It is far more sensible to go after the person s who released the lion into a city. Re:Big Deal!!! So, while it's not classified, it's not generally meant for public consumption. That doesn't mean you can't find it with a little searching. What is currently available on Amazon's website is the Operational Techniques link [amazon.
This is more of a "what sf does" type of book. And in reality, while it's no secret what SF or any other type of Army unit does, specific TTP are sensitive because they have pretty specific guidelines and checklists on how certain tasks are accomplished. They're not classified, but they're also not something an Army unit would necessarily want widely distributed.
Oh, and for people complaining about the format of the manual - this is what Army manuals look like. They have lousy formatting, and it's pretty common to find typos and other errors. WikiLeaks didn't really scoop anything, so it's not some sort of coup. I think the key is to play it in "Normal" mode.
Score: 4 , Interesting. Re: Score: 3 , Informative. Unless it was - you know - either a fake or inaccurately reported. Score: 4 , Informative. Except Iraq. Which wasn't a breeding ground for terrorists. Please cite your references, because I'm not sure you're possessed of the "ounce of intelligence" that you're referring to They installed and supported the "pro west" Shah of Iran, whose whoring of his country and people lead to the rise of the ayatollah's and the extremist element in that country.
They then gave Saddam Hussein their support in order that he should stand agains the "New" Iran, and then people from both of those countries got to experience the meat-grinder that is American Foreign Policy in the Middle East. They also didn't seem to care if he oppressed his own people, by whatever means, although after decades of his abuses, they then supported a Kurdish insurgency, but cut-off support to them just in time to let Saddam obliterate them.
Later they sent money, guns and tactical support to the Afghan rebels in order to help them overthrown the Russians, but then cut them loose to "wither on the vine" once the Russians left.
This is the record of American influence in this region, as ever with Americans, it's a story of doing whatever it takes to advance their interests, without thought, care or regard for how much it'll fuck-up anyone else That's the basis for the resentment, anger and hatred the people of these regions have for Americans, and that's the environment that's "breeding terrorists".
I have no hidden agenda. I'm simply pointing out that a LOT of the troubles America is experiencing in the world right now can be seen as karmic chickens coming home to roost. This document was signed in Thanks for playing. Just like Bush 'faked' the Iraq WMD stuff in , two years before he was elected so Congress would pass the Iraq Liberation Act, now he's being blamed for a purported anti-terrorism manual? You libs are too much.
Between Hans Blix's investigations in Iraq inconclusive at best and the CIA's complete refute of the Nigerian uranium story, W Bush's Iraq policy was based on false evidence used to mislead supporters.
The inspectors were in the process of inspection when they were driven out by the comming war. In addition, the UN 'resolution' fig leaf under which we went to war called for all countries to provide information the inspectors could use to locate the WMD. All the while the inspections were going on, Rumsfeld and others kept saying "we know where the weapons are" but refused to provide this information to the inspectors.
This placed the US in violation of the resolution. It's easy to understand why we didn't provide this information: when inspection proved it wrong it would have made it a lot harder to justify why were going to war. Did any of this need to be confirmed? Re:Did any of this need to be confirmed? We need some sort of government to protect peope from each other. Otherwise I couldn't agree more, it just sems to be a bunch of rich, cantankerous old killjoys at the top of each country, making up reasons to kill people that are under the influence of another bunch of rich old bastards.
Comment removed based on user account deletion. If the good guys outnumber the bad guys, then things will eventually settle down.
The good guys almost always outnumber the bad guys, but most won't do a single thing about it becauase they have their own lives to worry about.
I dunno, I think this is the old problem of mistaking incompetence for evil. Here in Australia our labor government and before that, to a lesser extend, the liberal government can sure be incompetent, but as much as I dislike Rudd he's probably not evil.
He supported the Iraq war in and now blames Howard for it of course, but he just like the majority of people thought it was necessary at the time. I shouldn't be feeding the troll, but it's obvious you don't really know too much about Islam with the way you've selected and interpreted those passages.
If you've read the entire Koran and the Hadiths and gotten the message "lying is good! Oh, and could you please verify the authority of your translation? Because no Muslim would accept a non-Arabic version of the Koran or the Hadith as authorative, since so much is lost in translation.
Arabic is a notoriously difficult language to translate due to the complexity of the ideas contained in many of the words. But you know that, of course, as I'm sure you've read Islamic holy documents in their original language, right? But wait!
Maybe you haven't. Wow, never knew that. What the hell are you talking about, is this some kind of blend of "ma salama" "go with peace" and "hasta la vista"? Seriously man, if you're going to be a critic of Islam from primary texts, at least learn the language.
No, sir, Islam isn't what needs to be destroyed in order to stop terror. It's intolerance, ignorance, and bigotry from people like YOU whether in Iraq, America, or elsewhere that has to die to stop terror. Does anyone seriously think that western governments have any kind of moral credibility" Talk to the average north american, and you'll find out that there are many that would rank you with steretype of the crzzy-type 'conspiracy theorists'.
This is just more example of fascism plain and simple, when business tools government for it's own interests.
Re: Score: 3 , Insightful. Way Offtopic Score: 4 , Funny. But I was intrigued by the use of the world 'peasant'. I figured that it was a term that only made sense in a feudal system - so like the proper netizen that I am, I toddled off to Wikipedia to clarify my thoughts.
I got no further than the first line: Not to be confused with pheasants. What's that, a guideline for the upper classes when on a shooting party! I never did find out about the peasants. His national government may have been a succession of corrupt dictators and inefficient bureaucrats. Talk about lack of perspective. Go spend thirty seconds with Google. Pick a dictator, any dictator: Castro, Somosa, Saddam, Ceausescu, whatever.
The level of violence, corruption, intimidation, whatever aren't even in the same league. I know it is cool to be all downtrodden, but really: get out of the dorm and get a sense of perspective. You have it orders of magnitude better than anyone who ever lived under those governments. On his worst day, chimp boy is better than any government in any developing country on their best day. America sucks! Every western government has some sort of Special Operations system in place with all the same provisions.
I think it is more telling that the slashdot crowd is just now "discovering" what has been known about black operations since the beginning of time. Next slashdot will be "discovering" Operation Gladio.
What's really scary Police departments and many security firms have a preference for ex-military. Re:What's really scary We wag our fingers at China for their actions in Tibet We lecture Russia about corruption get the feeling its all for the children? An insightful comment if ever I read one. Also worth pointing out this gives lie to the "They hate us for our freedom" rubbish repeatedly heard from our leaders when conflicts and violence occur in unfamiliar parts of the world.
The really sad thing is that any student of American history could say this is a non-story. Sometimes it's a bitch looking into the mirror. The sad thing is that huge swathes of this read as if they were redacted to fit an ideology, not truly written based on pragmatic achieving of a goal. It's all about doing the "dirty work" that the chairborne rangers with their neckties and air-conditioned offices dream about. I am going to read this in more detail, but right now it depresses me that counterinsurgency tactics have fallen so deeply into doing the "glamourous", "badass" stuff and ignoring the repercussions.
Current lack of success in Afghanistan and Iraq should have been a wake-up call to how important treating the locals is, how accepting moral limits can reap tactical benefits later on.
Bill Hicks said it best, of course [www. Hi, This is a common mistake made by many Americans, but please remember that Canada is not actually one of your states. You see we're an independent nation.
If you need help finding us on a map its that really big spot above you where you get your maple syrup and you used to get cheap shopping.
Since we're laterally north of you, we're also a "western government". Unless you're specifically talking about Alaska, then I suppose it is more west than us.. This was a US special force book.
I don't believe it wa. It's a terrible tragedy that such a foolhardy strategy has been embraced by our current adminstration. Now that everything that everybody already knew.. I thought the plan was to export democracy, free speech, human rights and other such goodies Re: Score: 3. The United States will lose more than can ever be gained with war.
So in other words Saddam Hussein was the ideal leader to have in Iraq? For about 20 years, yes. Absolutely Score: 5 , Insightful. Hence the support provided to him in his war against Iran. War is hell. Re:War is hell.
So it's by any means necessary then? The problem is that we should never go to war to bring people freedom. No holds barred Score: 4 , Insightful.
Sherman was The Man Score: 3 , Insightful. Wow, thats creepy Score: 3 , Insightful. If this was a CIA manual noone would lift an eyebrow, but this is apparently a field manual for an Army unit. But I keep forgetting, unless you are an american citizen you lack rights in the eyes of Uncle Sam.
Sad, really. Is anyone actually shocked? Special Forces are trained to work behind enemy lines in war to destabilize the government and cause as much damage as possible to the enemy's war effort. Since when have the niceties of the US constitution applied to an enemy, in war, in the enemy's territory? If a legal action is brought against you as a result of your submission, there are organisations that may help you.
The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We specialise in strategic global publishing and large archives. The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors.
You can only access this submissions system through Tor. See our Tor tab for more information. We also advise you to read our tips for sources before submitting. If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods.
Contact us to discuss how to proceed. The manual may be critically described as "what the US learned about running death squads and propping up corrupt government in Latin America and how to apply it to other places". Its contents are both history defining for Latin America and, given the continued role of US Special Forces in the suppression of insurgencies, including in Iraq and Afghanistan, history making. FID operations are designed to prop up "friendly" governments facing popular revolution or guerilla insurgency.
FID interventions are often covert or quasi-covert due to the unpopular nature of the governments being supported "In formulating a realistic policy for the use of advisors, the commander must carefully gauge the psychological climate of the HN [Host Nation] and the United States. It directly advocates warrantless searches, detainment without charge and under varying circumstances the suspension of habeas corpus. It directly advocates employing terrorists or prosecuting individuals for terrorism who are not terrorists, running false flag operations and concealing human rights abuses from journalists.
In a number of credible media reports suggested the Pentagon was intensely debating "the Salvador option" for Iraq. According to the New York Times Magazine:. The same article states James Steele and many other former Central American Special Forces "military advisors" have now been appointed at a high level to Iraq.
In a United Nations truth commission on El Salvador, which examined 22, atrocities that occurred during the twelve-year civil war, attributed 85 percent of the abuses to the US-backed El Salvador military and its paramilitary death squads.
White now the president for the Center for International Policy had to say as early as , in State Department documents obtained under the Freedom of Information Act:. Selected extracts follow. Note that the manual is pages long and contains substantial material throughout. These extracts should merely be considered representative. Emphasis has been added for further selectivity. Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means.
This determination was made on 5 December Destruction Notice: Destroy by any method that must prevent disclosure of contents or reconstruction of the document. Most of the counterintelligence measures used will be overt in nature and aimed at protecting installations, units, and information and detecting espionage, sabotage, and subversion. Examples of counterintelligence measures to use are.
For maximum effectiveness, a strong psychological operations effort is directed toward the families of the insurgents and their popular support base. The PSYOP aspect of the PRC program tries to make the imposition of control more palatable to the people by relating the necessity of controls to their safety and well-being. PSYOP efforts also try to create a favorable national or local government image and counter the effects of the insurgent propaganda effort.
Among these measures are the following :. Legal Considerations. All restrictions, controls, and DA measures must be governed by the legality of these methods and their impact on the populace.
In countries where government authorities do not have wide latitude in controlling the population, special or emergency legislation must be enacted.
This emergency legislation may include a form of martial law permitting government forces to search without warrant, to detain without bringing formal charges, and to execute other similar actions. PSYOP can support the mission by discrediting the insurgent forces to neutral groups, creating dissension among the insurgents themselves, and supporting defector programs.
Divisive programs create dissension, disorganization, low morale, subversion, and defection within the insurgent forces. Also important are national programs to win insurgents over to the government side with offers of amnesty and rewards. Motives for surrendering can range from personal rivalries and bitterness to disillusionment and discouragement. Pressure from the security forces has persuasive power.
Intelligence personnel must consider the parameters within which a revolutionary movement operates. Frequently, they establish a centralized intelligence processing center to collect and coordinate the amount of information required to make long-range intelligence estimates. Long-range intelligence focuses on the stable factors existing in an insurgency. For example, various demographic factors ethnic, racial, social, economic, religious, and political characteristics of the area in which the underground movement takes places are useful in identifying the members of the underground.
Collection of specific short-range intelligence about the rapidly changing variables of a local situation is critical.
Intelligence personnel must gather information on members of the underground, their movements, and their methods. Biographies and photos of suspected underground members, detailed information on their homes, families, education, work history, and associates are important features of short-range intelligence. Destroying its tactical units is not enough to defeat the enemy. The insurgent's underground cells or infrastructure must be neutralized first because the infrastructure is his main source of tactical intelligence and political control.
Eliminating the infrastructure within an area achieves two goals: it ensures the government's control of the area, and it cuts off the enemy's main source of intelligence. An intelligence and operations command center IOCC is needed at district or province level.
This organization becomes the nerve center for operations against the insurgent infrastructure. Information on insurgent infrastructure targets should come from such sources as the national police and other established intelligence nets and agents and individuals informants. The highly specialized and sensitive nature of clandestine intelligence collection demands specially selected and highly trained agents.
Information from clandestine sources is often highly sensitive and requires tight control to protect the source. However, tactical information upon which a combat response can be taken should be passed to the appropriate tactical level.
The spotting, assessment, and recruitment of an agent is not a haphazard process regardless of the type agent being sought. During the assessment phase, the case officer determines the individual's degree of intelligence, access to target, available or necessary cover, and motivation. Training ammunition is usually allocated to the CSDF on the basis of a specified number of rounds for each authorized weapon.
A supporting HN government force or an established CSDF logistic source provides the ammunition to support refresher training. All members of training assistance teams must understand their responsibilities concerning acts of misconduct by HN personnel. Team members receive briefings before deployment on what to do if they encounter or observe such acts.
Common Article 3 of the four Geneva Conventions lists prohibited acts by parties to the convention. Such acts are-. If team members encounter prohibited acts they can not stop, they will disengage from the activity, leave the area if possible, and report the incidents immediately to the proper in-country U. The country team will identify proper U.
Team members will not discuss such matters with non-U. Government authorities such as journalists and civilian contractors. They prefer using commandtype mines in densely populated areas. These documents stress that when using noncommand-detonated mines, the insurgents use every means to inform the local populace on their location, commensurate with security regulations.
Their C2 does not permit them to verify that those elements at the operational level strictly follow directives and orders. There are problems with this concept. The individual may be killed or the security forces may gain control of the area. Therefore, the recovery of the mine is next to impossible. Homemade antipersonnel mines are used extensively in El Salvador, Guatemala and Malaysia.
Eighty percent of all El Salvadoran armed forces casualties in were due to mines; in , soldiers wounded by mines and booby traps averaged 50 to 60 per month. The important point to remember is that any homemade mine is the product of the resources available to the insurgent group. Therefore, no two antipersonnel mines may be the same in their configuration and materials. Insurgent groups depend to a great extent on materials discarded or lost by security forces personnel. The insurgents not only use weapons, ammunition, mines, grenades, and demolitions for their original purpose but also in preparing expedient mines and booby traps.
A series of successful minings carried out by the Viet Cong insurgents on the Cua Viet River, Quang Tri Province, demonstrated their resourcefulness in countering minesweeping tactics.
Initially, chain-dragging sweeps took place morning and evening. After several successful mining attacks, it was apparent that they laid the mines after the minesweepers passed. Then, the boats using the river formed into convoys and transited the river with minesweepers meters ahead oft he convoy. Nevertheless, boats of the convoy were successfully mined in mid-channel, indicating that the mines were again laid after the minesweeper had passed, possibly by using sampans.
Several sampans were observed crossing or otherwise using the channel between the minesweepers and the convoy. The convoys were then organized so that the minesweepers worked immediately ahead of the convoy. One convoy successfully passed. The next convoy had its minesweepers mined and ambushed close to the river banks. Psychologically pressuring the HN [Host Nation] counterpart may sometimes be successful. Forms of psychological pressure may range from the obvious to the subtle.
The advisor never applies direct threats, pressure, or intimidation on his counterpart Indirect psychological pressure may be applied by taking an issue up the chain of command to a higher U. The U. Psychological pressure may obtain quick results but may have very negative side effects. The counterpart will feel alienated and possibly hostile if the advisor uses such techniques. Offers of payment in the form of valuables may cause him to become resentful of the obvious control being exerted over him.
In short, psychologically pressuring a counterpart is not recommended. Such pressure is used only as a last resort since it may irreparably damage the relationship between the advisor and his counterpart.
The introduction of military advisors requires preparing the populace with which the advisors are going to work. Before advisors enter a country, the HN [Host Nation] government carefully explains their introduction and clearly emphasizes the benefits of their presence to the citizens.
It must provide a credible justification to minimize the obvious propaganda benefits the insurgents could derive from this action. Once advisors are committed, their activities should be exploited. Their successful integration into the HN [Host Nation] society and their respect for local customs and mores, as well as their involvement with CA [Civil Affairs] projects, are constantly brought to light. In formulating a realistic policy for the use of advisors, the commander must carefully gauge the psychological climate of the HN [Host Nation] and the United States.
Advisors assist their counterparts in developing proper control plans and training programs for PRC measures. They also help coordinate plans and requests for materiel and submit recommendations to improve the overall effectiveness of operations. They can be helpful in preparing to initiate control. The primary goal or benefit must be to test SF training capabilities. This training is permissible as long as it is not comparable to or intended as SA training; that is, the training must be conducted as an SF team and not be long-term.
How to contact WikiLeaks? What is Tor? Tips for Sources After Submitting. Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Do not talk about your submission to others If you have any issues talk to WikiLeaks.
Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you. Submit documents to WikiLeaks.
Shop Donate Submit. Leaks News About Partners. Jump to: navigation , search. Views Page discuss View source. Personal tools Log in. Main Page Country index Follow us. What links here Related changes Special pages Printable version Permanent link.
0コメント