____    ______  ____    ______   ____     ______  __        
/\  _`\ /\  _  \/\  _`\ /\__  _\ /\  _`\  /\  _  \/\ \       
\ \ \L\ \ \ \L\ \ \ \/\ \/_/\ \/ \ \ \/\_\\ \ \L\ \ \ \      
 \ \ ,  /\ \  __ \ \ \ \ \ \ \ \  \ \ \/_/_\ \  __ \ \ \  __ 
  \ \ \\ \\ \ \/\ \ \ \_\ \ \_\ \__\ \ \L\ \\ \ \/\ \ \ \L\ \
   \ \_\ \_\ \_\ \_\ \____/ /\_____\\ \____/ \ \_\ \_\ \____/
    \/_/\/ /\/_/\/_/\/___/  \/_____/ \/___/   \/_/\/_/\/___/ 
                                                             
                                                             
 ____    ____    ____    ____    __  __  ____     ____       
/\  _`\ /\  _`\ /\  _`\ /\  _`\ /\ \/\ \/\  _`\  /\  _`\     
\ \ \/\ \ \ \L\_\ \ \L\_\ \ \L\_\ \ `\\ \ \ \/\_\\ \ \L\_\   
 \ \ \ \ \ \  _\L\ \  _\/\ \  _\L\ \ , ` \ \ \/_/_\ \  _\L   
  \ \ \_\ \ \ \L\ \ \ \/  \ \ \L\ \ \ \`\ \ \ \L\ \\ \ \L\ \ 
   \ \____/\ \____/\ \_\   \ \____/\ \_\ \_\ \____/ \ \____/ 
    \/___/  \/___/  \/_/    \/___/  \/_/\/_/\/___/   \/___/  
                                                             

Radical Defence (RadDef) is the continuation of many past projects to collect and archive the radical knowledge such as direct action, anti-fascism, hacking, security cultures, first aid, counterinsurgency, etc. as the accessible reciprocal of resources for comrades who seek such knowledge to defend their movements in battles against state and capitalism.

mail: radicaldefence@riseup.net
matrix: @radicaldefence:matrix.org
xmpp: radicaldefence@blah.im
jami: radicaldefence


DOWNLOAD ALL // DLC: The Guerrilla's Staple (Updated contents)


.
├── DIRECT-ACTION
│   ├── ANTI-FASCISM
│   │   ├── Alerta Alerta Snapshots of Europe’s Anti-fascist Struggle by Patrick Strickland.pdf
│   │   ├── Antifascism, Sports, Sobriety Forging A Militant Working-Class Culture by Julius Deutsch Gabriel Kuhn.pdf
│   │   ├── ANTIFA The Anti-Fascist Handbook by Mark Bray.pdf
│   │   ├── Stanislav Vysotsky - American Antifa.pdf
│   │   └── The Battle for the Mountain of the Kurds Self-Determination and Ethnic Cleansing in the Afrin Region of Rojava by Thomas Schmidinger Andrej Grubačić Michael Schiffmann.pdf
│   ├── BARRICADE
│   │   ├── 10-steps-blockade.pdf
│   │   ├── delia_smith_basic_blockading.pdf
│   │   └── Field Fortifications FM 5-15 1944.pdf
│   ├── BLACKBLOC
│   │   ├── anti-racist-action-the-green-mountain-anarchist-collective-black-bloc-tactics-communique.pdf
│   │   ├── crimethinc-affinity-groups.pdf
│   │   ├── crimethinc-anonymous-why-break-windows.pdf
│   │   ├── crimethinc-blocs-black-and-otherwise.pdf
│   │   ├── crimethinc-fashion-tips-for-the-brave.pdf
│   │   ├── elle-armageddon-the-femme-s-guide-to-riot-fashion.pdf
│   │   ├── nicolas-barricada-collective-the-black-bloc-in-quebec-an-analysis.pdf
│   │   └── The Black Bloc Papers_ An Anthology of Primary Texts from the North American Anarchist Black Bloc.pdf
│   ├── COUNTERINSURGENCY
│   │   ├── Canadian Forces Crowd Confrontation Operations Manual B-GJ-005-307 FP-090.pdf
│   │   ├── Counterinsurgency in Modern Warfare by Daniel Marston, Carter Malkasian.pdf
│   │   ├── FM 3-13.4 Army Support to Military Deception by Department of the Army.pdf
│   │   ├── fm3_19_15_CIVIL_DISTURBANCE_OPERATIONS.pdf
│   │   ├── fm3_24-INSURGENCIES_AND_COUNTERING_INSURGENCIES.pdf
│   │   ├── FM 7-98 Operations in a Low Intensity Conflict.pdf
│   │   ├── FM 90-8 Counterguerilla Operations.pdf
│   │   ├── frank-kitson-gangs-and-counter-gangs-1.pdf
│   │   ├── gang intell manual.pdf
│   │   ├── imrduckington_COIN.pdf
│   │   ├── low-intensity operations.pdf
│   │   ├── Psychology of Intelligence Analysis by Richards J. Heuer.pdf
│   │   ├── TACTICS IN COUNTERINSURGENCY - FM 3-24.2 (FM 90-8, FM 7-98) by HEADQUARTERS DEPARTMENT OF THE ARMY.pdf
│   │   ├── Unconventional Warfare Pocket Guide.pdf
│   │   ├── URBAN OPERATIONS by HEADQUARTERS DEPARTMENT OF THE ARMY.pdf
│   │   ├── U.S. Army Counterinsurgency Handbook by U S Dept of the Army, Department of Defense.pdf
│   │   └── U.S. Army Guerrilla Warfare Handbook by Department of the Army.pdf
│   ├── EXPROPRIATION
│   │   ├── paul-z-simons-illegalist-praxis.pdf
│   │   ├── The Anarchist Expropriators Buenaventura Durruti and Argentina’s Working-Class Robin Hoods by Osvaldo Bayer.pdf
│   │   ├── The bonnot gang the story of the French illegalists by Parry, Richard.pdf
│   │   └── Turning Money into Rebellion The Unlikely Story of Denmarks Revolutionary Bank Robbers by Gabriel Kuhn.pdf
│   ├── FIRST-AID
│   │   ├── Anatomy and Physiology Related to Clinical Pathology MD0851 by US Army medical department.pdf
│   │   ├── Basic Human Anatomy MD0006 by US Army medical department.pdf
│   │   ├── Basic Human Physiology MD0007 by US Army medical department.pdf
│   │   ├── Basic Medical Terminology MD0010 by US Army medical department.pdf
│   │   ├── Cardiac Rhythm Interpretation MD0571 by US Army medical department.pdf
│   │   ├── Chemical, Biological, Radiological, Nuclear, Explosive MD0534 by US Army medical department.pdf
│   │   ├── Combat Lifesaver Medical Tasks IS0825 by US Army medical course.pdf
│   │   ├── crimethinc-a-demonstrator-s-guide-to-responding-to-gunshot-wounds.pdf
│   │   ├── crimethinc-protocols-for-common-injuries-from-police-weapons.pdf
│   │   ├── EMO-card-pdf.pdf
│   │   ├── Eye, Ear, and Nose Injuries MD0547 by US Army medical department.pdf
│   │   ├── FM8-35_transportation_sick_1941.pdf
│   │   ├── FM8-50_Bandaging_Splinting_1944.pdf
│   │   ├── Medical_NBC_Battlebook.pdf
│   │   ├── Nursing Care of the Surgical Patient MD0915 by US Army medical department.pdf
│   │   ├── Pharmaceutical Calculations MD0802 by US Army medical department.pdf
│   │   ├── Principles of Radiographic Exposure MD0952 by US Army medical department.pdf
│   │   ├── Respiratory Diseases and Disorders MD0568 by US Army medical department.pdf
│   │   ├── riot-medicine-field-guide.pdf
│   │   ├── riot-medicine.pdf
│   │   ├── Self-aid and Buddy-Aid IS0877 by US Army medical department.pdf
│   │   ├── Skills for Revolutionary Survival_ 1. Trauma Medical Gear – Indigenous Anarchist Federation.html
│   │   ├── Sterile Procedures MD0540 by US Army medical department.pdf
│   │   ├── Treatment_of_Biological_Warfare_Agent_Casualties_MCRP_4-11.1C.pdf
│   │   └── U.S. Army First Aid Manual by Department of the Army.epub
│   ├── INSURRECTIONARY
│   │   ├── alfredo-m-bonanno-why-insurrection.pdf
│   │   ├── Atassa - Readings in Eco-Extremism.pdf
│   │   ├── Luigi Galleani the most dangerous anarchist in America by Antonio Senta.pdf
│   │   └── lupus-dragonowl-the-future-of-insurrection.pdf
│   ├── ORGANIZING
│   │   ├── Student Organiser Handbook.pdf
│   │   ├── The Struggle Within Prisons, Political Prisoners, and Mass Movements in the United States by Dan Berger, Ruth Wilson Gilmore, dream hampton.pdf
│   │   ├── University Activist Handbook.pdf
│   │   └── william-gillis-organizations-versus-getting-shit-done.pdf
│   ├── POLICE
│   │   ├── crimethinc-the-thine-blue-line-is-a-burning-fuse.pdf
│   │   ├── crimethinc-what-they-mean-when-they-say-peace.pdf
│   │   ├── edge-city-collective-counterinsurgency-and-the-policing-of-space-in-ferguson.pdf
│   │   ├── narcissa-black-kcbg-and-annonymous-others-i-want-to-kill-cops-until-i-m-dead.pdf
│   │   ├── Our Enemies in Blue Police and Power in America by Kristian Williams.pdf
│   │   └── The End of Policing by Alex S. Vitale.pdf
│   ├── PROTEST
│   │   ├── bfc-revolt-guide.pdf
│   │   ├── black-flag-catalyst-the-black-flag-catalyst-protest-guide-v1-2.pdf
│   │   ├── bodyhammer.pdf
│   │   ├── crimethinc-a-civilian-s-guide-to-direct-action.pdf
│   │   ├── crimethinc-a-demonstrator-s-guide-to-body-armors.pdf
│   │   ├── crimethinc-a-demonstrator-s-guide-to-gas-masks-and-goggles.pdf
│   │   ├── crimethinc-a-demonstrator-s-guide-to-helmets.pdf
│   │   ├── crimethinc-anonymous-ain-t-no-pc-gonna-fix-it-baby.pdf
│   │   ├── crimethinc-anonymous-deserting-the-digital-utopia.pdf
│   │   ├── crimethinc-eight-things-you-can-do-to-get-active.pdf
│   │   ├── crimethinc-how-to-get-what-you-want.pdf
│   │   ├── crimethinc-how-to-justify-workplace-theft.pdf
│   │   ├── crimethinc-reflections-on-the-ferguson-uprising.pdf
│   │   ├── crimethinc-the-making-of-outside-agitators.pdf
│   │   ├── GMAC_blackbloc_tactics.pdf
│   │   ├── shane-burley-how-to-survive-anti-police-protests.pdf
│   │   ├── Tactical_Employment_of_Non-Lethal_Weapons_FM_3-22.40.pdf
│   │   ├── The HK19 Manual - Part 1_ the Roles.pdf
│   │   ├── The HK19 Manual - Part 2B_ How Tos.pdf
│   │   └── warrior_crowd_control.pdf
│   ├── SABOTAGE
│   │   ├── anonymous-the-field-guide-to-anti-hunting.pdf
│   │   ├── blackcatsabotagebook.pdf
│   │   ├── efdirectactionmanual.pdf
│   │   ├── final-nail-4.pdf
│   │   ├── howtosink.pdf
│   │   ├── OzymandiasSabotageHandbookByCafeUndergroundInBritain.pdf
│   │   ├── Sabotage in the American Workplace by Martin Sprouse.pdf
│   │   ├── simple-sabotage-manual.pdf
│   │   ├── various-authors-ecodefense-a-field-guide-to-monkeywrenching.pdf
│   │   └── wolf_hunt_sab_manual.pdf
│   ├── SELF-DEFENCE
│   │   ├── 10_Brazilian_Ju_Jitsu_Moves_Every_Cop_Should_Know_Brad_Parker.pdf
│   │   ├── D2D_Manuscript_20210114.pdf
│   │   ├── FMFM 0-7. Close Combat and Hand to Hand Fighting U.S. Marine Corps.pdf
│   │   ├── Hand-to-Hand Combat by Headquarters, Department of the US Army.pdf
│   │   ├── Marine Corps Martial Arts.pdf
│   │   ├── Mark Hatmaker, Doug Werner - Boxing Mastery.pdf
│   │   ├── Mark Hatmaker - The Clinch.pdf
│   │   ├── Military Hand To Hand Combat Guide by Pressure Points.pdf
│   │   ├── Self-defense for radicals A to Z guide for subversive struggle by Mickey Z., Richard Cole.pdf
│   │   ├── Ted Gambordella - Weapons of the street.pdf
│   │   ├── TRANKADA - The Joint Locking Techniques Tapi-Tapi Of Modern Arnis - Filipino Stick Fighting by Senior Master Dan Anderson.pdf
│   │   └── USMC_MCMAP.pdf
│   ├── SQUATTING
│   │   └── squatter-s-handbook-england-13th-edition.pdf
│   ├── STRATEGY
│   │   ├── anti-system-cores-for-mass-struggle-and-subversion.pdf
│   │   ├── combativeunionism.pdf
│   │   ├── institute-for-the-study-of-insurgent-warfare-nine-theses-on-insurgency.pdf
│   │   ├── No More Heroes Grassroots Challenges to the Savior Mentality by Jordan Flaherty.epub
│   │   ├── serafinski-blessed-is-the-flame.pdf
│   │   ├── Taking sides revolutionary, solidarity and the poverty of liberalism by Milstein, Cindy.pdf
│   │   ├── Tom Nomad - The Master's Tools - Warfare and Insurgent Possibility.pdf
│   │   └── wildcat-the-deep-state.pdf
│   └── TACTICS
│       ├── anarchist-tactics-at-standing-rock.pdf
│       ├── banner_drops-stencils-wheatpaste.pdf
│       ├── crimethinc.recipes.for.disaster.an.anarchist.cookbook.pdf
│       ├── direct_action_manual_3.pdf
│       ├── Direct Action memoirs of an urban guerrilla by Hansen, Ann.pdf
│       ├── Knots An Illustrated Practical Guide to the Essential Knot Types and Their Uses by Adam Adamides.pdf
│       ├── peter-gelderloos-how-nonviolence-protects-the-state.pdf
│       ├── peter-gelderloos-the-failure-of-nonviolence.pdf
│       ├── pramen-14-tips-on-how-to-get-ready-for-the-revolutionary-situation.pdf
│       └── The Debt Resisters Operations Manual by Strike Debt.pdf
├── HACKING
│   ├── CAR-HACKING
│   │   └── The-Car-Hacker-s-Handbook-A-Guide-for-the-Penetration-Tester.pdf
│   ├── EXPLOITATION
│   │   ├── A-Bug-Hunter-s-Diary-A-Guided-Tour-Through-the-Wilds-of-Software-Security-.pdf
│   │   ├── Advanced Penetration TestingHacking the World’s Most Secure Networks by Wil Allsopp.pdf
│   │   ├── Black Hat Go Go Programming For Hackers and Pentesters by Tom Steele, Chris Patten, Dan Kottmann.pdf
│   │   ├── Black-Hat-Python-Python-Programming-for-Hackers-and-Pentesters-2ND-EDITION.pdf
│   │   ├── Black-Hat-Python-Python-Programming-for-Hackers-and-Pentesters.pdf
│   │   ├── Gray-Hat-C-Creating-and-Automating-Security-Tools.pdf
│   │   ├── Gray-Hat-Python-Python-Programming-for-Hackers-and-Reverse-Engineers.pdf
│   │   ├── Hacking-2nd-Edition-The-Art-of-Exploitation.pdf
│   │   ├── Linux Basics for Hackers_ Getting Started with Networking, Scripting, and Security in Kali.pdf
│   │   ├── Macintosh Terminal Pocket Guide Take Command of Your Mac by Daniel J. Barrett.pdf
│   │   ├── Metasploit-The-Penetration-Tester-s-Guide-.pdf
│   │   ├── Ninja-Hacking-Unconventional-Penetration-Testing-Tactics-and-Techniques.pdf
│   │   ├── Rootkits and Bootkits_ Reversing Modern Malware and Next Generation Threats.pdf
│   │   ├── shellcoders_handbook_discovering_and_exploiting_security_holes.pdf
│   │   ├── The-Art-of-Intrusion-The-Real-Stories-Behind-the-Exploits-of-Hackers-Intruders-and-Deceivers.pdf
│   │   ├── The-Browser-Hacker-s-Handbook.pdf
│   │   ├── The-Rootkit-Arsenal-Escape-and-Evasion-in-the-Dark-Corners-of-the-System.pdf
│   │   ├── Unauthorised-Access-Physical-Penetration-Testing-For-IT-Security-Teams.pdf
│   │   ├── Violent-Python-a-cookbook-for-hackers-forensic-analysts-penetration-testers-and-security-engineers.pdf
│   │   └── web_application_hackers_handbook_finding_and_exploiting_security_flaws.pdf
│   ├── FORENSICS
│   │   ├── Controlled research utilizing a basic all-metal detector in the search for buried.pdf
│   │   ├── Investigation of Assaults Suicides Homicides by Department of the Army.pdf
│   │   └── The_Complete_Investigator.pdf
│   ├── HARDWARE
│   │   ├── Android-Hacker-s-Handbook.pdf
│   │   ├── iOS-Hacker-s-Handbook.pdf
│   │   ├── Teach Yourself Electricity and Electronics by Stan Gibilisco.pdf
│   │   ├── The Hardware Hacker. Adventures in Making and Breaking Hardware.pdf
│   │   └── The-Mac-hacker-s-handbook.pdf
│   ├── LOCKPICKING
│   │   ├── CIA Lock Picking Field Operative Training Manual by Central Intelligence Agency.pdf
│   │   ├── Easy pickings a self teaching manual for the technique of lockpicking by Charles Edward Remington III.pdf
│   │   ├── How To Open Locks With Improvised Tools Practical, Non-Destructive Ways Of Getting Back Into Just About Everything When You Lose Your Keys by Hans Conkel.pdf
│   │   ├── How to Open Locks Without Keys or Picks.pdf
│   │   ├── Improvised Lock Picks-Police Guide To Lockpicking.pdf
│   │   ├── Keys to the Kingdom_ Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks.pdf
│   │   ├── Mit guide to lockpicking by Ted tool.pdf
│   │   ├── Practical Lock Picking, Second Edition_ A Physical Penetration Tester's Training Guide.pdf
│   │   ├── pramen-how-to-escape-from-handcuffs.pdf
│   │   ├── Quick tip - Free Parking-WkgX9iwXXxg.mp4
│   │   ├── Quick tip - Unlock office buildings with compressed air-dvlpi9hTUdQ.mp4
│   │   ├── Secrets Of Lock Picking by Steven Hampton.pdf
│   │   ├── The Complete Book of Locks and Locksmithing - 6th edition.pdf
│   │   └── Visual Guide to Lock Picking_ Warded Locks, Pin Tumbler Locks, Wafer Locks, Exercises and Much More.pdf
│   ├── MALWARE
│   │   └── malware_analysts_cookbook_and_dvd_tools_and_techniques_for_fighting_malicious_code.pdf
│   ├── NETWORK
│   │   ├── Attacking-Network-Protocols-A-Hacker-s-Guide-to-Capture-Analysis-and-Exploitation.pdf
│   │   ├── Ghost-in-the-Wires-My-Adventures-as-the-World-s-Most-Wanted-Hacker-.pdf
│   │   └── Silence-on-the-Wire-A-Field-Guide-to-Passive-Reconnaissance-and-Indirect-Attacks.pdf
│   ├── OSINT
│   │   ├── awesome-osint
│   │   │   └── README.txt
│   │   ├── datajournalism-resources
│   │   │   └── README.txt
│   │   └── SMS Verification Method 2019.pdf
│   ├── OTHER
│   │   ├── hackback-a-diy-guide.txt
│   │   ├── hackback-nopatience.txt
│   │   ├── Hacking Sindicat de Mossos d'Esquadra-167411059.mp4
│   │   ├── Quick tip - Self Checkout-OD5KsqiKP7A.mkv
│   │   └── subcowmandante-marcos-hack-back.pdf
│   └── SOCIAL-ENGINEERING
│       ├── Kali-Linux-Social-Engineering.pdf
│       ├── Phishing Dark Waters The Offensive and Defensive Sides of Malicious Emails by Christopher Hadnagy, Michele Fincher.pdf
│       ├── Social-Engineering-and-Nonverbal-Behavior-Set.epub
│       ├── The-Art-of-Deception-Controlling-the-Human-Element-of-Security.pdf
│       └── Unmasking-the-Social-Engineer-The-Human-Element-of-Security.pdf
├── RESILIENCE
│   ├── HOMESTEADING
│   │   ├── How to Grow Practically Everything by DK, Zia Allaway, Lia Leendertz.pdf
│   │   ├── The Mini Farming Handbook by Brett L. Markham.pdf
│   │   └── The Organic Composting Handbook Techniques for a Healthy, Abundant Garden by Dede Cummings.pdf
│   ├── PERMACULTURE
│   │   ├── [Dave_Jacke,_Eric_Toensmeier]_Edible_Forest_Garden.pdf
│   │   ├── [Graham_Burnett]_Permaculture,_a_Beginners_Guide.pdf
│   │   ├── [Patrick_Whitefield]_The_Earth_Care_Manual__A_Perm.pdf
│   │   └── [Toby_Hemenway]_Gaia's_Garden,_Second_Edition__A_G.pdf
│   ├── PREPPING
│   │   ├── Preppers Communication Handbook Lifesaving Strategies for Staying in Contact During and After a Disaster by Jim Cobb.pdf
│   │   ├── Preppers long-term survival guide food, shelter, security, off-the-grid power and more life-saving strategies for self-sufficient living by Jim Cobb.pdf
│   │   └── The Preppers Water Survival Guide Harvest, Treat, and Store Your Most Vital Resource by Daisy Luther.pdf
│   └── SURVIVAL
│       ├── FM 21-22 AFM 64-26 Survival At Sea 1950.pdf
│       ├── Standard time zones of the world by United States. Central Intelligence Agency.pdf
│       ├── The Ultimate Guide to U.S. Army Survival Skills, Tactics, and Techniques by Department of the Army, Jay McCullough.pdf
│       ├── The U.S. Navy SEAL Survival Handbook Learn the Survival Techniques and Strategies of Americas Elite Warriors by Don Mann, Ralph Pezzullo.pdf
│       └── US Army Survival Manual FM 21-76 by Department of Defense.pdf
└── SECURITY-CULTURE
    ├── COMSEC
    │   ├── anonymousplanet_guide.pdf
    │   ├── Burner Phone Best Practices - B3RN3D.html
    │   ├── burner_phone_best_practices_by_B3RN3D.pdf
    │   ├── crimethinc-talking-to-the-media.pdf
    │   ├── elle-armageddon-burner-phone-best-practices.pdf
    │   ├── event_boundaries_by_B3RN3D.pdf
    │   ├── FM 11-32 Combat Net Radio Operations.pdf
    │   ├── FM 24-12 Communications in a 'Come as You Are' War.pdf
    │   ├── FM 24-18 Tactical Single Channel Radio Communications Techniques.pdf
    │   ├── FM 24-20 Field-Wire Techniques 1956.pdf
    │   ├── FM 5-10 Engineer Field Manual, Communications, Construction, and Utilities .pdf
    │   ├── FM 6-02.72 Tactical Radios.pdf
    │   ├── signalfails-imposed.pdf
    │   ├── Skills for Revolutionary Survival_ 5. Communications Equipment for Rebels – Indigenous Anarchist Federation.html
    │   ├── The Zen of PGP.html
    │   └── Tor Country Codes - B3RN3D.html
    ├── COUNTERINTEL
    │   ├── Anarchist_Direct_Actions_A_Challenge_for_Law_Enforcement.pdf
    │   ├── CIA, KUBARK Counterintelligence Interrogation. Part 2 by Central Intelligence Agency.pdf
    │   ├── courtney-desiree-morris-why-misogynists-make-great-informants.pdf
    │   ├── crimethinc-if-the-fbi-approaches-you-to-become-an-informant.pdf
    │   ├── crimethinc-is-s-he-an-informant.pdf
    │   ├── el-libertario-editorial-collective-on-infiltration.pdf
    │   ├── FSB deploys cyber units inside Europe (for years).html
    │   ├── KUBARK Counterintelligence Interrogation by Central Intelligence Agency.pdf
    │   ├── The Info War against ISIS.html
    │   └── various-authors-research-and-development-articles-on-surveillance-technologies-from-green-anarc.pdf
    ├── HUMINT
    │   ├── fm2-22-3HUMAN INTELLIGENCE COLLECTOR OPERATIONS.pdf
    │   └── U.S. Army Human Intelligence Collector Field Manual by U.S. Department of the Army.epub
    ├── OPSEC
    │   ├── anonymous-in-defense-of-smashing-cameras.pdf
    │   ├── Beat the Heat How to Handle Encounters with Law Enforcement by Katya Komisaruk.pdf
    │   ├── Braintricks for OPSEC - B3RN3D.html
    │   ├── braintricks_for_opsec_by_B3RN3D.pdf
    │   ├── CIA Operative Teaches Spycraft and Psychology - B3RN3D.html
    │   ├── confidence-courage.pdf
    │   ├── confidence-courage-short-intro.pdf
    │   ├── crimethinc-doxcare.pdf
    │   ├── crimethinc-how-to-survive-a-felony-trial.pdf
    │   ├── crimethinc-is-s-he-an-informant.pdf
    │   ├── crimethinc-surviving-a-grand-jury.pdf
    │   ├── crimethinc-when-the-police-knock-on-your-door.pdf
    │   ├── Did You Ask Him About His Threat Model_ - B3RN3D.html
    │   ├── elle-armageddon-burner-phone-best-practices.pdf
    │   ├── Event Boundaries_ Helping to Compartmentalize Your Operations - B3RN3D.html
    │   ├── How to Hide Anything.pdf
    │   ├── Managing Pseudonyms Better Than DPR - B3RN3D.html
    │   ├── Perspectives of OPSEC Models - B3RN3D.html
    │   ├── Security thinking ruined secure messengers.html
    │   ├── various-authors-research-and-development-articles-on-surveillance-technologies-from-green-anarc.pdf
    │   └── WHAT_IS_SECURITY-by-AntiSpeciesistAction.md
    ├── PERSEC
    │   ├── Beat the Heat How to Handle Encounters with Law Enforcement by Katya Komisaruk.pdf
    │   ├── Disguise Techniques By A Edmond MacInaugh.pdf
    │   ├── fm20-3-Camouflage-Concealment-and-Decoys.pdf
    │   ├── Skills for Revolutionary Survival_ 2. Basic Personal Protective Equipment – Indigenous Anarchist Federation.html
    │   ├── The Modern Identity Changer.pdf
    │   └── Tools to Evade Stylometrics - B3RN3D.html
    └── SURVEILLANCE
        ├── FM 34-2-1 Reconaissance and Surveillance and Intelligence Support to Counterreconaissance.pdf
        ├── Mick Tyner - Spook Book.pdf
        ├── Shadowing and Surveillance.pdf
        └── Sheldon Charrett - Electronic Circuits and Secrets of an Old-Fashioned Spy.pdf





tree v1.8.0 © 1996 - 2018 by Steve Baker and Thomas Moore
HTML output hacked and copyleft © 1998 by Francesc Rocher
JSON output hacked and copyleft © 2014 by Florian Sesser
Charsets / OS/2 support © 2001 by Kyosuke Tokoro