0 0
Read Time:3 Minute, 7 Second

Over the past day, at least 4 military registration and enlistment offices were set on fire. On the whole, I do not consider attacks on military enlistment offices to be an effective means of slowing down the military machine. However, right now – when the military registration and enlistment offices are actively used to register the mobilized – there is a reason to destroy the military registration and enlistment offices.

But it is precisely in destruction, and not in symbolic attacks, when the flame practically does not damage the draft board.

Digital security. When looking for an object to attack, use TOR. It’s better not to discuss the promotion in messengers at all. If you are discussing, then only in reliable ones (Signal, Wire) and with a short timer for deleting messages. Don’t pick up your phone. Do not take your phone with you to the store, where you will buy some components for incendiary mixtures or explosives. Read more about information security here.

Physical security. Do not hold promotions near your place of residence. It is advisable to travel to another city. Use the wrong clothes for the action, in which you walk. After the action, get rid of it (but so that the security forces do not find it). Cover your face. Eyes can give out – use a baseball cap. Route through areas where there are no cameras. Everything is the same when preparing an action: exploration, purchase of materials. Don’t repeat yourself with the area for the action, nor with its form – participants in serial actions are easier to calculate. Do not talk about promotions with those who do not participate in them.

Efficiency

One Molotov cocktail, which will burn a couple of chairs, is unlikely to stop the mobilization even for a day. Therefore, it is worth considering how to cause significant damage that will stop the death conveyor. The “anarchist fighter” has repeatedly written that it is more efficient to break windows and pour flammable liquid inside. You can also use incendiary bombs.

Today Anarchy has formulated 5 points to consider when planning fire attacks:

  • The fire must be constantly transferred to new combustible materials. Successful “intruders” choose points where the fire will find a way to spread through combustible materials. Concrete walls do not burn. A hearth in the middle of the floor is unlikely to spread quickly.
  • The heat rises. This affects the distribution path.
  • “Time may be more important than temperature in order for heat to be transferred and new combustible material to ignite. Therefore, thickeners are added to the KM, which make the composition stick and burn longer. Close and long contact is important.
  • Multiple sources of ignition. Homemade incendiary devices often do not work, and when thrown, they hit the wrong place or have little effect. Therefore, “Cocktails” are often thrown in several pieces by a group or in series alone. Experienced organizations such as ALF/ELF install several timed incendiary devices at different locations.
  • The response time of the enemy forces is important. How quickly the guards can arrive to try to put out the fire (and detain the activists). Warning: Testing the response time itself can carry risks.

BA also wrote about the composition of mixtures and thickeners.

What else to say? An equally important and always relevant target for actions is the railways, which send weapons and manpower to the front. Instructions about attacks on the railway structure are on the channel and on the website of the Stop the Carriages movement.

You will also find a lot of useful materials for preparing sabotage actions on the Anarchist Fighter, Anarchy+ and Anti-War Sick Leave channels.

And the last. If you stir, stir quietly. If you’re not sure, don’t do it.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence