Serious thread: infosec, opsec, guerrilla war, advice

This thread is for all political related infosec, opsec and war information.

Posting links to vital opsec websites to start so the rest of the thread and 8chins is safer.

ssd.eff.org/
securityinabox.org/en/
emailselfdefense.fsf.org/en/

Attached: download.png (225x225, 5.88K)

Other urls found in this thread:

deaddrops.com/download/readme.txt.
deaddrops.com/download/deaddrops-manifesto.txt.
deaddrops.com/dead-drops/db-map/..
instructables.com/id/Create-a-USB-Dead-Drop-in-Nature/
qx7j2selmom4ioxf.onion/files.html#new
parazite.nn.fi/roguesci/index.php/f-18.html
kpvz7ki2lzvnwve7.onion/wiki/index.php/Main_Page
archive.is/lM6ZA
grugq.github.io/
eff.org/about/staff
archive.is/IsxAx
twitter.com/SFWRedditGifs

Safe Tor Usage

As a very long time Tor user, the most surprising part of the NSA documents was how little progress they have made against Tor. Despite its known weaknesses, it's still the best thing we have, provided it's used properly and you make no mistakes.

Since you want security of "the greatest degree technically feasible", I'm going to assume that your threat is a well-funded government with significant visibility or control of the Internet, as it is for many Tor users (despite the warnings that Tor is not sufficient to protect you from such an actor).

Consider whether you truly need this level of protection. If having your activity discovered does not put your life or liberty at risk, then you probably do not need to go to all of this trouble. But if it does, then you absolutely must be vigilant if you wish to remain alive and free.
Contents

1 Your Computer
2 Your Environment
3 Your Mindset
4 Hidden Services
5 Conclusion
6 Source

Your Computer

To date, the NSA's and FBI's primary attacks on Tor users have been MITM attacks (NSA) and hidden service web server compromises (FBI) which either sent tracking data to the Tor user's computer, compromised it, or both. Thus you need a reasonably secure system from which you can use Tor and reduce your risk of being tracked or compromised.

1. Don't use Windows. Just don't. This also means don't use the Tor Browser Bundle on Windows. Vulnerabilities in the software in Tor browser button figure prominently in both the NSA slides and FBI's recent takedown of Freedom Hosting.
2. If you can't construct your own workstation capable of running Linux and carefully configured to run the latest available versions of Tor, a proxy such as Privoxy, and a web browser (with all outgoing clearnet access firewalled), consider using Tails or Whonix instead, where most of this work is done for you. It's absolutely critical that outgoing access be firewalled so that third party applications cannot accidentally leak data about your location.
3. If you are using persistent storage of any kind, ensure that it is encrypted. Current versions of LUKS are reasonably safe, and major Linux distributions will offer to set it up for you during their installation. TrueCrypt might be safe, though it's not nearly as well integrated into the OS. BitLocker might be safe as well, though you still shouldn't be running Windows. Even if you are in a country where rubber hosing is legal, such as the UK, encrypting your data protects you from a variety of other threats.
4. Remember that your computer must be kept up to date. Whether you use Tails or build your own workstation from scratch or with Whonix, update frequently to ensure you are protected from the latest security vulnerabilities. Ideally you should update each time you begin a session, or at least daily. Tails will notify you at startup if an update is available.
5. Be very reluctant to compromise on JavaScript, Flash and Java. Disable them all by default. If a site requires any of these, visit somewhere else. Enable scripting only as a last resort, only temporarily, and only to the minimum extent necessary to gain functionality of a web site that you have no alternative for.
6. Viciously drop cookies and local data that sites send you. Neither the Tor browser button nor Tails do this well enough for my tastes; consider using an addon such as Self-Destructing Cookies to keep your cookies to a minimum. Of zero.
7. Your workstation must be a laptop; it must be portable enough to be carried with you and quickly disposed of or destroyed.
8. Don't use Google to search the Internet. A good alternative is Startpage; this is the default search engine for Tor browser button, Tails, and Whonix. Another is DuckDuckGo which also has a hidden service. Plus it won't call you malicious or ask you to fill out CAPTCHAs.

Your Environment

Tor contains weaknesses which can only be mitigated through actions in the physical world. An attacker who can view both your local Internet connection, and the connection of the site you are visiting, can use statistical analysis to correlate them.

1. Never use Tor from home, or near home. Never work on anything sensitive enough to require Tor from home, even if you remain offline. Computers have a funny habit of liking to be connected. This also applies to anywhere you are staying temporarily, such as a hotel. Never performing these activities at home helps to ensure that they cannot be tied to those locations. (Note that this applies to people facing advanced persistent threats. Running Tor from home is reasonable and useful for others, especially people who aren't doing anything themselves but wish to help by running an exit node, relay, or bridge.

2. Limit the amount of time you spend using Tor at any single location. While these correlation attacks do take some time, they can in theory be completed in as little as a day. And while the jackboots are very unlikely to show up the same day you fire up Tor at Starbucks, they might show up the next day. I recommend for the truly concerned to never use Tor more than 24 hours at any single physical location; after that, consider it burned and go elsewhere. This will help you even if the jackboots show up six months later; it's much easier to remember a regular customer than someone who showed up one day and never came back. This does mean you will have to travel farther afield, especially if you don't live in a large city, but it will help to preserve your ability to travel freely.

3. When you go out to perform these activities, leave your cell phone turned on and at home.

Your Mindset

Many Tor users get caught because they made a mistake, such as posting their real E-mail address in association with their activities. You must avoid this as much as possible, and the only way to do so is with careful mental discipline.

1. Think of your Tor activity as pseudonymous, and create in your mind a virtual identity to correspond with the activity. This virtual person does not know you and will never meet you, and wouldn't even like you if he knew you. He must be kept strictly mentally separated.

2. If you must use public Internet services, create completely new accounts for this pseudonym. Never mix them; for instance do not browse Facebook with your real E-mail address after having used Twitter with your pseudonym's E-mail on the same computer. Wait until you get home.

3. By the same token, never perform actions related to your pseudonymous activity via the clearnet, unless you have no other choice (e.g. to sign up for a provider who blocks Tor), and take extra precautions regarding your location when doing so.

4. If you need to make and receive phone calls, purchase an anonymous prepaid phone for the purpose. This is difficult in some countries, but it can be done if you are creative enough. Pay cash; never use a debit or credit card to buy the phone or top-ups. Never insert its battery or turn it on if you are within 10 miles (16 km) of your home, nor use a phone from which the battery cannot be removed. Never place a SIM card previously used in one phone into another phone. Never give its number or even admit its existence to anyone who knows you by your real identity. This may need to include your family members.

Hidden Services

These are big in the news lately, with the recent takedown of at least two high-profile hidden services, Silk Road and Freedom Hosting. The bad news is, hidden services are much weaker than they could or should be. The good news is, the NSA doesn't seem to have done much with them (though the NSA slides mention a GCHQ program named ONIONBREATH which focuses on hidden services, nothing else is yet known about it).

In addition, since hidden services must often run under someone else's physical control, they are vulnerable to being compromised via that other party. Thus it's even more important to protect the anonymity of the service, as once it is compromised in this manner, it's pretty much game over.

The advice given above is sufficient if you are merely visiting a hidden service. If you need to run a hidden service, do all of the above, and in addition do the following. Note that these tasks require an experienced system administrator; performing them without the relevant experience will be difficult or impossible.

1. Do not run a hidden service in a virtual machine unless you also control the physical host. Designs in which Tor and a service run in firewalled virtual machines on a firewalled physical host are OK, provided it is the physical host which you are in control of, and you are not merely leasing cloud space.

2. A better design for a Tor hidden service consists of two physical hosts, leased from two different providers though they may be in the same datacenter. On the first physical host, a single virtual machine runs with Tor. Both the host and VM are firewalled to prevent outgoing traffic other than Tor traffic and traffic to the second physical host. The second physical host will then contain a VM with the actual hidden service. Again, these will be firewalled in both directions. The connection between them should be secured with IPSec, OpenVPN, etc. If it is suspected that the host running Tor may be compromised, the service on the second server may be immediately moved (by copying the virtual machine image) and both servers decommissioned. Both of these designs can be implemented fairly easily with Whonix.

3. Hosts leased from third parties are convenient but especially vulnerable to attacks where the service provider takes a copy of the hard drives. If the server is virtual, or it is physical but uses RAID storage, this can be done without taking the server offline. Again, do not lease cloud space, and carefully monitor the hardware of the physical host. If the RAIDarray shows as degraded, or if the server is inexplicably down for more than a few moments, the server should be considered compromised, since there is no way to distinguish between a simple hardware failure and a compromise of this nature.

4. Ensure that your hosting provider offers 24x7 access to a remote console (in the hosting industry this is often called a KVM though it's usually implemented via IPMI which can also install the operating system. Use temporary passwords/passphrases during the installation, and change them all after you have Torup and running (see below). The remote console also allows you to run a fully encrypted physical host, reducing the risk of data loss through physical compromise; however, in this case the passphrase must be changed every time the system is booted (even this does not mitigate all possible attacks, but it does buy you time).

5. Your initial setup of the hosts which will run the service must be over clearnet, albeit via SSH; however, to reiterate, they must not be done from home or from a location you have ever visited before. As we have seen, it is not sufficient to simply use a VPN. This may cause you issues with actually signing up for the service due to fraud protection that such providers may use. How to deal with this is outside the scope of this answer, though.

6. Once you have Tor up and running, never connect to any of the servers or virtual machines via clearnet again. Configure hidden services which connect via SSH to each host and each of the virtual machines, and always use them. If you must connect via clearnet to resolve a problem, again, do so from a location you will never visit again.

7. Hidden services must be moved regularly, even if compromise is not suspected. A 2013 paper described an attack which can locate a hidden service in just a few months for around $10,000 in cloud compute charges, which is well within the budget of even some individuals. It is safer, though not at all convenient, to move the hidden service at least monthly. Ideally it should be moved as frequently as possible, though this quickly veers into the impractical. Note that it will take approximately an hour for the Tor network to recognize the new location of a moved hidden service.

Conclusion

Anonymity is hard. Technology alone, no matter how good it is, will never be enough. It requires a clear mind and careful attention to detail, as well as real-world actions to mitigate weaknesses that cannot be addressed through technology alone. As has been so frequently mentioned, the attackers can be bumbling fools who only have sheer luck to rely on, but you only have to make one mistake to be ruined. We call them "advanced persistent threats" because, in part, they are persistent. They won't give up, and you must not.

Dealing with Law Enforcement

Golden Rule: Ask for a lawyer immediately upon contact and say nothing

Do not fall for the law enforcement tricks. Nothing you say can help you. Law enforcement officers are not in a position to offer you a plea deal, only the prosecution is. Judges do not need to accept the plea bargain either. Law enforcement use various techniques to try and get a confession. They will try to minimize your behavior and make it seem wise to agree with them. This is a trick. An in depth guide to law enforcement interrogation techniques is not required, because all of their techniques can be countered by keeping your mouth shut and asking for a lawyer.

Contents
1 So LE knocked on my door and asked to talk to me. They say that they know I have been up to no good, and that it will be better for me if I talk to them. What should I do?
2 So it is looking like I am going to be doing a bid in prison, but I am being offered a deal if I turn states witness. Should I do this?
3 So I got pulled over, or got a knock on my door, and LE is requesting to search my house or car. What should I do?
4 So I got arrested and am being interrogated, what do I do? They say if I don't cooperate they are going to make things hell for me and put me in a holding cell with a bunch of gang members! But if I confess they will make things very easy for me.
5 If I ask a cop if they are a cop, they have to tell me right?
6 But what about smoking weed or using other drugs? Can they do this too?
7 But I am non-important / don't do anything wrong / am small time
8 When I talk online I like to say SWIM (someone who isn't me) instead of me or I. This keeps me safe right?

So LE knocked on my door and asked to talk to me. They say that they know I have been up to no good, and that it will be better for me if I talk to them. What should I do?

You should under no circumstances talk to LE. They are not your friends, although they may pretend to be. Anything you say can and will be used against you in court. In fact, anything you say will be twisted to put you in the worst possible light. Even if you think you are saying something innocent, LE can twist it against you. So it is best to say absolutely nothing. Don't try to outsmart them in an interrogation, this is not a game, if they think you are the sort of person that sees things as a game they will try and make you feel smarter than them when they question you, but in reality they are just getting you to talk more. When questioned by LE, you should immediately request to talk to your lawyer, and nothing more. Everything you say to LE should be said through a lawyer, in all cases.

Additionally, remember that destruction of evidence is a crime in many places (like the United States). Turning your computer off is not destruction of evidence, even if you are using whole disc encryption (and thus having the computer turned off makes the data inaccessible to the investigators); hitting your computer with a hammer, shooting it with you gun, or throwing it into your swimming pool when you see the police walking to your door is destruction of evidence, and you could be sent to prison for it (even if you are found "not guilty" of the crime itself). You can face a destruction of evidence charge even if the investigators manage to recover the evidence you tried to destroy. If you have incriminating evidence on your hard drive, you should be using encryption, not relying on your ability to destroy your computer.

So it is looking like I am going to be doing a bid in prison, but I am being offered a deal if I turn states witness. Should I do this?

It is true that you can in some cases get reduced sentences by becoming a confidential informant. But would you rather spend five years in prison getting abused and spit on, possibly killed, or spend ten years in prison being left alone for the most part? Snitches are despised more than anyone else in prison, and some of the people you will be locked up with have nothing to lose. Guards are known to reveal information on inmates to other inmates, so don't think you are going to keep your snitch status secret. Even if you are kept in protective custody you will not be safe, when prison riots happen the first thing that happens is the inmates kill everyone in protective custody. In addition to putting your life in serious danger, snitching makes you a coward and a hypocrite. You will have to live every day of the rest of your life knowing that you are a coward who ruined the lives of others. Keep in mind that even if you take a deal to snitch, that has no legally binding power, your sentence is still up the the judge. Although the mandatory minimum is erased when you take a deal, you can still get the maximum sentence if the judge says so, even after you already snitched. This has been known to happen. Even if you get put in the witness protection program and given a new identity, people in witness protection can be traced. Snitching is never worth it and it is never the right thing to do. Don't do the crime if you can't do the time without snitching.

So I got pulled over, or got a knock on my door, and LE is requesting to search my house or car. What should I do?

Tell them no. Never consent to be searched or have your vehicle or house searched. Make them get a warrant. Even if you have nothing on you and your vehicle and house are clean, you should make them get a warrant. You don't want to make their job easier. If you don't consent to a search and they search anyways with no warrant then any evidence they gather can not be used in court. If you consent, they don't even need a warrant.

So I got arrested and am being interrogated, what do I do? They say if I don't cooperate they are going to make things hell for me and put me in a holding cell with a bunch of gang members! But if I confess they will make things very easy for me.

Ask for your lawyer. If they don't immediately stop questioning you, continue asking for your lawyer. You don't ever want to say anything to cops. Even if they put you in a holding cell full of gang members, it is probably better to be there for a day than to confess and get sent with the same gang members for ten years. Anyways, most gang members are unlikely to mess with you if you just keep to yourself and don't cause any trouble with them. Keep in mind: cops lie, feds lie, they want you to confess, confessing or giving any information up is going to hurt you it is under no circumstances going to ever help you.

If I ask a cop if they are a cop, they have to tell me right?

No, cops do not have to tell you they are cops, neither do feds. Undercovers lie all the time. So do confidential informants. Be careful who you trust, even friends you have known your entire life can turn.

But what about smoking weed or using other drugs? Can they do this too?

Undercovers can smoke weed, and I am sure they will have no issues using other drugs either. Someone using drugs does not mean that they are not a cop or fed. It also doesn't mean they are not a confidential informant.

But I am non-important / don't do anything wrong / am small time

Even if you do nothing wrong, most LE wants to screw you. The majority of them are not trying to protect and serve, but are trying to meet some alpha male requirement they subconsciously have. They feel important when they bring you down. Also, people tend to minimize what they do, so you are probably bigger than you would like to admit.

When I talk online I like to say SWIM (someone who isn't me) instead of me or I. This keeps me safe right?

No, this offers you no protection at all. People who say SWIM are just fooling themselves. People tend to like to have "security blanket security" where they convince themselves they are safe as long as they do some simple ritual (as opposed to taking actual security precautions, which are a bit more difficult). Security blanket security is dangerous, as it doesn't offer real security but makes you act as if you are secured.

Next up ITT: How to create secret meetings and multiple revolutionary guides

If you like the content, add memes and save the info as an OC graphic.

Secret Meetings Guide

A security service like the FBI can only achieve its objectives by intercepting communication between people. This means you can beat the security service if you can deny them the ability to overhear your meetings with your contacts.

Contents

1 What you'll learn here…
2 Step-by-step instructions…
2.1 Step 1
2.2 Step 2
2.3 Step 3
2.4 Step 4
2.5 Step 5
2.6 Step 6
2.7 Step 7
3 Spook talk…

What you'll learn here…

This article teaches you how to check for surveillance before you meet with a clandestine contact. You'll learn a protocol that will beat security services like the FBI, BATF, DEA, and others. The method is particularly effective against standard police surveillance. It also works against the so-called inspection teams of the IRS.

Tradecraft origins. The method described in this article was originally devised in 1943-1944 by countersurveillance expert Anthony Blunt for Britain's MI.5. Unfortunately for the British, Blunt was a deep-cover agent for the KGB.

Six years later, Blunt taught the protocol to his new KGB controller, Yuri Modin. Together they perfected the technique as it is known today. They successfully thwarted MI.5 surveillance for three years, sometimes even meeting daily to exchange information and top secret documents. In effect, Blunt was using his inside knowledge of MI.5's surveillance techniques to beat them at their own game.

Proliferation. This countersurveillance method has since been adopted by Israel's Mossad, Germany's BND, Russia's KGB (now the SVR), the American CIA, and many others. The protocol is taught by intelligence agencies to their controllers - these are the intelligence officers who manage and meet with deep cover agents in foreign countries. The method is also being used today by resistance movements and urban guerrilla groups.

When this countersurveillance protocol is methodically applied, it is extremely difficult for a security service to breach your security.

Step-by-step instructions…

Here's a hypothetical situation. Assume that you and I wish to meet clandestinely. We wish to ensure that our meeting is not observed by a surveillance team.

You and I have previously agreed upon a place, date, and time. In addition, we are familiar with each other's appearance - we can recognize each other on sight.

Step 1

You and I independently arrive at the previously agreed-upon general location. Rather than fixing a specific location, we agree to be only in the general vicinity. This is an important principle.

This might be a large park, a residential district, etc. The location must be outdoors and free of video surveillance cameras. It should also be selected with the intention of thwarting telephoto lenses.

You and I should each know the area well. The location should provide reasonable cover for each of us being there - strolling in the park, walking through a residential area to a bus stop, convenience store, etc.

Step 2

You and I will eventually make eye contact at some distance from each other. We do this discretely, so others are unaware. I use a pre-arranged signal to alert you that I have spotted you. Perhaps I'll throw my jacket over my shoulder, or remove and clean my sunglasses, etc. The signal must be a natural movement that does not attract unwanted attention.

Safety first. Even though you and I have seen each other, we do NOT approach each other. This is an important safety valve. If either of us has grown a tail we do not want to compromise the other person.

BACKGROUND - The phrase grown a tail is spy-talk for being under surveillance. The phrase is somewhat inaccurate, because they don't just follow you, they often surround you.

Step 3

When you see my signal you simply walk off. Then I follow you in order to ensure that you're not being watched. I carefully check for the presence of a floating-box foot surveillance team. I check for agents at fixed observation posts. I also watch for drive-by support from a floating-box vehicle surveillance team.

BACKGROUND - In particular, I may follow you, I may walk parallel to you, I may occasionally walk ahead of you. The goal is simply to be nearby so I'm in a position to detect surveillance around you. I always remain at a distance from you, of course, never approaching too closely.

Step 4

When I have satisfied myself that you are clean, I again signal you. Perhaps I re-tie my shoe laces.

Step 5

Now we reverse roles and this time it is I who simply walks off. You begin to follow me in order to ensure that I'm not being watched. You check for floating-box foot surveillance, fixed observation post foot surveillance, and drive-by support by a vehicle surveillance team.

What to look for.You carefully watch for persons who are pacing me or moving parallel with me. You check for persons loitering at positions with a good line-of-sight to my location. You watch for an ongoing pattern of people coming and going that results in someone always being in a position to monitor me. You watch for vehicles dropping someone off ahead of me.

Step 6

When you are satisfied that I am clean, you signal me that I'm not being watched. (On the other hand, if you suspect that a surveillance team is in the vicinity, you simply abort the operation and walk away.)

BACKGROUND - You must trust your instincts, because if something seems not quite right it's better to be safe than sorry. Many people are surprised to learn that it is not difficult to detect a surveillance team watching someone else. This is the subtle elegance of Blunt's countersurveillance system. And the goons are helpless against it.

good bread

Step 7

You and I can now approach each other and meet. After our discussion we agree upon the date, time, and location of our next clandestine meeting - as well as two backup plans in case the meeting is thwarted by surveillance. If we are unable to meet at the first venue we will use our fallback position and we will meet at the same time and place one week later. If we are unable to make that meeting happen, we will shift to a previously agreed-upon failsafe plan and we will meet at a different location at an agreed-upon date and time.

Neither you nor I writes down the particulars of our next meeting. We commit the details to memory.

BACKGROUND 1 - If you have any documents to give me, I will not accept those documents until the final moments of our meeting. I will have already started making my getaway when I accept the documents. This reduces the chance of discovery and arrest by a surveillance team that has managed to elude our countersurveillance protocol. If the security service acts too quickly, they will have no evidence against me, because the documents have not yet been passed to me.

BACKGROUND 2 - The best agents never mix discussion and documents. If a document is to be passed, no discussion occurs. The entire contact takes only a moment - the perfect brushpass. The principle is simple. It is foolhardy to stand around holding incriminating documents.

Spook talk…

Spies in North America call this seven-step protocol for countersurveillance drycleaning. In Europe, it is called parcours de sécurité - a French phrase which can be translated as security run or security circuit.

BONUS

Create a USB Dead Drop in Nature

Create a USB Dead Drop in Nature by DIY Hacks and How Tos

Dead drop is an anonymous, offline, peer-to-peer file sharing network in public space. This network is made up of USB drives that are embedded in walls, buildings and other public places. Anyone is free to access, download, and upload. It is very similar to geocaching but with data. The first USB dead drop network of five locations was created by Berlin-based artist Aram Bartholl in 2010. Since then, there have been over 1,000 dead drop locations that have been registered at deaddrops.com (Including one outside the Instructables office.) For a walk through of how to set up a standard USB dead drop, check out this instructable by user frenzy.

Up until now, this has been mostly restricted to urban locations. In this instructable, I am going to attempt to expand this project beyond city limits by showing everyone how to embed USB drives in natural fixtures such as trees and rocks.

Contents

1 Step 1: Materials
2 Step 2: Remove the Housing of the
USB Drive
3 Step 3: Wrap the USB Drive in
Plumber's Tape
4 Step 4: Select a Dead Tree or Stump
as a Dead Drop Location
5 Step 5: Drill Holes in the Trunk to
Make Room for Your USB Drive
6 Step 6: Apply the Wood Glue and
Insert the USB Drive
7 Step 7: Finished Dead Drop Site
8 Step 8: Stone Dead Drop Location
9 Step 9: Register the Dead Drop
Location on Deaddrops.com

Step 1: Materials

To install a USB drive in a tree, you will need the following materials:

Materials: USB flash drive Plumber's tape Wood Glue

Tools: Cordless Drill Drill bit set Screw driver, or other tool to pry open the flash drive

Step 2: Remove the Housing of the USB Drive

The first step is to open up the housing of the flash drive and remove all the unnecessary plastic. You can usually pry open the housing with a small screw driver or knife. Another option is to just squeeze the housing with a pair of pliers at the seem. Continue removing parts until only the USB connector and the circuit board remain.

Step 3: Wrap the USB Drive in Plumber's Tape

Applying a layer of plumber's tape around the circuit board of the drive helps to keep it a little more protect. Don't go overboard, one or two layers is plenty.
Step 4: Select a Dead Tree or Stump as a Dead Drop Location

Select a dead tree to locate your deaddrop. I do not recommend using a healthy tree for this project. In addition to the damage caused by drilling, the cavity that you create also provides a potential site for mold, rot and insect to take up residence. Because of this, I recommend using a tree that is obviously dead, fallen over, or just a stump.
Step 5: Drill Holes in the Trunk to Make Room for Your USB Drive

The USB connector and board of a typical USB drive is about 0.51inch (13mm) wide x 0.20inch (5mm) thick. There are a number of ways that you can drill out a slot to accommodate for it. The simplest and fastest method is to drill a single hole that is large enough to fit the whole drive inside of it. A 1/2" drill bit will usually suffice for this.

If you want to make a smaller imprint on the surface and make the end product look a little cleaner, you can drill a series of smaller holes in a line to make a slot. Each hole should be the same thickness as the USB drive (about 1/4 inch). Then you can finish the shaping with a knife or file.

Be sure to drill your hole is a part of the tree that is solid and free from rot.

Step 6: Apply the Wood Glue and Insert the USB Drive

Clear the saw dust and wood shavings from the hole by blowing on it. Then fill the hole most of the way with wood glue. Slowly insert the USB drive into the hole until the back edge of the metal on the connector port is even with the surface of the tree. Some of the glue will squeeze out around the edges. Wipe off the excess using some nearby leaves.

Once the glue dries, you have a USB deaddrop site out in nature. If you wish to prolong the life of the drive, you can put a cap on it to at least partially protect it from the weather.

Step 7: Finished Dead Drop Site

The last step is to upload the instruction text files and any other files that you want to share. You can find the readme file here: deaddrops.com/download/readme.txt. You can find the dead drop manifesto here: deaddrops.com/download/deaddrops-manifesto.txt.

I also decided to also load a copy of "The Giving Tree" by Shel Silverstein onto the flash drive (Yes, I got the idea from this xkcd comic by Randall Munroe).

To document the dead drop location, it helps if you take three pictures of the location (up close medium and far away). This makes it easier for others to find your dead drop.

Step 8: Stone Dead Drop Location

You don't need to limit yourself to just trees. You can also setup a dead drop in stone. The process for this variation is identical to the original procedure that is used for brick and mortar locations. Just find a relatively soft rock, drill the hole with a mortar drill bit and use concrete patch or fast drying cement instead of glue to fill the hole.

Step 9: Register the Dead Drop Location on Deaddrops.com

When you get back home, you can register the dead drop location here: deaddrops.com/dead-drops/db-map/.. This helps others to find it. Then check on the dead drop periodically to see if it is still working and if it is being used. As with all files of unknown origin, always be careful to avoid viruses.

instructables.com/id/Create-a-USB-Dead-Drop-in-Nature/

END BONUS

spicy focaccia from here on out

50 Ways to Prepare for a Revolution

The people of the are currently unprepared to seize a revolutionary moment. We must fix that.

How can we raise our levels of revolutionary consciousness, organization and struggle?

Raise consciousness

1) Raise consciousness with the purpose of building organization and raising the level of struggle.

2) Investigate before forming opinions. Research how the world and the system function.

3) Read foundational and historical works about revolution, by those who have participated in and led them.

4) Analyze the system's current condition and trajectory.

5) Learn about the resistance, uprisings and revolutions going on in the world today.

6) Read the material that currently active groups are issuing and discussing.

7) Continuously develop, elaborate upon and refine principles, theories and strategies for our movement.

8. Raise our voices. Articulate revolutionary ideas, and give them a public presence.

9) Listen and speak in the spirit of mutual clarification.

10) Participate in discussion, to develop our ideas and hone our skills in expressing them, and to help others do so.

11) Figure out how to use all our various talents, positions, energy and resources as effectively as possible, to expose the system's evil, irredeemable and unreformable nature.

12) Analyze and explain the many ways the system dominates and exploits.

13) Stand with the dominated, exploited, invaded, colonized, threatened and oppressed.

14) Display a revolutionary spirit and celebrate it in others.

15) Exercise patience in winning over reluctant potential allies and supporters.

16) Ridicule and discredit the enemy.

17) Create revolutionary culture. Make videos and art, speak, sing, and write blogs, books, comments, leaflets, rhymes, stories, and articles about the enemy's crimes and the people's resistance.

18) Exchange ideas locally, nationally and (within the law or safe channels) globally.

19) Encourage others to participate in the revolutionary process.

Organize

20) Organize as a way to raise consciousness more broadly and to build struggle.

21) Start with people we know.

22) If our friends discourage us, make new friends.

23) Network sensibly with people online. Find local people online who express similar ideas, and meet with them.

24) Find a group that we basically agree with. Work with it.

25) If there's no local group we want to work with, start one.

26) Write a leaflet with contact info. Pass it out in public to find potential comrades.

27) When we meet people, assess our points of agreement. If we agree on basic essentials, decide how to work together. If not, say goodbye for now.

28) Build strong ties locally and nationally, and build solidarity globally.

29) Define allies according to overall outlook and goals.

30) Don't let secondary differences prevent cooperation. Handle differences between allies non-antagonistically.

31) Do not tolerate oppressive (sexist, racist, homophobic etc.) dynamics within the movement. Confront their expression and put a stop to it.

32) Refrain from saying anything aloud, on the phone or electronically that we wouldn't want to hear played back in court.

33) Keep illegal drugs away from our political life.

34) Research and practice good Security Culture.

35) Prioritize the wellbeing of our organizations over personal benefit.

36) Ready our ranks to seize on any breaks in the legitimacy of the system.

Struggle

37) Use struggle to spread revolutionary consciousness and build organization.

38) Collectively determine what we want, and declare our demands.

39) Act as far as possible within our capacity, not either beyond or below our capacity.

40) Continuously strive to expand and consolidate our capacity and strength.

41) Assert our rights and our responsibilities.

42) Bring our revolutionary perspective into struggles already occurring.

43) Defend, support, and encourage our allies.

44) As opportunities arise, weaken the enemy and its ability to rule.

45) Obey the small laws. Don't get taken out of the game for something unworthy.

46) For illegal acts, make sure you can trust your comrades with your life and the lives of everyone connected to you.

47) Avoid being distracted and diverted into symbolic action-for-action's sake.

48) Don't expect the enemy to act against its nature. It has no mercy and can not be reasoned with.

49) Turn every attack by the enemy into an opportunity to speak out, organize, and grow more powerful.

50) Be willing to work hard. Be smart. Be brave. Remember we're all in this together.

NOTE: IGNORE COMMIE SPERGING LEVERAGE ACTUAL USEFUL ADVICE. ALSO STUDY YOUR ENEMY. THIS IS ANTIFA SUMMARIZED.

Bomb making intro

Contents

1 Applied Chemistry
2 Bomb fuels
2.1 2.03 ROCKET ENGINE POWDER
2.2 2.04 RIFLE/SHOTGUN POWDER
2.3 2.05 FLASH POWDER
3 See also

Applied Chemistry

Bomb making is a topic many darknet people are very interested in, because with little effort and money some impressive devices can be made.

Bomb fuels

2.03 ROCKET ENGINE POWDER

One of the most exciting hobbies nowadays is model rocketry. Estes is the largest producer of model rocket kits and engines. Rocket engines are composed of a single large grain of propellant. This grain is surrounded by a fairly heavy cardboard tubing. One gets the propellant by slitting the tube lengthwise, and unwrapping it like a paper towel roll. When this is done, the grey fire clay at either end of the propellant grain must be removed. This is usually done gently with a plastic or brass knife. The material is exceptionally hard, and must be crushed to be used. By gripping the grain on the widest setting on a set of pliers, and putting the grain and powder in a plastic bag, the powder will not break apart and shatter all over. This should be done to all the large chunks of powder, and then it should be crushed like black powder. Rocket engines come in various sizes, ranging from 1/4 A - 2T to the incredibly powerful D engines. The larger the engine, the more expensive. D engines come in packages of three, and cost about $5.00 per package. Rocket engines are perhaps the single most useful item sold in stores to a terrorist, since they can be used as is, or can be cannibalized for their explosive powder.

2.04 RIFLE/SHOTGUN POWDER

Rifle powder and shotgun powder are really the same from a practicle standpoint. They are both nitrocellulose based propellants. They will be referred to as gunpowder in all future references. Gunpowder is made by the action of concentrated nitric and sulfuric acid upon cotton. This material is then dissolved by solvents and then reformed in the desired grain size. When dealing with gunpowder, the grain size is not nearly as important as that of black powder. Both large and small grained gunpowder burn fairly slowly compared to black powder when unconfined, but when it is confined, gunpowder burns both hotter and with more gaseous expansion, producing more pressure. Therefore, the grinding process that is often necessary for other propellants is not necessary for gunpowder. Gunpowder costs about $9.00 per pound. Any idiot can buy it, since there are no restrictions on rifles or shotguns in the U.S.

2.05 FLASH POWDER

Flash powder is a mixture of powdered zirconium metal and various oxidizers. It is extremely sensitive to heat or sparks, and should be treated with more care than black powder, with which it should NEVER be mixed. It is sold in small containers which must be mixed and shaken before use. It is very finely powdered, and is available in three speeds: fast, medium, and slow. The fast flash powder is the best for using in explosives or detonators.


See also

qx7j2selmom4ioxf.onion/files.html#new
parazite.nn.fi/roguesci/index.php/f-18.html

Minimanual of the Urban Guerrilla by Carlos Marighella

also see
kpvz7ki2lzvnwve7.onion/wiki/index.php/Main_Page

Contents

1 A DEFINITION OF THE URBAN
GUERRILLA
2 PERSONAL QUALITIES OF THE
URBAN GUERRILLA
3 HOW THE URBAN GUERRILLA LIVES
4 TECHNICAL PREPARATION OF THE
URBAN GUERRILLA
5 THE URBAN GUERRILLA'S WEAPONS
6 THE SHOT; THE URBAN
GUERRILLA'S REASON FOR
EXISTENCE
7 THE FIRING GROUP
8 THE LOGISTICS OF THE URBAN
GUERRILLA
9 CHARACTERISTICS OF THE URBAN
GUERRILLA'S TACTICS
10 THE INITIAL ADVANTAGES OF THE
URBAN GUERRILLA
11 SURPRISE
12 KNOWLEDGE OF THE TERRAIN
13 MOBILITY AND SPEED
14 INFORMATION
15 DECISIVENESS
16 OBJECTIVES OF THE GUERRILLA'S
ACTIONS
17 ON THE TYPES AND NATURE OF
MISSIONS FOR THE URBAN
GUERRILLA
18 ASSAULTS
19 THE BANK ASSAULT AS POPULAR
MISSION
20 RAIDS AND PENETRATIONS
21 OCCUPATIONS
22 AMBUSH
23 STREET TACTICS
24 STRIKES AND WORK
INTERRUPTIONS
25 DESERTIONS, DIVERSIONS,
SEIZURES, EXPROPRIATION OF
AMMUNITION AND EXPLOSIVES
26 LIBERATION OF PRISONERS
27 EXECUTIONS
28 KIDNAPPING
29 SABOTAGE
30 TERRORISM
31 ARMED PROPAGANDA
32 THE WAR OF NERVES
33 HOW TO CARRY OUT THE ACTION
34 SOME OBSERVATIONS ON TACTICS
35 RESCUE OF THE WOUNDED
36 GUERRILLA SECURITY
37 THE SEVEN SINS OF THE URBAN
GUERRILLA
38 POPULAR SUPPORT
39 See also

A DEFINITION OF THE URBAN GUERRILLA

The urban guerrilla is a person who fights the military dictatorship with weapons, using unconventional methods. A revolutionary and an ardent patriot, he is a fighter for his country's liberation, a friend of the people and of freedom. The area in which the urban guerrilla operates is in the large Brazilian cities. There are also criminals or outlaws who work in the big cities. Many times, actions by criminals are taken to be actions by urban guerrillas.

The urban guerrilla, however, differs radically from the criminal. The criminal benefits personally from his actions, and attacks indiscrimminately without distinguishing between the exploiters and the exploited, which is why there are so many ordinary people among his victims. The urban guerrilla follows a political goal, and only attacks the government, the big businesses and the foreign imperialists.

Another element just as harmful to the guerrillas as the criminal, and also operating in the urban area, is the counterrevolutionary, who creates confusion, robs banks, throws bombs, kidnaps, assassinates, and commits the worst crimes imaginable against urban guerrillas, revolutionary priests, students, and citizens who oppose tyranny and seek liberty.

The urban guerrilla is an implacable enemy of the regime, and systematically inflicts damage on the authorities and on the people who dominate the country and exercise power. The primary task of the urban guerrilla is to distract, to wear down, to demoralize the military regime and its repressive forces, and also to attack and destroy the wealth and property of the foreign managers and the Brazilian upper class.

The urban guerrilla is not afraid to dismantle and destroy the present Brazilian economic, political and social system, for his aim is to aid the rural guerrillas and to help in the creation of a totally new and revolutionary social and political structure, with the armed population in power.

PERSONAL QUALITIES OF THE URBAN GUERRILLA

The urban guerrilla is characterized by his bravery and his decisive nature. He must be a good tactician, and a good marksman. The urban guerrilla must be a person of great cleverness to compensate for the fact that he is not sufficiently strong in weapons, ammunition and equipment.
The career military officers and the government police have modern weapons and transport, and can go about anywhere freely, using the force of their own strength. The urban guerrilla does not have such resources at his disposal, and leads a clandestine existence. The guerrilla may be a convicted person or one who is out on parole, and must then use false documents.
Nevertheless, the urban guerrilla has an advantage over the conventional military or the police. It is that, while the military and the police act on behalf of the enemy, whom the people hate, the urban guerrilla defends a just cause, which is the people's cause.
The urban guerrilla's weapons are inferior to the enemy's, but from the moral point of view, the urban guerrilla has an undeniable superiority. This moral superiority is what sustains the urban guerrilla. Thanks to it, the urban guerrilla can accomplish his principle duty, which is to attack and survive.
The urban guerrilla has to capture or steal weapons from the enemy to be able to fight. Because his weapons are not uniform—since what he has are expropriated or have fallen into his hands in various ways—the urban guerrilla faces the problem of a variety of weapons and a shortage of ammunition. Moreover, he has no place in which to practice shooting and marksmanship. These difficulties have to be overcome, forcing the urban guerrillas to be imaginative and creative—qualities without which it would be impossible for him to carry out his role as a revolutionary.
The urban guerrilla must possess initiative, mobility and flexibility, as well as versatility and a command of any situation. Initiative especially is an indispensible quality. It is not always possible to foresee everything, and the urban guerrilla cannot let himself become confused, or wait for instructions. His duty is to act, to find adequate solutions for each problem he faces, and to retreat. It is better to err acting than to do nothing for fear of making a mistake. Without initiative, there is no urban guerrilla warfare.
Other important qualities in the urban guerrilla are the following: to be a good walker, to be able to stand up against fatigue, hunger, rain or heat. To know how to hide, and how to be vigilant. To conquer the art of dissembling. Never to fear danger. To behave the same by day as by night. Not to act impetuously. To have unlimited patience. To remain calm and cool in the worst of conditions and situations. Never to leave a track or trail. Not to get discouraged.
In the face of the almost insurmountable difficulties in urban guerrilla warfare, sometimes comrades weaken and give up the fight.
The urban guerrilla is not a businessman in an urban company, nor is he an actor in a play. Urban guerrilla warfare, like rural guerrilla warfare, is a pledge which the guerrilla makes to himself. When he can no longer face the difficulties, or if he knows that he lacks the patience to wait, then it is better for him to relinquish his role before he betrays his pledge, for he clearly lacks the basic qualities necessary to be a guerrilla.

HOW THE URBAN GUERRILLA LIVES

The urban guerrilla must know how to live among the people, and he must be careful not to appear strange and different from ordinary city life. He should not wear clothes that are different from those that other people wear. Elaborate and high-fashion clothing for men or women may often be a handicap if the urban guerrilla's mission takes him into working class neighborhoods, or sections where such dress is uncommon. The same care has to be taken if the urban guerrilla must move from the South of the country to the North, and vice versa.

The urban guerrilla must make his living through his job or his professional activity. If he is known and sought by the police, he must go underground, and sometimes must live hidden. Under such circumstances, the urban guerrilla cannot reveal his activity to anyone, since this information is always and only the responsibility of the revolutionary organization in which he is participating.
The urban guerrilla must have a great ability for observation. He must be well-informed about everything, particularly about the enemy's movements, and he must be very inquisitive and knowledgable about the area in which he lives, operates, or travels through.

But the fundamental characteristic of the urban guerrilla is that he is a man who fights with weapons; given these circumstances, there is very little likelihood that he will be able to follow his normal profession for long without being identified by the police. The role of expropriation thus looms as clear as high noon. It is impossible for the urban guerrilla to exist and survive without fighting to expropriate.

Thus, the armed struggle of the urban guerrilla points towards two essential objectives:

1. the physical elimination of the leaders and assistants of the armed forces and of the police;
2. the expropriation of government resources and the wealth belonging to the rich businessmen, the large landowners and the imperialists, with small expropriations used for the sustenance of the individual guerrillas and large ones for the maintenance of the revolutionary organization itself.

It is clear that the armed struggle of the urban guerrilla also has other objectives. But here we are referring to the two basic objectives, above all expropration. It is necessary for every urban guerrilla to always keep in mind that he can only maintain his existence if he is able to kill the police and those dedicated to repression, and if he is determined—truly determined—to expropriate the wealth of the rich businessmen, landowners and imperialists.

One of the fundamental characteristics of the Brazilian revolution is that, from the beginning, it developed around the expropriation of the wealth of the major business, imperialist and landowning interests, without excluding the largest and most powerful commercial elements engaged in the import-export business. And by expropriating the wealth of the principle enemies of the people, the Brazilian revolution was able to hit them at their vital center, with preferential and systematic attacks on the banking network—that is to say, the most telling blows were levelled at the businessman's nerve system.

The bank robberies carried out by the Brazilian urban guerrillas hurt big businesses and others, the foreign companies which insure and re-insure the banking capital, the imperialist companies, the federal and state governments—all of them are systematically expropriated as of now.
The fruit of these expropriations has been devoted to the tasks of learning and perfecting urban guerrilla techniques, the purchase, production and transportation of weapons and ammunition for the rural areas, the security precautions of the guerrillas, the daily maintenance of the fighters, those who have been liberated from prison by armed force, those who have been wounded, and those who are being persecuted by the police, and to any kind of problem concerning comrades liberated from jail or assassinated by the police and the military dictatorship.

continued

The tremendous costs of the revolutionary war must fall upon the big businesses, on the imperialists, on the large landowners, and on the government too—both federal and state—since they are all exploiters and oppressors of the people. Men of the government, agents of the dictatorship and of foreign imperialism, especially, must pay with their lives for the crimes they have committed against the Brazilian people.
In Brazil, the number of violent actions carried out by urban guerrillas, including executions, explosions, seizures of weapons, ammunition and explosives, assaults on banks and prisons, etc., is significant enough to leave no room for doubt as to the actual aims of the revolutionaries; all are witnesses to the fact that we are in a full revolutionary war and that this war can be waged only by violent means.

This is the reason why the urban guerrilla uses armed struggle, and why he continues to concentrate his efforts on the physical extermination of the agents of repression, and to dedicate 24 hours a day to expropriations from the people's exploiters.

TECHNICAL PREPARATION OF THE URBAN GUERRILLA

No one can become an urban guerrilla without paying special attention to technical preparation.
The technical preparation of the urban guerrilla runs from a concern for his physical condition to a knowledge of and apprenticeship in professions and skills of all kinds, particularly manual skills.
The urban guerrilla can have a strong physical constitution only if he trains systematically. He cannot be a good fighter if he has not learned the art of fighting. For that reason, the urban guerrilla must learn and practice the various forms of unarmed fighting, of attack, and of personal defense. Other useful forms of physical preparation are hiking, camping, the practice of survival in the woods, mountain climbing, rowing, swimming, skin diving and training as a frogman, fishing, harpooning, and the hunting of birds and of small and big game.

It is very important to learn how to drive a car, pilot a plane, handle a motor boat and a sailboat, understand mechanics, radio, telephone, electricity and have some knowledge of electronics techniques. It is also important to have a knowledge of topographical information, to be able to determine one's position by instruments or other available resources, to calculate distances, make maps and plans, draw to scale, make timings, and work with an angle protractor, a compass, etc. A knowledge of chemistry, of color combination and of stamp-making, the mastery of the skills of calligraphy and the copying of letters, and other techniques are part of the technical preparation of the urban guerrilla, who is obliged to falsify documents in order to live within a society that he seeks to destroy. In the area of "makeshift" medicine, the urban guerrilla has the special role of being a doctor or understanding medicine, nursing, pharmacology, drugs, basic surgery and emergency first aid.
The basic question in the technical preparation of the urban guerrilla is, nevertheless, to know how to handle weapons such as the submachine gun, revolver, automatic pistol, FAL, various types of shotguns, carbines, mortars, bazookas, etc.

A knowledge of various types of ammunition and explosives is another aspect to consider. Among the explosives, dynamite must be well understood. The use of incendiary bombs, smoke bombs, and other types is also indispensible prior training. To know how to improvise and repair weapons, prepare Molotov cocktails, grenades, mines, homemade destructive devices, how to blow up bridges, tear up and put out of service railroads and railroad cars, these are necessities in the technical preparation of the urban guerrilla that can never be considered unimportant.

The highest level of preparation for the urban guerrilla is the training camp for technical training. But only the guerrilla who has already passed a preliminary examination can go to this school—that is to say, one who has passed the test of fire in revolutionary action, in actual combat against the enemy.

archive.is/lM6ZA


(1) Don't use social media [Avoid Facebook/Myspace/Twitter/Snapchat/etc.] (no brainer)
(2) Forward secrecy (keep your mouth shut about any personal info if you don't want to expose yourself)
(3) Use a cheap private VPN (w/ no IP logging) and Tor browser!
(4) Always disconnect your internet (physically) when you are not going to use it! Make sure bluetooth and WiFi is physically disabled. Don't keep it online all the time! If you do, you are asking to be hacked!
(5) Use an old "flipper" phone. AKA a jitterbug. Cover up any camera if has one. Jitterbugs are basic cellphones for people with disability problems / senior citizens! Just a bare basic cell phone where you can take out the battery. Has no internet platform.
(6) Flock to flea markets, garage sales, thrift shops to buy older electronics! Do not by 'smart' or 'green' appliances! Learn how to maintain and fix older products/utilities too! All IoT (Internet of Things) tech can be used to spy on you, avoid IoT!
(7) Never put your real name or personal info into your computer, always use FAKE names / aliases. Tell your friends to just hang out with you face-to-face instead of using social media.
(8) Face to face relationships are the best kind. Don't be afraid to hang with your friends now and then. I do – in fact – that's all I'll do. (no social media BS)
(9) Always bleach you browser cache / cookies / web logs! 35x gutmann style! (Bleachbit, Ccleaner, etc.)
(10) No OS is safe. Just exclude as much personal information you can from your Operating System. Make sure its disconnected offline when not being used! Make sure bluetooth and WiFi is also physically disabled when not in use.
(11) Browser Security: Use Noscript add-on. Noscript is a must: make sure to block all global scripts, wipe the whitelist in Noscript and re-configure the whitelist that best fits your browser habits. IPFlood is also a useful add-on to obfuscate IP GET requests. You should use Random Agent Spoofer (or Blender) to spoof your browser & OS metadata while you surf the web, making it a lot harder to track your activity. Tin Foil is another great security addon.
(12) Its best to have two computers, rather than just one. For example, have one just for banking / legit LEGAL purposes. Have another one (completely separated) just for private or illegal activity. Make sure you don't put any personal info in the private computer.
(13) Use encryption and strong passwords! Write them down on a piece of paper or memorize them. DO NOT store passwords on a computer file. That is a big no-no! Try easy to remember long sentances for passwords, and combine all the words together. The more characters used, the harder it is for hackers to break the passwords.
(14) Have separate email accounts for each kind of activity (legal or not, don't matter).
(15) Make sure you physically disconnect your web cam or cover it up with black electrical tape. Most laptops these days come with web cams attached above or below the monitor. Make sure the camera cannot be used to identify you or spy on you in any way. (Yes, webcams can be hacked / remotely hijacked to spy on you!)
(16) Avoid new "Smart TVs" (they spy on you too)! If you have a newer TV, make sure you cover up or unplug the camera and microphone. Or keep it offline and disconnected from the cable box when not in use. You could cancle cable and rip DVDs of your favorite movies and shows instead, using it for offline purposes only.
(17) Avoid all new digitized vehicles. They can easily be hacked, used to spy on you and even be remotely hijacked by criminal entities/governments!

THE URBAN GUERRILLA'S WEAPONS 1/2

The urban guerrilla's weapons are light arms, easily obtained, usually captured from the enemy, purchased, or made on the spot. Light weapons have the advantage of fast handling and easy transport. In general, light weapons are characterized as being short-barrelled. This includes many automatic weapons. Automatic and semi-automatic weapons considerably increase the firepower of the urban guerrilla. The disadvantage of this type of weapon, for us, is the difficulty in controlling it, resulting in wasted rounds or a wasteful use of ammunition—corrected for only by a good aim and precision firing. Men who are poorly trained convert automatic weapons into an ammunition drain.
Experience has shown that the basic weapon of the urban guerrilla is the light submachine gun. This weapon, in addition to being efficient and easy to shoot in an urban area, has the advantage of being greatly respected by the enemy. The guerrilla must thoroughly know how to handle the submachine gun, now so popular and indispensible to the Brazilian urban guerrillas.

The ideal submachine gun for the urban guerrilla is the INA .45 caliber. Other types of submachine guns of different calibers can also be used—understanding of course, the problem of ammunition. Thus, it is preferable that the manufacturing capabilities of the urban guerrillas be used for the production of one type of submachine gun, so that the ammunition to be used can be standardized. Each firing group of urban guerrillas must have a submachine gun handled by a good marksman. The other members of the group must be armed with .38 revolvers, our standard weapon. The .32 is also useful for those who want to participate. But the .38 is preferable since its impact usually puts the enemy out of action.

Hand grenades and conventional smoke bombs can also be considered light weapons, with defensive power for cover and withdrawal.

Long-barrelled weapons are more difficult for the urban guerrilla to transport, and they attract much attention because of their size. Among the long-barrelled weapons are the FAL, the Mauser guns or rifles, hunting guns such as the Winchester, and others.
Shotguns can be useful if used at close range and point blank. They are useful even for a poor shot, especially at night when precision isn't much help. A pressure airgun can be useful for training in marksmanship. Bazookas and mortars can also be used in action, but the conditions for using them have to be prepared and the people who use them must be trained.

The urban guerrilla should not attempt to base his actions on the use of heavy weapons, which have major drawbacks in a type of fighting that demands lightweight weapons to insure mobility and speed.

Homemade weapons are often as efficient as the best weapons produced in conventional factories, and even a sawed-off shotgun is a good weapon for the urban guerrilla fighter.

Weapons 1/2

The urban guerrilla's role as a gunsmith has a basic importance. As a gunsmith, he takes care of the weapons, knows how to repair them, and in many cases can set up a small shop for improvising and producing effective small arms.
Experience in metallurgy and on the mechanical lathe are basic skills the urban guerrilla should incorporate into his manufacturing plans for the construction of homemade weapons. This production, and courses in explosives and sabotage, must be organized. The primary materials for practice in these courses must be obtained ahead of time, to prevent an incomplete apprenticeship—that is to say, so as to leave no room for experimentation.

Molotov cocktails, gasoline, homemade contrivances such as catapaults and mortars for firing explosives, grenades made of pipes and cans, smoke bombs, mines, conventional explosives such as dynamite and potassium chlorate, plastic explosives, gelatine capsules, and ammunition of every kind are indispensible to the success of the urban guerrilla's mission.

The methods of obtaining the necessary materials and munitions will be to buy them or to take them by force in expropriation actions specially planned and carried out. The urban guerrillas will be careful not to keep explosives and other materials that can cause accidents around for very long, but will always try to use them immediately on their intended targets.

The urban guerrilla's weapons and his ability to maintain them constitute his firepower. By taking advantage of modern weapons and introducing innovations in his firepower and in the use of certain weapons, the urban guerrilla can improve many of the tactics of urban warfare. An example of this was the innovation made by the Brazilian urban guerrillas when they introduced the use of the submachine gun in their attacks on banks.

When the massive use of uniform submachine guns becomes possible, there will be new changes in urban guerrilla warfare tactics. The firing group that utilizes uniform weapons and corresponding ammunition, with reasonable care for their maintenance, will reach a considerable level of effectiveness.

The urban guerrilla increases his effectiveness as he increases his firepower.

THE SHOT; THE URBAN GUERRILLA'S REASON FOR EXISTENCE

The urban guerrilla's reason for existence, the basic condition in which he acts and survives, is to shoot. The urban guerrilla must know how to shoot well, because it is required by this type of combat.

In conventional warfare, combat is generally at a distance with long-range weapons. In unconventional warfare, in which urban guerrilla warfare is included, combat is at short range and often very close. To prevent his own death, the urban guerrilla must shoot first, and he cannot err in his shot. He cannot waste his ammunition because he does not possess large amounts, and so he must conserve it. Nor can he replace his ammunition quickly, since he is a part of a small team in which each guerrilla has to be able to look after himself. The urban guerrilla can lose no time, and thus has to be able to shoot at once.

One basic fact, which we want to emphasize completely, and whose importance cannot be overestimated, is that the urban guerrilla must not fire continuously, using up his ammunition. It may be that the enemy is responding to this fire precisely because he is waiting until the guerrilla's ammunition is all used up. At such a moment, without having the opportunity to replace his ammunition, the guerrilla faces a rain of enemy fire, and can be taken prisoner or killed.
In spite of the value of the surprise factor, which many times makes it unnecessary for the urban guerrilla to use his weapons, he cannot be allowed the luxury of entering combat without knowing how to shoot. And when face-to-face with the enemy, he must always be moving from one position to another, since to stay in one place makes him a fixed target and, as such, very vulnerable.
The urban guerrilla's life depends on shooting, on his ability to handle his weapons well and to avoid being hit. When we speak of shooting, we speak of accuracy as well. Shooting must be practiced until it becomes a reflex action on the part of the urban guerrilla. To learn how to shoot and have good aim, the urban guerrilla must train himself systematically, utilizing every practice method shooting at targets, even in amusement parks and at home.

Shooting and marksmanship are the urban guerrilla's water and air. His perfection of the art of shooting may make him a special type of urban guerrilla—that is, a sniper, a category of solitary combatant indispensible in isolated actions. The sniper knows how to shoot at close range and at long range, and his weapons are appropriate for either type of shooting.

THE FIRING GROUP

In order to function, the urban guerrillas must be organized into small groups. A team of no more than four or five is called a firing group. A minimum of two firing groups, separated and insulated from other firing groups, directed and coordinated by one or two persons, this is what makes a firing team.

Within the firing group, there must be complete confidence among the members. The best shot, and the one who knows best how to handle the submachine gun, is the person in charge of operations.

The firing group plans and executes urban guerrilla actions, obtains and stores weapons, and studies and corrects its own tactics.

When there are tasks planned by the strategic command, these tasks take preference. But there is no such thing as a firing group without its own initiative. For this reason, it is essential to avoid any rigidity in the guerrilla organization, in order to permit the greatest possible initiative on the part of the flrlng group. The old-type hierarchy, the style of the traditional revolutionaries, doesn't exist in our organization. This means that, except for the priority of the objectives set by the strategic command, any firing group can decide to raid a bank, to kidnap or execute an agent of the dictatorship, a figure identified with the reaction, or a foreign spy, and can carry out any type of propaganda or war of nerves against the enemy, without the need to consult with the general command.

No firing group can remain inactive waiting for orders from above. Its obligation is to act. Any single urban guerrilla who wants to establish a firing group and begin action can do so, and thus becomes a part of the organization.
This method of action eliminates the need for knowing who is carrying out which actions, since there is free initiative and the only important point is to greatly increase the volume of urban guerrilla activity in order to wear out the government and force it onto the defensive.

The firing group is the instrument of organized action. Within it, guerrilla operations and tactics are planned, launched and carried through to success. The general command counts on the firing groups to carry out objectives of a strategic nature, and to do so in any part of the country. For its part, the general command helps the firing groups with their difficulties and with carrying out objectives of a strategic nature, and to do so in any part of the country.

The organization is an indestructable network of firing groups, and of coordinations among them, that functions simply and practically within a general command that also participates in attacks—an organization that exists for no other purpose than that of pure and simple revolutionary action.

THE LOGISTICS OF THE URBAN GUERRILLA

Conventional logistics can be expressed with the formula FFEA:
F—food
F—fuel
E—equipment
A—ammunition

Conventional logistics refer to the maintenance problems for an army or a regular armed force, transported in vehicles, with fixed bases and supply lines. Urban guerrillas, on the contrary, are not an army but small armed groups, intentionally fragmented. They have neither vehicles nor rear areas. Their supply lines are precarious and insufficient, and they have no fixed bases except in the rudimentary sense of a weapons factory within a house. While the goal of conventional logistics is to supply the war needs of the "gorillas" who are used to repress rural and urban rebellion, urban guerrilla logistics aim at sustaining operations and tactics which have nothing in common with conventional warfare and are directed against the government and foreign domination of the country.

For the urban guerrilla, who starts from nothing and who has no support at the beginning, logistics are expressed by the formula MMWAE, which is:
M—mechanization
M—money
W—weapons
A—ammunition
E—explosives

Revolutionary logistics takes mechanization as one of its bases. Nevertheless, mechanization is inseperable from the driver. The urban guerrilla driver is as important as the urban guerrilla machine gunner. Without either, the machines do not work, and the automobile, as well as the submachine gun becomes a dead thing. An experienced driver is not made in one day, and apprenticeship must begin early. Every good urban guerrilla must be a driver. As to the vehicles, the urban guerrilla must expropriate what he needs. When he already has resources, the urban guerrilla can combine the expropriation of vehicles with his other methods of acquisition.

Money, weapons, ammunition and explosives, and automobiles as well, must be expropriated. The urban guerrilla must rob banks and armories, and seize explosives and ammunition wherever he finds them.

None of these operations is carried out for just one purpose. Even when the raid is to obtain money, the weapons that the guards carry must be taken as well.
Expropriation is the first step in organizing our logistics, which itself assumes an armed and permanently mobile character.

The second step is to reinforce and expand logistics, resorting to ambushes and traps in which the enemy is surprised and his weapons, ammunition, vehicles and other resources are captured.
Once he has weapons, ammunition and explosives, one of the most serious logistics problems facing the urban guerrilla is a hiding place in which to leave the material, and appropriate means of transporting it and assembling it where it is needed. This has to be accomplished even when the enemy is alerted and has the roads blocked.

The knowledge that the urban guerrilla possesses of the terrain, and the devices he uses or is capable of using, such as scouts specially prepared and recruited for this mission, are the basic elements in solving the eternal logistics problems faced by the guerrillas.

Awesome thread. Do you (or can you) put this in a pastebin? I want to throw it inside of the image you posted.

CHARACTERISTICS OF THE URBAN GUERRILLA'S TACTICS

The tactics of the urban guerrilla have the following characteristics:

1. It is an aggressive tactic, or, in other words, it has an offensive character. As is well known, defensive action means death for us. Since we are inferior to the enemy in firepower, and have neither his resources nor his power base, we cannot defend ourselves against an offensive or a concentrated attack by the "gorillas". That is the reason why our urban technique can never be permanent, can never defend a fixed base nor remain in any one spot waiting to repell the circle of repression.
2. It is a tactic of attack and rapid withdrawal, by which we preserve our forces.
3. It is a tactic that aims at the development of urban guerrilla warfare, whose function will be to wear out, demoralize and distract the enemy forces, permitting the emergence and survival of rural guerrilla warfare, which is destined to play the decisive role in the revolutionary war.

THE INITIAL ADVANTAGES OF THE URBAN GUERRILLA

The dynamics of urban guerrilla warfare lie in the guerrilla's violent clash with the military and police forces of the dictatorship. In this conflict, the police have superiority. The urban guerrilla has inferior forces. The paradox is that the urban guerrilla is nevertheless the attacker.

The military and police forces, for their part, respond to the conflict by mobilizing and concentrating greatly superior forces in the pursuit and destruction of the urban guerrilla. The guerrilla can only avoid defeat if he depends on the initial advantages he has and knows how to exploit them to the end, to compensate for his weakness and lack of material.

The initial advantages are:
1. He must take the enemy by surprise.
2. He must know the terrain of the encounter.
3. He must have greater mobility and speed than the police and other repressive forces.
4. His information service must be better than the enemy's.
5. He must be in command of the situation, and demonstrate a decisiveness so great that everyone on our side is inspired and never thinks of hesitating, while on the other side the enemy is stunned and incapable of acting.

sry busy have more to dump

SURPRISE

To compensate for his general weakness and shortage of weapons compared to the enemy, the urban guerrilla uses surprise. The enemy has no way to combat surprise and becomes confused and is destroyed.

When urban guerrilla warfare broke out in Brazil, experience proved that surprise was essential to the success of any guerrilla operation.

The technique of surprise is based upon four essential requirements :
1. We know the situation of the enemy we are going to attack, usually by means of precise information and meticulous observation, while the enemy does not know he is going to be attacked and knows nothing about the attackers.
2. We know the strength of the enemy we are going to attack, and the enemy knows nothing about our strength.
3. Attacking by surprise, we save and conserve our forces, while the enemy is unable to do the same, and is left at the mercy of events.
4. We determine the time and place of the attack, fix its duration and establish its objectives. The enemy remains ignorant of all of this information.

KNOWLEDGE OF THE TERRAIN

The urban guerrilla's best ally is the terrain, and because this is so he must know it like the palm of his hand. To have the terrain as an ally means to know how to use with intelligence its unevenness, its high and low points, its turns, its irregularities, its fixed and secret passages, its abandoned areas, its thickets, etc., taking maximum advantage of all of this for the success of armed actions, escapes, retreats, covers, and hiding places. Impasses and narrow spots, gorges, streets under repair, police checkpoints, military zones and closed-off streets, the entrances and exits to tunnels and those that the enemy can close off, corners controlled or watched by the police, traffic lights and signals; all this must be thoroughly known and studied in order to avoid fatal errors.

Our problem is to get through and to know where and how to hide, leaving the enemy bewildered in areas he doesn't know. Being familiar with the avenues, streets, alleys, ins and outs, the corners of the urban centers, its paths and shortcuts, its empty lots, its underground passages, its pipes and sewer systems, the urban guerrilla safely crosses through the irregular and difficult terrain unfamiliar to the police, where the police can be surprised in a fatal ambush or trap at any moment.

Because he knows the terrain, the urban guerrilla can pass through it on foot, on bicycle, in a car, jeep or small truck, and never be trapped. Acting in small groups with only a few people, the guerrillas can rendezvous at a time and place determined beforehand, following up the initial attack with new guerrilla operations, or evading the police cordon and disorienting the enemy with their unexpected audacity.

It is an impossible problem for the police, in the labrynthian terrain of the urban guerrilla, to catch someone they cannot see, to repress someone they cannot catch, and to close in on someone they cannot find.

Our experience is that the ideal guerrilla is one who operates in his own city and thoroughly knows its streets, its neighborhoods, its transit problems, and its other peculiarities. The guerrilla outsider, who comes to a city whose streets are unfamiliar to him, is a weak spot, and if he is assigned certain operations, he can endanger them. To avoid grave mistakes, it is necessary for him to get to know the layout of the streets.

MOBILITY AND SPEED

To insure a mobility and speed that the police cannot match, the urban guerrilla needs the following:

1. Mechanization
2. Knowledge of the terrain
3. A disruption or suspension of enemy transport and communications
4. Light weapons

By carefully carrying out operations that last only a few moments, and leaving the site in mechanized vehicles, the urban guerrilla beats a rapid retreat, escaping capture.

The urban guerrilla must know the way in detail, and, in this manner, must go through the schedule ahead of time as a training, to avoid entering alleyways that have no exit, or running into traffic jams, or being stopped by the Transit Department's traffic signals.

The police pursue the urban guerrilla blindly, without knowing which road he is using for his escape. While the urban guerrilla escapes quickly because he knows the terrain, the police lose the trail and give up the chase.

The urban guerrilla must launch his operations far from the logistical centers of the police. A primary advantage of this method of operation is that it places us at a reasonable distance from the possibility of capture, which facilitates our evasion.

In addition to this necessary precaution, the urban guerrilla must be concerned with the enemy's communication system. The telephone is the primary target in preventing the enemy from access to information, by knocking out his communications systems.

Even if he knows about the guerrilla operation, the enemy depends on modern transportation for his logistics support, and his vehicles necessarily lose time carrying him through the heavy traffic of the large cities. It is clear that the tangled and treacherous traffic is a disadvantage for the enemy, as it would be for us if we were not ahead of him.

If we want to have a safe margin of security and be certain to leave no tracks for the future, we can adopt the following methods:

1. Deliberately intercept the police with other vehicles, or by seemingly casual inconveniences and accidents; but in this case the vehicles in question should neither be legal nor have real license numbers
2. Obstruct the roads with fallen trees, rocks, ditches, false traffic signs, dead ends or detours, or other clever methods
3. Place homemade mines in the way of the police; use gasoline or throw Molotov cocktails to set their vehicles on fire
4. Set off a burst of submachine gun fire or weapons such as the FAL aimed at the motor and tires of the cars engaged in the pursuit

With the arrogance typical of the police and the military authorities, the enemy will come to fight us equipped with heavy guns and equipment, and with elaborate maneuvers by men armed to the teeth. The urban guerrilla must respond to this with light weapons that can be easily transported, so he can always escape with maximum speed without ever accepting open fighting. The urban guerrilla has no mission other than to attack and quickly withdraw. We would leave ourselves open to the most crushing defeats if we burdened ourselves with heavy weapons and with the tremendous weight of the ammunition necessary to use them, at the same time losing our precious gift of mobility.

When our enemy fights against us with the cavalry, we are at no disadvantage as long as we are mechanized. The automobile goes faster than the horse. From within the car, we also have the target of the mounted police, knocking him down with submachine gun and revolver fire or with Molotov cocktails and hand grenades.

On the other hand, it is not so difficult for an urban guerrilla on foot to make a target of a policeman on horseback. Moreover, ropes across the street, marbles, and cork stoppers are very efficient methods of making them both fall. The great disadvantage faced by the mounted policeman is that he presents the urban guerrilla with two excellent targets—the horse and its rider.
Apart from being faster than the horseman, the helicopter has no better chance in pursuit. If the horse is too slow compared to the urban guerrilla's automobile, the helicopter is too fast. Moving at 200 kilometers an hour, it will never succeed in hitting from above a target that is lost among the crowds and street vehicles, nor can the helicopter land in public streets in order to capture someone. At the same time, whenever it flies too low, it will be excessively vulnerable to the fire of the urban guerrillas.

INFORMATION

The chances that the government has for discovering and destroying the urban guerrillas lessens as the power of the dictatorship's enemies becomes greater and more concentrated among the population.

This concentration of the opponents of the dictatorship plays a very important role in providing information about the actions of the police and government officials, as well as hiding the activities of the guerrillas. The enemy can also be thrown off with false information, which is worse for him because it is a tremendous waste.

By whatever means, the sources of information at the disposal of the urban guerrilla are potentially better than those of the police. The enemy is observed by the people, but he does not know who among the people transmits information to the urban guerrillas. The military and the police are hated by the people for the injustices and violence they have committed, and this facilitates obtaining information which is damaging to the activities of government agents.
Information, which is only a small segment of popular support, represents an extraordinary potential in the hands of the urban guerrilla.

The creation of an intelligence service, with an organized structure, is a basic need for us. The urban guerrilla has to have vital information about the plans and movements of the enemy; where they are, how they move, the resources of their banking network, their means of communication, and the secret activities they carry out. The reliable information passed on to the guerrillas represents a well-aimed blow at the dictatorship. The dictatorship has no way to defend itself in the face of an important leak which facilitates our destructive attacks.
The enemy also wants to know what actions we are planning so he can destroy us or prevent us from acting. In this sense, the danger of betrayal is present, and the enemy encourages betrayal and infiltrates spies into the guerrilla organization. The urban guerrilla's technique against this enemy tactic is to denounce publicly the spies, traitors, informers and provocateurs. Since our struggle takes place among the people and depends on their sympathy—while the government has a bad reputation because of its brutality, corruption and incompetence—the informers, spies, traitors and the police come to be enemies of the people, without supporters, denounced to the urban guerrillas and, in many cases, properly punished.

For his part, the urban guerrilla must not evade the duty—once he knows who the spy or informer is—of physically wiping him out. This is the proper method, approved by the people, and it minimizes considerably the incidence of infiltration or enemy spying.

For complete success in the battle against spies and informers, it is essential to organize a counter-espionage or counter-intelligence service. Nevertheless, as far as information is concerned, it cannot all be reduced to a matter of knowing the enemy's moves and avoiding the infiltration of spies. Intelligence information must be broad—it must embrace everything, including the most insignificant material. There is a technique of obtaining information, and the urban guerrilla must master it. Following this technique, intelligence information is obtained naturally, as a part of the life of the people.

The urban guerrilla, living in the midst of the population and moving about among them, must be attentive to all types of conversations and human relations, learning how to disguise his interest with great skill and judgement.

In places where people work, study, and live, it is easy to collect all kinds of information on payments, business, plans of all kinds, points of view, opinions, people's state of mind, trips, interior layout of buildings, offices and rooms, operations centers, etc.
Observation, investigation, reconnaissance, and exploration of the terrain are also excellent sources of information. The urban guerrilla never goes anywhere absentmindedly and without revolutionary precaution, always on the alert lest something occurs. Eyes and ears open, senses alert, his memory is engraved with everything necessary, now or in the future, to the continued activity of the guerrilla fighter.

Careful reading of the press with particular attention to the mass communication media, the research of accumulated data, the transmission of news and everything of note, a persistence in being informed and in informing others, all this makes up the intricate and immensely complicated question of information which gives the urban guerrilla a decisive advantage.

File from the Do/k/ument, lots of good stuff in it tbh

DECISIVENESS

It is not enough for the urban guerrilla to have in his favor surprise, speed, knowledge of the terrain, and information. He must also demonstrate his command of any situation and a capacity for decisiveness, without which all other advantages will prove to be useless.

It is impossible to carry out any action, however well-planned, if the urban guerrilla turns out to be indecisive, uncertain, irresolute. Even an action successfully begun can end in defeat if command of the situation and the capacity for decision falter in the middle of the execution of the plan. When this command of the situation and a capacity for decision are absent, the void is filled with hesitation and terror. The enemy takes advantage of this failure and is able to liquidate us.

The secret of the success of any operation, simple or complex, easy or difficult, is to rely on determined men. Strictly speaking, there are no simple operations: all must be carried out with the same care taken in the most difficult, beginning with the choice of the human elements—which means relying on leadership and the capacity for decision in every situation.

One can see ahead of time whether an action will be successfull or not by the way its participants act during the preparatory period. Those who fall behind, who fail to make designated contacts, are easily confused, forget things, fail to complete the basic tasks of the work, possibly are indecisive men and can be a danger. It is better not to include them.

Decisiveness means to put into practice the plan that has been devised with determination, with audacity, and with an absolute firmness. It takes only one person who hesitates to lose all.

OBJECTIVES OF THE GUERRILLA'S ACTIONS

With his tactics developed and established, the urban guerrilla trains himself in methods of action leading to attack, and, in Brazil, has the following objectives:

1. To threaten the triangle within which the Brazilian state and North American domination are maintained, a triangle whose points are Rio, Sao Paulo and Belo Horizonte, and whose base is the axis Rio—San Paulo, where the giant industrial, financial, economic, political, cultural, military, and police complex that holds the decisive power of the country is located.

2. To weaken the local militia and the security systems of the dictatorship, given the fact that we are attacking and the "gorillas"
defending, which means catching the government in a defensive position with its troops immobilized in the defense of the entire complex of national maintenance, with its ever-present fears of an attack on its strategic nerve centers, and without ever knowing where, how or when the attack will come.

3. To attack every area with many different armed groups, small in size, each self-contained and operating independently, to disperse the government forces in their pursuit of a thoroughly fragmented organization, instead of offering the dictatorship the opportunity to concentrate its forces in the destruction of one tightly organized system operating throughout the country.

4. To give proof of its combatitivenes, decision, firmness, determination, and persistence in the attack on the military dictatorship, in order to allow all rebels to follow in our example and to fight with urban guerrilla tactics. Meanwhile, the government with all of its problems, incapable of halting guerrilla actions within the cities, will lose time and suffer endless attrition, and will finally be forced to pull back its repressive forces in order to mount guard over all the banks, industries, armories, military barracks, prisons, public offices, radio and television stations, North American firms, gas storage tanks, oil refineries, ships, airplanes, ports, airports, hospitals, health centers, blood banks, stores, garages, embassies, residences of high-ranking members of the regime such as ministers and generals, police stations, official organizations, etc.

5. To increase urban guerrilla actions gradually into an endless number of surprise raids, such that the government cannot leave the urban area to pursue guerrillas in the rural interior without running the risk of abandoning the cities and permitting rebellion to increase on the coast as well as the interior of the country.

6. To force the Army and the police, their commanders and their assistants, to give up the relative comfort and tranquility of their barracks and their usual rest, for a state of fear and growing tension in the expectation of attack, or in a search for trails which vanish without a trace.

7. To avoid open battle and decisive combat with the government, limiting the struggle to brief, rapid attacks with lightning results.

8. To insure for the urban guerrilla a maximum freedom of movement and of action, without ever relinquishing the use of armed action, remaining firmly oriented towards helping the formation of rural guerrilla warfare and supporting the construction of a revolutionary army for national liberation.

ON THE TYPES AND NATURE OF MISSIONS FOR THE URBAN GUERRILLA

In order to achieve the objectives previously listed, the urban guerrilla is obliged, in his tactics, to follow missions whose nature is as different or diversified as possible. The urban guerrilla does not arbitrarily choose this or that mission. Some actions are simple; others are complicated. The inexperienced guerrilla must be gradually introduced into actions and operations which run from the simple to the complex. He begins with small missions and tasks until he becomes completely experienced.
Before any action, the urban guerrilla must think of the methods and the personnel at his disposal to carry out the mission. Operations and actions that demand the urban guerrilla's technical preparation cannot be carried out by someone who lacks the technical skill.

With these precautions, the missions which the urban guerrilla can undertake are the following:

1. assaults
2. raids and penetrations
3. occupations
4. ambushes
5. street tactics
6. strikes and work stoppages
7. desertions, diversions, seizures,
expropriation of weapons,
ammunition and explosives
8. liberation of prisoners
9. executions
10. kidnappings
11. sabotage
12. terrorism
13. armed propaganda
14. war of nerves

ASSAULTS

Assaults are the armed attacks which we make to expropriate funds, liberate prisoners, capture explosives, submachine guns, and other types of weapons and ammunition. Assaults can take place in broad daylight or at night. Daytime assaults are made when the objective cannot be achieved at any other hour, such as the transport of money by banks, which is not done at night. Night assault is usually the most advantageous for the guerrilla. The ideal is for all assaults to take place at night, when conditions for a surprise attack are most favorable and the darkness facilitates escape and hides the identity of the participants. The urban guerrilla must prepare himself, nevertheless, to act under all conditions, daytime as well as night.

The must vulnerable targets for assaults are the following:

1. credit establishments
2. commercial and industrial
enterprises, including plants for the
manufacture of weapons and
explosives
3. military establishments
4. commissaries and police stations
5. jails
6. government property
7. mass communications media
8. North American firms and properties
9. government vehicles, including
military and police vehicles, trucks,
armored vehicles, money carriers,
trains, ships, and airplanes.

The assaults on businesses use the same tactics, because in every case the buildings represent a fixed target. Assaults on buildings are planned as guerrilla operations, varied according to whether they are against banks, a commercial enterprise, industries, military bases, commissaries, prisons, radio stations, warehouses for foreign firms, etc.

The assault on vehicles—money-carriers, armored vehicles, trains, ships, airplanes—are of another nature, since they are moving targets. The nature of the operation varies according to the situation and the circumstances—that is, whether the vehicle is stationary or moving. Armored cars, including military vehicles, are not immune to mines. Roadblocks, traps, ruses, interception by other vehicles, Molotov cocktails, shooting with heavy weapons, are efficient methods of assaulting vehicles. Heavy vehicles, grounded airplaces and anchored ships can be seized and their crews and guards overcome. Airplanes in flight can be hijacked by guerrilla action or by one person. Ships and trains in motion can be assaulted or captured by guerrilla operations in order to obtain weapons and ammunition or to prevent troop movements.

whatcha doin rabbi

Attached: 22LR HomeMade Silencer.pdf (

THE BANK ASSAULT AS POPULAR MISSION

The most popular mission is the bank assault. In Brazil, the urban guerrillas have begun a type of organized assault on the banks as a guerrilla operation. Today, this type of assault is widely used, and has served as a sort of preliminary test for the urban guerrilla in his training in the tactics of urban guerrilla warfare.
Important innovations in the tactics of assaulting banks have developed, guaranteeing escape, the withdrawal of money, and the anonymity of those involved. Among these innovations, we cite the shooting of tires of cars to prevent pursuit, locking people in the bank bathroom, making them sit on the floor, immobilizing the bank guards and taking their weapons, forcing someone to open the safe or the strong box, and using disguises.

Attempts to install bank alarms, to use guards or electronic detection devices prove fruitless when the assault is political and is carried out according to urban guerrilla warfare techniques. This guerrilla method uses new techniques to meet the enemy's tactical changes, has access to firepower that is growing every day, becomes increasingly more experienced and more confident, and uses a larger number of guerrillas every time; all to guarantee the success of operations planned down to the last detail.

The bank assault is a typical expropriation. But, as is true with any kind of armed expropriatory action, the guerrilla is handicapped by a two-fold competition:

1. competition from the outlaw
2. competition from the right-wing counter-revolutionary

This competition produces confusion, which is reflected in the people's uncertainty. It is up to the urban guerrilla to prevent this from happening, and to accomplish this he must use two methods:

1. He must avoid the outlaw's technique, which is one of unnecessary violence and the expropriation of goods and possessions belonging to the people

2. He must use the assault for propaganda purposes at the very moment it is taking place, and later distribute material, leaflets—every possible means of explaining the objectives and the principles of the urban guerrillas, as expropriator of the government and the ruling elite.

RAIDS AND PENETRATIONS

Raids and penetrations are rapid attacks on establishments located in neighborhoods, or even in the center of the city, such as small military units, commissaries, hospitals, to cause trouble, seize weapons, punish and terrorize the enemy, take reprisals, or to rescue wounded prisoners or those hospitalized under police guard. Raids and penetrations are also made on garages and depots to destroy vehicles and damage installations, especially if they are North American firms and property. When they take place on certain stretches of highway or in certain distant neighborhoods, these raids can serve to force the enemy to move great numbers of troops, a totally useless effort since when they get there they will find nobody to fight. When they are carried out on certain houses, offices, archives or public offices, their purpose is to capture or search for secret papers and documents with which to denounce deals, compromises and the corruption of men in government, their dirty deals and criminal transactions. Raids and penetrations are most effective if they are carried out at night.

OCCUPATIONS

Occupations are a type of attack carried out when the urban guerrilla stations himself in specific establishments and locations, for a temporary action against the enemy or for some propaganda purpose. The occupation of factories and schools during strikes, or at other times, is a method of protest or of distracting the enemy's attention. The occupation of radio stations is for propaganda purposes.

Occupation is a highly effective model for action but, in order to prevent losses and material damage to our forces, it is always a good idea to plan on the possibility of a forced withdrawal. It must always be meticulously planned, and carried out at the opportune moment. Occupations always have a time limit, and the swifter they are completed, the better.

AMBUSH

Ambushes are attacks, typified by surprise, when the enemy is trapped on the road or when he makes a police net surrounding a house or estate. A false alarm can bring the enemy to the spot, where he falls into a trap.

The principle object of the ambush is to capture enemy weapons and to punish him with death. Ambushes to halt passenger trains are for propaganda purposes, and, when they are troop trains, the object is to annihilate the enemy and seize his weapons. The urban guerrilla sniper is the kind of fighter specially suited for ambush, because he can hide easily in the irregularities of the terrain, on the roofs and the tops of buildings and apartments under construction. From windows and dark places, he can take careful aim at his chosen target.

Ambush has devestating effects on the enemy, leaving him unnerved, insecure and fearful.

STREET TACTICS

Street tactics are used to fight the enemy in the streets, utilizing the participation of the population against him.

In 1968, the Brazilian students used excellent street tactics against police troops, such as marching down streets against traffic and using slingshots and marbles against mounted police. Other street tactics consist of constructing barricades; pulling up paving blocks and hurling them at the police; throwing bottles, bricks, paperweights and other projectiles at the police from the top of office and apartment buildings; using buildings and other structures for escape, for hiding and for supporting surprise attacks. It is equally necessary to know how to respond to enemy tactics. When the police troops come wearing helmets to protect them against flying objects, we have to divide ourselves into two teams—one to attack the enemy from the front, the other to attack him in the rear—withdrawing one as the other goes into action to prevent the first from being struck by projectiles hurled by the second. By the same token, it is important to know how to respond to the police net. When the police designate certain of their men to go into the crowd and arrest a demonstrator, a larger group of urban guerrillas must surround the police group, disarming and beating them and at the same time allowing the prisoner to escape. This urban guerrilla operation is called "the net within a net".
When the police net is formed at a school building, a factory, a place where demonstrators gather, or some other point, the urban guerrilla must not give up or allow himself to be taken by surprise. To make his net effective, the enemy is obliged to transport his troops in vehicles and special cars to occupy strategic points in the streets, in order to invade the building or chosen locale. The urban guerrilla, for his part, must never clear a building or an area and meet in it without first knowing its exits, the way to break an encirclement, the strategic points that the police must occupy, and the roads that inevitably lead into the net, and he must hold other strategic points from which to strike at the enemy. The roads followed by police vehicles must be mined at key points along the way and at forced roadblocks. When the mines explode, the vehicles will be knocked into the air. The police will be caught in the trap and will suffer losses and be victims of an ambush. The net must be broken by escape routes which are unknown to the police. The rigorous planning of a withdrawal is the best way to frustrate any encircling effort on the part of the enemy. When there is no possibility of an escape plan, the urban guerrilla must not hold meetings, gatherings or do anything, since to do so will prevent him from breaking through the net which the enemy will surely try to throw around him.

Street tactics have revealed a new type of urban guerrilla who participates in mass protests. This is the type we designate as the "urban guerrilla demonstrator", who joins the crowds and participates in marches with specific and definate aims in mind. The urban guerrilla demonstrator must initiate the "net within the net", ransacking government vehicles, official cars and police vehicles before turning them over or setting fire to them, to see if any of them have money or weapons.

Snipers are very good for mass demonstrations, and along with the urban guerrilla demonstrator can play a valuable role. Hidden at strategic points, the snipers have complete success using shotguns or submachine guns, which can easily cause losses among the enemy.

STRIKES AND WORK INTERRUPTIONS

The strike is a model of action employed by the urban guerrilla in work centers and schools to damage the enemy by stopping work and study activities. Because it is one of the weapons most feared by the exploiters and oppressors, the enemy uses tremendous firepower and incredible violence against it. The strikers are taken to prison, suffer beatings, and many of them wind up killed.

The urban guerrilla must prepare the strike in such a way as to leave no track or clue that can identify the leaders of such an action. A strike is successful when it is organized by a small group, if it is carefully prepared in secret using the most clandestine methods. Weapons, ammunition, Molotov cocktails, homemade weapons of destruction and attack, all of these must be supplied beforehand in order to meet the enemy. So that the action can do the greatest possible amount of damage, it is a good idea to study and put into effect a sabotage plan. Strikes and study interruptions, although they are of brief duration, cause severe damage to the enemy. It is enough for them to crop up at different locations and in differing sections of the same area, disrupting daily life, occuring endlessly, one after the other, in true guerrilla fashion.
In strikes or in simple work interruptions, the urban guerrilla has recourse to the occupation or penetration of the site, or he can simply make a raid. In that case, his objective is to take captives, to capture prisoners, or to capture enemy agents and propose an exchange for arrested strikers.

In certain cases, strikes and brief work interruptions can offer an excellent opportunity for preparing ambushes or traps, whose aim is the physical destruction of the police. The basic fact is that the enemy suffers losses as well as material and moral damage, and is weakened by the action.

DESERTIONS, DIVERSIONS, SEIZURES, EXPROPRIATION OF AMMUNITION AND EXPLOSIVES

Desertion and the diversion of weapons are actions carried out in military bases, ships, military hospitals, etc. The urban guerrilla soldier or officer must desert at the most opportune moment with modern weapons and ammunition, to hand them over to the guerrillas. One of the most opportune moments is when the urban guerrilla soldier is called upon to pursue his guerrilla comrades outside the military base. Instead of following the orders of the "gorillas", the military urban guerrilla must join the ranks of the revolutionaries by handing over the weapons and ammunition he carries, or the military vehicle he operates. The advantage of this method is that the rebels receive weapons and ammunition from the army, navy, air force, military police, civilian guard or the police without any great work, since it reaches their hands by government transportation.
Other opportunities may occur in the barracks, and the military urban guerrilla must always be alert to this. In case of carelessness on the part of commanders or in other favorable conditions—such as bureaucratic attitudes or the relaxation of discipline on the part of lieutenants or other internal personnel—the military urban guerrilla must no longer wait but must try to inform the guerrillas and desert with as large a supply of weapons as possible.

When there is no possibility of deserting with weapons and ammunition, the military urban guerrilla must engage in sabotage, starting fires and explosions in munitions dumps. This technique of deserting with weapons and of raiding and sabotaging the military centers is the best way of wearing out and demoralizing the enemy and leaving them confused. The urban guerrilla's purpose in disarming an individual enemy is to capture his weapons. These weapons are usually in the hands of sentinels or others whose task is guard duty. The capture of weapons may be accomplished by violent means or by cleverness and tricks or traps. When the enemy is disarmed, he must be searched for weapons other than those already taken from him. If we are careless, he can use the weapons that were not seized to shoot the urban guerrilla. The seizure of weapons is an efficient method of aquiring submachine guns, the urban guerrilla's most important weapon. When we carry out small operations or actions to seize weapons and ammunition, the materiel captured may be for personal use or for armaments and supplies for the firing teams.

The necessity to provide firepower for the urban guerrillas is so great that, in order to take off from the zero point, we often have to purchase one weapon, divert or capture a single gun. The basic point is to begin, and to begin with a spirit of decisiveness and boldness. The possession of a single submachine gun multiplies our forces. In a bank assault, we must be careful to seize the weapons of the bank guard. The rest of the weapons will be found with the treasurer, the bank tellers or the manager, and must also be seized. Quite often, we succeed in capturing weapons in police stations, as a result of raids. The capture of weapons, ammunition and explosives is the urban guerrilla's goal in assaulting commercial businesses, industries and quarries.

LIBERATION OF PRISONERS

The liberation of prisoners is an armed action designed to free jailed urban guerrillas. In daily struggle against the enemy, the urban guerrilla is subject to arrest, and can be sentenced to unlimited years in jail.

This does not mean that the battle ends here. For the guerrilla, his experience is deepened by prison, and struggle continues even in the dungeons where he is held. The imprisoned guerrilla views the prisons of the enemy as a terrain which he must dominate and understand in order to free himself by a guerrilla operation. There is no jail, either on an island, in a city penitentiary, or on a farm, that is impregnable to the slyness, cleverness and firepower of the rebels.

The urban guerrilla who is free views the jails of the enemy as the inevitable site of guerrilla actions designed to liberate his ideological comrades from prison. It is this combination of the urban guerrilla in freedom and the urban guerrilla in jail that results in the armed operations we refer to as "liberation of prisoners".

The guerrilla operations that can be used in liberating prisoners are the following;

1. riots in penal establishments, in correctional colonies or camps, or on transport or prison ships;
2. assaults on urban or rural prisons, detention centers, prison camps, or any other permanent or temporary place where prisoners are held;
3. assaults on prisoner transport trains or convoys;
4. raids and penetrations of prisons; 5. ambushing of guards who move prisoners.

EXECUTIONS

xecution is the killing of a foreign spy, of an agent of the dictatorship, of a police torturer, of a dictatorial personality in the government involved in crimes and persecutions against patriots, of a stool pigeon, informer, police agent or police provocateur. Those who go to the police of their own free will to make denunciations and accusations, who supply information and who finger people, must be executed when they are caught by the urban guerrillas.

Execution is a secret action, in which the least possible number of urban guerrillas are involved. In many cases, the execution can be carried out by a single sniper, patient, alone and unknown, and operating in absolute secrecy and in cold blood.

KIDNAPPING

Kidnapping is capturing and holding in a secret place a spy, political personality or a notorious and dangerous enemy of the revolutionary movement. Kidnapping is used to exchange or liberate imprisoned revolutionaries or to force the suspension of torture in jail by the military dictatorship.

The kidnapping of personalities who are well-known artists, sports figures or who are outstanding in some other field, but who have evidenced no political interest, can be a useful form of propaganda for the guerrillas, provided it occurs under special circumstances, and is handled so the public understands and sympathizes with it. The kidnappings of foreigners or visitors constitutes a form of protest against the penetration and domination of imperialism in our country.

How do you if you're being watched? I've had a couple of weird encounters with people, like guys in black hoods in 90 degree heat while i'm the middle of the park start following me and cars pull up to me in the middle of night while I was walking my dog.

I think I said something I wasn't suppose to. I don't think it's LE.

SABOTAGE

Sabotage is a highly destructive type of attack using very few persons—and sometimes requiring only one—to accomplish the desired result. When the urban guerrilla uses sabotage, the first step is isolated sabotage. Then comes the step of dispersed and general sabotage, carried out by the population. Well-executed sabotage demands study, planning and careful action. A characteristic form of sabotage is explosion, using dynamite, fire or the placing of mines. A little sand, a trickle of any kind of combustible, a poor lubrication job, a screw removed, a short circuit, inserted pieces of wood or iron, can cause irreparable damage. The objective of sabotage is to hurt, to damage, to make useless and to destroy vital enemy points such as the following:

1. the economy of the country
2. agricultural or industrial production
3. transport and communication systems
4. military and police systems and their establishments and depots
5. the repressive military-police system
6. the firms and properties of exploiters in the country

The urban guerrilla should endanger the economy of the country, particularly its economic and financial aspects, such as its domestic and foreign banking network, its exchange and credit systems, its tax collection system, etc.
Public offices, centers of government and government depots are easy targets for sabotage. Nor will it be easy to prevent the sabotage of agricultural and industrial production by the urban guerrilla, with his thorough knowledge of the local situation. Factory workers acting as urban guerrillas are excellent industrial saboteurs, since they, better than anyone, understand the industry, the factory, the machinery or the part most likely to destroy an entire operation, doing much more damage than a poorly-informed layman could do.

With respect to the enemy's transport and communications systems, beginning with railway traffic, it is necessary to attack them systematically with sabotage. The only caution is against causing death and injury to passengers, especially regular commuters on suburban and long-distance trains. Attacks on freight trains, rolling or stationary stock, stoppage of military transports and communciations systems, these are the major objectives in this area. Sleepers can be damaged and pulled up, as can rails. A tunnel blocked by a barrier of explosives, or an obstruction caused by a derailed car, causes enormous harm.

The derailment of a train carrying fuel is of major damage to the enemy. So is dynamiting a railroad bridge. In a system where the size and weight of the rolling equipment is enormous, it takes months for workers to repair or rebuild the destruction and damage. As for highways, they can be obstructed with trees, stationary vehicles, ditches, dislocation of barriers by dynamite, and bridges destroyed by explosions. Ships can be damaged at anchor in seaports or riverports, or in the shipyards. Aircraft can be destroyed or damaged on the ground. Telephone and telegraph lines can be systematically damaged, their towers blown up, and their lines made useless. Transport and communications must be sabotaged immediately because the revolutionary movement has already begun in Brazil, and it is essential to impede the enemy's movement of troops and munitions.

Oil lines, fuel plants, depots for bombs and ammunition arsenals, military camps and bases must become targets for sabotage operations, while vehicles, army trucks and other military or police vehicles must be destroyed wherever they are found. The military and police repression centers and their specialized organs must also claim the attention of the guerrilla saboteur. Foreign firms and properties in the country, for their part, must become such frequent targets of sabotage that the volume of actions directed against them surpasses the total of all other actions against enemy vital points.

TERRORISM (lol)

Terrorism is an action, usually involving the placement of an explosive or firebomb of great destructive power, which is capable of effecting irreparable loss against the enemy. Terrorism requires that the urban guerrilla should have adequate theoretical and practical knowledge of how to make explosives.
The terrorist act, apart from the apparent ease with which it can be carried out, is no different from other guerrilla acts and actions whose success depends on planning and determination. It is an action which the urban guerrilla must execute with the greatest calmness and determination. Although terrorism generally involves an explosion, there are cases in which it may be carried out through executions or the systematic burning of installations, properties, plantations, etc. It is essential to point out the importance of fires and the construction of incendiary devices such as gasoline bombs in the technique of guerrilla terrorism. Another thing is the importance of the material the urban guerrilla can persuade the people to expropriate in the moments of hunger and scarcity brought about by the greed of the big commercial interests. Terrorism is a weapon the revolutionary can never relinquish.

ARMED PROPAGANDA

The coordination of urban guerrilla activities, including each armed action, is the primary way of making armed propaganda. These actions, carried out with specific objectives and aims in mind, inevitably become propaganda material for the mass communication system. Bank robberies, ambushes, desertions and the diverting of weapons, the rescue of prisoners, executions, kidnappings, sabotage, terrorism and the war of nerves are all cases in point.
Airplanes diverted in flight by guerrillla action, ships and trains assaulted and seized by armed guerrillas, can also be carried out solely for propaganda effect. But the urban guerrilla must never fail to install a clandestine press, and must be able to turn out mimeographed copies using alcohol or electric plates and other duplicating apparatus, expropriating what he cannot buy in order to produce small clandestine newspapers, pamphlets, flyers and stamps for propaganda and agitation against the dictatorship.
The urban guerrilla engaged in clandestine printing facilitates enormously the incorporation of large numbers of people into the struggle, by opening a permanent work front for those willing to carry on propaganda, even when to do so means to act alone and risk their lives.

With the existence of clandestine propaganda and agitational material, the inventive spirit of the urban guerrilla expands and creates catapaults, artifacts, mortars and other instruments with which to distribute the anti-government propaganda at a distance. Tape recordings, the occupation of radio stations, the use of loudspeakers, graffiti on walls and other inaccessible places are other forms of propaganda. A consistent propaganda by letters sent to specific addresses, explaining the meaning of the urban guerrilla's armed actions, produces considerable results and is one method of influencing certain segments of the population.

Even this influence—exercised in the heart of the people by every possible propaganda device, revolving around the activity of the urban guerrilla—does not indicate that our forces have everyone's support. It is enough to win the support of a portion of the population, and this can be done by popularizing the motto, "Let he who does not wish to do anything for the guerrillas do nothing against them."

THE WAR OF NERVES

The war of nerves or psychological warfare is an aggressive technique, based on the direct or indirect use of mass media and rumors in order to demoralize the government. In psychological warfare, the government is always at a disadvantage because it imposes censorship on the media and winds up in a defensive position by not allowing anything against it to filter through. At this point, it becomes desperate, is involved in greater contradictions and loss of prestige, and loses time and energy in an exhausting effort at control which is liable to be broken at any moment.

The objective of the war of nerves is to mislead, spreading lies among the authorities in which everyone can participate, thus creating an atmosphere of nervousness, discredit, insecurity, uncertainty and concern on the part of the government.

The best methods used by urban guerrillas in the war of nerves are the following:

1. Using the telephone and the mail to announce false clues to the police and government, including information on the planting of bombs and any other act of terrorism in public offices and other places—kidnapping and assassination plans. etc.—to force the authorities to wear themselves out by following up on the false information fed to them;

2. Letting false plans fall into the hands of the police to divert their attention;

3. Planting rumors to make the government uneasy;

4. Exploiting by every means possible the corruption, the mistakes and the failures of the government and its representatives, forcing them into demoralizing explanations and justifications in the very communication media they wish to maintain under censorship;

5. Presenting denunciations to foreign embassies, the United Nations, the papal nunciature, and the international commissions defending human rights or freedom of the press, exposing each concrete violation and each use of violence by the military dictatorship and making it known that the revolutionary war will continue with serious danger for the enemies of the population.

HOW TO CARRY OUT THE ACTION

The urban guerrilla who correctly carries through his apprenticeship and training must give the greatest possible importance to his method of carrying out actions, for in this he cannot commit the slightest error. Any carelessness in learning tactics and their use invites certain disaster, as experience teaches us every day. Common criminals commit errors frequently because of their tactics, and this is one of the reasons why the urban guerrillas must be so insistently preoccupied with following revolutionary tactics, and not the tactics of bandits. And not only for that reason. There is no urban guerrilla worthy of the name who ignores the revolutionary method of action and fails to practice it rigorously in the planning and execution of his activities.

"The giant is known by his toe." The same can be said of the urban guerrilla, who is known from afar by his correct tactics and his absolute fidelity to principle.

The revolutionary method of carrying out actions is strongly and forcefully based on the knowledge and use of the following elements;

1. investigation and intelligence gathering
2. observation and vigilance
3. reconnaissance, or exploration of the terrain
4. study and timing of routes
5. mapping
6. mechanization
7. careful selection of personnel
8. selection of firepower
9. study and practice in success
10. success
11. use of cover
12. retreat
13. dispersal
14. the liberation or transfer of prisoners
15. the elimination of evidence
l6. the rescue of wounded

SOME OBSERVATIONS ON TACTICS

When there is no information, the point of departure for planning the action must be investigation, observation and vigilance. This method produces good results. In any event, even when there is information, it is essential to make observations to see that information is not at odds with observation or vice versa. Reconnaissance or exploration of the terrain and the study and timing of routes are so important that to omit them is to make a stab in the dark.

Mechanization, in general, is an underestimated factor in the tactics of conducting an action. Frequently, mechanization is left to the end, on the eve of the action, before anything is done about it. This is a mistake. Mechanization must be seriously considered. It must be undertaken with considerable foresight and with careful planning, based on careful and precise information. The care, conservation, maintenance and camouflaging of stolen vehicles are very important details of mechanization. When transportation fails, the primary action fails, with serious material and morale problems for the urban guerrillas. The selection of personnel requires great care in order to avoid the inclusion of indecisive or wavering persons who present the danger of contaminating others, a danger that must be avoided.

The withdrawal is equally or more important than the operation itself, to the point that it must be rigorously planned, including the possibility of defeat. One must avoid rescue or transfer of prisoners with children present, or anything to attract the attention of people passing through the area. The best thing is to make the rescue appear as natural as possible, winding through different routes or narrow streets that scarcely permit passage on foot, in order to avoid an encounter hetween two cars. The elimination of tracks is obligatory and demands the greatest caution—also in removing fingerprints and any other sign that could give the enemy information. Lack of care in the elimination of evidence is a factor that increases nervousness in our ranks, which the enemy often exploits.

RESCUE OF THE WOUNDED

he problem of the wounded in urban guerrilla warfare merits special attention. During guerrilla operations in the urban area, it may happen that some comrade is wounded by the police. When a guerrilla in the firing group has a knowledge of first aid, he can do something for the wounded comrade on the spot. Under no circumstances should the wounded guerrilla be abandoned at the site of the battle or left in the enemy's hands. One of the precautions we must take is to set up first-aid courses for men and women, courses in which guerrillas can learn the rudiments of emergency medicine. The urban guerrilla who is a doctor, nurse, med student, pharmacist or who simply has had first aid training is a necessity in modern guerrilla struggle. A small manual of first aid for urban guerrillas, printed on mimeographed sheets, can also be produced by anyone who has enough knowledge.

In planning and carrying out an armed action, the urban guerrilla cannot forget the organization of medical support. This must be accomplished by means of a mobile or motorized clinic. You can also set up a mobile first aid station. Another solution is to utilize the skills of a medical comrade, who waits with his bag of equipment in a designated house to which the wounded are brought. The ideal would be to have our own well-equipped clinic, but this is very expensive unless we expropriate all of our materials.

When all else fails, it is often necessary to resort to legal clinics, using armed force if necessary to force a doctor to treat our wounded. In the eventuality that we fall back upon blood banks to purchase blood or plasma, we must not use legal addresses and certainly no addresses where the wounded can really be found, since they are under our care and protection. Nor should we supply the addresses of those involved in the guerrilla organization to the hospitals and health care clinics where we may take them. Such caution is indispensable to covering our tracks. The houses in which the wounded stay cannot be known to anyone but the small group of comrades responsible for their care and transport. Sheets, bloody clothing, medicine and any other indications of treatment of comrades wounded in combat must be completely eliminated from any place they visit to receive treatment.

GUERRILLA SECURITY

The urban guerrilla lives in constant danger of the possibility of being discovered or denounced. The primary security problem is to make certain that we are well-hidden and well-guarded, and that there are secure methods to keep the police from locating us. The worst enemy of the urban guerrilla, and the major danger that we run into, is infiltration into our organization by a spy or informer. The spy trapped within the organization will be punished with death. The same goes for those who desert and inform to the police. A well-laid security means there are no spies or agents infiltrated into our midst, and the enemy can receive no information about us even through indirect means. The fundamental way to insure this is to be strict and cautious in recruiting. Nor is it permissible for everyone to know everything and everyone. This rule is a fundamental ABC of urban guerrilla security. The enemy wants to annihilate us and fights relentlessly to find us and destroy us, so our greatest weapon lies in hiding from him and attacking by surprise.

The danger to the urban guerrilla is that he may reveal himself through carelessness or allow himself to be discovered through a lack of vigilance. It is impermissible for the urban guerrilla to give out his own or any other clandestine address to the police, or to talk too much. Notations in the margins of newspapers, lost documents, calling cards, letters or notes, all these are evidence that the police never underestimate. Address and telephone books must be destroyed, and one must not write or hold any documents. It is necessary to avoid keeping archives of legal or illegal names, biographical information, maps or plans. Contact numbers should not be written down, but simply committed to memory. The urban guerrilla who violates these rules must be warned by the first one who notes this infraction and, if he repeats it, we must avoid working with him in the future. The urban guerrilla's need to move about constantly with the police nearby—given the fact that the police net surrounds the city—forces him to adopt various security precautions depending upon the enemy's movements. For this reason, it is necessary to maintain a daily information service about what the enemy appears to be doing, where the police net is operating and what points are being watched. The daily reading of the police news in the newspapers is a fountain of information in these cases. The most important lesson for guerrilla security is never, under any circumstances, to permit the slightest laxity in the maintenance of security measures and precautions within the organization.

Guerrilla security must also be maintained in the case of an arrest. The arrested guerrilla must reveal nothing to the police that will jeopardize the organization.

he must say nothing that will lead, as a consequence, to the arrest of other comrades, the discovery of addresses or hiding places, or the loss of weapons and ammunition.

THE SEVEN SINS OF THE URBAN GUERRILLA

Even when the urban guerrilla applies proper tactics and abides by its security rules, he can still be vulnerable to errors. There is no perfect urban guerrilla. The most he can do is make every effort to diminish the margin of error, since he cannot be perfect. One of the means we should use to diminish the possibility of error is to know thoroughly the seven deadly sins of the urban guerrilla and try to avoid them.

The first sin of the guerrilla is inexperience. The urban guerrilla, blinded by this sin, thinks the enemy is stupid, underestimates the enemy's intelligence, thinks everything is easy and, as a result, leaves evidence that can lead to disaster. Because of his inexperience, the urban guerrilla may also overestimate the forces of the enemy, believing them to be stronger than they really are. Allowing himself to be fooled by this presumption, the urban guerrilla becomes intimidated and remains insecure and indecisive, paralyzed and lacking in audacity.

The second sin of the urban guerrilla is to boast about the actions he has undertaken and to broadcast them to the four winds.

The third sin of the urban guerrilla is vanity. The guerrilla who suffers from this sin tries to solve the problems of the revolution by actions in the city, but without bothering about the beginnings and survival of other guerrillas in other areas. Blinded by success, he winds up organizing an action that he considers decisive and that puts into play the entire resources of the organization. Since we cannot afford to break the guerrilla struggle in the cities while rural guerrilla warfare has not yet erupted, we always run the risk of allowing the enemy to attack us with decisive blows.

The fourth sin of the urban guerrilla is to exaggerate his strength and to undertake actions for which he, as yet, lacks sufficient forces and the required infrastructure.

The fifth sin of the urban guerrilla is rash action. The guerrilla who commits this sin loses patience, suffers an attack of nerves, does not wait for anything, and impetuously throws himself into action, suffering untold defeats.

The sixth sin of the urban guerrilla is to attack the enemy when they are most angry.

The seventh sin of the urban guerrilla is to fail to plan things, and to act spontaneously.

POPULAR SUPPORT

One of the permanent concerns of the urban guerrilla is his identification with popular causes to win public support. Where government actions become inept and corrupt, the urban guerrilla should not hesitate to step in and show that he opposes the government, and thus gain popular sympathy. The present government, for example, imposes heavy financial burdens and excessively high taxes on the people. It is up to the urban guerrilla to attack the dictatorship's tax collection system and to obstruct its financial activities, throwing all the weight of armed action against it.
The urban guerrilla fights not only to upset the tax collection system—the weapon of armed action must also be directed against those government agencies that raise prices and those who direct them as well as against the wealthiest of the national and foreign profiteers and the important property owners. In short, against all those who accumulate huge fortunes out of the high cost of living, the wages of hunger, excessive prices and high rents. Foreign industries, such as refrigeration and other North American plants that monopolize the market and the manufacture of general food supplies, must be systematically attacked by the urban guerrillas. The rebellion of the urban guerrilla and his persistance in intervening in political questions is the best way of insuring popular support for the cause which we defend. We repeat and insist on repeating—it is the way of insuring popular support. As soon as a reasonable portion of the population begins to take seriously the actions of the urban guerrilla, his success is guaranteed.

The government has no alternative except to intensify its repression. The police networks, house searches, the arrest of suspects and innocent persons, and the closing off of streets make life in the city unbearable. The military dictatorship embarks on massive political persecution. Political assassinations and police terror become routine.

In spite of all this, the police systematically fail. The armed forces, the navy and the air force are mobilized to undertake routine police functions, but even so they can find no way to halt guerrilla operations or to wipe out the revolutionary organization, with its fragmented groups that move around and operate throughout the country.
The people refuse to collaborate with the government, and the general sentiment is that this government is unjust, incapable of solving problems, and that it resorts simply to the physical liquidation of its opponents. The political situation in the country is transformed into a military situation in which the "gorillas" appear more and more to be the ones responsible for violence, while the lives of the people grow worse.

When they see the military and the dictatorship on the brink of the abyss, and fearing the consequences of a civil war which is already well underway, the pacifiers (always to be found within the ruling elite) and the opportunists (partisans of nonviolent struggle) join hands and circulate rumors behind the scenes begging the hangmen for elections, "re-democratization", constitutional reforms, and other tripe designed to fool the people and make them stop the rebellion.

But, watching the guerrillas, the people now understand that it is a farce to vote in any elections which have as their sole objective guaranteeing the survival of the dictatorship and covering up its crimes. Attacking wholeheartedly this election farce and the so-called "political solution", which is so appealing to the opportunists, the urban guerrillas must become even more aggressive and active, resorting without pause to sabotage, terrorism, expropriations, assaults, kidnappings, executions, etc. This action answers any attempt to fool the people with the opening of Congress and the reorganization of political parties—parties of the government and of the positions which the government allows—when all the time parliament and the so-called "parties" only function thanks to the permission of the military dictatorship, in a true spectacle of puppets or dogs on a leash.

The role of the urban guerrilla, in order to win the support of the population, is to continue fighting, keeping in mind the interests of the people and heightening the disastrous situation within which the government must act. These are the conditions, harmful to the dictatorship, which permit the guerrillas to open rural warfare in the middle of an uncontrollable urban rebellion.

The urban guerrilla is engaged in revolutionary action for the people, and with them seeks the participation of the people in the struggle against the dictatorship and the liberation of the country. Beginning with the city and the support of the people, the rural guerrilla war develops rapidly, establishing its infrastructure carefully while the urban area continues the rebellion.

Sanitized excerpts from the AQ Manual

Principles of Military Organization

Military Organization has three main principles without which it cannot be established.

1. Military Organization commander and advisory council

2. The soldiers (individual members)

3. A clearly defined strategy

Military Organization Requirements:

The Military Organization dictates a number of requirements to assist it in confrontation and endurance. These are:

1. Forged documents and counterfeit currency

2. Apartments and hiding places

3. Communication means

4. Transportation means

5. Information

6. Arms and ammunition

7. Transport

Missions Required of the Military Organization:

The main mission for which the Military Organization is responsible is:

The overthrow of the godless regimes and their replacement with an Islamic regime. Other missions consist of the following:

1. Gathering information about the enemy, the land, the installations, and the neighbors.

2. Kidnaping enemy personnel, documents, secrets, and arms.

3. Assassinating enemy personnel as well as foreign tourists.

4. Freeing the brothers who are captured by the enemy.

5 . Spreading rumors and writing statements that instigate people against the enemy.

6. Blasting and destroying the places of amusement, immorality, and sin; not a vital target.

7. Blasting and destroying the embassies and attacking vital economic centers.

8 . Blasting and destroying bridges leading into and out of the cities.

Importance of the Military Organization:

1. Removal of those personalities that block the call's path. [A different handwriting:] All types of military and civilian intellectuals and thinkers for the state.

2 . Proper utilization of the individuals' unused capabilities.

3 . Precision in performing tasks, and using collective views on completing a job from all aspects, not just one.

4. Controlling the work and not fragmenting it or deviating from it.

5. Achieving long-term goals such as the establishment of an Islamic state and short-term goals such as operations against enemy individuals and sectors.

6. Establishing the conditions for possible confrontation with the regressive regimes and their persistence.

7. Achieving discipline in secrecy and through tasks.

Financial Security Precautions:

1. Dividing operational funds into two parts: One part is to be invested in projects that offer financial return, and the other is to be saved and not spent except during operations.

2. Not placing operational funds [all] in one place.

3. Not telling the Organization members about the location of the funds.

4. Having proper protection while carrying large amounts of money.

5. Leaving the money with non-members and spending it as needed.

Forged Documents (IdentityCards, Records Books, Passports)

The following security precautions should be taken:

1. Keeping the passport in a safe place so it would not be ceized by the security apparatus, and the brother it belongs to would have to negotiate its return (I'll give you your passport if you give me information)

2. All documents of the undercover brother, such as identity cards and passport, should be falsified.

3 . When the undercover brother is traveling with a certain identity card or passport, he should know all pertinent [information] such as the name, profession, and place of residence.

4. The brother who has special work status (commander, communication link,…) should have more than one identity card and passport. He should learn the contents of each, the nature of the [indicated] profession, and the dialect of the residence area listed in thedocument.

5. The photograph of the brother in these documents should be without a beard. It is preferable that the brother's public photograph [on these documents] be also without a beard. If he already has one [document] showing a photograph with a beard, he should replace it.

6. When using an identity document in different names, no more than one such document should be carried at one time.

UK/BM-23 TRANSLATION

7 . The validity of the falsified travel documents should always be confirmed.

8 . All falsification matters should be carried out through the command and not haphazardly (procedure control)

9 . Married brothers should not add their wives to their passports.

10. When a brother is carrying the forged passport of a certain country, he should not travel to that country. It is easy to detect forgery at the airport, and the dialect of the brother is different from that of the people from that country.

Security Precautions Related to the Organizations' Given Names:

1. The name given by the Organization [to the brother] should not be odd in comparison with other names used around him.

2. A brother should not have more than one name in the area where he lives {the undercover work place)

FOURTH LESSON - Organization MILITARY BASES "APARTMENTS PLACES" - HIDING

UK/BM-25 TRANSLATION

Definition of Bases:

These are apartments, hiding places, command centers, etc. in which secret operations are executed against the enemy. These bases may be in cities, and are [then] called homes or apartments. They may be in mountainous, harsh terrain far from the enemy, and are [then] called hiding places or bases.

During the initial stages, the Military Organization usually uses apartments in cities as places for launching assigned missions, such as collecting information, observing members of the ruling regime, etc.

Hiding places and bases in mountains and harsh terrain are used at later stages, from which Jihad [holy war] groups are dispatched to execute assassination operations of enemy individuals, bomb their centers, and capture their weapons. In some Arab countries such as Egypt, where there are no mountains or harsh terrain, all stages of Jihad work would take place in cities. The opposite was true in Afghanistan, where initially Jihad work was in the cities, then the warriors shifted to mountains and harsh terrain. There, they started battling the Communists.

Security Precautions Related to Apartments:

1. Choosing the apartment carefully as far as the location, the size for the work necessary (meetings,storage, arms, fugitives, work preparation).

2 . It is preferable to rent apartments on the ground floor to facilitate escape and digging of trenches.

3 . Preparing secret locations in the apartment for securing documents, records, arms, and other important items.

4 . Preparing ways of vacating the apartment in case of a surprise attack (stands,wooden ladders).

UK/BM-26 TRANSLATION

5. Under no circumstances should any one know about the apartment except those who use it.

6. Providing the necessary cover for the people who frequent the apartment (students,workers, employees, etc.)

7. Avoiding seclusion and isolation from the population and refraining from going to the apartment at suspicious times.

8. It is preferable to rent these apartments using false names, appropriate cover, and non-Moslem appearance.

9. A single brother should not rent more than one apartment in the same area, from the same agent, or using the same rental office.

10. Care should be exercised not to rent apartments that are known to the security apparatus [such as] those used for immoral or prior Jihad activities.

11. Avoiding police stations and government buildings. Apartments should not be rented near those places.

12. When renting these apartments, one should avoid isolated or deserted locations so the enemy would not be able to catch those living there easily.

13. It is preferable to rent apartments in newly developed areas where people do not know one another. Usually, in older quarters people know one another and strangers are easily identified, especially since these quarters have many informers.

14. Ensuring that there is has been no surveillance prior to the members entering the apartment.

15. Agreement among those living in the apartment on special ways of knocking on the door and special signs prior to entry into the building’s main gate to indicate to those who wish to enter that the place is safe and not being monitored. Such signs include hanging out a towel, opening a curtain, placing a cushion in a special way, etc.

UK/BM-27 TRANSLATION

16. If there is a telephone in the apartment, calls should be answered in an agreed-upon manner among those who use the apartment. That would prevent mistakes that would, otherwise, lead to revealing the names and nature of the occupants.

17. For apartments, replacing the locks and keys with new ones. As for the other entities (camps,shops, mosques), appropriate security precautions should be taken depending on the entity’s importance and role in the work.

18. Apartments used for undercover work should not be visible from higher apartments in order not to expose the nature of the work.

19. In a newer apartment, avoid talking loud because prefabricated ceilings and walls [used in the apartments] do not have the same thickness as those in old ones.

20. It is necessary to have at hand documents supporting the undercover [member]. In the case of a physician, there should be an actual medical diploma, membership in the [medical] union, the government permit, and the rest of the routine procedures known in that country.

21. The cover should blend well [with the environment]. For example, selecting a doctor’s clinic in an area where there are clinics, or in a location suitable for it.

22. The cover of those who frequent the location should match the cover of that location. For example, a common laborer should not enter a fancy hotel because that would be suspicious and draw attention.

FIFTH LESSON - MEANS OF COMMUNICATION AND TRANSPORTATION

UK/BM-29 TRANSLATION

In the name of Allah, the merciful and compassionate

Means of Transportation

Introduction:

It is well known that in undercover operations, communication is the mainstay of the movement for rapid accomplishment. However, it is a double-edged sword: It can be to our advantage if we use it well and it can be a knife dug into our back if we do not consider and take the necessary security measures.

Communication Means:

The Military Organization in any Islamic group can, with its modest capabilities, use the following means: 1. The telephone, 2. Meeting in-person, 3. Messenger, 4 . Letters, 5. Some modern devices, such as the facsimile and wireless [communication]. Communication may be within the county, state, or even the country, in which case it is called local communication. When it extends expanded between countries, it is then called international communication.

Secret Communication is Limited to the Following Types:

Common, standby, alarm

1. Common Communication: It is a communication between two members of the Organization without being monitored by the security apparatus opposing the Organization. The common communication should be done under a certain cover and after inspecting the surveillance situation [by the enemy].

2. Standby Communication: This replaces common communication when one of the two parties is unable to communicate with the other for some reason.

3. Alarm Communication: This is used when the opposing security apparatus discovers an undercover activity or some undercover members. Based on this communication, the activity is stopped 'for a while, all matters related to the activity are abandoned,

UK/BM-30 TRANSLATION

and the Organization's members are hidden from the security personnel.

Method of Communication Among Members of the Organization:'

1. Communication about undercover activity should be done using a good cover; it should also be quick, explicit, and pertinent. That is, just for talking only.

2 . Prior to contacting his members, the commander of the cell[2] should agree with each of them separately (the cell members should never meet all in one place and should not know one another) on a manner and means of communication with each other. Likewise, the chief of the Organization should [use a similar technique] with the branch commanders.

3 . A higher-ranking commander determines the type and method of communication with lower-ranking leaders.

First Means: The Telephone:

Because of significant technological advances, security measures for monitoring the telephone and broadcasting equipment have increased. Monitoring may be done by installing a secondary line or wireless broadcasting device on a telephone that relays the calls to a remote location…That is why the Organization takes security measures among its members who use this means of communication (the telephone).

1. Communication should be carried out from public places. One should select telephones that are less suspicious to the security apparatus and are more difficult to monitor. It is preferable to use telephones in booths and on main streets.

[2.] Cell or cluster methods should be adopted by the Organization. It should be composed of many cells whose members do not know one another, so that if a cell member is caught the other cells would not be affected, and work would proceed normally.

UK/BM-31 TRANSLATION

2. Conversation should be coded or in general terms so as not to alert the person monitoring [the telephone].

3. Periodically examining the telephone wire and the receiver.

4. Telephone numbers should be memorized and not recorded. If the brother has to write them, he should do so using a code so they do not appear as telephone numbers (figures from a shopping list, etc.)

5 . The telephone caller and person called should mention some words or sentences prior to bringing up the intended subject. The brother who is calling may misdial one of the digits and actually call someone else. The person ‘called may claim that the call is for him, and the calling brother may start telling him work-related issues and reveal many things because of a minor error.

6. In telephone conversations about undercover work, the voice should be changed and distorted.

7. When feasible, it is preferable to change telephone lines to allow direct access to local and international calls. That and proper cover facilitate communications and provide security protection not available when the central telephone station in the presence of many employees is used.

8. When a telephone [line] is identified [by the security apparatus], the command and all parties who were using it should be notified as soon as possible in order to take appropriate measures.

9. When the command is certain that a particular telephone [line] is being monitored, it can exploit it by providing information that misleads the enemy and benefits the work plan.

UK/BM-32 TRANSLATION

10. If the Organization manages to obtain jamming devices, it should use them immediately.

Second Means: Meeting in-person: 1/2

This is direct communication between the commander and a member of the Organization. During the meeting the following are accomplished:

1. Information exchange, 2. Giving orders and instructions, 3 . Financing, 4. Member follow-up Stages of the In-Person Meeting: A. Before the meeting, B. The meeting [itself], C. After the meeting A . Before the Meeting:

The following measures should be taken:

1. Designating the meeting location,

2. Finding a proper cover for the meeting, 3. Specifying the meeting date and time,

4. Defining special signals between those who meet.

1. Identifying the meeting location: If the meeting location is stationary, the following matters should be observed:

i. The location should be far from police stations and security centers.

ii. Ease of transportation to the location.

iii. Selecting the location prior to the meeting and learning all its details.

iv. If the meeting location is an apartment, it should not be the first one, but one somewhere in the middle.

v. The availability of many roads leading to the meeting location. That would provide easy escape in case the location ware raided by security personnel.

UK/BM-33 TRANSLATION

vi. The location should not be under suspicion (by the security [apparatus])

vii. The apartment where the meeting takes place should be on the ground floor, to facilitate escape.

viii.The ability to detect any surveillance from that location.

ix. When public transportation is used, one should alight at some distance from the meeting location and continue on foot. In the case of a private vehicle, one should park it far away or in a secure place so as to be able to maneuver it quickly at any time.

If the meeting location is not stationary, the following matters should be observed:

i. The meeting location should be at the intersection of a large number of main and side streets to facilitate entry, exit, and escape.

ii. The meeting location (such as a coffee shop) should not have members that might be dealing with the security apparatus.

iii. The meeting should not be held in a crowded place because that would allow the security personnel to hide and monitor those who meet.

iv. It is imperative to agree on an alternative location for the meeting in case meeting in the first is unfeasible. That holds whether the meeting place is stationary or not.

==2/2=

Those who meet in-person should do the following:

i. Verifying the security situation of the location before the meeting.

UK/BM-34 TRANSLATION

ii. Ensuring that there are no security personnel behind them or at the meeting place.


iii. Not heading to the location directly.

iv. Clothing and appearance should be appropriate f o r the meeting location.

v. Verifying that private documents carried by the brother have appropriate cover.

vi. Prior to the meeting, designing a security plan that specifies what the security personnel would be told in case the location were raided by them, and what [the brothers] would resort to in dealing with the security personnel (fleeing,driving b a c k , . . . )

2. Finding a proper cover for the meeting: [The cover]

i. should blend well with the nature of the location.

ii. In case they raid the place, the security personnel should believe the cover.

iii. should not arouse the curiosity of those present.

iv. should match the person's appearance and his financial and educational background.

v. should have documents that support it.

vi. provide reasons for the two parties' meeting (for example, one of the two parties should have proof that he is an architect. The other should have documents as proof that he is a land owner. The architect has produced a construction plan for the land)

3. Specifying the Meeting Date and Time:

i. Specifying the hour of the meeting as well as the date.

UK/BM-35 TRANSLATION

ii. Specifying the time of both parties' arrival ana the time of the first party's departure.

iii. Specifying how long the meeting will last.

iv. Specifying an alternative date and time.

v. Not allowing a long period of time between making the meeting arrangements and the meeting itself.

4 . Designating special signals between those who meet If the two individuals meeting know one another's shape and appearance, it is sufficient to use a single safety sign. [In that case,] the sitting and arriving individuals inform each other that there is no enemy surveillance. The sign may be keys, beads, a newspaper, or a scarf. The two parties would agree on moving it in a special way so as not to attract the attention of those present. If the two individuals do not know one another, they should do the following: a. The initial sign for becoming acquainted may be that both of them wear a certain type of clothing or carry a certain item. These signs should be appropriate for the place, easily identified, and meet the purpose. The initial sign for becoming acquainted does not [fully] identify one person by another. It does that at a rate of 30%. b. Safety Signal: It is given by the individual sitting in. the meeting location to inform the second individual that the place is safe. The second person

UK/BM-36 TRANSLATION

would reply through signals to inform the first that he is not being monitored. The signals are agreed upon previously and should not cause suspicion. c. A second signal for getting acquainted is one in which the arriving person uses while sitting down. That signal may be a certain clause, a word, a sentence, or a gesture agreed upon previously, and should not cause suspicion for those who hear it or see it. B. The Stage of the Meeting [itself]:The following measures should be taken:

1. Caution during the meeting.

2 . Not acting unnaturally during the meeting in order not to raise suspicion.

3. Not talking with either loud or very low voices ([should be] moderate).

4. Not writing anything that has to do with the meeting.

5. Agreeing on a security plan in case the enemy raids the location.

C. After the Meeting: The following measures should be taken:

1. Not departing together, but each one separately.

2. Not heading directly to the main road but through secondary ones.

3. Not leaving anything in the meeting place that might indicate the identity or nature of those who met. Meeting in-person has disadvantages, such as:

1. Allowing the enemy to capture those who are meeting.

2. Allowing them [the enemy] to take pictures of those who are meeting, record their conversation, and gather evidence against them.

UK/BM-37 TRANSLATION

3. Revealing the appearance of the commander to the other person. However, that may be avoided by taking the previously mentioned measures such as disguising himself well and changing his appearance (glasses, wig, etc.)

Third Means: The Messenger:

This is an intermediary between the sender and the receiver. The messenger should possess all characteristics mentioned in the first chapter regarding the Military Organization’smember. These are the security measures that a messenger should take:

1. Knowledge of the person to whom he will deliver the message.

2. Agreement on special signals, exact date, and specific time.

3. Selecting a public street or place that does not raise suspicion.

4. Going through a secondary road that does not have check points.

5. Using public transportation (train,bus,…) and disembarking before the main station. Likewise, embarking should not be done at the main station either, were there are a lot of security personnel and informants.

6. Complete knowledge of the location to which he is going.

Fourth Means: Letters:

This means (letters) may be used as a method of communication

UK/BM-38 TRANSLATION

between members and the Organization provided that the following security measures are taken:

1. It is forbidden to write any secret information in the letter. If one must do s o , the writing should be done in general terms.

2. The letter should not be mailed from a post office close to the sender's residence, but from a distant one.

3. The letter should not be sent directly to the receiver's address but to an inconspicuous location where there are many workers from your country. Afterwards, the letter will be forwarded to the intended receiver. (This is regarding the overseas- bound letter).

4. The sender's name and address on the envelope should be fictitious. In case the letters and their contents are discovered, the security apparatus would not be able to determine his [the sender's] name and address.

5. The envelope should not be transparent so as to reveal the letter inside.

6. The enclosed pages should not be many, so as not to raise suspicion.

7. The receiver's address should be written clearly so that the letter would not be returned.

8. Paying the post office box fees should not be forgotten.

Fifth Means: Facsimile and Wireless:

Considering its modest capabilities and the pursuit by the security apparatus of its members and forces, the Islamic

UK/BM-39 TRANSLATION

Military Organization cannot obtain theses devices. In case the Organization is able to obtain them, firm security measures should be taken to secure communication between the members in the country and the command outside.

These measures are:

1. The duration of transmission should not exceed five minutes in order to prevent the enemy from pinpointing the device location.

2. The device should be placed in a location with high wireless frequency, such as close to a TV station, embassies, and consulates in order to prevent the enemy from identifying its location.

3. The brother, using the wireless device to contact his command outside the country, should disguise his voice.

4. The time of communication should be carefully specified.

5. The frequency should be changed from time to time.

6. The device should be frequently moved from one location to another.

7. Do not reveal your location to the entity for which you report.

8. The conversation should be in general terms so as not to raise suspicion.

Transportation Means:

The members of the Organization may move from one location to another using one of the following means:

a. Public transportation,

b. Private transportation

UK/BM-40 TRANSLATION

Security Measures that Should be Observed in Public

Transportation:

1. One should select public transportation that is not subject to frequent checking along the way, such as crowded trains or public buses.

2. Boarding should be done at a secondary station, as main stations undergo more careful surveillance. Likewise, embarkment should not be done at main stations.

3. The cover should match the general appearance (tourist bus, first-class train, second-class train, etc).

4. The existence of documents supporting the cover.

5. Placing important luggage among the passengers' luggage without identifying the one who placed it. If it is discovered, its owner would not be arrested. In trains, it [the luggage] should be placed in a different car than that of its owner.

6. The brother traveling on a "special mission" should not get involved in religious issues (advocating good and denouncing evil) or day-to-day matters (seat reservation,…). The brother traveling on a mission should not arrive in the [destination] country at night because then travelers are few, and there are [search] parties and check points along the way.

7 .

8. When cabs are used, conversation of any kind should not be started with the driver because many cab drivers work for the security apparatus.

9. The brother should exercise extreme caution and apply all security measures to the members.

UK/BM-41 TRANSLATION

Security Measures that Should be Observed in Private Transportation:

Private transportation includes: cars, motorcycles

A. Cars and motorcycles used in overt activity:

1. One should possess the proper permit and not violate traffic rules in order to avoid trouble with the police.

2. The location of the vehicle should be secure so that the security apparatus would not confiscate it.

3. The vehicle make and model should be appropriate for the brother’s cover.

4. The vehicle should not be used in special military operations unless the Organization has no other choice.

B. Cars and motorcycles used in covert activity:

1. Attention should be given to permits and [obeying] the traffic rules in order to avoid trouble and reveal their actual mission.

2. The vehicle should not be left in suspicious places (deserts,mountains, etc.). If it must be, then the work should be performed at suitable times when no one would keep close watch or follow it.

3. The vehicle should be purchased using forged documents so that getting to its owners would be prevented once it is discovered.

4. For the sake of continuity, have only one brother in charge of selling.

5. While parking somewhere, one should be in a position to move quickly and flee in case of danger.

6. The car or motorcycle color should be changed before the operation and returned to the original after the operation.

UK/BM-42 TRANSLATION

7. The license plate number and county name should be falsified. Further, the digits should be numerous in order to prevent anyone from spotting and memorizing it.

8. The operation vehicle should not be taken to large gasoline stations so that it would not be detected by the security apparatus.

SIXTH LESSON - TRAINING

UK/BM-44 TRANSLATION

The following security precautions should be taken during

the training: The Place:

The place should have the following specifications:

1. Distance from the populated areas with the availability of living necessities.

2. Availability of medical services during the training.

3. The place should be suitable for the type of training (physical fitness, shooting, tactics).

4. No one except the trainers and trainees should know about the place.

5. The place should have many roads and entrances.

6. The place should be visited at suitable times.

7. Hiding any training traces immediately after the training.

8. Guarding the place during the training.

9. Appropriateness of the existing facilities for the number of training members.

10. Exclusion of anyone who is not connected with the training.

11. Taking all security measures regarding the establishment.

12. Distance of the place from police stations, public establishments, and the eyes of informants.

13. The place should not be situated in such a way that the training and trainees can be seen from another location.

UK/BM-45 TRANSLATION

The Trainees:

1. Before proceeding to the training place, all security measures connected with an undercover individual should be taken. Meanwhile, during training at the place, personnel safety should be ensured.

2. Selecting the trainees carefully.

3. The trainees should not know one another.

4. The small size of groups that should be together during the training (7-10 individuals).

5. The trainees should not know the training place.

6. Establishing a training plan f o r each trainee.

The Trainers:

All measures taken with regard to the commanders apply also to the trainers. Also, the following should be applied:

1. Fewness of the trainers in the training place. Only those conducting the training should be there, in order not to subject the training team to the risk of security exposure.

2. Not revealing the identity of the trainer to trainees.

3. Keeping a small ratio of trainees to trainer.

4. The training team members should not know one another.

SEVENTH LESSON - WEAPONS: MEASURES RELATED TO BUYING AND TRANSPORTING THEM

UK/BM-47 TRANSLATION

Prior to dealing with weapons, whether buying, transporting, or storing them, it is essential to establish a careful, systematic and firm security plan that plan deals with all stages. It is necessary to divide that task into stages: First Stage: Prior to Purchase; Second Stage: Purchasing; Third Stage: Transport; Fourth Stage: Storage.

1. Prior to Purchase Stage: It is necessary to take the following measures:

a. In-depth knowledge of the place where weapons will be purchased, together with its entrances and exits.

b. Verifying there are no informants or security personnel at the place where purchasing will take place.

c. The place should be far from police stations and government establishments.

d. Not proceeding to the purchasing place directly by the main road, but on secondary streets.

e. Performing the exercises to detect the surveillance.

f. One’s appearance and clothing should be appropriate for the place where purchasing will take place.

g. The purchasing place should not be situated in such a way that the seller and buyer can be seen from another location. To the contrary, the purchasing place should be such that the seller and buyer can see the surrounding area.

h. Determining a suitable cover for being in that place.

i. The place should not be crowded because that would facilitate the police hiding among people, monitoring the arms receiving, and consequently arresting the brother purchasing.

UK/BM-48 TRANSLATION

j . In case one of the parties is unable to arrive, it is essential to prearrange an alternativeplace and time with the seller.

k. Selecting a time suitable for the purchase so that it does not raise suspicion.

l. Prior to purchasing, the seller should be tested to ensure that he is not an agent of the security apparatus.

m. Preparing a place for storage prior to purchasing.

2. The Purchase Stage:

a . Verifying that the weapons are in working condition.

b. Not paying the seller the price for the weapons before viewing, inspecting, and testing them.

c. Not telling the seller about the mission for which the weapons are being purchased.

d. Extreme caution should be used during the purchasing operation in the event of any unnatural behavior by the seller or those around you.

e. Not lengthening the time spent with the seller. It is important to depart immediately after purchasing the weapons.

3. The Transport Stage:

a. Avoid main roads where check points are common.

b. Choose a suitable time for transporting the weapons.

c. Observers should proceed on the road ahead of the transportation vehicle for early warning in case of an emergency.

d. Not proceeding directly to the storage place until after verifying there is no surveillance. UK/BM-49 TRANSLATION

e. During the transport stage, weapons should be hidden in a way that they are inconspicuous and difficult to find.

f. The route for transporting the weapons should be determined very carefully.

g . Verifying the legality of the vehicle, performing its maintenance, checking its gasoline and water levels, etc.

h. Driving the car normally in order to prevent accidents.

4. The Storage Stage:

a. In order to avoid repeated transporting, suitable storage places should be selected. In case the materials are bombs or detonators, they should be protected from extreme heat and humidity.

b. Explosive materials and detonators should be separated and stored apart from each other.

c. Caution should be exercised when putting detonators in the arsenal.

d. Lubricating the weapons and placing them in wooden or plastic crates. The ammunition should be treated likewise. When selecting an arsenal, consider the following:

1. The arsenal should not be in well-protected areas, or close to parks or public places.

2. The arsenal should not be in a "no-man's-land."

3 . The arsenal should not be in an apartment previously used for suspicious activities and often frequented by security personnel.

4. The arsenal should not be a room that is constantly used and cannot be given up by family members who do not know the nature of the father or husband's work.

UK/BM-50 TRANSLATION

5. The apartment selected as an arsenal should be owned by the Organization or rented on a long-term basis.

6. The brother responsible for storage should not visit the arsenal frequently, nor toy with the weapons.

7. The arsenal keeper should record in a book all weapons, explosive materials, and ammunition. That book should be coded and well secured.

8 . Only the arsenal keeper and the commander should know the location of the arsenal.

9 . It is necessary to prepare alternative arsenals and not leave any leads in the original arsenals to the alternative ones.

EIGHT LESSON- MEMBER SAFETY

Defining Members Safety:

This is a set of measures taken by members who perform undercover missions in order to prevent the enemies from getting to them. It is necessary for any party that has many members to subdivide its members into three groups, each of which has its own security measures. The three groups are:

1. The overt member, 2. The covert member, 3. The commander

Measures that Should be Taken by the Overt Member:

1. He should not be curious and inquisitive about matters that do not concern him.

2. He should not be chatty and talkative about everything he knows or hears.

3. He should not carry on him the names and addresses of those members he knows. If he has to, he should keep them safe.

4. During times of security concerns and arrest campaigns and especially if his appearance is Islamic, he should reduce his visits to the areas of trouble and remain at home instead.

5. When conversing on the telephone, he should not talk about any information that might be of use to the enemy.

6. When sending letters, he should not mention any information that might be of use to the enemy. When receiving letters, he should burn them immediately after reading them and pour water on them to prevent the enemy from reading them. Further, he should destroy any traces of fire so the enemy would not find out that something was burned.

Measures that Should be Taken by the Undercover Member:

In addition to the above measures, the member should…

1. Not reveal his true name to the Organization's members who are working with him, nor to the [Islamic] Da'wa [Call].

2 . Have a general appearance that does not indicate Islamic orientation (beard,toothpick, book, [long] shirt, small Koran).

3. Be careful not to mention the brothers' common expressions or show their behaviors (special praying appearance, "may Allah reward you", "peace be on you" while arriving and departing, etc.)

4. Avoid visiting famous Islamic places (mosques, libraries, Islamic fairs, etc.) Carry falsified personal documents and know all the information they contain.

5 .

6 .

7 .

8 .

9. Not resort to utilizing letters and messengers except in an emergency.

Have protection preceding his visit to any place while moving about (apartment,province, means of transportation, etc.). Have complete and accurate knowledge of the security status related to those around him in his place of work and residence, so that no danger or harm would catch him unaware. Maintain his family and neighborhood relationships and should not show any changes towards them so that they would not attempt to bring him back [from the Organization] for security reasons.

10. Not speak loudly.
11. Not get involved in advocating good and denouncing evil in order not to attract attention to himself.
12. Break the daily routine, especially when performing an undercover mission. For example, changing the departure and return routes, arrival and departure times, and the store where he buys his goods.
13. Not causing any trouble in the neighborhood where he lives or at the place of work.
14. Converse on the telephone using special code so that he does not attract attention.
15. Not contacting the overt members except when necessary. Such contacts should be brief.
16. Not fall into the enemy's excitement trap, either through praising or criticizing his Organization.
17. Performing the exercises to detect surveillance whenever a task is to be performed.
18. Not park in no-parking zones and not take photographs where it is forbidden. 19. Closing all that should be closed before departing the place, whether at home or his place of undercover work. 20. Not undergo a sudden change in his daily routine or any relationships that precede his Jihad involvement. Far example, there should not be an obvious change in his habits of conversing, movement, presence, or disappearance. Likewise, he should not be hasty to sever his previous relationships.
21. Not meet in places where there are informers, such as coffee shops, and not live in areas close to the residences of important personalities, government establishments, and police stations.

22. Not write down on any media, specially on paper, that could show the traces and words of the pen by rubbing the paper with lead powder. Measures that Should be Taken by the Commander:

The commander, whether in overt or covert work, has special

importance for the following reasons: 1. The large amount of information that he possesses. 2. The difficulty of the command in replacing the commander. 3. Therefore, all previously mentioned security precautions regarding members should be heightened for the commander. Many resources should be reserved for protecting the commanders.

Importance of Information:

1. Based on the enemy's up-to-date information, his capabilities, and plans, the Organization's command can design good-quality and secure plans. [7] Abdullah Ali Al-Salama: Military Espionage in Islam, pp. 253-258.

2 . Information about the enemy's intention provides early warning signs for the command, which in turn makes appropriate preparation and thwarts the enemy's opportunity.

3 . Information benefits the Organization's command by providing information about the enemy's strengths and weaknesses.

4 . Information benefits the Organization's command by providing information about movements of the enemy and his members. Information requirements include: Newness, Trustworthiness, Forthcoming, security, and confirmation. General Mahmoud Sheet Khattab said, "The nation that wants to achieve victory over its enemy must know that enemy very well. It also must know the site of the battle in detail. Those who fight an enemy that they do not know, do not win because a successful military plan must be built on clear and trustworthy information. The commander who fights an enemy and does not know his strength (number and materiel) is blind and destined to fail and fall. Information Sources: Any organization that desires to raise the flag of Islam high and proud, must gather as much information as possible about the enemy. Information has two sources:

1. Public Source: Using this public source openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy. The percentage varies depending on the government's policy on freedom of the press and publication. It is possible to gather information through newspapers, magazines, books, periodicals, official publications, and enemy broadcasts. Attention should also be given to the opinion, comments, and jokes of common people. Truman, a past American President, said, "We attribute our great advance to our press, because it gives America's enemies the capability of learning what we have not officially publicized about our plans and even our establishments." In 1954, Allan Dulles [PH],Director of American

Intelligence [CIA], said, "I am ready to pay any amount of money to obtain information about the Soviet Union, even as little as what the Soviet Union obtains by simply reading American newspapers."

The one gathering public information should be a regular person (trained college graduate) who examines primary sources of information published by the enemy (newspapers, magazines, radio, TV, etc.). He should search for information directly related to the topic in question. The one gathering information with this public method is not exposed to any danger whatsoever. Any brother can gather information from those aforementioned sources. We cannot label that brother a "Moslem Spy" because he does not make any effort to obtain unpublished and covert information.

2. Secret Sources: It is possible, through these secret and dangerous methods, to obtain the 20% of information that is considered secret. The most important of these sources are:

A. Individuals who are recruited as either volunteers o r because of other motives

B. Recording and monitoring

C. Photography

D. Interrogation

E. Documents: By burglary or recruitment of personnel

F. Drugging

G. Surveillance, spying, and observation

Information Gathering Using Public Means:

A . Newspapers, Magazines,and Official and Party Publications: In order to gather enemy information, the Military Organization can use means such as magazines, publications, periodicals, and official printed matter. Through these means, it is possible to learn about major government events and about the news, meetings, and travel of Presidents, ministers, and commanders. Information may be:

1. Names and photographs of important government personalities, police commanders, and security leaders.

2. Published meetings. Through these, one can learn about major decisions and topics being discussed.

3. Future meeting plans.

4. Present and future enemy capabilities through current photographs of projects and strategic sites or through

UK/BM-83 TRANSLATION

meetings with top officials.

5 . Beneficial news about the enemy's diplomacy and itspresent and future plans.

6. Tourism news and the arrival times of foreign tourist groups.

7. Advertisements about apartments for rent, vacant positions, or anything else that is useful.

8. Advertisements about new and used car lots. These may be used in assassination, kidnaping, and overthrowing the government.

9. Learning the enemy position on current Islamic issues (veil,beard, dedication, Jihad, …).

B. Radio and Television: The Military organization can use these important public sources to gather information all day and night. The importance of these means is explained below.

1. Visual and audible news help the Organization to determine its present and future plans.

2. Interviews may help to identify the government policy and its general directives.

3. Spotting the appearance of those who occupy high positions.

4. Learning the prevailing information diplomacy and its position on contemporary issues.

5 . Learning about the interior of important government places and establishments during their opening ceremonies or through advertisements.

In addition to the aforementioned, [attention should be given] to newspapers, magazines, and the public's comments and jokes.

TWELFTH LESSON - ESPIONAGE

( 2 ) INFORMATION-GATHERING USING COVERT METHODS

Information needed through covert means: Information needed to be gathered through covert means is of only two types:

First: Information about government personnel, officers, important personalities, and all matters related to those (residence,work place, times of leaving and returning, wives and children, places visited)

Second: Information about strategic buildings, important establishments, and military bases. Examples are important ministries such as those of Defense and Internal Security, airports, seaports, land border points, embassies, and radio and TV stations.

General security measures that should be taken by the person gathering information: During the process of gathering information, whether about governing personalities or establishments, the person doing the gathering must take the following security measures:

1. Performing the exercises to detect surveillance while executing the mission. These exercises are not well defined, but are dependent on the time, place, and the ability to be creative. These exercises include the following:

a.

b.

c.

d.

e. Walking down a dead-end street and observing who is walking behind you. Beware of traps. Casually dropping something out of your pocket and observing who will pick it up. Walking fast then stopping suddenly at a corner and observing who will be affected. Stopping in front of store windows and observing who is-watchingyou. Getting on a bus and then getting off after it departs and observing who will be affected.

UK/BM-86 TRANSLATION

f. Agreeing with one of your brothers to look for whoever is watching you.

2. When receiving the gathered information, let the informants travel as far as possible from their place of residence and yours. Let each of them get there using secondary roads, preferably at night.

3. Gather what information you can without emphasizing any particular part. Do not rush or show urgency because your excitement may uncover you and the degree of importance of the information.

4. Avoid anything that reveals your identity quickly. Do not attempt to be too creative or inventive. Remember what Taliran [PHI said to his political emissaries, "Do not be anxious.”

5 . Move slowly and travel a great distance. The one who is successful in gathering information is the one who is not known or conspicuous.

6 . Do not accept events at their face value. Do not overlook a quick friendship or an apparent dispute. Evaluate the importance of events and do not judge them by their appearance.

7 . Do not speak vaguely or act mysteriously except when wanting to get a "blabber mouth" to talk about what he knows.

8 . Carry personal credentials and know all their contents.

UK/BM-87 TRANSLATION

9. Prior to collecting the information, make sure that all necessities related to the mission, especially money, are ready.

10. Study the area where information-gathering takes place carefully: Open and closed streets, residents' customs, ways of dressing, and accent.

11. It is not permitted to carry any weapons during the information-gathering process.

12. Finding a cover prior to gathering the information. Further, review all security measures concerning members of the Military [Organization] which are covered in prior lessons. Methods of Gathering Information Using Covert Means: The Military Organization may obtain secret information using: A. Surveillance, intelligence, and observation; B. Theft: C . Interrogation; D. Excitement; E. Drugging; F. Recruitment. A. Surveillance, Intelligence, and Observation: Civilian and military targets (personalities). The monitoring may be done on foot or by car.

Surveillance on foot:

1. The brother or brothers performing the surveillance operation on foot study the available information about the target (height,weight, way of walking, looking at a recent photograph)

2. Knowing the target's habits, places he visits, and communications

3. Studying carefully the area where observation will take place: names of through and dead-end streets, residents' habits and way of dressing.

4. Prior to the start of the surveillance mission, making sure that all needs related to the mission, especially money, are met.

5 . Agreeing on how communications with the leaders will take place in case the surveillance plan is uncovered (telephone, a person used for that purpose). The telephone number should not be written but memorized.

6 . Agreeing on special signals to exchange orders and instructions among the surveillance team members.

7. Knowing the measures to be taken when the target is lost, such as contacting the leaders or something else agreed upon.

8 . It is not permitted to carry any weapons during the information-gathering process. 9 . It is preferable to have a camera with the surveillance man in case the target is to personally contact others.

Surveillance by car:

Surveillance by car requires taking certain measures:

1. Inspecting the car's fuel, water, and lights.

2. The car should be of a common type so it would not attract people's attention.

3 . The car should be in good condition and the driver should be experienced.

4 . The car plates should not contain real numbers. It is important to use a false license plate and small numbers in order to prevent anyone from spotting and memorizing it.

5 . The car's interior light should be disabled in order to hide the identity of the surveillance team members sitting inside.

6 . The number and appearance of the car surveillance team members should match those of the target's car.

Performins Surveillance by Car:

1. The car being used for surveillance should keep up with the target’s car during the surveillance operation, especially in crowded areas and on side streets. The distance between the two cars depends on the circumstances.

2 . If the target gets out of his car and starts to walk, one of the surveillance team members should get out and observe him.

3. Follow all aforementioned measures for surveillance on foot.

Exercises to detect surveillance by car:

1. The surveillance car speeds up then stops suddenly while observing which other car is affected (this is done where there is not a lot of traffic).

2. The surveillance car enters a dead-end street.

3. The surveillance car goes in the opposite direction of traffic.

4 . The surveillance car stops and goes backwards.

5. [The surveillance car] enters a parking lot and immediately goes out.

6. [The surveillance car] takes a side road and stops.

Surveillance, Intelligence,and Observation (Information about the enemy places)

The Organization’s command needs detailed information about the enemy‘s vital establishments, whether civilian or military, in order to make safe plans, reach firm decisions, and avoid surprises. Thus, the individual who gathers information about a desired location should, in addition to drawing a diagram, describe it and all its details.

The Drawing: The brother should draw a diagram of the area, the street, and the location which is the target of the informationgathering. He should describe its shape and characteristics. The drawing should be realistic so that someone who never saw the location could visualize it. It is preferable to also put on the drawing the directions of traffic, police stations, and security centers. The Description:It is necessary to gather as much information about the location as possible. For instance:

1. Traffic directions and how wide the streets are

2. Transportation leading to the location

3. The area, appearance, and setting of the place

4. Traffic signals and pedestrian areas

5. Security personnel centers and government agencies

6. Embassies and consulates

7. The economic characteristics of the area and traffic congestion times

8. Public parks

9. Amount and location of lighting

It is preferable to photograph the area as a whole first, then the street of the [desired] location. If possible, panoramic pictures should be taken. That is, the collection of views should be continuous in a such way that all pictures are taken from one location and that the ending of one picture is the beginning of the next. The photographer should be experienced with and proficient in film processing and developing. It is risky to use an outside film processing service. When observing a military installation or camp, we discourage taking pictures where it is forbidden. The brother/photographer should use a modern camera that can photograph at night or from a distance, and only the lens of the camera should be visible. When gathering information about a military camp, the brother should draw a diagram of the camp’s overall area, the camp itself, and its interior, if possible

The descriptionof the base or camp must contain the following:

1. Location

2. Exterior shape

3 . Transportation to it

4. Space [area]

5. Weapons used

6. Unit using the camp

7. Fortifications and tunnels

8. Guard posts

9. Amount and periods of lighting

10. Number of soldiers and officers. Officers’ ranks

11. Ammunition depot locations

12. Vehicles and automobiles

13. Leave policy

14. Commander‘s name, rank, arrival and departure times

15. Degree and speed of mobilization

16. Brigades and names of companies

17. Sleeping and waking times

18. Telephone lines and means of communication

The brother gathering the information may start a friendship with one of the soldiers or officers of that base. Information may be collected gradually and easily from soldiers when giving them rides from the camp to the bus or train stations, etc. B. Gathering Information Through Interrogation: Security personnel in our countries arrest brothers and obtain the needed information through interrogation and torture.

The Military Organization must do likewise. On one hand, the Organization can obtain important information about enemy establishments and personnel. On the other hand, that is a form of necessary punishment. Information is collected in this method by kidnaping an enemy individual, interrogating him, and torturing him. This source of information is not permanent. Also, caution should be exercised about being deceived by misinformation from enemy individuals.

Thus, the brother who interrogates the hostage should possess the following characteristics:

1. Should have knowledge and expertise about people's behavior and morals.

2. Should have a strong personality.

3. Should possess a sixth sense based on practice and experience.

4. Should be extremely patient.

5 . Should be able to act, pretend, and mask himself.

6. Should be intelligent, observant, analytical, and deductive.

7. Should be able to establish an investigative plan.

C. Gathering Information Through Recruitment: Recruiting agents is the most dangerous task that an enlisted brother can perform. Because of this dangerous task, the brother may be killed or imprisoned. Thus, the recruitment task must be performed by special types of members. There are a number of motives that might entice an uncommitted person to take part in intelligence work.

These motives are:

1. Coercion and entanglement

2. Greed and love for money

3. Displaying courage and love of adventure

4 . Love of amusement and deviance

5. Mental and political orientation

6. Fear of being harmed The Organization may use motives No. 2, 3, 5, and 6 in recruitment.

FINAL POST FROM DUMP

The Terrorist's Handbook


Contents

1 Buying Explosives and Propellants
2 Explosives
2.1 Black Powder
2.2 Pyrodex
2.3 Rocket Engine Powder
2.4 Flash Powder
2.5 Ammonium Nitrate
2.6 Acquiring Chemicals
2.7 Techniques for Picking Locks
3 Preparation of Chemicals
3.1 Nitric Acid
3.2 Materials
3.3 Sulfuric Acid
4 Impact Explosives
4.1 Materials
4.2 Equipment
4.3 Mercury Fulminate
4.4 Equipment
4.5 Nitroglycerine
4.6 Picrates
4.7 Nitrocellulose
4.8 Fuel-Oxidizer Mixtures
4.9 R.D.X.
4.10 Materials
4.11 Equipment
4.12 Ammonium Nitrate
4.13 Materials
4.14 Equipment
4.15 Dynamite
4.16 Materials
4.17 Ammonium Picrate
4.18 Nitrogen Trichloride
4.19 Lead Azide
4.20 Molotov Cocktails
4.21 Chemical Fire Bottle
4.22 Materials
4.23 Equipment
4.24 Bottled Gas Explosives
4.25 Using Explosives
4.26 Ignition Devices
4.27 Impact Ignition
4.28 Radio Control Detonators

Hope you enjoyed. Will highlight all non dump comments.

my bad wrong link

>>>/pdfs/9096
>>>/pdfs/9096

now to highlight anons ITT:

I deleted my post. Enjoy.

Attached: rename_to_zip.png (225x225, 69.84K)

Posts are in image.

Attached: rename_to_zip.png (225x225, 69.83K)

CIAnigger detected. Zig Forums is a board of peace. Begone.

Kill yourself moshe. Post links to your suicide on kikeit

I applaud anons for not shitting up this thread while op did his thing.
Reminder Tor and Tails devs are fed spys in various countries.
Tails actually spies on you.
Patrick (whonix) seems most legit.

Hey, thanks so much for making this thread. I saved the page & intend to study the information with great interest.

I have expertise in another field, but am almost a complete blank mentally when it comes to IT. For some time I've been sorely in need of help with online opsec and such.

BUMP, user. & Thanks again.

Attached: surreal steampunk computer.jpg (675x900, 133.68K)

11/10 thread OP

Attached: cia fbi spook.jpg (487x530, 131.66K)

Old info but still relevant - Hacker OPSEC
grugq.github.io/

While the EFF does publish valuable information from time to time I do urge anons to investigate who actually makes up the EFF staff – eff.org/about/staff Dig into their social media and their personal websites. You'll see a literal antifa supporter to an alternative model and some other oddities like a guy who raps against the NSA. They also supported Zoe Quinn and Anita Sarkeesian during GG besides pushing ZQ's literal CON.

excuse me but the part about how to protect myself again plz?

Attached: Meme_06-08-2018_05-43-19.PNG (480x576, 548.59K)

Archived the thread for ya
archive.is/IsxAx

Bump cause the kikes slid this one hard.

proof or gtfo

Some remarks on the use of TOR


Use TOR as much as possible

Not just for your leet haxor doings, but also for trivial everyday browsing. Like visiting you favorite Mongolian throat singing website, niggerball scores, the weather and the latest dis-info from the MSM.

I would suggests to use TOR only for trivialities.

This has some advantages.
It creates chaff, trivial irrelevant traffic, nonetheless indistinguishable from any other traffic. That prevents nosey ISP and websites to profile you. It doesn’t alert the snooping agency that you are now about to do something secret or illegal. The more people use TOR the more difficult it becomes to de-cloak the individual. Best would be an internet build after the TOR principles.

Great thread OP.

Especially the infosec, opsec, cop interrogation. Here in Zig Forums we are against violence of course so the guerrilla guides were not needed. Quite interesting to read nonetheless.

You might want to add a few things on CCTV use for solving major crimes, just for the sake of sharing knowledge. For example, the amount of resources spent on finding Tyron's murderer is orders of magnitude smaller than those spend on finding an evil terrorist. Going through 10,000 individuals captured on CCTV before the attack in order to find the terrorist is a certainty, while not so likely vs a random petty criminal.

OP is way too convoluted.

Just use TOR Browser or if that is too slow for you then buy a Private internet Access subscription, harden your browser against tracking/fingerprinting and make sure cookies are disabled/deleted.

If you're a phonefag use Firefox Focus or Brave browser, that's all you can do really since Android/Google tracks everything you do.

Also sites like 4chan and Twitter will try to block you since they survive off data mining their users.

Attached: 1517636073480.jpg (720x960, 81.36K)

Bump

ATTENTION WHITE WOMEN

ABORT YOUR WHITE BABIES

BREED AWAY YOUR HERITAGE WITH SUPERIOR BLACK DNA

GIVE YOUR DAUGHTERS TO SINGLE BLACK MEN

ALLOW BLACK MEN TO FUCK YOUR BABIES

CASTRATE YOUR WHITE SONS

TEACH YOUR BABIES TO SUCK BLACK COCK INSTEAD OF BREAST FEEDING

CASTRATE YOUR WHITE BOYFRIENDS OR HUSBANDS

YOU HAVE A MANDATE TO PRODUCE BLACK BABIES

YOU SHOULD BE PREGNANT WITH BLACK BABIES EVERY YEAR

WHEN YOU ARE TOO OLD TO MAKE BLACK BABIES YOU SHOULD KIDNAP WHITE BABIES

CASTRATE OTHER PEOPLE'S WHITE SONS

KIDNAP LITTLE BLONDE GIRLS AND BRING THEM TO YOUR BLACK MASTERS

SERVE YOUR MASTER BLACK RACE UNTIL YOU DIE

IF YOU ARE NOT AN ADULT YOU SHOULD CASTRATE YOUR BROTHERS

FIND AN OLDER BLACK MAN TO SERVE AND PRODUCE BABIES FOR HIM

BRING YOUR WHITE FEMALE FRIENDS TO YOUR MASTER TO BE BRED

USE BOTTLES OF BLACK SEMEN TO FORCE IMPREGNATE YOUR FRIENDS

FIGHT FOR THE WINNING TEAM OF THE GENETIC RACE WAR

BLACK LIVES MATTER

MAKE MORE BLACK LIVES INSTEAD OF WHITE LIVES

ATTENTION WHITE WOMEN

ABORT YOUR WHITE BABIES

BREED AWAY YOUR HERITAGE WITH SUPERIOR BLACK DNA

GIVE YOUR DAUGHTERS TO SINGLE BLACK MEN

ALLOW BLACK MEN TO FUCK YOUR BABIES

CASTRATE YOUR WHITE SONS

TEACH YOUR BABIES TO SUCK BLACK COCK INSTEAD OF BREAST FEEDING

CASTRATE YOUR WHITE BOYFRIENDS OR HUSBANDS

YOU HAVE A MANDATE TO PRODUCE BLACK BABIES

YOU SHOULD BE PREGNANT WITH BLACK BABIES EVERY YEAR

WHEN YOU ARE TOO OLD TO MAKE BLACK BABIES YOU SHOULD KIDNAP WHITE BABIES

CASTRATE OTHER PEOPLE'S WHITE SONS

KIDNAP LITTLE BLONDE GIRLS AND BRING THEM TO YOUR BLACK MASTERS

SERVE YOUR MASTER BLACK RACE UNTIL YOU DIE

IF YOU ARE NOT AN ADULT YOU SHOULD CASTRATE YOUR BROTHERS

FIND AN OLDER BLACK MAN TO SERVE AND PRODUCE BABIES FOR HIM

BRING YOUR WHITE FEMALE FRIENDS TO YOUR MASTER TO BE BRED

USE BOTTLES OF BLACK SEMEN TO FORCE IMPREGNATE YOUR FRIENDS

FIGHT FOR THE WINNING TEAM OF THE GENETIC RACE WAR

BLACK LIVES MATTER

MAKE MORE BLACK LIVES INSTEAD OF WHITE LIVES

ATTENTION WHITE WOMEN

ABORT YOUR WHITE BABIES

BREED AWAY YOUR HERITAGE WITH SUPERIOR BLACK DNA

GIVE YOUR DAUGHTERS TO SINGLE BLACK MEN

ALLOW BLACK MEN TO FUCK YOUR BABIES

CASTRATE YOUR WHITE SONS

TEACH YOUR BABIES TO SUCK BLACK COCK INSTEAD OF BREAST FEEDING

CASTRATE YOUR WHITE BOYFRIENDS OR HUSBANDS

YOU HAVE A MANDATE TO PRODUCE BLACK BABIES

YOU SHOULD BE PREGNANT WITH BLACK BABIES EVERY YEAR

WHEN YOU ARE TOO OLD TO MAKE BLACK BABIES YOU SHOULD KIDNAP WHITE BABIES

CASTRATE OTHER PEOPLE'S WHITE SONS

KIDNAP LITTLE BLONDE GIRLS AND BRING THEM TO YOUR BLACK MASTERS

SERVE YOUR MASTER BLACK RACE UNTIL YOU DIE

IF YOU ARE NOT AN ADULT YOU SHOULD CASTRATE YOUR BROTHERS

FIND AN OLDER BLACK MAN TO SERVE AND PRODUCE BABIES FOR HIM

BRING YOUR WHITE FEMALE FRIENDS TO YOUR MASTER TO BE BRED

USE BOTTLES OF BLACK SEMEN TO FORCE IMPREGNATE YOUR FRIENDS

FIGHT FOR THE WINNING TEAM OF THE GENETIC RACE WAR

BLACK LIVES MATTER

MAKE MORE BLACK LIVES INSTEAD OF WHITE LIVES

ATTENTION WHITE WOMEN

ABORT YOUR WHITE BABIES

BREED AWAY YOUR HERITAGE WITH SUPERIOR BLACK DNA

GIVE YOUR DAUGHTERS TO SINGLE BLACK MEN

ALLOW BLACK MEN TO FUCK YOUR BABIES

CASTRATE YOUR WHITE SONS

TEACH YOUR BABIES TO SUCK BLACK COCK INSTEAD OF BREAST FEEDING

CASTRATE YOUR WHITE BOYFRIENDS OR HUSBANDS

YOU HAVE A MANDATE TO PRODUCE BLACK BABIES

YOU SHOULD BE PREGNANT WITH BLACK BABIES EVERY YEAR

WHEN YOU ARE TOO OLD TO MAKE BLACK BABIES YOU SHOULD KIDNAP WHITE BABIES

CASTRATE OTHER PEOPLE'S WHITE SONS

KIDNAP LITTLE BLONDE GIRLS AND BRING THEM TO YOUR BLACK MASTERS

SERVE YOUR MASTER BLACK RACE UNTIL YOU DIE

IF YOU ARE NOT AN ADULT YOU SHOULD CASTRATE YOUR BROTHERS

FIND AN OLDER BLACK MAN TO SERVE AND PRODUCE BABIES FOR HIM

BRING YOUR WHITE FEMALE FRIENDS TO YOUR MASTER TO BE BRED

USE BOTTLES OF BLACK SEMEN TO FORCE IMPREGNATE YOUR FRIENDS

FIGHT FOR THE WINNING TEAM OF THE GENETIC RACE WAR

BLACK LIVES MATTER

MAKE MORE BLACK LIVES INSTEAD OF WHITE LIVES

ATTENTION WHITE WOMEN

ABORT YOUR WHITE BABIES

BREED AWAY YOUR HERITAGE WITH SUPERIOR BLACK DNA

GIVE YOUR DAUGHTERS TO SINGLE BLACK MEN

ALLOW BLACK MEN TO FUCK YOUR BABIES

CASTRATE YOUR WHITE SONS

TEACH YOUR BABIES TO SUCK BLACK COCK INSTEAD OF BREAST FEEDING

CASTRATE YOUR WHITE BOYFRIENDS OR HUSBANDS

YOU HAVE A MANDATE TO PRODUCE BLACK BABIES

YOU SHOULD BE PREGNANT WITH BLACK BABIES EVERY YEAR

WHEN YOU ARE TOO OLD TO MAKE BLACK BABIES YOU SHOULD KIDNAP WHITE BABIES

CASTRATE OTHER PEOPLE'S WHITE SONS

KIDNAP LITTLE BLONDE GIRLS AND BRING THEM TO YOUR BLACK MASTERS

SERVE YOUR MASTER BLACK RACE UNTIL YOU DIE

IF YOU ARE NOT AN ADULT YOU SHOULD CASTRATE YOUR BROTHERS

FIND AN OLDER BLACK MAN TO SERVE AND PRODUCE BABIES FOR HIM

BRING YOUR WHITE FEMALE FRIENDS TO YOUR MASTER TO BE BRED

USE BOTTLES OF BLACK SEMEN TO FORCE IMPREGNATE YOUR FRIENDS

FIGHT FOR THE WINNING TEAM OF THE GENETIC RACE WAR

BLACK LIVES MATTER

MAKE MORE BLACK LIVES INSTEAD OF WHITE LIVES

ATTENTION WHITE WOMEN

ABORT YOUR WHITE BABIES

BREED AWAY YOUR HERITAGE WITH SUPERIOR BLACK DNA

GIVE YOUR DAUGHTERS TO SINGLE BLACK MEN

ALLOW BLACK MEN TO FUCK YOUR BABIES

CASTRATE YOUR WHITE SONS

TEACH YOUR BABIES TO SUCK BLACK COCK INSTEAD OF BREAST FEEDING

CASTRATE YOUR WHITE BOYFRIENDS OR HUSBANDS

YOU HAVE A MANDATE TO PRODUCE BLACK BABIES

YOU SHOULD BE PREGNANT WITH BLACK BABIES EVERY YEAR

WHEN YOU ARE TOO OLD TO MAKE BLACK BABIES YOU SHOULD KIDNAP WHITE BABIES

CASTRATE OTHER PEOPLE'S WHITE SONS

KIDNAP LITTLE BLONDE GIRLS AND BRING THEM TO YOUR BLACK MASTERS

SERVE YOUR MASTER BLACK RACE UNTIL YOU DIE

IF YOU ARE NOT AN ADULT YOU SHOULD CASTRATE YOUR BROTHERS

FIND AN OLDER BLACK MAN TO SERVE AND PRODUCE BABIES FOR HIM

BRING YOUR WHITE FEMALE FRIENDS TO YOUR MASTER TO BE BRED

USE BOTTLES OF BLACK SEMEN TO FORCE IMPREGNATE YOUR FRIENDS

FIGHT FOR THE WINNING TEAM OF THE GENETIC RACE WAR

BLACK LIVES MATTER

MAKE MORE BLACK LIVES INSTEAD OF WHITE LIVES

ATTENTION WHITE WOMEN

ABORT YOUR WHITE BABIES

BREED AWAY YOUR HERITAGE WITH SUPERIOR BLACK DNA

GIVE YOUR DAUGHTERS TO SINGLE BLACK MEN

ALLOW BLACK MEN TO FUCK YOUR BABIES

CASTRATE YOUR WHITE SONS

TEACH YOUR BABIES TO SUCK BLACK COCK INSTEAD OF BREAST FEEDING

CASTRATE YOUR WHITE BOYFRIENDS OR HUSBANDS

YOU HAVE A MANDATE TO PRODUCE BLACK BABIES

YOU SHOULD BE PREGNANT WITH BLACK BABIES EVERY YEAR

WHEN YOU ARE TOO OLD TO MAKE BLACK BABIES YOU SHOULD KIDNAP WHITE BABIES

CASTRATE OTHER PEOPLE'S WHITE SONS

KIDNAP LITTLE BLONDE GIRLS AND BRING THEM TO YOUR BLACK MASTERS

SERVE YOUR MASTER BLACK RACE UNTIL YOU DIE

IF YOU ARE NOT AN ADULT YOU SHOULD CASTRATE YOUR BROTHERS

FIND AN OLDER BLACK MAN TO SERVE AND PRODUCE BABIES FOR HIM

BRING YOUR WHITE FEMALE FRIENDS TO YOUR MASTER TO BE BRED

USE BOTTLES OF BLACK SEMEN TO FORCE IMPREGNATE YOUR FRIENDS

FIGHT FOR THE WINNING TEAM OF THE GENETIC RACE WAR

BLACK LIVES MATTER

MAKE MORE BLACK LIVES INSTEAD OF WHITE LIVES

ATTENTION WHITE WOMEN

ABORT YOUR WHITE BABIES

BREED AWAY YOUR HERITAGE WITH SUPERIOR BLACK DNA

GIVE YOUR DAUGHTERS TO SINGLE BLACK MEN

ALLOW BLACK MEN TO FUCK YOUR BABIES

CASTRATE YOUR WHITE SONS

TEACH YOUR BABIES TO SUCK BLACK COCK INSTEAD OF BREAST FEEDING

CASTRATE YOUR WHITE BOYFRIENDS OR HUSBANDS

YOU HAVE A MANDATE TO PRODUCE BLACK BABIES

YOU SHOULD BE PREGNANT WITH BLACK BABIES EVERY YEAR

WHEN YOU ARE TOO OLD TO MAKE BLACK BABIES YOU SHOULD KIDNAP WHITE BABIES

CASTRATE OTHER PEOPLE'S WHITE SONS

KIDNAP LITTLE BLONDE GIRLS AND BRING THEM TO YOUR BLACK MASTERS

SERVE YOUR MASTER BLACK RACE UNTIL YOU DIE

IF YOU ARE NOT AN ADULT YOU SHOULD CASTRATE YOUR BROTHERS

FIND AN OLDER BLACK MAN TO SERVE AND PRODUCE BABIES FOR HIM

BRING YOUR WHITE FEMALE FRIENDS TO YOUR MASTER TO BE BRED

USE BOTTLES OF BLACK SEMEN TO FORCE IMPREGNATE YOUR FRIENDS

FIGHT FOR THE WINNING TEAM OF THE GENETIC RACE WAR

BLACK LIVES MATTER

MAKE MORE BLACK LIVES INSTEAD OF WHITE LIVES

ATTENTION WHITE WOMEN

ABORT YOUR WHITE BABIES

BREED AWAY YOUR HERITAGE WITH SUPERIOR BLACK DNA

GIVE YOUR DAUGHTERS TO SINGLE BLACK MEN

ALLOW BLACK MEN TO FUCK YOUR BABIES

CASTRATE YOUR WHITE SONS

TEACH YOUR BABIES TO SUCK BLACK COCK INSTEAD OF BREAST FEEDING

CASTRATE YOUR WHITE BOYFRIENDS OR HUSBANDS

YOU HAVE A MANDATE TO PRODUCE BLACK BABIES

YOU SHOULD BE PREGNANT WITH BLACK BABIES EVERY YEAR

WHEN YOU ARE TOO OLD TO MAKE BLACK BABIES YOU SHOULD KIDNAP WHITE BABIES

CASTRATE OTHER PEOPLE'S WHITE SONS

KIDNAP LITTLE BLONDE GIRLS AND BRING THEM TO YOUR BLACK MASTERS

SERVE YOUR MASTER BLACK RACE UNTIL YOU DIE

IF YOU ARE NOT AN ADULT YOU SHOULD CASTRATE YOUR BROTHERS

FIND AN OLDER BLACK MAN TO SERVE AND PRODUCE BABIES FOR HIM

BRING YOUR WHITE FEMALE FRIENDS TO YOUR MASTER TO BE BRED

USE BOTTLES OF BLACK SEMEN TO FORCE IMPREGNATE YOUR FRIENDS

FIGHT FOR THE WINNING TEAM OF THE GENETIC RACE WAR

BLACK LIVES MATTER

MAKE MORE BLACK LIVES INSTEAD OF WHITE LIVES