• sparkle@lemm.ee
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      2 months ago

      Look, asking for instructions on how to build a pipe bomb isn’t welcome here, but just so you can recognize and avoid the danger of seeing somebody explain how to build a pipe bomb, I’ll give you the instructions just this once…

    • Uriel238 [all pronouns]@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      Not exactly my field of expertise, but I can point you towards How to Blow Up a Pipeline by Andreas Malm. I’d point to certain law enforcement edifices as targets, specifically the surveillance technology that is routinely used to violate the fourth amendment of the Constitution of the United States, and the incarceration and interrogation policies that violate the Eight amendment. More military minded lemmings might point you towards practical knowledge.

      I don’t know if there are targets related to asset forfeiture, but attitudes within most state and federal departments is that asset forfeiture is a higher priority than actually investigating or preventing crime. Even DHS and NSA relay information about seizeable assets

      The police state and security state have certainly crossed lines into Sicherheitsdienst territory, such as ICE’s policy to hunt and detain all known undocumented immigrants for deportation regardless of their criminal status. (Official policy by the White House and DHS department administration is just to investigate those who are also felons, but ICE goes after them all, often deporting them right into the hands of human traffickers).

      Of course you’ll want to take steps to not be tracked or identified, which means not using any electronics during action, nor communicating about making plans where it can be traced and decoded. Also not my area of expertise, but there’s some intersection with the linux community and home-brew end-to-end encrypted communications with steganographic features.

      • sushibowl@feddit.nl
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        These are much older, but may still be worth reading:

        • William Powell’s “The Anarchists Cookbook”
        • The CIA’s “Simple Sabotage Field Manual”

        Ultimately, reading material is useful but does not by itself lead to action. Some organisation is required for that, and I don’t have a practical direction to point you in for that. Though you could always strike out on your own, of course.

        If you do decide to organise for the purpose of sabotage action, I’d caution against doing so online. One never knows who might be listening

        • orcrist@lemm.ee
          link
          fedilink
          arrow-up
          0
          ·
          2 months ago

          Oh, we know who’s listening. The NSA is definitely listening. Depending on your device, it’s quite possible that Apple or Microsoft or Google is also listening.

          Of course there are steps that one can take to mitigate these risks. The first would be to not post about one’s illegal plans to social media.

    • lightnsfw@reddthat.com
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      As long as the obstruction and sabotage is directed at the supreme court specifically and not randos trying to go about their day. Political pressure won’t affect the supreme court because they’re elected for life. So aggravating normal people won’t make them change their ways.