Summary

This document appears to be a module, possibly for a training program, on forming mass organizations in rural areas. It lays out steps for recruitment and organization, focusing on building grassroots support. Specific steps in the process are outlined in the text extract.

Full Transcript

CPP BARRIO MODULE Method of expansion is “Leap Frog”, initial contacts formed into CPP Document “Ang Hakbang-Hakbang Na Pagtayo at...

CPP BARRIO MODULE Method of expansion is “Leap Frog”, initial contacts formed into CPP Document “Ang Hakbang-Hakbang Na Pagtayo at Grupong Tagapag-ugnay sa Baryo Pagtatag ng Saligang Organisasyong Masa sa (GTB) or Barrio Liaison Group (BLG) Kanayunan”  Ranging From 3 to 10; STEPS IN THE INFILTRATION OF A BARRIO  Organized into a BLG; 1. Recruit initial contacts  BLG assist SLT in conducting propaganda and 2. Establish Grupong Pang-organisa ng Baryo establishing link with the masses; (GPB) or Barrio Organizing Group (BOG) (If  Life span of BLG is from 1 week to 1 month method is not “Leap Frog”) ESTABLISHMENT OF GRUPONG PANG-ORGANISA NG 3. Establish Komiteng Pang-organisa ng Barrio BAYAN (GPB) OR BARRIO ORGANIZING GROUP (BOG) (KPB) or Barrio Organizing Committee (BOC) 4. Establish Basic Party Unit (Sangay ng Partido sa  From initial contacts – Lokalidad (SPL) or Local Party Branch (LPB) 5 to 7 qualified and willing 5. Establish People’s Militia or Milisyang Bayan elements are selected to (MB) members of GPB/OG in a sitio; 6. Establish Ganap na Samahang Masa (GSM) or  GPB/OG in a sitio Mass Solid Organization (MASSO) normally know each other; 7. Establish Komiteng Rebolusyonaryo ng Baryo  At this stage, (KRB) or the Barangay Revolutionary recruitment & training of mass activist starts; Committee (BRC)  Not dissolved even a KPB/POC has been established;  Peasant OG (GPM) organized first then Women OG (GPKBB) and Youth OG (GPKBT) RECRUITMENT OF INITIAL CONTACTS TASK OF GRUPONG PANG-ORGANISA NG BAYAN OR 1. Product of Mass Work from another barrio ORAGNIZING GROUP 2. Friends, Family members or former neighbor of a Fulltime NPA  Convince the masses in respective sector to 3. Clear Background participate in the revolution 4. Good Reputation  Launch and lead initial mass struggles in the 5. Accept the Revolution area  Assist NPA in the conduct of social investiagion TASK OF CONTACTS and class analysis (SICA) 1. Initial propaganda and social investigation and  Assist in intel gathering, serve as guide and class analysis procure supplies 2. Link NPA to sectors organized  Start influencing the Bgy Council, Tanods, PTA, 3. Assist initial propaganda for the masses etc 4. Give info on the AFP/PNP and undesirable ESTABLISHMENT OF KOMITENG PANG-ORGANISA NG elements BARYO (KPB) O BARRIO ORGANIZING COMMITTEE 5. Guide in going in and out the barrio (BOC) ESTABLISHMENT OF GRUPONG TAGAPAG-UGNAY SA  Compose of at least 12 Advance Activist BARYO (GTB) OR BARRIO LIAISON GROUP (BLG)  Basic Conditions for Establishment:  KPB is headed by a Chairman, assisted by a - 3 – 4 GPB/Ogs exist in Vice-Chairman the entire barrio;  KPB members remain - 6 months since first as members of the GPB was established in GPB/POG the barrio;  KPB and OG Members are not allowed to surface to - Prospective members prevent exposure of KPB/OC started  Leadership of KPB study of masscourses; remains underground and in - SICA had been their respective GPB/OG completed  Composition of 12-16 members  Sub-committees (Organization, Education, Economy, Health and Defense) TASK OF KOMITENG PANG-ORGANISA SA BARYO O ESTABLISHMENT OF SANGAY NG PARTIDO SA BARRIO ORGANIZING COMMITTEE LOKALIDAD (SPL) OR PARTY BRANCH (PB) 1. Lead GPB/Ogs in mass mobilizations PARTY BRANCH 2. Establish additional OGs in the sitios 3. Assist OGs in making plans  Necessary to establish upon reaching the stage 4. Assist in the formations of labor teams of KPB/POC to ensure that a party is leading the mass movements and links with the masses are strengthened 5. Give lessons on mass courses with the help of  Composed of at least 9 members (3 each from qualified instructors party groups of peasant, women and youth 6. Conduct in-depth investigation on problems of  Members of the PB remains as members of the masses their respective SOM/BMO 7. Strive to influence the entire Bgy Council ESTABLISHMENT OF MILITIANG BAYAN (MB) OR ESTABLISHMENT OF KOMITENG PANG-ORGANISA NG PEOPLE’S MILITIA BARYO (KPB) O BARRIO ORGANIZING COMMITTEE (BOC) TASK OF MILITIANG BAYAN (MB) OR PEOPLE’S MILITIA (MB) 1. Lead in maintaining revolutionary peace and 6. Members understand the policies in the order, secure revolutionary forces in the barrio. conduct of elections 2. Perfom duties as ordered by the party of an 7. The GSM/MASSO is formally organized via a NPA command in line with military plans and conference of the Barrio Chapter attended all operations of red fighters registered prospective members; A Komiteng 3. Assist in training self-defense units. Balangay (KB) of the GSM/MASSO composed of 16 members will then be elected by secret ESTABLISHMENT OF GANAP NA SAMAHANG MASA balloting; (GSM) OR FULLPLEDGE MASS ORGANIZATION/MASS 8. GPB/Ogs in the sector where GSM/MASSO has SOLID ORGANIZATION (MASSO) been established are dissolved; the Grupong Balangay (GB) is set up and placed under the KB; 9. GBs are organized in each subdivision of the barrio (sitio or cluster of houses; 10. KBP/OC is also dissolved at this stage. ESTABLISHMENT OF KOMITENG REBOLUSYONARYO NG BARYO (KRB) OR BARRIO REBOLUTIONARY COMMITTEE (BRC) 3 INSTRUMENTS OF REVOLUTION IN THE BARRIO 1. PEOPLE’S MILITIA CONDITIONS FOR ESTABLISHMENT OF GSM/MASSO 2. PARTY BRANCH 1. Almost all people in the sector participates in 3. BARRIO REVOLUTIONAY COMMITTEE (BRC) the mobilizations and willing to join the TWO OTHER METHODS IN ESTABLISHING SOM IN THE GSM/MASSO; BARANGAYS: 2. Other sectors are at least in the KPB level; 3. Those joining the GSM/MASSO have studied 1. Reactivation – Re-establish SOM or SPL in bgys mass courses; previously under CTM influence. 4. SICA completed in the barrio; Steps: 5. There is a minimum of 3 party members in the sector who can be formed into a party 1. Investigate history of mass work group/branch; 2. Complete SICA 3. Contact and hold meetings with former misinformation to shape and/or reshape SOM/SPL members messaging in its favor. 4. Mobilize members and mass activists to re- PHILIPPINE SETTING: establish BRCs 2. Recovery – Reorganize masses in abandoned GOALS: barrios under control of government forces.  deflect criticism Steps:  shape opinion 1.Form special YGM of capable and fully armed DTs  confuse target audience  undermine rivals 2.YGM to break terror or fear in the masses and regain  depict China as responsible stakeholder trust of the masses MEDIUMS: 3.Implement reactivation process  traditional diplomacy  proxies CHINA’S GEOPOLITICAL THREAT  social media  cooperation with legitimate media outlets TWO SCHOOLS OF THOUGHT THEMES:  China’s Rise is Peaceful - will replace or has already replaced the US as the world’s leading  encourage fearful mindset among Filipinos superpower. through threats of looming war;  China’s Rise is Threatening - Territorial  reject cooperation with nations who Disputes support the rules-based order  Disinformation - Cognitive Warfare  cultivate an image of an incompetent  Unfair Trade Practices - Economic Coercion government  Espionage - Cyber Intrusions.  promote need for a new leader attuned to China’s strategic interests TERRITORIAL DISPUTES CHINA AND COGNITIVE WARFARE (CW)  China is embroiled in numerous territorial disputes to include:  defined by NATO as an act aimed at  South China Sea/West Philippine Sea altering people’s perceptions and way of  East China Sea thinking, with the end goal of realizing a  Line of Actual Control strategic interest or agenda  Taiwan ACHIEVING VICTORY WITHOUT WAR” DISINFORMATION  China has placed CW’s importance on par with other domains of conflict--land, air,  The World Economic Forum has ranked sea, cyber, and space--believing it key to disinformation as the second highest global risk “victory without war” likely to threaten governments in 2024 aside from extreme weather which topped the list.  China is undertaking both overt and covert operations as part of a global influence campaign, using disinformation and STRATEGIES: SLEEPER CELL/ESPIONAGE CONCERNS:  Information Disturbance – using  Rise in cases of Chinese espionage globally legitimate social media accounts (Global  Philippine Setting Times, Xinhua News, and CGTN) to  Concerns coincide with the rise in Chinese influence a target audience’s view of a espionage cases globally involving those who situation; have entrenched themselves in societies as  Discourse Competition – spreading seemingly harmless individuals narratives aimed at “fueling the flames” of  China’s civilian-military fusion adds impetus for existing biases; concern given the difficulties in recognizing and  Public Opinion Blackout – flooding social confronting harmless activities from those with media with a specific narrative to stamp malicious intent. out alternative views and news; and PRE-POSITIONING OF INVESTMENT TARGETING  Block Information – controlling CRITICAL INFRASTRUCTURE/POLITICAL SYSTEM: adversaries flow of information using popular digital applications (APPS) such as  Investigations to determine the true identity of X/Twitter and TikTok. Bamban, Tarlac Mayor Alice Guo has raised concerns that Chinese assets are now being UNETHICAL TRADE PRACTICES: used to gain a foothold in the country’s political COPYRIGHT INFRINGEMENTS system  Philippines government targeted by  Apple Ipad/Iphone/Macbook China-based hackers.  Legos  BMW/Tesla/Honda/Dunlop BRIEFING ON THE SOUTH CHINA SEA/WEST  Jordan Brand/Polo RL PHILIPPINE SEA  Fendi/Hermes/New Balance Geographic Scope of the South China Sea / West OVERCAPACITY Philippine Sea  Oversupply of Chinese goods leading to export “Asia-Pacific” or “Indo-Pacific” region of products at low prices  World’s most populous geographic region  electric vehicles  solar panels  Composed of the FORCED TECHNOLOGY TRANSFER IN EXCHANGE OF  Pacific and Indian Oceans DOING BUSINESS  South China Sea(SCS) and East China Seas, and  Reverse Engineer Technology other smaller waterways  Intellectual Property Theft  An estimated 4.3 billion people ECONOMIC COERCION: Geographic Scope of the South China Sea/West  Manifested through trade and tourism Philippine Sea restrictions Administrative Order No. 29, s 2012  Philippines subjected to such practices in the past due to WPS dispute.’ Naming the WPS of the republic of the Philippines South China Sea/West Philippine Sea  Almost 15 percent more than the 175,784.73 metric tons recorded in 2022 SCS  According to the UP-Marine Science Institute,  A marginal sea bordering the Pacific Ocean and about 1,850 hectares (has) of reef ecosystems semi-enclosed by archipelagoes have been destroyed in the KIG and BdM--  An important Sea Lane of Communication resulting in a loss of about Php33.1B per year spanning some 3,500,000km2 Bajo de Masinloc (Scarborough Shoal / Panatag Island) Importance of the South China Sea/  Classified as a Rock within the EEZ (but not the West Philippine Sea KIG) and designated as a Traditional Fishing  Around 1/3rd of the world’s global shipping Ground by the 2016 Arbitral Award passes through the SCS  Allows Chinese, Vietnamese, and Filipino  40 percent of the world’s oil and natural gas; fishermen to operate within its Territorial Sea about 33 percent global maritime trade by  The area falls within China’s illegal “10-dash” volume and almost 60 percent by value line  90 percent of Chinese, Japanese, and The Philippine Rise South Korean oil imports  A completely submerged 35,000 km2 seascape  Over half the world’s fishermen, and trade with Benham Bank as the largest underwater worth between US$3.4T to US$5.3T traverses feature the disputed waterway  Inside the EEZ and has an Extended Continental West Philippine Sea Shelf West Philippine Sea (WPS)  China named about five undersea features in  200NM Exclusive Economic Zone (EEZ) in the the Area despite a UN-mandated body western seaboard, the Luzon Strait, Bajo de recognizing that Manila has sovereign rights in Masinloc (BdM), and the Kalayaan Island Group the EEZ, Continental, and Extended Continental (KIG) Shelf  The WPS spans about 914,196km2 which Recto Bank includes the maximum extent of the EEZ on the  Completely submerged feature in the KIG, with west coast plus the KIG Reed Tablemount as the largest undersea  The length of the Philippines’ approximate feature in the SCS (8,866km2 or almost 14 coastline facing the WPS measures about Metro Manilas) 3,835km  Covered by Service Contract 72 and has an Quick Figures estimated 2.5 billion barrels of oil and 25.5 trillion ft3 of natural gas  According to the Bureau of Fisheries and Aquatic Resources reported that the  The area falls within China’s illegal “10-dash” Philippines’ fisheries output in the WPS in 2023 line reached 201,894.49 metric tons Philippine Stations in the West Philippine Sea 406NM NW OFF PPC, PALAWAN  The Philippines has 9 stations LAND AREA: 15 HA  All of which are part of the Kalayaan Island OCCUPIED: 1971 Group and under the Municipality of Kalayaan STATUS: ROCK PHL Stations in the WPS Parola (Northeast Cay) Island MARITIME ENTITLEMENT: TERRITORIAL SEA 244NM DISTANCE TO NEAREST SHORELINE AND CONTIGUOUS ZONE 447NM NW OFF PPC, PALAWAN PHL Stations in the WPS Lawak (Nanshan) Island LAND AREA: 15 HA 146NM DISTANCE TO NEAREST SHORELINE OCCUPIED: 1971 304NM NW OFF PPC, PALAWAN STATUS: ROCK LAND AREA: 4.9 HA MARITIME ENTITLEMENT: TERRITORIAL SEA OCCUPIED: 1970 AND CONTIGUOUS ZONE STATUS: ROCK PHL Stations in the WPS Pag-asa (Thitu) Island MARITIME ENTITLEMENT: TERRITORIAL SEA 230NM OF NEAREST SHORELINE AND CONTIGUOUS ZONE 400NM NW OF PPC, PALAWAN PHL Stations in the WPS Likas (West York) Island 30 BUILDINGS 198NM DISTANCE TO NEAREST SHORELINE 80 FAMILIES (As of May 2024) 375NM NW OFF PPC, PALAWAN LAND AREA: 32.6 HA LAND AREA: 25 HA OCCUPIED: 1971 OCCUPIED: 1971 STATUS: ROCK STATUS: ROCK MARITIME ENTITLEMENT: TERRITORIAL SEA MARITIME ENTITLEMENT: TERRITORIAL SEA AND CONTIGUOUS ZONE AND CONTIGUOUS ZONE PHL Stations in the WPS Panata (Lankiam Cay) Island PHL Stations in the WPS Patag (Flat) Island 237NM DISTANCE TO NEAREST SHORELINE 149NM DISTANCE TO NEAREST SHORELINE 398NM NW OF PPC, PALAWAN 336NM NW OFF PPC, PALAWAN LAND AREA: 1.3 HA LAND AREA: 1.35 HA OCCUPIED: 1978 OCCUPIED: 1977 STATUS: ROCK PHL Stations in the WPS Kota (Loaita) Island MARITIME ENTITLEMENT: TERRITORIAL SEA AND CONTIGUOUS ZONE 212NM DISTANCE TO NEAREST SHORELINE PHL Stations in the WPS Rizal (Commodore) Reef ensure a unified, coordinated and effective governance framework for maritime security 101NM DISTANCE TO NEAREST SHORELINE and domain awareness 269NM SW OFF PPC, PALAWAN  NCWC Secretariat was renamed as the LAND AREA: 7 HA Presidential Office for Maritime Concerns which provides consultative, research, OCCUPIED: 1977 administrative and technical services to the PHL Stations in the WPS Ayungin (Second Thomas) NMC Shoal  The Philippines continues its whole-of- 110NM DISTANCE TO NEAREST SHORELINE government approach to address SCS concerns through the National Task Force for the WPS 264NM N OFF PPC, PALAWAN (NTF-WPS) OCCUPIED: 1999  The NICA is chair of the Intelligence Fusion STATUS: LOW TIDE ELEVATION Working Group of the NTF-WPS and conducts its own operations in the area MARITIME ENTITLEMENT: NONE  Monitoring of the WPS was drastically Government Actions in the West Philippine Sea improved in 2021 with the inclusion of space- based monitoring along with existing detection President Ferdinand Marcos platforms  Expressed his support for the 2016 Arbitral The Department of Foreign Affairs (DFA) Award  Continues to file diplomatic protests and  Urged the UN General Assembly in September revealed that it filed a total of 153 protests 2022 to abide by the UNCLOS and the peaceful against China under the PBBM administration settlement of disputes  20 protests filed against China in 2024 January 2023 Marcos’ state visit to Beijing Scientists of the UP-Marine Science Institute (UP-MSI)  He brought up Manila’s fisheries concern regarding the Mainland’s intervention on the  Conducts successful Marine Scientific Research fishing activities of Filipino fishermen in the expeditions to the WPS and officially WPS re-opened the Pag-asa Islands Research Station (PIRS) on  Resulted in talks to create a communication 25 October 2021 mechanism for maritime issues between the DFA and China’s Ministry of Foreign Affairs and  The PIRS was left abandoned since 2015 and the resumption of discussions on joint oil and was turned into a barracks before funding from gas talks in the SCS/WPS the national government was made available for its rehabilitation March 2024 Scientists of the UP-Marine Science Institute (UP-MSI)  Pres. Marcos Jr. signed EO 57 which renamed and reorganized the National Coast Watch  Established a Reef Monitoring Station on Council (NCWC) to the National Maritime Ayungin Shoal to collect information to help Council to formulate policies and strategies to protect the marine environment For the NICA  Zamora (Subi)  WPS-related operations are spearheaded by  While not part of the WPS, China still has the DIV and is focused on 19 occupied-features in the Paracels  Increasing maritime domain awareness China | Zamora (Subi) Reef  Improving the living conditions on the various stations in the KIG  Other initiatives designed to promote Philippine interests in the WPS China | Panganiban (Mischief) Reef Other Claimants and their Holdings China China’s illegal “10-dash” line  Encompasses about 85 percent of the SCS and all of the WPS China | Kagitingan (Fiery Cross) Reef  Based on historic claims  Debunked by the Arbitral Award and is not recognized by China largely due to Beijing’s Insistence on historic claims Concerns Related to China Attempts to give its reefs and rocks the same  Swarming of Chinese fishing vessels (CFVs) and entitlements as islands, intention to draw Chinese Maritime Militia (CMM) in the archipelagic baselines on its so-called island groups called “Four Sha”  Pag-asa Islands Attempts to limit freedom of navigation and  Recto (Reed) Bank overflight in the SCS  Julian Felipe (Whitsun) Reef in the Pagkakaisa  Seven occupied features (Union) Banks  Four in the EEZ Concerns Related to China  Burgos (Gaven)  Conduct of illegal Marine Scientific Research (MSR) in the WPS and the eastern seaboard;  McKennan (HUghes)  Arbitrary harassment of Filipino fishing boats  Mabini (Johnson) (FFBs) by the China Coast Guard (CCG) in  Panganiban (Mischief) Bajo de Masinloc  Three within the KIG  Harassment of resupply efforts to Ayungin Shoal;  Calderon (Cuarteron)  Kagitingan (Fiery Cross)  Increasing militarization of the WPS, sighting of  Largest naturally-occurring feature in the WPS People’s Liberation Army (PLA) vessels, planes,  Not claimed by the PHL; only by China and and drones Taiwan  Implementing laws contrary to UNCLOS  1.2km runway  Annual fishing ban (affects CFVs in BdM);  Garrisoned by Taipei’s Coast Guard  Maritime Police Law in February 2021 ; Administration (CGA)  Maritime Traffic Safety Law in September  Status: ROCK 2021;  Maritime Entitlement: Territorial Sea and  New measures to fine foreign fishing vessels in Contiguous Zone China-claimed waters in November 2021; Taiwan | Pratas (Dongsha) Islands  CCG to detain foreigners suspected of illegally  Taiwan-controlled, China-claimed crossing borders in May 2024  265NM from Ilocos Norte, has a 1.5km runway  Issuing threatening radio challenges and firing flares  Garrisoned by the Taiwanese Navy (including about  Putting “dual-use” facilities on its military bases 500 marines) (runways, radar stations, hospitals, sheltered ports etc); Taiwan  Dangerous maneuvers against Philippine  Concerns with Taiwan relate to the lack of government vessels and aircraft (e.g. laser fisheries delimitation with the Philippines and incident) non-participation in ASEAN-China talks on the SCS due to the self-ruled Island’s status as a  Chinese rocket debris have fallen in the WPS non-country and archipelagic waters more than six times since 2022  Taiwanese fishing, CGA, and MSR vessels are periodically sighted in waters off Batanes and  Placing a scientific buoy, an Ocean-Bottom the Philippine Rise Seismometer, removing payaos and placing barriers in BdM;  Taiwan rejects the Arbitral Award and casts doubt on COC talks due to its  Opposition to oil and gas activities in Service non-participation Contract 72 in Recto Bank; Vietnam | Lagos (Spratly) Island  Possible reclamation of BdM and occupation of Pag-asa Cay 2 (known in China as “Sandy Cay”);  Fourth largest naturally-occurring feature and  Has a 1.2km runway and Sheltered Port  Standoffs in the SCS with Vietnam in 2019, with Indonesia in 2019, 2020, and 2021, and with  Status: Rock Malaysia in 2020  Maritime Entitlement: Territorial Sea and Taiwan | Ligaw (Itu Aba) Contiguous Zone Vietnam | Pugad (Southwest) Vietnam | Bailan (Sand) Cay Pawikan (Investigator) Shoal Vietnam | Hizon (Pearson) Reef Mariveles Reef Construction of a marina or harbor Brunei Vietnam | Binago (Namyit) Island Vietnam | Lopez  Does not operate any occupied feature but a Jaena (Pigeon/Tennent) Reef segment of its EEZ overlaps with the KIG Vietnam also criticizes the Philippines for  Closely coordinates with Malaysia on improvements done in the Pag-asa Islands SCS-related concerns  Vietnam maintains irregular maritime militia May 2024 forces to support Hanoi’s interests along its  PH, Brunei agreed to enhance maritime coast line and claimed waters cooperation during the state visit of  Divided into the full-time Vietnam Maritime President Ferdinand Marcos Jr Militia (VMM) and part-time  Pollution Self-Defense Forces (SDF)  Skills training  VMM and SDF units are supported by the national and local governments and form part  Research and information sharing of Vietnam’s grey-zone strategy in the SCS Indonesia  Vietnam operates Vietnam Fisheries Resources  Increased encroachment of CCG and CFVs in Surveillance (VFRS) vessels the North Natuna Sea  Akin to the Philippines’ BFAR--alongside  2019, CCG began to escort CFVs Vietnam Coast Guard and Vietnam People’s  2020, CCG started to operate without CFVs, Navy vessels0 prompting a standoff between Jakarta and Malaysia | Celerio (Swallow) Reef Beijing  Island base and has an almost 1.4km runway 1982 UN Convention on the Law of the Sea  EEZ overlaps with the Philippines and it 1982 UN CONVENTION ON THE LAW OF THE SEA undertook MSR activities in the WPS in 2019  Ratified by all 151 parties, including the  Tourist destination as the features hosts the Philippines and China in 1994 Layang-Layang Airport (1.3km) and dive resort  The US is not party to the Convention but calls featuring a 3-star hotel (open from March to on states to adhere to it August each year  UNCLOS outlines the different maritime  Has a marine research station entitlements that features have Malaysia  Map names of features do not always follow Antonio Luna (Ardasier) Reef their UNCLOS counterparts Gabriela Silang (Erica) Reef  The Pag-asa Islands is a “Rock”  Fiery Cross “Reef” is a “Rock”  Mischief (Panganiban) Reef is considered as a NATO, and EU member-states all acknowledge “Reef” the Award’s validity UNCLOS Maritime Zones Other Agreements, Confidence-Building Measures 2009 Philippine Archipelagic Baselines Law 2002 Declaration on the Conduct (DOC) of Parties in the SCS  Affirms that the Philippines has dominion, sovereignty and jurisdiction over all portions of  Non-binding the national territory as defined in the  ASEAN-led initiative to help reduce tensions in Constitution and by provisions of applicable the SCS laws including, without limitation RA 7160, also known as the Local Government  Formulated in the pre-2000s Code of 1991, as amended  Signed in 2002, and implemented in varying  This Act, together with the geographic degrees by 2011 coordinates and the chart and maps indicating the aforesaid baselines, has been deposited  Encourages parties to with the UN Secretary General and is consistent  Exercise self-restraint with the 1982 UNCLOS  Refrain from actions that complicate the 2016 Arbitral Award dispute and increase tensions  “9-dash” line was incompatible with the  Avoid occupying unoccupied features UNCLOS  Did not stop China from reclaiming and  Recognized China’s expanding its occupied features in the SCS  illegal occupation of Panganiban Reef  Did not stop China from reclaiming and  aggressive actions expanding its occupied features in the SCS  harm to the marine environment due to  Does not include the Paracels (claimed by VN reclamation and exploitation activities which and Taiwan, occupied by China) and the Pratas aggravated disputes (claimed by China, occupied by Taiwan)  Unable to rule on several issues such as the Code of Conduct (COC) in the SCS ownership of certain features and contained  Seen as a follow-up to the DOC several portions that undermined Philippine claims  COC is seen by some states as a means to reduce tensions and prevent further Chinese  Declaring BdM as a Traditional Fishing Ground aggression and expansion in the SCS rather than as solely exclusive for Filipinos  Parties have differing ideas on how to proceed  Stating that no islands exist in the SCS  The Philippines and Vietnam seeking to have a  Establishing Territorial Seas for certain Chinese binding and effective COC while other ASEAN and Vietnamese-occupied features non-claimants like Cambodia seek a  Over 40 states recognize the validity of the non-binding agreement Arbitral Award. To note, the Quad, AUKUS,  In October 2023, the third reading of the single  The 7th BCM was held in Manila in March 2023 draft negotiating text commenced The 8th BCM was held in China in January 2024.  Progress has been very slow with a Single Draft INTRO TO CLANDESTINE ACTIVITY Negotiating Text proposed in 2018 and a first reading was completed in 2019 and a second Clandestine activity is necessitated by two reading was scheduled (but not accomplished) circumstances: in 2021  the desire to do something.  Talks have since stalled due to the COVID-19 Pandemic, China’s insistence on an in-person  it cannot be done openly. meeting, and Beijing’s greater assertiveness in Characteristics of Clandestine Activity the SCS  Each individual must develop conspiratorial  Local and foreign experts note that China’s rush discipline. to conclude a COC, regardless of effectiveness  Evaluate every action in terms of its possible  Attempt by Beijing to show to the international relationship to the clandestine task. community that it is managing disputes without the “interference” of “external states”  Be inconspicuous/discreet. like the US, Australia, Japan, India, and the EU  Faithfully adhere to secure rules of conduct. Code for Unplanned Encounters at Sea (CUES)  Non-binding confidence-building measure for ORGANIZATION FOR CLANDESTINE ACTIVITY: navies to conduct themselves professionally and safely at sea OPERATIONAL ENVIRONMENT  Recognizes that ships must adhere to existing  Plans for clandestine activity must be based on maritime guidelines like the full appreciation of the limiting factors of the environment, which includes:  1972 International Regulation for Preventing Collisions at Sea (COLREGs) o the terrain  1974 Safety of Life at Sea (SOLAS) Convention o the climate  Only governs Navy ships, not coast o the local inhabitants guard nor militia vessels o the political situation Philippines-China Bilateral Consultation Mechanism o the economic situation Meeting (BCM) o the capabilities of opposition security  Twice-a-year meeting established in 2017 services  Supposed to allow both countries to reduce tensions and find avenues to cooperate without allowing the SCS dispute to dominate PRINCIPLES OF ORGANIZATION bilateral relations  democratic organization - members of the  The 6th BCM was virtually held in May 2021 organization determine to a greater or lesser degree what is to be done, how it is to be done,  STRONG-ARM - provides special protection and who is to do it. during dangerous phases of a clandestine operation; undertakes aggressive action in the  authoritarian (military) organization - once accomplishment of an assigned task and assist the general goal has been accepted by all in operations directed against target members, the head of the organization personnel. determines what is to be done and how.  PROVOCATEUR - An agent who induces an Basic Organizational Elements for Clandestine opponent to act to his own detriment by Operations: discrediting himself or by revealing his true purpose of identity; Provocation may also  THE SPONSOR - is the group, which, through divert the opponent from an intended its headquarters, supports and directs the objective. organization conducting the clandestine  DIVERSIONIST - A provocateur who attempts activity. to divert the attention of an individual or  THE TARGET - is the person, place or thing group from an objective. against which the clandestine activity is to be conducted. THE SUPPORT AGENT - engages in activities which  THE AGENT - may be classified according to supports the clandestine operation. his function within an operation whether as:  RESEARCHER - A person whose job involves THE PRINCIPAL AGENT discovering or verifying information for use in a reports, book, programs, etc.  he is the managerial agent.  SURVEILLANT - He observes personnel and  he is the leader of an agent network which places of operational interest. would normally be accomplished by the case  INVESTIGATOR - He procures information on officer. persons or things of operational interest.  he may be required to spot, investigate,  PROCURER OF FUNDS - He obtains special select, recruit, and handle agents. currency when needed for operational use. THE ACTION AGENT - is the "doer" of a clandestine  PROCURER OF SUPPLIES - Sometimes called task, and may further classified according to the task the purchasing agent, he procures ordinary as he is assigned like: well as critical operational supplies.  SAFEHOUSE KEEPER - He manages and  ESPIONAGE AGENT - Clandestinely maintains safe house for operational use such produces information and transmit it to this as meetings, safe havens, training and others. superior.  STORAGE AREA MANAGER - He arranges for  PROPAGANDIST - Undertakes to mold the storage, distribution or transportation of the attitudes, opinions and actions of an operational supplies. individual, group or nation.  COMMUNICATION AGENT - Secures efficient  SABOTEUR - Undertakes positive action and timely communication within the network. against an unfriendly power, resulting in the loss of the use of an article, material, facility, THE COMMUNICATION SYSTEM process or other physical resources.  It may be destined solely for the passage of  GUERILLA - A member of a paramilitary directives or information. group organized to harass the enemy in a not war situation.  In the case of escape and evasion line, it  DOCUMENT AND INFORMATION SECURITY - will have to be prepared to handle the Measures designed to prevent unauthorized movement of personnel. disclosure of classified information  In other cases, materials - weapons,  OPERATIONAL SECURITY - Measures designed sabotage supplies, radio sets and others to effectively protect our methods of may be handled. operations, sources of information and  Commo system must be planned and personnel operated in accordance with the requirement of the tasks to be done in such  COMMUNICATIONS SECURITY - Measures a way to insure proper management, designed to prevent classified information and timeless, continuity and security. documents from compromise. OPERATIONAL SECURITY TWO PROBLEMS IN OPSEC: SECURITY - is defined as measures adopted by  COMPROMISE - Takes place upon an individual, business, agency, or government disclosure or identification of intelligence to prevent espionage, sabotage, or attack. personalities, operations or operational techniques in such a way as to affect the OPSEC effectiveness of the collection effort.  Measures taken in conducting operations in a  HUMAN ELEMENTS – Inability to keep a secure and effective manner. secret.  Keeps adversaries from getting critical  Tension resulting from lack of contact for information on planned, ongoing and past a operations.  prolonged period of time.  Limited ability of the average human to TYPES OF ADVERSARIES: live a 1. Terrorists (DAESH/ISIS)  “double life”. 2. Criminals gangs  Common tendency to do things the easy 3. Organized Crime grp way. 4. Drug-Trafficking Groups  Limited ability to be objective. 5. Violent Activists  Physical, mental and psychological 6. Extremist Groups and Cults limitations. 7. Foreign Intelligence Services  Tendency to develop set patterns of 8. Insiders activity. ASPECTS OF SECURITY: ELEMENTS OF OPSEC:  PHYSICAL SECURITY - Measures designed to ELEMENT OF SURPRISE prevent physical access into an area of an  Keep the true mission secret unauthorized person.  Establish and maintain the exact  PERSONNEL SECURITY - Measures taken to timetable of action to be taken insure that only authorized personnel have  Plan carefully, and base the plan access to classified matter. on factual  Carefully evaluate the risk which  COMMUNICATION DEVICES - Are must be assumed to accomplish methods and devices designed to the mission. conceal and/or transmit operational and intelligence information from one ELEMENT OF CONSPIRACY link to another.  Consider every factor from the  CUT-OUT DEVICES - promotes the standpoints of its possible effect on avoidance of direct contact between the mission personnel or units in intelligence organization which impede  Maintain an outward of normality and investigation by the active opposition blend effectively with the existing by reducing the opportunity to environment observe direct contact.  Subordinate personal desires and  DEAD DROP - A secret location where feelings to the accomplishment of the materials can be left in concealment mission. for another party to retrieve. This eliminates the need for direct contact PROPER OPERATIONAL PLANNING in hostile situations.  Intelligence operation must be  LIVE DROP - the live drop is similar to conducted only when the objective the dead drop except that a person is cannot be attained by other means. used instead of an object.  SAFE HOUSE - An apartment, hotel  Operational plan must be based upon room, or other similar site considered detailed and factual knowledge of the safe for use by operatives as a base of environment in which the operation operations or for a personal will take place meeting/de-briefing.  Prejudice or enthusiasm should not BASIC OPSEC RULES: interfere with the process of rendering careful and considered a. Each member will have specific assignment judgment and decision. and will have no aggressive action outside his assignment.  Operational plan must provide a “way out” of the worst possible disaster. b. Each member will report as soon as possible anything that has gone wrong or anything  Operational plan must be as simple as suspicious. possible. c. Each member will be punctual and will OPSEC METHODS: observe all rules for contacting other  COMPARTMENTATION - It is the authorized personnel. establishment and management of a d. Each member will know what to do in case of clandestine organization in such emergency, will know the warning signals to fashion that persons in one be used, whom he is to warn, which contacts component know only what they need to drop. to know about the personnel, organization or activities of another component. e. Above all, each member must be thoroughly  Planning and Direction trained and briefed for the specific demands  Collection of his task.  Processing and Exploitation  Analysis and Production INTELLIGENCE CYCLE  Dissemination and Integration Difference / Definitions:  Evaluation and Feedback INFORMATION - is raw data from any source, data that may be fragmentary, contradictory, unreliable, ambiguous, deceptive, or wrong. REQUIREMENTS / OBJECTIVES / MISSION: INTELLIGENCE - is information that has been collected,  Initiates the Intelligence cycle to provide integrated, evaluated, analyzed, and interpreted. timely, accurate, appropriate and consumable intelligence / information to FINISHED INTELLIGENCE - is the final product of the make informed decisions. Intelligence Cycle ready to be delivered to the user.  There is no point in tasking, collecting, analyzing, and distributing intelligence products if there's no policy, issue, or CATEGORIES OF FINISHED INTELLIGENCE anticipated issue on the table.  BASIC INTELLIGENCE - provides the fundamental and factual reference material on a country or issue. CLASSIFICATION/CATEGORIES OF INTELLIGENCE REQUIREMENTS:  CURRENT INTELLIGENCE - looks at day-to-day events; and/or reports on new developments. PRIORITY INTELLIGENCE REQUIREMENTS (PIRS)  ESTIMATIVE - intelligence looks at what might happen; judges probable outcomes.  Those intelligence requirements for which a  WARNING INTELLIGENCE - gives urgent notice User has an anticipated and stated priority in that something might happen. the task of planning and decision-making (US DoD).  RESEARCH - intelligence is an in-depth study of an issue.  An Intelligence Requirement associated with a decision that will affect the overall success of  SCIENTIFIC AND TECHNICAL - intelligence is the command's mission planning or mission information on foreign technologies. execution (military).  Essential Tasks for Collectors and Analysts. THE INTELLIGENCE CYCLE PIR’S CHARACTERISTICS:  Process by which information is acquired, converted into intelligence, and made  Ask only one question. available to policymakers  Focus is on a specific fact, event, or activity.  Repetitive process used to produce  Provide intelligence required to support a intelligence from information single planning task, decision, or action.  Process by which information is converted  Can be satisfied using available assets or into intelligence and made available to users. capabilities. US ARMY FMI ESSENTIAL ELEMENTS OF INFORMATION (EEI) THE 6 PHASES OF INTELLIGENCE CYCLE:  items of information regarding the enemy and Spotting his environment that the user needs by a  process of locating, identifying, and gathering particular time. preliminary data on person or people who has  Data on enemy strength or characteristics potential value to the current operations, or used by a consumer to decide on a course of those that may take place at a later date. action. SPOTTING CRITERIA: OTHER INTELLIGENCE REQUIREMENTS (OIRS) ACCESS – position or location that enables the person  The items of information regarding the enemy to obtain information, data from files, records, and his environment which need to be documents, etc; collected and processed in order to meet the intelligence requirements of the user. PLACEMENT SPECIFIC ORDER REQUESTS (SORS)  state of being located in the target area, or organization; and,  Product of requirement analysis that are required of collection units or agencies in the MOTIVES / MOTIVATION form of orders or requests.  loyalties, possible inducements. SPECIFIC INTELLIGENCE REQUIREMENTS (SIR) INFORMANTS  Intelligence gaps that must be filled-in to  are those with limited access and poor reduce the uncertainties associated with the placement. successful execution of a specific COA.  An identified gap in intelligence holdings that ACTION AGENTS may be satisfied only by collection action, and that has been validated by the appropriate  are those with poor placement but with very requirements control authority. (DOD) high access.  The Analyst creates a (SIR) INVESTIGATION  Combining SIR with a Collector produces a Specific Order or Request (SOR)  Process of conducting checks and investigations of spotted persons to INTELLIGENCE OPERATIONAL CYCLE determine: Intelligence Operational Cycle’s Phases MOTIVATION: Incentive or drive that impels the Agent Mission to work for the operative.  Reasonable; MICE  With sensible suspense data (database); Material - need, greed, identification, career. Operational planning Ideological.  is determined by the user’s requirements; Coercion - extra-marital affairs exposure, sexual  the nature of the clandestine activity to be abnormalities, illegal activities (negative). engaged in is also determined by the user. Emotional – love, hate, envy, fear, revenge, vanity. KINDS OF AGENTS:  Development Approach - recruiter cultivates Candidate Agent as long as he thinks  DUAL AGENTS – individuals simultaneously necessary before trying to recruit. and independently employed by 2 or more  Combination Approach - one cultivates the friendly intelligence units / office; Candidate Agent another attempts the actual  INTELLIGENCE PEDDLER – individual who sells recruitment. information; and,  PAPER MILL – individual who, offers a mixture DEVELOPMENT OF RAPPORT of valid but outdated information, overt news,  Attending Skills - shake hand right away, or propaganda or sometimes outright any act of small courtesy or kindness. Ask fabrications. about how he is or his family. RECRUITMENT  Smile and Warmth - the first contact with another person is your face! Be warm, friendly AGENT RECRUITMENT and happy.  The systematic method for finding agents who  Matching and Mirroring - match the will meet intelligence or information needs. approximate characteristics of the other person to create alignment with them. Use Recruitment Steps: their lingo/terminology.  Assess the Candidate Agent;  Listen - this is the 'King' of all rapport building  Plan the approach; skills. Practice "conversational generosity" -  Develop rapport; don't speak more than 30% of the time (10-  Exploit the motives; and, 20% is optimal).  Cultivate and develop the right attitude.  Link Interests - Whenever possible, notice similar interests and be sure to talk about and CONSIDERATIONS PRIOR TO APPROACH: expand on it. People will be glad that you are so interested in it.  SUITABILITY – qualifications, motives, and other factors which make the Candidate Agent EXPLOIT THE MOTIVE (MICE) fit or appropriate for the objective’s accomplishment.  Material - need, greed, identification, career.  ACCESSIBILITY – Candidate Agent’s ability to  Ideological. place himself in the physical location of the  Coercion - extra-marital affairs exposure, target to perform the required information sexual abnormalities, illegal activities collection without detection or compromise. (negative).  SUSCEPTIBILITY to CONTROL – ability to  Emotional – love, hate, envy, fear, revenge, comply with or submit to discipline and vanity. control.  Cultivate and develop the right attitude. PLAN THE APPROACH TRAINING  Cold Approach - recruiter establishes contacts  Provide the general and knowledge and skills and attempts to recruit without proper to the Agent. cultivation.  Provides the agent with tools to do the job, stresses the importance of his tasks, bolsters his morale, and builds his self – confidence.  Employ tact during this situation.  Remember that the Agent is clandestinely BRIEFING working for you, and it should not look like  To provide the Agent with recent you are paying him for his betrayal. developments that may affect the operations.  General review of pertinent operational facts.  Provide detailed instructions on the task itself.  Be careful on the choice of words pertaining to financial matters. DISPOSITION OPERATIONAL TESTING  Determination of courses of action upon  information comparison; Agent’s completion of objectives /  Surveillance; requirements.  Admitted test;  Target test (make Agent to report on non – existent target); and, INTELLIGENCE AXIOMS AND TENETS  Known target test (make Agent to report on known target which the Case Officer or Agent These are facts that require no proof because truth of Handler already have). these statements is obvious. DISPATCH AND RECEPTION  Axiom 1 - Intelligence is crucial to internal security. It can provide warnings of threats, detailed knowledge of organizations, personnel plan and actions.  Axiom 2 - Intelligence is essential to all types of operations.  Axiom 3 - Intelligence is the responsibility of all intelligence agencies.  Axiom 4 - Intelligence of the government must COMMUNICATION be superior to that of the enemy. THE TENETS OF INTELLIGENCE  The frequency and mode of transmitting information is based on maintenance of  Are the fundamental standards against which security, except for real-time or that performance of intelligence personnel and information that needs to be timely organizations must be judged. transmitted or reported.  A failure to achieve any one of these  Security of the Agent and of the operations is fundamental attributes may contribute to a of paramount importance. failure of operations. DEBRIEFING TIMELY - Intelligence must be available when the user requires it. Late intelligence is as useless as  Act of extracting from an Agent maximum no intelligence; Timely intelligence enables the amount of pertinent and useful information user to anticipate events in the operational obtained on a collection mission. environment for maximum effectiveness and to PAYMENT avoid being surprised. ACCURATE COVER and UNDERCOVER  Intelligence must be objective. It must be free COVER from any political or other constraint and  Protective guise used by a person, must not be distorted by pressure to conform organization or installation to prevent with the positions held in the higher echelons detection and investigation of clandestine of authority or command. activities.  Intelligence products must not be shaped to  one of the primary means to insure the conform to any perceptions of the user’s security of people, groups, installations and preferences. actions.  Intelligence is a factor in determining policy PERSONAL COVER - enables an individual to and decision, policy and decision must not engage in clandestine activity. determine intelligence USABLE - Intelligence must be tailored to the The selection and preparation of cover will be specific needs of the user and provided in forms determined by: suitable for immediate comprehension; The user or commander must be able to quickly apply  sensitivity of the operation; intelligence to the task at hand.  accessibility of the target;  the degree of accessibility desired; COMPLETE  the individual’s age, sex, marital status,  Complete intelligence answers the user or education, business or professional commander’s questions about the issue or experience, interests, hobbies, personality adversary to the fullest possible; what remains traits, financial status. unknown.  Intelligence must identify all the threats and COVER - may be either light or deep adversary’s capabilities. It must inform the depending upon the degree of backstopping; user or commander of the possible COA that refers to person, records, or events that are available to the threat groups and confirm a cover explanation. adversary. BACKSTOPPING - Light cover would be RELEVANT insufficient to conceal the individual’s  Intelligence must be relevant to the planning intelligence connections after routine and execution of the operation at hand. It investigation. must aid the user or commander in the accomplishment of the DEEP COVER - is a state of being that can requirements/objectives/mission. withstand extensive investigation without  It must contribute to the commander’s revealing the individual’s intelligence understanding of the threats and adversary, to connections. decide how to accomplish the assigned mission or of what is required. Natural or Artificial Cover:  NATURAL COVER - portion of the cover story which is factual;  ARTIFICIAL COVER - the fictional portion of of command, resulting in each member being the cover story. responsible to an immediate superior. COVER CATEGORIES: 1. Be inconspicuous. Merge into the background, appear natural; be a good citizen COVER FOR STATUS - means for the individual and avoid violating laws or customs. Don’t to be in a place or area and allows him annoy your neighbors. properly to account for his presence with 2. Be alert. ODEX: faces, places, details of plans proper documentation and a normal and instructions. appearing occupation. It is usually a mixture of 3. Keep informed. Know your enemy’s methods truth and fiction. and personnel. Be abreast of regulations, COVER FOR ACTION - Enables or makes it 4. Guard against exposure of incriminating possible for the individual to engage in material. Don’t write down names, addresses, clandestine activity by making it a part of his and telephone numbers of your contacts. normal, legal activity. Check your things. 5. Watch the security of living and working GROUP COVER - is necessary if operational quarters. Watch your conversation, your personnel must associate with one another in phone calls, your notes and other documents. performing their clandestine tasks. Picnics, Don’t ignore your servants, roommates, card games, birthday parties, music festivals, neighbors, friends, also relatives. art appreciation get-together, etc., have been 6. Know yourself. Self-discipline is essential. used as cover for group meetings. Know your strengths and weaknesses – what you can and cannot do customs, and gossip. ORGANIZATIONAL COVER - Used to Study information bearing on your work. camouflage and protect operational personnel 7. Be obedient. Obey orders to the last details. and their activities, and to protect installations Plan in advance. Plan for possible in which the clandestine activities are based. emergencies, with alternate plans before the emergency arises. COVER STORY - Is a plausible explanation for ORGANIZATIONAL or UNIT SECURITY - refers to an operative or participant in a clandestine security of structure and requires compartmentation activity his presence in the area. to insure that people in one component know no more than they need to know about other COVER CONVERSATION - Prior to the meeting components. or operation, the participants must agree on a conversation that they will engage in, but PERSONAL MEETINGS - Any face – to – face contact which will have no operational significance to between two or more members of clandestine net. safeguard against the possibility of  Important considerations in any PM plans are: compromise.  Location; PERSONAL SECURITY - each member of the group is required to protect his own security  Time (Date, Time, Duration); at all time. The organization must be set up  Cover Story; securely, preferably through a clear-cut chain  Cover Conversation;  Signals;  Risks of Detection; and, Emergency Means of Departure PARANOIA  An instinct or thought process that is believed to be heavily influenced by anxiety or fear, often to the point of delusion and irrationality.  Paranoid thinking typically includes persecutory beliefs, or beliefs of conspiracy concerning a perceived threat towards oneself. COVERT INFLUENCE OPERATIONS 6 PRINCIPLES OF COVIN: ANALYSIS OF OBJECTIVES 1. Determine whether objectives are:  Clandestine action;  Hides the hand of the government; REALISTIC, ACHIEVABLE, SUFFICIENTLY, RESOURCED  In support of a policy objective; MEASURABLE  Designed to influence people/events 2. Establish a timeline;  and change their behavior  Must have discernible and 3. Differentiate between short term and longterm  measurable results; objectives;  Accomplished over time; 4. Anticipate unintended consequences; To change or manipulate the actions of a 5. Define success; specific/predetermined target……. without a direct and obvious connection to that target… 6. Ensure end state is consistent with Strategic Objectives; Disrupt targets that are difficult or impossible to defeat by traditional means. ANALYSIS OF OBJECTIVES STRATEGIC vs OPERATIONAL OBJECTIVES National Goals for enhancing the security of the country’s citizens  Objectives must be actionable  Use Action Verbs  Do not use Analysis Verbs Ex. Majority of the target for recruits in a specific community are young men, wherein their real influencers are their mothers. Hence, target audience are the mothers of the potential recruits. Target Audience Selection Ultimately, select target audience based on the following: -Position Why is COVIN clandestine? -Power (power of mothers) -to protect the sponsoring govt or institution -Personality (charismatic) -to protect the case officer from danger physical or legal -networks/connections -to protect the clandestine methods used in ops (which ones have a wider network?) Why clandestine? Prioritizing Target Audience why is it impt to hide the role of the govt influence ops? -Suitability bias, lessen the effect, self-serving, unintended consequences. -Susceptibility IDENTIFY YOUR TARGET AUDIENCE: -Impact 1) ANALYSE your operational objective/s. -Analyse 2) LIST down all potential target audiences. Target Audience Selection 3) RESEARCH and ANALYSE target audiences. ⁃Who is the most capable of advancing the operational objective 4) PRIORITIZE. ⁃How are decisions communicated within the group? Remember: TARGETED AUDIENCE ⁃Historical grievances - small, targeted ⁃Motivations Target Audience Selection ⁃Cultural sensitivities Analyse Objectives ⁃Cultural traditions or practices Identify individuals or groups who will have the ⁃Vulnerability to influence (and why) most impact THEMES/MESSAGES If we can win a small group then they can do the ⁃ Key element in moving a target to take action work for us ⁃ Can come in many different forms ⁃ Convey a theme that moves the target audience to change their behavior ⁃ single theme = part of a broader integrated campaign Words are important, but choice of words is critical Slogans, songs, cartoons, pictures can all convey a message (important for society with low literacy) Analysis of Themes: But.. ⁃ How will it affect the target audience? Do not confuse dissemination vehicles with messages. (write ⁃ how will it affect others (unintended consequences)? the words out, images are not the message) ⁃ will the message reach the target audience? (will it An image is usually a dissemination vehicle for a resonate or inspire action) message. ⁃ Will the target audience understand it? THEMES/MESSAGES is a set of words that conveys the ⁃ will the target audience accept it? reason that will induce influence over the target audience ⁃ will the change in behavior be the one we sought? 1. Do not fall in love with your own message. EXAMPLES OF DISSEMINATION VEHICLES 2. Test your messages with other people. EXAMPLE: A message must be linked to your objective Leaflets/Posters offer some type of benefit to the target audience Social media posts Dont intimidate - be careful with taboos Reading materials Treat religion with care Radio/newspaper columns Treat innocent people with care Text blasts/Email Dont ridicule the target audience Community Engagements through avoid insults Forum/Assemblies/Symposiums/etc. Sermons/Lectures Rumors “Night Letters” A tactic employed by the Taliban and other extremist groups to discourage cooperation with foreign forces. Distributed at night. INFLUENCE AGENT Influence Agent? A Person recruited to transmit the message to the target audience A person recruited for his/her connections in the community A person with credibility who can convince others of the benefits of a specific course of action MEASURE OF EFFECTIVENESS: Different from a source/action agent. Ensures that the message was received and the Influence Agent message changed the behaviour of the target audience. Difficult to quantify and confirm MOEs are not always obvious Be creative! Be alert! A negative action can also be a significant measure of effectiveness Operational Obj: Reduce Sympathizers.. Vehicle: Leaflets/posters MOP: - Photos of people distributing posters/leaflets. MOE: -Increase in the number of residents that are relocating. MEASURE OF PERFORMANCE: - Survey results: decrease in the number of  Ensures that the message was sent and people supporting extremist ideals (must have a received by the target audience. benchmark survey)  Ensures that the message was received and the message changed the behaviour of the target ISLAMIST MILITANCY audience Pillars of Islam Shahada (Profession of faith) Šaum (Fasting) It is the most significant manifestation of Islamic faith and unity Zakat (Alms-giving) HISTORICAL TIMELINE (Islam’s Alleged Decline) Šalat (Prayer) Islam 1492 – Now: Beginning of Militancy Hajj (Pilgrimage) Ottoman Caliphate It is the duty of every Muslim to observe these pillars - Ottomans are Turks Shahada (Profession of Faith) - European outlook and focus Islamic Creed  Decline of Islam In reciting the Shahada, a Muslim bears witness that Allah is the only true god and that Muhammad is Allah’s - Some Muslims objected to the way Islam was applied prophet - Some Muslims sought a pure form of Islam Saum (fasting)  Islamist Revival An act of worshiping Allah by guarding one’s self  End of the Caliphate against selfishness, sensual and carnal desires - Turkey got involved in a European War (First World Conscious abstinence from food, drink and sexual War) intercourse from dawn to dusk for the purpose of - Turkey lost worship - Post-war secular Turkey abolished the caliphate Zakat (Alms Giving)  Upheaval in the Muslim World Obligatory payment made annually under Islamic law on certain kinds of property and used for charitable and - Ottoman empire divided among the winners of WWI religious purposes (colonialism) - Creation of the state of Israel Muslims have personal responsibility to ease economic - Failure of nationalism, socialism, and communism hardships for others and eliminate inequality  Turn to a particular interpretation of Islam for Salat (Prayer) salvation Ritual prayer of Muslims performed five times daily in a set form ISLAMISM It is said only in Arabic Islamism’s Background Salat is a form of worship of Allah, of obedience to Allah’s order and His teachings Hajj (Pilgrimage) Muslim pilgrimage to Mecca that takes place in the last month of the year All Muslims are expected to do Hajj at least once during their lifetime - Laws contrary to Shari’ah are unacceptable Islamism: Tenets Outside the political structure A duty to spread “correct” Islam Cooperation between the Muslims of the Ummah Defending Islam and Muslims against outside interference ISLAM and ISLAMISM ISLAMIST MILITANCY ISLAM MILITANCY is a RELIGION which means submission to God Aggressively using violence (physical or verbal) ISLAMISM in

Use Quizgecko on...
Browser
Browser