N5X DE T4Z   DO NOT ANSWER
N5X DE T4Z   DO NOT ANSWER
FM T4Z
TO N5X
NR 1
OO190029OCT98U
SUBJ: F9 V1 NR 7
BT
 

From: Vickie Nickel <training@bc.sympatico.ca>
Reply-To: Vickie Nickel <training@bc.sympatico.ca>
To: F9 Member <training@bc.sympatico.ca>
Subject: F9 #7
Date: Thu, 29 Oct 1998 14:01:10

To be removed from our mailing list, simply hit reply with "Remove"
or "Unsubscribe" in the subject line.
 
 
 
 

* * * F 9 B U L L E T I N * * *

Volume 1 Number 7 Thursday, October 29th, 1998
A free publication from http://www.spycounterspy.com

* * *

A source of knowledge and skills for the new American patriot.
Frank talk about resistance strategies, urban guerrilla tradecraft,
countersurveillance techniques, and underground activist methods.

For free back-issues, email training@bc.sympatico.ca

Read legal disclaimer at end of document.
 
 
 

* * * I N S I D E T H I S I S S U E

 CELL SECURITY
 BLOWBACK
 SITREP
 MESSAGE TO ACTIVE CELLS
 PARTING SHOT
 
 
 

* * * C E L L S E C U R I T Y
 

A cell is an active tactical unit. A cell is usually formed of three
or four people. But a cell can also be just one person. Or it can
be nine or ten people.

A cell is a covert unit. It is a secret unit. A cell can plan and
carry out operations only if the cell remains unknown to the authorities.

The existence of the cell must remain secret. The purpose and goals
of the cell must remain secret. The identities of the cell members
must remain secret.

A cell is a conspiratorial organization.

---

As a cell member, you must lead a double life. This means you must
lead a public life and you must also lead a secret life. For your public
life, you must adopt a persona that allows you to live openly in the
general population. For your secret life, you must adopt a nom de guerre
that allows you to remain unknown to the general population and to the
authorities.

Here is an example. Suppose your real name is "John Doe". When you
join an active cell, you might perhaps adopt the nom de guerre of "Alpha".

Whenever you engage in covert activities, you are Alpha. You communicate
ONLY with other members of your cell.

Whenever you are NOT engaged in covert activities, you are John Doe.
 John Doe is a model citizen in the eyes of the authorities. John Doe
obeys all the rules. John Doe never does anything unlawful.

As John Doe, you can go shopping, get your hair cut, see a movie, go
to work. You can do a lot of things, but you NEVER engage in covert
activities as John Doe.

This firewall between your public life and your secret life must be
maintained always. John Doe is your cover. You must never compromise
the security of your cover.

---

Your cell, however, will need to communicate with the outside world.
 Your cell may need to contact other underground elements, issue
statements
to the news media, send communiques to the authorities, recruit new
members, protect persecuted persons, and so on.

Suppose, for example, that your cell wishes to acquire weapons for
self-defense
during covert operations. [EDITOR'S NOTE -- This is merely an example,
not a recommendation.]

The weapons cannot be purchased by John Doe. He must be protected from
the possibility that the weapons may be used illegally. Having his
identity linked with the weapons could eventually lead to his arrest
and interrogation.

Nor can the weapons be purchased by Alpha. The cell must be protected
from the possibility that the arms dealer is an undercover FBI agent
-- or an informant. Even a well-intentioned arms dealer might eventually
be arrested and tortured to reveal the identities of his customers.

---

To preserve security, Alpha must use a "cut-out". Simply stated, the
cell must use a "go-between" in its dealings with other underground
elements.

A go-between is a person who knows only Alpha. The go-between does
not know the identities of other members of the cell.

Suppose that the cell uses a go-between to purchase the weapons from
an arms dealer on the black market. If the arms dealer is interrogated
and tortured by the police, he can identify only the go-between. Alpha
is safe.

Or is he?

After interrogating the arms dealer, the police will go out and pick
up the go-between. Properly tortured, the go-between will incriminate
Alpha. The cell has been fatally compromised.

Is there a better way to use cut-outs? Yes, there is.

---

At a secret meeting of the cell, it is agreed to acquire weapons for
self-defense during covert operations. Alpha, the cell leader, is
designated
to make the purchase.

Alpha gets in touch with a go-between, Beta, who does not know any of
the other members of the cell. Alpha gives his instructions to Beta.

The first go-between (Beta) gets in touch with a second go-between,
Charlie.

It is the second go-between (Charlie), who makes the purchase from the
arms dealer.

The first go-between (Beta), AFTER CAREFULLY CHECKING FOR SURVEILLANCE,
accepts the weapons from the second go-between (Charlie). This transfer
can be accomplished through a face-to-face meeting, through a dead-letter
box, or through a brush pass.

Beta now has the weapons in his possession. Beta sets up a rendezvous
with Alpha, the cell leader. AFTER METICULOUSLY CHECKING FOR SURVEILLANCE,
Alpha accepts the weapons from Beta.

---

This double cut-out system will protect the members of the cell. Here's
why.

Suppose that something goes wrong with the weapons purchase. It doesn't
really matter what the problem is. The arms dealer might be an informant.
 Or he might be an undercover BATF agent. The arms dealer might be
under surveillance by the FBI. Or a former customer of the arms dealer
might have provided his name to the police.

No matter what goes wrong, a double cut-out will provide a margin of
safety for the cell. Let's assume the arms dealer has been arrested.
 You must presume that he will talk. Here are two possible scenarios.

---

NASTY SCENARIO #1 -- CHARLIE IS UNDER SURVEILLANCE.
 The arms dealer has been arrested. During interrogation he has named
Charlie. The goons now have Charlie under surveillance. Remember,
Charlie is the second go-between. He knows both Beta and the arms dealer.
 But Beta is practising good security. He is using the "drycleaning"
method described at http://www.spycounterspy.com. [EDITOR'S NOTE --
Click on "Arrange secret meetings" to read the tutorial.]
 Here's what happens. Before meeting with Charlie, Beta observes
that Charlie is under surveillance. Beta aborts the meeting. BETA
BREAKS OFF ALL CONTACT WITH CHARLIE. The surveillance team never sees
Beta and Charlie together. The cell's security is still intact. AS
A PRECAUTION AGAINST CHARLIE'S EVENTUAL ARREST, the cell will arrange
for Beta to go into hiding. Even if Charlie talks, the authorities
will not be able to find Beta. And only Beta knows who Alpha is. The
cell is safe.

---

NASTY SCENARIO #2 -- CHARLIE HAS BEEN ARRESTED.
 The arms dealer has been arrested. During interrogation he has named
Charlie. The goons have arrested Charlie. Remember, Charlie is the
second go-between. He knows both Beta and the arms the dealer. Under
normal circumstances, Beta will detect Charlie's SUDDEN DISAPPEARANCE.
 As soon as he finds out what has happened, Beta reports the problem
to Alpha. In turn, Alpha gets in touch with other elements in the
resistance
movement who will ARRANGE FOR BETA TO GO INTO HIDING.
 No matter how long the police torture Charlie, the only name they
can get out of him is Beta. But Beta has disappeared. And only Beta
knows Alpha. So your cell's security remains intact. You can continue
to plan and carry out operations.

---

Simply stated, the double cut-out method is the only way to protect
the cell from the authorities. A single cut-out is good, but only a
double cut-out can provide the margin of protection that is required
in today's world. You need the extra buffer that the second go-between
provides.

The lesson? Whenever part of the chain is compromised, the resistance
movement must break the chain completely.

This means removing a link from the chain. There is no other way.
 
 
 

* * * B L O W B A C K

(Letters from readers. Blowback is spy-talk for unexpected backlash
from covert ops. Readers' comments are edited for brevity and style.)
 

BLOWBACK ITEM #1 -- CONCEALED UZIs.
 An ex-cop writes, "I was a police officer for twenty years and part
of an anti-terrorist team. We worked closely with the security of El
Al Airlines. That means Mossad. They carry black attache cases. When
they jerk up on the handle the attache case falls away, leaving only
a cocked Uzi submachine gun."
 

BLOWBACK ITEM #2 -- FEMA SIEGE.
 In response to our SitRep article about FEMA offering to train SWAT
teams in terrorist containment, a concerned F9 reader writes, "I believe
that FEMA is training SWAT to be ready to search an entire city in the
event of a terrorist attack. FEMA's first step will be to seal off
the city."
 

BLOWBACK ITEM #3 -- FEMA LISTS.
 Another F9 reader writes, "I heard somewhere that FEMA keeps a list
of names of subversives for the purpose of rounding them up during a
declared national emergency. If this is true, then the Y2K problem
takes on a new dimension, especially if power outages and other disruptions
begin to happen as predicted."
 

BLOWBACK ITEM #4 -- NEVER CONFESS.
 Another ex-cop writes, "When dealing with any government agent, never
never NEVER admit to anything under any circumstances. If you do, you
will lose, big time. The goons love to play the goodguy-badguy routine.
 They will lie lie LIE to get what they want from you. Then they'll
double-cross you. When the laundry is done, you'll be the one hung
out to dry, because their lies will hold up in Court. The one thing
I advise all my F9 friends is to never never NEVER confess -- and never
never NEVER admit to anything. NOT EVEN TO MAKE A DEAL. Take it from
me, an ex-cop who's been there."
 

BLOWBACK ITEM #5 -- BUGGED THROW-PHONES
 In response to our article about beating SWAT, a former
hostage-negotiator
writes, "You can expect that every throw-phone being used today contains
a hidden microphone. It will be transmitting to the negotiators. They
can hear everything in the room. It's a helluva negotiation tool...
cut the wires and only connect when the police negotiator wants to."
 
 
 

* * * S I T R E P

(Assorted items of interest. Sitrep is spy-talk for situation report.)
 

SITREP ITEM #1 -- BAD COPS.
 These are the government's own statistics. A big-city police chief
can expect to have the following officers arrested during a 12-month
period -- 10 abuse of authority; 5 felony; 7 misdemeanour; 3 theft;
4 domestic violence. If these statistics don't show up in YOUR city,
you've got to ask yourself if the police chief isn't covering up for
his bad cops. That means the whole barrel is rotten, not just a few
apples.
 

SITREP ITEM #2 -- VIOLENT CRIME IS UP.
 Worried Americans are watching Australia. According to a recent
story in the Brisbane Courier Mail, violent crime in that country has
increased AS A RESULT OF MANDATORY HANDGUN REGISTRATION. Robberies
involving guns rose 39% last year. THE BLACK MARKET IN GUNS IS BOOMING.
 Even law-abiding citizens are buying. The police are trotting out
all kinds of excuses to try and explain away the problem.
 At the root of everything, of course, is the intention of the
authorities
to disarm the population -- and the peoples' fear of the government.
 Here in the USA, concerned citizens are predicting that violent crime
will soar when mandatory gun registration is imposed by the US government
in response to the Y2K problem.
 

SITREP ITEM #3 -- PROPAGANDA PRIMER.
 The Spy & CounterSpy website doesn't yet contain any tutorials about
propaganda. There are a number of good Internet sources for information.
 If you're interested in this black art, you might want to check out
http://carmen.artsci.washington.edu/propaganda/contents.htm
 [EDITOR'S NOTE -- Our thanks to the F9 reader who passed us this
tip.]
 

SITREP ITEM #4 -- DEPLETED URANIUM BULLETS.
 During the Gulf War, coalition forces used rounds made of depleted
uranium to penetrate the armor of Saddam's tanks. Can't quite picture
it? Think of a hot knife through butter.
 In response to our recent article about beating SWAT, F9 Bulletin
was contacted by a member of [deleted]'s military. He says that a depleted
uranium round will penetrate SWAT's body armor. Then he goes on to
name and describe some of his nation's military handgun ammunition.
 Here at F9 we're wondering if that wasn't his way of leaking that
9mm depleted uranium handgun ammunition is available. If anyone has
any further information on this, please send email to F9 membership
manager Vickie Nickel at training@bc.sympatico.ca
 [EDITOR'S NOTE -- The name of the country has been deleted to protect
the identity of our reader.]
 
 
 

* * * M E S S A G E T O A C T I V E C E L L S

PLEASE STAND BY. FINAL ADJUSTMENTS TO MESSAGING SYSTEM. ENSURES SECURE
VS NSA ATTACK. EXPECT CONTACT IN DUE COURSE. FIRST MESSAGE COMMUNICATIONS
TEST ONLY. UNTIL THEN DO NOTHING TO JEOPARDIZE SELF. KEEP FAITH. WE
SHALL PREVAIL AGAINST FORCES OF TYRANNY. CHEERS GEORGE WASHINGTON.
 
 
 

* * * P A R T I N G S H O T

SUBSCRIBE/UNSUBSCRIBE: To continue to receive F9 Bulletin by email,
simply do nothing. To cancel your subscription, reply to this email
with "Remove" or "Unsubscribe" in the subject line.

BACK-ISSUES: To receive free back-issues of F9 Bulletin, send your
request by email to membership manager Vickie Nickel at
training@bc.sympatico.ca

ANTISURVEILLANCE TIP: You should promptly suspend your subscription
if you detect new surveillance. This will help you deceive the goons
into thinking that you are just one of the sheep. Watch mindless TV
programs and read mindless magazine articles for a while. The goons
will soon lose interest and downgrade the surveillance. Vickie will
gladly email you all the back issues when you renew your subscription
to F9 Bulletin.

FEEDBACK: Questions, comments, and suggestions about F9 Bulletin can
be sent to F9's membership manager Vickie Nickel at
training@bc.sympatico.ca
LEGAL STUFF: Sent in compliance with Section 301, Paragraph (a)(2)(C)
of s.1618. To be removed from our mailing list, hit reply with "Remove"
in the subject line. In accordance with Title 17 U.S.C. section 107,
this material is distributed without profit or payment to those who
have expressed a prior interest in receiving this information for
non-profit
research and educational purposes only. Copyright 1998 Lee Adams.
All rights are reserved. Quoting and copying prohibited. Published
weekly. Publisher's statement at end of document. Disclaimer: F9
does not issue orders or make suggestions; F9 merely informs; We support
actions which derive from your rights recognized under the Constitution
for the United States of America; We do not endorse, condone, or encourage
otherwise unlawful actions; F9 Bulletin is presented for information,
research, entertainment, and education purposes only; Pronouns such
as you, your, our, and we are used for ease of readability only; Terms
such as (but not limited to) guerrilla and active cell refer to states
of mind during lawful dissent, not intent or actions.
 
 

 Cheers.

 From your friends at http://www.spycounterspy.com

 Lee, Vickie, Agent X, and our network of whistleblowers and
>contributors
 
 

F9 Bulletin is published weekly by
 Here's-how, Right-now! Seminars Inc.,
 PO Box 8026, Victoria BC
 Canada V8W 3R7
Tel 250-475-1450 Fax 250-475-1460
 URL http://www.spycounterspy.com
 EMAIL training@bc.sympatico.ca
 

BT
193729OCT98U
ZNR ZFH2 ZEN2
T5Z QRT
VVVVV
AR
 

RETURN TO F9 TOC