GUERRILLA SECURITY
The urban guerrilla lives in constant danger of the possibility of being discovered or denounced. The primary security problem is to make certain that we are well-hidden and well-guarded, and that there are secure methods to keep the police from locating us. The worst enemy of the urban guerrilla, and the major danger that we run into, is infiltration into our organization by a spy or informer. The spy trapped within the organization will be punished with death. The same goes for those who desert and inform to the police. A well-laid security means there are no spies or agents infiltrated into our midst, and the enemy can receive no information about us even through indirect means. The fundamental way to insure this is to be strict and cautious in recruiting. Nor is it permissible for everyone to know everything and everyone. This rule is a fundamental ABC of urban guerrilla security. The enemy wants to annihilate us and fights relentlessly to find us and destroy us, so our greatest weapon lies in hiding from him and attacking by surprise.
The danger to the urban guerrilla is that he may reveal himself through carelessness or allow himself to be discovered through a lack of vigilance. It is impermissible for the urban guerrilla to give out his own or any other clandestine address to the police, or to talk too much. Notations in the margins of newspapers, lost documents, calling cards, letters or notes, all these are evidence that the police never underestimate. Address and telephone books must be destroyed, and one must not write or hold any documents. It is necessary to avoid keeping archives of legal or illegal names, biographical information, maps or plans. Contact numbers should not be written down, but simply committed to memory. The urban guerrilla who violates these rules must be warned by the first one who notes this infraction and, if he repeats it, we must avoid working with him in the future. The urban guerrilla's need to move about constantly with the police nearby—given the fact that the police net surrounds the city—forces him to adopt various security precautions depending upon the enemy's movements. For this reason, it is necessary to maintain a daily information service about what the enemy appears to be doing, where the police net is operating and what points are being watched. The daily reading of the police news in the newspapers is a fountain of information in these cases. The most important lesson for guerrilla security is never, under any circumstances, to permit the slightest laxity in the maintenance of security measures and precautions within the organization.
Guerrilla security must also be maintained in the case of an arrest. The arrested guerrilla must reveal nothing to the police that will jeopardize the organization.
he must say nothing that will lead, as a consequence, to the arrest of other comrades, the discovery of addresses or hiding places, or the loss of weapons and ammunition.
As for me I'm not browsing with Tor Browser. I would use it if I were very worried about tracking, but I'm not hiding from NSA. I'm not doing anything illegal or advocating anything illegal and wouldn't.
I just don't want to be casually tracked by google et al, and don't want to leave a trail of opinions that could be made retroactively illegal. I don't want to get swept up without warning in the first grab-all-the-likely-dissenters-sweep should Joseph Stalin Himself get into power.
So I just use this
and regular firefox.
To get .onion addresses working you gotta also set up manual socks proxy pointing to 127.0.0.1:9050 socks v5 and no proxy for localhost, 127.0.0.1
Plain web works without this, but adding the socks thing makes .onion work again.
Can run dissenter fine, and stay logged into things like pastebin.
Yes it's easier to track, but that's fine. In 10 years when they commandeer all the logs, they'll find that some dude named gopoundsand wrote this shit using firefox over tor.
Oooh we hate his opinions! Too bad we don't know who he is so we can line him up in front of a hole full of bodies and lime and shoot him.
I just log in as anon. To use anything but tor I have to sudo. So tor is the default. Tor browser works with this setup and if security were paramount for some task I would use it. But having regular firefox available to use ( still with tor ) makes having a level not of security, but of privacy possible. I consider it shutting the blinds while I walk around naked. Sure someone right outside the window might peek through the cracks but I'm not showing my ass to the whole neighborhood.
I will fucking hunt you down and your family and force you to sit for the rest of your natural life in a prison cell facing a TV feed of your shill posts motherfucker. CONTEMPLATE THAT YOU GODDAMN SWINE! I WILL NEVER SURRENDER I WILL NEVER TIRE NOR SLACKEN! NO PERSONAL PRICE CAN DISSUADE ME. NO FIAT CURRENCY BONANZA TAKE THE WIND OUT MY SAILS FOR MY DESTINATION IS EITHER DEATH OR FREEDOM FROM ZOG AND I WILL DO IT IN ANY CAPACITY. ANY FORM. IF I HAVE A WOUND I WILL SPRINT BACK TO THE FRONTLINE TWICE AS FAST. IF MY LEGS ARE MULCHED I WILL TRAIN MY ARMS AND HANDWALK MY WAY BACK THERE. I WILL DIG MY OWN TRENCHES AND CARRY MY OWN MACHINE GUNS. I WILL HAUL THE AMMO BOXES AND DRAW THE TACTICAL PLANS. NO TASK WILL PROVE TOO DAUNTING, NO STEP TOO LARGE.
NO HUMAN LIMIT WILL CONSTRAIN MY UNFETTERED WILL TO REMOVE YOUR EVIL EVIL EVVVIIIILLLLL FUCKING KIND FROM THE HAND WHICH DRIVES THE YOKE OF TYRANNY ON MY KIN. WHICH BANKRUPTS FARMERS.
So kindly FUCKING NECK YOURSELF YOU GODDAMNED AMOEBA, YOU MENTAL MIDGET, YOU WEAK FUCKING COWARD!
11836667
One thing that's gotta happen ASAP is an extra otp layer for fde and for coms, particularly text chat & (text) email.
Even with 90's tech it was already possible to establish a 100% uncrackable line of communication with someone with whom you have occasional physical contact, by physical exchange of CD's containing otp. Imperfect, because they couldn't be destroyed. Well, now we have HDD, which can be erased, and also which can be effectively destroyed (by heating the platter with a flame).
This is to be used in ADDITION to whatever encryption you may prefer, AES being surely adequate for most purposes.
11839039
Also, in addition to DBAN, you want to always be using full disk encryption (FDE) - but, if you use FDE, you need to have an excellent backup system, with offsite backups.
And this gets into the topic of keyfiles, like using a thumb drive to store a key for VeraCrypt. The degree to which this increases security is amazing. You go from "maybe they can guess your password" to "they gotta find that damn thumb drive".
SIXTH LESSON - TRAINING
UK/BM-44 TRANSLATION
The following security precautions should be taken during
the training: The Place:
The place should have the following specifications:
Distance from the populated areas with the availability of living necessities.
Availability of medical services during the training.
The place should be suitable for the type of training (physical fitness, shooting, tactics).
No one except the trainers and trainees should know about the place.
The place should have many roads and entrances.
The place should be visited at suitable times.
Hiding any training traces immediately after the training.
Guarding the place during the training.
Appropriateness of the existing facilities for the number of training members.
Exclusion of anyone who is not connected with the training.
Taking all security measures regarding the establishment.
Distance of the place from police stations, public establishments, and the eyes of informants.
The place should not be situated in such a way that the training and trainees can be seen from another location.
UK/BM-45 TRANSLATION
The Trainees:
Before proceeding to the training place, all security measures connected with an undercover individual should be taken. Meanwhile, during training at the place, personnel safety should be ensured.
Selecting the trainees carefully.
The trainees should not know one another.
The small size of groups that should be together during the training (7-10 individuals).
The trainees should not know the training place.
Establishing a training plan f o r each trainee.
The Trainers:
All measures taken with regard to the commanders apply also to the trainers. Also, the following should be applied:
Fewness of the trainers in the training place. Only those conducting the training should be there, in order not to subject the training team to the risk of security exposure.
Not revealing the identity of the trainer to trainees.
Keeping a small ratio of trainees to trainer.
[–] 16203761? ago
Step 6: Apply the Wood Glue and Insert the USB Drive
Clear the saw dust and wood shavings from the hole by blowing on it. Then fill the hole most of the way with wood glue. Slowly insert the USB drive into the hole until the back edge of the metal on the connector port is even with the surface of the tree. Some of the glue will squeeze out around the edges. Wipe off the excess using some nearby leaves.
Once the glue dries, you have a USB deaddrop site out in nature. If you wish to prolong the life of the drive, you can put a cap on it to at least partially protect it from the weather.
Step 7: Finished Dead Drop Site
The last step is to upload the instruction text files and any other files that you want to share. You can find the readme file here: http://deaddrops.com/download/readme.txt. You can find the dead drop manifesto here: http://deaddrops.com/download/deaddrops-manifesto.txt.
I also decided to also load a copy of "The Giving Tree" by Shel Silverstein onto the flash drive (Yes, I got the idea from this xkcd comic by Randall Munroe).
To document the dead drop location, it helps if you take three pictures of the location (up close medium and far away). This makes it easier for others to find your dead drop.
Step 8: Stone Dead Drop Location
You don't need to limit yourself to just trees. You can also setup a dead drop in stone. The process for this variation is identical to the original procedure that is used for brick and mortar locations. Just find a relatively soft rock, drill the hole with a mortar drill bit and use concrete patch or fast drying cement instead of glue to fill the hole.
Step 9: Register the Dead Drop Location on Deaddrops.com
When you get back home, you can register the dead drop location here: http://deaddrops.com/dead-drops/db-map/.. This helps others to find it. Then check on the dead drop periodically to see if it is still working and if it is being used. As with all files of unknown origin, always be careful to avoid viruses.
http://www.instructables.com/id/Create-a-USB-Dead-Drop-in-Nature/
END BONUS