Comes the revolution Things to consider before it arrives... The way things are going here in December of 2010, what wit...
6 downloads
620 Views
130KB Size
Report
This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!
Report copyright / DMCA form
Comes the revolution Things to consider before it arrives... The way things are going here in December of 2010, what with ever-expanding government, constantly growing “law enforcement” powers, an incompetent (and corrupt, and wasteful) Congress, and anything-goes Judiciary, it hopefully isn't going to be long before the people of the United States are ready and willing to stage a second American Revolution. With luck, such a revolt can be accomplished via the ballot box; it may prove necessary, however, to bring it about through an ammo box. While there is plenty of information readily available on the Internet, most of it is of the “how to build your own AC-130 gunship” variety; there's virtually nothing on any other aspect of staging an insurrection. With that in mind, the author of this document wishes to take note of a few things with the goal of getting others to consider their own situations and needs so that they will be more thoroughly prepared. Most of what will be brought up here will likely seem pretty obvious – but the reader shouldn't let that stop him or her from reading it anyway: all of us have had the experience of having to be reminded of something simple and obvious that we already “knew”. Besides, it just might happen that there will be something that gets you thinking about things in a different way, or you'll read something that suggests a solution to an already existing problem.
Communications One of the things that those in power will want to do is establish some kind of watch or monitor on what people are talking about – particularly those that they already know are in opposition to them. Such monitoring will likely be done quietly, and expanded as time and resources permit. Thanks to the Digital Telephony Act (a.k.a. Communications Assistance for Law Enforcement Act (CALEA) of 1994), tapping phones is about as simple as it can be. All that's necessary, really, is for the FBI, ATF, DEA, local law enforcement, or just about anyone else in a position of authority to get permission; as readily as the FBI has gotten (or claimed to have) National Security Letters [http://www.uscourts.gov/wiretap09/contents.html], you can be reasonably certain that a nervous or outright scared government will show little restraint about violating the rights of the ordinary citizen. This means, of course, that nobody should count on their email, phone conversations, faxes, or any other type of electronic communication as being private or secure; if anything, people should use such methods with the expectation that they'll be reviewed by someone in government. To get around this, the modern insurrectionist should establish alternative means of communicating with others outside his or her immediate circle. Whether that is to establish a simple cipher where certain specific phrases (“Aunt Tillie's tuna casserole was to DIE for!”) have alternative meanings (“We've suffered 25% personnel losses”), carrier pigeons hauling SD memory cards, or posting “innocent” photos (that have messages buried in them using steganography [http://en.wikipedia.org/wiki/Steganography and http://www.garykessler.net/library/steganography.html]) to a hobby site, NOW is the time to figure out how to exchange information with others and start practicing with it so that you can work out any bugs (and make sure it really works). Related to, but separate from, communications is the matter of information security (InfoSec). Simply put, if you aren't using some kind of cryptography [http://en.wikipedia.org/wiki/Cryptography and http://www.garykessler.net/library/crypto.html] (with some damn strong software such as GPG [http://www.gnupg.org/]!) to handle the information related to your activities, you're an idiot. That SD card sent by carrier pigeon? It should be one big-ass encrypted file. The message hidden in those pictures from your last fishing trip that you put on Picassa? Yup – encrypted, so there's nothing obviously interesting to anyone that looks. Codes and ciphers and all that may sound pretty sophisticated and high-tech – and it is, which is why it's so good. It's also something of a pain in the butt to have to do for each and every message, file, note, and everything else dealing with whatever you're involved in. But it's a lot better than the alternatives. Another aspect of InfoSec (as it applies to computers) is what operating system the computer uses. By far, the vast majority of Federal agencies and law enforcement organizations use Microsoft Windows® – which is all the reason you should need to consider using something else under the simple principle that anything you can do that's different or unfamiliar to them will slow them down (if not stop them outright). There are several alternatives to Windows®; the leading examples would probably be an Apple product or the Linux operating system [http://en.wikipedia.org/wiki/Linux and http://www.linux.org/]. Whatever else you may have heard about Linux (if anything), it is and can be as easy to use as anything from Microsoft – with the advantages of being FREE (as in no cost), more efficient (works better on older computers), more stable (doesn't crash), immune to viruses, and has enough free software available to satisfy almost anyone's needs. For the computer-savvy, the author would suggest Fedora [http://fedoraproject.org/] or SuSE [http://www.opensuse.org/en/]; for the beginner, Ubuntu [http://www.ubuntu.com/] might be a better choice. All three of the choices suggested offer a “live” disk that will let you take Linux for a test drive WITHOUT doing anything to whatever is already on any computer(s) you might have. In any case, using the KDE desktop is recommended, as it
more closely resembles the Windows® that most are familiar with. Another subject of concern regarding communications is what's known as “traffic analysis” [http://en.wikipedia.org/wiki/Traffic_analysis]: simply keeping track of who talks to who, and when, even if WHAT is being talked about isn't known. In pre-WWII Germany, the Nazis used lists of who called who on the telephone to help identify suspected “undesirables” under the reasonable expectation that Jews or Gypsies or Communists or whoever would probably be talking with other people of that group. Next time you get a phone bill, have a look at how the long-distance phone numbers you've talked with are so nicely organized... which brings us back to the alternate communication channel(s), and why you should establish and start using them ASAP: once you're comfortable that they're working, you can publicly separate yourself from others that share your goals while privately staying in touch with them. It's worth noting that most of Europe has outlawed that kind of detailed calltracking precisely BECAUSE it can so easily be abused. Something else to consider is the wide array of technology that can be brought to bear by those in power. The author is a military-trained electronics and computer type with over 35 years experience in those fields, and maintains a well above-average knowledge of the various information and data collecting capabilities the government employs. Anyone known or suspected by the government to be a “subversive” should expect to have an array of technologies deployed against them: everything from TEMPEST [http://en.wikipedia.org/wiki/TEMPEST] to passive monitoring to active espionage to satellite surveillance. While the author must decline to reveal any actual secrets, the kinds of things created by Hollywood in such movies as “Enemy of the State” aren't all that much better than what is actually in use. This doesn't mean that you can't fool the authorities, only that you must take MUCH more care to make it happen.
Strategy and Planning Different people reading this document may find themselves provoked into wanting to take action at different times, and for varying reasons. Don't. Although there will be times and temptations when the reader will simply want to go out and kill someone or something to try and send a message, that is something that should be reserved for later – when more of the average citizens are ready to recognize the action for what it is, and support it. All of the guerrilla and insurgency documents repeatedly emphasize that an uprising is only possible when a majority of the population is against those oppressing them – and that a guerrilla band can only operate with the at least TACIT (if not active) support and approval of the populace. So while it may make someone feel warm and fuzzy inside to blow up an ATF office when a law requiring all firearms to be registered is passed, it would actually be counterproductive in most cases: there simply wouldn't be that many people that saw the connection, or agreed with the appropriateness of even trying to “fight” the government. Instead, it would be better if individuals and groups used this lead-up time to do the hardest thing of all – think: • What is the position on regular “civilian” law enforcement (such as city cops, etc)? Should or shouldn't they be considered as legitimate targets or allies? Under what conditions? • How should the military be dealt with? What about individuals? Bases? Supplies? • How to deal with informants (and there will be some)? Execution? Banishment? Isolation? • Organizational structure – to operate with a strict chain of command, or more democratically? What rules and policies and procedures to use? • Contact(s) with other groups or individuals – who, under what conditions, and for what purpose(s)? • What resources do you have, and which ones can you develop, for such things as false ID, weapons, supplies, transportation, communication, food, jobs, etc? • Who plans what operations to take on? What size and types of activities can you or your group get involved with? • What materials and services do you have, and which ones will you need? Where to get them? Are specialty items or service people brought in permanently, or only for as long as needed? • How do you collect what types of information about your opponents, their capabilities and activities? • How do you maintain your OWN security? How to prevent yourself or your group from being captured or compromised by a rogue individual? How do you recover from it if it DOES happen? • How much of what types of training can you engage in? • How much of your local area can you operate in? How much of what types of assistance can you provide another group or individual? • Start thinking about what kinds of operations and activities you can undertake; what materials and supplies will you need – do you have enough of them, or should you begin stockpiling against future need? Are there alternatives you could use? Remember, peacetime estimations of usage are invariable grossly LOW.
Do you limit your activities to purely physical, or can you engage in psychological operations, too? THE most basic rule of guerrilla warfare is to force the established power structure into over-reacting so as to push them into alienating the general populace. Toward that end, here are a few things the author has thought of that might help get the creative juices flowing for the reader: • In a warm environment, find a way to damage/destroy the air conditioning for an office – particularly if the windows don't open. Conversely, target the heating in a cold area. • If the target is in an office building, contrive to force them to use the stairs. The taller the building, the more annoying this will be. If you can screw up the A/C or heating, too... • Skunk scent (from novelty shops or hunting supply stores) in the building air intake, or any place it can annoy the maximum number of people. • A nice barrage of model rockets (long-range, no parachutes of course) with some kind of payload would be spectacular. Even just having unarmed missiles falling from the sky would freak people out. • Any building is going to have a power feed. Find it, and contrive to destroy it. • If you can identify the power substation(s) that feed your target, find a way to damage or destroy it: shoot the transformers with armor-piercing (steel core) ammo, shoot the supports off the big bus bars, or just Molotov the damn thing. The stuff in a power substation is neither cheap, nor fast/easy to get – you'll have it shut down for days, if not weeks or months. • Destroy the phone/cable/comm lines that feed the building. Also any satellite dishes. • Concentrated battery acid in any circulating fluid system. • Clog any stand-, drainage-, or sewage-pipes (inflated ballons? Aerosol insulation? Bunch of compressed/dry sponges on a chain?) • fly a radio-controlled model airplane loaded with explosives or incendiaries into their building. Won't cause much damage, but sure messes with their heads... • Start outrageous (but believable) rumors that the target will have to address. Find ways to make the denials sound false. (“The IRS is not going to raise the payroll tax.” - Okay, maybe it was FICA...) • Get a peaceful protest going outside an office, under the guise of some false rumor. • Publicly hang various officials in effigy. • Any officials or employees you can identify, crank call them at oh-dark-thirty. Repeatedly. • Bomb threats. • Molotov their motor pool. • If they have an outside sprinkler system feed, monkey-wrench it. • At any open-air event, smoke bombs (even the cheap 4th of July kind) could be a distraction – particularly if someone started yelling “It's poison gas!” • A 'cellphone killer' left stuck to the bottom of a chair in an office would prove annoying. • While being “served” in a government office, accidentally releasing a small shot from a personal mace/teargas/pepper sprayer would get everyone coughing without forcing them out of the office. • Suspicious packages full of toilet paper or marshmallows. Toss in a few other goodies for the bomb disposal robot to “see”. • A package that suddenly starts (loudly!) announcing “I am a thirty second bomb! I am a twentynine second bomb! (continues countdown)” and finishes by announcing “Oops! I lied!” • Phone local news media with a warning that “someone” (don't specify who) from a particular office is going to die on a specific day or has been targeted for elimination. Identify yourself as the spokesperson for the Popular Front for the Liberation of (your town), or something equally •
•
• •
• •
•
•
•
•
ridiculous. There are plenty of examples of annoyance electronic circuits (such as cricket chirps, highpitched whistlers, etc) that run for a few seconds and then shut up (making them hard to find). Be generous. A small, innocuous package that suddenly sprays a mist of red/green/other water into the air in a public area. Check out something like the Arduino ( Arduino – HomePage ); if someone you know has a technical frame of mind, these little goodies are easily adapted to various purposes: ◦ A GPS-guided drone that drops a payload (of ______) before self-destructing. Can be launched from pretty much any distance (closer [couple of miles] is better, but farther [20+] is safer). The drone can easily be fabricated from invisible-to-radar materials (styrofoam, balsa, etc), and won't have enough metal to be picked up otherwise. Painted baby blue on the bottom (making hard to see from underneath) and camouflage on top, good luck with someone spotting it. ◦ Long-time delays (days, weeks, MONTHS), with capability to include a variety of antitamper mechanisms (position via GPS, rotation via digital compass, tilt, switches, light or dark, etc, etc.) ◦ Positional triggering via GPS (“only trigger when within these GPS coordinates (inside this geographic area):”) ◦ Timed/sequential operations: e.g. launch model rockets pointed this way at _____, then some number of minutes later, launch another set a different direction, then a different number of minutes after THAT, launch another set somewhere completely different. ◦ There are plenty of (well-explained) examples of how to do a LOT of different things with the Arduino on the Internet. Basically, if you can sense it, measure it, detect it, or otherwise tell when it changes, chances are that somebody has already figured out how to do it with an Arduino. Contrive to dump gasoline or any flammable/explosive gas or liquid into the street drainage system. http://en.wikipedia.org/wiki/1992_Guadalajara_explosions Those little telephone junction boxes sitting out next to the street make attractive little targets. Thermite, or even a chainsaw, would mess them up pretty bad (newer ones are almost entirely plastic). If you can get into the building utility room (whether by lockpicking or pretending to be a service person of some kind) where their telephone and networking cables are, a cup or tin can full of 5-minute epoxy over any sprinkler heads will keep them from extinguishing your delayed incendiaries. Magnesium wire (the heavier the better) wrapped around phone lines and network cables for a few feet will make them unusable and a genuine nuisance to replace. Magnesium wire is easy to ignite with one of those “miniature blowtorch” lighters. There are plenty of descriptions of how to make thermite to be found. Pressed into sticks, it can be ignited fairly simply (magnesium wire or ribbon), and can easily make an electric motor (Elevator? Pump? Ventilation?) inoperative. Place one on emergency generator fuel supplies for more spectacular results... Model rockets make for a dandy way of getting small payloads from 'here' to 'there'. They can be made so cheaply that entire barrages of the things can be created inexpensively. If on some kind of timer, finding who set it up could be difficult. Conveniently enough, they're available in a variety of sizes; some could carry a couple of POUNDS of payload. Also, the igniters and engines have multiple uses. Radio-control toys are cheap enough to be convenient ways of getting something like an explosive or incendiary charge to a specific spot. Smaller ones would be tough for any security
• • •
•
•
people to spot in, say, a parking lot full of cars. All those infrastructure things you never notice? Take a look at them and see if/how they can be used to provoke someone in government – directly or indirectly. The bigger or more “permanent” something is, the harder it is to damage – but even more so to repair/replace. Smaller items, they're easier, but you just have to go after more of them. If you can get to the coaxial cables to radio antennas, an ordinary straight pin (of the sewing variety) pushed straight in to create a short circuit not only disables the radio (possibly even damaging it), but is nearly impossible to discover if the head of the pin is cut off. Modern video cameras use a type of sensor that is particularly sensitive to infrared; buy/build some infrared lasers, and point them at any camera you want to overload so as to annoy someone (i.e. government parking lots/garages, public area surveillance, etc). Build small radio beacons (VERY cheap and easy to make) and stick them on vehicles from government motor pools – but do it in such a way that they're found. Make THEM paranoid about who's watching/following them!
Unconventional weapons and tactics • •
• • • • • • • • • • •
• • • • • •
•
• • •
Big-ass crossbow that fires rebar “arrows” shotgun load consisting of a couple of small weights connected by steel wire – fired at a helicopter, you stand a chance of the thing getting tangles up in the rotors (and screwing them up, or at least forcing the pilot to land the damn thing) a short (even 3' would work against ordinary vehicles, 6' for armored) section of bridge over a natural or artificial ditch; command-detonate the supports for it command-detonate trees onto a narrow road/path wide-spectrum radio jammers (the more powerful, the better) home-brew flash-bangs home-brew ground flares (play hell with night-vision gear) deploying tear gas, regurgitants, annoyants, pepper spray... anything to impair them when they aren't prepared for it. Incendiaries silent weapons like bows or crossbows punji-stake pits or other assorted boobytraps bright (xenon zillion-candlepower) lights when/where not expected shotgun shell inside a short section of pipe, inside a slightly larger pipe and buried in the ground. When stepped on, the shotgun shell is pressed down onto a short nail that pierces the primer. Mix “dummy” tripwires in with real boobytraps. They'll either get REAL nervous, or careless – either one works to your favor. Mix “cut the wire” with “pull the wire” triggering mechanisms. Keep them on their toes. Use natural or artificial obstacles to channel them to where you can REALLY go to work on them. Think of the vehicles that can be used against you, and think of ways to neutralize them: damaging a helicopter body isn't as effective as taking out the engine or blades. Assault personnel are probably going to be wearing BODY armor that doesn't protect their arms and legs... Make your own flechette rounds with ordinary straight pins in shotgun shells. Not normally lethal, but will penetrate Kevlar “armor” (actually a woven cloth) a whole bunch better than bullets – and still painful as hell. Command-activated defenses mounted well up in trees and pointed at the ground. Tops of assault vehicles are typically the least-armored, and assault personnel generally don't expect to be attacked from above... Loud (!!) annoying-as-hell sirens, noises (screams, tires screeching, anything and everything) that switch on and off at random. Hidden/unknown/unofficial escape routes (i.e. underground connection to storm drain system) Thick oil/grease on windows of ground vehicles works better than paint (not as 'liquid'), so wipers don't work, clouding/blocking their vision
• Anything you can do that they don't expect, whatever you can do to delay them or confuse them or inconvenience them or otherwise screw things up for them is to YOUR advantage. If it's stupid, but it works, it isn't stupid.
Road/Path
When heavy vehicle triggers release mechanism, heavy steel bars/plates rise up to trap axles or other vehicle parts.
SPRING
SPRING
Adjust springs so device only triggers when vehicle over 'normal' weight passes
Shotgun shell boobytrap
Coiled steel Optional cover (cardboard, cigarette wrapper, etc) Wire
Ground level
Inner pipe (slides in outer pipe) Weights (4)
Shotgun shell Outer pipe (fixed in place) nail
Shotgun shell With shot removed
2'+ Steel wire Weights
Helicopter anti-air load