E-Book Content
SECURITY A RESISTANCE MANUAL
Copyright 2013 Guerrillamerica All Rights Reserved.
TABLE OF CONTENTS PREFACE 5 Communications Security (COMSEC) 8
SYMMETRIC ENCRYPTION. 10 ASYMMETRIC ENCRYPTION. 11 ONE TIME PADS. 13 STENOGRAPHY. 15 CRYPTONYMS. 15 VIRTUAL PRIVATE NETWORK. 18 ANONYMOUS BROWSING. 18 ONLINE CHAT. 19 TELEPHONIC COMMUNICATION. 19 RADIO. 21 DEAD DROPS. 21 META-DATA. 22
Information Security (INFOSEC) 24 PREVENTION. 25 DEFENSE. 27 MITIGATION. 28
Personnel Security (PERSEC) 31
PERSONNEL SECURITY CONTROLS 31 CODE NAMES. 32 BIOMETRIC THREAT. 33 SOCIAL MEDIA. 38 RISK MANAGEMENT. 38 PERSONAL SECURITY. 39
Operations Security (OPSEC) 43 COMPROMISE. 43 CRITICAL INFORMATION. 44 INDICATORS. 47 ENEMY COLLECTION. 50 THREAT ANALYSIS. 50 VULNERABILITY ANALYSIS. 52 RISK ASSESSMENT. 52 OPSEC VIOLATIONS. 54
APPENDIX 55
ABOUT THE AUTHOR Samuel Culper is a former military intelligence professional, and contractor for a United States Government intelligence program. The bulk of Sam’s operational experience comes from working missions ranging from All-Source and Human Intelligence to Special Projects, biometrics, targeting, and senior-level advising; including multiple deployments to Iraq and Afghanistan. Sam left his stateside desk job a couple years ago to pursue other goals. I owe a great deal of thanks to the Mountain Guerrilla, and to Western Rifle Shooters Association, for adding fuel to the torch of Liberty. These individuals introduced me to the resistance movement, and have provided ample support and encouragement to others and myself.
PREFACE
“Be not intimidated, therefore, by any terrors… nor suffer yourselves to be wheedled out of your liberty...” – John Adams in A Dissertation on the Canon and Feudal Law, 1765
We as a nation have failed to heed and live out the words and warnings of our Founders. We have been tricked, we’ve been bullied, and we’ve been force fed. Readers of the Free Forces blogoshphere and the Three Percent movement are today’s rare exception. These Patriots will restore Liberty within our lifetimes. The past decade has laid bare in all their ugliness repeated incursions into citizen privacy and new interpretations of the Fourth Amendment, the hyper-militarization of police, politicians operating under the table and above the law, skyrocketing national debt against the will of the People, and seemingly endless wars and conflict. The time for defending domestic spying, rationalizing the police state, or justifying continued violations of the Bill of Rights has ended. It should not have started in the first place. We ought to realize that the regime is already preparing itself, and we ought to focus on solutions to preserve the flame of Liberty. What’s the best we can hope for, and what’s the best we can achieve? The best we can do is to restore America regionally – perhaps portions of the South or the Mountain West. (I’m a particular proponent of Rawles’s
American Redoubt.) Short of carving out and protecting a chunk of land where the ideals of American Liberty are defended and upheld, the best we can do is make the statists pay for their tyranny. These solutions aren’t popular, and they won’t be achieved without some pain and sacrifice. Patriots enjoy citing Thomas Jefferson’s oft-quoted words on the Tree of Liberty with regards to the blood of tyrants, but Jefferson also makes mention of the blood of patriots. This ebook was written specifically for the Three Percent and resistance movements in order to provide a basic understanding of security measures each team, cell, militia, or other organization should take to make itself more secure and to prevent regime violence against it. Security of communications, information, personnel, and operations should absolutely be your top concern. But security is a double-edge sword. In