st31 - 201 (1978) PDF
st31 - 201 (1978) PDF
st31 - 201 (1978) PDF
SPECIAL FORCES
OPERATIONS
US ARMY
JOHN F. KENNEDY
SPECIAL WARFARE CENTER
NOVEMBER 1978
ST 31-201
CONTENTS
CHAPTER 1. INTRODUCTION
1-1. PURPOSE AND SCOPE 1-1
1-2. RECOMMENDATIONS 1-1
CHAPTER 2. INTELLIGENCE AND SECURITY
Section I. INTRODUCTION 2-1
2-1. GENERAL 2-1
2-2. INTELLIGENCE CONSIDERATIONS IN AN
UNCONVENTIONAL WARFARE OPERATIONAL AREA (UWOA) 2-1
Section II. AREA STUDY/AREA INTELLIGENCE/AREA ASSESS
MENT 2-2
2-3. GENERAL 2-2
2-4. AREA STUDY 2-2
Source of Information 2-2
Preparation 2-2
Preparation by Operational Detachments 2-3
2-5. OPERATIONAL AREA INTELLIGENCE AND BRIEFBACK 2-3
Operational Area Intelligence Study 2-3
The "Asset" 2-4
Briefback 2-4
Briefback Guide 2-5
Training Aids 2-5
2-6. AREA ASSESSMENT 2-5
Section III.INTELLIGENCE PRODUCTION WITHIN THE UWOA 2-6
2-7. GENERAL 2-6
2-8. INTELLIGENCE INFORMATION COLLECTION 2-6
2-9. INTELLIGENCE REQUIREMENTS 2-7
Internal Operations 2-7
Higher Headquarters 2-7
Section IV. COUNTERINTELLIGENCE WITHIN THE UWOA 2-7
2-10. GENERAL 2-7
2-11. COUNTERINTELLIGENCE CONSIDERATIONS 2-8
Screening of Personnel and Potential
Recruits 2-8
Surveillance of the Local Populace 2-8
Penetration of Enemy Intelligence
Systems 2-8
Internal Security 2-8
Operational Security 2-8
i
Section V. TACTICAL SECURITY WITHIN THE UWOA 2-9
2-12. GENERAL 2-9
2-13. PRINCIPLES 2-9
Security System 2-9
Inner security zone 2-9
Outer security zone 2-11
Dispersion and Tactical Security 2-11
Mobility of Units and Installations 2-12
Camouflage, Cover, and Deception 2-12
March Security 2-12
CHAPTER 3. PSYCHOLOGICAL OPERATIONS (PSYOP)
Section I. INTRODUCTION 3-1
3-1. GENERAL 3-1
3-2. COORDINATION OF PSYCHOLOGICAL OPERATIONS 3-1
Section II. TARGET AUDIENCE 3-2
3-3. TYPES OF TARGET AUDIENCES 3-2
Enemy Military Forces 3-2
Persons Sympathetic to the Enemy 3-2
The Uncommitted 3-3
Persons Sympathetic to the Resistance
Movement 3-3
Section III.THE MESSAGE 3-3
3-4. MESSAGE DEVELOPMENT 3-3
3-5. MESSAGE FORMS 3-4
3-6. TYPES OF MEDIA 3-4
Radio 3-4
Printed Material 3-4
Symbolic Devices 3-5
Face-to-Face Communications 3-5
Entertainment 3-6
Gifts 3-6
3-7. ASSESSMENT OF EFFECTIVENESS 3-6
3-8. CONSIDERATIONS 3-6
3-9. REFERENCE 3-7
CHAPTER 4. INFILTRATION AND EXFILTRATION
Section I. INFILTRATION 4-1
4-1. GENERAL 4-1
4-2. FACTORS CONSIDERED IN SELECTING METHOD
OF INFILTRATION 4-1
Mission 4-1
Enemy Situation 4-1
Weather 4-1
Topography 4-1
Hydrography 4-1
Training 4-1
Accompanying Equipment/Supplies 4-2
ii
Distance 4-2
4-3. INITIAL ENTRY REPORT 4-2
4-4. AIR INFILTRATION 4-3
Advantages 4-3
Disadvantages 4-3
General 4-3
Specific Considerations 4-4
Drop zone (DZ) selection 4-4
Drop zone identification and
authentication procedures 4-4
Jump procedures 4-5
Blind-Drop Infiltration 4_5
Free-Fall Operations 4-6
Equipment/Supplies/Reception Committee 4-6
Control and Assembly Procedures 4-7
Control procedures 4-7
Assembly procedures 4-7
Emergency Procedures 4-7
Final Ground Procedures 4-7
4-5. WATER INFILTRATION 4-8
Advantages 4-8
Disadvantages 4-8
General 4-8
Considerations for Water Infiltration 4-8
Craft limitations 4-8
Equipment/supplies/reception
committee 4-9
Ship-to-shore movement 4-9
Rehearsals 4-9
4-6. LAND INFILTRATION 4-9
Advantages 4-9
Disadvantages 4-9
General 4-9
Section II. EXFILTRATION 4-10
4-7. GENERAL 4-10
4-8. METHODS 4-10
General 4-10
By Air and Water 4-10
Recovery areas 4-10
Recovery methods 4-11
Recovery times 4-11
By Land 4-11
Section III. INFILTRATION CHECKLIST 4-12
4-9. GENERAL 4-12
4-10. AIR INFILTRATION 4-12
iii
Planning at the Special Forces
Operational Base 4-12
Actions Prior to Drop 4-13
Action on DZ 4-14
4-11. SEA INFILTRATION 4-14
Planning at the SFOB 4-14
Actions Prior to Embarking 4-15
Actions En Route to Operational Area 4-16
Action During Ship-to-Shore Movement 4-16
Action at Landing Site 4-16
4-12. LAND INFILTRATION 4-17
Planning at the SFOB 4-17
Action Prior to Departure 4-18
Action After Departure 4-18
4-13. OTHER CONSIDERATIONS APPLICABLE TO ALL
METHODS OF INFILTRATION 4-19
Contact Plan 4-19
Infiltration and Contact Site 4-19
Movement to Safe Area 4-19
CHAPTER 5. ORGANIZATION AND DEVELOPMENT (BUILDUP) OF THE
UNCONVENTIONAL WARFARE OPERATIONAL AREA
Section I.PLANNING THE INITIAL ORGANIZATION OF THE
UNCONVENTIONAL WARFARE OPERATIONAL AREA 5-1
5-1. GENERAL 5-1
5-2. SELECTION OF OPERATIONAL ELEMENTS 5-1
Character of the Resistance Movement
Within the Area 5-1
Environment and Tactical Situations 5-1
Subdivided "A" Detachment 5-2
Assessment Teams 5-3
Tailoring 5-3
Unilateral Missions 5-3
5-3. COMMAND, CONTROL, AND SUPPORT 5-3
General 5-3
Possible UWOA-SFOB Communications 5-4
Area Command, Control, and Support 5-4
5-4. THE AREA COMMAND 5-5
General 5-5
Composition 5-5
Command group 5-5
Resistance forces 5-5
5-5. SPECIAL FORCES OBJECTIVES IN THE UWOA 5-5
General 5-5
Special Forces-Resistance Force
Relations 5-5
iv
5-6. CONSIDERATIONS IN ESTABLISHING RELATIONS 5-6
5-7. GENERAL AREA ORGANIZATION 5-7
General 5=7
Major Considerations 5-7
Internal Area Organization 5-7
The area complex 5-7
The guerrilla base 5-8
Locations 5-8
Section II. ORGANIZATIONAL DEVELOPMENT OF THE UWOA 5-9
5-8. GENERAL 5-9
5-9. UNIT ORGANIZATION 5-10
General 5-10
Principles of Organizations 5-10
Command and control 5-10
Basic organization 5-10
Size of Units 5-11
Area 5-11
Missions 5-11
Political considerations 5-11
Enemy control 5-11
Available personnel 5-11
Supply and support capability 5-11
Social tradition 5-12
5-10. THE AUXILIARY AND THE UNDERGROUND 5-12
General 5-12
Membership 5_13
Organization 5-13
Method of Operation 5-14
The Underground 5-15
Section III.ORGANIZATION OF RESISTANCE FORCE
SUPPORT SYSTEMS 5-15
5-11. GENERAL 5-15
5-12. CONSIDERATIONS IN ESTABLISHING SUPPORT
FUNCTIONS AND SYSTEMS 5-16
Security and Warning 5-16
Intelligence 5-16
Counterintelligence 5-17
Logistics 5-17
Recruiting 5-17
Psychological Warfare 5-17
Civilian Control 5-17
Evasion and Escape 5-17
Other Missions 5-17
Section IV. ADMINISTRATION, LAW, AND ORDER 5-18
5-13. PLANNING CONSIDERATIONS 5-18
v
5-14. RECORDS AND ADMINISTRATIVE PROCEDURES 5-19
Operation Journal 5-19
Command Structure 5-19
Personnel Roster 5-19
Personnel Records 5-19
Oath of Enlistment 5-20
Casualty Records 5-20
Graves Registration Information 5-20
Medical Records 5-20
Payrolls 5-20
Claims 5-20
Awards and Decorations 5-20
5-15. DISCIPLINE 5-21
Section V. TRAINING OF THE RESISTANCE FORCE 5-22
5-16. GENERAL 5-22
5-17. CHARACTERISTICS OF GUERRILLA TRAINING 5-23
5-18. THE TRAINING PLAN 5-23
General 5-23
Analysis of the Mission 5-24
Analysis of the Local Training Situation 5-24
Essential training to be conducted 5-24
Personnel 5-24
Time 5-24
Training facilities 5-24
Training aids 5-25
System and Organization for Training 5-25
5-19. OPERATIONS TO SUPPORT TRAINING 5-25
CHAPTER 6. AIR OPERATIONS
Section I. GENERAL 6-1
6-1. BASIC CRITERIA IN UNCONVENTIONAL WARFARE 6-1
6-2. TYPES OF AIR OPERATIONS 6-1
6-3. SEQUENCE OF AIR RESUPPLY MISSION 6-2
Operational Element 6-2
SFOB 6-2
Air Support Unit 6-3
Operational Element 6-3
Section II. DROP ZONE SELECTION 6-3
6-4. GENERAL 6-3
6-5. CONSIDERATIONS FOR SELECTING DZ's 6-3
Terrain 6-3
Weather 6-5
Obstacles 6-5
Shape and Size 6-5
Dispersion 6-5
vi
Surfaces6-6
Security6-7
Section III. DROP ZONE REPORTING 6-7
6-6. REPORTS AND MISSION REQUESTS 6-7
6-7. ALTERNATE DROP ZONES 6-9
6-8. MISSION CONFIRMATION FOR AIR DROP 6-9
6-9. AREA DROP ZONE 6-9
Section IV. DROP ZONE MARKING 6-12
6-10. DROP ZONE IDENTIFICATION 6-12
6-11. BEACONS/TRANSPONDERS 6-12
6-12. COMPUTING GROUND RELEASE POINT 6-12
Dispersion 6-12
Wind Drift 6-12
Forward Throw 6-14
High-Velocity and Free-Drop Loads 6-14
6-13. DZ MARKING 6-14
6-14. PLACEMENT OF MARKINGS 6-15
6-15. UNMARKED DROP ZONES 6-16
6-16. DROP ZONE AUTHENTICATION 6-17
Air to Ground 6-17
Ground to Air 6-17
Section V.RECEPTION COMMITTEES 6-17
6-17. GENERAL 6-17
Air to Ground 6-17
Ground to Air 6-18
Marking Party 6-18
Security Party 6-18
Recovery Party 6-19
Transport Party 6-19
6-19. DZ/LZ STERILIZATION 6-19
Section VI. LANDING ZONE OPERATIONS 6-20
6-20. GENERAL 6-20
6-21. SELECTION CRITERIA FOR LANDING ZONES (LZ's) 6-20
Basic Considerations 6-20
Aircraft Limitations 6-20
LZ Requirements- 6-21
Terrain Features 6-21
Weather 6-21
Sizmitations 6-21
LZ Requirements 6-21
Terrain Features 6-21
Weather 6-21
Size 6-21
Surface 6-23
vii
Approach and Takeoff Clearance 6-23
6-22. DIMENSIONS AND LAYOUT 6-23
6-23. CONCEPT OF OPERATIONS 6-26
Section VII. LANDING ZONES (WATER) 6-27
6-24. GENERAL 6-27
Section VIII. LANDING ZONES (ROTARY-WING AIRCRAFT) 6-27
6-25. GENERAL 6-27
6-26. SELECTION CRITERIA 6-28
Surface 6-28
Size 6-28
6-27. DISPLAY AND AUTHENTICATION 6-30
6-28. DIMENSIONS 6-30
6-29. MARKING 6-31
Section IX. MISCELLANEOUS AIR OPERATIONS 6-32
6-30. GENERAL 6-32
Section X. CHECKLIST FOR RECEPTION OPERATIONS
(DZ/LZ/RZ/BLS) 6-32
6-31. GENERAL 6-32
Training 6-32
Conduct of Operations 6-33
Alternate Sites 6-33
CHAPTER 7. COMBAT EMPLOYMENT OF RESISTANCE FORCES
Section I. GENERAL 7-1
7-1. PURPOSE 7-1
7-2. PLANNING 7-2
7-3. GUERRILLA WARFARE MISSIONS 7-3
Section II. MISSIONS TO SUPPORT THE UNIFIED COMMAND 7-4
7-4. TYPE MISSIONS 7_4
7-5. INTERDICTION 7-4
7-6. TYPES OF INTERDICTION OPERATIONS 7-5
Raid 7-5
Ambush 7-5
Mines and Boobytraps 7-5
Sniping 7-6
7-7. TARGET ANALYSIS 7-6
7-8. TARGET SYSTEMS 7-7
7-9. TACTICAL CONTROL MEASURES 7-9
General 7-9
Common Control Measures 7-9
Target assignment 7-10
Zones of action 7-10
Routes of movement 7-10
Mission support site (MSS) 7-10
viii
Other Control Measures 7-10
7-10. INTELLIGENCE 7-10
7-11. PSYCHOLOGICAL OPERATIONS (PSYOP) 7-11
Section III.MISSIONS TO SUPPORT CONVENTIONAL COMBAT
FORCES 7-11
7-12. GENERAL
7-13. OFFENSE 7-11
7-14. DEFENSE 7-11
7-15. RETROGRADE 7-13
Section IV. LINKUP OPERATIONS 7-13
7-16. GENERAL 7-13
7-17. COMMAND RELATIONSHIPS 7-14
7-18. PLANNING CONSIDERATIONS 7-14
Liaison 7-14
Contact Points 7-14
Coordination of Schemes of Maneuver 7-14
Fire Coordination Measures 7-15
Communications Coordination 7-15
Employment Following Linkup 7-15
7-19. AIRBORNE OPERATIONS 7-15
7-20. AMPHIBIOUS OPERATIONS 7-15
Section V. POST LINKUP OPERATIONS 7-16
7-21. GENERAL 7-16
7-22. MISSIONS7-16
Conventional Combat Operations 7-17
Reconnaissance 7-17
Counterguerrilla Operations 7-17
Rear Area Security 7-17
Civil Support 7-17
Retrain Host Country Conventional
Military Units 7-13
Section VI. DEFENSIVE OPERATIONS 7-19
7-23. GENERAL 7-19
7-24. INDICATORS COUNTERGUERRILLA OPERATIONS 7-19
7-25. DEFENSIVE TACTICS 7-20
Diversion Activities 7-20
Defense of Fixed Positions 7-20
Delay and Harassment Activities 7-20
Withdrawal 7-21
7-26. DEFENSIVE MEASURES THAT THE GUERRILLAS,
MAY EMPLOY 7-21
7-27. GUERRILLA BREAKOUT OPERATIONS 7-22
Section VII.STAY-BEHIND OPERATIONS 7-24
7-28. GENERAL 7-24
ix
7-29. ADVANTAGES OF STAY-BEHIND OPERATIONS 7-24
7-30. DISADVANTAGES OF STAY-BEHIND OPERATIONS 7-25
7-31. OTHER CONSIDERATIONS 7-25
7-32. ACTIVITIES 7-25
Section VIII.THE RAID 7-25
7-33. PURPOSE 7-25
7-34. ORGANIZATION OF THE RAID FORCE 7-26
Command Element 7-26
Assault Element 7-26
Support Element 7-26
Security Element 7-27
7-35. PREPARATION 7-27
Planning Considerations 7-27
Intelligence 7-28
Rehearsals of Participants 7-28
Final Inspection 7-28
7-36. MOVEMENT7-29
7-37. ACTION IN THE OBJECTIVE AREA 7-29
7-38. WITHDRAWAL 7-30
7-39. LARGE RAIDS 7-31
General 7-31
Movement to Objective Area 7-32
Control 7-32
Training 7-32
Fire Support 7-32
Timing 7-33
Withdrawal 7-33
Section IX. AMBUSHES 7-33
7-40. INTRODUCTION 7-33
7-41. PURPOSE 7-34
Destruction 7-34
Harassment 7-34
7-42. TYPES OF AMBUSHES 7-34
7-43. DESCRIPTIVE TERMS/DISCUSSIONS OF AMBUSH
OPERATIONS 7-34
Ambush Site 7-34
Killing Zone 7-34
Ambush Force 7-34
Attack Force 7-35
Security Element 7-35
"Rise From the Ground" Ambush 7-35
Near Ambush 7-35
Far Ambush 7-35
Harassing Ambush 7-35
Destruction Ambush 7-35
x
Deliberate Ambush 7-35
Ambush of Opportunity 7-35
Line, L, Z, T, V, Triangle,
(Open and Closed) and Box 7-36
7-44. FUNDAMENTALS OF SUCCESSFUL AMBUSH 7-36
Surprise 7-36
Coordinated Fires 7-36
Control 7-36
7-45. POINT AMBUSH 7-37
General 7-37
Point Ambush Formations 7-37
Line 7-37
The L 7-39
The Z 7-41
The T 7-42
The V 7-44
Triangle 7-46
Box 7-50
7-46. AREA AMBUSH 7-52
Background 7-52
Area Ambush (British Version) 7-52
Area Ambush (Baited Trap Version) 7-53
7-47. UNUSUAL AMBUSH TECHNIQUES 7-55
General 7-55
"Rise from the Ground" Ambush 7-55
Demolition Ambush 7-57
Special Ambush Situations 7-57
7-48. AMBUSH PATROLS 7-58
General 7-58
Planning and Preparation 7-58
Simplicity 7-59
Type of ambush 7-59
Deployment 7-59
Manner of attack 7-59
Size of ambush force 7-59
Organization 7-59
Equipment 7-59
Routes 7-61
Site 7-61
Occupation of the site 7-61
Positions 7-61
Camouflage 7-62
Movement, noise, and light discipline 7-62
Execution 7-62
Signals 7-62
Fire discipline 7-63
xi
Withdrawal to the objective rallying
point 7-63
Section X. MINING AND SNIPING 7-63
7-49. GENERAL 7-63
7-50. MINING 7-63
7-51. SNIPING 7-64
General 7-64
The Sniper 7-64
Missions 7-64
Selection and Training 7-64
Planning for Their Use 7-65
Sniper Teams 7-65
The Individual Sniper 7-65
Equipment 7-65
7-52. OBSTACLES 7-65
Security of Base Operations 7-65
Raids and Ambushes 7-66
CHAPTER 8. LOGISTICS
Section I. INTRODUCTION 8-1
8-1. GENERAL 8-1
8-2. RESISTANCE FORCE SUPPORT 8-1
8-3. SUPPLY OF OPERATIONAL ELEMENTS 8-1
8-4. RESISTANCE FORCE LOGISTICS 8-2
Section II. INTERNAL SUPPORT 8-2
8-5. GENERAL 8-2
8-6. LOGISTICAL REQUIREMENTS 8-3
Necessities of Life 8-3
Equipment for Operations 8-3
Medical 8-4
Transportation 8-4
Storage 8-4
Maintenance and Repairs 8-5
8-7. LOGISTICS ORGANIZATION 8-5
8-8. SOURCES OF SUPPLY 8-6
Offensive Operations and Battlefield
Recovery 8-6
Purchase 8-7
Levy 8-7
Barter 8-7
Confiscation 8-7
Production 8-7
Section III. EXTERNAL SUPPORT 8-8
8-9. GENERAL 8-8
8-10. PHASES OF SUPPLY 8-9
xii
Phase A - Accompanying Supply 8-9
Phase B - Resupply 8-9
Phase C - On-Call/Routine 8-11
8-11. DELIVERY 8-11
8-12. ACCOUNTABILITY 8-12
8-13. CLASSES OF SUPPLY 8-12
8-14. CATALOG SUPPLY SYSTEM 8-13
8-15. PACKING AND RIGGING 8-13
8-16. REQUEST PROCEDURES 8-14
Section IV. PLANNING CONSIDERATIONS IN ESTABLISHING
SUPPLY SYSTEMS 8-17
8-17. GENERAL 8-17
8-18. AREAS OF CONSIDERATION 8-17
Ammunition 8-17
Weapons 8-18
Explosives 8-19
Individual Equipment 8-20
Medical Supplies 8-20
Food Supplies 8-20
8-19. OTHER CONSIDERATIONS IN THE ESTABLISHMENT
OF SUPPLY SYSTEMS 8-21
CHAPTER 9. COMMUNICATIONS
Section I. GENERAL 9-1
9-1. GENERAL 9-1
9-2. EXTENT AND TYPE OF COMMUNICATIONS 9-1
Communications Within Friendly
Territory 9-1
Communications To and From the UWOA 9-1
Communications Within the UWOA 9-1
9-3. COMMUNICATION MEANS 9-2
Messenger 9-2
Radio 9-2
Telephone 9-2
Audible Signals 9-3
Visual Signals 9-4
Local Communication Systems 9-4
Pigeons or Trained Animals 9-4
Section II. COMMUNICATION TRAINING 9-4
9-4. GENERAL 9-4
9-5. CODE SPEED AND PROCEDURES 9-5
9-6. MAINTENANCE AND USE OF EQUIPMENT 9-5
9-7. RADIO PROPAGATION 9-5
9-8. MESSAGE WRITING 9-5
Section III.ANTENNAS 9-7
xiii
9-9. GENERAL 9-7
Field Expedient Insulators 9-7
Quarter-Wavelength Antenna 9-8
Half-Wave Doublet Antenna 9-9
Slant-Wire Antenna 9-10
Fourteen Percent Off-Center Fed Antenna 9-11
Indoor Antennas 9-11
Other Antennas 9-14
CHAPTER 10. MEDICAL
Section I. INTRODUCTION 10-1
10-1. GENERAL 10-1
10-2. TRAINING 10-2
10-3. INTELLIGENCE 10-2
Medical Area Study/Area Assessment 10-2
Veterinary Information 10-3
10-4. SUPPLY 10-3
10-5. HOSPITALIZATION 10-3
10-6. EVACUATION 10-4
10-7. VETERINARY MEDICAL SUPPORT IN A UWOA 10-5
10-8. THE SPECIAL FORCES GUERRILLA HOSPITAL 10-7
General 10-7
Staffing 10-8
Organization 10-8
Command Relationships 10-9
Employment 10-9
Section II. DEVELOPMENT OF MEDICAL SUPPORT IN
UNCONVENTIONAL WARFARE OPERATIONAL AREAS10-10
10-9. GENERAL 10-10
10-10. MEDICAL REQUIREMENT DURING THE BUILDUP PHASE 10-11
10-11. MEDICAL SUPPORT DURING EMPLOYMENT PHASE 10-12
10-12. MEDICAL SUPPORT DURING DEMOBILIZATION
PHASE 10-12
CHAPTER 11. FOREIGN INTERNAL DEFENSE
Section I. INTRODUCTION 11-1
11-1. GENERAL 11-1
11-2. CONCEPT 11-1
Section II. OPERATIONS 11-2
11-3. GENERAL 11-2
11-4. TYPES OF OPERATIONS 11-2
Intelligence Operations 11-2
Psychological Operations 11-2
Civil Affairs Operations 11-3
Populace and Resources Control Operations 11-3
xiv
Operations Against Insurgent Base Areas 11-3
Operations Against Interior
Infiltration Routes 11-3
Remote Area Operations 11-3
Urban Operations 11-4
Border Operations 11-4
Section III.INTELLIGENCE 11-4
11-5. INTELLIGENCE CONSIDERATIONS 11-4
11-6. AREA STUDY 11-5
Preparation 11-5
Preparation Methods 11-5
Operational Area Intelligence 11-5
Section IV. INFILTRATION TECHNIQUES 11-6
11-7. GENERAL 11-6
Section V. COMMUNICATIONS 11-6
11-8. SYSTEMS AND TECHNIQUES 11-6
11-9. WIRE COMMUNICATIONS 11-6
11-10. TRAINING 11-7
Section VI. POPULACE AND RESOURCES CONTROL 11-7
11-11. GENERAL 11-7
11-12. CONTROLS11-8
Section VII.FIELD ENGINEERING 11-9
11-13. GENERAL 11-9
11-14. CONSTRUCTION PROGRAMS 11-9
Section VIII.MEDICAL REQUIREMENTS 11-10
11-15. GENERAL 11-10
11-16. PREVENTIVE MEDICINE IN FID 11-10
11-17. VETERINARY PROCEDURES IN FID 11-12
APPENDIX A - AREA STUDY GUIDE, AREA INTELLIGENCE STUDY
GUIDE, AND BRIEFBACK GUIDE A-1
APPENDIX B - AREA ASSESSMENT B-1
APPENDIX C - FIELD-EXPEDIENT PRINTING METHODS C-1
APPENDIX D - EXAMPLES OF MASTER TRAINING PROGRAM FOR
RESISTANCE FORCES D-1
APPENDIX E - IMMEDIATE ACTION DRILLS FOR FOOT PATROLS E-1
APPENDIX F - DEFENSE AGAINST AMBUSH F-1
APPENDIX G - PATROL BASES G-1
APPENDIX H - COMBAT INTELLIGENCE AND TRACKING H-1
xv
CHAPTER 1
INTRODUCTION
1-2. RECOMMENDATIONS
The use of the words "he," "his," "himself," etc., in this special
text is intended to include both the masculine and feminine
genders. Any exception to this will be so noted.
1-1
1-2
CHAPTER 2
Section I. INTRODUCTION
2-1. GENERAL
This chapter provides information andguidance to Special Forces
operational detachments in planning for unconventional warfare (UW)
operations and in analyzing areas of operation through area study and
area assessment. Itdiscusses intelligence collection,
counterintelligence, and security aspects of concern to an
operational detachment during theorganization, buildup, and combat
employment phases of developing an unconventional warfare operational
area (UWOA).
2-2. INTELLIGENCE CONSIDERATIONS IN AN UNCONVENTIONAL WARFARE
OPERATIONAL AREA (UWOA)
2-1
resistance efforts may restrict radio traffic, thus limiting the
amount of intelligence information that can be relayed.
2-3. GENERAL
Special Forces operational detachments (SFOD) committed into
operational areas to support the US Army's role in any intensity of
conflict will usually find that activities in the area are supported
and accompanied by extensive political and economic activities. These
activities, conducted by individuals or groups integrated or acting
in concert with recognized resistance forces, may be overt or
clandestine. In order for Special Forces detachments to improve their
chances for success, they require more predeployment intelligence
than conventional Army combat units. To obtain this, SFOD's conduct
general area studies of assigned countries and specific intelligence
studies of areas of operations. Although area studies are normally
prepared and provided by special research agencies, the detachments
assemble their own studies in a format appropriate for operational
use.
(2) Group S2. Entire area study may be prepared by the S2 based
on available information concerning the operational missions and
areas of operations.
(3) Area specialist teams (AST's). These teams are assigned
operational responsibilities based on geographic or mission
consideration.
2-2
c. Preparation by Operational Detachments. Although unit training
requirements limit the time available for operational detachments to
prepare a detailed comprehensive general area study, preparation by
the operational detachments has the following advantages:
(1) The extensive research required enables the detachments to
learn more about their area of interest, and once placed in
isolation, the detachments can quickly assimilate the data for their
respective areas of operation based on mission requirements.
2-3
(4) Reaction to active propaganda programs.
(a) Teamwork.
(b) Attitude.
(c) Morale.
(d) Use of available time.
2-4
(h) Responsibilities in each phase of operation.
2-5
b. Assessment may assume two degrees of urgency—immediate and
subsequent. Matters of immediate urgency are included in the
"initial" assessment; the "principal" assessment is a continuous
collection 'of information conducted until exfiltration or evacuation
from the operational area. (See appendix B for sample format.)
2-7. GENERAL
2-6
2-9. INTELLIGENCE REQUIREMENTS
2-10. GENERAL
2-7
2-11. COUNTERINTELLIGENCE CONSIDERATIONS
(2) Coding of names and places, and the key to the code
disseminated on a need-to-know basis only.
e. Operational Security.
(1) Strict security measures must be enforced. Minimum measures
required are:
(b) Isolation of units from each other and from the civilian
population. Contact with civilians is held to the minimum and is made
solely by designated individuals or groups.
2-8
(c) Proper selection and rigid supervision of courier routes
between headquarters and units.
2-13. PRINCIPLES
2-9
Figure 2-1
Inner security zone.
2-10
Figure 2-2
Outer security zone
a. Outer security zone (fig. 2-2). Normally, the auxiliary and the
underground are responsible for furnishing guerrilla forces timely
information of enemy activity within this zone. The guerrilla force
should not fully rely on such supplementary warning systems. The
auxiliary and underground elements may be required to harass arid
delay the enemy, thus allowing the guerrilla force time to disperse.
2-11
(3) In the event of large-scale enemy operations against the
guerrilla force, the area commander may be forced to divide units
into even smaller elements to achieve greater dispersion or to
facilitate escape. This extreme dispersion will reduce the
effectiveness of command and control, lower the morale of the
guerrilla force, and hinder the ability of the auxiliaries to render
support. Therefore, excessively dispersed units roust be reassembled
as quickly as possible. Operational plans must provide for such
contingencies and include post-operation assembly areas (rallying
points).
e. March Security.
(2) Units are briefed on the local enemy situation, primary and
alternate routes, dispersal and reassembly areas along the way, and
security measures to be observed en route. Areas through which the
guerrilla force plans to pass may require assistance from the
auxiliary to provide security for the guerrilla force.
2-12
CHAPTER 3
Section I. INTRODUCTION
4-1. GENERAL
a. Psychological operations (PSYOP) are applicable to guerrilla
warfare as well as all other aspects of UW, and must be integrated
into all tactical planning. PSYOP is salesmanship used to develop a
weak cause and make a strong cause stronger. The cause must be sold
and taught to others to sell. If this is not done, chances for
success are slim.
3-1
b. Add to the determination of the resistance forces.
3-2
exploited, build popular support for the guerrilla cause. Special
Forces will not take part in nor condone those punitive actions which
are contrary to the rules of land warfare or US national policy.
When writing a message for the various target audiences, the theme of
the message, as well as the objectives of the PSYOP campaign, must be
carefully considered. Each message is created with a distinct purpose
in mind and is skillfully designed to accomplish that purpose. In
developing the message, it should be:
3-3
4-5. MESSAGE FORMS
d. Gifts.
a. Radio.
(2) One important advantage of radio is, of course, that one does
not have to be literate in order to hear and understand radio
broadcasts. This medium, however, has some disadvantages. To be sure
that the target group listens, the resistance must find a way to
inform the audience of the time and channel on which the illicit
broadcast will be made. Furthermore, broadcasts by low-power portable
transmitters have limited range. Enemy radio-locating equipment can
pinpoint the position of a transmitter, forcing the resistance to
change the frequency and the site of the transmitter frequently.
b. Printed Material.
(3) Within the UWOA, guerrilla forces may not have the facilities
to produce large amounts of printed material. However, Special Forces
may supply lightweight, portable printing equipment or devise field
expedients (see appendix D) that can produce a limited number of
leaflets, posters, or bulletins for the guerrilla force.
d. Face-to-Face Communications.
3-5
(3) Rumor cap be an effective propaganda device, but requires
extreme skill and care in its use. Although rumors are difficult to
control and are virtually impossible to trace, the target audience
can never be specifically isolated. Since rumors may also be used by
the enemy, those which are detrimental to the guerrilla effort may be
countered by leaflets or face-to-face meetings with selected members
of the civilian populace.
4-8. CONSIDERATIONS
3-6
improving methods, developing and revising plans, and setting new
PSYOP objectives.
4-9. REFERENCE
3-7
3-8
CHAPTER 4
Section I. INFILTRATION
4-1. GENERAL
4-2
(2) Paragraph A. Code Word. Designated in accordance with the
CEOI. The code word identifies the operational detachment making the
report.
a. Advantages.
(1) Flexibility.
b. Disadvantages.
(5) Can land and take off from short, unprepared airstrips.
(6) Can, under certain circumstances, land and take off from
water.
d. Specific Considerations.
(1) Drop zone (DZ) selection. DZ requirements for clandestine
parachute entry differ from those for normal airborne operations.
Security of the entry operation and survival of those infiltrated are
the overriding considerations. Obviously, ideal DZ's may be under
either continuous or periodic surveillance by security forces or by
technical means. Therefore, populated areas and areas occupied or
patrolled by enemy security forces muse be avoided. These
considerations, in combination with the topography of the remaining
area, may dictate the use of small, rough-terrain DZ's or deliberate
tree landings in densely forested or jungle areas. Use of such DZ's
may require special equipment and training in specialized techniques.
(2) Drop, zone identification and authentication procedures.
Although proper identification and authentication of the primary DZ
selected for the initial infiltration is the joint responsibility of
the aircraft commander and the Special Forces element commander,
other factors must be discussed:
4-4
(a) For the initial infiltration, the decision to proceed with
or abort the drop if improper markings or authentication signals are
displayed is the responsibility of the joint commanders for the
overall mission and is normally contained in the operation order.
There are two courses of action that may be employed:
e. Blind-Drop Infiltration.
4-5
f. Free-Fall Operations. Parachute entry from high altitudes may
be necessary in certain situations. Whenever a free-fall operation is
planned in hostile areas protected by enemy radar and other detection
devices, a system of jamming or disruption of these devices must be
established. In addition, the availability of aircraft and capability
of aircrews trained to work in depressurized aircraft at extremely
high altitudes must be considered. Once free-fall parachutists have
exited the aircraft, they maintain a stable free-fall position in the
air, falling to a designated altitude before opening their
parachutes. Parachutists then manipulate their parachutes to assemble
in the air and to insure landing close to each other on the ground.
Operational free-fall parachute techniques are contained in FM 31-19,
Special Forces Military Free-Fall Parachuting.
g. Equipment/Supplies/Reception Committee.
(1) The detachment must have in its possession the equipment with
which to accomplish initial tasks. These items normally consist of
radios, individual arms, and operational TOE equipment (medical kits,
photographic equipment, binoculars, compasses, etc.).
4-6
available. The present method of dropping individual loads consists
of packing all items in a rucksack; the jumper suspends the rucksack
a safe distance below himself and then releases it before he lands.
4-7
4-5. WATER INFILTRATION
a. Advantages.
(1) Long-range delivery capability.
b. Disadvantages.
(1) Time-consuming unloading and transshipment from offshore
drop-off points.
4-8
(2) Equipment/supplies/reception committee. Adequate water-
proofing should be provided to protect supplies and equipment from
the effects of salt water. As in air operations, the presence of a
reception committee influences the element's action before and after
the landing, and the amount of equipment and supplies it transports.
When fleet-type submarines are used, all items are packaged in a size
and configuration that will allow them, to pass through the narrow
access openings into the pressure hull. Size, configuration, and
packaging must be coordinated with the ship's personnel prior to
embarking.
(3) Ship-to-shore movement. Assignment of boat teams,
distribution of equipment and supplies, methods of debarkation, and
means of navigation to the landing beach are carefully planned. In
addition, consideration is given to methods of recognizing the
reception committee and disposing of the landing craft.
a. Advantages.
(1) Minimum logistical support.
b. Disadvantages.
4-7. GENERAL
Exfiltration is the extraction or evacuation of personnel, documents,
or equipment from an operational area.
4-8. METHODS
4-10
3. Allow the maneuver or landing of the recovery vehicle.
4-11
(1) The distance to friendly lines is relatively short.
4-9. GENERAL
4-12
(7) Communication procedures (en route and after drop).
4-13
c. Action on DZ.
4-14
(10) Initial entry report (IER).
(14) Rehearsals.
(15) Equipment preparation.
4-15
(7) Assignment of boat landing teams.
(6) Launching.
4-16
(2) Light discipline.
(d) Guides.
(5) Reconnaissance.
(6) Equipment preparation.
4-17
(10) Location of assets and identities.
4-18
(6) Actions at danger areas.
(7) Navigation.
(8) Control during movement.
a. Contact Plan.
(1) Contact made by minimum or selected personnel. (Air
infiltration--all personnel must be prepared to initiate contact if
man-to-man coverage is available on DZ.)
4-19
(1) Noise discipline.
4-20
CHAPTER 5
5-1. GENERAL
The organization of a UWOA involves initial area organization and
buildup of the resistance force. Initial organization includes
establishing the required command and administrative structure,
taking necessary security precautions, and training a nucleus of
guerrilla personnel. Buildup is the expansion of the original nucleus
into an operational unit capable of accomplishing the assigned
mission. No matter what degree of organization is encountered, in
order to organize support functions and systems for the guerrilla
force, the basic organizational objectives discussed in this section
must exist or must be organized and implemented immediately.
Figure 5-1
Two independent sector commands.
5-2
(2) Initial deployment as a subdivided element would also be
appropriate to:
5-4
5-4. THE AREA COMMAND
(1) Command group. The command group may consist: of the Special
Forces element/ selected members, the resistance leader and his staff
and, as appropriate, representatives from the auxiliary, underground,
and guerrilla force in the area. Either a formal staff is organized
or the command group meets periodically or "on call." The purpose of
the command group is to provide centralized control and coordination
of all resistance activities in the UWOA.
5-5
(3) In some situations, the nucleus ;of resistance elements may
be recruited from exiled or liberated personnel currently located in
friendly territory. These personnel may be infiltrated using normal
infiltration techniques discussed in chapter 4.
(5) Geography.
(6) Future missions.
5-7
(2) The guerrilla base.
Figure 5-2
Guerrilla base.
5-8
Section II. ORGANIZATIONAL DEVELOPMENT OF THE UWOA
5-8. GENERAL
a. Under close supervision and guidance in the early phases of
development and based on tentative organizational plans, limited
recruiting and training of personnel previously spotted and selected
by resistance leaders may be conducted. Based on the Special Forces
element's mission and the extent of training of the existing
resistance force, small-scale operations may be continued and
intensified. Most of the guerrilla actions undertaken should be
widely dispersed and of the simple harassment type (i.e., cutting of
telephone wires, putting tire puncturing devices on roads and
highways, contaminating gasoline and oil in vehicles and exposed
storage facilities, and attacking small, remote outposts and
facilities of the enemy). Of paramount importance is the fact that
the enemy is in full control: no activity should be undertaken that
will bring the enemy down in force on the guerrilla organization,
possibly wiping out or destroying its effectiveness.
b. A large part of the activity of this period may be directed
toward creating a political and psychological climate that will
induce resisters, or potential resisters, to risk their lives for the
"common cause." Under a strong leadership exerted by the area
command, these resistance groups will ultimately grow larger, become
better equipped, and become better trained. "Natural leaders," such
as former military personnel, clergymen, local officeholders, and
neighborhood spokesmen, will usually emerge. These provide the area
command with a potential resource on which to plan the growth and
expansion of the resistance force and the operational area.
5-9
5-9. UNIT ORGANIZATION
5-10
(e) The merging of small units into the larger organization
should be done without causing disharmony.
(f) Knowledge of the location and activities of other units
must be limited to the persons responsible for internal liaison.
(1) Area. The size and physical aspects of the area of operations
and the availability of suitable bases will limit the number of
guerrillas that can be employed successfully and will restrict the
types of operations.
5-11
(b) The equipment of the guerrillas must be based, at least
initially, on what is available and not on what the guerrilla wants
or needs. The enemy may be the principal source of supply until a
sound external logistical system can be established.
5-12
(e) Counterintelligence systems to counter enemy penetration
attempts and provide external and internal security.
(f) Systems and procedures for recruitment of personnel.
b. Membership.
d. Method of Operation.
(1) Auxiliary units derive their protection in two principal
ways—a compartmented structure and operating under cover. While enemy
counterguerrilla activities often force the guerrillas to cove
temporarily away from given areas, the auxiliaries survive by
remaining in place and conducting their activities so as to avoid
detection. Individual auxiliary members carry on their normal, day-
to-day routine, while secretly carrying out the many facets of
resistance activities.
(2) Auxiliary units frequently use passive or neutral elements of
the population to provide active support to the common cause. Usually
this is done on a one-time basis because of the security risks
involved in repeated use of such people. The ability of auxiliary
forces to manipulate large segments of the neutral population is
further enhanced by the demonstrated success of friendly forces.
5-14
The population is your greatest friend. Without their sympathy
and active support you cannot exist for extended periods of
time. As a result, you cannot afford to alienate them by
brutal behavior or lack of discipline.
Do not forget that the laws of land warfare are valid even
though they do not specifically cover every possible
situation.
For better or worse, you are practically dependent upon the
good will of the population. You also depend upon their steady
"I-do-not-know, I-have-not-heard-nor-seen-anything" replies to
enemy interrogators, even though this attitude might mean
their deportation or death.
Figure 5-3
Keys to good relations and support.
5-11. GENERAL
Once the area and unit organizations are underway the area command
must establish support functions and systems. These support functions
5-15
and systems include security and warning, logistics, communications,
medical support, recruiting, and, in some instances, providing part-
time guerrillas for diversionary operations.
5-16
c. Counterintelligence. The auxiliary assists the area command
counterintelligence effort by maintaining watch over transitory
civilians, by screening recruits for guerrilla units, and by
monitoring refugees and other non-inhabitants of the area. Because of
their intimate knowledge of local people, auxiliaries should be able
to report attempts by enemy agents to infiltrate the area. They can
also name those inhabitants whose loyalty to the resistance might be
suspect.
d. Logistics. The auxiliary supports guerrillas in all phases of
logistical operations. They provide transportation and/or porters for
the movement of supplies and equipment. Auxiliaries often care for
the sick and wounded, provide medical supplies, and arrange for
doctors and other medical personnel. They collect food, clothing, and
other supplies through a controlled system of levy, barter', or
contribution. Sometimes auxiliaries provide essential services such
as repair of clothing, shoes, and certain items of equipment.
Auxiliaries also furnish personnel to assist at reception sites. They
distribute supplies throughout the area. The extent of logistical
support furnished by the auxiliary depends upon the resources of the
area, the degree of influence it exerts on the population, and enemy
activities.
e. Recruiting. Guerrilla units depend upon the local population
for recruits to replace operational losses and to expand their
forces. Auxiliaries spot, screen, and recruit personnel for active
guerrilla units. If recruits are provided from reliable auxiliary
sources, the enemy's chances for placing agents in the guerrilla
force are greatly reduced.
f. Psychological Warfare. A very important mission in which
auxiliary units assist is psychological warfare. The spreading of
rumors, leaflets, and posters is timed with guerrilla tactical
missions to deceive the enemy. Leaflets can mislead the enemy
regarding guerrilla intentions, capabilities, and location. The
spreading of this propaganda is very difficult for the enemy to
control.
g. Civilian Control. To control the population and give the enemy
are impression of guerrilla power, auxiliary units establish a legal
control system to assist in preventing black marketing and
profiteering. Collaborators may be terrorized or punished by the
auxiliaries.
h. Evasion and Escape. Auxiliary units are ideally suited for the
support of evasion and escape mechanisms. Their contact with and
control over segments of the civilian population provide the area
command with a means of assisting evaders.
i. Other Missions. Auxiliary units may be called upon to perform a
number of other guerrilla support missions such as:
(1) Coordinated actions with the guerrillas against other targets
(e.g., cutting of telephone lines between enemy installations and
reserve forces prior to a guerrilla attack).
5-17
(2) Furnishing guides.
d. Personnel Records.
5-19
(3) Postings to the initial record may be by serial number. In
this manner, there is no reference to individuals by name nor is
there incriminating data that would associate them with the
resistance movement. A sample initial record 'is shown as an
inclosure to the Master Training Schedule (app D).
e. Oath of Enlistment.
(1) Resistance leaders should be convinced of the need for a
formal oath of loyalty to the resistance movement. At an appropriate
ceremony, the local indigenous leader should administer an oath of
enlistment to each new member of the resistance force. This may
provide a basis for recognition by the local government, after
hostilities, of the jurisdictional authority exercised b y guerrilla
unit commanders over individual guerrillas.
(2) Personnel should be required to sign the oath, and the oath
should become a part of the initial personnel record and secured
accordingly. Ideally, the oath should make reference to the guerrilla
code and to punishments for violation.
f. Casualty Records. This information includes records of
personnel killed, wounded, missing in action, or separated from the
guerrilla force because of illness or for other reasons.
5-20
5-15. DISCIPLINE
5-16. GENERAL
5-22
5-17. CHARACTERISTICS OF GUERRILLA TRAINING
a. General.
5-23
(c) Determining a system for training.
5-24
areas. Ranges and rehearsal areas should be located away from the
guerrilla base to avoid enemy detection.
(5) Training aids. Consistent with the situation, training aids
and equipment may accompany the operational element at the time of
infiltration. Initially equipment available for training will be
limited, and improvised training aids and mockups should be used.
5-25
5-26
CHAPTER 6
AIR OPERATIONS
This chapter is a guide; in actual operations, local approved
Standing Operating Procedures (SOPS) must be followed.
Section I. GENERAL
6-1
(1) Snow LZ's.
Figure 6-1
Sample UW Air Resupply Mission.
a. Operational Element.
d. Operational Element.
6-4. GENERAL
a. Terrain.
6-3
(2) It is desirable that the aircraft be able to approach the DZ
from any direction, and that there is an open approach quadrant of at
least 45 degrees to allow the aircrew flexibility to assume the
appropriate approach track.
Figure 6-2
Level turning radius required for one-approach
DZ’s and LZ’s (medium aircraft)
6-4
Figure 6-3
Level turn radius for STOL aircraft.
(1) The most desirable shapes for DZ's are square or round. The
width of rectangular-shaped DZ's should allow for minor errors in
computation of wind drift.
(2) The required length of a DZ depends primarily on the number
of units to be dropped and the length of their dispersal pattern.
e. Dispersion.
6-5
(2) Dispersion is computed using this rule-of-thumb formula: 1/2
speed of aircraft (knots) X exit time (seconds) - dispersion
(meters). Exit time is the elapsed time between the exits of the
first and last items (fig. 6-4).
Figure 6-4
Computation of dispersion.
f. Surfaces.
(4) Water depth will be no less than 4 feet for a personnel drop
on a water DZ. There will be no underwater obstructions to a depth of
6-6
4 feet, and the surface will be clear of floating debris or moored
craft and without protruding boulders, ledges, or pilings. Minimum
safe water temperature for personnel drops is 50 degrees F. (+ 10
degrees C.).
g. Security.
6-8
6-7. ALTERNATE DROP ZONES
6-9
Figure 6-7
Area DZ (reference points)
6-10
Figure 6-8
Obstacles and reference points (area DZ).
6-11
Section IV. DROP ZONE MARKING
6-11. BEACONS/TRANSPONDERS
6-12
Figure 6-9
Computation of ground release point (RP).
(4) Personnel and cargo drop: When receiving both personnel and
cargo in the same drop, use the same formula as noted above, but use
the constant factor of 4.0.
c. Forward Throw. Forward throw is the horizontal distance
traveled by the parachutist or cargo container between the point of
exit and the opening of the parachute. This factor, combined with
reaction time of the personnel in the aircraft, is compensated for by
moving the release point an additional 185 meters in the direction of
the aircraft approach.
6-14
(1) The number of markers used seldom exceeds six.
Figure 6-10
“Mask” clearance ration 15:1
6-15
Figure 6-11
Security of DZ markings.
c. When panels are used for daylight DZ marking they are
positioned at an angle of approximately 450 from the horizontal to
present the maximum surface toward the approaching aircraft. If the
drop is taking place during the period of sunrise or sunset, and the
sun is in the eyes of the pilot during the approach to the DZ or LZ,
smoke grenades or simple smudge fires should be used in conjunction
with panel markings to assist in sighting the DZ markings on the
approach.
6-17
e. Move supplies to distribution or cache sites.
b. Marking Party.
c. Security Party.
d. Recovery Party.
(1) Recovers cargo and air-delivery equipment from the DZ.
6-18
(2) Consists of at least two men for each parachutist or cargo
container. The recovery party is dispersed along the length of the
anticipated impact area, spots each parachute as it descends, and
moves to the impact point.
(3) Locates bundle. (One man must stay with it while the second
takes the parachute to the recovery collection point and guides a
detail back to carry off the packages. Another technique is to divide
the recovery party into two-man teams which have been assigned a
parachute number coinciding with the sequence of exit from the
aircraft. If personnel are available, the recovery party leader
stations a separate recovery detail at the far end of the DZ to track
and locate bundles if the exit is delayed or disrupted. Recovery
party personnel must have a simple signaling means, such as a metal
cricket or tone sticks, to preclude shouting or unnecessary movement.
When the first bundle, or parachutist, exits from the aircraft, the
recovery party leader should station a man directly under the point
of exit. This man remains in place until all bundles or parachutists
are recovered. He serves as a reference for the point of exit and can
subsequently indicate the aircraft's exact line of flight if a bundle
is lost and a sweep of the DZ must be made.)
e. Transport Party.
(1) Consists of part, or all, of the members of the command,
marking, and recovery parties.
6-19
b. To assist in sterilization, the individual parachutist:
6-20. GENERAL
d. Terrain Features.
(b) All landings and takeoffs are made into the wind.
(a) U-6
6-21
(b) Twin Otter
(c) Porter
(d) U-10
(e) C-7
(a) C-123
(b) C-46
(c) C-47
(d) C-130
(e) C-119
(3) In addition to the basic dimensions, extra clearances to
provide a safety factor are required.
6-22
g. Surface.
(4) LZ 's that are not suitable in summer may be ideal in winter.
Ice with a thickness of 8 inches will support a STOL aircraft. Ice 24
inches thick will support medium aircraft. Unless the aircraft is
equipped for snow-landing, snow in excess of 4 inches must be packed
or removed from the strip.
(5) The surface gradient of the LZ should not exceed 2 percent
(applicable to both length and width).
Illustrations in figure 6-12 and 6-13 show how to lay out LZ markings
for both STOL and medium aircraft. Use of these dimensions are
appropriate for most Special Forces LZ operations.
6-23
a. A cleared surface (called a safe area) must be added to each
end of the LZ. Each safe area is cleared of all obstacles over 1
meter high.
*Figure 6-12
Land LZ for STOL aircraft.
6-24
*Figure 6-13
Land LZ for medium aircraft.
6-25
b. The marking pattern which outlines the limits of the LZ
consists of (1) Five (5) marker stations for STOL aircraft. (2) Seven
(7) or more marker stations for medium aircraft. For LZ's longer than
the depicted minimum length, the number of left-hand markers beyond
station "C" will be increased to retain a marker spacing of 505 feet.
c. Stations "A" and "B" always mark the downwind end and provide
the entrance "gate" for aircraft approach. These stations represent
the first point at which the aircraft should touch the ground.
e. Station "C" marks the very last point at which the aircraft can
touch down and still complete a safe landing.
f. Stations "D" and "E" or "F" and "G" mark the upwind extreme
of the landing area.
a. Two minutes before scheduled arrival time, the RCL directs all
marker stations to be displayed. The RCL flashes the authentication
code signal toward the direction of expected aircraft approach
(track).
f. After touchdown and landing roll, the aircraft will turn right
and taxi back to the offload/load position guided by the RCL
6-26
continuous light source at station “B” One or more engines will
remain running during the entire operation.
g. To eliminate confusion and insure rapid handling, incoming
personnel/material are offloaded first. To insure safety, all off/on
loading will be from the rear behind the running engine(s).
6-25. GENERAL
6-27
(3) Hover nearly motionless and take on or discharge personnel
and cargo without landing.
(4) Fly safely and efficiently at low altitudes.
a. Surface.
(4) Heavy dust or loose snow will interfere with pilot vision
just before touchdown. This effect can be reduced by clearing,
wetting down, or using improvised landing mats or platforms.
b. Size.
6-28
(2) Landing platforms may be prepared in swamp or marsh areas by
building platforms of locally available materials (fig. 6-14). Such
LZ's normally are used for daylight operations only. The size of the
clearing, and the approach and takeoff requirements for this type of
LZ are discussed below with the following additional requirements for
the platform:
(a) The area should be large enough to accommodate the spread
of the landing gear plus 10 feet.
Figure 6-14
Examples of platform LZ’s for rotary-wing aircraft.
6-29
Figure 6-15
Preparing landing pads for rotary-wing aircraft
in mountainous terrain.
6-27. DISPLAY AND AUTHENTICATION
6-28. DIMENSIONS
The criteria depicted below represent the minimum dimensions of each
LZ. Helicopter units will designate Size 1, 2, 3, or 4 circular LZ's
or Size 3 or 4 rectangular LZ's, to be used for specific operations.
Numerous considerations such as helicopter type, unit proficiency,
nature of loads, climatic conditions and day or night operations may
apply to size of landing points used.
6-30
Figure 6-16
Dimensions for Landing Zones.
6-29. MARKING
Figure 6-17
Night Markings for Helicopter Landing Zones.
6-30. GENERAL
6-31. GENERAL
a. Training.
6-32
(1) Guerrillas and auxiliaries for their mission.
(2) Rehearsal.
(3) Security measures stressed during training to avoid
compromise.
b. Conduct of Operations.
c. Alternate Site(s).
6-33
6-34
CHAPTER 7
Section I. GENERAL
7-1. PURPOSE
d. During World War II, guerrilla forces were organized and used
extensively. Basically, their operations behind enemy lines applied
old principles and techniques to modern warfare. Nevertheless, many
factors impeded the efficient organization and conduct of guerrilla
operations. Military professionals generally did not understand the
art of guerrilla warfare and many of them regarded it as illegal and
dishonorable. The strategic and tactical relationships of guerrilla
forces to conventional forces were rarely appreciated. Special
operations organizations, shrouded in secrecy, were erroneously
judged by many as "cloak and dagger outfits" engaged in wild
exploits.
(3) Planning.
(4) Intelligence.
(5) Tactics.
(6) Mobility.
(7) Surprise.
7-2. PLANNING
7-2
7-3. GUERRILLA WARFARE MISSIONS
Figure 7-1
Special Forces Missions.
7-3
Guerrilla warfare missions (figure 7-1) which contribute to the land
battle may be described as:
(1) Missions to support the unified command (section II).
a. Interdiction.
b. Intelligence.
c. Psychological operations.
7-5. INTERDICTION
7-7
1. Disruption of daily dispatch and control procedures for
rail movements; causes delays, erratic time schedules, and
misrouting; and causes trains to accumulate at rail terminals,
junctions, and marshaling yards. This presents lucrative targets for
attack by other theater forces.
7-9
(1) Target assignment. Targets or objectives are designated for
attack. These targets are usually lines of communication, military
installations and units, and industrial facilities. Normally, targets
or objectives for guerrilla forces are not held for any length of
time, nor are they cleared of determined enemy resistance.
7-10. INTELLIGENCE
7-10
c. Targets of opportunity.
d. Poststrike assessments.
e. Political, sociological, and economic matters.
g. Technical intelligence.
7-13. OFFENSE
a. Missions which may be assigned to guerrilla units to assist
conventional offensive operations are designed to:
7-12
(5) Attack deep into the enemy rear--by attacking at every
opportunity and destroying vulnerable command posts, communication
centers, supply and maintenance facilities, ammunition and POL
depots, and reserve elements. This aggressive, relentless destruction
paralyzes the enemy and disintegrates his overall system of defense.
These operations spread fear, demoralize, and achieve
disproportionate results as rear echelon elements, not trained nor
equipped for battle, succumb to confusion, indecision, and panic.
7-15. RETROGRADE
7-16. GENERAL
7-13
7-17. COMMAND RELATIONSHIPS
a. Liaison.
7-15
operations which may be conducted in conjunct- ion with or
complementary to the amphibious assault.
b. If the selected beachhead is lightly defended or unoccupied,
guerrilla units may seize and hold portions of the beachhead. Landing
force planning must provide for early relief of guerrilla units.
Plans for naval gunfire support to guerrilla forces must include
provisions for the conduct and adjustment of fires. Naval gunfire
liaison personnel, shore fire-control parties, and tactical air
control parties should be provided as required.
7-16
a. Conventional Combat Operations.
7-23. GENERAL
Guerrilla units are normally inferior to organized enemy forces in
strength, firepower, mobility, and communications. Therefore,
guerrilla operations are primarily offensive; they do not undertake
defensive operations unless forced or ordered to. Usually when the
enemy attacks, guerrillas defend themselves by movement, dispersion,
withdrawal, or diversions. Defensive operations are accompanied
whenever possible by offensive actions against the enemy's flanks and
rear. On this basis, Special Forces always plan offensive operations
and security within the UWOA.
7-19
(6) Party membership drives.
7-20
d. Withdrawal.
7-21
l. Emphasizing passive air defense measures.
(1) Area for the attack. The main attack should be launched
against enemy weakness in a direction which will insure breakthrough
in the shortest possible time. The direction of attack may be
indicated by designating objectives and an axis of advance.
Objectives are assigned to insure penetration of the encircling force
and preservation of the gap created.
(7) Logistics.
7-28. GENERAL
7-24
7-30. DISADVANTAGES OF STAY-BEHIND OPERATIONS
7-32. ACTIVITIES
7-33. PURPOSE.
A raid is an operation, usually small scale, involving a swift
penetration of hostile territory to secure information, confuse the
enemy, or destroy his installations. It ends with a planned
withdrawal upon completion of the assigned mission. It is used to:
7-25
d. Liberate friendly personnel.
The size of the raid force depends on the mission, the nature and
location of the target, and the enemy situation. The raid force may
vary from a few personnel attacking a checkpoint to a battalion
attacking a large supply depot. Regardless of size, the raid force
consists of four basic elements: command, assault, security, and
support.
(2) Once the assault element has begun its action, the security
element prevents enemy entry into or escape from the objective area.
7-35. PREPARATION
a. Planning Considerations.
(1) The nature of the terrain and the combat efficiency of the
raiding force must be considered. The first step in the selection of
the target is based on its criticality, accessibility, vulnerability,
and recuperability. The criticality and recuperability of various
targets can be assessed prior to infiltration during the course of
the area study and operational area intelligence study. Accessibility
and vulnerability are situation dependent and these assessments must
be supported by current intelligence.
(3) Although detailed, the plan for a raid must be simple and not
depend on too many contingencies for success. Activities are planned
so that the target installation is not alerted. This means that
activities in the objective area will conform to normal patterns.
Times and space are carefully considered--time is allowed for
assembly and movement. All factors are considered to determine
whether movement and attack should be made during daylight or
darkness. Darkness naturally favors surprise and normally is the best
time when the operation is simple and physical arrangement of the
installation is known. Early dawn or dusk is favored when inadequate
knowledge of the installation or other factors necessitates tight
control of the operation. A withdrawal late in the day or at night
makes close pursuit by the enemy more difficult.
Figure 7-3
Movement to the objective.
7-37. ACTION IN THE OBJECTIVE AREA
7-29
Figure 7-4
Action in the objective area.
7-38. WITHDRAWAL
Figure 7-5
Withdrawal from the objective area.
7-39. LARGE RAIDS
7-31
b. Movement to Objective Area. Surprise is just as desirable as in
a smaller raid, but it is usually harder to achieve. In operational
areas, the number of troops to be assembled and deployed may require
additional MSS's at a greater distance from the target to preserve
secrecy; this will necessitate a longer move to the attack position.
A large raid force usually moves by small components over multiple
routes to the objective area.
Figure 7-6
Movement to the objective area—large raid force.
7-33
(c) It deprives the guerrillas of weapons, ammunition, and
equipment that is very difficult to replace.
(d) The death or capture of "hard core" personnel greatly
weakens the guerrilla force.
7-41. PURPOSE
7-34
d. Attack Force--The fire and maneuver portion of a point ambush.
In a patrol, the assault and support elements are the attack force.
e. Security Element--The early warning and/or security portion of
a point ambush. In a patrol, the security element is the security
force.
7-35
planned.In his case, the ambush force plans and prepares for the
ambush and attacks the first suitable target appearing.
(2) A search and attack patrol, before departing, plans and
rehearses the ambush of the types of targets it may encounter. It
establishes and executes ambushes as opportunities arise.
(b) Withholding fire until the target has moved into the
killing zone.
(c) Opening fire at the proper time.
7-36
(d) Initiating appropriate actions if the ambush is
prematurely detected.
a. General.
Figure 7-7
Ambush formations.
7-38
Figure 7-7 – Continued.
7-39
Figure 7-7 – Continued
7-40
Figure 7-7 – Continued.
7-41
Figure 7-7 – Continued.
7-42
Figure 7-7 – Continued.
7-44
Figure 7-7 – Continued. 7-45
(6) Triangle. This is a variation of the V formation and can be
varied in three ways.
• Ease of control.
• All-round security.
2. Disadvantages.
7-47
Figure 7-7 – Continued.
7-48
Figure 7-7 – Continued.
7-49
2. The ambush site must be a fairly level, open area which
provides (around its border) concealment for the ambush element
(unless it is a "rise from the ground" ambush).
7-51
7-46. AREA AMBUSH
a. Background.
The origin of the type of ambush now called area ambush is not known.
It was used by Hannibal against the Romans in the second century B.C.
More recently, it was modified and perfected by the British Army in
Malaya and, with several variations, used in Vietnam. The British
found that point ambushes often failed to produce heavy casualties.
When ambushed, the Communist guerrillas would immediately break
contact and disperse along escape routes leading away from the
killing zone. The British counteracted this tactic by blocking
escape routes with point ambushes. They called these multiple related
point ambushes the area ambush.
(d) The ambush is initiated when the target moves into the
central killing zone.
7-52
Figure 7-8.
Area ambush.
7-53
Figure 7-8 – Continued.
(b) Point ambushes are established along the routes over which
relieving or reinforcing units will have to approach.
(3) These two variations are best suited for situations where
routes of approach for relieving or reinforcing units are limited to
those favorable for ambush.
7-54
(4) They are also best suited for use by guerrilla forces, rather
than counterguerrilla forces. Both variations were extensively used
by Communist guerrilla forces in Vietnam.
7-55
Figure 7-9.
Unusual ambush techniques.
7-56
c. Demolition Ambush.
(3) When a target enters the mined area (killing zone) the two
men remaining detonate the explosives and withdraw immediately to
avoid detection and pursuit.
7-57
(2) Ambush of trains. Moving trains may be subjected to harassing
fire, but the most effective ambush is derailment. Derailment on a
grade, at a sharp curve, or on a high bridge will cause most of the
cars to overturn and result .in extensive casualties among the
passengers. It is desirable to derail trains so that the wreckage
remains on the tracks to delay traffic for long periods of time. Fire
is directed on the exits of overturned coaches; and designated
parties, armed with automatic weapons, rush forward to assault
coaches or cars still standing. Other parties take supplies from
freight yards and then set fire to the train. Rails are removed from
the track at some distance from the ambush site in each direction to
delay the arrival of reinforcements by train. In planning the ambush
of a train, remember that the enemy may include armored railroad cars
in the train for its protection and that important trains may be
preceded by advance guard locomotives or inspection ears to check the
track.
a. General.
(5) Size of ambush force. The patrol is tailored for its mission.
Two men may be adequate for an harassing ambush. A destruction ambush
may require the entire unit (squad, platoon, company).
7-59
Figure 7-10 – Continued.
7-60
(8) Routes.
(9) Site. Maps and aerial photographs are used to analyze the
terrain. When possible, an on-the-ground reconnaissance is made. As
far as possible, so-called "ideal" ambush sites are avoided. An alert
enemy is suspicious of these areas, avoids them if possible, and
increases vigilance and security when they must be entered. Surprise
is even more difficult to achieve in these areas. Instead, apparently
unlikely sites are chosen when possible. Considering this, an ambush
site must provide
(11) Positions. The patrol moves into the ambush site from
the rear ((8) above. Security elements are positioned first to
prevent surprise while the ambush is being established.
Automatic weapons are then positioned so that each can fire
along the entire killing zone. If this is not possible, they are
given overlapping sectors of fire so that the entire killing
zone is covered. The patrol leader then selects his position, located
where he can tell when to initiate the ambush. Riflemen and
grenadiers are then placed to cover any dead space left by the
automatic weapons. All weapons are assigned sectors of fire to
7-61
provide mutual support. The patrol leader sets a time by which
positions are to be prepared. The degree of preparation depends on
the time allowed. All men work at top speed during the allotted time.
c. Execution.
(1) Signals. Three signals, often four, are needed to execute the
ambush. Audible and visual signals, such as whistles and
pyrotechnics, must be changed often to avoid establishing patterns.
Too frequently, use of the same signals may result, in their becoming
known to the enemy. A target might recognize a signal and be able to
react in time to avoid the full effects of an ambush. For example, if
a white star cluster is habitually used to signal withdrawal in a
night ambush, an alert enemy might fire one and cause premature
withdrawal.
1. Arm-and-hand signals.
7-62
(d) A signal for withdrawal may also be by voice command,
whistles, or pyrotechnics.
(2) Fire Discipline. This is a key part of the ambush. Fire must
be withheld until the signal is given, then immediately delivered in
the heaviest, most accurate volume possible. Properly timed and
delivered fires contribute heavily to the achievement of surprise as
well as to destruction. of the target. When the target is to be
assaulted, the lifting or shifting of fires must be equally precise.
Otherwise, the assault is delayed and the target has opportunity to
recover and react.
7-49. GENERAL
7-50. MINING
7-63
7-51. SNIPING
7-52. OBSTACLES
7-66
CHAPTER 8
LOGISTICS
Section I. INTRODUCTION
8-1. GENERAL
(1) Capabilities.
8-5. GENERAL
8-2
bearing on diseases and noncombat injuries. The geography of an area
and the enemy situation influence the type of targets to be attacked.
a. Necessities of Life.
(1) Food. Most areas suitable for guerrilla base camps will have
some natural foods such as berries, edible plants, and small game.
These foods, however, are not sufficient to sustain the energy of
active guerrillas, and high-calorie foods such as grains, sugar, and
certain types of meats must be provided.
e. Storage.
8-4
(2) Caches are established and secured by both guerrilla and
auxiliary units in friendly areas prior to their being overrun or in
enemy-held areas after hostilities have commenced. They may be
located in caves, swamps, forests, cemeteries, or lakes. Dispersed
cache systems permit the guerrilla force to operate throughout the
UWOA independent of their base areas.
8-5
(1) The guerrilla force. The logistics system's primary purpose
is to provide support to guerrilla units. Usually guerrilla units are
satellited on an auxiliary region and receive direct logistical
support from auxiliary units within its operational area. In addition
to support from the auxiliary, the guerrilla unit may take overt
actions to satisfy its logistics requirements.
(2) The auxiliary. Since members of- the auxiliary live a normal
lifestyle, they are logistically self-sufficient. Normally, an
auxiliary unit is assigned responsibility for providing direct
logistical support to the guerrilla units) operating within its area
of responsibility. Common auxiliary-guerrilla areas of responsibility
simplify relationships by allowing direct coordination between the
auxiliary and supported guerrilla units.
8-6
b. Purchase. Currency for support of operations may be provided
from external or internal sources. Currency may be the money of the
area or some suitable substitute such as gold or promissory notes.'
Procurement through purchase is normally restricted to critical or
scarce items not available through other forms of procurement. Care
should be exercised to insure that the excessive injection of outside
currency does not disrupt the local economy unless economic
disruption is also a resistance force objective. General guidance on
fiscal administration is contained in AR 37-1.03 and AR 37-103-1.
8-9. GENERAL
Figure 8-1
Phases of supply from external support.
8-8
8-10. PHASES OF SUPPLY
(9) Necessity for other items of equipment and supplies (to help
establish rapport with resistance personnel).
b. Phase B - Resupply.
(2) The SFOB (or FOB when appropriate) schedules the delivery of
automatic and emergency resupply to deployed Special Forces elements.
Preplanned automatic and emergency resupply provides the UW force
with immediate supplies and equipment until on-call/routine resupply
8-9
procedures can be established. To facilitate handling and
transportation within the UWOA, equipment and supplies are normally
packed and rigged in appropriate aerial delivery containers which
have a cargo capacity of 500 pounds or less. To allow rapid clearance
of the DZ, the contents of each container are further packaged in
man-portable units of approximately 50 pounds each.
(3) Fulfills the need for selected items of equipment (to equip a
nucleus of the resistance force if a reception committee was not
expected on infiltration).
8-10
c. Phase C - On-Call/Routine.
(2) These supplies consist of major equipment items which are not
consumed at a predictable rate. They are held in readiness at theater
army area command (TAACOM) depots or at the SFOB/FOB for immediate
delivery on a specified mission request basis.
8-11. DELIVERY
8-12. ACCOUNTABILITY
a. Class I – Subsistence.
8-13
d. An inventory list is included in each delivery container to aid
in identifying lost or damaged material.
SECTION DESIGNATION
Chemical ALPHA ALPHA through
DELTA ZULU
Demolitions and Mines ECHO ALPHA through
HOTEL ZULU
Medical INDIA ALPHA through
LIMA ZULU
Weapons and Ammunition MIKE ALPHA through
PAPA ZULU
Quartermaster QUEBEC ALPHA through
TANGO ZULU
Signal UNIFORM ALPHA through
WHISKEY ZULU
Special XRAY ALPHA through
ZULU ZULU
8-14
c. Some units and packages are followed by a numbered list showing
the contents of the package or unit. The unit or package can be
ordered complete, or any numbered item may be ordered separately. For
example:
(4) Your request would read THREE UNIFORM HOTEL ONE indicating
six radios are required.
8-15
8-16
Section IV. PLANNING CONSIDERATIONS IN ESTABLISHING SUPPLY SYSTEMS
8-17. GENERAL
a. Ammunition.
8-17
(4) How much ammunition may be expected to be lost during
resupply operations? Considerations:
(a) High winds causing rough seas can make resupply difficult
by sea.
(b) Rainy weather with limited visibility and low cloud cover
could preclude resupply by air.
b. Weapons.
8-18
(b) Procedures may be set up to replace worn out gun barrels,
provided armorer repair kits and personnel to train are available.
c. Explosives.
(a) More explosives per man, or per unit, are necessary in the
initial stages than later as discussed in paragraph a(5) above and
chapter 5.
8-19
(b) Caches should be established on a decentralized control
system.
d. Individual Equipment.
e. Medical Supplies.
f. Food Supplies.
8-20
(1) What must be planned regarding food supplies? Considerations:
(b) Salt and sugar are important items and should be supplied
from the SFOB if they cannot be procured locally.
a. The considerations discussed are not the only factors that the
detachment and area commanders must take into consideration.
Continuing area assessment may disclose other areas of concern not
readily apparent at the time of initial infiltration.
8-21
8-22
CHAPTER 9
COMMUNICATIONS
Section I. GENERAL
9-1. GENERAL
(a) Messenger.
(b) Radio.
(c) Telephone.
Figure 9-1
Expedient Ground return circuit.
9-3
e. Visual Signals. Visual signals are limited only by the
equipment available. Normal actions are the guide for developing
visual signals. Visual signals include:
9-4. GENERAL
9-5
(1) Preparation. All outgoing messages to the SFOB are prepared
or reviewed by the detachment commander or his executive officer
before transmission.
(2) Content. Write the message and then read it back:. First
consider each portion. Can any portion be eliminated; many times the
bulk of a message is used to say something already obvious by just
sending the message. Does each portion tell the addressee something
or could that whole sentence or thought be eliminated? Then consider
whether the thought of the message is expressed as clearly and
concisely as possible.
9-6
(2) The Q and Z signals used by radio operators (ACP 131).
9-9. GENERAL
9-7
Figure 9-2
Expedient insulator.
9-8
Figure 9-3
One-quarter-wavelength antenna (vertical).
9-9
Figure 9-4
Half-wave doublet antenna.
9-10
Figure 9-5
Slant-wire antenna.
9-11
Figure 9-6
Fourteen percent off-center fed antenna.
Figure 9-7
Full-wave square-loop antenna.
9-12
(2) For operation on lower frequencies, a half-wave square-loop
antenna (fig. 9-8) may be used inside a building with excellent
results if care is taken in constructing and tuning the antenna. When
operating the AN/GRC-109, the indicator lamp of the antenna will not
glow brightly with either the full-wave loop or the half-wave open
loop. Although these antennas may be used indoors, best results are
obtained when operating with an outdoor system.
Figure 9-8
Half-wave square-loop antenna.
9-13
g. Other Antennas. It may be necessary to have patrols operating
outside the normal range of FM radio sets. If so, an antenna system
that will allow communications beyond the normal range of current
radios can be constructed by using the jungle antenna (fig. 9-9) or
the half-rhombic antenna (fig. 9-10). When operating on frequencies
above 30 MHz, the transmission range can be increased by improved
antennas. The use of any one these antennas should more than double
the range of standard radio sets.
Figure 9-9
Jungle antenna.
9-14
Figure 9-10
Half-rhombic antenna.
9-15
9-16
CHAPTER 10
MEDICAL
Section I. INTRODUCTION
10-1. GENERAL
10-2. TRAINING
10-3. INTELLIGENCE
10-2
(b) It brings to attention those disease problems of military
importance which require further investigation within operational
areas by teams of trained personnel in order to devise techniques for
their prevention.
b. Veterinary Information.
10-4. SUPPLY
10-5. HOSPITALIZATION
10-6. EVACUATION
10-4
d. As the operational area develops and the overall situation
favors the sponsor, evacuation of the sick and wounded to friendly
areas may be feasible. This lightens the burden upon the meager
facilities available to the area command and provides a higher
standard of medical care for the patient. Whenever possible, wounded
or sick Americans should be evacuated to a safe area for possible
exfiltration from the UWOA. The same is true of key guerrilla and
resistance leaders. Each case will have to be evaluated against the
risk of compromising the overall resistance force mission. A strict;
system of priorities for evacuation from the UWOA will be established
by the SFOB.,
10-5
(a) Briefings on the veterinary medical situation in areas of
planned deployment to include endemic and potential epidemic animal
diseases transmissible to man, and individual and small-unit measures
for their prevention.
10-6
1. Survival techniques to be used by individual and small,
operational units.
10-7
(4) Training and experience of medical officers assigned to the
guerrilla hospital facility.
c. Organization.
10-8
(e) Convalescent section. Establishes sites at which care is
provided to guerrillas no longer requiring the more intensive support
provided by the treatment section. Such sites increase the dispersion
of patients. Depending on the condition of guerrillas placed in
convalescent sites, guerrilla hospital personnel may not be required
to continually staff the sites.
d. Command Relationships.
e. Employment.
10-9. GENERAL
10-10
10-10. MEDICAL REQUIREMENT DURING THE BUILDUP PHASE
(1) The guerrilla force may comprise both foreign and local
personnel. Differences in immunity to the endemic diseases will exist
between ethnic groups. Certain preventive measures may be applicable
to one group and not to the other. For instance, the use of
chloroquineprimaquine for the prevention of malaria is not equally
feasible in all populations. While it may be necessary to administer
routine malaria prophylaxis to those recently introduced to 'the
area, it may or may not be desirable to treat local resistance forces
with the same drugs, e.g., primaquine may be poorly tolerated by the
local personnel. Further, the members of the resistance force may
exhibit diseases uncommon to US forces, such, as serious nutritional
deficiencies and cases of active tuberculosis.
10-11
10-11. MEDICAL SUPPORT DURING EMPLOYMENT PHASE
10-12
CHAPTER 11
Section I. INTRODUCTION
11-1. GENERAL
11-2. CONCEPT
A-1
(2) Internal development – Actions taken by a nation to promote its
growth by building viable institutions (political, military, economic, and
social) that respond to the needs of its society. (JCS Pub 1)
11-3. GENERAL
A-2
c. Civil Affairs Operations.
A-3
rest areas, arms factories, sources of food, or major infiltration routes.
The purpose of operations in these areas is to interdict the insurgent
movement and destroy its support facilities.
A-4
intelligence in addition to the traditional ones of enemy, weather, and
terrain.
a. Preparation. Basically the same preparations are made for FID as for
UW. However, the Special Forces element is required, because of the nature
of the activities in FID, to make extensive studies of local customs,
religious beliefs, languages, cultural backgrounds, and personalities.
Special Forces need to exploit, to the maximum, local law enforcement
agencies; security and intelligence elements and organizations; and
interpreters, guides, and trackers.
A-5
Section IV. INFILTRATION TECHNIQUES
11-7. GENERAL
Section V. COMMUNICATIONS
A-6
d. Communications with observation posts.
11-10. TRAINING
11-11. GENERAL
A-7
11-12. CONTROLS
b. Additional controls must be put into effect for materials that can be
used in medical treatment of insurgents and in manufacturing improvised
explosives. Adequate control of these items will depend upon properly
trained security personnel positioned at the production and distribution
facilities for these sensitive items.
(a) Informers.
(e) Curfews.
A-8
Section VII. FIELD ENGINEERING
11-13. GENERAL
a. Road expedients.
A-9
Section VIII. MEDICAL REQUIREMENTS
11-15. GENERAL
A-10
can usually be developed to attack basic health problems in the
village.
A-11
g. Priorities for programs are based upon the initial area assessment as
well as upon the desires or "felt needs" of the community. In initiating
programs, consider these basic rules:
A-12
APPENDIX A
OUTLINE
a. Occupying power.
(a) Influence.
(b) Organization.
(a) Government.
A-1
(a) Toward the United States.
1. Political concentrations.
2. Military concentrations.
3. Economic concentrations.
c. Political parties/factions.
A-2
d. Control and restrictions.
(1) Documentation.
(2) Rationing.
A-2. ECONOMY
a. Technological standards.
(1) Agriculture.
(1) Industry.
A-3
(1) Manufacture of consumer goods.
(1) Fuels.
(2) dower.
(1) Railroads.
(2) Highways.
(3) Waterways.
A-4
(4) Control and operation of transportation.
A-3. GEOGRAPHY
(a) Temperature.
1. Rainfall.
2. Snow.
1. Wind.
2. Visibility.
1. Effect on terrain.
2. Effect on visibility.
(4) Relief.
A-5
(b) General degree of slope.
A-6
(a) Tides and waves.
(11) Subsistence.
A-7
(1) Types, features, dress, and habits.
A-8
(2) Class structure (degree of established social
stratification and percentage of populace in each class).
(b) Population:
A-9
(a) Offensive.
(b) Defensive.
(3) Army.
(b) Organization.
(4) Navy.
A-10
(a) Air Force total personnel strength:
(6) Marines.
A-11
(17) Tactics (seasonal and terrain variations).
(19) Logistics.
a. Guerrillas.
A-12
(4) Operations to date.
c. Logistical capability.
A-7. TARGETS
A-13
carefully analyzed, and priorities established. In general,
targets are listed in order of priority in accordance with
mission requirements.)
a. Railroads.
(d) Tunnels.
b. Telecommunications.
c. POL.
d. Electric power.
A-14
h. Highways.
j. Seaports.
l. Industrial plants.
A-8. GENERAL
A-9. PURPOSE
A-10. FORMAT
a. Select from the area study guide those elements that are
applicable to the situation and the assigned UWOA.
A-15
(3) Possible direction and orientation points for
infiltration vehicles (aircraft or 'goat); i.e., landmarks or
reference points.
A-16
(2) Enemy—military forces and installations.
A-17
c. SFOD Commander.
(a) Geography.
(c) Economics.
(d) Religion.
e. SFOD S2 or Assistants.
f. S3 or Assistants.
A-18
(1) Infiltration plan to include:
(d) Strengths.
(e) Weaknesses.
g. SFOD S1.
A-19
(d) Photographs.
(c) Mail.
(a) Food.
A-20
(b) Weapons.
(c) Demolitions.
(d) Equipment.
(a) Hospitals.
(b) Doctors.
k. SFOD Commander.
A-21
(a) Notification system.
A-22
ANNEX A to Appendix A
ANNOTATED BIBLIOGRAPHY
1. SOVIET ARMY
2. MIDEAST
A-23
b. Handbook on the Chinese Communist Armed Forces (U), DIA,
Apr 66 (SECRET). Describes the Chinese Communist military
system, including ground forces, Navy, Air Force, and
paramilitary forces. (Organization, Doctrine, Personnel and
Training, Logistics, Weapons and Equipment.)
4. NORTH KOREA
5. UNITED STATES
6. GENERAL
A-24
b. Tactics of Soviet Ground Forces (DIA) (CONFIDENTIAL) DDI-
1100-123-75 (U). Soviet Tank Company Tactics (DIA) DDI-1120-129-
76. Military Operations of the Soviet Army - U-9AITAD Report No.
14-U-76 United States Army Intelligence Threat Analysis
Detachment.)
A-25
ANNEX B to Appendix A
REFERENCES
A-26
21-75 Combat Training of they Individual Soldier
and Patrolling
24-1 Tactical Communications Doctrine
30-5 Combat Intelligence
30-15 Intelligence Interrogation
30-16 Technical Intelligence
30-17 Counterintelligence Operations
30-20 Aerial Surveillance-Reconnaissance Field
Army
30-35 Military Intelligence Battalion, Aerial
Reconnaissance Support.
30-40 Handbook on Soviet Ground Forces
(C)31-20 Special Forces Operations (U)
(C)32-5 Signal Security (SIGSEC) (U)
(S)32-10 USASA in Support of Tactical Operations
(U)
100-5 Operations
100-26 The Air-Ground Operations Systems
101-5 Staff Officers' Field Manual: Staff
Organization and Procedure
101-31-1 Staff Officers' Field Manual: Nuclear
Weapons Employment, Doctrine, and
Procedures
TO BE PUBLISHED
A-27
MISCELLANEOUS PUBLICATIONS
TRADOC BULLETINS
A-28
ANNEX C to Appendix A
GTA TITLE
30-1-9 Production of Intelligence
30-1-10 Essential Elements of Information and Collection
Plan
30-1-11 Intelligence Cycle
30-1-12 Combat Intelligence
30-i-13 Journal, Workbook, and Situation Map
30-1-14 Introduction to Intelligence Reports
30-1-16 Military Intelligence Responsibilities for
Surveillance and Reconnaissance
30-1-17 Intelligence Officers Responsibility for
Surveillance and Reconnaissance
30-1-18 National Intelligence Community
30-1-19 Analysis of the Area of Operation
30-1-20 Interrogation Approach Techniques
30-1-21 Order of Battle Elements
30-1-22 Radar Surveillance Card and Plotter
30-1-23 Soldier's Guide to Combat Intelligence
30-3-7 Historical Development of Soviet Intelligence
30-3-8 Soviet Ordnance
30-3-10 Warsaw Treaty Organization
30-3-11 Soviet Antitank Weapons
30-3-13 North Atlantic Treaty Organization (NATO)
30-3-14 Warsaw Pact and Nato Tank Recognition Guide
30-3-15 Soviet Weapons Whiz Wheel
30-3-16 Soviet Army and Navy Uniforms, Ranks and Insignia
30-3-17 Intelligence Documents for Field Training
A-29
A-30
APPENDIX B
AREA ASSESSMENT
c. Overall security:
a. The Enemy.
(1) Disposition.
(5) Operations:
(2) Disposition.
c. Civil Government.
(a) Documentation.
(b) Rationing.
d. Civilian Populace.
e. Potential Targets.
(1) Railroads.
(2) Telecommunication.
(3) POL.
(8) Highways.
(10) Seaports.
f. Weather.
B-3
(2) Wind speed and direction.
g. Terrain.
(a) Guerrillas.
h. Resistance Movement.
(1) Guerrillas.
j. Preventive Medicine.
(1) Weather.
(c) Attitudes.
(4) Housing.
(5) Food.
B-6
(b) In remote areas, what; system is used for
disposal of human excrement, offal, and dead animals or
humans?
B-7
B-8
APPENDIX C
a. Tools For the Job. Six items of equipment are necessary for
printing in the field and make it possible to have printed matter
available for use at any time anywhere. The field-expedient printer
can carry these items along whenever he expects to do printing in the
field; but a good workable substitute can be found for all of these
items in the forests, swamps, and deserts of the world. The field-
expedient printer can often do his job through the use of substitute
items. The six essential tools for printing in the field are:
(2) A stencil.
(3) Ink.
(4) A stylus.
(5) Paper.
(a) The silk screen (fig. C-1) consists of a frame over which
a piece of cloth is stretched. This frame is attached to a base to
provide a flat working space. The cover is not necessary for printing
but simply makes the silk screen easy to carry from one place to
another.
Figure C-1
Silk screen with carrying case.
C-1
(b) The stencil is a device which allows the ink to
pass through the screen and onto the paper where it is
needed anti blocks out the ink where it is not needed.
(e) Nails must be very thin so they will not split the
wood. It is best to use "soft" wood in making the frame.
When you have made the frame, you are ready to attach the
cloth. Many kinds of material can be used to make the
C-2
screen. Silk cloth is a material which gives the best
results, it is strong and can be cleaned and used many
times. Parachute nylon or a cotton handkerchief will also
serve in an emergency, even an undershirt can be used; however,
remember that only finely woven cloth will allow a fine line to be
printed.
Figure C-2
Dimensions for construction of silk screen frame.
(2) Soak the cloth in water so that it will shrink tightly over
the frame when it dries.
(3) Place the cloth over the wooden frame and place one tack in
each corner as shown in A, figure C-3. Either small 1/4-inch tacks or
staples can be used. You will need about 90 tacks or staples to
attach the cloth securely.
(4) Next, place a row of tacks along one side of the frame as
shown in B, figure C-3. Ten evenly spaced tacks or staples will be
enough.
(5) Place a row of tacks along the opposite edge of the frame as
shown in C, figure C-3. The cloth must be pulled tight before driving
each of these 10 tacks.
C-3
Figure C-3
Tacking cloth to underside of frame.
Figure C-4
Dimensions for construction of base and cover.
C-4
f. The Hinge Nails. You are now ready to hinge. the silk screen to
the base. Place the frame in the base with the cloth side down. The
silk screen is now flat against the cardboard or plywood. The end of
the silkscreen frame should be 1 1/2 inches from the end of the base.
This will permit the frame to be raised. The two 1 1/4-inch nails are
driven through the side of the base from the outside and into the end
of the silkscreen frame. Figure C-1 shows where these hinge nails are
placed. These two nails form a hinge which allows the screen to be
raised and lowered. The final step in making your silk screen is the
hinging of the base to the cover. This is done by using the 2- x 28-
inch'piece of canvas as a hinge. This piece of cloth is tacked along
one side of the base and cover. You now have a carrying case for the
silk screen, making the screen portable.
g. The Ink to Be Used. Many different kinds of ink can be used for
printing with the silk screen. Ink with an oil base, such as
mimeograph ink, is best. Paint with an oil base is the best
substitute or printer's ink can also be used. Ink that is used for
silkscreen printing should be thick; oil base paints are almost the
right thickness. A little practice with the silk screen will teach
the printer what to look for in a good printing ink. The field-
expedient printer can practice by using many kinds of ink and paints.
In an emergency, berries or any stain producing material can be
crushed and an ink substitute produced.
(1) The first step is to make sure that you have all six of your
tools. They should be clean and in good working order, and you should
have enough paper to finish the job.
(3) Lift the silkscreen frame up from the base as in figure C-1.
Place the stencil on the bottom of the screen. Tacks, tape, or glue
can be used to hold the stencil in place.
(4) Place a piece of paper on the base under the stencil. This
piece of paper will protect the base from ink while you are preparing
to print.
(5) Lower the silk screen onto the base. Place enough ink on the
silk to cover the screen. Use the squeegee to spread the ink evenly
and to force the ink through the opening in the stencil. The squeegee
must have a straight edge; another tool which will do the same job is
a roller. A roller made of hard rubber is best for spreading the ink
on the silk screen. A stiff brush is another tool which can be used.
C-5
(6) You are now ready to print. Place the piece of paper to be
printed on the base and lower the silk screen on top of the paper.
Slide the squeegee firmly over the silk, forcing the ink through the
stencil, lift the screen, remove the paper, and allow the paper to
dry. If the printing is not dark enough, add more ink to the screen.
(7) When the printing job is finished, remove the stencil and
clean the screen and all other tools. Also, be sure that the squeegee
is clean.
(2) Saturate the pad with mimeograph ink. This ink: can be a
composite of almost any grease and carbon scraped from a fireplace or
grating. Color can be achieved by mixing pigments of color to the
grease instead of carbon. Mimeograph ink, commercial grade, is a
universal item and is available in any civilized country. Shoe
polish, thinned with kerosene or other solvent, is generally
available and usable.
(3) Stencils can be made from thin, tough tissue or thin airmail
paper by applying a coat of wax (paraffin) to one side. This wax can
be rubbed on, then gently warmed to insure uniformity of thickness
and penetration of the paper. Only partial penetration is desirable;
not saturation.
(4) For a stylus, you may use a ballpoint pen, a slender stick of
hard wood, or even a heavy piece of wire with the ends rounded and
smoothed enough to etch the wax without tearing the paper. The stylus
is used to inscribe the desired message or to sketch on the wax
coating of the paper. The paper is then applied to the inkpad with
C-6
the wax next to the ink. Some of the ink will penetrate through the
lines made by the stylus, thus "printing" the blank paper. The
undisturbed wax prevents the ink from penetrating the paper in
unwanted places.
(2) When the gelatin plate is set and ready for work, sponge the
plate thoroughly with cold water and allow it to set for an
additional minute or two. Using a sponge, remove all excess moisture
and apply the master copy, face down, on the gelatin plate. Carefully
smooth the copy to insure complete and uniform contact with prepared
plate. Do not remove for at least 2 minutes. Lift one corner of the
master for a gripping point and smoothly and carefully lift the
C-7
master copy from the gelatin plate. The gelatin plate now bears a
negative copy of the desired material and is ready to reproduce the
copy.
(3) Begin reproduction immediately after the master copy has been
removed from the gelatin plate. Reproduction is accomplished by
placing a blank sheet of smooth surface paper on the gelatin plate
and smoothing it into total contact by using the hand (or a rubber
roller, if available), then lifting the sheet from the gelatin
surface. This is done rapidly to obtain as many copies as possible
from one inking of the plate. One good inking of the plate may
produce from 100 to 200 copies by this method, while a commercial
Ditto machine may produce as many as 700 copies. To speed this
process, one small corner of the sheet of reproduction paper is left
free for gripping. This can be accomplished by permanently affixing a
small piece of paper to the place on the gelatin plate where a corner
of the reproduction paper would fall. This piece of paper acts as a
guide and a buffer to keep that one corner of the reproduction paper
from sticking. When removing the reproduction paper, lift the sheet
by the loose corner; do not attempt to roll it away. The rolling
action will cause the reproduction paper to curl as it dries.
C-8
APPENDIX D
The master training program for the 10-day leadership school was developed to provide the indigenous
leaders and potential leaders with a general knowledge of the subjects to be taught to all indigenous
personnel. Primary emphasis is placed on the role of the leader or commander in order to prepare these
leaders to supervise the activities of their subordinates. It is assumed that most of these personnel
have had prior military service and, therefore, should already possess a basic knowledge of the subjects
to be covered. Upon completion of the 10-day leadership school, the leaders will return to their units
of work and train with their units, thus expanding their own knowledge of the subject covered. Following
an example of a 10-day master training program for a leadership school for selected indigenous
personnel. HOURS
Subject Scope Day Night Total PE
Map Reading and Compass Same general scope as in 30-day program. Include how 4 2 6 (4)
to read scale and coordinates.
Field Aid, Field Same general scope as in 30-day program. Emphasis on 4 4 (1)
Sanitation, and Survival field sanitation and responsibility of commanders.
Individual Tactical Same general scope as in 30-day program. Emphasis on 10 9 19 (16)
Training (Day and Night) security of operational bases, movements,
formations, control measures at night, and duties
and responsibilities of commanders.
Patrols, Small-Unit Same general scope as in 30-day program. Emphasis on 10 29 30 (25)
Tactics, Raids, Ambushes planning, organization, preparation, command,
(Day and Night) control, security, execution of patrols, ambushes
and raids.
Weapons (US and Foreign) Same general scope as in 30-day program. 8 2 10 (7)
Familiarization firing. Primary emphasis on
employment of weapons.
Intelligence Same general scope as in 30-day program. Primary and 6 4 10 (8)
counterintelligence. Night visions.
Air Operations Same general scope as in 30-day program. Primary 6 8 14 (11)
emphasis on selection and reporting of DZ's,
organization of reception committee, duties and
responsibilities of commanders.
Demolition Familiarization with demolition procedures; 5 5 (3)
demonstrating, planning, safety.
Communications Communication means, available systems, 4 4 (2)
communication security, simple cryptographic
systems.
Leadership Principles and Military leadership, traits, principles, 6 6 (4)
Techniques indications, actions, and orders. Responsibilities
and duties of the commander. Human behavior problem
areas and problem-solving process. Selection of
junior leaders. Span of control and chain of
command. Combat leadership.
Tactics and Operations Characteristics of guerrilla warfare, guerrilla 7 5 12 (9)
operations, principles, capabilities, and
limitations, organization of operational bases,
security, civilian support, logistics,
counterintelligence, combat employment, missions,
tactical control measures, target selection, mission
support site, and defensive measures.
Responsibilities and duties of indigenous leaders.
Total hours in master program 70 50 120 (90)
Notes:
1. Identify those personnel whose leadership ability, knowledge, skill, or desire is below acceptable
standards.
2. Upon completion of leadership school one additional day may be scheduled for coordinating and
planning future operations.
3. A suggested arrangement of scheduling is as follows:
29 April - 4 May: Preparation for training and selection of leaders.
5 - 14 May: Leadership training.
16 May - 14 June: Troop training.
Section II. EXAMPLE OF A 30-DAY MASTER TRAINING PROGRAM
1. Personnel Data:
e. CIVILIAN OCCUPATION
f. LANGUAGES
h. FINANCIAL DATA:
j. PHOTOGRAPH
D-5
2. Training Record: SUBJECTS DATES
a. Basic Training
Advanced/specialist training:
DEGREE OF
WEAPON SKILL
c. Weapon qualifications:
D-6
d. Combat operations:
Disciplinary actions:
D-7
D-8
APPENDIX E
Section I. INTRODUCTION
E-1. GENERAL
a. A patrol may make contact with the enemy at any time. This
is especially true in guerrilla operations. Contact may be by
chance, by air observation or attack, or by ambush. It may beg
visual only: the patrol sights the enemy but is undetected by
him. In this case, the patrol leader can decide whether to make
or avoid physical contact, basing his decision on the patrol's
assigned mission and capability to successfully engage the
potential target.
E-1
(3) Can, in many cases, be initiated by any member of the
E-3. SIGNALS
E-2
E-4. SCOPE
Figure E-1
Special silent signals.
E-3
Section II. EXAMPLE IMMEDIATE ACTION DRILLS
E-4
(1) When used as a defensive measure to avoid contact,
ambush is not initiated unless the patrol is detected.
E-5
(3) The attack is continued to eliminate the ambush or to
break contact as directed.
E-6
Figure E-2
Immediate action drills.
E-7
Figure E-2
Continued.
E-8
Figure E-2
Continued.
E-9
(3) Situation. Patrol and enemy detect each other at same
time and at such close range that breaking by clock system or
fire and maneuver is not appropriate.
Figure E-2
Continued.
E-10
Figure E-2
Continued.
E-11
Figure E-2
Continued.
E-12
Figure E-2
Continued.
E-13
(b) Subsequent action. Patrol allows enemy to advance as
close as possible. Patrol leader opens fire when enemy is in
most vulnerable position (any patrol member opens fire if
detected). Patrol assaults with great violence and heavy fire;
destroys enemy; pursues if appropriate (11, 12, fig. E-2).
Figure E-2
Continued.
E-14
(2) Situation. Patrol sees enemy approaching. Contact
appears unavoidable.
Figure E-2
Continued.
E-15
(3) Situation. Patrol and enemy detect each other at same
time.
Figure E-2
Continued.
E-16
(4) Situation. Patrol is ambushed (near ambush).
Figure E-2
Continued.
E-17
Figure E-2
Continued.
E-18
Figure E-2
Continued.
E-19
Figure E-2
Continued.
E-20
APPENDIX F
Section I. GENERAL.
F-3. GENERAL
F-1
(1) Terrain, such as heavy jungle, restricts or prohibits cross-
country movement.
F-4. SCOPE
a. Map. The leader studies a map of the terrain over which he will move
his unit. He first checks the map's marginal data to determine reliability
at the time the map was made. If reliability is not good, or if the map is
old, he evaluates its reliability in Light of all other information he can
obtain. For example, a 20-year old map may not show several nearby roads
and trails; more recent; building and development in the area will not be
shown. The leader considers the terrain in relation to all available
information of known or suspected enemy positions and previous ambush
sites. His map study includes evaluation of the terrain from the enemy's
viewpoint. How could the enemy use this terrain? Where could the enemy
position troops, installations, and ambushes?
F-2
(2) Limitations. Despite its many advantages, aerial reconnaissance
has limitations.
c. Route Selection. The factors the leader considers are the same
whether he is selecting his route or studying a route he has been directed
to follow.
(1) Cover and concealment. Cover and concealment are desirable, but a
route with these features may obstruct movement. Terrain which provides a
moving unit cover and concealment also provides the enemy increased
opportunities for ambush. Identification of areas where ambushes may be
concealed allows the Leader to develop plans for clearing these areas.
(5) Attitude of the civilian population; the extent to which they can
be expected to cooperate or interfere.
F-3
e. Counterintelligence. In counterguerrillaoperations,in particular, a
key feature of preparing for movement is denying the enemy information. A
unit is especially vulnerable to ambush if the enemy knows the unit is to
move, what time it is to depart, where it is to go, the route it is to
follow, and the weapons and equipment; it is to carry. The efforts made to
deny or delay enemy acquisition of this information comprise the
counterintelligence plan.As a minimum, the plan restricts dissemination of
information.
Figure F-1
Examples of deception plans.
F-4
Figure F-1 – Continued.
g. Fire Support. Artillery and mortar fires are planned so they will
deceive, harass, or destroy the enemy. They may be planned as scheduled or
on-call fires.
(a) On key terrain features along the route. These can serve as
navigation aids or to deceive, harass, or destroy enemy on them.
F-5
(b) On known enemy positions.
(f) At intervals along the route, every 500 or 1,000 meters for
example. With fires so planned, the unit is never far from a plotted
concentration from which a shift can be quickly made.
F-6. MOVEMENT
(2) Less obvious items from which "negative information" may be gained
are:
F-6
(a) The absence of workers in fields. This may indicate that the
enemy is near.
(c) The absence of young men in a village. This indicates that the
village is controlled b y the enemy.
(a) A farm cart moving at night shows one lantern to indicate that
no government troops are on the road or trail behind. Two lanterns means
that government troops are close behind.
(b) A worker in the fields stops to put on or take off his shirt.
Either act can signal the approach of government troops. This is relayed by
other informers.
(c) A villager fishing in a rice paddy holds his pole out straight
to signal all clear up at an angles to signal that troops are approaching.
Figure F-2
Security in a two-man patrol.
F-7
(b) A larger unit can use any standard formation (file, column, vee)
and establish a reaction force. This reaction force can be separated from
the main body so that it will not come under, the fires of an ambush of the
main body, and can maneuver to destroy the ambush.
Figure F-3
Security organization of a rifle company.
F-8
APPENDIX G
PATROL BASES
G-1. GENERAL
G-2. PURPOSES
G-1
(2) A requirement to hide the patrol during a lengthy, detailed
reconnaissance of the objective area.
(3) A need to prepare food, maintain weapons and equipment, and rest
after extended movement.
(4) A need to formulate a final plan and issue necessary orders prior
to actions at the objective.
G-3. SELECTION
(1) The alternate location is for uses if the initial location proves
unsuitable or if the patrol is required to evacuate the initial location
prematurely. In guerrilla operations, reconnaissance and surveillance of
the alternate location until occupied or no longer needed are usually
desirable. Reconnaissance and surveillance are not needed as much in
counterguerrilla operations and are less likely to be possible or
practical.
(2) The rendezvous point is for use if the patrol evacuates the patrol
base by exfiltration of groups. The rendezvous point will not have been
reconnoitered.
G-2
(3) The rallying point is for use if the patrol is dispersed from the
patrol base. It is a point over which the patrol has previously passed, it
has been found suitable, and it is known to all.
G-4. CONSIDERATIONS.
When planning for a patrol base, mission and both passive and active
security measures must be considered.
a. Mission. A patrol base must be located in the best place for the
patrol to accomplish its mission.
(1) Select-
(2) Avoid-
G-3
(5) Ad alert plan.
A patrol base may be occupied in either of two ways: (1) by moving to the
selected site and expanding into and organizing the area in the same manner
as an on-the-spot establishment, or (2) by halting near the selected site
and sending forward reconnaissance farces. The method used must be
thoroughly planned and rehearsed. The establishment and use of patrol base
drills in these methods will assist in the swift and efficient
establishment of patrol bases. Occupation, using an example patrol base
drill, and subsequent operation are described below (1, figure G-1).
Figure G-1
Patrol base establishment.
G-4
a. Approach.
b. Reconnaissance.
(1) Patrol leader designates point of entry into patrol base location
as 6 o'clock; assigns areas by clock system; designates center of base as
patrol headquarters; moves to patrol headquarters.
(1) Patrol leaves line of march at right angles and enters base in
single file, moving to center of base. Designated men remove signs of
patrol's movement.
(2) Each leader peels off his unit and leads it to the left flank of
the unit sector.
(6) Patrol leader designates rallying points, positions for OPs and
listening posts, and withdrawal routes.
(7) Each unit puts out one two-man OP (day) and one three-man
listening post (night) and establishes communications.
G-5
Figure G-1.
Continued.
G-6
Figure G-1.
Continued.
G-7
d. Operation (figure G-2).
(1) Security.
(a) Only one point of entry and exit is used. It is camouflaged and
guarded at all times.
(b) Fires are built only when necessary and, as a general rule, only
in daylight. Whether day or night, only necessary fires are built and they
are kept as small as possible. Where terrain permits, fires are built in
pits and, if built at night, are carefully covered and shielded. Building
fires in pits reduces the danger of visual detection and facilitates
extinguishing the fires and camouflaging the sites. The driest and hardest
wood available is used (to reduce smoke). In most areas, the best time for
building fires is when the air is thin and smoke dissipates quickly
(usually around noon); early morning may be appropriate, however, in areas
where there is ground fog. The risk of detection, because of lingering
odor, must be weighed against the risk of detection due to visible smoke.
Figure G-2
Typical patrol base layout.
G-8
(c) Noisy tasks, such as cutting branches, are accomplished only at
designated times, as early as possible after occupation but never at night
nor during the quiet periods of early morning and late evening. When
possible, noisy tasks are performed when other sounds will cover them, such
as the sounds of aircraft, artillery, or distant battle noises.
(d) Movement, both inside and outside the patrol base, is restricted
to the minimum necessary.
(e) Civilians who discover the location of tire patrol base are
detained until the base is moved or until they can be evacuated to higher
headquarters. Care is taken to prevent the detained civilians from learning
about the base, its operation, and future plans. If necessary, they are
tied and blindfolded and their ears are covered.
(i) Each man makes certain that, he knows the locations of men and
positions to his flanks, front, and rear, and that he knows the times and
routes of any expected movement within, into, and out of the patrol base.
G-9
(d) An alert plan is established. This includes plans for evacuation
and defense. All members must know these plans and the signals or orders
for their implementation. Plans for defending the base include pursuit and
destruction of the attacking force.
(b) Wire can be used within the patrol base if its bulk and weight
and the time required to lay and pick up are not disadvantages.
(c) Tug, or pull, wires may be used for signaling. They are quiet
and reduce radio or telephone traffic.
(a) In daylight, catholes outside the perimeter are used. The user
must be guarded.
(c) Men wash, shave, and brush their teeth as needed, consistent
with the situation (including availability of water).
(d) Cans, food, and other trash are buried and the site is
concealed.
(8) Rest. Rest and sleep are permitted only after a11 work is done.
Rest periods are staggered so that proper security is maintained.
Consistent with work and security requirements, as much sleep and rest as
possible are scheduled for each man.
G-10
(9) Resupply. If the patrol is to be resupplied by air, the flight
path, drop and/or landing zone, and cache are located so that neither the
base nor possible objectives are compromised.
(11) Departure.
G-11
G-12
APPENDIX H
Section I. INTRODUCTION
H-1. GENERAL
H-1
H-3. INDICATORS
H-2
to anti of the other five physical sense. It is a feeling or a premonition.
H-3
(o) Increased reconnaissance and radio traffic, demonstrations,
feints, massing of forces, or change in location of headquarters, medical
facilities, and other supporting forces.
H-4
(f) New homes, fields, roads, trails, or canals in areas other than
those controlled by the government.
H-5
Figure H-1
Area surveyed by tracker for indicators.
H-6
(6) Interpretation and/or immediate use intelligence.
H-6. DISPLACEMENT
a. Since the last man in a file will normally leave the clearest
footprints, his will be the key set of prints. A stick can be cut to match
the length of the key print and notched to indicate width at the widest
part of the sole. The tracker should study the angle o f the key print to
the direction of march. Also he should look for an identifying mark or
feature on the print, such as a worn or frayed part of footwear, to help
him identify the key print. In case the trail becomes vague or obliterated,
H-7
or the trail being followed merges with another, the tracker can use his
stick measuring devices and with close study be able to identify the key
print. This will aid him to stay on the trail of the group being followed.
b. The box method can be used to count up to 18 persons. There are three
ways the tracker can employ the box method.
(1) The first and most accurate is to use the stride as a unit of
measure. This is used when a key print can be determined (1, figure H-2).
By identifying the key print on a trail and drawing a line from the heel of
the foot across the trail or road, then moving forward to the opposite
print made by the same person, and drawing a line through the instep, the
tracker forms a box with the edges of the road or trail forming the sides
and the lines he has drawn as the front and back. The tracker then counts
every print inside the box to determine the number of persons in the party
being followed. Any person walking normally would have stepped in the box
at least one time. The key print should be counted as one.
(2) The second way the tracker can employ the box method is the 18-
inch box (2, figure H-2). The 18-inch box is used when there is no key
print distinguishable. In this method, the sides of the road, trail, or
open area again form the sides of the box. This time, however, the tracker
finds an average section of trail and marks off a cross section 18 inches
in length. By counting each indentation in the box, the tracker can
determine approximately how many persons used this particular trail. This
system is not as accurate as the stride measurement. One can readily see
that a person walking with a long stride may step completely over the
18 inch box. Another fault in this method is that a soldier may not have a
measuring device with him.
(3) The third way a tracker may use the box method is the 36 inch box.
The 36-inch box is roughly the same as the 18-inch system. The tracker
marks off a 36-inch cross section of the trail, counts the prints or
indentations in the box, then divides by 2 to determine the number of
persons that used the trail. This system has the same drawbacks as the 18-
inch box but may be useful under the right circumstances (3, fig. H-2).
(The M16 rifle is 36 inches long and may be used as a measuring device.)
Footprints are only one example of displacement,. Anything; that has been
moved from its original position by a moving person is an example of
displacement.
H-8
Figure H-2.
Box methods of determining number of footprints.
H-9
turned over to indicate a different color underneath. Grass or other
vegetation may be bent or broken in the direction of movement.
c. Wild animals and birds flushed from their natural habitat by the
person being tracked are examples of displacement. Cries of birds excited
by unnatural movement is an indicator. Tops of talc grass or brush moving
on a windless day indicates that someone is moving the vegetation.
H-10. STAINING
Staining occurs when any substance from one organism or article is smeared
or deposited on something else.
H-10
a. The best example of staining is blood from a profusely bleeding
wound. Blood signs often will be in the form of spatters o f drops. Blood
indicators are not always on the ground. Blood can be smeared on leaves or
twigs from a man's height to the ground.
(e) A bloodstain from a head wound will appear heavy, wet, and
slimy, like gelatin.
(f) Abdominal wounds often mix blood with digestive juices so that
the deposit will have an odor and be light in color.
(2) The seriousness of the wound and how far the individual can move
unassisted. This process could lead the tracker to enemy bodies or further
indications as to where they have been carried.
a. Staining can also occur when muddy footgear is dragged over grass,
stones, and shrubs. Thus, staining and displacement combine to indicate
movement and the direction taken.
(1) Crushed leaves may stain rocky ground that; is too hard to leave
footprints.
(2) Roots, stones, and vines may be stained where leaves or berries
are crushed on them by moving feet.
H-11
be stained by mud from footwear. Algae can be displaced from stones in
streams and can stain other stones or the bank.
H-12. WEATHERING
a. Alight rain may round out the edges of the print. The tracker must
remember when the last rain occurred in order to place these prints into a
proper time frame. A heavy rain may erase all signs.
b. Wind also affects tracks. Besides drying out the print, litter,
sticks, or leaves may be blown into the print. By remembering wind
activity, the tracker may guess the age of the tracks. For example, the
tracker may think, "It is calm at the present, but the wind blew hard about
an hour ago. These tracks have litter blown into them, so they must be over
an hour old." The tracker must be sure, however, that the litter was blown
into the print, and was not crushed into the print when it way made.
H-12
c. Trails exiting streams may appear to have, been weathered by rain
because of water running from clothing or equipment into the tracks. This
is particularly true if the party exits the stream in a file. This will
permit each person to deposit water into the tracks. The existence of a
wet, apparently weathered trail slowly fading into a dry trail indicates
the trail is fresh.
d. Wind affects sounds and odors. If the wind is blowing from the
direction of the trail the tracker is following, sounds and odors may be
carried to him. If the wind is blowing in the same direction as the trail
being followed, the tracker must be extremely cautious since the wind will
carry his sounds towards the enemy. Wind direction can be determined by
dropping a handful of dry dust or grass from shoulder height. By pointing in
the same direction the wind is blowing, sounds can be localized by cupping
the hands behind the ears and slowly turning. When the sounds are loudest,
the tracker is facing the origin of the sound.
e. In calm weather, when no wind is blowing, the air currents that may
carry sounds to the tracker may be too light to feel. The tracker must
remember that the air cools in the evening and moves downhill to the valleys.
If a tracker is moving uphill late in the day or at night, air currents will
probably be moving toward him, provided no other wind is blowing. As the sun
warms the air in the valleys in the morning, it moves uphill. These factors
should be considered when plotting routes for patrols or other operations. If
a tracker or a commander can keep the wind in his face, sounds and odors will
be carried to him from his objective or the party being tracked.
g. The tracker should know and understand how the weather effects soil,
vegetation, and other indicators in his area. He cannot properly determine
the age of indicators until he understands the effects that weather has on
trail signs (fig. H-3).
H-14. LITTERING
H-13
Figure H-3,
Weather effects on footprints.
H-14
H-15. CAMOUFLAGE TECHNIQUES USED TO CONFUSE TRACKERS
a. The party being followed may employ "most used" and "least used"
routes to cover their movement.
d. A trail can be brushed out, but rarely without leaving signs. This
technique should be easily recognized by the experienced tracker.
e. If the trail leads across rocky or hard ground, the tracker should
attempt to circle the area to pack up the exit trail. On rocky ground, moss
or lichens growing on the stones could be displaced by even the most
careful evader. If these methods fail, the tracker should return to the
last visible indicators and then head in the direction of movement i4 ever-
widening circles until he again falls upon visible signs.
H-15
f. Remember that an individual who attempts to hide his trail moves at a
reduced speed. Therefore, an experienced tracker, who is not fooled by
these attempts, gains time on the person being followed.
H-16
Figure H-4.
Rifle squad employed as tracker team.
H-18. SUMMARY
c. While tracking, the tracker should also remember that if he and the
party being followed are moving at the same speed, the gap will never be
closed. The tracker should practice reading and interpreting trail signs so
that while he tracks, time can be made up and he can gain on his enemy.
H-17
H-18