MOBILITY AND SPEED
To insure a mobility and speed that the police cannot match, the urban guerrilla needs the following:
Mechanization
Knowledge of the terrain
A disruption or suspension of enemy transport and communications
Light weapons
By carefully carrying out operations that last only a few moments, and leaving the site in mechanized vehicles, the urban guerrilla beats a rapid retreat, escaping capture.
The urban guerrilla must know the way in detail, and, in this manner, must go through the schedule ahead of time as a training, to avoid entering alleyways that have no exit, or running into traffic jams, or being stopped by the Transit Department's traffic signals.
The police pursue the urban guerrilla blindly, without knowing which road he is using for his escape. While the urban guerrilla escapes quickly because he knows the terrain, the police lose the trail and give up the chase.
The urban guerrilla must launch his operations far from the logistical centers of the police. A primary advantage of this method of operation is that it places us at a reasonable distance from the possibility of capture, which facilitates our evasion.
In addition to this necessary precaution, the urban guerrilla must be concerned with the enemy's communication system. The telephone is the primary target in preventing the enemy from access to information, by knocking out his communications systems.
Even if he knows about the guerrilla operation, the enemy depends on modern transportation for his logistics support, and his vehicles necessarily lose time carrying him through the heavy traffic of the large cities. It is clear that the tangled and treacherous traffic is a disadvantage for the enemy, as it would be for us if we were not ahead of him.
If we want to have a safe margin of security and be certain to leave no tracks for the future, we can adopt the following methods:
Deliberately intercept the police with other vehicles, or by seemingly casual inconveniences and accidents; but in this case the vehicles in question should neither be legal nor have real license numbers
Obstruct the roads with fallen trees, rocks, ditches, false traffic signs, dead ends or detours, or other clever methods
Place homemade mines in the way of the police; use gasoline or throw Molotov cocktails to set their vehicles on fire
Set off a burst of submachine gun fire or weapons such as the FAL aimed at the motor and tires of the cars engaged in the pursuit
With the arrogance typical of the police and the military authorities, the enemy will come to fight us equipped with heavy guns and equipment, and with elaborate maneuvers by men armed to the teeth. The urban guerrilla must respond to this with light weapons that can be easily transported, so he can always escape with maximum speed without ever accepting open fighting. The urban guerrilla has no mission other than to attack and quickly withdraw. We would leave ourselves open to the most crushing defeats if we burdened ourselves with heavy weapons and with the tremendous weight of the ammunition necessary to use them, at the same time losing our precious gift of mobility.
When our enemy fights against us with the cavalry, we are at no disadvantage as long as we are mechanized. The automobile goes faster than the horse. From within the car, we also have the target of the mounted police, knocking him down with submachine gun and revolver fire or with Molotov cocktails and hand grenades.
On the other hand, it is not so difficult for an urban guerrilla on foot to make a target of a policeman on horseback. Moreover, ropes across the street, marbles, and cork stoppers are very efficient methods of making them both fall. The great disadvantage faced by the mounted policeman is that he presents the urban guerrilla with two excellent targets—the horse and its rider.
Apart from being faster than the horseman, the helicopter has no better chance in pursuit. If the horse is too slow compared to the urban guerrilla's automobile, the helicopter is too fast. Moving at 200 kilometers an hour, it will never succeed in hitting from above a target that is lost among the crowds and street vehicles, nor can the helicopter land in public streets in order to capture someone. At the same time, whenever it flies too low, it will be excessively vulnerable to the fire of the urban guerrillas.
Safe Tor Usage
As a very long time Tor user, the most surprising part of the NSA documents was how little progress they have made against Tor. Despite its known weaknesses, it's still the best thing we have, provided it's used properly and you make no mistakes.
Since you want security of "the greatest degree technically feasible", I'm going to assume that your threat is a well-funded government with significant visibility or control of the Internet, as it is for many Tor users (despite the warnings that Tor is not sufficient to protect you from such an actor).
Consider whether you truly need this level of protection. If having your activity discovered does not put your life or liberty at risk, then you probably do not need to go to all of this trouble. But if it does, then you absolutely must be vigilant if you wish to remain alive and free.
Contents
1 Your Computer
2 Your Environment
3 Your Mindset
4 Hidden Services
5 Conclusion
6 Source [ ](https://8ch.net/pol/res/11699120.html#q11699131)
Bad intel to some extent, because you do not make it clear the government already has extensive coverage of those who it wants coverage of.
Case in point - I am a minor player online, though many here would have heard of me. They pick up my keystrokes as a type, and I have a real time monitor somewhere (and more). How I am not sure, I'd assume they got into my system through the provider using established backdoors. So I can use TOR, but I assume they are pulling data some other way. If you are genuinely a threat to the machine, they will find you wholly outside your use ot TOR and get on you by going around it. Even if your computer security were perfect, they would put Cameras in to grab screen shots.
I'm not saying not to use TOR, but you shouldn't create an image that defeating the machine is an easy, or even necessarily controllable endeavor. There is a ton of coverage on multiple levels, from social circle analysis, phone record monitoring, to probably a limited in-person level that actually has human reviews of everyone at some point in their lives.
And knowing how the world works somewhat, I would assume they pick up TOR traffic profiles at the point of entry (every company is comped), and if you use TOR you get in person coverage to figure out what your deal is, and what you are up to.
Check out the Tom Bauerle story to see what is out there, and what they are using. The Machine has stuff even the Navy SEALs wouldn't believe is out there.
Tor in its' current state is of limited use due to too many nodes being taken over. It's the best run honeypot of the bunch. Best used when in foreign countries where internet to begin with is in its' early years and countermeasures aren't about. In the US, it's better to blend in outright on your more public platforms, to make it harder to be picked out of the crowd as it were. TOR is meant to serve as an auxilary protection for those going stealth, but is overly distinctive in current times(Due to lack of usage at large).
brainlet doesn't know the way TOR works
Even if you connect to a node owned by the FBI, they still cannot know your identity. The only way for you to be infected is if you have SCRIPTS turned on, like javascript. There is no way of someone know your identity if you simply browse and post online unless you use a unique way of typing (some pedo who owned a large pedo site was only found due to typing "hiyas" in each announcement and some posts, they then searched for this usage of the unique word and found him on a facebook page advertising his pickup truck).
The only way anyone has found a TOR users identity is via a vulnerability in a script or if the user downloaded a compromised file. Make sure the site has HTTPS/TLS.
Weapons 1/2
The urban guerrilla's role as a gunsmith has a basic importance. As a gunsmith, he takes care of the weapons, knows how to repair them, and in many cases can set up a small shop for improvising and producing effective small arms.
Experience in metallurgy and on the mechanical lathe are basic skills the urban guerrilla should incorporate into his manufacturing plans for the construction of homemade weapons. This production, and courses in explosives and sabotage, must be organized. The primary materials for practice in these courses must be obtained ahead of time, to prevent an incomplete apprenticeship—that is to say, so as to leave no room for experimentation.
Molotov cocktails, gasoline, homemade contrivances such as catapaults and mortars for firing explosives, grenades made of pipes and cans, smoke bombs, mines, conventional explosives such as dynamite and potassium chlorate, plastic explosives, gelatine capsules, and ammunition of every kind are indispensible to the success of the urban guerrilla's mission.
The methods of obtaining the necessary materials and munitions will be to buy them or to take them by force in expropriation actions specially planned and carried out. The urban guerrillas will be careful not to keep explosives and other materials that can cause accidents around for very long, but will always try to use them immediately on their intended targets.
The urban guerrilla's weapons and his ability to maintain them constitute his firepower. By taking advantage of modern weapons and introducing innovations in his firepower and in the use of certain weapons, the urban guerrilla can improve many of the tactics of urban warfare. An example of this was the innovation made by the Brazilian urban guerrillas when they introduced the use of the submachine gun in their attacks on banks.
When the massive use of uniform submachine guns becomes possible, there will be new changes in urban guerrilla warfare tactics. The firing group that utilizes uniform weapons and corresponding ammunition, with reasonable care for their maintenance, will reach a considerable level of effectiveness.
The urban guerrilla increases his effectiveness as he increases his firepower.
Third Means: The Messenger:
This is an intermediary between the sender and the receiver. The messenger should possess all characteristics mentioned in the first chapter regarding the Military Organization’smember. These are the security measures that a messenger should take:
Knowledge of the person to whom he will deliver the message.
Agreement on special signals, exact date, and specific time.
Selecting a public street or place that does not raise suspicion.
Going through a secondary road that does not have check points.
Using public transportation (train,bus,…) and disembarking before the main station. Likewise, embarking should not be done at the main station either, were there are a lot of security personnel and informants.
Complete knowledge of the location to which he is going.
Fourth Means: Letters:
This means (letters) may be used as a method of communication
UK/BM-38 TRANSLATION
between members and the Organization provided that the following security measures are taken:
It is forbidden to write any secret information in the letter. If one must do s o , the writing should be done in general terms.
The letter should not be mailed from a post office close to the sender's residence, but from a distant one.
The letter should not be sent directly to the receiver's address but to an inconspicuous location where there are many workers from your country. Afterwards, the letter will be forwarded to the intended receiver. (This is regarding the overseas- bound letter).
The sender's name and address on the envelope should be fictitious. In case the letters and their contents are discovered, the security apparatus would not be able to determine his [the sender's] name and address.
The envelope should not be transparent so as to reveal the letter inside.
The enclosed pages should not be many, so as not to raise suspicion.
The receiver's address should be written clearly so that the letter would not be returned.
Paying the post office box fees should not be forgotten.
Fifth Means: Facsimile and Wireless:
Considering its modest capabilities and the pursuit by the security apparatus of its members and forces, the Islamic
UK/BM-39 TRANSLATION
Military Organization cannot obtain theses devices. In case the Organization is able to obtain them, firm security measures should be taken to secure communication between the members in the country and the command outside.
These measures are:
The duration of transmission should not exceed five minutes in order to prevent the enemy from pinpointing the device location.
The device should be placed in a location with high wireless frequency, such as close to a TV station, embassies, and consulates in order to prevent the enemy from identifying its location.
The brother, using the wireless device to contact his command outside the country, should disguise his voice.
The time of communication should be carefully specified.
The frequency should be changed from time to time.
The device should be frequently moved from one location to another.
Do not reveal your location to the entity for which you report.
The conversation should be in general terms so as not to raise suspicion.
[–] 16203956? ago