Sie sind auf Seite 1von 98

Dissident Soldier’s Field Manual

Unconventional Warfare and Conflict in the Modern Times as


well as the Future World

First Edition

March 2018

First part written by The Punisher2018

Other parts taken from various sources

Assembled and updated regularly by The Punisher 2018

1
2
Intro 5

Part One: 6

The Essays on War by The Punisher 2018 6

The Technological Soldier 7

The Deep Web/Dark Web 7

Collateral Damage 8

Psychological Warfare 8

Interregation Techniques 9

Torture 10

Close Quarter Combat 11

Part Two: 13

Selected Works Various Sources 13

Traditional Army Hand Signals 14

Urban Operations 16

Room and Hallway Clearing 18

Interrogation 19

Select Works of Mao Tse-Tung 20

Guerilla Tactics as Taught 21

REGULAR HIDING PLACES AND PRECAUTIONS TO BE TAKEN WHEN WE HALT


25

TRAINING 28

Guerilla Tactics by Che Guevara 31

The Zapatista Mexican Rebellion, its Revolutionary Objectives and Tactics 46

Techniques of the Mexican Cartel 49

Getting on the Deep Web Internet Article 53

7 Kinds of Hackers 55

ISIS Torture Techniques 56

The Hacker Toolbox 59

Hacker Terms 60

US Army Forges Ahead in Their Commitment to 3D Printing 66

Putin says the nation that leads in AI ‘will be the ruler of the world’ 69

NSA Surveillance Program 70

3
AR15 Parts 73

Part Three 74

Homemade Explosives 74

Plastic Explosive Filler 75

Improvised Black Powder 75

Fertilizer Explosive 76

Pipe Hand Grenade 77

Nail Grenade 78

Mortar Scrap Mine 79

Electric Bulb Initiator 80

Delay Igniter from Cigarette 81

Watch Delay Timer 81

Mercury Fulminate 82

Lead Azide 83

DDNP 83

Be Invisible to Police 85

Appendix 87

2018 List of Secure Emails 88

Security Points for Beginner Deep Web Users 89

2018 Deep Web Links 90

Police Scanner Codes 92

Basic Rights of US Citizens When Stopped by Police 95

4
Intro
Dissident, rebels, freedom fighters, Hacktivist or terrorist; the title changes depending on who
one speaks with. I, like any soldier, have my set of values, does, ethics, politics and so on but
we’re not here to discuss my beliefs. This manual is not intended to promote any single
agenda, it's a manual for the street level soldier of any movement. It's the training, tools and
understanding of the dynamics of unconventional warfare today and tomorrow. 

Many will criticize me for not publicly endorsing a movement, many will try to say that I’m a
nihilist without a true agenda. This is not true, but it also is more true than I’d like to admit.
There needs to be counter pressure at all time regardless of what is in power because there are
two enemies of the people and these are the state and corporations. Attacking the state is a
more conservative approach, fighting for individual freedom yet attacking the corporations is
liberal as it puts the many of the individual and fights social injustices. Regardless we need
people on both sides always adding pressure because in their absence tyranny and fascism
(conservative or liberal) will rise. So although I promote one agenda but I also promote the art
of eternal conflict. Further more I am and always have been a soldier, war is in my veins and if I
am being honest with myself, I will fight regardless. If you think this notion is insane, I want you
to think about the countless US service men and women who’ve served during a time of war
even though they didn’t agree with the conflict. While in the service I’ve met many who were
there not for patriotism, money or politics but to feed the warrior within. 

In ancient times men and women have had the urge to battle, many without the faintest idea of
why they are doing it besides an inner compulsion. This is because war is natural for mankind,
it has many positive influences over the world’s population, evolution and advancements. Sure
many have been slapped with a label or cause onto something but many times these things
like “patriotism” is just a justification for their actions in a modernized world of empathy, which
is something that the future will lack (as I will explain later.)


5
Part One:
The Essays on War by The
Punisher 2018


6
What follows are some brief essays by The Punisher2018. This section is basic for now but
there are future plans to expand greatly on many of these topics as well as add new ones in
future editions.

The Technological Soldier


In the past a soldier was a brute and comprised more brawn, drive and brutality than brains.
They were expendable on the field and their worth was measured in blood. Today’s soldier is
more of a jack of all trades with a main skill that contributes to the movement. All soldiers
today must balance brain and brawn. The hacker is the token of the street level soldier that has
redistributed the power into our favor.

Today everything is on the internet, from the distribution of utilities, to medical treatment and
military craft. A well skilled hacker can shut down a more traditional army by attacking
satellites, comms, orders and disable or start any missle system up to and including nuclear
arms. This hacker soldier can do all this from the comfort of their own bedroom and it is this
Overwatch that paves the way for the street infantry movement.

Imaginer the devastation one could do by looping a feed of the perimeter from the previous
day in the enemies tracking systems all the while using hijacked satellite feeds to move around
units for attack. Imagine hijacking comms and moving entire squads into designated killzones. 

The Deep Web/Dark Web


The deep web is the internet that is not indexed and known for their anonymity. With the proper
knowledge an entire movement can exist outside the reach of any infiltrators and communicate
anonymously with extreme encryption and IP blocking. The deep web is a haven of crime
where drugs and all kinds of illegal activity takes place but it is where dissidence thrives. The
Arab Spring movement was all coordinated undetected by the governments in the middle east
during 2010 thanks to the deep web.

The deep web grew with help from the U.S. military, which sought a way to communicate with
intelligence assets and Americans stationed abroad without being detected. Paul Syverson,
David Goldschlag and Michael Reed, mathematicians at the Naval Research Laboratory,
worked on the concept of “onion routing” in 1995. Their research soon developed into The
Onion Router project, better known as Tor, in 1997. They had no clue how powerful this
network would be for the future dissident soldier.

Today entire missions can be carried out all over the country with no central physical building
to alert the authorities, furthermore this network is anonymous and cannot be breached. If one
doubts this just read the story of the Silk Road drug operation that was only crushed because
of a stupid mistake.

This brings me to my next topic, network security. This cannot be an expendable part of any
modern movement, it takes a simple coding era like in Silk Road to bring the whole thing
down. With that stated its vital to use experts in cyber security that are constantly being used
and rotated. Security protocols should be conducted in a revolving and evolving method.
Domains should be on .onion and accessed by TOR browsers with a good IP blocker. All
websites and forums should be rotated to new domains monthly, and all passwords changed
weekly. This should only be communicated by deep web email services that are untraceable

7
and build with a self deleting mechanism set for twenty-four hours. Nothing should be kept on
a computer, all Intel needs to be stored on an external and deeply encrypted drive.  

If the clear net (surface net) is used, especially for mainstream social media, protocols need to
be in place and more delicate information should either be coded or omitted completely. All
social networking conducted needs to be conducted by a “clean computer” that is never
attached to any sensitive Intel. An IP blocker should be used and all user names false, every
month changing to prevent any kind of tracking. Social media is important in providing
the uneducated on the movement, providing real material of intent, mission and a place to feed
propaganda on the opposition. These social media sites should be regulated by set people
who have no further operation within the movement to give a lone wolf appearance. Any
connection can bring an entire movement down and must be avoided. Only in extreme
situations can these clear net soldiers be used and once used they no longer can return to their
clear net position.

 The flow of information is imperative to be run smoothly and without interruption. Total
anonymity is guaranteed as long as the tech is skilled. With this valuable asset the war can be
won. The deep web has made it easier than ever in organizing, planning and deploying
missions and Intel. 

Collateral Damage
This is an unfortunate aspect of war and although we should minimize this we cannot
jeopardize the progress over it. The opposition will use the casualties in their slander campaign
to paint your organization as a terrorist group and it is the job of spokespersons to address
these incidents. Always own up to the mistake, express regret but explain the lack of options,
trying to divert blame to the opposition but being careful not to oversell it.

Psychological Warfare
Make the enemy fear you and victory is around the corner. This can be accomplished through a
history of brutality such as hanging the skinned corpses of the enemy in public spaces, videos
of torture and executions (explained more in depth later) and even using various psychotropic
drugs.

Amphetamines are a well-tested drug known for focus, drive, energy and therefore they provide
an advantage in stimulant induced combat readiness. One must be careful because too much
of the drug can cause psychosis and cause one to be more prone to making mistakes.
Methamphetamine is a more dirty speed that should only be used as a last resort. Due to the
addictive nature of these drugs all soldiers should be properly screened to prevent abuse.

Using psychedelic drugs such as LSD has been practiced by our own government, more
important during the MKULTRA CIA experimentations on mind control. Contaminating a water
supply with large amounts of these substances can be beneficial in giving your group the upper
hand. 

There are other means of psych warfare such as low frequency audio waves which cause
disorientation and physical illness. Staged, fabricated execution films/torture films can be
made to deter soldiers from engaging your group while under the assumption that the videos
are authentic.

8
Interregation Techniques
1. Abdominal Slap— The purpose was to cause the detainee to feel fear and despair, to
punish certain behavior and humiliate or insult the detainee, according to a description in
government documents, obtained by the American Civil Liberties Union in 2009. The
interrogator stands about a foot from the detainee's stomach, and slaps the detainee with the
back of his hand. The interrogator's hand is held with the fingers together and straight and
slaps the detainee's abdomen. The CIA was using this technique prior to 2004 without
approval by the Justice Department.

2. Attention Grasp— The interrogator grabs the detainee by the collar, with two hands, and
pulls him closer in, according to a description of the technique by former CIA acting general
counsel John Rizzo. Rizzo described this technique being used on Al Qaeda operative Abu
Zubaydah in his recent book, "Company Man."

3. Cramped Confinement— The interrogator would put the detainee in a box, sometimes big
enough to stand in, for up to 18 hours, or one only big enough to curl up in for up to two hours,
Rizzo said in his book. The interrogator had the option to put a "harmless" insect inside the
small box when the technique was used on Zubaydah, because he hated bugs, Rizzo said.

4. Dietary Manipulation— This technique involved switching from solid foods to liquid. For
instance, in August 2002, Zubaydah was put on a liquid diet that consisted of Ensure and
water, the Senate report said.

5. The Facial Hold— The interrogator holds the detainee's head so it can't move and puts one
hand on each side of the detainee's face, keeping fingertips away from the detainee's eyes,
Rizzo explained in his book.

6. The Facial Slap/Insult Slap— The interrogator slaps the detainee in the face, with fingers
spread, striking between the chin and earlobe, Rizzo explained in his book. The idea, Rizzo
said, was to startle or humiliate the detainee, Zubaydah, and "disabuse him of the notion that
he wouldn't be physically hit."

7. Nudity— This technique was used with others. For instance, a detainee would be forced to
stand for prolonged periods while nude.

8. Stress Positions— The purpose of these techniques are to stimulate mild discomfort from
extended muscle use, according to a description in a government document obtained by the
ACLU. Two such positions, used on Zubaydah, were to have him sit on the floor with his legs
stretched out in front of him and his arms above his head, or kneeling on the floor while leaning
back at a 45-degree angle, Rizzo said in his book.

9. Sleep Deprivation— Detainees were kept awake for up to 180 hours, often standing or in a
stress position, the Senate report said. Sometimes, the detainees' hands would be shackled
above their heads. At least five detainees had "disturbing hallucinations" during this technique,
and in two of those cases, the CIA continued the practice. One detainee, Arsala Khan,
hallucinated after 56 hours of standing sleep deprivation in October 2003. After this, the CIA
came to the conclusion that he "does not appear to be the subject involved in ... current plans
or activities against US personnel or facilities." After about a month of detention and
interrogation, the CIA recommended he be released to his village, but interrogators instead
transferred him to the US military, where he remained in custody for four years.

10. Wall Standing— A detainee faces a wall, standing about four feet away. The interrogator
has the detainee reach out his arms toward the wall so that his fingers are touching it. The
detainee would have to hold that position indefinitely, according to a description by Rizzo
about this technique used on Zubaydah.

9
11. Walling— Interrogators slam detainees against a wall. In one instance, Zubaydah was
slammed against a concrete wall, the Senate report said. On March 22, 2003, Al Qaeda leader
Khalid Sheikh Mohammed underwent "intense" questioning and walling. Giving up no new
information, interrogators water-boarded him. After an hour of that, he said he was "ready to
talk," the CIA said.

12. Waterboarding— The detainee is strapped to a board or bench, and water is poured over
the detainees face to simulate drowning. According to the Senate report, the technique
brought on convulsions and vomiting, immediate fluid intake, and involuntary leg, chest, and
arm spasms. Abu Zubaydah became "completely unresponsive, with bubbles rising through his
open, full mouth." Zubaydah was described as "hysterical" after these sessions and
"distressed to a level that he was unable to effectively communicate." At one point, Khalid
Sheik Mohammad was water-boarded 65 times between the afternoon of March 12, 2003, and
the morning of March 13.

13. Water Dousing— Naked detainees were held down on a tarp on the floor, according to the
Senate report. The tarp would be pulled up around them to make a bathtub. Cold or
refrigerated water would be poured on them. In some cases, detainees were hosed down over
and over again as they were naked and shackled, standing in a sleep deprivation pose.

Torture
Certain people can handle being a torturer while many cannot. Only the most brutal should be
selected in these interrigations and they must be rotated in and out periodically. The art of
torture is delicate and if conducted wrong, it can lead to a subject giving wrong information to
stop the pain because when applying too much pain the Intel becomes unreliable.

It's best to start off moderate quickly, then a long period of psychological torture which
includes manipulation and false senses of empathy. The suspect should then be examined
medically and their condition discussed with the Overwatch to decide the next course of
action. 

The CIA had experimented on a truth serum that involved injecting barbiturates into the left arm
of the suspect. When they are about to pass out they then would inject amphetamines into the
other arm. This would cause a state where the subject was not in control of their responses
and therefore less likely to lie or hide the Intel you seek. This had been proven to be effective
during the MKULTRA program.

Torture can be divided into four categories; low intensity, moderate intensity, high intensity and
extreme intensity.

Low Intensity Torture:

-yelling at the subject, calling them names and threatening them with death. Telling them that
nobody is coming for them.

-show fabricated footage of a subject next store going through extreme torture. Explain that
this person didn’t give up their intel and eventually it led to their death.

-Reassure them constantly that their is no way out of this unless they give up the intel. Assure
that they will be released after in an undisclosed location.

-Play low-frequency audio waves or music engineered to cause feelings of dread or


hopelessness. Play audio of people screaming apparently from another room.

-punches and kicks should be done to hurt but not knock the subject out and limit direct hits to
the face in repetition, allowing periods where they can recover and think.

10
- Place a bag over the subject’s head or place them in a confined area like a manmade coffin.
Kick the box, yell, pour liquids on the subject and play disorienting audio.

Moderate Intensity Torture:

-Breaking fingers, limbs and using a nail gun on non-vital parts of the body

-kicking the genetalia

-small incisions on the body that is sprinkled with salt

-Waterboarding

-Setting small, short lived fires on the subjects limbs

-breaking knee caps

-putting out cigarettes on the skin of the subject

-running razor blades across the subject’s face

High Intensity Torture:

-shooting kneecaps

-stabbing knives into limbs

-Cutting off ears

-putting out cigarettes in ONE eye of the subject

-blood letting to make them weak

-removing finger nails with plyers

-removing teeth with plyers

Extreme Intensity Torture:

(Only used as last resort. Usually the subject won’t survive and more imortantly they may give
false information just to stop the pain.)

-blow torch on the body, stating with extremities and them moving to genitalia and face

-stab or shoot in the gut

-castration with bolt cutters

-injecting chemicals that cause a burning sensation

-placing painful objects into bodily orifices including anus and urethra

-dumping boiling oil onto the body or a metal reduced to a liquid state

-cut out an eye with a corkscrew

-remove genetalia and place it within view and leave the room for a while. Cortorize all wounds
to prevent bleeding out.

-Place a hungry rodent on their abdomen and place a metal bucket over it. Use a blow torch to
heat up the bucket and force the rodent to dig.

Of course this is just a small list of examples and it is limited only to the imagination of those
sadistic enough to create them. Have medical attention onboard as a psychological tool to give
hope as well as a means to prevent the subject going into shock or dying prematurely.

Close Quarter Combat


During the Second Gulf War of the 2000’s America had to retrain their army to fight the
unconventional soldier. In 2013 I was told be a high ranking member of the military that the
focus was shifting back to force on force training, traditional army combat. I theorize this is to
prepare for the escalating modern cold war with Russia, China or the unstable North Korea.
Regardless of the reason it's important to understand that the military is being taught two very
different methods of combat and therefore can never master any. Unconventional and
conventional warfare are so different and their mastery requires endless devotion and
development. As a street soldier we need only focus on the guerilla tactics, we lack the size
and need to learn conventional warfare except in defense. This gives us an enormous
advantage over the opposition.

11
Here are some basics

The Fatal Funnel

Unless the plan is to breach a wall, the likely place of entry into a potentially hostile room is
through the door. The door is referred to as the “fatal funnel.” Anyone expecting an armed
intrusion will be focusing attention and firepower towards the place of entry. Getting into and
out of the fatal funnel is essential to success so if someone in front of you trips, walk over
them.

Two or More Shooters

Room clearing should always be done by at least two shooters. Because there are so many
unknowns and way too many dangerous angles to be cleared immediately by one person, two
shooters are needed, at a minimum. It’s been said that “Two is one, and one is none.” With at
least two shooters, you can maintain 360-degree coverage. And remember team trust is
absolute so practice, practice and practice, together.

Going Left or Right?

If there’s time for a plan and rehearsal hours prior to the execution phase, do it; but remember
to be flexible. Once inside, things have a tendency to change based on new information and
real or perceived threats. Instead of planning on who goes left or right (criss-cross or button-
hook) once inside the door, follow this simple rule of thumb: go the opposite way that the
person in front of you went. In a hasty entry, you’ll never have time to plan anyway. Again, go
the opposite way through the door that the person in front of you went.

Fields of Fire

Get through the fatal funnel, then clear the near corner. You have to be close on the heels of
the guy/gal in front of you or you won’t be able to protect his/her backside as soon as they’re
in the building. The key here is to maintain personal responsibility for your area and sectors of
fire—the field of vision you can feasibly shoot at accurately.  Accordingly, wherever your muzzle
goes, that’s where your eyes should be. Think eyes, muzzle, target.

In CQB, speed matters. Get through the door, clear the near corner (or “dig” the corner by
walking close to it), walk the walls, and look for the next threat. The greatest threat may be a
person, but it’s also any uncleared areas.

Speed kills (bad guys)

Finally, as you’re “running” the walls, it’s really walking. If you have to shoot on the move, only
move as fast as you can shoot accurately. Don’t be in such a hurry that you’re out of control.
You’re there to control the situation. Be smooth. Here’s an old tactical saying to put in your
toolbox: “Smooth is fast and fast is smooth.”

Remember, don’t shoot fast, discern fast and then shoot quickly and accurately if you are
justified.  Keep shooting until the threat stops.

12
Part Two:
Selected Works Various Sources


13
Traditional Army Hand Signals

14
15
Urban Operations

16

17
Room and Hallway Clearing

18
Interrogation

19
Select Works of Mao Tse-Tung

20
Guerilla Tactics as Taught

1. PRECAUTIONS WHEN ON THE MARCH.

When we are on the march, we must send plainclothes units armed with pistols ahead of our
vanguard, behind our rear guard, and to the side of our lateral defenses, in order to spy out the
situation and to forestall unexpected attacks by the enemy, or superfluous clashes.

2. PRECAUTIONS DURING HALTS.

When we encamp, if there is a presumption that the enemy may be near, we should send every
day a guerrilla company—or at least a platoon—toward the enemy's defenses to carry out
reconnaissance at a distance (from 20 to 30 li ) or to join up with the local forces and carry out
propaganda among the masses, in order to inspire them to resist the enemy. If this unit
discovers the enemy, it should, on the one hand, resist him and, on the other hand, report to us
so that we can prepare to meet the foe or to retreat without being drawn into an unnecessary
battle. 

3. WE MUST NOT ATTACK STRONG POSITIONS.

If the enemy guards his position firmly or defends a strong strategic point, then, unless we
have special guarantees of success. we must not attack him. If we attack him, we will waste
considerable time, and our losses in killed and wounded will certainly be many times those of
the enemy. Moreover, in guerrilla warfare, our artillery is not strong: if we recklessly attack a
strong position, it will be very difficult to take it rapidly, at one stroke, and, meanwhile, it will be
easy for the enemy to gather his forces from all sides and surround us. On this point, the army
and the people must be absolutely firm of purpose and cannot act recklessly in a disorderly
fashion because of a moment's anger.

4. DO NOT FIGHT HARD BATTLES.

If we do not have a 100 per cent guarantee of victory, we should not fight a battle, for it is not
worth while to kill 1,000 of the enemy and lose 800 killed among ourselves. Especially in
guerrilla warfare such as we are waging, it is difficult to replace men, horses, and ammunition;
if we fight a battle and lose many men, and horses, and much ammunition, this must be
considered a defeat for us.

5. WE MUST NOT FIGHT IF THE SITUATION OF THE ENEMY IS NOT CLEAR.

When we are encamped in a certain place and suddenly discover the enemy but are not
informed regarding his numbers or where he is coming from, we must absolutely not fight, but
must resolutely retreat several tens of li. It is only if we are right up against the enemy that we
should send covering units, for, if the enemy comes to attack us, it is certainly because his
forces are superior or he has a plan, and we must under no circumstances fall into his trap. If
the enemy is in force, it is obviously advantageous to retreat. If his numbers are small and we
retreat, nothing more than a little extra fatigue is involved, and there will always be time to
return and attack him again later. 

6. WE MUST ORGANIZE THE MASSES AND UNITE WITH THEM.

Modern warfare is not a matter in which armies alone can determine victory or defeat.
Especially in guerrilla combat, we must rely on the force of the popular masses, for it is only
thus that we can have a guarantee of success. The support of the masses offers us great
advantages as regards transport, assistance to wounded, intelligence, disruption of the
enemy's position, etc. At the same time, the enemy can be put into an isolated position, thus
further increasing our advantages. If, by misfortune, we are defeated, it will also be possible to

21
escape or to find concealment. Consequently, we must not lightly give battle in places where
the masses are not organized and linked to us.

7. USING THE MASSES TO MAKE A SURPRISE ATTACK AND BREAK A BLOCKADE.

When the enemy surrounds us and blockades us, we should rouse the popular masses and cut
the enemy's communications in all directions, so that he does not know that our army is
already near him. Then, we should take advantage of a dark night or of the light of dawn to
attack and disperse him.

8. SURPRISE ATTACKS ON ISOLATED UNITS.

When we have reconnoitered the enemy's position and have kept our men at a distance of
several li and when he has unquestionably relaxed his precautions, then we advance rapidly
with light equipment, before dawn when the enemy does not expect us, and exterminate him.

9. USING THE POPULAR MASSES TO HARRY THE ENEMY.

On the basis of a decision by the main force of the army, in time of battle, we send out part of
our forces, divided into several units—the smallest element being a platoon—to lead the local
militia, police, volunteer army, or other popular masses of the peasantry and the workers.
These groups use a great variety of flags, occupy mountaintops or villages and market towns,
use brass gongs, spears, rudimentary cannon, swords and spikes, trumpets, etc. They scatter
all over the landscape and yell, thus distracting the enemy's eyes and ears. Or, both night and
day, on all sides, they shoot off isolated shots to cause panic among the enemy soldiers and
fatigue their spirit. Then, afterward, our army appears in full strength when the enemy does not
expect it and disperses him by a flank attack. 

10. CIRCLING AROUND TO GET AWAY FROM THE ENEMY.

When we are faced with a large enemy force and do not have sufficient strength to meet its
attack, we use the method of circling around. We hasten to a place where there are no enemy
troops, and we use mountain trails so that the enemy cannot catch up with us. At the same
time, along the way, we utilize the popular masses, getting them to carry on reconnaissance
work in the front and the rear, so that we are not attacked, by the enemy from either direction.

11. GETTING OUT OF DIFFICULT SITUATIONS.

Presume that in the rear there is a pursuing army and in the front an obstacle, or that the
pursuing army is too strong for us. As a plan to get out of such a difficult situation, we can
send a part of our forces 4 or 5 li off, to lure the enemy up a big road, while our main force
follows a side road and escapes the enemy. Or we can make a detour around to the enemy's
rear and attack him there by surprise. Or we can use the local militia and the police to go along
another route, leaving some objects, making footprints in the road, sticking up notices etc., so
as to induce the enemy to follow them. Then, our main force suddenly rushes out from a side
road, striking at the enemy from the front and the rear, encircles him on all sides, and
annihilates him.

12. "CAUSE AN UPROAR IN THE EAST, STRIKE IN THE WEST."

When the army wants to attack a certain place, it does not advance there directly but makes a
detour by some other place and then changes its course in the midst of its march, in order to
attack and disperse the enemy. "The thunderclap leaves no time to cover one's ears." 

13. CONCEALED ATTACKS FROM AMBUSH.

When the enemy is pursuing us in great haste we select a spot for an ambush and wait until he
arrives. Thus, we can capture the enemy all at one stroke.

14. AMBUSHING THE ENEMY IN THE COURSE OF HIS MARCH.

22
When we learn from reconnaissance that the enemy plans to advance from a certain point, we
choose a spot where his path is narrow and passes through confusing mountainous terrain and
send a part of our troops—or a group of sharpshooters— to lie hidden on the mountains
bordering his path, or in the forest, to wait until his main force is passing through. Then we
throw rocks down on his men from the mountains and rake them with bullets, or shoot from
ambush at their commanding officers mounted on horseback.

15. MAKING A STRONG DEFENSE BY EMPTYING THE COUNTRYSIDE.

When our spies have informed us that the enemy is about to arrive, and if our force is not
sufficient to give battle, we should then carry out the stratagem of "making a strong defense by
emptying the countryside." We hide the food, stores, fuel, grain, pots and other utensils, etc., in
order to cut off the enemy's food supply. Moreover, as regards the popular masses of the area
in question, with the exception of old men, women, and children, who are left behind to provide
reconnaissance information, we lead all able-bodied men to hiding places. Thus, the enemy
has no one to serve as porters, guides, and scouts. At the same time, we send a few men to
the enemy's rear communication lines, to cut off his supplies, capture his couriers, and cut or
sabot age his communications facilities.

16. MEETING A SUPERIOR ENEMY.

(1) When the enemy advances, we retreat. If the enemy's forces were weaker than ours, he
would not dare advance and attack us. So, when he advances toward us, we can conclude
that the enemy is certainly coming with superior force and is acting according to plan and with
preparation. It is, therefore, appropriate for us to evade his vanguard, by withdrawing
beforehand. If we meet with the enemy in the course of our march and either do not have clear
information regarding him or know that his army is stronger than ours, we should, without the
slightest hesitation, carry out a precautionary withdrawal.

As to the place to which we should withdraw, it is not appropriate to go long distances the
main roads, so that the enemy follows us to the end. We should move about sinuously in the
nearby area, winding around in circles. If the enemy appears ahead of us, we should circle
around to his rear, if the enemy is on the mountains, we should descend into the valleys; if the
enemy is in the middle, we should retreat on the two sides ; if the enemy in on the left bank of
the river, we should retreat on the right bank ; if the enemy is on the right bank, we should
retreat on the left bank.

Moreover, in withdrawing, when we come to a crossroads, we can deliberately leave some


objects in the branch of the road we do not take or send a small fraction of our men horses
that way, in order to leave some tracks or write symbols. Or we can write some distinguishing
marks on the road we do take to indicate that it is closed. Thus, we induce the enemy to direct
his pursuit and attack in the wrong direction.

At such times, it is best to evacuate the popular masses and such armed forces as the militia,
police, volunteer army, etc., by various routes in all directions, in order to confuse the enemy's
eyes and ears. We can leave behind part of our men, who bury their uniforms and weapons
and disguise themselves as merchants, street vendors, etc. They spread rumors or pretend to
be obliging in order to spy out information regarding the enemy's numbers, his plans, the
location and routine of his camps, and the precautions he is taking. If the enemy questions
them about the direction in which we have withdrawn and the strength of our force, they
should talk incoherently, pointing to the east and saying the west, pointing to the south and
saying the north, replacing big by small and small by big, talking at random and creating
rumors. They wait until our army is about to attack, and then they dig up their uniforms and put
them on, take out their weapons, and attack the enemy from his midst, thus completely routing
him and leaving him with nowhere to turn.

(2) When the enemy retreats, we pursue. When the enemy army retreats, it is appropriate to
take advantage of the situation to advance. On such an occasion, the enemy's military

23
situation must have undergone a change, otherwise he would not have retreated, and he is
certainly not prepared to join battle against us with any resolution. If we take advantage of the
situation and make a covering attack on his rear, the enemy's covering units will certainly not
be resolved to fight, and in the context of the enemy's over-all plan it will be difficult for his
forward units to return and join in the fray. In rough mountainous terrain, where the paths are
narrow and rivers and streams intertwined so that there are many bridges, even if the enemy's
forward forces were to turn back, this move would require much time. So, by the time he turns
back, his rear will already have been annihilated and he will already have been disarmed.

At this time, the organizations of the popular masses, should devise methods for destroying the
bridges on the route over which the enemy is retreating, or cutting the wires of his
communications system. Or, best of all, they should wait until the bulk of the enemy's army
have retreated and, taking advantage of the protection afforded by our guards and army, block
the enemy's path of retreat, so that, although his forces may want to turn back, they cannot do
it, and, although they yearn for help, they cannot obtain it.

But, at such a time, the most important task of the popular masses is to spy out the direction in
which the enemy is withdrawing, in order to ascertain whether or not there may be an ambush
or a feigned retreat intended to encircle us from two sides, and report to us immediately so that
our army can pluck up courage and pursue the enemy or devise a method of evading him.

(3) When the enemy halts, we harass him. When the enemy is newly arrived in our territory, is
not familiar with the terrain, does not understand the local dialect, and is unable to gain any
information from the scouts he send out, it is as though he had entered a distant and
inaccessible land. At such a time, we should increase our harassment—shooting off guns
everywhere, to make him ill at ease day and night, so exercising a great influence on both his
mind and body under such circumstances, I fear that any army, however overbearing, will
begin to waver and will become weary. We need only await the time when his spirits are
wavering and his body weary, and then, if our armies rush in all together, we can certainly
exterminate him completely.

17. DEALING WITH A WEAK ENEMY.

Fighting as we are for the existence of our nation and the achievement of the aims of guerrilla
warfare—which are to destroy the enemy and to stir up the courage of the popular masses—
when we are faced with a weak enemy, naturally we should unite with the popular masses of
the place in question to surround him and exterminate him at one stroke.

18. AROUSING THE MASSES.

There are always a good many among the popular masses who forget the great cause for the
sake of petty advantage. Frequently having received great favors from the enemy, they act
contrary to conscience and aid the forces of evil. For this reason, before the arrival of the
enemy in a given place, we must do our utmost to whip up the spirits of the popular masses, to
rouse their will to resist and to endow them with an unshakable resolve to fight to the end.
without seeking advantage, without compromise or surrender. We must induce them to follow
our orders sincerely and to cooperate with our army to resist the enemy. At the same time, we
should also organize "resist-the-enemy associations", "associations for national salvation", and
other types of professional bodies to facilitate the transmission of orders and the evacuation of
villages in time of necessity and to clean out traitors and prevent their utilization by the enemy.

24
REGULAR HIDING PLACES AND PRECAUTIONS TO
BE TAKEN WHEN WE HALT
1. MARSHALING OUR TROOPS.

The problem is not merely one of resting and marshaling out troops. We require a place that
can also be used for conserving ammunition and food and for receiving and looking after
wounded and sick soldiers. Hence, the place in question commonly serves also as a
supporting point in time of battle. As soon as we are the objects of the enemy's pursuit and
attack, we withdraw there, and secretly hide, so as to await an opportunity to act or to begin
resisting the enemy again.

2. THE CHOICE OF A SPOT.

1. A hiding place where we can rest for a long time may conveniently be found deep in the
forest, in a thatched hut near a marsh, in a cave under the ground or in a mountainside, on a
lonely farm, or in a small and secluded hamlet. Because of the sympathy it enjoys a small
guerrilla unit normally has no difficulty at all in finding a regular hiding place.

2. A guerrilla unit must absolutely maintain the strictest secrecy regarding the hiding places it
has selected. Even one's closest friends and relatives must not be informed if they have no
connection with the guerrilla unit in question. If our original hiding place has been discovered
by the enemy, then, in general, we should not wait for the enemy to come and attack us but
must quickly remove elsewhere.

3. Sometimes such hiding places also serve as storehouses for military equipment, powder,
and provisions, and also for receiving wounded and sick soldiers. More often, a separate secret
location in the vicinity of the hiding place is selected for each type of storehouse because there
are people continually going in and out of a hiding place and it can very easily be discovered
by the enemy.

4. The more individuals there are among the people who support the guerrillas, so that the
guerrilla unit can also maintain a communications network among the people, the easier it is for
the guerrilla unit to find a hiding place. There are times when, in order to evade the enemy's
pursuit and attack, and find a good place to hide, a given guerrilla unit must be split up, each
of its members being obliged to find a way to hide himself in one of the houses of the local
population. In such circumstances, the local population is the only hope of salvation of the
members of the guerrilla unit.

3. THE QUESTION OF PROVISIONS.

In places where the local population is hostile to the guerrillas, there is no alternative to
foraging backed by force, but one should send reliable people from among the detachment, in
order to guard against pillaging.

When the guerrilla unit does not fear discovery, it can send out a special small unit to forage for
food, to collect contributions of food, or to demand food supplies from the local authorities.

4. CHANGING ONE'S HALTING PLACE.

The best method by which a guerrilla unit can maintain its own security is through the agility of
its action. In case of necessity, the unit can make a habit of changing its halting place every
night (if, during the day, it has been in village A, at twilight it moves to village B).

5. OCCUPYING A HALTING PLACE.

25
When a guerrilla unit encamps, the arrangement of its forces should be determined entirely by
the nature of its action, but it should not occupy a large village that its own forces are
insufficient to hold. If a guerrilla unit cannot do otherwise, and finds itself in such a place, it
should occupy only a few collective dwellings situated apart and convenient for defense. The
best thing is to be located in a village where one can keep a lookout in all directions, especially
on the road along which the enemy might come. We must absolutely not disperse the
members of the unit to stay in different houses, acting, for the sake of individual convenience,
in a way of which the enemy could take advantage. In order to keep the enemy from knowing
where we are staying, the best method is to enter the village only late at night. Moreover, we
should look about carefully and all sides of the village and not allow anyone at all to come out.

6. THE DEGREE OF PRECAUTIONS.

In order to avoid excessive fatigue to the members of a guerrilla unit, and to assure them of a
real rest, it is not necessary to send out large numbers of scouts to sound a warning. It suffices
to arrange for military outposts and concealed scouts in all adjoining places and along all roads
( those which the enemy must take, or those related to us ). We should also send out spies to
places from 2 to 4 li away. This distance will be sufficient.

Whether or not the enemy attacks us, we must always fix an assembly point at a distance of
from 10 to 16 li, for use in case of withdrawal. Moreover, the roads leading to the assembly
point should be designated and marked in advance (but there must be at least two roads
giving access to such a place ) .

7. PREPARATIONS.

When a guerrilla unit is staying in a place, all its members, whether they be officers or soldiers,
must at all times take measures to prepare for battle. Especially after twilight, every officer and
soldier must gather together the arms and other equipment he carries with him, and arrange
them in proper order, so that it will be convenient, in case there is an alarm in the dark, for him
to go out quickly and meet the attack.

8. WHEN THERE IS ANXIETY ABOUT A SURPRISE ATTACK BY THE ENEMY.

1. If the guerrilla unit itself is especially alert, if its intelligence network is organized with
exceptional discretion, and if the people of the area are in sympathy with us, so that they
regularly report all movements to us, then it is extremely difficult for the enemy to mount
sudden surprise attacks. But whatever the circumstances may be, we must always exercise
due caution.

2. In order to prevent the enemy relying on a hostile population from coming and making a
surprise attack on us, we must take special precautionary measures. Thus by methods of
intimidation we warn the local population, we arrest and detain people. But at the same time,
the unit must exercise caution and be prepared.

3. If there is an alarm, we should assemble the whole unit in a building that has been prepared
for defense. We should dispatch to this building advance sentries and observers as required.
The entrance to the building should be closed by movable obstacles, and we should establish
in advance signals for the defense. Weapons and other equipment should be properly prepared
and placed within reach of each man.

4. When circumstances are extremely critical, part of a friendly unit should take over
responsibility for the security of our position and the place in which our army is staying, as well
as for sending out spies far and wide to add to the warning system. They report constantly to
the guerrilla task group on the situation of nearby enemy forces.

5. When we use artificial obstacles to block the roads, we must make provision for
communication with our first line and reserves, as well as with the local population and our
correspondence network.

26
6. In case of necessity, the roads within villages can be completely blocked off, or we can leave
a way through. Whenever possible, each guerrilla task group should have a prepared position.

9. DISPOSITIONS IN CASE OF AN ENEMY SURPRISE ATTACK.

1. When we discover that the enemy is moving toward us, if we find out from reconnaissance
that he is not in strength, we should annihilate him with one sudden blow. If the enemy forces
are several times more numerous than ours, we should rapidly withdraw. But while we are
withdrawing we should give the enemy a false impression of the direction in which we are
moving, so as to conceal our actual route of withdrawal.

2. If the enemy attacks us by surprise and we do not succeed in evading him, we should
exploit in full measure the advantages of a village for defensive action, resist him firmly, and
then later take advantage of an opportunity to withdraw.

3. If we have already lost a village, we should reply by a counterattack or counterblows in order


to take it back quickly and save our captured comrades, or those comrades who are clinging
to a position and defending it stubbornly to the death. If our action is rapid, we can always
attain such objectives, because after a victory the enemy is often in great confusion and lax in
his precautions.

4. The best occasion for carrying out such counterblows, or such a counteroffensive, is just
after the victory of the enemy's surprise attack. The sacrifices of a charge under such
circumstances are less than those from running away, or from stopping and giving battle in
unfavourable terrain following the enemy' s attack.

METHODS OF DESTROYING WORKS ON THE GROUND.

1. Railroads should be destroyed at the points where they are most difficult to repair, such as at
curves, at points where the railway is hidden from view, where the enemy's precautions are lax,
where we can work under cover, or where we can destroy a large length of track. When
destroying the rails, we should bend them, or hollow out the ground beneath them. In low-
laying places we should dig ditches. As for tunnels, we should obstruct them.

2. Railroad ties, wooden bridges, telegraph and telephone poles, etc., should be burned up.
Wires should be carried away or dropped into the water.

3. Signals switches, semaphores, railroad carriages, etc., located in the stations should be
destroyed, preferably by blowing them up with explosives.

4. In destroying cobblestone roads, highways, bridges, and other constructions, we must in all
cases choose a method of destruction appropriate to the nature of the construction.


27
TRAINING
1. THE SCOPE OF TRAINING.

Training is not limited to the military arts; we must also pay attention to political training, to the
literacy movement, to training in hygiene, etc. Consequently, when a guerrilla unit is engaged in
drill, literacy training should represent an appropriate part of the whole, and can be given in all
places and at all times.

For the purpose of achieving a full and satisfactory result from all the kinds of training carried
out in a guerrilla unit, we must increase the will to study on their own initiative among the
officers and soldiers. Apart from the political aspect, and in addition to increasing political
consciousness, we must also promote amusements for the army, mitigate a painful and tedious
existence, assist the people in their own self-defense, and cause the armed force of the
popular masses to unite closely with us.

2. TRAINING IN ALL SUBJECTS.

The consequence of training in all subjects, though it is difficult to reduce it to uniformity, is, as
regards methods in general, to proceed from the superficial to the profound, first the broad and
then the rigorous, from the simple and easy to the complex and difficult, first the partial and
then the universal. In all fields, one must demonstrate one's theories by concrete experience,
so as to strengthen the students' confidence.

3. CULTIVATING THE PEOPLE'S CAPACITY FOR SELF-DEFENSE.

The most pressing and most important task of a guerrilla unit is to carry out guerrilla attacks
without ceasing in the places occupied by the enemy, to seize and kill all traitors and
reactionaries, and to protect the popular masses. At the same time, a guerrilla unit must
investigate the concrete offenses of the enemy and use every possible method to discover and
smash his tricks and plots. Therefore:

1. It is advantageous to make known our good government, to make great efforts to unite with
the popular masses, and to support the forces of the popular masses. Such actions can also
be carried out on the territory of the enemy. We should also use every possible method and
devote all our strength to encourage the people to imitate our own actions, stimulate them to
fight the enemy actively, and guide their combat.

2. Our action in supporting the people's capacity for self-defense should be of long duration,
and not ephemeral. We must do the best we can to let people know that, at all times, a guerrilla
unit struggles and sacrifices itself for the popular masses and, even in the case of the most
dangerous crisis, will absolutely not harm the popular masses. If the local population meets
with a defeat in its first military action, after we have drawn it into the war, its spirit of struggle
will necessarily be dissipated to some extent. When the masses falter in this way, we must
devise a way to rouse their enthusiasm and to bring their spirit of struggle to a high level once
more.

3. A guerrilla unit constitutes the most conscious and advanced segment of the people. Hence,
they should first unite those among the popular masses who are dissatisfied with the enemy
and who accept the leadership of those we send among them. We must also aid the people to
establish plans, to get arms, and to establish liaison and mutual assistance with mass
organizations in neighboring villages and even in other cities that are victims of the enemy's
oppression. But, in carrying out all such work, we must maintain the strictest secrecy.

4. TRAINING IN HYGIENE.

1. In order to strengthen its own fighting capacity, every mess unit should designate one or two
soldiers as nurses, to treat the ailments of the officers and soldiers when they arise and, also to

28
explain the rudiments of hygiene, as well as to assist, direct, supervise, and encourage all
matters of hygiene in the unit.

2. Replenishing stocks of medicines is an extremely difficult matter in a guerrilla unit. Hence we


should, in accordance with the seasons etc., prepare certain medicines especially for
emergency care, and other normally indispensable medicines. As regards wounded and
seriously ill members of the unit, when there is no alternative, they are entrusted to fellow
soldiers with some slight medical knowledge or to local inhabitants sympathetic to us.

5. MILITARY TRAINING.

Military training all relates to the enemy army. Its purpose is to create greater skill than that of
the enemy in each specialized art.

1. Subjects. The items requiring particular attention are dispersing, assembling, marksmanship,
maneuvering an army, mountain climbing, construction of military works, night fighting,
mountain fighting, fighting on narrow roads, espionage and security measures, searches,
liaison, and other such actions.

2. Methods. In carrying out military instruction, particular attention should be paid to all
methods of teaching and explanation, which should be more or less as described below:

a. For theoretical instruction one can employ the method of giving suggestions and the method
of questions and answers. All methods of teaching that adopt the style of speechmaking and
injecting [ideas into the students' heads] should be eliminated in so far as possible.

b. When explaining actions, we should pay attention to linking our talks with the living reality,
so that it will be easy for the soldiers to understand us.

c. We should devote more time to concrete demonstrations of actions and less time to talking
about empty theories. Consequently, the greatest effort should be made to diminish the
duration and number of classroom sessions and the numbers of practical exercises should be
increased.

d. All explanations in the classroom should in so far as possible correspond to the exercises
outside.

e. All demonstrations of actions should be carefully prepared in advance before they are
executed. All negligent and perfunctory behaviour—doing things any old way—must absolutely
be eliminated.

f. With respect to all activities, we should devise a way to incite the officers and soldiers to
carry out a competition, in order to increase the spirit of initiative and the positive attitude they
manifest in their work, and to speed up the work.

g. Increase applied training, diminish training according to a fixed pattern, and correct the
erroneous idea that training according to a fixed pattern is useful in maintaining military
discipline.

h. The plan of training should be suited to the circumstances, time, and place in which it is to
be carried out. The training plan must absolutely not be rigid; we must seize every occasion
and strive to give training adapted to the circumstances. This is done more or less as indicated
below:

i. We utilize the time when the army is on the march to carry on direction finding, recognizing
differences in terrain, estimating distances, reconnaissance action, and designating objectives
and the utilization of terrain.

i. When we are in camp, we utilize preparations for security measures in order to carry out
exercises in all kinds of observation and precautions, beginning with the role of advanced
sentries. We also provide training in construction of military works.

29
ii. We utilize the opportunity provided by a battle, and before setting out or before the fighting
begins, we explain, on the basis of the tasks we have been ordered to perform, such forms of
action as ambushes, surprise attacks, main attacks, and supporting attacks, etc.

iii. We utilize the opportunity, when we are awaiting the moment for action, to explain in
practical terms how we resist the charges of the enemy, as well as shooting and other such
military actions.

iv. We utilize post-battle exposition and criticism (such exposition and criticism should be
based on a minute investigation of the facts, carried out beforehand) to point out the strength
and weaknesses in our actions during the battle and what was appropriate and inappropriate in
the individual commands, thus giving a concrete lesson to all of officers and men.

v. We utilize the time offered by morning and evening roll calls to give various kinds of talks.

vi. We utilize the occasion offered by the recreation period to put on games, dances, and
modern-style plays, having military significance, thus imperceptibly increasing the officers' and
soldiers' desire to correct themselves, and increasing their willingness to follow good
examples.

vii. We utilize each occasion of reward and punishment to carry out thorough propaganda
among the officers and soldiers, in order to increase the soldiers' sense of achievement and
their shame in doing evil, and thus, little by little, fostering a good military discipline.

6. POLITICAL TRAINING.

In order to assure that all the independent actions of a guerrilla unit attain complete victory,
apart from reinforcing military training, the most important thing is that we must make certain
that the officers and soldiers have a high level of "political consciousness" and of "devotion" to
their own cause. Political training is the only method by which this objective can be attained. Its
content is described in detail later on.

7. THE LITERACY MOVEMENT.

In order to increase the cultural level of the officers and soldiers, so that they may more easily
absorb all kinds of training, each mess unit must carry out literacy training. The methods are as
follows:

1. The "A" class includes all those who know about fifty characters.

2. The "B" class includes those who know above twenty characters.

3. The "C" class includes those who know no characters at all.

4. The teachers of the various classes consist of those in the unit with a relatively high cultural
level.

5. When we halt, there should be an hour each day devoted to the study of characters. When
we are on the march, we can carry out instruction either while moving or during rest periods. In
such training, the important thing is regularity rather than speed. In general, if the soldiers learn
two words a day, it is excellent.

30
Guerilla Tactics by Che Guevara

31
1.ESSENCE OF GUERRILLA WARFARE

The armed victory of the Cuban people over the Batista dictatorship was not only the triumph
of heroism as reported by the newspapers of the world; it also forced a change in the old
dogmas concerning the conduct of the popular masses of Latin America. It showed plainly the
capacity of the people to free themselves by means of guerrilla warfare from a government that
oppresses them.

We consider that the Cuban Revolution contributed three fundamental lessons to the conduct
of revolutionary movements in America. They are:

(1) Popular forces can win a war against the army.

(2) It is not necessary to wait until all conditions for making revolution exist; the insurrection can
create them.

(3) In underdeveloped America the countryside is the basic area for armed fighting.

Of these three propositions the first two contradict the defeatist attitude of revolutionaries or
pseudo- revolutionaries who remain inactive and take refuge in the pretext that against a
professional army nothing can be done, who sit down to wait until in some mechanical way all
necessary objective and subjective conditions are given without working to accelerate them.
As these problems were formerly a subject of discussion in Cuba, until facts settled the
question, they are probably still much discussed in America. Naturally, it is not to be thought
that all conditions for revolution are going to be created through the impulse given to them by
guerrilla activity. It must always be kept in mind that there is a necessary minimum without
which the establishment and consolidation of the first center is not practicable. People must
see clearly the futility of maintaining the fight for social goals within the framework of civil
debate. When the forces of oppression come to maintain themselves in power against
established law; peace is considered already broken.

In these conditions popular discontent expresses itself in more active forms. An attitude of
resistance finally crystallizes in an outbreak of fighting, provoked initially by the conduct of the
authorities. Where a government has come into power through some form of popular vote,
fraudulent or not, and maintains at least an appearance of constitutional legality, the guerrilla
outbreak cannot be promoted, since the possibilities of peaceful struggle have not yet been
exhausted.

The third proposition is a fundamental of strategy. It ought to be noted by those who maintain
dogmatically that the struggle of the masses is centered in city movements, entirely forgetting
the immense participation of the country people in the life of all the underdeveloped parts of
America. Of course the struggles of the city masses of organized workers should not be
underrated; but their real possibilities of engaging in armed struggle must be carefully analyzed
where the guarantees which customarily adorn our constitutions are suspended or ignored. In
these conditions the illegal workers' movements face enormous dangers. They must function
secretly without arms. The situation in the open country is not so difficult. There, in places
beyond the reach of the repressive forces, the armed guerrillas can support the inhabitants. We
will later make a careful analysis of these three conclusions that stand out in the Cuban
revolutionary experience. We emphasize them now at the beginning of this work as our
fundamental contribution.

Guerrilla warfare, the basis of the struggle of a people to redeem itself, has diverse
characteristics, different facets, even though the essential will for liberation remains the same.
It is obvious -and writers on the theme have said it many times-that war responds to a certain
series of scientific laws; whoever ignores them will go down to defeat. Guerrilla warfare as a
phase of war must be ruled by all of these; but besides, because of its special aspects, a series
of corollary laws must also be recognized in order to carry it forward. Though geographical and

32
social conditions in each country determine the mode and particular forms that guerrilla
warfare will take, there are general laws that hold for all fighting of this type.

Our task at the moment is to find the basic principles of this kind of fighting and the rules to be
followed by peoples seeking liberation; to develop theory from facts; to generalize and give
structure to our experience for the profit of others.

Let us first consider the question: who are the combatants in guerrilla warfare? On one side we
have a group composed of the oppressor and his agents, the professional army, well armed
and disciplined, in many cases receiving foreign help as well as the help of the bureaucracy in
the employ of the oppressor. On the other side are the people of the nation or region involved.
It is important to emphasize that guerrilla warfare is a war of the masses, a war of the people.
The guerrilla band is an armed nucleus, the fighting vanguard of the people. It draws its great
force from the mass of the people themselves. The guerrilla band is not to be considered
inferior to the army against which it fights simply because it is inferior in firepower. Guerrilla
warfare is used by the side which is supported by a majority but which possesses a much
smaller number of arms for use in defense against oppression.

The guerrilla fighter needs full help from the people of the area. This is an indispensable
condition. This is clearly seen by considering the case of bandit gangs that operate in a region.
They have all the characteristics of a guerrilla army, homogeneity, respect for the leader, valor,
knowledge of the ground, and, often, even good understanding of the tactics to be employed.
The only thing missing is support of the people; and, inevitably, these gangs are captured and
exterminated by the public force.

Analyzing the mode of operation of the guerrilla band, seeing its form of struggle and

understanding its base in the masses, we can answer the question: why does the guerrilla
fighter fight? We must come to the inevitable conclusion that the guerrilla fighter is a social
reformer, that he takes up arms responding to the angry protest of the people against their
oppressors, and that he fights in order to change the social system that keeps all his unarmed
brothers in ignominy and misery. He launches himself against the conditions of the reigning
institutions at a particular moment and dedicates himself with all the vigor that circumstances
permit to breaking the mold of these institutions.

When we analyze more fully the tactic of guerrilla warfare, we will see that the guerrilla fighter
needs to have a good knowledge of the surrounding countryside, the paths of entry and
escape, the possibilities of speedy maneuver, good hiding places; naturally also, he must count
on the support of the people. All this indicates that the guerrilla fighter will carry out his action
in wild places of small population. Since in these places the struggle of the people for reforms
is aimed primarily and almost exclusively at changing the social form of land ownership, the
guerrilla fighter is above all an agrarian revolutionary. He interprets the desires of the great
peasant mass to be owners of land, owners of their means of production, of their animals, of all
that which they have long yearned to call their own, of that which constitutes their life and will
also serve as their cemetery.

It should be noted that in current interpretations there are two different types of guerrilla
warfare, one of which-a struggle complementing great regular armies such as was the case of
the Ukrainian fighters in the Soviet Union-does not enter into this analysis. We are interested in
the other type, the case of an armed group engaged in struggle against the constituted power,
whether colonial or not, which establishes itself as the only base and which builds itself up in
rural areas. In all such cases, whatever the ideological aims that may inspire the fight, the
economic aim is determined by the aspiration toward ownership of land.

The China of Mao begins as an outbreak of worker groups in the South, which is defeated and
almost annihilated. It succeeds in establishing itself and begins its advance only when, after

33
the long march from Yenan, it takes up its base in rural territories and makes agrarian reform its
fundamental goal. The struggle of Ho Chi Minh is based in the rice-growing peasants, who are
oppressed by the French colonial yoke; with this force it is going forward to the defeat of the
colonialists. In both cases there is a framework of patriotic war against the Japanese invader,
but the economic basis of a fight for the land has not disappeared. In the case of Algeria, the
grand idea of Arab nationalism has its economic counterpart in the fact that a million French
settlers utilize nearly all of the arable land of Algeria. In some countries, such as Puerto Rico,
where the special conditions of the island have not permitted a guerrilla outbreak, the
nationalist spirit, deeply wounded by the discrimination that is daily practiced, has as its basis
the aspiration of the peasants (even though many of them are already a proletariat) to recover
the land that the Yankee invader seized from them. This same central idea, though in different
forms, inspired the small farmers, peasants, and slaves of the eastern estates of Cuba to close
ranks and defend together the right to possess land during the thirty- year war of liberation.

Taking account of the possibilities of development of guerrilla warfare, which is transformed


with the increase in the operating potential of the guerrilla band into a war of positions, this
type of warfare, despite its special character, is to be considered as an embryo, a prelude, of
the other. The possibilities of growth of the guerrilla band and of changes in the mode of fight
until conventional warfare is reached, are as great as the possibilities of defeating the enemy in
each of the different battles, combats, or skirmishes that take place. Therefore, the
fundamental principle is that no battle, combat, or skirmish is to be fought unless it will be won.
There is a malevolent definition that says: _The guerrilla fighter is the Jesuit of warfare._ By this
is indicated a quality of secretiveness, of treachery, of surprise that is obviously an essential
element of guerrilla warfare. It is a special kind of Jesuitism, naturally prompted by
circumstances, which necessitates acting at

certain moments in ways different from the romantic and sporting conceptions with which we
are taught to believe war is fought.

War is always a struggle in which each contender tries to annihilate the other. Besides using
force, they will have recourse to all possible tricks and stratagems in order to achieve the goal.

Military strategy and tactics are a representation by analysis of the objectives of the

groups and of the means of achieving these objectives. These means contemplate taking

advantage of all the weak points of the enemy. The fighting action of each individual platoon in
a large army in a war of positions will present the same characteristics as those of the guerrilla
band. It uses secretiveness, treachery, and surprise; and when these are not present, it is
because vigilance on the other side prevents surprise. But since the guerrilla band is a division
unto itself, and since there are large zones of territory not controlled by the enemy, it is always
possible to carry out guerrilla attacks in such a way as to assure surprise; and it is the duty of
the guerrilla fighter to do so. _Hit and run_ some call this scornfully, and this is accurate. Hit
and run, wait, lie in ambush, again hit and run, and thus repeatedly, without giving any rest to
the enemy. There is in all this, it would appear, a negative quality, an attitude of retreat, of
avoiding frontal fights. However, this is consequent upon the general strategy of guerrilla
warfare, which is the same in its ultimate end as is any warfare: to win, to annihilate the enemy.

Thus it is clear that guerrilla warfare is a phase that does not afford in itself opportunities to
arrive at complete victory. It is one of the initial phases of warfare and will develop continuously
until the guerrilla army in its steady growth acquires the characteristics of a regular army. At
that moment it will be ready to deal final blows to the enemy and to achieve victory. Triumph
will always be the product of a regular army, even though its origins are in a guerrilla army.

Just as the general of a division in a modern war does not have to die in front of his soldiers,
the guerrilla fighter, who is general of himself, need not die in every battle. He is ready to give

34
his life, but the positive quality of this guerrilla warfare is precisely that each one of the guerrilla
fighters is ready to die, not to defend an ideal, but rather to convert it into reality. This is the
basis, the essence of guerrilla fighting. Miraculously, a small band of men, the armed vanguard
of the great popular force that supports them, goes beyond the immediate tactical objective,
goes on decisively to achieve an ideal, to establish a new society, to break the old molds of the
outdated, and to achieve, finally, the social justice for which they fight.

Considered thus, all these disparaged qualities acquire a true nobility, the nobility of the end at
which they aim; and it becomes clear that we are not speaking of distorted means of reaching
an end. This fighting attitude, this attitude of not being dismayed at any time, this inflexibility
when confronting the great problems in the final objective is also the nobility of the guerrilla
fighter.

2. GUERRILLA STRATEGY

In guerrilla terminology, strategy is understood as the analysis of the objectives to be achieved


in the light of the total military situation and the overall ways of reaching these objectives.

To have a correct strategic appreciation from the point of view of the guerrilla band, it is
necessary to analyze fundamentally what will be the enemy's mode of action. If the final
objective is always the complete destruction of the opposite force, the enemy is confronted in
the case of a civil war of this kind with the standard task: he will have to achieve the total
destruction of each one of the components of the guerrilla band. The guerrilla fighter, on the
other hand, must analyze the resources which the enemy has for trying to achieve that
outcome: the means in men, in mobility, in

popular support, in armaments, in capacity of leadership on which he can count. We must


make our own strategy adequate on the basis of these studies, keeping in mind always the
final objective of defeating the enemy army.

There are fundamental aspects to be studied: the armament, for example, and the manner of
using this armament. The value of a tank, of an airplane in a fight of this type must be weighed.
The arms of the enemy, his ammunition, his habits must be considered; because the principal
source of provision for the guerrilla force is precisely in enemy armaments. If there is a
possibility of choice, we should prefer the same type as that used by the enemy, since the
greatest problem of the guerrilla band is the lack of ammunition, which the opponent must
provide.

After the objectives have been fixed and analyzed, it is necessary to study the order of the
steps leading to the achievement of the final objective. This should be planned in advance,
even though it will be modified and adjusted as the fighting develops and unforeseen
circumstances arise.

At the outset, the essential task of the guerrilla fighter is to keep himself from being destroyed.
Little by little it will be easier for the members of the guerrilla band or bands to adapt
themselves to their form of life and to make flight and escape from the forces that are on the
offensive an easy task, because it is performed daily. When this condition is reached, the
guerrilla, having taken up inaccessible positions out of reach of the enemy, or having
assembled forces that deter the enemy from attacking, ought to proceed to the gradual
weakening of the enemy. This will be carried out at first at those points nearest to the points of
active warfare against the guerrilla band and later will be taken deeper into enemy territory,
attacking his communications, later attacking or harassing his bases of operations and his
central bases, tormenting him on all sides to the full extent of the capabilities of the guerrilla
forces.

The blows should be continuous. The enemy soldier in a zone of operations ought not to be
allowed to sleep; his outposts ought to be attacked and liquidated systematically. At every

35
moment the impression ought to be created that he is surrounded by a complete circle. In
wooded and broken areas this effort should be maintained both day and night; in open zones
that are easily penetrated by enemy patrols, at night only. In order to do all this the absolute
cooperation of the people and a perfect knowledge of the ground is necessary. These two
necessities affect every minute of the life of the guerrilla fighter. Therefore, along with centers
for study of present and future zones of operations, intensive popular work must be undertaken
to explain the motives of the revolution, its ends, and to spread the incontrovertible truth that
victory of the enemy against the people is finally impossible. Whoever does not feel this
undoubted truth cannot be a guerrilla fighter.

This popular work should at first be aimed at securing secrecy; that is, each peasant, each
member of the society in which action is taking place, will be asked not to mention what he
sees and hears; later, help will be sought from inhabitants whose loyalty to the revolution offers
greater guarantees; still later, use will be made of these persons in missions of contact, for
transporting goods or arms, as guides in the zones familiar to them; still later, it is possible to
arrive at organized mass action in the centers of work, of which the final result will be the
general strike.

The strike is a most important factor in civil war, but in order to reach it a series of
complementary conditions are necessary which do not always exist and which very rarely
come to exist spontaneously. It is necessary to create these essential conditions, basically by
explaining the purposes of the revolution and by demonstrating the forces of the people and
their possibilities.

• It is also possible to have recourse to certain very homogeneous groups, which must have
shown their efficacy previously in less dangerous tasks, in order to make use of another of the
terrible arms of the guerrilla band, sabotage. It is possible to paralyze entire armies, to suspend
the industrial life of a zone, leaving the inhabitants of a city without factories,

without light, without water, without communications of any kind, without being able to risk
travel by highway except at certain hours. If all this is achieved, the morale of the enemy falls,
the morale of his combatant units weakens, and the fruit ripens for plucking at a precise
moment.

All this presupposes an increase in the territory included within the guerrilla action, but an
excessive in- crease of this territory is to be avoided. It is essential always to preserve a strong
base of operations and to continue strengthening it during the course of the war. Within this
territory, measures of indoctrination of the inhabitants of the zone should be utilized; measures
of quarantine should be taken against the irreconcilable enemies of the revolution; all the purely
defensive measures, such as trenches, mines, and communications, should be perfected.

When the guerrilla band has reached a respectable power in arms and in number of
combatants, it ought to proceed to the formation of new columns. This is an act similar to that
of the beehive when at a given moment it releases a new queen, who goes to another region
with a part of the swarm. The mother hive with the most notable guerrilla chief will stay in the
less dangerous places, while the new columns will penetrate other enemy territories following
the cycle already described.

A moment will arrive in which the territory occupied by the columns is too small for them; and
in the advance toward regions solidly defended by the enemy, it will be necessary to confront
powerful forces. At that instant the columns join, they offer a compact, fighting front, and a war
of positions is reached, a war carried on by regular armies. However, the former guerrilla army
cannot cut itself off from its base, and it should create new guerrilla bands behind the enemy
acting in the same way as the original bands operated earlier, proceeding thus to penetrate
enemy territory until it is dominated.

36
It is thus that guerrillas reach the stage of attack, of the encirclement of fortified bases, of the
defeat of reinforcements, of mass action, ever more ardent, in the whole national territory,
arriving finally at the objective of the war: victory.

3. GUERRILLA TACTICS

[Che smoking his pipe in the mountains of Bolivia] In military language, tactics are the practical
methods of achieving the grand strategic objectives.

In one sense they complement strategy and in an-other they are more specific rules within it.
As means, tactics are much more variable, much more flexible than the final objectives, and
they should be adjusted continually during the struggle. There are tactical objectives that
remain constant throughout a war and others that vary. The first thing to be considered is the
adjusting of guerrilla action to the action of the enemy.

The fundamental characteristic of a guerrilla band is mobility. This permits it in a few minutes to
move far from a specific theater and in a few hours far even from the region, if that becomes
necessary; permits it constantly to change front and avoid any type of encirclement. As the
circumstances of the war require, the guerrilla band can dedicate itself exclusively to fleeing
from an encirclement which is the enemy's only way of forcing the band into a decisive fight
that could be unfavorable; it can also change the battle into a counter-encirclement (small
bands of men are presumably surrounded by the enemy when suddenly the enemy is
surrounded by stronger

contingents; or men located in a safe place serve as a lure, leading to the encirclement and
annihilation of the entire troops and supply of an attacking force). Characteristic of this war of
mobility is the so-called minuet, named from the analogy with the dance: the guerrilla bands
encircle an enemy position, an advancing column, for example; they encircle it completely from
the four points of the compass, with five or six men in each place, far enough away to avoid
being encircled themselves; the fight is started at any one of the points, and the army moves
toward it; the guerrilla band then retreats, always maintaining visual contact, and initiates its
attack from another point. The army will repeat its action and the guerrilla band the same.
Thus, successively, it is possible to keep an enemy column immobilized, forcing it to expend
large quantities of ammunition and weakening the morale of its troops without incurring great
dangers.

This same tactic can be applied at nighttime, closing in more and showing greater
aggressiveness, because in these conditions counter-encirclement is much more difficult.
Movement by night is another important characteristic of the guerrilla band, enabling it to
advance into position for an attack and, where the danger of betrayal exists, to mobilize in new
territory. The numerical inferiority of the guerrilla makes it necessary that attacks always be
carried out by surprise; this great advantage is what permits the guerrilla fighter to inflict losses
on the enemy without suffering losses. In a fight between a hundred men on one side and ten
on the other, losses are not equal where there is one casualty on each side. The enemy loss is
always reparable; it amounts to only one percent of his effectiveness. The loss of the guerrilla
band requires more time to be repaired because it involves a soldier of high specialization and
is ten percent of the operating forces.

A dead soldier of the guerrillas ought never to be left with his arms and his ammunition. The
duty of every guerrilla soldier whenever a companion falls is to recover immediately these
extremely precious elements of the fight. In fact, the care which must be taken of ammunition
and the method of using it are further characteristics of guerrilla warfare. In any combat
between a regular force and a guerrilla band it is always possible to know one from the other
by their different manner of fire: a great amount of firing on the part of the regular army,
sporadic and accurate shots on the part of the guerrillas.

37
Once one of our heroes, now dead, had to employ his machine guns for nearly five minutes,
burst after burst, in order to slow up the advance of enemy soldiers. This fact caused
considerable confusion in our forces, because they assumed from the rhythm of fire that key
position must have been taken by the enemy, since this was one of the rare occasions where
departure from the rule of saving fire had been called for because of the importance of the
point being defended.

Another fundamental characteristic of the guerrilla soldier is his flexibility, his ability to adapt
himself to all circumstances, and to convert to his service all of the accidents of the action.
Against the rigidity of classical methods of fighting, the guerrilla fighter invents his own tactics
at every minute of the fight and constantly surprises the enemy.

In the first place, there are only elastic positions, specific places that the enemy cannot pass,
and places of diverting him. Frequently the enemy, after easily overcoming difficulties in a
gradual advance, is surprised to find himself suddenly and solidly detained without possibilities
of moving forward. This is due to the fact that the guerrilla-defended positions, when they have
been selected on the basis of a careful study of the ground, are invulnerable. It is not the
number of attacking soldiers that counts, but the number of defending soldiers. Once that
number has been placed there, it can nearly always hold off a battalion with success. It is a
major task of the chiefs to choose well the moment and the place for defending a position
without retreat.

The form of attack of a guerrilla army is also different; starting with surprise and fury,
irresistible, it suddenly converts itself into total passivity.

The surviving enemy, resting, believes that the attacker has departed; he begins to relax, to
return to the routine life of the camp or of the fortress, when suddenly a new attack bursts forth
in another place, with the same characteristics, while the main body of the guerrilla band lies in
wait to intercept reinforcements. At other times an outpost defending the camp will be
suddenly attacked by the guerrilla, dominated, and captured. The fundamental thing is surprise
and rapidity of attack.

Acts of sabotage are very important. It is necessary to distinguish clearly between sabotage, a
revolutionary and highly effective method of warfare, and terrorism, a measure that is generally
ineffective and in-discriminate in its results, since it often makes victims of innocent people and
destroys a large number of lives that would be valuable to the revolution. Terrorism should be
considered a valuable tactic when it is used to put to death some noted leader of the
oppressing forces well known for his cruelty, his efficiency in repression, or other quality that
makes his elimination useful. But the killing of persons of small importance is never advisable,
since it brings on an increase of reprisals, including deaths.

There is one point very much in controversy in Opinions about terrorism. Many consider that its
use, by provoking police oppression, hinders all more or less legal or semiclandestine contact
with the masses and makes impossible unification for actions that will be necessary at a critical
moment. This is correct; but it also happens that in a civil war the repression by the
governmental power in certain towns is already so great that, in fact, every type of legal action
is suppressed already, and any action of the masses that is not supported by arms is
impossible. It is therefore necessary to be circumspect in adopting methods of this type and to
consider the consequences that they may bring for the revolution. At any rate, well-managed
sabotage is always a very effective arm, though it should not be employed to put means of
production out of action, leaving a sector of the population paralyzed (and thus without work)
unless this paralysis affects the normal life of the society. It is ridiculous to carry out sabotage
against a soft-drink factory, but it is absolutely correct and advisable to carry out sabotage
against a power plant. In the first case, a certain number of workers are put out of a job but
nothing is done to modify the rhythm of industrial life; in the second case, there will again be

38
displaced workers, but this is entirely justified by the paralysis of the life of the region. We will
return to the technique of sabotage later.

One of the favorite arms of the enemy army, supposed to be decisive in modern times, is
aviation. Nevertheless, this has no use whatsoever during the period that guerrilla warfare is in
its first stages, with small concentrations of men in rugged places. The utility of aviation lies in
the systematic destruction of visible and organized defenses; and for this there must be large
concentrations of men who construct these defenses, something that does not exist in this
type of warfare. Planes are also potent against marches by columns through level places or
places without cover; however, this latter danger is easily avoided by carrying out the marches
at night.

One of the weakest points of the enemy is transportation by road and railroad. It is virtually
impossible to maintain a vigil yard by yard over a transport line, a road, or a railroad. At any
point a considerable amount of explosive charge can be planted that will make the road
impassable; or by exploding it at the moment that a vehicle passes, a consider-able loss in
lives and materiel to the enemy is caused at the same time that the road is cut.

The sources of explosives are varied. They can be brought from other zones; or use can be
made of bombs seized from the dictatorship, though these do not always work; or they can be
manufactured in secret laboratories within the guerrilla zone. The technique of setting them off
is quite varied; their manufacture also depends upon the conditions of the guerrilla band.

In our laboratory we made powder which we used as a cap, and we invented various devices
for

exploding the mines at the desired moment. The ones that gave the best results were electric.
The first mine that we exploded was a bomb dropped from an aircraft of the dictatorship. We
adapted it by inserting various caps and adding a gun with the trigger pulled by a cord. At the
moment that an enemy truck passed, the weapon was fired to set off the explosion.

These techniques can be developed to a high degree. We have information that in Algeria, for
example, tele-explosive mines, that is, mines exploded by radio at great distances from the
point where they are located, are being used today against the French colonial power.

The technique of lying in ambush along roads in order to explode mines and annihilate
survivors is one of the most remunerative in point of ammunition and arms. The surprised
enemy does not use his ammunition and has no time to flee; so with a small expenditure of
ammunition large results are achieved. As blows are dealt the enemy, he also changes his
tactics, and in place of isolated trucks, veritable motorized columns move. However, by
choosing the ground well, the same result can be produced by breaking the column and
concentrating forces on one vehicle. In these cases the essential elements of guerrilla tactics
must always be kept in mind. These are: perfect knowledge of the ground; surveillance and
foresight as to the lines of escape; vigilance over all the secondary roads that can bring
support to the point of attack; intimacy with people in the zone so as to have sure help from
them in respect to supplies, transport, and temporary or permanent hiding places if it becomes
necessary to leave wounded companions behind; numerical superiority at a chosen point of
action; total mobility; and the possibility of counting on reserves.

If all these tactical requisites are fulfilled, surprise attack along the lines of communication of
the enemy yields notable dividends.

A fundamental part of guerrilla tactics is the treatment accorded the people of the zone. Even
the treatment accorded the enemy is important; the norm to be followed should be an absolute
inflexibility at the time of attack, an absolute inflexibility toward all the despicable elements that
resort to informing and assassination, and clemency as absolute as possible to-ward the
enemy soldiers who go into the fight performing or believing that they perform a military duty. It

39
is a good policy, so long as there are no considerable bases of operations and invulnerable
places, to take no prisoners. Survivors ought to be set free. The wounded should be cared for
with all possible resources at the time of the action. Conduct toward the civil population ought
to be regulated by a large respect for all the rules and traditions of the people of the zone, in
order to demonstrate effectively, with deeds, the moral superiority of the guerrilla fighter over
the oppressing soldier. Except in special situations, there ought to be no execution of justice
without giving the criminal an opportunity to clear himself.

4. WARFARE ON FAVORABLE GROUND

[Che Guevara addressing the United Nations in New York City] As we have already said,
guerrilla fighting will not always take place in country most favorable to the employment of its
tactics; but when it does, that is, when the guerrilla band is located in zones difficult to reach,
either because of dense forests, steep mountains, impassable deserts or marshes, the general
tactics, based on the fundamental postulates of guerrilla warfare, must always be the same. An
important point to consider is the moment for making contact with the enemy. If the zone is so
thick, so difficult that an organized army can never reach it, the guerrilla band should advance
to the regions where the army can arrive and where there will be a possibility of combat.

As soon as the survival of the guerrilla band has been assured, it should fight; it must
constantly go

out from its refuge to fight. Its mobility does not have to be as great as in those cases where
the ground is unfavorable; it must adjust itself to the capabilities of the enemy, but it is not
necessary to be able to move as quickly as in places where the enemy can concentrate a large
number of men in a few minutes. Neither is the nocturnal character of this warfare so
important; it will be possible in many cases to carry out daytime operations, especially
mobilizations by day, though subjected to enemy observation by land and air. It is also possible
to persist in a military action for a much longer time, above all in the mountains; it is possible to
undertake battles of long duration with very few men, and it is very probable that the arrival of
enemy reinforcements at the scene of the fight can be prevented.

A close watch over the points of access is, however, an axiom never to be forgotten by the
guerrilla fighter. His aggressiveness (on account of the difficulties that the enemy faces in
bringing up reinforcements) can he greater, he can approach the enemy more closely, fight
much more directly, more frontally and for a longer time, though these rules may be qualified by
various circumstances, such, for example, as the amount of ammunition.

Fighting on favorable ground and particularly in the mountains presents many advantages but
also the inconvenience that it is difficult to capture in a single operation a considerable quantity
of arms and ammunition, owing to the precautions that the enemy takes in these regions. (The
guerrilla soldier must never forget the fact that it is the enemy that must serve as his source of
supply of ammunition and arms.) But much more rapidly than in unfavorable ground the
guerrilla band will here be able to "dig in," that is, to form a base capable of engaging in a war
of positions, where small industries may be in-stalled as they are needed, as well as hospitals,
centers for education and training, storage facilities, organs of propaganda, etc., adequately
protected from aviation or from long-range artillery.

The guerrilla band in these conditions can number many more personnel; there will be
noncombatants and perhaps even a system of training in the use of the arms that eventually
are to fall into the power of the guerrilla army.

The number of men that a guerrilla band can have is a matter of extremely flexible calculation
adapted to the territory, to the means available of acquiring supplies, to the mass flights of
oppressed people from other zones, to the arms available, to the necessities of organization.
But, in any case, it is much more practicable to establish a base and expand with the support

40
of new combatant elements. The radius of action of a guerrilla band of this type can be as wide
as conditions or the operations of other bands in adjacent territory permit. The range will be
limited by the time that it takes to arrive at a zone of security from the zone of operation;
assuming that marches must be made at night, it will not be possible to operate more than five
or six hours away from a point of maximum security. Small guerrilla bands that work constantly
at weakening a territory can go farther away from the zone of security.

The arms preferable for this type of warfare are long-range weapons requiring small
expenditure of bullets, supported by a group of automatic or semi-automatic arms. Of the rifles
and machine guns that exist in the markets of the United States, one of the best is the M-1
rifle, called the Garand. However, only people with some experience should use this, since it
has the disadvantage of expending too much ammunition. Medium-heavy arms, such as tripod
machine guns, can be used on favorable ground, affording a greater margin of security for the
weapon and its personnel, but they ought always to be a means of repelling an enemy and not
for attack.

An ideal composition for a guerrilla band of 25 men would be: 10 to 15 single-shot rifles and
about 10 automatic arms between Garands and hand machine guns, including light and easily
portable automatic arms, such as the Browning or the more modern Belgian FAL and M-14
automatic rifles.

Among the hand machine-guns the best are those of nine millimeters, which permit a larger
transport of ammunition. The simpler its construction the better, because this increases the
case of switching parts. All this must be adjusted to the armament that the enemy uses, Since
the ammunition that he employs is what we are going to use when his arms fall into our hands.
It is practically impossible for heavy arms to be used. Aircraft cannot see anything and cease to
operate; tanks and cannons cannot do much owing to the difficulties of advancing in these
zones.

A very important consideration is supply. In general, the zones of difficult access for this very
reason present special problems, since there are few peasants, and therefore animal and food
supplies are scarce. It is necessary to maintain stable lines of communication in order to be
able always to count on a minimum of food, stockpiled, in the event of any disagreeable
development. In this kind of zone of operations the possibilities of sabotage on a large scale
are generally not present; with the inaccessibility goes a lack of constructions, telephone lines,
aqueducts, etc., that could be damaged by direct action.

For supply purposes it is important to have animals, among which the mule is the best in rough
country. Adequate pasturage permitting good nutrition is essential. The mule can pass through
extremely hilly country impossible for other animals. In the most difficult situations it is
necessary to resort to transport by men. Each individual can carry twenty-five kilograms for
many hours daily and for many days.

The lines of communication with the exterior should include a series of intermediate points
manned by people of complete reliability, where products can be stored and where contacts
can go to hide themselves at critical times. Internal lines of communication can also be
created. Their extension will be determined by the stage of development reached by the
guerrilla band. In some zones of operations in the recent Cuban war, telephone lines of many
kilometers of length were established, roads were built, and a messenger service maintained
sufficient to cover all zones in a minimum of time.

There are also other possible means of communication, not used in the Cuban war but
perfectly applicable, such as smoke signals, signals with sunshine reflected by mirrors, and
carrier pigeons.

41
The vital necessities of the guerrillas are to maintain their arms in good condition, to capture
ammunition, and, above everything else, to have adequate shoes. The first manufacturing
efforts should therefore be directed toward these objectives. Shoe factories can initially be
cobbler installations that replace halfsoles on old shoes, expanding afterwards into a series of
organized factories with a good average daily production of shoes. The manufacture of powder
is fairly simple; and much can be accomplished by having a small laboratory and bringing in
the necessary materials from outside. Mined areas constitute a grave danger for the enemy;
large areas can be mined for simultaneous explosion, destroying up to hundreds of men.

5. WARFARE ON UNFAVORABLE GROUND

In order to carry on warfare in country that is not very hilly, lacks forests, and has many roads,
all the fundamental requisites of guerrilla warfare must be observed; only the forms will be
altered. The quantity, not the quality, of guerrilla warfare will change. For example, following the
same order as before, the mobility of this type of guerrilla should be extraordinary; strikes
should be made preferably at night; they should be extremely rapid but the guerrilla should
move to places different from the starting point, the farthest possible from the scene of action,
assuming that there is no place secure from the repressive forces that the guerrilla can use as
its garrison.

A man can walk between 30 and 50 kilometers during the night hours; it is possible also to
march during the first hours of daylight, unless the zones of operation are closely watched or
there is danger that people in the vicinity, seeing the passing troops, will notify the pursuing
army of the location of the guerrilla band and its route. It is always preferable in these cases to
operate at night with the greatest possible silence both before and after the action; the first
hours of night are best. Here too there are exceptions to the general rule, since at times the
dawn hours will be preferable. It is never wise to habituate the enemy to a certain form of
warfare; it is necessary to vary constantly the places, the hours, and the forms of operation.

We have already said that the action cannot endure for long, but must be rapid; it must be of a
high degree of effectiveness, last a few minutes, and be followed by an immediate withdrawal.
The arms employed here will not be the same as in the case of actions on favorable ground; a
large quantity of automatic weapons is to be preferred. In night attacks marksmanship is not
the determining factor, but rather concentration of fire; the more automatic arms firing at short
distance, the more possibilities there are of annihilating the enemy.

Also, the use of mines in roads and the destruction of bridges are tactics of great importance.
Attacks by the guerrilla will be less aggressive so far as the persistence and continuation are
concerned, but they can be very violent, and they can utilize different arms, such as mines and
the shotgun. Against open vehicles heavily loaded with men, which is the usual method of
transporting troops, and even against closed vehicles that do not have special defenses-
against buses, for example-the shotgun is a tremendous weapon. A shotgun loaded with large
shot is the most effective. This is not a secret of guerrilla fighters; it is used also in big wars.
The Americans used shotgun platoons armed with high-quality weapons and bayonets for
assaulting machine-gun nests.

There is an important problem to explain, that of ammunition; this will almost always be taken
from the enemy. It is therefore necessary to strike blows where there will be the absolute
assurance of restoring the ammunition expended, unless there are large reserves in secure
places. In other words, an annihilating attack against a group of men is not to be under-taken
at the risk of expending all ammunition without being able to replace it. Always in guerrilla
tactics it is necessary to keep in mind the grave problem of procuring the war materiel
necessary for continuing the fight. For this reason guerrilla arms ought to be the same as those
used by the enemy, except for weapons such as revolvers and shotguns, for which the
ammunition can be obtained in the zone itself or in the cities.

42
The number of men that a guerrilla band of this type should include does not exceed ten to
fifteen. In forming a single combat unit it is of great importance always to consider the
limitations on numbers: ten, twelve, fifteen men can hide anywhere and at the same time can
help each other in putting up a powerful resistance to the enemy. Four or five would perhaps
be too small a number, but when the number exceeds ten the possibility that the enemy will
discover them in their camp or on the march is much greater.

Remember that the velocity of the guerrilla band on the march is equal to the velocity of its
slowest man. It is more difficult to find uniformity of marching speed with twenty, thirty, or forty
men than with ten. And the guerrilla fighter on the plain must be fundamentally a runner. Here
the practice of hitting and running acquires its maximum use. The guerrilla bands on the plain
suffer the enormous inconvenience of being subject to a rapid encirclement and of not having
sure places where they can set up a firm resistance; therefore they must live in conditions of
absolute secrecy for a long time, since it would be dangerous to trust any neighbor whose
fidelity is not perfectly established. The reprisals of the enemy are so violent, usually so brutal,
inflicted not only on the head of the family but frequently on the women and children as well,
that pressure on individuals lacking firmness may result at any moment in their giving way and
revealing information as to where the guerrilla

band is located and how it is operating. This would immediately produce an encirclement with
consequences always disagreeable, although not necessarily fatal. When conditions, the
quantity of arms, and the state of insurrection of the people call for an increase in the number
of men, the guerrilla band should be divided. If it is necessary, all can rejoin at a given moment
to deal a blow, but in such a way that immediately afterwards they can disperse toward
separate zones, a gain divided into small groups of ten, twelve, or fifteen men.

It is entirely feasible to organize whole armies under a single command and to assure respect
and obedience to this command without the necessity of being in a single group. Therefore the
election of the guerrilla chiefs and the certainty that they coordinate ideologically and
personally with the overall chief of the zone are very important.

The bazooka is a heavy weapon that can be used by the guerrilla band because of its easy
portability and operation. Today the rifle-fired anti-tank grenade can replace it. Naturally, it will
be a weapon taken from the enemy. The bazooka is ideal for firing on armored vehicles, and
even on unarmored vehicles that are loaded with troops, and for taking small military bases of
few men in a short time; but it is important to point out that not more than three shells per man
can be carried, and this only with considerable exertion.

As for the utilization of heavy arms taken from the enemy, nothing is to be scorned. But there
are weapons such as the tripod machine gun, the heavy fifty-millimeter machine gun3 etc.,
that, when captured, can be utilized with a willingness to lose them again. In other words, in
the unfavorable conditions that we are now analyzing, a battle to defend a heavy machine gun
or other weapon of this type cannot be allowed; they are simply to be used until the tactical
moment when they must be abandoned. In our Cuban war of liberation, to abandon a weapon
constituted a grave offense, and there was never any case where the necessity arose.
Nevertheless, we mention this case in order to explain clearly the only situation in which
abandonment would not constitute an occasion for reproaches. On unfavorable ground, the
guerrilla weapon is the personal weapon of rapid fire.

Easy access to the zone usually means that it will be habitable and that there will be a peasant
population in these places. This facilitates supply enormously. Having trustworthy people and
making contact with establishments that provide supplies to the population, it is possible to
maintain a guerrilla band perfectly well without having to devote time or money to long and
dangerous lines of communication. Also it is well to reiterate that the smaller the number of
men the easier it will be to procure food for them. Essential supplies such as bedding,

43
waterproof material, mosquito netting, shoes, medicines, and food will be found directly in the
zone, since they are things of daily use by its inhabitants.

Communications will be much easier in the sense of being able to count on a larger number of
men and more roads; but they will be more difficult as a problem of security for messages
between distant points, since it will be necessary to rely on a series of contacts that have to be
trusted. There will be the danger of an eventual capture of one of the messengers, who are
constantly crossing enemy zones. If the messages are of small importance, they should be
oral; if of great importance, code writing should be used. Experience shows that transmission
by word of mouth greatly distorts any communication.

For these same reasons manufacture will have much less importance, at the same time that it
would be much more difficult to carry it out. It will not be possible to have factories making
shoes or arms. Practically speaking, manufacture will have to be limited to small shops,
carefully hidden, where shotgun shells can be recharged and mines, simple grenades, and
other minimum necessities of the moment manufactured. On the other hand, it is possible to
make use of all the friendly shops of the zone for such work as is necessary.

This brings us to two consequences that flow logically from what has been said. One of them is
that the favorable conditions for establishing a permanent camp in guerrilla warfare are inverse
to the degree of productive development of a place. All favorable conditions, all facilities of life
normally induce men to settle; but for the guerrilla band the opposite is the case. The more
facilities there are for social life, the more nomadic, the more uncertain the life of the guerrilla
fighter. These really are the results of one and the same principle. The title of this section is
"War on Unfavorable Ground," because everything that is favorable to human life,
communications, urban and semi-urban concentrations of large numbers of people, land easily
worked by machine, all these place the guerrilla fighter in a disadvantageous situation.

The second conclusion is that if guerrilla fighting must include me extremely important faction
of work on the masses, this work is even more important in the unfavorable zones, where a
single enemy attack can produce a catastrophe. Indoctrination should be continuous, and so
should be the struggle for unity of the workers, of the peasants, and of other social classes that
live in the zone, in order to achieve toward the guerrilla fighters a maximum homogeneity of
attitude. This task with the masses, this constant work at the huge problem of relations of the
guerrilla band with the inhabitants of the zone, must also govern the attitude to be taken
toward the case of an individual recalcitrant enemy soldier: he should be eliminated without
hesitation when he is dangerous. In this respect the guerrilla band must be drastic. Enemies
cannot be permitted to exist within the zone of operations in places that offer no security.

6. SUBURBAN WARFARE

If during the war the guerrilla bands close in on cities and penetrate the surrounding country in
such a way as to be able to establish themselves in conditions of some security, it will be
necessary to give these suburban bands a special education, or rather, a special organization.

It is fundamental to recognize that a suburban guerrilla band can never spring up of its own
accord. It will be born only after certain conditions necessary for its survival have been created.
Therefore, the suburban guerrilla will always be under the direct orders of chiefs located in
another zone. The function of this guerrilla band will not be to carry out independent actions
but to coordinate its activities with overall strategic plans in such a way as to support the
action of larger groups situated in another area, contributing specifically to the success of a
fixed tactical objective, without the operational freedom of guerrilla bands of the other types.
For example, a suburban band will not be able to choose among the operations of destroying
telephone lines, moving to make attacks in another locality, and surprising a patrol of soldiers
on a distant road; it will do exactly what it is told. If its function is to cut down telephone poles

44
or electric wires, to destroy sewers, railroads, or water mains, it will limit itself to carrying out
these tasks efficiently.

It ought not to number more than four or five men. The limitation on numbers is important,
because the suburban guerrilla must be considered as situated in exceptionally unfavorable
ground, where the vigilance of the enemy will be much greater and the possibilities of reprisals
as well as of betrayal are increased enormously. Another aggravating circumstance is that the
suburban guerrilla band cannot depart far from the places where it is going to operate. To
speed of action and withdrawal there must be added a limitation on the distance of withdrawal
from the scene of action and the need to remain totally hidden during the daytime. This is a
nocturnal guerrilla band in the extreme, without possibilities of changing its manner of
operating until the insurrection is so far advanced that it can take part as an active combatant
in the siege of the city.

The essential qualities of the guerrilla fighter in this situation are discipline (perhaps in the
highest degree of all) and discretion. He cannot count on more than two or three friendly
houses that will provide food; it is almost certain that an encirclement in these conditions will
be equivalent to death. Weapons, furthermore, will not be of the same kind as those of the
other groups. They will be for personal defense, of the type that do not hinder a rapid flight or
betray a secure hiding place. As their armament the band ought to have not more than one
carbine or one sawed-off shotgun, or perhaps two, with pistols for the other members.

They will concentrate their action on prescribed sabotage and never carry out armed attacks,
except by surprising one or two members or agents of the enemy troops.

For sabotage they need a full set of instruments. The guerrilla fighter must have good saws,
large quantities of dynamite, picks and shovels, apparatus for lifting rails, and, in general,
adequate mechanical equipment for the work to be carried out. This should be hidden in
places that are secure but easily accessible to the hands that will need to use it.

If there is more than one guerrilla band, they will all be under a single chief who will give orders
as to the necessary tasks through contacts of proven trustworthiness who live openly as
ordinary citizens. In certain cases the guerrilla fighter will be able to maintain his peacetime
work, but this is very difficult. Practically speaking, the suburban guerrilla band is a group of
men who are already outside the law, in a condition of war, situated as unfavorably as we have
described.

The importance of a suburban struggle has usually been underestimated; it is really very great.
A good operation of this type extended over a wide area paralyzes almost completely the
commercial and industrial life of the sector and places the entire population in a situation of
unrest, of anguish, almost of impatience for the development of violent events that will relieve
the period of suspense. If from the first moment of the war, thought is taken for the future
possibility of this type of fight and an organization of specialists started, a much more rapid
action will be assured, and with it a saving of lives and of the priceless time of the nation.

45
The Zapatista Mexican Rebellion, its Revolutionary
Objectives and Tactics
by James Graham

46
On New Years Day 1994 with ski masks and automatic rifles in hand the Zapatista National
Liberation Army (EZLN) descended from the hills of Mexico's impoverished Chiapas province
and commenced a unique armed struggle. The EZLN have relied heavily on sympathetic
organisations, public relations and the internet to present the group's ideology to Mexicans and
to people around the world. In so doing, they successfully circumvented and undermined the
propaganda systems that had previously prevented large-scale peaceful movements from
expressing essentially the same objectives.

The EZLN is largely an indigenous peasant based movement with some urban intellectual
leadership most notably Subcommander Marcos the groups spokesperson. The organisation
has its roots in Mexico's most southern and poverty-stricken province, Chiapas. A province
dominated by indigenous Indian communities and largely excluded from any capitalist
development. Ninety percent of indigenous households in the state are without electricity and
running water.

Democracy, freedom and justice are the EZLN's three central objectives. The democracy they
envisage is consensus based, direct and participatory. Their goal of freedom is required to
facilitate indigenous autonomy and self-determination. Social and economic justice, a critique
of neo-liberal ideology is a key objective considered necessary to gain respect for indigenous
culture and alternative ways of life. Combined they cover other more specific demands like
improved housing and education and the protection of Indian culture.

Chiapas had long voted for the ruling Revolutionary Institutional Party (PRI) in relatively larger
numbers than any other Mexican state. People were mostly forced by the local landowning
elites to vote in this way. This gives some clue as to the all-encompassing grip the PRI
maintained on Mexican society in Chiapas. It controlled the mass media, the few schools, the
unions and the peasant organisations. The only significant counter balance to the PRI was the
Roman Catholic Church. Thus, the rebels combined forces with the church to help organise
peasant communities and support their struggles. By working alongside with what are
generally the most trusted and revered members in Mexican peasant communities the rebels
were able to slowly earn the trust and support of the local peasants. Sharing the hardships and
general state of hopelessness with the peasants changed the rebels own perspectives to a
point where the two became inseparable. Thus the guerrilla leadership did not take up arms
and then call for local support. They consulted widely and thoroughly with local communities
first until a consensus in favour of armed struggle was achieved.

The Zapatistas hence practise at every step the local autonomy, democracy and justice they
preach. This lack of hypocrisy undeniably helped win over the active support of the people of
Chiapas. As well Marcos and other Zapatistas have used the "language of storytelling and
poetry rather than political dogma" to communicate their dreams and ideas to the local
population and later the world. Thirty percent of people in Chiapas are illiterate and another
thirty two percent speak only their native Indian language. Storytelling was thus crucial in
ensuring the guerrillas earned the support of the most deprived people in Mexico. Active and
widespread participation was crucial as armed resistance has historically led to harsh elite led
repression. Military and state backed terror was indeed the PRI's and the Chiapas landed
elite's response. Hired guards and other paramilitary groups were entrusted by the state to
terrorise the local population into subjugation and submission. The peasants responded by
sending their men into the jungle in support of the guerrillas while the women folk did their best
to continue their way of life in the face of military occupation. The guerrilla leadership
foreseeing this response sought to create national and international support networks with any
organisation that shared in part or all of the movement's vision. These networks and the
support they produced created an effective shield that prevented the Mexican state following a
path of complete repression against the Zapatistas.

47
Mexico in 1994 was firmly under the one party hegemony of the PRI. Opposition movements
were uncoordinated and prone to cooptation, repression or marginalisation. Mexico's mass
media were either state controlled or closely watched by the PRI state. Interlinking personal
relationships amongst the elite also helped to consolidate party control. In October 1990, the
Mexican government hired the largest public relations firm in the world, Burson-Marsteller to
gain Mexican acceptance of the North American Free Trade Zone. In the early 1990s the
Mexican state had a coordinated and successful propaganda machine at its disposal.

48
Techniques of the Mexican Cartel

49
Beheading by Chainsaw

In 2014, a video began making the rounds in the gore-hound corners of the Internet, one that
nauseated even the most steeled, desensitized viewers. In the video, two men are propped
against a stone wall, their hands tied behind their backs. Off-camera audio reveals that the
men are members of the Sinaloa cartel (headed by the notorious Joaquín "El Chapo"
Guzmán) and have been deemed dedos, Spanish slang for snitches.

What happens next is a gruesome display of brute violence. The first man's neck begins
spurting blood from severed arteries as a chainsaw removes his head from his body, his
convulsions terrifyingly lasting throughout the ordeal. The decapitation is carried out so brutally
that in the process, the prisoner sitting next to him loses his arm from the chainsaw's errant
course. He then sits in agony before being beheaded via machete himself.

The video is so horrifying that it's been used as an intimidation tactic for anyone who'd dare
involve the law with the cartel's criminal enterprise, with potential whistleblowers receiving
graphic DVDs in the mail. It's difficult to think of a more effective way to ensure silence.  

The Stew

A method of execution whose brutal creativity is attributed to Los Zetas cartel leader Miguel
Trevino, "The Stew" (El Guiso) would seem to back up claims that Trevino himself is a bit of a
psychopath. 

The Stew has two variations. In the first, victims - perceived enemies of the Zetas cartel - are
placed inside 55-gallon barrels filled with oil and lit on fire, resulting in a rapid, searing,
agonizing death. But the Stew has another even more gruesome recipe that also takes place in
a 55-gallon barrel, one that requires a bit more patience: simply boiling victims alive.  

Miguel Trevino was apprehended in 2013, but the practice of El Guiso is still carried out by the
Zetas cartel, whose reputation as the most sadistic crime organization in Mexico remains firmly
intact. 

Face Peeling

In the annals of disturbing execution videos on the Internet, a recent contender [**warning:
extremely graphic content**] is vying for the position of most awful documented killing online.
The extremely graphic video shows a man, his hands severed, writhing on the floor of an
unknown location in utter agony, his head a skeletal smear of red, with his face and eyeballs
completely removed from his skull via razor blade. The will to live demonstrated by the victim is
astounding, considering the indescribable amount of pain and blood loss involved the flaying
of one's own face.  

Face peeling has become a common practice in the Mexican Drug War as an effective scare
tactic to rivals and would-be informants. El Chapo's Sinaloa cartel have even gotten creative
with the process, affixing one victim's face to a soccer ball to send an ominous message.
Found at the footsteps of city hall in Ciudad Juarez, the decorative football came with a note:
"Happy New Year, because this will be your last."

Feeding to Lions and Tigers

50
As notably portrayed in the 1983 film Scarface, drug lords have long thought private zoos to be
a statement of opulence. Just as the infamous Pablo Escobar kept hippopotamuses and other
exotic creatures at his private compound, rare and dangerous pets are still a status symbol
today for high-ranking members of the Mexican drug cartels. 

While some cartel kingpins, like Jesus "The King" Zambada, a leader of the Sinaloa cartel who
recently had 200 animals confiscated from his property in a raid, simply enjoy the animals as a
part of the ranchero lifestyle, leave it to the uniquely demented Zetas to find another use for
their collection of beasts. 

Heriberto Lazcano, noted psychopath and leader of the Zetas cartel, purportedly fed his rivals
and enemies to lions and tigers he kept on his ranches. His victims would be forced into cages
with these fanged creatures and gnashed apart, torn limb from limb in an excruciating death to
an audience of onlookers. The Mexican government claims Lazcano is dead (though no body
has been found), but with the widespread ownership of these animals and the copycat nature
of the drug war, it's quite plausible his execution design lives on.

Acid Baths

Acid baths have long been a tried-and-true method of disposal for human bodies. More
effective than lye (also popular with murderers), acid can dissolve a body completely, liquefying
bones and even teeth. It's a gruesome process in the post-mortem, but being submerged in
acid while alive is surely one of the most torturous ways to exit life - your skin slowly eroding to
the bone from an inescapable caustic liquid.

In 2011, the sadistic Zetas cartel carried out one of the bloodiest mass murders in the Mexican
Drug War's history - dubbed as the Second San Fernando Massacre (yes, there was a first
one), 193 lives were claimed by the Zetas in the municipality of San Fernando, Tamaulipas,
Mexico.

A survivor of the massacre, who was aboard a charter bus whose occupants were kidnapped
by the Zetas that day, described the horrifying ordeal:

They took away the children from their mothers, and shot the rest of the bus passengers. The
women were taken to a warehouse where many other women were held captive. Inside a dark
room, the women were reportedly raped and beaten, while one heard the screams of the
women and of the children being put in acid.

Death by Dismemberment

To meet one's demise via the removal of limbs is not a new form of execution. In fact, the ritual
of being drawn and quartered dates as far back as the 13th century, where it was England's
choice method for the dispatching of traitors. But the wheel has been reinvented, so to speak,
with the Zetas cartel taking dismemberment to sadistic new levels in the Mexican Drug War.  

A drug trafficker who was kidnapped by the Zetas after a shipment of narcotics was seized by
US officials described in harrowing detail what was shown to him as a penalty for failure to pay
for the lost goods.

Led by his captors from their vehicle outside the Mexican city of Piedras Negras, the man was
made to kneel on the ground and remove his blindfold. The Zetas then showed him what he
could expect to happen to his loved ones should he default on what he owed. The man then

51
witnessed a family - a mother and father, and their six-year-old daughter - standing near a
flaming barrel. As the parents looked on in horror - held by their hair, forced to watch - their
daughter was dismembered alive by ax, as laughing Zetas threw the child's severed limbs into
the fire. After the abhorrent act, the parents met the same fate, but only after witnessing the
impossible depravity exhibited by the Zetas cartel. 

Execution-Style Shootings

Execution-style shootings are a tried-and-true method of murder for the cartels. they are
effective, quick, and in their simplistic brutality, they send a clear message of just how low the
value of life is to those behind the trigger. When compared to other atrocities committed in
the drug war, an execution-style bullet to the back of the head may seem tame, if not merciful,
but as has been documented repeatedly on video, the sheer terror on the faces of the victims -
hopeless, resigned to certain death - can be more stomach-churning than even the bloodiest
display. 

A haunting video emerged in March of 2016 that showed the bleak final minutes of a man's life.
He was the captive of an unnamed cartel, forced to bare-knuckle box with another man in front
of numerous spectators. After roughly 40 seconds, the fight is called by a masked gunman in
favor of the other competitor. The first man, now the loser, is forced to kneel. Exhausted,
defeated, and his fate sealed, a gun is held to his head and the video cuts to black. Authorities
would later report that the man had been killed by a gunshot to his brain. 

Hanging

The act of killing by hanging is not exactly a new craze developed by the cartels. It's a practice
that dates back hundreds of years, and it's still used around the world today (including in the
US). While this rudimentary and timeless method of execution is employed quite often in the
Mexican Drug War, the cartels have gone a long way to put their own signature on it.

For the cartels, hanging serves more of an ornamental purpose. Victims are often hanged after
death in highly visible places to send a message regarding turf in disputed cities. These bodies
are frequently mutilated and show signs of torture and abuse, creating a grotesque display on
bridges and billboards. A body found hanging from a bridge in Tijuana, just 10 miles south of
the US border, was recently found with a message to would-be turncoats or snitches: "This is
how all grasshoppers will be left," showing the practice is alive and well as a depraved form of
communication.   


52
Getting on the Deep Web Internet Article

Hi everyone. Today I am introducing a guide to Deep Web in which you will be provided a quick
intro to it along with the way to access it. This deep web has several names dark net, invisible
web, hidden web, dark web,deep website.

I guess all know what search engines are and how do they work but you will be amazed to
know that they sweep through only a thin layer of the entire web. There are petabytes of data
which is not registered to any of the search engines and not only that, anonymity is the major
property of deep web. Thing doesn’t end here the there is a more secure and private layer
beneath which contain network tunnels of VPN ,restricted contents to which only authorized
personals can gain access and are relying upon Tor and I2P like Subnets. The content that dark
web possess are mostly those content which are either illegal or anything that requires
anonymity to exist. You cannot access these website using normal browsers, you need special
browser like Tor Browser which keeps your identity hidden and bounces the traffic from various
servers scattered worldwide, so that tracing you is difficult. All the transaction that happens
there is in Bitcoins no tracing there too.

So anything that is not accessible via search engine comes under deep web whose subset is
dark web which is accessible by authorized ones only.

Things that you can do on Deep web:

Hacked credit cards, hacking, hidden hosting, Hidden wiki(yes they got their own wiki),Hire
from hacker to hitman ,illegal porn, market of illegal items, Research works ,secret forums and
the list goes on. You might not know what you may find in deep web. Take a look at the wiki
stats

How to access Deep web on computer:

Download Tor Web Browser from here and use deep web links from above link and make sure
you bookmark them cause you might not remember it any long. Also they keep shutting
servers down frequently so be patient as chances are you might copy paste link and it won’t
work.

How to access Deep web on Android:

1 Download Orbot from here.

2 Download custom Firefox called Orfox browser from Here.

3 Start Orbot click on large onion and wait till it gets green.

53

4.   Start orfox and a saved link will be there named as Check Tor Connection click on it.If you
see a page like image below

54
7 Kinds of Hackers
1 Script Kiddie – Script Kiddies normally don’t care about hacking (if they did,
they’d be Green Hats. See below.). They copy code and use it for a virus or an SQLi or
something else. Script Kiddies will never hack for themselves; they’ll just download overused
software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A
common Script Kiddie attack is DoSing or DDoSing (Denial of Service and Distributed Denial of
Service), in which they flood an IP with so much information it collapses under the strain. This
attack is frequently used by the “hacker” group Anonymous, which doesn’t help anyone’s
reputation.

2 White Hat – Also known as ethical hackers, White Hat hackers are the good
guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White
Hat hackers hold a college degree in IT security or computer science and must be certified to
pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker)
from the EC-Council.

3 Black Hat – Also known as crackers, these are the men and women you hear
about in the news. They find banks or other companies with weak security and steal money or
credit card information. The surprising truth about their methods of attack is that they often use
common hacking practices they learned early on.

4 Gray Hat – Nothing is ever just black or white; the same is true in the world of
hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface
a website or two), yet they don’t help people for good (but, they could if they wanted to). These
hackers comprise most of the hacking world, even though Black Hat hackers garner most (if
not all) of the media’s attention.

5 Green Hat – These are the hacker “n00bz,” but unlike Script Kiddies, they care
about hacking and strive to become full-blown hackers. They’re often flamed by the hacker
community for asking many basic questions. When their questions are answered, they’ll listen
with the intent and curiosity of a child listening to family stories.

6 Red Hat – These are the vigilantes of the hacker world. They’re like White Hats
in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried
so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by
uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out.
They leverage multiple aggressive methods that might force a cracker to need a new computer.

7 Blue Hat – If a Script Kiddie took revenge, he/she might become a Blue Hat.
Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz,
but like the Script Kiddies, they have no desire to learn.


55
ISIS Torture Techniques

The ghost. The ghost torture is a method of contorting a prisoner,


holding them in that position for an extended period of time, and
lashing them. Typically, prisoners are held or suspended from the
rafters when the ghost technique is administered.

Fuel dousing. Prisoners are doused with fuel, and sometimes they
are set on fire, and sometimes they are spared. The psychological
aspect of fuel dousing adds to the trauma inflicted on the prisoners.

Severed heads. Prisoners are forced to sit in enclosed spaces


surrounded by severed heads for days at a time. This is among the
cruelest methods of psychological torture utilized by ISIS.

Electric shock. Electric shock torture is a common interrogation


technique. Prisoners frequently die of cardiac arrest as a result of
being shocked repeatedly.

56
The flying carpet. The flying carpet involves strapping the prisoner
to two wooden boards. The prisoners' backs are twisted and contorted,
often resulting in paralysis.

The biter. The biter is a punishment inflicted upon female prisoners.


A pair of metal jaws are clamped down on a woman's breasts, causing
excruciating pain and tissue damage.

Taunting with remains. Prisoners are sometimes taunted with the


skulls or dismembered remains of their relatives or neighbors. As with
the severed heads torture, prisoners are often kept in enclosed spaces
with the remains of people they know.

Barrels. Prisoners are kept in barrels or small cells where their arms
and legs are tied, preventing them from being able to move. This is
often followed by execution, often involving being burned alive or
decapitation.

Crucifixion. Public crucifixion is a method of execution which


guarantees a prisoner a slow, excruciating death. This is meant to
humiliate the victim and bring them shame, in addition to the physical
agony they are subjected to.

The cage. Minor infractions can result in a person being imprisoned


in a cage for days at a time by ISIS soldiers. Such infractions include
talking to a girl, drinking a beer, or any perceived sign of disrespect.

Joint dislocation. Prisoners are suspended by their wrists until they


can no longer move their hands. In variations of the "ghost"
punishment, the end result is usually the dislocation of a prisoner's
arms.

Solitary confinement. Prisoners are kept in dark cells for days at a


time. They can be denied food or water to the point of near death.

Variations of the flying carpet. In some extreme instances of the


flying carpet torture, a prisoner's back is broken. This results in nerve
damage, paralysis or death.

57
Upside-down suspension. Prisoners are hanged upside-down
from the rafters for extended periods of time. This causes the blood to
rush to the prisoner's head, often resulting in a loss of consciousness.
Upside-down suspension is used intermittently with waterboarding.

58
The Hacker Toolbox
• Log keystrokes: Some programs allow hackers to review every keystroke a
computer user makes. Once installed on a victim's computer, the programs record each
keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone's
identity.

• Hack passwords: There are many ways to hack someone's password, from
educated guesses to simple algorithms that generate combinations of letters, numbers and
symbols. The trial and error method of hacking passwords is called a brute force attack,
meaning the hacker tries to generate every possible combination to gain access. Another way
to hack passwords is to use a dictionary attack, a program that inserts common words into
password fields.

• Infect a computer or system with a virus: Computer viruses are programs


designed to duplicate themselves and cause problems ranging from crashing a computer to
wiping out everything on a system's hard drive. A hacker might install a virus by infiltrating a
system, but it's much more common for hackers to create simple viruses and send them out to
potential victims via email, instant messages, Web sites with downloadable content or peer-to-
peer networks.

• Gain backdoor access: Similar to hacking passwords, some hackers create


programs that search for unprotected pathways into network systems and computers. In the
early days of the Internet, many computer systems had limited security, making it possible for a
hacker to find a pathway into the system without a username or password. Another way a
hacker might gain backdoor access is to infect a computer or system with a Trojan horse.

• Create zombie computers: A zombie computer, or bot, is a computer that a


hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a
victim executes seemingly innocent code, a connection opens between his computer and the
hacker's system. The hacker can secretly control the victim's computer, using it to commit
crimes or spread spam.

• Spy on e-mail: Hackers have created code that lets them intercept and read e-
mail messages -- the Internet's equivalent to wiretapping. Today, most e-mail programs use
encryption formulas so complex that even if a hacker intercepts the message, he won't be able
to read it.

59
Hacker Terms
Adware – Adware is software designed to force pre-chosen ads to display on your system.
Some adware is designed to be malicious and will pop up ads with such speed and frequency
that they seem to be taking over everything, slowing down your system and tying up all of your
system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the
least.

Back Door – A back door is a point of entry that circumvents normal security and can be used
by a cracker to access a network or computer system. Usually back doors are created by
system developers as shortcuts to speed access through security during the development
stage and then are overlooked and never properly removed during final implementation.
Sometimes crackers will create their own back door to a system by using a virus or a Trojan to
set it up, thereby allowing them future access at their leisure.

Black Hat – Just like in the old westerns, these are the bad guys. A black hat is a cracker. To
add insult to injury, black hats may also share information about the “break in” with other black
hat crackers so they can exploit the same vulnerabilities before the victim becomes aware and
takes appropriate measures… like calling Global Digital Forensics!

Bot – A bot is a software “robot” that performs an extensive set of automated tasks on its own.
Search engines like Google use bots, also known as spiders, to crawl through websites in
order to scan through all of your pages. In these cases bots are not meant to interfere with a
user, but are employed in an effort to index sites for the purpose of ranking them accordingly
for appropriate returns on search queries. But when black hats use a bot, they can perform an
extensive set of destructive tasks, as well as introduce many forms of malware to your system
or network. They can also be used by black hats to coordinate attacks by controlling botnets.

Botnet – A botnet is a network of zombie drones under the control of a black hat. When black
hats are launching a Distributed Denial of Service attack for instance, they will use a botnet
under their control to accomplish it. Most often, the users of the systems will not even know
they are involved or that their system resources are being used to carry out DDOS attacks or
for spamming. It not only helps cover the black hat’s tracks, but increases the ferocity of the
attack by using the resources of many computer systems in a coordinated effort.

Cookies – A cookie is a small packet of information from a visited webserver stored on your
system by your computer’s browser. It is designed to store personalized information in order to
customize your next visit. For instance, if you visit a site with forms to fill out on each visit, that
information can be stored on your system as a cookie so you don’t have to go through the
process of filling out the forms each time you visit.

Cracker – When you hear the word hacker today, in reality it is normally referring to a cracker,
but the two have become synonymous. With its origin derived from “safe-cracker” as a way to
differentiate from the various uses of “hacker” in the cyber world, a cracker is someone who
breaks into a computer system or network without authorization and with the intention of doing
damage. A cracker may destroy files, steal personal information like credit card numbers or
client data, infect the system with a virus, or undertake many others things that cause harm.
This glossary will give you an idea of what they can do and some of the means they use to
achieve their malicious objectives. These are the black hats.

Denial of Service Attack (DOS) – A Denial of Service attack is an attack designed to overwhelm
a targeted website to the point of crashing it or making it inaccessible. Along with sheer
numbers and frequency, sometimes the data packets that are sent are malformed to further
stress the system trying to process the server requests. A successful Denial of Service attack
can cripple any entity that relies on its online presence by rendering their website virtually
useless.

60
Distributed Denial of Service Attack (DDOS) – A Distributed Denial of Service attack is done
with the help of zombie drones (also known as a botnet) under the control of black hats using a
master program to command them to send information and data packets to the targeted
webserver from the multiple systems under their control. This obviously makes the Distributed
Denial of Service attack even more devastating than a Denial of Service attack launched from a
single system, flooding the target server with a speed and volume that is exponentially
magnified. As is normally the case with zombie drones and botnets, this is often done without
the user of the controlled system even knowing they were involved.

Dumpster Diving – The act of rummaging through the trash of an individual or business to
gather information that could be useful for a cyber criminal to gain access to a system or attain
personal information to aid them in identity theft or system intrusion. One person’s garbage can
indeed be a cyber criminal’s treasure.

Easter Egg – A non-malicious surprise contained in a program or on a circuit board installed by


the developer. It could be as simple as a text greeting, a signature, or an image embedded on a
circuit board, or comprise a more complex routine, like a video or a small program. The criteria
that must be met to be considered an Easter Egg are that it be undocumented, non-malicious,
reproducible to anyone with the same device or software, not be obvious, and above all – it
should be entertaining!

Firewall – A firewall is a security barrier designed to keep unwanted intruders “outside” a


computer system or network while allowing safe communication between systems and users
on the “inside” of the firewall. Firewalls can be physical devices or software-based, or a
combination of the two. A well designed and implemented firewall is a must to ensure safe
communications and network access and should be regularly checked and updated to ensure
continued function. Black hats learn new tricks and exploit new techniques all the time, and
what worked to keep them out yesterday may need to be adjusted or replaced over time.

Gray Hat – A gray hat, as you would imagine, is a bit of a white hat/black hat hybrid. Thankfully,
like white hats, their mission is not to do damage to a system or network, but to expose flaws
in system security. The black hat part of the mix is that they may very well use illegal means to
gain access to the targeted system or network, but not for the purpose of damaging or
destroying data: they want to expose the security weaknesses of a particular system and then
notify the “victim” of their success. Often this is done with the intent of then selling their
services to help correct the security failure so black hats can not gain entry and/or access for
more devious and harmful purposes.

Hacker – This is the trickiest definition of the group and controversy has followed its use for
decades. Originally, the term hacker had a positive connotation and it actually had nothing to
do with computer systems. In 1946, the Tech Model Railroad Club of MIT coined the term to
mean someone who applies ingenuity to achieve a clever result. Then, when computers came
along, ”hacker” took on the meaning of someone who would “hack” away on a program
through the night to make it better. But in the 80s everything changed, and Hollywood was the
catalyst. When the personal computers onslaught started invading our daily lives, it didn’t take
long for clever screen-writers to bring the black hat villains of the cyber world to the forefront of
our collective consciousness, and they haven’t looked back since. They associated our
deepest fears with the word hacker, making them the ones that unraveled our privacy, put our
safety in jeopardy, and had the power to take everything from us, from our material
possessions to our very identities. And they could do it all anonymously, by hacking away in a
dark room by the dim light of a computer monitor’s glow. Needless to say, right or wrong, it
stuck! Even many professionals in the computing field today have finally, albeit grudgingly,
given in to the mainstream meaning of the word. “Hacker” has thus become the catch-all term
used when in fact it should be “cracker.”

Keylogger – A keylogger is a non-destructive program that is designed to log every keystroke


made on a computer. The information that is collected can then be saved as a file and/or sent

61
to another machine on the network or over the Internet, making it possible for someone else to
see every keystroke that was made on a particular system. By breaking down this information,
it can be easy for a black hat cracker to recreate your user names and passwords, putting all
kinds of information at risk and susceptible to misuse. Just imagine your online banking login
information falling into the wrong hands! Finding out you have a keylogger installed, however,
does not necessarily mean you were the victim of a black hat, as some companies install them
on employee computers to track usage and ensure that systems are not being used for
unintended purposes. Keyloggers are, for obvious reasons, often considered to be spyware.

Logic Bomb – A logic bomb is a malicious program designed to execute when a certain
criterion is met. A time bomb could be considered a logic bomb because when the target time
or date is reached, it executes. But logic bombs can be much more complex. They can be
designed to execute when a certain file is accessed, or when a certain key combination is
pressed, or through the passing of any other event or task that is possible to be tracked on a
computer. Until the trigger event the logic bomb was designed for passes, it will simply remain
dormant.

Malware – Simply put, malware is a malicious program that causes damage. It includes viruses,
Trojans, worms, time bombs, logic bombs, or anything else intended to cause damage upon
the execution of the payload.

Master Program – A master program is the program a black hat cracker uses to remotely
transmit commands to infected zombie drones, normally to carry out Denial of Service attacks
or spam attacks.

Payload – The payload is the part of the malware program that actually executes its designed
task.

Phishing – Phishing is a form of social engineering carried out by black hats in electronic form,
usually by email, with the purpose of gathering sensitive information. Often these
communications will look legitimate and sometimes they will even look like they come from a
legitimate source like a social networking site, a well-known entity like Paypal or Ebay, or even
your bank. They will have a link directing you to a site that looks very convincing and ask you
to verify your account information. When you log in to verify your information on the bogus site,
you have just given the black hat exactly what they need to make you the next victim of cyber
crime. Phishing is done in many forms – sometimes it’s easy to spot, sometimes not.

Phreaker – Considered the original computer hackers, phreakers, or phone phreakers, hit the
scene in the 60s and made their mark by circumventing telecommunications security systems
to place calls, including long distance, for free. By using electronic recording devices, or even
simply creating tones with a whistle, phreakers tricked the systems into thinking it was a valid
call. One of the first to find prominence was “Captain Crunch,” a phreaker who realized the toy
whistle that came as a prize in a box of Captain Crunch cereal could be used to mimic the tone
frequencies used by telecommunications companies to validate and route calls.

Polymorphic Virus – A polymorphic virus is a virus that will change its digital footprint every
time it replicates. Antivirus software relies on a constantly updated and evolving database of
virus signatures to detect any virus that may have infected a system. By changing its signature
upon replication, a polymorphic virus may elude antivirus software, making it very hard to
eradicate.

Rootkit – Without a doubt, the biggest fear in IT security is an undetected intrusion. A rootkit is
a tool that can give a black hat the means for just such a perfect heist. A rootkit is a malware
program that is installed on a system through various means, including the same methods that
allow viruses to be injected into a system, like email, websites designed to introduce malware,
or downloading and/or copying to the system with an unsafe program. Once a rootkit is
introduced, this will create a back door for a black hat that will allow remote, unauthorized
entry whenever he or she chooses. What makes a rootkit particularly lethal: it is installed and

62
functions at such low system levels that it can be designed to erase its own tracks and activity
from the now vulnerable system, allowing the black hat to navigate through entire networks
without being exposed. Often, black hats will use social engineering to gain physical access to
particularly well protected system so the rootkit can be directly installed from CD or a tiny USB
drive (it only takes a minute) in order either to circumvent a particularly troublesome firewall or
gain access to a system that is not normally accessible from the outside. Once the rootkit is
introduced, the black hat has free reign and even skilled IT security departments will have a lot
of trouble even seeing the activity as it’s happening. Rootkits are a definite 10 on the scary
scale of cyber intrusions.

Script Kiddie – An individual who does not possess, or just doesn’t use, their own skills and
know-how to hack or crack a computer system or network, but uses a pre-written program or
piece of code, a script, to do the dirty work. While they may not possess the computing talent,
they can be just as dangerous!

Social Engineering – In the realm of the black hats, social engineering means to deceive
someone for the purpose of acquiring sensitive and personal information, like credit card
details or user names and passwords. For instance, when fictitious Mr. Smith calls from IT
services to inform you of new user name and password guidelines being implemented by the
company and asks you to reveal yours so he can make sure they meet the new guidelines, you
have been a target of social engineering. They can be very clever and resourceful, and very,
very convincing. The only way to make sure you are not a victim of social engineering is never
to give your personal and sensitive information to anyone you are not absolutely sure about.
There are very few occasions that anyone legitimate would ever ask you for a password, and
you should always be the one contacting them, not the other way around.

Spam – Spam is simply unsolicited email, also known as junk email. Spammers gather lists of
email addresses, which they use to bombard users with this unsolicited mail. Often, the emails
sent are simply advertising for a product or a service, but sometimes they can be used for
phishing and/or directing you to websites or products that will introduce malware to your
system. When you receive spam, the best practice is to delete it immediately. Sometimes you
will see a note in a spam email that gives you instructions on how to be removed from the list –
never do it! This will only confirm to the spammer that they have a valid email address and the
spam will just keep coming. They could also then sell your email address to another spammer
as a confirmed email address and more spam will show up in your inbox. Most mail services
have spam filters and these should be employed whenever possible.

Spoofing – Spoofing is the art of misdirection. Black hat crackers will often cover their tracks
by spoofing (faking) an IP address or masking/changing the sender information on an email so
as to deceive the recipient as to its origin. For example, they could send you an email
containing a link to a page that will infect your system with malware and make it look like it
came from a safe source, such as a trusted friend or well-known organization. Most of the true
sources have security measures in place to avoid tampering with sender information on their
own mail servers, but as many black hat spammers will launch attacks from their own SMTP
(Simple Mail Transfer Protocol), they will be able to tamper with that information. When in
doubt, check with the source yourself.

Spyware – Spyware is software designed to gather information about a user’s computer use
without their knowledge. Sometimes spyware is simply used to track a user’s Internet surfing
habits for advertising purposes in an effort to match your interests with relevant ads. On the
other side of the coin, spyware can also scan computer files and keystrokes, create pop-up
ads, change your homepage and/or direct you to pre-chosen websites. One common use is to
generate a pop-up ad informing you that your system has been infected with a virus or some
other form of malware and then force you to a pre-selected page that has the solution to fix the
problem. Most often, spyware is bundled with free software like screen savers, emoticons and
social networking programs.

63
Time Bomb – A time bomb is a malicious program designed to execute at a predetermined
time and/or date. Time bombs are often set to trigger on special days like holidays, or
sometimes they mark things like Hitler’s birthday or 9/11 to make some sort of political
statement. What a time bomb does on execution could be something benign like showing a
certain picture, or it could be much more damaging, like stealing, deleting, or corrupting
system information. Until the trigger time is achieved, a time bomb will simply remain dormant.

Trojan – A Trojan, or Trojan Horse, is a malicious program disguised to look like a valid
program, making it difficult to distinguish from programs that are supposed to be there. Once
introduced, a Trojan can destroy files, alter information, steal passwords or other information,
or fulfill any other sinister purpose it was designed to accomplish. Or it may stay dormant,
waiting for a cracker to access it remotely and take control of the system. A Trojan is a lot like a
virus, but without the ability to replicate.

Virus – A virus is a malicious program or code that attaches itself to another program file and
can replicate itself and thereby infect other systems. Just like the flu virus, it can spread from
one system to another when the infected program is used by another system. The more
interconnected the host is, the better its chances to spread. The spread of a virus can easily
occur on networked systems, or it could even be passed along on other media like a CD or
memory stick when a user unwittingly copies an infected file and introduces it to a new system.
A virus could even be emailed with an attachment. “Virus” is often incorrectly used as a catch-
all phrase for other malicious programs that don’t have the ability to self-replicate, like spyware
and adware.

Wardriving – Wardriving is the act of driving around in a vehicle with the purpose of finding an
open, unsecured Wi-Fi wireless network. Many times, the range of a wireless network will
exceed the perimeter of a building and create zones in public places that can be exploited to
gain entry to the network. Black hats, and even gray hats, will often use a GPS system to make
maps of exploitable zones so they can be used at a later time or passed on to others.
Wardriving is not the only way this task is performed – there are Warbikers and Warwalkers too.
As you can see, it is imperative that your WiFi network is secure because there are entities out
there looking for any opening to ply their trade.

White Hat – While black hats use their skill for malicious purposes, white hats are ethical
hackers. They use their knowledge and skill to thwart the black hats and secure the integrity of
computer systems or networks. If a black hat decides to target you, it’s a great thing to have a
white hat around. But if you don’t, you can always call on one of ours at Global Digital
Forensics.

Worm – A worm is very similar to a virus in that it is a destructive self-contained program that
can replicate itself. But unlike a virus, a worm does not need to be a part of another program or
document. A worm can copy and transfer itself to other systems on a network, even without
user intervention. A worm can become devastating if not isolated and removed. Even if it does
not cause outright damage, a worm replicating out of control can exponentially consume
system resources like memory and bandwidth until a system becomes unstable and unusable.

Zero Day Threat/Exploit – Every threat to your computer security has to start somewhere.
Unfortunately, the way most of us protect ourselves from cyber threats and intrusions, is to use
detection programs that are based on analyzing, comparing and matching the digital footprint
of a possible threat to an internal database of threats that have been previously detected,
reported and documented. That’s why we all have to go through those seemingly never-ending
updates to our antivirus programs, that’s how the database is updated and the newest threats
are added to the list of what the scanners look for. That inherent flaw in our scanners is what
makes a Zero Day threat so dangerous. A Zero Day threat is pristine and undocumented. From
the very first day a particular threat is ever deployed (zero day) until that threat is noticed,
reported, documented and added to the index, it is an unknown. As far as standard protection

64
goes, unknown means invisible – and when it comes to cyber threats, invisible can definitely
mean trouble.

Zombie / Zombie Drone – A zombie is a malware program that can be used by a black hat
cracker to remotely take control of a system so it can be used as a zombie drone for further
attacks, like spam emails or Denial of Service attacks, without a user’s knowledge. This helps
cover the black hat’s tracks and increases the magnitude of their activities by using your
resources for their own devious purposes. Rarely will the user infected with a zombie even
know it’s there, as zombies are normally benign and non-destructive in and of themselves.
Zombies can be introduced to a system by simply opening an infected email attachment, but
most often they are received through non-mainstream sites like file sharing sites, chat groups,
adult websites and online casinos that force you to download their media player to have
access to the content on their site, using the installed player itself as the delivery mechanism.

65
US Army Forges Ahead in Their Commitment to 3D
Printing
by Bridget Butler Millsaps | Aug 21, 2017 | 3D Printing, Aerospace 3D Printing, Business |

There are so many examples today that demonstrate the impact 3D printing is having all over
the world, and in so many different areas of industry. But if you wonder what the true potential
for the future of 3D printing technology is, just take stock of its biggest fans. While we report on
many different innovations via NASA today, we also follow numerous stories regarding the uses
of 3D printing in the military—often including the US Army.

It would seem that they have taken stock of and are ready to take advantage of nearly every
benefit of 3D printing from the intrinsic affordability and self-sustainability in manufacturing out
in field to the ability to make prototypes and parts not previously possible. This is evidenced by
their interest in making everything from customized military meals to 3D printed grenade
launchers—with 3D printed grenades, of course.

Now, the Army is releasing a report of how far they have progressed with 3D printing, and what
they intend to do in the future. Their report begins by pointing out how important 3D printing
can be to soldiers in remote areas, as they can make whatever they need, whether that is
sustenance, a new gun, or perhaps even bioprinted cells to heal a wound or a severe burn.

“Additive manufacturing technology has the ability to improve the performance of Army
weapon systems on the battlefield. Additionally, 3D printing gives the Army a tactical
advantage by providing the ability to manufacture and produce items as close to the point of
need as possible. This will not only lighten the logistics burden but also improve the efficiency
of the acquisition process. By simplifying the process of repairing or producing spare parts, the
Army will make critical gains in readiness,” states the Army.

66

These parts were made using additive manufacturing, which creates plastic items and other
durable components by adding material, layer by layer, using 3-D printers. [Photo: U.S. Army]

They have created a plan for their 3D printing goals, known as the Additive Manufacturing
Technology Roadmap. According to the Army, this was combined with the Department of
Defense (DOD) Roadmap, outlining goals for all branches of the military.

“The DOD roadmap also identifies current and future capabilities that are needed to enable AM
and areas for collaboration,” states the Army. “These common standards set out in the
roadmap will enable the DOD, industry, and academia to effectively use AM.”

Their 3D printing plan has been implemented in three steps, beginning with 3D printing to make
or replace existing parts. This has already been helpful for many parts of the military—even if
they are just 3D printing temporary parts until the others can be received. 3D printing is also
helpful in prototyping new parts. In the second part of their plan, they are eliminating multi-part
assembly. The Army also plans to begin creating new parts that did not exist previously.

67

This breaching tool, which is used to open doors and crates or to cut wires and other material,
evolved from the initial pattern on the left to the final product on the far right. Based on Soldier
feedback on the original design, contouring to the handle for safety and grip was added, as
well as quick change blades and hex holes so that it can be used as a wrench. [Photo: U.S.
Army]

They will also collaborate with the Army’s Rapid Equipping Force (REF) in the creation and
managing of expeditionary laboratories. The Ex Labs will be deployed around the globe and
are meant to support ‘forward-deployed Soldiers.’ The US Army will also be working with
RDECOM on a system that offers ‘containerized’ 3D printing. It is already en route to Thailand
and Japan where it will be used in the multi-national Pacific Pathways exercise.

“The Army relies on the manufacturing prowess of industry to keep our Soldiers the best-
equipped in the world because having the best equipment, the right equipment in the right
quantity when you need it is an essential component of making our Soldiers the safest and
most effective in the world,” said Maj. Gen. Cedric T. Wins, commanding general, U.S. Army
Research, Development and Engineering Command (RDECOM).

Discuss in the Army forum at 3DPB.com.

68
Putin says the nation that leads in AI ‘will be the ruler
of the world’
The Russian president warned that artificial intelligence offers ‘colossal opportunities’ as well
as dangers

By James Vincent@jjvincent Sep 4, 2017, 4:53am EDT

“Artificial intelligence is the future, not only for Russia, but for all humankind,” said Putin,
reports RT. “It comes with colossal opportunities, but also threats that are difficult to predict.
Whoever becomes the leader in this sphere will become the ruler of the world.”

““IT COMES WITH COLOSSAL OPPORTUNITIES, BUT ALSO THREATS.”

The development of artificial intelligence has increasingly become a national security concern
in recent years. It is China and the US (not Russia) which are seen as the two frontrunners, with
China recently announcing its ambition to become the global leader in AI research by 2030.
Many analysts warn that America is in danger of falling behind, especially as the Trump
administration prepares to cut funding for basic science and technology research.

Although it’s thought that artificial intelligence will help boost countries’ economies in a number
of areas, from heavy industry to medical research, AI technology will also be useful in warfare.
Artificial intelligence can be used to develop cyber weapons, and control autonomous tools like
drone swarms — fleets of low-cost quadcopters with a shared ‘brain’ that can be used for
surveillance as well as attacking opponents.

Both China and the US are currently researching this technology, and in his speech on Friday,
Putin predicted that future wars would be fought by countries using drones. “When one party's
drones are destroyed by drones of another, it will have no other choice but to surrender,” said
the Russian president, according to the Associated Press.

Recently, Elon Musk and 116 other technology leaders sent a petition to the United Nations
calling for new regulations on how such AI weapons are developed. The group stated that the
introduction of autonomous technology would be tantamount to a “third revolution in warfare,”
following the development of gunpowder and nuclear weapons.

An AI arms race doesn’t necessarily have to be a winner-takes-all scenario, though. Putin


noted that Russia did not want to see any one country “monopolize” the field, and said instead:
“If we become leaders in this area, we will share this know-how with entire world, the same
way we share our nuclear technologies today.”

69
NSA Surveillance Program
The National Security Agency’s mass surveillance has greatly expanded in the years since
September 11, 2001. Disclosures have shown that, until recently, the government regularly
tracked the calls of hundreds of millions of Americans. Today, it continues to spy on a vast but
unknown number of Americans’ international calls, text messages, web-browsing activities,
and emails.

The government’s surveillance programs have infiltrated most of the communications


technologies we have come to rely on. They are largely enabled by a problematic law passed
by Congress — the FISA Amendments Act (FAA), which is set to expire this year — along with
Executive Order 12,333, the primary authority invoked by the NSA to conduct surveillance
outside of the United States. The Patriot Act has also made it easier for the government to spy
on Americans right here at home over the past 15 years. Although the Foreign Intelligence
Surveillance Court oversees some of the government’s surveillance activities, it operates in
near-total secrecy through one-sided procedures that heavily favor the government.

Our Constitution and democratic system demand that government be transparent and
accountable to the people, not the other way around. History has shown that powerful, secret
surveillance tools will almost certainly be abused for political ends.

The ACLU has been at the forefront of the struggle to rein in the surveillance superstructure,
which strikes at the core of our rights to privacy, free speech, and association.

Surveillance Under the FISA Amendments Act

The FISA Amendments Act of 2008 (FAA) gives the NSA almost unchecked power to monitor
Americans’ international phone calls, text messages, and emails — under the guise of targeting
foreigners abroad. The ACLU has long warned that one provision of the statute, Section 702,
would be used to eavesdrop on Americans’ private communications. In June 2013, The
Guardian published documents provided by whistleblower Edward Snowden confirming the
massive scale of this international dragnet. Recent disclosures also show that an unknown
number of purely domestic communications are monitored, that the rules that supposedly
protect Americans' privacy are weak and riddled with exceptions, and that virtually every email
that goes into or out of the United States is scanned for suspicious keywords.

LEARN MORE ABOUT SECTION 702

In 2008, less than an hour after President Bush signed the FAA into law, the ACLU filed a
lawsuit challenging its constitutionality. The case, Amnesty v. Clapper, was filed on behalf of a
broad coalition of attorneys and organizations whose work requires them to engage in sensitive
and sometimes privileged telephone and email communications with individuals located
abroad. But in a 5–4 ruling handed down in February 2013, the Supreme Court held that the
ACLU plaintiffs did not have “standing” to sue because they could not prove their
communications had actually been surveilled under the law.

In March 2015, the ACLU filed Wikimedia Foundation v. NSA, a lawsuit challenging “Upstream”
surveillance under the FAA. Through Upstream surveillance, the U.S. government copies and
searches the contents of almost all international — and many domestic — text-based internet
communications. The suit was brought on behalf of nine educational, legal, human rights, and
media organizations, including the Wikimedia Foundation, operator of one of the most-visited
websites on the internet. Collectively, the plaintiffs engage in more than a trillion sensitive
internet communications every year, and each has been profoundly harmed by NSA
surveillance.

Surveillance Under Executive Order 12,333

70
Executive Order 12,333, signed by President Reagan in 1981 and modified many times since,
is the authority primarily relied upon by the intelligence agencies to gather foreign intelligence
outside of the United States. Recent disclosures indicate that the U.S. government operates a
host of large-scale programs under EO 12333, many of which appear to involve the collection
of vast quantities of Americans’ information. These programs have included, for example, the
NSA’s collection of billions of cellphone location records each day; its recording of every single
cellphone call into, out of, and within at least two countries; and its surreptitious interception of
data from Google and Yahoo user accounts as that information travels between those
companies’ data centers located abroad.

In December 2013, the ACLU, along with the Media Freedom Information Access Clinic at Yale
Law School, filed a Freedom of Information Act lawsuit demanding that the government release
information about its use of EO 12,333 to conduct surveillance of Americans’ communications.

Surveillance Under the Patriot Act

For many years, the government claimed sweeping authority under the Patriot Act to collect a
record of every single phone call made by every single American "on an ongoing daily basis."
This program not only exceeded the authority given to the government by Congress, but it
violated the right of privacy protected by the Fourth Amendment, and the rights of free speech
and association protected by the First Amendment. For this reason, the ACLU challenged the
government's collection of our phone records under Section 215 of the Patriot Act just days
after the program was revealed in June 2013 by The Guardian. In May 2015, a court of appeals
found that the phone records program violated Section 215, and Congress allowed the
provision to expire in June of that year. The program was reformed by the USA Freedom Act,
which passed days later.

To bring greater transparency to the NSA's surveillance under the Patriot Act, the ACLU filed
two motions with the secretive FISC asking it to release to the public its opinions authorizing
the bulk collection of Americans' data by the NSA.

Our earlier work to reform the Patriot Act includes a number of successful challenges to the
government's use of and secrecy surrounding National Security Letters.

Bringing Transparency to the FISA Court

The ACLU has long fought to bring greater transparency and public access to the FISC — the
secretive court that oversees the government’s surveillance programs. When the FISC was first
established in 1978, it primarily assessed individual surveillance applications to determine
whether there was probable cause to believe a specific surveillance target was an agent of a
foreign power. In recent years, however, the FISC’s responsibilities have changed dramatically,
and the FISC today oversees sweeping surveillance programs and assesses their
constitutionality — all without any public participation or review.

The ACLU has been advocating and petitioning for access to the FISC for more than a decade,
working with Congress and the executive branch, and appearing before the court itself to push
for greater transparency. Days after the court’s Section 215 order was published in the press in
June 2013, we filed a motion seeking access to the secret judicial opinions underlying the
NSA's mass call tracking program. We have since filed two other access motions in the FISC,
seeking significant legal opinions authorizing bulk collection and those interpreting the
government’s secret surveillance powers in the years after 9/11. We also signed a brief filed in
the FISC in support of the First Amendment rights of the recipients of FISC orders, such as
telephone and internet companies, to release information about the type and volume of
national security requests they receive from the NSA and the FBI.

Secret law has no place in a democracy. Under the First Amendment, the public has a qualified
right of access to FISC opinions concerning the scope, meaning, or constitutionality of the
surveillance laws, and that right clearly applies to legal opinions interpreting Americans'

71
bedrock constitutional rights. We all have a right to know, at least in general terms, what kinds
of information the government is collecting about innocent Americans, on what scale, and
based on what legal theory.


72
AR15 Parts

73
Part Three
Homemade Explosives

74
Plastic Explosive Filler
A plastic explosive filler can be made from potassium chlorate and petroleum jelly. This
explosive can be detonated with commercial #8 or any military blasting cap.

Procedure

1. Spread potassium chlorate crystals thinly on a hard surface. Roll the round stick over
crystals to crush into a very fine powder until it looks like face powder or wheat flour.

2. Place 9 parts powdered potassium chlorate and 1 part petroleum jelly in a wide bowl or
similar container. Mix ingredients with hands (knead) until a uniform paste is obtained.

Note: Store explosive in a waterproof container until ready to use.

Improvised Black Powder


Black powder can be prepared in a simple, safe manner. It may be used as blasting or gun
powder.

75
Note: The above amounts will yield two pounds (900 grams) of black powder. However, only
the ratios of the amounts of ingredients are important. Thus, for twice as much black powder,
double all quantities used.

Procedure

1. Place alcohol in one of the buckets.

2. Place potassium nitrate, charcoal, and sulfur in the heat resistant bucket. Add 1 cup water
and mix thoroughly with wooden stick until all ingredients are dissolved.

3. Add remaining water (2 cups) to mixture. Place bucket on heat source and stir until small
bubbles begin to form.

Caution: Do not boil mixture. Be sure all mixture stays wet. If any is dry, as on sides of pan, it
may ignite.

4. Remove bucket from heat and pour mixture into alcohol while stirring vigorously.

5. Let alcohol mixture stand about 5 minutes. Strain mixture through cloth to obtain black
powder. Discard liquid. Wrap cloth around black powder and squeeze to remove all excess
liquid.

6. Place screening over dry bucket. Place workable amount of damp powder on screen and
granulate by rubbing solid through screen.

Note: If granulated particles appear to stick together and change shape, recombine entire
batch of powder and repeat steps 5 and 6.

7. Spread granulated black powder on flat dry surface so that layer about 1/2 inch (1-1/4 cm) is
formed. Allow to dry. Use radiator, or direct sunlight. This should be dried as soon as possible,
preferably in one hour. The longer the drying period, the less effective the black powder.

Caution: Remove from heat as soon as granules are dry. Black powder is now ready for use.

Fertilizer Explosive
An explosive munition can be made from fertilizer grade ammonium nitrate and either fuel oil or
a mixture of equal parts of motor oil and gasoline. When properly prepared, this explosive
munition can be detonated with a blasting cap.

Procedure

76
1. Spread a handful of the ammonium nitrate on the large flat board and rub vigorously with the
other board until the large particles are crushed into a very fine powder that looks like flour
(approximately 10 minutes).

Note: Proceed with step 2 as soon as possible since the powder may take moisture from the
air and become spoiled.

2. Mix one measure (cup, tablespoon, etc.) of fuel oil with 16 measures of the finely ground
ammonium nitrate in a dry bucket or other suitable container and stir with the wooden rod. If
fuel oil is not available, use one half measure of gasoline and one half measure of motor oil.
Store in a waterproof container until ready to use.

3. Spoon this mixture into an iron or steel pipe which has an end cap threaded on one end. If
a pipe is not available, you may use a dry tin can, a glass jar or a heavy-walled cardboard tube.

Note: Take care not to tamp or shake the mixture in the pipe. If mixture becomes tightly
packed, one cap will not be sufficient to initiate the explosive.

4. Insert blasting cap just beneath the surface of the explosive mix.

Note: Confining the open end of the container will add to the effectiveness of the explosive.

Pipe Hand Grenade


Hand grenades can be made from a piece of iron pipe. The filler can be plastic or granular
military explosive, improvised explosive, or propellant from shotgun or small arms ammunition.

Procedure

77
1. Place blasting cap on one end of fuse cord and crimp with pliers.

Note: To find out how long the fuse cord should be, check the time it takes a known length to
burn. If 12 inches burns in 30 seconds, a 6-inch cord will ignite the grenade in 15 seconds.

2. Screw pipe cap to one and of pipe. Place fuse cord with blasting cap into the opposite end
so that the blasting cap in near the center of the pipe.

Note: If plastic explosive is to be used, fill pipe before inserting blasting cap. Push a round
stick into the center of the explosive to make a hole and then insert the blasting cap.

3. Pour explosive or propellant into pipe a little bit at a time. Tap the base of the pipe frequently
to settle filler.

4. Drill a hole in the center of the unassembled pipe cap large enough for the fume cord to
pass through.

5. Wipe pipe threads to remove any filler material. Slide the drilled pipe cap over the fuse and
screw hand tight onto the pipe.

Nail Grenade
Effective fragmentation grenades can be made from a block of TNT or other blasting explosive
and nails.

Materials Required

Block of TNT or other blasting explosive

Nails

Nonelectric military blasting cap

Fuse Cord

Tape, string, wire or glue

Procedure

78
1. If an explosive charge other than a standard TNT block is used, make a hole in the center of
the charge for inserting the blasting cap. TNT can be drilled with relative safety. With plastic
explosives, a hole can be made by pressing a round stick into the center of the charge. The
hole should be deep enough that the blasting cap is totally within the explosive.

2. Tape, tie or glue one or two rows of closely packed nails to sides of explosive block. Nails
should completely cover the four surfaces of the block.

3. Place blasting cap on one end of the fuse cord and crimp with pliers.

4.

Insert the blasting cap in the hole in the block of explosive. Tape or tie fuse cord securely in
place so that it will not fall out when the grenade is thrown.

Alternate Use

Note: To find out how long the fuse cord should be, check the time it takes a known length to
burn. If 12 inches (30 cm) burns for 30 seconds, a 10 second delay will require a 4 inch (10 cm)
fuse.

An effective directional antipersonnel mine can be made by placing nails on only one side of
the explosive block. For this came, an electric blasting cap can be used.

Mortar Scrap Mine


A directional shrapnel launcher that can be placed in the path of advancing troops.

Note: Be sure pipe has no cracks or flaws.

Procedure

1. Screw threaded cap onto pipe.

2. Place propellant and igniter in paper or rag and tie package with string so contents will not
fall out.

3. Insert packaged propellant and igniter into pipe until package rests against threaded cap
leaving firing leads extending from open end of pipe.

79
4. Roll rag till it is about 6 inches (15-1/2 cm) long and the same diameter as pipe. Insert rag
wadding against packaged propellant igniter. With caution, pack tightly using stick.

5. Insert stones and/or scrap metal into pipe.

6. Insert second piece of rag wadding against stones and/or metal scrap. Pack tightly as
before.

How to Use

1. Bury pipe in ground with open end facing the expected path of the enemy. The open end
may be covered with cardboard and a thin layer of dirt or leaves as camouflage.

2. Connect firing leads to battery and switch. Mine can be remotely fired when needed or
attached to trip device placed in path of advancing troops.

Note: A nonelectrical ignition system can be substituted for the electrical ignition system as
follows. 1. Follow above procedure, substituting safety fuse for igniter.

2. Light safety fuse when ready to fire.

Electric Bulb Initiator


Mortars, mines and similar weapons often make use of electric initiators. An electric initiator
can be made using a flash light or automobile electric light bulb.

Materials Required:

Electric light bulb and mating socket

Cardboard or heavy paper

Black powder

Adhesive tape

Procedure Method I

1. Break the glass of the electric light bulb. Take care not to damage the filament. The initiator
will not work if the filament is broken. Remove all glass above the base of the bulb.

2. Form a tube 3 to 4 inches long from cardboard or heavy paper to fit around the base of the
bulb. Join the tube with adhesive tape.

3. Fit the tube to the bulb base and tape in place. Make sure that the tube does not cover that
portion

of the bulb base that fits into the socket.

4. If no socket is available for connecting the initiator to the firing circuit, solder the connecting
wires to the bulb base.

Caution: Do not use a hot soldering iron on the completed igniter since it may ignite the black
powder.

5. Fill the tube with black powder and tape the open end of the tube closed.

Method II

If the glass bulb (electric light) is large enough to hold the black powder, it can be used as the
container.

80
Procedure:

1. File a small hole in the top of the bulb.

2. Fill the bulb with black powder and tape the hole closed.

Delay Igniter from Cigarette


A simple and economical time delay can be made with a common cigarette.

Materials Required:

Cigarette

Paper match

String (shoelace or similar cord)

Fuse cord (improvised or commercial)

Procedure

1. Cut end of fuse cord to expose inner core.

2. Light cigarette in normal fashion. Place a paper match so that the head is over exposed end
of fuse cord and tie both to the side of the burning cigarette with string.

3. Position the burning cigarette with fuse so that it burns freely. A suggested method is to
hang the delay on a twig.

Note:

Common dry cigarettes burn about 1 inch every 7 or 8 minutes in still air. If the fuse cord is
placed 1 inch from the burning end of a cigarette a time delay of 7 or 8 minutes will result.

Delay time will vary depending upon type of cigarette, wind, moisture, and other atmospheric
conditions. To obtain accurate delay time, a test run should be made under “use” conditions.

Watch Delay Timer


A time delay device for use with electrical firing circuits can be made by using a watch with a
plastic crystal.

Materials Required:

Watch with plastic crystal

Small clean metal screw

Battery

Connecting wires

Drill or nail

Procedure

81
1. If watch has a sweep or large second hand, remove it. If delay time of more than one hour is
required, also remove the minute hand. If hands are painted, carefully scrape paint from
contact edge with knife.

2. Drill a hole through the crystal of the watch or pierce the crystal with a heated nail. The hole
must be small enough that the screw can be tightly threaded into it.

3. Place the screw in the hole and turn down as far as possible without making contact with
the face of the watch. If screw has a pointed tip, it may be necessary to grind the tip flat.

If no screw is available, pass bent stiff wire through the hole and tape to the crystal.

Important: Check to make sure hand of watch cannot pass screw or wire without contacting it.
How to Use

1. Set the watch so that a hand will reach the screw or wire at the time you want the firing
circuit completed.

2. Wind the watch.

3. Attach a wire from the case of the watch to one terminal of the battery.

4. Attach one wire from an electric initiator (blasting cap, squib, or alarm device) to the screw or
wire on the face of the watch.

5. After thorough inspection is made to assure that the screw or the wire connected to it is not
touching the face or case of the watch, attach the other wire from the initiator to the second
terminal of the battery.

Caution: Follow step 5 carefully to prevent premature initiation.

Mercury Fulminate
Description

Mercury fulminate is an initiating explosive, commonly appearing as white or gray crystals. It is


extremely sensitive to initiation by heat, friction, spark or flame, and impact. It detonates when
initiated by any of these means. It is pressed into containers, usually at 3000 pounds per
square inch (20 mPa), for use in detonators and blasting caps. However, when compressed at
greater and greater pressure (up to 30,000 pounds per square inch or 200 mPa), it becomes
“dead pressed.” In this condition, it can only be exploded by another initial detonating agent.
Mercury fulminate gradually becomes inert when stored continuously above 100°F. A dark-
colored product of deterioration gives evidence of this effect. Mercury fulminate is stored
underwater except when there is danger of freezing. Then it is stored under a mixture of water
and alcohol.

Comments

This material was tested. It is effective.

References

TM 9-1900, Ammunition, General, page 59. TM 9-1910, Military Explosives, page 98.

A1.2 Lead Styphnate

Description

Lead styphnate is an initiating explosive, commonly appearing in the form of orange or brown
crystals. It is easily ignited by heat and static discharge but cannot be used to initiate
secondary high explosives reliably. Lead styphnate is used as an igniting charge for lead azide
and as an ingredient in priming mixtures for small arms ammunition. In these applications, it is

82
usually mixed with other materials first and then pressed into a metallic container (detonators
and primers). Lead styphnate is stored under water except when there is danger of freezing.
Then it is stored under a mixture of water and alcohol.

Comments

This item was tested. It is effective.

References

TM 9-1900, Ammunition, General, page 59. TM 9-1910, Military Explosives, page 107.

Lead Azide
Description

Lead azide is an initiating explosive and is produced as a white to buff crystalline substance.

It is a more efficient detonating agent than mercury fulminate and it does not decompose on
long continued storage at moderately elevated temperatures. It is sensitive to both flame and
impact but requires a layer of lead styphnate priming mixture to produce reliable initiation when
it is used in detonators that are initiated by a firing pin or electrical energy. It is generally loaded
into aluminum detonator housings and must not be loaded into housing of copper or brass
because extremely sensitive copper azide can be formed in the presence of moisture.

Comments

This material was tested. It is effective.

References

TM 9-1900, Ammunition, General, page 60. TM 9-1910, Military Explosives, page 103.

DDNP
Description

DDNP (diazodinitrophenol is a primary high explosive. It is extensively used in commercial


blasting caps that are initiated by black powder safety fuse. It is superior to mercury fulminate
in stability but is not as stable as lead azide. DDNP is desensitized by immersion in water.

Comments

This material was tested. It is effective.

References

TM 9-1900, Ammunition, General, page 60. TM 9-1910, Military Explosives, page 103.


83
An Ex-Cop's Guide to Not
Getting Arrested
MIKE RIGGS NOV 7, 2013

SHARE

TWEET

Dale Carson is a defense attorney in Jacksonville, Florida, as well


as an alumnus of the Miami-Dade Police Department and the FBI.
So he knows a thing or two about how cops determine who to
hassle, and what all of us can do to not be one of those people.
Carson has distilled his tips into a book titled Arrest-Proof
Yourself, now in its second edition. It is a legitimately scary book
—369 pages of insight on the many ways police officers profile
and harass the people on their beat in an effort to rack up as many
arrests as possible. 
"Law enforcement officers now are part of the revenue gathering
system," Carson tells me in a phone interview. "The ranks of cops
are young and competitive, they’re in competition with one
another and intra-departmentally. It becomes a game. Policing
isn’t about keeping streets safe, it’s about statistical success. The
question for them is, Who can put the most people in jail?"
Which would make the question for you and me, how can we
stay out of jail? Carson's book does a pretty good job of
explaining—in frank language—how to beat a system that's
increasingly predatory.
.cls-1{fill:#fff;}citylab
Love CityLab? Sign up for our free email newsletter.

84
Be Invisible to Police
Carson has four golden rules, the first of which is, "If police can't see you, they can't arrest
you." The simplest application of this concept is that if you plan on doing something illegal, you
should do it in the privacy of your home. Yes, you can be arrested while at home, but you can't
be profiled sitting in your living room, and profiling is what you're trying to avoid. 

Planning on consuming illegal drugs? Stay at home.

The rule extends to activities that are perfectly legal. "In 21st century America," he writes, "as
long as you're not committing a crime, you should be able to wear the wildest clothes you
want, roam the streets when you feel like it, and lean on a light post or hang out at some wild
club if it amuses you." "Should" is the key word. In reality, cops love hassling people who stand
out, even though it's not illegal to, say, have a Buckeyes bumper sticker that looks like a pot
leaf. If you drive a sports car or a lowrider, you're more likely to attract a cop's attention than if
you drive, say, a gray Honda Civic. Same goes for clothes, hairstyles, tone and volume of
voice. Be boring.  

So try to blend in. Beat cops who patrol the same routes day after day are "incredibly attuned
to incongruity." But don't be too reactive when you see cops. "Police are visual predators,"
Carson writes. "Any sudden change in motion, speed, direction or behavior immediately
attracts their attention." That means even if you're doing something you think might attract a
cop's attention, quickly doing something else will attract even more attention. "Don't alter the
pattern," Carson advises. "Keep on keeping on." 

Also, if you can help it, don't go out after dark. 

What if I can't be invisible to police?

If police want to hassle you, they're going to, even if you're following the above tips as closely
as possible. What then? Every interaction with a police officer entails two contests: One for
"psychological dominance" and one for "custody of your body." Carson advises giving in on
the first contest in order to win the second. Is that belittling? Of course. "Being questioned by
police is insulting," Carson writes. "It is, however, less insulting than being arrested. What I'm
advising you to do when questioned by police is pocket the insult. This is difficult and
emotionally painful."

Winning the psychological battle requires you to be honest with cops, polite, respectful, and
resistant to incitement. "If cops lean into your space and blast you with coffee-and-stale-donut
breath, ignore it," Carson writes. Same goes for if they poke you in the chest or use racial slurs.
"If you react, you'll get busted." Make eye contact, but don't smile. "Cops don't like smiles."
Always tell the truth. "Lying is complicated, telling the truth is simple." 

He also says you should be dignified—unless it looks like you're about to lose both the
psychological contest and the one for custody of your body. In which case, you should be
strategically pitiful. 

First off, you should ask for a notice to appear as an alternative to being arrested. You still have
to go before a judge, but you can go under your own power without first going to jail. Carson
says the least degrading way to get a cop to issue you a notice in lieu of arresting you is to tell
them that you're not a hardened criminal and that being arrested (and having your mugshot
taken) is going to impact your employment, education and/or family. 

And if that doesn't work? It's debasement time. Start with crying. Bawl hard while begging for
a notice (the option here is a notice or jail, not notice/jail or getting off scot free). "Don't waste

85
time worrying about what your friends will think," Carson says. "If they're with you, they're
getting arrested too." If they're not with you, they won't know. 

If crying fails, and you're willing to do whatever it takes to not go to jail, Carson advises you to
"foul yourself so that the police will consider setting you free in order not to get their cruiser
nasty." Vomit on your clothes. Defecate and urinate in your pants. Then let the officers know
what you've done. If they arrest you anyway, you'll get cleaned and reclothed at the jail. 

Reasonable things you should never do 

If you're driving too fast and see a police car up ahead, don't hit the brakes. "If you suddenly
hit the brakes," Carson writes, "cops in front of you will see your front end dip, a tip-off that
you were speeding." Don't drive perfectly, or too slow. Don't slouch or put too much heavy
stuff in your trunk, causing your car to ride low. If you're a dude, and you want to roll around
town with your fellow dudes, be prepared for a stop. "When cops see four young males in a
car, they immediately wonder if this is a crew of criminals out to do a job." If you're going to
ride four deep, have one member of your car wear a highly visible item of clothing indicating
what you do for a living. For instance, if you're all construction workers car-pooling on the way
home from a job site, someone in the car should wear a hard hat. Seriously. 

Another reasonable thing you should never do? Allow a cop to search your car. There are many
loopholes that allow cops to search your car without probable cause or a warrant, but Carson
advises you to say no every time. You should still follow all the rules of a traffic stop—keep
hands where cops can see them, give them your paperwork, get out of the car if they ask you
to—but never let them search. Always, always, always say no (politely). 

86
Appendix

87
2018 List of Secure Emails
▪ ProtonMail – protonirockerxow.onion

▪ Torbox – torbox3uiot6wchz.onion

▪ Bitmessage – bitmailendavkbec.onion, clearweb

▪ Mail2Tor – mail2tor2zyjdctd.onion

▪ RiseUp – nzh3fv6jc6jskki3.onion, clearweb

▪ Cock.li (NSFW) – cockmailwwfvrtqj.onion, clearweb

▪ Lelantos – lelantoss7bcnwbv.onion paid accounts only

▪ Autistici – wi7qkxyrdpu5cmvr.onion, clearweb

▪ AnonInbox – ncikv3i4qfzwy2qy.onion paid accounts only

▪ VFEMail – 344c6kbnjnljjzlz.onion, clearweb


88
Security Points for Beginner Deep Web Users
1). Setup your secure deep web access network, For help, check out how to access the deep
web guide.

2) Unplug your webcam or cover webcam by black tape.

3). Generate a second identity(Virtual Identity for Deep Web) that you can use them all over the
deep web

4). Don’t use any personal information for your second identity.

5). Always use anonymous email service for account creation.

Recommendation: only use emails that offer client end encryption or decryption. I am using
protonmail.com or tutanota.com both are trusted email services and mostly user prefers both
of these.

6). When accessing the Deep Web, close all other programs or software running on your
system.

SECURITY POINTS FOR MEDIUM OR ADVANCED DEEP WEB USERS:

7).  Always check for Updates on Tor Browser, be quick to get the updates installed as soon as
they’re available.

8). Check the Tor browser’s “Javascript Enable or Disable” status.

Recommended: always stop javascript when you are accessing any deep web sites.

9). Before you access any hidden wiki links, you can and should use “New Identity” or “New
Tor Circuit” setting using:

New Identity: Ctrl+Shift+U

New Tor Circuit for This Site: Ctrl+Shift+L

10). If 2FA (2 Factor Authentication) is being offered by any site, make sure you use it. Mostly
sites allow PGP authentication If you are not aware with PGP and want to know more then
check out PGP Guide for beginner users.

11). Only access the deep web on trusted devices, don’t use any other person’s laptop or
desktop to access the Deep web.

12). Highly recommended point: For you security first run your Nord VPN software client and
only after a connection is established start Tor browser.

Note: If you are a security geek and wish to protect the security of all the members who are
using your home internet network then you may and should use a VPN router for a VPN
protected wireless network.


89
2018 Deep Web Links
http://pnxauh22krzb5xso.onion/ – Blogs – The Hack Lair – deep
web blog that offers lot or short hacking tutorials, if you want to
learn these tutorials then you can read these short tutorials on the
Hack Lair site.

http://js27scjrosjfuviu.onion/ – Blogs – Cryptoblog – Do you want


to read some tech articles on the deep web, this blog have right
now 2 article at my explore time.. If you want to read this blog
then you can click on the given link.

http://ozawuyxtechnopol.onion/ – Blogs – Techn0Plis – Deep web


blog where you can read anonymous articles, available articles
may be related to government policy, politics, crime or anything.
Article is written in the French language, if you know French then
you may try to explore given onion link.

http://tpq5sxk5cgdf35uq.onion/ – Blog/Tech – BestBlog: This is


very good Tech blogs on Dark Net world, Hope you also enjoy this
site stuff, I regularly visit this site.

http://cjtjunfc4ykpdw5v.onion – Deep web blogs – Eposing the


Internet: This is the biggest deep web (dark web) information
portal which having some advanced level projects information and
Videos. hope you will enjoy great amount of dark web information
gernals.

http://shadow7jnzxjkvpz.onion/ – Blogs – Shadow Life: Here you


can get latest deep web links news and updates.

http://ol346fucnsjru223.onion/ – Blogs – CryptoNote: Know


information about CryptoNote, CryptoNote is also cryptocurrency.

90
http://b2lqdo3v4tphyqbf.onion/ – Blogs – Caught in the Crossfire:
A wave of non-criminal users is joining the dark web and stepping
into the middle of a privacy battle, This onion link offer only one-
page stuff which you can on the homepage, that content look like
a story about the dark web.

http://cbnujyutccrk267j.onion/posts.html – Blogs – The


Anonymous Gateway: This deep web blog offers anonymous
gateway related updates and news.

http://kxojy6ygju4h6lwn.onion/ – Blogs – Flashlight: This is the


best deep web blog ever, everyday updating about latest hidden
web news, bitcoins updates and many more.

http://kzfzhi4nsvzx4rr3.onion/ – Blogs – HackManhattan:  finding


some good hidden wiki blog, and want to get some interesting
articles then this deep web links will help you.

http://apfront5qxkubpis.onion/– Blogs/News – Antipuritansky Front


– This is the open community based deep web sites, which
always updated news related to sexual freedom, against sexual
violence, Here you can get videos, docs related to sexual freedom
or violence.

http://cpbeftwgsfw7jsyt.onion/ – Blog/Document/Research Paper


– Index of/: Another FTP directory based deep web links, which
have more than 1000+ chemistry, cannabis, pharmacology and
Rhodium collection pdf, research paper and text files. And
directory structure are sorted into well format.

http://264nglqbtqlabsxl.onion/ – Blogs/Hacking – Cyber Guerrilla:


this site having good amount of latest hacking related blog post,
guide type tutorials.


91
Police Scanner Codes

10-0 Caution
10-1 Unable to copy — change location
10-2 Signal good
10-3 Stop transmitting
10-4 Acknowledgement (OK)
10-5 Relay
10-6 Busy — stand by unless urgent
10-7 Out of service
10-8 In service
10-9 Repeat
10-10 Fight in progress
10-11 Dog case
10-12 Stand by (stop)
10-13 Weather — road report
10-14 Prowler report
10-15 Civil disturbance
10-16 Domestic disturbance
10-17 Meet complainant
10-18 Quickly
10-19 Return to …
10-20 Location
10-21 Call … by telephone
10-22 Disregard
10-23 Arrived at scene
10-24 Assignment completed
10-25 Report in person (meet) …
10-26 Detaining subject, expedite
10-27 Drivers license information
10-28 Vehicle registration information
10-29 Check for wanted
10-30 Unnecessary use of radio
10-31 Crime in progress
10-32 Man with gun
10-33 Emergency
10-34 Riot
10-35 Major crime alert
10-36 Correct time
10-37 (Investigate) suspicious vehicle
10-38 Stopping suspicious vehicle

92
10-39 Urgent — use light, siren
10-40 Silent run — no light, siren
10-41 Beginning tour of duty
10-42 Ending tour of duty
10-43 Information
10-44 Permission to leave … for …
10-45 Animal carcass at …
10-46 Assist motorist
10-47 Emergency road repairs at …
10-48 Traffic standard repair at …
10-49 Traffic light out at …
10-50 Accident (fatal, personal injury, property damage)
10-51 Wrecker needed
10-52 Ambulance needed
10-53 Road blocked at …
10-54 Livestock on highway
10-55 Suspected DUI
10-56 Intoxicated pedestrian
10-57 Hit and run (fatal, personal injury, property damage)
10-58 Direct traffic
10-59 Convoy or escort
10-60 Squad in vicinity
10-61 Isolate self for message
10-62 Reply to message
10-63 Prepare to make written copy
10-64 Message for local delivery
10-65 Net message assignment
10-66 Message cancellation
10-67 Clear for net message
10-68 Dispatch information
10-69 Message received
10-70 Fire
10-71 Advise nature of fire
10-72 Report progress on fire
10-73 Smoke report
10-74 Negative
10-75 In contact with …
10-76 En route …
10-77 ETA (estimated time of arrival)
10-78 Need assistance
10-79 Notify coroner
10-80 Chase in progress
10-81 Breathalyzer

93
10-82 Reserve lodging
10-83 Work school xing at …
10-84 If meeting … advise ETA
10-85 Delayed due to …
10-86 Officer/operator on duty
10-87 Pick up/distribute checks
10-88 Present telephone number of …
10-89 Bomb threat
10-90 Bank alarm at …
10-91 Pick up prisoner/subject
10-92 Improperly parked vehicle
10-93 Blockade
10-94 Drag racing
10-95 Prisoner/subject in custody
10-96 Mental subject
10-97 Check (test) signal
10-98 Prison/jail break
10-99 Wanted/stolen indicated


94
Basic Rights of US Citizens When Stopped by Police
• The Bill of Rights: The bedrock of your rights in the face of the law.

• The Fourth Amendment:Your right to protection in your “persons, houses,


papers, and effects.”

• Your Miranda Rights: An explanation of how you are “mirandized” and what that
means.

• What is Reasonable Suspicion?: Explanation of this legal standard that applies


to searches, seizures, and arrests.

• What is Probable Cause?: A guide to to when judges can issue warrants or


justify arrests.

With a Gun:

• Guarantees of the right to bear arms: A list of state constitutions that guarantee
the right to bear arms.

• Legal Theory, Right to Bear Arms The Legal theory behind your right to bear
arms, with an emphasis on the Constitution.

• Handgun Laws Map: A map linked to state level information on handgun and
carry laws.

• Guide to Interstate Firearm Transportation: A guide to your rights in transporting


firearms via interstate.

• Guide to Airline Firearm Transportation: A guide to your rights in transporting


firarms via plane.

• Your Right to Defense Against Unlawful Arrest: A list of cases confirming your
right to defend yourself against unlawful arrest.

In Public:

• Stopped by the police?: ACLU’s guide to your rights and being stopped by the
police.

• Seven Rules for Recording Police:A guide to your rights when filming cops.

• Can you swear at cops?:A guide to the difference between free speech, yelling,
and swearing.

• Peacefully Protesting: How to protest peacefully, effectively, and within your


rights.

• Rights of Non-Citizens: ACLU’s guide to non-citizen rights and law enforcement.

In the Car:

• Rights when you’re pulled over: A look at when cops can and can’t pull you
over.

• When police can search your car:An outline of when police can and can search
your car, and what your rights are.

• Your Rights at Checkpoints: A guide to a variety of checkpoints and your rights.

• When Police Can Use Drug Dogs: Your 4th Amendment rights and drug dog
searches.

95
• Car Passenger Rights: The 4th amendment rights of Passengers in cars stopped
by police.

• DUI Dodger App: An app that warns you of DUI checkpoints within 50 miles.

• Fixed App: An app that helps preserve your rights when ticketed.

In your House:

• Police at your door: A guide to your rights when the police come to your home.

At School:

• Rights of Minor Students: A guide to who can make you answer questions as a
minor.

• Your rights in private school: A look at how student rights are different in public
and private school.

• Guide to Constitutional Rights on Campus: A series of guides on your rights as a


college student.

• 6 Tips to Protect Your Rights in College: A guide to defending your rights when
charged with a crime on campus.

At the Station:

• Being Questioned: ACLU’s guide to your rights when police question you.

At the Airport:

• Your rights at airports: ACLU’s guide to your rights at airports and ports of entry.

96
97
www.thepunisher2018.wordpress.com

98

Das könnte Ihnen auch gefallen