0 0
Read Time:2 Minute, 47 Second

Urgent announcement. Attention to all who are planning.

The regime felt like it was being bitten by soft military enlistment offices and was going to strengthen the security of the facilities. This takes time, the guards will not appear immediately. It is advisable to conduct additional reconnaissance of the situation before the attack. If at the time of the attack you notice something new, unusual, inappropriate, or vice versa, some ordinary element of the picture is missing – evaluate your possibilities for an emergency retreat along a pre-planned path if the guards appear not with a delay, as when an alarm is triggered, but instantly, a little after the start of the attack. If the chances of delay are close to 100%, cancel the attack. When you are free, you are needed.

If you are found on the approach to the target, dump. Feel free to throw away “equipment” if necessary.

Think of a “spare” object of attack, attention to which will be weakened, because everyone is guarding the military registration and enlistment offices. Legitimate targets: police departments, the National Guard, the FSB, official vehicles of the security forces, civil administration – buildings and vehicles.


Another extremely ironic goal for a partisan who changed his mind about burning down a guarded military registration and enlistment office is paddy wagons at rallies.

Some of the security forces are guarding the military registration and enlistment offices, some are at the front, someone is guarding the mobilized so that they do not run away, someone is guarding the departments so that they are not burned, while the personnel are pissing off a peaceful rally, someone, in a smaller number than before, went to disperse the rally.


He is strong who comes to the battlefield first; he is weak who comes second to the battlefield and rushes into battle
– Sun Tzu “The Art of War”

In response to numerous requests for coordination and structure, we repeat: the time for structures will come, but it is not now. On the other hand, “not now” means preparation time. And the revolutionary situation means the need for preparation.

Preparation requires people and communication between them. There are supporters, everything is fine with communication, what can go wrong?

Connection.

Roskomnadzor is still guarding our security from information with a knife switch in hand and a soldering iron from telecom operators in one place. Yes, with a high probability a shutdown awaits us, when the Internet is cut down completely, physically. And no Telegram will help to bypass Internet blocking if there is no Internet itself.

We invite everyone to join us in the Briar messenger: https://briarproject.org/ Here is a link to our contact, add: briar://adahjonuibhyunuep6nyhrdkuhudbjfy44vawpcel7qt33ypxjosc

What is good about this another messenger:
* There is no binding to anything at all, neither to mail, nor to a phone number
* Your account is stored only on your smartphone and nowhere else, you can delete it using the panic button
* Traffic is encrypted via TOR
* In the absence of the Internet, Briar can connect directly with other contacts within WiFi range

We remind you that no encryption will protect you from disclosure if you share personal details about yourself and your plans. Assume that any group, any public chat can be infiltrated and trsh major can read and write.

Connect, let’s create a public group.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence