TIP: Click on subject to list as thread! ANSI
echo: barktopus
to: Phil Payne
from: Adam
date: 2007-01-24 13:56:46
subject: Re: Petraeus `the situation in Iraq is dire...`

From: Adam 

Phil Payne wrote:
>> Jeapes, Tony. SAS Secret War. London: Greenhill Books, 2005. (How the
>> British Special Air Service raised and employed irregular tribal forces
>> to counter a communist insurgency in Oman during the 1960s and 1970s.)
>
>> Jeapes & Kitson are both good reads though Kitson leaves out some of the
>> somewhat harsher methods. OK I admit to a leaning towards Jeapes for old
>> times sake
>
> I met Tony in Bangladesh in about 1982.  He's a tall bugger - stands out in
> a crowd.  Drank water out of a bottle he brought with him.  Very polite,
> very quiet.  I've no idea what he was doing there, but as someone said at
> the time: "He never goes anywhere without a reason".
>

Was this before of after the coup?

> I don't know if it's in the book, but one of the techniques he described
> (and I remember it as Aden, not Oman) was a stop and search of a truck.
> While the driver was being "questioned on the bonnet", the
search team went
> through a load of fruit and found a box of grenades.  Rather than make a
> fuss, they just screwed all the fuses down to "no delay". 
There were two
> grenade throwing incidents the next day, and two very dead insurgents.  A
> box of grenades with two missing was found on the police station steps the
> next morning and grenade throwing ceased to be a popular pastime for a
> while.
>

 Indeed.

> I'm amazed he's written a book, but I bet it's 100% authorized.
>
> He also told me a story about the Balcombe Street siege, but I'll leave it
> to his judgement.  If it's in the book, fine.  Their preferred mode of
> transport at the time was a furniture van. A "Hereford cattle truck".
>
>

One of the tactics less covered is the way to mess up a terrorist group....

I'll have to choose my words carefully but in essence a classic terrorist
structure is the "cell" structure where one group/cell only knows
about itself. This helps keep security risks upon capture to a minimum as
you can't divulge wot you don't know.

The second common org point is that of the "shared cache" wherein
weapons are pooled at secret points in overlapping circles i.e. cell A
shares a hide with cell d & another with cell b. B shares with a &
c & c shares with b & d. i.e. multiple hides none of which are
common to more than 2 cells.

The cells are divided so that only some know of one hide & only some
know of another.

The weakness is that if you find a willing person from cell a you can find
at least 1 hide & possibly dependant upon cell security 2 hides.

now the fun begins assuming you can nick a weapon from a common hide shared
with cell d & one from a hide shared with cell b.

you then shoot someone from cell c with one of the weapons &
(possibly...possibly later) someone from group b with a weapon from the
group a-d hide.

Then you replace the weapons in the hides.

& wait for some internecine warfare to break out as group c blames a or
b & group b blames a or d.

of course the local plod can be "unwitting helpers" as their
forensic ppl announce that the weapons used were "IRA guns used
before" & say with murders/shootings they were used in previously
thus giving the "boys" clues as to which of their comrade cells
carried out the hit on them.

Not that this ever happened of course but the name "Four Square
Laundry" comes to mind.


This is the sort of tactic which is oddly missing from most of the
published literature.

Adam

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.