0
0

[–] 16203759? ago 

BONUS

Create a USB Dead Drop in Nature

Create a USB Dead Drop in Nature by DIY Hacks and How Tos

Dead drop is an anonymous, offline, peer-to-peer file sharing network in public space. This network is made up of USB drives that are embedded in walls, buildings and other public places. Anyone is free to access, download, and upload. It is very similar to geocaching but with data. The first USB dead drop network of five locations was created by Berlin-based artist Aram Bartholl in 2010. Since then, there have been over 1,000 dead drop locations that have been registered at deaddrops.com (Including one outside the Instructables office.) For a walk through of how to set up a standard USB dead drop, check out this instructable by user frenzy.

Up until now, this has been mostly restricted to urban locations. In this instructable, I am going to attempt to expand this project beyond city limits by showing everyone how to embed USB drives in natural fixtures such as trees and rocks.

Contents

1 Step 1: Materials

2 Step 2: Remove the Housing of the 

    USB Drive

3 Step 3: Wrap the USB Drive in 

   Plumber's Tape

4 Step 4: Select a Dead Tree or Stump 

   as a Dead Drop Location

5 Step 5: Drill Holes in the Trunk to 

    Make Room for Your USB Drive

6 Step 6: Apply the Wood Glue and 

    Insert the USB Drive

7 Step 7: Finished Dead Drop Site

8 Step 8: Stone Dead Drop Location

9 Step 9: Register the Dead Drop 

   Location on Deaddrops.com

Step 1: Materials

To install a USB drive in a tree, you will need the following materials:

Materials: USB flash drive Plumber's tape Wood Glue

Tools: Cordless Drill Drill bit set Screw driver, or other tool to pry open the flash drive

Step 2: Remove the Housing of the USB Drive

The first step is to open up the housing of the flash drive and remove all the unnecessary plastic. You can usually pry open the housing with a small screw driver or knife. Another option is to just squeeze the housing with a pair of pliers at the seem. Continue removing parts until only the USB connector and the circuit board remain.

Step 3: Wrap the USB Drive in Plumber's Tape

Applying a layer of plumber's tape around the circuit board of the drive helps to keep it a little more protect. Don't go overboard, one or two layers is plenty.

Step 4: Select a Dead Tree or Stump as a Dead Drop Location

Select a dead tree to locate your deaddrop. I do not recommend using a healthy tree for this project. In addition to the damage caused by drilling, the cavity that you create also provides a potential site for mold, rot and insect to take up residence. Because of this, I recommend using a tree that is obviously dead, fallen over, or just a stump.

Step 5: Drill Holes in the Trunk to Make Room for Your USB Drive

The USB connector and board of a typical USB drive is about 0.51inch (13mm) wide x 0.20inch (5mm) thick. There are a number of ways that you can drill out a slot to accommodate for it. The simplest and fastest method is to drill a single hole that is large enough to fit the whole drive inside of it. A 1/2" drill bit will usually suffice for this.

If you want to make a smaller imprint on the surface and make the end product look a little cleaner, you can drill a series of smaller holes in a line to make a slot. Each hole should be the same thickness as the USB drive (about 1/4 inch). Then you can finish the shaping with a knife or file.

Be sure to drill your hole is a part of the tree that is solid and free from rot.

0
0

[–] 16343295? ago 

Is this nigga serious?

lol wtf am i reading

0
0

[–] 16343300? ago 

Dead drops are ancient mane. Bump

0
0

[–] 16204192? ago 

Plumbers tape

Tar is far superior.

>>11699294

31) Do not tolerate oppressive (sexist, racist, homophobic etc.) dynamics within the movement. Confront their expression and put a stop to it.

kek

STASI Boys for sure in the thread. Completely bullshit methods of explosive creation given. True terror not revealed. Use Tor and you can still be TORPEDOED.

Flexin those Beamsplitters Mr. Apl[habet

0
0

[–] 16203758? ago 

Step 7

You and I can now approach each other and meet. After our discussion we agree upon the date, time, and location of our next clandestine meeting - as well as two backup plans in case the meeting is thwarted by surveillance. If we are unable to meet at the first venue we will use our fallback position and we will meet at the same time and place one week later. If we are unable to make that meeting happen, we will shift to a previously agreed-upon failsafe plan and we will meet at a different location at an agreed-upon date and time.

Neither you nor I writes down the particulars of our next meeting. We commit the details to memory.

BACKGROUND 1 - If you have any documents to give me, I will not accept those documents until the final moments of our meeting. I will have already started making my getaway when I accept the documents. This reduces the chance of discovery and arrest by a surveillance team that has managed to elude our countersurveillance protocol. If the security service acts too quickly, they will have no evidence against me, because the documents have not yet been passed to me.

BACKGROUND 2 - The best agents never mix discussion and documents. If a document is to be passed, no discussion occurs. The entire contact takes only a moment - the perfect brushpass. The principle is simple. It is foolhardy to stand around holding incriminating documents.

Spook talk…

Spies in North America call this seven-step protocol for countersurveillance drycleaning. In Europe, it is called parcours de sécurité - a French phrase which can be translated as security run or security circuit.

0
0

[–] 16203757? ago 

good bread

0
0

[–] 16203864? ago 

my bad wrong link

>>>/pdfs/9096

>>>/pdfs/9096

now to highlight anons ITT:

>>11699242

>>11699403

11699435

>>11699469

>>11699507

>>11699548

0
0

[–] 16203865? ago 

Posts are in image.

0
0

[–] 16203756? ago 

Step 1

You and I independently arrive at the previously agreed-upon general location. Rather than fixing a specific location, we agree to be only in the general vicinity. This is an important principle.

This might be a large park, a residential district, etc. The location must be outdoors and free of video surveillance cameras. It should also be selected with the intention of thwarting telephoto lenses.

You and I should each know the area well. The location should provide reasonable cover for each of us being there - strolling in the park, walking through a residential area to a bus stop, convenience store, etc.

Step 2

You and I will eventually make eye contact at some distance from each other. We do this discretely, so others are unaware. I use a pre-arranged signal to alert you that I have spotted you. Perhaps I'll throw my jacket over my shoulder, or remove and clean my sunglasses, etc. The signal must be a natural movement that does not attract unwanted attention.

Safety first. Even though you and I have seen each other, we do NOT approach each other. This is an important safety valve. If either of us has grown a tail we do not want to compromise the other person.

BACKGROUND - The phrase grown a tail is spy-talk for being under surveillance. The phrase is somewhat inaccurate, because they don't just follow you, they often surround you.

Step 3

When you see my signal you simply walk off. Then I follow you in order to ensure that you're not being watched. I carefully check for the presence of a floating-box foot surveillance team. I check for agents at fixed observation posts. I also watch for drive-by support from a floating-box vehicle surveillance team.

BACKGROUND - In particular, I may follow you, I may walk parallel to you, I may occasionally walk ahead of you. The goal is simply to be nearby so I'm in a position to detect surveillance around you. I always remain at a distance from you, of course, never approaching too closely.

Step 4

When I have satisfied myself that you are clean, I again signal you. Perhaps I re-tie my shoe laces.

Step 5

Now we reverse roles and this time it is I who simply walks off. You begin to follow me in order to ensure that I'm not being watched. You check for floating-box foot surveillance, fixed observation post foot surveillance, and drive-by support by a vehicle surveillance team.

What to look for.You carefully watch for persons who are pacing me or moving parallel with me. You check for persons loitering at positions with a good line-of-sight to my location. You watch for an ongoing pattern of people coming and going that results in someone always being in a position to monitor me. You watch for vehicles dropping someone off ahead of me.

Step 6

When you are satisfied that I am clean, you signal me that I'm not being watched. (On the other hand, if you suspect that a surveillance team is in the vicinity, you simply abort the operation and walk away.)

BACKGROUND - You must trust your instincts, because if something seems not quite right it's better to be safe than sorry. Many people are surprised to learn that it is not difficult to detect a surveillance team watching someone else. This is the subtle elegance of Blunt's countersurveillance system. And the goons are helpless against it.

0
0

[–] 16203753? ago 

What you'll learn here…

This article teaches you how to check for surveillance before you meet with a clandestine contact. You'll learn a protocol that will beat security services like the FBI, BATF, DEA, and others. The method is particularly effective against standard police surveillance. It also works against the so-called inspection teams of the IRS.

Tradecraft origins. The method described in this article was originally devised in 1943-1944 by countersurveillance expert Anthony Blunt for Britain's MI.5. Unfortunately for the British, Blunt was a deep-cover agent for the KGB.

Six years later, Blunt taught the protocol to his new KGB controller, Yuri Modin. Together they perfected the technique as it is known today. They successfully thwarted MI.5 surveillance for three years, sometimes even meeting daily to exchange information and top secret documents. In effect, Blunt was using his inside knowledge of MI.5's surveillance techniques to beat them at their own game.

Proliferation. This countersurveillance method has since been adopted by Israel's Mossad, Germany's BND, Russia's KGB (now the SVR), the American CIA, and many others. The protocol is taught by intelligence agencies to their controllers - these are the intelligence officers who manage and meet with deep cover agents in foreign countries. The method is also being used today by resistance movements and urban guerrilla groups.

When this countersurveillance protocol is methodically applied, it is extremely difficult for a security service to breach your security.

Step-by-step instructions…

Here's a hypothetical situation. Assume that you and I wish to meet clandestinely. We wish to ensure that our meeting is not observed by a surveillance team.

You and I have previously agreed upon a place, date, and time. In addition, we are familiar with each other's appearance - we can recognize each other on sight.

0
0

[–] 16203752? ago 

Secret Meetings Guide

A security service like the FBI can only achieve its objectives by intercepting communication between people. This means you can beat the security service if you can deny them the ability to overhear your meetings with your contacts.

Contents

1 What you'll learn here…

2 Step-by-step instructions…

    2.1 Step 1

    2.2 Step 2

    2.3 Step 3

    2.4 Step 4

    2.5 Step 5

    2.6 Step 6

    2.7 Step 7

3 Spook talk… [ ](https://8ch.net/pol/res/11699120.html#q11699211)

0
0

[–] 16203751? ago 

Next up ITT: How to create secret meetings and multiple revolutionary guides

If you like the content, add memes and save the info as an OC graphic.

0
0

[–] 16203748? ago 

So I got arrested and am being interrogated, what do I do? They say if I don't cooperate they are going to make things hell for me and put me in a holding cell with a bunch of gang members! But if I confess they will make things very easy for me.

Ask for your lawyer. If they don't immediately stop questioning you, continue asking for your lawyer. You don't ever want to say anything to cops. Even if they put you in a holding cell full of gang members, it is probably better to be there for a day than to confess and get sent with the same gang members for ten years. Anyways, most gang members are unlikely to mess with you if you just keep to yourself and don't cause any trouble with them. Keep in mind: cops lie, feds lie, they want you to confess, confessing or giving any information up is going to hurt you it is under no circumstances going to ever help you.

If I ask a cop if they are a cop, they have to tell me right?

No, cops do not have to tell you they are cops, neither do feds. Undercovers lie all the time. So do confidential informants. Be careful who you trust, even friends you have known your entire life can turn.

But what about smoking weed or using other drugs? Can they do this too?

Undercovers can smoke weed, and I am sure they will have no issues using other drugs either. Someone using drugs does not mean that they are not a cop or fed. It also doesn't mean they are not a confidential informant.

But I am non-important / don't do anything wrong / am small time

Even if you do nothing wrong, most LE wants to screw you. The majority of them are not trying to protect and serve, but are trying to meet some alpha male requirement they subconsciously have. They feel important when they bring you down. Also, people tend to minimize what they do, so you are probably bigger than you would like to admit.

When I talk online I like to say SWIM (someone who isn't me) instead of me or I. This keeps me safe right?

No, this offers you no protection at all. People who say SWIM are just fooling themselves. People tend to like to have "security blanket security" where they convince themselves they are safe as long as they do some simple ritual (as opposed to taking actual security precautions, which are a bit more difficult). Security blanket security is dangerous, as it doesn't offer real security but makes you act as if you are secured.

load more comments ▼ (7 remaining)