Secret Meetings Guide
A security service like the FBI can only achieve its objectives by intercepting communication between people. This means you can beat the security service if you can deny them the ability to overhear your meetings with your contacts.
Contents
1 What you'll learn here…
2 Step-by-step instructions…
2.1 Step 1
2.2 Step 2
2.3 Step 3
2.4 Step 4
2.5 Step 5
2.6 Step 6
2.7 Step 7
3 Spook talk… [ ](https://8ch.net/pol/res/11699120.html#q11699211)
What you'll learn here…
This article teaches you how to check for surveillance before you meet with a clandestine contact. You'll learn a protocol that will beat security services like the FBI, BATF, DEA, and others. The method is particularly effective against standard police surveillance. It also works against the so-called inspection teams of the IRS.
Tradecraft origins. The method described in this article was originally devised in 1943-1944 by countersurveillance expert Anthony Blunt for Britain's MI.5. Unfortunately for the British, Blunt was a deep-cover agent for the KGB.
Six years later, Blunt taught the protocol to his new KGB controller, Yuri Modin. Together they perfected the technique as it is known today. They successfully thwarted MI.5 surveillance for three years, sometimes even meeting daily to exchange information and top secret documents. In effect, Blunt was using his inside knowledge of MI.5's surveillance techniques to beat them at their own game.
Proliferation. This countersurveillance method has since been adopted by Israel's Mossad, Germany's BND, Russia's KGB (now the SVR), the American CIA, and many others. The protocol is taught by intelligence agencies to their controllers - these are the intelligence officers who manage and meet with deep cover agents in foreign countries. The method is also being used today by resistance movements and urban guerrilla groups.
When this countersurveillance protocol is methodically applied, it is extremely difficult for a security service to breach your security.
Step-by-step instructions…
Here's a hypothetical situation. Assume that you and I wish to meet clandestinely. We wish to ensure that our meeting is not observed by a surveillance team.
You and I have previously agreed upon a place, date, and time. In addition, we are familiar with each other's appearance - we can recognize each other on sight.
Step 1
You and I independently arrive at the previously agreed-upon general location. Rather than fixing a specific location, we agree to be only in the general vicinity. This is an important principle.
This might be a large park, a residential district, etc. The location must be outdoors and free of video surveillance cameras. It should also be selected with the intention of thwarting telephoto lenses.
You and I should each know the area well. The location should provide reasonable cover for each of us being there - strolling in the park, walking through a residential area to a bus stop, convenience store, etc.
Step 2
You and I will eventually make eye contact at some distance from each other. We do this discretely, so others are unaware. I use a pre-arranged signal to alert you that I have spotted you. Perhaps I'll throw my jacket over my shoulder, or remove and clean my sunglasses, etc. The signal must be a natural movement that does not attract unwanted attention.
Safety first. Even though you and I have seen each other, we do NOT approach each other. This is an important safety valve. If either of us has grown a tail we do not want to compromise the other person.
BACKGROUND - The phrase grown a tail is spy-talk for being under surveillance. The phrase is somewhat inaccurate, because they don't just follow you, they often surround you.
Step 3
When you see my signal you simply walk off. Then I follow you in order to ensure that you're not being watched. I carefully check for the presence of a floating-box foot surveillance team. I check for agents at fixed observation posts. I also watch for drive-by support from a floating-box vehicle surveillance team.
BACKGROUND - In particular, I may follow you, I may walk parallel to you, I may occasionally walk ahead of you. The goal is simply to be nearby so I'm in a position to detect surveillance around you. I always remain at a distance from you, of course, never approaching too closely.
Step 4
When I have satisfied myself that you are clean, I again signal you. Perhaps I re-tie my shoe laces.
Step 5
Now we reverse roles and this time it is I who simply walks off. You begin to follow me in order to ensure that I'm not being watched. You check for floating-box foot surveillance, fixed observation post foot surveillance, and drive-by support by a vehicle surveillance team.
What to look for.You carefully watch for persons who are pacing me or moving parallel with me. You check for persons loitering at positions with a good line-of-sight to my location. You watch for an ongoing pattern of people coming and going that results in someone always being in a position to monitor me. You watch for vehicles dropping someone off ahead of me.
Step 6
When you are satisfied that I am clean, you signal me that I'm not being watched. (On the other hand, if you suspect that a surveillance team is in the vicinity, you simply abort the operation and walk away.)
BACKGROUND - You must trust your instincts, because if something seems not quite right it's better to be safe than sorry. Many people are surprised to learn that it is not difficult to detect a surveillance team watching someone else. This is the subtle elegance of Blunt's countersurveillance system. And the goons are helpless against it.
my bad wrong link
now to highlight anons ITT:
11699435
Step 7
You and I can now approach each other and meet. After our discussion we agree upon the date, time, and location of our next clandestine meeting - as well as two backup plans in case the meeting is thwarted by surveillance. If we are unable to meet at the first venue we will use our fallback position and we will meet at the same time and place one week later. If we are unable to make that meeting happen, we will shift to a previously agreed-upon failsafe plan and we will meet at a different location at an agreed-upon date and time.
Neither you nor I writes down the particulars of our next meeting. We commit the details to memory.
BACKGROUND 1 - If you have any documents to give me, I will not accept those documents until the final moments of our meeting. I will have already started making my getaway when I accept the documents. This reduces the chance of discovery and arrest by a surveillance team that has managed to elude our countersurveillance protocol. If the security service acts too quickly, they will have no evidence against me, because the documents have not yet been passed to me.
BACKGROUND 2 - The best agents never mix discussion and documents. If a document is to be passed, no discussion occurs. The entire contact takes only a moment - the perfect brushpass. The principle is simple. It is foolhardy to stand around holding incriminating documents.
Spook talk…
Spies in North America call this seven-step protocol for countersurveillance drycleaning. In Europe, it is called parcours de sécurité - a French phrase which can be translated as security run or security circuit.
BONUS
Create a USB Dead Drop in Nature
Create a USB Dead Drop in Nature by DIY Hacks and How Tos
Dead drop is an anonymous, offline, peer-to-peer file sharing network in public space. This network is made up of USB drives that are embedded in walls, buildings and other public places. Anyone is free to access, download, and upload. It is very similar to geocaching but with data. The first USB dead drop network of five locations was created by Berlin-based artist Aram Bartholl in 2010. Since then, there have been over 1,000 dead drop locations that have been registered at deaddrops.com (Including one outside the Instructables office.) For a walk through of how to set up a standard USB dead drop, check out this instructable by user frenzy.
Up until now, this has been mostly restricted to urban locations. In this instructable, I am going to attempt to expand this project beyond city limits by showing everyone how to embed USB drives in natural fixtures such as trees and rocks.
Contents
1 Step 1: Materials
2 Step 2: Remove the Housing of the
USB Drive
3 Step 3: Wrap the USB Drive in
Plumber's Tape
4 Step 4: Select a Dead Tree or Stump
as a Dead Drop Location
5 Step 5: Drill Holes in the Trunk to
Make Room for Your USB Drive
6 Step 6: Apply the Wood Glue and
Insert the USB Drive
7 Step 7: Finished Dead Drop Site
8 Step 8: Stone Dead Drop Location
9 Step 9: Register the Dead Drop
Location on Deaddrops.com
Step 1: Materials
To install a USB drive in a tree, you will need the following materials:
Materials: USB flash drive Plumber's tape Wood Glue
Tools: Cordless Drill Drill bit set Screw driver, or other tool to pry open the flash drive
Step 2: Remove the Housing of the USB Drive
The first step is to open up the housing of the flash drive and remove all the unnecessary plastic. You can usually pry open the housing with a small screw driver or knife. Another option is to just squeeze the housing with a pair of pliers at the seem. Continue removing parts until only the USB connector and the circuit board remain.
Step 3: Wrap the USB Drive in Plumber's Tape
Applying a layer of plumber's tape around the circuit board of the drive helps to keep it a little more protect. Don't go overboard, one or two layers is plenty.
Step 4: Select a Dead Tree or Stump as a Dead Drop Location
Select a dead tree to locate your deaddrop. I do not recommend using a healthy tree for this project. In addition to the damage caused by drilling, the cavity that you create also provides a potential site for mold, rot and insect to take up residence. Because of this, I recommend using a tree that is obviously dead, fallen over, or just a stump.
Step 5: Drill Holes in the Trunk to Make Room for Your USB Drive
The USB connector and board of a typical USB drive is about 0.51inch (13mm) wide x 0.20inch (5mm) thick. There are a number of ways that you can drill out a slot to accommodate for it. The simplest and fastest method is to drill a single hole that is large enough to fit the whole drive inside of it. A 1/2" drill bit will usually suffice for this.
If you want to make a smaller imprint on the surface and make the end product look a little cleaner, you can drill a series of smaller holes in a line to make a slot. Each hole should be the same thickness as the USB drive (about 1/4 inch). Then you can finish the shaping with a knife or file.
Be sure to drill your hole is a part of the tree that is solid and free from rot.
Plumbers tape
Tar is far superior.
31) Do not tolerate oppressive (sexist, racist, homophobic etc.) dynamics within the movement. Confront their expression and put a stop to it.
kek
STASI Boys for sure in the thread. Completely bullshit methods of explosive creation given. True terror not revealed. Use Tor and you can still be TORPEDOED.
Step 6: Apply the Wood Glue and Insert the USB Drive
Clear the saw dust and wood shavings from the hole by blowing on it. Then fill the hole most of the way with wood glue. Slowly insert the USB drive into the hole until the back edge of the metal on the connector port is even with the surface of the tree. Some of the glue will squeeze out around the edges. Wipe off the excess using some nearby leaves.
Once the glue dries, you have a USB deaddrop site out in nature. If you wish to prolong the life of the drive, you can put a cap on it to at least partially protect it from the weather.
Step 7: Finished Dead Drop Site
The last step is to upload the instruction text files and any other files that you want to share. You can find the readme file here: http://deaddrops.com/download/readme.txt. You can find the dead drop manifesto here: http://deaddrops.com/download/deaddrops-manifesto.txt.
I also decided to also load a copy of "The Giving Tree" by Shel Silverstein onto the flash drive (Yes, I got the idea from this xkcd comic by Randall Munroe).
To document the dead drop location, it helps if you take three pictures of the location (up close medium and far away). This makes it easier for others to find your dead drop.
Step 8: Stone Dead Drop Location
You don't need to limit yourself to just trees. You can also setup a dead drop in stone. The process for this variation is identical to the original procedure that is used for brick and mortar locations. Just find a relatively soft rock, drill the hole with a mortar drill bit and use concrete patch or fast drying cement instead of glue to fill the hole.
Step 9: Register the Dead Drop Location on Deaddrops.com
When you get back home, you can register the dead drop location here: http://deaddrops.com/dead-drops/db-map/.. This helps others to find it. Then check on the dead drop periodically to see if it is still working and if it is being used. As with all files of unknown origin, always be careful to avoid viruses.
http://www.instructables.com/id/Create-a-USB-Dead-Drop-in-Nature/
[–] 16203751? ago
Next up ITT: How to create secret meetings and multiple revolutionary guides
If you like the content, add memes and save the info as an OC graphic.