WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

393

For example, take cellphones.

By themselves, given a phone number, it's easy to listen to someone through their phone. Like, real easy.

Guys that follow basic opsec though, don't realize that not taking a self-phone deprives them of a valuable avenue for counter-information and disinformation.

Likewise with any action or communications that can be monitored.

Always be asking, "what does this cause opponents who may be listening to believe is true?"

This is exploitable. You can have security services going to false caches, or have them go to places you want to, or counter-entrap them, or have them believing you can be leveraged. And of course if you're the falls-on-sword type, this gives you immediate access to harm their operations.

Also keep in mind that while utilizing avenues like this, you should have hand signals or other methods of silent communication. You don't want to tell someone to be quite, because that gives the game away immediately.

A simple sign or motion, or codeword, lets who you are communicating with know that phones should be put away, turned off, moved to a secure location. Likewise it lets them know to move to a room without windows, or sweep for bugs, or any number of other actions based on the mode of communication, location, and nature thereof.

Having communications signals on lock and thoroughly drilled before you're on radar is absolutely essential.

The object of every civil liberties group, militia, or civil defense group should be limited hangouts, reverse entrapment, and baiting intelligence operatives into exposing their methods, their lawlessness, and their agents.

OPSEC should never be defensive.

It should be aggressive in its goals.

↓ expand content
For example, take cellphones. By themselves, given a phone number, it's easy to listen to someone through their phone. Like, real easy. Guys that follow basic opsec though, don't realize that not taking a self-phone deprives them of a valuable avenue for counter-information and disinformation. Likewise with any action or communications that can be monitored. Always be asking, "what does this cause opponents who may be listening to *believe* is true?" This is exploitable. You can have security services going to false caches, or have them go to places you want to, or counter-entrap them, or have them believing you can be leveraged. And of course if you're the falls-on-sword type, this gives you immediate access to harm their operations. Also keep in mind that while utilizing avenues like this, you should have hand signals or other methods of silent communication. You don't want to tell someone to be quite, because that gives the game away immediately. A simple sign or motion, or codeword, lets who you are communicating with know that phones should be put away, turned off, moved to a secure location. Likewise it lets them know to move to a room without windows, or sweep for bugs, or any number of other actions based on the mode of communication, location, and nature thereof. Having communications signals on lock and thoroughly drilled *before* you're on radar is absolutely essential. The object of every civil liberties group, militia, or civil defense group should be limited hangouts, reverse entrapment, and baiting intelligence operatives into exposing their methods, their lawlessness, and their agents. OPSEC should never be defensive. It should be aggressive in its goals.

(post is archived)

[–] 0 pt 3y

Solid advice friend. Any info on counter interrogation techniques ?

[–] 0 pt 3y

counter interrogation techniques ?

If it's police, that simple, don't talk. Ask for a lawyer.

If you're being tortured or interrogated by military or paramilitary elements, you're mostly already screwed, so it's about damage control.

You will crack under torture, everyone cracks under torture.

If you want to survive, your best bet is to try and balance what you tell them vs remaining silent.

Protocols should be in place before any operation where you might be captured.

Namely

  1. everyone should be familiar with the protocols

  2. disinformation (supply caches, rally points, safehouses, comms channels), should be customized and given out to every member. When they are captured, they devulge this information. If you know who was captured, then you know what false information is being fed to the enemy, and can consequently arrange to 'meet and greet' them in kind.

  3. Make sure everyone knows, in the event of capture, what information to prioritize, or what order to divulge it first, to minimize damage to your group or organization.

Remember, as long as you're giving your captors useful information, they will keep you alive.

Unless you've undergone SERE type training, attempting to escape is not recommended, for obvious reasons.

If they have other captors, theres also the possibility of provoking your captors into 1. killing you so you don't divulge information, 2. disposing of someone in the camp that has turned to spying for the enemy, 3. killing the interrogator (not recommended), thereby denying the enemy an experienced torturer/interrogator.

Thats about the gist of it.

Being captured, providing it is a detention camp by military or paramilitary forces, is also an opportunity to manufacture atrocity propaganda, and potentially overhear chatter from guards that could provide valuable information about opposition troop movements, tactics, weaknesses, plans, etc, which may be relayed, by one method, or another, to people better equipped to determine the veracity and utility of the information. But realistically thats a long shot.

Realistically, most people are just gonna wait to be sprung or for the conflict to end so they can seek release.

↓ expand content
[–] 1 pt 3y

I was thinking specifically paramilitary or military counter interrogation. I believe the best you can hope for is to buy time for your cell members to get lost , or do some damage control.

I would try to stay silent as long as possible , then dribs and drabs , but when they have a drill against your skull , who really knows .