Sunday, February 21, 2016
HOW TO MAKE C4
INGREDIENTS:
12 oz. spackling putty or 20 packs of Silly Putty
1 container Petroleum Jelly (Vasaline)
Candle Wax
12 Oz. Isopropol (rubbing) alcohol
A heat source (hot plate, stove, etc.)
A hydrometer or battery hydrometer
A large Pyrex, or enameled steel container
6 inch length of polyester yarn
Flour or Corn Starch
24 Oz. cooking oil (Canola Oil works best)
1 package wire pipe cleaners
2 packages (2.8 Oz) clear gelatin
Place four cups of tap water in your Pyrex container, and begin heating it until it boils. Add the gelatin, and mix thoroughly. Remove from heat, and allow it to cool completely, then add 4 Oz. of cooking oil, and stir. You should notice a thin layer of solids beginning to form near the top. Scrape off the solids, and place them in a small container. Place them in the freezer.
Next, light your candle, allowing the melted wax to accumulate. In your bowl, mix the petroleum jelly, cooking oil, putty, and corn starch until well blended. Test the mixture with the hydrometer. You should get a reading of 17. If you do not get this reading, keep mixing.
Now remove the chilled mixture from the freezer. BE CAREFUL. The mixture is highly unstable at this point. Add it to the compound in the bowl - the blend should have the consistency of ice cream. Stir in the mixture VERY CAREFULLY.
Now, take approximately 1/3 of your compound, and form it into a ball shape. Often you will see C4 molded into a square, but a sphere-type charge guarantees the highest detonation velocity. You should mold the shape to a density of 1.3 grams in a cube. Dip the ball into the candle wax to seal the compound from moisture. Form a second ball, slightly smaller than the first, and also dip it into the wax. Stack this ball on top of the first. Finally, make a third ball, smaller than the first two, and stack it on top. This three-tiered formation will cause a cascading detonation effect that is absolutely devastating.
You will need your pipe cleaners now. You will insert them into each side of the middle ball - this is where your detonator will attach to the device. There will be three hookups for each side, so you must twist together three pipe cleaners so that they branch out (see Illustration).
Insert the pipe cleaners on opposite sides of the 3-tiered shape. Next you will need your yarn. Tie the yarn around the compound, at the joint between the top second and third sections. Tie it loosely, and let the remaining yarn hang down in front of the charge. This will form a secondary fuse, should it become necessary.
Now, to mark your bomb. This is extremely important. You will need to identify your device according to the internatinal munitions protocol. The first marking will be two black dots near the top of the charge, on the top sphere (use a fine-point black magic marker for this). These dots should be horizontal, about one inch apart. This signifies that it is a class 2 explosive (meaning it’s homemade). Below these dots, place a single third dot. This means it is a class 1 hazardous material (meaning the most dangerous). Then, below this formation line up five dots close together - that will indicate that this is Composition 4. REMEMBER: IT IS ILLEGAL TO MAKE YOUR OWN EXPLOSIVES IF YOU DO NOT MARK THEM PROPERLY.
The finished product is below. As I stated before, it is dangerous to store this material in a closed area. The ideal storage medium is out in the open, preferably on a coffee table, where you can keep a close eye on it. You will probably want to leave it there during the winter and holiday months, but it is wise to dispose of it during spring and summer, when the chemicals become the most volatile.
12 oz. spackling putty or 20 packs of Silly Putty
1 container Petroleum Jelly (Vasaline)
Candle Wax
12 Oz. Isopropol (rubbing) alcohol
A heat source (hot plate, stove, etc.)
A hydrometer or battery hydrometer
A large Pyrex, or enameled steel container
6 inch length of polyester yarn
Flour or Corn Starch
24 Oz. cooking oil (Canola Oil works best)
1 package wire pipe cleaners
2 packages (2.8 Oz) clear gelatin
Place four cups of tap water in your Pyrex container, and begin heating it until it boils. Add the gelatin, and mix thoroughly. Remove from heat, and allow it to cool completely, then add 4 Oz. of cooking oil, and stir. You should notice a thin layer of solids beginning to form near the top. Scrape off the solids, and place them in a small container. Place them in the freezer.
Next, light your candle, allowing the melted wax to accumulate. In your bowl, mix the petroleum jelly, cooking oil, putty, and corn starch until well blended. Test the mixture with the hydrometer. You should get a reading of 17. If you do not get this reading, keep mixing.
Now remove the chilled mixture from the freezer. BE CAREFUL. The mixture is highly unstable at this point. Add it to the compound in the bowl - the blend should have the consistency of ice cream. Stir in the mixture VERY CAREFULLY.
Now, take approximately 1/3 of your compound, and form it into a ball shape. Often you will see C4 molded into a square, but a sphere-type charge guarantees the highest detonation velocity. You should mold the shape to a density of 1.3 grams in a cube. Dip the ball into the candle wax to seal the compound from moisture. Form a second ball, slightly smaller than the first, and also dip it into the wax. Stack this ball on top of the first. Finally, make a third ball, smaller than the first two, and stack it on top. This three-tiered formation will cause a cascading detonation effect that is absolutely devastating.
You will need your pipe cleaners now. You will insert them into each side of the middle ball - this is where your detonator will attach to the device. There will be three hookups for each side, so you must twist together three pipe cleaners so that they branch out (see Illustration).
Insert the pipe cleaners on opposite sides of the 3-tiered shape. Next you will need your yarn. Tie the yarn around the compound, at the joint between the top second and third sections. Tie it loosely, and let the remaining yarn hang down in front of the charge. This will form a secondary fuse, should it become necessary.
Now, to mark your bomb. This is extremely important. You will need to identify your device according to the internatinal munitions protocol. The first marking will be two black dots near the top of the charge, on the top sphere (use a fine-point black magic marker for this). These dots should be horizontal, about one inch apart. This signifies that it is a class 2 explosive (meaning it’s homemade). Below these dots, place a single third dot. This means it is a class 1 hazardous material (meaning the most dangerous). Then, below this formation line up five dots close together - that will indicate that this is Composition 4. REMEMBER: IT IS ILLEGAL TO MAKE YOUR OWN EXPLOSIVES IF YOU DO NOT MARK THEM PROPERLY.
The finished product is below. As I stated before, it is dangerous to store this material in a closed area. The ideal storage medium is out in the open, preferably on a coffee table, where you can keep a close eye on it. You will probably want to leave it there during the winter and holiday months, but it is wise to dispose of it during spring and summer, when the chemicals become the most volatile.
Friday, February 19, 2016
Agent Staining is a technique that involves writing a unique marker (or stain) onto a target machine. Each stain is visible in passively collected SIGINT and is stamped into every packet, which enables all the events from that stained machine to be brought back together to recreate a browsing session.” http://cryptome.org/2013/10/gchq-mullenize.pdf http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf ¤ Packet Staining :: http://prezi.com/p5et9yawg2c6/ip-packet-staining/ http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00 http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01 http://cryptome.org/2013/10/packet-stain/packet-staining.htm ¤ NSA Peeling Back the Layers of Tor :: http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption ¤ NSA ; Tor Source Code Vulnerabilities :: “We have seen several targets using Tor. Our goal was to analyze Tor source code and determine any vulnerabilities in the system. We set up an internal Tor network to analyze Tor traffic, in the hopes of discovering ways to passively identify it. We also worked to create a custom Tor client which allows the user finer control.” ... ... “This accomplishes several things. Most basically, the Tor servers, many of which are listed on publicly advertised directory servers, are chosen to act as a series of proxies. This may seem to be excessively complex, as a single proxy server can be used to hide one’s location, but a single-hop proxy is vulnerable in two ways. First, by analyzing the pattern of the traffic going to and from the proxy server, it is possible to deduce which clients are making which requests. Second, if an attacker owns the proxy server, then it certainly knows who is asking for what, and anonymization is ruined. By using multiple hops, Tor is much more resistant to both of these attacks. Traffic analysis becomes extraordinarily difficult, as it must be coordinated across several machines, and an attacker must own all the hops along the circuit in order to trace requests back to the originating client.” ... ... “In our time in the lab, we found that running an nmap on a node that is offering a hidden service will turn up the port that the hidden service is using to deal with incoming connections. It can then be directly connected to, outside of Tor.” ... ... “We would have to try to connect to each of the ports we see open on a machine to determine if there is a hidden service being run. We would not even know which protocol the hidden service is running. It may be an HTTP server, an FTP server, an SMTP server, etc. The only thing we know is that the protocol must run over TCP. It is not enough to attempt to connect once to each port, using an HTTP GET request. Several protocols must be tried.” ... ... “It may also be useful to study Tor directory servers in more detail. Our work focused solely on the client, but many attacks would be much easier with access to more Tor servers. The directory servers ultimately control which Tor servers are used by clients. We have found that a server can put itself on a directory server multiple times; all it takes is the server running several Tor processes, each having a different nickname, open port, fingerprint, and LOG FILE. This only requires different configuration files for the different processes, which are easy to set up. That machine will handle a disproportionate amount of traffic, since it is listed several times. This increases the density of friendly servers in the cloud without increasing the number of servers we have set up. Unfortunately, each listing has the same IP address, which would be very noticeable to anyone who inspecting the directories.” http://cryptome.org/2013/10/nsa-tor.pdf http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html ¤ NSA ; Types of IAT :: http://cryptome.org/2013/10/nsa-iat-tor.pdf ¤ NSA Link Removed by Guardian :: http://cryptome.org/2013/10/nsa-link-removed.htm
The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/03/nsa_malware_feature.jpg https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/turbine-large.jpg https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/tao-2-1024x768.png https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf
NSA TURBINE Automated Hacking Documents (Mirrored) :: http://cryptome.org/2014/03/nsa-turbine-turmoil.pdf http://cryptome.org/2014/03/nsa-industry-exploit.pdf http://cryptome.org/2014/03/nsa-converged.pdf http://cryptome.org/2014/03/nsa-quantum-insert.pdf http://cryptome.org/2014/03/nsa-thousands-implants.pdf http://cryptome.org/2014/03/nsa-gchq-quantumtheory.pdf http://cryptome.org/2014/03/nsa-more-than-one-way.pdf http://cryptome.org/2014/03/nsa-hammerchant.pdf http://cryptome.org/2014/03/nsa-phishing-mtm.pdf http://cryptome.org/2014/03/tao-quantuminsert-bonanza.htmNSA Hacking Routers & Social Media (Misc) :: http://cryptome.org/2014/03/nsa-5-eyes-hacking.pdf http://cryptome.org/2014/03/nsa-menwith-xkeyscore.pdf http://cryptome.org/2014/03/nsa-selector.pdfGCHQ ROYAL CONCIERGE Diplomatic Hotel Spy :: http://cryptome.org/2013/11/gchq-royal-concierge-de.pdf http://cryptome.org/2013/11/gchq-royal-concierge.jpg ¤ GCHQ Monitors Diplomats Hotel Bookings :: Britain’s GCHQ intelligence service monitors diplomats’ travels using a sophisticated automated system that tracks hotel bookings. Once a room has been identified, it opens the door to a variety of spying options.
Thursday, February 18, 2016
There is a vessel with traces of radiocative detected by thermal satellite, coming to Europe's West Coast, belonging to a danish transportation company, that stopped in Bermudas coming from Mexico, probably get payed on offshore, hack the ship software and unbalance the cargo, so it can be dropped on the water.
I got an operation: an Eclelon agent run away from southeast asia, went with an old passaport to south africa, there was hint on the old passaport detection system; He got if from a drug mule, that got it from someone looked like him in cape town, he insisted to get payed cash for the passport on BND, he's asking for political asylim in Tadijkstan staying inside an heavy guard army building; he's supposed to having someone passing intel; two options, get inside an killing him or payed Tadjisktan, probably don't want to loose him.
Wednesday, February 17, 2016
Do you know what is setting up a double agent? Someone sends an email to a journalist, or several emails, telling a story about an american organization fucking south america! but the story is fake, and has no possible damage . Now she goes to the editor and he stalls the publishing wiating for the newspaper admistration clear the story! then the editor is treathd by anonimouse calls! then her laptop disseapers! so the sender is not revealed. Then the local journalist woman , on american payroll,, releases the story, and then she is hired to investigate for the local government; and so, double agent set up!
Tuesday, February 16, 2016
Portuguese company DEFEX, using a host of fake companies in Austria and Holland ...; and suspected role in having financed and supplied the explosives used to blow up the Israeli Embassy in Buenos Aires in 1992
.... Just eight days after the assassination, the vehicle used in the embassy bombing was purchased in Buenos Aires by an individual with a Portuguese accent who signed documents with a last name different from the one on his identification. Three weeks later, the embassy was in ruins
.... Just eight days after the assassination, the vehicle used in the embassy bombing was purchased in Buenos Aires by an individual with a Portuguese accent who signed documents with a last name different from the one on his identification. Three weeks later, the embassy was in ruins
Monday, February 15, 2016
depleted uranium dioxide from Portugal
concelho de Nelas, tomaram conhecimento da existência de um stock de urânio guardado nas instalações da antiga Empresa Nacional do Urânio (ENU). Este stock, de cerca de 200 toneladas de concentrado de urânio (também chamado “yellow cake”), é o que resta das 4370 toneladas produzidas durante 50 anos nas instalações da ENU junto da antiga mina da Urgeiriça.
A existência do stock de urânio, talvez desconhecido de muita gente, originou interrogações sobre a perigosidade do material armazenado, a vulnerabilidade do local e a possibilidade de grupos terroristas dele se apossarem para fabrico de bombas atómicas artesanais a usar em hipotéticos e devastadores atentados.
depleted” uranium dioxide from Portugal ...tal como o report da CIA que conduziu à guerra do Iraque
Many other countries contributed as well; since Iraq's nuclear program in the early 1980s was officially viewed internationally as for power production, not weapons, there were no UN prohibitions against it. An Austrian company gave Iraq calutrons for enriching uranium. The nation also provided heat exchangers, tanks, condensers, and columns for the Iraqi chemical weapons infrastructure, 16% of the international sales. Singapore gave 4,515 tons of precursors for VX, sarin, tabun, and mustard gasses to Iraq. The Dutch gave 4,261 tons of precursors for sarin, tabun, mustard, and tear gasses to Iraq. Egypt gave 2,400 tons of tabun and sarin precursors to Iraq and 28,500 tons of weapons designed for carrying chemical munitions. India gave 2,343 tons of precursors to VX, tabun, Sarin, and mustard gasses. Luxembourg gave Iraq 650 tons of mustard gas precursors. Spain gave Iraq 57,500 munitions designed for carrying chemical weapons. In addition, they provided reactors, condensers, columns and tanks for Iraq’s chemical warfare program, 4.4% of the international sales. China provided 45,000 munitions designed for chemical warfare. Portugal provided yellowcake between 1980 and 1982. Niger provided yellowcake in 1981.
A existência do stock de urânio, talvez desconhecido de muita gente, originou interrogações sobre a perigosidade do material armazenado, a vulnerabilidade do local e a possibilidade de grupos terroristas dele se apossarem para fabrico de bombas atómicas artesanais a usar em hipotéticos e devastadores atentados.
depleted” uranium dioxide from Portugal ...tal como o report da CIA que conduziu à guerra do Iraque
Many other countries contributed as well; since Iraq's nuclear program in the early 1980s was officially viewed internationally as for power production, not weapons, there were no UN prohibitions against it. An Austrian company gave Iraq calutrons for enriching uranium. The nation also provided heat exchangers, tanks, condensers, and columns for the Iraqi chemical weapons infrastructure, 16% of the international sales. Singapore gave 4,515 tons of precursors for VX, sarin, tabun, and mustard gasses to Iraq. The Dutch gave 4,261 tons of precursors for sarin, tabun, mustard, and tear gasses to Iraq. Egypt gave 2,400 tons of tabun and sarin precursors to Iraq and 28,500 tons of weapons designed for carrying chemical munitions. India gave 2,343 tons of precursors to VX, tabun, Sarin, and mustard gasses. Luxembourg gave Iraq 650 tons of mustard gas precursors. Spain gave Iraq 57,500 munitions designed for carrying chemical weapons. In addition, they provided reactors, condensers, columns and tanks for Iraq’s chemical warfare program, 4.4% of the international sales. China provided 45,000 munitions designed for chemical warfare. Portugal provided yellowcake between 1980 and 1982. Niger provided yellowcake in 1981.
Subscribe to:
Posts (Atom)
Ambassador @EmbaixadaRusPt URGENT INTEL the guy hedge fund is stable wontget higher to convince investors until end of the day @realDonaldTrump desesperate either help friends either stay with some cents @USTreasury @POLITICOEurope @ecb @FT @WSJ @EUCouncil @DeptofDefense
https://www.mediaite.com/news/billionaire-trump-backer-bill-ackman-skewers-howard-lutnicks-glaring-conflict-of-interest-he-profits-when-ou...
