Sunday, February 21, 2016

PETN Synthesis

HOW TO MAKE C4

INGREDIENTS:

12 oz. spackling putty or 20 packs of Silly Putty

1 container Petroleum Jelly (Vasaline)

Candle Wax

12 Oz. Isopropol (rubbing) alcohol

A heat source (hot plate, stove, etc.)

A hydrometer or battery hydrometer

A large Pyrex, or enameled steel container

6 inch length of polyester yarn

Flour or Corn Starch

24 Oz. cooking oil (Canola Oil works best)

1 package wire pipe cleaners

2 packages (2.8 Oz) clear gelatin

Place four cups of tap water in your Pyrex container, and begin heating it until it boils. Add the gelatin, and mix thoroughly. Remove from heat, and allow it to cool completely, then add 4 Oz. of cooking oil, and stir. You should notice a thin layer of solids beginning to form near the top. Scrape off the solids, and place them in a small container. Place them in the freezer.

Next, light your candle, allowing the melted wax to accumulate. In your bowl, mix the petroleum jelly, cooking oil, putty, and corn starch until well blended. Test the mixture with the hydrometer. You should get a reading of 17. If you do not get this reading, keep mixing.

Now remove the chilled mixture from the freezer. BE CAREFUL. The mixture is highly unstable at this point. Add it to the compound in the bowl - the blend should have the consistency of ice cream. Stir in the mixture VERY CAREFULLY.

Now, take approximately 1/3 of your compound, and form it into a ball shape. Often you will see C4 molded into a square, but a sphere-type charge guarantees the highest detonation velocity. You should mold the shape to a density of 1.3 grams in a cube. Dip the ball into the candle wax to seal the compound from moisture. Form a second ball, slightly smaller than the first, and also dip it into the wax. Stack this ball on top of the first. Finally, make a third ball, smaller than the first two, and stack it on top. This three-tiered formation will cause a cascading detonation effect that is absolutely devastating.



You will need your pipe cleaners now. You will insert them into each side of the middle ball - this is where your detonator will attach to the device. There will be three hookups for each side, so you must twist together three pipe cleaners so that they branch out (see Illustration).



Insert the pipe cleaners on opposite sides of the 3-tiered shape. Next you will need your yarn. Tie the yarn around the compound, at the joint between the top second and third sections. Tie it loosely, and let the remaining yarn hang down in front of the charge. This will form a secondary fuse, should it become necessary.

Now, to mark your bomb. This is extremely important. You will need to identify your device according to the internatinal munitions protocol. The first marking will be two black dots near the top of the charge, on the top sphere (use a fine-point black magic marker for this). These dots should be horizontal, about one inch apart. This signifies that it is a class 2 explosive (meaning it’s homemade). Below these dots, place a single third dot. This means it is a class 1 hazardous material (meaning the most dangerous). Then, below this formation line up five dots close together - that will indicate that this is Composition 4. REMEMBER: IT IS ILLEGAL TO MAKE YOUR OWN EXPLOSIVES IF YOU DO NOT MARK THEM PROPERLY.

The finished product is below. As I stated before, it is dangerous to store this material in a closed area. The ideal storage medium is out in the open, preferably on a coffee table, where you can keep a close eye on it. You will probably want to leave it there during the winter and holiday months, but it is wise to dispose of it during spring and summer, when the chemicals become the most volatile. 

Friday, February 19, 2016

 Agent Staining is a technique that
involves writing a unique marker (or stain)
onto a target machine. Each stain is
visible in passively collected SIGINT
and is stamped into every packet, which
enables all the events from that stained
machine to be brought back together to
recreate a browsing session.”
  
http://cryptome.org/2013/10/gchq-mullenize.pdf
  
http://s3.documentcloud.org/documents/801762/mullenize-28redacted-29.pdf
  
¤ Packet Staining ::
  
http://prezi.com/p5et9yawg2c6/ip-packet-staining/
http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-00
http://tools.ietf.org/html/draft-macaulay-6man-packet-stain-01
http://cryptome.org/2013/10/packet-stain/packet-staining.htm
  
¤ NSA Peeling Back the Layers of Tor ::
  
http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document
http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
  
¤ NSA ; Tor Source Code Vulnerabilities ::
  
 “We have seen several targets using Tor.
Our goal was to analyze Tor source code
and determine any vulnerabilities in
the system. We set up an internal Tor
network to analyze Tor traffic, in the
hopes of discovering ways to passively
identify it. We also worked to create
a custom Tor client which allows the
user finer control.” ... ...
  
 “This accomplishes several things.
Most basically, the Tor servers, many
of which are listed on publicly advertised
directory servers, are chosen to act as
a series of proxies. This may seem to
be excessively complex, as a single
proxy server can be used to hide one’s
location, but a single-hop proxy is
vulnerable in two ways. First, by
analyzing the pattern of the traffic
going to and from the proxy server,
it is possible to deduce which clients
are making which requests. Second, if
an attacker owns the proxy server, then
it certainly knows who is asking for what,
and anonymization is ruined. By using
multiple hops, Tor is much more resistant
to both of these attacks. Traffic analysis
becomes extraordinarily difficult, as it
must be coordinated across several machines,
and an attacker must own all the hops
along the circuit in order to trace
requests back to the originating client.”
  
... ...
  
 “In our time in the lab, we found that
running an nmap on a node that is offering
a hidden service will turn up the port
that the hidden service is using to deal
with incoming connections. It can then be
directly connected to, outside of Tor.”
  
... ...
  
 “We would have to try to connect to
each of the ports we see open on a
machine to determine if there is a
hidden service being run. We would not
even know which protocol the hidden
service is running. It may be an HTTP
server, an FTP server, an SMTP server,
etc. The only thing we know is that
the protocol must run over TCP. It is
not enough to attempt to connect once
to each port, using an HTTP GET request.
Several protocols must be tried.”
  
... ...
  
 “It may also be useful to study Tor
directory servers in more detail. Our
work focused solely on the client, but
many attacks would be much easier with
access to more Tor servers. The directory
servers ultimately control which Tor
servers are used by clients. We have found
that a server can put itself on a directory
server multiple times; all it takes is the
server running several Tor processes, each
having a different nickname, open port,
fingerprint, and LOG FILE. This only
requires different configuration files
for the different processes, which are
easy to set up. That machine will handle
a disproportionate amount of traffic,
since it is listed several times. This
increases the density of friendly servers
in the cloud without increasing the number
of servers we have set up. Unfortunately,
each listing has the same IP address,
which would be very noticeable to anyone
who inspecting the directories.”
  
http://cryptome.org/2013/10/nsa-tor.pdf
http://s3.documentcloud.org/documents/802061/ces-summer-2006-tor-paper-28redacted-29-1.pdf
http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
  
¤ NSA ; Types of IAT ::
  
http://cryptome.org/2013/10/nsa-iat-tor.pdf
  
¤ NSA Link Removed by Guardian ::
  
http://cryptome.org/2013/10/nsa-link-removed.htm
  


The classified files – provided previously by NSA
whistleblower Edward Snowden – contain new details
about groundbreaking surveillance technology the
agency has developed to infect potentially millions
of computers worldwide with malware “implants.” The
clandestine initiative enables the NSA to break into
targeted computers and to siphon out data from foreign
Internet and phone networks.
  
https://prod01-cdn02.cdn.firstlook.org/wp-uploads/2014/03/nsa_malware_feature.jpg
https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/turbine-large.jpg
https://prod01-cdn01.cdn.firstlook.org/wp-uploads/2014/03/tao-2-1024x768.png
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076889/nsa-technology-directorate-analysis-of-converged.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1077724/industry-scale-exploitation.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1077721/thousands-of-implants.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076859/nsa-phishing-tactics-and-man-in-the-middle-attacks.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076891/there-is-more-than-one-way-to-quantum.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/1076862/quantum-insert-diagrams.pdf

NSA TURBINE Automated Hacking Documents (Mirrored) ::
  
http://cryptome.org/2014/03/nsa-turbine-turmoil.pdf
http://cryptome.org/2014/03/nsa-industry-exploit.pdf
http://cryptome.org/2014/03/nsa-converged.pdf
http://cryptome.org/2014/03/nsa-quantum-insert.pdf
http://cryptome.org/2014/03/nsa-thousands-implants.pdf
http://cryptome.org/2014/03/nsa-gchq-quantumtheory.pdf
http://cryptome.org/2014/03/nsa-more-than-one-way.pdf
http://cryptome.org/2014/03/nsa-hammerchant.pdf
http://cryptome.org/2014/03/nsa-phishing-mtm.pdf
http://cryptome.org/2014/03/tao-quantuminsert-bonanza.htm

NSA Hacking Routers & Social Media (Misc) ::
  
http://cryptome.org/2014/03/nsa-5-eyes-hacking.pdf
http://cryptome.org/2014/03/nsa-menwith-xkeyscore.pdf
http://cryptome.org/2014/03/nsa-selector.pdf

GCHQ ROYAL CONCIERGE Diplomatic Hotel Spy ::
  
http://cryptome.org/2013/11/gchq-royal-concierge-de.pdf
  
http://cryptome.org/2013/11/gchq-royal-concierge.jpg
  
¤ GCHQ Monitors Diplomats Hotel Bookings ::
  
 Britain’s GCHQ intelligence service monitors
diplomats’ travels using a sophisticated
automated system that tracks hotel bookings.
Once a room has been identified, it opens
the door to a variety of spying options.
So the non radioactive detected constainer is made of :
Lead container with 5.7% antimony;
Paraffin wax charged with 23% barium chromate;
— Polyurethane foam;
— Borosilicate glass


on cargo : air condicioners mislead the gamma detectors

Thursday, February 18, 2016

no radioactive trace can be detected by thermal sensors satellites cargo cover with kilos of wax, on the north atlantic.
There is a vessel with traces of radiocative detected by thermal satellite, coming to Europe's West Coast, belonging to a danish transportation company, that stopped in Bermudas coming from Mexico, probably get payed on offshore, hack the ship software and unbalance the cargo, so it can be dropped on the water.
I got an operation: an Eclelon agent run away from southeast asia, went with an old passaport to south africa, there was hint on the old passaport detection system; He got if from a drug mule, that got it from someone looked like him in cape town, he insisted to get payed cash for the passport on BND, he's asking for political asylim in Tadijkstan staying inside an heavy guard army building; he's supposed to having someone passing intel; two options, get inside an killing him or payed Tadjisktan, probably don't want to loose him.

Wednesday, February 17, 2016

Do you know what is setting up a double agent? Someone sends an email to a journalist, or several emails, telling a story about an american organization fucking south america! but the story is fake, and has no possible damage . Now she goes to the editor and he stalls the publishing wiating for the newspaper admistration clear the story! then the editor is treathd by anonimouse calls! then her laptop disseapers! so the sender is not revealed. Then the local journalist woman , on american payroll,, releases the story, and then she is hired to investigate for the local government; and so, double agent set up!

Tuesday, February 16, 2016

Portuguese company DEFEX, using a host of fake companies in Austria and Holland ...; and suspected role in having financed and supplied the explosives used to blow up the Israeli Embassy in Buenos Aires in 1992
.... Just eight days after the assassination, the vehicle used in the embassy bombing was purchased in Buenos Aires by an individual with a Portuguese accent who signed documents with a last name different from the one on his identification. Three weeks later, the embassy was in ruins

Monday, February 15, 2016

depleted uranium dioxide from Portugal

concelho de Nelas, tomaram conhecimento da existência de um stock de urânio guardado nas instalações da antiga Empresa Nacional do Urânio (ENU). Este stock, de cerca de 200 toneladas de concentrado de urânio (também chamado “yellow cake”), é o que resta das 4370 toneladas produzidas durante 50 anos nas instalações da ENU junto da antiga mina da Urgeiriça.
A existência do stock de urânio, talvez desconhecido de muita gente, originou interrogações sobre a perigosidade do material armazenado, a vulnerabilidade do local e a possibilidade de grupos terroristas dele se apossarem para fabrico de bombas atómicas artesanais a usar em hipotéticos e devastadores atentados.


depleted” uranium dioxide from Portugal ...tal como o report da CIA que conduziu à guerra do Iraque

Many other countries contributed as well; since Iraq's nuclear program in the early 1980s was officially viewed internationally as for power production, not weapons, there were no UN prohibitions against it. An Austrian company gave Iraq calutrons for enriching uranium. The nation also provided heat exchangers, tanks, condensers, and columns for the Iraqi chemical weapons infrastructure, 16% of the international sales. Singapore gave 4,515 tons of precursors for VX, sarin, tabun, and mustard gasses to Iraq. The Dutch gave 4,261 tons of precursors for sarin, tabun, mustard, and tear gasses to Iraq. Egypt gave 2,400 tons of tabun and sarin precursors to Iraq and 28,500 tons of weapons designed for carrying chemical munitions. India gave 2,343 tons of precursors to VX, tabun, Sarin, and mustard gasses. Luxembourg gave Iraq 650 tons of mustard gas precursors. Spain gave Iraq 57,500 munitions designed for carrying chemical weapons. In addition, they provided reactors, condensers, columns and tanks for Iraq’s chemical warfare program, 4.4% of the international sales. China provided 45,000 munitions designed for chemical warfare. Portugal provided yellowcake between 1980 and 1982. Niger provided yellowcake in 1981.