SS Werwolf, Combat Instruction Manual
SS Werwolf, Combat Instruction Manual
SS Werwolf, Combat Instruction Manual
Contents
Contents
I. The Guerrilla
Guerrilla War
A. Nature
Nature of Guerrilla
Guerrilla Warfare………………………….
Warfare ............................... 01
01
B.
B. Organization……………………….............................
Organization ........................... 02
C.
C. Command
D.
D. Prospects
Principles
Prospects of Success
..........................
Command Principles……………….............................
Success and Boundaries………………..
03
03
Boundaries .................... 06
Leaders
II.
II. Formation
Formation of Guerrilla
Guerrilla Units
A. General
General Requirements……………………………….
Requirements ..................................... 07
B.
B. Leaders……………………………............................ 07
C.
C. Men………………………………………………….
Men .......................................................... 07
D.
D. Order of Battle……………………............................
Battle ............................. .. 07
E.
E. Armament…………………………............................
Armament .............................. 08
F.
F. Equipment…………………………………………..
Equipment .................................................. 09
G.
G. Clothing……………………………………………..
Clothing ..................................................... 09
III. Training
Training
A. Fundamentals……………………………………….
Fundamentals .............................................. 10
10
B.
B. Utilization
Utilization of Terrain
Terrain and Camouflage……………..
Camouflage ................. 10 10
C.
C. Navigation
Navigation in Terrain……………………………….
Terrain ..................................... 15
15
D.
D. Reporting
Reporting and Communications……………………
Communications ........................ 17 17
E.
E. Close-Quarter Battle………………………………..
Close-Quarter Battle ...................................... 18
18
F.
F. Roadblocks…………………………………………
Roadblocks ................................................ 19
19
IV. Tactics
Tactics
A. Reaching
Reaching the Operational
Operational Areas……………………..27
Areas ..........................27
B.
B. Selection
Selection of Targets
Targets for Destruction
Destruction and Combat….
Combat. . .. 29
C.
C. Reconnaissance
Reconnaissance and Intelligence…………………...
Intelligence ........................ 29
D.
D. The March………………………………………….
March ................................................. 31 31
E.
E. Checkpoints
Checkpoints for Planning…………………………..
Flaming ................................ 33
F. Interdiction
Interdiction Operations……………………………..
Operations ................................... 33
G.
G. Ambush……………………………………………..
Ambush ..................................................... 35
H.
H. Raids…………………………………………………
Raids ......................................................... 39
I. Disengagement……………………………………..
Disengagement ............................................ 40
Securing the Rest Area
J. Securing Area……………………………..
................................... 42
K.
K. Protection Against Countermeasures………………
Protection Against Countermeasures .................. 43
V.
V. Action Against Enemy
Action Against Enemy Agitation……………………....
Agitation ............................ 44
VI. Accommodation
Accommodation and Food Supply Supply
A. Shelters……………………………………………..
Shelters ..................................................... 46
B.
B. Heating
Heating and Cooking
Cooking Fires…………………………
Fires .............................. 50
C.
C. Water……………………………………………….
Water ....................................................... 51
51
D.
D. Latrine
Latrine and Waste………………………………….
Waste ........................................ 5151
E.
E. Food Supply,
Supply, Sustenance………………………….
Sustenance ............................... 51 51
F. Emergency
Emergency Rations………………………………..
Rations ...................................... 54
Appendix 1:
Appendix 1: Guidelines
Guidelines for the Equipment
Equipment of the Guerrilla
Guerrilla
Soldier………………………………………………………………..
Soldier .......................................................................... 55
55
Appendix 2:
Appendix 2: Instructions of the March
Instructions for the Use of March Compass……….
Compass .......... 57
Appendix 3:Airborne
Appendix 3: Airborne Operations……………………………............
Operations.........................r................... 58
Appendix A: Digital
Appendix Digital and Modern
Modern Methods………………………….
Methods ............................... 59
59
Appendix B: Modern
Appendix Modern Weapons
Weapons Outline
Outline
Appendix C: Enemy
Appendix Enemy Tactics
Tactics and Guerrilla
Guerrilla War
Guerrilla War
I. The Guerrilla
of Guerrilla Warfare
11.. Nature of
The guerrilla
guerrilla war that is conducted
conducted in a hard, determined
determined fashion,
fashion, and with
with clear political
political aims, is
an effective
effective means
means to assist one’s own military,
military, and political
political struggle,
struggle, and to harass
harass and paralyze
paralyze
the enemy’s
enemy’s war effort,
effort, economy
economy and politics
politics through
through military
military subsidiary
subsidiary actions.
actions. In the guerrilla
guerrilla
of numbers
war the lack of numbers and material
material is compensated
compensated for through
through special
special combat tactics, better
combat tactics, better
knowledge of the land, daring
knowledge daring decisions,
decisions, cunning
cunning deception
deception and utmost
utmost determination.
determination.
The guerrilla
guerrilla war is not a momentary
momentary substitute,
substitute, but an essential part of modern
essential part warfare. In
modern warfare.
desperate
desperate situations
situations it is the ultimate
ultimate means
means to defend
defend freedom
freedom and life of nation
nation to the utmost.
utmost.
Conducted
Conducted conjunction with general
conjunction with general military
military operations,
operations, clear political
political objectives
objectives and qualified
qualified
means
means the guerrilla
guerrilla war can lead to success
success of decisive
decisive importance.
importance. This is particularly
particularly the case
in a long war and in times
times of political upheaval.
political upheaval.
The guerrilla
guerrilla war is conducted
conducted in the frontline, flanks, but most of all in the rear
frontline, the flanks, rear of the enemy
enemy
and his country,
country, in enemy
enemy occupied
occupied areas and in countries
countries that are allied with
with the enemy
enemy or are
important
important to his war effort,
effort, economy
economy and politics.
politics.
Aims of guerrilla
Aims of warfare are:
guerrilla warfare
a) To harass,
harass, lie down
down and destroy
destroy enemy
enemy forces.
forces.
b) To harass
harass and destroy
destroy the enemy’s
enemy’s supplies,
supplies, his transport
transport means,
means, his communications
communications
network, and his industrial
network, industrial and supply facilities.
facilities.
c) To exterminate
exterminate all the enemy’s
enemy’s helpers
helpers and frustrate
frustrate all enemy
enemy measures through ruthless
measures through ruthless
combat.
combat. Violence
Violence against
against terror!
terror!
d) To support
support any regular army
any regular army reconnaissance,
reconnaissance, intelligence
intelligence and espionage.
espionage.
1
2. Organization
The organization
organization of guerrilla
guerrilla warfare
warfare has to adapt to the war situation,
situation, the terrain
terrain and the extent
extent
of control
control that the enemy
enemy exerts over the operational
operational area.
a) The guerrilla
guerrilla war is supported
supported by frontline troops through
frontline troops through raids,
raids, reconnaissance
reconnaissance patrols
patrols
and special assault
assault detachments.
detachments. Cut off off units,
units, groups
groups of stragglers
stragglers and soldiers
soldiers on
evasive
evasive action also support.
support.
These
These missions
missions in the frontline
frontline area are mostly
mostly of short duration.
duration. Every
Every arising
arising
opportunity
opportunity for such guerrilla
guerrilla action must be exploited
exploited quickly
quickly and skillfully
skillfully by all units
units
of the Wehrmacht.
Wehrmacht. The troopstroops are to be educated
educated to solve these
these tasks by resourceful
resourceful
improvisation.
improvisation.
c) Originating
Originating out of the population,
population, the guerrilla
guerrilla war is conducted
conducted by local resistance
resistance
movements.
movements. Without
Without support
support from the population
population or an armed power resistance
armed power resistance groups
groups
cannot
cannot sustain
sustain themselves
themselves for long. This support must therefore
therefore be achieved
achieved and held by all
means.
means.
The strength
strength of employed units must be kept limited
employed units limited so that maneuverability
maneuverability as well as the
potential to hide camouflage
potential camouflage and rigidly
rigidly direct
direct command
command and control
control are maintained.
maintained. It is
therefore better
therefore better to form new
new independent units instead
independent units instead of enlarging
enlarging existing
existing ones.
Guerrilla
Guerrilla warfare executed with a large number
warfare can only be executed number of small units independently
independently
employed,
employed, but under
under one command.
command.
2
3. Command Principles
The most important
important command
command principles
principles for guerrilla
guerrilla warfare
warfare are the combination
combination of of clear
methodical
methodical planning
planning with ruthless
ruthless daring
daring in the execution
execution of an operation.
operation. Careful
Careful and thorough
thorough
examination
examination of the possibilities necessary when
possibilities for success is necessary when initiating
initiating the guerrilla
guerrilla war.
The guerrilla
guerrilla war is executed
executed in 3 stages:
a) When
When beginning
beginning the guerrilla
guerrilla war,
war, it is necessary
necessary to limit action
action to passive
passive resistance,
resistance,
one-man
one-man operations,
operations, or smallest
smallest size guerrilla
guerrilla groups,
groups, especially
especially if the situation
situation is
unclear, the terrain
unclear, terrain unfavorable,
unfavorable, or it the enemy
enemy exerts tight observation
exerts tight control. At
observation and control.
this stage secret harassment
harassment and destruction
destruction missions
missions have the priority
priority over combat
combat
actions.
actions.
b) Missions
Missions of guerrilla
guerrilla groups,
groups, and guerrilla
guerrilla platoons
platoons in the strength
strength ofof several
several guerrilla
guerrilla
groups, with combat
groups, with combat and larger destruction missions are only possible
destruction missions possible in favorable
favorable terrain
terrain
with the support
with support of the population
population and when
when the general
general situation
situation is clearly
clearly understood.
understood.
c) The last stage of the guerrilla
guerrilla war is the deployment
deployment of the guerilla
guerilla task forces.
forces. This is
possible in weakly
possible weakly secured
secured areas,
areas, with the help of the population
population or the regular
regular army,
army, or
with enduring
with enduring support
support and resupply
resupply by air.
Larger
Larger unit stages
stages must include
include the foregoing.
foregoing. It must be avoided, when operations
avoided, that when operations of larger
larger
units are instituted,
units instituted, that those
those of the small and smallest units are stopped.
smallest units stopped.
Greatest
Greatest care must be taken
taken when
when converting
converting from the combat
combat form ofof the last siege of guerrilla
guerrilla
war to the general
general uprising
uprising of the population,
population, and thus to the form and style of regular
regular war.
war.
Premature
Premature timing
timing for the uprising
uprising of the concentrated
concentrated popular
popular masses
masses can destroy
destroy all
achievements
achievements that have been won by guerrilla
been won warfare up
guerrilla warfare up till then.
then.
3
Surprise
Surprise over the enemy
enemy is achieved
achieved by secrecy,
secrecy, cunning
cunning in planning
planning and daring raids. Surprise
daring raids. Surprise is
the queen
queen of the art of the guerrilla
guerrilla warfare.
warfare. Greatest possible maneuverability
Greatest possible maneuverability of the small
guerrilla
guerrilla units,
units, avoiding
avoiding all patterns, using tricks
patterns, using tricks and ruses,
ruses, exploitation
exploitation of darkness
darkness and terrain,
terrain,
quick
quick comprehension
comprehension and mastering
mastering of of situations,
situations, careful
careful camouflage,
camouflage, ambushes, raids and secret
ambushes, raids
destruction
destruction missions
missions are the means
means by which
which surprise
surprise is achieved.
achieved.
Psychological
Psychological warfare
warfare must
must go
go hand-in-hand
hand-in-hand with combat
combat activities.
activities. Every possibility
possibility to waken
waken
and strengthen
strengthen the will for resistance
resistance in the population,
population, to wear
wear down the enemy’s
enemy’s morale
morale and
undermine his prestige
undermine prestige must
must be used.
used. The choice
choice of the operational
operational area for guerrilla
guerrilla units
units is the
task of the higher
task higher command.
command. Points to be considered
considered are:
a) The requirements
requirements of the political
political and regular
regular army
army high command;
command;
b) The result of reconnaissance
result of reconnaissance and intelligence;
intelligence;
c) The suitability
suitability of terrain;
terrain;
d) The possibilities
possibilities for resupply.
resupply.
a) The requirements
requirements of the regularregular army
army high command
command are the most important
important
considerations
considerations in guerilla warfare.
guerilla warfare.
The following
following tasks
tasks may
may be assigned:
assigned:
aa) To initiate
initiate and support
support the local guerrilla warfare ambitions
guerrilla warfare ambitions in the enemy’s
enemy’s sphere of
influence as a means
influence means of political
political pressure
pressure and to disrupt
disrupt his war industry.
industry.
bb) Obstruction
Obstruction of the enemy’s troop deployment.
enemy’s troop deployment.
cc) Preparation
Preparation of the guerrilla unit’s own,
guerrilla unit’s own, far-reaching
far-reaching attack operations
operations through
through local
reconnaissance, harassment of the rearward
reconnaissance, as well as harassment rearward connections
connections of the enemy.
enemy. In the last days
and hours before
before the attack, these activities
attack, these activities should be increased up to a temporary
increased up temporary paralyzation
paralyzation of
enemy
enemy command,
command, control
control and communications
communications centers
centers as well
well as massive
massive interruption
interruption of
trafficways. In the further
trafficways. further course
course of the attack,
attack, the guerrilla units can be of valuable
guerrilla units valuable assistance
assistance to
the advancing
advancing friendly troops.
fiiendly troops.
dc) Cover
Cover of retrograde
retrograde operations of the friendly
operations of friendly forces through
through actions
actions against flanks
against the flanks
of pursuing
pursuing enemy
enemy attack
attack spearheads,
spearheads, and against enemy, that are
against the supply lines of the enemy,
lengthened
lengthened in the course
course of his attack,
attack, and thus are vulnerable targets.
vulnerable targets.
4
d) The attitude
attitude of the population
population is of equally
equally large importance
importance for the choice
choice of the
operational
operational area. A hostile
hostile attitude
attitude can make
make operations
operations even against
against important
important targets,
targets,
almost
almost impossible.
impossible. Sufficient
Sufficient support
support from the population
population on the other hand makes
missions
missions against
against a number
number of less valuable
valuable targets
targets profitable
profitable because
because of the accumulating
accumulating
effect.
effect.
e)
6) The possibilities of resupply,
possibilities of resupply, by land, by sea or by air, must
must be considered
considered thoroughly.
thoroughly.
They are contributory
contributory factors
factors for the choice
choice of the operational
operational area and ofof prime
prime
important
important for the length
length of operations.
operations.
5
4. Prospects
Prospects of Success and Boundaries
Boundaries
The prospects
prospects of success
success by means
means of guerrilla warfare are determined
guerrilla warfare determined by the political,
political, military
military
and economic
economic situation,
situation, the terrain,
terrain, population
population density,
density, traffic
traffic infrastructure, national
infrastructure, national
characteristics
characteristics and religious
religious habits,
habits, the attitude
attitude of the population
population and most of all, by the
toughness and combat
toughness combat effectiveness
effectiveness of the employed
employed guerrilla units.
guerrilla units.
Without
Without a clear political
political will,
will, the guerrilla
guerrilla war can achieve
achieve only temporary
temporary success,
success, even if
conducted with tactical
conducted with tactical skill. On the other hand, quick
quick and lasting
lasting consequences
consequences can be expected,
expected,
if the political
if political and military
military high command recognize and exploit
command recognize exploit the advantages
advantages that the guerrilla
guerrilla
operations
operations have achieved.
achieved. This must be done in timely
timely fashion
fashion and with utmost determination.
with utmost determination.
The necessity
necessity of a reliable
reliable support network through
support network through secret assistance
assistance by the population
population in the
operational
operational area,
area, dependence
dependence on help through
through strong friendly
friendly forces
forces or continuous resupply by
continuous resupply
air, sets certain
certain boundaries
boundaries for the prospects
prospects of success of guerilla
guerilla warfare.
warfare.
The terrain
terrain strongly
strongly determines possibilities and combat
determines the possibilities combat means
means of the guerrilla war. Covered
guerrilla war. Covered
strongly
strongly undulated
undulated terrain
terrain with insufficient traffic
with insufficient traffic infrastructure,
infrastructure, poorly
poorly passable terrain, and
passable terrain,
most of all wooded
most wooded areas and mountains
mountains assist guerilla
guerilla missions.
missions. Open terrain
terrain with high
population density
population density and a well-developed
well-developed traffic
traffic infrastructure presents great problems
infrastructure presents problems for the
conduct
conduct of guerrilla
guerrilla warfare.
warfare. Large cities and industrial
industrial areas offer after adequate
adequate adaptation of
adaptation of
the organization
organization forms,
forms, good possibilities
possibilities for guerrilla
guerrilla actions.
actions. This is especially
especially the case in the
ruins of destroyed
ruins destroyed larger settlements.
settlements.
6
II. Formation of Guerrilla Units
General Requirements
1. General Requirements
In the guerrilla war, it is not the strength
guerrilla war, strength of the employed units and the mass of their weapons
employed units weapons
that give success,
success, but the inner strength
strength of the guerrillas,
guerrillas, their daring
daring craftiness
craftiness and ingenuity
ingenuity in
exploiting
exploiting all favors
favors of the terrain
terrain and helpful means. When
helpful means. When forming
forming and reinforcing
reinforcing guerrilla
guerrilla
units, consideration
units, consideration must be taken taken of these
these factors.
factors. Still able are volunteers
volunteers who besides
besides
enthusiasm
enthusiasm and willingness
willingness have the doggedness,
doggedness, toughness
toughness and ingenuity needed. Gaps in their
ingenuity needed. their
military training
military training can be closed.
closed. The variety
variety of tasks performed
performed by a guerrilla makes it
guerrilla unit makes
necessary that it not only include
necessary include good soldiers,
soldiers, but also men with technical
technical and practical
practical skills,
and such with political
political and propagandistic
propagandistic abilities.
abilities.
2. Leaders
The correct
correct choice
choice and training
training of the leaders
leaders is of decisive
decisive importance.
importance. The leader of a guerrilla
guerrilla
unit should be demanding himself and others,
demanding of himself when conducting
others, when conducting his mission.
mission. On the other
hand, he must provide
provide never-ending
never-ending concern
concern for the welfare
welfare of his men,
men, this maintaining
maintaining the
battle-worthiness
battle-worthiness of his unit.
unit. His daringness
daringness as a combatant,
combatant, his leadership
leadership success
success and his
unconditional fairness
unconditional fairness must waken
waken confidence.
confidence. Confidence
Confidence is the fundamental
fundamental of leadership
leadership in
guerrilla
guerrilla units.
units. The authority
authority of the leader personality, not on rank
rests solely on his personality,
leader rests rank and
insignia.
insignia. The leader
leader of a guerrilla
guerrilla unit carries
carries a high
high measure
measure of responsibility.
responsibility. He has the same
rights as the commander
rights commander of an independently
independently operation battleship, and he may
operation battleship, may impose
impose any
any
punishment -- even death
punishment death -- to keep
keep up
up discipline.
discipline.
Besides
Besides military proficiency and personality,
military proficiency personality, a feeling
feeling for political
political and propagandistic
propagandistic
possibilities is of high value for the leader
possibilities leader of a guerrilla unit.
guerrilla unit.
3. The Men
The guerrilla
guerrilla must be an excellent
excellent soldier and unite
unite the capabilities
capabilities of an infantry
infantry man with
with those
those
of an engineer.
engineer. Furthermore,
Furthermore, his mission requires from him a close relationship
mission requires relationship to nature,
nature,
frugality
frugality and ingenuity
ingenuity in the exploitation
exploitation of all means
means and makeshifts
makeshifts available.
available. Through
Through his
behavior towards the population,
behavior towards population, he must win the confidence
confidence and respect
respect of all freedom-loving
freedom-loving
people. Weaklings
people. Weaklings and traitors
traitors fear him like the plague.
plague. It is important
important that a large number
number of the
men know
know the operational
operational area and are in command
command of the language
language of the country, yes even of
country, yes
the local dialect. Acquiring and training
dialect. Acquiring training radio
radio operators
operators in due time
time must not be neglected
neglected in any
any
case. Even women
women may
may be suitable.
suitable.
of Battle
4. Order of Battle
The strength
strength of the guerilla
guerilla unit must adjust itself to the enemy
adjust itself enemy situation,
situation, the mission
mission and the
terrain. In areas under
terrain. tight observation
under tight observation and with insufficient cover and concealment,
with insufficient concealment, it is only
possible to operate
possible operate in smallest-size
smallest-size groups,
groups, which
which at the utmost
utmost may temporarily be united
may temporarily united for a
common
common mission.
mission. In sparsely
sparsely occupied
occupied areas or terrain with good possibilities
terrain with possibilities for cover
cover and
concealment,
concealment, stronger
stronger units can hold themselves.
themselves. But even these
these units must always
always be structured
structured
7
into groups
groups and platoons.
platoons. The smallest
smallest independently
independently operating unit is the guerrilla
operating unit guerrilla group.
group. It
consists
consists of 11 leader and 4 guerrillas.
guerrillas. Under
Under difficult
difficult circumstances
circumstances and for special tasks, tasks,
reconnaissance or destruction
reconnaissance destruction missions,
missions, even smaller
smaller guerrilla teams may
guerrilla teams may be employed.
employed.
Formation
Formation of stronger
stronger groups of doubtful
groups is of doubtful usefulness.
usefulness. The guerrilla
guerrilla platoon
platoon consists
consists of several
guerrilla
guerrilla groups
groups and a command
command squad with an overall
overall strength
strength of 1010 leaders
leaders and 40 guerrillas.
guerrillas.
Guerrilla platoons are to be employed
Guerrilla platoons employed where
where terrain
terrain and the enemyenemy situation permit it.
situation permit it. In
especially
especially favorable
favorable situations,
situations, for example
example in poorly
poorly secured,
secured, densely wooded, or mountainous
densely wooded, mountainous
areas and when
when the guerrilla unit’s effect on the situation
guerrilla unit’s situation in the operational
operational are has progressed
progressed
sufficiently,
sufficiently, guerilla task forces
guerilla task forces which
which consist
consist of several
several platoons,
platoons, are to be formed.
formed. The
following
following assignment
assignment of command tasks has proven
command tasks itself effective
proven itself effective for larger guerrilla platoons
guerrilla platoons
and guerrilla task forces.
guerrilla task forces.
a) Leader
Leader
b) Leader
Leader of the reconnaissance
reconnaissance service
service and the command
command squad
c) Leader
Leader for political
political questions
questions
d) Leader
Leader of the signals squad
e) Weapons
Weapons and material warder
material warder
f) Doctor
Doctor or medical
medical orderly
orderly
g) Cook
h) Mess sergeant
sergeant and accountant
accountant
In smaller
smaller guerrilla
guerrilla platoons,
platoons, several tasks
tasks must be united.
united. A back-up
back-up must be named
named and
instructed
instructed in the tasks
tasks so that casualties
casualties do not cause interruptions.
interruptions. When
When the guerrilla
guerrilla
warfare has grown
warfare grown to have even greater
greater importance
importance in an area a local secret command
command
staff must be set up.
staff up. Liaison
Liaison officers
officers are to be attached
attached to it.
it.
5. Armament
The armament
armament of the guerrilla units must be light. It must not hinder
guerrilla units hinder maneuverability,
maneuverability, but
on the other hand should enable enable a destructive
destructive firepower
firepower in worthwhile
worthwhile close-range
close-range
targets. In the guerrilla
targets. guerrilla groups
groups some of the guerrillas
guerrillas must be therefore
therefore equipped
equipped with
rifles. Pistols
rifles. Pistols and daggers
daggers may
may also be of value.value. Hand grenades
grenades are indispensable.
indispensable.
Additionally, depending
Additionally, upon the mission,
depending upon mission, explosives
explosives are added to the equipment.
equipment. It is
very
very advantageous
advantageous to use a suppressed
suppressed weapon
weapon and to have a sniper rife. rife. Also,
Also, some of
weapons should be equipped
the weapons with luminous
equipped with luminous sights. It may
may become necessary to equip
become necessary equip
the guerrilla
guerrilla platoons
platoons with several
several machine
machine guns
guns and bazookas
bazookas for certain
certain missions.
missions.
Especially
Especially in the mountains,
mountains, it is advantageous
advantageous to take along
along mortars.
mortars. Depending
Depending uponupon
the situation
situation and the mission,
mission, guerrilla
guerrilla task forces
forces must carry
carry heavier
heavier high angle-
angle- and
anti-tank weapons. A uniform
anti-tank weapons. uniform caliber
caliber of the armament
armament is important
important because
because of
ammunition resupply. Especially
ammunition resupply. Especially suited are all weapons calibers that are common
weapons with calibers common in
the operational
operational area. Supplementation
Supplementation and replacement
replacement of arms through
through procurement
procurement of
enemy weapons is always
enemy weapons always a good policy.
policy. In difficult
difficult supply situations, raids to obtain
situations, raids obtain
weapons and ammunition
weapons ammunition must be conducted.
conducted.
8
6. Equipment
Equipment
The equipment of the guerrilla
equipment of guerrilla soldier and the whole
whole guerrilla unit must be adapted
guerrilla unit adapted to the
circumstances
circumstances and the situation
situation in the operational
operational area. It must be so light that
maneuverability
maneuverability is not restricted. Appendix 11 may
restricted. Appendix may serve as a guideline.
guideline. It is best to carry
carry
most necessary
the most necessary equipment
equipment pieces
pieces directly
directly on the body,
body, so that the guerrilla
guerrilla is still
combat ready after losing
combat ready losing or having
having to temporarily
temporarily hide his rucksack. of
pieces of
rucksack. All pieces
equipment
equipment that are not constantly
constantly carried
carried along must be hidden
hidden in concealed
concealed caches
caches in the
operational
operational area. Suitable waterproof containers
Suitable waterproof containers are needed, therefore.
needed, therefore.
7. Clothing
Clothing
The clothing
clothing must be adapted
adapted to the climate
climate of the operational
operational area,
area, the task, and the
duration
duration of the mission.
mission. The uniform common with the infantry
uniform common infantry ranger
ranger units of the Army
Army
is best suited. Except
Except in large towns,
towns, the clothing
clothing of the peasant
peasant population
population in the
operational
operational area may
may always used in emergencies.
always be used emergencies. Kidney warmers are good to keep
Kidney warmers keep
healthy.
healthy. It has proven
proven useful
useful to take along
along several thin undergarments instead of one thick
undergarments instead thick
one. Thus, several different
different layers
layers can be worn
worn over each other,
other, enabling
enabling a better
better
adaption
adaption to the existing weather. The clothes
existing weather. clothes must
must be impregnated
impregnated against
against lice. Shoes
with rubber
with rubber soles, or sports shoes, are useful
useful for special
special missions.
missions.
9
III.
111. Training
Fundamentals
1. Fundamentals
Good infantry training is of great value to the guerrilla.
infantry training guerrilla. Where
Where it is lacking,
lacking, the most
important
important branches
branches must be taught
taught to mend. Weapons training, marksmanship,
Weapons training, marksmanship, utilization
utilization
of the terrain
terrain and combat
combat training, close-quarter tank destruction
training, close-quarter destruction and guerrilla battle
guerrilla battle
techniques in squad, group
techniques group and platoon
platoon formations must be taught.
formations must taught. Furthermore,
Furthermore, engineer
engineer
training is necessary
training necessary to the extent that each guerrilla
guerrilla has a basic
basic knowledge
knowledge of installing
installing
barriers obstacles and can work
barriers and obstacles work with demolitions.
demolitions. As manymany guerrillas
guerrillas as possible
possible
must be instructed
instructed in the special field of destruction
special field destruction and sabotage techniques. A practical
sabotage techniques. practical
instruction first aid is indispensable
instruction in first indispensable because of the possibilities
because of of becoming
possibilities of becoming wounded.
wounded.
The following
following principles valid for all training
principles must be held as valid phases:
training phases:
All branches
branches must be adapted
adapted to the special
special requirements
requirements of guerrilla
guerrilla warfare,
warfare, living in
field and night
the field night combat.
combat. Everything
Everything not necessary
necessary must be dispensed
dispensed with.
with. Important
Important
aspects
aspects must be repeated
repeated again and again.
again. It is more important
important to maximize
maximize
maneuverability, the capacity
maneuverability, capacity to adapt,
adapt, the ingenuity
ingenuity and the “hunter”
“hunter” instinct than it is to
instinct than
drill the men.
2. Utilization
Utilization of of Terrain and Camouflage
Camouflage
Proper
Proper utilization
utilization of the terrain
terrain and camouflage will enable
camouflage will find concealment
enable one to find concealment form
the enemy
enemy in order to deceive,
deceive, dupe and surprise
surprise him. One must offer only the very very
smallest
smallest and poorly visible target
poorly visible target possible
possible in case ofof discovery.
discovery. Camouflage
Camouflage against
against air
view must never
view never be forgotten.
forgotten. Utilization
Utilization of the terrain requires the skillful
terrain requires skillful use of all
possibilities of cover and concealment,
possibilities concealment, and consideration
consideration of the color of the back and
underground.
underground.
Sunlight
Sunlight and shadows
shadows must also be considered.
considered. The guerrilla
guerrilla must always
always be intent on
offering
offering only a small target.
target. Camouflage
Camouflage is achieved
achieved by adapting
adapting to the surroundings
surroundings with
the help of natural
natural and artificial
artificial means
means and by avoiding noticeable movements.
avoiding noticeable movements. The
following points concerning
following points concerning cover and concealment
concealment must be remembered:
remembered:
a) Cover
Cover for campsites,
campsites, halt and rest areas during
during the march
march and when
when advancing
advancing is
offered
offered by mountains,
mountains, hills, boulders,
boulders, valleys,
valleys, gulches,
gulches, forests,
forests, hedges,
hedges, bushes,
bushes, corn-
fields,
fields, houses,
houses, barns,
barns, walls,
walls, fences
fences ditches,
ditches, dirt piles
piles etc.
The guerrilla
guerrilla sneaking
sneaking up
up on enemy
enemy guards
guards must make use of even the smallest
smallest
depressor,
depressor, furrow,
furrow, dirt and rock-pile,
rock-pile, mole mound
mound and grass
grass bundle
bundle for cover and
concealment
concealment (Picture
(Picture 1).
1).
10
10
Right! Wrong!
Picture 1.
Picture 1. Utilization of small cover
Utilization of cover
b) Consideration of the color of
Consideration of of the back and underground
underground is necessary:
necessary: for example,
example, the
grey-green uniform offers no camouflage
grey-green uniform camouflage against
against light yellow-colored
yellow-colored sand.
Especially
Especially to be considered
considered is the contour against the sky which
contour against which the guerrilla
guerrilla offers to
the eye enemy when
eye of the enemy when advancing
advancing over hills
hills and even the smallest
smallest elevations.
elevations.
This contour
contour effect is not only a give-away daytime, but also during
give-away at daytime, during bright nights
bright nights
(Picture
(Picture 2).
Right! Wrong!
Picture
Picture 2.
2. Consideration of back
Consideration of back and underground
underground
11
1]
a) Every
Every shadow
shadow offers good camouflage
camouflage (Picture
(Picture 3).
V—.-P.‘
—_'¢~ - .-_' fi‘ I
7'
-
W
~
..._I[“" Hn'
I
F-‘V a-' -
- x ‘
-
‘.x.~n--~u"..w"\.
nib... ‘
Picture 3. Shadows
Picture Shadows as camouflage
“"'
I‘A- ..‘
camouflage against
A»
against air observation
observation
b) The guerrilla
guerrilla must always take care that he offers
always take offers only as small a target
target as possible
possible
(Picture
(Picture 4).
12
12
Right! Wrong!
Picture
Picture 4.
4. Minimizing target
Minimizing the target
c)
C) The most
most important natural camouflage
important natural means are: small trees,
camouflage means twigs, grass,
trees, twigs, moss,
grass, moss,
wheat, herbs,
wheat, herbs, leaves etc. Face and handshands must
must be subdued
subdued withwith dirt, soot or grease
grease
paint winter, with
paint in the winter, with blackboard
blackboard chalk
chalk or flour.
flour. When camouflaging
camouflaging campsites,
campsites, it
is advisable replant small
advisable to replant trees, bushes,
small trees, bushes, grass
grass and moss.
moss. The camouflage
camouflage thus
becomes more
becomes natural and does not wither
more natural wither as fast.
d)
01) The most common
common artificial
artificial camouflage
camouflage meansmeans are: the tent canvas, blankets,
canvas, blankets,
camouflaged
camouflaged uniforms,
uniforms, camouflaged poncho shirts, large camouflaged
camouflaged poncho camouflaged nets to cover cover
foxholes
foxholes etc.. and small camouflage
camouflage nets to cover cover the face and the shoulders.shoulders.
Camouflage poncho shirts and snow poncho
Camouflage poncho poncho shirts are easily self-made.
self-made. Old clothing
clothing
pieces, fishing
pieces, nets and rope
fishing nets of value.
rope are also of value. These
These artificial
artificial camouflage
camouflage means
means maymay
supplemented with
be supplemented with natural means like twigs,
natural means grass etc. Different
twigs, grass Different colored rags,
colored rags,
bundles of bush
bundles of bush and paper
paper can be tied to nets.
nets. It is useful
useful eyelets
eyelets and bands
bands to the cap,
cap,
so that camouflage
camouflage may may be quickly
quickly attached
attached and changed
changed (Picture
(Picture 5).5).
13
13
Picture
Picture 5. Small camouflage
camouflage net
e) Avoiding all sudden movements
6) Avoiding movements is part ofof camouflaging.
camouflaging. At dusk and in the dark only
quick movements
movements and sounds
sounds are noticeable.
noticeable. The following
following rules must
must be followed:
followed:
Always remember: How
Always remember: enemy now see me? Don’t
How does the enemy Don’t forget to adapt your
your
camouflage
camouflage to youryour surroundings!
surroundings! Avoid
Avoid sudden movements!
movements! They destroy
destroy all
camouflage efforts. And
camouflage efforts. And pay
pay attention
attention to shape,
shape, shine and shadow.
shadow.
14
14
Terrain
1. Navigation in Terrain
The simplest way to navigate
simplest way navigate in terrain
terrain is to know
know the operational
operational area thoroughly.
thoroughly. The
guerrilla must therefore
guerrilla must taught to remember
therefore be taught remember special
special orientation
orientation features that are easily
features that
recognized by day (dominant
recognized (dominant heights,
heights, church
church towers,
towers, factory
factory chimneys,
chimneys, single trees, field
trees, field
barns,
barns, groups
groups of boulders
boulders etc.). In order to orientate himself at dusk and in the night.
orientate himself night. He
remember their
must remember their contours.
contours. He must also memorize
memorize dominant
dominant lines which
which can serve
him as conduction
conduction lines during
during night
night marches.
marches. Such lines are fences, walls, hedges,
fences, walls, hedges,
waterways, high-tension
waterways, high-tension power
power lines, forest
forest edges,
edges, dams,
dams, railways,
railways, streets, tracks
tracks etc.
When
When conduction
conduction lines and orientation
orientation points
points can easily be mistaken
mistaken for others,
others,
additional
additional features
features must be memorized verification so that mistakes
memorized for verification mistakes are ruled
ruled out. In
uniform terrain,
uniform terrain, especially
especially in forests,
forests, orientation
orientation points
points and conduction
conduction lines are very very
important.
important. At cross-roads,
cross-roads, for example,
example, the guerrilla
guerrilla must memorize
memorize the specific
specific features
features
find the right way.
in order to find way. Gaps in the skyline,
skyline, dominant
dominant treetops,
treetops, path starting points
starting points
etc. serve as additional reference verification
additional reference verification signs at uniform
uniform forest edges.
edges. Certain
Certain
important
important distances
distances should always
always be estimated
estimated and memorized
memorized together with the
together with
conduction
conduction lines and orientation points. Evaluation
orientation points. Evaluation of the number
number of steps
steps from one
orientation
orientation point
point to the next also is a good means means of easily
easily finding
finding the right way at night.
right way night.
When using a map
When using map to plan a night march,
march, orientation
orientation points
points and conduction
conduction lines can be
memorized
memorized with its help. This helps to avoid having having to use a light when
when referring
referring to the
map
map in the dark. If the terrain
terrain is totally
totally unknown,
unknown, or if the guerrilla first step in
guerrilla is lost, the first
find the right
order to find right way
way is to determine
determine the navigational
navigational directions.
directions. The following
following
principles may
principles may be used:
used:
a) The position
position of the sun is fairly accurately
accurately in the east at 0600
0600 hours,
hours, in the southwest
southwest at
1500
1500 hours and in the west west at 1800 hours.
hours.
b) A good method
method to determine
determine the southern
southern direction
direction is by the use of the watch.
watch. Hold the
watch
watch level and point
point the small hand towards
towards the sun. When
When the angle between
between the hour-
hour-
hand and the 12 12 is cut in half, this line, extended
extended forward before noon
forward before noon and backward
backward in
the afternoon,
afternoon, points
points south (Picture
(Picture 6).
15
15
Picture
Picture 6. Determining Southern Directionwith
Determining the Southern Direction with the Pocket
Pocket Watch
Watch
Left: Morning 0600h 1500h
Right: Afternoon 1500h
Picture
Picture 7.
7. North
North Star and Big Dipper
Dipper
1.
1. North Star 2. Big Dipper
d) At night
night the directions
directions can also be determined
determined by the position
position of the moon:
moon: the full
moon is exactly
moon exactly opposite
opposite the sun and thus
thus in the southwest
southwest at 0300 hours
hours and in the
west at 0600 hours.
west first quarter
hours. The first quarter of a waxing
waxing moon
moon stands where
where the sun was 6
16
16
hours ago:
hours ago: for example,
example, in the west at 2400 hours. The last quarter quarter of a waxing
waxing moon
moon
stands where
where the sun will stand after 6 hours; hours; for example,
example, in the east at 2400 hours.hours.
In order to determine
determine one’s own position with the help of a map,
position with map, it must first be
aligned
aligned with the true north
north with the help of of the sun or one of the other means;
means; then the
surrounding
surrounding area is checked
checked for terrain
terrain features
features that are easily foundfound on the map map
(streets,
(streets, churches,
churches, dominant
dominant hills etc.). TheseThese points
points are then compared
compared with the
picture of the map
picture of map so that one’s own position
position can be ascertained.
ascertained. Determination
Determination of a
certain terrain point
certain terrain point is achieved
achieved as follows:
follows: Mark your your own position
position on the map,
map,
choose
choose a clearly visible terrain
clearly visible terrain feature that is not too near
feature that near (e.g. church)
church) and align the
map
map to it.it. The upper
upper edge of the map now points
map now points north.
north. If other terrain
terrain features
features are
sighted
sighted along a line markedmarked from one’s own position position with the help of a ruler ruler or
pencil, the line on the map
pencil, map must lead to the wanted wanted terrain
terrain point.
point. The difficulties
difficulties of
navigating in unknown
navigating unknown terrain,
terrain, especially
especially in forests
forests and at night,
night, make it necessary
necessary
that every
every guerrilla
guerrilla learn how to use a compass.
compass. When using using a compass,
compass, hold it away
away
from steel and iron objectsobjects (e.g. gun) as far as possiblepossible because needle will
because the needle
otherwise
otherwise be deflected.
deflected. With the help of of the compass,
compass, maps
maps can be aligned with true
aligned with
north, directions
north, directions maymay be determined,
determined, and a plotted
plotted course
course can be maintained with the
maintained with
help of a compass
compass bearing.
bearing. The compass,
compass, next to the sun is the most practical
practical means
by which
which to navigate.
navigate. Each guerrilla therefore be trained
guerrilla must therefore trained in its use. Help
therefore is given
therefore Appendix II.
given in Appendix
5. Reporting
Reporting and Communications
Communications
Reliable, quickly
Reliable, quickly transmitted
transmitted reports
reports and messages
messages are fundamental
fundamental to the security
security
and command
command of the guerrilla
guerrilla unit. The guerrilla
guerrilla must be taught
taught to observe
observe attentively
attentively
and to avoid unclear and exaggerated
avoid unclear exaggerated statements.
statements. He must transmittransmit or deliver
deliver
important
important messages
messages quickly. Signals that are clearly
quickly. Signals clearly visible
visible or well
well understood
understood over
long distances
distances are best suited to transmit
transmit simple messages,
messages, warnings
warnings and orders.
orders. They
must be arranged
must arranged well in advance
advance and changed
changed from time to time. Too many many signals
with various
with various meanings
meanings are to be avoided. confusion rather
avoided. They can cause more confusion rather than
help. It is especially
especially important
important to arrange
arrange signals withwith the sympathizers
sympathizers in the
population. These
population. These signals mostly
mostly serve as a warning.
warning. Such signals may may be: opening
opening or
closing
closing certain
certain attic hatches,
hatches, windows
windows or shutters,
shutters, opening
opening or closing
closing of curtains,
curtains,
hanging out of wash
hanging wash or unsuspicious
unsuspicious clothes,
clothes, putting
putting on lights
lights in certain
certain rooms
rooms and so
on. These signs can mean: “Danger
“Danger of Enemy.”
Enemy.” “No danger.”
danger.” “Enemy
“Enemy in the village.”
village.”
Or “Enemy
“Enemy in the house.”
house.” They can also indicateindicate that the sympathizer
sympathizer has an
important
important message
message for the unit.
unit. All guerrillas
guerrillas acting
acting as observers,
observers, scouts or guards
guards
must consider
must consider the following
following points
points when
when reporting:
reporting: Can the message
message be given with a
signal?
signal? Is it necessary
necessary to send a messenger?
messenger? Is it necessary
necessary to draw a sketch?
sketch? All oral
or written
written messages
messages must be checked
checked for the possibility
possibility of sending
sending a part
part of the
message
message immediately with a simple sign.
immediately with
17
17
This is especially
especially important
important for warnings.
warnings. Written
Written messages
messages must be avoidedavoided as much much as
possible. All messages
possible. messages must clearly clearly state: What have I seen myself? myself? What has a comrade comrade
noticed? Which
noticed? Which reports
reports are from the population? population? What is speculation?
speculation? Reports
Reports fromfiom the
population must
population must have indication
indication as to how trustworthy
trustworthy the message
message seems; presumptions must be
seems; presumptions
explained.
explained. It must always
always be considered
considered that even calm men cannot cannot observe
observe clearly
clearly during
during a
combat
combat situation
situation and tend tend to exaggerate
exaggerate due to excitation.
excitation. The following
following points must be
points must
followed:
followed: When was the observation
observation made? made? What
What was observed
observed (e.g. a platoon,
platoon, 2 cannons
cannons etc.)?
etc.)?
Which
Which enemy
enemy activity was observed
activity was observed (determine
(determine the exact position)?
position)? The further
further intention
intention of the
message’s
message’s sender must always always be included.
included. Each messenger
messenger and courier
courier must know to whom
must know whom the
message
message is addressed, where he will
addressed, where find the addressee,
will find what he must do if he cannot
addressee, and what find
cannot find
him, and respectfully
respectfully after he has delivered
delivered the message. must memorize
message. He must memorize the contents
contents ofof the
message so that he can destroy
message destroy the message
message whenwhen in danger.
danger. The messenger
messenger must not give away away
the position
position of the leader’s perimeter through
leader’s perimeter through wrong
wrong conduct.
conduct. He must detour
detour and cut back very very
often.
often. Written
Written messages
messages should not be signed nor have an address address on them.
them. Simple signs are
sufficient.
sufficient. Code names
names and abbreviations
abbreviations used used in the guerrilla
guerrilla unit may
may also be employed.
employed.
Messages
Messages fromfiom helpers
helpers out in the population
population can be hiddenhidden in predetermined
predetermined “mailboxes,”
“mailboxes,” Well
suited for this purpose
purpose are: hollow trees, cracks
hollow trees, walls etc. When using
cracks in walls using such mailboxes,
mailboxes, it is
advisable
advisable to agree
agree on a sign in the vicinity
vicinity indicating
indicating that a message
message has been left. This helps to
avoid
avoid having
having to check
check the dead mailbox.mailbox. Use of flashing
flashing signal lights is only possiblepossible if the
enemy
enemy situation
situation permits
permits it. it. In the mountains,
mountains, they are of use in order to avoid difficult, difficult, time-
time-
consuming
consuming message
message deliveries
deliveries through
through to the valleys.
valleys. Care must be taken
taken that these
these flashing
flashing
messages are coded.
messages coded. It is best to use only short signs. Long enduring enduring blinking
blinking should be avoided.
avoided.
Pigeons
Pigeons maymay be given to reconnaissance
reconnaissance patrols patrols in order to bring important
important messages
messages to the
higher
higher command.
command. Radio Radio transmission
transmission is indispensable
indispensable in a guerrilla
guerrilla war whenwhen lacking
lacking other
technical means
technical means of communications.
communications. Training Training of good radio
radio operators
operators in due time
time and far-sighted
far-sighted
acquisition
acquisition of replacements
replacements must never neglected, even when
never be neglected, when lacking
lacking sufficient
sufficient number
number of
radio sets at the moment.
radio moment. Employment
Employment of women women for this task is possible.
possible.
5. Close-Quarter
Close-Quarter Battle
Battle
The training
training in close-quarter
close-quarter battle
battle must be conducted
conducted in a guerrilla-like,
guerrilla-like, sporting way. It should
sporting way.
enable
enable the guerilla
guerilla to: a) fight with the spade, dagger
fight with dagger or without
without a weapon
weapon and not depend
depend solely
upon his firearm.
upon firearm. b) overwhelm
overwhelm an enemy enemy silently
silently when
when encountering
encountering him unexpectedly
unexpectedly
(especially
(especially at night).
night). c) overwhelm
overwhelm a guard silently.
silently. d)
d) break
break a hold and deliver
deliver defensive
defensive blows
blows
and punches.
punches. Often the whole
whole mission
mission depends upon overcoming
depends upon overcoming the enemyenemy silently,
silently, during
during an
unexpected encounter
unexpected encounter or when
when disposing
disposing of a guard.
guard. Close-quarter
Close-quarter battle
battle must therefore
therefore be
practiced again and again.
practiced again. Strict regulations
regulations cannot
cannot be given,
given, but when
when disposing
disposing of a guard,
guard, the
following points must
following points must be observed:
observed: Only specifically
specifically skillful guerrilla
guerrilla should be employed
employed for
task. Leave
the task. unnecessary equipment.
Leave unnecessary equipment. Wear
Wear shoes with
with rubber
rubber soles or sports off
sports shoes or take off
your boots.
your boots. Sneak to a secure position
position near the guard and study his habits, then sneak to the place
habits, then place
best suited for the attack.
attack. When jumping
jumping on the guard and hitting
hitting him, make sure he cannot
cannot cry
cry
out. Depending
Depending upon
upon orders,
orders, drag the guard away
away or dispose
dispose of him. Take awayaway papers, weapons,
papers, weapons,
18
18
equipment
equipment etc. Disappear
Disappear quickly
quickly or carry with your
carry on with your mission.
mission. When
When practicing
practicing breaking
breaking a
hold, it is important
hold, important that the guerrilla
guerrilla learns to react energetically
energetically and quickly
quickly so that he is able to
overwhelm
overwhelm an enemy
enemy who is superior
superior in constitution.
constitution. It is not necessary
necessary for the guerilla
guerilla to know
know
a large variety
variety of close-quarter methods. It is better that those
battle methods.
close-quarter battle which suit him best become
those which become
second nature. Blows
second nature. Blows and punches
punches against
against vulnerable parts of the body
vulnerable parts body are mostly
mostly executed with
executed with
of the hand.
the fist or the edge of hand. Kicks
Kicks against
against the knee
knee or shins can drop an enemy
enemy to the ground
ground
before he is able to react.
before react. The following
following parts
parts of the body
body are best
best attacked with blows
attacked with blows and
punches: Temple,
punches: Temple, base of the nose,
nose, upper
upper lip, neck, Adam’s apple and back
neck, Adam’s back of the neck;
neck; Main
Main
arteries,
arteries, heart,
heart, kidneys,
kidneys, groin.
groin.
6. Roadblocks
Roadblocks
Roadblocks are an important
Roadblocks important means
means ofof guerrilla
guerrilla warfare.
warfare. They are employed with
together with
employed together
ambushes
ambushes to hinder pursuit by motorized
hinder pursuit motorized troops harass enemy
troops and to harass traffic. The effectiveness
enemy traffic. effectiveness ofof
obstacles
obstacles can be multiplied through the use of
multiplied through of hidden
hidden explosive
explosive charges.
charges. The guerrilla
guerrilla group
group
must always
must always be able to set up roadblocks with the means
up simple roadblocks means available.
available. Training
Training must enable
enable
the guerrillas choose and build
guerrillas to choose build an obstacle number of
obstacle best suited for the number of men and means
means
available.
available. When ambushing
ambushing on heavily
heavily frequented roads, obstacles
frequented roads, obstacles in the form of mines
mines must be
employed.
employed. These
These should be detonated
detonated electrically
electrically or by trip wire
wire (Picture
(Picture 8).
Picture
Picture 8. Single Tree Blockade
Blockade
19
19
To hinder
hinder pursuit
pursuit or in harassment
harassment operations,
operations, antitank
antitank mines
mines or improvised
improvised mines
mines with pressure
With pressure
or relief—pressure.
relief-pressure.
Picture
Picture 9.
9. Notches
Notches for the Direction
Direction of Fall
Fall
20
Picture 10.
Picture 10‘ Tree Blockade
Blockade
21
21
Detonators may
Detonators used successfully.
may be used Mines must always
successfully. Mines always be carefully
carefully camouflaged. Destruction
camouflaged. Destruction
of bridges
of bridges made
made of of iron, masonry,
masonry, or wood
wood by demolition,
demolition, requires
requires considerable
considerable amounts
amounts ofof
explosives
explosives and a thorough
thorough instruction
instruction in handling
handling ofof explosives
explosives and fuses and in calculating
calculating the
charges.
charges. This is a subject of special
special instructions
instructions and regulations.
regulations. Even without
without explosives
explosives and
mines, guerrilla
mines, guerrilla groups
groups can set up
up obstacles efficientlyhinder
that will efficiently
obstacles that hinder the enemy:
enemy:
a) Single trees are chopped
chopped down so that a stump of about 11 to 11 ½ ‘/2 meter’s
meter’s height
height is left
standing.
standing. The treetop
treetop must
must fall in the direction
direction of the enemy,
enemy, and the whole
whole width
width of the
street must
must be obstructed
obstructed (Picture
(Picture 9).
Picture
Picture 11.
11. Wire Cable Blockade
Blockade
direction in which
The direction which the tree should fall is determined
determined by a notch
notch (1/5 to 1/3 of the diameter).
1/3 of diameter).
Saw cuts should end in this notch.
notch. Jamming
Jamming ofof the saw is avoided using a wedge.
avoided by using wedge.
22
The growth
growth ofof the tree and branches of other trees may
branches of influence the direction
may influence direction in which
which the tree
falls. In this case, push with sticks or pull
case, push pull with
with ropes
ropes in the direction
direction necessary.
necessary. (Picture
(Picture 9)
b) Tree blockades
blockades are made
made by cutting
cutting down trees
trees over a distance of 20 to 30 meters.
distance of meters. The trees
trees
should
should fall crosswise with the treetops
crosswise over each other, with treetops towards
towards the enemy
enemy and outwards
outwards so that
visibility into the obstacle
Visibility obstacle is obstructed.
obstructed. Only tress
tress in favorable
favorable positions
positions are cut (Picture
(Picture 10).
10).
Picture 12.
Picture Destroying a Road
12. Destroying Road
23
d) Destroying road: The road is dug out over its complete
Destroying a road: complete width,
width, 2 to 3 meters
meters wide
Wide and 11
meter deep.
meter deep. The earth is thrown
thrown down the embankment
embankment (Picture
(Picture 12).
12). This obstacle
obstacle is very
very
effective
effective in mountains
mountains on roads
roads that run along slopes. Repair
Repair of the street is complicated
complicated if the
bottom
bottom ofof the ditch is angled
angled downhill
downhill (Picture
(Picture 13).
13).
-.
M‘
”$3
63%}; LF"'k.5.}
‘_
r
'- l
..‘...',‘
-
L‘\\‘ a y -
Picture 13.
Picture Destroying a Road
13. Destroying Road
e) Wrecking
Wrecking of wooden
wooden bridges
bridges is sufficiently
sufficiently effective
effective if the planks
planks and support
support beams
beams of some
parts of the whole
parts whole bridge
bridge are removed.
removed. Destruction
Destruction is completed
completed by sawing through
through or removing
removing
the supports. wood must
supports. The wood must be removed rendered useless
removed or rendered useless by chopping
chopping or cutting
cutting it.
it. Against
Against
armored
armored vehicles
vehicles and light reconnaissance
reconnaissance tanks, wrecking can be camouflaged
tanks, the wrecking camouflaged by sawing
beams only halfway
the beams through. The bridge
halfway through. bridge will
will collapse
collapse after a vehicle
vehicle has driven
driven on it.
it.
f) It requires
requires a long time to prepare
prepare the incendiary
incendiary destruction
destruction of wooden
wooden bridges.
bridges. The fire must
fire must
be nourished
nourished from below.
below. Therefore,
Therefore, a large quantity
quantity of inflammable
inflammable material
material like tar, pitch,
pitch, oil,
gasoline, petroleum, straw etc. is necessary
gasoline, petroleum, necessary and must be fastened
fastened under
under every beam and all
every beam
supports.
supports. Hanging
Hanging or setting
setting up
up containers
containers (barrels,
(barrels, Jerry cans) filled with
with tar, petroleum,
petroleum, oil etc..
directly under
directly under the planks,
planks, pouring
pouring engine
engine oil over the bridge
bridge before
before igniting
igniting it and so forth,
forth,
accelerate
accelerate the destruction.
destruction. Sufficient
Sufficient draft is created
created by removing
removing some planks.
planks. Destruction
Destruction ofof a
bridge by burning
bridge burning it down requires
requires 5 to 10
10 hours. Long lasting obstruction of a road
lasting obstruction road is achieved
achieved
by erecting
erecting several
several echelons
echelons of barriers
barriers in depth.
depth. The effect of barriers
barriers is multiplied
multiplied by phony
phony
24
obstacles.
obstacles. They must be identical
identical to real barriers.
barriers. Phony
Phony barriers
barriers should be erected
erected in connection
connection
with the real ones or in alternation
with alternation with real ones. A phony
phony barrier
barrier will only be effective
effective if the
enemy notices it and if he has encountered
enemy notices encountered a similar real obstacle
obstacle before.
before. If mines have
have already
already
exploded
exploded in the direction of the enemy,
direction of enemy, motor
motor vehicles
vehicles will be easily stopped
stopped by a simple wire
wire or
wire rope,
Wire rope, a conspicuous
conspicuous sign on the road,road, fresh tar spots on the asphalt
asphalt of the road,
road, brushed
brushed
spots on cobblestones,
cobblestones, freshly
freshly repositioned
repositioned cobblestones,
cobblestones, dug up refilled holes,
up and refilled holes, iron pieces
pieces or
pieces of wooden
pieces wooden planks
planks placed
placed on earth, wires
Wires leading
leading into the earth near chopped
chopped down trees.
trees.
25
When
When setting up phony
setting up phony barriers,
barriers, a great variety
variety should be tried.
tried. In general,
general, the following
following
fundamentals
fundamentals must be observed when setting up
observed when up barriers:
barriers:
a) It should
should not be possible
possible to bypass
bypass the barrier.
barrier.
b) The enemy
enemy should come upon
upon the barrier unexpectedly (behind
barrier unexpectedly (behind curves,
curves, bushes
bushes etc.)
c) The barrier watched and be under
barrier should be watched under control
control by one’s
one’s own fireteam
fireteam or reinforced
reinforced
through hidden
through hidden charges.
charges.
Large
Large barriers
barriers (tree blockades,
blockades, destruction
destruction of roads, wrecking and burning
roads, wrecking burning of bridges)
bridges)
which require
which require more men and longer time can only be accomplished
longer time accomplished under
under favorable
favorable
circumstances.
circumstances. Help of the population
population is mostly
mostly necessary.
necessary. When laying
laying mine barriers,
barriers,
care must be taken
taken that other persons
persons do not observe
observe the work.
work.
26
IV. Tactics
1. Reaching
Reaching the Operational Areas Areas
a) By staying
staying behind
behind operations.
operations. This possibility
possibility is only given
given in mobile warfare and
mobile warfare
during
during enemy
enemy offensives.
offensives. It is most favorable
favorable if the guerrilla
guerrilla unit can stay
stay behind
behind in
predetermined operational
the predetermined operational area. If this is not possible,
possible, it is very
very important
important to
choose
choose an area within
within the battle zone out of whichwhich the guerrilla
guerrilla unit can march
march into
operational area under
the operational under greatest
greatest possible
possible cover and concealment.
concealment. It is very difficult
very difficult
or almost
almost impossible
impossible to stay behind
behind in areas where points of main battle effort
where the points effort are.
Supply
Supply and weapons
weapons caches
caches must be set up up in due time.
time. The guerrilla itself
guerrilla unit hides itself
in well-camouflaged
well-camouflaged fox-holes
fox-holes (Picture
(Picture 14),
14), dense,
dense, vast pine forests,
forests, field-ruins,
field-ruins,
cellars
cellars etc. in order to stay
stay behind.
behind.
b) Secret passage
passage through
through enemy
enemy lines in times
times of static battle action.
action. If circumstances
circumstances
permit, the whole
permit, whole guerrilla infiltrate to a favorable
guerrilla unit must infiltrate favorable sector at a favorable
favorable
time. Friendly
time. troops must support
Friendly troops them with all means
support them means available.
available. Suited therefore
therefore are
quiet sectors of of the front line that are secured
secured mainly fortified strongpoints,
mainly by fortified strongpoints,
densely
densely wooded
wooded terrain,
terrain, out of which
which concealed
concealed routes
routes into the operational
operational area can
be found.
found. Dark nights
nights and favorable
favorable weather: rain, fog, snow and gusty winds,
weather: rain, winds, must
be exploited.
exploited. Field-ruins,
Field-ruins, mining
mining installations
installations and other complex
complex build-up
build-up industrial
industrial
districts
districts are hard to oversee
oversee and also favor infiltration. rendezvous point
infiltration. A rendezvous point (RV) with
good cover and concealment
concealment must be arranged
arranged if the guerrillas
guerrillas are to pass
pass through
through
enemy their own. A RV is also important
enemy lines on their important and therefore
therefore must be ordered
ordered if the
unit is forced
forced to disperse.
disperse.
27
Picture 14.
Picture 14. Foxhole
Foxhole
28
A certain
certain waiting period must be ordered
waiting period ordered for the RV. Instructions
Instructions must be given in the case that a
guerrilla
guerrilla comes
comes late. After
After the successful passage through
successful passage through enemy
enemy lines, the guerrilla
guerrilla unit must
cautiously
cautiously advance
advance into the enemy’s rear area as far as possible
enemy’s rear possible and lay up
up in a good hide-out
hide-out
before
before dawn.
dawn.
c) Forced passage.
Forced passage.
Where
Where a secret passage through enemy
passage through enemy lines is not possible,
possible, an attack
attack of temporarily
temporarily united
united
guerrilla
guerrilla units through
through enemy
enemy lines maymay be in order.
order. In some cases,
cases, such attacks
attacks may
may be
conducted
conducted solely for this purpose.
purpose. Daring
Daring thrusts tank packs
thrusts of tank packs into the enemy’s
enemy’s rear promise
promise
success
success in some cases. The guerrillas
guerrillas will dismount where there
dismount where there is possible
possible undercover.
undercover. All
forced passages are difficult
forced passages therefore only to be used as a last possibility.
difficult and therefore possibility.
d) Over water
water or through
through the air by parachute
parachute drop or air landing
landing in the operational
operational area or near it
(See Appendix
Appendix 4). All identification
identification papers,
papers, letters,
letters, photos
photos and anything
anything else that may
may give the
enemy
enemy intelligence
intelligence clues must be turned
turned in prior
prior to the mission.
mission. False, misleading
misleading documents
documents and
papers may
papers may be taken
taken along. It is also necessary
necessary that the guerrilla
guerrilla memorize
memorize a well-planned
well-planned cover
cover
story
story (past life, family,
family, mission,
mission, own unit)
unit) so as to deceive
deceive the enemy’s
enemy’s intelligence.
intelligence.
3. Reconnaissance
Reconnaissance and Intelligence
Intelligence
Careful reconnaissance must give the leader of a guerrilla
Careful reconnaissance unit the fundamental
guerrilla unit fundamental information
information he
needs to make decisions.
needs decisions. It may
may also be of importance
importance for the general
general planning
planning of the guerrilla
guerrilla
unit and the regular
regular war command.
command. The general
general aim of reconnaissance
reconnaissance is to determine
determine the enemy
enemy
situation
situation in respect
respect to strength,
strength, location
location of staffs and units,
units, movements,
movements, intentions
intentions and combat
combat
strength.
strength. Guerrilla
Guerrilla warfare
warfare targets
targets require
require careful reconnaissance and observation
carefiil reconnaissance observation of the troop
troop
barracks, officer and functionary
barracks, officer functionary quarters,
quarters, fuel, ammunition
ammunition and foodfood depots
depots of the enemy
enemy his
security
security measures
measures and habits,
habits, his traffic
traffic routes
routes and communication
communication installations.
installations. Furthermore,
Furthermore, the
attitude
attitude of the population
population in the operational
operational area and the effect of the guerrilla
guerrilla unit’s
unit7s activity
activity on
the enemy
enemy and the population
population is of importance.
importance.
29
The main effort lies on the detection
detection and reconnaissance
reconnaissance of suitable
suitable targets
targets and gapsgaps in the
enemy’s
enemy’s security
security measures.
measures. Immediate
Immediate guerrilla
guerrilla warfare
warfare reconnaissance
reconnaissance is conducted
conducted by scouts
and small reconnaissance
reconnaissance parties,
parties, but most of all by men of confidence
confidence and occasional
occasional helpers
helpers
out of the population.
population. The results of reconnaissance
results of reconnaissance will be insufficient
insufficient without willing and
without the willing
understanding help of the population.
understanding population. This help must therefore
therefore be sought after. The scout should
see everything
everything without himself being
without himself being seen. Besides
Besides his special mission,
mission, he must always
always keep
keep the
security of his unit
security of unit in mind; he must give warningwarning in due time
time if danger
danger threatens.
threatens. If the scout
cannot
cannot avoid
avoid combat,
combat, he must
must strive to destroy
destroy the enemy
enemy quickly.
quickly. The dead enemy
enemy is searched
searched
identificationpapers,
for identification papers, letters,
letters, notebooks
notebooks and other sources of information;
information; his corpse
corpse hidden
is hidden
to prevent
prevent early discovery
discovery and pursuit.
pursuit. It is often favorable
favorable for scouts to disguise themselves as
disguise themselves
local inhabitants.
inhabitants. Greatest caution must be taken
Greatest caution taken when
when questioning residents. The important
questioning local residents. important
questions
questions must
must be placed
placed unsuspiciously
unsuspiciously among
among other unimportant
unimportant ones. Precautions
Precautions must also
be taken when preparing
taken when preparing to move
move on: asking
asking misleading
misleading questions
questions about
about routes
routes and locations
locations that
the scout never
never intends
intends to take, turning away
take, turning away from the intended route, and cutting
intended route, cutting back to deceive
deceive
possible pursuers
possible pursuers are all in order here. It is very
very important
important that the scout avoids
avoids leaving tracks or
leaving tracks
covers
covers those
those that he has made.
made. He avoids
avoids enemy
enemy controls
controls by bypassing
bypassing them
them on hidden paths.
hidden paths.
Occasionally right to boldly
Occasionally it is right boldly mingle with the traffic
mingle in with traffic on a busy
busy main road.
main road.
Permanent
Permanent informants
informants and occasional
occasional helpers
helpers out of the population
population will often deliver
deliver the most
valuable
valuable information
information because
because they can constantly
constantly observe
observe the enemy
enemy activities
activities without
without difficulty.
difficulty.
The most
most important
important task of the reconnaissance
reconnaissance service therefore
therefore is to install a network
network of
informants.
informants. A continuous
continuous surveillance
surveillance must be ensured
ensured in the cities, command-centers
command-centers and traffic
traffic
injunctions.
injunctions. Well suited as informants
informants and occasional
occasional helpers
helpers are persons
persons that are in contact
contact with
the occupation
occupation forces.
forces. This is especially
especially the case if they
they have access
access to the camps
camps and barracks
barracks
like innkeepers,
innkeepers, door-to-door
door-to-door salesmen,
salesmen, barbers,
barbers, and personnel
personnel from stores delivering
delivering goods.
goods. It
will be of greatest value if individual
greatest value individual soldiers dissatisfied or ideologically
soldiers that are dissatisfied ideologically close to the
guerrilla
guerrilla unit or persons
persons attached
attached to the enemy’s
enemy’s army
army can be won as informants.
informants. Untrained
Untrained
informants
informants must be given exact instructions
instructions as to which
which information
information is of value.
value. In order to avoid
avoid
endangering
endangering the informant,
informant, a “mailbox”
“mailbox” is agreed
agreed upon.
upon. This means that he is ordered
ordered to leave
his observations
observations and information
information at a certain
certain hiding place. Occasionally
hiding place. Occasionally an unsuspicious
unsuspicious
rendezvous is arranged
rendezvous arranged with him. This may may be in the traffic
traffic stream of a busy street on market
market
days, in front of food distribution points, stores, and in heavily
distribution points, heavily frequented
frequented public
public offices.
offices. Usable
Usable
reconnaissance results
reconnaissance results are often only obtained
obtained after long and patient
patient observation.
observation. If other sources
sources
bring no results,
results, it may
may become necessary to take
become necessary take a prisoner
prisoner in order to question
question him. The best
time therefore
time therefore is during
during a rainy night.
rainy night.
30
Usable results are often obtained
Usable results obtained by listening
listening in on the enemy’s radio communication
enemy’s radio communication and
tapping his telephone
tapping telephone wires.
wires. See special instructions
instructions for this. The reliability
reliability of all reconnaissance
reconnaissance
elements
elements and sources
sources must be constantly
constantly controlled
controlled by comparison
comparison and rechecking.
rechecking. Important
Important
decisions must only be based
decisions based on information
information that has been verified through
been verified through several independent
independent
sources. After
sources. After the target
target has been
been determined,
determined, the information
information obtained
obtained by intelligence must be
intelligence must
supplemented
supplemented by a thorough
thorough reconnaissance
reconnaissance of of the terrain
terrain around target. It is very
around the target. very important
important
find concealed
to find routes for the approach
concealed routes approach and withdrawal.
withdrawal. A sketch of the area is of value.
value. Often
Often
reconnaissance activity
the reconnaissance activity will be determined
determined by orders
orders from the Wehrmacht.
Wehrmacht.
4. The March
Guerrilla units almost
Guerrilla units almost always
always march
march at night.
night. Bad weather must be exploited.
weather must exploited. They avoid
avoid
dwellings, roads and paths
dwellings, roads paths that are often used.
used. When forced
forced to use paths
paths and tracks,
tracks, greatest
greatest
caution
caution must be exercised;
exercised; marching
marching at the edge or parallel
parallel to the path
path lessens
lessens the danger.
danger. The
march of the guerrilla
march of guerrilla unit must be a steady cautious
cautious advance
advance (Picture
(Picture 15).
15).
‘. Him?” "'5: a: .
Picture
Picture 15. Noiseless walking
15. Noiseless walking
Left: On soft ground
ground
Middle:
Middle: On hard ground
ground
Right:
Right: On grass
grass
31
31
It is best to advance
advance from sector to sector with with frequent
frequent silent halts in order to listen and observe.
observe.
The march
march of the guerrilla
guerrilla platoon
platoon is secured by advance
advance scouts. Larger
Larger units employ
employ an advance
advance
party and a rear guard.
party guard. In general,
general, it is not necessary
necessary to secure the flanks,
flanks, spreading
spreading out too much
much
attracts
attracts the attention
attention of of the enemy.
enemy. The advance
advance party must always
party must always be intent to avoid
avoid terrain
terrain that
makes
makes a silent advance
advance impossible.
impossible. Before
Before reaching
reaching defiles
defiles and areas with with little cover and
concealment,
concealment, scouts are sent out to reconnoiter
reconnoiter and secure the march march route
route and the flanks.
flanks. The
guerrilla
guerrilla unit waits
waits in combat readiness until
combat readiness until they return.
return. These scouts must must also advance
advance from
Communication between
sector to sector. Communication between the scouts and the unit achieved with the help of
unit is achieved
unsuspicious signs (animal
unsuspicious (animal sounds, visual signs). The meanings
sounds, visual meanings of these
these signs must often be
changed.
changed. Greatest
Greatest care mustmust be taken
taken to avoid, or respectively,
respectively, to cover tracks.
tracks. Where
Where this is not
possible, the enemy
possible, enemy must be deceiveddeceived withwith false tracks
tracks and by cutting
cutting back. It is strictly
forbidden
forbidden to smoke during during the march.
march. Marches will only be conducted
Marches will conducted at daytime when it is
daytime when
absolutely necessary, in this case,
absolutely necessary, case, every possibility for cover and concealment
every possibility must be used in
concealment must
order to avoid
avoid detection
detection by ground
ground or air surveillance.
surveillance. Long detours
detours are often unavoidable.
unavoidable. The
behavior
behavior of domestic animals, wild
domestic animals, wild beasts
beasts and birds must
must be observed
observed because
because it is often possible
possible
to draw conclusions
conclusions as to the presence
presence of humans
humans out of it. If the unit comes
it. If comes upon
upon single local
inhabitants,
inhabitants, they must must be taken
taken along under pretense that they are needed
under the pretense needed as couriers
couriers or
guides.
guides. While
While theythey are with
with the unit, they must be questioned
questioned and deceived
deceived as to the real
intentions
intentions of the unit through
through conversation
conversation conducted
conducted for this purpose between members
purpose between members of the
unit. Finally,
unit. they must be sent off
Finally, they off in a misleading
misleading direction.
direction. Security
Security measures
measures must be taken taken
immediately
immediately during
during longer march rest periods.
longer march periods. The guerrillas
guerrillas securing
securing the area must be able to
provide heavy
provide heavy firepower.
firepower. Before
Before resting,
resting, the unit must cut back.
back. The area for the rest must offer
good cover
cover and concealment
concealment as well well as fields
fields of fire
fire against
against any
any enemy
enemy following
following the tracks
tracks of
the unit (Picture
(Picture 18).
18). When
When continuing
continuing the march,
march, even after a short rest, a personnel
personnel check
check must
be made
made so that nobody
nobody is left behind.
behind.
1 4 "
.k _,-’
‘* ‘
A A.
\ x i 13/ .L"
" d I’—/
A A
\ n
A.
k
A_ A
_' .- o.
A
_>_7‘nn
_ '
A ‘-
u‘l
L
‘ f.
-
f /'
,.
'
"
z
" '
'
1
1' Il
1
"
A
//
‘ 5" I‘
“n : ' A
n
/.’. n/
I
n k 4
‘
_
-
.
"
V
an A
—:
-, - _ —.—‘
- 1‘ o ——
7
—- 3
0
.
"‘zV-V’ a 1
Picture 16.
Picture 16. Cutting
Cutting Back Before
Before Resting
Resting
The rest area is designated by the circle.
32
5. Checkpoints
Checkpoints for Planning
Planning
Preparatory
Preparatory intelligence
intelligence and reconnaissance
reconnaissance give the leader
leader the information
information he needs
needs in order to
plan an operation.
plan operation. When
When he has reached
reached a decision,
decision, he must reconsider
reconsider the plan
plan of operation
operation he
intends
intends to conduct
conduct and talk it over with
with his men. Where possibility is given,
Where the possibility given, he must practice
practice
important
important details
details with them.
them. When planning
planning the following points must be observed:
following points observed:
a) Place!
Place! 7– Where?
Where? Where
Where is the target?
target? Which routes of approach?
Which routes approach? Which routes for
Which routes
withdrawal? Which
withdrawal? Which advantages
advantages ofof the terrain
terrain can I exploit?
exploit?
b) Time!
Time! – 7 When?
When? When operation? At night?
When is the best time for the operation? night? During
During the day?
During
During moon-light?
moon-light? During
During complete
complete darkness?
darkness? When
When do the guards
guards change?
change? When
When is the
target
target not secured
secured strongly?
strongly?
c)
C) Forces!
Forces! 7 – Who?
Who? Who is guarding/securing
guarding/securing the target?
target? Regular
Regular army?
army? A special unit?
unit?
Language?
Language? How strong?
strong? Positions
Positions of guards?
guards? Attitude
Attitude of the population
population living near the
target? Who will execute
target? execute the operation?
operation? Required
Required strength?
strength? Distribution
Distribution of tasks.
tasks.
d) Combat
Combat means!
means! – 7 What?
What? What means
means for destruction
destruction are necessary
necessary in order to conduct
conduct
the operation?
operation? Amount
Amount of explosives
explosives and incendiaries?
incendiaries? Which
Which type of weapons?
weapons? Which
Which
type of special clothing?
type clothing? Which
Which equipment?
equipment? Which
Which helpful
helpful aids will I find at the target?
target?
e)
6) Execution!
Execution! – 7 How? How will I execute
execute the operation?
operation? Combat plan? Demolitions
Combat plan? plan?
Demolitions plan?
Possibilities
Possibilities to infiltrate
infiltrate secretly?
secretly? Preparation, jump-off position?
Preparation, jump-off position? Deception
Deception of of the
enemy?
enemy? How do I avoid the security
security elements?
elements? How do I avoidavoid or break resistance?
break resistance?
key-words, “Where?
The key-words, “Where? – 7 When?
When? 7 – Who? – What?
Who? 7 What? –7 How?”
How?” are mainly
mainly intended
intended for the
planning of interdiction
planning interdiction operations.
operations. Used accordingly,
accordingly, they may
may also be considered
considered when
when
planning other operations.
planning operations.
6. Interdiction Operations
Operations
In the first phase
phase of guerrilla warfare, interdiction
guerrilla warfare, interdiction operations
operations are of prime
prime importance.
importance.
The parts
parts of this phase
phase are directed
directed against targets in the enemy’s
against targets rear:
enemy’s rear:
a) Supply
Supply of the enemy’s
enemy’s attack
attack spearheads:
spearheads: fuel, ammunition,
ammunition, equipment,
equipment, maintenance
maintenance
services;
services;
Railway installations:
b) Railway installations: rails, railway
railway bridges,
bridges, train stations,
stations, signal boxes,
boxes, turntables,
turntables,
switch points,
points, communication
communication and signal means, means, repair
repair shops;
c) Bridges
Bridges on supply routes;
routes;
d) Transport
Transport facilities: trucks, cars,
facilities: trucks, cars, trailers, tractors, locomotives,
trailers, tractors, locomotives, railway wagons,
railway wagons,
airplanes,
airplanes, horse-drawn
horse-drawn carts;
e) Air traffic:
traffic: airports,
airports, airfields,
airfields, hangars;
hangars;
f) Oil pipelines,
pipelines, fuel dumps,
dumps, tank trucks,
trucks, filling
filling stations;
stations;
g) Ammunition
Ammunition dumps,
dumps, food stores, equipment
equipment stores;
h) Communication
Communication installations:
installations: Telegraph
Telegraph and telephone
telephone lines and transmitting
transmitting stations,
stations,
broadcasting stations,
broadcasting stations, radio
radio communication
communication installations;
installations;
i)
i) Installations
Installations at waterways,
waterways, floodgates,
floodgates, lifting
lifting tackles;
tackles;
j) Powerplants,
Powerplants, gasgas and waterworks,
waterworks, dams;
dams;
33
k) Mines
Mines and industrial plants of all sorts.
industrial plants
Surprise
Surprise is the main prerequisite
prerequisite for success.
success. Therefore,
Therefore, absolute
absolute secrecy
secrecy of all
preparations is necessary.
preparations necessary. All communication
communication lines leading
leading away
away from the enemy
enemy
installation
installation are severed
severed when
when the raid starts. Even in small-scale
small-scale operations,
operations, a
clear distribution
distribution of destruction,
destruction, security
security and combat tasks is necessary.
combat tasks necessary. A
security party secures,
security party secures, protects
protects or warns
warns against
against surprise:
surprise: a destruction
destruction party
party
destroys
destroys the target.
target. Small units
units must avoid
avoid combat.
combat. In large-scale
large-scale operations
operations a
reserve is held back
reserve back in order
order to break unforeseen
unforeseen resistance
resistance and cover
cover the
withdrawal of the unit after execution
withdrawal execution of the operation.
operation. The reserve
reserve should
primarily be equipped
primarily equipped with a sufficient
sufficient number
number of automatic
automatic weapons.
weapons. The
reserve party
reserve party can cover the withdrawal
withdrawal with
with gunfire
gunfire and by laying
laying out mines
mines or
booby traps.
booby traps. With the latter, it is possible
possible to gain a considerable
considerable amount
amount of time.
time.
In larger scale operations,
operations, simultaneous
simultaneous diversionary
diversionary and feint attacks,
attacks, ambushes
ambushes
along the roads
roads leading
leading to the target,
target, or mining
mining of the routes
routes can occasionally
occasionally be
advantageous.
advantageous. When strong strong enemy
enemy firepower
firepower can be expected,
expected, his possible fire
possible fire
plan must be considered
plan considered during
during the planning.
planning. The instructions
instructions under number 9 are
under number
withdrawal.
valid for the withdrawal.
34
7. Ambush
Ambush
Next
Next to interdiction
interdiction operations,
operations, the ambush
ambush is one of the most promising
promising means
means of waging
waging
guerrilla warfare. It is successful
guerrilla warfare. successful if the enemy
enemy is completely
completely surprised.
surprised. This can be achieved
achieved
through careful
through planning and occasionally
careful planning occasionally by skillful
skillful and quick improvisation.
improvisation. The smaller the
operation,
operation, the easier its execution
execution and the larger
larger the possibility
possibility of avoiding
avoiding failure.
failure. The approach
approach
to the ambush
ambush site must be unnoticed
unnoticed by the enemy
enemy and the population.
population. Enemies
Enemies met by chance
chance
must be killed
killed inconspicuously.
inconspicuously. Local inhabitants
inhabitants must be detained
detained for the duration
duration of the
operation. If necessary,
operation. If necessary, the operation
operation must be cancelled.
cancelled. The ambush
ambush must be set up up in suitable
suitable
terrain. Areas
terrain. Areas that are too obvious
obvious as ambush
ambush sites like defiles,
defiles, hollows
hollows etc. must be avoided.
avoided.
Well suited on the other hand are inconspicuous positions in hedges,
inconspicuous positions hedges, forest edges,
edges, cornfields,
cornfields,
settlements
settlements and gardens,
gardens, especially
especially if they offer possibilities
possibilities of covered
covered and concealed
concealed
withdrawal. Patient,
withdrawal. noiseless, and motionless
Patient, noiseless, motionless waiting,
waiting, often over a longer
longer period
period of time,
time, are
necessary when
necessary when laying
laying in ambush.
ambush. Fire only opens
opens upup when
when the order or predetermined
predetermined sign is
given.
given. In larger scale ambushes
ambushes the advance
advance party
party of the enemy
enemy should be allowed
allowed to passpass in
order to hit the more valuable
valuable targets
targets following.
following. If sufficient
sufficient forces
forces are available,
available, a separate
separate
ambush
ambush maymay be set upup for the expected
expected advance
advance party.
party. Fire on the advance
advance party
party may
may open
open upup
only after the main ambush
ambush is sprung.
sprung. In smaller operations,
operations, only weaker
weaker enemy units, that can
enemy units,
be completely
completely destroyed,
destroyed, are ambushed.
ambushed. The most effective
effective arms in ambushes
ambushes are automatic
automatic
weapons. Their effect is greatly
weapons. multiplied if mortars
greatly multiplied mortars etc. can also be employed.
employed. Where
Where it is
possible, the ambush
possible, ambush should be combined
combined with minefields.
minefields. The pictures
pictures 17,
17, 18
18 and 1919 give a
guideline
guideline as to how ambushes
ambushes maymay be set up.
up.
Hereby
Hereby the following
following peculiarities
peculiarities must be observed.
observed.
a) In ambushes
ambushes at streets, it must always
always be considered
considered that the enemy will secure his
enemy will
march
march routes
routes and watch
watch over them, with patrols,
them, with patrols, security
security elements, reconnaissance
elements, reconnaissance
parties and airplanes.
parties airplanes.
The ambush
ambush must therefore
therefore be camouflaged
camouflaged so well that that enemy
enemy security
security elements
elements and stronger
stronger
enemy
enemy units that are allowed
allowed to pass
pass do not notice
notice it.
it. Reconnaissance
Reconnaissance must be continued
continued during
during a
larger
larger operation
operation in order to make
make an unexpected
unexpected enemy
enemy attack
attack impossible.
impossible. The tasks
tasks of security
security
and reconnaissance
reconnaissance elements,
elements, on one side, and combat
combat and reserve
reserve elements,
elements, on the other, must
be closely
closely and carefully
carefully defined.
defined.
35
Picture 17.
Picture Road Ambush
17. Road of a Guerrilla
Ambush of Guerrilla Group
Group
These guerrillas open up fire
open up fire from the flanks.
flanks. A machine gungun or two guerrillas then fire
fire on and along the road and
especially into the road-ditches.
36
When
When ambushing
ambushing motorized march columns,
motorized march of the column
columns, the front of column must
must be forced
forced to stop. This
is done by using barriers. Only then is fire
using barriers. fire opened
opened up
up on the vehicles.
vehicles.
Picture 18.
Picture 18. Road Ambush
Ambush of a Guerrilla Platoon
Guerrilla Platoon
It is very
very advantageous
advantageous ifif a small guerrilla
guerrilla unit can execute
execute ambushes
ambushes at various
various roads
roads in short
order.
order. The enemy
enemy is thus deceived
deceived into thinking
thinking that the area is infested
infested with
with guerrilla
guerrilla units. This
units.
forces
forces the enemy
enemy to employ
employ intensive
intensive security measures and ties up
security measures up a larger
larger number
number of of his
troops. When this has been
troops. When been achieved,
achieved, the main
main effort of the guerrilla
guerrilla unit is shifted
shifted to other
operations.
operations.
b) In ambushes
ambushes it railways,
railways, the aim is to completely
completely destroy
destroy as much material and enemy
much material enemy
personnel as possible.
personnel possible. Ambushes
Ambushes at railways
railways are the task ofof larger guerrilla units, platoons
guerrilla units, platoons or
corps.
corps. Smaller
Smaller units may
may conduct
conduct demolition of rails
demolition of rails and harassment
harassment by occasional
occasional gunfire.
gunfire.
Ambushes at downhill
Ambushes downhill sections of the railway,
sections of if possible,
railway, and if possible, at a curve
curve in connection with
connection with
mines, are potentially
mines, worthwhile.
potentially worthwhile.
37
Obstructions
Obstructions of longer
longer durations
durations are thus
thus achieved;
achieved; also, the curve can be covered more easily by
covered more
gunfire.
gunfire.
I‘ A "L
(.1 \- L
L .J
Picture
Picture 19. Railway Ambush
19. Railway Ambush of a Guerrilla
Guerrilla Platoon
Platoon
The ambush
ambush site should be away away from fortifications, rail-way stations,
fortifications, rail-way stations, and junctions
junctions as far as
possible in order to avoid quick intervention
possible intervention by enemy
enemy security
security forces.
forces. Communication
Communication wireswires
must also be cut. Before
must Before the operation,
operation, intelligence
intelligence and reconnaissance
reconnaissance must concentrate
concentrate on
observing traffic
observing traffic density
density protective
protective measures,
measures, and whowho occupies
occupies the trains.
trains. During
During the operation,
operation,
every
every guerrilla
guerrilla group
group and every
every single
single guerrilla
guerrilla must know exactly which
know exactly which task they
they have been
given. After
given. After successful
successful demolitions,
demolitions, the main impact of the gunfire
impact of gunfire must
must be directed
directed against
against the
cars that are damaged
damaged least. Soldiers jumping out of
Soldiers jumping of the train
train must be taken
taken with
with fire
fire from the
flanks.
flanks. Possible near the train must be controlled
Possible cover near controlled by gunfire.
gunfire. In most cases a sign for the
opening
opening of fire
fire is not necessary.
necessary. It is opened
opened up with the explosion
up with explosion of the mines
mines and the derailing
derailing
of the train.
train.
38
It is very
very important
important that a sign for cease-fire
cease-fire be predetermined
predetermined in order to avoid
avoid endangering
endangering the
guerrilla
guerrilla groups
groups that have
have been assigned
assigned the task of destroying remains of the train and
destroying the remains
salvaging usable booty (weapons,
salvaging the usable (weapons, ammunition,
ammunition, food, medicine,
medicine, clothing).
clothing).
8. Raids
Raids
By fully exploiting
exploiting the surprise
surprise element
element of a raid,
raid, it is possible
possible to destroy
destroy an enemy
enemy that is
superior
superior in numbers
numbers or weapons.
weapons. But if the raid is unsuccessful,
unsuccessful, the operation
operation often
often ends withwith
high losses.
losses. If the enemy
enemy has a great numerical
numerical superiority
superiority and fights
fights with tactical
tactical skill, this can
lead to the destruction
destruction ofof the guerrilla
guerrilla unit. Therefore,
Therefore, the decision
decision to raid a superior
superior or stronger
stronger
enemy,
enemy, for example,
example, a strongpoint,
strongpoint, an enemy-occupied
enemy-occupied village,
village, a staff, an airport,
airport, a camp,
camp, a
railway station,
railway station, should
should be considered
considered very thoroughly. All circumstances
very thoroughly. circumstances must be checked.checked.
Reliable
Reliable and secure routes
routes of withdrawal
withdrawal in case of failure
failure are a prerequisite.
prerequisite. Only a leader
leader with
very
very good tactical training will be able to plan and conduct
tactical training conduct a raid or a well-defended
well-defended larger
larger
target. Improvised
target. Improvised raids at each possible
possible opportunity
opportunity are far more
more promising
promising and muchmuch easier
easier
than attacks
than attacks against difficult targets.
against such difficult targets. Even smaller
smaller guerrilla
guerrilla units can achieve
achieve good results.
results.
possibilities are given
Such possibilities given by chance
chance when
when coming stragglers, wood
upon stragglers,
coming upon wood collection
collection parties,
parties,
messengers,
messengers, lone vehicles,
vehicles, staff
staff on reconnaissance.
reconnaissance. They may
may also be sought or created:
created: for
example,
example, by guerrillas
guerrillas hiding
hiding on a traintrain and attacking personnel on the locomotive.
attacking the personnel locomotive. Or by
burglarizing
burglarizing the apartment
apartment of a functionary killing him, or attacking
functionary and killing attacking enemy
enemy duty offices,
offices,
powerplants, out-posts
powerplants, out-posts that are insufficiently
insufficiently secured.
secured. Skillful exploitation
exploitation of such possibilities
possibilities is
the nature of guerrilla
nature of warfare. They offer good chances
guerrilla warfare. chances of success
success at little risk.
risk.
The raid of a larger
larger target
target that is easy
easy to defend
defend and well
well secured,
secured, for example,
example, an enemy-
enemy-
occupied
occupied dwelling,
dwelling, requires
requires careful
careful planning.
planning. Sufficient
Sufficient forces
forces must also be available.
available. This is
only possible
possible for larger guerrilla units. The aim is the destruction
guerrilla units. destruction of the important
important enemy
enemy
installations
installations that are set up up there, i.e. powerplants,
powerplants, fuel dumps,
dumps, staffs etc. Thorough
Thorough
reconnaissance and intelligence
reconnaissance intelligence must be conducted
conducted before planning. Strength,
before planning. Strength, order of battle,
battle,
armament
armament and deployment
deployment of of the enemy,
enemy, his security
security and defense
defense instructions,
instructions, defensive
defensive
installations,
installations, barriers,
barriers, communication
communication lines to neighboring
neighboring villages,
villages, immediate
immediate security
security at the
operation
operation target,
target, must be established
established in advance.
advance. In order to achieve
achieve a certain
certain familiarity
familiarity with the
habits
habits of the enemy,
enemy, intelligence
intelligence and reconnaissance
reconnaissance must be conducted
conducted over a longer period of
longer period
time. The help of the inhabitants
time. inhabitants is absolutely necessary. The combat
absolutely necessary. plan is made according
combat plan according to
the results of the intelligence
results of intelligence and reconnaissance.
reconnaissance. It must primarily
primarily contain:
contain:
a) Disposition
Disposition of forces,
forces, combat
combat means
means and equipment;
equipment;
b) Order of battle,
Order of battle, allocation
allocation of security, relief assault
security, relief assault and destroy
destroy groups;
groups;
c) Assignment
Assignment of the attack and destroy targets; instructions
destroy targets; security and relief
instructions to the security relief
groups;
groups;
d) Support
Support on the part
part of the inhabitants
inhabitants or through
through guerrillas
guerrillas that have infiltrated;
infiltrated;
e) March
March and approach
approach
of attack (if necessary,
f) Time of necessary, attack signal) watch word,
signal) watch word, recognition
recognition signals
signals
g) Orders
Orders for withdrawal,
withdrawal, immediate,
immediate, secondary
secondary rendezvous points
rendezvous points
h) Place of the leader
leader during
during the attack
attack
39
The raid must start by surprise.
surprise. The operation
operation must be called off if the element
called off element of surprise
surprise
is lost before
before the attack.
attack. The execution
execution of a raid requires
requires ruthless
ruthless daring,
daring, energetic
energetic
momentum and flexible
momentum flexible improvising.
improvising. Unexpected
Unexpected enemy
enemy defense
defense must be broken. broken.
Surprise
Surprise over the defenders
defenders must always
always be taken
taken into consideration when raiding
consideration when raiding large
objects,
objects, even after very
very thorough
thorough reconnaissance.
reconnaissance. The first, most important
important aim is the
simultaneous
simultaneous destruction
destruction of all securing
securing elements if this is possible.
elements if possible. This is best achieved
achieved
through guerrillas
through infiltrated into the village
guerrillas that have infiltrated before the raid and attack
village before attack the
sentries
sentries or guards predetermined time or signal. At the same time
guards at a predetermined time all communication
communication
wires leading
wires leading from the village
village are cut. The second
second aim is to seize the most important
important key
positions before
positions before the alarmed
alarmed defenders
defenders can man themthem and at the same time attack attack the
barracks, where
barracks, where the soldiers must be killed
soldiers must killed or contained.
contained. The most important rules of
important rules
street combat
combat must be observed:
observed: containing
containing enemy resistance pockets
enemy resistance pockets through
through automatic
automatic
weapons and mortars;
weapons mortars; avoiding
avoiding open places and the middle
open places middle of the street, usingusing all
possible cover that doors,
possible doors, corners,
comers, columns
columns etc. offer: smoking
smoking out houses
houses that are
stubbornly
stubbomly defended with hand grenades,
defended with if necessary,
grenades, if necessary, by demolitions
demolitions or by burning
burning them
them
out. Only after successful paralyzation of the defenders
successful paralyzation defenders can the planned
planned destruction
destruction be
executed.
executed.
40
40
Unexpected
Unexpected disturbances
disturbances must be quieted relief groups
quieted by the relief groups held in readiness.
readiness. Unceasing
Unceasing
reconnaissance during
reconnaissance during the execution
execution of the raid must not be neglected.
neglected. Elements
Elements must secure
against
against neighboring
neighboring villages.
villages. Streets, on which
which enemy
enemy reinforcements
reinforcements may may arrive,
arrive, must be sealed
with barriers. After
with barriers. After execution
execution of the operational
operational aims on which
which the raid
raid was based,
based, the groups
groups
withdraw in predetermined
withdraw predetermined order after the signal to do so has been given. relief groups
given. The relief groups that
were held in readiness
were readiness cover the withdrawal
withdrawal and disengagement
disengagement from the enemy.enemy. Raids against
against
weaker objects,
weaker objects, train stations,
stations, depots
depots and supply and industrial
industrial installations
installations outside
outside of enemy
enemy
guarded
guarded settlements
settlements can be conducted
conducted by small guerrilla
guerrilla units.
units. These
These must be planned
planned according
according
to the same basic tactical
tactical rules
rules that are valid for operations
operations against
against strongly
strongly secured
secured settlements.
settlements.
They promise
promise easier success.
success.
8. Disengagement
Disengagement
Skillful
Skillful disengagements
disengagements from the enemy enemy and withdrawal
withdrawal after the execution
execution of an operation,
operation, or
when breaking
when breaking off of an operation,
operation, is a tactical
tactical component
component of guerrilla
guerrilla warfare.
warfare. Successful
Successful
withdrawal secures
withdrawal secures the possibility
possibility of landing
landing new new surprising
surprising blows
blows against
against the enemy.
enemy.
Withdrawal
Withdrawal is easiest
easiest if it is possible
possible to completely
completely destroy
destroy the enemy.
enemy. This must be considered
considered
when choosing
when choosing a target.
target. Operations
Operations in which
which the guerrilla
guerrilla unit could be engaged
engaged in a long-lasting
long-lasting
fight
fight with superior
superior enemy
enemy forces must be avoided.
forces must avoided. They do not fit fit in with the character
character ofof
guerrilla warfare because
guerrilla warfare they make withdrawal
because they withdrawal extremely
extremely difficult.
difficult. Concealed
Concealed routes
routes of
withdrawal must always
withdrawal always be reconnoitered
reconnoitered even if complete
complete success
success can be expected.
expected. Orders
Orders for
withdrawal along these
the withdrawal routes must be given in advance.
these routes advance. The withdrawal
withdrawal from the enemyenemy is
conducted
conducted individually
individually or in small groups.
groups. Rendezvous
Rendezvous pointspoints and waiting
waiting times
times must always
always be
ordered
ordered beforehand.
beforehand. In most cases, cases, it is appropriate
appropriate to determine
determine an immediate
immediate RV (1-3
kilometers) with a short waiting
kilometers) waiting time (1-3 hours)
hours) and a secondary
secondary RV withwith a longer
longer waiting
waiting time
(about
(about 24 hours).
hours). The RV points
points should offer good cover cover and concealment,
concealment, close observation
observation
posts, and concealed
posts, concealed routes
routes of withdrawal.
withdrawal. It is absolutely
absolutely necessary
necessary to secure the RV. The
possibility that the enemy
possibility enemy may find the RV by treason
may find treason must always
always be considered.
considered. The rest area
of the unit must therefore
therefore be away
away from the RV point.
point. Only a guide remains
remains at the RV. Groups
Groups
must always
always be ordered
ordered to cover
cover the withdrawal
withdrawal of the guerrilla
guerrilla unit with gunfire
gunfire and barriers
barriers if
the operation
operation is conducted
conducted by a larger
larger guerrilla unit.
guerrilla unit.
40
40
y
I
"'23::
0—:1’
n~--—--""
,.'
n
#--
s’ G-
a
F‘"
i’—
- .
"
-
nA n & n
‘ ~ :i" r—fl
'
,
I 1 A
.' - - " - :‘r - '\ ('1
I i (I
,1.
:1 .l (I
‘
:
‘. _
‘ A.
- _,.-— . 1] -~ 2. .1 i n
Picture 20. Backtracking
Picture Backtracking and Jumping Off the Track
Jumping Off
off his tracks into a group
The guerrilla first went to the forest edge where he backtracked and jumped off of bushes.
group of
He waded through a creek in order to further conceal his tracks.
41
41
It is best to give this task relief groups
task to the relief groups held in readiness.
readiness. Pursuit
Pursuit from skillful
skillful scouts,
tracking dogs, and trackers
tracking trackers must always
always be expected. possibilities to deceive
expected. All possibilities deceive them and
conceal
conceal one’s own tracks
tracks must be used.
used. Such possibilities
possibilities are: backtracking,
backtracking, cutting
cutting back,
jumping off the track
jumping track at suitable places, wading
suitable places, wading through
through streams.
streams. Setting
Setting up
up ambushes
ambushes along the
route of withdrawal
route withdrawal now and then after a successful
successful operation
operation can lead to new
new success
success and make
further withdrawal easier.
further withdrawal easier.
42
42
Protection Against
11. Protection Countermeasures
Against Countermeasures
The following
following countermeasures
countermeasures may
may be expected
expected from the enemy:
enemy:
a) Use of informants
informants and provocateurs.
provocateurs.
b) Employment
Employment of special hunter forces.
forces.
c) Encirclement
Encirclement and search of the operational
operational area.
d) Securing
Securing and guarding
guarding of all war-vital
war-vital installations.
installations.
a) The use of informants
informants and provocateurs
provocateurs forces the guerrilla reinforce their
guerrilla unit to reinforce their
observation
observation teams
teams and use special precautions when contracting
precautions when contracting civilians.
civilians. Men of of
confidence
confidence and sympathizers
sympathizers must be ordered
ordered to observe
observe the enemy
enemy agency
agency that recruits
recruits
and employs
employs the informants
informants against
against guerrilla units. Informants
guerrilla units. Informants that have been uncovered
uncovered
must be destroyed.
destroyed.
b) The employment
employment of special hunterhunter forces
forces by the enemy
enemy is a considerable
considerable problem
problem for
guerrilla
guerrilla fighters.
fighters. It is the mission of these
mission of these hunter
hunter forces
forces to detect, pursue and fight
detect, pursue fight the
guerrilla units with
guerrilla units with the same means
means and methods
methods 7– cunning,
cunning, camouflage,
camouflage, surprise
surprise –
7 that
the guerrillas
guerrillas use. Because
Because of this, the enemy
enemy hunter
hunter forces, which consist
forces, which consist of specially
specially
picked men,
picked men, are particularly
particularly dangerous.
dangerous. Only untiring
untiring watchfulness
watchfulness and never
never lessening
lessening
caution
caution can protect
protect against
against surprise
surprise attacks
attacks from enemy
enemy hunter
hunter forces.
forces.
It may
may become necessary to concentrate
become necessary concentrate the complete
complete guerrilla
guerrilla war effort in an
operational
operational area on destroying
destroying an especially
especially dangerous
dangerous enemy
enemy hunter
hunter force.
c)
C) Encirclement
Encirclement and search of the operational
operational area requires
requires a large number
number of troops.
troops. If the
enemy
enemy sees himself
himself forced
forced to employ
employ such measures
measures that tie down a large number
number of his
forces,
forces, this is already
already a success.
success. Such large-scale
large-scale operations feared less than the
operations must be feared
employment
employment of hunter
hunter forces because there
forces because there always
always are sure possibilities
possibilities to evade:
evade:
aa) Withdraw
Withdraw from the operational
operational area when
when the enemy
enemy intention
intention of encirclement
encirclement has
been detected;
been detected;
bb) Exfiltrate through enemy
Exfiltrate through enemy lines where
where they are very thin at the beginning
very thin beginning of the
encirclement
encirclement in favorable terrain;
favorable terrain;
cc) Stay behind
behind the lines in well-camouflaged
well-camouflagedfoxholes
foxholes or similar hideouts;
hideouts;
dd) Break
Break out of the encirclement
encirclement at a weak
weak point
point in the line.
d) The securing
securing a guarding
guarding of the land and of all-important
all-important installations
installations by the enemy
enemy makes
careful
careful reconnaissance
reconnaissance and planning
planning for guerrilla
guerrilla actions
actions but does not make the actions
actions
impossible.
impossible. There
There is no countermeasure
countermeasure of the enemy enemy that cannot
cannot be rendered
rendered useless
useless
through skillful
through skillful adaption
adaption to it.
it. The attitude
attitude of the population
population and the amount
amount of assistance
assistance
it is willing
willing to give to the guerrilla
guerrilla unit is of great importance.
importance.
43
43
V. Action Against Enemy Agitation
Because
Because of the close
Close relationship
relationship of guerrilla
guerrilla warfare
warfare and politics,
politics, action against
against enemy
enemy agitation
agitation
is a task that is just as important
important as interdiction
interdiction and combat
combat actions. means must be used to
actions. All means
ward
ward off enemy
enemy influence
influence and waken
waken and maintain
maintain a clear political
political will.
will. Tactical
Tactical activities
activities must
always
always take consideration
consideration of this necessity.
necessity. It is essential
essential for the guerrilla unit to have constant
guerrilla unit constant
news of the general
news general situation.
situation.
The intellectual-political
intellectual-political instruction
instruction is intended
intended for:
Because of their
a) Because their strenuous
strenuous combat
combat activity,
activity, the guerrilla themselves need
guerrilla units themselves need special
intellectual-political
intellectual-political care and leadership.
leadership. Guerrilla
Guerrilla warfare
warfare is not possible
possible without
without a
clear political will. The guerrilla
political will. guerrilla not only submits
submits to extreme
extreme hardships
hardships and constant
constant
danger,
danger, but also to the intellectual
intellectual influences
influences that are predominant
predominant in the rear area of
the enemy.
enemy. His political
political will must be strengthened
strengthened and hardened
hardened against these
against these
wearing influences,
wearing influences, and his spirit challenged
challenged to constant
constant watchfulness.
watchfulness. The most
effective
effective means
means of intellectual-political
intellectual-political instruction
instruction for the guerrilla unit is the
guerrilla unit
example
example of of their leader.
leader. IfIf he is filled
filled with
with a glowing
glowing love for the fatherland, prepared
fatherland, prepared
to make any
any sacrifice
sacrifice for the freedom
freedom of his peoples
peoples and willing
willing to bear any
any hardship,
hardship,
then his guerrillas
guerrillas will also. Warding
Warding off off enemy
enemy agitation
agitation is an easy
easy task then.
then. The
guerrilla
guerrilla must be enabled
enabled to express
express his political belief clearly
political belief clearly and convincingly
convincingly
through the intellectual
through training. He must be able to argue
intellectual training. argue the cause
cause of his fatherland,
fatherland,
0f truthfulness
of truthfulness and justness
justness with
with wit.
44
44
b) The population
population in the operational
operational area sees the guerrilla
guerrilla as a representative
representative of the nationhood
nationhood
from which
which they have been cutoff.
been cut off. His attitude,
attitude, his confidence
confidence and unyielding
unyielding will to fight
fight must
be a stimulus
stimulus to all those
those with a positive
positive attitude.
attitude. The leader
leader in charge
charge of political
political questions
questions has
the important
important duty of establishing
establishing and maintaining
maintaining contact
contact with the population.
population. This must be
under consideration
done under consideration of all precautions.
precautions. He must find find out their
their sufferings,
sufferings, worries,
worries, and
opinions,
opinions, and observe
observe all measures
measures of of the enemy
enemy command
command and administration
administration attentively.
attentively. Every
Every
possibility must be used to unmask
possibility unmask enemy
enemy agitation
agitation and lies, to supply the population
population with
with true
news, reminding
news, reminding them
them of the eternal
eternal values
values of nationhood,
nationhood, and root root out cowardly
cowardly servility.
servility. All
means
means to reliably
reliably spread news
news is good.
good. Often the simplest
simplest is the most effective
effective (mouth-to-mouth,
(mouth-to-mouth,
chain and ring
ring letters,
letters, inscriptions with chalk, paint,
inscriptions with paint, and stamps on walls,
walls, enemy
enemy billboards
billboards and
proclamations, pamphlets from hand
proclamations, pamphlets hand to hand).
hand). It maymay become necessary for larger units
become necessary units to
acquire
acquire a duplicating
duplicating machine
machine or a printing
printing press,
press, and also material
material needed
needed to make simple
stamps.
stamps. The achievements
achievements of the guerrilla unit must be made public
guerrilla unit public without restraint. Friend
without restraint. Friend and
foe should talk of them. disadvantage if the unit is credited
them. It is no disadvantage credited with deeds
deeds and capabilities
capabilities
that exceed
exceed its potential.
potential. It is wise to show restraint
restraint when
when requisitioning
requisitioning and demanding
demanding support
support
from the population.
population. All unnecessary
unnecessary inconveniences
inconveniences and danger danger to the population
population should be
avoided.
avoided. The guerrilla unit must try to help and protect
guerrilla unit protect as far as this is possible within their
possible within their
mission.
mission. Traitors
Traitors must be rooted
rooted out without pity.
without pity.
c) If it is possible
possible to point
point out the true situation
situation and the unavoidable results of the enemy’s
unavoidable results enemy’s
policy, in addition
policy, addition to the initial mission,
mission, then
then this should be done. Suited here are pamphlets,
pamphlets,
handbills,
handbills, and inscriptions
inscriptions on walls.
walls. It can also be of use to let a prisoner
prisoner free if he spontaneously
spontaneously
shows signs of individual
individual and political
political insight.
insight. The political
political leader
leader of the unit must have the
opportunity
opportunity to instruct influence him before
instruct and influence before this is done.
done. Caution
Caution must be exercised.
exercised. The
tactical mission
tactical mission and the security
security of the unit have priority.
priority.
45
45
VI. Accommodation and Food Supply
1. Shelters
Shelters
Permanent camps
Permanent camps withwith bunkers,
bunkers, log cabins, permanent tents
cabins, permanent tents or light emergency
emergency shelters
shelters
may be built
may built if the general
general situation
situation permits
permits it, and the terrain
terrain offers sufficient
sufficient cover and
concealment.
concealment. Such camps camps offer the advantage
advantage of a certain
certain level of comfort.
comfort. Their
detection
detection by the enemy,
enemy, on the other hand, cannot avoided, even with
cannot be avoided, with very
very good
camouflage, because of the beaten
camouflage, because trails that have
beaten trails have come into existence.
existence.
‘3
¢
Picture
Picture 21a. Earth
Earth bunker
bunker (cutaway)
(cutaway)
Temporary
Temporary protection
protection is achieved
achieved by choosing
choosing the construction
construction site in unpassable
unpassable terrain,
terrain,
far off from the settlements,
settlements, in dense undergrowth.
undergrowth.
a) Bunkers cabins are built with simple
Bunkers and log cabins means that are adapted
simple means adapted to the available
available
material of the constructors.
material and the skill of Fanciness must
constructors. Fanciness must be avoided.
avoided.
46
46
Adaptation to the surrounding
Adaptation surrounding terrain
terrain through
through camouflage
camouflage and avoiding
avoiding beaten tracks are the best
beaten tracks
protection for a bunker
protection bunker (Picture
(Picture 21).
TL—n 33:.
:6
£3
If}
,’
,_.____._._ ‘
.
\\ j
-
.\
‘u
,
v5
I,‘
"
. .a
o I .2
. .1
l
"
:
. ——l P“ \
I -"
v
”I:
,_
s
\\'b
\‘N
i
"’1
. 04‘1““
o -
.4
$3.- .
...... ”WEI—1
« -
v-------c--‘,OO ~o-.....-.-«.-I
47
47
They are set up very easily
up very easily and quickly.
quickly. In addition, more space
addition, more space is achieved with the same
achieved with
number of tent canvas
number of canvas pieces.
pieces. Twig huts may built in umbrella,
may be built umbrella, half-tent,
half-tent, or house
house form.
form.
Guidelines
Guidelines here are given in the pictures
pictures 22 and 23.
Spruce
Spruce and pine branches
branches are fastened spars with wire,
fastened to spars wire, string, or flexible
flexible twigs.
twigs. Their needles
needles
must hang
must hang downwards
downwards in order to drain off rain.
rain. They must
must be packed
packed one upon
upon the other from
bottom
bottom to top. A clean and accurate
accurate packing of pine twigs
packing of twigs also makes
makes a good sleeping place.
sleeping place.
Picture 22 and 24. Twig Hut and Twig Roof
Picture Roof
It cushions
cushions and protects
protects against
against cold and moisture
moisture from the ground.
ground. Twig huts may built
may be built
halfway ground. They can then
halfway into the ground. then be camouflaged
camouflagedmore easily
easily and are much
much warmer.
warmer. The
dug-up
dug-up ground must be carefully
ground must advantageous to cover the roof with
hidden, it is advantageous
carefully hidden, with a layer of earth
or snow and maybe
maybe some leaves
leaves as camouflage. Permanent shelters
camouflage. Permanent shelters cannot
cannot be erected where the
erected where
terrain does not offer adequate
terrain adequate cover and concealment.
concealment. In this case,
case, suitable
suitable emergency hideouts
emergency hideouts
like lone farms,
farms, animal
animal sheds, barns,
barns, hay lofts and ruins
ruins must
must be chosen.
chosen. With some skill, it will
possible to arrange
be possible arrange warm
warm pieces
pieces in them,
them, even during
during winter.
winter.
2. Heating
Heating and Cooking
Cooking Fires
Fires
It is necessary guerrilla to build
necessary for the guerrilla fires as a source of warmth
build fires warmth and to cook. Matches must
Matches must
always
always be protected
protected against moisture and used very
against moisture very sparingly.
sparingly. It is a good idea to keep
keep a small
emergency
emergency supply in a waterproof
waterproof separate
separate container
container (bullet
(bullet casing
casing closed with wax).
closed with wax). Moist
Moist
matches will
matches will light more rubbed in the hair before
more easily if they are rubbed before striking
striking them.
them. If matches
matches are
missing, it is possible
missing, fire in the following
possible to shoot fire way: remove
following way: remove the bullet, pourpour most
most ofof the
powder on a piece
powder piece of paper
paper or bark; add paper wads, dry grass
paper wads, grass or similar material;
material; stick a soft
loose paper
paper plug
plug in the shell, fire at the prepared
prepared ignition
ignition material,
material, and blow softly. “Shooting”
“Shooting” a
fire is not very easy
very easy in humid
humid air. It works
works better
better if a teaspoon
teaspoon of
of the filling
filling from a flare
flare is added
added
to the paper.
paper. In strong sunlight,
sunlight, the fire material
material that was prepared ignited with the help of
prepared can be ignited
a lens. After ignition, the fire is nourished
After ignition, further by small sticks with shavings
nourished further shavings (Picture
(Picture 25), dry
pine twigs
pine twigs and dry grass.
grass.
50
Campfires
Campfires are only allowed if the enemy
allowed if enemy situation permits it.
situation permits it. The most advantageous
advantageous types
types are
shown
shown in picture
picture 26.
"(L h. 1.
w
‘€\&
7‘.‘(“
’
_ .
s
3. Water
Surface
Surface water
water out of streams
streams of all kinds
kinds should always be boiled
should always boiled before
before use.
use. Water
Water purification
purification
tablets may
tablets may replace measure in emergencies.
replace this measure emergencies.
51
51
Staple rations must always
rations must always be saved. More insufficiencies do not allow for them
More insufficiencies them to be touched.
touched.
They may only be used when
may only when under
under enemy
enemy pressure
pressure or when
when all other possibilities
possibilities to acquisition
acquisition
food are blocked.
blocked. Concentrated
Concentrated food that is supplied
supplied by air must used very
must be used very sparingly.
sparingly. The
mess sergeant
mess sergeant must know
know which
which amount
amount ofof food is needed
needed by the unit. He must then determine
must then determine
type, amount and work
type, amount work out a plan
plan 7– the acquisition
acquisition debit –
7 to get it.
it. He is responsible
responsible for the
execution of the acquisition.
execution of acquisition.
.‘l.‘3” .- '{"‘"."?\.-
av V".
‘ ‘o 5
Picture
Picture 27. Foxhole
Foxhole for Wounded
Wounded
Bread
Bread or flour,
flour, groats,
groats, vegetables
vegetables or white
white cabbages,
cabbages, fat and meat
meat and salt are mainly
mainly needed.
needed.
Ready-made grots
Ready-made grots may
may be replaced
replaced by barley,
barley, wheat,
wheat, rye
rye or oats in emergencies.
emergencies.
52
Calculating
Calculating an amount of 2-3-kilograms
amount of 2-3-kilograms raw weight
weight of food per
per man and day adds upup to about 50
kilos for a 20-man
kilos unit. That is about 300 to 400
20-man unit. 400 kilos
kilos per
per weeks,
weeks, which
which is the equivalent
equivalent of one
or two horse
horse drawn
drawn carts. The acquisition
acquisition plan must be based
plan must based on such calculations.
calculations. No more than
more than
one week’s
week’s supply should be kept
kept openly
openly in permanent
permanent camp.
camp.
Picture
Picture 26. Sledge for Wounded
Wounded
Staple supplies
supplies of long-lasting
long-lasting food (bacon,
(bacon, smoked meat, groats,
smoked meat, groats, salt, honey
honey etc.), if possible
possible to
last for one month,
month, should be scattered throughout the operational
scattered throughout must be taken
operational area. Care must taken that it
way that it is safe from wild animals
is stored in such a way animals and rats. The food that is constantly
constantly
needed is stored in well-camouflaged
needed well-camouflagedfoxholes
foxholes near the accommodation. sufficient
accommodation. It should be sufficient
for about one month.
month. Potatoes
Potatoes can be kept
kept in holes and covered.
covered. Wheat,
Wheat, groats
groats and so forth are
best buried
best buried in wooden
wooden barrels
barrels or boxes
boxes and sealed from the top with a water-proof
top with water-proof wooden
wooden lid
and a thin layer of clay etc. and then
then camouflaged.
camouflaged.
Vegetables
Vegetables may
may be buried
buried in the same way
way as potatoes.
potatoes. Cabbage
Cabbage is best kept in wooden
wooden barrels:
barrels:
bacon
bacon may
may be kept along
along with wheat.
wheat. Fat and butter should be well well salted and poured
poured into small
wooden kegs.
wooden kegs. The opening
opening is sealed by nailing
nailing a lid on. The kegskegs are buried
buried or hung in the trees
trees
in dense pine groves.
groves. In summer,
summer, meat will
will only keep if if it is heavily if possible,
heavily salted and, if possible,
smoked.
smoked. In winter,
winter, meat will keep
keep almost
almost indefinitely
indefinitely if it is frozen.
frozen. Tea can be made out of lime
blossoms,
blossoms, blackberry
blackberry leaves, young leaves
leaves, young wild strawberries
leaves of wild strawberries and others.
others. Roasted
Roasted acorns,
acorns,
barley, wheat and so on may
barley, wheat may serve as coffee
coffee substitutes.
substitutes.
5. Emergency
Emergency Rations
Rations
Wooden flour is a good emergency
Wooden flour ration. It is best acquired
emergency ration. young pine or birch
acquired from young birch trees
trees in
the following way: remove
following way: remove the outer rough
rough bark; separate
separate the soft, moist layer underneath
underneath and
cut it into small pieces;
pieces; changing water several
changing the water times, cook it until the resin
several times, resin taste is lessened;
lessened;
carefully
carefully dry the pieces
pieces until they
they are dry and brittle; pulverize them
brittle; grind down and pulverize them into flour.
flour.
The yellow-brown
yellow-brown wooden flour that has been
wooden flour been obtained
obtained in this wayway can be used extend wheat
used to extend wheat
or rye
rye flour.
flour. It may
may also be eaten pure.
pure. To do this, prepare
prepare a dough
dough using
using milk or water,
water, roll it out
very
very flat,
flat, cut it into pieces
pieces and roast these
these on tin or iron pans.
pans. Very young
young spruce
spruce sprouts
sprouts can be
eaten raw
raw or cooked.
cooked. Edible
Edible mushrooms
mushrooms are good food, berries berries also. Mushrooms
Mushrooms become
become
poisonous after a frost, whereas
poisonous whereas many
many berries,
berries, like mountain
mountain ash and barberries,
barberries, only become
become
edible
edible and tasty
tasty after they
they have been frozen.
frozen. Cranberries,
Cranberries, whortleberries,
whortleberries, elderberries,
elderberries, and
hawthorn, which are found
hawthorn, which found in moorlands,
moorlands, are very
very nutritious
nutritious and tasty.
tasty. Lime buds and most moss
(with the exception
exception of the yellowish
yellowish ones), especially
especially the greyish
greyish white
white well-known reindeer
well-known reindeer
moss,
moss, are edible.
edible. The bitter taste that is inherent
inherent in them removed by soaking
them can be removed soaking them for
several
several hours in water which wood
water to which wood ash has been added. After
been added. After that you
you can cook them into a
mash that is fairly tasty.
mash tasty. In emergencies,
emergencies, you
you can eat mossmoss raw after washing thoroughly. At
washing it thoroughly.
the banks
banks of rivers
rivers and lakes you
you can dig out the thick roots
roots of calamus reeds. They can be eaten
calamus reeds.
raw, cooked
raw, cooked or baked.
baked.
54
Appendix I
of the Guerrilla
Guideline for the Equipment of Guerrilla
Each guerrilla seeds:
Rucksack
Rucksack or pack
Haversack
Haversack or hunting
hunting pouch
pouch
Canvas
Canvas piece
piece
Blanket
Blanket or sleeping
sleeping bag
Webbing
Webbing or belt
Ammunition pouch
Ammunition pouch
Mess kit
Canteen
Canteen with cup
cup
Cutlery
Cutlery
Hunting
Hunting knife
knife or dagger
dagger
Compass
Compass
Lighter,
Lighter, matches,
matches, magnifying firestone
magnifying lens, firestone
Weapons cleaning kit
Weapons cleaning
Pencil
Pencil and paper
paper
Calendar with rising
Calendar with rising and setting times
times of sun and moon
Camouflage
Camouflage net
Mosquito
Mosquito net
First-aid equipment:
equipment:
first-aid kit with basic
Small first-aid first-aid instructions
basic first-aid instructions
Dressing
Dressing (in the uniform)
uniform)
Chinin
Chinin
Aspirin
Aspirin Tannalbin
Tannalbin Vitamin
Vitamin drops
Prontosil
Prontosil Pervitin
Pervitin Water purification
purification tablets
tablets
55
Each group
group needs:
needs:
Binoculars
Binoculars
Flashlights
Flashlights
Map case and maps
maps
Shovel
Shovel
Claw axe
Saw
Isolated
Isolated pliers
pliers and wire
Wire cutters
cutters
Collapsible
Collapsible stoves for solid fuel
Whistle
Whistle
56
Appendix II
11
If the destination
b) If point is visible
destination point Visible from the departure
departure point,
point, then you
you must:
must:
57
Appendix III
Airborne
Airborne Operations
General
1. General
Insertion
Insertion and resupply
resupply by air is conducted
conducted by parachute
parachute drop or by air landing
landing with
motor-planes
motor-planes or gliders.
gliders. Both types
types of operations
operations need to be prepared
prepared by experts.
experts.
Everyone
Everyone who has to consider possibility of air insertion
consider the possibility insertion or resupply
resupply must know
know the
following
following basic principles.
principles. The airborne
airborne operation
operation is dependent
dependent upon
upon the weather,
weather,
especially
especially in respect
respect to visibility
visibility at the drop zone or landing
landing site, motor
motor failures
failures and other
circumstances.
circumstances. Therefore,
Therefore, it cannot
cannot be planned
planned very
very far in advance
advance as to a certain time. In
certain time.
resupply operations
resupply operations that serve an existing
existing ground
ground organization
organization in the operational
operational area,
area, a
possible operations
possible operations period
period of at least 8 days must be agreed
agreed upon.
upon. The path-finder
path-finder group
group
responsible for the landing
responsible landing light signals or beacons
beacons must be ready
ready during
during this period of
period of
time. The time
time. time of arrival
arrival may
may be later in case of enemy
enemy contact
contact or unfavorable
unfavorable weather,
weather, or
earlier
earlier in case of strong tail wind.
wind.
58
choosing
choosing the drop zone. Large pastures that are fenced
Large pastures fenced in by forests
forests or hills, and cannot
cannot
be viewed
viewed from the sides, are best suited.
59
They should
should not have ditches,
ditches, boulders
boulders or other natural
natural or artificial
artificial obstructions
obstructions on them.
them. The
size should be approximately
approximately 2000 by 500 meters. meters. Dispatching
Dispatching is conducted
conducted according
according to the
technical and tactical
technical tactical instructions
instructions of an experienced jump-master. The best
experienced jump-master. best flight
flight level is at 300
meters. In order to ensure
meters. ensure a dense landing
landing when
when dispatching whole units,
dispatching whole units, it is necessary
necessary that the
men jump in close and fast sequencesequence (each ½ V2 second).
second). Delays
Delays during
during the dispatch
dispatch may
may endanger
endanger
the complete
complete mission.
mission. When having
having to approach repeatedly there
approach repeatedly there is no guarantee
guarantee that the unit
will land close together.
together. If the unit was dropped
dropped into an area that was not foreseen
foreseen for it, due to
incorrect navigation or an emergency,
incorrect navigation emergency, it still must be able to operate operate from there
there and reach
reach the
operational
operational area. Appropriate
Appropriate supplies with maps
supplies with maps and march
march compass
compass must be provided.
provided. When
When
planning the mission,
planning considered that radio
mission, it must also be considered radio communications
communications may may not work,
work,
(Determination
(Determination of land messengermessenger routes,
routes, or mail deposit link-up with existing
deposit sites, link-up radio
existing radio
installations
installations in the operational
operational area.)
area.) A drop zone with the same characteristics
characteristics as for paratrooper
paratrooper
landing
landing zones
zones is agreed upon for resupply
agreed upon resupply operations.
operations. The procedure
procedure for the assembly
assembly of the
groups
groups after landing
landing must be ordered
ordered in detail.
detail. First contact
contact is made using
using inconspicuous
inconspicuous sound
signals
signals (animal
(animal voices,
voices, clapping
clapping hands).
hands). Depending
Depending on the situation,
situation, the group
group gathers
gathers from the
first to the last or vice-versa.
first vice-versa. If If cargo
cargo has been dispatched
dispatched before
before the men,
men, the group
group gathers
gathers
towards first man. An alternate
towards the first alternate assembly
assembly point
point or RV must be ordered
ordered in all situations
situations so that
men whowho have been carried
carried away fiom the drop zone can join their
away from their group
group later on. In order to
assist the airplane
airplane in finding
finding the drop zone,zone, the unit already
already in the operational
operational are uses directions,
directions,
finding
finding equipment
equipment or sets up up visual
visual signs that were
were agreed upon. These signs must consist
agreed upon. consist of a
simple,
simple, clearly
clearly visible
visible geometrical
geometrical symbol
symbol that rules out anyany confusion.
confusion. (Example:
(Example: an isosceles
isosceles
triangle with
triangle with a base of 70 metersmeters and two sides of 100 100 meters.)
meters.) While
While sheets are laid out in
daytime
daytime at the corner points. At night,
corner points. fires are lighted
night, fires lighted that are prepared
prepared by heaping
heaping up wood.
up wood.
Incendiaries should be used to light them
Incendiaries should them quickly.
quickly. They are lighted
lighted as soon as the listening
listening post
first motor
hears the first motor noises.
noises. It must be possible
possible to keep
keep the fire
fire burning
burning for a longer period. As
longer period.
soon as the airplane
airplane has reached
reached the drop zone,zone, a flashing
flashing light should be shined.
shined. Flares
Flares may
may only
be used if if the enemy
enemy cannot
cannot see them.
them.
3. Air Landings
Landings
Air landings
landings are dependent
dependent upon
upon a number
number of very
very different
different and variable
variable conditions
conditions from case to
case. There
There will always
always be the exception.
exception. Landings
Landings of airplanes
airplanes are only to be planned
planned if
preparations are possible
preparations possible by an organization
organization already
already in the operational
operational area in genera.,
genera., an expert
may
may be dropped
dropped in to check the suitability
suitability of the site for landing
landing and starting.
starting. Where
Where this is not
possible, the following
possible, following guidelines
guidelines must be used:
used: A motor vehicle
vehicle should be able drive over the
field at a speed of approximately
field approximately 60 kilometers/hour.
kilometers/hour. The landing
landing site should be completely flat
completely flat
without natural
without natural or artificial
artificial obstacles.
obstacles. It should not be too soft. Also,
Also, the immediate
immediate surrounding
surrounding
terrain should not have any
terrain any high obstacles
obstacles in order to ensure
ensure low entry and exit. The landing
landing site
is marked
marked with lights
lights or white
white sheets according
according to the agreed
agreed sign. In general, of 2000 x
general, a site of
2000 meters
meters will be required.
required. The same rules as for airplanes
airplanes also apply
apply to gliders.
gliders. But the
distance needed
distance needed for landing
landing may
may be reduced
reduced to approximately
approximately 30 meters
meters through
through the use of
braking parachutes or rockets.
braking parachutes rockets. Night
Night landings
landings without
without preparation
preparation by an existing
existing organization
organization are
not possible,
possible, even for gliders.
gliders. In general,
general, the insertion will be in the early hours
insertion will hours of dawn.
dawn. But
even then considerable
considerable casualties
casualties must be expected
expected in case of ground
ground fog. The execution
execution of a
59
glider
glider insertion
insertion is extremely
extremely dependent
dependent upon
upon the careful
careful choice
choice of the glider pilot.
pilot. He must stay
with the guerrilla
with guerrilla unit after the landing should be used as an expert
landing and should expert on all questions
questions
concerning
concerning air operations.
operations.
60
Appendix A: Digital and Modern Methods
1. Operational Security
Security (OPSEC)
(OPSEC)
Introduction to OPSEC:
Introduction Paranoia
OPSEC: A Caution Against Paranoia
The following
following summary
summary of the modern
modern state of the surveillance
surveillance network
network is provided
provided to make the
reader
reader aware
aware of one thing:
thing:
PERFECT OPSEC IS AN ILLUSION. THE ONLY PATH TO VICTORY IS THROUGH
DETERMINED ACTION AND AND MILITARY PROWESS. It is highly highly encouraged
encouraged to assign
assign
certain
certain people
people within
within your
your combat
combat unit the role of maintaining
maintaining OPSEC/INFOSEC
OPSEC/INFOSEC and
developing
developing this understanding
understanding among rest, not through
among the rest, through constant
constant discussion,
discussion, but through
through
timely updates,
timely should their behaviors
updates, should behaviors deviate
deviate from agreed
agreed upon procedures. Ultimately,
upon procedures. Ultimately, the
modern
modern revolutionary
revolutionary must be agile and aware, Appendix is a collection
aware, this Appendix collection of modern tools to
modern tools
supplement
supplement a strident
strident behavioral sufficientdegree
behavioral style. A sufficient degree of OPSEC
OPSEC to provide reassurance and
provide reassurance
guide
guide actions
actions is to be weighed
weighed against paranoia and inaction.
against paranoia inaction. Ultimately, it is preferential
preferential to
discount OPSEC in favor of revolutionary action and a coherent understandingunderstanding of National
Socialist principles, especially
Socialist especially as they apply to continuous improvement. In practice practice this
means:
means: „Keep
,,Keep Calm and Carry On “! “!
I. TOR
As a very
very long time Tor user,
user, the most surprising
surprising part of the NSA
NSA documents
documents was how
little progress
progress they have made against
against Tor. Despite
Despite its known weaknesses, it's still the
known weaknesses,
best thing provided it's used
thing we have, provided used properly,
properly, and you
you make no mistakes.
mistakes. If seeking
seeking
security
security of "the greatest
greatest degree technically feasible"
degree technically feasible" such as when
when facing ZOG or an
facing ZOG
enemy
enemy well-funded
well-funded government with significant
government with visibility or control
significant visibility control of the Internet
Internet you
you
must take into consideration
consideration the warnings
warnings that Tor is not sufficient
sufficient to protect
protect you
you from
such an actor. Consider whether you you truly need this level of protection. If having
having your
your
activity
activity discovered
discovered does not putput your
your life or liberty
liberty at risk, then
then you
you probably
probably do not need
to go
go to all of this trouble.
trouble. But if it does, then you
you absolutely
absolutely must be vigilant you wish
vigilant if you wish
remain alive and free.
to remain
Contents
1)
1) Your Computer
Computer
2) Your
Your Environment
Environment
3) Your Mindset
Mindset
4) Hidden
Hidden Services
Services
5) Conclusion
Conclusion
6) Source
Source
1) Your Computer2
1)
To date, the NSANSA and FBI's primary attacks
FBI's primary attacks on Tor users
users have been Man-in-the
Man-in-the Middle
Middle
(MITM)
(MITM) attacks
attacks (NSA)
(NSA) and hiddenhidden service web server compromises
compromises (FBI) which which either
sent tracking
tracking data to the Tor user'suser's computer,
computer, compromised
compromised it, or both. Thus, you need
Thus, you need a
reasonably secure system from which
reasonably which youyou can use Tor and reducereduce your of being
your risk of being
tracked or compromised.
tracked compromised.
1) Don't use Windows. Just don't. This also means
1) means don't use the Tor BrowserBrowser Bundle
Bundle on
Windows. Vulnerabilities in the software
Windows. Vulnerabilities software in Tor browser button figure
browser button prominently in
figure prominently
both the NSA slides and FBI's recent
both takedown of Freedom
recent takedown Freedom Hosting.
Hosting.
2) If you
you can't construct
construct youryour own workstation
workstation capable
capable ofof running
running Linux
Linux and carefully
carefully
configured
configuredto run the latest availableavailable versions
versions of Tor, a proxy
proxy such as Privoxy,
Privoxy, and a web
browser
browser (with all outgoing Cleamet access
outgoing Clearnet access firewalled),
firewalled), consider using Tails or Whonix
consider using Whonix
instead,
instead, where
where most of of this work
work is done for you. you. It's absolutely
absolutely critical
critical that outgoing
outgoing
access firewalled, so that third party
access be firewalled, party applications
applications cannot
cannot accidentally
accidentally leak data about
your location.
your location.
3) If you
you are using
using persistent
persistent storage of any kind, ensure
any kind, ensure that it is encrypted.
encrypted. Current
Current
versions of LUKS
versions LUKS are reasonably
reasonably safe, and major Linux distributions
distributions will offer to set it
up for you
up you during their installation.
during their installation. True CryptCrypt
2 Note:
Note: Burner
Burner phones,
phones, Signal Jammers
J ammers and EM weaponsweapons are not discussed
discussed however
however are
recommended for further
recommended further personal
personal study. Burner
Burner phones
phones (both old and new) new) especially
especially
present an attractive
present attractive option
option for revolutionaries
revolutionaries with access
access to expansive
expansive financial
financial options
options
and are ideal for communications.
communications. Might Might be safe, though
though it's not nearly
nearly as well-integrated
well-integrated
into the OS. BitLocker
BitLocker might
might be safe as well, thoughthough youyou still shouldn't running
shouldn't be running
Windows.
Windows. Even if if you
you are in a country
country where
where rubber
rubber hosing
hosing is legal, such as the UK,
encrypting
encrypting your
your data protects
protects youyou from a variety
variety of other threats.
threats.
4) Remember
Remember that your your computer
computer must be kept up up to date. Whether
Whether you you use Tails or
build
build your
your own workstation
workstation from scratch or with with Whonix, update frequently
Whonix, update frequently to ensure
ensure
you are protected
you protected from the latestlatest security
security vulnerabilities.
vulnerabilities.
Ideally,
Ideally, you
you should update each time you
should update you begin a session,
session, or at least daily. Tails will
notify you
notify you at startup
startup if an update
update is available.
available.
5) Be very
very reluctant
reluctant to compromise
compromise on JavaScript,
J avaScript, Flash and Java. Disable them all by
Disable them
default.
default. If a site requires
requires anyany of these,
these, visit somewhere
somewhere else. Enable
Enable scripting
scripting only as a
last resort,
resort, only temporarily,
temporarily, and only to the minimum minimum extent necessary to gain
extent necessary
functionality of a web site that you
functionality you have no alternative
alternative for.
6) Viciously
Viciously drop cookies
cookies and local data data that sites send you.
you. Neither
Neither the Tor browser
browser
button nor Tails do this well
button well enough
enough for my my tastes;
tastes; consider
consider using
using an addon
addon such as Self-
Destructing
Destructing Cookies
Cookies to keep keep your
your cookies
cookies to a minimum
minimum (0).
7) Your workstation
workstation should be a laptop; it must be portable portable enough
enough to be carried with
carried with
you and quickly
you quickly disposed
disposed of or destroyed.
destroyed.
8) Don't
Don't use Google
Google to search the Internet.
Internet. A good alternative
alternative is Startpage;
Startpage; this is the
default
default search engine
engine for Tor browser
browser button,
button, Tails, and Whonix. Another is
Whonix. Another
DuckDuckGo
DuckDuckGo which which also has a hidden service. Plus, it won't
hidden service. won't call you
you malicious
malicious or ask
you to fill
you fill out CAPTCHAs.
CAPTCHAs.
2) Your Environment
Tor contains weaknesses which
contains weaknesses which can only be mitigated through actions
mitigated through actions in the physical
physical
world. An attacker
world. who can view both
attacker who both your
your local Internet
Internet connection,
connection, and the connection
connection
of the site you
you are visiting,
visiting, can use statistical
statistical analysis
analysis to correlate them.
correlate them.
1) Never
1) Never use Tor from home, home, or near home. Neverwork
near home. Never work on anythinganything sensitive
sensitive enough
enough to
require Tor from home,
require home, even if you remain offline.
you remain offline. Computers
Computers have a funny habit of of
liking
liking to be connected.
connected. This also applies
applies to anywhere
anywhere you you are staying
staying temporarily,
temporarily, such as
a hotel.
hotel. Never
Never performing these activities
performing these activities at home helps to ensure ensure that they cannotcannot be tied
those locations.
to those locations. (Note that this applies people facing
applies to people facing advanced
advanced persistent
persistent threats.
threats.
Running
Running Tor from home is reasonable
reasonable and useful
useful for others,
others, especially
especially people
people who aren't
doing
doing anything
anything themselves
themselves but wish wish to help by running
running an exit node, node, relay,
relay, or bridge.
bridge.
2) Limit
Limit the amount
amount of timetime you
you spend using Tor at any any single location.
location. While
While these
these
correlation
correlation attacks
attacks do take
take some time,
time, they
they can in theory
theory be completed
completed in as little as a
And while
day. And while the enemy
enemy are very very unlikely
unlikely to show up up the same day you you fire up Tor at
fire up
Starbucks,
Starbucks, they might
might show up up the next day. I recommend
recommend for the truly truly concerned
concerned to
never use Tor more than
never than 24 hours
hours at anyany single physical
physical location;
location; after that, consider
consider it
burned and go
burned go elsewhere.
elsewhere. This will help you
you even if the enemy
enemy show up
up six months
months later;
it's much easier to remember
remember a regular
regular customer
customer than someone
someone who who showed
showed up up one day
and never
never came back.
back. This does mean you will have to travel
you will travel farther
farther afield,
afield, especially
especially if
you
you don't live in a large city, but it will
will help to preserve
preserve youryour ability
ability to travel
travel freely.
freely.
3) When
When youyou go
go out to perform
perform these
these activities,
activities, leave youryour cell phone
phone
turned
turned on and at home.
home.
3) Your Mindset
Many
Many Tor users
users get caught
caught because
because they made a mistake, posting their
mistake, such as posting their real E-mail
E-mail
address
address in association
association with their activities.
with their activities. You must avoid avoid this as muchmuch as possible,
possible, and
the only way
way to do so is withwith careful
careful mental
mental discipline.
discipline.
1)
1) Think
Think of your
your Tor activity
activity as pseudonymous
pseudonymous and create create in your
your mind a virtual
virtual identity
identity
to correspond with the activity.
correspond with virtual person
activity. This virtual person does not know know you you and will never never
meet you
you and wouldn't
wouldn't even like you you if he knew
knew you.
you. He must be kept kept strictly
strictly mentally
mentally
separated.
separated.
2) If you
you must use public
public Internet
Internet services,
services, create
create completely
completely new accountsaccounts for this this
pseudonym. Never
pseudonym. Never mix them;
them; for instance,
instance, do not browse
browse Facebook
Facebook with your your real E-mail
E-mail
address
address after having used Twitter
having used Twitter with your your pseudonym's
pseudonym's E-mail E-mail on the same computer.computer.
until you
Wait until you get home.
home.
3) By the same token,
token, never
never perform
perform actions related to your
actions related your pseudonymous
pseudonymous activity activity via
the Clearnet, unless you
Cleamet, unless you have no other choice choice (e.g.
(e. g. to sign up up for a provider
provider who who blocks
blocks
Tor) and take extra precautions
precautions regarding
regarding your
your
location when doing so.
location when so.
you need to make and receive
4) If you receive phone
phone calls, purchase
purchase an anonymous
anonymous prepaid prepaid phone
phone
for the purpose. difficult in some countries,
purpose. This is difficult countries, but it can be done if you you are creative
creative
enough.
enough. Pay cash; never
never use a debit or credit card to buy the phone top-ups. Never
phone or top-ups. Never
insert its battery
battery or turn it on if youyou are within
within 10
10 miles (16 km) of your your home, nor use a
phone from which
phone which the battery
battery cannot removed. Never
cannot be removed. Never place
place a SIM card previously
previously
used
used in one phone
phone into another phone. Never
another phone. Never give its number
number or even admit its existence
existence
to anyone who knows
anyone who knows youyou by youryour real identity.
identity. This maymay need
need to include
include your
your family
family
members.
members.
Services
4) Hidden Services
These
These are big in the news news lately, withwith the recent takedown of at least two high-profile
recent takedown high-profile
hidden
hidden services,
services, Silk Road and Freedom Freedom Hosting.
Hosting. The bad news news is, hidden
hidden services
services are
much weaker than
much weaker than they could
could or should be. The good news news is, the NSANSA doesn't
doesn't seem to
have done much with them (though
much with (though the NSA NSA slides mention
mention a GCHQ program named
GCHQ program named
ONIONBREATH
ONIONBREATH which which focuses
focuses on hidden
hidden services,
services, nothing
nothing
else is yet known
known about it)3. In addition,
addition, since hidden
hidden services must often run under
services must under
someone
someone else's physical
physical control, they are vulnerable
control, they vulnerable to being compromised
compromised via that other
party. Thus,
party. Thus, it's even moremore important
important to protect
protect the anonymity
anonymity of the service,
service, as once it is
compromised
compromised in this manner, manner, it's pretty
pretty much game game over. 3 Verify
Verify the most current
current state
of intelligence
of intelligence on any any enemy
enemy intelligence
intelligence network.
network.
The advice
advice given above sufficientif
above is sufficient if you
you are merely
merely visiting
visiting a hidden
hidden service. If you
you
need
need to run a hidden
hidden service,
service, do all of the above, above, and in addition
addition do the following. Note
following. Note
that these tasks require
these tasks require an experienced
experienced systemsystem administrator; performing them
administrator; performing them without
without
relevant experience
the relevant difficult or impossible.
experience will be difficult impossible.
1)
I) Do not run a hidden
hidden service
service in a virtual
virtual machine unless you
machine unless you also control
control the physical
physical
host. Designs
Designs in which
which Tor and a service run in firewalled firewalled virtual
virtual
machines firewalledphysical
machines on a firewalled physical host are OK, provided provided it is the physical
physical host which
which you
you
are in control
control of, and you you are not merely
merely leasing
leasing cloud
cloud space.
space.
2) A better
better design
design for a Tor hiddenhidden service consists
consists of two physical
physical hosts,
hosts, leased
leased from
two different providers though
different providers though they may may be in the same datacenter. first physical
datacenter. On the first physical
host, a single virtual
host, virtual machine
machine runs runs with
with Tor. Both firewalledto
Both the host and VM are firewalled
prevent outgoing traffic
prevent outgoing traffic other thanthan Tor traffic
traffic and traffic
traffic to the second physical
physical host. The
second
second physical
physical host will then contain contain a VM with with the actual hidden
hidden service. Again,
Again, these
these
firewalled in both directions.
will be firewalled directions. The connection
connection between
between them shouldshould be secured
secured
with IPSec,
with IPSec, OpenVPN,
OpenVPN, etc. If it is suspected
suspected that the host runningrunning Tor may may be
compromised,
compromised, the service on the second second server may may be immediately
immediately movedmoved (by copying
copying
the virtual
virtual machine
machine image)
image) and both both servers
servers decommissioned.
decommissioned. Both of these these designs
designs can
be implemented
implemented fairly easily easily with Whonix.
Whonix.
3) Hosts
Hosts leased from third third parties
parties are convenient
convenient but especially vulnerable to attacks
especially vulnerable attacks
where the service
where service provider takes a copy
provider takes drives. If the server is virtual,
copy of the hard drives. virtual, or it is
physical but uses
physical uses RAID
RAID storage,
storage, this can be done without taking the server offline.
without taking Again,
offline. Again,
do not lease cloud
cloud space,
space, and carefully
carefully monitor
monitor the hardware
hardware of the physical
physical host. If the
RAIDarray
RAIDarray shows as degraded,degraded, or if the server is inexplicably
inexplicably down for more than a few
moments,
moments, the server should be considered considered compromised,
compromised, since there there is no way
way to
distinguish
distinguish between
between a simple hardware failure
simple hardware failure and a compromise
compromise of this nature.
nature.
4) Ensure
Ensure that your
your hosting provider offers
hosting provider offers 24x7 access
access to a remote
remote console
console (in the
hosting
hosting industry
industry this is often called a KVM KVM thoughthough it's usually
usually implemented
implemented via IPMI
which can also install
which install the operating
operating system).
system). Use temporary
temporary
passwords/passphrases during
passwords/passphrases during the installation
installation and change
change them
them all after you
you have Tor up up
and running
running (see below).
below). The remote
remote console
console also allows
allows you
you to run a fully encrypted
encrypted
physical host, reducing
physical reducing the risk of data loss through physical compromise;
through physical compromise; however,
however, in
this case the passphrase
passphrase must be changed
changed every
every time the system
system is booted
booted (even this does
not mitigate possible attacks,
mitigate all possible attacks, but it does buy you time).
you time).
5) Your initial setup of the hosts whichwhich will
will run the service must be over Clearnet,
Clearnet, albeit
albeit
via SSH; however,
however, to reiterate,
reiterate, they must not be done from home or from a location location you
you
have ever visited
have visited before.
before. As we have seen,seen, it is not sufficient
sufficient to simply use a VPN. This
may
may cause you you issues with actually
actually signing
signing upup for the service due to fraud protection
protection that
such providers
providers maymay use. How to deal with with this
this is outside
outside the scope
scope of this
this answer,
answer, though.
though.
6) Once
Once youyou have Tor up up and running,
running, never
never connect
connect to any
any of the servers or virtual
virtual
machines via Clearnet
machines Clearnet again. Configure
Configure hidden
hidden services
services which
which connect
connect via SSH to each
host and each of the virtual
virtual machines,
machines, and always
always use them.
them. If you
you must connect
connect via
Clearnet
Clearnet to resolve
resolve a problem,
problem, again,
again, do so from a location
location you
you will never
never visit again.
again.
7) Hidden
Hidden services
services must be moved
moved regularly,
regularly, even if compromise
compromise is not suspected.
suspected. A
2013 paper
paper described
described an attack which
which can locate
locate a hidden
hidden service
service in just a few months
months for
around
around $10,000
$10,000 in cloud compute
compute charges,
charges, which well within
which is well budget of even some
within the budget
individuals.
individuals. It is safer, though
though not at all convenient,
convenient, to move the hidden hidden service
service at least
monthly.
monthly. Ideally,
Ideally, it should be moved
moved as frequently
frequently as possible,
possible, though
though this quickly
quickly veers
into the impractical. Note that it will take
impractical. Note take approximately
approximately an hour for the Tor network network to
recognize the new location
recognize location of a moved
moved hidden
hidden service.
service.
5) Conclusion
Anonymity is hard. Technology
Anonymity Technology alone, no mattermatter how good it is, will will never
never be enough.
enough. It
requires a clear mind and careful
requires careful attention
attention to detail, as well
well as real-world
real-world actions
actions to
mitigate weaknesses that cannot
mitigate weaknesses cannot be addressed
addressed through
through
technology alone.
technology alone. As has been so frequently mentioned, the attackers
frequently mentioned, attackers can be bumbling
bumbling
fools who only have sheer luck to rely on, on, but you
you only have to make one mistake
mistake to be
ruined. We call them
ruined. them "advanced persistent threats"
"advanced persistent threats" because,
because, in part,
part, they are persistent.
persistent.
They won't
won't give up, you must not.4
up, and you not.4
II. TOR + VPN and Advanced Considerations5
ConsiderationsS
If you
If you wish
wish to proceed past this point
proceed past point you
you will need to have a deep understanding
understanding ofof
exactly
exactly what a VPN intemet connections
VPN is and how internet connections operate
operate on a fundamental
fundamental level. If
any
any of the terminology
terminology used before
before confuses find somebody
you then find
confuses you somebody more competent
competent to
interpret
interpret the following
following section.
section. Now for those
those who are still reading,
reading, Stallman
Stallman may
may be
some goony
goony beard guy who supports
beard guy supports some commie
commie BS and is constantly
constantly crying
crying about
Trump
Trump but his website's pretty decent
website's pretty decent to dig through
through for info. His long term
term link is a good
place to dig for sites that may
place may house
house some decent
decent info: https://stallman.org/longterm.html
https://stallman.org/longterm.html
1] Assorted
1) Considerations
Assorted Topics and Considerations
i) „I've
..['ve got nothing to hide!“
'I've Got Nothing
Nothing to Hide'
Hide' and Other Misunderstandings of Privacy
Misunderstandings of Privacy
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565&
https://papers.ssm.com/sol3/papers.cfm?abstract_id=998565&
Matters -- Ted Talk
Why Privacy Matters
https://www.ted.com/talks/glenn_greenwald_why_privacy_matters
https://www.ted.com/talks/glenn_greenwald_why_privacy_matters
4 https://www.torproject.org/download/download-easy.html.en#warning
https://www.torproject.org/download/download—easy.html.en#warning
55 Additionally,
Additionally, this is old information,
information, but still relevant:
relevant: Hacker
Hacker OPSEC
OPSEC --
http://grugq.github.io/
http://grugq.github.io/
break -- https://prism-break.org/
Prism break https://prism-break.org/
ii) „What
,,What about TOR+VPN or TOR+proxies, is it worse than plain TOR?“
provide a benefit
It can provide benefit in certain
certain circumstances.
circumstances.
You-to-Tor-to-VPN-to-Clearnet will let you you use sites that block Tor exits (unless
(unless they
also block your vpn
block your provider). You-to-VPN-to-Tor
vpn provider). You-to-VPN-to-Tor will prevent prevent anyone
anyone observing your
observing your
local traffic
traffic from knowing
knowing that you you are connecting
connecting to the Tor network
network (though
(though obviously
obviously
they will know
they know youyou are connecting
connecting to the VPN) VPN) Source:
Source:
https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
https://trac.torproj ect.org/proj ects/tor/wiki/doc/TorPlusVPN
You -> VPN/SSH
You VPN/SSH -> Tor
You can route
route Tor through
through VPN/SSH
VPN/SSH services.
services. That might prevent your
might prevent your ISP etc. from
seeing that you're using Tor (VPN/SSH
you're using (VPN/SSH Fingerprinting
Fingerprinting below).
below). On one hand, VPNs VPNs are
more popular
popular than
than Tor, so you won't stand out as much, on the other hand, in some
you won't
countries replacing an encrypted
countries replacing encrypted Tor connection
connection with with an encrypted
encrypted VPNVPN or SSH
connection,
connection, willwill be suspicious
suspicious as well.
well. SSH tunnels
tunnels are not so popular.
popular. Once the VPN
client has connected,
connected, the VPN tunnel tunnel will be the machine's
machine's default
default Internet
Internet connection,
connection,
and TBB (Tor Browser
Browser Bundle)
Bundle) (or Tor client)client) will route
route through
through it. fine
it. This can be a fine
idea, assuming
assuming youryour VPN/SSH
VPN/SSH provider's
provider's network
network is in fact sufficiently
sufficiently safer than
than your
your
own network.
network. Another
Another advantage
advantage here is that it prevents
prevents Tor from seeing who who you
you are
behind the VPN/SSH.
behind VPN/ SSH. So if somebody
somebody does manage manage to break
break Tor and learn the IP address
address
your traffic
your traffic is coming
coming from, but your your VPN/SSH
VPN/ SSH was actually
actually following through on their
following through
promises (they won't
promises watch, they
won't watch, they won't
won't remember,
remember, and they they will somehow
somehow magically
magically
make it so nobody
nobody else is watching
watching either),
either), then you'll
you'll be better off.
You VPN/SSH
You -> Tor -> VPN/SSH
You can also route
route VPN/SSH
VPN/SSH services
services through
through Tor. That hides and secures your Internet
secures your Internet
activity
activity from Tor exit nodes.
nodes. Although
Although you you are exposed
exposed to VPN/SSH
VPN/SSH exit nodes,nodes, you
you at
least get to choose
choose them.
them. If you're using VPN/SSHs
you're using VPN/SSHs in thisthis way,
way, you'll want to pay
you'll want pay for
them anonymously
them anonymously (cash in the mail [beware [beware of youryour fingerprint
fingerprintand printer
printer fingerprint6],
fingerprint6],
Liberty
Liberty Reserve,
Reserve, well-laundered
well-laundered Bitcoin,
Bitcoin, etc.). However,
However, youyou can't readily
readily do this without
without
using virtual
using machines. And
virtual machines. you'll need
And you'll need to use TCP mode for the VPNs VPNs (to route
route through
through
Tor). In our experience,
experience, establishing
establishing VPN connections
connections through
through Tor is chancy,
chancy, and
requires much tweaking.
requires tweaking. Even if you you pay
pay for them
them anonymously, you're making
anonymously, you're making a
bottleneck where
bottleneck where all your
your traffic
traffic goes
goes 7– the VPN/SSH
VPN/ SSH can build a profile
profile of everything
everything
you do, and over time
you time that will probably
probably be really
really dangerous.
dangerous.
VPN/SSH
VPN/SSH Fingerprinting
Fingerprinting
Using
Using a VPN or SSH does not provide provide strong guarantees
guarantees of hiding
hiding the fact you
you
(6 WARNING:
WARNING: Your printer printer may
may leave identifying
identifying microdots
microdots on the page)
page)
are using
using Tor from your your ISP. VPN's
VPN's and SSH's are vulnerable
vulnerable to an attack called Website
Website
traffic
traffic fingerprinting
fingerprinting
1)
1) Very briefly,
briefly, it's a passive
passive eavesdropping
eavesdropping attack,
attack, although
although the adversary
adversary only watches
watches
encrypted
encrypted traffic
traffic from the VPN or SSH, the adversary
adversary can still guess what website
guess what website is
being visited,
visited, because
because all websites specific traffic
websites have specific traffic patterns.
patterns. The content
content of the
transmission is still hidden,
transmission hidden, but to which
which website
website one connects
connects to isn't secret anymore.
anymore.
There
There are multiple research papers
multiple research papers on that topic
topic (See footnote).
footnote).
2) Once the premise
premise is accepted,
accepted, that VPN's
VPN's and SSH's can leak which which website
website one is
visiting with a high accuracy,
visiting difficult to imagine,
accuracy, it's not difficult encrypted Tor traffic
imagine, that also encrypted traffic
hidden by a VPN's
hidden VPN's or SSH's could be classified.
classified. There
There are no research papers on that
research papers
topic7.
topic7.
What about Proxy Fingerprinting?
Fingerprinting? It has been said above already, already, that connections
connections to
proxies are not encrypted,
proxies therefore this attack
encrypted, therefore attack isn't even required
required against proxies, since
against proxies,
proxies cannot
proxies cannot hide the fact that you're
you're using
using Tor anyway.
anyway.
iii) Chain VPNs and Metadata:
Metadata:
Unlike what is often wrongly
Unlike what wrongly assumed,
assumed, metadata
metadata is extremely powerful, and chaining
extremely powerful, chaining
multiple VPNs or using
multiple VPNs using simply a VPN
VPN or Tor is not that safe. The following
following may
may allow
you to better
you better evade detection via Metadata:
evade detection Metadata:
https://security.stackexchange.com/questions/121733/how-can-meta-data-beused-to-
https://security.stackexchange.com/questions/ 1 2 1 7 33/how-can-meta-data-beused-to-
identify-users-through-chained-vpns/121738#121738
identify-users-through-chained-vpns/1 21 738#12 173 8
7 Examining research papers
Examining research papers on related topics is a must for SS members
related topics members in charge
charge of
INFOSEC
INFOSEC and/orand/or OPSEC.
OPSEC.
8 Ubuntu or Mint
9 https://archive.fo/jv0qa
ht_tps://archive.fo/jv09a
One ongoing
ongoing challenge
challenge for microphones
microphones has been physics: physics: The smaller microphones
microphones get,
the more of them you you need
need to capture
capture a sound, and the more processing
processing of that
that sound is
required. Startups
required. Startups such as Boston-based
Boston-based VesperVesper Technologies, 7
Technologies, Inc. — which
which has received
received
money from Baidu,
money
even tinier, yet
yet more capable
Amazon’s Alexa
Baidu, Bose and Amazon’s
capable designs
designs built around
7
Alexa Fund — are meeting
around minuscule
meeting the challenge
minuscule flaps of silicon
flaps of
with
challenge with
silicon that generate
generate
electric
electric current when bent by sound waves.
current when waves. Vesper claims this gives their
Vesper claims their microphone
microphone
unique capabilities,
unique capabilities, like understanding
understanding your your voice even in windy
windy conditions,
conditions, and drawing
drawing
zero power
power when
when awaiting
awaiting a “wake word,” since sound itself
‘Vvake word,” itself generates
generates the power
power the
microphone needs. We’re
microphone needs. We’re moving toward a world
moving toward world in which
which everything with a plug or
everything with
battery can respond
battery respond to a voice command.
command. Apple’s
Apple7s next Air Pods (spypods)
(spypods) could
could have
many
many of the capabilities
capabilities that Vesper
Vesper claims
claims its microphones
microphones will enable,
enable, such as built-in
built-in
noise cancellation.
noise cancellation. (In the past, Apple used several
Apple has used several suppliers
suppliers for its microphones.)
microphones.)
Meanwhile,
Meanwhile, the CEO of Samsung’s
Samsung’s consumer-electronics
consumer-electronics division recently told The Wall
division recently
Street Journal
Journal that by 2020 his company
company plans
plans to equip every
every single device sellsifrom
device it sells—from
TVs to refrigerators—with
refrigeratorsiwith microphones.
microphones. It could be unnerving to be surrounded surrounded by
listening devices,
devices, but the paradox is that as the technologytechnology develops,
develops, so does our
ability to free these gadgets from having to connect to the internet. internet.
Consider
Consider the voice-controlled trash can (spy cans) from Simple human.
voice-controlled trash human. Say “Open
“Open can”
opensiand then closes
and it opens—and closes on its own once the user walks walks away.
away. That’s
That’s it. It’s easy
easy to
make fun of a high-tech
high-tech trash
trash can,
can, especially
especially one that costs $200. As anyone anyone who lives
with multiple
with multiple virtual
virtual assistants attest, it is tricky to talk to one without
assistants can attest, without inadvertently
inadvertently
involving whole crowd.
involving the whole crowd.
Consumers must do everything to stop this from happening and BOYCOTT all
these spy
spy products.10
2) Physical OPSEC and Usage Behaviourll
Usage Behaviour11
The following
following list of 17
17 points
points was written
written with the absolute
absolute human
human limits
limits of OPSEC
OPSEC in
mind.
mind. It is to be followed
followed by the most
most committed
committed of resistance warriors.
resistance warriors.
1)
1) Don't
Don't use social media.
media. Avoid
Avoid Facebook/Myspace/
Facebook/Myspace/ Twitter/
Twitter/ Snapchat/etc.
Snapchat/etc.
2) Forward
Forward secrecy
secrecy (keep your
your mouth
mouth shut about
about any personal info if you
any personal you don't want
want to
expose
expose yourself)
yourself)
3) Use a cheap private VPN (w/ no IP logging)
cheap private logging) and Tor browser!
browser!
Always disconnect
4) Always disconnect your intemet (physically)
your internet (physically) when you are not going
when you going to use it!
it! Make
sure Bluetooth
Bluetooth and Wi-Fi is physically
physically disabled.
disabled. Don't keep it online time! If you
online all the time! you
do, you
you are asking
asking to be hacked!
hacked!
10
10 https://archive.fo/u2rcj
https://archive.fo/u2rcj
11
11 http://archive.is/lM6ZA
hflp://archive.is/1M6ZA
6) Party
Party van with Pirate Box and Botnet
This concept
concept is only for the most dedicated technically capable.
dedicated and technically capable. Implementing
Implementing it
requires determination,
requires determination, good driving
driving and an intimate
intimate knowledge
knowledge of INFOSEC.
INFOSEC. It has
been dubbed
dubbed the „Party
,,Party van“ since inside of it youyou will be having
having a continuous party, but
continuous party,
there is another
there another Party Van which
which has letters
letters belonging
belonging to an „Alphabet
,,Alphabet Soup“ agency
agency
attached
attached to it awaiting
awaiting you if you
you if you go
go for this method.
method.
Are you
you mentally strong enough to becoming a bit buccaneer?
What you need:
What you need:
1)
1) A van or truck.
truck. A rental
rental vehicle
vehicle is recommended,
recommended, though security thereof
though the security thereof is
questionable.
questionable. Intimate knowledge of the vehicle
Intimate knowledge vehicle and any
any digital
digital subsystems
subsystems it may have
may have
is a necessity.
necessity.
2) A „pirate
,,pirate box“ hacked router and antenna
hacked router antenna set-up.
3) A small team
team of 2-5 revolutionaries
revolutionaries who are all skilled drivers.
drivers.
4) Food
Food rations,
rations, as you will be driving
you will driving almost
almost continuously
continuously for the entire
entire operation.
operation.
5) A route
route plan -- DO NOT NOT DIGITIZE
DIGITIZE THE ROUTE ROUTE PLAN!
PLAN!
6) A „zero-day“,
,,zero-day“, or list of common
common Wi-Fi exploits,
exploits, in order to hack nearby
nearby Wi-Fi
modems.
modems.
7) Knowledge
Knowledge of how to maintain
maintain and operate
operate a botnet, which is the product
botnet, which product of this
endeavor
endeavor and can then be used used against
against enemy
enemy digital
digital networks.
networks. The concept
concept is simple.
simple.
You buy rations
rations and get your other supplies
get your supplies stocked up.
stocked up.
Then you
you drive along
along your route at a leisurely
your route leisurely pace
pace hacking
hacking as many
many Wi-Fi
Wi-F i routers
routers
(automatically!
(automatically! Write
Write the script yourself!)
yourselfl) along the wayway as come into range
range of your
your
signal. Law enforcement
enforcement will not identify you as long as you
identify you you stay on the move
move and avoid
avoid
boosting your signal too strongly.
boosting your strongly. Ideally,
Ideally, your
your connection
connection request
request should
should not be visible
visible
nearby Wi-Fi
to nearby users. Ultimately
Wi-Fi users. Ultimately this method
method depends
depends greatly
greatly on personal
personal computer
computer and
communications proficiency and is recommended
communications proficiency recommended in order to build a botnet week
within a week
botnet within
or so of continuous
continuous driving
driving (take shifts, make sure proper
proper vehicle maintenance is
vehicle maintenance
observed prior to departure
observed prior departure and use cash at gasgas stations).
stations).
The success
success of such a mission
mission depends
depends on careful planning of digital
careful planning resources and
digital resources
knowledge of both cellular
knowledge cellular and 2G/3G/4G networks. If
2G/3G/4G networks. If your
your ISP notices
notices irregular
irregular
behavior
behavior and decides
decides to remove
remove you from their
you from their system youyou must have plans
plans around
around this
eventuality.
eventuality. Dynamic
Dynamic IPs and multiple
multiple (or spoofed)
spoofed) device
device IDs are essential
essential to maintain
maintain
connectivity
connectivity to the network,
network, or it is entirely possible to perform
entirely possible perform the operation
operation „offline
,,offline “if
your configuration
your configuration settings
settings are adequate
adequate and you
you do not plan
plan on immediately
immediately activating
activating
the botnet.
botnet. The topic
topic of botnet
botnet management
management should
should be carefully planned and directly
carefully planned directly
connected
connected to the following
following attacks
attacks on enemy
enemy network
network infrastructure.
infrastructure.
You
You may
may picture yourself as a pirate, but first
first and foremost you
you are a National
Socialist and any
Socialist any use of the botnet for personal gain will be identified and punished
by your
your allies.
allies.
Officers
IV. Tactics against Law Enforcement Officers
Enforcement
1) Dealing with Law Enforcement
Golden Rule: Ask for a lawyer immediately upon upon contact and say say nothing.
Do not fall for the tricks
tricks which
which enemy
enemy law enforcement
enforcement may play. Nothing
may play. you say
Nothing you say
can help you.
you. Law enforcement
enforcement officers
officers are not in a position
position to offer you
you a plea
plea
deal, only the prosecution
prosecution is, and even then you you are guaranteed
guaranteed a politicized
politicized
verdict
verdict for having opposed their
having opposed their Jew cabal and stood for the liberty
liberty of your
your Volk.
Judges
Judges do not need to accept
accept the plea bargain
bargain either.
either. Law enforcement
enforcement use
various
various techniques
techniques to trytry and get
get a confession.
confession. They will trytry to minimize your
minimize your
behavior
behavior and make it seem wise to agree with them.
agree with them. This is a trick.
trick. An in-depth
in-depth
guide to law enforcement
enforcement interrogation techniques is not required,
interrogation techniques required, because
because all of
their
their techniques
techniques can be countered
countered by refusing
refusing to speak and asking
asking for a lawyer.
lawyer.
Contents
1) LE knocked
1) knocked on my my door
2) I am being offered
offered a deal if I turn states witness
witness
3) LE is requesting
requesting to search my my house
house or car
4) I got arrested
arrested and am being
being interrogated
interrogated
5) If I ask a cop
cop if they are a cop,
cop, do they have to tell me
6) Do LE smoke weed weed or use other drugs
7) I am non-important/don't
non-important/don't do anything
anything wrong
wrong
8)
8) When
When I talk online
online I like to say
say SWIM (someone
(someone whowho isn't me)
So LE knocked on my my door and asked to talk to me. They say say that they know I
have been up up to no good, better for me if I talk to them.
good, and that it will be better
What should I do?
You should under circumstances talk to LE. They are not your
under no circumstances your friends
friends 15,
15, although
although
they may pretend to be. Anything
may pretend Anything youyou say will be used against
say can and will against you
you in court. In
fact, anything
anything you
you say will be twisted
say will twisted to put you
you in the worst possible light. Even if you
worst possible you
think
think you
you are saying something
something innocent, twist it against
innocent, LE can twist you. So, it is best to say
against you. say
absolutely
absolutely nothing.
nothing. Don't try to outsmart
outsmart them
them in an interrogation,
interrogation, this is not a game,
game, if
they think
they think you
you are the sort ofof person
person that sees things
things as a game
game they will try
try and make
make
you feel smarter than
you than them when they
them when they question you, but in reality
question you, they are just getting
reality they getting
you to talk more. When
you When questioned
questioned by LE, you you should immediately request to talk to your
immediately request your
lawyer,
lawyer, and nothing
nothing more.
more. Everything you say
Everything you say to LE should be said through
through a lawyer,
lawyer, in
all cases.
cases. 15
15 Unless
Unless the officer
officer makes they are an SS member
makes it clear that they member and
investigating
investigating the enemy.
enemy. Then discretion
discretion should be used,
used, though
though generally
generally LE are to be
treated politely
treated with support for their
politely and with their role in maintaining
maintaining societal
societal integrity.
integrity. However,
However,
many understand the war effort.
many LE do not understand effort. Reading
Reading the body language
language of an LE will help
you determine
you their intentions
determine their towards you
intentions towards you and the cause.
cause.
Additionally, remember
Additionally, remember that destruction
destruction of evidence
evidence is a crime in many
many
places (like the United
places United States).
States). Turning
Turning your
your computer off is not destruction of
evidence,
evidence, even if youyou are using whole
whole disc
disc encryption (and thus having
having the computer
computer
turned
turned off makes
makes the data inaccessible
inaccessible to the investigators);
investigators); hitting your computer
hitting your with a
computer with
hammer,
hammer, shooting
shooting it with
with you
you gun,
gun, or throwing
throwing it into your
your swimming
swimming pool whenwhen you
you see
police walking
the police walking to your
your door is destruction
destruction of evidence,
evidence, and youyou could be sent to
prison for it (even
prison (even if you
you are found "not guilty"
guilty" of the crime itself). You can face a
crime itself).
destruction
destruction of evidence
evidence charge
charge even if the investigators
investigators manage recover the evidence
manage to recover evidence
you tried to destroy.
you tried destroy. If you
you have incriminating
incriminating evidence your hard drive,
evidence on your you should
drive, you
using encryption,
be using encryption, not relying
relying on your
your ability
ability to destroy
destroy your
your computer.
computer.
So it is looking
looking like I am going to be doing a bid in prison, but I am being offered a
witness. Should I do this?
deal if I turn states witness.
It is true that you
you can in some cases get get reduced
reduced sentences
sentences by becoming
becoming a confidential
confidential
informant.
informant. But wouldwould you
you rather
rather spend five years
years in prison
prison getting
getting abused
abused and spit on,
on,
possibly killed,
possibly killed, or spend ten years
years in prison
prison being left alone for the most part? part? Snitches
Snitches
are despised
despised more than than anyone
anyone else in prison,
prison, and some of the peoplepeople youyou will be locked
up
up with
with (Communists,
(Communists, Life-sentence
Life-sentence etc.) have nothing
nothing to lose. Guards
Guards are known
known to
reveal information
reveal information on inmates
inmates to other inmates,
inmates, so don't think you you are going keep your
going to keep your
snitch status secret. EvenEven if you
you are kept protective custody
kept in protective custody you will not be safe, when
you will when
prison riots
prison riots happen
happen the first thing
thing that happens
happens is the inmates
inmates kill everyone
everyone in protective
protective
custody.
custody. In addition putting your
addition to putting your life in serious danger,
danger, helping
helping the enemy
enemy makes you a
makes you
coward
coward and a hypocrite. mind that even if you
hypocrite. Keep in mind take a deal to snitch, that has no
you take
legally
legally binding power, your
binding power, your sentence
sentence is still up
up to the judge.
judge. Although
Although the mandatory
mandatory
minimum
minimum is erasederased when
when you
you take a deal, youyou can still get the maximum
maximum sentence
sentence if the
judge says
says so,
so, even after you
you already snitched. This has been
already snitched. been known
known to happen.
happen. Even if
you
you get put in the witness
witness protection
protection program
program and given a new
new identity,
identity, people
people in witness
witness
protection can be traced.
protection traced. Snitching
Snitching is never
never worth
worth it,
it, and it is never
never the right
right thing
thing to do.
Don't do the crime if you you can't do the
time without
time without snitching.16
snitching. 16
So I got pulled over,over, or got a knock on my my door, and LE is requesting to search my my
house or car. What should I do?
them no. Never
Tell them Never consent
consent to be searched
searched or have your
your vehicle
vehicle or house searched.
searched. Make
them get a warrant.
them warrant. Even if youyou have nothing
nothing on youyou and your
your vehicle
vehicle and house are
clean, you should make them
clean, you them get
get a warrant.
warrant. You don't want
want to make their job easier.
make their easier. If
you don't consent
you consent to a search and they search anywaysanyways with no warrant then any
warrant then any evidence
evidence
they gather cannot
they used in court. If you
cannot be used you consent, they don't even need
consent, they need a warrant.
warrant.
16
16 This advice
advice is mainly
mainly for your protection. Cooperation
your protection. Cooperation withwith SS aligned
aligned LE is perfectly
perfectly
valid, AFTER
AFTER the Zionist
Zionist Occupational
Occupational Government
Government in your your Nation
Nation or local area is
ousted.
ousted. You must assumeassume that LE willwill not protect
protect you
you adequately.
adequately.
arrested and am being interrogated,
So I got arrested interrogated, what do I do? They say don't
say if I don't
cooperate they are going going to make things hell for me and put me in a holding cell
with a bunch of gang gang members! But if I confess confess they will make things
very
very easy
easy for me.
me.
Ask for your
your lawyer.
lawyer. If they
they don't immediately
immediately stopstop questioning
questioning you,you, continue
continue asking
asking for
your lawyer.
your lawyer. You don't ever want want to say
say anything
anything to cops.
cops. Even
Even if they put you you in a
holding
holding cell full of gang
gang members,
members, it is probably
probably better to be therethere for a day than than to
confess
confess and get sent withwith the same gang gang members
members for ten years.years. Anyways,
Anyways, most most ganggang
members
members are unlikely
unlikely to mess with
with you
you if you
you just keep to yourself
yourself and don't cause any any
trouble with them.
trouble them. Keep
Keep in mind: police
police lie, secret service
service lie, they
they want you to confess,
want you confess,
confessing
confessing or giving
giving any
any information
information up up is going
going to hurt youyou it is under no circumstances
circumstances
going
going to ever help you.you.
If I ask a cop
cop if they are a cop,
cop, they have to tell me right?
No, cops
cops do not have to tell youyou they are cops, neither do secret service.
cops, neither service. Undercovers
Undercovers lie
all the time.
time. So, do confidential
confidential informants. careful who you
informants. Be careful you trust,
trust, even friends you
friends you
have known your entire life can turn.
known your
But what about smoking weed weed or using other drugs? Can they do this too?
Undercovers
Undercovers can smoke weed, weed, and I am sure theythey will have no issues using using other drugs
either.
either. Someone using drugs does not mean that
Someone using that they
they are not a cop cop or secret service
service agent.
agent.
It also doesn't
doesn't mean
mean they are not a confidential
confidential
informant.
informant.
But I am non-important
non-important / don'tdon't do anything wrong wrong / am small time
Even if youyou do nothing wrong, most LE wants
nothing wrong, wants to screw you.you. The majority
majority of themthem are not
trying to protect
trying protect and serve but are trying
trying to meet
meet some alpha
alpha male requirement
requirement they they
subconsciously
subconsciously have.have. They feel important when they bring you
important when you down. people tend
Also, people
down. Also,
minimize what
to minimize what they do, so youyou are probably bigger than you
probably bigger you would
would like to admit.
admit. Be
proud but silent of your
proud your achievements
achievements for the revolution.
revolution.
When I talk online I like like to say
say SWIM (someone
(someone who isn't me) me) instead of me or I.
This keeps me safe safe right?
right?
No, this offers youyou no protection
protection at all. People
People who say say SWIM are just fooling fooling
themselves. People tend to like to have "security
themselves. People "security blanket
blanket security" where they convince
security" where convince
themselves they are safe as long as they do some simple ritual
themselves ritual (as opposed
opposed to takingtaking
actual
actual security precautions, which
security precautions, which are a bit more difficult).
difficult). Security
Security blanket
blanket security
security is
dangerous,
dangerous, as it doesn't
doesn't offer real security
security but makes you act as if
makes you if you
you are secured.
secured.
Appendix B: Modern Weapons Outline
Blunderbusses,
Blunderbusses, and other homemade
homemade gunsguns can be researched
researched online,
online, as well
well as slingshots
slingshots
and various
various low-tech
low-tech „fool proof “weapons.
,,fool proof “weapons. It is also possible
possible to create basic projectile
projectile
weapons and guns
weapons guns through
through experimentation, though care is to be taken
experimentation, though taken when
when testing
testing and
using said guns
using unrifled barrels
guns as unrifled barrels or explosions
explosions in the firing
firing chamber
chamber may prove highly
may prove highly
dangerous.
dangerous. They fall outside scope of this guide due to their
outside of the scope their variety
variety and
abundance.
abundance. Local factors
factors and ammunition types are to be carefully
ammunition types carefully considered when
considered when
manufacturing
manufacturing or acquiring
acquiring guns
guns (projectile
(projectile weapons)
weapons) and ammunition
ammunition (projectiles).
(projectiles).
In the original Werwolfguide this is explained
original SS Werwolf explained in detail.
detail. Other military
military manuals
manuals and
gun
gun manufacturing
manufacturing guides17
guidesl7 can be acquired
acquired online
online or via associates
associates who participate
participate in
related activities.
related activities.
Described
Described in this Appendix
Appendix are modern
modern weapons
weapons which
which are not commonly
commonly found,
found, or mass
produced. Additionally,
produced. Additionally, explosives,
explosives, molotov
molotov cocktails
cocktails and swiss army
army knives
knives are
detailed.
detailed.
I. Modern Weapons
1. Modern Shortlist
Weapons Shortlist
1)
1) Microwave gun gun
This gun classified as a directed
gun can be classified directed energy
energy weapon.
weapon. It is known
known colloquially
colloquially as the
Poor man's Ray Gun “as it is a simple microwave microwave oven conversion.
conversion. Microwave
Microwave oven
magnetrons
magnetrons are inexpensive
inexpensive and easyeasy to manipulate,
manipulate, though
though extreme
extreme caution
caution should be
used
used as the voltages
voltages involved
involved are lethal.
lethal. A grounded
grounded understanding
understanding of electrical
electrical
engineering
engineering is recommended before construction,
recommended before though ultimately
construction, though ultimately it is up
up to the risk
tolerance of the individual
tolerance individual to engage
engage in the manufacturing
manufacturing of such a weapon.
weapon. As with the
Laser gun
gun manual
manual below,
below, the intention
intention should be to burn the enemy enemy (or drone)
drone) to the
death, not maim their eyesight.
death, eyesight. This should aiming at the neck
should be done by aiming neck or head
depending
depending on the powerpower of said beam.
beam. Skin will char so to achieve
achieve the desired
desired lethal
lethal
effect
effect it is important
important to maintain
maintain aim. Alternatively, seriously wound
Alternatively, it can be used to seriously wound the
enemy
enemy by targeting
targeting either
either exposed
exposed regions
regions of
skin, light clothing
clothing or grenades/explosives
grenades/explosives attached
attached to their utility
utility belt. Other
Other longer
longer
wavelengths than
wavelengths than the two mentioned,
mentioned, can be engineered
engineered in order to
penetrate and boil enemies
penetrate enemies alive though power consumption
though the power consumption for this and potential
potential for
melting
melting of components
components hinders
hinders the effectiveness
effectiveness of these weapons.
these weapons.
Ultimately,
Ultimately, it is upup to the individual
individual in order to determine
determine the best radiation
radiation frequency
frequency
and amplitude
amplitude to employ
employ in the field.
field. Caution and careful operation of such guns guns is
vital to prevent loss of good will and morale among among friendly forces.
forces.
17
17 An excellent
excellent collection
collection of gun
gun related
related materials: http://archive.is/yAjQi
materials: hgpM/archiveis/ijf 2i
„Poor Microwave oven conversion:
,,Poor man's Ray Gun“ -- Microwave
https://www.yumpu.com/en/document/view/33249254/the-poor-mans-raygunpdf
https://www.yumpu.com/en/document/view/33249254/the-poor-mans-raygunpdf
2) Laser gun
gun
How to Make a Laser
WARNING: Lasers cause blindness or eye eye damage and, as with Microwave guns, guns,
civilians or children is strictly forbidden and those who do so will be
using it near civilians
executed either by the enemy enemy or by friendly forces.
First of all, let's review
review the Laser concept:
concept: L.A.S.E.R.
L.A.S.E.R. stands for Light
Light Emission
Emission by
Stimulated
Stimulated Emission
Emission of Radiation.
Radiation. Lasers work, basically,
Lasers work, basically, like this:
this:
1.
1. A substance
substance (usually
(usually a gas,
gas, although
although crystal
crystal lasers
lasers are made as well)
well) is heated
heated to the
point where
point where it begins
begins to emit Photons.
Photons. This substance
substance is held in a tube.
tube.
2.
2. The Photons reflect off mirrors
Photons reflect mirrors on either
either side of the tube.
3.
3. Eventually,
Eventually, the focused Photons will break
focused Photons break through
through one of the mirrors
mirrors and the actual
actual
laser beam
beam will emit from the front of the tube. tube. Although Lasers are used
Although Lasers used in multiple
multiple
types of light, we will be focusing
types focusing on the Visible
Visible Spectrum.
Spectrum. The Visible
Visible Spectrum
Spectrum of
Light varies
varies for each person,
person, but generally
generally extends
extends from around
around 380 nm (Violet)
(Violet) to
around
around 700 nm (Red). Red (600-700 nm) are some of the most common
(600-700 nm) common lasers.
lasers. They are
also some of the
easiest
easiest to obtain.
obtain.
Some
Some recommended materials:materials:
1-Adjustable
l-AdjustableVoltage
Voltage Regulator
Regulator LM317T
LM317T
1-
1- 100
100 ohm Potentiometer
Potentiometer
2- 1010 ohm Resistors
Resistors
1-
1- 1N4001 Rectifier Diode
1N4001 Rectifier Diode
1- 47uf 35v Capacitor
1- Capacitor
1- Any Size PCB Board
1- Any Board
1- Any Solder
1- Any
1- Any Soldering
1- Any Soldering Iron
1-
1- Power
Power Switch
Switch (I(1 like momentary
momentary push buttons)
buttons)
1- l2x30mm Aixiz
1- 12x30mm Aixiz laser housing
housing Click
Click Here
2- Spools
Spools of wire (Red and Black)
Black)
You will need
need at least a 6 volt Power
Power source.
source.
need something
You will also need something to put everything
everything in when
when you
you are done. (a flashlight works
flashlight works
if you
you can make
make the circuit
circuit small enough fit in it) If you
enough to fit you do not use a flashlight you will
flashlight you
need
need some form of of battery
battery holder.
holder.
Optional:
Optional: Digital
Digital Multimeter
Multimeter
(may be needed
needed if you
you run into problems
problems during
during construction
construction or prototyping).
prototyping).
Diodes
i) Laser Diodes
Laser Diodes
Diodes are tiny.
tiny. Creating
Creating them
them in a DIY setting is costly
costly and time-consuming
time-consuming and
they are usually
they usually manufactured
manufactured by precision
precision machines.
machines. Harvesting
Harvesting a laser diode can be a
tricky process as they tend to be very
tricky process very fragile
fragile and sensitive
sensitive to static and other forms
forms of
shock. It is very
very important take your
important to take your time
time in harvesting your precious
harvesting your precious diode.
diode. Do not
ever drop it!
it!
Below
Below is an image
image of a Diode:
Diode:
(Inside
(Inside the Drive)
Drive)
(Typical
(Typical Drive)
Drive)
Inside you will need to locate
Inside you locate the laser assembly.
assembly. It will be on 2 metal
metal rails. At the ends
of those
of those rails will be more
more screws
screws to remove.
remove Once they removedyou
they are removed you will be able to
lift the rails
rails and slide the laser assembly
assembly right
right off.
On the right of the page
right side of page is a picture of the exact component
picture of you should be removing
component you removing
from your
your drive at this point.
point.
may need
Once it is off (you may need to use forceps
forceps to wrestle
wrestle it off, eventually
eventually it will come,
come, just
keep you will need
keep at it), you need to remove heat-sinks. There
remove the heat-sinks. There is an opaque
opaque glue connecting
connecting
them
them to the sled. Insert your
your screwdriver
screwdriver (smaller
(smaller
better) on the glue and pry
the better) go under
pry it off. Try to go under the base on the glue.
mm
http://showsyouhow.blogspot.com/2007/1 2/diy—dvd—burner-laserpointer-proper—
way_18.html
M»
3
5
s s l
:5 £5
5%
fig Eu 3.
g in}
5533?:
gsagé
- 3
5
E
—-§
mg; l!
—U
a
§§§§2 i
2
ilagg g
5
Mia: -
4!
IL;
——_‘
l'mili\ «-
Ni-gnln c
Vol I'm-d
19 Additional devices
19 Additional devices and EM based
based gadgets:
gadgets: https://diymaketech.blogspot.com/2012
https://diymaketech.blogspot.com/20l2
ii) Coil
Coil Length
The longer
longer the coil is the more time
time it has to drag the projectile
projectile to the center
center and the more
wraps of wire
wraps fitted into the solenoid
wire can be fitted solenoid increasing
increasing magnetic
magnetic flux
flux density.
density. The longer
longer
piece of wire the coil is made of and the higher
the piece higher the inductance
inductance of the coil the higher
higher
reluctance of the coil is so the longer
the reluctance longer the current pulse length
current pulse will be. This means
length will means that
the rate of change
change of current
current is lower and so will not reach
reach as high a peak
peak value.
value. Since the
current
current effects
effects the magnetic field density
magnetic field density a high current
current is desirable
desirable so the coil should
should be
tuned so that it makes
tuned makes the strongest
strongest magnetic field in the time
magnetic field time available.
available.
The coil length
length is directly
directly linked to the projectile
projectile length
length as they should
should be roughly
roughly equal
as mentioned
mentioned previously.
previously.
v)
V) Pulse Length
The pulse
pulse length
length should be exactly
exactly the same length
length as the amount
amount of time it takes
takes to pull
projectile from the breach
the projectile breach to the center of the coil and return
return to zero. The pulse
pulse length
length
is affected
affected by a myriad
myriad of variables
variables including,
including, capacitor
capacitor voltage,
voltage, capacitor
capacitor capacity,
capacity,
circuit
circuit resistance,
resistance, and coil inductance which varies
inductance which varies dynamically
dynamically during
during use as there
there is
initially
initially an air core which
which is soon replaced
replaced with an iron core as the projectile
projectile slides in not
to mention
mention depending
depending on how many many turns, what gauge
turns, layers and what gauge of wire is used.
used. This
problem is solved by fixing
problem fixing as many
many variables
variables as possible
possible such as capacitor
capacitor voltage
voltage and
size, projectile
projectile dimensions which in turn fix
dimensions which fix the coil length
length and internal
internal diameter.
diameter. Then
remaining variables
the remaining variables are varied
varied until
until the optimal
optimal combination
combination is found.
found. The remaining
remaining
variables are most importantly
variables importantly wire gauge
gauge and number
number of layers. Assuming a suitable
layers. Assuming suitable
switch can be usedused the wire gauge
gauge is usually
usually the largest
largest available.
available.
Switch bounce/resistance
vi) Switch
Mechanical
Mechanical switches
switches can arc and bounce
bounce which
which lengthens pulse and lowers
lengthens the pulse lowers the
average
average flux
flux density
density experienced
experienced in the tubetube during
during firing.
firing. This is overcome
overcome by the use of
solid-state
solid-state switches
switches such as SCR’s, MOSFET’s
MOSFET’s or IGBT’s IGBT’s which
which experience
experience none
none of the
arcing
arcing issues.
issues. They are not perfect
perfect solutions though as they
solutions though they have several
several flaws
flaws such as
requiring a switching
requiring switching current/voltage
current/voltage to work,
work, and SCR’s
SCR’s cannot
cannot be switched off until the
switched off
source-drain
source-drain current
current drops below
below zero so require
require “v-switching”.
“v-switching”. V-switching where a
V—switching is where
second
second SCR and cap cap bank of the same or higher
higher voltage
voltage is discharged
discharged through first
through the first
SCR dropping
dropping the voltage below zero and switching
voltage below switching the switch off.
MOSFET’s
MOSFET’s are generally
generally quite low power
power so are of no use to coil guns of a decent
guns of decent scale
and a suitable
suitable one can be expensive
expensive but a solution
solution is to use a bank of themthem is parallel
parallel to
spread the current
current over several
several less expensive
expensive devises.
devises. IGBT’s
IGBT’s are much betterbetter solutions
solutions
as they
they can be switched
switched on and off at will and can handlehandle far higher power than
higher power than
MOSFET’s.
MOSFET’s. It is also important
important that the solid state switch can operate
operate fast enough
enough to turn
the device
device on and offoff in the desired frame, Most
desired time frame, Most IGBT’s
IGBT’s are capable
capable of this as well.
well.
vii) Capacitor
Capacitor Voltage
The higher
higher the capacitor
capacitor voltage
voltage the higher
higher the projectile
projectile velocity
velocity since the stored energy
energy
in a capacitor
capacitor is equal half the capacitance
equal to half capacitance multiplied
multiplied by the voltage
voltage squared
squared as long as
the switching
switching capabilities
capabilities are there then this is one of the more favorable
favorable variables
variables to
choose
choose to increase
increase as each extra volt makes
makes a big difference.
difference.
viii) Capacitor
Capacitor Capacitance
The higher
higher the capacitance
capacitance the larger
larger the volume
volume of stored energy
energy in line with:
with:
Energy stored in a capacitor=1/2 CV"2
capacitor=l/2 CV^2
iii) Charging
A 1.5v 400-volt inverter
1.5V to 400-volt inverter has been included
included in the enclosure
enclosure to enable
enable the device
device to be
charged
charged of AA batteries would be slow and would
batteries but this would would use several
several batteries
batteries per
per shot.
The main charging
charging comes half rectified
comes from half rectified mains using a light bulb as a charging
mains using charging
resistor to give non-linear
resistor non-linear resistance
resistance through
through the charge
charge cycle. UK mains electricity
electricity is
240v RMS, which
which when half wave
when half rectified using
wave rectified using a diode
diode comes
comes out at 336v. My
capacitors
capacitors charge
charge up
up to 330 volts so 336 is perfect
perfect and mains will allow me to charge
mains will charge the
bank cheaply
cheaply and quickly
quickly when
when compared
compared to the battery
battery solution.
solution. A resistor
resistor was placed
placed
across
across the capacitor
capacitor bank to slowly discharge
discharge it to make
make sure it is always
always left uncharged.
uncharged.
v) Projectile dimensions
Through trial and error and parameter
Through trial parameter sweeps
sweeps I found
found the optimum
optimum set up
up for several
several
different
different diameters of proj
diameters of projectile.
ectile. The important
important results
results are below;
below; all were
were limited
limited to
roughly 800Amps
roughly 800Amps so my my IGBT handle the current.
IGBT could handle current.
6mm Diameter
The standard
standard 6mm coil gun with the predetermined
gun with above would
predetermined limits from above would give a rough
rough
maximum
maximum of of 33.5m/s
33‘5m/s and 3.6J kinetic
kinetic energy
energy on 15
15 layers
layers of
of 14AWG
14AWG 30mm
30mm length.
length. The
capacitor bank
capacitor bank was evidently too much
was so large this was evidently much power
power to dump
dump into such a small
projectile in one stage. The projectile
projectile projectile size was too small,
small, and a larger projectile
projectile was
needed. The simulation
needed. simulation graph
graph is below
below
10mm Projectile
Using a 10mm
Using 10mm projectile found that a 40mm
projectile it was found length coil would
40mm length would be best
best using
using 10
10
layers of wire
layers of wire and producing
producing 25.4m/s
25.4m/s but a more
more reasonable
reasonable 7.6J of kinetic
7 .6J of kinetic energy.
energy‘
12mm Projectile
12mm
Using a 12mm
Using 12mm projectile
projectile an optimum
optimum length of 45mm
length of found with 9 layers
45mm was found of
layers of
14AWG.
14AWG. This gave
gave a velocity of 22.7m/s
velocity of 22.7m/s and a kinetic
kinetic energy of 9.9J with
energy of with a peak
peak current
current
of 811Amps.
of 81 lAmps‘
15mm Projectile
Using a 15mm
Using 15mm projectile
projectile an optimum
optimum set up
up was found to be 7 layers of 50mm length
layers of length
14AWG.
14AWG. This gave
gave a velocity of 16.65m/s
velocity of 16.65m/s and a kinetic
kinetic energy
energy of 9.15J.
9.15J. This was less
than the 12mm
12mm so the 12mm
12mm was used.
used.
f\
K1 @
@ C5)
II. Home-made
Home-made explosives
perfect world
In a perfect world the National Socialist would
National Socialist would not need
need to manufacture
manufacture bombs
bombs at home,
home,
however perfect world
however a perfect world must be forged Blood, which
through our Iron and Blood,
forged through which starts in the
household.
household.
1)
1) Bomb making intro
Contents
1) Applied Chemistry
1) Applied Chemistry
2) Bomb
Bomb fuels
a) ROCKET
ROCKET ENGINE
ENGINE POWDER
POWDER
b) RIFLE/SHOTGUN
RIFLE/ SHOTGUN POWDER
POWDER
c) FLASH
FLASH POWDER
POWDER
3) See also
1)
1) Applied Chemistry
Bomb
Bomb making
making is a topic many
many darknet people are very
darknet people very interested
interested in, because with little
because with
effort and money
money some impressive
impressive devices
devices can be made.
2) Bomb fuels
a) ROCKET ENGINE POWDER
One of the most exciting
exciting hobbies nowadays is model
hobbies nowadays model rocketry.
rocketry. Estes is the largest
largest
producer of model rocket
producer rocket kits and engines.
engines. Rocket
Rocket engines
engines are composed
composed of a single large
grain of propellant.
propellant. This grain is surrounded
surrounded by a fairly
fairly heavy cardboard tubing. One gets
cardboard tubing.
propellant by slitting the tube lengthwise
the propellant lengthwise and unwrapping
unwrapping it like a paper
paper towel
towel roll.
roll.
When
When this is done,
done, the grey
grey fire
fire clay at either
end of the propellant
propellant grain must be removed.
removed. This is usually
usually done gently with a plastic
gently with plastic or
brass knife.
brass knife. The material
material is exceptionally
exceptionally hard and must be crushed
crushed to be used.
used. By
gripping
gripping the grain on the widest
widest setting
setting on a set of pliers
pliers and putting
putting the grain and
powder in a plastic
powder plastic bag, powder will not break
bag, the powder break apart and shatter
shatter all over. This should
be done to all the large chunks
chunks of powder, crushed like black
powder, and then it should be crushed black
powder. Rocket
powder. Rocket engines
engines come in various
various sizes, ranging
ranging from 1/41/4 A -- 2T to the incredibly
incredibly
powerful D engines.
powerful engines. The larger the engine,
engine, the more expensive.
expensive. D engines
engines come in
packages of three,
packages three, and cost about $5.00 per per package.
package. Rocket
Rocket engines
engines are perhaps
perhaps the
terrorist, since they can be used
single most useful item sold in stores to a terrorist, used as is, or can be
cannibalized for their
cannibalized their explosive powder.
explosive powder.
b) RIFLE/SHOTGUN POWDER
Rifle powder
Rifle powder and shotgun powder are really
shotgun powder really the same from a practical
practical standpoint.
standpoint. They
are both nitrocellulose-based propellants. They will be referred
nitrocellulose-based propellants. referred to as gunpowder
gunpowder in all
future references. Gunpowder
future references. Gunpowder is mademade by the action
action of
concentrated nitric and sulfuric
concentrated nitric upon cotton.
sulfuric acid upon material is then
cotton. This material then dissolved
dissolved by
solvents and then reformed
solvents reformed in the desired dealing with gunpowder,
desired grain size. When dealing gunpowder, the
grain size is not nearly
nearly as important
important as that of of black powder.
powder. Both large and small grained
grained
gunpowder burn fairly slowly
gunpowder burn slowly compared
compared to black powder when unconfined,
powder when unconfined, but when
when it is
confined,
confined, gunpowder
gunpowder burns
burns both hotter with more gaseous
hotter and with gaseous expansion, producing
expansion, producing
more pressure.
pressure. Therefore,
Therefore, the grinding process that is often necessary
grinding process necessary for other
propellants is not necessary
propellants necessary for gunpowder.
gunpowder. Gunpowder
Gunpowder costs about
about $9.00 per
per pound.
pound.
c) FLASH POWDER
Flash powder is a mixture
Flash powder mixture of powdered
powdered zirconium
zirconium metal and various
various oxidizers.
oxidizers. It is
extremely sensitive to heat or sparks and should be treated
extremely sensitive treated with
with more care than black
powder, with which
powder, which it should NEVER
NEVER be mixed.
mixed. It is sold in small containers
containers which
which must
be mixed
mixed and shaken before
before use. It is very
very finely
finely powdered,
powdered, and is available
available in three
three
speeds:
speeds: fast, medium, flash powder
medium, and slow. The fast flash powder is the best for using
using in explosives
explosives
or detonators.21
detonators.21
21
21 See also: http://qx7j2selmom4ioxf.onion/files.html#new
http://qx7j2selmom4ioxf.onion/files.html#new
http://parazite.nn.fi/roguesci/index.php/f-18.html
http://parazite.nn.fi/roguesci/indexphp/f—l8.html
bomb/molotov etc.
3) Pipe bomb/molotov etc.
i) EXPLOSIVE CONTAINERS
This section will
will cover
cover everything
everything from making
making a simple firecrackerto a complicated
simple firecracker complicated
scheme
scheme for detonating
detonating an insensitive
insensitive high explosive,
explosive, both of which
which are methods
methods that
that
could be utilized
utilized by freedom
freedom fighters.
fighters.
A pocket
pocket is formed.
formed. This pocket filled with
pocket can be filled with black
black powder, pyrodex, flash
powder, pyrodex, flash powder,
powder,
gunpowder,
gunpowder, rocket
rocket engine powder, or any
engine powder, any of the quick-burning
quick-burning fuel oxidizer
oxidizer mixtures
mixtures that occur
occur
fine powder.
in the form of a fine powder. A fuse is then
inserted,
inserted, and one continues
continues the triangular
triangular folds, being careful
folds, being careful not to spill out any
any of the
explosive.
explosive. When
When the polumna
polumnais finished,
finished, it should be taped
taped together
together very tightly, since this will
very tightly,
increase
increase the strength
strength of the container,
container, and produce
produce a louder
louder and more
more powerful
powerful explosion when it
explosion when
finished polumna
is lit. The finished polumnashould look like a 1/4
1/4 inch - 1/3-inch-thick triangle, like the one
1/3-inch-thick triangle,
shown below:
below:
Mann mm .m .I-nn'vx
(An assembled
assembled bomb is presented
presented in fig.
fig. 2.)
..............
It I
lth‘lt‘k’J 9 N u-n
:u c»
lg 1 \ncrmnd my my ,.
11g I
puma-1H: an «)4 *Lv'ux; 9.: :_~. h‘ . d1! [,4 my now
Lu 3
pux .wl: m l «1 1h I, an: x '1 Jul ll my... ,.-
1y up." .url-Ilw w um
' w M; .M.
mm
mm ,, rm. “MK”-.. ‘7
in 4 .nl!\|\luk\l
l “d; x“
x
«m M r.;‘ .w- 3.x:- ml r,._ .m mm {-
“sun: l
paper
l
v-v-vnyuwwtq-v.‘
civic-Icon00-OI‘
:ttutntuatxtttl
‘uv-v-o-onovn..‘
" cxplomr ‘ '
cotton-luaclloc‘
sloututntu‘ _______________________ “he
noose-t-katnncn‘
.\.\.-'\,\.\.\.‘\,\.\.\:\;\.\.\,\
[Inuc l
paper
cprn)
is placed
placed in the piping.
piping. Epoxy with a drying
Epoxy with drying agent works
works best
best in this type of device.
device. One end
must be made first and be allowed
allowed to dry completely
completely before
before the device filled with powder
device can be filled powder
and fused. Then, with another
fused. Then, piece of tissue
another piece tissue paper,
paper, pack
pack the powder
powder tightly,
tightly, and cover
cover it with
plenty of epoxy.
plenty PVC pipe works
epoxy. PVC works well for this type of device,
device, but it cannot used if the pipe
cannot be used
had an inside
inside diameter greater than 3/4 of an inch. Other
diameter greater Other plastic used in this type
putties can be used
plastic putties type
of device,
of device, but epoxy with a drying
epoxy with drying agent works
works best.
best.
v) ADVANCED
ADVANCED USES USES FOR EXPLOSIVES
The techniques
techniques presented those that could be used by a person
presented here are those person who
who had some degree of
degree of
knowledge of the use of explosives.
knowledge explosives. Some of this information
information comes
comes from demolitions
demolitions books,
books, or
from military
military handbooks.
handbooks. Advanced
Advanced uses for explosives
explosives usually
usually involved
involved shaped charges
charges or
utilize a minimum
utilize minimum amount
amount of explosive
explosive to do a maximum
maximum amount
amount of damage.
damage. They almost
almost
always
always involve
involve high order explosives.
explosives.
“m- H'rr
xgmm
pnmulg mm.-
Imckul} Inlnmmm
\‘ mum hm.
Pugh
upl....u-
Jul-fr
I
: mm
"Ink we!
[‘I[‘\'
\ unhu
(pm)
‘
II!~\HC l
Mm
Imuc
mpn
cpm)
-
uuc
A
\\ Irc
4) Swiss army
army knife blueprint
blueprint
No modern
modern fighter
fighter is complete without a Swiss Army
complete without Army Knife, referred to as a Multitool.
Knife, also referred Multitool. It is
recommended to acquire
recommended acquire a Victorinox
Victorinox Spartan
Spartan or Deluxe
Deluxe Tinker.
Tinker. In lieu of these
these a simple guide
guide
for DIY construction
construction of your
your own Swiss Army
Army Knife (different
(different attachments
attachments approximated
approximated as
keys) is included
keys) included below,
below, the SS member
member is recommended
recommended to creatively work around
creatively work resource
around resource
limitations
limitations relating tools and materials:
relating to tools materials:
i) Materials
1) pieces of wood
1) Two pieces wood (about
(about 1"
1" x 3.75"
3.7 5" x 1/8"
1/8" each)
2) Thin sheet metal (about
(about 2" x 3.75")
3.75")
3) Two #8 machine
machine screw lock nuts
4) Two #8 machine
machine screws, 3/ " long
screws, 3/4"
5) Ten #8 machine
machine screw washers
washers
6) Glue that's
that's able to bond wood to metal
bond wood metal
7) Wood
Wood stain (optional)
(optional)
8) Polyurethane
Polyurethane (optional)
(optional)
5)
[
ii) Tools
1)
5) Pencil
Pencil
6) Ruler
Ruler
Tip: Paint
39 CU
e“l (x‘3 D DC)
Tools
C)
paint section
the paint
at Dollar
clamps
13" x 9"
wood pieces.
hardware stores. For the sheet metal,
9" of metal.
metal.
pieces. These are generally
used a baking
metal, I used
generally free at
baking sheet that I found
found
v) Assemble
Assemble the Frame
Insert machine screws
Insert the machine through the holes
screws through holes in the metal
metal plates.
plates. Then add the washers
washers and keys.
keys.
Four
Four keys and five
five washers fit perfectly
washers will fit perfectly on a 3/4-inch
3/4-inch screw
screw in the sequence
sequence (sheet metal,
metal,
washer, key, washer,
washer, washer, key,
key, washer, key, washer,
washer, key, key, washer,
washer, key, washer, sheet metal). Using this
metal). Using this sequence,
sequence,
two keys
keys and three
three washers fit on a3 1/2-inch
washers will fit 1/2-inch screw.
screw. Likewise,
Likewise, six keys and seven
seven washers
washers
fit on a 1-inch
will fit 1-inch screw.
screw.
A
d 1114
Alternatively, you
Alternatively, you can conserve
tend to stick on each other.
washers. When you're
washers. you're done adding
space a little bit by eliminating
conserve space
If you
other. If have an odd number
you have
eliminating the washers,
number of
keys and washers,
adding keys
of keys you
washers, but the keys will
you can fill
washers, add the second
fill the space
piece of
second piece
space with
of sheet metal.
will
with two
metal. Then,
tighten everything
tighten together with the two lock nuts.
everything together nuts.
vi) Glue the Wooden Panels
Apply a thin layer of glue to the outside
Apply outside of one plate
plate and press
press on the wooden
wooden panel.
panel. Do the same
for the second panel,
panel, then binder clips to hold
then use binder hold everything
everything in place while the glue dries. You
place while
may wish to add a layer or two
may wish of card stock to prevent
two of prevent the clamps
clamps from denting your wood
denting your wood
panels. Victorinox
panels. Victorinox Spartan. Victorinox Deluxe
Spartan. Victorinox Deluxe Tinker.
Tinker.
Guerrilla War
Appendix C: Enemy Tactics and Guerrilla
I.
1. War Tactics of the Enemy
This section was based
section was based on the Brazilian22-communist tactics which
Brazilian22-communist war tactics which saw success
success in the 70's.
Clear differences
differences and yet large similarities
similarities are apparent.
apparent. The largest
largest difference
difference occurs
occurs in the war
philosophy of each individual
philosophy of individual fighter,
fighter, or rather
rather the lack thereof,
thereof, especially
especially from the ethical
ethical and
leadership
leadership perspective, of the leftists.
perspective, of leftists.
On the other hand it is helpful
helpful to learn the bulk of these
bulk of these tactics off by-heart
tactics off by-heart in order to improve
improve
your own war effort and to encircle,
your encircle, lure and destroy
destroy the enemy
enemy in the field.
field.
I. Mini-Manual of the Urban Guerrilla by Carlos Marighella
Urban Guerrilla
Contents23
1)
1) A DEFINITION
DEFINITION OF THE URBAN URBAN GUERRILLA
GUERRILLA
2) PERSONAL
PERSONAL QUALITIES
QUALITIES OF THE URBAN URBAN GUERRILLA
GUERRILLA
3) HOW
HOW THE URBAN
URBAN GUERRILLA
GUERRILLA LIVES LIVES
4) TECHNICAL PREPARATION OF THE URBAN
TECHNICAL PREPARATION URBAN GUERRILLA
GUERRILLA
5) THE URBAN
URBAN GUERRILLA'S
GUERRILLA‘S WEAPONSWEAPONS
6) THE SHOT; THE URBANURBAN GUERRILLA'S
GUERRILLA‘S REASON REASON FOR FOR EXISTENCE
EXISTENCE
7) THE FIRING
FIRING GROUP
GROUP
8) THE LOGISTICS
LOGISTICS OF THE URBAN
URBAN GUERRILLA
GUERRILLA
9) CHARACTERISTICS
CHARACTERISTICS OF THE URBAN URBAN GUERRILLA'S
GUERRILLA'S TACTICS
TACTICS
10)
10) THE INITIAL
INITIAL ADVANTAGES
ADVANTAGES OF THE URBAN URBAN GUERRILLA
GUERRILLA
11)
1
l) SURPRISE
SURPRISE
12)
12) KNOWLEDGE
KNOWLEDGE OF THE TERRAIN
TERRAIN
13)
l3) MOBILITY AND SPEED
MOBILITY AND SPEED
14)
14) INFORMATION
INFORMATION
15)
15) DECISIVENESS
DECISIVENESS
16)
16) OBJECTIVES
OBJECTIVES OF THE GUERRILLA'S ACTIONS
GUERRILLA'S ACTIONS
17)
17) ON THE TYPES
TYPES AND NATURE OF MISSIONS
AND NATURE MISSIONS FORFOR THE URBAN
URBAN
GUERRILLA
GUERRILLA
18) ASSAULTS
18) ASSAULTS
19)
19) THE BANK ASSAULT AS POPULAR
BANK ASSAULT POPULAR MISSION
MISSION
20) RAIDS
RAIDS AND
AND PENETRATIONS
PENETRATIONS
21) OCCUPATIONS
OCCUPATIONS
22 Tactics are adapted
adapted to the Brazil's environment -- this must be considered.
considered.
22) AMBUSH
AMBUSH
23) STREET
STREET TACTICS
TACTICS
24) STRIKES AND WORK
STRIKES AND WORK INTERRUPTIONS
INTERRUPTIONS
25) DESERTIONS,
DESERTIONS, DIVERSIONS,
DIVERSIONS, SEIZURES,
SEIZURES, EXPROPRIATION
EXPROPRIATION OF
AMMUNITION AND
AMMUNITION AND EXPLOSIVES
EXPLOSIVES
26) LIBERATION
LIBERATION OF PRISONERS
PRISONERS
27) EXECUTIONS
EXECUTIONS
28) KIDNAPPING
KIDNAPPING
29) SABOTAGE
SABOTAGE
30) TERRORISM
TERRORISM
31) ARMED
ARMED PROPAGANDA
PROPAGANDA
32) THE WAR
WAR OF NERVES
NERVES
33) HOW
HOW TO CARRY
CARRY OUT THE ACTION
ACTION
34) SOME OBSERVATIONS
OBSERVATIONS ON TACTICS
TACTICS
35) RESCUE
RESCUE OF THE WOUNDED
WOUNDED
36) GUERRILLA
GUERRILLA SECURITY
SECURITY
37) THE SEVEN
SEVEN SINS OF THE URBAN
URBAN GUERRILLA
GUERRILLA
38) POPULAR
POPULAR SUPPORT
SUPPORT
39) See also
1)
1) A DEFINITION OF THE URBAN URBANGUERRILLA
GUERRILLA
The urban
urban guerrilla
guerrilla is a person
person who
who fights
fights the military
military dictatorship with weapons,
dictatorship with weapons, using
using
unconventional methods.
unconventional methods. A revolutionary
revolutionary and an ardent
ardent patriot,
patriot, he is a fighter
fighter for his country's
country's
liberation,
liberation, a friend
friend of the people freedom. The area in which
people and of freedom. which the urban
urban guerrilla
guerrilla operates
operates
is in the large Brazilian
Brazilian cities.
cities. There
There are also criminals outlaws who work
criminals or outlaws work in the big cities.
cities.
Many times, actions
Many times, actions by criminals
criminals are taken
taken to be actions urban guerrillas.
actions by urban guerrillas. The urban
urban guerrilla,
guerrilla,
however,
however, differs radically from the criminal.
differs radically criminal benefits
criminal. The criminal benefits personally fiom his actions,
personally from actions,
and attacks
attacks indiscriminately
indiscriminately without
without distinguishing
distinguishing between
between the exploiters
exploiters and the exploited,
exploited,
which is why there
which there are so many
many ordinary people among
ordinary people among his victims.
victims. The urban
urban guerrilla
guerrilla follows
follows a
political goal, and only attacks
political attacks the government, businesses and the foreign
government, the big businesses foreign imperialists.
imperialists.
Another element
Another element just as harmful
harmful to the guerrillas
guerrillas as the criminal, operating in the urban
criminal, and also operating urban
area,
area, is the counterrevolutionary,
counterrevolutionary, who
who creates
creates confusion,
confusion, robs banks,
banks, throws
throws bombs, kidnaps,
bombs, kidnaps,
assassinates,
assassinates, and commits
commits the worst
worst crimes
crimes imaginable
imaginable against urban guerrillas,
against urban revolutionary
guerrillas, revolutionary
priests, students,
priests, students, and citizens
citizens who oppose
oppose tyranny
tyranny and seek liberty. urban guerrilla
liberty. The urban guerrilla is an
implacable
implacable enemyenemy of the regime,
regime, and systematically
systematically inflicts
inflicts damage
damage on the authorities
authorities and on the
people who
people who dominate
dominate the country
country and exercise
exercise power.
power. The primary
primary task of the urban
urban guerrilla
guerrilla is
to distract,
distract, to wear
wear down,
down, to demoralize
demoralize the military
military regime
regime and its repressive
repressive forces,
forces, and also to
attack
attack and destroy
destroy the wealth
wealth and property
property of the foreign managers and the Brazilian
foreign managers Brazilian upper
upper class.
The urban
urban guerrilla
guerrilla is not afraid
afraid to dismantle
dismantle and destroy
destroy the present Brazilian economic,
present Brazilian economic,
political and social system,
political system, for his aim is to aid the rural guerrillas
guerrillas and to help in the creation
creation of a
totally new
totally new and revolutionary
revolutionary social and political
political structure,
structure, with the armed population
population in power.
power.
TECHNICAL PREPARATION
4) TECHNICAL THE URBAN GUERRILLA
PREPARATION OF THE GUERRILLA
No one can become
become an urban
urban guerrilla
guerrilla without paying special attention
without paying attention to technical
technical preparation.
preparation.
The technical
technical preparation urban guerrilla
preparation of the urban guerrilla runs from a concern
concern for his physical
physical condition
condition to
a knowledge
knowledge of and apprenticeship
apprenticeship in professions
professions and skills of all kinds,
kinds, particularly
particularly manual
manual
skills. The urban
urban guerrilla
guerrilla can have a strong physical
physical constitution
constitution only if he trains
trains systematically.
systematically.
He cannot
cannot be a good fighter
fighter if he has not learned
learned the art of fighting.
fighting. For that reason,
reason, the urban
urban
guerrilla
guerrilla must learn and practice
practice the various
various forms
forms of unarmed
unarmed fighting,
fighting, of attack,
attack, and of
personal defense.
personal defense. Other useful
useful forms
forms of physical preparation are hiking,
physical preparation hiking, camping, practice of
camping, the practice
survival
survival in the woods,
woods, mountain
mountain climbing,
climbing, rowing,
rowing, swimming,
swimming, skin diving
diving and training
training as a
frogman,
frogman, fishing,
fishing, harpooning,
harpooning, and the hunting
hunting of birds
birds and of small and big game. game. It is very
very
important
important to learn how to drive a car, car, pilot a plane,
plane, handle
handle a motor boat and a sailboat,
sailboat,
understand mechanics,
understand radio, telephone,
mechanics, radio, telephone, electricity
electricity and have some knowledge
knowledge of electronics
electronics
techniques 25.
techniques
It is also important
important to have a knowledge
knowledge of topographical
topographical information,
information, to be able to determine
determine
one's position
position by instruments
instruments or other available resources, to calculate
available resources, calculate distances,
distances, make maps maps and
plans, draw to scale, make timings,
plans, work with
timings, and work with an angle protractor,
protractor, a compass,
compass, etc. A
knowledge of chemistry,
knowledge chemistry, of color combination
combination and of stamp-making, mastery of the skills of
stamp-making, the mastery
calligraphy
calligraphy and the copying
copying of letters,
letters, and other techniques
techniques are part of the technical
technical preparation
preparation
of the urban
urban guerrilla,
guerrilla, who is obliged
obliged to falsify
falsify documents
documents in order
order to live within
within a society that he
seeks to destroy.
destroy. In the area of "makeshift"
"makeshift" medicine,
medicine, the urban
urban guerrilla
guerrilla has the special role role of
being
being a doctor
doctor or understanding
understanding medicine,
medicine, nursing, pharmacology, drugs,
nursing, pharmacology, drugs, basic surgery
surgery and
emergency first aid. The basic
emergency first basic question
question in the technical
technical preparation
preparation of the urban
urban guerrilla
guerrilla is,
nevertheless, to know
nevertheless, know how to handle
handle weapons
weapons such as the submachine
submachine gun, revolver, automatic
gun, revolver, automatic
pistol, FAL, various
pistol, types of shotguns,
various types shotguns, carbines,
carbines, mortars, bazookas, etc. A knowledge
mortars, bazookas, knowledge of various
various
types of ammunition
types ammunition and explosives
explosives is another
another aspect
aspect to consider. Among the explosives,
consider. Among explosives,
dynamite
dynamite must be well well understood.
understood. The use of incendiary
incendiary bombs,
bombs, smoke
smoke bombs,
bombs, and other types types
is also indispensable
indispensable prior
prior training.
training. To know
know how to improvise
improvise and repair
repair weapons,
weapons, prepare
prepare
Molotov
Molotov cocktails,
cocktails, grenades,
grenades, mines,
mines, homemade
homemade destructive
destructive devices,
devices, how-to
how-to blow-up
blow-up bridges,
bridges,
tear up
up and put out of service railroads and railroad
service railroads railroad cars, these are necessities
cars, these necessities in the technical
technical
preparation of the urban
preparation urban guerrilla
guerrilla that can never
never be considered
considered unimportant.
unimportant. 25 Note Note here that the
enemy rarely follows
enemy rarely follows this advice, preferring to engage
advice, preferring engage in carnal pleasures
pleasures and merely
merely learning
learning a
singular
singular role to a good degree.
degree. The list of skills mentioned
mentioned is recommended
recommended as you you have the
willpower and strength
willpower strength to better
better yourself
yourself as compared
compared to their slovenliness.
slovenliness. That being said,
underestimate your
NEVER underestimate your enemy.
enemy. The highest
highest level of preparation
preparation for the urban
urban guerrilla
guerrilla is
training camp
the training camp for technical
technical training.
training. But only the guerrilla who has already
guerrilla who passed a
already passed
preliminary examination
preliminary examination can go schoolithat is to say,
go to this school—that say, one who
who has passed
passed the test of fire
fire
in revolutionary
revolutionary action,
action, in actual
actual combat
combat against
against the enemy.
enemy.
URBANGUERRILLA'S
5) THE URBAN GUERRILLA'S WEAPONS
The urban
urban guerrilla's weapons are light arms,
guerrilla's weapons arms, easily
easily obtained,
obtained, usually
usually captured
captured from the enemy,
enemy,
purchased, or made
purchased, made on the spot. Light weapons
weapons have the advantage
advantage of fast handling
handling and easyeasy
transport. In general,
transport. general, light weapons
weapons are
characterized
characterized as being
being short-barreled.
short-barreled. This includes many automatic
includes many weapons. Automatic
automatic weapons. Automatic and
semi-automatic weapons considerably
semi-automatic weapons considerably increase
increase the firepower
firepower of the urban
urban guerrilla.
guerrilla. The
disadvantage
disadvantage of this type
type of weapon,
weapon, for us,
us, is the difficulty
difficulty in controlling
controlling it,
it, resulting
resulting in wasted
wasted
rounds or a wasteful
rounds ammunitionicorrected for only by a good aim and precision
wasteful use of ammunition—corrected precision firing.
firing.
Men who are poorly
poorly trained
trained convert
convert automatic weapons into an ammunition
automatic weapons ammunition drain.
drain. Experience
Experience
has shown that the basic weapon
weapon of the urban
urban guerrilla
guerrilla is the light submachine
submachine gun.gun. This weapon,
weapon,
in addition
addition to being efficient
efficient and easy
easy to shoot in an urban
urban area,
area, has the advantage
advantage of of being
being
greatly
greatly respected
respected by the enemy.
enemy. The guerrilla
guerrilla must thoroughly
thoroughly know
know how to handle
handle the
submachine
submachine gun, now so popular
gun, now popular and indispensable
indispensable to the Brazilian urban guerrillas.
Brazilian urban guerrillas. The ideal
submachine
submachine gun gun for the urban
urban guerrilla
guerrilla is the INA .45.45 caliber.
caliber. Other types of submachine
Other types submachine gunsguns of
different
different calibers
calibers can also be used—understanding
usediunderstanding of course, problem of ammunition.
course, the problem ammunition. Thus,
it is preferable
preferable that the manufacturing
manufacturing capabilities
capabilities of the urban guerrillas be used for the
urban guerrillas
production of
production of one type ofof submachine
submachine gun,gun, so that the ammunition
ammunition to be usedused can be
standardized.
standardized. Each firing
firing group
group of urban
urban guerrillas
guerrillas must have a submachine
submachine gungun handled
handled by a
good marksman.
marksman. The other members
members of the group armed with .38 revolvers,
group must be armed revolvers, our standard
standard
weapon.
weapon. The .32 is also useful
useful for those
those who want
want to participate.
participate. But the .38 is preferable
preferable since
its impact usually puts
impact usually puts the enemy
enemy out of action.
action. Hand
Hand grenades
grenades and conventional
conventional smoke bombs bombs
can also be considered weapons, with defensive
considered light weapons, defensive power
power for cover and withdrawal.
withdrawal. Long-Long-
barreled
barreled weapons
weapons are more difficult
difficult for the urban
urban guerrilla
guerrilla to transport,
transport, and they attract
they attract much
attention because of their
attention because their size. Among
Among the long-barreled weapons are the FAL, the Mauser
long-barreled weapons Mauser guns
guns
or rifles,
rifles, hunting
hunting guns
guns such as the Winchester,
Winchester, and others.
others. Shotguns useful if used
Shotguns can be useful used at close
range and point
range point blank.
blank. They are useful
useful even for a poor
poor shot, especially
especially at night when precision
night when precision
isn't much
much help. A pressure
pressure air-gun
air-gun can be useful
useful for training
training in marksmanship.
marksmanship. Bazookas
Bazookas and
mortars
mortars can also be usedused in action,
action, but the conditions
conditions for using them have to be prepared
using them prepared and the
people who use them
people who them must be trained.
trained. The urban
urban guerrilla
guerrilla should not attempt
attempt to base his actions
actions
on the use of heavy weapons, which
heavy weapons, which have major
major drawbacks
drawbacks in a type of fighting
fighting that demands
demands
lightweight
lightweight weapons
weapons to insure mobility and speed. Homemade
insure mobility Homemade weapons
weapons are often efficient as
often as efficient
the best weapons
weapons produced
produced in conventional
conventional factories,
factories, and even a sawed-off
sawed-off shotgun
shotgun is a good
weapon for the urban guerrilla
weapon guerrilla fighter.
fighter.
i) Weapons
Weapons
The urban
urban guerrilla's role as a gunsmith
guerrilla's role gunsmith has a basic importance.
importance. As a gunsmith,
gunsmith, he takes
takes care of
weapons, knows
the weapons, knows how to repairrepair them,
them, and in many
many cases
cases can setup a small shop for
improvising
improvising and producing
producing effective
effective small arms. Experience
Experience in metallurgy
metallurgy and on the
mechanical
mechanical lathe are basic
basic skills the urban
urban guerrilla
guerrilla should incorporate
incorporate into his manufacturing
manufacturing
plans for the construction
plans construction of homemade weapons. This production,
homemade weapons. production, and courses
courses in explosives
explosives and
sabotage,
sabotage, must be organized.
organized. The primary
primary materials
materials for practice
practice in these
these courses
courses must be
obtained
obtained ahead
ahead of time, prevent an incomplete
time, to prevent incomplete apprenticeship—that
apprenticeshipithat is to say,say, so as to leave no
room for experimentation.
room experimentation. Molotov
Molotov cocktails,
cocktails, gasoline,
gasoline, homemade
homemade contrivances
contrivances such as
catapults
catapults and mortars
mortars for firing
firing explosives,
explosives, grenades
grenades made of pipespipes and cans,
cans, smoke bombs,
bombs,
mines,
mines, conventional
conventional explosives
explosives such as dynamite
dynamite and potassium
potassium chlorate,
chlorate, plastic
plastic explosives,
explosives,
gelatin
gelatin capsules,
capsules, and ammunition
ammunition of of every kind are indispensable
every kind indispensable to the success of the urban
urban
guerrilla's
guerrilla's mission.
mission. The methods
methods of of obtaining
obtaining the necessary
necessary materials
materials and munitions
munitions will be to
buy them
them or to take them
them by force in expropriation
expropriation actions
actions specially planned and carried
specially planned carried out. The
urban guerrillas
urban will be careful
guerrillas will keep explosives
careful not to keep explosives and other materials
materials that can cause
accidents
accidents around
around for very
very long but will always
always try
try to use them immediately on their intended
them immediately intended
targets. The urban
targets. urban guerrilla's
guerrilla's weapons
weapons and his ability
ability to maintain
maintain them
them constitute
constitute his firepower.
firepower.
By taking
taking advantage
advantage of modern
modern weapons
weapons and introducing
introducing innovations
innovations in his firepower
firepower and in the
use of certain weapons, the urban
certain weapons, urban guerrilla
guerrilla can improve
improve many
many of the tactics
tactics of urban
urban warfare.
warfare. An
example
example of this was the innovation
innovation made by the Brazilian urban guerrillas
Brazilian urban when they
guerrillas when they introduced
introduced
the use of the submachine
submachine gungun in their attacks
attacks on banks.
banks. When
When the massive
massive use of uniform
uniform
submachine
submachine guns
guns becomes possible, there will be new
becomes possible, new changes
changes in urban
urban guerrilla warfare tactics.
guerrilla warfare tactics.
The firing
firing group utilizes uniform
group that utilizes weapons and corresponding
uniform weapons corresponding ammunition, with reasonable
ammunition, with reasonable
care for their maintenance,
maintenance, will reach
reach a considerable of effectiveness.
considerable level of effectiveness. The urban
urban guerrilla
guerrilla
increases
increases his effectiveness
effectiveness as he increases
increases his firepower.
firepower.
6) THE SHOT; THE URBAN URBAN GUERRILLA'S REASON REASON FOR EXISTENCE
The urban
urban guerrilla's
guerrilla's reason
reason for existence,
existence, the basic condition
condition in which
which he acts and survives,
survives, is to
shoot. The urban
urban guerrilla
guerrilla must know
know how to shoot well, well, because
because it is required
required by this typetype of
combat.
combat. In conventional warfare, combat
conventional warfare, combat is generally
generally at a distance
distance with long-range weapons. In
long-range weapons.
unconventional warfare, in which
unconventional warfare, which urban
urban guerrilla
guerrilla warfare
warfare is included,
included, combat
combat is at short range
range
and often very
very close. To prevent
prevent his own death, urban guerrilla
death, the urban guerrilla must shoot first,
first, and he
cannot
cannot err in his shot. He cannot
cannot waste
waste his ammunition
ammunition because
because he does not possess
possess large
amounts,
amounts, and so he must conserve
conserve it. Nor can he replace
it. Nor replace his ammunition
ammunition quickly,
quickly, since he is a
part of a small team in which
part which each guerrilla himself The urban
guerrilla has to be able to look after himself. urban
guerrilla
guerrilla can lose no time, thus has to be able to shoot at once. One basic
time, and thus basic fact, which
which we
want to emphasize
want emphasize completely,
completely, and whose whose importance
importance cannot
cannot be overestimated,
overestimated, is that the urban
urban
guerrilla
guerrilla must not fire
fire continuously,
continuously, usingusing up
up his ammunition.
ammunition. It may may be that the enemy
enemy is
responding to this fire
responding fire precisely
precisely because
because he is waiting
waiting until the guerrilla's
guerrilla's ammunition used
ammunition is all used
up.
up. At such a moment,
moment, without
without having
having the opportunity
opportunity to replace
replace his ammunition,
ammunition, the guerrilla
guerrilla
faces a rain of enemy
enemy fire,
fire, and can be takentaken prisoner
prisoner or killed.
killed. In spite of the value
value of the surprise
surprise
factor, which
factor, which many
many times
times makes unnecessary for the urban
makes it unnecessary urban guerrilla
guerrilla to use his weapons,
weapons, he
cannot
cannot be allowed
allowed the luxury
luxury of entering
entering combat knowing how to shoot. And when
without knowing
combat without when face-
to-face with the enemy,
to-face enemy, he must alwaysalways be moving
moving from one position
position to another,
another, since to stay in
one place
place makes fixed target
makes him a fixed target and, as such, very very vulnerable.
vulnerable. The urban
urban guerrilla's
guerrilla's life
depends
depends on shooting,
shooting, on his ability
ability to handle
handle his weapons
weapons well
well and to avoid
avoid being
being hit. When we
speak of shooting,
shooting, we speak of accuracy
accuracy as well.well. Shooting
Shooting must be practiced
practiced until it becomes
becomes a
reflex
reflex action part of the urban
action on the part urban guerrilla.
guerrilla. To learn how to shoot and have have good aim, the
urban guerrilla
urban guerrilla must train himself systematically,
train himself utilizing every
systematically, utilizing practice method
every practice method shooting
shooting at
targets, even in amusement
targets, amusement parksparks and at home.home. Shooting
Shooting and marksmanship
marksmanship are the urban urban
guerrilla's
guerrilla's water perfection of the art of shooting
water and air. His perfection shooting may
may make him a special type of
special type
urban guerrilla—
urban guerrillai that is, a sniper, a category
category of solitary
solitary combatant
combatant indispensable
indispensable in isolated
isolated
actions.
actions. The sniper knows
knows how to shoot at close range range and at long range,
range, and his weapons
weapons are
appropriate
appropriate for either type of shooting.
shooting.
No firing
firing group
group can remain
remain inactive
inactive waiting
waiting for orders
orders from above.
above. Its obligation
obligation is to act. Any
Any
single urban
urban guerrilla
guerrilla who wants
wants to establish
establish a firing
firing group
group and begin action
action can do so,so, and thus
becomes
becomes a part of of the organization.
organization. This method
method of action eliminates the need for knowing
action eliminates knowing whowho
is carrying
carrying out which
which actions,
actions, since there
there is free initiative
initiative and the only important
important point
point is to
greatly
greatly increase
increase the volume
volume of urban
urban guerrilla
guerrilla activity wear out the government
activity in order to wear government and
force it onto the defensive.
defensive. The firing
firing group
group is the instrument
instrument of organized
organized action.
action. Within
Within it,
it,
guerrilla
guerrilla operations
operations and tactics
tactics are planned,
planned, launched
launched and carried through to success.
carried through success. The general
general
command
command counts
counts on the firing
firing groups
groups to carry
carry out objectives of a strategic
objectives of nature, and to do so in
strategic nature,
any part of the country.
any part country. For its part,
part, the general
general command
command helps the firing
firing groups with their
groups with
difficulties and with carrying
difficulties carrying out objectives
objectives of a strategic
strategic nature,
nature, and to do so in anyany part of the
country.
country. The organization
organization is an indestructible network of firing
indestructible network firing groups,
groups, and of coordination’s
coordination’s
among
among them,
them, that functions
functions simply and practically
practically within
within a general
general command
command that also
participates attacksian organization
participates in attacks—an organization that exists
exists for no other purpose than that of pure
purpose than pure and
simple revolutionary
revolutionary action.
action.
Conventional
Conventional logistics
logistics refer
refer to the maintenance problems for an army
maintenance problems army or a regular
regular armed
armed force,
force,
transported in vehicles,
transported vehicles, with fixed bases
with fixed bases and supply lines. Urban
Urban guerrillas,
guerrillas, on the contrary,
contrary, are
not an army
army but small armed groups,
groups, intentionally
intentionally fragmented.
fragmented. They have neither
neither vehicles
vehicles nor
rear areas. Their supply lines are precarious
precarious and insufficient, fixed bases
they have no fixed
insufficient, and they bases except
except
in the rudimentary
rudimentary sense of a weapons
weapons factory
factory within
within a house.
house. While
While the goal of
conventional
conventional logistics
logistics is to supply the war needs "gorillas" who are used to repress
needs of the "gorillas" repress rural
rural
and urban
urban rebellion,
rebellion, urban
urban guerrilla
guerrilla logistics
logistics aim at sustaining
sustaining operations
operations and tactics
tactics which
which have
nothing in common
nothing with conventional
common with conventional warfare
warfare and are directed
directed against
against the government
government and
foreign
foreign domination
domination of the country.
country. For the urban
urban guerrilla, who starts from nothing
guerrilla, who nothing and who
who has
no support
support at the beginning,
beginning, logistics
logistics are expressed
expressed by the formula MMWAE, which
which is:
M—mechanization
M—money
M—money
W—weapons
W—weapons
A—ammunition
E—explosives
E—explosives
Revolutionary
Revolutionary logistics takes mechanization
logistics takes mechanization as one of its bases.
bases. Nevertheless,
Nevertheless, mechanization
mechanization is
inseparable
inseparable from the driver.
driver. The urban
urban guerrilla
guerrilla driver
driver is as important
important as the urban
urban guerrilla
guerrilla
machine
machine gunner.
gunner. Without
Without either,
either, the machines
machines do
work, and the automobile,
not work, automobile, as well
well as the submachine
submachine gun gun becomes
becomes a dead thing. An
experienced
experienced driver
driver is not made in one day, and apprenticeship
apprenticeship mustmust begin
begin early. Every good
urban guerrilla
urban guerrilla must be a driver.
driver. As to the vehicles,
vehicles, the
urban guerrilla
urban expropriate what
guerrilla must expropriate what he needs.
needs. When
When he already
already has resources,
resources, the urban
urban
guerrilla
guerrilla can combine
combine the expropriation
expropriation of vehicles with his other methods
vehicles with methods of acquisition.
acquisition.
Money,
Money, weapons,
weapons, ammunition
ammunition and explosives,
explosives, and automobiles
automobiles as well, must be expropriated.
expropriated.
The urban
urban guerrilla
guerrilla must rob banks
banks and armories
armories and seize explosives
explosives and ammunition wherever
ammunition wherever
finds them.
he finds them. None
None of these
these operations
operations is carried
carried out for just one purpose.
purpose. Even whenwhen the raid is
to obtain money, weapons that the guards
money, the weapons guards carry
carry must be taken
taken as well.
well. Expropriation
Expropriation is the
first step in organizing logistics, which
organizing our logistics, itself assumes
which itself assumes an armed
armed and permanently
permanently mobile
mobile
character.
character. The second step step is to reinforce
reinforce and expand
expand logistics,
logistics, resorting
resorting to ambushes
ambushes and traps
traps
in which
which the enemy
enemy is surprised,
surprised, and his weapons,
weapons, ammunition,
ammunition, vehicles
vehicles and other resources
resources are
captured.
captured. Once
Once he has weapons,
weapons, ammunition
ammunition and explosives,
explosives, one of the most serious
serious logistics
logistics
problems facing
problems urban guerrilla
facing the urban guerrilla is a hiding
hiding place
place in which
which to leave the material,
material, and
appropriate
appropriate means
means of of transporting
transporting it and assembling
assembling it where
where it is needed.
needed. This has to be
accomplished
accomplished even when when the enemy
enemy is alerted
alerted and has the roads
roads blocked.
blocked. The knowledge
knowledge thatthat the
urban guerrilla
urban guerrilla possesses
possesses of the terrain,
terrain, and the devices
devices he uses
uses or is capable
capable of using,
using, such as
scouts specially prepared and recruited
specially prepared recruited for this mission,
mission, are the basic
basic elements
elements in solving
solving the
eternal
eternal logistics
logistics problems
problems faced by the guerrillas.
guerrillas.
l l) SURPRISE
11)
To compensate
compensate for his general weakness and shortage
general weakness shortage of weapons
weapons compared
compared to the enemy,
enemy, the
urban guerrilla
urban guerrilla uses surprise.
surprise. The enemy
enemy has no wayway to combat
combat surprise
surprise and becomes
becomes confused
confused
and is destroyed.
destroyed. When urban guerrilla
When urban guerrilla warfare
warfare broke
broke out in Brazil,
Brazil, experience proved that
experience proved
surprise
surprise was essential
essential to the success
success of any
any guerrilla
guerrilla operation.
operation. The technique
technique of surprise
surprise is based
upon four essential
upon requirements:
essential requirements:
1)
1) We know
know the situation
situation of the enemy
enemy we are going
going to attack, usually by means
attack, usually means of precise
precise
information
information and meticulous
meticulous observation, while the enemy
observation, while enemy does not knowknow he is going to be
attacked knows nothing
attacked and knows nothing about
about the attackers.
attackers.
2) We know
know the strength
strength of the enemy
enemy we are going to attack,
attack, and the enemy
enemy knows
knows nothing
nothing
about
about our strength.
strength.
3) Attacking
Attacking by surprise,
surprise, we save and conserve
conserve our forces, while the enemy
forces, while enemy is unable
unable to do the
same,
same, and is left at the mercy
mercy of events.
events.
4) We determine
determine the time and placeplace of the attack,
attack, fix
fix its duration
duration and establish
establish its objectives.
objectives. The
enemy remains ignorant
enemy remains ignorant of all of this information.
information.
l4) INFORMATION
14)
chances that the government
The chances government has for discovering
discovering and destroying urban guerrillas
destroying the urban guerrillas lessens
lessens
as the power
power of the dictatorship's
dictatorship's enemies
enemies becomes
becomes greater
greater and more concentrated
concentrated among
among the
population. This concentration
population. concentration of of the opponents
opponents of the dictatorship plays a very
dictatorship plays very important
important role in
providing information
providing information about the actions
actions of the police
police and government
government officials,
officials, as well
well as hiding
hiding
the activities
activities of the guerrillas.
guerrillas. The enemy
enemy can also be thrown
thrown off with
with false information,
information, which
which is
worse for him because
worse because it is a tremendous waste. By whatever
tremendous waste. whatever means,
means, the sources
sources of information
information
at the disposal
disposal of the urban guerrilla
guerrilla are potentially
potentially better than those
better than those of the police.
police. The enemy
enemy is
observed
observed by the people,
people, but he does not know
know who among
among the people
people transmits
transmits information
information to
urban guerrillas.
the urban guerrillas. The military police are hated
military and the police hated by the people
people for the injustices
injustices and
violence
violence they have committed,
committed, and this
this facilitates
facilitates obtaining
obtaining information which is damaging
information which damaging to
the activities
activities of government
government agents.
agents. Information,
Information, which
which is only a small segment
segment of popular
popular
support,
support, represents
represents an extraordinary
extraordinary potential
potential in the hands ofof the urban
urban guerrilla.
guerrilla.
The urban
urban guerrilla
guerrilla has to have vital information
information about the plans
plans and movements
movements of the enemy;
enemy;
where they
where they are,
are, how they
they move, resources of their
move, the resources their banking network, their
banking network, their means
means of
communication,
communication, and the secret activities
activities they carry
carry out. The reliable
reliable information passed on to the
information passed
guerrillas represents a well-aimed
guerrillas represents well-aimed blow at the dictatorship.
dictatorship. The dictatorship
dictatorship has no way
way to defend
defend
itself in the face of an important
itself important leak which
which facilitates
facilitates our destructive
destructive attacks.
attacks. The enemy
enemy also
wants to know
wants what actions
know what actions we are planning
planning so he can destroy
destroy us or prevent
prevent us from acting.
acting. In
this sense,
sense, the danger of betrayal
danger of betrayal is present,
present, and the enemy
enemy encourages
encourages betrayal infiltrates
betrayal and infiltrates
spies into the guerrilla
guerrilla organization.
organization. The urban
urban guerrilla's
guerrilla's technique
technique against
against this enemy
enemy tactic
tactic is
to denounce publicly the spies, traitors,
denounce publicly traitors, informers
informers and provocateurs.
provocateurs. Since our struggle takes
struggle takes
place among
place people and depends
among the people depends on their sympathy—while
sympathyiwhile the government
government has a bad
reputation because
reputation because of its brutality,
brutality, corruption
corruption and incompetence—the
incompetenceithe informers,
informers, spies, traitors
traitors
and the police
police come to be enemies
enemies of the people,
people, without
without supporters,
supporters, denounced
denounced to the urban
urban
guerrillas
guerrillas and, in many
many cases,
cases, properly
properly punished.
punished. For his part, urban guerrilla
part, the urban guerrilla must not evade
evade
the duty—once
dutywnce he knows knows who the spy spy or informer iswf
informer is—of physically
physically wiping
wiping him out. This is the
proper
proper
[26]
[26] This is to be exploited via infiltrations and counter-surveillance.
method,
method, approved
approved by the people,
people, and it minimizes
minimizes considerably
considerably the incidence
incidence of infiltration
infiltration or
enemy
enemy spying.
spying. For complete
complete success
success in the battle
battle against
against spies and informers,
informers, it is essential
essential to
organize
organize a counter-espionage
counter-espionage or counter-intelligence
counter-intelligence service. Nevertheless, as far as information
service. Nevertheless, information
is concerned,
concerned, it cannot
cannot all be reduced
reduced to a matter
matter of knowing
knowing the enemy's
enemy's moves
moves and avoiding
avoiding the
infiltration
infiltration of spies. Intelligence
Intelligence information broadiit must embrace
information must be broad—it embrace everything,
everything,
including most insignificant
including the most insignificant material.
material. There is a technique
technique of obtaining
obtaining information,
information, and the
urban guerrilla
urban guerrilla must master
master it.
it. Following
Following this technique,
technique, intelligence
intelligence information
information is obtained
obtained
naturally, as a part
naturally, part of the life of the people.
people. The urban
urban guerrilla,
guerrilla, living
living in the midst of the
population and moving
population moving about
about among them, must
among them, must be attentive types of conversations
attentive to all types conversations and
human relations, learning
human relations, learning how to disguise
disguise his interest
interest with great skill and judgement.
judgement.
In places
places where
where people
people work,
work, study, and live, it is easy
easy to collect
collect all kinds
kinds of information
information on
payments, business,
payments, business, plans
plans of all kinds,
kinds, points of view, opinions,
points of people's state of mind, trips,
opinions, people's trips,
interior
interior layout
layout of buildings,
buildings, offices
offices and rooms,
rooms, operations
operations centers,
centers, etc. Observation,
Observation,
investigation, reconnaissance, and exploration
investigation, reconnaissance, exploration of the terrain
terrain are also excellent
excellent sources
sources of
information.
information. The urban
urban guerrilla
guerrilla never
never goes
goes anywhere
anywhere absentmindedly
absentmindedly and withoutwithout revolutionary
revolutionary
precaution, always
precaution, always on the alert lest something
something occurs.
occurs. Eyes and ears open,open, senses alert, his
memory
memory is engraved with everything
engraved with necessary, now or in the future,
everything necessary, future, to the continued
continued activity of
activity of
the guerrilla
guerrilla fighter.
fighter. Careful reading of the press
Careful reading press with
with particular
particular attention
attention to the mass
communication
communication media, research of accumulated
media, the research accumulated data, the transmission
transmission of news
news and
everything
everything of note,
note, a persistence
persistence in being informed
informed and in informing
informing others,
others, all this makes up the
makes up
intricate
intricate and immensely
immensely complicated
complicated question of information
question of which gives
information which gives the urban
urban guerrilla
guerrilla a
decisive
decisive advantage.
advantage.
DECISIVENESS
15) DECISIVENESS
It is not enough
enough for the urban
urban guerrilla
guerrilla to have in his favor surprise,
surprise, speed, knowledge
knowledge of of the
terrain, and information.
terrain, information. He must also demonstrate
demonstrate his command
command of any any situation
situation and a capacity
capacity
for decisiveness, without which
decisiveness, without which all other advantages
advantages will prove
prove to be useless.
useless. It is impossible
impossible to
carry
carry out any
any action,
action, however well-planned, if the urban
however well-planned, urban guerrilla turns out to be indecisive,
guerrilla turns indecisive,
uncertain, irresolute.
uncertain, irresolute. Even an action successfully
successfully begun
begun can end in defeat
defeat if command
command of the
situation
situation and the capacity
capacity for decision
decision falter in the middle
middle of the execution
execution of the plan.
plan. When
When this
command
command of of the situation
situation and a capacity
capacity for decision
decision are absent, filled with hesitation
absent, the void is filled hesitation
and terror.
terror. The enemy takes advantage
enemy takes advantage ofof this failure
failure and is able to liquidate
liquidate us. The secret of the
success
success of anyany operation,
operation, simple or complex,
complex, easy
easy or difficult,
difficult, is to rely on determined
determined men.
Strictly
Strictly speaking,
speaking, there
there are no simple operations: carried out with the same care taken
operations: all must be carried taken
in the most difficult,
difficult, beginning
beginning with the choice
choice of the human elementsiwhich means
human elements—which relying on
means relying
leadership
leadership and the capacity
capacity for decision
decision in every
every situation.
situation. One can see ahead of time whether
ahead of whether an
action
action will be successful
successful or not by the wayway its participants
participants act during
during the preparatory
preparatory period.
period.
Those
Those whowho fall behind,
behind, whowho fail to make
make designated
designated contacts,
contacts, are easily
easily confused,
confused, forget things,
forget things,
fail to complete
complete the basic tasks
tasks of the work,
work, possibly
possibly are indecisive
indecisive men and can be a danger.
danger. It is
better
better not to include them. Decisiveness
include them. Decisiveness means
means to put into practice
practice the plan
plan that has been
been devised
devised
with determination,
with with audacity,
determination, with audacity, and with an absolute
absolute firmness.
firmness. It takes
takes only one person
person who
who
hesitates
hesitates to lose all.
17) ON
ON THE TYPES AND AND NATURE MISSIONS FOR THE URBAN
NATURE OF MISSIONS URBAN GUERRILLA
In order
order to achieve
achieve the objectives previously listed,
objectives previously listed, the urban
urban guerrilla
guerrilla is obliged,
obliged, in his tactics,
tactics,
to follow
follow missions
missions whose
whose nature
nature is as different diversifiedas possible.
different or diversified urban guerrilla
possible. The urban guerrilla
does not arbitrarily
arbitrarily choose
choose this or that mission.
mission. Some actions
actions are simple;
simple; others are complicated.
complicated.
The inexperienced
inexperienced guerrilla
guerrilla must be gradually
gradually introduced
introduced into actions
actions and operations
operations which
which run
from the simple to the complex.
complex. He begins missions and tasks
begins with small missions until he becomes
tasks until becomes
completely
completely experienced.
experienced. Before
Before any
any action, guerrilla must think
urban guerrilla
action, the urban think of the methods
methods and the
personnel at his disposal
personnel disposal to carry
carry out the mission.
mission. Operations
Operations and actions
actions that demand urban
demand the urban
guerrilla's
guerrilla's technical
technical preparation
preparation cannot
cannot be carried someone who lacks the technical
carried out by someone technical skill.
With these
these precautions,
precautions, the missions which the urban
missions which urban guerrilla
guerrilla can undertake
undertake are the following:
following:
1) Assaults
1) Assaults
2) Raids
Raids and penetrations
penetrations
3) Occupations
Occupations
Ambushes
4) Ambushes
5) Street tactics
tactics
Strikes and work
6) Strikes work stoppages
stoppages
7) Desertions,
Desertions, diversions,
diversions, seizures,
seizures,
8)
8) Expropriation
Expropriation of of weapons,
weapons,
9) Ammunition
Ammunition and explosives
explosives
10)
10) Liberation
Liberation of prisoners
prisoners
11)
1 1) Executions
Executions
12)
12) Kidnappings
Kidnappings
13)
13) Sabotage
Sabotage
14)
14) Terrorism
Terrorism
15) Armed propaganda
15) Armed propaganda
16)
16) War of nerves
nerves
18) ASSAULTS
ASSAULTS
Assaults are the armed
Assaults armed attacks which we make
attacks which make to expropriate
expropriate funds,
funds, liberate prisoners, capture
liberate prisoners, capture
explosives,
explosives, submachine
submachine guns,
guns, and other types
types of
of weapons
weapons and ammunition.
ammunition. Assaults can take
Assaults
place in broad daylight
place daylight or at night.
night. Daytime
Daytime assaults
assaults are made when
when the objective
objective cannot
cannot be
achieved
achieved at anyany other
other hour, such as the transport
transport of money
money by banks, which is not done
banks, which done at night.
night.
Night assault
Night assault is usually
usually the most advantageous
advantageous for the guerrilla.
guerrilla. The ideal is for all assaults
assaults to
take place
take place at night,
night, when
when conditions
conditions for a surprise
surprise attack are most favorable
favorable and the darkness
darkness
facilitates
facilitates escape
escape and hides
hides the identity
identity of the participants.
participants. The urban
urban guerrilla must prepare
guerrilla must prepare
himself,
himself, nevertheless, under all conditions,
nevertheless, to act under conditions, daytime
daytime as well
well as night.
night.
The most vulnerable
vulnerable targets
targets for assaults
assaults are the following:
following:
1)
1) Credit
Credit establishments
establishments
2) Commercial
Commercial and industrial
industrial enterprises,
enterprises, including plants for the manufacture
including plants manufacture of of weapons
weapons and
explosives
explosives
3) Military
Military establishments
establishments
4) Commissaries
Commissaries and policepolice stations
stations
5) Jails
6) Government
Government property
property
7) Mass
Mass communications
communications media
8) North
North American
American firms
firms and properties
properties
9) Government
Government vehicles,
vehicles, including
including military
military and police
police vehicles,
vehicles, trucks,
trucks, armored vehicles, money
armored vehicles, money
carriers,
carriers, trains,
trains, ships, and airplanes.
airplanes. The assaults
assaults on businesses
businesses use the same tactics,
tactics, because
because in
every
every case the buildings
buildings represent fixed target.
represent a fixed target. Assaults
Assaults on buildings
buildings are planned
planned as guerrilla
guerrilla
operations,
operations, varied
varied according
according to whether
whether they are against
against banks,
banks, a commercial
commercial enterprise,
enterprise,
industries,
industries, military
military bases,
bases, commissaries, prisons, radio
commissaries, prisons, radio stations, warehouses for foreign
stations, warehouses foreign firms,
firms,
etc. The assault
assault on vehiclesimoney-carriers,
vehicles—money-carriers, armoredarmored vehicles, trains, ships, airplanes—are
vehicles, trains, airplanesiareof
another
another nature,
nature, since they are moving targets. The nature
moving targets. nature of the operation
operation varies
varies according
according to the
situation circumstancesithat is, whether
situation and the circumstances—that whether the vehicle
vehicle is stationary
stationary or moving.
moving. Armored
Armored
cars,
cars, including
including military vehicles, are not immune
military vehicles, immune to mines.
mines. Roadblocks, traps, ruses,
Roadblocks, traps, ruses, interception
interception
by other vehicles,
vehicles, Molotov
Molotov cocktails,
cocktails, shooting
shooting with heavy efficient methods
weapons, are efficient
heavy weapons, methods of
assaulting
assaulting vehicles. Heavy vehicles,
vehicles. Heavy vehicles, grounded
grounded airplanes
airplanes and anchored
anchored ships can be seized,
seized, and
their
their crews and guards
guards overcome. Airplanes in flight
overcome. Airplanes flight can be hijacked
hijacked by guerrilla
guerrilla action or by
one person.
person. Ships and trains
trains in motion
motion can be assaulted
assaulted or captured
captured by guerrilla
guerrilla operations
operations in
order to obtain
obtain weapons
weapons and ammunition
ammunition or to prevent troop movements.
prevent troop movements.
This competition
competition produces
produces confusion,
confusion, which reflected in the people's
which is reflected people's uncertainty.
uncertainty. It is up
up to the
urban guerrilla
urban guerrilla to prevent
prevent this from happening,
happening, and to accomplish
accomplish this he must use two methods:
methods:
1)
1) He must avoid the outlaw's
outlaw's technique,
technique, which
which is one of unnecessary
unnecessary violence
violence and the
expropriation
expropriation of goods
goods and possessions
possessions belonging
belonging to the people.
people.
2) He must
must use the assault
assault for propaganda
propaganda purposes
purposes at the very
very moment
moment it is taking
taking place,
place, and
later distribute
distribute material,
material, leaflets—every
leafletsieverypossible
possible means
means of explaining
explaining the objectives
objectives and the
principles of the urban
principles of urban guerrillas,
guerrillas, as expropriator
expropriator
of the government
government and the ruling
ruling elite.
21) OCCUPATIONS
Occupations
Occupations are a type of attack carried
carried out when
when the urban
urban guerrilla
guerrilla stations himselfin specific
stations himself specific
establishments
establishments and locations,
locations, for a temporary
temporary action against
against the enemy
enemy or for some propaganda
propaganda
purpose. The occupation
purpose. occupation ofof factories
factories and schools
schools during
during strikes, or at other times,
times, is a method
method of
protest or of distracting
protest distracting the enemy's
enemy's attention.
attention. The occupation
occupation of radio
radio stations
stations is for propaganda
propaganda
purposes. Occupation
purposes. Occupation is a highly
highly effective
effective model
model for action
action but, in order to prevent
prevent
losses
losses and material
material damage
damage to our forces,
forces, it is always
always a good idea to plan on the possibility
possibility of a
forced withdrawal. It must always
forced withdrawal. always be meticulously planned and carried
meticulously planned carried out at the opportune
opportune
moment.
moment. Occupations
Occupations always
always have a time
time limit, and the swifter they
they are completed,
completed, the better.
better.
22) AMBUSH
AMBUSH
Ambushes are attacks,
Ambushes attacks, typified
typified by surprise, when the enemy
surprise, when road or when
trapped on the road
enemy is trapped when he
makes a police
makes police net surrounding
surrounding a house or estate.
estate. A false alarm
alarm can bring
bring the enemy
enemy the spot,
to
where he falls into a trap.
where trap. The principle
principle object of the ambush
ambush is to capture
capture enemy
enemy weapons
weapons and to
punish him with
punish with death. Ambushes to halt passenger
death. Ambushes passenger trains
trains are for propaganda
propaganda purposes,
purposes, and,
when they are troop
when trains, the object
troop trains, object is to annihilate
annihilate the enemy
enemy and seize his weapons.
weapons. The
urban guerrilla sniper is the kind
urban guerrilla kind of fighter
fighter especially
especially suited for ambush,
ambush, because
because he can hide
easily
easily in the irregularities
irregularities of the terrain,
terrain, on the roofs
roofs and the tops ofof buildings
buildings and apartments
apartments
under
under construction.
construction. From
From windows
windows and dark places,
places, he can take careful
careful aim at his chosen target.
chosen target.
Ambush has devastating
Ambush devastating effects
effects on the enemy,
enemy, leaving
leaving him unnerved,
unnerved, insecure
insecure and fearful.
fearful.
The guerrilla
guerrilla operations used in liberating
operations that can be used prisoners are the following;
liberating prisoners following;
1)
1) Riots
Riots in penal
penal establishments,
establishments, in correctional
correctional colonies
colonies or camps,
camps, or on transport
transport or prison
prison
ships;
2) Assaults
Assaults on urban
urban or rural
rural prisons,
prisons, detention
detention centers, prison camps,
centers, prison camps, or any permanent or
any other permanent
temporary place
temporary place where
where prisoners
prisoners are held;
3) Assaults
Assaults on prisoner transport trains
prisoner transport trains or convoys;
convoys;
4) Raids penetrations of prisons;
Raids and penetrations prisons;
5) Ambushing
Ambushing of of guards who move prisoners.
guards who prisoners.
27) EXECUTIONS
Execution
Execution is the killing
killing of a foreign
foreign spy,
spy, of an agent of the dictatorship,
dictatorship, of a police
police torturer,
torturer, of a
dictatorial
dictatorial personality
personality in the government
government involved
involved in crimes
crimes and persecutions
persecutions against patriots, of
against patriots,
a stool pigeon,
pigeon, informer,
informer, police
police agent or police
police provocateur.
provocateur. Those
Those who go go to the police their
police of their
own free will
will to make denunciations
denunciations and accusations,
accusations, who supply information
information and who finger
finger
people, must be executed
people, executed when
when they are caught
caught by the urban
urban guerrillas.
guerrillas. Execution
Execution is a secret
action, which the least possible
action, in which number of
possible number of urban
urban guerrillas
guerrillas are involved.
involved. In many
many cases,
cases, the
execution
execution can be carried
carried out by a single sniper,
sniper, patient,
patient, alone and unknown,
unknown, and operating
operating in
absolute
absolute secrecy
secrecy and in cold blood.
blood.
28) KIDNAPPING
Kidnapping
Kidnapping is capturing
capturing and holding
holding in a secret place
place a spy,
spy, political personality or a notorious
political personality notorious
and dangerous
dangerous enemy
enemy of the revolutionary
revolutionary movement.
movement. Kidnapping used to exchange
Kidnapping is used exchange or liberate
liberate
imprisoned
imprisoned revolutionaries
revolutionaries or to force the
suspension of torture
suspension of torture in jail by the military
military dictatorship.
dictatorship. The kidnapping
kidnapping of personalities
personalities who are
well-known artists,
well-known figures or who are outstanding
artists, sports figures outstanding in some other field,
field, but who
who have
evidenced
evidenced no political
political interest,
interest, can be a useful
useful form of propaganda
propaganda for the guerrillas,
guerrillas, provided
provided it
occurs under
occurs under special
special circumstances,
circumstances, and is handled
handled so the public
public understands
understands and sympathizes
sympathizes
with it.
with it. The kidnappings
kidnappings of of foreigners
foreigners or visitors
visitors constitutes
constitutes a form of protest
protest against
against the
penetration and domination
penetration domination of imperialism
imperialism in our country.
country.
SABOTAGE
29) SABOTAGE
Sabotage
Sabotage is a highly
highly destructive
destructive type of attack
attack using
using very persons—and sometimes
very few personsiand sometimes requiring
requiring
oneito
only one—to accomplish
accomplish the desired
desired result.
result. When
When the urban
urban guerrilla
guerrilla uses sabotage,
sabotage, first step
the first step
is isolated
isolated sabotage.
sabotage. Then comes
comes the step of dispersed
dispersed and general
general sabotage,
sabotage, carried
carried out by the
population. Well-executed
population. Well-executed sabotage
sabotage demands
demands study, planning
planning and careful
careful action.
action. A characteristic
characteristic
form of sabotage
sabotage is explosion, using dynamite,
explosion, using dynamite, fire
fire or the placing
placing of mines.
mines. A little sand, a trickle
trickle
any kind of combustible,
of any combustible, a poor
poor lubrication
lubrication job, a screw removed,
removed, a short circuit,
circuit, inserted
inserted
pieces of wood
pieces wood or iron, can cause
cause irreparable
irreparable damage.
damage. The objective
objective of sabotage
sabotage is to hurt, to
damage,
damage, to make useless
useless and to destroy
destroy vital enemy points such as the following:
enemy points following:
1)
1) the economy
economy of of the country
country
2) agricultural
agricultural or industrial
industrial production
production
3) transport
transport and communication
communication systems
systems
4) military
military and police systems and their
police systems their establishments
establishments and depots
depots
5) the repressive
repressive military-police
military-police system
system
firms and properties
6) the firms properties of exploiters
exploiters in the country
country
The urban
urban guerrilla
guerrilla should
should endanger
endanger the economy
economy of the country, particularly its economic
country, particularly economic and
financial aspects,
financial aspects, such as its domestic
domestic and foreign
foreign banking network, its exchange
banking network, exchange and credit
systems,
systems, its tax collection
collection system,
system, etc. Public
Public offices,
offices, centers
centers of government
government and government
government
depots
depots are easy targets for sabotage.
easy targets sabotage. Nor will it be easy easy to prevent
prevent the sabotage
sabotage of agricultural
agricultural
and industrial production27 by the urban
industrial production27 urban guerrilla, with his thorough
guerrilla, with thorough knowledge
knowledge of the local
situation.
situation. Factory
Factory workers
workers acting
acting as urban
urban guerrillas
guerrillas are excellent
excellent industrial
industrial saboteurs,
saboteurs, since they,
they,
better than anyone,
better than anyone, understand
understand the industry,
industry, the factory,
factory, the machinery
machinery or the part part most likely to
destroy
destroy an entire operation,
operation, doing much more damage damage than a poorly-informed
poorly-informed laymanlayman could
could do.
27 Do not emulate
emulate needless
needless destruction
destruction of private property. A factory
private property. factory is just a building.
building. A factory
factory
owner,
owner, however,
however, is an individual,
individual, whowho may
may be held liable
liable to any
any crimes which he has committed
crimes which committed
of the Zionist
in service of Zionist menace.
menace. Sabotage
Sabotage is only a valid tactic tactic against
against factories of the enemy.
factories of enemy.
Choose
Choose your
your targets wisely with respect
targets wisely respect to the enemy's transport and communications
enemy's transport communications systems,
systems,
beginning with railway
beginning with traffic, it is necessary
railway traffic, attack them
necessary to attack them systematically
systematically with sabotage.
sabotage. The
only caution
caution is against
against causing
causing death and injury
injury to passengers,
passengers, especially
especially regular
regular commuters
commuters on
suburban
suburban and long-distance
long-distance trains. Attacks on freight
trains. Attacks freight trains,
trains, rolling
rolling or stationary
stationary stock, stoppage
stoppage
of military
military transports
transports and communications
communications systems, these are the major objectives
systems, these objectives in this area.
Sleepers
Sleepers can be damaged
damaged and pulled
pulled up,
up, as can rails.
rails. A tunnel
tunnel blocked
blocked by a barrier
barrier of explosives,
explosives,
or an obstruction
obstruction caused
caused by a derailed
derailed car,
car, causes
causes enormous
enormous harm. The derailment
derailment of a train
carrying
carrying fuel is of major damage
damage to the enemy.
enemy. So is dynamiting
dynamiting a railroad
railroad bridge.
bridge. In a system
system
where the size and weight
where weight of the rolling
rolling equipment
equipment is enormous,
enormous, it takes
takes months
months for workers
workers to
repair or rebuild
repair rebuild the destruction
destruction and damage.
damage. As for highways,
highways, they they can be obstructed with trees,
obstructed with trees,
stationary
stationary vehicles,
vehicles, ditches,
ditches, dislocation
dislocation of barriers
barriers by dynamite,
dynamite, and bridges
bridges destroyed
destroyed by
explosions.
explosions. Ships can be damaged
damaged at anchor
anchor in seaports
seaports or riverports,
riverports, or in the shipyards. Aircraft
shipyards. Aircraft
can be destroyed
destroyed or damaged
damaged on the ground.
ground. Telephone
Telephone and telegraph
telegraph lines can be systematically
systematically
damaged, their
damaged, their towers
towers blown up, and their lines made
blown up, made useless.
useless. Transport
Transport and communications
communications
must be sabotaged
sabotaged immediately
immediately because revolutionary movement
because the revolutionary movement has already
already begun
begun in
Brazil,
Brazil, and it is essential
essential to impede
impede the enemy's
enemy's movement
movement of troops
troops and munitions.
munitions. Oil lines,
fuel plants,
plants, depots
depots for bombs
bombs and ammunition
ammunition arsenals,
arsenals, military
military camps
camps and bases must become
become
targets for sabotage
targets sabotage operations,
operations, while
while vehicles,
vehicles, army trucks and other military
army trucks military or police
police vehicles
vehicles
must be destroyed
destroyed wherever
wherever they are found.
found. The military
military and police
police repression centers and their
repression centers their
specialized
specialized organs
organs must also claim the attention
attention of the guerrilla
guerrilla saboteur.
saboteur. Foreign firms and
Foreign firms
properties in the country,
properties part, must become
country, for their part, become such frequent
frequent targets
targets of sabotage
sabotage that the
volume
volume of actions
actions directed
directed against
against them
them surpasses
surpasses the total of all other actions
actions against
against enemy
enemy
vital points.
points.
30) TERRORISM
Terrorism
Terrorism is an action,
action, usually
usually involving placement of an explosive
involving the placement explosive or firebomb
firebomb of great
destructive
destructive power,
power, which
which is capable
capable of effecting
effecting irreparable
irreparable loss against
against the enemy.
enemy. Terrorism
Terrorism
requires that the urban
requires urban guerrilla
guerrilla should
should have adequate
adequate theoretical
theoretical and practical
practical knowledge
knowledge of
how to make
make explosives.
explosives. The terrorist
terrorist act, apart from the apparent
apparent ease with
with which
which it can be
carried
carried out, is no different
different from other guerrilla
guerrilla acts and actions
actions whose
whose success
success depends
depends on
planning and determination.
planning determination. It is an action which the urban
action which urban guerrilla
guerrilla must execute with the
execute with
greatest
greatest calmness
calmness and determination. Although terrorism
determination. Although terrorism generally
generally involves
involves an explosion, there
explosion, there
are cases in which
which it may
may be carried
carried out through
through executions
executions or the systematic
systematic burning
burning of
installations, properties, plantations,
installations, properties, plantations, etc. It is essential
essential to point
point out the importance fires and the
importance of fires
construction
construction of incendiary
incendiary devices
devices such as gasoline
gasoline bombs
bombs in the technique
technique of guerrilla terrorism.
guerrilla terrorism.
Another thing
Another thing is the importance
importance of the material
material the urban guerrilla
guerrilla can persuade people to
persuade the people
expropriate
expropriate in the moments
moments of hunger
hunger and scarcity
scarcity brought
brought about by the greed
greed of the big
commercial
commercial interests28.
interests28. Terrorism
Terrorism is a weapon
weapon the revolutionary
revolutionary can never
never relinquish.
relinquish.
desperate,
desperate, is involved
involved in greater
greater contradictions
contradictions and loss of prestige,
prestige, and loses time and energy
energy in
an exhausting
exhausting effort at control which is liable to be broken
control which broken at any
any moment.
moment. The objective
objective of the
war of nerves
nerves is to mislead,
mislead, spreading
spreading lies among
among the authorities
authorities in which
which everyone
everyone can
participate, thus creating
participate, creating an atmosphere
atmosphere of nervousness,
nervousness, discredit,
discredit, insecurity, uncertainty and
insecurity, uncertainty
concern
concern on the part of the government used by urban
methods used
government 29. The best methods urban guerrillas
guerrillas in the war
of nerves
of nerves are the following:
following:
1)
1) Using
Using the telephone
telephone and the mail to announce
announce false clues to the police
police and government,
government,
including
including information
information on the planting
planting ofof bombs
bombs and anyany other act ofof terrorism
terrorism in public
public offices
offices
and other placesikidnapping
places—kidnapping and assassination
assassination plans. etcito
plans. etc.—to force the authorities
authorities to wear
wear
themselves out by following
themselves following up
up on the false information
information fed to them;
them;
2) Letting plans fall into the hands of the police
Letting false plans divert their
police to divert their attention;
attention;
3) Planting
Planting rumors
rumors to make the government
government uneasy;
uneasy;
4) Exploiting
Exploiting by every
every means
means possible
possible the corruption,
corruption, the mistakes
mistakes and the failures
failures of the
government
government and its representatives,
representatives, forcing
forcing them
them into demoralizing
demoralizing explanations
explanations and
justifications in the very
justifications communication media
very communication media they maintain under
they wish to maintain under censorship;
censorship;
5) Presenting
Presenting denunciations
denunciations to foreign
foreign embassies,
embassies, the United Nations, the papal
United Nations, papal enunciator,
enunciator, and
the international
international commissions
commissions defending
defending human
human rights
rights or freedom
freedom of the press,
press, exposing
exposing each
concrete
concrete violation
violation and each use of violence
violence by the military
military dictatorship
dictatorship and making
making it known
known that
revolutionary war will continue
the revolutionary with serious danger
continue with danger for the enemies
enemies of the population.
population.
OBSERVATIONS ON
34) SOME OBSERVATIONS ON TACTICS
When there is no information,
When there point of departure
information, the point planning the action
departure for planning action must be
investigation,
investigation, observation
observation and vigilance.
vigilance. This method produces good results.
method produces results. In any
any event,
event, even
when there
when there is information,
information, it is essential
essential to make observations
observations to see that information
information is not at
with observation
odds with observation or vice versa. Reconnaissance
Reconnaissance or exploration
exploration of the terrain
terrain and the study
and timing
timing of routes
routes are so important
important that to omit them
them is to make a stab in the dark.
Mechanization,
Mechanization, in general,
general, is an underestimated
underestimated factor
factor in the tactics
tactics of conducting
conducting an action.
action.
Frequently,
Frequently, mechanization
mechanization is left to the end, on the eve of the action, before anything
action, before anything is done
about
about it.
it. This is a mistake.
mistake. Mechanization
Mechanization must be seriously
seriously considered.
considered. It must be undertaken
undertaken
with considerable
with considerable foresight
foresight and with careful
careful planning,
planning, based on careful
careful and precise
precise information.
information.
The care,
care, conservation,
conservation, maintenance
maintenance and camouflaging
camouflaging of of stolen vehicles
vehicles are very
very important
important
details of mechanization.
details of mechanization. When transportation
transportation fails, the primary
primary action fails, with serious
material and morale
material morale problems
problems for the urban
urban guerrillas.
guerrillas. The selection of personnel
selection of personnel requires
requires great
care in order to avoid
avoid the inclusion
inclusion ofof indecisive
indecisive or wavering
wavering persons
persons who
who present
present the danger
danger of
contaminating
contaminating others,
others, a danger
danger that must be avoided.
avoided. The withdrawal
withdrawal is equally
equally or more
important than the operation
important operation itself,
itself, to the point
point that it must be rigorously planned, including
rigorously planned, including the
possibility of defeat.
possibility defeat. One must avoid
avoid rescue
rescue or transfer prisoners with children
transfer of prisoners children present,
present, or
anything
anything to
attract
attract the attention
attention of people
people passing
passing through
through the area. The best thing
thing is to make the rescue
rescue
appear
appear as natural
natural as possible,
possible, winding through different
winding through different routes
routes or narrow
narrow streets that scarcely
scarcely
permit passage
permit passage on foot, in order
order to avoid an encounter
encounter between two cars. The elimination
between two elimination of
tracks is obligatory
tracks obligatory and demands
demands the greatest cautionialso in removing
greatest caution—also removing fingerprints
fingerprints and anyany
other sign that could give the enemy
enemy information.
information. Lack of care in the elimination
elimination of evidence
evidence is a
factor
factor that increases
increases nervousness
nervousness in our ranks,ranks, which
which the enemy
enemy often exploits.
exploits.
SEVEN SINS
37) THE SEVEN SINS OF THE URBANURBAN GUERRILLA
Even when
when the urban
urban guerrilla
guerrilla applies
applies proper
proper tactics
tactics and abides
abides by its security
security rules,
rules, he can still
be vulnerable
vulnerable to errors.
errors. There
There is no perfect
perfect urban
urban guerrilla.
guerrilla. The most he can do is make every
every
effort
effort to diminish
diminish the margin
margin of error,
error, since he cannot
cannot be perfect.
perfect. One of the means
means we should
use to diminish
diminish the possibility
possibility of error is to know thoroughly the seven deadly
know thoroughly deadly sins of the urban
urban
guerrilla
guerrilla and try to avoid
avoid them. first sin of the guerrilla
them. The first guerrilla is inexperience.
inexperience. The urban
urban guerrilla
guerrilla
blinded
blinded by this sin, thinks
thinks the enemy
enemy is stupid, underestimates
underestimates the enemy's
enemy's intelligence,
intelligence, thinks
thinks
everything
everything is easy
easy and, as a result,
result, leaves
leaves evidence
evidence that can lead to disaster. Because of his
disaster. Because
inexperience,
inexperience, the urban
urban guerrilla may also overestimate
guerrilla may overestimate the forces of the enemy,
enemy, believing them
believing them
to be stronger than they really
stronger than really are. Allowing himself to be fooled
Allowing himself fooled by this presumption,
presumption, the urban
urban
guerrilla
guerrilla becomes
becomes intimidated
intimidated and remains
remains insecure
insecure and indecisive, paralyzed and lacking
indecisive, paralyzed lacking in
audacity.
audacity. The second sin of the urban urban guerrilla
guerrilla is to boast about the actions
actions he has undertaken
undertaken
broadcast them
and to broadcast winds. The third
them to the four winds. third sin of the urban
urban guerrilla
guerrilla is vanity.
vanity. The
guerrilla who suffers from this sin tries
guerrilla tries to solve the problems
problems of the revolution
revolution by actions
actions in the
city, but without bothering about the beginnings
without bothering beginnings and survival
survival of other guerrillas
guerrillas in other areas.
areas.
Blinded
Blinded by success,
success, he winds
winds up
up organizing
organizing an action that he considers
considers decisive
decisive and that puts
puts
into play the entire resources of the organization.
entire resources organization. Since we cannot
cannot afford to break
break the guerrilla
guerrilla
struggle
struggle in the cities while
while rural guerrilla warfare has not yet erupted,
guerrilla warfare erupted, we always
always run the risk ofof
allowing
allowing the enemy
enemy to attack
attack us with
with decisive
decisive blows.
blows. The fourth
fourth sin of the urban
urban guerrilla
guerrilla is to
exaggerate
exaggerate his strength
strength and to undertake
undertake actions
actions for which
which he, as yet, lacks sufficient
sufficient forces and
required infrastructure.
the required fifth sin of the urban
infrastructure. The fifth urban guerrilla
guerrilla is rash action.
action. The guerrilla
guerrilla who
commits
commits this sin loses patience, nerves, does not wait
patience, suffers an attack of nerves, wait for anything,
anything, and
impetuously
impetuously throws himself into action,
throws himself action, suffering
suffering untold
untold defeats.
defeats. The sixth sin of the urban
guerrilla
guerrilla is to attack
attack the enemy when they
enemy when they are most angry. seventh sin of the urban
angry. The seventh urban guerrilla
guerrilla
is to fail to plan things,
things, and to act spontaneously.
spontaneously.
II. JJihadist
ihadist Training Manual
The following
following are relevant
relevant (non-Koran
(non-Koran based)
based) excerpts
excerpts from a training
training manual
manual from the Islamic
Islamic
Jihadist
J ihadist Group
Group “Al Qaeda”,
Qaeda”, special care should be taken
taken to avoid replication
replication of the tactics
tactics
involving religious zealotry
involving religious zealotry and suicide
suicide bombing.
bombing. These
These tactics
tactics are rarely
rarely effective
effective and lead to a
clouded
clouded mind which
which will result
result in poor
poor battle
battle decisions.
decisions. The leadership
leadership is advised
advised to only use
religion to maintain
religion maintain order
order in the direst of circumstances,
circumstances, where
where perhaps
perhaps men,
men, on the brink
brink of
death,
death, might reconnect with
might reconnect with their religiosity
religiosity regardless. Additionally, it should be considered
regardless. Additionally,
natural allies
that Muslims are our natural allies against the Jewish threat,
threat, care should
should be taken
taken not to
conform
conform to alien ideologies,
ideologies, however
however cooperation
cooperation and diplomacy
diplomacy is proven
proven to be more effective
effective
than fighting
than private religious
fighting private religious wars
wars on the battlefield.
battlefield. The National
National Socialist
Socialist is committed
committed not to
factionism
factionism but to the right
right for all peoples security for their nation
peoples to have security nation and race,
race, even if the
recent Islamic
recent Islamic invasion
invasion of Europe
Europe may
may result
result to mixed
mixed alliances
alliances and perspectives
perspectives among
among the
men. All Muslims
men. Muslims who agree
agree to join the war effort
effort and fight their own freedom
fight for their freedom against
against the
international
international Jew and his terrorist
terrorist allies should
should be treated
treated as allies. Any Muslims
Muslims claiming
claiming to
have a birthright
birthright to European
European soil are traitors their Volk
traitors to their Volk and Nations
Nations and must be immediately
immediately
expelled
expelled from anyany National
National Socialist
Socialist military
military formation.
formation. Care should be taken
taken to identify
identify the use
of Taqiyyah
Taqiyyah – religiously condoned
7 religiously condoned lying, comparable
comparable to Jew pilpul
pilpul 7– and alliances
alliances and
communications
communications clearly
clearly monitored
monitored if said member
member is a newnew recruit
recruit or has not yet
yet been proven
proven in
battle with his allies (or blood
battle with blood brothers,
brothers, in the case of Islamic National Socialist
Islamic National Socialist formations).
formations).
Military Organization
Organization Requirements:
Requirements:
The Military
Military Organization
Organization dictates
dictates a number
number of requirements
requirements to assist
assist it in confrontation
confrontation and
endurance.
endurance. These
These are:
1)
1) Forged
Forged documents
documents and counterfeit
counterfeit currency
currency
2) Apartments
Apartments and hiding places
places
3) Communication
Communication means
means
4) Transportation
Transportation means
means
5) Information
Information
6) Arms
Arms and ammunition
ammunition
7) Transport
Transport
Importance
Importance of the Military Organization:
Organization:
1)
1) Removal
Removal of those personalities that block
those personalities block the call's path.
path. [A different
different handwriting:]
handwritingz] All types
types
of military
military and civilian
civilian intellectuals
intellectuals and thinkers
thinkers for the state.
2) Proper
Proper utilization
utilization of the individuals' unused capabilities.
individuals' unused capabilities.
3) Precision
Precision in performing
performing tasks,
tasks, and using
using collective views on completing
collective views completing a job from all aspects,
aspects,
not just one.
notjust
Controlling the work
4) Controlling work and not fragmenting
fragmenting it or deviating
deviating from it.
it.
5) Achieving
Achieving long-term
long-term goals such as the establishment
establishment of an Islamic
Islamic state and short-term
short-term goals
such as operations
operations against
against enemy
enemy individuals
individuals
and sectors.
sectors.
6) Establishing
Establishing the conditions
conditions for possible
possible confrontation
confrontation with the regressive
regressive regimes their
regimes and their
persistence.
persistence.
7) Achieving
Achieving discipline
discipline in secrecy through tasks.
secrecy and through tasks.
Precautions:
Financial Security Precautions:
1)
1) Dividing
Dividing operational
operational funds parts: One part is to be invested
funds into two parts: projects that offer
invested in projects
financial return,
financial return, and the other is to be saved and not spent except
spent except during
during operations.
operations.
2) Not placing
placing operational
operational funds
funds [all]
[all] in one place.
place.
3) Not telling
telling the Organization
Organization members
members about
about the location
location of the funds.
funds.
4) Having proper protection
Having proper protection while
while carrying
carrying large amounts
amounts ofof money.
money.
5) Leaving
Leaving the money
money with non-members
non-members and spending
spending it as needed.
needed.
This is direct
direct communication
communication between
between the commander
commander and a member
member of the Organization.
Organization. During
During
the meeting
meeting the following
following are accomplished:
accomplished:
1)
1) Information
Information exchange,
exchange,
2) Giving
Giving orders
orders and instructions,
instructions,
3) Financing,
Financing,
4) Member
Member follow-up
follow-up
1)
1) Identifying the meeting location
If the meeting
meeting location
location is stationary,
stationary, the following
following matters
matters should
should be observed:
observed:
i) The location
location should be far fromfiom police
police stations
stations and security
security centers.
centers.
ii) Ease of transportation
transportation to the location.
location.
iii) Selecting
Selecting the location
location prior
prior to the meeting
meeting and learning
learning all its details.
details.
If the meeting
iv) If meeting location
location is an apartment, first one,
apartment, it should not be the first one, but one somewhere
somewhere in
the middle.
middle.
v) The availability
availability of many roads leading
many roads leading to the meeting
meeting location.
location. That would
would provide
provide easy
easy
escape
escape in case the location
location ware
ware raided
raided by security
security personnel.
personnel.
location should not be under
vi) The location under suspicion
suspicion (by the security
security [apparatus])
[apparatus])
vii) The apartment where the meeting
apartment where takes place
meeting takes place should be on the ground
ground floor,
floor, to facilitate
facilitate
escape.
escape.
Viii) The ability
ability to detect
detect any
any surveillance
surveillance from that location.
location.
ix) When public transportation
When public transportation is used,
used, one should alight at some distance
distance from
from the meeting
meeting
location
location and continue
continue on foot. In the case of a private
private vehicle,
vehicle, one should park
park it far away
away or in a
secure place
place so as to be able to maneuver
maneuver it quickly
quickly at any time.
any time.
2) Finding a proper
proper cover for the meeting [The [The cover]
cover]
i) should blend well with
with the nature
nature of the location.
location.
ii) In case they
they raid the place,
place, the security personnel should believe
security personnel believe the cover.
cover.
iii) should
should not arouse
arouse the curiosity
curiosity of those
those present.
present.
iv) should match
match the person's
person's appearance financial and educational
appearance and his financial educational background.
background.
v) should
should have documents that support
documents that support it.
it.
vi) provide
provide reasons
reasons for the two parties'
parties' meeting
meeting (for example,
example, one of the two parties
parties should
should have
proof that he is an architect.
proof architect. The other should have documents
documents as proof
proof that he is a land owner.
owner.
The architect
architect has produced
produced a construction plan for the land)
construction plan
3) Specifying
Specifying the Meeting Date and Time
i)
i) Specifying
Specifying the hour of the meeting
meeting as well as the date.
ii) Specifying time of both parties'
Specifying the time parties' arrival
arrival ana the time
time of the first party's
party's departure.
departure.
iii) Specifying
Specifying how long the meeting
meeting will last.
iv) Specifying
Specifying an alternative
alternative date and time.
time.
v) Not allowing period of time between
allowing a long period between making
making the meeting
meeting arrangements
arrangements and the
meeting
meeting itself.
Transportation
Transportation Means:
The members
members of the Organization
Organization may
may move
move from one location
location to another using
another using
of the following
one of means:
following means:
a) Public
Public transportation,
transportation,
b) Private transportation
Private transportation
The Trainees:
1)
1) Before proceeding to the training
Before proceeding training place,
place, all security
security measures
measures connected with an undercover
connected with undercover
individual
individual should be taken.
taken. Meanwhile,
Meanwhile, during
during training
training at the place, personnel safety should be
place, personnel
ensured.
ensured.
2) Selecting trainees carefully.
Selecting the trainees carefully.
3) The trainees
trainees should not know
know one another.
another.
4) The small size of groups
groups that should be together
together during
during the training
training (7-10 individuals).
individuals).
5) The trainees
trainees should not know
know the training place.
training place.
6) Establishing
Establishing a training
training plan for each trainee.
trainee.
Trainers:
The Trainers:
measures taken
All measures taken with regard
regard to the commanders
commanders apply
apply also to the trainers.
trainers. Also,
Also, the following
following
should be applied:
1)
1) Fewness
Fewness of the trainers
trainers in the training
training place.
place. Only those
those conducting training should be
conducting the training
there, in order not to subject the training
there, team to the risk of security
training team security exposure.
exposure.
2) Not revealing
revealing the identity
identity of the trainer
trainer to trainees.
trainees.
3) Keeping
Keeping a small ratio
ratio of trainees
trainees to trainer.
trainer.
4) The training
training team members
members should not know know one another.
another.
SEVENTH LESSON
6) SEVENTH LESSON -- WEAPONS: MEASURES MEASURES RELATED TO
BUYING AND
BUYING AND TRANSPORTING THEM
Prior to dealing with weapons,
dealing with whether buying,
weapons, whether buying, transporting,
transporting, or storing them, it is essential
storing them, essential to
establish
establish a careful,
careful, systematic firm security
systematic and firm plan that plan deals with
security plan with all stages.
stages. It is
necessary to divide
necessary divide that task
task into stages:
stages:
Prior to Purchase;
First Stage: Prior Purchase;
3) The Transport
TransportStage
a) Avoid
Avoid main roads where check
roads where points are common.
check points common.
b) Choose
Choose a suitable time for transporting
suitable time weapons.
transporting the weapons.
c) Observers
Observers should proceed road ahead
proceed on the road ahead of the transportation
transportation vehicle
vehicle for early warning
warning in
case of an emergency.
emergency.
d) Not proceeding
proceeding directly
directly to the storage place until after verifying
storage place verifying there is no surveillance.
surveillance.
e) During transport stage, weapons
During the transport weapons should be hidden
hidden in a way they are inconspicuous
way that they inconspicuous
difficult to find.
and difficult find.
f)
i) The route
route for transporting
transporting the weapons
weapons should be determined
determined very
very carefully.
carefully.
g) Verifying
Verifying the legality
legality of the vehicle,
vehicle, performing
performing its maintenance,
maintenance, checking
checking its gasoline
gasoline and
water levels,
water levels, etc.
h) Driving
Driving the car normally
normally in order
order to prevent
prevent accidents.
accidents.
Commander:
Measures that Should be Taken by the Commander:
The commander,
commander, whether
whether in overt or covert work,
work, has special
special importance
importance for the following
following
reasons:
reasons:
1)
1) The large amount
amount of information
information that he possesses.
possesses.
2) The difficulty
difficulty of the command
command in replacing
replacing the commander.
commander.
3) Therefore, previously mentioned
Therefore, all previously mentioned security precautions regarding
security precautions regarding members
members should
should be
heightened
heightened for the commander. resources should be reserved
commander. Many resources reserved for protecting
protecting the
commanders.
commanders.
Importance Information:
Importance of Information:
1)
1) Based
Based on the enemy's up-to-date information,
enemy's up-to-date information, his capabilities,
capabilities, and plans,
plans, the Organization's
Organization's
command
command can design
design good-quality
good-quality and secure plans.
plans. [7]
[7] Abdullah Al-Salama: Military
Abdullah Ali Al-Salama: Military
Espionage
Espionage in Islam, pp. 253- 258.
Islam, pp.
2) Information
Information about the enemy's
enemy's intention provides early warning
intention provides warning signs for the command, which
command, which
in turn makes
makes appropriate preparation and thwarts
appropriate preparation thwarts the enemy's
enemy's opportunity.
opportunity.
3) Information
Information benefits
benefits the Organization's
Organization's command
command by providing
providing information
information about the enemy's
enemy's
strengths
strengths and weaknesses.
weaknesses.
4) Information
Information benefits
benefits the Organization's
Organization's command
command by providing
providing information
information about
about movements
movements
of the enemy
enemy and his members.
members.
Information requirements
Information requirements include:
Newness, Trustworthiness,
Newness, Trustworthiness, Forthcoming,
Forthcoming, security,
security, and confirmation.
confirmation. General Mahmoud Sheet
General Mahmoud
Khattab nation that wants
Khattab said, "The nation wants to achieve
achieve victory
victory over its enemy
enemy must know
know that enemy
enemy
very
very well.
well. It also must know
know the site of the battle in detail.
detail. Those
Those who fight
fight an enemy
enemy that they
they
do not know,
know, do not win because
because a successful
successful military plan must
military plan built on clear and
must be built
trustworthy information.
trustworthy information. The commander
commander who fights
fights an enemy
enemy and does not know
know his strength
strength
(number
(number and material)
material) is blind and destined
destined to fail and fall.
Information Sources:
Information
Any organization
Any organization that desires
desires to raise the flag
flag of Islam high and proud,
proud, must gather
gather as much
much
information
information as possible
possible about
about the enemy.
enemy. Information two sources:
Information has two sources:
1)
1) Public Source: Using this publicpublic source openly
openly and without
without resorting
resorting to illegal
illegal means,
means, it is
possible to gather
possible gather at least 80% of information about the enemy. percentage varies
enemy. The percentage varies
depending
depending on the government's policy on freedom
government's policy freedom of the press
press and publication.
publication. It is possible
possible to
gather
gather information
information through newspapers, magazines,
through newspapers, magazines, books,
books, periodicals,
periodicals, official publications, and
official publications,
enemy
enemy broadcasts.
broadcasts. Attention
Attention should
should also be given to the opinion,
opinion, comments,
comments, and jokes of of
common people. Truman,
common people. Truman, a past
past American
American President,
President, said, "We attribute
attribute our great advance
advance to
our press,
press, because
because it gives America's
America's enemies
enemies the capability
capability ofof learning
learning what
what we have not
officially publicized about our plans
officially publicized establishments. " In 1954,
plans and even our establishments." 1954, Allan
Allan Dulles
Dulles [PH],
Director
Director of American
American Intelligence
Intelligence [CIA], said, "I am ready
ready to pay
pay any
any amount
amount of
of money
money to
obtain
obtain information
information about the Soviet Union,
Union, even as little as what the Soviet Union
Union obtains
obtains by
simply reading American
simply reading newspapers." The one gathering
American newspapers." public information
gathering public information should
should be a regular
regular
person (trained
person (trained college
college graduate) who examines
graduate) who examines primary
primary sources
sources of information published by the
information published
enemy
enemy (newspapers,
(newspapers, magazines, radio, TV, etc.). He should search for information
magazines, radio, information directly
directly
related to the topic
related topic in question.
question. The one gathering
gathering information
information with
with this public
public method
method is not
exposed
exposed to anyany danger
danger whatsoever.
whatsoever. Any brother
brother can gather
gather information
information from those
those
aforementioned
aforementioned sources.
sources. We cannot
cannot label that brother
brother a "Moslem
"Moslem Spy" becausebecause he does not make
any
any effort
effort to obtain unpublished and covert
obtain unpublished covert information.
information.
Television:
B. Radio and Television:
The Military
Military organization
organization can use these
these important public sources
important public sources to gather
gather information
information all day
night. The importance
and night. importance of these
these means
means is explained
explained below.
below.
1)
1) Visual
Visual and audible
audible news
news help the Organization
Organization to determine
determine its present
present and future plans.
future plans.
2) Interviews
Interviews may
may help to identify
identify the government
government policy
policy and its general
general directives.
directives.
3) Spotting
Spotting the appearance
appearance of those
those who occupy
occupy high positions.
positions.
4) Learning
Learning the prevailing
prevailing information
information diplomacy
diplomacy and its position
position on contemporary
contemporary issues.
issues.
5) Learning
Learning about the interior
interior of important
important government
government places
places and establishments
establishments during
during their
opening
opening ceremonies
ceremonies or through
through advertisements.
advertisements. In addition
addition to the aforementioned,
aforementioned, [attention
[attention
should be given] newspapers, magazines,
given] to newspapers, magazines, and the public's
public's comments
comments and jokes.
jokes.
1)
1) Performing exercises to detect surveillance while
Performing the exercises while executing
executing the mission.
mission. These
These exercises
exercises
are not well
well defined,
defined, but are dependent
dependent on the time,
time, place,
place, and the ability
ability to be creative.
creative. These
These
exercises
exercises include
include the following:
following:
a)
b)
c)
C)
d)
e) Walking
Walking down a dead-end
dead-end street and observing
observing who is walking
walking behind
behind you.
you. Beware
Beware ofof traps.
traps.
Casually
Casually dropping
dropping something
something out of your pocket and observing
your pocket observing who will pick it up.
up. Walking
Walking fast
then stopping
then stopping suddenly
suddenly at a corner
comer and observing who will be affected.
observing who affected. Stopping
Stopping in front of store
windows and observing
windows who is-watching
observing who you. Getting
is-watching you. Getting on a bus and then getting
getting off after it
departs
departs and observing
observing who will be affected.
affected.
f) Agreeing
Agreeing with one of your brothers to look for whoever
your brothers whoever is watching
watching you.
you.
2) When
When receiving
receiving the gathered information, let the informants
informants travel
travel as far as possible
possible from
their
their place
place ofof residence
residence and yours.
yours. Let each of them
them get
get there using secondary
there using roads, preferably
secondary roads, preferably
at night.
night.
Gather what
3) Gather what information
information youyou can without
without emphasizing
emphasizing any particular part.
any particular part. Do not rush or
show urgency because your
urgency because your excitement
excitement may uncover you
may uncover you and the degree
degree of importance
importance of the
information.
information.
4) Avoid
Avoid anything
anything that reveals your identity
reveals your identity quickly.
quickly. Do not attempt
attempt to be too creative
creative or
inventive.
inventive. Remember
Remember what what Taliran
Taliran [PHI] said to his political
political emissaries,
emissaries, "Do not be anxious.”
anxious.”
5) Move
Move slowly and travel travel a great
great distance.
distance. The one who is successful
successful in gathering
gathering information
information is
the one who is not known known or conspicuous.
conspicuous.
6) Do not accept
accept events
events at their face value.
value. Do not overlook
overlook a quick
quick friendship
friendship or an apparent
apparent
dispute.
dispute. Evaluate
Evaluate the importance events and do not judge them by their
importance of events their appearance.
appearance.
7) Do not speak vaguely
vaguely or act mysteriously
mysteriously except when wanting
except when wanting to get a "blabber
"blabber mouth"
mouth" to
talk about whatwhat he knows.
knows.
8) Carry
Carry personal
personal credentials know all their contents.
credentials and know contents.
9) Prior to collecting
collecting the information,
information, make
make sure that all necessities
necessities related
related to the mission,
mission,
especially
especially money,
money, are ready.
ready.
10)
10) Study the area where where information-gathering
information-gathering takestakes place
place carefully:
carefully: Open and closed
closed streets,
streets,
residents' customs,
residents' ways of dressing,
customs, ways dressing, and accent.
accent.
11)
I 1) It is not permitted
permitted to carry
carry any
any weapons
weapons during
during the information
information gathering
gathering process.
process.
12)
12) Finding
Finding a cover prior to gathering
cover prior gathering the information.
information. Further, review all security
Further, review measures
security measures
concerning
concerning members
members of the Military
Military [Organization]
[Organization] which
which are covered
covered in prior
prior lessons.
lessons.
The Military
Military Organization
Organization may
may obtain
obtain secret information
information using:
using:
A. Surveillance,
Surveillance, intelligence,
intelligence, and observation;
observation;
B. Theft:
Theft:
C. Interrogation;
Interrogation;
D. Excitement;
Excitement;
E. Drugging;
Drugging;
F.
F. Recruitment.
Recruitment.
A. Surveillance,
Surveillance, Intelligence,
Intelligence, and Observation:
Observation: Civilian
Civilian and military targets (personalities).
military targets (personalities). The
monitoring
monitoring may
may be done on foot or by car.
Surveillance on foot:
1)
1) The brother
brother or brothers performing the surveillance
brothers performing surveillance operation
operation on foot study the available
available
information
information about the targettarget (height, weight, way
(height, weight, way of walking,
walking, looking
looking at a recent
recent photograph)
photograph)
2) Knowing
Knowing the target's
target's habits, places he visits,
habits, places visits, and communications
communications
3) Studying
Studying carefully
carefully the area where
where observation
observation will take place:
place: names
names of through
through and dead-end
dead-end
streets,
streets, residents'
residents' habits
habits and way
way of dressing.
dressing.
4) Prior to the start of the surveillance
surveillance mission,
mission, making
making sure that all needs
needs related
related to the mission,
mission,
especially
especially money,
money, are met.
5) Agreeing on how communications
5) Agreeing communications withwith the leaders
leaders will take
take place
place in case the surveillance
surveillance
plan is uncovered
plan uncovered (telephone,
(telephone, a person used for that purpose).
person used purpose). The telephone
telephone number
number should
should not
be written
written but memorized.
memorized.
6) Agreeing
Agreeing on special signals
signals to exchange
exchange orders
orders and instructions
instructions among
among the surveillance
surveillance team
members.
members.
7) Knowing
Knowing the measures taken when
measures to be taken when the target
target is lost, such as contacting
contacting the leaders
leaders or
something
something else agreed upon.
agreed upon.
8) It is not permitted
permitted to carry
carry any weapons during
any weapons during the information
information gathering process.
gathering process.
9) It is preferable
preferable to have a camera
camera with the surveillance
surveillance man in case the target is to personally
personally
contact
contact others.
others.
Surveillance by car:car:
Surveillance
Surveillance by car requires
requires taking
taking certain
certain measures:
measures:
1)
1) Inspecting
Inspecting the car's fuel,
fiiel, water,
water, and lights.
lights.
2) The car should be of a common
common typetype so it would
would not attract
attract people's
people's attention.
attention.
3) The car should be in good condition
condition and the driver should be experienced.
experienced.
4) The car plates
plates should not contain numbers. It is important
contain real numbers. important to use a false license plate and
license plate
small numbers
numbers in order to prevent
prevent anyone
anyone from spotting
spotting and memorizing
memorizing it.
it.
5) The car's interior
interior light should be disabled
disabled in order to hide the identity
identity of the surveillance team
surveillance team
members sitting inside.
members inside.
6) The number
number and appearance
appearance of the car surveillance team members
surveillance team members should match those of the
match those
target's car.
target's
Surveillance, Intelligence,
Intelligence, and Observation (Information about the enemy enemy places)
The Organization’s
Organization’s command needs detailed
command needs detailed information
information about
about the enemy‘s
enemy‘s vital establishments,
establishments,
whether civilian
whether civilian or military,
military, in order to make safe plans,
plans, reach
reach firm
firm decisions,
decisions, and avoid
surprises.
surprises. Thus,
Thus, the individual who gathers
individual who gathers information
information about a desired
desired location
location should,
should, in
addition
addition to drawing
drawing a diagram,
diagram, describe
describe it and all its details.
details.
It is preferable
preferable to photograph
photograph the area as a whole
whole first, then the street of the [desired]
first, then [desired] location.
location. If
possible, panoramic
possible, panoramic pictures
pictures should be taken.
taken. That is, the collection
collection of views
views should be
continuous
continuous in a such way
way that all pictures
pictures are taken
taken
location and that the ending
from one location ending of one picture
picture is the beginning
beginning of the next. The
photographer should be experienced
photographer experienced with and proficient film processing
proficient in film processing and developing.
developing. It is
risky to use an outside
risky outside film processing service.
film processing service. When
observing
observing a military
military installation
installation or camp,
camp, we discourage taking pictures
discourage taking pictures where
where it is forbidden.
forbidden.
The brother/photographer
brother/photographer should use a modern
modern camera
camera that can photograph
photograph at night
night or from a
distance,
distance, and only the lens of the camera
camera should
should be visible.
visible. When
When gathering
gathering information
information about
about a
military camp, the brother
military camp, brother should draw a diagram
diagram of the camp’s
camp’s overall
overall area,
area, the camp
camp itself, and
its interior, if possible
interior, if possible
The description of the base or camp camp must contain the following:
following:
1)
1) Location
Location
2) Exterior
Exterior shape
3) Transportation
Transportation to it
4) Space [area]
5) Weapons used
Weapons used
6) Unit using
using the camp
camp
Fortificationsand tunnels
7) Fortifications tunnels
8) Guard posts
Guard posts
9) Amount
Amount and periods
periods of lighting
lighting
10) Number of soldiers
10) Number soldiers and officers.
officers. Officers’
Officers’ ranks
ranks
11) Ammunition depot locations
1 1) Ammunition locations
12)
12) Vehicles
Vehicles and automobiles
automobiles
13)
13) Leave policy
Leave policy
14)
14) Commander name, rank,
Commander name, rank, arrival
arrival and departure
departure times
times
15)
15) Degree
Degree and speed of mobilization
mobilization
16)
16) Brigades
Brigades and names of companies
names of companies
17)
17) Sleeping waking times
Sleeping and waking times
18)
18) Telephone
Telephone lines and means
means of communication
communication
The brother
brother gathering
gathering the information
information maymay start a friendship
fiiendship with one of the soldiers
soldiers or officers
officers
of that base. Information
Information may
may be collected
collected gradually
gradually and easily from soldiers
soldiers when
when giving them
giving them
rides from the camp
rides camp to the bus or train stations,
stations, etc.
Summary
Summary of Books
Books and Guides
Guides of the Enemy:
Enemy:
Rules
Rules for Radicals
Radicals –7 Saul Alinsky
Alinsky
Das Kapital
Kapital –7 Karl Marx
The Little Red Book 7 – Mao Zedong
Zedong
„Open
”Open Society“
Society“ Strategy
Strategy Documents
Documents
United Nations Agenda
United Nations Agenda 21, 2030 etc.
The Protocols
Protocols of the Elders
Elders of Zion
Zion (unclear
(unclear origin
origin but
nevertheless studied
nevertheless studied by the Enemy)
Enemy)
1)
1) https://archive.org/details/military-manuals
https.'//archive.org/details/military-manuals
Military Manuals -- booby
booby traps,
traps, improvised
improvised munitions,
munitions, unconventional warfare devices
unconventional warfare devices and
techniques, marksmanship
techniques, marksmanship and ballistics
ballistics
2) https://8ch.net/pdfs/res/6071.html#9096
https://8ch.net/pdfs/res/607 1.html#9096
Terrorist's Handbook –7 A definitive
The Terrorist's definitive guide
guide to manufacturing
manufacturing most weapons
weapons and materials
materials
needed for active
needed resistance measures.
active resistance measures. Do not let the name
name confuse
confuse you,
you, as an SS member
member your
your
aims are noble
noble and your
your motives
motives pure.
pure. Terror
Terror is not to be strived towards,
towards, rather
rather victory
victory is. Do
allow your
not allow your enemy
enemy to label you terrorist thereby granting them power.
you as a terrorist If seeking
power. If seeking a
name for this handbook
name handbook in discussion
discussion it is recommended
recommended to frame
frame it as „Resistance
,,Resistance Fighter”
Fighter” or
„Freedom
”Freedom Fighter”
Fighter” Handbook.
Handbook.
31
31 Warning: these resources
Warning: these resources should be downloaded
downloaded and stored on a safe medium
medium preferably
preferably in a
radiation proofed
radiation proofed room
room (i.e. Faraday
Faraday cage, concrete walled
cage, concrete walled basement
basement or bunker).
bunker). The enemy
enemy has
been attacking
attacking archival
archival services
services and therefore
therefore the saving of online
online resources
resources is to be prioritized.
prioritized.
3)
https://web.archive.org/web/20080302034604/http://www.bellum.nu:80/literature/tacayan.html
https://web.archive.org/web/20080302034604/http://www.bellum.nu:80/literature/tacayanhtml
CIA psyops
psyops in guerilla warfare.
guerilla warfare.
4)
https://web.archive.org/web/20080228200118/http://www.bellum.nu:80/literature.html
https://web.archive.org/web/200802282001 18/http://www.bellum.nu:80/literature.html
Classic
Classic tomes warfare theory, modern
tomes on conventional warfare modern ones on guerilla warfare tactics
guerilla warfare tactics
5) https://8ch.net/k/res/480825.html#557006
https://8ch.net/k/res/480825.html#557006
Scientific Principles of Improvised Warfare
Scientific Warfare and Home
Home Defense,
Defense,
Volumes
Volumes 1-6 1-6
6) https://8ch.net/k/res/480825.html#555519
https://8ch.net/k/res/480825.html#555519
To Break a Tyrant's
Tyrant's Chains
7) https://8ch.net/k/res/480825.html#480994
https://8ch.net/k/res/480825.html#480994
Rhodesian Drake
Drake Shooting
Shooting
8) https://www.survivalschool.us/survival-info/militarymanuals-pdf/
https://www.survivalschool.us/survival-info/militarymanuals-pdf/
Almost every
Almost US. ZOG Field Manual and Training Manual
every U.S.
9) https://archive.fo/qPAPo
https://archive.fo/qPAPo
A summary discussion of many
summary and discussion many of the above resources.
resources. This list can be extended
extended or
shortened result of personal
shortened as a result personal research
research into the topics
topics mentioned.
mentioned. On the following page a
following page
definitive introduction
definitive introduction into classical National Socialist
classical National Socialist ideology
ideology is presented.
presented. It is essential
essential that
every
every single person understand and form their
person understand their own beliefs
beliefs and being,
being, in order to be able to
combine
combine and rationally,
rationally, yet critically,
critically, analyze
analyze as many
many different perspectives as possible.
different perspectives possible. This,
purpose behind
after all, is the purpose behind Idealism:
Idealism: the development
development of of the human
human thought process and
thought process
striving
striving for perfect truth und its natural
perfect truth natural consequences
consequences and idealized
idealized systems.
systems.
THE LITERATE
NATSOB
ADOLF HITLER
IIIII
HITlERS'.” 27'
1“
ZWEITESXS‘
4
TWOEWEHH BUCH
”NW" '
"
AIHu-n Rust-Man»;
Germany
Illl'
Reborn \‘l/I 50/1
h I.“ .u um“,