07. cap 7 - sabotaje

Upload: adrian-von-folkersam

Post on 04-Jun-2018

226 views

Category:

Documents


3 download

TRANSCRIPT

  • 8/13/2019 07. Cap 7 - Sabotaje

    1/10

    CHAPTER

    Sabotage can be a necessary evil thatmay pave the way for resistance and

    the deterioration of government

  • 8/13/2019 07. Cap 7 - Sabotaje

    2/10

    Sabotage can be carried out by any member of an intelligence agency. It can be a single act carried out byan agent or it can involve the destruction of major facilities by Special Forces. Operations that requiredemolitions or sabotage are commonly known as bang-and-burn operations. Although not alwaysnecessary, the use of explosives increases the effectiveness of sabotage, and, providing the user has the- '-lagination and training, almost anything is possible.Many sabotage techniques have been gleaned from low-inte nsity wars,where guerillas have been forced to improvise in order to defeat anorganized and we ll-equipped army. If manufactured landmines were~rnavailable,he guerillas would make "punji pits". While these punji pitslacked the power of a landmine, anyone stepping onto the sharpened#,pikeswou ld s till be hospitalized, as many an American soldier discovered(luring he Vietnam War.

    Sabotage was used very effectively by the French Resistance during the'ic.cond World War. The felling of telephone po les and the plac ing of sugar111 sand in fuel tanks were just a few of the tricks used by the Resistance.Ihoy also discovered that ad ding carborundum powder to the axle greaseof rrench trains soon brought the German's supply system to a halt.Nonetheless, most of the damage was achieved by the use of explosives.Illis allowed them to destroy bridges and railway lines, as well as blowing

    11 lroop conveys.I inding and recru iting people to carly out sabotage depends on the

    lrltlividual situation. If a county is in rebellion and if Special Forces111v.onnel re assisting the guerrillas with training, it is o ften best to get~vi l i~lnso carry out small, non-explosive acts of sabotage. Students are~ l ~ ~ ~ l i c t r l a r l yood for this. With a few exceptions, the students of most

    I ~I I I I I I I~PS arc at odds with the government over one issue or another; it is6.1111l1ly mattcr of infiltration and organ ization to get them to work. The111-.I ~r~c>tl int l\ l o usr an af cnt who is compatible with rhe srudcntII.III*III~I~111do 1,lr.k t I ic~111will1 tl(.lininf rhc militant elem rnl$ w it l~ ir ~Ir18..I,IIII III llov lvl llsl ll 011, 1111.. I . (IIIIIII, il : . .IIIBII~1 111.11tc11 111 01~ .111111111 :

    111111'111 11111'. I11111wl1I11 ):111~111Il~l'.,111 Ill' l111111.111~11 0111 1) 1111 1~11111.1.111 lilt*

    ball rolling, the riot will be self-perpetuating. The government will reactpredictably with over-zealous violence that will lead to an escalation of theriots and the use of petrol bombs etc.TRUE STORYAt 8.37 pm on 28 December 1968, several helicopters loaded withparatroopers took off - heir destination was Beirut airport. s BeirutInternational Airport is situated to the south of the city some threekilometres from the sea, an d is approximately 90 kms (55 Miles) north ofthe Israeli-Lebanon border, the flying time was estimated at 45 minutes. In1968, the airport comprised of two runways crisscrossing in scissor-likefashion, in a no rth-south direction. The passenger terminal lay b etween thetwo lanes and there was an open area in front of it. Hangars and parkingand maintenance areas for the planes were at the north-eastern and south-western edges of the runways. South of the terminal was the standbyemergency services pavilion of the airport, where fire and fim -aid stationswere located.

    Each of the helicopters carried a team of highly trained explosive experts;their objective was to destroy as many civilian aircraft as possible. Securityfor the airport consisted of some 90 security men, armed m ainly withhandguns. Back-up for a real emergency came from a Lebanese Armycommando company situated some three kilometres away. Extra help was,iI.;n av;lililblc from the police in Beiru t city, but it would take them aIIIIIIIII~IIIII of 10 1nili11 tr5 rcacli th r airport.

    1111*G ~ l ~ ~ ~.1'. 10 (o111ro111111, 011 (l111y. I~I I I~I~llir111*.111d Oolrl 111(111mlll11~~1 1 1 - 111111' 111 1111 l11lIll~11y11111 ~111111. WI~IIIII Il l ' (1 1l' v1 ~o ll~ ~I111111

  • 8/13/2019 07. Cap 7 - Sabotaje

    3/10

    SABOTAGE

    approaching the airport by the helicopters, which, once they had depositedthe soldiers on the aidield, would proceed to the approach roads, wherethey would drop nails and smoke. Several military vehicles tried to forcetheir way through this barrier, only to be fired on by the helicopters.

    As serious resistance was kept at bay, the disembarked troops set aboutfixing explosive devices to the aircraft parked on the airfield. Intermittentgunfire could be heard throughout the airfield, much of w hich were wa rningshots to frighten away the civilian maintenance workers. A total of 14planes mos tly belong ing to Mid dle East Airlines (MEN were destroyedat an estimated cost of $42 million. Those responsible for this assault oract of terrorism, as t was claimed by many Western governments at thetime) were the Israeli military. This was their retaliation for an assault byPFLP on an El AL aircraft at Athens airport earlier in the year.

    SABOTAGE TECHNIQUES(AS F E A ~ ~N THECIAHANDBOOK)Note: These acts are all used by spies. As they are illegal acts, however,they should not be used by civilians.Felling Trees in Road: Felling a large tree in the right place can cause long

    I . Rocks or troos on tlio rond nro offoclivo.

    A Potato up .the Exhaust: A potato rammed into an exhaust will stopany vehicle after a few metres.

    Sand or Sugar in Fuel: Placing sugar or sand in the fuel tank will stop avehicle, although it will not do too much damage to the engine.

    Sand or sugar in a petrol tank will kill a car.Tyre traps: Old nails, twisted in such a manner that they fall spike up

    when d ropped onto the ground (known as jacks ), are ideal for bunting avehicle's tyres. well-planned ambush site can stop a military convoy hejacks are placed at night by the spy.

  • 8/13/2019 07. Cap 7 - Sabotaje

    4/10

    Create Waste a nd Drain Capital: In guerrilla warfare, locals can helpthe spy by drain ing the government's resources: leaving taps running,smashing and bur sting water pipes, brin ging down telep hone lines,knocking out the local electricity substations, burnin g vehicles in thestreet, creating no-go areas for government troops etc.

    i v i l insurrection.

    ?~R can cut malnand exchange telephone lines.

    Telephone lines can be pulled down by the spy with a makeshift hook.

    SPECI LIST S BOT GE MISSIONSSpecialist sabotage missions normally take place in a war situation, withthe in tention to h it the enemy's war production capacity. Weapons andammunitions factories, power stations, railroads, and MSR (Main SupplyRoutes) are prime targets. In order to ensure that the enemy facility iscompletely destroyed, a g ood knowledge of explosives and their placementis required. For example, the destruction of an enemy oil refinery thatoccupies a square kilometre plot may seem like an impossible task For awell-tra ined Special Forces team, however, it is relatively easy.

    A reconnaissance would take place during which the team wou ld lo ok forthe Horton Sphere; this is a huge metal ball that can be found in every oilrefinery. Once the sphere has been located, it is a simple matter of fixingtwo charges: the first is a basic, high-explosive cutting charge, and thesecond is an incendiary. The Horton Sphere contains thousands of litres ofliquid gas and the idea is to utilize this by converting it into a bomb. Thecutting charge punches a hole tha t releases the gas; an ins tant later, theincendiary ignites the gas. If this is done correctly there would be little leftof the oil refinery, as the Horton Sphere would take out evelything within asquare mile with no difficulty.

    T ~ l c p h o n ~ommunications also play a major role in any conflict. WhileIIII~ ~l i l i l , l ryill hnvc Ihoir own radios, thc civilian popirlation rcly totally1111 tt II~IIUII~.Y'. I~I~Il l i ~ i i ,~k [ r * .'1 Ii i j j l l prio~ilvallf cl . ie. 1ri1(11 1n11,111111 II'II'(IIII~III' I'l(1 1.1111 1". 111 I l l ' l I l~.. l loyl+~l1 ~/11),lll*11111111~111Ill", I11 1111~

  • 8/13/2019 07. Cap 7 - Sabotaje

    5/10

    SABOTAGE

    fact that the sabotage team has to guarantee that all the computerframes inside the exchange are destroyed. Even if only one is left intact,the engineers can quickly lash up an emergency service. One unique wayof knocking out a telephone exchange is to destroy the ringingequipment. On older systems, these are two small generators; on newerones, the sounds are created by computers and all that is necessary is tolocate and destroy them. While the telephon e system may remain intact,no one knows that there is a call. Both of the above examples are typicalof specialist sabotage.

    BOOBY TRAPSExplosive booby traps are used extensively by both Special Forcesand gu errillas in order to create panic and disorder among the enemy.They range from complicated manufactured devices to the plainopportunist variety. They can be triggered by pull, pressure, pressurerelease, trip, contact, motion sensor and heat. In many cases, boobytraps are designed not to kill but to maim, thus placing an extra strainon the enemy s logistics. Most booby traps require some form oftriggering device; these are best kept simple, as the followingexamples will demonstrate.

    A pressure plate switch can be made from a catering-size can ofbaked beans or a similar product which can be found in the garbagebins of any hotel. The top and the bottom lids are removed by the spyusing a can opener. On a flat wood en surface, u sing a hammer and alarge nail, the entire surface of both is punctured with holes. A wire isfixed to each of the lids, and then one of the lids is wrapped in clingfilm

    wo layers are enough. Finally, both o f the lids are placed together,with the serrated edges are facing each other. The clingfilm will stopmoisture contact and prevent the plates from touching. This is placed onthe ground and covered by a small amount of soil for camouflage. Whensomeone steps on the plates, the pressure causes the serrated edges ofthe punched holes to penetrate the cling film and create a contact.

    cigarette is often as a timer for ig niting the fuse. The cigarette wil l burnslowly enough to provide anything between a one- and ten-m inute delay.The cigarette is simply attached tdlthe fuse t the requircd position. AsmGcr c i ~ a r c l l ~ %rnolrlclcr, ralllcr lh,h h~rrn, Inli ll (11 wil l I ~ PI I I O ~ ( ~ I>y h ~.. \V, ll b.ll 0 1111\ )lo1111 1 ) 1 11 11iIl~111

    STRING

    A cigarette timer is one of the oldest methods of making a delayed fuse.

    Book matches can be converted into a delayed fuse or used as a fric tion fuse igniter.A book of matches can also be used by the spy as pull-switch igniter?.

    strip of striking board is placed over the match heads and a piece of tripwire is attached in the path of the inlr~rrlcr

    Onr of tl r qimplc~t ricf:~r

  • 8/13/2019 07. Cap 7 - Sabotaje

    6/10

    SABOTAGE

    THROUGH ELECTRIC METALCONTACT

    \ METALCONTACT

    Tho common clothes peg offers the e xplosive expert the means of cons tructing a veryi~fhctivemeans of initiation. A string has been attached to a plastic spoon, which whenI1l11pcdwill allow the peg to close and cause a circuit t o form. When the weight is liftedIIII peg will close and cause a circuit to form.

    11~1-.ilye adapted for sabotage by the spy. A simple magnetic door orwlllrlow rnagnctic contact can quickly be wired into a booby-trapped room.

    11111 Ili f:~ cr or lcttcr bomb can be made from any musical birthday orIIII*.III~~I~.old. TICW arc found in m ost card shops and are purpose-mndc

    1111 11 Irh I,y IIIII .py III(~li111,ii m~rhnn ismq r~ pln cr d i th t l~lon;llor ilirl- 1 1111111 .111101111l 111 I~)((,IO'.IVI~

    II 4 This musical chimefrom a birthday cardcan be improvised omake a letter bomb.

    BARED ENDS CIRCUIT WIRES

    METAL DISK

    DRIED BEANS PEASNTlLS OR OTHER SEEDS

    -When water is poured over dried vegetables it causes them to expand; this can be used tcreate a delayed action igniter.

    A makeshift timer can be constructed out of a tin and some dried beans,peas or lentils. Timers can be made by irst placing the dried vegetables ina jar, adding a set amount of water and wa iting to see how much theyswe ll over a given time span. Once the expansion rate of the driedvcgctahl~ss established, it is a simple m attrr of wirinp; everything up.

    IL1t l ln co~i l~ol l~r loys offer llir ZPY Illc posr,iOility of wirclcw corilroll~cl~ ' ) ( ~ l l 1 1 ~ . 1 1 1 1 1 ~ .111* 11'11~l~l~l. 01110~1'fI10111111( I O V 111(1 1 l 1 1 b WI~I~*,11~11~011110I

  • 8/13/2019 07. Cap 7 - Sabotaje

    7/10

    the drive motor are used to fire the detonator in the explosive. One of theways an agent will use such a device is to place both the receiver andexplosives on the target's car and then hide the transmitter by the side ofthe road, on a sharp bend - a steep drop, bridges and tunne ls providefurther opportunities. The transmitter will be wired so that it is permanentlyon and provided that there is a good battery supply and i f the timing isright, when the target passes the chosen point, the explosive will not onlydestroy the car, but will also send it off the road. By this time, the agentcan be many miles away.

    Modem anti personnel mines are highly sophisticated.

    ANTI PERSONNEL MINESWhen operating in the field, especially in a war zone, it is always a goodidea for any agent to have a w orking knowledge o f mines. Mines areextremely dangerous and for the most part they are placed byinexperienced people who make no record of their location - he end resultis often the loss of innocent life. In an emergency, however, they canprovide a good defence or delaying tactic. While there are many forms ofmine available, the agent is only required to concentrate on one type, theanli-prrsonnel mine. If rhc aficnt is bring phrq\rcd for any reawn, cirhcr anloo^ ol ilr vc~liirlc, II(~,,rc\l~ll l,icctmc\rrl nll.11111 c~ ~ ~ .r l~ i~ lc \lI~~IIII~, ill *,lowilIlwll # l I l V ,,I lll lll Ill i l l 1 6 ,111

    track They are activated by any number of means, from straightfowardpressure, to trip, pull, movement and vibration. Some mines can be set todisarm after a given period.

    The highly effective Claymore can be set up and removed many times. It is lethal.The American-made Claymore mine is still widely used by many

    countries. It can be used by the agent to form a perFect perimeter defenceor to ambush the enemy. The mine is easily deployed and, if no t used,can be quickly disarmed for re-use at a later date. The mine itself is amoulded plastic case measuring some Z cm high by 20 cm wide. Thewhole case is slightly cutved with the words "Front Towards Enemy"embossed on the crest face. The mine is packed with a solid explosive intowhich thousands of small ball bearings are set. The base of the mine hastwo sets of spiked legs that can be adjusted for angle; the top containstwo screw-cap detonator wells. The mine is exploded by commanddetonation, w hen a half-wave, hnntlhclrl I:rnc>r,ilnl ic drprcsscd. One in livemines contains a r r~ ti nf i rvicr 11 .IIIIWr ~ l ~ l l ~ l l l l ~ yllolif: t h ~nni~~inriclwirct. Tlic\ w li nl r niinr., in rll ~t lir il 1111 wll ll .IIIII I~I*IIIII~IIOI,l 11o111,i\O11 I111111 @I

  • 8/13/2019 07. Cap 7 - Sabotaje

    8/10

    SABOTAGE

    A-TYPE AMBUSHAn "A-Type" ambush is a series of unmanned explosive devices that are setup and left for the enemy to walk into. The explosive can vary from WP(white phosphorus) to hand grenades and Claymore mines, all linked bydetonating cord into a single triggering device. They are mainly used on setroutes used by the enemy for ferrying weapons. A-Type ambushes were laidby the American forces in Vietnam an d by th e British SAS during Borneooperations and during the Oman War. They are always clearly recorded andare removed if they have not been triggered.

    LASER TARGET DESIGNATORThis device is at the top end of sabotage and is only generally used bySpecial Forces or agents to destroy large targets..The development o f thelaser target designator enables the operator to "paint" a target so that anaircraft or a missile can destroy it. This eliminates the need to exposeyourself on the target, and thus avoids compromise. The unit looks like alarge pair of box-shaped binoculars and weighs less than six kilograms, yetit enables an agent to destroy a target from a considerable distance. Laserlarget designators allow agents to deliver airborne ordnance - such asPaveway or Pavetack Laser-Guided Bombs (LGBs) - onto ground targets witha high degree of accuracy. The agent will move into a position where he has,in unobstructed view of the target. Once the sight has acquired the target,llie agent can either call for an immediate air strike or he can programmelie designator to activate at a predetermined time. The pilot will release his

    ordnance once the signal has been "locked", this can be up to 20 kilometresI miles) from the target. Provided that the laser target designator continues

    I r r paint the target, the ordnance simply homes in on the signal.

    SPECIAL ATOMIC DEMOLITION MUNITIONSSADM)The Special Atomic Demolition Munitions was a nuclear landmine with ayield of b etween one and 15 kilotons. It was designed primarily fordeployment behind enemy lines and to destroy harbours, airfields, bridges,dams - or to effectively disrupt enemy troop movements. The complete unit(including the wa rhead) weighed less than 200 kgs and was deployedbetween 1965 and 1986. Delivery was normally by a specialist two-manteam w ho w ould place the weapon package in an acceptable location.They would then set the timer and make good their escape. The timerdelay could be set between one and twenty-four hours. For this reason, theinsertion teams some of which were parachute-trained- practisedplacement and retrieval procedures extensively. Most of the deploymentstook place in the former Soviet Union or in Europe.

    Special atomic munitions look deceptively simple.The SADM used a gun-type principle, whereby two sub-critical masses of

    U-238 were fired through a precisely machined "doughnut" of uranium. Themino used a mechanical permissive action link to prevent unauthorizedr l ~ ~ ~ o ~ ~ , ~ l i o r i .l i ~asic philosophy behind thc SADM programme was to,III,IIII ~ ) ~ c ~ r I ~ ~ l ~ * ~ l ~ ~ i l ~ r ~ r l,II.~ cI~, Ihnr thc LJ5Ar plnnrs wcrc. trn,ihlc 1 r i~ch.

    I l~ r .. l ~ ~ - . ~ a l . ~ ~ ~ ~ .11i(11 1 b l ~ i ~ i e ~ . ~ ~l o i r l llc*il ow11 ,AI)M I,Io~ I,II~III~(~.,inrlII I. \fllll l d ~ I~III~VI'II11,I 1111 l#1l11'~1.Ill11111t1.

  • 8/13/2019 07. Cap 7 - Sabotaje

    9/10

  • 8/13/2019 07. Cap 7 - Sabotaje

    10/10

    girlfriend can now be done with a few strokes of the keyboard. Billions ofemails a week speed up conversation, save telephone charges and enableus to comm unicate rapidly around the world. This is why th e lnternet andemail were designed. Unfortunately, the price we must pay for this serviceis high, not in monetary cost, b ut in the way in which both the lnternet andemail can be abused.

    The lnternet offers unlimited facilities to the saboteur: the knowledge onhow to make home-made explosives or how to construct a bomb and anyamount of information on a p otential target. Email can be encrypted in sucha way that no government agency can crack the code, thus allowin gterrorist organizations secure communications on a worldwide basis. Thesame system a llows them to contact other groups and to prepare jointoperations. Business and bank accounts can be established over thelnternet which provide money for weaponry and operations; if doneproperly, almost all these activities are untraceable.

    I here is a perceivable threat from bio-terrorism, as both extremist na tions,ind terrorist organizations have access to the skills required to cultivatesome of the most dangerous pathogens and to deploy them as agents in~ c t s f terror. In 1995, the Japanese cult, Aum Shinrikyo, released the nerve:,is Sarin in the Tokyo subway. The Sarin had been manufactured by the

    llt s wn chemists. Members of this group are also kn own to havet~,lvelledo Zaire in 1992 to obtain samples of the Ebola virus. However,rllct main causes of concern are anthrax and smallpox.

    Anthrax is an organism that is easy to produce in large quantity and is~*xllomelytable in its dried form. The effect of aerosolized anthrax onl111111,inss highly lethal. In 1979, an anthrax epidemic broke out insv~~rtllovskn the Soviet Union. Sverdlovsk was also the home of a militarylllr~ capons facility. Some 66 people died, all of who lived within fourEIIIIIII~~I~PSf the facility. Sheep and cattle also died along the same win d,l~tl*.,,ornc as far away as 50 km. Anthrax also reared its head shortly after1111 )/ I1 altncks in the United States. A strange white powder wasI IIIII I*, I I I~/n ~li(hnail system that was later confirmed as weapons ~ylntlv.IIII~II.IX ,,.I*. I cbr.1111 I(>V(.I.I~ p(toplc IC~P con la miniitcrl .11r1. o ~ ~ ~ ~ tW(*II1 1 1 1 1 1 ~IIIWI~VI*I,~VI*II ,IIII~II,IH -.Ii1)*. ~ i to ~ l * , / ~ : l ~ i l i ~ , ~ ~ l ( ( ~II(\IIOIII~),III~~I11~I~~.I~F)F ~ I .~. I I I.I., ~.1i1,1111)o~

    4 th e effectiveness of explosive sabotagefades into insignificance when com paredto bio-terrorism.

    Smallpox is caused by a virus spread from person to person; thoseinfected develop a characteristic fever and rash. After an incubation period often to 12 days, the patient has high fever and pain. Then a rash begins, withsmall papules developing into pustules on days seven to eight and finallychanging to scabs around day 12. Between 25 and 30 per cent of allunvaccinated patien ts die of the disease. The terrorist poten tial ofaerosolized smallpox is demonstrated by the outbreak in Germany in 1970.A German who had been working in Pakistan became ill with high fever anddianhoea. He was admitted to a local hospital on the 11Januarywhere hewas isolated due to the fact that they thought he might have typhoid fever.Three days later, a rash appeared and by 16 Januaryhe was diagnosed withsmallpox. He was immediately transported to one of Germany s specialisolation hospitals, and more than 100,000 persons were sw iftly vaccinated.However, the smallpox patient had had a cough and the coughing acted asa large-volume, small-particle aerosol. Consequently, 19 cases of smallpoxoccurred in the hospital resulting in the death of one of the cases.

    Two years later, in February 1972, a similar outbreak went undetected inthe former country o f Yugoslavia. It was four weeks before a correctdiagnosis was discovered, by which time the original carrier had alreadytlictl. Twcnty million people were vaccinated. Some 10,000 people spent..IQVI*I,IIwiv>k . ll isolation, wliile n cif:hho~lrinf:cnlrntrics closctl rhcirI I I I I ~ ~ ~ Q I * .lv 11111 I / I ~ I ~ *110 ~./III~II~IIII.I-, IIIIIII~I tnntrol, I/ , [ r a ~ l i c * ~ ~ t o b1,ltl1 1 1 1 1 1 1 . 1 1 11~ 11 .111.1ll)111~(,111lI l i l l.l l l l l l l l l