[Index to the Anarchist Cookbook IV, Ver. 4.14] COOKBOOK.IV: Intro by Exodus 001: Counterfeiting Money 002: Credit Card Fraud

Total Page:16

File Type:pdf, Size:1020Kb

[Index to the Anarchist Cookbook IV, Ver. 4.14] COOKBOOK.IV: Intro by Exodus 001: Counterfeiting Money 002: Credit Card Fraud [Index to the Anarchist Cookbook IV, ver. 4.14] COOKBOOK.IV: Intro by Exodus 001: Counterfeiting Money 002: Credit Card Fraud 003: Making Plastic Explosives from Bleach 004: Picking Master Locks 005: The Arts of Lockpicking I 006: The Arts of Lockpicking II 007: Solidox Bombs 008: High Tech Revenge: The Beigebox (NEW Revision 4.14) 009: CO2 Bombs 010: Thermite Bombs (NEW Rivision, 4.14) 011: Touch Explosives 012: Letter Bombs 013: Paint Bombs 014: Ways to send a car to HELL 015: Do ya hate school? (NEW Revision, 4.14) 016: Phone related vandalism 017: Highway police radar jamming 018: Smoke Bombs 019: Mail Box Bombs 020: Hotwiring cars 021: Napalm 022: Fertilizer Bomb 023: Tennis Ball Bomb 024: Diskette Bombs 025: Unlisted Phone Numbers (NEW Revision, 4.14) 026: Fuses 027: How to make Potassium Nitrate 028: Exploding Lightbulbs 029: Under water igniters 030: Home-brew blast cannon 031: Chemical Equivalency List 032: Phone Taps 033: Landmines 034: A different kind of Molitov Cocktail 035: Phone Systems Tutorial I 036: Phone Systems Tutorial II 037: Basic Alliance Teleconferencing 038: Aqua Box Plans 039: Hindenberg Bomb 040: How to Kill Someone with your Bare Hands 041: Phone Systems Tutorial III 042: Black Box Plans 043: The Blotto Box 044: Blowgun 045: Brown Box Plans 046: Calcium Carbide Bomb 047: More Ways to Send a Car to Hell 048: Ripping off Change Machines (NEW Revision, 4.14) 049: Clear Box Plans 050: CNA Number Listing 051: Electronic Terrorism 052: How to Start a Conference w/o 2600hz or M-F 053: Dynamite 054: Auto Exhaust Flame Thower 055: How to Break into BBS Express 056: Firebomb 057: Fuse Bomb 058: Generic Bomb 059: Green Box Plans 060: Portable Grenade Launcher 061: Basic Hacking Tutorial I 062: Basic Hacking Tutorial II 063: Hacking DEC's 064: Harmless Bombs 065: Breaking into Houses (NEW Revision, 4.14) 066: Hypnotism 067: Remote Informer Issue #1 068: Jackpotting ATM Machines 069: Jug Bomb 070: Fun at K-Mart 071: Mace Substitute 072: How to Grow Marijuana 073: Match Head Bomb 074: Terrorizing McDonalds 075: "Mentor's" Last Words 076: The Myth of the 2600hz Detector 077: Blue Box Plans (Ye' olde Favorite) 078: Napalm II 079: Nitroglycerin Recipe 080: Operation: Fuckup 081: Stealing Calls from Payphones 082: Pool Fun (NEW Revision, 4.14) 083: Free Postage 084: Unstable Explosives 085: Weird Drugs 086: The Art of Carding 087: Recognizing Credit Cards 088: How to Get a New Identity 089: Remote Informer Issue #2 090: Remote Informer Issue #3 091: Remote Informer Issue #4 092: Remote Informer Issue #5 093: Phreaker's Guide to Loop Lines 094: Ma-Bell Tutorial 095: Getting Money out of Pay Phones 096: Computer-based PBX 097: PC-Pursuit Port Statistics 098: Pearl Box Plans 099: The Phreak File 100: Red Box Plans 101: RemObs 102: Scarlet Box Plans 103: Silver Box Plans 104: Bell Trashing 105: Canadian WATS Phonebook 106: Hacking TRW 107: Hacking VAX & UNIX 108: Verification Circuits 109: White Box Plans 110: The BLAST Box 111: Dealing with the Rate & Route Operator 112: Cellular Phone Phreaking 113: Cheesebox Plans 114: How to Start Your Own Conferences 115: Gold Box Plans 116: The History of ESS 117: The Lunch Box 118: Olive Box Plans 119: The Tron Box 120: More TRW Info 121: "Phreaker's Phunhouse" 122: Phrack Magazine - Vol. 3, Issue 27 (Intro to MIDNET) 123: Phrack Magazine - Vol. 3, Issue 27 (The Making of a Hacker) 124: Phrack Magazine - Vol. 3, Issue 28 (Network Miscellany) 125: Phrack Magazine - Vol. 3, Issue 28 (Pearl Box Schematic) 126: Phrack Magazine - Vol. 3, Issue 28 (Snarfing Remote Files) 127: Phrack Magazine - Vol. 3, Issue 30 (Western Union, Telex, TWX & Time Service) 128: Phrack Magazine - Vol. 3, Issue 30 (Hacking & Tymnet) 129: Phrack Magazine - Vol. 3, Issue 30 (The DECWRL Mail Gateway) 130: Sodium Chlorate 131: Mercury Fulminate 132: Improvised Black Powder 133: Nitric Acid 134: Dust Bomb Instructions 135: Carbon-Tet Explosive 136: Making Picric Acid from Aspirin 137: Reclamation of RDX from C-4 Explosives 138: Egg-based Gelled Flame Fuels 139: Clothespin Switch 140: Flexible Plate Switch 141: Low Signature Systems (Silencers) 142: Delay Igniter From Cigarette 143: Nicotine 144: Dried Seed Timer 145: Nail Grenade 146: Bell Glossary 147: Phone Dial Locks -- How to Beat'em 148: Exchange Scanning 149: A Short History of Phreaking 150: "Secrets of the Little Blue Box" (story) 151: The History of British Phreaking 152: "Bad as Shit" (story) 153: Telenet 154: Fucking with the Operator 155: Phrack Magazine - Vol. 1, Issue 1 (The Phone Preak's Fry-Um Guide) 156: International Country Code Listing 157: Infinity Transmitter Schematic and Plans 158: LSD 159: Bananas 160: Yummy Marihuana Recipes 161: Peanuts 162: Chemical Fire Bottle 163: Igniter from Book Matches 164: "Red or White Powder" Propellant 165: Pipe Hand Grenade 166: European Credit Card Fraud (Written by Creditman! A Cookbook IV Recap!!) 167: Potassium Bomb 168: Your Legal Rights (For adults, or some of us think we are) 169: Juvenile Offenders' Rights 170: Down The Road Missle 171: Fun With ShotGunn Shells 172: Surveillance Equipment 173: Drip Timer 174: Stealing 175: Miscellaneous 176: Shaving cream bomb 177: Ripping off change machines 2 178: Lockpicking the EASY way 179: Anarchy 'N' Explosives Prelude 180: Anarchy 'N' Explosives Vol. 1 181: Anarchy 'N' Explosives Vol. 2 182: Anarchy 'N' Explosives Vol. 3 183: Anarchy 'N' Explosives Vol. 4 184: Anarchy 'N' Explosives Vol. 5 185: Explosives and Propellants 186: Lockpicking 3 187: Chemical Equivalent List 2 188: Nitroglycerin 2 189: Cellulose Nitrate 190: Starter Explosives 191: Flash Powder 192: Exploding Pens 193: Revised Pipe Bombs 4.14 194: * SAFETY * A MUST READ! 195: Ammonium TriIodide 196: Sulfuric Acid / Ammonium Nitrate III 197: Black Powder 3 198: Nitrocellulose 199: R.D.X. (Revised 4.14) 200: The Black Gate BBS 201: ANFOS 202: Picric Acid 2 203: Bottled Explosives 204: Dry Ice 205: Fuses / Ignitors / Delays 206: Film Canister Bombs 207: Book Bombs 208: Phone Bombs 209: Special Ammunition 210: Rocketry 211: Pipe Cannon 2 212: Smoke Bombs 4.14 213: Firecrackers 214: Suppliers II 215: Lab-Raid Checklist 216: Misc. Anarchy 217: LockPicking 4 218: Misc. Anarchy II 219: -* THERMITE 4 *- <-- The BEST rev. to 4.14 220: Conclusion Look for the NEXT Edition of The Anarchist CookBook!! -=> Exodus <=-_ Counterfeiting Money by JRoger Before reading this article, it would be a very good idea to get a book on photo offset printing, for this is the method used in counterfeiting US currency. If you are familiar with this method of printing, counterfeiting should be a simple task for you. Genuine currency is made by a process called "gravure", which involves etching a metal block. Since etching a metal block is impossible to do by hand, photo offset printing comes into the process. Photo offset printing starts by making negatives of the currency with a camera, and putting the negatives on a piece of masking material (usually orange in color). The stripped negatives, commonly called "flats", are then exposed to a lithographic plate with an arc light plate maker. The burned plates are then developed with the proper developing chemical. One at a time, these plates are wrapped around the plate cylinder of the press. The press to use should be an 11 by 14 offset, such as the AB Dick 360. Make 2 negatives of the portrait side of the bill, and 1 of the back side. After developing them and letting them dry, take them to a light table. Using opaque on one of the portrait sides, touch out all the green, which is the seal and the serial numbers. The back side does not require any retouching, because it is all one color. Now, make sure all of the negatives are registered (lined up correctly) on the flats. By the way, every time you need another serial number, shoot 1 negative of the portrait side, cut out the serial number, and remove the old serial number from the flat replacing it with the new one. Now you have all 3 flats, and each represents a different color: black, and 2 shades of green (the two shades of green are created by mixing inks). Now you are ready to burn the plates. Take a lithographic plate and etch three marks on it. These marks must be 2 and 9/16 inches apart, starting on one of the short edges. Do the same thing to 2 more plates. Then, take 1 of the flats and place it on the plate, exactly lining the short edge up with the edge of the plate. Burn it, move it up to the next mark, and cover up the exposed area you have already burned. Burn that, and do the same thing 2 more times, moving the flat up one more mark. Do the same process with the other 2 flats (each on a separate plate). Develop all three plates. You should now have 4 images on each plate with an equal space between each bill. The paper you will need will not match exactly, but it will do for most situations. The paper to use should have a 25% rag content. By the way, Disaperf computer paper (invisible perforation) does the job well. Take the paper and load it into the press. Be sure to set the air, buckle, and paper thickness right. Start with the black plate (the plate without the serial numbers). Wrap it around the cylinder and load black ink in. Make sure you run more than you need because there will be a lot of rejects.
Recommended publications
  • Trends in Anti-Fascist and Anarchist Recruitment and Mobilization
    Trends in Anti-Fascist and Anarchist Recruitment and Mobilization Dr. Ariel Kocha1 aMember, The Middle East Networks Analysis Desk, Moshe Dayan Center for Middle Eastern and African Studies, Tel Aviv University Abstract Article History For many, the discourse on anarchists' violence belongs to the past, to an era that Received Aug 1, 2017 shocked the world but ended a long time ago. However, this assumption is not accurate Accepted Feb 16, 2018 in the twentieth-first century. It ignores the reality that allows extremists to rise from Published: Mar 30, 2018 the dust, gain popularity and use available tools to promote themselves and their ideas, and thus, to pose a new potential threat. While most of the research on radicalization and political violent extremism focuses on jihadism or the contemporary right-wing extremism, it is important not to ignore the reaction that right-wing extremists created and provoked in the past, which is still relevant in our days: left-wing extremism, which is embodied today in violent anarchists and anti-fascists. This article sheds light on the contemporary left-wing extremism and violent mobilization in Europe and North America, its reflections on the Internet and in music, and its violent activity at home against "fascist" representatives (such as right-wing extremist groups and individuals), and even abroad, against other "fascist" representatives, such as the Islamic State organization. The purpose of the article is to examine this under- researched phenomenon while focusing on popular and recent modes of mobilization and recruitment of this "new revolutionary left", which reflect a threat that is developing in Europe, North America and the Middle East – but not from the jihadi or right-wing aspects, but from anti-fascist and anarchists' militancy aspect.
    [Show full text]
  • U.S. Department of Justice Federal Bureau of Investigation Washington, D.C. 20535 August 24, 2020 MR. JOHN GREENEWALD JR. SUITE
    U.S. Department of Justice Federal Bureau of Investigation Washington, D.C. 20535 August 24, 2020 MR. JOHN GREENEWALD JR. SUITE 1203 27305 WEST LIVE OAK ROAD CASTAIC, CA 91384-4520 FOIPA Request No.: 1374338-000 Subject: List of FBI Pre-Processed Files/Database Dear Mr. Greenewald: This is in response to your Freedom of Information/Privacy Acts (FOIPA) request. The FBI has completed its search for records responsive to your request. Please see the paragraphs below for relevant information specific to your request as well as the enclosed FBI FOIPA Addendum for standard responses applicable to all requests. Material consisting of 192 pages has been reviewed pursuant to Title 5, U.S. Code § 552/552a, and this material is being released to you in its entirety with no excisions of information. Please refer to the enclosed FBI FOIPA Addendum for additional standard responses applicable to your request. “Part 1” of the Addendum includes standard responses that apply to all requests. “Part 2” includes additional standard responses that apply to all requests for records about yourself or any third party individuals. “Part 3” includes general information about FBI records that you may find useful. Also enclosed is our Explanation of Exemptions. For questions regarding our determinations, visit the www.fbi.gov/foia website under “Contact Us.” The FOIPA Request number listed above has been assigned to your request. Please use this number in all correspondence concerning your request. If you are not satisfied with the Federal Bureau of Investigation’s determination in response to this request, you may administratively appeal by writing to the Director, Office of Information Policy (OIP), United States Department of Justice, 441 G Street, NW, 6th Floor, Washington, D.C.
    [Show full text]
  • STINGS, STOOLIES, and AGENTS PROVOCATEURS: EVALUATING FBI UNDERCOVER COUNTERRORISM OPERATIONS a Thesis Submitted to the Faculty
    STINGS, STOOLIES, AND AGENTS PROVOCATEURS: EVALUATING FBI UNDERCOVER COUNTERRORISM OPERATIONS A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Joseph Bertini, B.A. Washington, DC April 15, 2011 Copyright 2011 by Joseph Bertini All Rights Reserved ii TABLE OF CONTENTS Introduction ...................................................................................................................... 1 Literature Review............................................................................................................. 3 Background Information .................................................................................................. 4 Data and Methods .......................................................................................................... 13 Analysis.......................................................................................................................... 17 Conclusions and Recommendations .............................................................................. 30 Appendix ........................................................................................................................ 36 Bibliography ................................................................................................................... 44 iii I. Introduction After the September 11, 2001 terrorist attacks, the Federal Bureau of Investigation (FBI) dramatically
    [Show full text]
  • Providing the Recipe for Destruction: Protected Or Unprotected Speech Loris L
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Scholarly Commons McGeorge Law Review Volume 32 Article 13 Issue 1 Symposium: Biotechnology and the Law 1-1-2000 Providing the Recipe for Destruction: Protected or Unprotected Speech Loris L. Bakken University of the Pacific; cGeM orge School of Law Follow this and additional works at: https://scholarlycommons.pacific.edu/mlr Part of the Law Commons Recommended Citation Loris L. Bakken, Providing the Recipe for Destruction: Protected or Unprotected Speech, 32 McGeorge L. Rev. 289 (2000). Available at: https://scholarlycommons.pacific.edu/mlr/vol32/iss1/13 This Symposium is brought to you for free and open access by the Journals and Law Reviews at Scholarly Commons. It has been accepted for inclusion in McGeorge Law Review by an authorized editor of Scholarly Commons. For more information, please contact [email protected]. Comments Providing the Recipe for Destruction: Protected or Unprotected Speech? Loris L. Bakken* TABLE OF CONTENTS I. INTRODUCTION .............................................. 290 II. CONTENT OF MANUALS AND WEB SITES PROVIDING DETAILED ILLEGAL INSTRUCTION ............................................... 292 A. M anuals ................................................ 293 B. Web Sites ............................................... 296 III. FIRST AMENDMENT CASE LAW ................................. 298 A. Schenck v. United States ................................... 299 B. Abrams v. United States ..................................
    [Show full text]
  • Stephen Jones Principal Defense Attorney for Timothy Mcveigh
    Stephen Jones Principal Defense Attorney for Timothy McVeigh Chapter 1 — 1:20 Introduction John Erling: Stephen Jones is an attorney from Enid, Oklahoma whose practice is limited to trials and appeals. He attended the University of Texas, graduated from the University of Oklahoma law school in 1966 and was admitted to the bar that same year. In 1964 he served as research assistant for Richard M. Nixon and in 1967 with legal counsel to the governor of Oklahoma. Of his many accomplishments he was appointed by the United States District Court on May 8, 1995, to serve as the principal defense counsel for Timothy McVeigh charged in the Oklahoma City Bombing Case. In the interview you are about to hear, Stephen Jones discredits Timothy McVeigh’s confession. And you will hear Mr. Jones say that Mr. McVeigh takes too much credit for the bombing and believes that there are others unknown. His book on this matter is titled, Others Unknown: The Oklahoma City Bombing Case and Conspiracy. This interview was recorded in Mr. Jones office in downtown Oklahoma City, January 27, 2010, and made available on VoicesofOklahoma.com. Chapter 2 — 3:45 Coming to Oklahoma John Erling: My name is John Erling and this is January 27, 2010. Stephen if you will state your full name date of birth and present age. Stephen Jones: Stephen Jones, July 1, 1940 and I’m 69 years old. JE: Where were you born? SJ: Lafayette, Louisiana. JE: Your mother’s maiden name? And where was she– SJ: Sure. I was an only child.
    [Show full text]
  • The Terrorist Argument: Modern Advocacy and Propaganda
    ONE Terrorist Propaganda and Argument errorism is a form of deliberate, purposeful po liti cal activity. It combines Tpower and argument.1 Terrorist arguments— the subject of this volume— may have some success without being sound, subtle, or intellectually rich. They may be low- level mor- alism. They may be high- wattage and heated, yet connect in only sputtering ways with thoughtful people. But as a thousand “normal” po liti cal campaigns have demonstrated in modern times, in favorable circumstances being brazen and argumentative can be enough to get noticed and make neutrals or moder- ates back away, or to draw the weak- minded in. Terrorists may be highly edu- cated, rhetorically skilled, or both. What compels may not be the wealth of wisdom or the line of logic in terrorists’ arguments but the freshness in their approaches, the variety in their media, the relentlessness of their combinations of words and deeds pummeling their audience. Few realize how great is the range of terrorist mediums. Our pages will explore and reveal this range. Simple songs, chants, and shouted slogans have long done ser vice as forms of po liti cal mobilization. The Islamic State in Syria and the Levant, referred to as ISIS, or simply IS, features male chants as musical accompaniment to in- numerable propaganda releases. These forms of vocalization are free; they can be mastered instantly; they may evolve, or rebut, a prevailing view, or take fresh sudden turns during a terrorist campaign. Their short form has always been easy to daub on walls and now works well within the 140- character limit 5 6 The Terrorist Argument of social media message.
    [Show full text]
  • The Terror Pandemic: the International Diffusion of Terrorism
    University of South Carolina Scholar Commons Theses and Dissertations Summer 2019 The Terror Pandemic: The International Diffusion of Terrorism Stephen Michael Chicoine Follow this and additional works at: https://scholarcommons.sc.edu/etd Part of the Sociology Commons Recommended Citation Chicoine, S. M.(2019). The Terror Pandemic: The International Diffusion of Terrorism. (Doctoral dissertation). Retrieved from https://scholarcommons.sc.edu/etd/5443 This Open Access Dissertation is brought to you by Scholar Commons. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Scholar Commons. For more information, please contact [email protected]. THE TERROR PANDEMIC: THE INTERNATIONAL DIFFUSION OF TERRORISM By Stephen Michael Chicoine Bachelor of Science Lander University, 2009 Master of Arts University of South Carolina, 2012 Submitted in Partial Fulfillment of the Requirements For the Degree of Doctor of Philosophy in Sociology College of Arts and Sciences University of South Carolina 2019 Accepted by: Mathieu Deflem, Major Professor Andrea Henderson-Platt, Committee Member Deena Scott Isom, Committee Member Jennifer Augustine, Committee Member Cheryl L. Addy, Vice Provost and Dean of the Graduate School © Copyright by Stephen Michael Chicoine, 2019 All Rights Reserved. ii ABSTRACT The online recruitment efforts of ISIS have raised questions about the new role of the internet in the spread of terrorism. However, the use of the mass media by terrorist groups to recruit and spread is not unique to ISIS or the digital age and has been an aspect of terrorism since its modern conception. To explain the spread of terrorism historically and understand the unique dimensions of terrorism and the internet, a cultural explanation is proposed to explain the process through terrorism spreads as well as the content that inspires violence.
    [Show full text]
  • Anarchism and Authority
    ANARCHISM AND AUTHORITY Examining the political theory of anarchism from a philosophical and historical perspective, Paul McLaughlin relates anarchism to the fundamental ethical and political problem of authority. The book pays particular attention to the authority of the state and the anarchist rejection of all traditional claims made for the legitimacy of state authority, the author both explaining and defending the central tenets of the anarchist critique of the state. The founding works of anarchist thought, by Godwin, Proudhon and Stirner, are explored and anarchism is examined in its historical context, including the influence of such events as the Enlightenment and the French Revolution on anarchist thought. Finally, the major theoretical developments of anarchism from the late-nineteenth century to the present are summarized and evaluated. This book is both a highly readable account of the development of anarchist thinking and a lucid and well-reasoned defence of the anarchist philosophy. ASHAGTE NEW CRITICAL THINKING IN PHILOSOPHY The Ashgate New Critical Thinking in Philosophy series brings high quality research monograph publishing into focus for authors, the international library market, and student, academic and research readers. Headed by an international editorial advisory board of acclaimed scholars from across the philosophical spectrum, this monograph series presents cutting-edge research from established as well as exciting new authors in the field. Spanning the breadth of philosophy and related disciplinary and interdisciplinary
    [Show full text]
  • 1 Hearing of the Senate Select Committee On
    HEARING OF THE SENATE SELECT COMMITTEE ON INTELLIGENCE ANNUAL THREAT ASSESSMENT WITNESSES: JOHN D. NEGROPONTE, DIRECTOR OF NATIONAL INTELLIGENCE; GENERAL MICHAEL V. HAYDEN, DIRECTOR, CENTRAL INTELLIGENCE AGENCY; RANDALL M. FORT, ASSISTANT SECRETARY OF STATE FOR INTELLIGENCE AND RESEARCH, DEPARTMENT OF STATE; ROBERT S. MUELLER III, DIRECTOR, FEDERAL BUREAU OF INVESTIGATION; LIEUTENANT GENERAL MICHAEL D. MAPLES, DIRECTOR, DEFENSE INTELLIGENCE AGENCY CHAIRED BY: SENATOR JOHN D. ROCKEFELLER IV (D-WV) LOCATION: 216 HART SENATE OFFICE BUILDING, WASHINGTON, D.C. TIME: 2:49 P.M. EST DATE: THURSDAY, JANUARY 11, 2007 SEN. ROCKEFELLER: This hearing will come to order. In fact, this hearing is in order. And I welcome all of our witnesses in what is I think one of the most important public meetings of the year. This one will be open, and then we’ll have a closed one. And I think between the two we can get a lot accomplished. So today the Senate Select Committee on Intelligence embarks on an ambitious agenda of hearings and committee reviews that will restore meaningful congressional oversight of the activities of the United States intelligence community. I think it’s fitting that the committee’s first hearing of 2007 is on the worldwide threat. It’s important not only that the Congress but the American people understand that threats facing our country both inside our borders and abroad are significant. This is why the committee is conducting the session open. I am extremely concerned that the – and I’ll just be frank about it; this senator’s point of view – that the misguided policies of the administration have increased the threat facing our nation and hampered our ability to isolate and defeat al Qaeda and other terrorists that seek to strike against the United States.
    [Show full text]
  • The Anarchist Cookbook
    the anarchist cookbook Keith McHenry with Chaz Bufe See Sharp Press ◆ Tucson, Arizona Copyright © 2015 by Keith McHenry and Chaz Bufe. Introduction copyright © 2015 by Chris Hedges. All rights reserved. For information contact: See Sharp Press llc P.O. Box 1731 Tucson, AZ 85702 www.seesharppress.com The Anarchist cookbook / by Keith McHenry with Chaz Bufe – Tucson, Ariz.: See Sharp Press, 2015. 154 p. : ill. ; 28 cm. Includes bibliographical references and index. ISBN 978-1-937276-76-8 Contents: 1. Anarchism. 2. Cooking, American -- Recipes. 3. United States -- Economic conditions -- 21st century. 4. Food -- Political aspects. 5. Food relief. I. McHenry, Keith. II. Bufe, Charles. 320.57 Portions of this book previously appeared in somewhat different form in Hungry for Peace, by Keith McHenry, Provocations, by Chaz Bufe, The Complete Manual of Pirate RadioYou Can’t Blow Up a Social Relationship, by our favorite author, Anonymous. Contents Introduction (Chris Hedges) . i Its Author on the Original “Anarchist Cookbook” (William Powell) . v I. Anarchism 1. Anarchism: What It Is and What It Isn’t . .1 2. You Can’t Blow Up a Social Relationship: The Anarchist Case Against Terrorism . 7 3. Revolutionary Nonviolence . 19 4. Avoiding FBI Entrapment . 25 5. Anarchism vs. “Libertarianism” . 33 II. Recipes for Social Change 1. Common Approaches: What Works, What Doesn’t A. Boycotts and Divestment Campaigns . 39 B. Co-ops . 40 C. Education . 41 D. Labor Organizing . 42 a. Business Unions . 42 b. Revolutionary Unions . 43 c. Labor Tactics. 44 E. Occupations . 45 F. Sabotage . 46 G. Simple Living . 48 H. Street Demonstrations . 49 I.
    [Show full text]