a. Motives for sabotage. Do not allow yourself to think that sabotage
is always motivated by defense interests.
This is high on the list of
motives.
Consideration for the persons or groups involved must also be
given.
A saboteur may work for pay, hatred or revenge.
He may work from
sincere belief, to settle a real or imagined wrong, or because of blackmail.
Enemy agents are trained to identify easy targets for recruitment. Likewise,
you must also be aware of such persons.
Suspicious behavior should be
reported to the proper investigating agency.
b. Characteristics of saboteurs.
Who is the saboteur? He may be
anyone.
He could be a foreign agent, well trained, or a rank amateur from
any nation.
Saboteurs may be motivated by any of the reasons mentioned
above. The use of legitimate business as a front allows them to infiltrate
installations and industries.
Saboteurs may work alone or in groups with
possible aid from sympathizers.
How they work depends on how broad the
mission. Behavior patterns give clues to the characteristics of a saboteur.
Persons may frequently act on impulse. They may act discontented with their
job.
They may be easily swayed by subversive propaganda; they could be
mentally ill.
c. Sabotage targets.
Targets selected for sabotage will result in
disruption of national defense capabilities. The disruption may be direct or
indirect, complete or partial. Agents lie dormant for long periods of time.
They analyze weaknesses in security programs; they identify vulnerable
activities.
Then they make plans for the assault.
As security personnel,
your planning must reach past the obvious; it must include assumptions of
other possibilities.
There is not however, a foolproof security system.
Knowing which targets are critical and vulnerable aids in defense planning.
So are
public
utilities
-power,
water,
gas,
lights,
and
sewage
lines.
Transportation -highways, airports, waterways, and facilities supporting
these functions are targets.
Logistics -warehouses, supply depots, weapons
and ammunition storage areas are also. Each of these areas demand a threat
analysis.
This is a must when determining criticality and vulnerability.
Appropriate security planning will be based on this analysis. It will also
be based on available resources.
d. Sabotage methods. Ingenious methods used by saboteurs are endless.
However, the methods may be generally classified as follows: fire,
explosive/mechanical devices, chemical, and psychological. Recognition of an
act of sabotage is often difficult.
This is because the act itself often
destroys evidence of sabotage.
understand some of the methods used.
e. Countersabotage. The enemy adopts new methods and devices to use in
sabotage. Likewise, you should be motivated toward better security measures
to counter these acts.
Using physical security measures would help stop
(1) Use of effective planning.
(2) Risk analysis and evaluation.
MP1001
1-6