Nato Sof

Download as pdf or txt
Download as pdf or txt
You are on page 1of 70

Comprehensive Defence Handbook—Vol II

1
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Intentionally blank

2
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Foreword – COM NSHQ


Enabling Comprehensive Defence is a key
component of our AJP 3.5 Military Assistance
mission’s Force Multiplier Special Operations
Forces (FMSOF) expertise. While countries may be
in different stages of developing these
comprehensive defence capabilities, all will benefit
from enhancing and synchronizing deterrent and
comprehensive defence networks and tools. Our
intent is for this purely defensive handbook to assist
all NATO and Partner countries that seek to
optimize their country’s deterrence and
comprehensive defence capabilities.

Comprehensive defence is not limited to SOF,


military or government practitioners. Rather, it
centres on enabling an entire country through a
whole-of-society, whole-of-country deterrent and
defensive approach. This handbook therefore
focuses on roles and functions of society, groups
and government entities working together to improve deterrence and defence of their homeland.
The pillars of comprehensive deterrence and defence activities across phases of preparation,
response and recovery provide a framework for practical checklists and implementat io n
principles.

The aim of this this handbook and the checklists contained within it is to practically assist in
the development of a national programme designed to enable all members of society to
contribute to comprehensive deterrence and defence. Use of the handbook will foster a shared
understanding that underscores increased coordination and synergized effects. This handbook
is a key tool for trainers to leverage within their own countries as they develop the
comprehensive deterrent and defence capabilities for their country. While readers may find
significant benefit in this first edition of the comprehensive defence handbook, I welcome your
feedback so that we can improve this handbook as we republish updated versions of yearly.
Your additional considerations, best-practices and recommendations will also be helpful as we
update data in our comprehensive defence courses, seminars and table-top exercises.

Comprehensive Defence is enshrined in the defensive resilience and resistance principles of


Article 3. This handbook and the techniques within are purely defensive in nature, and will
assist in the development truly comprehensive deterrence and defensive networks.

Sincerely,

Eric P. Wendt
Lieutenant General, USA Army
Commander

1
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Intentionally blank

2
Edition A Version 1
Comprehensive Defence Handbook—Vol II

File Ref: NSHQJ9/IBG/S-0532 Tel: +32 (0)65 44 7111


Tel: +32 (0)65 44 + ext
Date: 1 December 2020 Email: nshqregistry@nshq.nato.int

NSHQ PUBLICATION

COMPREHENSIVE DEFENCE HANDBOOK

Status. This is an original NATO Special Operations Headquarters (NSHQ) publication.

1. Purpose. To provide fundamental concepts and principles for countries to develop,


enhance, or redefine their approach to Comprehensive Defence.

2. Applicability. Recommendations within this handbook are based upon reference


publications and best practices. The guidance is meant to be informative rather than
authoritative. It does not supersede existing doctrinal publications. This handbook is primarily
written for countries desiring to implement or refine a comprehensive whole-of-society
approach to national defence.

3. Publication Updates. NSHQ will review this publication at least annually and update
as needed. Suggestions for updates should be directed to the proponent.

4. Proponent. The proponent of this publication is the NSHQ Strategy, Concepts and
Experimentation Directorate.

5. Distribution. As required.

Eric P. Wendt
Lieutenant General, USA Army
Commander

3
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Intentionally blank

4
Edition A Version 1
Comprehensive Defence Handbook—Vol II

NSHQ Change Proposal Comment Matrix


For changing, correcting, or removing current and/or inserting new content.

Comment Guidelines for the Originator:

C – Critical
S – Substantive
E – Editorial
C/S Sub- Adjudication
Serial Originator Para Comment Rationale
/E Para (NSHQ Doctrine)
Insert then highlight, Rationale will A - Approved
or line out text to be be submitted AA - Approved as
modified and propose for all amended
a recommended comments
NA - Not
course of action.
General observations Approved
without proposed
solutions should not
be submitted.

Note: This table may be copied and pasted into an email to allow for more room to
comment.

Submission:
Submit requests to modify publications to NSHQ Concepts Directorate

5
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Intentionally blank

6
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Contents
Foreword – COM NSHQ.................................................................................................. 1
Chapter 1 - Volume II Introduction .................................................................................. 9
Section 1 - Overview .................................................................................................... 9
Section 2 - Organisation .............................................................................................. 9
Summary..................................................................................................................... 10
Chapter 2 - Understanding Comprehensive Defence .................................................. 11
Section 1 - Definitions and Relevance ...................................................................... 11
Section 2 - Risks ........................................................................................................ 13
Section 3 - Contributing to Resilience ....................................................................... 14
Chapter 3 - Malicious Acts............................................................................................. 17
Section 1 - Overview .................................................................................................. 17
Section 2 - Weaponised Information ......................................................................... 17
Section 3 - Cyber Attacks .......................................................................................... 19
Section 4 - Terrorism.................................................................................................. 21
Chapter 4 - Malicious Act: Armed Incursion ................................................................. 25
Section 1 - Overview .................................................................................................. 25
Section 2 - Response Force ...................................................................................... 26
Section 3 - Contributing to Comprehensive Defence against an Armed Incursion 29
Section 4 - Law ........................................................................................................... 31
Chapter 5 - Skills ............................................................................................................ 33
Section 1 - Overview .................................................................................................. 33
Section 2 - Survive ..................................................................................................... 33
Section 3 - Report ...................................................................................................... 46
Section 4 - Evacuate .................................................................................................. 48
Section 5 - Participate ................................................................................................ 51

7
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Intentionally blank

8
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Chapter 1 - Volume II Introduction


This is the second of a two-volume handbook. It provides background information and
checklists that the average member of society can reference when looking for ways to
contribute to national safety and security.

Section 1 - Overview

1.1 This volume is designed to form the core of a stand-alone handbook that, once
tailored to a nation’s specific needs, can be provided to every member of society.
Because it is a template, beyond this introductory chapter, the volume is written
as though it is speaking directly to a nation’s residents. However, it uses the
generic terms, such as “the nation.” When adapted for a specific country, officials
may choose to adjust the tone to account for particular cultural and educational
considerations.

1.2 At least one nation that issues this type of handbook to its population uses
humorous illustrations to help maintain the readers’ attention but also notes the
seriousness of the information being communicated. Similarly, when refining the
document to fit a nation’s social personality, officials should be reminded that
over-simplifying the material might cause it to either lose its impact or alienate
the public by insulting the readers’ intelligence.

1.3 As with Volume I, this document concentrates on building resilience agains t


malicious acts. However, the examples and advice provided can easily be
expanded to cover more potential threats, to include specific natural and/or
accidental acts.

Section 2 - Organisation
1.4 Volume II has five chapters:
a. The chapter that follows this one begins by explaining comprehensive defenc e
in further detail. It then goes on to discuss how to identify risks that the nation
may face. The chapter concludes by offering different ways that individuals
can contribute to comprehensive defence.
b. The next two chapters present specific methods for individuals to help build
resilience and defend against malicious acts. To cover as broad a range as
possible, it uses four types of acts as examples: cyber attack, weaponised
information, terrorism and armed incursion.
c. The final chapter is the heart of Volume II. The checklists that comprise
Chapter 5 offer specific measures one can take if faced with an armed
incursion, beginning with how to survive if occupied and concluding with
activities individuals can perform to directly support the nation’s defenc e
forces.

9
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Summary.
1.5 Volume II is the core of a user’s manual. When tailored for a specific nation, it
will help the average member of society understand how they can contribute to
the country’s safety and security, first by being individually resilient and then by
being capable and willing to directly respond to an emergency should it arise.

10
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Chapter 2 - Understanding Comprehensive Defence

Section 1 - Definitions and Relevance


2.1 What is Comprehensive Defence?

An official Government strategy, which encompasses a whole of society


approach to protecting the nation against potential threats.

2.2 What is Resilience?

The will and ability to withstand external pressures and influences and/or
recover from the effects of those pressures or influences.

Simply put, a resilient society is prepared to respond to and quickly recover


from any natural, accidental event or malicious act

2.3 What this means to you. In order for Comprehensive Defence to be effective,
every member of society must understand what it is and how they can contribute
to it.

Table 2.1 Key Point


Comprehensive Defence recognises that all members of society have a right
and responsibility to help protect the nation against any threat: natural,
accidental or malicious.

Table 2.2 Comprehensive Defence Actors


Public Sector Private Sector Civic Sector

Military Civil
Business NGO’s
Conventional Government Ministries Industry Clubs
Special Operations Emergency Management Privately Owned Energy Churches
Reserve/Home Etc. Privately Owned Faith Groups
Guard Hospitals Individual citizens
Other Infrastructure

“the 2 % “ The 98%

2.4 Figuratively speaking, the responsibility to prevent or respond to threatening


events falls to only 2% of society. This means that the majority of the population
is contained in the two non-governmental categories, the private and civic
sectors, sometimes referred to as “the 98%.”
A key Comprehensive Defence objective is to harness the untapped capacity
of “the 98%” by developing the will of the people to directly contribute to their
own safety and security, and their natural right to self-determination.

11
Edition A Version 1
Comprehensive Defence Handbook—Vol II

With Comprehensive Defence, the government involves all sectors of society


when planning, preparing, responding to and recovering from natural,
accidental and malicious events that would threaten the nation’s safety or
security.
 Through the government, society establishes the means to educate, inform
and enable the public
 The public is then—
• Continuously aware of any developments that may threaten the nation
• Capable of helping prepare for and respond to threats
• Committed to contributing should a natural, accidental or malicious event
occur
 This approach creates the conditions for national resilience: trust, cohesion
and motivation (figure 2.1)

Figure 2.1 Comprehensive Defence Conditions

Table 2.3 Key Take Away


 Comprehensive defence empowers all members of society to contribute to
their own safety and security

o This increases the nation’s ability to prevent, respond to and recover from
potential threats—natural, accidental or malicious.

 A well-executed comprehensive defence strategy can deter malicious acts,


and, if deterrence fails, contribute to restoring sovereignty.

12
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Section 2 - Risks
2.5 What is a risk? 1
A risk or threat is a natural, accidental or malicious event that may accomplish
one or more of the following:
 Interfere with the nation’s ability to govern itself or make decisions free from
external influence
 Produce mass casualties or displace a large portion of the population
 Substantially disrupt essential goods or services
 Require a national-level response
Through its internal planning processes, the nation has precise criteria for
categorizing various risks, such as mass casualties, etc.

2.6 How to know what risks the nation is facing


In keeping with comprehensive defence methodology, the government
conducts periodic Comprehensive Risk Assessments (CRAs)
 Members of the private and civic sectors contribute to the assessments,
and simple to understand reports are provided to the public

Figure 2.2 Graphic Depiction of Notional Risk Assessment

1
Although the terms risk and threat have slightly different meanings, they are used here
interchangeably

13
Edition A Version 1
Comprehensive Defence Handbook—Vol II

2.7 Figure 2-2 is an example of a graphic depiction of the results of a CRA. 2


Using this chart, the average member of society can quickly assess the
likelihood and impact of events that would threaten the population’s safety
and security
The written report the picture comes from would provide more details
regarding each potential risk.

2.8 How to identify a threatening event is going to occur or has occurred.


Some emergencies cannot be predicted
However, most nations have systems to warn residents of potential danger
as far in advance as possible
Therefore, when it comes to natural or accidental events in particular, the
public alert system is often the best indicator that an event may occur or has
already happened

Table 2.4 Possible Alert Methods


• Specific radio and TV stations the government uses to provide information
• Websites
• Smart phone apps
• Text message systems
• Outdoor warning systems, to include air raid signals

2.9 Summary. By understanding, and potentially even participating in the nation’s


Comprehensive Risk Assessment process, the average resident will be more
capable of contributing to Comprehensive Defence and the nation will be more
resilient for it.

Table 2.5 Key Point


Comprehensive Defence increases our resilience and deters agression

Section 3 - Contributing to Resilience


2.10 Overview. This section discusses how individual members of society can
contribute to national resilience. It begins by providing tips for maintaining
individual resilience and then offers ideas on how to participate as part of a group.

2.11 Individual Resilience. The first step in contributing to national resilience is to


establish and maintain the highest possible level of individual resilience. This will
help reduce the demand for national resources during an emergency.

2
Example comes from the UK National Risk Register found at ukresillience.gov.uk

14
Edition A Version 1
Comprehensive Defence Handbook—Vol II

The key to individual resilience is to be well prepared for potential emergencies


 Natural, accidental or malicious events

Table 2.6 Individual Resilience Considerations—Aware, Capable, Committed


Aware • Know your national alert systems and status
o Natural disaster alert levels (tornado, fire, flood, etc.)
o Terror alert levels (i.e., green, orange, yellow, red)
o Legal status (state of emergency, etc.)
• Know the public warning systems
o Sirens
o Television and Radio stations
o Test cycles (how often and what they mean)
• Know where to get accurate information
• Know the markings and locations for protective shelters
• Know your nation’s emergency response protocols
o Natural disaster
o Accident
o Malicious Act
Capable • Participate in available training and education programmes
o Maintain current first aid qualification
o Online awareness programmes
Committed • Maintain a home emergency preparedness kit (Chapter 5)
• Maintain a communications plan
o Phone
o Contact procedures
o Contact information; i.e., emergency phone number(s)
• Maintain emergency evacuation plans
o Home
o Work
o Routes

2.12 Contributing on a larger scale. There are numerous ways to contribute to


national resilience at the local, sub-national and national levels.

Table 2.7 Some Ways to Participate in Comprehensive Defence


• Consider skills and desires in terms of the resilience/comprehensive defence pillars
(Social and Psychological: Civil, Cyber, etc.)
• Join non-profit and faith communities groups that contribute preparing for and
responding to emergencies
• Volunteer for an emergency response and defence organisations
• Establish or join a community awareness programme

15
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Intentionally blank

16
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Chapter 3 - Malicious Acts


This chapter and the one that follows provide detailed information on how to prepare
for, recognise, survive and respond to a malicious act. Since it would be impossible for
this handbook to address all conceivable malicious acts, the chapters will offer
considerations for a few of the most common ones: cyber attack, weaponised
information, terrorism and armed incursion.

Section 1 - Overview
3.1 What are Malicious Acts?
Any action taken by an individual or organisation, external to the society, the
effects of which threaten your nation’s safety, security, sovereignty or its
peoples’ right to self-determination.
Malicious acts need not be violent or physical. Weaponised information or
nefarious cyber activity may undermine a nation’s independence more
effectively over time than an armed invasion would.

Section 2 - Weaponised Information

3.2 As it relates to national defence, adversaries use disinformation for many


purposes.
Table 3.1 Potential Purposes of Disinformation
Influence public opinion in favour of the adversary
• May be a long-term campaign that lasts for generations
• Influence the nation’s political processes; i.e., elections
• Destabilise the targeted nation by undermining the trust, cohesion and motivation
o Exploit ethnic and cultural differences to cause civil unrest
o Spread “fake news” to cause political discord
• Deceive the targeted nation regarding the adversary’s true intentions
o Deny or shift blame for a malicious act

3.3 Quite often, the intended target for weaponised information is the public, not the
government. Therefore, it is particularly important for all members of society to
understand how to recognise and respond to these attacks.

Table 3.2 Recognising and Responding to Misinformation


Aware • Always apply critical thinking skills (Table 3-3 below)
o Entertainment, to include children’s television and movies
o News from any source
o Social media
o Literature
• Be familiar with readily available tools and resources
o Online training sites
o Fact checking software and sites 3
o Curriculum development materials for teachers and parents

3
It is important, also, to ensure that fact checking sites are unbiased
17
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o Encourage children to participate in contests sponsored by


schools or government
Capable • Develop skills for identifying weaponised information
o International Federation of Library Associations and Institutions
(IFLA) provides a useful model 4
o Consider the source
o Read beyond headlines
o Check the author
o Check your own biases
o Review supporting sources
o Ask yourself if it is a joke 5 (onion.com)
o Ask the experts
•Similar model with additional considerations6
o Have I heard of the publisher before?
o Is this the source I think it is, or does it sound a bit like them?
o Can I point to where this happened on a map?
o Has this been reported anywhere else?
o Is there more than one piece of evidence for this claim?
o Could this be something else?
• Know how to report weaponised information/disinformation
o Know the procedure or each social media platform you use
o Know the procedure for online websites
Committed • Report disinformation
• Do not forward or repeat information that you are not certain is
true
• Use sound digital hygiene practices

4
https://www.ifla.org/publications/node/11174
5
www.onion.com
6
https://www.bbc.com/news/38053324
18
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Table 3.3 Reference for Understanding Critical Thinking 7

Section 3 - Cyber Attacks


3.4 Because the internet has become an indispensable means of communication,
cyber attacks and weaponised information are very closely related.
However, cyber attacks can pose an even greater threat to society than
weaponized information does.
Whereas weaponized information can have a direct effect on social and
psychological resilience, its influence on the other pillars of comprehensive
defence is indirect.
Cyber attacks, on the other hand, can directly and immediately impact all six
pillars.
Moreover, like weaponised information, the adversary’s cyber attacks often
intentionally target the nation’s population and its critical infrastructure.

7
Stanford History Education Group is often cited for its work in critical thinking and recognising
misinformation https://sheg.stanford.edu/

19
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Table 3.4 Ten Best practices for Resilience against Malicious Online Activity
Individual • Keep personal information locked down and limit its diffusion;
cyber
• Always double-check the reliability of information seen online;
resilience
measures • Be extremely careful when downloading content from websites;
• Purchase products online from secure and reliable websites
only;
• Always update systems, software, and applications on your
devices;
• Keep antivirus protection current;
• Regularly monitor your bank account and online transactions;
• Be wary of links and files contained in communications coming
from unknown or unreliable sources;
• Verify that address bar reads “https” when conveying
confidential information online;
• Regularly utilize backup systems copies.

3.5 As working remotely has become common in many nations, members of society
should apply additional measures to help reinforce resilience when teleworking.

Table 3.5 Best Practices for Online Resilience when Teleworking


Cyber • Follow your administration/organization’s policies as a matter of
resilience priority;
measures
for working • Use operating systems for which support is guaranteed;
remotely • Make sure that the security software of your operating system are
enabled and constantly updated;
• Verify that access to the operating system is protected by a
secure password, compliant with the policies of your
administration/organization;
• Do not install software from unofficial sources/repositories;
• Block access to the system when you leave the workstation;
• Do not click on links or attachments contained in suspicious
emails and report any suspicious activity to the information
security authority within your administration/organization;
• Access adequately protected Wi-Fi connections only;
• Connect to mobile devices whose provenance is know;
• Always log out from the services/portals used after you have
finished your work session.

20
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Section 4 - Terrorism
3.6 What is terrorism?
There are many definitions for terrorism. The following definition is used by
NATO and applies throughout this handbook:

Table 3.6 NATO definition of Terrorism


“The unlawful use or threatened use of force or violence, instilling fear
and terror, against individuals or property in an attempt to coerce or
intimidate governments or societies, or to gain control over a population,
to achieve political, religious or ideological objectives.”

3.7 Terrorism may be difficult to recognise.


The act may appear to be a “typical” crime, particularly if responsibility cannot
be immediately attributed to a particular actor
The physical results may be the same as those caused by a natural or
accidental event
Although terrorism is often handled as a crime, when conducted by an
organisation that is from outside the nation, it is also an attack on the targeted
nation’s sovereignty
Figure 3.1 Potential Sources and Types of Terrorism

3.8 From a Comprehensive Defence perspective, one of the greatest differences


between a terrorist act and a natural or accidental event is the public’s ability to
help prevent an act of terrorism from occurring.

21
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Figure 3.2 Terrorist Attack Cycle

3.9 Most terrorist acts follow the same general pattern (Figure 3.2)
During the Target Selection, Planning and Rehearsal phases, terrorists are
gathering information and testing their plans
 The objective during this period is to deny them access to the target, detect
their actions if they do manage to gain access to the target and, through
resilience measures, deter them from ultimately taking action
If the terrorist(s) successfully conduct an attack, immediate responses are
similar to those used for natural or accidental events
During the exploitation phase, the terrorists will use various forms of media to
advertise their attack, as they seek both to instil fear and gain support
 The measures used against weaponised information come into effect

Table 3.7 Considerations for Building Individual Resilience Against Terrorist Attacks
Aware • Understand national concept for countering terrorism
o Example: UK Model (Figure 3.2)
 Phases of a terrorist attack
 Target selection
 Planning
 Training
 Attack
 Exploitation
 Resilience and defence against a terrorist attack
 Deny
 Detect
 Deter
• Stay abreast of local and international trends regarding terrorism
• Be aware of likely terrorist targets
o Crowded places
22
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o Historically, culturally or religiously significant structures


o Government centres
• Understand terrorist actions during the Target Selection, Planning
and Rehearsal phases
o Internet data searches
o Physical reconnaissance
o Dry runs to test attack techniques and security
• Stay alert to persons appearing to scout or conduct surveillance
o Digitally recording or taking notes of security features
o Suspiciously focusing on entry points, exits, stairwells, hallways, fire
escapes
o Loitering to watch staff, visitors, deliveries at a public or private venue
Capable • Participate in available education programmes
o Online training is easy to access and complete
o If programmes not available from own nation, reach beyond your borders
virtually
o Heads of household require family members to participate in applicable
programmes
• Maintain current first aid certification
Committed • Report suspicious behaviour to business or appropriate authorities
o Know how to report and to whom
o Know what to report
 What you saw
 Description of those involved
 Location
 Time of incident
 Your contact info
• Establish community social groups whose members are interested in
safety and security (i.e., crime watch groups, etc.) (see table XX)

3.10 Community watch programmes are particularly effective tools for maintaining
resilience against terrorism.

Table 3.8 Considerations for Starting a Community Watch Group


Recruit and • Identify people interested in starting a Neighbourhood Watch
Organise
• Establish a planning committee to initiate the programme
• Compile a list of issues to be addressed
Collaborate • Invite them to meet with your group at a time and place
with Law convenient for your Watch Group
Enforcement o Discuss any concerns
o Identify any training local law enforcement may be able to provide
Create a • Decide what type of communication will work for the group
Communication o Meetings, social media or both
Plan o Be mindful of privacy and security when using social media
• Assemble contact information
o Phone trees
o Email addresses
o Again, being mindful of privacy and security
o Start a newsletter

23
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Take Action • Initiate meetings


• Mix business with pleasure—allow members to socialise
• Collaborate and build partnerships with other citizen
organisations and local businesses
• Provide speakers on topics of interest

3.11 Terrorist attacks may take many forms and be aimed toward any individual, group
or facility
Below are considerations for preventing and responding to two of the most
common types of attacks: Improvised Explosive Devices (IEDs) and active
shooter incidents

Table 3.9 Considerations for Preventing and Responding to IED and Active Shooter
Attack Considerations
Method
IED • Know how to ID suspicious item (HOT)
o Hidden: Is it hidden or concealed
o Obvious: Is it obviously suspicious (wires, lights, etc.)
o Typical: Is it unusual for the circumstance (large backpack at a concert)
• Know response procedures (4Cs)
o Confirm the item is suspicious (HOT)
o Clear the area
o Communicate with authorities
o Control the area (no re-entry, etc.)
Active • Evacuate
Shooter 8 o After identifying safe route
o Leave belongings behind
o Encourage others to evacuate
• Hide
o If evacuation not possible
o Avoid dead ends and bottle necks
o Out of sight of shooter
o Lock, barricade and move away from entrances
o Turn phone to silent, vibrate off
• Take action
o Last resort—when in imminent danger
o Disrupt shooter by whatever means possible
• Contact authorities
• Cooperate when authorities arrive

Table 3.10 Key Take Away--Malicious Act


Being aware, capable and committed to assist helps keep everyone safe

8
https://www.dhs.gov/xlibrary/assets/active_shooter_booklet.pdf
https://www.gov.uk/government/publications/stay-safe-film
24
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Chapter 4 - Malicious Act: Armed Incursion


For most nations, an armed incursion is the least likely but most dangerous malicious
act imaginable. It is also the one that, from a whole-of-society perspective in particular,
requires the greatest amount of preparation.

Section 1 - Overview
4.1 What does an armed incursion look like?
An armed incursion may unfold in many ways
 It can begin with a very obvious attacks from the air, land and or sea
 The adversary may also use more subtle methods, such as infiltrating
personnel into the nation who have been assigned certain tasks that will
simplify and aid the enemy’s attack
Table 4.1 Considerations to Help Determine if an Incursion will Occur or has Begun
Planning • In general, no matter what form of attack the adversary uses, the overall
and pattern will be similar to a terrorist attack.
executing o Conduct reconnaissance
o Plan
o Rehearse
o Attack
o Consolidate
Possible • Foreign military force breaches targeted nation’s physical border and
methods withdraws quickly (i.e., days or weeks)
of attack
• Foreign military force breaches targeted nation’s physical border and
remains to occupy part or all of the breached nation’s territory
• Foreign power uses paramilitary or disguised forces to covertly invade and
occupy targeted nation or open the way for an overt occupying force
• Some combination of the above possibilities
Possible • The adversary may attempt to confuse, desensitise or deceive the targeted
indicators government and public prior to an incursion.
o Troop movements disguised as exercises
o Weaponised information campaign
o Cyber attacks against detection and early warning systems

4.2 Maintaining the state. In the event of an armed incursion, society’s first priority
will be to prevent or limit death and suffering among its population. Maintaining
the state will be another high priority, which all members of society should
understand
International laws and diplomacy will come into play as the enemy nation
seeks to justify its action among the global community of states
It is essential that the government remain intact.
 Should the government cease to exist, the targeted nation’s international
legal personality will be challenged, making it incapable of effectively
representing itself (or its population) in international forums
 The occupying power will also challenge the legitimacy of the targeted
nation’s armed forces
25
Edition A Version 1
Comprehensive Defence Handbook—Vol II

• The occupier will likely declare itself the legitimate head of state and
designate all opposing forces (i.e., the army) to be terrorists or
insurgents.
The targeted nation may decide to relocate its capital and key political leaders .
The chosen location may be outside of the country, based on standing treaties
and agreements
 The precise location of the head of state and government may be kept
secret, even as official national business is conducted remotely; e.g., via
internet, couriers, etc.

Section 2 - Response Force

Figure 4.1 Integrated, Multi-layered, Whole-of-Society Defence


4.3 In order to effectively contribute to the nation’s defence forces, it is necessary to
know how they are organised and how they an armed incursion.
The nation’s first response will come from the Armed Forces
The home guard is organised to support the standing Armed Forces
A smaller organisation called the Asymmetric Defence Component gives the
nation the ability to resist the adversary while blending in with the population
Together, they are referred to here as the Comprehensive Defence Force

4.4 Home Guard


Priorities
 Protect population
 Ensure continuation of essential goods and services
 Support emergency response and/or military operations
Examples of support to civil authorities
 Police
• Guarding and securing infrastructure
• Movement control
26
Edition A Version 1
Comprehensive Defence Handbook—Vol II

• Liaison functions
 Emergency Response/Rescue Services
• Search and Rescue
• Special expertise (medical, scientific support, etc.)
• Manpower in support of disaster relief
Organisation
 Some home guard units are aligned to Armed forces units within the Army,
Navy and Air Force
 Some are aligned to civilian response elements
 Some individuals assist in various places throughout the emergency
response and defence structures
 Some serve only during emergency
 Some clubs become part of the home guard during a crisis (parachuting,
mountain rescue, radio, rescue dogs, etc.)
Pay
 None, home guard service is voluntary
 May be reimbursed for some expenses

4.5 ADC Structure and Functions. The ADC commonly organised into four
elements.

Table 4.2 ADC components and Functions

Component Description
Underground  Civilian led
 Performs Leadership and Command and Control functions
 Carries out clandestine political and military actions
 Secrecy is paramount
o Operates through a cellular structure
27
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Component Description
• Cellular structure
o Core cell within it performs the functions of the government
o Core receives its guidance from the government in exile if one
was formed
Adapted Force 9  Conducts combat actions as directed by the Underground
 Combination of the traditional armed forces and
predesignated elements of society
o Depending on defence structures, force will comprise the
nation’s standing armed forces, reserve, home guard units and
volunteers from throughout the private and civic sectors
o It is organised, trained and equipped as a standing component
of the defence and security apparatus during peacetime
o Only manned by a small core element
o Will normally use asymmetric (unconventional) tactics
Auxiliary  Secretly provides logistical and operational support to the
Underground and Adapted Force
 Cellular organisation that is dispersed throughout the
population
o Individual cell may consist of a group or a lone person
o A cell may be asked to carry out a single task (deliver a
message, switch on a light), a continuous mission (provide
medical treatment as required), or circumstances may be such
that they are not called upon at all during the entire course of the
conflict
o For added resilience, members will normally only be provided
the information they require to perform their assigned task(s)
Public  Overt political expression of the nation’s will within occupied
Component/Overt territory(ies)
Political Arm
 If there is no exiled, displaced or shadow government, the
Public Component may perform the national leadership
function
o Otherwise, it is an extension of the existing government
o May be opposition political party, larger organisation or a single
individual
o May negotiate directly with the installed government or
occupying power
o Ability to function will vary based on the occupying power’s
willingness to tolerate political opposition

4.6 Population. Most of the population will not belong to either of the active elements
described above. They are, nevertheless, capable of contributing to

9
This element is often referred to as the Guerrilla Force because of the tactics it employs and the in-
extremis nature in which it is formed. However, when created as a component of a Comprehensive
Defence, the force is organised, trained and equipped as a standing component of the defence and
security apparatus. Therefore, it is referred to here as the Adapted Force to recognise it as a
combination of the traditional armed forces and predesignated elements of society.

28
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Comprehensive Defence through low risk, passive activities that inhibit the
occupying force’s ability to consolidate power. For this to occur, the entire
population must be educated, informed, enabled and accounted for in the
planning process.

Table 4.3 ADC Characteristics


 Government-led and established by national legislation
 All members undergo extensive security screening
 The identities are protected at all time
 Staffed by a small element during peacetime
 More members join in event of crisis
 Members from throughout society provide support during crisis
 Can help lead nonviolent resistance activities to prevent the adversary from
consolidating power

Section 3 - Contributing to Comprehensive Defence against an


Armed Incursion

4.7 In the event of an armed incursion, members of society who are not formally
obligated to contribute to comprehensive defence must decide which of four
options they will select.

Table 4.4 Options for Contributing to Defence against an Armed Incursion


a. Remain passive by not contributing in any way, neither directly nor indirectly
b. Lead or participate in nonviolent resistance
c. Aid the armed forces, home guard or ADC
d. Join the armed forces, home guard or ADC

4.8 Most nations have provisions within their constitutions that clearly discourage
option ‘a’.
Therefore, the remainder of this chapter will outline choices ‘b’ through ‘d’
Chapter 5 that follows will offer an array of skills that residents can use to
prepare themselves to contribute should the need arise

29
Edition A Version 1
Comprehensive Defence Handbook—Vol II

4.9 Nonviolent Resistance. (also see Chapter 5).


One of the most powerful weapons the nation can wield against an occupying
power

Table 4.5 Nonviolent Resistance Characteristics and Considerations


• The objective is to systematically delegitimise the occupying power
• The power of the state is derived from the consent of the governed
• The governed thus possess the moral and political authority to withhold consent
• The most effective way to withhold authority from an occupying power is through
nonviolent means
o Military and law enforcement authorities are trained to counter force with force
o They are less prepared to counter nonviolent resistance

Table 4.6 Nonviolent Resistance Categories and Conditions for Success


Category Activities
Protests and • Formal statements
Persuasion • Blogging
• Group presentations
• Distributing leaflets
• Wearing symbols
• Drama and music
• Joining online protest groups
• Processions
• Honouring the dead
• Public assemblies
Noncooperation • Social or economic boycotts
• Text messaging banned or censored information
• Labour strikes
• Boycotting rigged elections
• Refusing to recognise the legitimacy of the occupying regime
Intervention • Hunger strikes
• Sit-downs in streets
• Live video streaming of abuse or fraud
• Occupation of offices
• Seeking imprisonment
• Overloading facilities
Conditions for • Organisation, training and communications.
success • Mass public participation and support
• Patience and commitment from those involved

4.10 Assisting the territorial defence force. Those who cannot join the defence
forces, or for whom doing so is not feasible, are still able to contribute to
comprehensive defence efforts.

Table 4.7 Ways to Contribute to the Territorial Defence Force


• Help evacuate key government officials en route to exile location
• Collect information about the occupying army and the occupation regime
• Identify collaborators and provide information about them to the TDF

30
Edition A Version 1
Comprehensive Defence Handbook—Vol II

• Install hiding places and help stock them with supplies


o The TDF will need a number of hidden supply sites (caches) to provide greater
security for fighters as they carry out their responsibilities
o The sites will stock a range of supplies—medicines, perishable food, warm
clothing, weapons, ammunition, etc.
• Hide fighters
• Care for wounded members of the TDF
• Serve as an envoy
o The TDF will likely find modern means of communications to be unsafe
o Though being a courier certainly invites its own set of risks, messengers also add
an additional layer of security to the nation’s overall capabilities

4.11 Join Territorial Defence Forces. The mission of those who belong to the armed
element of the ADC is relatively clear.
However, those who either cannot or do not wish to participate in armed action
can serve in the TDF auxiliary component.

Table 4.8 Examples of Unarmed Territorial Defence Force Functions


• Provide advanced medical care for unit members
• Provide food and water to resistance fighters
• Care for hygiene; i.e., washing and drying uniforms
• Emplace and retrieve weapons and/or ammunition

Section 4 - Law 10. There are some very practical legal considerations to keep in
mind if the nation is attacked.

4.12 Acting in accordance with national obligations to ratified international and regional
human rights treaties is essential to legitmacy and success.
Violations could jeapordize funding, training, equipment, direct participation
or planned conventional military support from allies and partners.
• Popular support from within the nation will be placed at risk.
• Resistance forces must adhere to the LOAC at all times,and especially avoid
targeting civilians and civilian objects. If adversary’s civilian assets are targeted,
they may resort to targeting civilian assets in retaliation.

4.13 If you join the response forces, legal considerations should be included in your
training.
• If you do not receive this training prior to an armed incursion, it is important that
you ensure you engage only in legal acts.
• Response forces will be considered combatants and can be targeted by the
occupying forces under LOAC. Additionally, civilian organizations that take part

10
Resistance Operating Concept

31
Edition A Version 1
Comprehensive Defence Handbook—Vol II

in the conflict through non-combatant roles may also be targeted while they take
part; e.g., if you drive a truck with military supplies, you may be targeted during
the delivery, but not once you have completed the task. However, you can be
apprehended and detained for posing a security risk.
• You must understand what actions are acceptable and authorised by national and
international laws and norms.
• Should you violate the law while defending against an armed incursion, you could
be held accountable during the conflict or after hostilities end.
• Following occupation, military courts or commissions should be created to fairly
adjudicate occupying forces violations of the LOAC, and should be subject to the
review of international organizations include the U.N. or the ICRC.

Table 4.9 Key Take Aways -- Armed Incursion


 There are many ways to participate in Comprehensive Defence
 It is best to volunteer during non-crisis in order to be well-trained in case of crisis
 A large, well-trained home guard decreases the chance of war

32
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Chapter 5 - Skills
This chapter is directed mainly toward residents who are not part of the ADC or home
guard prior to hostilities but decide to directly or indirectly contribute in the event of an
incursion.

• Survive
• Report
• Evacuate
• Participate

Section 1 - Overview
5.1 The skills are presented within four sections, which generally correspond with
one’s reaction to an armed incursion.
Survive—skills that will help you avoid death or serious bodily injury and
continue to function in the event of an armed incursion, while helping others
do the same
Report—when, how, what and to whom information should be provided
Evacuate—how to move to safety, either as part of a government-directed
evacuation or on one’s own
Participate—skills that will enable you to directly support the home guard or
ADC in the event to of an armed incursion

5.2 Ideally, persons who commit to support or serve the ADC or home guard will be
trained and equipped to fulfil their assigned responsibilities prior to hostilities .
This chapter, therefore, focuses on skills that the average member of society can
use to survive an armed incursion, and should the opportunity present itself,
contribute to the nation’s defence.

5.3 The skills and practices presented here are not unique and most may be applied
in any emergency situation—natural, accidental or malicious. Moreover, this
chapter is not a substitute for training. All members of society should take the
initiative to develop and maintain these individual capabilities well prior to any
potential crisis.

Section 2 - Survive
5.4 Overview. This section details skills and advice on how to survive when facing
an armed incursion. The information is divided into five areas.
Preparing an individual resilience kit to ensure access to food, clothing and
basic necessities
Surviving under hostile conditions—defensive responses to threats that are
either lethal or can cause serious injury

33
Edition A Version 1
Comprehensive Defence Handbook—Vol II

First aid—overview and considerations only. First aid requires focused


training.
Shelter—how to build a shelter in your home or another building if living
within occupied territory.
Surviving in occupied territory—basic considerations if forced to live among
the enemy

5.5 Individual Resilience Kit. In case of emergency, you will need food and water,
medicines and hygiene items, clothing and material to keep you warm and dry,
communications capabilities, and tools.
You will also need a backpack with your immediate needs.
All of this should be prepared now and regularly maintained.

Table 5.1 Individual Resilience Kit


Food • Canned meats, vegetables and fruits
• Potatoes, cabbage, carrots, eggs
• Non-perishable, • Bread with a long shelf-life, e.g. tortillas, hard bread, crackers,
easy to prepare rusks
with little water • Cheese spread, soft whey cheese and other spreads in tubes
• 3-days for • Oat milk, soy milk, milk powder
evacuation • Cooking oil, hard cheese
• 2 weeks for • Quick-cook pasta, rice, grains, instant mashed potatoes
home • Precooked lentils, beans, vegetables, hummus in tins
• Fruit purée, jam, marmalade
• Prepared blueberry and rosehip soup, juice or another drink that
can be stored at room temperature
• Coffee, tea, chocolate, energy bars, honey, almonds, nuts, nut
butter, seeds.
Water • Bottles
• Buckets with lids
• 4 Litres per • Plastic bottles to freeze water in (do not fill to the top or the bottles
person per day will crack)
• 3 days for • Mineral water
evacuation, 2 • Jerry cans, ideally with a tap to collect water in. You can also have
weeks for home a couple of clean jerry cans that are filled with water as a reserve.
These are to be stored in a cool, dark place.
Healthcare Items • Medications
• Sanitation and personal hygiene
o Feminine hygiene products
o Hand sanitiser
o Wet wipes
• Hearing aids w/extra batteries
• Extra eye glasses
• First aid kit
• Emergency blankets
• Surgical gloves
• Face masks
Warmth • Woollen clothes
• Warm all-weather outdoor clothing
• Hats, gloves, scarves

34
Edition A Version 1
Comprehensive Defence Handbook—Vol II

• Depends on • Blankets
nation’s • Sleeping mats
climate • Sleeping bags
• Candles
• Tea lights
• Matches or fire lighter
• Alternative heat source; e.g., gas heater
Communications • Battery, solar or winding-powered radio
• Car radio
• List of important phone numbers
• Extra batteries/power bank for mobile devices
• Mobile phone car charger
Tools • Manual can opener
• Fire extinguisher
• Flashlight
• Head lamp
• Portable cooking stove/camp stove
• Scissors
• Multi-tool
• Duct tape
• Plastic sheeting
• Matches
Other • Baby supplies
• Pet supplies
• Paper printouts
o Insurance policies
o Bank details
o Registration certificates
• Cash in small denominations
• Entertainment items
• Whistle
• Writing material
o Notebooks
o Pens & pencils
Grab & Go Bag • 3 Days’ supply for evacuation
(Figure 5-1)

Figure 5.1 Grab & Go Bag


35
Edition A Version 1
Comprehensive Defence Handbook—Vol II

5.6 Surviving under hostile conditions.

Table 5.2 Considerations for Surviving Under Hostile Conditions


Air raid alarm • Do not panic
• Alert relatives and neighbours
• Unplug electrical appliances
• Shut off your gas and water supply
• Turn off lights
• Close the curtains
• Take shelter in basement or other suitable place
• In case there is no place suitable for sheltering at home, take your ID
documents, money, food, water, personal protection and medical aid
necessities, the most necessary medicine, and go quickly to the
nearest collective protection site or other shelter
Shooting or • If outdoors, the moment you hear shooting, do not start running
exchanges o Drop immediately to the ground and cover your head with your hands
of fire nearby o Do not even think of looking for a cleaner place, drop down where you are
standing
o Squeeze yourself to the ground as low as you can and remain so for as
long as you can hear shooting
o Crawl to a safer place (be it an underground passage, a basement,
ground floor of a building, a ditch, at least behind a garbage bin, or such)
when the shooting pauses
• If you hear shooting or exchanges of fire in your house, do not come
near windows
o Turn off lights and move to a windowless room (e.g. bathroom, closet)
• If you hear gunshots while you are at home and it is no longer safe to
remain there, go to the nearest collective protection site that will
provide shelter and assistance
Suspicious • Never touch it!
object or o Never try to find out what is inside of it
explosive o Do not lift it or carry it elsewhere
o Do not fling it aside
o Never try to determine exactly what it is on your own
• Do not smoke or use your cell phone near suspicious objects
• Step away from it and hide behind a firm structure, preferably a
building
• Report your finding to authorities as soon as possible while maintain
a safe distance with a barrier in between
• If possible, meet the arriving authorities because you can provide the
most precise description and location of the suspicious object
• While you are waiting for authorities, keep other people away from the
object
o Warn people near its location to retreat to a safer place
• If you spotted the object in public transport, be sure to alert the driver
36
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Nearby • Drop to the ground and cover your head with your hands
detonation
• Use any shelter available
o Buildings, ditches, hollows, trees if outdoors
o Closets, cupboards, tables or walls if indoors
• Do not hasten to leave your shelter because some fragments travel
like a boomerang – circle in the air and hit near ground zero
• If you escaped injuries, assist the wounded to evacuate to a safer
location and provide first aid
• Do not choose damaged buildings for shelter, as these can collapse at
any moment, whether fully or partly
• Use emergency exits if a detonation takes place while you are indoors
• Never use elevators!
• Report incident to authorities as soon as it is safe to do so
Trapped under • You cannot afford to panic
rubble o Breathe deeply, assess your situation and be prepared to do everything it
takes to survive
• Slowly and carefully (so as not to loosen the debris atop you) try to
free your hands and legs
• Check your injuries
o If you are bleeding, squeeze the wound to stop the flow
• If it is cold, lie on your side, snuggle down, and put your arm
underneath your side to reduce contact with the ground
• If you can sit, draw your knees to your chest, bow down and cover
your head with your hand
• Find a way to communicate your presence/location
o Shout
o Make noise with anything available(e.g. hammer a piece of metal or rock
against a pipe), especially if you can tell there are rescuers nearby
• Try to find out if there are more people trapped nearby
• If you have your cell phone, call and report your emergency situation
• Be aware that hourly, rescuers normally shut down any equipment
they are operating to for at least 10-minutes listen for calls for help
• When trying to free yourself, be careful when moving ruined spars,
bricks or other rubble, as they may be supporting a large mass of
debris above you
Chemical or • Do not panic
radiological
• Warn neighbours and relatives
threat
• Leave the contaminated area as quickly as possible
• Move perpendicularly to the wind direction so that wind is blowing on
your side, and bypass low terrains
• Try to breath in chemical or radioactive particles or dust
o Cover your nose and mouth with a disposable mask, towel or folded
handkerchief
o Use a respirator or a gas mask in case you have one

37
Edition A Version 1
Comprehensive Defence Handbook—Vol II

• Protect your skin by wearing waterproof clothes and shoes


• Be sure to have stable iodine preparations (potassium iodide or
potassium iodate) if such an instructions have been given
• If you cannot withdraw from the contaminated area
o Go inside if you are outdoors
o Stay in an enclosed space if already indoors
• Close and seal all windows, window vents, ventilation system holes,
doors and shafts with adhesive tape or other suitable means
o Cover external doors with damp cloth
o Plastic windows and balcony doors are highly tight so additional sealing is
not necessary;
o Seal ventilation system holes and window vents with cloth or paper
o Shut off ventilation, air supply, conditioning and air heating systems
• Go to the upper stories of the house – many of the hazardous
chemical material tend to collect in low-lying areas
• Store drinking water in tightly closable vessels or jars
• Put vegetables into boxes lined with paper and plastic wrap and cover
with canvas or other type of dense fabric
• If you have animals or pets, take them into enclosed premises or
greenhouses
• Cover your wells
• Do not step outside needlessly
• Prepare for possible evacuation
Returning from • Avoid physical contact with your family members so as not to
chemically, contaminate
biologically-
radiologically • Take off all the clothes you were wearing in the CBR contaminated
(CBR) environment;
contaminated o Remove in a head-to-feet direction
o Do not pull your clothes over your head so as not to transfer pollution
environment
onto your face and into your eyes;
• Wrap your clothes with the contaminated surface inside
• Put into bags (double-wrapped) and put in a safe place outside of
living quarters
o You will be instructed on what to do with them later
• Wash yourself very thoroughly in a hot shower (38-40 Celsius) or cold
shower with soap (laundry soap is recommended)
o Wash hands first
o Continue to face, neck, eyes, and ears
o Clean out your nose and wash your mouth, thoroughly
o Wash every part of your body
o Continue washing yourself for 3-5 minutes
o Prolong the time to 10 minutes if you have been exposed to radioactive
contamination

First Aid. The information that follows is for reference only. It is not meant to be a
substitute for formal first aid training.
38
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Table 5.3 First Aid Reference


Circulation Know the types of bleeding
• Arterial - if an artery near the surface is damaged, bright red blood
will gush out in spurts that are synchronized with the heartbeat.
• Venous - blood from the veins is dark red. Venous bleeding is
characterized by a steady, even flow.
• Capillary - capillary blood is usually brick red in color. If capillaries
bleed, the blood oozes out slowly.
Stopping Arterial bleeding is priority over reviving breathing
Preparation • Complete formal first aid training
o If available, take classes that produce a certificate, such as the
Red Cross/Red Crescent
o If in-person training is not available, take courses online11
• At a minimum, you should be trained in the following
o CPR
o Stopping bleeding—how and when to use each of the following
 Direct pressure
 Pressure dressing
 Tourniquet
o Treating chest injuries when lung is punctured
o Applying splints
• Keep your first aid kit with your individual resilience items at
all times
• Inspect and replace items as needed
• If you are in occupied territory, keep first aid materials on your
person
o Keep the most important items in your pockets, not in your
backpack, especially if you are either supporting the TDF or a
member of the TDF
Kit contents • Tourniquets
• Individual bandages
• Oropharynx tube
• Scissors
• Bandages
o Pressure dressings
o Sterile bandages of various sizes
o Padded adhesive bandages
• Triangular bandage (medical scarf)
• Iodine (5%) for cleaning and disinfecting wounds
• Basic non-prescription medicines
o Anti-inflammatory
o Pain reliever

11
https://www.firstaidforfree.com/ https://deployedmedicine.com/
https://www.marines.mil/Portals/1/Publications/MCRP%203-40A.9%20formerly%20MCRP%203-
02G.pdf?ver=2018-03-13-082229-160

39
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o Digestive system (diarrhoea, nausea, etc.)


o Electrolyte mixture
o Vitamin C
o Skin regeneration
o Other medications based on personal needs
• Disposable gloves
Assessing the • Always start by surveying the area for risks and hazards
area
• Make sure conditions are safe for both you and the victim
before you start rendering first aid
Assess the • Quickly scan the rest of their body for serious injuries
victim
• Step 1—Check for responsiveness
o This is done by gently shaking or tapping him while calmly
asking, “Are you OK?”
o Watch for a response
o If the casualty does not respond move on to check for
breathing (see below)
 If there is serious arterial bleeding, treat that first (see below)
o If the casualty responds, continue with the evaluation
o If the casualty is conscious, ask them where they feel different
than usual or where it hurts
o Ask him to identify the location of pain if they can, or to identify
the area in which there is no feeling
WARNING--If a broken back or neck is suspected, do not move
the casualty unless their life is in immediate danger (such as
close to a burning vehicle). Movement may cause permanent
paralysis or death.
• Step 2—Check for breathing
o If the casualty is breathing, proceed to step (3)
o If the casualty is not breathing, stop the evaluation and begin
first aid to attempt to ventilate the casualty
o Attempt to open the airway, if an airway obstruction is apparent,
clear the airway obstruction, then ventilate
o After successfully ventilating the casualty, proceed to step (3).
• Step 3—Check for pulse
o If a pulse is present and the casualty is breathing, proceed to
step (4)
o If a pulse is present, but the casualty is still not breathing, start
rescue breathing
o If a pulse is not present, seek professional medical help
• Step 4—Check for bleeding.
o Look for spurts of blood or blood-soaked clothes
o Also check for both entry and exit wounds
o If the casualty is bleeding from an open wound, stop the
evaluation and begin first aid procedures to stop the bleeding
• Step 5—Check for shock

5.7 Shelter

40
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Table 5.4 Considerations for Creating and Finding Shelter


Converting
• The best choice is a basement with concrete ceiling and strong
basement
into a shelter walls
• Build strong and spacey shelves and stand them by the wall,
which can also be used as bunk beds or benches
• Plan an emergency exit or install one if possible
• Install a vent
o Consider an auxiliary vent; e.g., a roughly 150 mm-diameter pipe
• If you have a heater in the basement, drive its stovepipe to the
outside and make the floor under the heater fire-proof (use bricks,
a concrete block, or similar)
• Lay a wooden floor (wood planks or boards) to retain warmth
• If your basement has windows, keep sandbags on hand to cover
the windows on the inside to shield yourself from fragments in
case there is an explosion outside;
• Bring a portable cooker (gas-fired) and a kerosene lamp;
• Keep a part of your stocks (food, water), warm clothes and basic
necessities in the basement
• Have a 40-liter barrel or other vessel for water
• Plan a spot to be used as a toilet (a bucket with a cover may be
used)
• If you live in an apartment building your neighbours will probably
also use the basement as shelter, so you will be able to band together
o Several heaters may be needed
o Place them by the windows and drive the stovepipes out the windows
o The heaters will also provide you with lighting
o You will be able to use one room for keeping food, another as your
WC facility
o Cook together and restock your food and water supplies together
Shelter in • Lumber-rooms can be found in most apartment buildings
existing o These protect well from bombardment
building o Good place to keep basic supplies of food, gas and pharmaceuticals.
• If you cannot find a lumber-room, create a safe room
o Ground floors of brick buildings work best
o Choose the room with the least number of windows, as you will need
to block them
o Remember that if you barricade yourself in completely, you will be
trapped if the ceiling collapses
o Leave or create an emergency exit for such cases
 A window is normally suitable
Returning • Inspect buildings thoroughly for damage that could cause them to
home after collapse
the
• As you enter a building, never light your way with open fire and do
emergency
not smoke
• Maintain a safe distance from loose wires (including telephone
line)
o Any loose wire poses a lethal threat

41
Edition A Version 1
Comprehensive Defence Handbook—Vol II

• Do not switch on lights before making sure the wires are in order
and have not been damaged
• Check for the smell of gas or other chemical materials in and
around the house
• Prior to consuming any products you left behind, make sure they
are not chemically contaminated, musty or spoiled
• Prior to consuming tap or well water make sure it is clean/not
contaminated
• If you have found yourself near a site where emergency aid is
rendered but your help is not needed, do not disturb the rescuers
without serious cause

5.8 Surviving in Occupied Territory

Table 5.5 Considerations for Surviving in Occupied Territory


Hostile forces • You must remain calm
turn up in the
area where you • First try to figure out what exactly is happening, and only then decide
live what action to take
• If you have spotted soldiers in your yard, do not approach them
o They may perceive you as a threat, or you may become the victim of a stray
bullet
• Do pry or give into temptation to take a closer look at military equipment,
weapons or armed people
o Peepers may easily be taken for spies
• Do not allow your children play in the streets
o Kids are inquisitive and can be run over by tanks, blunder upon an explosive,
etc.
• Do not provoke enemy soldiers by visibly taking videos or photos of
them
• Keep your hands out of your pockets and make no abrupt movements
when talking to an armed person
• Never argue with a person holding a gun
• Leave your home if armed individuals are entering it or are looking to
settling down in your place
• Whenever possible, it is better to travel by foot than to drive
Enemy • Accept the inspection as a necessary evil
soldiers
surveying • If an enemy soldier is pointing a gun at you and tells you to present you
document, do it in a calm manner
premises and
demand to • Do not look away from the soldiers conducting the verification, but do
present your not stare at them insistently
documents
• Stand calmly and still where you have been directed during verification
unless you are, e.g., directed to open some doors
• You can make the verification conclude faster if you obey instructions
given and act in a natural and calm manner

42
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o Do not become flustered, nervously look around, chatter or fall unnaturally


silent
Located in a • Take care to maintain water supplies
territory seized o Water supply will likely be disconnected or pipes frozen (in case it is winter)
by enemy o Fill all the vessels, even your bathtub, with water while you still can
forces o Fill water supplies with water from wells, bores or open bodies of water
o If you are in the city, centralized water supply may be available in fire fighter
stations, hospitals, active collective protection buildings;
• Centralised distribution of humanitarian aid sites are the safest sources
of food
• Shops may not be working or may be destroyed, however, there may be
food or other necessities left even in damaged shop premises
• Stay alert for undetonated or deliberately placed explosives when
looking for food in such places
• Use a bicycle or a wheelbarrow to look for and to transport water and
food to where you live
o This attract less attention from enemy soldiers
o Weigh the need and feasibility of acquiring a weapon for self-defence from
robbers and pillagers
• In case you come across a weapon do not try to pick it up, because it
may be booby-trapped or used as a bait for enemy soldiers
• Do not walk around at night-time
o You will get killed
o Enemy soldiers will judge a nightwalker to be an enemy trying to change
position, transport weapons or conduct reconnaissance
• If you are in a city, walk only there where you can be clearly viewed and
wear inconspicuous clothes so as not arouse the suspicions of enemy
soldiers
o i .e. simple and plain with no insignia or militaristic elements
• Do not give interviews to the adversary
• Do not agree to be filmed or photographed by the adversary
• If a person introduces themselves as a freelancer, make sure they really
are what they say they are
• Confirm that your lodgement is not near a key site: e.g., mortar position,
snipers on your roof, etc.
• Find some “fellows of fate”
o You will defend yourself from robbers and looters more easily if you join
forces with friends or relatives
Aggressor’s • Do not collaborate with the military occupation authority
military forces
• Do not obey orders from invaders and collaborationists
establish a
headquarters • Do not attend any meetings, rallies or other events they organise
and/or
positions in • Do not give them any information
your • If you have a chance to do so, talk to enemy soldiers to make clear that
neighbourhood you oppose their commanders’ propaganda will not pose any threat to
them as individuals

43
Edition A Version 1
Comprehensive Defence Handbook—Vol II

• Use every means available to inform the aggressor state’s society about
the criminal offences and aggression its political figures, leaders, chiefs
or government are waging (choose email, social media or international
media outlets for this)
• Spread information about the actual situation via social media and
mobile communication networks as well as directly (in person)
• If you can do it safely, take video footage of the aggressive actions of
enemy forces and use mediums available (e.g. the Internet) to transfer it
to international media outlets (CNN, BBC, etc.)
• Stage cyber-attacks on information systems of the aggressor or invader
in case Internet connection is still available amidst the armed conflict
• Provide aid to those affected by violence and repressive measures of the
invaders
Taken hostage • Keep in mind, your sole goal is to survive
• Accept the situation and prepare for a wait
• Work to put yourself together and help prevent your fellow hostages
from panicking
• Accept the fact that being afraid is natural
o The initial 15-45 minutes are the peak of risk, so obey your kidnappers’
instructions immediately
• The more time you spend together, the smaller the risk is that the
abductors will harm you
• Do not talk unnecessarily
• Maintain a friendly bearing and do not cheat
• Do not beg, apologise or start crying
• Do not make any observations or suggestions to your kidnappers
• Do not argue with kidnappers or other hostages, adhere to the common
view
• Do not turn your back to the kidnappers unless they direct you to do so
o Eye contact with your abductors is a welcome thing, people tend to kill less
when being looked at, however, do not stare at them without cease;
o Eat if you are offered food, even if you are not hungry
 Eating will help you maintain your strength, while refusing will bring in more
hostility
 Try to rest,
o Sit if possible
• If the hostage situation persists, try getting some sleep
• Tell the abductors if any of your fellow hostages need medical
assistance
• Speak consistently and in a calm manner, and do not attempt doing
anything before you are allowed to do it
• If you have reason to believe a rescue operation is going to occur soon,
or you can hear noise and shooting, find a safe place, lie down, cover
your head with your hands and do not make any abrupt movements

44
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o Never start running towards the persons who are conducting the rescue -
they may mistake you for an abductor.

45
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Section 3 - Report
5.9 Overview. This section provides considerations regarding when, how, what and
to whom information should be reported during an emergency.
The first element of reporting is knowing emergency response numbers,
websites, etc.
If occupied, this may all change. So, it will be important to understand what
critical services and functions the nation will accept from the occupying
power and which will be provided by the underground and auxiliary
If you decide to provide information to the TDF, it will also be important to
know how to make contact without putting yourself or the force at risk. This
may be best accomplished by linking up with the armed forces.

Table 5.6 Considerations and Methods for reporting Items of Interest


When to report • Be clear of danger
o Move to a safe location if necessary and possible
• Avoid making unnecessary calls
o The network will likely be overloaded
o Consider the urgency of the information to be passed
What to report • Your condition
o Depending on the situation, this information may prevent
unnecessary resources from being directed to confirm your status
• Condition of others near you
• What you’ve seen
Suspicious or • If you spot suspicious or armed groups of people in your
armed groups neighbourhood or any other location in your country, report
what you saw by calling the appropriate emergency number
How to report • It is naturally challenging to communicate clearly and concisely
in an emergency
• Consider well in advance what information is necessary
• Do not provide information that may be false
• Injury reporting
o Age
o Sex
o Illness or injury (describe do not attempt to diagnose)
o Cause for concern (life threatening, potential loss of eyesight,
limb, etc.)
o Estimated time of arrival if you are transporting the injured person
to another location
• Encounters with the adversary (also see Section 5—Participate)
o Do not take unnecessary risks trying to gather or confirm
information
o Provide as much information as possible using the acronym
“SALUTE”
 Size of the group
 Activity—what the group was doing
 Location
 Unit—any identifying patches, numerical markings, etc.
46
Edition A Version 1
Comprehensive Defence Handbook—Vol II

 Time seen
 Equipment, such as rifles, trucks, etc.

47
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Section 4 - Evacuate
5.10 Overview. This chapter provides considerations for evacuating your home and
area, either under government direction and guidance or on your own. The
material is arranged as follows:
How to remain prepared
What to consider if evacuation is likely
What information to expect the government to provide if an evacuation
is initiated
Actions to take once the evacuation is initiated
Considerations if it is unsafe to remain in your home but you cannot
evacuate

Prepare • Know emergency shelters in the area


• Make advanced arrangements with friends or relatives in other
towns or regions that may be willing to provide shelter
o Choose destinations in different directions to provide options
• Think over evacuation routes
• Be familiar with alternate routes
o Shortcuts may be blocked
• Think of methods of evacuation
o Foot, car, etc.
• Keep go-bag ready (Fig. 5-1)
• Plan how you will care for your pets in an emergency now
• Keep emergency kit in car
o Jumper cables
o Flares or reflective triangle
o Ice scraper
o Car cell phone charger
o Blanket
o Map
o Cat litter or sand (for better tire traction)
• Min ½ tank of fuel at all times
Evacuation
• Listen to a battery-powered radio and follow local evacuation
likely
instructions
• Check with neighbours who may need a ride
• Keep your gas tank full in case of evacuation or power outages
o Gas stations may be closed or power outage may prevent pumping
o A full tank will also keep the fuel line from freezing
• Have the car checked for the following if evacuation is possible
o Antifreeze levels
o Battery and ignition system
o Brakes
o Exhaust system

48
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o Fuel and air filters


o Heater and defroster
o Lights and flashing hazard lights
o Oil
o Thermostat
o Windshield wiper equipment and washer fluid level
o Install good winter tires and make sure they have enough tread, or
any chains or studs required in your local area
Likely • Time you have before departing from the unsafe territory
information if
• How residents unable to leave by their own means will be
evacuation
directed and evacuated
managed by • Location of evacuation points (collection points)
government
• Location of intermediate collection points (if necessary)
• Destination of evacuation and collection points (for those using
their own transport) where vital services are available (food,
drinking water, medicine, etc.)
• The things to take along
• The safety measures before departing your home
• The roads (evacuation routes) you should take
Evacuation • Be aware that leaving ahead of time is better than leaving
initiated belatedly
• If the government does not initiate an evacuation and you live in
the city, go to a settlement or village, to you relatives or friends
as soon as possible
o Fighting is generally less probable there, and you will have less
difficulty accessing food and water
• If time allows
o Call or email relatives who live in areas different from yours
• Tell them where you are going and how to contact you, if you
know
• Take basic necessities you may need in case of evacuation or
temporarily settling somewhere else (go-bag(s))
o Use bags if necessary- five small bundles are far better than one
gigantic suitcaseKeep one smaller backpack with water and food
which you must never take off you
• Take your pets with you but understand that only service
animals may be allowed in public shelters
• Change into clothes that will protect you (full-length trousers,
waterproof jacket, Wellington boots, cap)
• Ensure you maintain a civilian appearance during evacuation
o Do not wear khaki or camouflage colours/patterns
o Do not carry militaristic backpacks
o Do not attach hunting knives or canteens in visible places
• If your family is leaving by vehicle, use one vehicle so as to
minimize chances for any of your family members to fall behind
(roads for departing must be chosen in advance)
• Only travel the daytime
49
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o It is very hard to distinguish between a civilian and a soldier in the


dark
o When choosing a place to stay overnight, prefer open areas to
empty buildings where fighting has taken place
 These may be booby-trapped
• Choose the routes recommended by official sources
oDo not attempt shortcuts, because roads other than recommended
may be blocked or dangerous due to military movement
• Look for check posts
o Territory under military control will have routes intended for civilian
withdrawal and evacuation
o You will receive the most essential information at the check posts;
• Drive carefully over bridges and crossovers, do not pull over
under high voltage cables
• Be alert for road hazards such as washed-out roads or bridges
and downed power lines
• Do not drive into flooded areas
• If there are dead bodies on the streets, you should not touch
them
• If you are not able to evacuate by your own transport, find out in
advance the location of the nearest evacuation points from
where residents will be moved in an organised manner in the
event of a serious adversity
• If you cannot safely stay with friends or relatives go to the
destinations indicated by official sources where you will receive
refuge and necessary aid
• Go on foot if it is too late to leave by vehicle
o Do not hurry as you walk, look like calm civilians willing to leave
(because this is what you are)
• Make sure you are leaving your home protected
o Disconnect water supply
o Unplug all electric gadgets
o Take food out of refrigerators and freezers
o Close and lock all doors
o Take outdoor furniture and children’s toys into the house
• Once you have evacuated, do not attempt to return if the armed
conflict is still ongoing and enemy forces are still in control of
your home area – you may be suspected of gathering
intelligence
In case it is • If a sudden threat has emerged and you must retreat to a safe
unsafe to stay place, go to the nearest collective protection facilities marked
at home by a special sign
and you o Take your personal ID documents and medicine (in case you are
cannot taking any or have health problems)
evacuate o Take your go-bag(s)
o In case you are taking babies or young children with you, take
food, disposable diapers, wrap and some toys for them.

50
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Section 5 - Participate
5.11 As noted in Chapter 4, nonviolent resistance is one of the most effective ways
the public can help defend the nation against an armed incursion.
The list below is widely referred to as Gene Sharp’s 198 nonviolent actions. 12
Not all will apply to any one situation, but it is useful to be familiar with all
possibilities.

Table 5.7 Potential Nonviolent Resistance Methods


FORMAL STATEMENTS PROCESSIONS
1. Public speeches 1. Marches
2. Letters of opposition or support 2. Parades
3. Declarations by organizations and 3. Religious processions
institutions 4. Pilgrimages
4. Signed public declarations 5. Motorcades
5. Declarations of indictment and HONOURING THE DEAD
intention 1. Political mourning
6. Group or mass petitions 2. Mock funerals
COMMUNICATIONS WITH A WIDER AUDIENCE 3. Demonstrative funerals
1. Slogans, caricatures, and symbols 4. Homage at burial places
2. Banners, posters, and displayed PUBLIC ASSEMBLIES
communications 1. Assemblies of protest or support
3. Leaflets, pamphlets, and books 2. Protest meetings
4. Newspapers and journals 3. Camouflaged meetings of protest
5. Records, radio, and television 4. Teach‐ins
6. Skywriting and earthwriting
GROUP REPRESENTATIONS WITHDRAWAL AND RENUNCIATION
1. Deputations 1. Walk‐outs
2. Mock awards 2. Silence
3. Group lobbying 3. Renouncing honours
4. Picketing 4. Turning one’s back
5. Mock elections
SYMBOLIC PUBLIC ACTS THE METHODS OF SOCIAL
1. Displays of flags and symbolic colours NONCOOPERATION
2. Wearing of symbols OSTRACISM OF PERSONS
3. Prayer and worship 1. Social boycott
4. Delivering symbolic objects 2. Selective social boycott
5. Protest disrobings 3. Lysistratic nonaction
6. Destruction of own property 4. Excommunication
7. Symbolic lights 5. Interdict
8. Displays of portraits NONCOOPERATION WITH SOCIAL
9. Paint as protest EVENTS, CUSTOMS, AND
10. New signs and names INSTITUTIONS
11. Symbolic sounds 1. Suspension of social and sports
12. Symbolic reclamations activities
13. Rude gestures 2. Boycott of social affairs
3. Student strike
4. Social disobedience

12
Will add reference

51
Edition A Version 1
Comprehensive Defence Handbook—Vol II

5. Withdrawal from social institutions

PRESSURES ON INDIVIDUALS WITHDRAWAL FROM THE SOCIAL


1. “Haunting” officials SYSTEM
2. Taunting officials 1. Stay‐at‐home
3. Fraternization 2. Total personal non-cooperation
4. Vigils 3. “Flight” of workers
DRAMA AND MUSIC 4. Sanctuary
1. Humorous skits and pranks 5. Collective disappearance
2. Performances of plays and music 6. Protest emigration (hijrat)
3. Singing
THE METHODS OF ECONOMIC RESTRICTED STRIKES
NONCOOPERATION: ECONOMIC BOYCOTTS 1. Detailed strike
ACTION BY CONSUMERS 2. Bumper strike
1. Consumers’ boycott 3. Slowdown strike
2. Nonconsumption of boycotted goods 4. Working‐to‐rule strike
3. Policy of austerity 5. Reporting “sick” (sick‐in)
4. Rent withholding 6. Strike by resignation
5. Refusal to rent 7. Limited strike
6. National consumers’ boycott 8. Selective strike
7. International consumers’ boycott MULTI‐INDUSTRY STRIKES
1. Generalized strike
2. General strike
ACTION BY WORKERS AND PRODUCERS COMBINATION OF STRIKES AND
1. Workers’ boycott ECONOMIC CLOSURES
2. Producers’ boycott 1. Hartal
2. Economic shutdown
ACTION BY MIDDLEMEN THE METHODS OF POLITICAL
1. Suppliers’ and handlers’ boycott NONCOOPERATION
ACTION BY OWNERS AND MANAGEMENT REJECTION OF AUTHORITY
1. Traders’ boycott 1. Withholding or withdrawal of
2. Refusal to let or sell property allegiance
3. Lockout 2. Refusal of public support
4. Refusal of industrial assistance 3. Literature and speeches
5. Merchants’ “general strike”
ACTION BY HOLDERS OF FINANCIAL CITIZENS’ NONCOOPERATION WITH
RESOURCES GOVERNMENT
1. Withdrawal of bank deposits 1. Boycott of legislative bodies
2. Refusal to pay fees, dues, and 2. Boycott of elections
assessments 3. Boycott of government employment
3. Refusal to pay debts or interest and positions
4. Severance of funds and credit 4. Boycott of government departments,
5. Revenue refusal agencies, and other bodies
6. Refusal of a government’s money 5. Withdrawal from governmental
educational institutions
6. Boycott of government‐supported
institutions
7. Refusal of assistance to enforcement
agents

52
Edition A Version 1
Comprehensive Defence Handbook—Vol II

8. Removal of own signs and


placemarks
9. Refusal to accept appointed officials
10. Refusal to dissolve existing
institutions

ACTION BY GOVERNMENTS CITIZENS’ ALTERNATIVES TO


1. Domestic embargo OBEDIENCE
2. Blacklisting of traders 1. Reluctant and slow compliance
3. International sellers’ embargo 2. Nonobedience in absence of direct
4. International buyers’ embargo supervision
5. International trade embargo 3. Popular nonobedience
4. Disguised disobedience
5. Refusal of an assemblage or
meeting to
disperse
6. Sitdown
7. Noncooperation with conscription
and
deportation
8. Hiding, escape, and false identities
9. Civil disobedience of “illegitimate”
laws
THE METHODS OF ECONOMIC ACTION BY GOVERNMENT
NONCOOOPERATION: THE STRIKE PERSONNEL
SYMBOLIC STRIKES 1. Selective refusal of assistance by
1. Protest strike government aides
2. Quickie walkout (lightning strike) 2. Blocking of lines of command and
information
3. Stalling and obstruction
AGRICULTURAL STRIKES
4. General administrative
1. Peasant strike
noncooperation
2. Farm workers’ strike
5. Judicial noncooperation
ORDINARY INDUSTRIAL STRIKES 6. Deliberate inefficiency and selective
1. Establishment strike noncooperation by enforcement agents
2. Industry strike
3. Sympathy strike
STRIKES BY SPECIAL GROUPS DOMESTIC GOVERNMENTAL
1. Refusal of impressed labor ACTION
2. Prisoners’ strike 1. Quasi‐legal evasions and delays
3. Craft strike 2. Noncooperation by constituent
4. Professional strike governmental units
INTERNATIONAL GOVERNMENTAL ACTION THE METHODS OF NONVIOLENT
1. Changes in diplomatic and other INTERVENTION
representation PSYCHOLOGICAL INTERVENTION
2. Delay and cancellation of diplomatic 1. Self‐exposure to the elements
events 2. The fast
3. Withholding of diplomatic recognition a. Fast of moral pressure

53
Edition A Version 1
Comprehensive Defence Handbook—Vol II

4. Severance of diplomatic relations b. Hunger strike


5. Withdrawal from international c. Satyagrahic fast
organizations 3. Reverse trial
6. Refusal of membership in international 4. Nonviolent harassment
bodies
7. Expulsion from international
organizations
PHYSICAL INTERVENTION SOCIAL INTERVENTION
1. Sit‐in 1. Establishing new social patterns
2. Stand‐in 2. Overloading of facilities
3. Ride‐in 3. Stall‐in
4. Wade‐in 4. Speak‐in
5. Mill‐in 5. Guerrilla theatre
6. Pray‐in 6. Alternative social institutions
7. Nonviolent raids 7. Alternative communication system
8. Nonviolent air raids
9. Nonviolent invasion
10. Nonviolent interjection
11. Nonviolent obstruction
12. Nonviolent occupation
ECONOMIC INTERVENTION POLITICAL INTERVENTION
1. Reverse strike 1. Overloading of administrative
2. Stay‐in strike systems
3. Nonviolent land seizure 2. Disclosing identities of secret agents
4. Defiance of blockades 3. Seeking imprisonment
5. Politically motivated counterfeiting 4. Civil disobedience of “neutral” laws
6. Preclusive purchasing 5. Work‐on without collaboration
7. Seizure of assets 6. Dual sovereignty and parallel
8. Dumping Government
9. Selective patronage
10. Alternative markets
11. Alternative transportation systems
12. Alternative economic institutions
THE METHODS OF ECONOMIC RESTRICTED STRIKES
NONCOOPERATION: ECONOMIC BOYCOTTS 1. Detailed strike
ACTION BY CONSUMERS 2. Bumper strike
1. Consumers’ boycott 3. Slowdown strike
2. Nonconsumption of boycotted goods 4. Working‐to‐rule strike
3. Policy of austerity 5. Reporting “sick” (sick‐in)
4. Rent withholding 6. Strike by resignation
5. Refusal to rent 7. Limited strike
6. National consumers’ boycott 8. Selective strike
7. International consumers’ boycott MULTI‐INDUSTRY STRIKES
1. Generalized strike
2. General strike
ACTION BY WORKERS AND PRODUCERS COMBINATION OF STRIKES AND
1. Workers’ boycott ECONOMIC CLOSURES
2. Producers’ boycott 1. Hartal
2. Economic shutdown
ACTION BY MIDDLEMEN THE METHODS OF POLITICAL
2. Suppliers’ and handlers’ boycott NONCOOPERATION
ACTION BY OWNERS AND MANAGEMENT REJECTION OF AUTHORITY
1. Traders’ boycott 1. Withholding or withdrawal of
2. Refusal to let or sell property allegiance
3. Lockout 2. Refusal of public support
54
Edition A Version 1
Comprehensive Defence Handbook—Vol II

4. Refusal of industrial assistance 3. Literature and speeches


5. Merchants’ “general strike”

ACTION BY HOLDERS OF FINANCIAL CITIZENS’ NONCOOPERATION WITH


RESOURCES GOVERNMENT
1. Withdrawal of bank deposits 1. Boycott of legislative bodies
2. Refusal to pay fees, dues, and 2. Boycott of elections
assessments 3. Boycott of government employment
3. Refusal to pay debts or interest and positions
4. Severance of funds and credit 4. Boycott of government departments,
5. Revenue refusal agencies, and other bodies
6. Refusal of a government’s money 5. Withdrawal from governmental
educational institutions
6. Boycott of government‐supported
institutions
7. Refusal of assistance to enforcement
agents
8. Removal of own signs and
placemarks
9. Refusal to accept appointed officials
10. Refusal to dissolve existing
institutions

5.12 Caching items. Below are techniques for establishing a site for hiding items
(cache site). There may be any number of reasons to hide items for future
recovery and use.

Table 5.8 Possible Types and Reasons for Hiding Items


• Suppllies and equipment in support of the national response forces
• Family heirlooms; e.g., valuables, such as artwork, etc.
• Emergency supplies for self-family-friends
• Items that can be bartered in an emergency
• Supplies in emergency locations; i.e., away from home

General • Security is the priority consideration


considerations o Building the cache site and emplacing the material undetected
o Ability to access the cache site to replace or maintain material
o Retrieving the material, particularly in the face of an armed incursion
o A site that is obvious to one will be obvious to all (especially a
concealment site)
Cache • Concealment
methods o Use permanent man-made or natural features to hide or disguise
material
o Best used for exceptionally secure sites and when quick access and
recovery are important
 Requires minimal time and labour to establish
 Normally requires least packaging
• Burial
o Generally, best long-term security

55
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o More time-consuming and labour-intensive than concealment


o Most likely requires special packaging or container(s)
o Requires more time to recover
o May be more difficult to locate
• Submersion
o Suitable on rare occasions
o Requires waterproof, pressure resistant container
o Must account for potential impact of factors that require expertise to
analyse: water depth, bottom composition, currents, etc.
o Normally requires at least two people to emplace and recover
Site Criteria • Accessibility
o Can be located by simple instructions to someone who has never
visited the location
 Require distinct, permanent landmarks within measurable distance
o Two secure routes to the site
 Alternate route enables escape and reduces chance of being
detected
o Can be emplaced and recovered in any season
 Impact of snow or frozen ground, to include tracks
• Concealment site
o Examples
 Natural caves and caverns
 Abandoned mines and quarries
 Abandoned buildings
 Infrequently used structures (stadiums, railroad facilities on spur
lines)
 Memorial edifices (mausoleums, crypts, monuments)
 Public buildings (museums, places of worship, libraries)
 Ruins of historical interest
 Culverts
 Sewers
 Cable conduits
o Considerations
 Equally accessible to the emplace(s) and recovery individual(s)
 Remains accessible as long as needed
 Discovery will not reveal persons involved
 Not in a location frequented by the adversary
 Physically secure for the preservation of cached material
• Burial site considerations
o Drainage
o Ground cover
o Natural concealment
o Type of soil
o Snowfall and freezing
o Rocks and other subsurface obstructions
• Submersion site considerations
o Normally requires a boat, which adds a level of complexity to
access, emplacement, maintenance and recovery
o Streams and rivers may be impacted by rains

56
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Reference  General area located by place name; i.e., region, village, etc.
points for
 Immediate Reference Point (IRP)
locating a site
o Durable landmark; i.e., only church or bridge in the vicinity
• Final Reference Point (FRP)
o Unmistakably identifiable
o Will remain fixed for at least as long as the cache is used
o Near enough to the cache to pinpoint the exact location with precise
linear measurements
o Accessible from IRP by simple route description
Pinpointing  GPS
methods o Most accurate
o Commonly available during non-emergencies
o GPS satellite access may be blocked during armed incursion
o Place directly beside the FRP (figure XX)
 Projection from FRP
o FRP requires one side long enough to permit precise projection
(figure XX)
o May project from two FRPs to an intersection point (figure XX)
o Projections tend to lose accuracy when sighting beyond 50 meters
• Compass heading and distance from FRP (figure XX)
Packaging  Thoroughly inspect, clean and dry material before packaging
considerations
 Coat with preservative; i.e., oil or paint
 Enclose instructions for using material
 Conduct submersion test to test seal
 Select containers carefully
o Completely watertight and airtight after sealing
o Noiseless when being handled
o Resistant to shook and abrasion
o Lightweight construction
o Able to withstand rodents, insects and bacteria
o Can be closed and reopened easily and repeatedly
o Capable of withstanding highly acid or alkaline soil or water
Security • Always maintain maximum vigilance at the site to avoid detection
measures
• Use lookout if available
o If no lookout, pause, look and listen frequently
• Minimise the use of artificial light (flashlights, lanterns, etc.)
• Have a plan of action in case of interrupted or discovered during
emplacement, maintenance or removal
• Plan time to sterilise burial site after hole has been refilled
o Dispose of excess soil far from burial site (stream is ideal)
o Check to ensure no tools are left behind
o If work is done at night, may need to return to site during the day to
inspect if safe to do so

57
Edition A Version 1
Comprehensive Defence Handbook—Vol II

5.13 Describing Individuals 13


When describing soldiers, follow the SALUTE report format provided in
Section 2 above.
There are also times when information regarding individual features may
be helpful, for instance when trying to identify a particular leader or when
hostilities end and individual members of the invading force must be
located to stand trial for their crimes.

Table 5.9 Considerations for Describing Individuals


General • Sex
features
• Race or national origin
• Age (estimated)
• Height
o Use comparisons with your own height, a door or some other standard
measure
• Weight (estimated)
• Build
o Fat
o Husky
o Slim
o Muscular, etc.
Facial • Hair
features o Colour
o Texture
o Hairline
o Style
o Also possible dyes or wigs
• Forehead
o Forehead height
o Whether the skin is smooth, creased or wrinkled
• Eyes
o Colour
o Shape (round, almond)
o Clear or bloodshot
o Heaviness of eyelashes and eyebrows
• Nose
o Overall shape (long, wide, flat, etc.)
o Nostrils (wide, narrow, flared)
• Cheeks
o Flesh sunken or filled out
o Dried or oily
o Wrinkles around nose or mouth

13 https://home.chicagopolice.org/about/contact-us/how-to-describe-a-suspect/

58
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o Cheek bones high or low, wide or narrow


• Ears
o Size and prominence (protruding or flat against head)
• Mouth
o Lips thin, medium or full
o Corners turn up, turn down, or level
• Chin
o Shape (round, oval, pointed, square)
o Double chin
o Dimpled
o Cleft
• Neck
o Protruding Adam’s apple
o Hanging jowls
• Complexion
o Pores
o Pockmarks
o Acne
o Razor rash
o Bumps
• Facial hair
o Clean shaven
o Unshaven
o Beard
o Moustache
o Goatee
o Sideburns
• Tattoos
o Shape and style
o On what part of the body
Other • Voice
physical o Pitch
features or o Tone
peculiarities o Rasp
o Lisp
• Speech
o Articulate
o Uneducated
o Accent
o use of slang
• Gait
o Slow
o Fast
o Limp

59
Edition A Version 1
Comprehensive Defence Handbook—Vol II

5.14 Describing Tracked Vehicles. To the average person, a large armoured


vehicle that moves on tracks and has a gun sticking out of it is a tank. A military
professional will see that same vehicle and determine that it is not a tank. It is
an armoured personnel carrier, self-propelled artillery or any of several other
possible specific weapon systems.
The average civilian is not expected to be able to precisely identify all the
various types of military equipment.
It is helpful, however, to be able to describe items in a way will allow a
professional to determine what it is.
The table below describes the difference between some of the most common
armoured military vehicles you would see in a hostile situation. 14

Table 5.10 General Vehicle Identification Considerations


Tanks • General. Oftentimes the term “tank” is used as a blanket word
for any armoured military vehicle, but this is erroneous. Tanks
are heavily armed and armoured vehicles designed to clear out
well-protected targets, engage other vehicles (especially other
tanks), and use their off-road mobility to exploit weaknesses in
the enemy’s defences. Due to their size and firepower, tanks are
also formidable psychological weapons. However, they can be
vulnerable in built-up environments.
o Size: Large — usually 45+ tons.
o Guns: Large 100-125 mm main gun This is the best way to
identify a tank. Tank guns are long and protrude beyond the
front of the tank. Tanks have auxiliary machine guns as well.
o Missiles: Some tanks can fire missiles from their main guns,
but tanks generally do not carry externally-mounted missiles.
o Propulsion: Tracked; tracks are large and wide.
o Windows: No, except for small sensor or periscope windows.
Infantry Fighting • General. IFVs are easy to mistake for tanks. The main
Vehicles (IFVs) difference between the two is role and weapon size. IFVs carry
infantry into battle as well as participating in combat, whereas
tanks do not transport infantry. This difference is reflected by the
smaller IFV primary weapon size, which frees up space for
infantry and equipment.
o Size: Usually around 20-30 tons. Somewhat smaller than a
tank.
o Guns: 20-40 mm main guns are standard, with some
exceptions. IFV guns are not as large or long as a tank gun.
IFV guns will usually but not always be mounted in a small
turret that does not span the full width of the hull. IFVs almost
always have one primary weapon. If the vehicle has multiple
large guns mounted to a single turret, it is probably a an anti-
aircraft weapon.

14
https://whitefleet.net/2015/12/01/military-vehicle-identification-guide-ground-vehicles/

60
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o Missiles: Some IFVs carry missiles since their main guns lack
the punch of a tank gun.
o Windows: No, except small periscope and sensor openings.
• The primary role of these vehicles is to move troops in and out
of areas where they may be subjected to enemy fire. APCs vary
widely in configuration from simple up-armored SUVs to tank
based vehicles that can withstand immense punishment.
Because their primary mission is to transport troops, APCs are
lightly armed, with at most a grenade launcher or machine gun
and sometimes no armament at all
Amoured
• General. The primary role of these vehicles is to move troops in
personnel
and out of areas where they may be subjected to enemy fire.
carriers
APCs vary widely in configuration from simple up-armored SUVs
to tank based vehicles that can withstand immense punishment.
Because their primary mission is to transport troops, APCs are
lightly armed, with at most a grenade launcher or machine gun
and sometimes no armament at all.
o Size: Varies, from SUV-sized to tank or IFV-sized
o Guns: A few machine guns, grenade launchers, or no
armament. Does not have a turret-mounted autocannon
o Missiles: Some APCs are modified to carry missiles, but this is
not common
o Propulsion: Tracked or wheeled
o Windows: Some have none, others have armored windows
similar to a truck or SUV. Depends on armor level and chassis
used
Notes: Many APCs are modified to perform specialized tasks,
such as serving as a combat ambulance, serving as a mortar
platform, etc. In this case the base vehicle is still an APC but the
role is no longer troop transport.
Reconnaissance • General. Reconnaissance vehicles are high mobility vehicles
vehicles designed to move around the battlefield rapidly, gathering
information and probing enemy defenses while engaging any ill-
protected contacts. The chassis layout, level of protection and
armament of these vehicles varies widely, as many different
chassis designs can be modified to fit the recon role. A common
reconnaissance vehicle layout is a small, lightly armored 4×4
with a relatively large autocannon or machine gun mounted in a
turret. Almost all modern light tanks are built as reconnaissance
vehicles. Unfortunately, it is very difficult to tell based on
appearance when a vehicle (for example an IFV) has been
modified from its original design to a reconnaissance layout;
many IFVs and APCs are changed to reconnaissance vehicles
by adding improved optics and communications equipment.
o Size: Large SUV to small tank
o Guns: Often one low-velocity cannon, autocannon, or machine
gun in a small turret
o Missiles: Some are armed with missiles
o Propulsion: Wheeled or tracked
61
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Table 5.11 Techniques for describing Tracked Vehicles


Features Example
Major parts

Turret
• Rotating armoured
structure on the top
of the vehicle

Armament
• Varies from
machineguns to
large cannons
• In turreted vehicles
the heavy armament
is found in the turret

Tracks
• Notice that
tanks have
wheels inside
of the tracks
• These are
often covered
by panels
called skirts,
or obscured
by grass
• However, if
you can see
the wheels,
count them

62
Edition A Version 1
Comprehensive Defence Handbook—Vol II

5.15 Describing Terrain. The TDF will use information about the terrain to support
all planning and decisions. This section will provide the tools necessary to
provide information regarding streams and rivers, ground slope, and the
movement of personnel. It is not necessary for you to know exactly how the
information will be used. In fact, for security purposes, it is best to know as little
as possible. However, you should trust that sometimes seemingly useless
pieces of information may help the TDF will determine where the enemy has
been, where they may go next and where they cannot go.

Table 5.12 River or stream velocity


Potential • Determine whether certain vehicles, boats or personnel can cross a body of water
Uses
How to
calcuate

Table 5.13 Measuring Slope


Potential • Identify possible helicopter landing zones
uses
• Identify possible staging or support areas
• Road usability
Fomulas • Slope can be measured by pecentage or degree

100m
Vertical
Distance
(V)

1,000m Horizontal distance (H)

• Formula for percentage


o V/H x 100
o V = Vertical distance (difference in elevation)
o H = Horizontal distance
o 100/1,000 x 100 = 10% slope
• Formula for degree
o V/H x 57.3
o V = Vertical distance (difference in elevation)
o H = Horizontal distance

63
Edition A Version 1
Comprehensive Defence Handbook—Vol II

o 100/1,000 x 57.3 = 5.73 degrees slope

Calculating • Modern smart devices are often equipped to measure elevation, distance,
vertical etc.
and
• If such a device is not available distance and eleveation may be measured
horizontal
distances via the pace method (see figure below).
o This method is most accurate for slopes of less than 30 percent grade, and
requires practice to master.

o Stand at the bottom of the slope with your head and eyes level.
o Sight a spot on the slope.
 This spot should be easily identifiable.
 If it is not, another person should go forward to mark the location.
o Walk forward and stand on the marked spot.
 Record the number of paces.
 Repeat this procedureuntil the top of the slope (estimate fractions of an eye
level) is reached.
o Compute the vertical distance by multiplying the number of sightings by
the eye-level height(1.75 meters).
 Compute the horizontal distance by totaling the number of paces and
convertingthem to meters by multiplying by 0.75 (or the known pace-to-meter
conversion factor).
o Calculate the percent of slope by substituting the values into the percent-
of-slope format.

Table 5.14 Analysing Footprints


Potential Uses • Determine number of personnel, speed and direction of travel

What to look • If footprints are deep and the pace is long, the party was moving
for rapidly (A).
o Long strides and deep prints with toe prints deeper than heel prints
indicate running.
• Prints that are deep, short, and widely spaced, with signs of scuffing
or shuffling indicate the person is carrying a heavy load (B).
o If the party members realize they are being followed, they may try to hide
their tracks.
• Persons walking backward have a short, irregular stride (C).
o The prints have an unnaturally deep toe, and soil is displaced in the
direction of movement.

64
Edition A Version 1
Comprehensive Defence Handbook—Vol II

• Women tend to with feet pointed slightly inward, while men walk with
their feet straight ahead or pointed slightly to the outside (D).
o Prints left by women are usually smaller and the stride is usually shorter
than prints left by men.

5.16 Summary. The skills in this chapter are focused on responding to an armed
incursion. However, many of the same steps will help you survive and assist
others in the event of any emergency. They are measures you can take to
increase and maintain your individual resilience and contribute to national
comprehensive defence.

65
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Intentionally blank

66
Edition A Version 1
Comprehensive Defence Handbook—Vol II

Intentionally blank

67
Edition A Version 1

You might also like