acm defense protocol

15
Anarcho-collectivism Movement High Command Defense Protocol Vice President: Isaiah

Upload: wiredsnowman

Post on 03-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 1/15

Anarcho-collectivism

MovementHigh Command Defense ProtocolVice President: Isaiah

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 2/15

 pg. 1

ACM –  High Command Defense Protocol

The information in this document is confidential to the Anarcho-Collectivism Movement (ACM) and should not be disclosed to any other person or

establishment. It may not be reproduced in whole, or in part, nor may any of theinformation contained therein be disclosed without the prior consent of the

directors of the ACM. A recipient may not solicit, directly or indirectly (whetherthrough an agent or otherwise) the participation of another institution or person

without the prior approval of the directors of the ACM. Failure to abide will resultin immediate Termination.

Contents

Forward (pg.2)

  Letter from ISAIAH

Headquarters Construction (pg.3)

  Location

  Building

  Fortification

  Traps

Defense Procedures (pg.8)

  Defending your Base

  Invasion & Siege Tactics

Patrolling (pg.12)

  Patrol Routes

  Patrol Formations

Emergency Protocol (PG.13)

  Contingency Plan

Forward

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 3/15

 pg. 2

If I have not said so in person yet, I would like to welcome you to the FinestMercenary Establishment the outlands have to offer. Within this manual lies the

means to create and defend a base of Operations from even the most abominable

threats known to the Outlands. Using the protocols and tactics provided in thisguide, attention to detail is required; your very life may depend on it. With great

 pleasure, I bestow upon you the information needed to outlast any worthyopponent who would dare lay his feet on ACM Soil.

Isaiah

Vice President

“The world is a dangerous place to live in; not because of the people who are evil, but because of the people not willing to do anything…” 

- Isaiah

Vice President

Headquarters Construction

The core of any establishment not only lies with its members, but with its

 base of operations. Here, the very Dealings/Assignments that pay for housing,food, weapons and supplies are discussed and debated. Many members call this

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 4/15

 pg. 3

 place their home, not to mention, the prime location for training recruits. With any

large-scale base, it requires complete devotion from its members to secure it,establish it, and prevent any enemy forces from collecting confidential information

such as this.

Location:

When scouring the outlands for a location to set up headquarters, many

factors must be taken into consideration. Naturally, environmental cover andaltitude are the prime components. If possible, utilize the high ground immediately.

This will allow you to have a commanding view of the entire battlefield and vast

line of sight. Taking the high ground also forces invading enemies to look up intothe brightness of sky, possibly blinding them under certain circumstances. It is

extremely hard to approach as defenders can fire upon invaders before they are

within retaliation range. To put it lightly, you‟re King of the castle.Choosing natural barriers will also work to your advantage. If you encounter building rubble, or mountainside rocks, consider this heavily, it could act as a

natural wall or choke point.

Building and Fortifying an H.Q:

The construction of your Headquarters is the most crucial step in any

established group as the amount of effort put in directly shows in the final product.

Time and resources are a major factor when deciding what type of Building youneed. For instance, a small outpost will not require as much time and materials as

the complete H.Q will.

Once a location has been chosen, quickly establish a perimeter to protect

those constructing the base. Immediately begin with the outer wall or fence. If theresources are available, a strong concrete perimeter roughly eight to ten feet tall

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 5/15

 pg. 4

around will be nearly impenetrable. An alternative is to use destroyed buildings

with piled cars/debris as a barrier around them. If fencing is the only option, makesure to leave a wide space between the fence and the area of operations, with

 plenty of internal cover from outsiders. Then use sheet metal or wood to cover up

the fence to block external observation.

If the perimeter is established, utilize whatever resources are inside tocontinue making your H.Q. As stated earlier, a Base of Operations should be built

around a previously established pre-war area, giving you full use of the sheltersalready there. If no shelters are established, wood beams and sheet metal are a

good temporary starting point to create buildings. Tents are also an alternative as

they provide safety from the elements, but no protection from attackers.

Building and Fortifying Continued:

Specific Buildings are required when planning a headquarters that must betaken into consideration. Lacking one or two of these facilities can lead to disaster.

 Needed Facilities are as Follows:

  Barracks

  Shooting Range/Training Area

  Meeting Area/H.Q Operations

  Storage/Armory

  Guard Towers

  Front Gate Checkpoint

  Fortified Walls

  Water Storage Tower/Tank

Optional Facilities are as follows:

  Chapel

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 6/15

 pg. 5

  Relaxation Area

  Clinic

  Mess Facility

Reinforcing buildings and walls are a costly, but necessary step in ensuringsafety. Consistently add sheet metal or concrete to ensure the stability and attack- proofing of the structure. Create staggered supports to prevent collapse at all times.

Guard Towers should also be placed on each corner of the encampment, allowingfor a high-altitude view of the battlefield.

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 7/15

 pg. 6

Traps:

There‟s nothing dishonorable about letting your enemies walk unknowingly

to their deaths. In this sections, Several Traps will be discussed that can easily be

created from abundant resources. Be creative when designing some of your own.Always remember Your Trap Placement Locations.

Bear traps are an example of a trap that is easily found, or created. To build

one, create an axle on witch two jagged jaws are hinged. Hold them apart by astrong spring that can be released from a center pedal when depressed. Space

accordingly around your H.Q.

Grenade wires are a simple concept. Hang any form of explosive device

lightly by the pin on a thin wire low to the ground. When an enemy triggers the

wire the grenade pin is pulled. You can figure out the rest. Subsequently, bells can be hung instead of grenades for a non-lethal effect.

Tiger pits are a classic way of eliminating enemies and discouraging morale.

Simply dig a pit and line the insides with spikes and other deadly objects. Makesure to cover the top of the pit with twigs and leaves that are weak enough to fall

through.

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 8/15

 pg. 7

Traps Continued:

There are endless combinations of traps. For the record, here is a small list

of some that can be used with abundant materials:

  Mines

  Tripwired firearms

  Pitfalls

  Bullet traps

  Snares

  Tree branch traps

  Fire bombs (not advised) 

  Radiation exposure (not advised) 

 Triggered blades

  Rock/boulder drops

With the main reason for traps being to demoralize attackers, make them as

gruesome and as hidden as possible. As stated before: REMEMBER Trap

Placement locations!

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 9/15

 pg. 8

DEFENSE PROCEDUREs

Its one task to build a headquarters, its another to keep it protected. This

section will discuss the various tactics used to defend one‟s base from attack ,

assault and siege. Even with an overpowering force, a well defended and supplied base can outlast the largest offensive army.

Basic Defense (guarding]:

When guarding your Base of Operations, there needs to constantly be a clear

sightline of the battlefield and strong communication between the post and the

interior of the establshment. Sightings must be reported at all times. There are twospecific posts which need to be manned non-stop that will be discussed:

The Front Gate:

The main entrance can either be the strongest zone in the base or the weakest

depending on your organization skills. Under normal circumstances, the gate can

remain open. When an entity considered a threat nears itself, the gate must beclosed. There must be a minimum of one guard at all times manning the front gate

outpost, whether it be to report sightings, warn members or greet allies. The front

gate post must have some form of physical cover to hide from invaders. A mountedgun would normally fit on this position for extra support. 

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 10/15

 pg. 9

The Watch Towers:

AS described before, a base should have a minimum of four watch towers,

one for eatch corner. one per each direction, North, South, West and East. The

duties of a tower guard are simple; look in their specefied direction and report Allsightings to the interior of the base via yelling. IF the guard deems an entity a

threat, he may fire a warning shot into the direction of the entity. If an imminentthreat is discovered, the guard may fire at will.

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 11/15

 pg. 10

General Defense Rules:

The Base of Operations, As stated previously, needs to be defended at all

times and needs to be well stocked with food, water, ammunition and medical

supplies. A minimum of 5 Members are required to maintain watch, as well as anoptional garrison for backup. Your troops must be trained constantly to remain

ready and vigilant.

Upon any attack, all troops need to be notified immediately and readied for battle. If possible, line them along walkways built on the interior of the walls for a

height advantage. If surrounded, space troops evenly along the wall according to

skill and weaponry. The firepower should be spaced to supress from all angles.Pick targets wisely, look for high ranking officials who will be farther back, grunts

will usually be part of the main assault. If enemy machinegunners or special

weaponry such as energy weapons or artillery, alert a significant portion of thedefense to focus fire upon them, as they will disrupt the attack. Practice withvarious drills to test troop response time.

Remain behind cover at all times and rarely expose yourself. Time yourshots so that one person is always firing and the other is behind cover, this acts as

suppresive fire. The enemy will always be fired upon in this situation.

Communication between troops is crucial, select one troop to act as a messengerand another to act as a bandolier to distribute ammunition to those in need.

Utilize explosives constantly to disperse enemies behind cover and destroylight cover. If they have any machinery or robotics, use the nescessary explosives

or energy weapons to target them as normal ammunition will be renderedineffective.

Most of all: Communicate and remain calm. 

Siege Defense: [Revert to Contingency Plan for additional details] 

Under the circumstances your base is attacked with a military force large

enough to render your base enclosed or cut-off, siege defense tactics will need to

 be initiated. In likelyhood, your enemies will have enough cover and mobilizationto wait your defense out. Siege tactics are much different then that of conventional

warfare. Chances are, your enemy will discontinue their fire upon you for moredemorilizing tactics.

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 12/15

 pg. 11

When a siege is declared, the attack will more than likely slow down, andyour enemies will remain at a distance out of range of your weaponry, keeping an

ever vigilant eye on your headquarters. To use the term loosely, your attackers will

try to „wait you out‟ for signs of starvation, dehydration or mental fatigue. 

To keep your enemies at bay, maintain a slow but present stream of fireupon the attackers. To elaborate, establish one troop to take „pot-shots‟ at theirgarrison to remind them of your presence. It is critical that food,water,ammunitionand supplies are rationed to the fullest extend as sieges can last months.

If possible, establish a messenger to communicate with the enemy troops todiscuss terms of diplomacy. Inside the base, keep entertained and light spirited. Do

not let the attack get to you as it will make the situation much worse when internal

affairs interfere.

If all fails, mount your troops for a counter assault when you feel the enemy

is most vulnerable, usually at night to maintain some stealth aspect.

Once again: Remain calm and comminicate. 

PATROLLING

Often, small patrol groups will be sent in a close proximity to the exterior ofthe H.Q to patrol the surrounding area. It is up to the Founder and officials as to

when and how many will be sent in a specific duration or timeframe.

Patrols are used to establish your clamed territory and reporty findings,whether they be allied, neutral or hostile. On the occasion patrol groups encounter

hostile forces, they are to retaliate immediately unless the hostile force is of

overpowering nature. In that case, patrols are instructed to immediately return to base for a large scale-defense.

Patrol Routes and Formations:

Patrols are to remain in very close proximity to the base exterior in the caseof a large assault at hand. They are to travel in staggered groups, meaning if one

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 13/15

 pg. 12

 patrol is attacked, the subsequent can provide assistance on arrival. A typical patrol

will consist of minimum two troops to a maximum of four and should neverventure farther than 50 meters of the base radius.

Patrols are to travel in one of the following formations as each allow troopsto cover their patrol members while having a clear view of the wastes. 

Emergency Protocol –  Contingency Plan

Contingency Plan Alpha-1:

  If the current President of the ACM were to be assassinated or killed in battle, then the chain of command will follow as such:

1.  Vice President

2.  LieUtenant

Contingency Plan Bravo-1:

  In the event of a raid from a large foe, eliminate all intelligence gathered.

Leave at least one large explosive if obtainable within the vicinity primed

and ready to detonate (RTD). Execute all slaves on the premises. Execute all prisoners.

Contingency Plan Charlie-1:

  In the event of a Member being captured and death is assured, Take your

own life.

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 14/15

 pg. 13

Contingency Plan Delta-1:

  If one of our Allies is threatened by a large force and faces annihilation,

assist them by any means necessary. Ignore your Duties and proceed to

assist. Enemy Factions are exempt from this Contingency Plan.

Contingency Plan Echo-1:

  In the event of a fire, contain said fire and make sure it does not come intocontact with the Armory.

  In the event of a hidden bomb threat, stay clear of the area that has been

reported to have a bomb and do not try to remove belongings from that area.Un-sling, Un-holster, and Un-sheath all and any weapons and maintain a

high level of caution.

Contingency Plan Foxtrot-1:

  In the event of a Refugee/Member who has openly betrayed the group

opening fire within the base, steer clear and find cover. Report it over theradio and your exact location. If you have an ID on him/her, report it As

Soon As Possible.

Contingency Plan Golf-1:

  In the event of a raid aimed at freeing prisoners, execute allm prisoners.Take the bodies and laden them with crude armor and weapons. Place them

in front of the base before the attackers reach the base radius.

Contingency Plan Hotel-1:

  In the event of an ambush, take immediate cover and report your locationimmediately. Hold out until reinforcements arrive.

Contingency Plan Indiana-1:

  When taking over an establishment/Enemy Base, always search every home.

Execute any and all armed individuals without exception. Attempt to leaveno trace of a struggle. Take anything worth of value and move it back to HQ.

Be sure to be escorted.

8/12/2019 Acm Defense Protocol

http://slidepdf.com/reader/full/acm-defense-protocol 15/15

 pg. 14

 Property of the ANARCHO-COLLECTIVISM MOVEMENT ; Refer to agreement