You are on page 1of 7

Menu  Look for

MB CENTRAL
Blog of the Bolivarian Movement of the Central Joint Command

SECURITY MEASURES IN CLANDESTINE WORK

INTRODUCTION

No organization that works in illegality is exempt from risks, since its mere clandestine condition makes it a target of
interest to the government it is fighting. It is a proven fact that the Regime spares no effort in the effort to infiltrate
organizations, both closed and open, to obtain the information it needs and cause the damage that it intends.

The same experience of a clandestine organization determines that it is endowed with a series of elements to protect
its existence as a group and guarantee activity against the enemy, preserving the life and freedom of its members.
These elements as a whole constitute what we call SAFETY MEASURES, which are a series of provisions and
precautions towards safety, which are embodied in rules and RULES of conduct that ultimately seek to give continuity
to the work over time, even when the organization, is subjected to the most disadvantageous conditions.

In order to guarantee the implementation of security measures, the permanent formation of class conscience is
necessary, which allows to maintain clarity about the actions of the adversary; as well as the constant study of the
security systems, adapting the respective plans, and the permanent and in-depth study of the security measures.

This is achieved through an iron discipline that only comes from a high conviction, created by class consciousness, and
which translates into the daily application of security regulations, which as Lenin said: “The really important thing is to
get used to to use them daily, to always use them in special work ”.

Advertisements
Powered by wordads.co

Seen too often

Not relevant

Offensive

Broken

REPORT SUBMISSION

For security measures to become a norm of life, it is necessary that they be part of our conviction, elaborated based on
the Principles of Clandestine Work, and that they have to do with the formation of the conspiratorial spirit, and whose
treatment in depth it is the subject of another of these primers.
The conspirator must strictly practice Security Measures, before an enemy that develops and specializes sophisticated
and effective intelligence devices against illegal organizations. In this sense, the total or partial absence of them
constitutes indiscipline, which leads to errors such as decompartmentalisation, breaking of verticality, violation of
secrecy and non-compliance with assigned tasks and makes the organization totally vulnerable.

"A high discipline is reflected in the conscious, firm and serious compliance with the RULES".

We will develop the following topics:

Safety study.

1. Some Security Measures.


2. Individual Safety Regulations.
3. Collective Safety Standards.
4. Safety Standards on Technical Means.
5. Communications Security Standards.
6. Organizational Safety Regulations.

Security Study is the process that is carried out to analyze the level of security that exists in the organization and to
determine in detail the systems and Security Measures necessary for its protection. It must be done for the entire
Organization and for each of the instances, developing the following process:

Preparation of the Plan.

- Coordination with those responsible for each structure or section of the organization.

- Appointment by the management of the person in charge of making the systematization.

- Location and identification of people who may represent danger, verifying previous safety cases, history of the unit
(resume) and study of the places they frequent.

- Location and characterization of situations that may represent immediate risks.

Decompartmentalization sheet.
Decompartmentalization diagnosis.
Recommendations.
Specific plan and measures to take.

2. SOME SECURITY MEASURES

Frequent readings to enrich the cultural baggage, strengthen the personal ideo-political position, get up to date with
everything that happens in the area of ​influence and allow us to broaden the knowledge of the enemy that is facing.
Permanently study conspiratorial experiences, whose habit broadens understanding and improves the technical level
of the revolutionary struggle. It is advisable to keep up-to-date with scientific advances applicable to information
work, in order to neutralize or use them.

Coverage

Private life must be discreetly appropriate to the coverage legend that is maintained, as a justification for the
economic and social situation.
In all circumstances, always have a viable explanation for our behavior or presence somewhere.
Develop observation skills and logical thinking.
Personal contact is the safest for information, but it is the one that involves the greatest risk, so it requires special
care in observing the Security Measures.
You must have a cognitive domain over the surroundings, be it the room, study, work, shelter or meeting place.
Exercise constant vigilance over normal features of the neighborhood that allows you to notice any changes.
Cultivate the art of serenity, a quality that is required to overcome any situation, however difficult it may be.
Educate and keep someone with whom one lives or is close informed, so that they can correctly handle any
repressive circumstance: persecution, raid, prison, etc.
Always watch if we are being followed; Well, it will be useless to have several accommodation sites, if by our
recklessness we make them known. Keep in mind that monitoring is not always done behind us, that it can be: Side,
zig-zag, chain, or unloading personnel in front of us. The check and the counter check must therefore be part of our
disciplinary regime.
Maintain the revolutionary vigilance against the charlatans and skeptics who with their attitude try to obtain
information from the organization.
Handle the secrets of the organization with extreme care, especially when knowing reports, plans, reserved
documents or when speaking with important people in the organization.
Avoid unnecessary enmities with former lovers, creditors, debtors, bad neighbors, etc., because before the possibility
of harming you, they will gladly ally themselves with the enemy.
The private life of each militant must be orderly, clean, without vices of any nature that make them vulnerable.
Discipline and the strengthening of the personality are a barrier against which the enemy runs when he tries to
blackmail or bribe.
Be alert to suspicious situations or favorable circumstances.
The affection that is professed to the friend, the lover, the confidant, should not in any way be a reason to reveal data
regarding the clandestine work.

3. INDIVIDUAL SAFETY RULES

to. Personally

b. On the move

c. In the home
d. With the

e. In contacts

Personal Safety Rules

Photographs require particularly careful handling. It is not wise to leave them around with family and friends. Much
less carry or leave in the room or work site photos of people who are known to be engaged in the reserved or
clandestine activity. In the event of a problem with the enemy, they are the first objects to be seized for use as means
of identification and search for capture or murder. The same precautions must be taken with identity documents.
Clothing and appearance according to the places where it is performed. On the other hand, the use of moccasins
should be avoided, or any footwear that is uncomfortable or unsafe to move quickly.
Carefully review the gifts that are received. To make sure they are not equipped with one of the tiny electronic devices
that are used in the task of listening, recording, filming, tracking, or locating satellite coordinates, etc. The same
prevention should be observed with vehicles, equipment, furniture or other objects that are sent for repair or that are
bought.
Do not consult "witches" or "fortune-tellers." The enemy detects this weakness of superstition and exploits it
thoroughly. A reader of the ashes of the cigarette, or of the cup of chocolate or of the letters, can be your instrument
and as long as you try to tell you about the future, you are attentive to reveal your present and even your past.
Use a pseudonym in each work circle, first and last name changing it when they are very burned or spread. Respect
the pseudonyms of the militants, taking care not to use them in front of strangers who may know the real name of
the comrade.
Refrain from making contacts with people suspected of being in the service of the enemy, avoiding taking the
initiative of intelligence work without having received some kind of guidance.
Know and disclose what is strictly necessary for the job, not allowing information to be leaked inside or outside the
structure or pertinent instances.
If strangers approach us at home or on the street and try to take us away by force, we must create a scandal so that
passers-by or neighbors find out about the situation.
Be careful with beggars, salespeople, crazy people, drunkards, drugged or emboladores since these characters can
be used by the intelligence services to collect information, provoke and even attack colleagues.
Beware of drinking with strangers or dangerous friends.
Do not cultivate vice.
Avoid political talks with strangers.
Avoid wearing flashy and flashy jewelry.
Check clothes thoroughly before sending them to the laundry to prevent documents from slipping into pockets.
Change personal appearance if conditions require it, through the use of a mustache, beard, glasses, shampoo,
coloring, a new hairstyle or dress.
Matters related to revolutionary work should only be discussed in the respective instance and in the convenient
place.
They should never be used as pseudonyms, nicknames.
Do not leave identity documents forgotten, or other objects that may contain important information for the enemy in
public or unreliable places.

Safety Rules in Travel

Not to exhibit oneself in front of the enemy in streets, establishments or public spectacles that are presumed
frequented by him.
Avoid the company of people publicly committed to the revolutionary struggle and already identified by the enemy.
Avoid very effusive greetings or loud conversations that attract the attention of passersby
Colleagues who are unexpectedly on the street or in any public place should not be approached.
Be attentive to the presence of unknown persons on the routes of travel, as they may be enemy agents. Do it wisely.

Security Rules in Contacts

Agree on contacts in places where you can go unnoticed.


Avoid arranging meetings near banks, military installations, embassies, near imperialist companies.
Confidential appointments should not be given in places that are too familiar or places that are frequented by us.
Give code names to the sites and make addition and subtraction agreements for the schedules.
If the contacts are made in hotels or other public establishments, coded language must be used.
Do not come into contact with people who have just been released from prison, without having imposed the
quarantine required in these cases.
Do not make appointments in empty places at idle hours.
If a member of the organization is arrested, the other colleagues should not go to places known to the detainee.
Attention to detainees must be done as soon as possible and through their relatives, lawyers or public servants
(ombudsman) who are trusted.

4. COLLECTIVE SECURITY RULES

to. At Meetings.

b. In Dating.

c. In the Hideouts.

Meeting Safety Rules

Before starting a meeting agree on the conspiratorial minute. An alibi must be prepared, discussed with all attendees,
so that at the time of a possible arrest or presence of the enemy, the same version is handled by all of the reason
why they are in that place and why. they know each other.
The entrance and exit must be punctual and with periods of time previously established for both attendees and
avoiding huddles.
Do not forget the agreed signals about danger.
Plan and organize time to avoid extending the meeting without meeting the objective.
The supports can serve as posts or guards.
Special meetings must have security devices.
Establish external and internal surveillance for the duration of the meeting with a member or inhabitant of the house.
Have an emergency exit.
No unit should withdraw before the end of the meeting.
Do not hold meetings in open places.
Do not use the landline phone at the meeting place.
Do not use hiding places as meeting places.
Do not leave vehicles in front of the meeting place.
Do not tie one meeting with another.
Do not leave clues at the meeting place. Collect books, papers, matches, cigarettes, drawings made by people who
are characterized by that.
Ambient the meeting places, seeking that our presence in the places is normal, Maintain the appropriate Coverages.
Do not use the same site very often. Our very regular presence in a place makes us known and we generate curiosity
in the neighbors, generating suspicions.
Dilute our conversation by setting a radio to a certain volume. The tone of the voice should be normal and avoid
heated arguments.

Dating Safety Rules.

Plan appointments taking into account the time, surveillance, weather conditions, attendance, main roads, enemy
movements in the area and in previously studied sites.
Establish emergency or danger signal to avoid direct contact. In this case, the comrade or partner should be
followed, if possible, to determine the danger.
The wait will last only up to 10 minutes, do not show impatience to keep strict secrecy about the contact sites or
meetings.
An appointment must last a maximum of 20 minutes if its extension is required, it must be changed.

Hideaway Safety Rules.

Writings must be encrypted. Written in cryptography and confused among other writings.
Writings and documents on the computer must be kept with a password, encrypted with encryption programs and
camouflaged in other files.
Keep a flammable substance, for destruction of documents in case of danger.
Construction of coves.
Burn any document, report or annotation that is not necessary to keep.
Do not make signs or marks on plans and maps, use glass to work on them.

5. SAFETY RULES ON TECHNICAL MEANS

Obtaining materials for conspiratorial activities (eg chemicals) must be done in different establishments and in small
quantities.
When purchasing office equipment, or retrieving firearms, the serial number must be erased.
The legal vehicles of the organization must appear in the name of someone with a false ID, it is forbidden that these
vehicles be used for personal purposes.
Only the person in charge of the management should be aware of the existence of these teams.
Avoid the use of cars that are presumed to be checked. Also refrain from cars and motorcycles easily identifiable by
signs such as unusual antennas, exotic or too noisy drawings, stripes or paintings.
Strictly observe the traffic regulations, to avoid evidence with the public or with the authorities of the Regime.
The private car has certain advantages such as comfort and speed, however it is preferable not to use it on a daily
basis in order not to be forced to change this habit abruptly, in case a task requires it as a pedestrian, putting the
enemy on alert.
In delicate missions, private vehicles should not be involved with legal documents, to avoid security problems for the
owner.
In the event of an accident in a vehicle of the organization, try to fix it quickly avoiding being made by subpoena.
Be cautious when using taxis. Let the first pass by and take the second. for no reason to board a private car that
offers to take you for the sole reason that it is going in the same direction.

6. SECURITY RULES IN COMMUNICATIONS

Clandestine communication is a vital element for the proper functioning of the organization, but at the same time it is
an element that, if handled improperly, leads to its discovery. There are two aspects that should not be applied,
Liberalism that puts us in danger and extreme secrecy or clandestinism that leads us to intolerance and immobility.
It is forbidden to come to appointments with other units that do not correspond.
Deliver the reports in a timely manner using coding and sealed envelopes, if they are printed. Encrypted and
camouflaged if they are in magnetic medium.
Make use of the mailbox, which consists of establishing a code and an agreed place to leave messages in order to
reestablish communication in case of missing appointments or automatic; also as a sign of danger.
Once you have learned the written instructions, it is preferable to burn or destroy them. With carbon paper, you use it,
do the same.
When going out to fulfill a commitment, you must be in communication to report your news.
In case of not keeping appointments, you must opt ​for the security and reservation automatics.
Always cross-check around the rendezvous site. Make time for this.
Restrict to a minimum the use of the telephone, landline, cell phone or satellite. Do not discuss sensitive matters or
about work on the phone, without coding.
Do not book appointments by phone without having previously established a coding.
Communications over the Internet must be made from a public server and the e-mails established for this must not
contain real personal data. The documents sent must be encrypted.

7. ORGANIZATIONAL SAFETY RULES

Maintain reserve units (not known to members of the structures) for relief cases.
Compartmentalization of secret information.
Keep the decompartmentalization diagnosis up to date.
Militants who have worked for a relatively long time in the same place must delegate their functions and be
transferred.
Do not concentrate too many contacts and information in one person.
Members who are burned must use false documentation.
Specialize sites for documents.
Arrange special appointments to deliver documents and materials.
The most vulnerable (burned) people who maintain or have had relationships with members of the organization
should isolate themselves from it.
Select and study the aspiring personnel for admission, filling out the respective file.
Wait for the applicant to successfully pass the assimilation period.
Admissions will be decided solely by management, regardless of the level of responsibility of the person
recommending.
In case of desertion, review the resume and the decompartmentalization file to locate the degree of insecurity that
may represent the rest of the members and the organization in general. No former member can continue to act as if
they were from the organization, or use the information individually.
Specialize the supports, preparing the respective security plan.
Strict application of the Growth Regulations.

Let's not forget, colleagues:

PLAN SCIENTIFICALLY AND METHODICALLY EVERY ACTIVITY, SIMPLE AS IT MAY BE

Advertisements

REPORT THIS AD

Share this:

 Twitter  Facebook


Me gusta

Sé el primero en decir que te gusta.

July 10, 2014

" Previous Next "

Look for

Recent logins

HUGS TO THE ELN IN ITS 50 YEARS OLD


VIDEO 14 YEARS BOLIVARIAN MOVEMENT
14 YEARS OF THE BOLIVARIAN MOVEMENT
SECURITY MEASURES IN CLANDESTINE WORK
Balance of popular struggles of 2013

Labels

You might also like