04. cap 4 - métodos de entrada - vulnerado de barreras

Upload: adrian-von-folkersam

Post on 04-Jun-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    1/18

    CH PTER

    Overtly or covertly g ming entry to a buildingis one of the essential skills for a spy. Gaininginformation from public or not-so-publicsources forms the basis of much spycraft.

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    2/18

    All of the information and techniques explained in this section are in the public domain. They outline theskills of secret agents and Special Forces operating in foreign countries. None of the literature in thissection will tell you how to construct a bomb or how to make real explosives. Similarly, the section on lockpicking is merely an outline and the skills required to perfect the art take years to master.Methods of entry cover a wide variety of spycraft skills, which fall into two,~tego ries covert (gaining access) and overt (making access). If a spy

    wlghes to plant a bug in the target's house, he will most probably wish11 enter the premises and leave covertly. In contrast, a r aid on a..llspected terrorist bomb-m aking factory wo uld a lmost certainly beIl~ltiated y the use of force that w ill inevitably result in a loud noise at1111, point of entry.

    In its basic form, infiltration is simply gainin g access to a structure,wl~vther t is a build ing, an aircraft, a ship or a vehicle. To gain access, a*.IIV may have to climb up, abseil down or carry out direct penetration, i.e.III* nay need to go through a wall. Much o f the equipmen t required forMIA is termed "low tech", and, for the most part, has been develop ed1111ol1f:hecessity or c onstant civilian usage. Counter-terrorist techniquesII.IVII turned the hum ble builder's ladder into a rap id mean s of access,w l ~ l l ~ ~uch of the cutting equipment used has been developed fromIII~III~.im i la ro those used on a day-to-day basis by the rescue services.

    f l l l lc~rmore specialist MoE skills use a mixture of m ilitary and civilian11.1 I~~birlucs;hese include lock p icking and the use of explosives. CovertI IIIIV in be made by picking the locks, or by silently cutting through

    1 1 1 1 4 11,irq or doors. Overt entry, on the other hand, is normally carried out11.1111: IIIC fastest methods - hrough the use of explosives or wall-l l 1 t 3 . 1 1 II~II~ annons. Although this type of work is highly specialized, it isIIIIIIIIII~IIII tIicita ~ p yas a general working knowledge of such skills.

    W~IIIII II P.< lo n ti o u s ~ r building is required, the agents willIIIIIIII~IIIVIIIIV 0111 n I,irf ct r c rw SCP S ~ ~ t v o i l l a n c ~ec tion ). his entails nIIIIIIII* II~I~.~~IV,II/IIII 1 1 1 1 ~ ) r i ~ 1 i i l ~ . ~ * .0 I~*.I,II)I/~.II111~ o~r(ar l r lc l rc ~~,h1%

    1 1 1 .1 l1 1 110l111. 111 I ' I l I I V ,111lI 0 IB 1114111 011' IIl111' 1 1 1 ~ 1 1111' ~ ) I O ~ ~ t l I VI

    occupied. Once this basic information has been collated, a method ofentry will then be formulated. Depending on the security devicesprotecting the house, a plan will be made either to break in and makeit look as though a burglary has taken place - or to effect a covert entry.

    Surprising as it m ay seem, it is often be tter for a spy to break in durin gdaylight hours, especially if he intends it to look like a robbery. At 10 amin the morning, the man of the house is likely to be at wo rk the childrenare probably at school and the wife could well be out shopping or atwork In contrast, a house is almost always occupied from six in theevening and throughout the night.

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    3/18

    -I _ ~ I low alarms are controlled by a four-digit code that is punched into

    Iclllveniently situated somewhere close to the main point of entry.I . ~ l l t ~ w ~ ;he property owne r a short period of time to enter the house

    3 v 1.1 II l\,lctivate he alarm. Alarm systems are designed to activate underb . I 1111 lliditions; for the most part when one of the internal sensors has.I. 1, I II~ II .omebody's presence or when a door or window contact hasI . ' II 11111ktln.his activates the alarm and the box on the outside of theI l ~ ~ ~ l ~ ~ l r., set off. In some cases the alarm may phone the local police1 1 1 . . tnrll l clnly accept VIPs), or even the house owner's mobile phone.

    1111-11 . ,111 several ways a spy can bypass an alarm system. For example,I IIV III,IV get a ladder and insert expand ing foam into the outside alarm1.. ~ ~ , l l l ~ ~ ~ l l l ~ e r i n go break the light if one is attached. Or he may try to1.1. VIIIV 11111 alarm system manufacturer and then obtain the engineefsI a 1 1 4 1 0 atnll 11de.

    t f l11l4-IIII~I of these methods are effective, the modern agent will oftenI I -.III,IIIplate-like device at his disposal (the name o f which is. 1111.tl)l1,lt he simply places over the keys on the control box and

    I 11 ,,I,IIIclisplay the correct code instantly. The device measures the1 1 1 ~ . 1 1 1110 push buttons, as each is minutely different. The pad isIlilrl. I~I I I I I I~~o measure the difference (and will also determine the

    FI~11 \ ~ l ~ i r1 the four code keys are pressed. The device works on 70 perI 1 11 0 1 1 1 1 IIIWI~ keypads.I , l l t t q . l wily a spy has of carrying out daylight entry is by walking up to

    11 1 1 1 11 11 t11111 and knocking loudly (he will not rely on the doorbell as itI I I~trlkrn),n order to establish whether anyone is at home. If

    . I ~ I 1111. ,Illq.wers he door, the spy can simply switch to a back-up planI IV III,II 110 is collecting for charity, for example. If no one is at home,

    1 I, I ,\rl..l lo enter the premises directly, by forcing the door with ae . I 1 1 1 1 1 1 ~ 1 101; f the property is hidden from view, us ing a hydraulic

    I. 111 ,I I 1 111% lnay go to the rear of the house and try there. He will t y.. l111(,11.l,l*,s as it has a nasty habit of m aking a distinctive sound thatlFnm . r t r IIl0 lbI I ~ ~t~spicion f any neighbours.I I, 1.1 IIIV 11~11. IOP clfeacd, the spy will consider the amount of time

    1 1 1

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    4/18

    METHODS OF ENTRY

    ASSAULT LADDERS

    Assault ladders cater for any eventuality: gaining access to buildings o assaulting aircraftThere are an extensive range of assault ladders available, most of which

    wore originally developed to cope with terrorist siege situations. TheseIll( ude single section, multi-sectional and extending types in single-width,~louble-width nd triple-stile designs. The best ladders are those that are~~ l~~nufac tu redrom structural grade aluminium alloy with deeply serratedIIIIII sections and heavy-duty rectangular sections. They are fitted as8.1,lndardwith non-slip rubber feet, noise-reducing buffers on all exposed1.11 1.5, and are finished in black po lyester pow der coating with etch primer.1111. reason for hav ing double- and triple -width ladders is to enable several111*1*.., o 1)11l,lir r,in.;porI vchic'lcz, ship and aircraft or

    I ILI ILO lo1 '.( ,II /I) I: W,III,. W.111 I~ ook'.111rl.11iocv I~I~IIIOIIII*.1,111 l l l ~l l l l ~ l lll 111 .l,18+.

    b Multi-sectional ladders are mainly manufactured in do uble-width or triple-stile configurations. The sections of theseladders range in length from one metre up to four metresand can be quickly assembled to give finished lengths of upto eight metres. They can be transported easily in vans orestate cars and provide team capability for two to fourpersonnel, depending on both the length of the ladder andthe conditions. They are fitted as standard with heavy-dutychannel connectors complete with nylon slides and lockingpins. Sniper platForms are also available.

    b Wire coil ascent and descent ladders are available inlengths up to 30 metres. s is the case with fixed ladders,they are manufactured from structural grade aluminium a lloyand high-tensile wire. They have non-slip rubber feet, noise-reducing buffers on all exposed faces and are finished inblack polyester powder coating with etch primer. The ladderis rolled into a coil for transport. Coil ladders are normallyput in place via an extendable hook which can be used ona building or for gaining access to a ship.

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    5/18

    METHODS OF ENTRY

    VEHICLE LADDER AND PLATFORM SYSTEMSIli e most common delivery system used by most anti-terrorist teams todayis a vehicle ladder and platform system. The system provides the assaultteam with both delivery and access to buildings, trains, coaches andaircraft. While a covert assault may require the use o f norma l assaultI,idders, both the IA and a rapid assault are best carried out by thec~mployment f a vehicle-mounted, multi-role, personnel delivery system.There are various systems being currently developed. Some are designed tofit permanently onto armoured vehicles, while other systems are carriedwithin a standard pick-up and can be assembled in minutes. In both cases,the assembled ladders can be configured to suit a wide range of userneeds, capable of deploying fully equipped personnel to a variety of levels.Tor example, the system can be adjusted to deliver a ten-man assau lt teamdircctly to the doors of a Boeing 747. The same system can be adjusted in arow minutes to enable an assault on a building window some sevenniorres above ground level. The system can also be used for assaultingships if they are in dock

    The members of the assault team are carried on load-carrying platformstIi;~t are secured to the sides, top and front hood of the veh icle. In add ition1 this, ladders can be formed into access bridges if and when a voidnrcds to be crossed. It is also possible to fit a 360-degree turntable with,in extended ladder, similar to those used by fire-fighters, which enables~nulti-roleunctions at difficult angles.ABSEILINGAbseiling is used for descending a rock face or the side of a building. Itcan also be used from a helicopter. Abseiling equipment consists of thefollowing: an abseil harness, designed to be used as either as a full-I~ o d y arness permitting a person to be suspended for protractedperiods of time e.g. outside a window or as a simple sit harness forstraightforward descending. A normal abseil rope is made of 11mm-diameter, non-stretch, black polyester rope. This is available in d ifferingpre-cut lengths of 50, 100, 150 and 200 metres. Various descenders areused, the most common of which is a horned, figure-of-eight abseiltlcscc~irleron which rhc lower rinc is set at 90 clcgrccs to the upperOIII I l ~ i ~ ,~ l i ~ ~ ~ i ~ ~ ~ ~ t c ~ ~111~I~I~(II\I~(vI w ~ s Il ~ ~ ~ i r i f1 ( I (>~ . ( (~ I~ Il i ~stop"t l ~ ~ ~ . c~ 1 1 c l i 1 1w o~ k - .II 1111, lO1i l.,1111" ~ i~ ~ c i l ) l c * ,~~~~, I I I / I I I :11 11 IIII~ o1)(~,111

    110111111111

    release of pressure on the handle causes the descent to be haltedimmediately. Karabiners, fitted with locking screwgates that have abreaking strain of 3,000 kg, join the separate abseiling units. Rope bagsare used during covert work to ease the sm ooth deployme nt of a ropeduring a descent.

    4 Abseiling down the face of abuilding remains one of themost popular methods ofentry. As seen here speciallyconstructed wire ladders canalso be used to gain accessto buildings.

    SPIDERMAN SUCKERSSpiderman suckers allow a spy to climb up vertical walls with a greatdegree of safety. The four vacuum pads will adhere to any surface, be itconcrete, sandstone, plaster, wood, glass or metal. Each pad is computercontrolled, which means that the vacuum effect of each pad can beconstantly measured and adjusted. A visual and acoustic warning signalinforms the user about the load-carrying capacity of each pad and a fail-safe method ensures that only one pad can be removed at any time.

    The unit is operated using compressed air supplied by an air cylinderthat is worn on the operator's back. The air cylind~r llows approximatelytwo hours of climbing time. The total ~ ln it rtilll~ ll; ;lhot~r7 kg, andoffers a carv ing capacity of n r o ~ ~ n t lIIII 111i@11lrIIIIIII~~~i ininj :o 11cc 1110

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    6/18

    4 Spiderman suckers allowan agent to climb any verticalsurface.

    RARlD-ENTRY EQUIPMENT111 II ($ a spy has climbed or abseiled into position, they will require a means111 ;;lining entry. Rapid-entry equipment ranges from silent hydraulic cuttersII tl spreaders to sledge hammers, crowbars and axes. These tools are

    ~t~ lmonlyeferred to as a "Barclaycard, meaning an entry tool that worksI, 1~icularly ell for gaining quick access into a building. Most hydraulic

    I I I I ~~se lightwe ight pumps that can be easily carried by a single spy. Thetllowing is a selection of the equipment available:

    b A Man ual Doo r Ram is a hand-held ram designed to forceinward-opening doors. The ram is swung against the lockarea and imparts a weight load of approximately three tons.

    iq cffcctivo against all but reinforced steel doors andwctif;lis 6 kc

    b A Dnnr ripper is I li~ litwci~ li~oo1 tlcsicncd ro force outward-II~)I~IIIII~~1oo1~.111 l ) l l ~ ~ l ~ t1 1 l 1 r 3 1or)l l b tltivcrn I)r ~l w ~c ~n1111IIIIIII ,t~lrlIII* II.IIIII~11 11111 lo( k ,III*,I A I~ I~( I I I* IIII I la l~ l l - . l l l

    helps overcome resistance by allowing the blade to beworked behind the door thus providing increased force.

    b A Hydraulic Door Ram is designed to force reinforced inward-opening doon. It is supplied with three sets of claws to suitall standard widths o f door from 760 mm to 920 mrn. Themain ram is positioned over the lock area while the secondaryram forces the jaws into the frame. A valve then activates themain ram to force the door open exerting a maximum force offive tons. An 11-ton version is also available.

    b The Hooliga n ba r is an A merican-designed rapid-entrytool. Essentially, it is a one metre metal bar w ith variousattachments. Two or three blows with the bar will takeout most of the window; the hooks are then used topull out the debris or can be used as leverage on sash-type windows.

    b Spreaders are used to either lift a door off its hinges or tolift or move a heavy object.

    b jaws and disk cutters are used to cut or penetrate any formof metal. Some hydraulic models can cut metal ban that areup to 35 mm thick

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    7/18

    METHODS O ENTRY I

    SPECIALIST AMMUNITIONThe Hatton round is designed to remove hinges off doors without the riskof ricochet. These rounds contain 12-gauge, semi-solid, frangible slugsweighing 50 gm. They smash hinges from their fixings and cause damageto the surrounding woodwork These rounds will penetrate vehicle tyres, firedoors that are clad on both sides with metal plate, cell-type doors, 12 mmthick Makralon and armoured glass from a range of 1.5 m. The Hattonammunition can only be used in M agnum shotguns with three-inchchambers and unchoked barrels.

    RIP, 12-gauge, close-range ammunition comprises of cartridges filled witha mixture of micronized CS, an inert powder to add weight and anothernon-toxic powder. On firing, the compression and friction produces a largeamount of carbon dioxide gas when the cartridges exit the barrel of theshotgun. The mixture is propelled towards the target at a very high speed,forming a cloud of incapac itating airborne irritant in the process. The m uzzleof the shotgun can be held against any wooden door up to 65 mm inthickness and the powder will blast a hole through it. One round will fill aroom that is nine by six metres in size.THERMAL LANCEThe thermal lance is designed for cutting mild steel, inc luding objects thatare underwater. The basic system consists of a 4 metre flexible thermallance made from Kerie cable, a single three-litre oxygen cylinder fitted withpressure gauges, a pressure regulator, a battery-powered igniter and athree-way valve which switches the system's working pressure on or off.Once ignited, the Kerie cable burns at approximately 60 cm a minute duringcutting, and has a maximum cutting time of six minutes. A backpackportable system, that weighing 10.5 kg is favoured for cutting during acovert entry.

    WALL-BREACHING CANNONThe wall-breaching cannon is a device that eliminates the need for usinghigh explosives as a method of entry in a hostage situation. Every walldiffers and it is very difficult to judge the amount of explosive required toblow a hole without causinc sevcrc debris on rhe opposire side. In the caseof a h o c ln ~c c ~ s c ~ l c ~il~~,rlioli,lli*, cotllrl ,1115rb locc of life lo IIW Iloslnl~c~.

    1111, w,lll I)II$,II IIIIII r 8 ~ ~ ~ ~ ~ ~ ~ ~ ~,I*, III~vI~IIII)~~(I1 r1 1 1 i v1 ,I IIO.IVV, *.of1~l l i l ~ i~ il l l~ lIl1 ~.l l l l i li - l l l v l~ l l l lIv 111 ,I1 lllll l m l l i ~~ l l i l l l ~ ~ l l~ l l l i ~ l l i81,1alI vo

    The wall-breaching cannonuses water to smash its waythrough walls and allows anentry to be made.The effect on a wall from asingle wall breach.

    breach a wall, w hile in stantly dissipating the energy after the w all had beenbreached. It was discovered that a wate r-filled plastic container fired bycompressed air could fulfil this requirement very ncleq~~ntcly. muzzle-loaded, smooth bore barrel was then rlr*~.ir:nivl0 I ,II III~ l l ~ ronminer. Thermr of thc barrel is fitted wit11 ill l i~I~~.I~IVII~I 1 1 1 ~ 1 1 +. . I~ I . I I~ I I I~~ Iroln ~ h oln ,~ in ,,111rl hy ,111 r\n~r,ipl)r~tl;I.I-.*.l l* . i wl~ll 1111111 111 . IIV I ~ I I ~1ii IIlli~loll.lllilll - 1 ~ I v ~ ~ I Il l i ~ ~ , ~ , l l l i * ,l l l l~ . l l ~ ~ ~ l ~ l l l l l l l ~ll I llll~llll~illl~,l l i ~~ ,~ , l l l l ~l k

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    8/18

    METHODS OF EMTRY

    the rear of the projectile. A loose piston stops any air leakage past theprojectile, and gives good velocity at pressures between 100, 200 and 300kg psi. The system can be easily transported in helicopters or estate cars.

    LOCK PICKINGAll agents need to learn the basics of lock picking as part of their tradecraft.The principle of picking locks is fairly basic, as are lock-picking tools, manyof which can be easily made or improvised by a spy. The problem withpicking locks lies in the skill. It can take many years to perfect thefundamentals of lock picking, and it is a skill that requires great practice inorder to maintain the feel . A very brief guide to how a spy goes about the.lock-picking process is outlined below. Note: picking locks in order to gainunauthorized entry into a person's property is illegal and not recommended.LOCK PICKING EQUIPMENT

    There is a wide range of lock-picking equipment on the market, andavailable in stores and especially over the internet. These vary from thesimple, traditional lock-p icking sets to the more expensive and advancedlock-pick guns. The basic lock-pick set consists of a range of toolsincluding several different lock-pick shapes and a variety of tension bars.Mos t sets tend to include tools for the removal of key ends that getsnapped off in the lock

    There are many different types o f lock-picking guns available to th eagent and indeed the general public but these are generally bulky bycomparison to the lock-pick set. Lock-pick guns are available in eithermanual or electric operation, and all have interchangeable picks. Whilethe Cobra Electronic lock pick is often acclaimed as the ultimate device,the Lockaid gun, in this author's opinion, is more efficient and reliable.PIN TUMBLER LOCKMost of the locks manufactured over the past 20 years are of the pintumbler type. In its basic form, it is a very simp le lock ing device. A series ofsmall pins fit into the inner barrel of a cylinder. The pins are in two pieces,normally at different lengths and are forced into recesses within the innerbarrel by a small spring. If a correct key is inserted, the different sized pinsare brought into line where their break meets in the outer casing of theinner barrel. This allows the inner barrel to turn freely within the casing andthe lock is then released.Any method of aligning the pins in this manner and turning the innerbarrel will open the lock This can be achieved by two methods rackingor picking the pins. To achieve this, two basic tools are required a lockpick or a rake and a tension bar.

    The pick, or rake, is a flat strip of hardened metal tha t has had its endshaped to fit into the lock and which advances the pins on their smallsprings to the required depth.

    The tension bar is a flat strip of metal inserted into the mouth of thebarrel to employ a minute amount of tension onto it. This process helpsseat the pins and turn the barrel.

    Note: While most locks turn clockwise, some cylinders may turn theopposite way. If the tumbler's pins will not break, or if they stay broken, itmc.;lnr, lhat tension is being applied in rhe wrong direction. If several clicksnrc l ~ ~ ~ ~ r c lIICP l l ~ o~II< ~OI~I~v >PPI ~ ( ~ I ~ ~ ~ ~ c I ,t I W ~ I I ~l ~a l IW 111nI~1or111*1111 1 1 1 1 1 1 1 ~ 1 t I1(1 il:l11 I I I ~ ~IOII

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    9/18

    METHODS OF ENTRY

    RAKING AND PICKINGThere are many different types and designs of lock-picking tools and theycan all be used by a spy for different functions. Two are probably sufficientfor a spy. Raking is the quickest method of opening a lo ck It is fast andstraightforward providing that the pin sizes do not change suddenly, suchas the combination illustrated below. Before the spy starts he will makesure that the lock is clean and free from any grit or dirt by blowing hardinto the lock before attempting to open. Raking involves inserting he pickto the rear of the pins and swiftly snapping the pick outwards, running thetip over the pins in the process.

    Prior to doing this, he will insert a tension bar into the bottom of thekeyway and apply a slight pressure on the lock's inner barrel. Thetension is applied in the unlock direction. The amount of tensionexerted should just be enough to turn the barrel once the pins areseated, but not so strong as to bind the pins against the barrel. It is thissingle "feel" that is the basis of all good lock picking. If the tension istoo heavy, the top pins will bind and the shearline will n ot allow thebreaking point to meet. If it is too weak, the pins will simply fall backinto the locked position.

    The tension bar simply replaces the key body as a means of turning the tumblerWhen raking. he will have to repeat the operation several times. If the

    barrel does not turn by the fourth time, he will hold the tension with thetool. He will place his ear to the lock and slowly release the tension. If thepitting sound of the pins falling back to rest is heard, then he has appliedtoo much pressure. If he hears nothing. then he needs to apply morepressure on the tension bar.

    The ease with which a lock can be opened will depend on three things:firstly, the length and position of the pins, secondly, the type of tools youuse, and thirdly, the make o f the lock. Cheap locks will be easier to openthan expensive ones. Cheaper locks arc f;cncrally poorly constructed,allowing for a much greater clenranc~\M~IWI*I*I~1 1 1 3 I~,llrr>lincl tlic body,r l111~nnkinl il far rasi~ro nsrcvl~ltl~bIIIII~I~II,IIIII~~II~IIII*l1(\,11) ofkc. C ~ I I,iIe.o I,IVII r1 1 1~,111o1I~~~IIIII ~IIII I I \ t r s t - ,1.0 11111 111111-. 1totl1 1 w l ~ i (111.1 41 1111 111 VI ' IY I',I'.Y 1 0 1111 1

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    10/18

    The spy will isten to the pins popping and count the number of pops for problems pins.Lock picking is very similar to raking, but it requires a lot more skill, as the

    11lnsneed to be seated individually. Starting at the back of the lock, the spyIllcls for the rearmost pin and gently pushes it up. The barrel should move

    I raction. Working towards the end of the lock, he will seat each pin in111111ntil the barrel is released. comb ination of one swift rake followedIIV picking is sometimes the easy answer to cracking the lock

    One of the reasons some pins bind or stick is that the top is oftenmushroom-shaped, causing the top to topple and bind on the shearline.Careful picking will overcome this. One particular make of lock, calledMedeco, splits the pins at an angle, m aking it a very difficult lock to p ick

    In an emergenq, it is possible to bypass the pins by drilling a line throughthe lock The spy will direct the drill towards the top centre of the lock wherethe tumbler meets the body. He will use a centre punch to provide the drillwi th a good start guide. spy wi ll drill straight through for at least .threecentimetres and will push a screwdriver into the keyhole to turn the lock

    good agent will develop the feel for lock picking by doing a dailyexercise. He will wash his hands and then rub in hand cream. He willmassage both hands and fingers for about five minutes and then let themrelax. He will find a smooth surface, such as a sheet of glass, (an oldpicture frame is perfect), and place a few grains of sugar on the surface ofit. He will close his eyes and gently use his fingers to locate the grains ofsugar. When has done this, he will play with each one of them very gently.He will try to differentiate the size and shape of each grain. This exercisenot only helps the spy's feel, but it also helps his mind to visualize what h eis feeling. Visualization is the key to understanding he techniques of lockpicking.

    Note: spy will sometimes sharpen one end of a pick to a needlepoint.If this poin t is forced all the way to the rear of a padlock until it hits therear plate the sharpened pick will grip the metal. The spy wil l try to forcethe plate either up or down as this will sometimes release the lock withoutthe need for raking or picking.CLANDESTINE LOCK PICKING TIPS

    b The spy will define the lock type and its make during targetrecce phase. He will purchase a similar lock and practise. Ifhe has the time and the tools, he will cut the lock open andexamine its inner mechanics in detail.

    b Some locks take time to pick, so a spy will take short breaksto rest his fingers.

    b He will avoid scratching the outer face o f the lock.b Ilc will rorurn rho lock r its natural st ro onco finishod.

    I ~ , I V ~ I ~ ~ ;III pi~i..ll I " flo, it i~ i, (' j h . i~ io ~ ~i l l i ~ i l ~ i l ~ i tI~ I * v vIll~111)11.11 l* t l l l 1111 10f k

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    11/18

    METHODS OF ENTRY

    Certain keyways are cut at an angle. A spy will make sure hepicks to compensate and follow the angle.

    b Well-made locks are extremely hard to pick; they are verytight and require a little more tension.A "springf pin is not aligned.If the lock is open but the door is not there will probably beinternal dead bolts. The spy will probably then use hydraulicspreaders in the door jam, bu t this is likely to leave large,telltale marks.Most locks can be opened, but not all of them are easy.Some people have a natural ability for lock picking, whileothers struggle.

    A LOCK PICKING SET

    Lock-pickingsets must be made from the correct type of metal.Pick-locks are made from several strips of h igh-tens ile metal and a spywou ld probably source the material from a mode l store. Alternatively, a setof heavy-duty feeler gauges that are used by the motor industry could beused. A spy will scan or photocopy a template and print out a copy ontopaper. Next, he will carefully cut out the shapes. He will place eachindividual template onto sopnmte strip of metal or on one of thc lenvcsof lhc fcclor ~ ~ I I I C ~or lh r spv, it c now ,I 1 i i ~ 1 1 1 1~ 1f fy inrl i l~f: IIIWIIl ic111i~1,lI 1111 1 1 1 1 t l l~~, l lc~t l,I l , l l , i~I#I*, l l~i ' l lI1 l l l t ~ ~ l ~ l lIlI.. ~ l l l l l l l1 1 ~ l l l l l l ~Iv

    placing the metal in a vice and grinding it with a coarse grinder to get arough outline, before using a fine grinder to finish off. Finally, the spy willremove the paper template to reveal his pick

    The spy will place the tension bar in a vice and heat it with a blowtorch.Once the metal is hot, he will use a pair of pliers to twist the top 15 mmof the bar to a 90-degree turn. He will then bend this over at 90 degreesto form an uprigh t section. To start with he will only need to make threebasic tools.EMERGENCY PICKSAny type of thin metal can be used by a spy for makeshift picks andtension bars in an emergency. The best two items to use are heavy-dutypaper clips or safety pins. These can easily be straightened or bent in orderto make all the tools the spy may need to open a lock However, they arelimi ted to such items as lockers, drawers and filing cabinets, as heavy-dutylocks will require a more substantial set of tools to pick

    There are several new types of lock picks available. One is called the fibrrpick This looks and acts very much like a toothbrush, but is used to brushthe lock pins instead of teeth. Fibre picks come in a variety of different fibresizes and strengths, and it is just a matter of selecting the right fibre pickfor the purpose. The spy w ill try several different-sized fibre picks un til hefinds the one that operates the lock He will then record the fibre picknumber. After a little practice, the operator soon gets to know w hich fibrepick is right for a certain type of lock The fibre pick is an excellent tool touse for a clandestine entry, as, unlike hard metal picks, i t does not harm thvpins and leaves no scratches.

    While there are many ingenious devices available to the agent for openinqvehicle doors, this can be achieved by improvisation. One simple way a spvwill use to open a vehicle door is to use a strip of plastic banding tape. TIM*spy will take about half a metre in length, and fold this in half, creasing thr,folded end.

    He will use a flat piecc of m ~ t i l lo 11111* 11111 v141icltl loo ~ pen II 1111)tap corncr (the corner of t l i ~l o n ~II,II 1 I I I I I Iv~' .~IWBIV 10111 1 1 i ~ ililmil lo^). l l i l ~ , l i o ~ ~ lt l) ~o v i t l i l1 1 1 ~wl111 ~ I I I I I I I ~ ~ I.II~II 11 *.I111111 1 1 1 1 i I ~ , ~ ~ I I1 ~ 1 1 1 11 1 1 1 i l 1 1 1 4 1 1 1 1 1,1111, l ~ ~ ~ l l lIII-.II I1 .1llr111lII 1 ' ~ I ~ I I ~ / I I I ~ ~ I I ~ . ,11111,

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    12/18

    METHODS O ENTRY

    using a saw ing action, pull the tape d own until it is resting close to theinternal door release catch. Once in position, he wil l p ush one end of thetape inwards while holding the other end firm; this causes the tape toform a bow near the crease. He will work the tape back and forth untilthe bow is over the release catch. He then pulls the two ends of the tapetight and lifts at the same time. This should unlock the door.

    Note: although this is a method used by spies it should not be usedI)y civilians. It is a criminal offence for civilians to break into other~)c>ople'sars.

    A l l l l l r l t In ilnirnnnnry l o allnll l l lrlnl i > r * l 1to11lnn a nlllnll nlr l l l of ~ ~ t n n t l ~ :a1111,

    DEMOLITIONS ND EXPLOSIVESMost agents will have a basic unde rstanding of dem olition techniques.However, this type of work is normally left to experts, such as the BritishSAS or the American DELTA force personnel. While demolitions often formpart of the MoE strategy, they can also be used in assassination andsabotage m issions. In their base form, mos t explosives are safe tohandle, easy to use, lightweight and have considerable destructivepower. From the terrorist's point of view, explosives offer an easy meansof causing devastation and, as such, are widely used, mainly in the formof car bombs.DEMOLITIONS TR ININGFew people wou ld argue wi th the fact that th e British SAS de molition swing offers a remarkable course, covering all facets of demolitions andexplosives. The practical work progresses slowly from the basic rules ofhandling explosives to the making of hom e-made explosives andadvanced sabotage. The latter covers in-depth details on destroyingplaces such as oil refineries, railway stations an d teleph one exchanges.The aim of the SAS demolition course is to teach the pupil how to usethe minimum amount of explosive to cause the maximum amount ofdamage. This requires the use of complex formulas for cutting steel andfor the placement of the explosive. The range of explosives nowavailable to the saboteur has increased immensely; technology has ledto the development of advanced explosives together with a wideselection of wireless detonating devices.

    Modern high explosives are fairly safe to handle; they can be dropped,jumped on and even set on fire, a lthough burning a very large amount islikely to produce enough heat to cause detona tion (although we stronglyrecommend agains t tes ting this theory.) H andling modern plastic explosiveis a little like playing with plasticine and it too can be mou lded intodifferent shapes.

    To activa te high explosive, a detonator is required; this device comesin two types - electrical and non-electrical. A detonator is a smallaluminium tube about 250 mm long and half-filled with a substanceknow n as PETN. The non -electrical detonator is open a nd ready torcc~ivc lcngth of safety fuse, whilc the clcctricnl dcronntor h s twoW~II , ~ I ~ I I I I ~ I ~ I I ~ro113 t W lio ,~-I c l (~1011 ,1 thc, ~ I I ~ I W C Into l ~ l - ~ ~ t i cI'~(~IIII'.IvI'11111 1111 Ill .l 1 Ill ( 0 1 1111' ~ 1 1 1 . ~111' ( 1 ~ 1 1 1 1 1 ' ( 1 1 ~ 1 1 0 1 1 I I ~ I ~ ~ I ~ I V ) ,I11'

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    13/18

    METHODS OF ENTRY

    detonator is activated. The speed of a detonator is around 6,000 metresper second; this jump-starts the explosive, which, in the case of PE-4,explodes at around 7300 metres per second - creating enough energyto cut steel. High explosive only becomes dangerous when both adetonator and an initiation device are added.MILRARY EXPLOSIVESThe Americans use an explosive compound know n as C-4 that is acomm on variety of m ilitary explosive. In its original state it looks verymuch like uncooked bread dough. As with many plastic compounds, thebasic ingredient is cyc lonite (cyclotrimethylene trinitramine), which makesup around 90 per cent of the C-4. It also contains a polyisobutylenebinder (5.5 per cent) and the plasticizer, the amount and type of whichvaries with manufacturer.

    American military personnellearning the intricate skill ofmodern explosives. These agentscan be seen preparing improvisedbombs for use by African rebels.

    As with many other modern explosives, C-4 was developed during theSecond World War wh en thc original RDX was mixed with mineral oil andIcci~hin. 11 is 1110 Iato.;~ ll li~lc l f C (Con lpolii~iorl) txl)lo~.ivc~5,111 n l w lli rl iWl*Il1~ I l ~ ~ l ~ l l l ~ ~ l ~ ~ I~1 1 1 ~Wull

    With the right equipment bomb construction ban be safe and simple for agents.Variations of C-4 are used widely around the world. The French news

    agency, AFP, reported that the explosive used in the Bali bombing was of atype m anufactured in Israel. As most modern explosives contain a tracercompound, any residue from an exploded bomb in which commercialexplosive has been used will enable you to trace the manufacturer.SEMTEXSemtex is a Czech-manufactured, RDX-based, plastic explosive. It contains ihigher percentage of RDX than the British PE-4 plastic explosive. Itcomprises 88 per cent RDX and 12 per cent binderlplasticizer. This meansthat i t has a deton ating veloc ity higher than that of the PE-4's 8,500 mps.In the past Semtex was odourless, which made it difficult to detect usingthe norm al type o f explosive detec tion systems. In recent years, however,the manufacturers have introduced a trace element, making it easier todetect and enabling it to be traced forensically.

    The explosive first entered the terrorist chain during the 1970s whenSemtex H was used at a training school for rcrrarisrs in rho Crimca by boll1thc Czech intclligcncc scrvicc ,inti rllc. KhII I r~rnrnt f thc~RA ,llznP~IC~IIIII ~~ I il (IIII~II~: IIL~I ( I I ~ I I11 I I I~*~~II~IIII~II~*.\I*I~,I~,I~IIII~V 11wr~ ~ ~ 1121 ,1111 I IIIv/~.~I~II~ I~1A III) I,II IN~(I ~I I~ .I I I I~ I. I I ~I ~~I I I . I I I~~I~I~.1 l ~ ~ ~ ~ ~ t ~ - ) (1 110111 IIIV~I

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    14/18

    METHODS O ENTRY I

    However, successful operations by Irish security forces, who discoveredsome one-and-a-half tons, subsequently reduced the terroristsr stock. Sincethen, the IRA have primarily used Semtex H in the manufacture ofmunitions - such as m ines, mortar bombs and rocket-propelled grenades -~ h i l esing home-made explosives such as ANFO (Ammonium Nitrate-uel Oil) and Re-crystallized Ammonium Nitrate (RAN) - or bombs.NEW EXPLOSIVEA new family of explosives has been developed. The Americans fori~xamp le, ave produced Astrolite A-1-5 th at is the world's most powerFul11on-nuclear explosive. It is extremely safe t o handle and offers av~r sat ility o t available from conventional hydrocarbon explosives.4strolite was discovered during research into rocket propellant during the1960s, when ammonium nitrate was mixed with anhydrous hydrazine.Illis produces Astrolite G, but, when a fine alum inium powder is added, itorlns Astrolite A-1-5. I t is reported that th is liqu id high explos ive can be.,llcly sprayed from aircraft, and, upon contact, soaks into top soil to aIvpth of a few centimetres. With a life of only four days, it is reputedly~lldctectable, xcept by chemical agent sensors, and can subsequently beIvlonated remotely by personnel who are equipped with the necessary~lllin tion evice.

    is also believed that the Chinese have developed a new form of highanl~losive. wo British radical Muslims carried out a suicide bomb attack on

    l11h n Tel Aviv, resu lting in the deaths of three people and leav ing 50~l l lc~rsnjured. One of the suicide bom bers managed to escape, but no t111lorc e left behind an amount of explosive. Upon investigation, the Israeli111,11vstsoncluded that the explosive came from a leading Chinesevcl)loqives manufacturer. The explosive was constructed of a newI I I I I I ~ ~ L I ~ ~ ,hich was both odourless and lightweight. It is believed that

    tI1I.. 11c.w explos ive is also able to pass through a irport X-ray machinesw l l l ~ o l ~ leing detected.NNERAL SAFETY RULESIII JI~I(*I,II,iodc rn explosives are vety safe to handle, but certain. I I~~I~II~II( I~,11o111dilwilv~ e in place. For example, charges should beIIIIIIIIIII~~IIIOIIII Il i o~~ i \ r II ~ ~ ~ o ~ i , i ~ i ~ l ~ord (l li rco knots ~ q ~ l i l llclctonato r) as1l11* I O V I ~ I ~ ~ * ,I IIIIIOI III~IIPI ~. III\IVII,II~ /I~ .~Ia.o ~l Io w~ ,I ~ cq cnl In lii;lk(\1 1 1 1 I I I I~ I~,III~I IIIIIII~II~I11 III~II~~I".,IIIII 1 I~I I I I I~~I01~11111 11 IIIII 1 1 1 ~ 1 i t l

    without the use of a detonator. The detonator is only applied at the lastmoment when the initiation set is attached.

    One safety measure is to use knotted detonation cord instead of a detonatorExplosives

    b No smok ing when using explosives.Training stores should not be mixed with live explosives.L i e detonators should not be in close proximity to explosives.

    b Explosive should not be tamped with metal instruments.The minimum amount of personnel on-site when connectingdetonators to explosives.

    Detonating Cord Safety Rulesb Sharp curves should be avoided when constructing long runs.b Detonating cords should only cross at junctions.b Long suspended sections should be avoided.

    A 15 cm tail should always be left.The minimum distance between each charge and the mainline should be 50 cm.Thc andc of c h a p should be at lean 90 degrees to the main line.

    b W.l~r\rprool ,iil rinds z l ~ o ~ ~ l r le ~rc;erj'ifIIC cli,irf es nro in(?Id( 01 ,111V I i ~ l l ~~ l I 1r 11111~\

    l k

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    15/18

    etonatorsDetonators should be kep t away from the explosive until theinitiation is required.

    b Detonators should be kept away from heat sources.b ,The wires from electrical detonators can be short circuited by

    twisting them together.b Initiation set can be prepared prior to marrying it with explosives.b Knotted detonating cord (three knots) can be used in make-

    up charges.Conventional explosive is a solid carbon-based or liquid substance which,

    when stimulated at the correct speed (through the use of a detonator),converts almost entirely to gases of both intense pressure and temperature.

    Explosives are divided into two forms, low and high. Low explosive isignited by a flame and the resulting explosion is a rapid burn that formscombustion. Low explosives contain their own oxygen, so the burning isextremely quick and produces stable gases of high temperature and highpressure. While low explosive provides gases that have a pushing or liftingeffect, they are not normally capable of cutting steel. One example of a lowexplosive is gunpowder.

    High explosive generally has a detonating speed in excess of 8,000metres per second, mak ing the base substance very stable. This substancemust be detonated. Detonation involves the almost-instantaneousdecomposition of the compounds that make up the explosive. This processis started by an initial shock and the effect is twofold. A small detonator isfired to produce a shock wave that travels outwards from the point o finitiation through the explosive and into the target. This shock wave impartsan energy that is strong enough to cut steel. This is followed by the gases,which achieve intense temperatures and the pressure to provide the push.The power of an explosive is expressed by the rate at which it detonates -it is called detonating velocity.

    One important aspect of both high and low explosives is the tam pingI effect. Tamping simply involves containing the gases and allowing them toI build to the po int where they must break out. The better the tampinp; the

    hcrtcr rhc cffccr. A normal firework, for rxamplc , cxplo clc~will1 locrd h n ~ i ~1111tli r 1 1 ~./IIIII~V I)IIIII

    The secret of a good explosives expert is knowing where to place the charges.When detonation occurs, the gases will escape via the least line of

    resistance away from the direction of initiation. Various materials can beused for tamping - water, clay or sandbags are all good examples.

    An agent or a Special Forces team may be required to attack any numbcrof different targets - railway lines, oil refineries or, as in recent years, adrugs warehouse. Every target presents different problems, andcircumstances will often govern the chosen method of attack If time isrequired for a getaway, concealment of the charges is critical, and th is maytake precedence over the best place in which to position them. For thisreason, complicated formulas have been worked out in order to obtain thcbest results.

    Despite the number of different formulas for cu tting steel, concrete andwooden targets, the one overriding factor when it comes to all explosives in.the formula " P for plenty. It is a phrase that is w idely used during the SA5dem olition course. An SAS soldier wi ll have to learn many technicalformulae in order to apply the right amount of cxploqivc to a particular tyl31,of explosive target. The P for plclily I,IIor It II'.I~II 11) (\TI on the ~ a f riclv

    A ~ i o l l i ~ r>a%ic imipc)rirvit II*.o~Il l I*)~)I I I~.I \ I I~~~,. IIII* 111,1111i1i11i1f It lon~olilio~v.. t l l I I ~ , lrii lI11k.. 111 + 1 I .I c~:. M11v.lI.II, ~II~,11,11 IIV~IJIIC'r l l . t l 11 c.)clrlo-.iv~~II~I~II1, I~II 1 1 1 1 1 1 I I I~I I IV I I I~II~II~II I111 .II~IIII..I IIII~,III

    . - ...-Ill

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    16/18

    m MmO S O ENTRY

    lime and in order to achieve this, a ring of detonating cord is passed fromthe initiator around every charge and back again to the initiator. This iscalled the "ring main". The shock waves the n travel both ways; if one e nd.filiould ail, the other wi ll detonate the charges.

    Illr(lnts h t require several charges can all be connected by a ringmain. This allows al l11111charges to go off at the same time.MW, formula explosives need to be p laced in a certain shape and placedIIII~ .II the target. With steel beams, it is a simple matter of covering every

    IIII .I~( I f the "I" beam. When it comes to cutting round metal, the~ . ~ ~ ~ l l ~ ~ . . i v charge may be halved and shaped into a saddle or a diamond,III I I~,II(I shear effect.

    Wllil11all precise explosive charges are formed into a shape, the actual11.1lr1vlharge itself normally refers to an inverted cone-shaped explosive

    1 I I ~ I I I ~ I ~11~rinciple behind the charge is based on the inversion of shockt l . l \ l18 . . cllitr rhc explosive has been initiated; this forms the explosive force1 1 1 1 1 I II ~ ~ i t l p o i ~ i lutting charge which, due to its standoff, can penetrate thick

    1 t s 1 ~ 1 A . . l~,~l,c~lliar~c?an be found in mo st anti-tank missiles, but it is11 I I -.III r l~ l~ in lemolitions for depth penetration.llnMr CHARGEIFLEXIBLE CUTTING CHARGE

    on a wooden frame to which a metal-cased explosive was attached, thesimple aim was to blow a ho le through a wall. The size of the framedepended on the area that was to be blown, and the amount of explosiveused depended on the thickness of the wall. The early frame charge hassince been developed by Royal Ordnance into a cutting explosive known as"Blade". This is a linear-shaped charge made from DEMIEX 200 an EDX-based plastic explosive that detonates in excess of 2500 metres persecond. Internally, copper produces a shaped charge jet that, on initiationby an L2AIlLIA1 detonator, cuts with fine precision. Blade is fitted with aself-adhesive strip so that it can be attached to the target. The charge iscovered by a sheath o f close-cell foam. Blade comes in five differentweights and thicknesses, each of which can be cut w ith a knife andtailored to a design of cutting charge. Blade can be incorporated into aconventional explosive ring-main with charges linked together withdetonating cord for simultaneous detonation.

    7 1 1 1 wlll t r l11811 III\III~WI* 11111111: 1111o111 11I ~ ( ~ i t ~ l o t (v1OOOI; l wlnrlow or n I i ~ ~ ~ ~ ~ ~ ~lr l l II~~I:IIIIIIII1rl1111nlvf1l ~ c l ~R n I~III~III:~IIIIOII 11lr:ll III t l ~ ~ r ~ l g ~ ~ ~ ~ r l(1 1 1 1 1111 IIII.., ,111 I~)([I III~.IVI*1 1 1 1 ~ 1 ~ I,III:I~ Is. ~ f v l lt i t l~ ~ lIII III~IIIV III*VI~IIIJII*II III 11111 IIW

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    17/18

  • 8/13/2019 04. Cap 4 - Mtodos de Entrada - Vulnerado de Barreras

    18/18

    IMPROVISED EXPLOSIVESFortunately for an agent, military explosive can be purchased from manycountries and its commercial equivalent can be found in any quarry aroundthe world. In most countries, there are laws to control explosives. However,these are enforced ' more through safe ty than for any other reason. Inaddition, high explosive is extremely simple to make, with many N storesand supermarkets stocking the basic ingredients.

    Even when no explosive is available, combustible material, such asgasoline, is always accessible and one gallon of gasoline has the blastpower of seven pounds of high explosive when detonated. The use offertilizer and diesel oil could make up the bulk of a bomb which, in order toachieve the required detonation speed, could then be in itiated bycommercial explosive. The secret to making any explosive is having a basicunderstanding of chemicals and chemistry.When attached to a friendly guerrilla or revolutionary unit, agents andSpecial Forces units are sometimes required to carry out demolitions workwithout the use of military explosives. Training friendly forces in anothercountry often involves teaching them the basics of improvised explosives. Agood example of this w as w hen American agents trained Al Quaedasoldiers during the Russian invasion of Afghanistan.

    Although it is possible to construct a detonator, as a rule, improvised highexplosive mixes require a commercial detonator in order to make them work

    To this end, mos t terrorist organisations use a booster for the improvised .mix. Without the booster, there is a very good chance that the home-madeexplosives will not detonate due to the crude method of its construction.

    CACHEWhen working in a foreign country, t is not always possible for theintelligence agency to provide the agent with the correct equipment. Toovercome this problem, spies, agents and covert operators are oftenguided to an existing cache in order to retrieve supplies such asammunition, weapons or explosives. Caches were widely used by theOSS and the SOE during the Second World War, thus all ow ing agents tocarry out prolonged operations. Modern caches are housed in purpose-built, watertight containers, which can be hidden for years. They aregenerally deployed during times of peace or when the opportunity arises.During the first Gulf War, hundreds of caches were pla nted in Iraq, bothby the United States and th e British. These secret locations are thencarefully recorded. Traditionally, however, cache reports are no torious lypoor and even if they are well documented, the cache usually evadesthe seeker.Note: explosives are dangerous and should only be used and created byexperts. In most instances the use of explosives by members of'the publicis illegal.