Home

Cybertek #9

image

Contents

1. Lowell Michigan 49331 How To Contact The Militia Ed Note In light of some moves made by our elected rep resentitives and their bureaucratic underlings that could be considered totalitarian people across the country have been forming citizen s militias The concept of a citizen mi litia is well grounded in our country s law which considers every citizen above the age of 18 part of it and makes a distinction betwen it calling us the unorganized militia and the organized militia which is the national guard and reserves In addition surpeme court cases involving fire arms ownership have consistently based their decisions on the suitability of weapons for militia purposes If one checks the laws they will find that contrary to the recent ramblings of certain socialist media types these militias ore totally legal Recently we received this press release from one of these militia units UNCLASSIFIED APPROVED FOR PUBLIC RELEASE DATE 18NOV94 FILE PUB 94 001 TO POTENTIAL amp OPERATIONAL UNORGANIZED MILITIA UNITS FROM TRADOC WEST PUT NY UNORG MILITIA TOPIC INITIAL CONTACT SOI BEGIN TEXT The following SOI has been adopted by WEST PUT NY UNORG MILITIA and is intended for nationwide unclassi fied initial contact communications needs between different militia units Standard OPSEC and COMSEC procedures apply Militia units should adopt their own secure SOls for intra unit communications and for inter unit communica
2. ity What is important is the correct identification of those who will be susceptible reaching them and doing it with the correctly fashioned message to evoke the desired response lt is important to remember at this time that the mecha nism that can be relied upon for replication of a meme into a host is a primitive one it is not susceptible to reasoned arguments or sophisticated ones This is more of a case of life imitating art people don t perceive reality only their perceptions of reality everything is second hand people live their myths and only tolerate their reality 6 2 1 Target Hosts Proper identification of the target hosts conserves re sources and so should be done carefully Individuats who have recently undergone crisis events are particularly sus ceptible to most any message this group are the most likely to undergo a religious conversion or complete change of life bchavior The uneducated inexperienced or unsophis ticated lack the more advanced cognitive mechanisms for manipulation of language and for fillering it acting like an immune system Individuals who need to fill a void such as college students away from home commonly for the first tme are ripe targets for more than an education as numerous cults have found The Jesuit belief that if you catch them early and they are yours for life seems true for more than religion such identifications as brand loyalty are also fixed
3. tempval decipher where current WRITE plain tempval Current current step END iwhilej END decode BEGIN main elrscr writein One Time Cipher 1 00 writeln write E nerypt or Diecrypt user readkey writeln write Plaintext file name Teadinifnamel assigniplain fname write Ciphectext file name readin fname assignicipher fname write Start value j readin start write Step value readin step IF upcase USER E then encode IF upcase USER D then decade close plain close ciphert END main Memetic Engineering PsyOps and Viruses for the Wetware by Atreides Managing Director The Nemesis Group Bunbu Itchi Japanese phrase meaning Pen and Sword in accord Most practitioners of the hard sciences look down their noses at whal they refer to as the fuzzy sciences those do mains that are limited to passive observation with no or only limited application to the real world This is an under standable chauvinism when they look around them they see bridges skyscrapers automobiles airplanes cellular phones CAT scanners synthetic fibers all the fruits of their labors What could compete with all that Because of this chauvinism by definition in fact a fu sion synthesis or synergy take your pick of terms com bining very powerful aspects of cerain hard mathematically malleable sciences and soft non quantifiab
4. Crafling a set of memes that take into account vanous per ceptions of events can create an impenetrable chaos the actual facts are wrapped like successive layers of an onion around the core Each laver of the onion is yet another plausible interpretation of events mixed with red herrings use of multiple layers insures that if one or a few get peeled off the truth still remains covered Interestingly tailoring a few layers of the memetic cover story for specific types of probers can send them off with their expectations properly met but with the truth still secure 7 3 Cultural Manipulation amp Cultural Warfare As a lool of covert intelligence and operations memetic engineering has considerable potential Politics by its na ture lies pun intended on perceptions and so becomes an easy target for this sort of operation There are other uses for the practice that are morc indi rect yet beneficial For instance the region of the former Soviet Union is in chaos the operational paradigm under which they have been operating having been completely shattered Some want to return to the old ways because it is familiar it fits with their paradigm Yet all those people have had their myths shattered this makes them danger ously susceptible to any chance meme that happens along Taking advantage of this ready made larget group should be done as soon as possible instilling a new myth that is beneficial to the West Int
5. root out We gain an ability to be more selective in our beliefs at the cost of an amazingly robust learning process that is native to the human mind That is not to say that the fac ulty goes away it does not it is onty harder to get to Humans develop blinders a functional inability to recog nize or process certain symbols or concepts that do not agree with the operational psychology of the resident wetware Kuhn when examining scientific progress coined the term paradigm to explain the issue people wear rose colored glasses that causes them fo see or interpret the world around them in a way consistent with that which they already believe Oddly enough this seems an odd corollary of the Copenhagen interpretation of quantum reality or the bane of the professional intelligence gatherer which is you get what you look for and in many cases only what you look for The human mind has a unique ability to take a large body of data or an unknown situation and put what ever interpretation upon it suits them the most ignoring everything else Take as given this level of uncertainty as to the underlying truth of things and sure enough you come around to tell them enough times and they come to believe it the operational philosophy of both Goebbels and Madi son Avenue 4 0 An Expanded Model of Communication Review of a communication model may be helpful at this point so a walk through is in order Pa
6. grey matter providing you with senses nerve endings neurons and sofiware combined from that odd core of your being that is doing the reflecting and the ma terial it is reflecting upon kind of like a computer program and its data That isn t the whole story of course there is an unidentified extra component the wetware that gives you free will volition self awareness We know next to nothing about how this piece works it appears to be an odd combination of chaotic and stochastic processes transcend ing both About the only thing we know for certain about the human mind is that we haven t even begun to utilize it to its full potential 3 0 Language the Building Blocks of the Mind Very little of what we think of as conscious thought goes on without language Language seems not so much an ex pression of thought but the basic assembly materials of it as such it is also the limiting factor to a peoples thought process for an instructive example track the historical ten dency in the New World for English speakers to favor free markets and democracy while Spanish speakers favored controlled markets and oppressive governments Language has its limitations for instance there are some things that can t be represented only evoked such as emotions Com munication is thus limited to the realm of dogma where the symbols passing back and forth between people are just second hand slices of someone else s point
7. more efficient signal To the best of my knowledge there are no walkie talkie CBs thal have SSB The rigs you buy should be capable of being modified for extra output power and extended frequency coverage The higher output power will extend your communications range and the extended frequency coverage will give you extra channels that offer a little more privacy Several books are available via mail order that provide details on such modifications Note however thal modifying CB ra dios for extra power output and frequency coverage is against FCC regulations unless you are an amateur radio operator modifying them for 10 meter band 28 Mhz lo 29 7 Mhz operation Should you get caught violating FCC regulations you re equipment will be seized and you will most likely get hit with a sizable fine Since you really have better things to do with your money suggest you play it safe and obey FCC regulations After the collapse occurs however whatever works to help you survive will be the order of the day and I think thcre will be worse things to worry about when the balloon fi nally goes up than the FCC Whenever possible you should use SSB for intra group communications Most CBs used by the genera public only feature AM mode as that form of transmission requires less operator expertise to use especially in a vehicular setting where the driver is also the radio operator Jn addition to providing better range SSB transmissions will s
8. of view The amazing thing is that it is capable of occurring at all When very young and with the mind acting continually to acquire patterns to imitate and mimic the basic building blocks of communication become programmed View them as precursors primitives or archetypes they are critical pieces necessary to interaction with the environment for the rest of your life When someone tells you something is blue you are forced back into the original foundation of your language skills the same for most anything we view as baby talk those simple one syllable words that form the Jeast common denominator of all other concepts Obvi ously access to this primal mechanism in the human mind would be quite powerful access however becomes more complicated over time It appears that without constant use the capability alrophies much like a muscle as we grow and become more sophisticated higher reasoning centers and capabilities of abstraction come into play leaving the more basic and powerful store and repeat functions alone We also tend to create a center of disbelief while young it is statistically likely that most of the behavior and language acquired is pro survival while later in life this probability radically decreases Any adult with exposure to children will note how easy it is to convince them of things soon though children stop believing in the Easter Bunny or Santa Ctaus and other spurious bits ihat are easy to
9. overwrite your source data The program is very basic and doesn t check prototypical one time cypher system PROGRAM one_time_cipher input output USES crt TYPE datafile FILE OF BYTE VAR plain datafile cipher datafile Start REAL step REAL user CHAR fname string our function to be FUNCTION pseudo x BEGIN pseudo which could be anything we want it REAL BYTE pseudo ROUND 200 SIN 180 END pseudo PL x x xP sf FUNCTION encipher BYTE BEGIN encipher forig BYTE value REAL IF orig pseudo value gt 255 THEN encipher orig pseudo value 256 ELSE encipher orig pseudo value END encipher FUNCTION deciphec orig BYTE value REAL BYTE BEGIN decipher IF orig pseudo value lt THEN decipher orig pseudo value 256 ELSE decipher orig pseudo valve END decipher PROCEDURE encode VAR where byte current real tempval byte BEGIN encode REWRITE i cipheri RESET plain current start WHILE NOT EOF piain DO BEGIN whiie READ plain where tempval encipher where WAITE icipher tempval current current step END whilej encade current END PROCEDURE decade VAR where byte current i real tempval byte BEGIN decode REWRITE piain RESET cipher current i start WHILE NOT EOF cipher DO BEGIN whiltel READ cipher where
10. tions after initial contact and credential verification DO NOT USE THIS SOI FOR CLASSIFIED OR MISSION CRITICAL COMMUNICATIONS l Citizens Band Primary initial contact Channel 14 AM mode Secondary Channels 5 11 30 35 AM mode The secondary channels are to be used in the order pre sented above in case of interference 14 10 5 to 11 to 30 to 35 to 14 Tell your party to Go up one and then pro ceed to the next secondary channel When communicating on this band call Break for Union Jack to initiate communications with other Militia units on frequency 2 2 Meter Amateur Radio Band 146 535 Mhz Simplex No CTCSS PL An amateur radio license of at least Technician class is required to operate on this frequency Initiate contact by calling CQ and discreetly bringing up the subject NOTE This frequency is open to all radio amateurs holding the ap propriate license classes A portion of them do not share our beliefs 3 49 Mhz No License Band Channel A B C D E in that order If a frequency is in use in your area go the next higher one Initiate communications with the phrase Calling for a militia contact this is lt use pseudonym of choice gt Y Classifieds UNDERGROUND INFORMATION Computer Security Hacking Phones Survivalism Cryptography and more Catalog 2 SHP 862 Farmington Avenue Suite 306 Bristol CT 06010 CONSULTING SERVICES NOW AVAILABLE The staff of OCL Magnitude Cybertck ar
11. while subjects are young For more sophisticated hosts the messages musi be more diffuse but that in fact seems to aid in transmission just as people strain harder to hear a whisper concepts that they absorb or receive through extrapolation seem to by pass filters better This seems to be akin to tweening in motion pictures where an eye will smooth the actual jerky motions into smooth action people fill in cracks they categorize and these tendencies can be put to good use 6 2 2 Crafting the Meme A robust meme needs good thoughtful design like a well taid out house or city Many memes suffer from organic growth problems where they are undirected unmanaged and soon die under their own weight Creation of a meme requires that the engineer frame the correct intent for best performance value just as with a military mission if you can t state the objective you aren t likely to succeed It is important to identify the right buttons to push the releas ers or triggers for behavior that are desired note that a tar get subject can act or react based upon a meme and a clearly directed outlet should be built in Unlike with 2 biological automata the meme should not unnecessarily impair the host and their abiliry to function making certain that the meme and host fits into the system is critical to the spread and overall influence of the meme The memetic engineer will likely want direct unaltered transmiss
12. would be on foot bicycle horse by sail boats by canoe amp paddle or rarely a motorcycle of even a moped and even rarer by aulomobile As years go by what roads will be teft But there is another mode of travel ignored by most post collapse planners This is travel by aircrafi of many sorts Take for instance microlite aircrafi able to take off and land from afield cruise about on very little fuel while cov ering many miles of travel And for heavier craft bush pi lots for years have flown one and two engine craf equipped with pontoons and wheel combination for land water lakeofffandings During WWII Japanese air craft flew on alcohol even local homebrew Or how about hydrogen helium batloons or dirigibles for travel If properly constructed they can be used for world wide travel and even carry their own fleet of aircrafi along for fast reconnaissance defense or ground to air shuttling of passengers and cargo Yes hydrogen is very flammable but until you find enough helium to replace it by salvaging from welders s supply or recovering from natural gas wells can be used safely Heck the Germans did it for awhile For heavier cargo probably be moved by restored rail service rebuilt canal barge systems or by steam tractor road trains As for major highways only those maintained by private road companies will still be used And no doubt various technical survivors will utilize cel lular phones shortwav
13. you are getting your ground level education in the various self reliance fields you will undoubtedly be drawn to particular ones Those are the ones you should specialize in and master This may seem a tall order Some will say it s impossible In the days before TV our ancestors did ex actly what I am suggesting Take out your 12 gauge Put a round of 00 buckshot into that damned idiot box Mail it to Dan Rather as a token of what you think of him With that accursed distraction out of your way you ll have plenty of lime to leam what you need for the hard times ahead A people who mean to be their own governors must arm themselves with the power knowledge gives James Madison kg Citizen s Band Communications by Thomas Icon People looking for an inexpensive way to communicate via radio oflen choose Citizen s Band or CB as their means CB is probably the most widely used communica tions band in the U S CB has a colorful history in the U S In the late 70 s and early 80 s it was the focus of a great fad in this country which resulted in several movies and popular songs of the era Unfortunately this publicity caused the band to lose it s reputation as millions of people pul their ears on and used it lo practice their southern accent While the good buddy era has passed most people still have a CB in their car as it remains the best way to deter mine highway conditions and request assistance when stuck
14. 0 year Canadian US 25 year Overseas US 30 year Equivalent trades of similar periodicals interesting elec tronic equipment office supplies envelopes and 2 cent stamps accepted in lieu of monetary payment Cybertek Newsletier is Copyright 1994 1995 by OCL Magnitude All Rights Reserved The information in this newsletter is presented for educa tional purposes only No illegal use is implied or suggested The most important thing a practitioner of any art can have is their own mind The individuals who can resist fol lowing the crowd will always be ahead of their peers and will always have the means to deal with persecution Thomas Icom
15. 5 MHz K Dot 467 8125 MHz Silver Star 467 90 MHz Gold Star 467 875 MHz Blue Star 467 925 MHz Y One Time Cipher by Nick Halflinger This is a one time cipher The formula used is sin x 3 The program asks if you are encoding or decoding the data Type E or D The program asks you for the PLAINTEXT file name This is the english or binary data when it is not coded The program asks you for the CIPHERTEXT file name This is the encrypted data The program asks you for the starting value of X This is one of the two parameters that are special The program asks you for the step value of X This is the other special parameter To decipher a message you necd both the START and STEP values If someone else finds these values then the data can be read You must find a way to decide these val ues so that nobody else can figure them out You might want to use things like the file date size or something They can be any real number If you don t know what a one time cipher is or why it is secure find a good book on ciphers or security and find out This is not the place for a description You don t need to understand what makes this secure but it does help I ve tried about 1 2 meg of sample data including execu table files and text files There has not been one single error in encnption decnption in that time However I can t guarantee that there aren t any bugs If you put the wrong filenames in the wrong places you may
16. ad a different time period speci fied in that range 3 Telephone numbers to remote systems should be sup plied on a need to know basis The numbers should not be easily accessible by unauthorized personnel Accounts belonging to transferred or terminated em ployees should deleted immediately Information copied from a remote system to a worksta tion should be assigned the same level of protection that it had on the remote system Users should logoff a remote system before leaving their terminal Computers and related material diskettes software manuals modems et al should be given the same pro lection as any other highly portable and valuable prop erty When possibic they should be secured when not in use 4 5 6 w 7 8 Personal Computer users should make use of the sys tem s keyboard lock when not in use The key s senal number should be recorded Data on a hard disk or floppy diskettes should be backed up with the floppies being stored in a secure preferably remote location 10 Proprietary or Confidential information should be stored on floppy diskettes rather than on a system s fixed disk 9 Doing a Radiol reprinted from Full Disclosure 30 I have found a way of receiving your great radio program which I feel will help others receive Full Disclosure Live Ed Note Full Disclosure Live is on WWCR 5065 Khz Sundays at 7 8 PM Central Time Since I
17. am in prison you have to find new ways of getting to hear the truth This does work as I regularly listen to Full Disclosure Live VOA RCI CBC Canada BBC France Germany Netherlands R O C Cuba Time Signals WWV CHU and morse code all this on a modificd Sony walkman bought here at the prison I modified the radio to receive up to 10 Mhz Sony FM AM Walkman Model SRF 29 Modifying a walkman to receive shortwave 1 Open the back of the radio removing the two screws one in the battery holder one under the belt clip 2 After the back of the radio is removed look for a small copper wire wrapped iron bar at the top of the radio This is the AM antenna 3 You will see four small wires soldered to the antenna 4 Take six inches of smal multi strand wire afler strip ping about one half inch of the plastic from both ends of the wire Carefutly wrap one end of the wire around place 2 note on some radios of the same model place 3 picks up better Carefully solder or super glue or just carefully twist the wire onto the best place 2 or 3 7 You can cut a small groove in the edge of the radio to let the wire extend outside of the radio when the case is closed 8 I cut a small hole in the back of my radio so I could use the adjustable red coil to fine tune the shortwave Stations 9 The red painted coil sce above is used to fine tune the stations 10 Very carefully turn the coil to the lefi co
18. and assemble a sizable com munications network easily and for relatively little money Since CB is in very common use your group s communica lions will be go unnoticed among the thousands of other people who are using CB in your area Having CB pear in your possession will not call attention to you any more than it would for evervone else who owns it CB will also probably be the ideal inter community party line and hailing frequency However the same characteristics also cause problems The she r number of users causes interference which ham pers your range Everybody with a CB meaning everybody would be able to listen to your group s operations and know that you were in the area Those same listeners would be able to disrupt your communications just as easily as they are able to listen in with a variety of means ranging from simply keeping their microphone keyed to recording and playing back your previous transmissions to confuse you While this is we to a certain extent with all forms of radio communications elccironic countermeasures is most easily conducted against CB communications Your group should have a CB rig in its commo shack and in every vehi cle for use as an intelligence collection aid means of com munications with the outside world and alternate communications network for your group Any base or mo bile CB acquired should have SSB capability as SSB gives more range for the power used due to it s narrower
19. and near a small town village 15 Learn about first aid wilderness medicine herbal ra dionic and other alternative medica and health tech niques field sanitation and communicable disease control Study for and acquire an EMT Paramedic cer tification and beyond that if possible and vou feel par ucularly drawn to the healing arts 16 Learn at least the basics of producing acquiring your own food If you know how to do this you ll be O K no matter what happens to the stores Having a work ing knowledge of hunting fishing gardening particu larly smali scale hydroponics trapping homebrewing and raising animals will save you money in food bills and possibly save your life sometime 17 Learn the basics of shelter building As long as you know how to get a basic roof over your head under varying conditions you ll be O K 18 Never stop leaming Knowledge equals freedom These steps represent a basic starting point for those read ers interested in true self reliance and preparedness not the ramboesque bullshit that often passes for it The aim is to be a jack of all trades and master of a few that will help you live independently from the system as much as possible Actually it s not as isolationist as it sounds You should be participating in the economy of the small pleasant community where you live The system you ll be independent of is the mess that s responsible for this countn s decline While
20. e search will also likely provide leverage points where the effort invested gives back considerable retum It will be im portant to maintain a sense of realism however and focus efforts based on the needs of the intended goal is it neces sary to have a significant number of people over a short pe riod of time or a few dedicated people over a longer penod of time The engineer should follow the communication model and maintain the proper role and actions based on it 7 0 Operational Uses of Memetic Engineering Manipulation of this sort occurs all the time albeit primi tive and directed at such things as Drink Coke or Vote lt Whomever gt There are a great number of areas that me metic enginecring could have large scale effect 7 1 Jungian Economics Since most people don t know the difference between real worth and perceived value they get them very confused What makes a certain stock on the market worth more than another What causes a bank run People s perceptions do two stocks can have the same real worth and yet sell for wildly different amounts a perception of bank instability triggering a run becomes a self fulfilling prophecy It is all popular delusions and the madness of crowds Deliberate manipulation of perceived values can have extreme effects on a market and economy 7 2 Cover Stories Careful use of memetic concepts can provide the intelli gence community with the ideal process for cover stories
21. e communications fax machines and computers either from salvaged systems and parts or if possible locally manufactured This means of course just how well prepared you have made your survival library Yes one is going 10 have to include whalever books cover the design amp manufacturing of the high tech items you will need along with the tools or information on constructing those tools necessary to build hydrogen proof fabrics helium recovery systems or cutting siticon wafers into integrated circuits Also be good now to prelocate by using maps and phone books various industrial manufacturers and suppliers for future salvaging after the collapse This will safe many man hours and fuel supplies for your recon amp salvage scav engers later on Same can be said for any local welder s suppliers or natu ral gas wells in your area ALTERNATIVE ENERGY If you can afford to buy your solar cell panels hydroelectric generators even wind gen erators now do so Lf possible invest in all usable alterna Live systems practical for your area and needs As for the cost do remember even a solar cell panel of 1 amp production will be well worth having when your local utility dies for good someday Or how much would you pay Just to switch on a light especially when the power is gone forever LAST After the collapse it would be nice to hold a con vention for all you fellow survivors whom made it And for those who
22. e now available for consulting on information and electronic security disas ter preparedness personal security self reliance and specialized communications systems for individuals and businesses For more information write OCL Magnitude Consulting Services P O Box 64 Brewster NY 10509 WANTED Articles for Cybertck 10 We are seeking high quality practical how to articles on various aspects of lechnology security and self reliance Write us or call RuneStone BBS for topics of interest and compensation in formation or to submit an article Classified Ad Fee 5 cents word 20 word minimum Deadline for March April 95 Issue February 15 1995 Send ads to Cybertek P O Box 64 Brewster NY 10509 ATTN Classifieds Cybertek Newsletter Information Senior Editor Publisher Thomas Icom OCL Magnitude P O Box 64 Brewster NY 10509 thomas icom lirg com Layout Editor Anubis IRG anubis iirg com BBS Sysops Mercenary IIRG mercenary iirg com Brian Oblivion RDT LOpht Heavy Industries oblivion l0pht com Subscription amp Mailing Dept Assistance Brain Donor The Harbinger of Death Necross Sinister lonizer IIRG Writers Atreides Nick Halflinger Wildflower Dial In BBS The RuneStone BBS IRG WHQ 1 203 832 8441 10288 0700 THE IIRG New User Password Cyberdeck Internet BBS LOpht Heavy Industries Telnet 1Opht com FTP fip lOpht com Subscription Information Individual 15 year 6 issues Corporate 8
23. e of all content or total filtration of the message un til there is no content This is a product of the layers built initially by the mimicry mechanism and compounded by later cognitive faculties Depending upon the medium and channel Baker may give feedback reply ask for clarifica tion etc The message may initiate actions or reactions in Baker based upon an accurate match up of releasers ge stalls and concepts that evoke a response Baker may initiate a message becoming the Able party in the modci but the message must be reviewed in the light of the initial trigger Is the content of the initial message con linuing on thus successfully causing replication or trans mission being a meme with contagion Has the content changed If so was it done poorly bad replication a decay like the game of telephone Oddly mutation Improved upon and added to aggregation Did it spur new content offshoots Taken in ils entirety even basic communication is in credibly complex as stated earlier it s amazing it occurs at all As is evident in the model however is just how closely communication of ideas seems congruent with the spread of infection review of some basics on disease will help clarify this further 5 0 Diseases and Other Automata No matter what else may be an apparent effect the only purpose of a disease and automata is that of reproduction and metabolism Everyihing else is secondary most flu sympt
24. echanisms beyond those of conventional biology For Dawkins and other biologists this would function similarly to the discredited principles of Lamarckian evolu tion where acquired traits can be passed on to off spring On a practical biological level this is absurd removing the lails from lizards will not cause the offspring to be born without lails While physical characteristics are in no way transferable in such a convenient method psychological characteristics do indeed seem to be The young of most any species that has parents present through infancy child hood and adulthood appear to have a mechanism built in that is geared 10 learn through imitation this provides edu cation to the young in a cost efficient manner for the par eni and so seems to have won out in the natural selection process In human beings both behavior and language ap pear to transfer through this mimicry process part of our brain operating independently of conscious will acts as a self programming computer In a typical moment of whimsy Dawkins wonders if it is possible that Nature views the mind as a whole different eco system where memes compete via natural selection for control of a host Dawkins further speculates that if true memes are spreading mutating and evolving exponentially faster than their biological brethren it seems that the hu man mind is a fertile ground for expansion Given a cross divisional background and a cynical
25. een as spreading uncontrollably the accompanying paradigm shift was a simple concept as op posed to explaining a complicated democracy to illiterate and uneducated peasants and attractive to the majority of those it infected that they should have control a steady supply of food an education freedom from the oppression of the ruling class Without instituting a careful study and science of memetics we ll never know how to deal with such things in the future although it might be suspected that introduction of another primitive meme to counter it would work if only through the perpetuation of a chaotic state of affairs and the subsequent susceptibility of the population then taken advantage of that with another meme see the rise of Napoleon as an example 9 0 Protecting Yourself The best way to protect oneself knowing that this sort of thing is possible is the Delphic oracle s comment to know thyself Understanding the rudiments of what is going on allows for considerable self programming and self control a sophisticated person in fact will have a number of para digms and shif them at will It is interesting to note that prophylactic measures against this sort of thing have con siderable history for example Speculative Freemasonry in an attempt to counteract the rise of superstition and the power of the Church used various rituals and initiauions kept secret to increase the shock value to the participant to i
26. gas masks and learn about defense from nu clear biological and chemical hazards 4 Form into groups of three to ten trustworthy and reli able people 5 Keep your group s profile low and refrain from overt ac tivity that would attract unwanted attention 6 Develop alternate communications systems such as cou riers radio or computer networks 7 Gather as much intelligence as possible about the vari ous factors affecting your survival in your area and sur rounding regions Make your group s plans according to information you receive 8 Stockpile a minimum three month to two year food and water supply for your group 9 Acquire communicauions equipment CBs scanners ham radio equipment shortwave receivers modems packet radio equipment linemans test sets etc 10 Acquire a reliable common easily repaircd vehicle Collect spare parts and try to keep a minimum of 40 50 gallons of fuel on hand 11 Learn about alcohol fuels Be able to set up a still and convert your vehicle for alcohol fuel use 12 Make at least five copies of this article and anony mously send them to people whom you cel will make use of it 13 Lf you haven t already Icarn a useful trade that will en able you 10 earn a living in a rural area Stockpile tools and materials relating to your trade 14 Move to a rural area if possible Acquire a 1 2 acre more if you desire and are able 10 do so buildable or already built on plot of l
27. ion of the meme from host to host as that gives a uniform basis for prediction of actions and reactions A well crafted meme encourages replication and transmission the preaching factor to others it should also allow a group identification communication to give hosts a feeling of belonging to something larger than themselves Intent is likely that the meme alters or becomes the host s opera liona paradigm a conversion this provides the longest lasting effect of the meme rather than being just a fad It would be useful if it helped impar a resistance to further reprogramming the strength of faith and shouldn t re quire continual reinforcement which to prevent overload would require signal variation which may then cause schisms A meme should be resistant to schisms and inter pretation by encouraging dogma acceptance of the com municated experience rather than a direct one and enforce a desire for external wiser guidance Effects can also be seen through the use of aggregation alterations expansion and improvements off of existing memes in many ways this is an easier task to accomplish since the engineer can hijack a proven operational meme with similar or shortfall effects to their desired intent and have a solid likelihood of success 6 2 3 Starting the Fire The engineer or sponsoring group will need to have ac cess 10 the necessary vector channel for distribution R
28. lary personnel have a unique susceptibility to brainwashing attacks as it has already been done once such indoctrina lion techniques wear down an individual s resistance but do not necessarily build it back up properly to act as an im munity Additionally instructive is the lack of success of mililary sponsored hearts and minds campaigns where memes are never crafted to become the operational para digm of the targeted people and so have instead fostered hostility or resentment through the oversaturation of what the target s view as noise 6 2 Mechanisms As the Noble Prize winning physicist Richard Feynman stated you can t predict the actions of a single thing at a single time because there is no math prediction is a rough adherence to an average which requires a statistical body Use of memetics to manipulate individuals would seem to be out of the question but the large scale use to manipulate large bodies or cultures is not Anyone familiar with sys lems operations is aware that in rough terms 20 percent of ihe members of any average set will produce 80 percent of the effects of the set for example 20 percent of the scien tific researchers in a given domain will produce 80 percent of the discoveries or publish 80 percent of the papers It does not then require an unwieldy number of convents to manipulate a large body as controlling a small number gives the apparent effect of controlling the statistic major
29. le has been seriously overlooked This may in fact be a good thing if the repercussions of such a blend of domains are as powerful as they seem the practitioners of such a new field will quite literally wield considerable influence Think of this new domain as applied sociology or cul tural engineering Neither name is sufficient description to a field that encompasses information theory general se mantics semiotics cybernetics neurolinguistics statistical theory adveriising propaganda conditioning epistemol ogy epidemiology game theory cognitive psychology so ciology and evolutionary biology If your eyes have glazed over or you have already decided that you shouldn t be reading such trash as this then resign yourself to being one of the sheep Careful study of Nazism and Goebbels Marnism or Scientology and Hubbard give clear indica tions that the concepts work from there it is simply a mat ter of analysis of the phenomenon to build a new form of engineering which in deference to its roots can be referred 10 as memetic engineering 1 0 Background Evolutionary biologist Richard Dawkins in his book The Selfish Gene proposed a concept he termed memetics a corollary to genetics but in the domain of the mind rather than molecular biology A meme is a basic unit of memory but like a gene can be transferred via replication better than a gene memes can be reproduced by a variety of m
30. lin Good general guide to CB radio history and operations Tomcat s BIG CB Handbook by Tom Kneite All of the above are available from CRB Research Books Inc P O Box 56 Commack NY 11725 Catalog 1 00 An excellent source for CB technical information parts services repair books and high performance accessones is CBC International P O Box 31500PC Phoenix AZ 85046 Catalog 2 00 Popular Communications is a general radio communica tions radio monitoring magazine that covers CB as part of its focus It s available at any decent book store Barnes amp Noble Borders even Waldenbooks or news stand Y Survival Notes 1 by Wildflower DRYING WET BOOKS Can be a Jong messy process of taking apart the books separating the pages and wailing for a long drying period which rot amp mold can still destroy the book permanently Al least that is the old process for many years Nowadays whole books can be slowly dried faster at low power setting in a microwave oven This proc ess eliminates separating the pages restoring the whole book at the same time without major water damage even eliminating insects amp mold in the drying process CACHE STORAGE OF BOOKS Utilizing a 50 vac uum amp heat sealer sold in most major department store chains a book can be slored in a plastic bag which has been vacuumed of air content then heat sealed Then the bagged books are stored in a waterproof container such a
31. m didn t a mass pee off on their common grave site afler the homebrew beer festival All for NOW LIVE LONG amp FREE Wildflower 94 Deciphering the Radio Sticker Code by Thomas Icom To make things easier on customers and salesmen radio manufacturers place little star or circle dot shaped slickers of various colors or with various letters on their low end ra dios and packaging which have been configured for opera tion on popular low power and itinerant frequencies This sticker indicates what frequency the radios operate on Knowing this code will help you when you re purchasing surplus or used equipment at hamfests and auctions Even if the radio s batteries are dead missing or you don t have your frequency counter handy you ll know if it s compatible with the rest of your equipment Knowledge of the code will also aid in doing SIGINT Signals Intelligence work if you have no frequency counter or scanner handy Lf you can get a decent glance at the radio being used by the target you ll be able to determine the frequency for later intercep lion This sticker is usually on the lower front or back of the radio This enables you to see the sticker when it s ei ther resting in it s belt carrier or when it s being held up to the operators head while being used Blue Dot 154 57 MHz Green Dot 154 60 MHz Red Dot 151 625 MHz Purple Dot 151 955 MHz Brown Dot 464 50 MHz Yellow Dot 464 55 MHz Dot 467 762
32. myth and that people including one s own parents have systematically lied to you This may seem a callous way to view it but from the viewpoint of building cognitive mechanisms this is one of the earliest we gain that fosters the ability of disbelief Nazism the myth of Germanic racial superiority is an in teresting took at a common historical occurrence Hitler provided the skeleton but Gocbbels and the Propaganda Minisiry put flesh on the bones Use of constant reinforce ment triggering an amazing number of cultural responses such as noble sacrifice and total commitment use of the elite chosen by God metaphor indoctrination of the young all were a masterful implementation by a natural talent The meme however had the roots of its destruction built in with non tolerance the inability to conceive of losing and the perpetration of unspeakable acts as side effects that combined to kill off those infected Nazism also gives an example in recent history of a successful meme actually managing to become an operational paradigm for continu ing generations Religion and cults are understandable when one realizes that a cult is a meme that spreads throughout a population but once it becomes the operational paradigm in a signifi cant number it acts as a religion Judaism is specifically in teresting for its exceptions such as the lack of ihe ability to convert into the system and the requirement that the Tal m
33. nged in absence of quantification such as I m in pain which can describe a paper cut or amputa tion unknown without referents and there are also null points such as the format or level of politeness Implied content to a message can come from traffic analysis given a Statistically significant base to work from as well as the intentional and unintentiona inclusions and omissions in the content which implies the receiver has at least equiva lent or greater knowicdge of the content topics to gauge properly Able s message may be sent in many forms many times via many channcls and media types to increase the prob ability of successfully achieving the intent variably the in tent may require continual reinforcement thus benefiting from the signal saturation or this may cause overload in the recipient to the detriment of Abie s purpose Party Baker is the receiving party of the message Baker may or may not be a willing party to such communication Baker s motivalion is to remain integrated and maintain equilibrium to do this Baker passes the message already having potentially suffered Joss and noise related to the channel through a variety of automatic cognitive filters such as Baker s perception operational paradigms inter pretations and frame of reference What such mechanisms do is strip the message down so that it can be rendered into its useful component parts the results may be complete ac ceptanc
34. nvoke and evoke a state of mind and being through gnosis direct experience The influence historically of such groups is still debated yet the influence of the practi tioners still remains we view them as the most significant free thinkers artists and scientists of their age Clearly the ability to continually integrate the signals one receives and choose one s own actions and reactions is a beneficial capability 10 0 Conclusion An old Eskimo proverb states thal to give a man a fish is to feed him for a day to teach a man to fish is to feed him for life The discovery or invention of concepts and memes and subsequent transmission of them is the story of Man Yet many other historical pressures once given careful analysis have yielded useful beneficial engineering prac tices and sciences It is only a matter of time before a practice of memetics called something that will make il palatable and believable comes into formal existence Hopefully it will be soon as there are a number of areas for study and implementation immediately Meanwhile just as diseases cut down humanity before we understood about germs memes are cutting through and having their effect American culture is particularly sus ceptible having become highly sensitized to it Culture is in fact simply a slalistical aggregate of the reinforced sig nals available in a body of people European and Asian cul tures with considerable tradi
35. oms are caused by 2 virus intent on replicating itself into additional hosis the potential eventual fatality of the host is meaningless to an unreasoning reproduction mecha nism that cannot foresee the results in the event of it actu ally succeeding a game theory expansion on this with yational players requires the use of new positions don t lose and don t win and is highly educational Infection regardless of the source bacterial viral fun gal is opportunistic all it wants is access to the resources Necessary to continue on its quest for expansion The veclors of contagion via which the automata reproduce and replicate 10 additional hosts are varied channels all re quire that some representative sample of the automata sus pended in a mechanism that can support ils meager claim to life be exchanged Limits io the growth and spread of such automata are many the diversity of the domain of potential hosts itself is a barrier since such variation is beyond the capabilities of automata to reproduce and be transmitted in the yeast growth law where the most limited resource constrains the system also works to the automata s detriment commonly through limiting the number of new and available hosts in a brownian motion type expansion Certain potential hosts have a susceptibility to being n fected some through genetic or hereditary predisposition or because of age with a young inexpe
36. on the road In any semi populated arca a CB tuned to the right channe is an effective intelligence source of the jun gle telegraph variety When something happens so and so pets on the hom to what s his name and gives him all the details Afer a disaster the common availability of CB equipment will make monitoring the CB band a necessity to gather intelligence from individuals who will be trans mitting real time news from the disaster area After the col lapse it will help you determine the intentions of some of the many groups who will be roaming around Hearing a marauder band five miles down the road heading towards your homestead will enable you to make special prepara tions for their arrival For more details refer to the Clay more mine plans in Issuc 8 of Cydertek The CB band consists of 40 channels between 26 965 Mhz and 27 185 Mhz Power output is limited to 5 watts using AM transmission and 12 watts using Single Side Band SSB transmission The typical range for reliable CB communications is 5 10 20 miles although when atmos pheric conditions are right worldwide communications is possible The main advantage and disadvantage to CB is its wide availability and broad usage As paradoxical as this sounds it is true These characteristics of CB enable you to accom plish several important things CB gear is inexpensive and widely available You will be able to buy your rigs at Radio Shack or a department store
37. ord should be used together to think and act are one and can even be the same weapon This document is an attempt at memetic manipulation as well You the reader now have a spawn of new memes not to mention the meme of memes in your personal wetware The difference is that my intent is to tum you the reader into a plaver rather than a pawn You trust me don t you Y A Look at Business Data Security Measures by Thomas Icom I ve received some information from our readers regard ing the data processing security guidelines set by various companies and how they are presented to their rank amp file ie non information systems depanment employees I ve taken the 10 most common guidelines and presented them in this article so as better give the zine s readers an idca about business data security measures If you run a business that makes use of computers and are interested in how to protect your data you will find this information useful The nice thing about these measures is that they cost next to nothing to implement and if conscientiously applied will do a great deal to increase your level of data security 1 Account user ID and passward information for remote systems should not be resident in a PC or it s software They should also not be written down in any documen lation or otherwise be easily accessible by unauthorized personnel 2 Remote system passwords should be changed every 7 60 days Each company h
38. ound gar bled on an AM only rig This will provide communica lions secunty against low end CB users the majority of people who use CB For those of you who are wondering a properly tuned SSB rig will be capable of receiving AM transmissions so you ll be able to hear AM CBers on the same channel while in SSB mode When using a communications mode as popular as CB some form of communicalions encryption is a necessity Design a code system for use with your CB gear and change it on a frequent basis Design it so that it makes your group s communications sound like typical CBer activ ity such as a few fishermen chatting about lake stream conditions or local residents catching up on gossip A sys tem like that is superior to a code system thal sounds mili tary because listeners will assume that innocuous sounding conversation is what it appears to be whereas if you sound high speed people will know something s up even if they can t understand what you re saying Those of you interested in leaming more about Citizen s Band communications and CB modifications should refer to the following Recommended technical manuals for CB equipment re pairs and modifications for better performance and 10 me ter ham band usage The CB Radio Hacker s Guide by Kevin Ross CB Tricks of the Trode by J L Richardson CB Tricks il by J L Richardson The Screwdriver Expert s Guide To Do It Yourself CB Repairs and Modifications by Lee Frank
39. reatly now because such poor understanding has allowed such automata as AIDS to gain a statistically significant foothold and other dead dis eases are retuming There are now similar vectors in place for memetic type automata witness the media explosion of telephone televi sion cable fax machines computer and computer net works movies books magazines posters billboards radio whisper nets it is endless And while naturally occurnng biological diseases are simply opportunistic and have no such mechanism memes can be very accurately targeted aimed at self selecting affinity groups that will make ideal hosts 6 0 Memcetics as an Applied Science Plato banned music from his Republic because of his primitive natural understanding of memetic engineering the notion of an idea coming along and literally rewriting the nature of a culture is obviously an old one Examples of memes are instructive case studies and merit examination 6 1 Primitive and Not So Primilive Attempts Santa Claus is a meme that parents deliberately infect their children with the purpose for it is quite unfathom able and seems to run along two paths it didn t seem to hurt the parent when they had it and it helps to explain the odd behavior that people go through once a year The Claus meme in a child helps the way cowpox helped with small pox part of growing up is the trauma of learning once old enough that Santa is a
40. rienced immune system or an old tired one The host s immune system will commonly recognize the infection for what it is and begin an immune response an allempt to repel the invader or in legrate it into the system While the host deals with the automata on a micro level there are macro level actions as well there are processes of containment the control and suppression of vectors firefighting with specific treat ments and firebreaks intended to prevent the spread There is an aflermath to dealing with the automata re lated to the survival enhancement value added or detrac lion value subtracted effects which may vary from the benefits of E coli or mitochondria or an improved immune response or the damage of an impaired or weakened im mune response or the Joss of some resource in the fight for control with the automata It takes no great stretch of the imagination to draw the parallels between disease automata and message automata Memelics the study of language communication informational automata will become 2 generally recognized field of increasing importance At one point in time historically we had no biological or germ theory of disease because of this we were late to cope with the effects of widespread access of automata to improved disease vectors as simple as fleas on rats spreading the plague to the effects of air travel on moder yet primitive epidemiology we are suffering g
41. roduction of a quasi religious semi political movement with a charismatic leader preach ing how the collapse of Socialist Realism should have killed them off but how they are a strong people able to conquer any obstacics would be quite effective Free mar ket values and the upheaval necessary to make them a real ity are made palatable by pointing out that even with active opposition and with a waste of considerable resources they had never been beaten then the message that they can tum this energy and their resources to winning in the market can be introduced Current reform process is proceeding at far too Jofty an intellectual level and is doomed for failure a resurgence of hostile forces 10 the West in the region are not desirable This is just one example of the covert political use of me metics it will grow to be a considerable tool for operations that may not use more coercive forms of manipulation 8 0 Spread and Contro of Memes There are many unanswered questions that will only re ceive answers with Lime and study Among them are many critical points such as how do you deal with information once it is released You can t take it back so you had better get it right the first time How do you fight an idea Such things as gun control can t work as long as there is the ba sic idea of a gun and the know how to assemble one Even more important is dealing with a meme like Marxism which was correctly s
42. rty Able of the communication begins with an intent a purpose for wishing to communicate A channel for com munication is chosen by Able the channel and medium of communication has certain trails which effect the message There are throughput how fast you can communicate bandwidth how much you can communicate and interac tivity the degree and frequency with which there is contact with the other party Proper choice of channel is critical to the ability to successfully communicate the message a pic ture can be worth a thousand words and vice versa Addi tional choices some not consciously are made the initial conditions of and for communication handshaking to con firm that there is a dialog possible and the basic building blocks to be used to assemble the message the primitives precursors and archetypes Able then frames the message This message intends to impart some informational value to the recipient there is a fine line as to whether such inten tion is value neutral communication or manipulation in varying degrees of subt y a game theory expansion of evo lutionary benefits of communication as a tool concretely supports that manipulation of others and their resources is the primary intent of the faculty The message will contain a variable degree of explicit and implied data points Ex plicit hard points are the standard who what where when how and why soft points are relative concepts commonly excha
43. s a surplus ammo boxes and then buned in walls or ground If a book is zapped at low setting for 10 minutes in a mi crowave oven this would eliminale excess water content insect eggs and any mold spores before bagging the book The vacuum amp heat sealer machine can also be used to pre pare moisture amp mold sensitive articles for safer storage For example clothing items bandages matches toilet pa per ammo etc A good rule is to cache away items essential for survival essential to make other items with or items hard to make or find later on Examples matches Magnet wire transistors primers thermometers etc I can build my own resistors capacitors even relays but a transistor be damn near impossible Can grind my own gunpowder but harder to make a decent primer for the shell Taps amp dies which I can make nuts amp bolts with are just as necessary as a hammer for my shop I s easy to make candles amp soap yet easier if I lay in a few years wonh now before being forced to create them AFTER THE COLLAPSE Within ten years most fuels will be either used up or have deteriorated beyond usabil ity Most people then would have to depend upon home made fuels methane alcohol wood gas wood hydrogen and possibly methanol these fuels expensive to make in any great quantity in terms of man hours all be used carefully in whatever surviving or homebuilt machines then in use For travel most
44. tion and what could be termed cultural inertia are harder to manipulate against the grain Aberrations such as Nazism are not influences that run contrary to a cultural bias they are in fact a ught feedback loop of the primitive cultural idenuty symbols transmitted back into the culture continually much like feedback in a sound system The U S has no culture anymore rapid adoption of high throughput high bandwidth signals channels from cellular phones through MTV have complctely eroded what culture there was and replaced it with instant gratifi cation pop culture and sound bites Culture is a statisti cal average of the signals and Americans are subjected to continual bombardment of ever changing and inconsistent signals cultural schizophrenia is the least resultant prob lem yet causes splinters of the culture of retreat into more insular cultural identifications Studies of violence drugs use and other behavior are incomplete without an accom panying memetic investigation Control of the signals and messages presents the ultimate tool for defining shaping and controlling a people Ameri can or otherwise What of the considerable investment by the Japanese in American media organizations or the fact that more children recognize Super Mario or Sonic the Hedgchog than Mickey Mouse Memetics can be a power ful tool and can be seen as 2 culmination of the Japanese seniiment that the pen and sw
45. ud be exactly duplicated with no changes or interpreta tion These have acted to give the followers a solid cultural identity that has resisted schism and other not inconsider able attacks The odd beast known as Scientology is an other clear example of natural talent at work Hubbard a failed science fiction author created Dianetics on a wager freely plagiarizing critical concepts from an older mystical group he monitored when younger Scientology was delib erately engineered to give power and wealth to its creator while providing an operational philosophy of living to the followers certain religious functions such as clearing with a pseudo polygraph device create additional opportu nities for control through blackmail A comparative study of religions and religious history is an instructive lesson in memetics and cultural manipulation Finally the military provides another view of memetics Mititary training and indoctrination are a factory for me metic implantation such training strips the individuals down to their basic core personality and rebuilds them in the image desired by the service Such training uses many of the accepted tactics of brainwashing de individualization sleep deprivation exhaustion control of the means of support immersion into chaos and personal incompetence and the creation through reinforcement of a new doctrine and identity It is suspicious in fact that mili
46. unter clock wise the coil is very easy to tum do not force it breaks easily to fine tune shortwave stations 11 Take at least 5 feet of small multi strand wire if not multi strand solid will twist one end of this wire to the Stripped end of the wire coming out of the radio Be sure the end of this wire is stripped of insulation for about one or two inches 12 After stripping the other end of this wire touch or hook it to a metal frame I use an aluminum window frame for this still in the window 5 Donnal 6 wr 13 If this was done properly you will receive quite a num ber of shortwave stations mainly at night 4 I regularly receive 8 to 10 english speaking stations several french german and spanish stations plus morse code in the shortwave band 15 With this modification you can listen to Full Diselo sure Live 16 Be sure the radio is tuned to the AM band of your radio nol the FM Switch it to AM 17 You will not lose the FM or AM band you will have to retune the radio to a local AM station after listening to shortwave by adjusting the red coil Ed Note This orticle was reprinted from a letter in Issue 30 of the excellent periodical Full Disclosure Full Dis closure has top notch articles and information about sur veillance privacy and constitutional issues recommend that you subscribe to it Full Disclosure is 29 95 for 12 s sues payable to First Amendment Press Inc P O Box 67
47. view of Humankind one quickly wonders if this mechanism in the human mind is deliberately accessible and if a specifically engineered meme could be inuoduced through it intentionally benefi cial to the engineer rather than host To get to that point a brief discussion of other relevant areas is called for 2 0 Mind as Ecology Mind as Ecosystem The material for these sections derives from the works of Shannon Korzybski Eco Wiener Jung Kuhn Hume Bateson AfeLuhan Von Neumann Turing Pavlov Skin ner and Pareto I highly recommend their works as a con crete starting place for an avid student to pursue You are an expert on the human mind after all you are in possession of one Unfortunately you never received a user s manual However you have managed to get this far in life so obviously your mind seems to be able to take care of itself just like a top of the line automobile it automagi cally takes care of the details and leaves the larger issues up lo you extrapolation of this analogy further implying that the human brain seems merely a tool for the human mind and further implications from that are left to the reader If you think about how you think you will find your mind is made of memories facts and that sort of thing you picked these up through continual reinforcement and having been there for it some things can be taught others need to be icamed Using a computer metaphor your mind is hard ware the
48. ybertek Issue 9 Oechnology Security Gelf Refiance January February 1995 Published by OCL Magnitude P O Box 64 Breweter NY 10508 Steps to Self Reliance and Preparedness by Thomas Icom Clearly the bad times are upon us When one examines the rising crime rate record inflation withering of young people s minds by an educational system more interested in promoting socialism than educating totalitarian govern ment policies being established and the spin control propa ganda issuing forth from the mass media il becomes apparent that an epic disaster of unprecedented magnitude is due to happen shortly Some people disagree and state that the disaster has al ready occurred slowly over a period of time and that the events we are witnessing today the ones I stated earlier are actually the beginning of a new dark ages Whatever one believes one thing is certain Times are changing and the changes aren t for the better All is not lost however for those who recognize society s downward spiral and take the Lime to make appropriate preparations for the survival of these perilous times Those with the foresight to take the necessary measures to protect themselves and their family will weather the stormy days ahead and leave a priceless legacy for their descendents As more people recognize the danger signs of what s to come they realize that there is no help to be found from the mass media When the media does recogni
49. ze a real prob lem the rising crime rate for example the automatic re sponse issued forth by the editors and anchormen is to cry for increasing legislation and restriction of the citizens right to sclf reliance and preparedness Certain traitorous types in our government seem to be only too willing to ac cept their suggestions This situation does nothing to help those who desire to lake control of their own lives regardless of what the future might throw at them It has already resulted in the genocide of thousands of people in this country who were denied by various local and regional governments an adequate means to defend themselves against crime lt would seem that se lect people in the government and media are purposely try ing to worsen this country s situation so that they might be able to institute a socialist totalitarian Amerika and en slave the masses To take charge of your life achieve true freedom and maintain self reliance from the establishment the following steps are recommended 1 Acquire firearms of known reliability common caliber and availability along with sufficient parts and accesso ries magazines slings scopes etc Become competent with your weapons and learn about improvised weap onry and military tactics 2 Maintain a reserve ammunition stockpile for your weap ons The minimum recommended amount would be at least 500 rounds per weapon with 1000 rounds being preferable 3 Purchase

Download Pdf Manuals

image

Related Search

Cybertek cybertek cybertek mssp cybertek brest cybertek pau cybertek avis cybertek paris cybertek toulon cybertek bordeaux cybertek begles cybertek toulouse cybertek labege cybertek angoulins cybertek merignac cybertek montauban cybertek bordeaux lac cybertek pc gamer cybertek mail login cybertek systems winner sd cybertek new albany cybertek jonesborough tn cybertek in redlands ca

Related Contents

OASE AquaActiv BioKick fresh OASE AquaActiv BioKick fresh  Kingston Technology HyperX 4GB DDR3 240-pin DIMM Kit  Instalação do Certificado Digital  VGN-FS660P/W  User manual  Excarcelación del politraumatizado  Voir - Avmor  SPT SF-614P Use and Care Manual  Tripp Lite Black USB Sync / Charge Cable with Lightning Connector, 6-ft. (1.8M)  ELECTRONIC TRAINING EQUIPMENT  

Copyright © All rights reserved.
Failed to retrieve file