top of page
BRIEF
Operation_Iraqi_Freedom_(OIF)_DVIDS12018

STRATEGIES

Dive headfirst into the strategic vortex of global insurgency with our 'Strategies' articles. This compact section of our database explores the military strategies employed by insurgent groups worldwide.

Drawing from a combination of OSINT and theory, these 'Strategies' articles are your gateway to understanding the tactics of resistance/insurgency groups worldwide.

Table of Contents

ASSASSINATIONS & TARGETED KILLINGS

ASSASSINATIONS & TARGETED KILLINGS

ASSASINATIONSDRAFT1.jpg

Exploring the intricate world of assassinations, this report delves into the historical context, strategic implications, and technical aspects of targeted killings. From renowned cases by insurgent groups like the LTTE and ETA to recent high-profile individual assassinations, the report examines the purpose, methods, and countermeasures associated with assassinations.

Discover the motivations behind this tactic, the impact on societies, and the ongoing challenges in protecting prominent figures. Uncover the complexities of assassinations and gain insights into the ever-evolving strategies used by insurgent groups seeking to achieve political, military, and ideological objectives.

HumanShield2.jpg

Human shields have served as one of the most controversial tactics in modern conflicts, particularly used by Jihadi terror and insurgent groups. Human shields involve the strategic placement of civilians to shield military targets from attacks. This tactic creates a complex dilemma for counterinsurgency forces, as attacking the shielded military objective risks causing civilian casualties and violating international law, while refraining from attacking may allow the enemy to operate with impunity.

​

This issue of our Strategy Reports explores the legal and ethical issues surrounding human shields, and it mentions the concept of "lawfare", whereby insurgents exploit the legal constraints of counterinsurgency forces to their advantage.

Hostage Taking Strategy Report Thumbnail.jpg

Hostage-taking and kidnapping have been longstanding tactics in political and insurgent conflicts, serving as methods of exerting pressure or gaining ransom. This issue explores the historical landscape and notable cases of hostage-taking, highlighting events like the 1979 Grand Mosque seizure, the Iranian hostage crisis, and recent abductions by Hamas.

 

This Strategy Report examines the motives and types of hostage-taking, including kidnapping, hijacking, and barricade-siege, and the complexities involved in counterterrorism responses. Our writer Anthony Krumme also delves into the effectiveness of these tactics and the evolution of countermeasures, providing a comprehensive analysis of the strategies and psychological impacts of hostage situations.

EXPLOSIVES & ARMS

EXPLOSIVES & ARMS

3D_print-blueprint.jpg

This article explores the emergence of 3D printed weapons as a disruptive force in modern warfare and insurgencies. With advancements in consumer-grade 3D printers, reduced production costs, and widespread distribution of blueprints, these weapons have proliferated in different areas, ranging from warzones to households.

In this piece, we examine notable cases of 3D printed firearms, such as their use by armed student and ethnic organisations in Myanmar and paramilitary groups in Northern Ireland. We highlight the challenges faced by state actors in countering this threat and the potential implications for future conflicts.

SBs

Suicide bombings involve individuals willingly sacrificing their lives to inflict destruction and loss, driven by political, religious, or ideological motives. Examining notable cases like Hezbollah's 1983 attacks, as well as Al-Qaeda's 9/11, underscores the strategy's potency. Suicide bombing campaigns serve dual purposes: strategic, aimed at expelling occupiers and destabilising regimes; and organisational, shifting conflict dynamics by leveraging self-sacrifice to defy military inferiority.

​

Ultimately, comprehending the multifaceted nature of suicide bombing is crucial to understanding its impact and shaping effective responses within insurgent conflicts.

Copy of Untitled.jpg

Recoilless weapons are direct-fire support weapons that mitigate excessive recoil by expelling propellant gasses or another counter mass from the rear, balancing the forward momentum of the projectile. They are commonly used by armed forces, insurgent groups, and non-state actors due to their portability, versatility, and effectiveness in conflict zones. These weapons are especially prevalent in the Middle East and Africa, and have been used against armored vehicles, enemy infantry, and fortified positions with various tactics and munitions

​

This article takes a deep dive into the history and the gradual integration of these weapons within arsenals of global insurgencies and militaries.

SR Graphics Sketches.jpg

Anti-Tank Guided Missiles (ATGMs) are precision-guided munitions designed for targeting and neutralizing armored vehicles, including tanks. They play a critical role in modern warfare by providing infantry and light units the capability to engage and destroy heavily armored threats from a distance, often with top-attack profiles that exploit the weaker armor on the top of vehicles. Their use has proliferated across various conflict zones, significantly influencing the dynamics of ground combat by enhancing the lethality and strategic flexibility of non-armored forces.

MILITARY TACTICS & OPERATIONS

MILITARY TACTICS & OPERATIONS

Convoy Ambush SR Thumbnail.jpg

Logistics convoy ambushes have been a pivotal tactic in asymmetric warfare, targeting the supply lines essential for military operations. This report delves into the historical and contemporary use of convoy ambushes, examining notable cases from the Vietnam War, Soviet-Afghan War, and Iraq War.

These attacks disrupt the logistical backbone of stronger military forces. The report also discusses the execution of such ambushes, countermeasures employed by conventional forces, and the evolution of tactics and technology in response to these persistent threats, providing a comprehensive analysis of this critical aspect of modern warfare.

URBAN WARFARE & SABOTAGE

URBAN WARFARE & SABOTAGE

Sn1per_Attack_V.01Asset_10.png

This incredible report provides an overview of the evolution and tactics of snipers in modern warfare, with a focus on their use by insurgent groups. By continuously incorporating OSINT, we examine three levels of insurgent snipers, their objectives, and the psychological effects of their attacks. Evidently, we link these levels to real insurgencies and real organised movements around the world.

The technical analysis includes a breakdown of the capabilities and strategies employed by each level of insurgent snipers. The article concludes by outlining countermeasures used by conventional militaries to detect and neutralize snipers.

BioT Graphic.jpg

Bioterrorism is a strategy involving the deliberate release of harmful biological agents to create fear and chaos within populations. Historical instances include the 2001 US anthrax attacks and the 1984 Rajneeshee bioterror attack in Oregon.

​

The primary purpose of bioterrorism is to instill widespread fear and instability. Unlike conventional terrorism, it exploits the characteristics of biological agents, such as delayed symptom onset, making detection and response challenging. Countermeasures include vaccination programs, surveillance, and intelligence efforts, but budget constraints can hinder these responses, leaving populations vulnerable to bioterror threats.

Tunnel Warfare Graphic.jpg

Tunnel warfare has seen a resurgence in recent times, notably with the Hamas attack on October 7th 2023. Tunnels vary from sophisticated structures to simple hand-dug passageways and are used for diverse purposes like smuggling, storing supplies, and military offensives. Historically, extensive tunnel networks were used in the Vietnam War and Afghanistan, facilitating stealth movements and surprise attacks.

​

These tunnels offer strategic advantages in movement, storage, and communication while minimizing detection risk. However, combat in tunnels is fraught with dangers like limited visibility, structural hazards, and environmental risks. 

bottom of page