LN324-91

                             CHAPTER XXVII


         PLANNING AND CONDUCTING A MOBILE (ON FOOT) VIGILANCE
               FIXED VIGILANCE AND PATROL CAR VIGILANCE

INTRODUCTION:

     As a counter intelligence (CI) Special Agent (SA) you must know how to
plan and conduct a vigilance. It is probable that during your career as a SA
you will be assigned to missions to conduct a vigilance. It is your duty to
establish the personnel, time and equipment that will be needed to carry out
this mission.

GENERAL FACTS:

     1.    Determine the vigilance objectives:

           a.   The vigilance is an investigative tool that consists of
keeping a person, place or target under physical or technical observation to
obtain evidence or information pertaining to an investigation or CI
operations.

           b.   When more simple methods and financial expenditures have not
been successful, the vigilance is used to fulfill the specific objectives of
the investigation. The objectives of vigilance include:

     (1)   Establish the identity of the person involved in activities of
interest to CI.
     (2)   Detecting ilegal activities that fall under the jurisdiction of CI
section.
     (3)   Obtain information to use in an interrogation.
     (4)   Develop leads for future investigations.
     (5)   Confirm or refute information.
     (6)   Obtain admissible evidence in a legal manner.












                                  241

LN324-91 [page missing] d. Detailed description of the name and addresses of associates, contacts and relatives of the SUBJECT. e. Professional training of the SUBJECT in the countervigilance techniques (Figure 1). FIGURE 1 COUNTERSURVEILLANCE SUBJECT ACTIONS COUNTER MOVES ______________________________________________________________________ Using convoy techniques Using reserve personnel so they be aware of the convoy techniques Changing direction many times Constant change of watch persons in a short time Re-tracing a course Constant change of watch persons Using the reflection on windows Allow quite a distance and take up innocent actions, such as passing the SUBJECT and entering a store Using baits (throwing paper or Use reserve personnel to extract the similar objects) and observe if articles an hour later any person picks it up Changing the pace as you walk Maintain harmony with the area and act in a natural way Using public transportation Maintain at least one watch person and immediately getting off without climbing on public transportation Getting off public transportationMaintain the vehicle or get off and in a deserted area walk in the opposite direction of the SUBJECT Climbing up various public Using support vehicles transportation in succession 242
LN324-91 4. Conduct a study of the area to obtain and analyze detailed information of the place where the vigilance took place. Consider the area where the SUBJECT lives, works or spends time. a. Obtain a map and take notes of: 1) Road constructions 2) Police control points 3) One-way streets 4) No outlet streets 5) Other articles of potential interest (Shopping centers, markets, etc.) b. Identify the nature, place, structure and type of building that is most frequently found. Put emphasis in: 1) The residence of the SUBJECT. 2) The working place of the SUBJECT. c. Study the population of the area to identify particular or potential problems. 1) Race 2) Custom and cultural habits 3) Religion 4) Language 5) Reaction of the people to strangers d. Identify the traffic pattern 1) Change of workers 2) Movement of vehicles a) One-way streets b) Changing directional lines c) Congested areas d) Zone considerations (commercial, residential or industrial) e. Identify the public transportation systems including: (1) Type (bus, taxi, railroad) (2) Tolls (cash or special coupons) (3) Timetable (4) Loading and unloading places 243
LN324-91 f. Review the local laws (1) Identify the local laws and their impact in the personnel and method regarding vigilance. (2) Identify the application methods. (3) Identify the local police agencies, including their appearance. g. Obtain the weather reports during your vigilance. h. If possible, conduct a search of the area. 5. Prepare a vigilance plan that includes all the operational considerations and instructions to make sure that the objective of the watch is achieved. The plan must be detailed to avoid wrong interpretations, but it must not be so restricted that it eliminates flexibility and the initiative of the individual watch person. NOTE: The vigilance plan could be formal or informal, oral or written, depending upon the circumstances and time availability. a. Identify the personnel requirements. (1) Identify the number and type of persons that would be required. (2) Select qualified personnel to participate in the vigilance. Main qualifications include: (a) Previous experience in conducting a vigilance. NOTE: It is essential that a maximum number of personnel have previous experience in conducting a vigilance, because operational and technical methods cannot be learned completely from a book. A person without qualification could harm the vigilance. (b) Physical appearance that does not attract curiosity. (c) Ability to stay without being recognized and ability to mix WITH his surroundings or environment. 244
LN324-91 NOTE: Select persons from the area to be used in the area where other persons will attract attention. These other persons must be used to control and supervise the vigilance of a place from a safe distance. (d) Expedients (ability to adapt quickly to any situation) (e) Physical vital strength and patience (f) Detailed perception (g) Retentive memory b. Determine the requirements of the logistics and administrative supports. (1) Relief vigilance personnel from other duties (2) Obtain special documents, if required (3) Provide financing to cover the project and for contingent financial expenses (4) Arrange to obtain the vehicles (5) Obtain and examine the support equipment (6) Arrange for food and other commodities, if appropriate, for the vigilance personnel (7) Prepare one or more cover stories to explain each presence and activities of the watch persons in a particular place (8) Plan the relief for the watch crew (9) Give them arms, if necessary c. Determine the control and communication procedures (1) Establish the control procedures (a) Establish a central control point to direct the vigilance operations (b) Clearly tell the watch personnel what is the chain of command from the watch man to the control point. (2) Establish the procedures for communication. (a) Establish radio communications, when possible, as the foremost method of communication between the operative elements and the control 245
LN324-91 point. 246
LN324-91 NOTE: The use of the safe communication systems could be necessary in some circumstances. EQUIPMENT AND PROVISIONS Radios Cameras and accessories Binoculars Tape recorders Books and pencil Maps Small transmitter in SUBJECT'S car Receiver for the transmitter Change of clothes (b) Establish visual signals when the radios do not work or there are no radios available. 1 Limit the number of signals and keep them simple. 2 Visual signals must be natural gestures that do not attract attention to the watch person (Example: taking a paper from your pocket, lighting a cigarette, etc.) (c) Establish the procedures for emergency communication. d. Determine the specific mission that will be assigned to each group or individual watch person. NOTE: The planning and preparation must consider all the possible contingencies that could develop during the vigilance. 6. To direct the members of the team about vigilance. NOTE: The watch team must know as much as possible about the case so that in such way they could interpret the SUBJECT'S actions. a. Inform the participants of the vigilance objectives. b. Inform the participants of the type, methods and techniques that will be used in the vigilance (Figures 3 and 4). 247
LN324-91 c. Inform the participants of the role they will play in the vigilance. d. Provide the participants WITH the target information and the area. Use photographs, maps, sketches to familiarize the participants completely WITH the target aspects and WITH the area that will be watched. e. Provide additional training and preliminary training in the vigilance and counter vigilance methods. VIGILANCE METHODS a. A fixed vigilance is when a watch person(s) is kept in a place or fixed position to observe the activities of an specific place. b. A vigilance in action is when the watch person(s) follow the SUBJECT from one place to another to keep the continuous observation of his activities. The vigilance in action could be: (1) A mobile vigilance (feet) (2) A car patrol vigilance c. A technical vigilance is when technical visual equipment, electronic bugging equipment, and photographs are used. d. A mixed vigilance is when there is a combination of methods mentioned above. This method is more expensive in money terms and personnel, but will give us the best result. 248
LN324-91 FIGURE 4 VIGILANCE TECHNIQUES DISTANCE: The distance between the watch person and the SUBJECT will depend upon the circumstances and the watch person's judgement and must vary during the course of the vigilance. Normally, the more people there are in the street the closer the watch person will be from the SUBJECT. TURNING ON CORNERS: Do not make immediate turns after a SUBJECT in corners. A suspicious SUBJECT could "examine and observe" a watch person by just standing in the corner and observing attentively these persons that turn around the same corner. Making a wider turn will help keep our pose and will allow us to review the area. CONVOY: Valuable SUBJECT(s) to a vigilance could use convoys while conducting important activities. The convoys will keep a position in the back of the SUBJECT, keeping him on view, and is alerted about watch persons. Be attentive and alert about the utilization of convoys and take appropriate action to prevent the commitment of the vigilance. DECOYS: The SUBJECT uses a substitute of similar physical appearance so as to act as a decoy and to confuse the watch person. This is an efficient method when it is used in the residence or work place of the SUBJECT. CLIMBING BUSES AND TAXIS: If the SUBJECT climbs a bus or taxi, the watch person "A" must try to climb the bus or taxi, but always keeping a distance behind the SUBJECT if possible. RESTAURANT:Obtain a chair out of the direct SUBJECT'S view range, but so as you can see the SUBJECT, if possible, in a place where you could listen to the SUBJECT. Order according to the type of service ordered by the SUBJECT to be sure that you can pay the bill and leave the restaurant without looking track of the SUBJECT. RADIOS: The use of communication equipment must be without attracting attention to the public's curiosity. Do not bend to approach the microphone. RECOGNIZING THE SUBJECT: The SUBJECT must be physically shown to the watch person, if possible. Study and be prepared to recognize the appearance and the SUBJECT'S mannerisms. Do not depend in the SUBJECT'S dress manner. 249
LN324-91 VIGILANCE TECHNIQUES COMING INTO A BUILDING:The size, nature and surroundings are significant considerations to determine future actions. Small buildings, if any, could be kept under vigilance, it is not necessary to follow the SUBJECT to this building unless the SUBJECT made a contact WITH other persons there in the past. In large buildings, follow the SUBJECT and use the inside of the building to your advantage. Keep in mind that lazy persons attract attention. ELEVATORS: Follow the SUBJECT to the elevator only if there are other persons and if the SUBJECT does not suspect he is been observed. Stop in the floor above or below the SUBJECT and use the stairs to get to the same floor as the SUBJECT'S. In department stores or similar buildings, the watch person could leave the elevator on the same floor as the SUBJECT. If the SUBJECT enters an elevator alone, stay in the lobby and determine the direction the SUBJECT went to by observing the floor indicator of the elevator. Use the stairs and another elevator to reach the same floor as the SUBJECT'S. Figure 4 (cont.) 7. Conduct the vigilance using one of the methods mentioned below: a. The method of a watchman NOTE: Avoid this method in a moving vigilance, if possible, because it does not allow flexibility. (1) Operate in behind the SUBJECT and in the same street. (2) Operate in the street adjacent to the SUBJECT when it is operationally necessary to avoid the commitment of the vigilance. The circumstance will dictate if we must operate in front, behind or next to the SUBJECT. (EXAMPLE: Operate next to the SUBJECT when he turns around the corner to observe if he makes contact or enters into a building). (3) Keep close to the SUBJECT to observe his actions. 250
LN324-91 (4) If the SUBJECT turns around in a corner and the area is not too crowded continue crossing the street in the intersection. Observe the street in the direction of the SUBJECT, write down the position and action of the person and act according to the situation. (5) If the SUBJECT turns around in a corner that is crowded, stop in the corner, in a casual manner and observe the SUBJECT'S actions. Unless the SUBJECT is stopped in a corner, continue the vigilance in the same street. b. The two watchmen method ("AB" method) (1) A watchman is kept in position "A" directly behind the SUBJECT. (2) A second watchman is kept in position "B" behind "A" or in the street next to the SUBJECT and next to him. (3) The distance is kept according to the situation. (4) If both watchmen are in the same street and the SUBJECT turns around in the corner, watchman "A" continues to walk in the original direction and crosses the street at the intersection. From the adjacent street, watchman "A" points out the appropriate procedures of following the SUBJECT to watchman "B". (5) If watchman "B" is operating in the adjacent street and the SUBJECT turns around in the same corner that he is at, watchman "B" must cross the street behind the SUBJECT and take watchman "A"s position. It is not necessary to use signals because this arrangement must be established beforehand. (6) If watchman "B" is operating in the adjacent street and the SUBJECT crosses the street in the direction of watchman "B", watchman "B" must limit his step to avoid contact WITH the SUBJECT. Watchman "B" must enter in a store or continue walking straight ahead, keeping visual contact WITH watchman "A" to look for a signal indicating his next move. 251
LN324-91 c. The three men method (The "ABC" method). (1) A member of a group is placed in position "A" at a short distance from the SUBJECT. Watchman "A" observes WITH detail and writes down the SUBJECT'S actions. (2) The second watchman is placed in position "B" behind watchman "A". Watchman "B" keeps the constant observation of actions of both watchman "A" and the SUBJECT and prepares to assume the position of watchman "A" when it is required. Watchman "B" also observes to see if there are any convoys and takes appropriate action against these convoys. (3) The third watchman is placed in position "C" in the street adjacent and next tQ the SUBJECT. Watchman "C" directs the actions of watchman "A" and "B" WITH signals arranged beforehand and prepares to assume the watchman "A"s position if the SUBJECT crosses the street and leaves watchmen "A" and "B" alone. NOTE: If the group of watchmen have more persons, they will follow behind watchmen "B" and "C". (4) If the subject turns around the corner directly on the side he is walking (out of watchman "C"), watchman "A" crosses the street in the intersection and assumes the position of watchman "C" and watchman "B" places himself in position "A" and watchman "C" crosses the street and places himself in position "B". (5) If the SUBJECT turns around the corner and crosses the street in the direction of watchman "C", it is not necessary to change positions. (6) If the SUBJECT simply crosses the street in which he is walking, without turning around any place, then watchman "C" is placed in position "A", and watchman "A" assumes the position of watchman "C" and watchman "B" crosses the street and places himself in position "B". NOTE: All position changes must be directed depending upon the circumstances and the watchmen judgement and they will be done in a way so as not to attract the attention of the population or the SUBJECT'S attention. 252
LN324-91 d. The progressive vigilance is used when the SUBJECT has counter- vigilance experience and it is expected that he will use any technique to avoid the vigilance. (1) Locate the SUBJECT'S place to start (residence, office, etc). (2) After locating this point, start to pick up the SUBJECT from any place outside out of his sight. (3) Continue and observe the SUBJECT only at short distances on the first day. (4) In the following days, pick the SUBJECT at the time and place where you left him the last time, and again follow him at a short distance to a new point. NOTE: This method will be painful and slow if the SUBJECT changes his daily routine occasionally, but will eventually take the watch persons to the places and contacts that the SUBJECT wants to keep secret. 8. Write down all the observations regarding the SUBJECT and his activities. Write down in a manner that does not attract attention. The small tape recorders are a valuable tool during vigilance. Writing notes in maps or newspapers also works. 9. Carry out the fixed vigilance. a. Establish an stationary position to avoid the SUBJECT'S detection or the curiosity of other persons. Conduct the vigilance in one of these positions: (1) A fixed place could be used during a short term or during a stop in a mobile vigilance. (2) WITH a parked vehicle in the vicinity of the target. a) Do not park in the same place for a long time. b) Warn the police agency if the vigilance involves parking a vehicle for a long time. 253
LN324-91 c) Do not keep the vehicle's motor running while parked. It is very dangerous (carbon monoxide could enter inside the car) and will attract attention. d) Unplug the light inside the vehicle. e) After parking the vehicle, you must open the door and close it, many persons unconsciously listen to determine if they open and closed the vehicle's doors right after parking. (3) In a room or an apartment located next to the SUBJECT. (a) This place must be one or two floors above the SUBJECT'S place. (b) This place must be accessible to entrances that are not visible by the SUBJECT. (c) This place must be occupied all day to avoid the entrance of non- authorized persons. (d) The observer must seat in a dark room away from direct view of the window to get the best advantage that the shade in the room offers. (e) Limit the number of watch persons to two or three in a position, because a larger number could attract attention. (f) Frequently relieve the personnel to avoid fatigue. 10. Carrying out the vehicle's vigilance method: a. The vehicle's method. NOTE: Avoid this method in the mobile vigilance, if possible, because it does not allow flexibility. (1) Prepare the vehicle. (2) Operate in the back side of the SUBJECT'S vehicle. 254
LN324-91 (3) Maintain close to the SUBJECT to observe his actions. (4) If the SUBJECT'S vehicle turns around in a corner follow him or continue crossing the intersection and make a "U" turn and continue following him. Observe the street and the direction of the SUBJECT, write down the position and persons's action, and act according to the situation. b. The two vehicle method ("AB" method) (1) Prepare the vehicle. (2) The first vehicle is kept in position "A" directly behind the SUBJECT, while this vehicle must be kept at least two or three vehicles behind the SUBJECT'S vehicle. (3) The second vehicle is kept in position "B" directly behind "A" or in the street parallel the SUBJECT'S vehicle and at his side, while receiving directions, by radio from vehicle "A". (4) The distance is kept according to the situation. NOTE: It is possible to keep the vigilance through the back mirror of the watch person's vehicle when traveling in front of the SUBJECT'S vehicle. (5) Change positions of watch person's vehicles frequently to avoid that the SUBJECT recognizes these vehicles. c. The three vehicle method ("ABC" method) (1) Prepare the vehicle (2) In a vigilance through vehicles using the "ABC" method, the watch person's vehicles are lined in the same manner that in "ABC" techniques for mobile vigilance (on foot). Vehicle "C" operates in a known parallel route. (3) If the circumstances dictate it both vehicles "B" and "C" could operate in the SUBJECT'S parallel route. Change vehicles "B" and "C" frequently WITH vehicle "A". 255
LN324-91 (4) A watchman's vehicle could be placed in a position in front of the SUBJECT'S vehicle to avoid that the SUBJECT could recognize the watchmen's vehicles. 11. End the vigilance when: a. The vigilance objectives have been attained. b. The SUBJECT of a discreet vigilance knows that he is under vigilance and takes actions that indicate that he recognizes that he has been watched. 12. Prepare the vigilance reports using the Agent's Report. The report must have the following information: a. Introduction paragraph (1) Date and time when the vigilance started and ended. (2) Identify the person under vigilance, if he is not the SUBJECT of the investigation. (3) Complete identification of other agencies or person(s) that provided assistance during the vigilance. (4) Type of vigilance (5) Specific place or general area involved. b. Detailed description of the SUBJECT, including his mannerisms, and defined habits. c. Chronological details of events or activities in a narrative form or tabulation, identifying each contact and building by number (For example, Contact 1); a summary of all the conversations that were heard about the SUBJECT. Including an exact transcript, if possible. d. Description of each contact. e. Description of each building implied. 256
LN324-91 f. If there is a formal report, include the date, time and reasons for which the vigilance was discontinued. g. The SA in charge of the vigilance team signs the report. 257
LN324-91 CHAPTER XXVIII TERRORISM INTRODUCTION: In this chapter you may describe terrorism, the phases of the conflict under low intensity, who were the terrorists, the characteristics of the terrorist operations, the terrorist organization, the arms used by the terrorists, the security methods of the terrorist's groups. GENERAL FACTS: QUESTIONS TO BE COVERED IN THIS CHAPTER: 1. What are the phases of the low intensity conflict? 2. How is terrorism defined? 3. Who are the terrorists? 4. What are the characteristics of the terrorist's or rebel's operations? 5. How is the organization of a terrorist's movement? 6. What are the methods to provide security to a terrorist organization? 7. What arms are used by the terrorists? 8. What are some of the targets that are most attacked by terrorists? 9. What are some of the most common terrorist activities ? 10. What is the terrorist's goal? 258
LN324-91 BASIC DATA ABOUT TERRORISM AND REBELLION THE REBELLION OR CONFLICT PHASES OF LOW INTENSITY: 1. PHASE I: (Latent or Incipient Insurrection) This phase rotates between the circumstances of the subversive activities is only a potential, latent or incipient threat, and situations in which the subversive incidents and activities occur frequently and in an organized way. This does not include a violent burst of activity or chaotic activity. a. EXAMPLES OF ACTIVITIES THAT COULD BE CARRIED OUT IN PHASE I: 1) The rebels starting from a relatively weak position, plan and organize their campaign and select urban or rural areas of objectivity. 2) The open or clandestine organizations are established. If the insurrection party is ilegal, the organizations will be clandestine. 3) Psychological operations are carried out WITH the purpose of exploiting complaints and people's wishes. 4) Then the organization starts WITH a ghost government. 5) Once the party is established, they concentrate in gaining the influence of the population and infiltrating in the government, economic and social organizations, and in presenting a threat to the administrative ability of the government. 6) During the last stage of Phase I the importance of recruiting, organizing and training the armed elements is emphasized. 7) The police forces are attacked, other activities terrorist (groups) and some other military operations of less importance to try to influence additionally over the population, or to provide arms for the movement and confronting the government's ability to keep peace and order. 2. PHASE II: (Guerrilla warfare) This phase is reached once the subversive movement has gained sufficient local and external support and starts to conduct an organized guerrilla warfare, or forms of violence against the established authority. 259
LN324-91 a. EXAMPLES OF ACTIVITIES THAT COULD BE CARRIED OUT DURING PHASE II: 1) Phase I is continued and expanded. The rebel's political and military control is intensified over the territory and the population. 2) Guerrilla warfare is used in a great scale and in some areas a limited defense is mounted. 3) According to what the situation allows a rebel's government is organized in areas they dominate, and in areas that have yet to be under their control. 4) The most important military goal is the control of the greatest area. The rebels try to understand the government troops in static defense and interdiction operations and they try to destroy the communications lines and take or destroy the government's supplies and resources. 3. PHASE III: (Movement war) The situation advances from Phase II to Phase III when the insurrection has mainly changed to a movement war between the organized rebel's forces and the government forces. a. EXAMPLES OF ACTIVITIES THAT COULD BE CARRIED OUT DURING PHASE III: 1) The activities that were initiated in Phases I and II, are continued and increased. 2) The largest units in size are used to combat the government forces and gain key geographic and political objectives that will help overthrow the government forces. 3) If the rebels try to win the military sector over and the government is overthrown, immediately they will initiate their consolidation activities. This includes removing the potential enemies, establishing additional control mechanisms and the re-structuring of society. 260

Page 261 Missing


LN324-91 (4) Additional information and summary of the terrorist's personality: In general, a terrorist is a determined person who thinks that he or she is participating in a dynamic political process but that cannot distinguish the difference between the actions and moral principles; to them the objectives justify the tactics. The true terrorist is not a crazy fanatic as is commonly thought. They are hard-working persons that are prepared to give their lives for the cause. Most terrorists desire to live to see that their goals are fulfilled or carried out; to attain that objective they use persons WITH mental problems (crazy people) or common criminals to carry out risky missions such as murders. b. AGE: In general the age of a terrorist is between twenty and thirty years of age. For the local groups is even adolescents. The leaders of any type of organization is commonly older (58, 40, 35). c. SEX: For the most part in the terrorists' history, they have been predominantly males. During a period of a decade (1966 to 1976), 80% of the operations were addressed and executed by men. The role of a woman in those times was to recount (collect) intelligence, such as messengers, nurses, and the operation of safe houses. From that era on there was a dramatic change in the feminine participation in the terrorist acts. At present, the greatest part of the terrorists are still men, but WITH a great women participation. The participation of women in terrorist movements is due in part, to social changes, female liberation and youth's rebelliousness. d. CIVIL STATUS: The greatest part of the terrorist organizations have a majority of single members. The accepted general figure is between 75-80% single. This reflects that marriage is considered as an operational problem for the group. Frequently the members of a terrorist group that are married break up WITH their family once they find themselves convinced in their group's beliefs and they follow them. e. ORIGIN: The urban metropolitan areas constitute the source of the greatest part of the terrorist numbers. 262
LN324-91 f. SOCIO-ECONOMIC HISTORY: Normally they come from liberal party member parents. There is a preponderance of professionals, such as lawyers and doctors, but the other occupations include clergy, business executives, diplomats, government employees, police and members of the armed forces. The terrorist groups usually come from middle and high classes. g. EDUCATION AND OCCUPATION: There is a vast majority of students and intellectuals within the revolutionary movements and their directors. The majority of the leaders have received some university education or have taken higher education courses and then some. The social and humanity degrees seem to attract many; the students rarely come up as leaders, but the universities are a field for the revolutionary movements. h. RECRUITMENT: The universities play an prominent role in the recruitment of terrorists. They introduce anarchist and marxists doctrines and many of the student federations are controlled by radicals. The jail adds another element, although it does not play such an important role as the university's. i. RELIGION: The terrorist tend to be atheists, devoted to violence. This does not mean that all terrorist are atheists. In Latin America's case, the catholic priest's and the nuns have carried out active roles in the terrorist operations of both sectors. 263
LN324-91 COMPARISON BETWEEN THE TWO CATEGORIES OF TERRORISTS: NATIONALIST IDEOLOGICAL [millennium-oriented] Personality: Educated leader Same, preponderance of Idealist socially unadjusted youth Activist Age: From adolescence In their twenties, thirties to the 30's (leaders in their 40's) Sex: Masculine (a few activeDivided almost 50% ones from the feminine sex)women have very active roles. Civil Status: Single Single Origin: Metropolitan area Metropolitan areas Socio-economic Low and middle class Middle and higher classes history: (leaders middle to high classes) Education and Varies greatly University and Professional Occupation (Leaders are professionals) Recruitment Varies greatly in cities City, University, Prisons Religion Varies greatly None 264
LN324-91 TWO MAIN TERRORIST CATEGORIES: WITH the considerable changes that have taken place during the last twenty years, there has come into play two main terrorist categories: a. Nationalist: They take power or cause a national revolution. The control of specific territory is their common denominator. These groups have as principal goal to take a territory as a sovereign entity. They have objectives defined in a short term and frequently make do in a practical manner to attain them. b. Ideological: Revolutionaries and anarchists of an indefinite ideology that try to destroy the existing system. As a general rule they try to avoid to arouse any definite substitute government because this tends to divide the organization through dissention. METHODS OF OPERATION: Terrorist operations are being carried out in a professional manner and are executed by well-trained specialized clandestine elements, particularly by international groups. The terrorist organizations are becoming bureaucratic institutions and their members are specializing in diverse areas. There is evidence of one transnational affiliation and assistance between the groups. The terrorist groups generally operate as clandestine organizations. a. To avoid penetration and information loss about the organization, operations, techniques and plans, groups practice strict security measures. A leader is designated and guided about the mission and the support requirements. b. Procuring even more security, frequently the members of the team do not meet but until the last rehearsal and shortly before leaving towards the place where the mission will take place. In such manner, the members of the team and the support personnel will not know the location of the target until it is necessary to carry out the mission. The identity of each member of the team will be kept in secret, even from the member themselves, by using names and false identification. 265
LN324-91 c. To increase security, a special intelligence team will carry out a detailed search of the area or the target. To increase the security even more, many targets that have been recognized will not be attacked by a reason or other, so the fact that a search has taken place does not mean that the target will be attacked. Additionally, to make the hamper or prevent the detection, they plan a greater number of attacks than they will actually carry out. d. Urban local groups carry out their operations as an initiative of their local cells or their movement's central command. e. Terrorists normally look to exploit the vulnerabilities, attacking targets that have a weak security stand. Terrorist operations are characterized by: "THE VIOLENCE", "SPEED", AND "SURPRISE". Terrorists reduce their own vulnerabilities to reduce the risk of the operation. If the original target is well protected, they take into consideration the degree of risk and vulnerability of the group, select another target. This does not mean that terrorist groups will not attack a high security target and risk a suicide mission if they think that could be the last resource. TERRORISTS TARGETS: The terrorists targets are generally of two types: Symbolic or pragmatic. Targets that could serve both purposes are selected if they are available. Targets are more symbolic when terrorists are weak and vulnerable. As the movement grows, targets are more pragmatic. The definition of the two types of targets is as follows: a. SYMBOLIC TARGETS: Symbolic targets are normally prominent members of a regime or an institution. The terrorist's acts against the target are committed in highly visible places to attract the greatest degree of attention possible and they serve as principal instrument to reduce the trust, inflict fear and provoke the repression of the latter psychological use by the movement. b. PRAGMATIC TARGETS: Pragmatic targets include multinational corporation executives, key members of the opposition, whose selection has the purpose of coercing the group's objective so as to support the movement; to obtain resources, such as, money, supplies and arms. 266

Page 267 Missing


LN324-91 TERRORIST ACTIVITIES: The activities of the terrorist groups include: a. Murders b. Bombs (including the use of letters and explosive packages, and fire bombs) c. Kidnapping and taking hostages d. Pre-meditated fires e. Ambushes f. Armed attacks g. Street tactics h. Robberies ADDITIONAL INFORMATION ABOUT TERRORISM: a. Terrorist goals: 1) Guide the masses not to support the government and support their movement. 2) Terrorism will give the urban insurgent a method to develop the potential for mass uprising and give the rural insurgent a method to oblige them to reduce the control of the government and to force them into the desired behavior. 3) These goals constitute the fundamental terrorist threat for governments. LOCAL LEVEL ORGANIZATIONAL CHART COMMAND INTELLIGENCE SUPPORT COMBAT SECTION SECTION ELEMENTS ________________ NATIONAL LEVEL ORGANIZATIONAL CHART COMMAND SUB-COMMAND SUB-COMMAND SUB-COMMAND INTELLIGENCE SUPPORT COMBAT SECTION SECTION SECTION 268

Chapter 29

[Back to SOAW Home Page]    [Send email to SOAW]    [SOA Manuals]