Step 1
You and I independently arrive at the previously agreed-upon general location. Rather than fixing a specific location, we agree to be only in the general vicinity. This is an important principle.
This might be a large park, a residential district, etc. The location must be outdoors and free of video surveillance cameras. It should also be selected with the intention of thwarting telephoto lenses.
You and I should each know the area well. The location should provide reasonable cover for each of us being there - strolling in the park, walking through a residential area to a bus stop, convenience store, etc.
Step 2
You and I will eventually make eye contact at some distance from each other. We do this discretely, so others are unaware. I use a pre-arranged signal to alert you that I have spotted you. Perhaps I'll throw my jacket over my shoulder, or remove and clean my sunglasses, etc. The signal must be a natural movement that does not attract unwanted attention.
Safety first. Even though you and I have seen each other, we do NOT approach each other. This is an important safety valve. If either of us has grown a tail we do not want to compromise the other person.
BACKGROUND - The phrase grown a tail is spy-talk for being under surveillance. The phrase is somewhat inaccurate, because they don't just follow you, they often surround you.
Step 3
When you see my signal you simply walk off. Then I follow you in order to ensure that you're not being watched. I carefully check for the presence of a floating-box foot surveillance team. I check for agents at fixed observation posts. I also watch for drive-by support from a floating-box vehicle surveillance team.
BACKGROUND - In particular, I may follow you, I may walk parallel to you, I may occasionally walk ahead of you. The goal is simply to be nearby so I'm in a position to detect surveillance around you. I always remain at a distance from you, of course, never approaching too closely.
Step 4
When I have satisfied myself that you are clean, I again signal you. Perhaps I re-tie my shoe laces.
Step 5
Now we reverse roles and this time it is I who simply walks off. You begin to follow me in order to ensure that I'm not being watched. You check for floating-box foot surveillance, fixed observation post foot surveillance, and drive-by support by a vehicle surveillance team.
What to look for.You carefully watch for persons who are pacing me or moving parallel with me. You check for persons loitering at positions with a good line-of-sight to my location. You watch for an ongoing pattern of people coming and going that results in someone always being in a position to monitor me. You watch for vehicles dropping someone off ahead of me.
Step 6
When you are satisfied that I am clean, you signal me that I'm not being watched. (On the other hand, if you suspect that a surveillance team is in the vicinity, you simply abort the operation and walk away.)
BACKGROUND - You must trust your instincts, because if something seems not quite right it's better to be safe than sorry. Many people are surprised to learn that it is not difficult to detect a surveillance team watching someone else. This is the subtle elegance of Blunt's countersurveillance system. And the goons are helpless against it.
FOURTH LESSON - Organization MILITARY BASES "APARTMENTS PLACES" - HIDING
UK/BM-25 TRANSLATION
Definition of Bases:
These are apartments, hiding places, command centers, etc. in which secret operations are executed against the enemy. These bases may be in cities, and are [then] called homes or apartments. They may be in mountainous, harsh terrain far from the enemy, and are [then] called hiding places or bases.
During the initial stages, the Military Organization usually uses apartments in cities as places for launching assigned missions, such as collecting information, observing members of the ruling regime, etc.
Hiding places and bases in mountains and harsh terrain are used at later stages, from which Jihad [holy war] groups are dispatched to execute assassination operations of enemy individuals, bomb their centers, and capture their weapons. In some Arab countries such as Egypt, where there are no mountains or harsh terrain, all stages of Jihad work would take place in cities. The opposite was true in Afghanistan, where initially Jihad work was in the cities, then the warriors shifted to mountains and harsh terrain. There, they started battling the Communists.
Security Precautions Related to Apartments:
2 . It is preferable to rent apartments on the ground floor to facilitate escape and digging of trenches.
3 . Preparing secret locations in the apartment for securing documents, records, arms, and other important items.
4 . Preparing ways of vacating the apartment in case of a surprise attack (stands,wooden ladders).
UK/BM-26 TRANSLATION
Under no circumstances should any one know about the apartment except those who use it.
Providing the necessary cover for the people who frequent the apartment (students,workers, employees, etc.)
Avoiding seclusion and isolation from the population and refraining from going to the apartment at suspicious times.
It is preferable to rent these apartments using false names, appropriate cover, and non-Moslem appearance.
A single brother should not rent more than one apartment in the same area, from the same agent, or using the same rental office.
Care should be exercised not to rent apartments that are known to the security apparatus [such as] those used for immoral or prior Jihad activities.
Avoiding police stations and government buildings. Apartments should not be rented near those places.
When renting these apartments, one should avoid isolated or deserted locations so the enemy would not be able to catch those living there easily.
It is preferable to rent apartments in newly developed areas where people do not know one another. Usually, in older quarters people know one another and strangers are easily identified, especially since these quarters have many informers.
Ensuring that there is has been no surveillance prior to the members entering the apartment.
Agreement among those living in the apartment on special ways of knocking on the door and special signs prior to entry into the building’s main gate to indicate to those who wish to enter that the place is safe and not being monitored. Such signs include hanging out a towel, opening a curtain, placing a cushion in a special way, etc.
UK/BM-27 TRANSLATION
If there is a telephone in the apartment, calls should be answered in an agreed-upon manner among those who use the apartment. That would prevent mistakes that would, otherwise, lead to revealing the names and nature of the occupants.
For apartments, replacing the locks and keys with new ones. As for the other entities (camps,shops, mosques), appropriate security precautions should be taken depending on the entity’s importance and role in the work.
Apartments used for undercover work should not be visible from higher apartments in order not to expose the nature of the work.
In a newer apartment, avoid talking loud because prefabricated ceilings and walls [used in the apartments] do not have the same thickness as those in old ones.
It is necessary to have at hand documents supporting the undercover [member]. In the case of a physician, there should be an actual medical diploma, membership in the [medical] union, the government permit, and the rest of the routine procedures known in that country.
The cover should blend well [with the environment]. For example, selecting a doctor’s clinic in an area where there are clinics, or in a location suitable for it.
The cover of those who frequent the location should match the cover of that location. For example, a common laborer should not enter a fancy hotel because that would be suspicious and draw attention.
==2/2=
Those who meet in-person should do the following:
i. Verifying the security situation of the location before the meeting.
UK/BM-34 TRANSLATION
ii. Ensuring that there are no security personnel behind them or at the meeting place.
iii. Not heading to the location directly.
iv. Clothing and appearance should be appropriate f o r the meeting location.
v. Verifying that private documents carried by the brother have appropriate cover.
vi. Prior to the meeting, designing a security plan that specifies what the security personnel would be told in case the location were raided by them, and what [the brothers] would resort to in dealing with the security personnel (fleeing,driving b a c k , . . . )
i. should blend well with the nature of the location.
ii. In case they raid the place, the security personnel should believe the cover.
iii. should not arouse the curiosity of those present.
iv. should match the person's appearance and his financial and educational background.
v. should have documents that support it.
vi. provide reasons for the two parties' meeting (for example, one of the two parties should have proof that he is an architect. The other should have documents as proof that he is a land owner. The architect has produced a construction plan for the land)
i. Specifying the hour of the meeting as well as the date.
UK/BM-35 TRANSLATION
ii. Specifying the time of both parties' arrival ana the time of the first party's departure.
iii. Specifying how long the meeting will last.
iv. Specifying an alternative date and time.
v. Not allowing a long period of time between making the meeting arrangements and the meeting itself.
4 . Designating special signals between those who meet If the two individuals meeting know one another's shape and appearance, it is sufficient to use a single safety sign. [In that case,] the sitting and arriving individuals inform each other that there is no enemy surveillance. The sign may be keys, beads, a newspaper, or a scarf. The two parties would agree on moving it in a special way so as not to attract the attention of those present. If the two individuals do not know one another, they should do the following: a. The initial sign for becoming acquainted may be that both of them wear a certain type of clothing or carry a certain item. These signs should be appropriate for the place, easily identified, and meet the purpose. The initial sign for becoming acquainted does not [fully] identify one person by another. It does that at a rate of 30%. b. Safety Signal: It is given by the individual sitting in. the meeting location to inform the second individual that the place is safe. The second person
UK/BM-36 TRANSLATION
would reply through signals to inform the first that he is not being monitored. The signals are agreed upon previously and should not cause suspicion. c. A second signal for getting acquainted is one in which the arriving person uses while sitting down. That signal may be a certain clause, a word, a sentence, or a gesture agreed upon previously, and should not cause suspicion for those who hear it or see it. B. The Stage of the Meeting [itself]:The following measures should be taken:
2 . Not acting unnaturally during the meeting in order not to raise suspicion.
Not talking with either loud or very low voices ([should be] moderate).
Not writing anything that has to do with the meeting.
Agreeing on a security plan in case the enemy raids the location.
C. After the Meeting: The following measures should be taken:
Not departing together, but each one separately.
Not heading directly to the main road but through secondary ones.
Not leaving anything in the meeting place that might indicate the identity or nature of those who met. Meeting in-person has disadvantages, such as:
Allowing the enemy to capture those who are meeting.
Allowing them [the enemy] to take pictures of those who are meeting, record their conversation, and gather evidence against them.
UK/BM-37 TRANSLATION
BONUS
Create a USB Dead Drop in Nature
Create a USB Dead Drop in Nature by DIY Hacks and How Tos
Dead drop is an anonymous, offline, peer-to-peer file sharing network in public space. This network is made up of USB drives that are embedded in walls, buildings and other public places. Anyone is free to access, download, and upload. It is very similar to geocaching but with data. The first USB dead drop network of five locations was created by Berlin-based artist Aram Bartholl in 2010. Since then, there have been over 1,000 dead drop locations that have been registered at deaddrops.com (Including one outside the Instructables office.) For a walk through of how to set up a standard USB dead drop, check out this instructable by user frenzy.
Up until now, this has been mostly restricted to urban locations. In this instructable, I am going to attempt to expand this project beyond city limits by showing everyone how to embed USB drives in natural fixtures such as trees and rocks.
Contents
1 Step 1: Materials
2 Step 2: Remove the Housing of the
USB Drive
3 Step 3: Wrap the USB Drive in
Plumber's Tape
4 Step 4: Select a Dead Tree or Stump
as a Dead Drop Location
5 Step 5: Drill Holes in the Trunk to
Make Room for Your USB Drive
6 Step 6: Apply the Wood Glue and
Insert the USB Drive
7 Step 7: Finished Dead Drop Site
8 Step 8: Stone Dead Drop Location
9 Step 9: Register the Dead Drop
Location on Deaddrops.com
Step 1: Materials
To install a USB drive in a tree, you will need the following materials:
Materials: USB flash drive Plumber's tape Wood Glue
Tools: Cordless Drill Drill bit set Screw driver, or other tool to pry open the flash drive
Step 2: Remove the Housing of the USB Drive
The first step is to open up the housing of the flash drive and remove all the unnecessary plastic. You can usually pry open the housing with a small screw driver or knife. Another option is to just squeeze the housing with a pair of pliers at the seem. Continue removing parts until only the USB connector and the circuit board remain.
Step 3: Wrap the USB Drive in Plumber's Tape
Applying a layer of plumber's tape around the circuit board of the drive helps to keep it a little more protect. Don't go overboard, one or two layers is plenty.
Step 4: Select a Dead Tree or Stump as a Dead Drop Location
Select a dead tree to locate your deaddrop. I do not recommend using a healthy tree for this project. In addition to the damage caused by drilling, the cavity that you create also provides a potential site for mold, rot and insect to take up residence. Because of this, I recommend using a tree that is obviously dead, fallen over, or just a stump.
Step 5: Drill Holes in the Trunk to Make Room for Your USB Drive
The USB connector and board of a typical USB drive is about 0.51inch (13mm) wide x 0.20inch (5mm) thick. There are a number of ways that you can drill out a slot to accommodate for it. The simplest and fastest method is to drill a single hole that is large enough to fit the whole drive inside of it. A 1/2" drill bit will usually suffice for this.
If you want to make a smaller imprint on the surface and make the end product look a little cleaner, you can drill a series of smaller holes in a line to make a slot. Each hole should be the same thickness as the USB drive (about 1/4 inch). Then you can finish the shaping with a knife or file.
Be sure to drill your hole is a part of the tree that is solid and free from rot.
Plumbers tape
Tar is far superior.
31) Do not tolerate oppressive (sexist, racist, homophobic etc.) dynamics within the movement. Confront their expression and put a stop to it.
kek
STASI Boys for sure in the thread. Completely bullshit methods of explosive creation given. True terror not revealed. Use Tor and you can still be TORPEDOED.
Financial Security Precautions:
Dividing operational funds into two parts: One part is to be invested in projects that offer financial return, and the other is to be saved and not spent except during operations.
Not placing operational funds [all] in one place.
Not telling the Organization members about the location of the funds.
Having proper protection while carrying large amounts of money.
Leaving the money with non-members and spending it as needed.
Forged Documents (IdentityCards, Records Books, Passports)
The following security precautions should be taken:
Keeping the passport in a safe place so it would not be ceized by the security apparatus, and the brother it belongs to would have to negotiate its return (I'll give you your passport if you give me information)
All documents of the undercover brother, such as identity cards and passport, should be falsified.
3 . When the undercover brother is traveling with a certain identity card or passport, he should know all pertinent [information] such as the name, profession, and place of residence.
The brother who has special work status (commander, communication link,…) should have more than one identity card and passport. He should learn the contents of each, the nature of the [indicated] profession, and the dialect of the residence area listed in thedocument.
The photograph of the brother in these documents should be without a beard. It is preferable that the brother's public photograph [on these documents] be also without a beard. If he already has one [document] showing a photograph with a beard, he should replace it.
When using an identity document in different names, no more than one such document should be carried at one time.
UK/BM-23 TRANSLATION
7 . The validity of the falsified travel documents should always be confirmed.
8 . All falsification matters should be carried out through the command and not haphazardly (procedure control)
9 . Married brothers should not add their wives to their passports.
Security Precautions Related to the Organizations' Given Names:
[–] 16916243? ago
hey lets all do this thing thats on a website everyone including the feds read