comprehensive defence handbook —vol ii

70
Comprehensive Defence Handbook—Vol II 1 Edition A Version 1

Upload: others

Post on 03-Oct-2021

26 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

1 Edition A Version 1

Page 2: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

2 Edition A Version 1

Intentionally blank

Page 3: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

1 Edition A Version 1

Foreword – COM NSHQ Enabling Comprehensive Defence is a key component of our AJP 3.5 Military Assistance mission’s Force Multiplier Special Operations Forces (FMSOF) expertise. While countries may be in different stages of developing these comprehensive defence capabilities, all will benefit from enhancing and synchronizing deterrent and comprehensive defence networks and tools. Our intent is for this purely defensive handbook to assist all NATO and Partner countries that seek to optimize their country’s deterrence and comprehensive defence capabilities. Comprehensive defence is not limited to SOF, military or government practitioners. Rather, it centres on enabling an entire country through a whole-of-society, whole-of-country deterrent and defensive approach. This handbook therefore focuses on roles and functions of society, groups

and government entities working together to improve deterrence and defence of their homeland. The pillars of comprehensive deterrence and defence activities across phases of preparation, response and recovery provide a framework for practical checklists and implementat ion principles. The aim of this this handbook and the checklists contained within it is to practically assist in the development of a national programme designed to enable all members of society to contribute to comprehensive deterrence and defence. Use of the handbook will foster a shared understanding that underscores increased coordination and synergized effects. This handbook is a key tool for trainers to leverage within their own countries as they develop the comprehensive deterrent and defence capabilities for their country. While readers may find significant benefit in this first edition of the comprehensive defence handbook, I welcome your feedback so that we can improve this handbook as we republish updated versions of yearly. Your additional considerations, best-practices and recommendations will also be helpful as we update data in our comprehensive defence courses, seminars and table-top exercises. Comprehensive Defence is enshrined in the defensive resilience and resistance principles of Article 3. This handbook and the techniques within are purely defensive in nature, and will assist in the development truly comprehensive deterrence and defensive networks. Sincerely,

Eric P. Wendt Lieutenant General, USA Army Commander

Page 4: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

2 Edition A Version 1

Intentionally blank

Page 5: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

3 Edition A Version 1

File Ref:

Date:

NSHQJ9/IBG/S-0532

1 December 2020

Tel: Tel: Email:

+32 (0)65 44 7111+32 (0)65 44 + [email protected]

NSHQ PUBLICATION

COMPREHENSIVE DEFENCE HANDBOOK

Status. This is an original NATO Special Operations Headquarters (NSHQ) publication.

1. Purpose. To provide fundamental concepts and principles for countries to develop,enhance, or redefine their approach to Comprehensive Defence.

2. Applicability. Recommendations within this handbook are based upon referencepublications and best practices. The guidance is meant to be informative rather thanauthoritative. It does not supersede existing doctrinal publications. This handbook is primarilywritten for countries desiring to implement or refine a comprehensive whole-of-societyapproach to national defence.

3. Publication Updates. NSHQ will review this publication at least annually and updateas needed. Suggestions for updates should be directed to the proponent.

4. Proponent. The proponent of this publication is the NSHQ Strategy, Concepts andExperimentation Directorate.

5. Distribution. As required.

Eric P. Wendt Lieutenant General, USA Army Commander

Page 6: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

4 Edition A Version 1

Intentionally blank

Page 7: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

5 Edition A Version 1

NSHQ Change Proposal Comment Matrix

For changing, correcting, or removing current and/or inserting new content.

Comment Guidelines for the Originator:

C – Critical S – Substantive E – Editorial

Serial C / S / E Originator Para Sub-

Para Comment Rationale Adjudication

(NSHQ Doctrine)

Insert then highlight, or line out text to be modified and propose a recommended course of action. General observations without proposed solutions should not be submitted.

Rationale will be submitted for all comments

A - Approved AA - Approved as amended NA - Not Approved

Note: This table may be copied and pasted into an email to allow for more room to comment. Submission: Submit requests to modify publications to NSHQ Concepts Directorate

Page 8: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

6 Edition A Version 1

Intentionally blank

Page 9: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

7 Edition A Version 1

Contents Foreword – COM NSHQ.................................................................................................. 1

Chapter 1 - Volume II Introduction .................................................................................. 9 Section 1 - Overview .................................................................................................... 9

Section 2 - Organisation .............................................................................................. 9 Summary..................................................................................................................... 10

Chapter 2 - Understanding Comprehensive Defence .................................................. 11 Section 1 - Definitions and Relevance ...................................................................... 11

Section 2 - Risks ........................................................................................................ 13 Section 3 - Contributing to Resilience ....................................................................... 14

Chapter 3 - Malicious Acts............................................................................................. 17 Section 1 - Overview .................................................................................................. 17

Section 2 - Weaponised Information ......................................................................... 17 Section 3 - Cyber Attacks .......................................................................................... 19

Section 4 - Terrorism.................................................................................................. 21 Chapter 4 - Malicious Act: Armed Incursion ................................................................. 25

Section 1 - Overview .................................................................................................. 25 Section 2 - Response Force ...................................................................................... 26

Section 3 - Contributing to Comprehensive Defence against an Armed Incursion 29 Section 4 - Law ........................................................................................................... 31

Chapter 5 - Skills ............................................................................................................ 33 Section 1 - Overview .................................................................................................. 33

Section 2 - Survive ..................................................................................................... 33 Section 3 - Report ...................................................................................................... 46

Section 4 - Evacuate .................................................................................................. 48 Section 5 - Participate ................................................................................................ 51

Page 10: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

8 Edition A Version 1

Intentionally blank

Page 11: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

9 Edition A Version 1

Chapter 1 - Volume II Introduction This is the second of a two-volume handbook. It provides background information and checklists that the average member of society can reference when looking for ways to contribute to national safety and security. Section 1 - Overview 1.1 This volume is designed to form the core of a stand-alone handbook that, once

tailored to a nation’s specific needs, can be provided to every member of society. Because it is a template, beyond this introductory chapter, the volume is written as though it is speaking directly to a nation’s residents. However, it uses the generic terms, such as “the nation.” When adapted for a specific country, officials may choose to adjust the tone to account for particular cultural and educational considerations.

1.2 At least one nation that issues this type of handbook to its population uses humorous illustrations to help maintain the readers’ attention but also notes the seriousness of the information being communicated. Similarly, when refining the document to fit a nation’s social personality, officials should be reminded that over-simplifying the material might cause it to either lose its impact or alienate the public by insulting the readers’ intelligence.

1.3 As with Volume I, this document concentrates on building resilience against malicious acts. However, the examples and advice provided can easily be expanded to cover more potential threats, to include specific natural and/or accidental acts.

Section 2 - Organisation 1.4 Volume II has five chapters:

a. The chapter that follows this one begins by explaining comprehensive defence in further detail. It then goes on to discuss how to identify risks that the nation may face. The chapter concludes by offering different ways that individuals can contribute to comprehensive defence.

b. The next two chapters present specific methods for individuals to help build resilience and defend against malicious acts. To cover as broad a range as possible, it uses four types of acts as examples: cyber attack, weaponised information, terrorism and armed incursion.

c. The final chapter is the heart of Volume II. The checklists that comprise Chapter 5 offer specific measures one can take if faced with an armed incursion, beginning with how to survive if occupied and concluding with activities individuals can perform to directly support the nation’s defence forces.

Page 12: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

10 Edition A Version 1

Summary. 1.5 Volume II is the core of a user’s manual. When tailored for a specific nation, it

will help the average member of society understand how they can contribute to the country’s safety and security, first by being individually resilient and then by being capable and willing to directly respond to an emergency should it arise.

Page 13: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

11 Edition A Version 1

Chapter 2 - Understanding Comprehensive Defence

Section 1 - Definitions and Relevance

2.1 What is Comprehensive Defence?

An official Government strategy, which encompasses a whole of society approach to protecting the nation against potential threats.

2.2 What is Resilience?

The will and ability to withstand external pressures and influences and/or recover from the effects of those pressures or influences.

� Simply put, a resilient society is prepared to respond to and quickly recover

from any natural, accidental event or malicious act

2.3 What this means to you. In order for Comprehensive Defence to be effective, every member of society must understand what it is and how they can contribute to it.

Table 2.1 Key Point Comprehensive Defence recognises that all members of society have a right and responsibility to help protect the nation against any threat: natural, accidental or malicious.

Table 2.2 Comprehensive Defence Actors Public Sector Private Sector

Business Industry Privately Owned Energy Privately Owned Hospitals Other Infrastructure

Civic Sector

NGO’s Clubs Churches Faith Groups Individual citizens

Military Conventional Special Operations Reserve/Home Guard

Civil Government Ministries Emergency Management Etc.

2.4 Figuratively speaking, the responsibility to prevent or respond to threatening

events falls to only 2% of society. This means that the majority of the population is contained in the two non-governmental categories, the private and civic sectors, sometimes referred to as “the 98%.” � A key Comprehensive Defence objective is to harness the untapped capacity

of “the 98%” by developing the will of the people to directly contribute to their own safety and security, and their natural right to self-determination.

“the 2 % “ The 98%

Page 14: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

12 Edition A Version 1

� With Comprehensive Defence, the government involves all sectors of society when planning, preparing, responding to and recovering from natural, accidental and malicious events that would threaten the nation’s safety or security. Through the government, society establishes the means to educate, inform

and enable the public The public is then—

• Continuously aware of any developments that may threaten the nation • Capable of helping prepare for and respond to threats • Committed to contributing should a natural, accidental or malicious event

occur This approach creates the conditions for national resilience: trust, cohesion

and motivation (figure 2.1)

Figure 2.1 Comprehensive Defence Conditions

Table 2.3 Key Take Away Comprehensive defence empowers all members of society to contribute to

their own safety and security o This increases the nation’s ability to prevent, respond to and recover from

potential threats—natural, accidental or malicious. A well-executed comprehensive defence strategy can deter malicious acts,

and, if deterrence fails, contribute to restoring sovereignty.

Page 15: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

13 Edition A Version 1

Section 2 - Risks

2.5 What is a risk?1 � A risk or threat is a natural, accidental or malicious event that may accomplish

one or more of the following: Interfere with the nation’s ability to govern itself or make decisions free from

external influence Produce mass casualties or displace a large portion of the population Substantially disrupt essential goods or services Require a national-level response

� Through its internal planning processes, the nation has precise criteria for categorizing various risks, such as mass casualties, etc.

2.6 How to know what risks the nation is facing � In keeping with comprehensive defence methodology, the government

conducts periodic Comprehensive Risk Assessments (CRAs) Members of the private and civic sectors contribute to the assessments,

and simple to understand reports are provided to the public

Figure 2.2 Graphic Depiction of Notional Risk Assessment

1 Although the terms risk and threat have slightly different meanings, they are used here interchangeably

Page 16: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

14 Edition A Version 1

2.7 Figure 2-2 is an example of a graphic depiction of the results of a CRA.2 � Using this chart, the average member of society can quickly assess the

likelihood and impact of events that would threaten the population’s safety and security

� The written report the picture comes from would provide more details regarding each potential risk.

2.8 How to identify a threatening event is going to occur or has occurred.

� Some emergencies cannot be predicted � However, most nations have systems to warn residents of potential danger

as far in advance as possible � Therefore, when it comes to natural or accidental events in particular, the

public alert system is often the best indicator that an event may occur or has already happened

Table 2.4 Possible Alert Methods • Specific radio and TV stations the government uses to provide information • Websites

• Smart phone apps

• Text message systems

• Outdoor warning systems, to include air raid signals

2.9 Summary. By understanding, and potentially even participating in the nation’s Comprehensive Risk Assessment process, the average resident will be more capable of contributing to Comprehensive Defence and the nation will be more resilient for it.

Table 2.5 Key Point Comprehensive Defence increases our resilience and deters agression

Section 3 - Contributing to Resilience

2.10 Overview. This section discusses how individual members of society can contribute to national resilience. It begins by providing tips for maintaining individual resilience and then offers ideas on how to participate as part of a group.

2.11 Individual Resilience. The first step in contributing to national resilience is to establish and maintain the highest possible level of individual resilience. This will help reduce the demand for national resources during an emergency.

2 Example comes from the UK National Risk Register found at ukresillience.gov.uk

Page 17: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

15 Edition A Version 1

� The key to individual resilience is to be well prepared for potential emergencies Natural, accidental or malicious events

Table 2.6 Individual Resilience Considerations—Aware, Capable, Committed Aware • Know your national alert systems and status

o Natural disaster alert levels (tornado, fire, flood, etc.) o Terror alert levels (i.e., green, orange, yellow, red) o Legal status (state of emergency, etc.)

• Know the public warning systems o Sirens o Television and Radio stations o Test cycles (how often and what they mean)

• Know where to get accurate information • Know the markings and locations for protective shelters • Know your nation’s emergency response protocols o Natural disaster o Accident o Malicious Act

Capable • Participate in available training and education programmes o Maintain current first aid qualification o Online awareness programmes

Committed • Maintain a home emergency preparedness kit (Chapter 5) • Maintain a communications plan o Phone o Contact procedures o Contact information; i.e., emergency phone number(s)

• Maintain emergency evacuation plans o Home o Work o Routes

2.12 Contributing on a larger scale. There are numerous ways to contribute to national resilience at the local, sub-national and national levels.

Table 2.7 Some Ways to Participate in Comprehensive Defence • Consider skills and desires in terms of the resilience/comprehensive defence pillars

(Social and Psychological: Civil, Cyber, etc.) • Join non-profit and faith communities groups that contribute preparing for and

responding to emergencies

• Volunteer for an emergency response and defence organisations • Establish or join a community awareness programme

Page 18: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

16 Edition A Version 1

Intentionally blank

Page 19: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

17 Edition A Version 1

Chapter 3 - Malicious Acts This chapter and the one that follows provide detailed information on how to prepare for, recognise, survive and respond to a malicious act. Since it would be impossible for this handbook to address all conceivable malicious acts, the chapters will offer considerations for a few of the most common ones: cyber attack, weaponised information, terrorism and armed incursion.

Section 1 - Overview 3.1 What are Malicious Acts?

� Any action taken by an individual or organisation, external to the society, the effects of which threaten your nation’s safety, security, sovereignty or its peoples’ right to self-determination.

� Malicious acts need not be violent or physical. Weaponised information or nefarious cyber activity may undermine a nation’s independence more effectively over time than an armed invasion would.

Section 2 - Weaponised Information 3.2 As it relates to national defence, adversaries use disinformation for many

purposes. Table 3.1 Potential Purposes of Disinformation

Influence public opinion in favour of the adversary • May be a long-term campaign that lasts for generations

• Influence the nation’s political processes; i.e., elections

• Destabilise the targeted nation by undermining the trust, cohesion and motivation o Exploit ethnic and cultural differences to cause civil unrest o Spread “fake news” to cause political discord

• Deceive the targeted nation regarding the adversary’s true intentions o Deny or shift blame for a malicious act

3.3 Quite often, the intended target for weaponised information is the public, not the

government. Therefore, it is particularly important for all members of society to understand how to recognise and respond to these attacks.

Table 3.2 Recognising and Responding to Misinformation Aware • Always apply critical thinking skills (Table 3-3 below)

o Entertainment, to include children’s television and movies o News from any source o Social media o Literature

• Be familiar with readily available tools and resources o Online training sites o Fact checking software and sites3 o Curriculum development materials for teachers and parents

3 It is important, also, to ensure that fact checking sites are unbiased

Page 20: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

18 Edition A Version 1

o Encourage children to participate in contests sponsored by schools or government

Capable • Develop skills for identifying weaponised information o International Federation of Library Associations and Institutions

(IFLA) provides a useful model4 o Consider the source o Read beyond headlines o Check the author o Check your own biases o Review supporting sources o Ask yourself if it is a joke5 (onion.com) o Ask the experts

•Similar model with additional considerations6 o Have I heard of the publisher before? o Is this the source I think it is, or does it sound a bit like them? o Can I point to where this happened on a map? o Has this been reported anywhere else? o Is there more than one piece of evidence for this claim? o Could this be something else?

• Know how to report weaponised information/disinformation o Know the procedure or each social media platform you use o Know the procedure for online websites

Committed • Report disinformation • Do not forward or repeat information that you are not certain is

true • Use sound digital hygiene practices

4 https://www.ifla.org/publications/node/11174 5 www.onion.com 6 https://www.bbc.com/news/38053324

Page 21: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

19 Edition A Version 1

Table 3.3 Reference for Understanding Critical Thinking7

Section 3 - Cyber Attacks

3.4 Because the internet has become an indispensable means of communication, cyber attacks and weaponised information are very closely related. � However, cyber attacks can pose an even greater threat to society than

weaponized information does. � Whereas weaponized information can have a direct effect on social and

psychological resilience, its influence on the other pillars of comprehensive defence is indirect.

� Cyber attacks, on the other hand, can directly and immediately impact all six pillars.

� Moreover, like weaponised information, the adversary’s cyber attacks often intentionally target the nation’s population and its critical infrastructure.

7 Stanford History Education Group is often cited for its work in critical thinking and recognising misinformation https://sheg.stanford.edu/

Page 22: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

20 Edition A Version 1

Table 3.4 Ten Best practices for Resilience against Malicious Online Activity

Individual cyber resilience measures

• Keep personal information locked down and limit its diffusion; • Always double-check the reliability of information seen online; • Be extremely careful when downloading content from websites; • Purchase products online from secure and reliable websites

only; • Always update systems, software, and applications on your

devices; • Keep antivirus protection current; • Regularly monitor your bank account and online transactions; • Be wary of links and files contained in communications coming

from unknown or unreliable sources; • Verify that address bar reads “https” when conveying

confidential information online; • Regularly utilize backup systems copies.

3.5 As working remotely has become common in many nations, members of society

should apply additional measures to help reinforce resilience when teleworking.

Table 3.5 Best Practices for Online Resilience when Teleworking Cyber resilience measures for working remotely

• Follow your administration/organization’s policies as a matter of priority;

• Use operating systems for which support is guaranteed; • Make sure that the security software of your operating system are

enabled and constantly updated; • Verify that access to the operating system is protected by a

secure password, compliant with the policies of your administration/organization;

• Do not install software from unofficial sources/repositories; • Block access to the system when you leave the workstation; • Do not click on links or attachments contained in suspicious

emails and report any suspicious activity to the information security authority within your administration/organization;

• Access adequately protected Wi-Fi connections only; • Connect to mobile devices whose provenance is know; • Always log out from the services/portals used after you have

finished your work session.

Page 23: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

21 Edition A Version 1

Section 4 - Terrorism

3.6 What is terrorism? � There are many definitions for terrorism. The following definition is used by

NATO and applies throughout this handbook:

Table 3.6 NATO definition of Terrorism

“The unlawful use or threatened use of force or violence, instilling fear and terror, against individuals or property in an attempt to coerce or intimidate governments or societies, or to gain control over a population, to achieve political, religious or ideological objectives.”

3.7 Terrorism may be difficult to recognise.

� The act may appear to be a “typical” crime, particularly if responsibility cannot be immediately attributed to a particular actor

� The physical results may be the same as those caused by a natural or accidental event

� Although terrorism is often handled as a crime, when conducted by an organisation that is from outside the nation, it is also an attack on the targeted nation’s sovereignty

Figure 3.1 Potential Sources and Types of Terrorism

3.8 From a Comprehensive Defence perspective, one of the greatest differences

between a terrorist act and a natural or accidental event is the public’s ability to help prevent an act of terrorism from occurring.

Page 24: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

22 Edition A Version 1

Figure 3.2 Terrorist Attack Cycle

3.9 Most terrorist acts follow the same general pattern (Figure 3.2)

� During the Target Selection, Planning and Rehearsal phases, terrorists are gathering information and testing their plans The objective during this period is to deny them access to the target, detect

their actions if they do manage to gain access to the target and, through resilience measures, deter them from ultimately taking action

� If the terrorist(s) successfully conduct an attack, immediate responses are similar to those used for natural or accidental events

� During the exploitation phase, the terrorists will use various forms of media to advertise their attack, as they seek both to instil fear and gain support The measures used against weaponised information come into effect

Table 3.7 Considerations for Building Individual Resilience Against Terrorist Attacks Aware • Understand national concept for countering terrorism

o Example: UK Model (Figure 3.2) Phases of a terrorist attack Target selection Planning Training Attack Exploitation

Resilience and defence against a terrorist attack Deny Detect Deter

• Stay abreast of local and international trends regarding terrorism

• Be aware of likely terrorist targets o Crowded places

Page 25: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

23 Edition A Version 1

o Historically, culturally or religiously significant structures o Government centres

• Understand terrorist actions during the Target Selection, Planning and Rehearsal phases o Internet data searches o Physical reconnaissance o Dry runs to test attack techniques and security

• Stay alert to persons appearing to scout or conduct surveillance o Digitally recording or taking notes of security features o Suspiciously focusing on entry points, exits, stairwells, hallways, fire

escapes o Loitering to watch staff, visitors, deliveries at a public or private venue

Capable • Participate in available education programmes o Online training is easy to access and complete o If programmes not available from own nation, reach beyond your borders

virtually o Heads of household require family members to participate in applicable

programmes • Maintain current first aid certification

Committed • Report suspicious behaviour to business or appropriate authorities o Know how to report and to whom o Know what to report What you saw Description of those involved Location Time of incident Your contact info

• Establish community social groups whose members are interested in safety and security (i.e., crime watch groups, etc.) (see table XX)

3.10 Community watch programmes are particularly effective tools for maintaining

resilience against terrorism. Table 3.8 Considerations for Starting a Community Watch Group

Recruit and Organise

• Identify people interested in starting a Neighbourhood Watch • Establish a planning committee to initiate the programme • Compile a list of issues to be addressed

Collaborate with Law Enforcement

• Invite them to meet with your group at a time and place convenient for your Watch Group o Discuss any concerns o Identify any training local law enforcement may be able to provide

Create a Communication Plan

• Decide what type of communication will work for the group o Meetings, social media or both o Be mindful of privacy and security when using social media

• Assemble contact information o Phone trees o Email addresses o Again, being mindful of privacy and security o Start a newsletter

Page 26: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

24 Edition A Version 1

Take Action • Initiate meetings

• Mix business with pleasure—allow members to socialise

• Collaborate and build partnerships with other citizen organisations and local businesses

• Provide speakers on topics of interest

3.11 Terrorist attacks may take many forms and be aimed toward any individual, group or facility � Below are considerations for preventing and responding to two of the most

common types of attacks: Improvised Explosive Devices (IEDs) and active shooter incidents

Table 3.9 Considerations for Preventing and Responding to IED and Active Shooter Attack Method

Considerations

IED • Know how to ID suspicious item (HOT) o Hidden: Is it hidden or concealed o Obvious: Is it obviously suspicious (wires, lights, etc.) o Typical: Is it unusual for the circumstance (large backpack at a concert)

• Know response procedures (4Cs) o Confirm the item is suspicious (HOT) o Clear the area o Communicate with authorities o Control the area (no re-entry, etc.)

Active Shooter8

• Evacuate o After identifying safe route o Leave belongings behind o Encourage others to evacuate

• Hide o If evacuation not possible o Avoid dead ends and bottle necks o Out of sight of shooter o Lock, barricade and move away from entrances o Turn phone to silent, vibrate off

• Take action o Last resort—when in imminent danger o Disrupt shooter by whatever means possible

• Contact authorities • Cooperate when authorities arrive

Table 3.10 Key Take Away--Malicious Act Being aware, capable and committed to assist helps keep everyone safe

8 https://www.dhs.gov/xlibrary/assets/active_shooter_booklet.pdf https://www.gov.uk/government/publications/stay-safe-film

Page 27: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

25 Edition A Version 1

Chapter 4 - Malicious Act: Armed Incursion For most nations, an armed incursion is the least likely but most dangerous malicious act imaginable. It is also the one that, from a whole-of-society perspective in particular, requires the greatest amount of preparation.

Section 1 - Overview

4.1 What does an armed incursion look like?

� An armed incursion may unfold in many ways It can begin with a very obvious attacks from the air, land and or sea The adversary may also use more subtle methods, such as infiltrating

personnel into the nation who have been assigned certain tasks that will simplify and aid the enemy’s attack

Table 4.1 Considerations to Help Determine if an Incursion will Occur or has Begun Planning and executing

• In general, no matter what form of attack the adversary uses, the overall pattern will be similar to a terrorist attack. o Conduct reconnaissance o Plan o Rehearse o Attack o Consolidate

Possible methods of attack

• Foreign military force breaches targeted nation’s physical border and withdraws quickly (i.e., days or weeks)

• Foreign military force breaches targeted nation’s physical border and remains to occupy part or all of the breached nation’s territory

• Foreign power uses paramilitary or disguised forces to covertly invade and occupy targeted nation or open the way for an overt occupying force

• Some combination of the above possibilities Possible indicators

• The adversary may attempt to confuse, desensitise or deceive the targeted government and public prior to an incursion. o Troop movements disguised as exercises o Weaponised information campaign o Cyber attacks against detection and early warning systems

4.2 Maintaining the state. In the event of an armed incursion, society’s first priority

will be to prevent or limit death and suffering among its population. Maintaining the state will be another high priority, which all members of society should understand

� International laws and diplomacy will come into play as the enemy nation seeks to justify its action among the global community of states

� It is essential that the government remain intact. Should the government cease to exist, the targeted nation’s international

legal personality will be challenged, making it incapable of effectively representing itself (or its population) in international forums

The occupying power will also challenge the legitimacy of the targeted nation’s armed forces

Page 28: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

26 Edition A Version 1

• The occupier will likely declare itself the legitimate head of state and designate all opposing forces (i.e., the army) to be terrorists or insurgents.

� The targeted nation may decide to relocate its capital and key political leaders. The chosen location may be outside of the country, based on standing treaties and agreements The precise location of the head of state and government may be kept

secret, even as official national business is conducted remotely; e.g., via internet, couriers, etc.

Section 2 - Response Force

Figure 4.1 Integrated, Multi-layered, Whole-of-Society Defence 4.3 In order to effectively contribute to the nation’s defence forces, it is necessary to

know how they are organised and how they an armed incursion.

� The nation’s first response will come from the Armed Forces � The home guard is organised to support the standing Armed Forces

� A smaller organisation called the Asymmetric Defence Component gives the nation the ability to resist the adversary while blending in with the population

� Together, they are referred to here as the Comprehensive Defence Force

4.4 Home Guard � Priorities Protect population Ensure continuation of essential goods and services Support emergency response and/or military operations

� Examples of support to civil authorities Police

• Guarding and securing infrastructure • Movement control

Page 29: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

27 Edition A Version 1

• Liaison functions Emergency Response/Rescue Services

• Search and Rescue • Special expertise (medical, scientific support, etc.) • Manpower in support of disaster relief

� Organisation Some home guard units are aligned to Armed forces units within the Army,

Navy and Air Force Some are aligned to civilian response elements Some individuals assist in various places throughout the emergency

response and defence structures Some serve only during emergency Some clubs become part of the home guard during a crisis (parachuting,

mountain rescue, radio, rescue dogs, etc.)

� Pay None, home guard service is voluntary May be reimbursed for some expenses

4.5 ADC Structure and Functions. The ADC commonly organised into four

elements.

Table 4.2 ADC components and Functions

Component Description Underground

Civilian led Performs Leadership and Command and Control functions Carries out clandestine political and military actions Secrecy is paramount

o Operates through a cellular structure

Page 30: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

28 Edition A Version 1

Component Description • Cellular structure

o Core cell within it performs the functions of the government o Core receives its guidance from the government in exile if one

was formed Adapted Force9

Conducts combat actions as directed by the Underground Combination of the traditional armed forces and

predesignated elements of society o Depending on defence structures, force will comprise the

nation’s standing armed forces, reserve, home guard units and volunteers from throughout the private and civic sectors

o It is organised, trained and equipped as a standing component of the defence and security apparatus during peacetime

o Only manned by a small core element o Will normally use asymmetric (unconventional) tactics

Auxiliary Secretly provides logistical and operational support to the Underground and Adapted Force

Cellular organisation that is dispersed throughout the population o Individual cell may consist of a group or a lone person o A cell may be asked to carry out a single task (deliver a

message, switch on a light), a continuous mission (provide medical treatment as required), or circumstances may be such that they are not called upon at all during the entire course of the conflict

o For added resilience, members will normally only be provided the information they require to perform their assigned task(s)

Public Component/Overt Political Arm

Overt political expression of the nation’s will within occupied territory(ies)

If there is no exiled, displaced or shadow government, the Public Component may perform the national leadership function o Otherwise, it is an extension of the existing government o May be opposition political party, larger organisation or a single

individual o May negotiate directly with the installed government or

occupying power o Ability to function will vary based on the occupying power’s

willingness to tolerate political opposition

4.6 Population. Most of the population will not belong to either of the active elements

described above. They are, nevertheless, capable of contributing to

9 This element is often referred to as the Guerrilla Force because of the tactics it employs and the in-extremis nature in which it is formed. However, when created as a component of a Comprehensive Defence, the force is organised, trained and equipped as a standing component of the defence and security apparatus. Therefore, it is referred to here as the Adapted Force to recognise it as a combination of the traditional armed forces and predesignated elements of society.

Page 31: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

29 Edition A Version 1

Comprehensive Defence through low risk, passive activities that inhibit the occupying force’s ability to consolidate power. For this to occur, the entire population must be educated, informed, enabled and accounted for in the planning process.

Table 4.3 ADC Characteristics

Government-led and established by national legislation All members undergo extensive security screening The identities are protected at all time Staffed by a small element during peacetime More members join in event of crisis Members from throughout society provide support during crisis Can help lead nonviolent resistance activities to prevent the adversary from

consolidating power Section 3 - Contributing to Comprehensive Defence against an Armed Incursion

4.7 In the event of an armed incursion, members of society who are not formally obligated to contribute to comprehensive defence must decide which of four options they will select.

Table 4.4 Options for Contributing to Defence against an Armed Incursion

a. Remain passive by not contributing in any way, neither directly nor indirectly b. Lead or participate in nonviolent resistance c. Aid the armed forces, home guard or ADC d. Join the armed forces, home guard or ADC

4.8 Most nations have provisions within their constitutions that clearly discourage

option ‘a’. � Therefore, the remainder of this chapter will outline choices ‘b’ through ‘d’

� Chapter 5 that follows will offer an array of skills that residents can use to prepare themselves to contribute should the need arise

Page 32: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

30 Edition A Version 1

4.9 Nonviolent Resistance. (also see Chapter 5). � One of the most powerful weapons the nation can wield against an occupying

power Table 4.5 Nonviolent Resistance Characteristics and Considerations

• The objective is to systematically delegitimise the occupying power • The power of the state is derived from the consent of the governed • The governed thus possess the moral and political authority to withhold consent • The most effective way to withhold authority from an occupying power is through

nonviolent means o Military and law enforcement authorities are trained to counter force with force o They are less prepared to counter nonviolent resistance

Table 4.6 Nonviolent Resistance Categories and Conditions for Success

Category Activities Protests and Persuasion

• Formal statements • Blogging • Group presentations • Distributing leaflets • Wearing symbols • Drama and music • Joining online protest groups • Processions • Honouring the dead • Public assemblies

Noncooperation

• Social or economic boycotts • Text messaging banned or censored information • Labour strikes • Boycotting rigged elections • Refusing to recognise the legitimacy of the occupying regime

Intervention

• Hunger strikes • Sit-downs in streets • Live video streaming of abuse or fraud • Occupation of offices • Seeking imprisonment • Overloading facilities

Conditions for success

• Organisation, training and communications. • Mass public participation and support • Patience and commitment from those involved

4.10 Assisting the territorial defence force. Those who cannot join the defence

forces, or for whom doing so is not feasible, are still able to contribute to comprehensive defence efforts.

Table 4.7 Ways to Contribute to the Territorial Defence Force • Help evacuate key government officials en route to exile location • Collect information about the occupying army and the occupation regime • Identify collaborators and provide information about them to the TDF

Page 33: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

31 Edition A Version 1

• Install hiding places and help stock them with supplies o The TDF will need a number of hidden supply sites (caches) to provide greater

security for fighters as they carry out their responsibilities o The sites will stock a range of supplies—medicines, perishable food, warm

clothing, weapons, ammunition, etc. • Hide fighters • Care for wounded members of the TDF • Serve as an envoy o The TDF will likely find modern means of communications to be unsafe o Though being a courier certainly invites its own set of risks, messengers also add

an additional layer of security to the nation’s overall capabilities

4.11 Join Territorial Defence Forces. The mission of those who belong to the armed

element of the ADC is relatively clear. � However, those who either cannot or do not wish to participate in armed action

can serve in the TDF auxiliary component.

Table 4.8 Examples of Unarmed Territorial Defence Force Functions • Provide advanced medical care for unit members • Provide food and water to resistance fighters • Care for hygiene; i.e., washing and drying uniforms • Emplace and retrieve weapons and/or ammunition

Section 4 - Law 10. There are some very practical legal considerations to keep in mind if the nation is attacked. 4.12 Acting in accordance with national obligations to ratified international and regional

human rights treaties is essential to legitmacy and success. Violations could jeapordize funding, training, equipment, direct participation or planned conventional military support from allies and partners.

• Popular support from within the nation will be placed at risk. • Resistance forces must adhere to the LOAC at all times,and especially avoid

targeting civilians and civilian objects. If adversary’s civilian assets are targeted, they may resort to targeting civilian assets in retaliation.

4.13 If you join the response forces, legal considerations should be included in your

training. • If you do not receive this training prior to an armed incursion, it is important that

you ensure you engage only in legal acts.

• Response forces will be considered combatants and can be targeted by the occupying forces under LOAC. Additionally, civilian organizations that take part

10 Resistance Operating Concept

Page 34: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

32 Edition A Version 1

in the conflict through non-combatant roles may also be targeted while they take part; e.g., if you drive a truck with military supplies, you may be targeted during the delivery, but not once you have completed the task. However, you can be apprehended and detained for posing a security risk.

• You must understand what actions are acceptable and authorised by national and international laws and norms.

• Should you violate the law while defending against an armed incursion, you could be held accountable during the conflict or after hostilities end.

• Following occupation, military courts or commissions should be created to fairly adjudicate occupying forces violations of the LOAC, and should be subject to the review of international organizations include the U.N. or the ICRC.

Table 4.9 Key Take Aways -- Armed Incursion There are many ways to participate in Comprehensive Defence It is best to volunteer during non-crisis in order to be well-trained in case of crisis A large, well-trained home guard decreases the chance of war

Page 35: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

33 Edition A Version 1

Chapter 5 - Skills This chapter is directed mainly toward residents who are not part of the ADC or home guard prior to hostilities but decide to directly or indirectly contribute in the event of an incursion.

• Survive • Report • Evacuate • Participate

Section 1 - Overview

5.1 The skills are presented within four sections, which generally correspond with one’s reaction to an armed incursion.

� Survive—skills that will help you avoid death or serious bodily injury and continue to function in the event of an armed incursion, while helping others do the same

� Report—when, how, what and to whom information should be provided

� Evacuate—how to move to safety, either as part of a government-directed evacuation or on one’s own

� Participate—skills that will enable you to directly support the home guard or ADC in the event to of an armed incursion

5.2 Ideally, persons who commit to support or serve the ADC or home guard will be trained and equipped to fulfil their assigned responsibilities prior to hostilities. This chapter, therefore, focuses on skills that the average member of society can use to survive an armed incursion, and should the opportunity present itself, contribute to the nation’s defence.

5.3 The skills and practices presented here are not unique and most may be applied

in any emergency situation—natural, accidental or malicious. Moreover, this chapter is not a substitute for training. All members of society should take the initiative to develop and maintain these individual capabilities well prior to any potential crisis.

Section 2 - Survive

5.4 Overview. This section details skills and advice on how to survive when facing an armed incursion. The information is divided into five areas.

� Preparing an individual resilience kit to ensure access to food, clothing and basic necessities

� Surviving under hostile conditions—defensive responses to threats that are either lethal or can cause serious injury

Page 36: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

34 Edition A Version 1

� First aid—overview and considerations only. First aid requires focused training.

� Shelter—how to build a shelter in your home or another building if living within occupied territory.

� Surviving in occupied territory—basic considerations if forced to live among the enemy

5.5 Individual Resilience Kit. In case of emergency, you will need food and water,

medicines and hygiene items, clothing and material to keep you warm and dry, communications capabilities, and tools.

� You will also need a backpack with your immediate needs. � All of this should be prepared now and regularly maintained.

Table 5.1 Individual Resilience Kit Food

• Non-perishable, easy to prepare with little water

• 3-days for evacuation

• 2 weeks for home

• Canned meats, vegetables and fruits • Potatoes, cabbage, carrots, eggs • Bread with a long shelf-life, e.g. tortillas, hard bread, crackers,

rusks • Cheese spread, soft whey cheese and other spreads in tubes • Oat milk, soy milk, milk powder • Cooking oil, hard cheese • Quick-cook pasta, rice, grains, instant mashed potatoes • Precooked lentils, beans, vegetables, hummus in tins • Fruit purée, jam, marmalade • Prepared blueberry and rosehip soup, juice or another drink that

can be stored at room temperature • Coffee, tea, chocolate, energy bars, honey, almonds, nuts, nut

butter, seeds. Water

• 4 Litres per person per day

• 3 days for evacuation, 2 weeks for home

• Bottles • Buckets with lids • Plastic bottles to freeze water in (do not fill to the top or the bottles

will crack) • Mineral water • Jerry cans, ideally with a tap to collect water in. You can also have

a couple of clean jerry cans that are filled with water as a reserve. These are to be stored in a cool, dark place.

Healthcare Items • Medications • Sanitation and personal hygiene

o Feminine hygiene products o Hand sanitiser o Wet wipes

• Hearing aids w/extra batteries • Extra eye glasses • First aid kit • Emergency blankets • Surgical gloves • Face masks

Warmth • Woollen clothes • Warm all-weather outdoor clothing • Hats, gloves, scarves

Page 37: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

35 Edition A Version 1

• Depends on nation’s climate

• Blankets • Sleeping mats • Sleeping bags • Candles • Tea lights • Matches or fire lighter • Alternative heat source; e.g., gas heater

Communications • Battery, solar or winding-powered radio • Car radio • List of important phone numbers • Extra batteries/power bank for mobile devices • Mobile phone car charger

Tools • Manual can opener • Fire extinguisher • Flashlight • Head lamp • Portable cooking stove/camp stove • Scissors • Multi-tool • Duct tape • Plastic sheeting • Matches

Other • Baby supplies • Pet supplies • Paper printouts

o Insurance policies o Bank details o Registration certificates

• Cash in small denominations • Entertainment items • Whistle • Writing material

o Notebooks o Pens & pencils

Grab & Go Bag (Figure 5-1)

• 3 Days’ supply for evacuation

Figure 5.1 Grab & Go Bag

Page 38: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

36 Edition A Version 1

5.6 Surviving under hostile conditions.

Table 5.2 Considerations for Surviving Under Hostile Conditions Air raid alarm • Do not panic

• Alert relatives and neighbours • Unplug electrical appliances • Shut off your gas and water supply • Turn off lights • Close the curtains • Take shelter in basement or other suitable place • In case there is no place suitable for sheltering at home, take your ID

documents, money, food, water, personal protection and medical aid necessities, the most necessary medicine, and go quickly to the nearest collective protection site or other shelter

Shooting or exchanges of fire nearby

• If outdoors, the moment you hear shooting, do not start running o Drop immediately to the ground and cover your head with your hands o Do not even think of looking for a cleaner place, drop down where you are

standing o Squeeze yourself to the ground as low as you can and remain so for as

long as you can hear shooting o Crawl to a safer place (be it an underground passage, a basement,

ground floor of a building, a ditch, at least behind a garbage bin, or such) when the shooting pauses

• If you hear shooting or exchanges of fire in your house, do not come near windows o Turn off lights and move to a windowless room (e.g. bathroom, closet)

• If you hear gunshots while you are at home and it is no longer safe to remain there, go to the nearest collective protection site that will provide shelter and assistance

Suspicious object or explosive

• Never touch it! o Never try to find out what is inside of it o Do not lift it or carry it elsewhere o Do not fling it aside o Never try to determine exactly what it is on your own

• Do not smoke or use your cell phone near suspicious objects • Step away from it and hide behind a firm structure, preferably a

building • Report your finding to authorities as soon as possible while maintain

a safe distance with a barrier in between • If possible, meet the arriving authorities because you can provide the

most precise description and location of the suspicious object • While you are waiting for authorities, keep other people away from the

object o Warn people near its location to retreat to a safer place

• If you spotted the object in public transport, be sure to alert the driver

Page 39: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

37 Edition A Version 1

Nearby detonation

• Drop to the ground and cover your head with your hands • Use any shelter available o Buildings, ditches, hollows, trees if outdoors o Closets, cupboards, tables or walls if indoors

• Do not hasten to leave your shelter because some fragments travel like a boomerang – circle in the air and hit near ground zero

• If you escaped injuries, assist the wounded to evacuate to a safer location and provide first aid

• Do not choose damaged buildings for shelter, as these can collapse at any moment, whether fully or partly

• Use emergency exits if a detonation takes place while you are indoors • Never use elevators! • Report incident to authorities as soon as it is safe to do so

Trapped under rubble

• You cannot afford to panic o Breathe deeply, assess your situation and be prepared to do everything it

takes to survive

• Slowly and carefully (so as not to loosen the debris atop you) try to free your hands and legs

• Check your injuries o If you are bleeding, squeeze the wound to stop the flow

• If it is cold, lie on your side, snuggle down, and put your arm underneath your side to reduce contact with the ground

• If you can sit, draw your knees to your chest, bow down and cover your head with your hand

• Find a way to communicate your presence/location o Shout o Make noise with anything available(e.g. hammer a piece of metal or rock

against a pipe), especially if you can tell there are rescuers nearby

• Try to find out if there are more people trapped nearby • If you have your cell phone, call and report your emergency situation • Be aware that hourly, rescuers normally shut down any equipment

they are operating to for at least 10-minutes listen for calls for help • When trying to free yourself, be careful when moving ruined spars,

bricks or other rubble, as they may be supporting a large mass of debris above you

Chemical or radiological threat

• Do not panic • Warn neighbours and relatives • Leave the contaminated area as quickly as possible • Move perpendicularly to the wind direction so that wind is blowing on

your side, and bypass low terrains • Try to breath in chemical or radioactive particles or dust o Cover your nose and mouth with a disposable mask, towel or folded

handkerchief o Use a respirator or a gas mask in case you have one

Page 40: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

38 Edition A Version 1

• Protect your skin by wearing waterproof clothes and shoes • Be sure to have stable iodine preparations (potassium iodide or

potassium iodate) if such an instructions have been given • If you cannot withdraw from the contaminated area o Go inside if you are outdoors o Stay in an enclosed space if already indoors

• Close and seal all windows, window vents, ventilation system holes, doors and shafts with adhesive tape or other suitable means o Cover external doors with damp cloth o Plastic windows and balcony doors are highly tight so additional sealing is

not necessary; o Seal ventilation system holes and window vents with cloth or paper o Shut off ventilation, air supply, conditioning and air heating systems

• Go to the upper stories of the house – many of the hazardous chemical material tend to collect in low-lying areas

• Store drinking water in tightly closable vessels or jars • Put vegetables into boxes lined with paper and plastic wrap and cover

with canvas or other type of dense fabric • If you have animals or pets, take them into enclosed premises or

greenhouses • Cover your wells • Do not step outside needlessly • Prepare for possible evacuation

Returning from chemically, biologically- radiologically (CBR) contaminated environment

• Avoid physical contact with your family members so as not to contaminate

• Take off all the clothes you were wearing in the CBR contaminated environment; o Remove in a head-to-feet direction o Do not pull your clothes over your head so as not to transfer pollution

onto your face and into your eyes;

• Wrap your clothes with the contaminated surface inside • Put into bags (double-wrapped) and put in a safe place outside of

living quarters o You will be instructed on what to do with them later

• Wash yourself very thoroughly in a hot shower (38-40 Celsius) or cold shower with soap (laundry soap is recommended) o Wash hands first o Continue to face, neck, eyes, and ears o Clean out your nose and wash your mouth, thoroughly o Wash every part of your body o Continue washing yourself for 3-5 minutes o Prolong the time to 10 minutes if you have been exposed to radioactive

contamination

First Aid. The information that follows is for reference only. It is not meant to be a substitute for formal first aid training.

Page 41: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

39 Edition A Version 1

Table 5.3 First Aid Reference Circulation Know the types of bleeding

• Arterial - if an artery near the surface is damaged, bright red blood will gush out in spurts that are synchronized with the heartbeat.

• Venous - blood from the veins is dark red. Venous bleeding is characterized by a steady, even flow.

• Capillary - capillary blood is usually brick red in color. If capillaries bleed, the blood oozes out slowly.

Stopping Arterial bleeding is priority over reviving breathing Preparation • Complete formal first aid training

o If available, take classes that produce a certificate, such as the Red Cross/Red Crescent

o If in-person training is not available, take courses online11

• At a minimum, you should be trained in the following o CPR o Stopping bleeding—how and when to use each of the following Direct pressure Pressure dressing Tourniquet

o Treating chest injuries when lung is punctured o Applying splints

• Keep your first aid kit with your individual resilience items at all times

• Inspect and replace items as needed • If you are in occupied territory, keep first aid materials on your

person o Keep the most important items in your pockets, not in your

backpack, especially if you are either supporting the TDF or a member of the TDF

Kit contents • Tourniquets • Individual bandages • Oropharynx tube • Scissors • Bandages o Pressure dressings o Sterile bandages of various sizes o Padded adhesive bandages

• Triangular bandage (medical scarf) • Iodine (5%) for cleaning and disinfecting wounds • Basic non-prescription medicines o Anti-inflammatory o Pain reliever

11 https://www.firstaidforfree.com/ https://deployedmedicine.com/ https://www.marines.mil/Portals/1/Publications/MCRP%203-40A.9%20formerly%20MCRP%203-02G.pdf?ver=2018-03-13-082229-160

Page 42: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

40 Edition A Version 1

o Digestive system (diarrhoea, nausea, etc.) o Electrolyte mixture o Vitamin C o Skin regeneration o Other medications based on personal needs

• Disposable gloves Assessing the area

• Always start by surveying the area for risks and hazards • Make sure conditions are safe for both you and the victim

before you start rendering first aid Assess the victim

• Quickly scan the rest of their body for serious injuries • Step 1—Check for responsiveness o This is done by gently shaking or tapping him while calmly

asking, “Are you OK?” o Watch for a response o If the casualty does not respond move on to check for

breathing (see below) If there is serious arterial bleeding, treat that first (see below)

o If the casualty responds, continue with the evaluation o If the casualty is conscious, ask them where they feel different

than usual or where it hurts o Ask him to identify the location of pain if they can, or to identify

the area in which there is no feeling WARNING--If a broken back or neck is suspected, do not move the casualty unless their life is in immediate danger (such as close to a burning vehicle). Movement may cause permanent paralysis or death. • Step 2—Check for breathing o If the casualty is breathing, proceed to step (3) o If the casualty is not breathing, stop the evaluation and begin

first aid to attempt to ventilate the casualty o Attempt to open the airway, if an airway obstruction is apparent,

clear the airway obstruction, then ventilate o After successfully ventilating the casualty, proceed to step (3).

• Step 3—Check for pulse o If a pulse is present and the casualty is breathing, proceed to

step (4) o If a pulse is present, but the casualty is still not breathing, start

rescue breathing o If a pulse is not present, seek professional medical help

• Step 4—Check for bleeding. o Look for spurts of blood or blood-soaked clothes o Also check for both entry and exit wounds o If the casualty is bleeding from an open wound, stop the

evaluation and begin first aid procedures to stop the bleeding

• Step 5—Check for shock

5.7 Shelter

Page 43: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

41 Edition A Version 1

Table 5.4 Considerations for Creating and Finding Shelter Converting basement into a shelter

• The best choice is a basement with concrete ceiling and strong walls

• Build strong and spacey shelves and stand them by the wall, which can also be used as bunk beds or benches

• Plan an emergency exit or install one if possible • Install a vent o Consider an auxiliary vent; e.g., a roughly 150 mm-diameter pipe

• If you have a heater in the basement, drive its stovepipe to the outside and make the floor under the heater fire-proof (use bricks, a concrete block, or similar)

• Lay a wooden floor (wood planks or boards) to retain warmth • If your basement has windows, keep sandbags on hand to cover

the windows on the inside to shield yourself from fragments in case there is an explosion outside;

• Bring a portable cooker (gas-fired) and a kerosene lamp; • Keep a part of your stocks (food, water), warm clothes and basic

necessities in the basement • Have a 40-liter barrel or other vessel for water • Plan a spot to be used as a toilet (a bucket with a cover may be

used) • If you live in an apartment building your neighbours will probably

also use the basement as shelter, so you will be able to band together o Several heaters may be needed o Place them by the windows and drive the stovepipes out the windows o The heaters will also provide you with lighting o You will be able to use one room for keeping food, another as your

WC facility o Cook together and restock your food and water supplies together

Shelter in existing building

• Lumber-rooms can be found in most apartment buildings o These protect well from bombardment o Good place to keep basic supplies of food, gas and pharmaceuticals.

• If you cannot find a lumber-room, create a safe room o Ground floors of brick buildings work best o Choose the room with the least number of windows, as you will need

to block them o Remember that if you barricade yourself in completely, you will be

trapped if the ceiling collapses o Leave or create an emergency exit for such cases A window is normally suitable

Returning home after the emergency

• Inspect buildings thoroughly for damage that could cause them to collapse

• As you enter a building, never light your way with open fire and do not smoke

• Maintain a safe distance from loose wires (including telephone line) o Any loose wire poses a lethal threat

Page 44: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

42 Edition A Version 1

• Do not switch on lights before making sure the wires are in order and have not been damaged

• Check for the smell of gas or other chemical materials in and around the house

• Prior to consuming any products you left behind, make sure they are not chemically contaminated, musty or spoiled

• Prior to consuming tap or well water make sure it is clean/not contaminated

• If you have found yourself near a site where emergency aid is rendered but your help is not needed, do not disturb the rescuers without serious cause

5.8 Surviving in Occupied Territory

Table 5.5 Considerations for Surviving in Occupied Territory Hostile forces turn up in the area where you live

• You must remain calm • First try to figure out what exactly is happening, and only then decide

what action to take • If you have spotted soldiers in your yard, do not approach them o They may perceive you as a threat, or you may become the victim of a stray

bullet

• Do pry or give into temptation to take a closer look at military equipment, weapons or armed people o Peepers may easily be taken for spies

• Do not allow your children play in the streets o Kids are inquisitive and can be run over by tanks, blunder upon an explosive,

etc.

• Do not provoke enemy soldiers by visibly taking videos or photos of them

• Keep your hands out of your pockets and make no abrupt movements when talking to an armed person

• Never argue with a person holding a gun • Leave your home if armed individuals are entering it or are looking to

settling down in your place • Whenever possible, it is better to travel by foot than to drive

Enemy soldiers surveying premises and demand to present your documents

• Accept the inspection as a necessary evil • If an enemy soldier is pointing a gun at you and tells you to present you

document, do it in a calm manner • Do not look away from the soldiers conducting the verification, but do

not stare at them insistently • Stand calmly and still where you have been directed during verification

unless you are, e.g., directed to open some doors • You can make the verification conclude faster if you obey instructions

given and act in a natural and calm manner

Page 45: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

43 Edition A Version 1

o Do not become flustered, nervously look around, chatter or fall unnaturally silent

Located in a territory seized by enemy forces

• Take care to maintain water supplies o Water supply will likely be disconnected or pipes frozen (in case it is winter) o Fill all the vessels, even your bathtub, with water while you still can o Fill water supplies with water from wells, bores or open bodies of water o If you are in the city, centralized water supply may be available in fire fighter

stations, hospitals, active collective protection buildings;

• Centralised distribution of humanitarian aid sites are the safest sources of food

• Shops may not be working or may be destroyed, however, there may be food or other necessities left even in damaged shop premises

• Stay alert for undetonated or deliberately placed explosives when looking for food in such places

• Use a bicycle or a wheelbarrow to look for and to transport water and food to where you live o This attract less attention from enemy soldiers o Weigh the need and feasibility of acquiring a weapon for self-defence from

robbers and pillagers

• In case you come across a weapon do not try to pick it up, because it may be booby-trapped or used as a bait for enemy soldiers

• Do not walk around at night-time o You will get killed o Enemy soldiers will judge a nightwalker to be an enemy trying to change

position, transport weapons or conduct reconnaissance

• If you are in a city, walk only there where you can be clearly viewed and wear inconspicuous clothes so as not arouse the suspicions of enemy soldiers o i .e. simple and plain with no insignia or militaristic elements

• Do not give interviews to the adversary • Do not agree to be filmed or photographed by the adversary • If a person introduces themselves as a freelancer, make sure they really

are what they say they are • Confirm that your lodgement is not near a key site: e.g., mortar position,

snipers on your roof, etc. • Find some “fellows of fate” o You will defend yourself from robbers and looters more easily if you join

forces with friends or relatives Aggressor’s military forces establish a headquarters and/or positions in your neighbourhood

• Do not collaborate with the military occupation authority • Do not obey orders from invaders and collaborationists • Do not attend any meetings, rallies or other events they organise • Do not give them any information • If you have a chance to do so, talk to enemy soldiers to make clear that

you oppose their commanders’ propaganda will not pose any threat to them as individuals

Page 46: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

44 Edition A Version 1

• Use every means available to inform the aggressor state’s society about the criminal offences and aggression its political figures, leaders, chiefs or government are waging (choose email, social media or international media outlets for this)

• Spread information about the actual situation via social media and mobile communication networks as well as directly (in person)

• If you can do it safely, take video footage of the aggressive actions of enemy forces and use mediums available (e.g. the Internet) to transfer it to international media outlets (CNN, BBC, etc.)

• Stage cyber-attacks on information systems of the aggressor or invader in case Internet connection is still available amidst the armed conflict

• Provide aid to those affected by violence and repressive measures of the invaders

Taken hostage • Keep in mind, your sole goal is to survive • Accept the situation and prepare for a wait • Work to put yourself together and help prevent your fellow hostages

from panicking • Accept the fact that being afraid is natural o The initial 15-45 minutes are the peak of risk, so obey your kidnappers’

instructions immediately

• The more time you spend together, the smaller the risk is that the abductors will harm you

• Do not talk unnecessarily • Maintain a friendly bearing and do not cheat • Do not beg, apologise or start crying • Do not make any observations or suggestions to your kidnappers • Do not argue with kidnappers or other hostages, adhere to the common

view • Do not turn your back to the kidnappers unless they direct you to do so o Eye contact with your abductors is a welcome thing, people tend to kill less

when being looked at, however, do not stare at them without cease; o Eat if you are offered food, even if you are not hungry Eating will help you maintain your strength, while refusing will bring in more

hostility Try to rest, o Sit if possible

• If the hostage situation persists, try getting some sleep • Tell the abductors if any of your fellow hostages need medical

assistance • Speak consistently and in a calm manner, and do not attempt doing

anything before you are allowed to do it • If you have reason to believe a rescue operation is going to occur soon,

or you can hear noise and shooting, find a safe place, lie down, cover your head with your hands and do not make any abrupt movements

Page 47: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

45 Edition A Version 1

o Never start running towards the persons who are conducting the rescue - they may mistake you for an abductor.

Page 48: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

46 Edition A Version 1

Section 3 - Report

5.9 Overview. This section provides considerations regarding when, how, what and to whom information should be reported during an emergency.

� The first element of reporting is knowing emergency response numbers, websites, etc.

� If occupied, this may all change. So, it will be important to understand what critical services and functions the nation will accept from the occupying power and which will be provided by the underground and auxiliary

� If you decide to provide information to the TDF, it will also be important to know how to make contact without putting yourself or the force at risk. This may be best accomplished by linking up with the armed forces. Table 5.6 Considerations and Methods for reporting Items of Interest

When to report

• Be clear of danger o Move to a safe location if necessary and possible

• Avoid making unnecessary calls o The network will likely be overloaded o Consider the urgency of the information to be passed

What to report • Your condition o Depending on the situation, this information may prevent

unnecessary resources from being directed to confirm your status

• Condition of others near you • What you’ve seen

Suspicious or armed groups

• If you spot suspicious or armed groups of people in your neighbourhood or any other location in your country, report what you saw by calling the appropriate emergency number

How to report • It is naturally challenging to communicate clearly and concisely in an emergency

• Consider well in advance what information is necessary • Do not provide information that may be false • Injury reporting o Age o Sex o Illness or injury (describe do not attempt to diagnose) o Cause for concern (life threatening, potential loss of eyesight,

limb, etc.) o Estimated time of arrival if you are transporting the injured person

to another location

• Encounters with the adversary (also see Section 5—Participate) o Do not take unnecessary risks trying to gather or confirm

information o Provide as much information as possible using the acronym

“SALUTE” Size of the group Activity—what the group was doing Location Unit—any identifying patches, numerical markings, etc.

Page 49: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

47 Edition A Version 1

Time seen Equipment, such as rifles, trucks, etc.

Page 50: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

48 Edition A Version 1

Section 4 - Evacuate

5.10 Overview. This chapter provides considerations for evacuating your home and area, either under government direction and guidance or on your own. The material is arranged as follows: � How to remain prepared � What to consider if evacuation is likely � What information to expect the government to provide if an evacuation

is initiated � Actions to take once the evacuation is initiated � Considerations if it is unsafe to remain in your home but you cannot

evacuate

Prepare • Know emergency shelters in the area • Make advanced arrangements with friends or relatives in other

towns or regions that may be willing to provide shelter o Choose destinations in different directions to provide options

• Think over evacuation routes • Be familiar with alternate routes o Shortcuts may be blocked

• Think of methods of evacuation o Foot, car, etc.

• Keep go-bag ready (Fig. 5-1) • Plan how you will care for your pets in an emergency now • Keep emergency kit in car o Jumper cables o Flares or reflective triangle o Ice scraper o Car cell phone charger o Blanket o Map o Cat litter or sand (for better tire traction)

• Min ½ tank of fuel at all times Evacuation likely • Listen to a battery-powered radio and follow local evacuation

instructions • Check with neighbours who may need a ride • Keep your gas tank full in case of evacuation or power outages o Gas stations may be closed or power outage may prevent pumping o A full tank will also keep the fuel line from freezing

• Have the car checked for the following if evacuation is possible o Antifreeze levels o Battery and ignition system o Brakes o Exhaust system

Page 51: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

49 Edition A Version 1

o Fuel and air filters o Heater and defroster o Lights and flashing hazard lights o Oil o Thermostat o Windshield wiper equipment and washer fluid level o Install good winter tires and make sure they have enough tread, or

any chains or studs required in your local area Likely information if evacuation directed and managed by government

• Time you have before departing from the unsafe territory • How residents unable to leave by their own means will be

evacuated • Location of evacuation points (collection points) • Location of intermediate collection points (if necessary) • Destination of evacuation and collection points (for those using

their own transport) where vital services are available (food, drinking water, medicine, etc.)

• The things to take along • The safety measures before departing your home • The roads (evacuation routes) you should take

Evacuation initiated

• Be aware that leaving ahead of time is better than leaving belatedly

• If the government does not initiate an evacuation and you live in the city, go to a settlement or village, to you relatives or friends as soon as possible o Fighting is generally less probable there, and you will have less

difficulty accessing food and water • If time allows o Call or email relatives who live in areas different from yours

• Tell them where you are going and how to contact you, if you know

• Take basic necessities you may need in case of evacuation or temporarily settling somewhere else (go-bag(s)) o Use bags if necessary- five small bundles are far better than one

gigantic suitcaseKeep one smaller backpack with water and food which you must never take off you

• Take your pets with you but understand that only service animals may be allowed in public shelters

• Change into clothes that will protect you (full-length trousers, waterproof jacket, Wellington boots, cap)

• Ensure you maintain a civilian appearance during evacuation o Do not wear khaki or camouflage colours/patterns o Do not carry militaristic backpacks o Do not attach hunting knives or canteens in visible places

• If your family is leaving by vehicle, use one vehicle so as to minimize chances for any of your family members to fall behind (roads for departing must be chosen in advance)

• Only travel the daytime

Page 52: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

50 Edition A Version 1

o It is very hard to distinguish between a civilian and a soldier in the dark

o When choosing a place to stay overnight, prefer open areas to empty buildings where fighting has taken place These may be booby-trapped

• Choose the routes recommended by official sources oDo not attempt shortcuts, because roads other than recommended

may be blocked or dangerous due to military movement • Look for check posts o Territory under military control will have routes intended for civilian

withdrawal and evacuation o You will receive the most essential information at the check posts; • Drive carefully over bridges and crossovers, do not pull over

under high voltage cables • Be alert for road hazards such as washed-out roads or bridges

and downed power lines • Do not drive into flooded areas • If there are dead bodies on the streets, you should not touch

them • If you are not able to evacuate by your own transport, find out in

advance the location of the nearest evacuation points from where residents will be moved in an organised manner in the event of a serious adversity

• If you cannot safely stay with friends or relatives go to the destinations indicated by official sources where you will receive refuge and necessary aid

• Go on foot if it is too late to leave by vehicle o Do not hurry as you walk, look like calm civilians willing to leave

(because this is what you are)

• Make sure you are leaving your home protected o Disconnect water supply o Unplug all electric gadgets o Take food out of refrigerators and freezers o Close and lock all doors o Take outdoor furniture and children’s toys into the house • Once you have evacuated, do not attempt to return if the armed

conflict is still ongoing and enemy forces are still in control of your home area – you may be suspected of gathering intelligence

In case it is unsafe to stay at home and you cannot evacuate

• If a sudden threat has emerged and you must retreat to a safe place, go to the nearest collective protection facilities marked by a special sign

o Take your personal ID documents and medicine (in case you are taking any or have health problems)

o Take your go-bag(s) o In case you are taking babies or young children with you, take

food, disposable diapers, wrap and some toys for them.

Page 53: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

51 Edition A Version 1

Section 5 - Participate

5.11 As noted in Chapter 4, nonviolent resistance is one of the most effective ways the public can help defend the nation against an armed incursion.

� The list below is widely referred to as Gene Sharp’s 198 nonviolent actions.12

� Not all will apply to any one situation, but it is useful to be familiar with all possibilities.

Table 5.7 Potential Nonviolent Resistance Methods

FORMAL STATEMENTS 1. Public speeches 2. Letters of opposition or support 3. Declarations by organizations and institutions 4. Signed public declarations 5. Declarations of indictment and intention 6. Group or mass petitions

PROCESSIONS 1. Marches 2. Parades 3. Religious processions 4. Pilgrimages 5. Motorcades HONOURING THE DEAD 1. Political mourning 2. Mock funerals 3. Demonstrative funerals 4. Homage at burial places

COMMUNICATIONS WITH A WIDER AUDIENCE 1. Slogans, caricatures, and symbols 2. Banners, posters, and displayed communications 3. Leaflets, pamphlets, and books 4. Newspapers and journals 5. Records, radio, and television 6. Skywriting and earthwriting

PUBLIC ASSEMBLIES 1. Assemblies of protest or support 2. Protest meetings 3. Camouflaged meetings of protest 4. Teach‐ins

GROUP REPRESENTATIONS 1. Deputations 2. Mock awards 3. Group lobbying 4. Picketing 5. Mock elections

WITHDRAWAL AND RENUNCIATION 1. Walk‐outs 2. Silence 3. Renouncing honours 4. Turning one’s back

SYMBOLIC PUBLIC ACTS 1. Displays of flags and symbolic colours 2. Wearing of symbols 3. Prayer and worship 4. Delivering symbolic objects 5. Protest disrobings 6. Destruction of own property 7. Symbolic lights 8. Displays of portraits 9. Paint as protest 10. New signs and names 11. Symbolic sounds 12. Symbolic reclamations 13. Rude gestures

THE METHODS OF SOCIAL NONCOOPERATION OSTRACISM OF PERSONS 1. Social boycott 2. Selective social boycott 3. Lysistratic nonaction 4. Excommunication 5. Interdict NONCOOPERATION WITH SOCIAL EVENTS, CUSTOMS, AND INSTITUTIONS 1. Suspension of social and sports activities 2. Boycott of social affairs 3. Student strike 4. Social disobedience

12 Will add reference

Page 54: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

52 Edition A Version 1

5. Withdrawal from social institutions

PRESSURES ON INDIVIDUALS 1. “Haunting” officials 2. Taunting officials 3. Fraternization 4. Vigils

WITHDRAWAL FROM THE SOCIAL SYSTEM 1. Stay‐at‐home 2. Total personal non-cooperation 3. “Flight” of workers 4. Sanctuary 5. Collective disappearance 6. Protest emigration (hijrat)

DRAMA AND MUSIC 1. Humorous skits and pranks 2. Performances of plays and music 3. Singing THE METHODS OF ECONOMIC NONCOOPERATION: ECONOMIC BOYCOTTS ACTION BY CONSUMERS 1. Consumers’ boycott 2. Nonconsumption of boycotted goods 3. Policy of austerity 4. Rent withholding 5. Refusal to rent 6. National consumers’ boycott 7. International consumers’ boycott

RESTRICTED STRIKES 1. Detailed strike 2. Bumper strike 3. Slowdown strike 4. Working‐to‐rule strike 5. Reporting “sick” (sick‐in) 6. Strike by resignation 7. Limited strike 8. Selective strike MULTI‐ INDUSTRY STRIKES 1. Generalized strike 2. General strike

ACTION BY WORKERS AND PRODUCERS 1. Workers’ boycott 2. Producers’ boycott

COMBINATION OF STRIKES AND ECONOMIC CLOSURES 1. Hartal 2. Economic shutdown

ACTION BY MIDDLEMEN 1. Suppliers’ and handlers’ boycott

THE METHODS OF POLITICAL NONCOOPERATION REJECTION OF AUTHORITY 1. Withholding or withdrawal of allegiance 2. Refusal of public support 3. Literature and speeches

ACTION BY OWNERS AND MANAGEMENT 1. Traders’ boycott 2. Refusal to let or sell property 3. Lockout 4. Refusal of industrial assistance 5. Merchants’ “general strike” ACTION BY HOLDERS OF FINANCIAL RESOURCES 1. Withdrawal of bank deposits 2. Refusal to pay fees, dues, and assessments 3. Refusal to pay debts or interest 4. Severance of funds and credit 5. Revenue refusal 6. Refusal of a government’s money

CITIZENS’ NONCOOPERATION WITH GOVERNMENT 1. Boycott of legislative bodies 2. Boycott of elections 3. Boycott of government employment and positions 4. Boycott of government departments, agencies, and other bodies 5. Withdrawal from governmental educational institutions 6. Boycott of government‐supported institutions 7. Refusal of assistance to enforcement agents

Page 55: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

53 Edition A Version 1

8. Removal of own signs and placemarks 9. Refusal to accept appointed officials 10. Refusal to dissolve existing institutions

ACTION BY GOVERNMENTS 1. Domestic embargo 2. Blacklisting of traders 3. International sellers’ embargo 4. International buyers’ embargo 5. International trade embargo

CITIZENS’ ALTERNATIVES TO OBEDIENCE 1. Reluctant and slow compliance 2. Nonobedience in absence of direct supervision 3. Popular nonobedience 4. Disguised disobedience 5. Refusal of an assemblage or meeting to disperse 6. Sitdown 7. Noncooperation with conscription and deportation 8. Hiding, escape, and false identities 9. Civil disobedience of “illegitimate” laws

THE METHODS OF ECONOMIC NONCOOOPERATION: THE STRIKE SYMBOLIC STRIKES 1. Protest strike 2. Quickie walkout (lightning strike)

ACTION BY GOVERNMENT PERSONNEL 1. Selective refusal of assistance by government aides 2. Blocking of lines of command and information 3. Stalling and obstruction 4. General administrative noncooperation 5. Judicial noncooperation 6. Deliberate inefficiency and selective noncooperation by enforcement agents

AGRICULTURAL STRIKES 1. Peasant strike 2. Farm workers’ strike ORDINARY INDUSTRIAL STRIKES 1. Establishment strike 2. Industry strike 3. Sympathy strike STRIKES BY SPECIAL GROUPS 1. Refusal of impressed labor 2. Prisoners’ strike 3. Craft strike 4. Professional strike

DOMESTIC GOVERNMENTAL ACTION 1. Quasi‐legal evasions and delays 2. Noncooperation by constituent governmental units

INTERNATIONAL GOVERNMENTAL ACTION 1. Changes in diplomatic and other representation 2. Delay and cancellation of diplomatic events 3. Withholding of diplomatic recognition

THE METHODS OF NONVIOLENT INTERVENTION PSYCHOLOGICAL INTERVENTION 1. Self‐exposure to the elements 2. The fast a. Fast of moral pressure

Page 56: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

54 Edition A Version 1

4. Severance of diplomatic relations 5. Withdrawal from international organizations 6. Refusal of membership in international bodies 7. Expulsion from international organizations

b. Hunger strike c. Satyagrahic fast 3. Reverse trial 4. Nonviolent harassment

PHYSICAL INTERVENTION 1. Sit‐in 2. Stand‐in 3. Ride‐in 4. Wade‐in 5. Mill‐in 6. Pray‐in 7. Nonviolent raids 8. Nonviolent air raids 9. Nonviolent invasion 10. Nonviolent interjection 11. Nonviolent obstruction 12. Nonviolent occupation

SOCIAL INTERVENTION 1. Establishing new social patterns 2. Overloading of facilities 3. Stall‐in 4. Speak‐in 5. Guerrilla theatre 6. Alternative social institutions 7. Alternative communication system

ECONOMIC INTERVENTION 1. Reverse strike 2. Stay‐in strike 3. Nonviolent land seizure 4. Defiance of blockades 5. Politically motivated counterfeiting 6. Preclusive purchasing 7. Seizure of assets 8. Dumping 9. Selective patronage 10. Alternative markets 11. Alternative transportation systems 12. Alternative economic institutions

POLITICAL INTERVENTION 1. Overloading of administrative systems 2. Disclosing identities of secret agents 3. Seeking imprisonment 4. Civil disobedience of “neutral” laws 5. Work‐on without collaboration 6. Dual sovereignty and parallel Government

THE METHODS OF ECONOMIC NONCOOPERATION: ECONOMIC BOYCOTTS ACTION BY CONSUMERS 1. Consumers’ boycott 2. Nonconsumption of boycotted goods 3. Policy of austerity 4. Rent withholding 5. Refusal to rent 6. National consumers’ boycott 7. International consumers’ boycott

RESTRICTED STRIKES 1. Detailed strike 2. Bumper strike 3. Slowdown strike 4. Working‐to‐rule strike 5. Reporting “sick” (sick‐in) 6. Strike by resignation 7. Limited strike 8. Selective strike MULTI‐ INDUSTRY STRIKES 1. Generalized strike 2. General strike

ACTION BY WORKERS AND PRODUCERS 1. Workers’ boycott 2. Producers’ boycott

COMBINATION OF STRIKES AND ECONOMIC CLOSURES 1. Hartal 2. Economic shutdown

ACTION BY MIDDLEMEN 2. Suppliers’ and handlers’ boycott

THE METHODS OF POLITICAL NONCOOPERATION REJECTION OF AUTHORITY 1. Withholding or withdrawal of allegiance 2. Refusal of public support

ACTION BY OWNERS AND MANAGEMENT 1. Traders’ boycott 2. Refusal to let or sell property 3. Lockout

Page 57: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

55 Edition A Version 1

4. Refusal of industrial assistance 5. Merchants’ “general strike”

3. Literature and speeches

ACTION BY HOLDERS OF FINANCIAL RESOURCES 1. Withdrawal of bank deposits 2. Refusal to pay fees, dues, and assessments 3. Refusal to pay debts or interest 4. Severance of funds and credit 5. Revenue refusal 6. Refusal of a government’s money

CITIZENS’ NONCOOPERATION WITH GOVERNMENT 1. Boycott of legislative bodies 2. Boycott of elections 3. Boycott of government employment and positions 4. Boycott of government departments, agencies, and other bodies 5. Withdrawal from governmental educational institutions 6. Boycott of government‐supported institutions 7. Refusal of assistance to enforcement agents 8. Removal of own signs and placemarks 9. Refusal to accept appointed officials 10. Refusal to dissolve existing institutions

5.12 Caching items. Below are techniques for establishing a site for hiding items (cache site). There may be any number of reasons to hide items for future recovery and use.

Table 5.8 Possible Types and Reasons for Hiding Items • Suppllies and equipment in support of the national response forces • Family heirlooms; e.g., valuables, such as artwork, etc. • Emergency supplies for self-family-friends • Items that can be bartered in an emergency • Supplies in emergency locations; i.e., away from home

General considerations

• Security is the priority consideration o Building the cache site and emplacing the material undetected o Ability to access the cache site to replace or maintain material o Retrieving the material, particularly in the face of an armed incursion o A site that is obvious to one will be obvious to all (especially a

concealment site) Cache methods

• Concealment o Use permanent man-made or natural features to hide or disguise

material o Best used for exceptionally secure sites and when quick access and

recovery are important Requires minimal time and labour to establish Normally requires least packaging

• Burial o Generally, best long-term security

Page 58: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

56 Edition A Version 1

o More time-consuming and labour-intensive than concealment o Most likely requires special packaging or container(s) o Requires more time to recover o May be more difficult to locate

• Submersion o Suitable on rare occasions o Requires waterproof, pressure resistant container o Must account for potential impact of factors that require expertise to

analyse: water depth, bottom composition, currents, etc. o Normally requires at least two people to emplace and recover

Site Criteria • Accessibility o Can be located by simple instructions to someone who has never

visited the location Require distinct, permanent landmarks within measurable distance

o Two secure routes to the site Alternate route enables escape and reduces chance of being

detected o Can be emplaced and recovered in any season Impact of snow or frozen ground, to include tracks

• Concealment site o Examples Natural caves and caverns Abandoned mines and quarries Abandoned buildings Infrequently used structures (stadiums, railroad facilities on spur

lines) Memorial edifices (mausoleums, crypts, monuments) Public buildings (museums, places of worship, libraries) Ruins of historical interest Culverts Sewers Cable conduits

o Considerations Equally accessible to the emplace(s) and recovery individual(s) Remains accessible as long as needed Discovery will not reveal persons involved Not in a location frequented by the adversary Physically secure for the preservation of cached material

• Burial site considerations o Drainage o Ground cover o Natural concealment o Type of soil o Snowfall and freezing o Rocks and other subsurface obstructions

• Submersion site considerations o Normally requires a boat, which adds a level of complexity to

access, emplacement, maintenance and recovery o Streams and rivers may be impacted by rains

Page 59: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

57 Edition A Version 1

Reference points for locating a site

General area located by place name; i.e., region, village, etc. Immediate Reference Point (IRP) o Durable landmark; i.e., only church or bridge in the vicinity

• Final Reference Point (FRP) o Unmistakably identifiable o Will remain fixed for at least as long as the cache is used o Near enough to the cache to pinpoint the exact location with precise

linear measurements o Accessible from IRP by simple route description

Pinpointing methods

GPS o Most accurate o Commonly available during non-emergencies o GPS satellite access may be blocked during armed incursion o Place directly beside the FRP (figure XX) Projection from FRP o FRP requires one side long enough to permit precise projection

(figure XX) o May project from two FRPs to an intersection point (figure XX) o Projections tend to lose accuracy when sighting beyond 50 meters

• Compass heading and distance from FRP (figure XX) Packaging considerations

Thoroughly inspect, clean and dry material before packaging Coat with preservative; i.e., oil or paint Enclose instructions for using material Conduct submersion test to test seal Select containers carefully o Completely watertight and airtight after sealing o Noiseless when being handled o Resistant to shook and abrasion o Lightweight construction o Able to withstand rodents, insects and bacteria o Can be closed and reopened easily and repeatedly o Capable of withstanding highly acid or alkaline soil or water

Security measures

• Always maintain maximum vigilance at the site to avoid detection • Use lookout if available o If no lookout, pause, look and listen frequently

• Minimise the use of artificial light (flashlights, lanterns, etc.) • Have a plan of action in case of interrupted or discovered during

emplacement, maintenance or removal • Plan time to sterilise burial site after hole has been refilled o Dispose of excess soil far from burial site (stream is ideal) o Check to ensure no tools are left behind o If work is done at night, may need to return to site during the day to

inspect if safe to do so

Page 60: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

58 Edition A Version 1

5.13 Describing Individuals13

� When describing soldiers, follow the SALUTE report format provided in Section 2 above.

� There are also times when information regarding individual features may be helpful, for instance when trying to identify a particular leader or when hostilities end and individual members of the invading force must be located to stand trial for their crimes.

Table 5.9 Considerations for Describing Individuals

General features

• Sex • Race or national origin • Age (estimated) • Height o Use comparisons with your own height, a door or some other standard

measure • Weight (estimated) • Build o Fat o Husky o Slim o Muscular, etc.

Facial features

• Hair o Colour o Texture o Hairline o Style o Also possible dyes or wigs

• Forehead o Forehead height o Whether the skin is smooth, creased or wrinkled

• Eyes o Colour o Shape (round, almond) o Clear or bloodshot o Heaviness of eyelashes and eyebrows

• Nose o Overall shape (long, wide, flat, etc.) o Nostrils (wide, narrow, flared)

• Cheeks o Flesh sunken or filled out o Dried or oily o Wrinkles around nose or mouth

13 https://home.chicagopolice.org/about/contact-us/how-to-describe-a-suspect/

Page 61: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

59 Edition A Version 1

o Cheek bones high or low, wide or narrow • Ears

o Size and prominence (protruding or flat against head) • Mouth

o Lips thin, medium or full o Corners turn up, turn down, or level

• Chin o Shape (round, oval, pointed, square) o Double chin o Dimpled o Cleft

• Neck o Protruding Adam’s apple o Hanging jowls

• Complexion o Pores o Pockmarks o Acne o Razor rash o Bumps

• Facial hair o Clean shaven o Unshaven o Beard o Moustache o Goatee o Sideburns

• Tattoos o Shape and style o On what part of the body

Other physical features or peculiarities

• Voice o Pitch o Tone o Rasp o Lisp

• Speech o Articulate o Uneducated o Accent o use of slang

• Gait o Slow o Fast o Limp

Page 62: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

60 Edition A Version 1

5.14 Describing Tracked Vehicles. To the average person, a large armoured vehicle that moves on tracks and has a gun sticking out of it is a tank. A military professional will see that same vehicle and determine that it is not a tank. It is an armoured personnel carrier, self-propelled artillery or any of several other possible specific weapon systems.

� The average civilian is not expected to be able to precisely identify all the various types of military equipment.

� It is helpful, however, to be able to describe items in a way will allow a professional to determine what it is.

� The table below describes the difference between some of the most common armoured military vehicles you would see in a hostile situation. 14

Table 5.10 General Vehicle Identification Considerations

Tanks • General. Oftentimes the term “tank” is used as a blanket word for any armoured military vehicle, but this is erroneous. Tanks are heavily armed and armoured vehicles designed to clear out well-protected targets, engage other vehicles (especially other tanks), and use their off-road mobility to exploit weaknesses in the enemy’s defences. Due to their size and firepower, tanks are also formidable psychological weapons. However, they can be vulnerable in built-up environments. o Size: Large — usually 45+ tons.

o Guns: Large 100-125 mm main gun This is the best way to identify a tank. Tank guns are long and protrude beyond the front of the tank. Tanks have auxiliary machine guns as well.

o Missiles: Some tanks can fire missiles from their main guns, but tanks generally do not carry externally-mounted missiles.

o Propulsion: Tracked; tracks are large and wide. o Windows: No, except for small sensor or periscope windows.

Infantry Fighting Vehicles (IFVs)

• General. IFVs are easy to mistake for tanks. The main difference between the two is role and weapon size. IFVs carry infantry into battle as well as participating in combat, whereas tanks do not transport infantry. This difference is reflected by the smaller IFV primary weapon size, which frees up space for infantry and equipment. o Size: Usually around 20-30 tons. Somewhat smaller than a

tank. o Guns: 20-40 mm main guns are standard, with some

exceptions. IFV guns are not as large or long as a tank gun. IFV guns will usually but not always be mounted in a small turret that does not span the full width of the hull. IFVs almost always have one primary weapon. If the vehicle has multiple large guns mounted to a single turret, it is probably a an anti-aircraft weapon.

14 https://whitefleet.net/2015/12/01/military-vehicle-identification-guide-ground-vehicles/

Page 63: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

61 Edition A Version 1

o Missiles: Some IFVs carry missiles since their main guns lack the punch of a tank gun.

o Windows: No, except small periscope and sensor openings.

• The primary role of these vehicles is to move troops in and out of areas where they may be subjected to enemy fire. APCs vary widely in configuration from simple up-armored SUVs to tank based vehicles that can withstand immense punishment. Because their primary mission is to transport troops, APCs are lightly armed, with at most a grenade launcher or machine gun and sometimes no armament at all

Amoured personnel carriers

• General. The primary role of these vehicles is to move troops in and out of areas where they may be subjected to enemy fire. APCs vary widely in configuration from simple up-armored SUVs to tank based vehicles that can withstand immense punishment. Because their primary mission is to transport troops, APCs are lightly armed, with at most a grenade launcher or machine gun and sometimes no armament at all. o Size : Varies, from SUV-sized to tank or IFV-sized

o Guns: A few machine guns, grenade launchers, or no armament. Does not have a turret-mounted autocannon

o Missiles: Some APCs are modified to carry missiles, but this is not common

o Propulsion: Tracked or wheeled o Windows: Some have none, others have armored windows

similar to a truck or SUV. Depends on armor level and chassis used

Notes: Many APCs are modified to perform specialized tasks, such as serving as a combat ambulance, serving as a mortar platform, etc. In this case the base vehicle is still an APC but the role is no longer troop transport.

Reconnaissance vehicles

• General. Reconnaissance vehicles are high mobility vehicles designed to move around the battlefield rapidly, gathering information and probing enemy defenses while engaging any ill-protected contacts. The chassis layout, level of protection and armament of these vehicles varies widely, as many different chassis designs can be modified to fit the recon role. A common reconnaissance vehicle layout is a small, lightly armored 4×4 with a relatively large autocannon or machine gun mounted in a turret. Almost all modern light tanks are built as reconnaissance vehicles. Unfortunately, it is very difficult to tell based on appearance when a vehicle (for example an IFV) has been modified from its original design to a reconnaissance layout; many IFVs and APCs are changed to reconnaissance vehicles by adding improved optics and communications equipment. o Size: Large SUV to small tank o Guns: Often one low-velocity cannon, autocannon, or machine

gun in a small turret o Missiles: Some are armed with missiles

o Propulsion: Wheeled or tracked

Page 64: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

62 Edition A Version 1

Table 5.11 Techniques for describing Tracked Vehicles Features Example Major parts

Turret • Rotating armoured

structure on the top of the vehicle

Armament • Varies from

machineguns to large cannons

• In turreted vehicles the heavy armament is found in the turret

Tracks • Notice that

tanks have wheels inside of the tracks

• These are often covered by panels called skirts, or obscured by grass

• However, if you can see the wheels, count them

Page 65: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

63 Edition A Version 1

5.15 Describing Terrain. The TDF will use information about the terrain to support all planning and decisions. This section will provide the tools necessary to provide information regarding streams and rivers, ground slope, and the movement of personnel. It is not necessary for you to know exactly how the information will be used. In fact, for security purposes, it is best to know as little as possible. However, you should trust that sometimes seemingly useless pieces of information may help the TDF will determine where the enemy has been, where they may go next and where they cannot go.

Table 5.12 River or stream velocity Potential Uses

• Determine whether certain vehicles, boats or personnel can cross a body of water

How to calcuate

Table 5.13 Measuring Slope Potential uses

• Identify possible helicopter landing zones • Identify possible staging or support areas • Road usability

Fomulas • Slope can be measured by pecentage or degree

• Formula for percentage o V/H x 100 o V = Vertical distance (difference in elevation) o H = Horizontal distance o 100/1,000 x 100 = 10% slope

• Formula for degree o V/H x 57.3 o V = Vertical distance (difference in elevation) o H = Horizontal distance

100m Vertical Distance

(V)

1,000m Horizontal distance (H)

Page 66: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

64 Edition A Version 1

o 100/1,000 x 57.3 = 5.73 degrees slope

Calculating vertical and horizontal distances

• Modern smart devices are often equipped to measure elevation, distance, etc.

• If such a device is not available distance and eleveation may be measured via the pace method (see figure below). o This method is most accurate for slopes of less than 30 percent grade, and

requires practice to master.

o Stand at the bottom of the slope with your head and eyes level. o Sight a spot on the slope. This spot should be easily identifiable. If it is not, another person should go forward to mark the location.

o Walk forward and stand on the marked spot. Record the number of paces. Repeat this procedureuntil the top of the slope (estimate fractions of an eye

level) is reached. o Compute the vertical distance by multiplying the number of sightings by

the eye-level height(1.75 meters). Compute the horizontal distance by totaling the number of paces and

convertingthem to meters by multiplying by 0.75 (or the known pace-to-meter conversion factor).

o Calculate the percent of slope by substituting the values into the percent-of-slope format.

Table 5.14 Analysing Footprints Potential Uses • Determine number of personnel, speed and direction of travel

What to look for

• If footprints are deep and the pace is long, the party was moving rapidly (A). o Long strides and deep prints with toe prints deeper than heel prints

indicate running.

• Prints that are deep, short, and widely spaced, with signs of scuffing or shuffling indicate the person is carrying a heavy load (B). o If the party members realize they are being followed, they may try to hide

their tracks.

• Persons walking backward have a short, irregular stride (C). o The prints have an unnaturally deep toe, and soil is displaced in the

direction of movement.

Page 67: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

65 Edition A Version 1

• Women tend to with feet pointed slightly inward, while men walk with their feet straight ahead or pointed slightly to the outside (D). o Prints left by women are usually smaller and the stride is usually shorter

than prints left by men.

5.16 Summary. The skills in this chapter are focused on responding to an armed incursion. However, many of the same steps will help you survive and assist others in the event of any emergency. They are measures you can take to increase and maintain your individual resilience and contribute to national comprehensive defence.

Page 68: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

66 Edition A Version 1

Intentionally blank

Page 69: Comprehensive Defence Handbook —Vol II

Comprehensive Defence Handbook—Vol II

67 Edition A Version 1

Intentionally blank

Page 70: Comprehensive Defence Handbook —Vol II