [CIA], said, "I am ready
ready to pay
pay any
any amount
amount of
of money
money to
obtain
obtain information
information about the Soviet Union,
Union, even as little as what the Soviet Union
Union obtains
obtains by
simply reading American
simply reading newspapers." The one gathering
American newspapers." public information
gathering public information should
should be a regular
regular
person (trained
person (trained college
college graduate) who examines
graduate) who examines primary
primary sources
sources of information published by the
information published
enemy
enemy (newspapers,
(newspapers, magazines, radio, TV, etc.). He should search for information
magazines, radio, information directly
directly
related to the topic
related topic in question.
question. The one gathering
gathering information
information with
with this public
public method
method is not
exposed
exposed to anyany danger
danger whatsoever.
whatsoever. Any brother
brother can gather
gather information
information from those
those
aforementioned
aforementioned sources.
sources. We cannot
cannot label that brother
brother a "Moslem
"Moslem Spy" becausebecause he does not make
any
any effort
effort to obtain unpublished and covert
obtain unpublished covert information.
information.

2) Secret Sources: It is possible,


possible, through
through these
these secret and dangerous
dangerous methods,
methods, to obtain
obtain the 20%
of information that is considered
considered secret. The most
most important
important of these
these sources
sources are:
Individuals who are recruited
A. Individuals recruited as either volunteers
volunteers or because
because of other motives
motives
B. Recording
Recording and monitoring
monitoring
C. Photography
Photography
D. Interrogation
Interrogation
E. Documents:
Documents: By burglary
burglary or recruitment
recruitment of personnel
personnel
F.
F. Drugging
Drugging
G. Surveillance,
Surveillance, spying,
spying, and observation
observation

Information Gathering Using Public


Information Public Means:
Means:
Official and Party
A. Newspapers, Magazines, and Official Party Publications:
In order
order to gather
gather enemy
enemy information,
information, the Military
Military Organization
Organization can use means
means such as
magazines,
magazines, publications,
publications, periodicals,
periodicals, and official printed matter.
official printed matter. Through
Through these
these means,
means, it is
possible to learn about major
possible major government
government events
events and about the news,
news, meetings,
meetings, and travel
travel of
Presidents,
Presidents, ministers,
ministers, and commanders.
commanders. Information
Information may
may be:
1) Names and photographs
1) Names photographs of important
important government
government personalities,
personalities, police
police commanders,
commanders, and
security
security leaders.
leaders.
2) Published meetings. Through
Published meetings. Through these,
these, one can learn about major
major decisions
decisions and topics
topics being
discussed.
discussed.
3) Future
Future meeting
meeting plans.
plans.
4) Present
Present and future
future enemy
enemy capabilities through current
capabilities through photographs of
current photographs of projects
projects and strategic
strategic
sites or through
through meetings
meetings with top
top officials.
officials.
5) Beneficial news about the enemy's
Beneficial news enemy's diplomacy
diplomacy and its present
present and future plans.
future plans.
6) Tourism
Tourism news
news and the arrival
arrival times
times of foreign tourist group
foreign tourist group
7) Advertisements
Advertisements about apartments
apartments for rent,
rent, vacant
vacant positions,
positions, or anything
anything else that
that is useful.
useful.
Advertisements about new and used car lots. These
8) Advertisements may be used
These may used in assassination, kidnaping,
assassination, kidnaping,
and overthrowing
overthrowing the government.
government.
9) Learning
Learning the enemy position on current
enemy position current Islamic
Islamic issues (veil, beard,
beard, dedication,
dedication, Jihad).
Jihad).

Television:
B. Radio and Television:
The Military
Military organization
organization can use these
these important public sources
important public sources to gather
gather information
information all day
night. The importance
and night. importance of these
these means
means is explained
explained below.
below.
1)
1) Visual
Visual and audible
audible news
news help the Organization
Organization to determine
determine its present
present and future plans.
future plans.
2) Interviews
Interviews may
may help to identify
identify the government
government policy
policy and its general
general directives.
directives.
3) Spotting
Spotting the appearance
appearance of those
those who occupy
occupy high positions.
positions.
4) Learning
Learning the prevailing
prevailing information
information diplomacy
diplomacy and its position
position on contemporary
contemporary issues.
issues.
5) Learning
Learning about the interior
interior of important
important government
government places
places and establishments
establishments during
during their
opening
opening ceremonies
ceremonies or through
through advertisements.
advertisements. In addition
addition to the aforementioned,
aforementioned, [attention
[attention
should be given] newspapers, magazines,
given] to newspapers, magazines, and the public's
public's comments
comments and jokes.
jokes.

8) TWELFTH LESSON LESSON -- ESPIONAGE


INFORMATION-GATHERING USING USING COVERT METHODS
Information
Information needed
needed through
through covert
covert means:
means: Information
Information needed
needed to be gathered
gathered through
through covert
covert
means
means is of only two types:
types:
First: Information
Information about government personnel, officers,
government personnel, officers, important personalities, and all matters
important personalities, matters
related to those
related those (residence, work place,
(residence, work place, times
times of leaving returning, wives
leaving and returning, wives and children,
children, places
places
visited)
visited)
Second:
Second: Information
Information about strategic
strategic buildings,
buildings, important
important establishments,
establishments, and military
military bases.
bases.
Examples
Examples are important
important ministries
ministries such as those ofof Defense
Defense and Internal
Internal Security,
Security, airports,
airports,
seaports,
seaports, land border
border points,
points, embassies,
embassies, and radio and TV stations.
stations.

General security measures that should be taken by the person information:


person gathering information:
During
During the process
process of gathering
gathering information, whether about governing
information, whether governing personalities
personalities or
establishments,
establishments, the person
person doing the gathering
gathering must take the following
following security
security measures:
measures:

1)
1) Performing exercises to detect surveillance while
Performing the exercises while executing
executing the mission.
mission. These
These exercises
exercises
are not well
well defined,
defined, but are dependent
dependent on the time,
time, place,
place, and the ability
ability to be creative.
creative. These
These
exercises
exercises include
include the following:
following:
a)
b)
c)
C)
d)
e) Walking
Walking down a dead-end
dead-end street and observing
observing who is walking
walking behind
behind you.
you. Beware
Beware ofof traps.
traps.
Casually
Casually dropping
dropping something
something out of your pocket and observing
your pocket observing who will pick it up.
up. Walking
Walking fast
then stopping
then stopping suddenly
suddenly at a corner
comer and observing who will be affected.
observing who affected. Stopping
Stopping in front of store
windows and observing
windows who is-watching
observing who you. Getting
is-watching you. Getting on a bus and then getting
getting off after it
departs
departs and observing
observing who will be affected.
affected.

f) Agreeing
Agreeing with one of your brothers to look for whoever
your brothers whoever is watching
watching you.
you.
2) When
When receiving
receiving the gathered information, let the informants
informants travel
travel as far as possible
possible from
their
their place
place ofof residence
residence and yours.
yours. Let each of them
them get
get there using secondary
there using roads, preferably
secondary roads, preferably
at night.
night.
Gather what
3) Gather what information
information youyou can without
without emphasizing
emphasizing any particular part.
any particular part. Do not rush or
show urgency because your
urgency because your excitement
excitement may uncover you
may uncover you and the degree
degree of importance
importance of the
information.
information.
4) Avoid
Avoid anything
anything that reveals your identity
reveals your identity quickly.
quickly. Do not attempt
attempt to be too creative
creative or
inventive.
inventive. Remember
Remember what what Taliran
Taliran [PHI] said to his political
political emissaries,
emissaries, "Do not be anxious.”
anxious.”
5) Move
Move slowly and travel travel a great
great distance.
distance. The one who is successful
successful in gathering
gathering information
information is
the one who is not known known or conspicuous.
conspicuous.
6) Do not accept
accept events
events at their face value.
value. Do not overlook
overlook a quick
quick friendship
friendship or an apparent
apparent
dispute.
dispute. Evaluate
Evaluate the importance events and do not judge them by their
importance of events their appearance.
appearance.
7) Do not speak vaguely
vaguely or act mysteriously
mysteriously except when wanting
except when wanting to get a "blabber
"blabber mouth"
mouth" to
talk about whatwhat he knows.
knows.
8) Carry
Carry personal
personal credentials know all their contents.
credentials and know contents.
9) Prior to collecting
collecting the information,
information, make
make sure that all necessities
necessities related
related to the mission,
mission,
especially
especially money,
money, are ready.
ready.
10)
10) Study the area where where information-gathering
information-gathering takestakes place
place carefully:
carefully: Open and closed
closed streets,
streets,
residents' customs,
residents' ways of dressing,
customs, ways dressing, and accent.
accent.
11)
I 1) It is not permitted
permitted to carry
carry any
any weapons
weapons during
during the information
information gathering
gathering process.
process.
12)
12) Finding
Finding a cover prior to gathering
cover prior gathering the information.
information. Further, review all security
Further, review measures
security measures
concerning
concerning members
members of the Military
Military [Organization]
[Organization] which
which are covered
covered in prior
prior lessons.
lessons.

Methods of Gathering Information Using


Gathering Information Using Covert Means:

The Military
Military Organization
Organization may
may obtain
obtain secret information
information using:
using:
A. Surveillance,
Surveillance, intelligence,
intelligence, and observation;
observation;
B. Theft:
Theft:
C. Interrogation;
Interrogation;
D. Excitement;
Excitement;
E. Drugging;
Drugging;
F.
F. Recruitment.
Recruitment.
A. Surveillance,
Surveillance, Intelligence,
Intelligence, and Observation:
Observation: Civilian
Civilian and military targets (personalities).
military targets (personalities). The
monitoring
monitoring may
may be done on foot or by car.

Surveillance on foot:
1)
1) The brother
brother or brothers performing the surveillance
brothers performing surveillance operation
operation on foot study the available
available
information
information about the targettarget (height, weight, way
(height, weight, way of walking,
walking, looking
looking at a recent
recent photograph)
photograph)
2) Knowing
Knowing the target's
target's habits, places he visits,
habits, places visits, and communications
communications
3) Studying
Studying carefully
carefully the area where
where observation
observation will take place:
place: names
names of through
through and dead-end
dead-end
streets,
streets, residents'
residents' habits
habits and way
way of dressing.
dressing.
4) Prior to the start of the surveillance
surveillance mission,
mission, making
making sure that all needs
needs related
related to the mission,
mission,
especially
especially money,
money, are met.
5) Agreeing on how communications
5) Agreeing communications withwith the leaders
leaders will take
take place
place in case the surveillance
surveillance
plan is uncovered
plan uncovered (telephone,
(telephone, a person used for that purpose).
person used purpose). The telephone
telephone number
number should
should not
be written
written but memorized.
memorized.
6) Agreeing
Agreeing on special signals
signals to exchange
exchange orders
orders and instructions
instructions among
among the surveillance
surveillance team
members.
members.
7) Knowing
Knowing the measures taken when
measures to be taken when the target
target is lost, such as contacting
contacting the leaders
leaders or
something
something else agreed upon.
agreed upon.
8) It is not permitted
permitted to carry
carry any weapons during
any weapons during the information
information gathering process.
gathering process.
9) It is preferable
preferable to have a camera
camera with the surveillance
surveillance man in case the target is to personally
personally
contact
contact others.
others.

Surveillance by car:car:
Surveillance
Surveillance by car requires
requires taking
taking certain
certain measures:
measures:
1)
1) Inspecting
Inspecting the car's fuel,
fiiel, water,
water, and lights.
lights.
2) The car should be of a common
common typetype so it would
would not attract
attract people's
people's attention.
attention.
3) The car should be in good condition
condition and the driver should be experienced.
experienced.
4) The car plates
plates should not contain numbers. It is important
contain real numbers. important to use a false license plate and
license plate
small numbers
numbers in order to prevent
prevent anyone
anyone from spotting
spotting and memorizing
memorizing it.
it.
5) The car's interior
interior light should be disabled
disabled in order to hide the identity
identity of the surveillance team
surveillance team
members sitting inside.
members inside.
6) The number
number and appearance
appearance of the car surveillance team members
surveillance team members should match those of the
match those
target's car.
target's

Performing Surveillance by Car: Car:


1) The car being used
1) used for surveillance
surveillance should keep
keep up
up with the target’s
target’s car during
during the
surveillance
surveillance operation,
operation, especially
especially in crowded
crowded areas and on side streets.
streets. The distance
distance between
between the
two cars depends
depends on the circumstances.
circumstances.
2) If the target
target gets out of his car and starts to walk, of the surveillance
walk, one of team members
surveillance team members should
get out and observe
observe him.
3) Follow
Follow all aforementioned
aforementioned measures
measures for surveillance
surveillance on foot.

Exercises to detect surveillance by car:car:


1)
1) The surveillance
surveillance car speeds up then stops suddenly
up then suddenly while
while observing
observing which
which other car is
affected
affected (this is done where
where there
there is not a lot of traffic).
traffic).
2) The surveillance
surveillance car enters
enters a dead-end
dead-end street.
3) The surveillance
surveillance car goes
goes in the opposite
opposite direction of traffic.
direction of traffic.
4) The surveillance
surveillance car stops and goes
goes backwards.
backwards.
5) [The surveillance
surveillance car] enters
enters a parking
parking lot and immediately
immediately goesgoes out.
6) [The surveillance takes a side road and stops.
surveillance car] takes stops.

Surveillance, Intelligence,
Intelligence, and Observation (Information about the enemy enemy places)
The Organization’s
Organization’s command needs detailed
command needs detailed information
information about
about the enemy‘s
enemy‘s vital establishments,
establishments,
whether civilian
whether civilian or military,
military, in order to make safe plans,
plans, reach
reach firm
firm decisions,
decisions, and avoid
surprises.
surprises. Thus,
Thus, the individual who gathers
individual who gathers information
information about a desired
desired location
location should,
should, in
addition
addition to drawing
drawing a diagram,
diagram, describe
describe it and all its details.
details.

The Drawing: The brother


brother should draw a diagram
diagram of the area,
area, the street, and the location which
location which
target of the information-gathering.
is the target information-gathering. He should
should describe
describe its shape and characteristics.
characteristics. The
drawing
drawing should be realistic
realistic so that someone who never
someone who never saw the location
location could
could visualize
visualize it. It is
preferable to also put on the drawing
preferable drawing the directions
directions of traffic,
traffic, police
police stations,
stations, and security
security
centers.
centers.

The Description: It is necessary


necessary to gather
gather as much information
information about the location
location as possible.
possible.
For instance:
instance:
1)
1) Traffic
Traffic directions
directions and how wide the streets are
2) Transportation
Transportation leading
leading to the location
location
3) The area,
area, appearance,
appearance, and setting of the place
place
4) Traffic
Traffic signals
signals and pedestrian
pedestrian areas
5) Security
Security personnel
personnel centers
centers and government
government agencies
agencies
6) Embassies
Embassies and consulates
consulates
7) The economic characteristics of the area and traffic
economic characteristics traffic congestion
congestion times
times
8) Public parks
Public parks
9) Amount
Amount and location
location of lighting
lighting

It is preferable
preferable to photograph
photograph the area as a whole
whole first, then the street of the [desired]
first, then [desired] location.
location. If
possible, panoramic
possible, panoramic pictures
pictures should be taken.
taken. That is, the collection
collection of views
views should be
continuous
continuous in a such way
way that all pictures
pictures are taken
taken
location and that the ending
from one location ending of one picture
picture is the beginning
beginning of the next. The
photographer should be experienced
photographer experienced with and proficient film processing
proficient in film processing and developing.
developing. It is
risky to use an outside
risky outside film processing service.
film processing service. When
observing
observing a military
military installation
installation or camp,
camp, we discourage taking pictures
discourage taking pictures where
where it is forbidden.
forbidden.
The brother/photographer
brother/photographer should use a modern
modern camera
camera that can photograph
photograph at night
night or from a
distance,
distance, and only the lens of the camera
camera should
should be visible.
visible. When
When gathering
gathering information
information about
about a
military camp, the brother
military camp, brother should draw a diagram
diagram of the camp’s
camp’s overall
overall area,
area, the camp
camp itself, and
its interior, if possible
interior, if possible

The description of the base or camp camp must contain the following:
following:
1)
1) Location
Location
2) Exterior
Exterior shape
3) Transportation
Transportation to it
4) Space [area]
5) Weapons used
Weapons used
6) Unit using
using the camp
camp
Fortificationsand tunnels
7) Fortifications tunnels
8) Guard posts
Guard posts
9) Amount
Amount and periods
periods of lighting
lighting
10) Number of soldiers
10) Number soldiers and officers.
officers. Officers’
Officers’ ranks
ranks
11) Ammunition depot locations
1 1) Ammunition locations
12)
12) Vehicles
Vehicles and automobiles
automobiles
13)
13) Leave policy
Leave policy
14)
14) Commander name, rank,
Commander name, rank, arrival
arrival and departure
departure times
times
15)
15) Degree
Degree and speed of mobilization
mobilization
16)
16) Brigades
Brigades and names of companies
names of companies
17)
17) Sleeping waking times
Sleeping and waking times
18)
18) Telephone
Telephone lines and means
means of communication
communication
The brother
brother gathering
gathering the information
information maymay start a friendship
fiiendship with one of the soldiers
soldiers or officers
officers
of that base. Information
Information may
may be collected
collected gradually
gradually and easily from soldiers
soldiers when
when giving them
giving them
rides from the camp
rides camp to the bus or train stations,
stations, etc.

Gathering Information Through Interrogation:


Gathering Information Interrogation:
Security
Security personnel
personnel in our countries
countries arrest brothers
brothers and obtain needed information
obtain the needed through
information through
interrogation
interrogation and torture.
torture. The Military
Military Organization
Organization must do likewise.
likewise. On one hand, the
Organization
Organization can obtain
obtain important
important information
information about enemy
enemy establishments
establishments and personnel.
personnel. On
the other hand,
hand, that is a form of necessary
necessary punishment.
punishment. Information
Information is collected
collected in this method
method by
kidnaping an enemy
kidnaping enemy individual,
individual, interrogating
interrogating him, and torturing
torturing him. This source of information
information
is not permanent.
permanent. Also,
Also, caution
caution should
should be exercised
exercised about
about being
being deceived
deceived by misinformation
misinformation
from enemy
enemy individuals.
individuals. Thus, the brother
brother who interrogates
interrogates the hostage
hostage should
should possess the
possess
following
following characteristics:
characteristics:
1)
1) Should
Should have knowledge
knowledge and expertise
expertise about people's
people's behavior
behavior and morals.
morals.
2) Should have a strong personality.
Should have personality.
3) Should possess a sixth sense based
Should possess based on practice
practice and experience.
experience.
4) Should
Should be extremely patient.
extremely patient.
5) Should
Should be able to act, pretend,
pretend, and mask himself.
himself.
6) Should
Should be intelligent,
intelligent, observant,
observant, analytical,
analytical, and deductive.
deductive.
7) Should
Should be able to establish
establish an investigative plan.
investigative plan.

Gathering Information Through Recruitment:


Gathering Information Recruitment:
Recruiting
Recruiting agents dangerous task that an enlisted
agents is the most dangerous enlisted brother
brother can perform.
perform. Because
Because of this
dangerous task, the brother
dangerous task, may be killed
brother may killed or imprisoned.
imprisoned. Thus, the recruitment
recruitment task must be
performed by special types
performed types of members.
members. There
There are a number
number of motives
motives that might
might entice
entice an
uncommitted person to take part
uncommitted person part in intelligence work.
intelligence work.
These
These motives
motives are:
1)
l) Coercion
Coercion and entanglement
entanglement
2) Greed
Greed and love for money
money
3) Displaying
Displaying courage
courage and love of adventure
adventure
4) Love of amusement
amusement and deviance
deviance
5)
5) Mental
Mental and political
political orientation
orientation
6) Fear of being
being harmed
harmed
The Organization
Organization may
may use motives
motives No. 2, 3, 5, and 6 in recruitment.
recruitment.

Summary
Summary of Books
Books and Guides
Guides of the Enemy:
Enemy:
Rules
Rules for Radicals
Radicals –7 Saul Alinsky
Alinsky
Das Kapital
Kapital –7 Karl Marx
The Little Red Book 7 – Mao Zedong
Zedong
„Open
”Open Society“
Society“ Strategy
Strategy Documents
Documents
United Nations Agenda
United Nations Agenda 21, 2030 etc.
The Protocols
Protocols of the Elders
Elders of Zion
Zion (unclear
(unclear origin
origin but
nevertheless studied
nevertheless studied by the Enemy)
Enemy)

II. War Knowledge from Neutral, Historical or Allied Sources


War Tactics and Background Knowledge
The following
following list of books recommended as background
books is recommended background information
information for the more knowledge
knowledge
hungry
hungry leadership
leadership forces:
forces:
100
100 Years
Years Together
Together 7– Alexander
Alexander Solzhenitsyn
Solzhenitsyn
The International
International Jew 7– Henry
Henry Ford
On War –7 General
General Carl von Clausewitz
Clausewitz
The Art of War –7 Sun Tzu
New Lies for Old –7 Anatoliy
New Anatoliy Golitysn
Golitysn
Databanks 31:
Online Resources and Databanks 31:
IT IS A PRIORITY TO SAVE SAVE THESE RESOURCES AND AND COPY THEM SO THAT THE
DATA IS MIRRORED OFFLINE. DO NOT
DATA NOT ACCESS
ACCESS THESE
THESE RESOURCES
RESOURCES WITHOUT
WITHOUT
INITIAL
INITIAL OPSEC
OPSEC PRECAUTIONS
PRECAUTIONS OR FULL COMMITTMENT COMMITTMENT TO THE CAUSE. CAUSE. It is ideal
that this manual
manual be given
given to you
you in a printed
printed version,
version, although you should remain
although you remain calm, focused
focused
and determined until the final
determined until victory if it has been
final victory been given
given to you
you via an online
online source.

1)
1) https://archive.org/details/military-manuals
https.'//archive.org/details/military-manuals
Military Manuals -- booby
booby traps,
traps, improvised
improvised munitions,
munitions, unconventional warfare devices
unconventional warfare devices and
techniques, marksmanship
techniques, marksmanship and ballistics
ballistics

2) https://8ch.net/pdfs/res/6071.html#9096
https://8ch.net/pdfs/res/607 1.html#9096
Terrorist's Handbook –7 A definitive
The Terrorist's definitive guide
guide to manufacturing
manufacturing most weapons
weapons and materials
materials
needed for active
needed resistance measures.
active resistance measures. Do not let the name
name confuse
confuse you,
you, as an SS member
member your
your
aims are noble
noble and your
your motives
motives pure.
pure. Terror
Terror is not to be strived towards,
towards, rather
rather victory
victory is. Do
allow your
not allow your enemy
enemy to label you terrorist thereby granting them power.
you as a terrorist If seeking
power. If seeking a
name for this handbook
name handbook in discussion
discussion it is recommended
recommended to frame
frame it as „Resistance
,,Resistance Fighter”
Fighter” or
„Freedom
”Freedom Fighter”
Fighter” Handbook.
Handbook.

31
31 Warning: these resources
Warning: these resources should be downloaded
downloaded and stored on a safe medium
medium preferably
preferably in a
radiation proofed
radiation proofed room
room (i.e. Faraday
Faraday cage, concrete walled
cage, concrete walled basement
basement or bunker).
bunker). The enemy
enemy has
been attacking
attacking archival
archival services
services and therefore
therefore the saving of online
online resources
resources is to be prioritized.
prioritized.

3)
https://web.archive.org/web/20080302034604/http://www.bellum.nu:80/literature/tacayan.html
https://web.archive.org/web/20080302034604/http://www.bellum.nu:80/literature/tacayanhtml
CIA psyops
psyops in guerilla warfare.
guerilla warfare.
4)
https://web.archive.org/web/20080228200118/http://www.bellum.nu:80/literature.html
https://web.archive.org/web/200802282001 18/http://www.bellum.nu:80/literature.html
Classic
Classic tomes warfare theory, modern
tomes on conventional warfare modern ones on guerilla warfare tactics
guerilla warfare tactics

5) https://8ch.net/k/res/480825.html#557006
https://8ch.net/k/res/480825.html#557006
Scientific Principles of Improvised Warfare
Scientific Warfare and Home
Home Defense,
Defense,
Volumes
Volumes 1-6 1-6

6) https://8ch.net/k/res/480825.html#555519
https://8ch.net/k/res/480825.html#555519
To Break a Tyrant's
Tyrant's Chains

7) https://8ch.net/k/res/480825.html#480994
https://8ch.net/k/res/480825.html#480994
Rhodesian Drake
Drake Shooting
Shooting

8) https://www.survivalschool.us/survival-info/militarymanuals-pdf/
https://www.survivalschool.us/survival-info/militarymanuals-pdf/
Almost every
Almost US. ZOG Field Manual and Training Manual
every U.S.

9) https://archive.fo/qPAPo
https://archive.fo/qPAPo
A summary discussion of many
summary and discussion many of the above resources.
resources. This list can be extended
extended or
shortened result of personal
shortened as a result personal research
research into the topics
topics mentioned.
mentioned. On the following page a
following page
definitive introduction
definitive introduction into classical National Socialist
classical National Socialist ideology
ideology is presented.
presented. It is essential
essential that
every
every single person understand and form their
person understand their own beliefs
beliefs and being,
being, in order to be able to
combine
combine and rationally,
rationally, yet critically,
critically, analyze
analyze as many
many different perspectives as possible.
different perspectives possible. This,
purpose behind
after all, is the purpose behind Idealism:
Idealism: the development
development of of the human
human thought process and
thought process
striving
striving for perfect truth und its natural
perfect truth natural consequences
consequences and idealized
idealized systems.
systems.
THE LITERATE
NATSOB
ADOLF HITLER

IIIII

HITlERS'.” 27'

1“
ZWEITESXS‘
4

TWOEWEHH BUCH
”NW" '
"

AIHu-n Rust-Man»;

Germany
Illl'
Reborn \‘l/I 50/1
h I.“ .u um“,

You might also like