IRON LOTUS FIELD HANDBOOK
SURVIVAL & OPERATIONS MANUAL
The Iron Lotus Field Handbook is not theory. It is actionable, field-tested knowledge designed to protect and empower civilians and resistance members in a surveillance society controlled by authoritarian forces. It assumes no prior experience. Every section is crafted for immediate use, with the singular mission: resist, disrupt, survive, and safeguard innocent lives.
SECTION 1: DISCIPLINE & TRADECRAFT FOUNDATION
OBJECTIVE: Embed unshakable discipline, operational security, and psychological resilience into every cell member. Silence, unpredictability, and compartmentalization are survival.
1.1 THE GOLDEN RULE
Rule:
- Shut your mouth.
- No operational talk digitally, in public, or to untrusted individuals.
- Never speak freely—even with allies—in areas with unknown surveillance coverage
Enforcement Tactics:
- Enact standing cell protocol: failure to follow silence results in immediate isolation from the network.
- Regularly conduct mock “interrogation drills” to stress-test member resilience.
1.2 CELL SIZE & COMPARTMENTALIZATION
Structure:
- Cells of 3-7 max.
- No member knows more than two adjacent contacts.
- Leadership rotates; no permanent leaders.
Practice:
- Operational plans divided—each member only knows their specific task.
- Communication limited to immediate mission need-to-know only.
1.3 PATTERN DISRUPTION DISCIPLINE
Rules:
- Never repeat routes, schedules, meeting spots, or travel methods within two-week windows.
- Alter appearance daily:
- Different layers, colors, posture, gait.
- Change transport:
- Walk, bike, rideshare (no account-based), backroads vehicle, public transit in rotation.
Checks:
- Assign “pattern disruptor” role to monitor team member behaviors weekly.
1.4 ZERO DIGITAL TRACE MANDATE
Rules:
- No personal phones, smart devices, cloud accounts.
- Burners only. Powered down, kept in Faraday pouch when not in isolated use.
Practice:
- Devices cycled biweekly; old devices burned or chemically destroyed.
- Zero social media presence by any operatives.
1.5 VISUAL BLENDING
Tactics:
- Clothing: mass-market neutral colors, no logos or standout items.
- No identifiable accessories: watches, bags, hats must all be generic.
- Adjust body language to blend:
- Avoid eye contact, fidgeting, or clustering in groups.
1.6 IMMEDIATE EXTRACTION MINDSET
Rule:
- Always know your exit route before arrival.
- Pre-identify:
- Nearby alleyways, secondary exits, rooftop access points.
Standard Practice:
- Never linger post-mission—extract within 3 minutes of task completion.
- Recon area at least once before mission.
SECTION 2: COUNTER-SURVEILLANCE CORE PRINCIPLES
OBJECTIVE:
Neutralize digital and physical surveillance systems. Prevent identification, tracking, or compromise by state, corporate, or private entities.
2.1 FACIAL RECOGNITION AVOIDANCE
Tactics:
- Always wear multi-layer disguises:
- Mask (preferably surgical or balaclava-style).
- Sunglasses.
- Cap, hoodie, or wide-brim hat.
- Neck covering (scarf or gaiter).
Advanced Countermeasures:
- IR LED arrays sewn into hats/glasses frames to blind facial recognition software.
- Change appearance: Rotate clothing daily, alter posture and gait, avoid distinct accessories or tattoos.
- Movement Discipline:
- Use low-light areas, crowds, underpasses, alleys to avoid camera coverage.
- Operate during poor weather (rain, fog, snow) to reduce image clarity.
2.2 DEVICE CONTROL & DIGITAL SIGNATURE SUPPRESSION
Rules:
- No personal phones.
- Burner phones only, powered down, stored in Faraday pouches.
- Never log into personal accounts or known WiFi/Bluetooth networks.
- Strip all smart devices from extraction zones.
Additional Tactics:
- Disable NFC, WiFi, Bluetooth auto-connect features permanently.
- Use pre-paid SIMs from locations far from operational zones.
- Regularly cycle burner phones and numbers—destroy old ones physically.
2.3 VEHICLE PROTOCOL
Vehicle Usage:
- Older vehicles only (pre-2010 models preferred).
- No onboard GPS, telematics, or Bluetooth.
Tactics:
- License plate switches: Use removable magnetic plates, mud/spray cover, or plate bending.
- Swap vehicles regularly between safehouses or cells.
- Avoid ALPR-covered highways, toll roads, and known surveillance choke points.
- Park in obscured areas: underground garages, behind large trucks, or heavily wooded zones.
2.4 HUMAN SURVEILLANCE AWARENESS
Assume:
- Plainclothes officers, patrols, drones, and informants are present.
Tactics:
- Always vary routes and timing. No fixed schedule.
- Leave fake trails (abandoned burner devices, decoy movements, deliberately visible symbols).
- Rotate meeting locations: Never use the same site twice in two weeks.
- Use layered lookouts and crowd decoys to obscure actual movement.
- Avoid clustering in groups—move separately and link later.
2.5 AERIAL & DRONE SURVEILLANCE COUNTERMEASURES
Tactics:
- Operate under dense canopies, inside tunnels, beneath overpasses.
- Wear reflective or thermal-disruptive clothing to scramble drone imaging.
- Carry portable broad-spectrum radio scanners to detect nearby drone frequencies (see Section 6).
- Move during poor weather: heavy wind, rain, snow.
2.6 SIGNAL DECEPTION TACTICS
Advanced Techniques:
- WiFi/Bluetooth spoofing: Carry dummy devices broadcasting fake identifiers.
- CCTV Loops: Place pre-recorded video feeds (looping mundane crowd scenes) on hijacked local cameras.
- Signal Flooding: Deploy RF jammers in short bursts to overwhelm local comms (see Section 6).
SECTION 3: ESCAPE & EVASION ROUTES
Mission-critical: move persecuted civilians and team members to safety without leaving a trace. Adapt routes to urban, suburban, and rural landscapes while preparing for long-distance exfiltration beyond surveillance zones.
3.1 URBAN TUNNELS & SEWERS
Access:
- Manholes, service hatches, maintenance corridors.
Usage:
- Moving civilians between safehouses.
- Storing caches (supplies, food, medical kits).
- Exfiltration under heavy surveillance.
Tactics:
- Focus on older cities (NYC, Chicago, DC) with vast unused tunnel networks.
- Always recon each route—check for sensors, cameras, motion triggers.
- Bring portable oxygen, headlamps, noise-masking tools (soft shoes, foam inserts).
- Never reuse the same entry/exit point twice within a two-week window.
3.2 DRAINAGE SYSTEMS & CULVERTS
Access:
- Underpasses, parks, parking lots, riverbanks.
Usage:
- Nighttime movement to avoid surveillance drones and checkpoints.
- Direct connections to industrial zones, suburban edges, or remote forests.
Tactics:
- Dry weather only to prevent flood entrapment.
- Always carry bolt cutters, crowbars.
- Mark entry points subtly (scratches, plant markers).
- Plant caches periodically near exit points.
3.3 ABANDONED INFRASTRUCTURE
Access:
- Decommissioned rail lines, subway stations, warehouses, silos.
Usage:
- Ideal fallback, regrouping, or staging areas.
- Store long-term supplies and duplicate escape tools.
Tactics:
- Recon every entry/exit. Many older sites have bricked sections—map manually.
- Establish multiple exit plans: rooftops, ladders, tunnels beneath.
3.4 RURAL TRAIL & SERVICE PATHS
Access:
- Bike trails, unpaved service roads, maintenance paths, utility corridors.
Usage:
- Evade roadblocks and drones in low-density zones.
- Move discreetly across county lines or borders.
Tactics:
- Cache supplies every few miles: waterproof containers buried shallow, marked discreetly.
- Use tree markers, stone arrangements as route guides.
3.5 LONG-RANGE EXFILTRATION ROUTES
Objective: Safely extract individuals out of active surveillance zones—possibly across state or international borders.
Options:
- Freight Train Hopping:
- Target rail yards at night, low-population zones.
- Identify slow-moving rural freight lines.
- Blend in with cargo, never ride in or near urban yards.
- Natural Corridor Movement:
- Rivers, creek beds, dense forests used to avoid patrol zones.
- Travel at dawn/dusk or in poor weather.
- Establish temporary hide camps along the route.
- Backroad Convoys:
- Use convoys of older vehicles without telemetry.
- Stagger vehicle movements, rotate license plates.
- Swap drivers at predefined intervals.
Protocol:
- Every long-range escape must include backup routes, secondary vehicles, and safehouse stops pre-arranged by separate cells.
SECTION 4: SABOTAGE & DISRUPTION TACTICS
OBJECTIVE:
Overstretch regime resources, disrupt logistics, delay enforcement actions, expose incompetence, and buy time for extraction and relocation missions. Every act of sabotage must be designed to cause maximum confusion, minimal traceability, and avoid civilian harm.
4.1 POWER INFRASTRUCTURE DISRUPTION
Tactics:
- Thermite Composition:
- 1 part rust powder + 3 parts aluminum powder.
- Ignite with magnesium strip or road flare.
Targets:
- Substation transformers.
- Military logistics power relays.
- Communications relay towers.
Deployment:
- Always in rural or remote areas to avoid unnecessary civilian blackouts.
- Wear gloves. Zero fingerprints or DNA traces.
- Quick deployment: never remain onsite longer than 3 minutes post-ignition.
4.2 RAIL & ROAD OBSTRUCTION
Tactics:
- Physically disable chokepoints:
- Highways, fuel depots, military bridges.
Methods:
- Debris piles strategically placed.
- Use old, abandoned vehicles to fake breakdowns (engine stripped, gas tanks removed).
- Quick-setup barricades with heavy objects or chains.
- Spike strips or nail boards pre-fabricated and placed at night.
Impact:
- Force rerouting of police/military convoys.
- Delay logistical support reaching crackdown zones.
4.3 COMMUNICATION DISRUPTION
Methods:
- Fiber-optic Cable Sabotage:
- Locate exposed conduits in industrial areas, telecom boxes.
- Cut key cables at unmonitored junctions.
- Telecom Box Tampering:
- Open-access panels often have default or no locks.
- Disable junction connections, remove fuses or small components.
- RF Jammers:
- Short-range devices (see Section 6) deployed near police staging areas, surveillance hubs, or drone patrol zones.
- Limit usage to short bursts to prevent triangulation.
Impact:
- Cripple command coordination during extraction missions.
- Confuse surveillance systems.
4.4 HIGHWAY & PUBLIC FRUSTRATION OPERATIONS
Traffic Sign Hijacking:
- Default passwords often unaltered:
- DOTSHELL, CDEGEMAC, 1234, 5555, DEPT1234.
- Reprogram to display anti-regime messaging.
- Examples: “SYSTEM FAILURE IMMINENT,” “RESISTANCE ACTIVE.”
- Never reuse the same message or sign twice.
Vehicle Breakdown Gridlocks:
- Deploy stripped-down vehicles at highway chokepoints.
- Fake breakdowns with hoods open, tires slashed—cause cascading delays.
Flash Protest Actions:
- Appear spontaneously in dense urban zones.
- Large banners, chants, visible symbols deployed quickly.
- Disperse before enforcement arrives—never hold ground.
- Coordinate multiple locations to dilute regime response.
4.5 ADDITIONAL SABOTAGE TECHNIQUES
Water Supply Disruption:
- Temporarily disable irrigation systems feeding regime-controlled zones.
- Block drainage systems during heavy rainfall to flood key intersections.
Resource Drain Operations:
- Bombard regime hotlines with false tips.
- Submit constant, believable complaints to force manpower reallocation.
Psychological Sabotage:
- Place fake “orders” or memos on regime logistics boards to misdirect shipments.
- Leak false intelligence about protest locations.
SECTION 5: SAFEHOUSE VISUAL SIGNALS
OBJECTIVE:
Provide resistance cells and civilians with clear, discreet, and modern methods to signal safehouse status and resources while evading regime surveillance.
5.1 VISUAL SYMBOLS & CODES
Symbol |
Meaning |
Circle with Dot |
Safehouse ready, secure |
Inverted Triangle |
Temporary refuge, leave within 12 hrs |
Square with X |
Compromised. Do NOT enter |
Horizontal Arrow |
Relocation underway |
Three Vertical Lines |
Supply cache nearby |
Instructions:
- Use chalk, stickers, tape, or etchings.
- Mark in low-eye-level, inconspicuous areas (utility poles, bench undersides, alley walls).
- Rotate symbols regularly.
5.2 DIGITAL/TECH-BASED SIGNAL EXTENSIONS
Tactics:
- QR Coded Graffiti: QR codes embedded in public posters or stickers redirect to innocuous pages but contain coded safehouse info (ciphered text embedded in metadata).
- WiFi Beacon Signals: Place portable WiFi devices broadcasting SSID names as coded signals. Examples:
- SSID: “DotGreenReady” = Safehouse secure.
- SSID: “SquareRedExit” = Do not enter, compromised.
- Bluetooth Name Tags: Burner devices broadcasting Bluetooth names with pre-agreed keywords for nearby operatives.
5.3 PHYSICAL DROP MARKERS
- Small stones or painted objects placed discreetly near park benches, lampposts, trash bins to mark drop zones.
- Colored cloth tags or zip ties tied inconspicuously on fences, poles, tree branches as directional markers.
5.4 LIGHT & SOUND SIGNALS
- Window blinds arranged in specific patterns (open/closed) to signal status.
- Flashlight Morse codes used at pre-agreed hours to communicate house readiness.
- Wind chimes or bells hung outside with distinct number of chimes = specific meaning.
5.5 AUDIO/VISUAL SOCIAL CUES
- Public music choices (certain songs played on outdoor speakers = safe, others = compromised).
- Flyers for events with hidden meaning in dates or fonts.
- Hand gestures, clothing accessories (colored armbands, ribbons) worn by trusted contacts in crowded areas.
FINAL RULE:
Symbols and signals must be:
- Simple, easily replicated.
- Deniable (able to pass as coincidence to outsiders).
- Changed frequently and never left for more than 72 hours in static locations.
SECTION 6: DIY TOOLS & GUIDES (EXPANDED)
6.1 RF JAMMER (SHORT-RANGE COMMUNICATION DISRUPTION)
Objective: Temporarily disrupt police, military, and drone communications within a 30-50 meter radius.
Materials Needed:
- 555 Timer IC (standard, available at electronics retailers)
- 2N2222 transistor or equivalent
- Capacitors: 100nF, 10nF, 1μF
- Resistors: 1kΩ, 10kΩ
- Copper antenna wire (approx. 20cm, stripped)
- Breadboard or PCB board
- 9V battery (or 12V if needed)
- Battery clip
- Optional: toggle switch, shielded metal casing (tin box)
Assembly:
- Wire the 555 Timer IC in astable mode per standard RF circuit diagrams.
- Connect capacitors and resistors to shape the square wave frequency output.
- Transistor amplifies output signal.
- Attach antenna wire to transistor output.
- Connect battery and optional toggle switch.
- Test, then solder final circuit to PCB. Mount inside metal casing for durability.
Deployment:
- Conceal in urban clutter: dumpsters, rooftops, under vehicles.
- Use in bursts under 10 minutes.
- Destroy or remove after use—wipe fingerprints.
6.2 FARADAY PHONE POUCH (SIGNAL BLOCKING DEVICE)
Objective: Prevent mobile phone tracking or remote activation.
Materials Needed:
- Small cloth pouch (canvas recommended)
- Aluminum foil OR conductive mesh fabric
- Velcro or zipper for secure closure
Assembly:
- Line the inside of pouch with layers of aluminum foil/conductive mesh, ensuring no gaps.
- Seal edges completely—no exposed cloth sections.
- Test by placing phone inside; ensure zero reception.
Usage:
- Always keep burner phones inside when inactive.
- Do not open pouch near known surveillance points.
6.3 IR BLINDER ARRAY (FACIAL RECOGNITION JAMMER)
Objective: Disrupt facial recognition cameras without drawing attention.
Materials Needed:
- IR LEDs (850nm wavelength recommended)
- Resistors: 220Ω
- Small battery pack (coin cell or AA x2)
- Thin wire
- Cap or glasses frame for mounting
Assembly:
- Wire IR LEDs in parallel circuit with resistors.
- Connect to battery pack (concealed within cap brim or glasses temple).
- Test using digital camera—LEDs will glow bright white.
Deployment:
- Wear in public spaces with high CCTV density.
- Use intermittently to avoid pattern recognition.
6.4 SMOKE SCREEN GENERATOR (CROWD & SURVEILLANCE DISRUPTION)
Objective: Block line-of-sight and thermal surveillance temporarily.
Materials Needed:
- Sugar
- Potassium nitrate (saltpeter, available at garden stores)
- Saucepan
- Heat source (portable stove or campfire)
- Small metal container
Assembly:
- Mix 60% potassium nitrate with 40% sugar.
- Heat gently until caramel-like consistency forms.
- Pour into small containers (tin cans, aluminum tubes).
- Light fuse or use open flame to ignite.
Deployment:
- Place near choke points, alleyways, extraction zones.
- Burns for 1-2 minutes, producing thick smoke.
6.5 DIY SIGNAL FLARE (VISUAL DISTRACTION OR COMMUNICATION)
Objective: Distract regime patrols, signal allies, or mark safe zones.
Materials Needed:
- Steel wool
- AA battery
- Waterproof matches or lighter
- Small tube or PVC pipe casing
Assembly:
- Insert steel wool inside tube.
- Insert battery to connect positive and negative terminals to wool.
- Prepare for manual ignition (battery touch or matches).
Deployment:
- Set flares to mislead drones or patrols.
- Use color-coded flare light (painted casings) for ally communication.
SECTION 7: ESCAPE & EXTRACTION PRINCIPLES
OBJECTIVE:
Safely extract persecuted civilians and resistance members while avoiding detection, interception, or data trails. Operate under principles of decentralization, adaptability, and unpredictability.
7.1 SMALL GROUP MOVEMENT
- Rule: Never move large groups in one batch.
- Tactic: Break into staggered teams of 2-4 people max.
- Movement Windows: Vary departure times by hours, or days, depending on surveillance density.
Reason: Large groups are easier to detect, profile, and intercept. Smaller units blend in.
7.2 SUPPLY CACHING
- Pre-place survival supplies: food, water, clothing, burner phones, spare cash.
- Cache locations:
- Beneath park benches.
- Inside abandoned structures.
- Underground in waterproof containers.
Use pre-marked, cipher-protected drop points (see Section 5). Rotate regularly.
7.3 VEHICLE & ROUTE DISCIPLINE
- Designate multiple drivers.
- Tactic: Drivers rotate vehicles and routes constantly. Ditch vehicles post-use, wipe for prints/DNA.
- Vehicle Choice: Prefer older, non-GPS cars. License plate switching essential.
- Use side streets, service roads, unpaved paths to bypass ALPRs and checkpoints.
7.4 SECONDARY EXTRACTION ZONES
- Always establish at least two fallback extraction points:
- 1 in urban safehouse areas.
- 1 in rural outskirts (barns, abandoned lots, wooded areas).
Rule: Primary routes are expendable. Secondary routes must never overlap.
7.5 AVOIDANCE OF DIGITAL SYSTEMS
- No digital maps or GPS.
- Tactic: Use hardcopy maps annotated manually.
- Cache physical maps at drop points or embedded in clothing.
7.6 PHYSICAL DISGUISE & ROUTE VARIATION
- Change clothing layers, posture, gait at each leg of extraction.
- Vary entry/exit points: parks, alleys, tunnels, backdoors.
7.7 SAFEHOUSE HANDOFF PROTOCOLS
- Never stay in one safehouse beyond 48 hours.
- Rotate host contacts. Each safehouse operator knows only the previous and next point.
- Leave no personal belongings behind. All evidence burned or chemically destroyed.
7.8 ESCAPE TIMING PRINCIPLES
- Move during low surveillance windows (2am-4am).
- Prefer bad weather: fog, heavy rain, or snow to block aerial or thermal surveillance.
SECTION 8: ADDITIONAL HIGH-RISK KNOWLEDGE (DO NOT GOOGLE)
8.1 Default Access Codes and System Vulnerabilities
- Traffic Message Boards:
- Default passwords: DOTSHELL, CDEGEMAC, 1234, 5555, DEPT1234.
- Older cabinets may lack updated passwords.
- Utility Access Points:
- Maintenance panels for grids, tunnels, and telecom boxes often have factory-default locks.
- Standard utility key sets available at hardware stores.
- CCTV Systems:
- Small town systems often use default passwords: admin, 0000, 1111.
- Inspect light poles and cabinets for physical access ports.
8.2 Avoid Googling Sensitive Topics:
- Keywords like “thermite,” “disable cameras,” “bypass ALPR” trigger surveillance sweeps.
- Never download encryption apps or tactical manuals through personal networks.
8.3 Physical Drop Sources (Suggested Examples):
- Zine Libraries, DIY Bookshops: Drop physical guides inside folded zines.
- Tool Libraries, Repair Cafés: Hide instructions inside toolboxes or manuals.
- Public Parks / Free Libraries: Conceal pages inside regular books.
- Churches/Bulletin Boards: Place disguised booklets behind older flyers.
SECTION 9: ADVANCED DIY FIELD TOOLS
9.1 RF Jammer Construction Overview
- Parts Needed:
- 555 Timer IC, 2N2222 transistor, antenna wire (20cm copper), capacitors (100nF, 10nF), resistors (1kΩ, 10kΩ), battery clip + 9V battery.
- Assembly:
- Configure 555 Timer IC in astable mode.
- Capacitors & resistors shape square wave frequency.
- Amplify output via transistor.
- Wire antenna, shield in metal casing if possible.
- Deployment:
- Place in urban clutter near police staging areas, drones, or surveillance hubs.
- Use in bursts (under 10 mins) to avoid triangulation.
- Destroy after use.
9.2 Faraday Phone Pouch DIY
- Line cloth pouch with foil or conductive mesh.
- Seal properly; no phone signals leak.
9.3 IR Blinder Array
- Attach IR LED strips to cap brim.
- Power via small battery pack.
- Blocks facial recognition on surveillance cameras.
SECTION 10: HIGH-RISK BEHAVIOR TO AVOID
10.1 Digital Red Flags:
- Searching or discussing insurgency materials online.
- Logging into protest forums under real or burner IDs.
- Downloading encrypted apps from known app stores.
Actionable Rule:
Never research or communicate from personal devices. Use air-gapped, burner hardware only, away from your operational zone.
10.2 Suspicious Financial Activity:
- Large cash withdrawals.
- Bulk purchases of survival gear, chemicals, electronics.
- Cryptocurrency used without obfuscation layers.
Actionable Rule:
Spread purchases out over time, in small increments, at multiple locations.
10.3 Repeating Movement Patterns:
- Regular visits to known hubs, repeated meeting locations.
Actionable Rule:
Rotate meeting spots, vary entry/exit points, change appearance and transport methods frequently.
10.4 Physical Evidence Sloppiness:
- Garbage pulls reveal notes, receipts, electronics remnants.
Actionable Rule:
Burn, chemically destroy, or remove all physical evidence immediately after operations.
SECTION 11: SOCIAL TRADECRAFT
11.1 Avoid Loud Recruits:
- Bragging, online-posting, ideology-flaunting people are compromised liabilities.
Actionable Rule:
Recruit only from known, long-trusted contacts. Watch actions, not public declarations.
11.2 Body Language & Presence Discipline:
- Nervous clusters, hand-offs, darting eyes attract regime attention.
Actionable Rule:
Always act calm, occupied, distracted. Move separately, avoid tight clusters. Leave no impression.
SECTION 12: SAFEHOUSE SIGNAL & CIPHER APPENDIX
Symbol |
Meaning |
|||
Circle with Dot |
Safehouse ready, secure |
|||
Inverted Triangle |
Temporary refuge, leave within 12 hrs |
|||
Square with X |
Compromised. Do NOT enter |
|||
Horizontal Arrow |
Relocation underway |
|||
Three Vertical Lines |
Supply cache nearby |
Usage: Mark discreetly via chalk, etching, or stickers. Rotate symbols monthly.
Cipher Example:
- Simple number-letter substitution (A=1, B=2, etc.) for low-level ops.
- Rotate cipher keys bi-weekly.
SECTION 13: PSYCHOLOGICAL OPERATIONS (PSYOPS) MANUAL
OBJECTIVE:
Undermine regime authority, legitimacy, and cohesion through targeted psychological tactics. Amplify public dissatisfaction, sow distrust within regime ranks, and neutralize the power of fear and respect that sustains authoritarian control.
13.1 MOCKERY & PUBLIC HUMILIATION
Tactic:
- Produce and distribute satire: posters, stickers, graffiti caricaturing leadership as weak, confused, corrupt.
- Hijack regime slogans, flipping or distorting them humorously.
- Alter public signage: hack traffic signs, billboards to display absurd, regime-approved messages.
Historical Precedent:
- Eastern Bloc underground publications mocked secret police.
Impact:
- Shatters aura of invincibility. Regime becomes a joke, not a threat.
13.2 RUMOR CAMPAIGNS & INTERNAL DIVISION
Tactic:
- Plant stories of regime infighting, betrayals, financial scandals.
- Distribute false memos, fake leaked documents showing command disloyalty.
- Use SMS blasts, anonymous web posts to suggest loyalty tests or purges.
Historical Precedent:
- French Resistance spread Nazi command betrayal rumors, sparking internal distrust.
Impact:
- Forces regime to waste resources investigating itself. Leaders distrust subordinates, slowing their response.
13.3 FALSE FLAG FAILURES
Tactic:
- Engineer regime event disruptions: power cuts, staged mishaps, sound system failures at rallies.
- Leak fake memos exposing supposed regime blunders or poor planning.
- Interrupt regime media broadcasts with contradictory or bizarre messages.
Historical Precedent:
- Central American operations staged regime failures to undermine control.
Impact:
- Erodes public faith in regime competence. Highlights cracks in control.
13.4 SYMBOL INFILTRATION
Tactic:
- Hijack regime hashtags, fill with ironic/anti-regime content.
- Distribute altered state flags/emblems featuring subtle resistance marks.
- Mockingly display regime slogans in contexts of visible failure (broken infrastructure, protests).
Historical Precedent:
- Polish Solidarity flipped Communist slogans upside down.
Impact:
- Turns regime’s own symbols into tools of resistance.
13.5 HUMANIZE THE PERSECUTED, DEHUMANIZE ENFORCERS
Tactic:
- Publish personal stories, images of disappeared civilians—name, face, family.
- Satirize regime police/soldiers as incompetent or cowardly.
- Meme failures of enforcement (empty shelves, long lines, broken systems).
Historical Precedent:
- South African anti-apartheid movements publicized victim stories while ridiculing enforcers.
Impact:
- Builds empathy for persecuted. Breaks fear-based image of regime enforcers.
SECTION 14: ASYMMETRIC & SELF-SUFFICIENCY OPERATIONS
OBJECTIVE:
Ensure long-term survival and resistance capability by leveraging asymmetry, local resources, and sustainable techniques. Operate with minimal dependence on external supply chains while continually disrupting regime logistics.
14.1 DIY SUPPLY CHAIN & LOCAL SOURCING
Tactics:
- DIY Manufacturing:
- 3D-printed non-regulated drone parts, tools.
- Repurpose e-waste: extract copper wire, batteries, circuit boards.
- Salvage abandoned vehicles/buildings: fabrics, metals, wiring.
- Simple chemistry: create thermite (rust + aluminum scrap).
- Urban Foraging:
- Gather batteries, wiring, containers from industrial junkyards.
- Strip scrap electronics for reusable components.
- Gear Maintenance:
- Patch clothing, backpacks, tarps with salvaged fabric.
- Clean, repair boots, tools using basic hand-stitching and glue.
14.2 OFF-GRID CAMPS & RURAL SURVIVAL
Shelter:
- Camouflaged tarp shelters, dugouts insulated with branches/leaves.
- Rotate locations weekly to avoid detection.
Water:
- Bio-sand filters (layers of sand, gravel, charcoal).
- Solar stills or basic iodine/bleach treatments.
- Rainwater collection from tarps.
Food:
- Foraging: wild greens (dandelion, plantain), berries, nuts.
- Small game traps (snares, deadfalls) and fishing without store-bought gear.
- Guerrilla gardening in abandoned lots: potatoes, kale, onions.
14.3 DISRUPTIVE INFRASTRUCTURE SABOTAGE (NON-EXPLOSIVE)
Targets & Methods:
- Drain fuel/oil from regime vehicles.
- Sugar or saltwater poured into engines.
- Nail boards and tire-spiking strips at choke points.
- Cut telecom lines, data cables—avoid civilian power lines.
- Jamming and tampering with regime radio repeaters (see Section 9).
14.4 AUTONOMOUS CELL NETWORKING
Techniques:
- Encrypted Dead Drops:
- USB drives or messages left in pre-agreed physical locations (pipes, public benches, hollow bricks).
- Public codes: chalk marks, unique graffiti tags to signal status.
- Prepositioned Caches:
- Rotate locations monthly.
- Contain medical supplies, spare burner phones, printed maps.
14.5 TERRAIN & WEATHER ADVANTAGE
Usage:
- Move under cover of storms, snow, fog to block drone visibility.
- Use rivers, canals for stealth transit—avoid highways.
- Observe wildlife sounds (crickets, birds); silence = possible patrol nearby.
14.6 QUICK REFERENCE SUMMARY:
Resource |
Asymmetric Use |
Scrap metal |
Traps, jammers, thermite, radio antenna |
Abandoned lots |
Microplots for food, hidden supply caches |
Wild plants |
Medicine (yarrow, plantain), food, camouflage |
E-waste |
Electronics parts, battery scavenging |
Rainwater |
Collection + filtration—clean, sustainable |
Animals |
Protein + sound masking during movement |
SECTION 15: MESSAGING STRATEGY & CALLS TO ACTION
OBJECTIVE:
Control the narrative, spread resistance ideology, mobilize the public, and demoralize regime supporters through overt and covert messaging techniques.
15.1 OVERT MESSAGING
Tactics:
- Direct Flyers, Posters, Graffiti:
- Spread anti-regime slogans, resistance symbols, or leadership mockery in high-visibility areas.
- Include simple, clear calls to action (protest times, solidarity gestures).
- Public Statements & Media Leaks:
- Release declarations via trusted, anonymous online accounts.
- Frame regime failures (empty shelves, blackouts, violence) as proof of their collapse.
- Protest Symbols:
- Encourage public to adopt subtle gestures (colored ribbons, marked coins, certain clothing items).
- Standardized chants or slogans across protests build unity.
Historical Precedent:
- Solidarity Poland: flyers, underground press spread resistance news daily.
15.2 DOUBLE MESSAGING (DUAL PURPOSE COMMUNICATION)
Tactics:
- Layered Symbols:
- Use harmless-seeming public posters, art, or ads containing coded information for cells (dates, locations, key phrases).
- Graffiti tags serving dual purpose—public protest + safehouse/supply cache signals.
- Social Media Infiltration:
- Memes and jokes that seem benign, but carry insider information or rallying cues.
- Hijack regime hashtags with double-edged content.
Example:
- Public poster with innocuous message (“Community Clean-Up Day”) includes ciphered meeting point/date in layout design.
15.3 AUDIO & VISUAL BROADCASTS
Tactics:
- Low-Power Pirate Radio:
- Set up rotating FM stations to spread uncensored news, regime failures, calls for action.
- Projection Bombing:
- Project videos, slogans, or resistance content on public buildings at night—impossible to censor in real-time.
- Sound Warfare:
- Loudspeakers in unexpected public spaces broadcasting regime mockery or anti-regime songs.
15.4 EXAMPLES OF CALLS TO ACTION
Medium |
Example Call to Action |
Flyer |
“Show up 8PM, Main Square. Black Ribbon = Ally” |
Graffiti Tag |
Resistance symbol + directional arrow to drop |
Social Media Meme |
Popular meme template, hidden rallying date |
Pirate Radio |
“Tomorrow, gridlock highways at noon” |
Projection Bomb |
“Regime Lies—We Know. Stand Up Now!” |
15.5 FINAL RULE:
Consistency and Saturation: Repeat the same symbols, codes, and calls to action across mediums and cities. Never give the regime breathing room. Every wall, screen, and network becomes part of the battlefield.
SECTION 16: INFORMATION WARFARE & COUNTER-PROPAGANDA
OBJECTIVE:
Control and expose regime disinformation campaigns. Amplify truth, build trust in the resistance, and undermine the regime’s narrative monopoly.
16.1 IDENTIFYING PROPAGANDA
Tactics:
- Track patterns in regime-controlled media (overused slogans, manipulated data).
- Cross-reference stories across multiple unofficial, grassroots, or foreign outlets.
- Flag emotionally charged stories pushing blind loyalty or scapegoating minorities.
16.2 COUNTER-PROPAGANDA OPERATIONS
Tactics:
- Create viral truth-based memes, videos, or blogs that expose specific lies.
- Leak regime failures via trusted anonymous social channels.
- Use bots or burner accounts to flood regime hashtags with counter-messages.
- Broadcast pirate radio/newsletters with fact-based bulletins.
16.3 PUBLIC EXPOSURE CAMPAIGNS
Tactics:
- Print side-by-side flyers comparing regime lies to real-world conditions (empty shelves, blackouts).
- Conduct public “fact checks” on walls, graffiti, or handouts.
- Project or hack displays to show regime manipulations (edited news footage examples).
SECTION 17: FINANCIAL SELF-SUFFICIENCY & FUNDING OPERATIONS
OBJECTIVE:
Establish sustainable, decentralized financial support for resistance activities, minimizing surveillance exposure.
17.1 CRYPTO & ANONYMOUS CURRENCIES
Tactics:
- Use privacy coins (Monero, Zcash) + mixers.
- Never convert large sums at once.
- Conduct all crypto trades via VPNs + air-gapped burners.
17.2 LOCAL FUNDRAISING & BARTER NETWORKS
Tactics:
- Build underground trade systems (goods-for-goods/services-for-services).
- Organize cash collection drives via community circles, religious groups, or sympathetic businesses.
17.3 ASSET REPURPOSING
Tactics:
- Strip abandoned vehicles, buildings for materials that can be sold or repurposed (scrap metal, electronics).
- Launder seized regime assets into resistance support.
SECTION 18: HUMANITARIAN SHADOW NETWORKS
OBJECTIVE:
Provide covert systems for medical aid, shelter, and food to persecuted civilians.
18.1 UNDERGROUND MEDICAL SUPPORT
Tactics:
- Stock decentralized caches of medkits, antibiotics, trauma supplies.
- Establish mobile underground clinics staffed by trusted professionals.
- Rotate supply locations monthly.
18.2 FOOD & SHELTER SUPPORT
Tactics:
- Guerrilla gardens + rooftop farming for independent food sources.
- Establish rotating safehouses with strict compartmentalization.
- Use encrypted dead drop systems to direct civilians to aid points.
SECTION 19: CELL SECURITY & INFILTRATION DEFENSE
OBJECTIVE:
Prevent regime infiltration, detect informants, and maintain operational integrity.
19.1 VETTING & STRESS TESTS
Tactics:
- All recruits vetted by multiple trusted sources.
- Use misinformation tests: feed suspects false details, watch for leaks.
- Observe for unusual eagerness, inconsistent stories.
19.2 PHYSICAL SECURITY
Tactics:
- Never meet at the same location twice.
- Use blindfold transport or staggered meeting points.
- Always maintain fallback plans in case of sudden arrests or betrayal.
SECTION 20: POST-CONFLICT TRANSITION & POWER VACUUM PREVENTION
OBJECTIVE:
Ensure peaceful, democratic restoration after regime collapse. Prevent chaos, opportunist takeovers, or factional violence.
20.1 COMMUNITY COUNCILS
Tactics:
- Establish local councils during resistance, composed of trusted civilians.
- Begin drafting transition frameworks early—address civilian rights, justice processes.
20.2 DEFECTOR REINTEGRATION
Tactics:
- Create standardized amnesty programs for defectors aiding resistance.
- Vet carefully, avoiding warlord rise.
20.3 CIVILIAN RIGHTS DECLARATION
Tactics:
- Pre-draft and circulate rights documents as a resistance commitment.
- Ensure post-conflict civilians are aware of protections, avoiding repeat oppression cycles.
SECTION 21: ANONYMOUS MOVEMENT & UNDERGROUND NETWORKS
OBJECTIVE:
Enable near-anonymous travel and secure relocation of persecuted individuals within a total surveillance society. Establish permanent underground networks for sustained movement.
21.1 THE LIMITATIONS OF MODERN FAKE IDENTITIES
Reality:
- Digital identity verification (biometrics, real-time database checks, ALPRs) has rendered traditional fake IDs obsolete.
- Attempts to use fabricated documents often trigger immediate scrutiny.
Solution: Shift focus from faked identities to invisibility, route control, and off-grid support.
21.2 UNDERGROUND NETWORK STRUCTURE
Tactics:
- Establish decentralized, autonomous cells across urban, suburban, and rural zones.
- Each cell manages:
- Safehouses: Rotated weekly, never reused in rapid succession.
- Supply Caches: Burner phones, clothing, food, currency hidden in public locations.
- Extraction Routes: Use of tunnels, rail lines, culverts, abandoned infrastructure (see Section 3).
Compartmentalization:
- Members only know immediate contacts and next safehouse, preventing total network compromise.
21.3 TRAVEL PROTOCOLS WITHOUT RELIANCE ON IDENTITY
Tactics:
- No Digital Trace:
- Burners in Faraday pouches.
- No credit card, app usage.
- Transportation:
- Older, non-traceable vehicles (no embedded GPS).
- License plate switches, rural backroads to bypass ALPRs.
- Hopping freight rail in rural zones.
- Pedestrian Movement:
- Dense crowd blending (festivals, markets).
- Varied appearance and gait daily.
- Utilize storm drains, service tunnels, underground parking structures.
21.4 CROSSING BORDERS & HOSTILE CHECKPOINTS
Tactics:
- Avoid official crossings. Identify smuggler trails, old smuggling routes, and natural boundary zones (forests, rivers).
- Recruit guides familiar with terrain.
- Cross at night or under adverse weather conditions (fog, heavy rain).
Preparation:
- Civilians trained in cover stories if intercepted.
- No electronic devices carried. All intel memorized.
21.5 CODED COMMUNICATION WITHIN THE UNDERGROUND
Tactics:
- Pre-arranged symbols left on walls, public benches (see Section 5).
- Dead drops with next-location information.
- Signal fires, lights, flags visible from distance (color-coded).
21.6 FINAL RULE:
True anonymity in the digital era comes from route control, human trust networks, and zero reliance on identity systems. Every urban center, every highway can host an underground—built on trust, adaptability, and constant movement.
SECTION 22: COMMUNITY SAFETY & RESILIENCE UNDER COLLAPSE
OBJECTIVE:
Empower local communities to protect themselves and survive as regime policies dismantle social safety nets, reduce services, and deepen economic decline.
22.1 LOCAL MUTUAL AID NETWORKS
Tactics:
- Establish neighborhood-level mutual aid groups.
- Coordinate distribution of food, medicine, shelter through physical bulletin boards, encrypted channels, or word-of-mouth.
- Rotate responsibility for logistics to avoid burnout or targeting.
Examples:
- Free food fridges in hidden locations.
- Community kitchens run out of rotating safehouses.
- Medical supply drops using dead drop points.
22.2 COMMUNITY DEFENSE & SAFETY TEAMS
Tactics:
- Train small teams in first aid, fire response, basic self-defense.
- Use patrol rotations to protect vulnerable neighborhoods from regime thugs or opportunistic violence.
- Whistle signals, flashlight codes, or noise makers to alert for danger.
22.3 UNDERGROUND EDUCATION & CHILD SAFETY
Tactics:
- Organize clandestine schools to replace stripped education services.
- Rotate locations weekly to avoid detection.
- Incorporate curriculum on history, critical thinking, survival skills, resistance ideology.
22.4 ECONOMIC SELF-SUFFICIENCY NETWORKS
Tactics:
- Establish community bartering systems.
- Rotate community members’ skills/services (repair work, farming, childcare).
- Create micro-economies based on trade and resource pooling.
Example:
- “Service Days” where local members trade labor or goods without currency.
- Hidden community workshops for tool and gear repair.
22.5 PUBLIC HEALTH IN A COLLAPSING SYSTEM
Tactics:
- Stockpile basic medicines: antibiotics, antiseptics, painkillers.
- Teach sanitation: DIY latrines, water filtration (see Section 14), waste disposal to prevent disease.
- Hidden vaccination points, if available.
22.6 MENTAL RESILIENCE & COMMUNITY MORALE
Tactics:
- Hold clandestine cultural events, music nights, or religious gatherings.
- Publish underground newsletters celebrating local acts of resistance.
- Support psychological health through peer counseling, mutual care.
APPENDIX A: URBAN ESCAPE BLUEPRINT
OBJECTIVE:
Establish reliable, unmapped escape routes through urban environments, utilizing abandoned, forgotten, or overlooked infrastructure to evade regime patrols and extraction teams.
KEY ROUTE TYPES:
- Utility Tunnels (Steam, Electrical, Telecommunications):
- Locations: Older cities (NYC, Chicago, DC).
- Access Points: Manholes in alleys and industrial zones, maintenance hatches near power substations, decommissioned entries in basements.
- Notes: Carry portable oxygen and lights; ventilation is limited. Watch for motion sensors in newer sections.
- Storm Drainage Systems:
- Locations: Universal in all cities.
- Access Points: Grates in parking lots, underpasses, culverts leading to rivers.
- Notes: Navigate only during dry weather. Mark entry discreetly. Exit at remote discharge points outside surveillance.
- Abandoned Subway Lines & Stations:
- Hotspots: Cincinnati, NYC, Boston.
- Access Points: Forgotten stairwells, elevator shafts, sealed platforms.
- Caution: Recon routes; exits may be bricked. Regime sweeps possible—rotate usage.
- Disused Rail Lines & Freight Yards:
- Usage: Connect urban hubs to outskirts. Typically low surveillance in economically depressed areas.
SUPPORT INFRASTRUCTURE:
- Safehouse Integration:
- Coordinate safehouses at surface points near tunnel entries/exits.
- Use rotating signal markers (spray tags, flags):
- Green: Safe
- Yellow: Compromised but empty
- Red: Hostile forces present
- Supply Cache Points:
- Waterproof containers beneath benches, utility poles. Include medkits, burners, cash, map fragments.
ESCAPE PROTOCOLS:
- Recon First: Never use a route without prior recon. Check monthly for surveillance updates.
- Divide Movements: Split large groups; stagger exits.
- Noise Discipline: Avoid metal-on-metal sounds.
- Time Windows: Move during low surveillance windows (2am-4am).
- Route Rotation: Never reuse the same path within two weeks.
APPENDIX B: SURVEILLANCE AVOIDANCE WHILE TRAVELING
OBJECTIVE:
Provide actionable protocols to evade cameras, drones, license plate readers, facial recognition, and digital tracking while moving through contested zones.
1. AVOIDING CAMERA NETWORKS
- Blind Spots: Corners, underpasses, dense crowds.
- Lighting Weakness: Bright lights, smoke/fog blind street cams.
- Actions:
- Move parallel to walls, outside CCTV cones.
- Use umbrellas, hoods, scarves; avoid unique patterns.
- Use crowds and protests to blend.
- Avoid clusters like ATMs, gas stations, government buildings.
2. FACIAL RECOGNITION COUNTERMEASURES
- Weaknesses:
- Sensitive to occlusions: scarves, masks, sunglasses.
- Struggles with IR light interference.
- Protocol:
- Multi-layer face covering: cap, sunglasses, surgical mask.
- Avoid consistent accessories.
- Use IR LED arrays sewn into hats (blinds facial recognition).
3. MOBILE DEVICE TRACKING
- Risks:
- Towers triangulate even “off” phones.
- Bluetooth/WiFi auto-connects expose presence.
- Apps leak GPS/device ID.
- Actions:
- Burner phones only. Powered down, stored in Faraday pouch.
- Disable Bluetooth/WiFi/NFC.
- Keep personal devices far away or cached.
4. LICENSE PLATE READERS
- Tactics:
- Avoid highways, known ALPR zones.
- Use older vehicles without embedded GPS.
- Temporary plate covers (mud, magnets).
- Park in underground garages, behind large vehicles.
5. DRONE & AERIAL SURVEILLANCE
- Avoidance:
- Operate in heavy wind, rain, or night.
- Dense canopy, tunnels, overpasses block aerial line-of-sight.
- Reflective or IR-disruptive materials scramble thermal imaging.
- Carry radio scanners to detect drone frequencies.
6. BEST PRACTICES SUMMARY
- Randomize routes/timing.
- Limit travel groups.
- Destroy physical evidence post-movement.
- Switch clothing, gait, accessories regularly.
APPENDIX C: DEFAULT PASSWORD DATABASE & COMMON ACCESS CODES
OBJECTIVE:
Provide high-risk, pre-researched access codes that cannot be safely searched online without triggering surveillance sweeps.
System Type |
Common Defaults |
Traffic Message Boards |
DOTSHELL, CDEGEMAC, 1234, 5555 |
CCTV Systems (small towns) |
admin, 0000, 1111, password, default |
Utility Access Panels |
Often unlocked, or keys universal at hardware stores |
Telecom Boxes |
No passwords, exposed physical fuses or ports |
Building Maintenance Panels |
Fire code: 2580, 0000, 4242 (varies) |
APPENDIX D: URBAN TRAPS & NON-LETHAL DEFENSE DEVICES
DIY DEVICES:
- Nail Boards:
- Plywood + nails protruding upwards, concealed under leaves.
- Placement: alleyways, entry routes.
- Tripwire Noise Makers:
- Cans with stones attached to fishing wire.
- Triggers loud noise to alert safehouse occupants.
- Tire Puncture Strips:
- Rows of nails or sharpened scrap metal on wooden beams.
- Dropped across roads post-mission to block pursuers.
- Chemical Deterrents:
- Vinegar, pepper powder, water in spray bottles = crude irritant.
APPENDIX E: BASIC FIELD MEDICAL & TRAUMA CARE
Included Diagrams:
- Tourniquet application (limb hemorrhage control).
- Basic wound suturing technique.
- Improvised water filtration (charcoal, sand, gravel layers).
- Plant Guide:
- Yarrow: Antiseptic properties.
- Plantain: Anti-inflammatory, wound dressing.
- Willow Bark: Pain relief (natural aspirin).
APPENDIX F: DIY ENERGY & POWER SOURCES
Tactics:
- Bicycle Generators:
- Attach alternator + voltage regulator to rear wheel.
- Charge batteries for comms gear.
- Car Battery Scavenging:
- Remove safely, use inverter for small-scale power.
- Recharge with manual crank systems.
- Solar Panel Rigging:
- Salvage panels from abandoned buildings.
- Mount to portable frames, store excess charge in deep-cycle batteries.
APPENDIX G: PRINTABLE ENCRYPTION & CIPHER TABLES
Included:
- Number-letter substitution (A=1, B=2, etc.).
- Rotating keyword ciphers.
- One-time pad templates.
- Cipher wheel printable cutout.
APPENDIX H: DOCUMENT FORGERY BASICS (LOW-TECH)
Methods:
- Age paper with tea/coffee stain, gentle heat.
- Stamp duplication: carve erasers with sharp objects.
- Photocopy genuine forms, overlay with modified data manually.
- Always test ink bleed and paper feel consistency.
APPENDIX I: BLACKLISTED SEARCH TERMS & ONLINE BEHAVIOR GUIDE
NEVER SEARCH OR POST ABOUT:
- Bomb-making ingredients (thermite, acetone peroxide, etc.).
- Communication disruption tools (RF jammers, frequency scanners).
- Surveillance bypass techniques.
- DIY firearms, explosives, weapon mods.
- Names of resistance groups, known defectors.
SAFER ALTERNATIVES:
- Gather intel via:
- In-person contacts.
- Physical zines, booklets distributed in safe zones.
- Dead drops.
- QR codes embedded in street art (cipher protected).
FINAL RULE: Digital space is always compromised. Never trust public forums, encrypted apps alone, or uncensored search engines.
APPENDIX J: CRIMINAL SURVIVAL SKILLS & HARD REALITIES
OBJECTIVE:
Prepare operatives mentally and practically for the reality that resisting authoritarian regimes means breaking laws. Learn how to survive, evade detection, and minimize exposure.
J.1 MINDSET ADJUSTMENT
- Understand: You will be labeled a criminal. There is no difference between intent and action in the eyes of oppressive regimes.
- Detach emotionally from societal definitions of legality. Focus on morality: protecting lives and resisting tyranny.
J.2 POLICE STOP SURVIVAL PROTOCOL
- Never carry personal ID unless absolutely necessary.
- Commit fake but plausible cover stories to memory.
- Avoid nervous behavior: act bored, calm, non-threatening.
- Keep bags, vehicles clean of contraband during non-operational movement.
J.3 HANDCUFF, ZIPTIE, & RESTRAINT ESCAPE BASICS
- Hide shim tools (small metal pieces) in belt, shoes.
- Practice breaking zip ties with leverage (knee-to-hand motion).
- Learn wrist positioning to prevent tight bindings.
J.4 BASIC LOCK EVASION SKILLS
- Carry universal utility keys for utility boxes, elevators.
- Master basic lockpicking techniques for low-security doors.
- Never leave tools behind—burn or bury.
J.5 FINGERPRINT, DNA & TRACE AVOIDANCE
- Always wear gloves.
- Burn or chemically destroy all waste: receipts, used gloves, packaging.
- Avoid shedding hair, skin, saliva at ops sites.
J.6 HEAT AWARENESS: KNOW WHEN TO DISAPPEAR
- If contacts disappear or surveillance increases, pull back entirely.
- Rotate to different safe zones, discard devices.
- Change appearance, abandon prior routes.
FINAL RULE:
Every action carries risk. You will have to lie, vanish, and outthink professional law enforcement. Accept it. Prepare for it. Build discipline to survive it.