100 Deadly Skills: The SEAL Operative's Guide To Eluding Pursuers, Evading Capture, And Surviving Any Dangerous Situation Situa

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 250 [warning: Documents this large are best viewed by clicking the View PDF Link!]

CLICKHERETOSIGNUP
orvisitusonlinetosignupat
eBookNews.SimonandSchuster.com
CONTENTS
ANotetoReaders
Epigraph
Introduction
PARTI:MISSIONPREP
001AnatomyofaViolentNomad
002CreateanEveryDayCarryKit
003BuildaVehicleBoltBag
004MakeaConcealableCompass
005BuildanImprovisedConcealableHolster
006ConcealEscapeTools
007ConstructaRectalConcealment
008UseImprovisedBodyArmor
009IdentifyEmergencyBallisticShields
010TheViolentNomadWorkout
PARTII:INFILTRATION
011CrossEnemyBordersbySea
012CrossEnemyBordersbyAir
013CrossEnemyBordersbyLand
014ConcealGearUsingCaches
015HookandClimbaTargetStructure
016ScaleaHighWall
017BlendintoAnyEnvironment
PARTIII:INFRASTRUCTUREDEVELOPMENT
018HotelSecurityandSafetyAwareness
019PreventaHotelRoomInvasion
020ConcealBelongingswithinLodging
021BuildaRoomHide
022StealaVehicle
023OperationalVehiclePrep
024EscapeandEvasionVehiclePrep
025BuildaVehicleHide
026StealaPlane
027MakeaWaterBottleSilencer
028TransformanUmbrellaintoaLeadPipe
029TurnaPenintoaWeapon
030UseaFishingWeightasanImprovisedSap
031MakeaFlexibleChainWeapon
032MakeaNewspaperNailBat
033DeployaRollofCoins
PARTIV:SURVEILLANCE
034DismountedSurveillance
035MobileSurveillance
036MakeanImprovisedInfraredLight
037MakeaTrackingDeviceforNightSurveillance
038DetectTamperingofPersonalEffects
039DetermineSurveillance
040DiscreetlyLoseSurveillance
041DetectTrackingDevices
042DeceiveSurveillanceCameras
PARTV:ACCESS
043CreateImprovisedLock-PickingTools
044PickaLock
045ClamaKey
046CloneaKey
047ImpressionaLock
048BypassaHotelRoomDoor
049SurreptitiouslyUnlatchDoorLocks
050DefeataPadlock
051CovertlyAccessLockedLuggage
052OpenaCarDoorwithaPieceofString
053DiscreetlyOpenGarageDoors
PARTVI:COLLECTION
054InstallanAudioDevice
055TurnaSpeakerintoaMicrophone
056ConstructandInstallaPinholeCamera
057MakeHomemadePlastic
058SendAnonymousEmails
059HideInformationinPlainSight
060HideandExtractDataUsingEverydayPhotos
PARTVII:OPERATIONALACTIONS
061DrawaConcealedPistol
062ShootfromaVehicle
063WinaKnifeFight
064StrikeforaKnockout
065DeliveraDevastatingElbowStrike
066MakeanImprovisedTaser
067MakeanImprovisedExplosiveDevice
068MakeaDiversionary“Flash”Device
069MakeaMolotovCocktail
070PITaTargetVehicle
071PistolDisarmament:PointedatChest
072PistolDisarmament:PointedatBack
073SurviveanActiveShooter
074MakeanImprovisedGasMask
075SurviveaGrenadeAttack
076WagePsychologicalWarfare
PARTVIII:SANITIZATION
077LeaveZeroDNABehind
078LeaveZeroFingerprintsBehind
079LeaveZeroDigitalTraceBehind
080TrickFacialRecognitionSoftware
081TrickFingerprintScanningSoftware
082CreateaHastyDisguise
083GetPastaGuardDog
084DiscreetlyClearaFloodedScubaMask
085DisposeofaBody
PARTIX:EXFILTRATIONANDESCAPE
086CreateaRappellingHarness
087EscapeaMultistoryBuilding
088SurviveaDrowningAttempt
089EscapefromanAutomobileTrunk
090DevelopaBug-OutRoute
091PerformaJ-turn
092PerformaReverse180
093SurviveVehicularImpact
094BreakThroughaTwo-CarBlock
095EscapeanAmbush
096SetUpProperPostureforEscape
097RepositionRestrainedHands
098DefeatHandcuffs
099DefeatZipTies
100DefeatDuctTape
TheFinalBLUF
Acknowledgments
AbouttheAuthor
Glossary
ResourcesandReferences
Index
ANotetoReaders
The skills described in the following pages are called “deadly” for a reason—and not just
because of the danger they pose to others. Developed by highly trained operatives who
regularly face life-threatening conditions, these skills push the limits of human endurance,
precision,andingenuity.
Andoften,theboundariesofthelaw.
The book you are holding in your hands (or reading on your device) contains actionable
informationadaptedfromtheworldof specialoperations.Muchofthatinformation,shared
herewithciviliansinthespiritofself-defense,istobeusedinonlythedirestemergencies.
When confronted with unexpected danger, in many cases the safest course of action is
escape.Inthefaceofanactiveshooter(seepage178),thefirstoption(ifconditionsallow)is
torun—andthelastistofight.Ifathiefwantsyourvaluables,handthemover.Iftheendof
theworldtrulydoescometopass...well,thenallbetsareoff.
The author and publisher disclaim any liability from any injury that may result from the
use, proper or improper, of the information contained in this book. The stated goal of this
bookisnottoenableadeadlyclassofcitizensbuttoentertainwhilesimultaneouslyimparting
abodyofknowledgethatmaycomeinhandyintheabsolutedirestofemergencies.
Bedeadlyinspirit,butnotinaction.Respecttherightsofothersandthelawsoftheland.
Our fate is determined by how far we are prepared to push ourselves to stay alive—the
decisions we make to survive. We must do whatever it takes to endure and make it through
alive.
—BEARGRYLLS
INTRODUCTION
Potential dangers lurk everywhere these days. Disasters strike in war-torn regions and far-
flung locations—but with alarming regularity, they also seem to inch closer and closer to
home.Spanningactsofterror,massshootings,andtheunseen(andsometimesvirtual)matrix
ofeverydaycrime,dangerrefusestobeconfinedtodarkalleys,unstablenations,ordistantzip
codes.
People tend to imagineworst-case scenariosinhighly colorfulterms,butchaos andcrime
aretherealapocalypticscenarios.Wepicturealiens,frozentundra,andintergalacticwarfare,
when in fact the catastrophic event we’ve been waiting for is more likely to look like a
mundane report of vandalism on last night’s news—or the massive Internet shutdown in
tomorrow’s headlines. Or, indeed, the violent criminal hiding in the shadows of a desolate
parking garage. In the face of true catastrophe, a basement full of canned peas and distilled
waterisn’tlikelytobemuchhelp.
Inafuturewhereeverystrangerposesapotentialthreat,knowingthepredatormindsetis
theonlysafehaven.Whatarethetricksusedbythestealthiest,mostdangeroushumanbeings
inourmidst?Howcanyouspotandavoidthe dangersthatsurroundus?Youcouldturnto
thecriminalclasstofindout.Oryoucouldgoonebetterbytakingapagefromsomeofthe
mosthighlytrainedspecialistsontheplanet.
The one hundred deadly skills you are about to encounter are adapted from the world of
special operations, a complex web of associations dominated by operatives with a shared
predilection for intrigue and danger. These elite, highly skilled warriors are charged with
riskingtheirlivesunderthemostchallenginganddireconditionsonearth.Asoperativeswho
routinelyinfiltratetheworld’smostdangerousandvolatileregions,theymustbeequalparts
spies,soldiers,andlawlessrule-breakers.
Theyareactionheroesformoderntimes,one-partJamesBond,theotherRambo.Somecall
thesehighlyskilledoperatives“ViolentNomads,”asanodtotheirdisregardforinternational
bordersandtheirbiasforswift,brutalaction.
Many of the techniques that make up the Violent Nomad body of knowledge cannot be
divulged without severe risk to public safety, but a great deal of potentially lifesaving
information can still be shared. Each skill is broken down into its most critical parts, or
CoursesofAction(COAs),andsummedupbyaBLUF(BottomLineUpFront),whichspells
out the key takeaway from the operative’s perspective; Civilian BLUFs flip the skills around
andoutlinepreventive measurescivilians cantaketoarm themselvesagainstpredatorsusing
theseparticulartechniques.
AsaretiredNavySEALwhospentseveralyearsinsidetheNSA(NationalSecurityAgency),
inwritingthisbookIdrewonanunusualbreadthofexperiencethatspanstwentyyearsspent
running special ops all over the world, both in teams and alone, and merges lessons learned
from both combat and surveillance. The skills in this book represent a potential path to
survivalinthefaceofanynumberofdangeroussituations,fromeludingpursuersandescaping
abduction to self-defense. And they may even provide a blueprint for getting through
doomsday.
Theworldisn’t gettinganysafer,but youcan be prepared.Whetheryou’refacedwithan
alieninvasionoranassailantwieldingaseeminglyinnocuousitemsuchasawaterbottleIor
anumbrella,learninghowtothinklikeaViolentNomadwillradicallyimproveyourchances
ofcomingoutontop.
I.Turntopage70ifyou’reinterestedindevelopinganirrationalfearofwaterbottles.
PARTI
MISSIONPREP
001 AnatomyofaViolentNomad
Beyondthedefensivepotentialcommontomanyoftheskillsinthisbook,thereismuchthe
average civilian can learn from an operative’s mindset. First and foremost, that mindset is
defined by preparedness and awareness. Whether in home territory or under deepest cover,
operativesarecontinuallyscanningthegenerallandscapeforthreatsevenwhenthey’renoton
the clock. Civilians, too, can train their minds toward habits such as scouting exit routes in
crowded restaurants or building spur-of-the-moment escape plans. This kind of vigilance
allowsanoperativeconfrontedwithsuddendangertotakeimmediateaction.
Whetherheiscrossingborders,executingsurveillance,oreliminatingdangeroustargetsand
disappearingwithoutatrace,theclandestineoperativefrequentlyworksalone.Giventhathe
sooftenfindshimselfbehindenemylineswithoutreinforcements,anoperative’scombatand
counterintelligenceskillsaremetbyanequallysophisticatedaptitudeforriskassessmentand
analysis. In an increasingly dangerous world, civilians who are attuned to potential risk
(particularly but not exclusively when traveling) will be many steps ahead of the general
populace.
••
Theoperativealsodemonstratesabaselinepredispositiontowardanonymity.Eachclandestine
operative is trained to “go black,” operating for extended periods of time with limited
communication to associates. While operating under the radar, he may assume the outward
appearance of a student, a businessperson, or a traveler, as he understands that terrorist
groups or host-nation governments may be targeting him during his travels—and that if
perceived as a spy and arrested, he will be subject to detention and harsh interrogations.
Additionally, as a traveler, he is vulnerable to the risks of petty crime and kidnapping that
applytoanyciviliantravelingabroad.Tocountersuchrisks,theoperativeadoptsasneutral
anappearanceaspossible.ThegeneralruleisthelessconspicuoustheNomad,thesafer.
Due tothehighly covertnatureoftheirmissions,operativesgotogreatlengthstoensure
that they blend into their surroundings. A carefully managed appearance allows them to
operateundetectedbypotentialwitnessesaswellashost-countrypoliceandsecurityservices.
But beyond their unremarkability, clothing and gear must have the capability to conceal the
equipmentrequiredforanoperationoranescape.(Thewaistbandandcuffsofpantsandthe
tonguesofshoes,forexample,areidealhidingplacesforhandcuffkeysandrazorblades.)
OperativesfavorbrandssuchasPanerai,whicharedurableandwellmadebutstillhavea
civilian-friendlylook.Always readytorunorfight, theywear closed-toedshoes withKevlar
laces and conceal weapons and spread escape equipment throughout their clothing. Lighters
andcigarettesarealwayscarried,evenbynonsmokers,astheymaybeusedasatoolofescape
or to create a distraction or diversion. (See pages86,166, and168.) LED flashlights are
essentialforseeinginthedarkorsignalingforhelp.
••
When it comes to gear, preparedness doesnt look quite the way moviegoers have come to
expect. Because clandestine operatives cannot board commercial flights with concealed
weaponsorhigh-techspygeartuckedawayintheirluggage,theyfavora“no-tech”or“low-
tech”approach that is highly dependent on improvisation. Though fictional spies employ all
manner of shiny, complex contraptions, in the real world, every high-tech toy increases an
operative’s risk of detention or arrest. Hence, operatives learn to adapt, improvise, and
overcome technical obstacles using tools and technology that are readily available in the
country of operation. One example: Every hotel room has a Bible or a Koran stashed in a
bedsidedrawer—andtapingacoupleofthosetogetheryieldsasetofimprovisedbodyarmor
thatprovidessignificantprotectionagainstprojectiles.
Thoughlow-techdoesntusuallyextendtoanoperative’scommunications,hetakesahighly
cautious approach to cybersecurity. The operative avoids leaving behind trails of digital
breadcrumbs at all costs, understanding that any cybercommunication is fundamentally
insecure. In an age where savings accounts and the locations of friends and family are
vulnerabletoanythirdpartywithaccesstoaWi-Ficonnectionandthewilltodoharm,there
isnosuchthingasasurfeitofprecaution.
Civilian BLUF: Particularly when traveling, civilians are well served by adopting the
operative’s predilection for anonymity. Choose clothing and accessories for usefulness and
generalneutrality.Inavolatileurbancrisis,brightcolorsandeye-catchinglogoscanbecome
convenientaimingpointsforapairofriflesights.
002 CreateanEveryDayCarryKit
Whiletheaveragecivilianapproachesemergencypreparednessfromalife-supportperspective
thatprioritizesfoodandwatersupplies(stasheddeepinahomebasement)totheexclusionof
weapons and escapetools, true preparednessacknowledgesand confrontstheviolenceofthe
modern world. To ensure a state of constant preparedness, the Violent Nomad carries up to
threetypesofEveryDayCarry(EDC)kits,eachdesignedtosupporthismissionandhelphim
evade crisis. Whether the call comes or not, the EDC kits also provide an edge against
unexpectedthreatsofallsorts,fromenvironmentaldisasterstoterroriststrikesandlone-wolf
attacks.
When traveling through potentially hostile territory or during turbulent times, a Nomad
willdistributeseverallayersoflife-supportandpersonal-safetyitemsthroughouthisclothing
andouterwear;intheeventthatheisstrippedofhisprimaryweapon,thispracticemayleave
himwithseveralundetectedoptionsoflastresort.Escapegearinparticularshouldbespread
outinsuchawaythatsomeofitremainsavailableiftheNomadisrestrained.
Themostbasickit,the“pocketkit,”shouldbecomprisedofessentialweapons,escapeand
evasion equipment, and one “black” (covert) mobile phone. Rather than being consolidated
intoasinglecontainerorconcealment,theseitemsshouldbedistributedthroughoutclothing.
Ahandgunshouldbeconcealedinawaistbandholster,forthemostaccessibledraw.(Seepage
152fortipsondrawingaholsteredweapon.)Anemergencycommunicationdeviceisessential,
butothercontentswillvarydependingontheterrain.AstainlesssteelZebrapencanbeused
to leave notes for potential rescuers—or to strike an assailant. In the case of abduction or
detention,ahandcuffkeyandLEDlightcamouflagedalongsidecarorhotelkeysarepotential
lifesavers;asbackupintheeventthatclothespocketsaresearched,aconcealablehandcuffkey
canbehiddeninashirtcufforonazipperpull.Someoperativescarrymouthpieces,whichcan
bevitalduringhand-to-handcombat.
The “container kit”—generally tucked into a jacket or an operational bag (see below)—
functions as backup in the event that an operative is stripped of his primary weapon and/or
operational bag. This highly condensed kit contains small improvised weapons (loose coins
tiedupinahandkerchief)andnavigationalaids(aheadlampandahandheldGPSdevice)that
changedependingontheenvironment,aswellaslock-pickingtoolsthatcouldprovideaccess
to information, food, or shelter. Purchased within the area of operation, a set of “recci”
(reconnaissance)keyblanksprovidesanadvantageinbreaking-and-enteringscenarios.Durable
andreliablydiscreet,arigidsunglasscaseistheoptimalcontainerforthiskit.
Thefinalpieceofthepuzzleistheoperationalbag.Toprepareforthepossibilityofescape
inthefaceofsurveillanceorattack,itscontentsshouldincludeanemptycollapsiblebackpack
andachangeofclothesincolorsoppositefromtheonestheoperativeiswearing.Evenshoes
should be taken into consideration—if wearing sneakers, pack a pair of rubber sandals. A
concealed pocket holds highly sensitive data on memory devices such as thumb drives or SD
cards,aKevlarclipboardactsasaninnocuous-lookingformofimprovisedballisticarmor,and
awadofcashallowstheNomadtosubsistindeepcoverforaslongasthesituationdemands.
RelatedSkills: Build a Vehicle Bolt Bag, page 10; Create a Hasty Disguise,page 200; Use
ImprovisedBodyArmor,page20;IdentifyEmergencyBallisticShields,page22.
003 BuildaVehicleBoltBag
Operatives don’t have the luxury of being able to return to base to stock up on food or
ammunition, so their effectiveness as free-range agents is built around preparation—and
preparation means always being prepared for the worst. When an operative is conducting a
missionabroad,oneofthefirstordersofbusinessuponbeingcalledintoactionisbuildinga
bolt bag. In the case of emergency, this bag (also known as a “bug-out kit”) becomes an
essentiallife-supportsystem.Itcontainseverythingneededtokeeptheoperativealive,should
he have to “go black,” hiding out of sight until he can either resume his mission or make
arrangementstosafelyexittheareaofoperation.
Aboltbagtypicallyconsistsofadayortwooflifesupport—water,food,cash,emergency
medicalsupplies,navigationaids,anda“black”orcovertphonesimilartothetypeknownin
the criminal world as a “burner.” The bag should be stashed in the operational vehicle,
concealedina spot thatis easilyaccessiblefrom thedriver’s seat,suchasthecenterconsole
compartment(betweentheseats)orundertheseat.(Shouldtheoperativefindhimselfupside
downastheresultofacollisionwithaggressors,thekitshouldbewithinarmsreach.)Asits
name implies, the bolt bag needs to be light enough to be carried—canned foods and other
heavysuppliesdonotlendthemselvestoeaseoftransport.
CivilianBLUF:Inday-to-daylife,boltbagscanbeusedasprecautionarydisastermeasures
notonlybycivilianslivinginregionsathighriskfornaturaldisasters,butbyanyonealertto
thethreatofurbandisastersorterrorism.
004 MakeaConcealableCompass
Covert situationsoftencallforeasilyconcealable,dependable low-fialternatives—andinthe
caseofacompass,asimplepairofmagnetsfitsthebill.Anoperativemayhavebeenstripped
ofhisGPSdeviceuponcaptureormaybeworkinginacontextinwhichtheuseofahandheld
GPSsystemwouldattracttoomuchnotice.AconcealablecompassensuresthattheNomadis
alwaysabletoeffectivelynavigatethroughunknownterritory,nomatterhowremote.
Thoughmicrocompassesmaybefoundatanyadventurestoreinthedevelopedworld,they
may not be available elsewhere. Improvised compasses, on the other hand, are easy to make
usingresourcesreadilyavailableinmostcountries.Thetoolworksbyharnessingthepowerof
rare-earthmagnets,thebaselinemechanismusedtopowercompasses.Tunedtothedialofthe
earth’smagneticfield,whenconnectedandallowedtodanglefromalengthofthread,therods
becomeanaturalcompass;onepointssouth,theothernorth.
Becausethepurchaseofrare-earthmagnetscanarousesuspicion,itisadvisabletoseekout
lessalertingproductssuchasrefrigeratormagnets,whiteboardmagnets,ormagnetichandbag
closures, always in pairs. Any improvisations must be tested thoroughly, lest the Nomad be
confrontedwithaninaccurateimprovisedtoolmid-escape.
CivilianBLUF: The standard instructions for building a compass (see illustration) involve a
pairofrare-earthrodmagnetsandalengthofKevlarthread(chosenforitsdurability),buta
similareffectmaybeachievedbypiercingamagnetizedneedlethroughacorkandfloatingthe
deviceinwater.
005 BuildanImprovisedConcealableHolster
Operativesarewellversedinusingundergroundchannelstoacquireweaponswithinthearea
ofoperation,asgunsandothermunitionscannotbetransportedacrossinternationalborders
without permission from both the country of origin and the destination country. But
specialized equipment such as concealable holsters are often harder to come by, and any
attempttosmuggletheminwouldcertainlygetaNomadpulledintoanunwanteddetainment
atcustoms.
Inordertomaintainalowprofile,operativesgenerallytravelaslightlyaspossible,utilizing
off-the-shelf resources to fulfill their mission requirements. This predisposition toward
minimalism presents challenges but does not tend to leave operatives in a disadvantaged
position, as many improvised tools—the holster included—provide a better capability than
manufacturedversions.
Commercially available holsters tend to make concealment difficult. Bulky and inflexible,
they increase the overall signature of the weapon in an operative’s waistline and can make
extraction a challenge. A pistol that cannot be quickly and seamlessly removed from an
operative’s holster becomes a deadly liability, so the choice of holster is crucial. This
improvisedmodel,madeofwirehangerandtape,contributesvirtuallynoadditionalbulkand
ensuresaquickandglitch-freedraw.
RelatedSkills:DrawaConcealedPistol,page152.
006 ConcealEscapeTools
Thepossibilityofbeingcaptured,kidnapped,ortakenhostageexistsforalltravelers,butit’s
onethat’sespeciallyrealforoperativeswhocannotrelyuponbeingbailedoutbytheirhome-
nationgovernments.
If captured, operatives can expect to be immediately frisked for concealed weapons, at
whichpointtheyarelikelytohavemostoftheirgearconfiscatedbytheircaptors.Escapeaids
concealedinclothingmayremainundetectedforawhile,butoperativesknowthatiftheyare
incaptivitylongenough,they willeventuallybestrippednakedandhavetorelysolely upon
the escape tools they’ve concealed on and inside their bodies. Given a lack of institutional
backup, self-escape preparations are an essential component of a Nomad’s every operational
plan.
Ahumanaversiontobloodybandagesmeanscaptorsareunlikelytocloselyexaminelesions
or scars, so a Nomad can utilize medical adhesive to glue specific tools onto the body
underneathmanufacturedwounds.
Thereisalsoanear-universalreluctanceonthepartofcaptorsforfrisking,pattingdown,
or probing the nether regions of their detainees—and this unease provides operatives with
exploitableopportunitiesforconcealmentofescapetoolsinaxilla(armpit)hairorpubichair.
Body concealments can be as elaborate as suppositories placed in the penis (urethra and
foreskin), vagina, or rectum or in the nostrils, ears, mouth, and navel. And they can be as
simpleasbarelyperceptiblecondoms.Note:Thisadvantagecanworktoa Nomad’sbenefit,
butdiminishesquicklyasheorsheistransferredtoincreasinglyhigherlevelsofdetentionand
security.
RelatedSkills:ConstructaRectalConcealment,page18.
007 ConstructaRectalConcealment
When a mission involves a high potential for capture, operatives prepare for the possibility
that they will be detained, searched, and stripped of any visible weapons. This leaves the
operative only one method of recourse: the concealment of weapons and escape tools in his
bodilycavities.Navigationaids,money,escapetools,andevenmakeshiftweaponssuchasan
improvisedicepick(seeillustration)canbeconcealedinsideatamponapplicatororaluminum
cigartubethatisinsertedintotheanalcavity.
Theuseoftherectalpassageasahidingplaceforillegalitemsorweaponsiscommoninthe
shadow worlds of drug trafficking and terrorism. But the technique is also well known to
operatives as an extreme measure of self-preservation used during ground zero of high-risk
missions.
Such a concealment is surprisingly immune to high-tech methods of detection. Full-body
scanners bounce electromagnetic waves off the body in search of metallic objects and other
contraband.Whiletheirlow-frequencyradarcandetectweaponsthatprotrudefromthebody,
itcannotseethroughskinorbone.EvenX-raymachinesdon’tdoaverygoodjobofrendering
items camouflaged in tissue, and MRI machines used in medical contexts would render a
concealmentasashadowthat,givenitslocation,couldbemistakenforfecalmatter.
Note:Anyimprovisedcontainersmustbewaterproof,nontoxic,smooth,andsealedontheir
upperend.
008 UseImprovisedBodyArmor
Whether engaging armed targets or caught in the crossfire of social unrest, operatives
frequentlyfindthemselvesinneedofbodyarmor.Government-issuedarmorprovidesthebest
protectionagainstinjury—butbecauseofitstraceability,operativesoncovertmissionsarenot
authorized to use it. To survive, they must learn to create improvised body armor using
everydayitemsandmaterials.
When taped tightly together in units of two, hardcover books such as encyclopedias and
dictionaries become rigid bundles or “plates” that can dissipate the energy of a projectile.
Taping commonly available ceramic tiles to the outer facing of each plate provides an
additionallayerofprotection,andtheresultingarmorcanbeconcealedbyajacketorcoator
easilycarriedinamessengerbagorbackpack.
Plates should be suspended on the front and back of the torso in order to protect “center
mass”—thespineandvitalorganssuchasheartandlungs.
Another layer ofprotectioncanbeachievedviaa commerciallyavailableKevlarclipboard
rated to stop 9mm pistol bullets. Lightweight and portable, once painted with a flat brown
painttheclipboardisnon-alertingandwillpassscrutinyifexaminedatabordercrossingor
airport.
Improvisedarmormustbethickenoughtosloworstopaprojectileandthinenoughtobe
wearable.Dependingonavailablematerials,ViolentNomadsmaybeabletocreateimprovised
armorthickenoughtostopaprojectile.Pistolroundstravelmoreslowly(9mmprojectileat
1,100feetpersecond);fasterriflerounds(5.56mmprojectileatapproximately3,000feetper
second) require more protective material. But an operative never quite knows what he will
encounter,andsotendstobuildfortheworst-casescenario.
009 IdentifyEmergencyBallisticShields
Whenbulletsareflying,theoddsofsurvivalaredeterminedbysplit-seconddecisions.Whether
thosedecisionsareeducatedones,ratherthanunconsciousmovesmadeintheclutchesoffight
orflight,canmeanthedifferencebetweensafetyandseriousinjuryordeath.
Theinstincttorunforcoverisuniversal,butitmustbecoupledwithanunderstandingof
the relationship between ballistics and everyday materials. Dense wood, concrete, steel, and
granite are the preferred materials in the face of open fire—these thick, heavy materials can
stop bullets and save lives. Sheetrock walls may offer concealment—thus diminishing a
shooter’saccuracy—andgivetheappearanceofsolidity,buttheywillnotstopbullets.Evena
small.22-caliberpistolcanripthroughdrywall.Concreteorsteelcolumns,ontheotherhand,
providebetterballisticprotection,despitetheirrelativelackofcoverage.
In cases of emergency, these principles can be applied to many of the objects in civilian
environments. Granite-top tables, concrete planters, and steel appliances all fit the bill.
Countertops, desks, and tables in hotel rooms are frequently made of granite or steel. But
someeverydayobjectsappearsolidyetaremadeoutoflightweightmaterialsthatwon’thold
uptogunfire.Mailboxesandtrashcansaregenerallymadeoutofaluminum.Hulkingvending
machines are mostly comprised of glass and plastic. Cars are partially made of steel, but a
steelsolightweightthatitfailstoofferadequateprotection;intheabsenceofotheroptions,
hidingbehindtheenginesideofthecar,ratherthantheemptytrunk,putsanadditionallayer
ofdensematerialsbetweenanoperativeorcivilianandtheshooter.
RelatedSkills:UseImprovisedBodyArmor,page20;SurviveanActiveShooter,page178.
010 TheViolentNomadWorkout
No strangers to ruthless obstacle courses and drills that combine sleep deprivation and live
explosives to simulate the hardships of real-world combat, operatives are trained under the
toughest conditions on earth. Once past basic training, they remain combat-ready by
incorporatingthe“RunFightRun”formulaintotheirworkouts.
Repeatedlyliftingapairofdumbbellsdoesn’ttranslateintoanabilitytodefeatanassailant
in hand-to-hand combat after an arduous chase over rugged terrain—so Violent Nomad
training prizes real-world combat and self-defense techniques over muscle-building reps.
Traditionalstrength-buildingandcardiovascularexerciseshavetheirplace,butintegratingthe
RunFightRunphilosophyintoworkoutroutinesbuildstheendurancetooutlastanopponent
inafightand/orchase.
Consistingofintegratedrepetitivestrikingmovementsstackedwithsprints,RunFightRun
workoutsdonotrequireagymoranysophisticatedequipment.Allthat’sneededisaplaceto
sprint and an object to carry and strike, preferably a heavy punching bag; designed for
striking,itisversatileenoughtobeusedforsquats,deadlifts,carrying,andpresses.Aheavy
bagcanalsobethrownandstruckontheground,whichiswheremostfightsendup.
Civilian BLUF: Use the heavy bag to perform a mix of exercises, with sprints integrated
between reps. Increase duration and weight as needed to ramp up intensity over time. A
worthy conditioning goal is to be able to perform three sets of striking for three minutes
straightandthensprintforonemileinsevenminutesorless.
PARTII
INFILTRATION:ACCESSTOENEMY
TERRITORY
011 CrossEnemyBordersbySea
As smugglers and refugees the world over well know, maritime borders in even the most
securecountriestendtodisplayhighdegreesofporosity.Foranoperativebent ondiscretion
andstealth,intherightkindoflandscapehelocastingbecomesapreferentialmethodofentry.
Droppingfromaslow-movinghelicopterintofrigidwatersisahigh-level,dangerousskill.
Even while hovering, helicopters can create hurricanelike winds that result in blinding mists
andskin-stingingwaterblasts.Practiceis essential,andleapingoutof a helicopterintodark
seasrequiresproperaltitudeandsafeforwardspeed.Onlybyfollowingspecificprotocolscan
operatives survive the jump. At an altitude of twenty feet, the helicopter’s forward speed
shouldnotexceedtenknots;atanaltitudeoftenfeet,forwardspeedshouldnotexceedtwenty
knots.Thisisknownasthe“10for20,20for10”rule.
Correctbodypositioning(seediagram)preventsinjuryandensuresthattheforceofimpact
hits the divingfins(ratherthanany protruding bodyparts)anddoes not dislodge thediving
mask.Althoughthejumpprohibitstheuseofheavy-dutydivingequipment,awetsuit,amask
orgoggles,fins,andaninflatablelifejacketareessential.Allothergearmustbestowedina
waterproof backpack or “dry bag” and strapped onto the operative with lanyards so as to
prevent its being lost to the depth of the ocean. Its contents should include mission-specific
gear such as a change of clothes that will allow the operative to blend into the area of
operation and an additional weapon, along with a hand shovel. The operative’s primary
weapon, an MP7 submachine gun, should be loaded and carried bolt forward; a condom
stretchedoveritsmuzzlepreventswaterfromenteringthebarrelbutwon’timpedeabullet’s
exitpath.
The dry bag is slung over one shoulder so it can easily be shed if the operative runs into
difficulties in the water. Strapping a bag on too securely could impede the operative’s
swimmingstrokeandposeariskofdrowning.
To swim to shore, operatives use the combat recovery stroke, a side stroke with a
minimizedprofileinwhichthearmsdon’texitthewater.Onceoutofthewater,theychange
intodryclothesandusethehandshoveltocachetheirgear.
012 CrossEnemyBordersbyAir
Formostcivilians,illegalbordercrossingsconjureuptunnelsdugdeepunderground,passage
fees paid to shadowy guides, and caravan rides to distant way stations. But for Violent
Nomads, border crossings are solitary affairs best accomplished via a territory’s most
unmonitored,unguardedspaces:bysea(page28),byland(page34),orbyair.Whenexecuted
inacountry’sdesolatecornersandundercoverofdarkness,suchinfiltrationscanbeentirely
undetectable.
For trained operatives, an infiltration by air is built on a two-pronged approach:
appropriationofanunmannedprivateplane(page66)anddescentviawingsuitandparachute.
Global laws dictate that maritime airspace reverts to international rule within twelve
nautical miles of any country’s coastline—and that guideline should inform any attempt at
infiltration.Oncewithinenemyairspace,theaircraftmust“goblack,”itstransponder,radios,
andlightsshutoffinordertoavoidalertingenemyair-trafficcontroltowerstoitspresence.
Acombinationofairglidingandparachutingfromtheplanedownontoruralterrainoffers
the quietest and least visible means of entry. Once a landing point has been identified,
calculating the jump point involves a universal equation: When jumping from a moving
aircraftinawingsuitmadeoutofanonporousnylon,everytwoandahalffeetdroppedmeans
a simultaneous gain of one foot of forward glide, more if going downwind. Such a suit
essentiallyturnsanoperativeintoahumankite,allowinghimtousehislegsandarmstosteer
likeanaircraft.Parachutingisaslow-movingandmuchmorevisibleproposition,soaNomad
shouldwaituntilthelastpossibleminutetoactivatehischute.
Onceonground,thenylonwingsuitandparachutecanbemeltedintoahandfulofglasslike
beads.
013 CrossEnemyBordersbyLand
Every nation displays some weaknesses along its borders, particularly in its uninhabited
spaces,andoperativesalwaysseektoexploitthesevulnerabilities.Butthewildertheterrain,
themorechallengingitwillbetocross.Aseasonedoperativecrossingenemybordersonfoot
might spend days or weeks trekking alone through scorching deserts, freezing mountaintops,
anddense jungle asheslowlywendshiswaytowardthe areaofoperation.Despitethepace
andphysicalchallengesofsuchanapproach,themostdifficultrouteislikelytobethemost
desirable one—for the more rugged the terrain, the freer it will be from scrutiny and
surveillance. If airspace is heavily guarded, infiltration on land may also be the operative’s
onlyrecourse.
GearandTransportation: Almost inevitably, a portion of the journey will occur on foot,
buttheidealscenariowillallowtheoperativetoclockafairnumberofmilesonanoff-road
motorbike with the horsepower to carry a two- to three-hundred-pound load and the
durability to take on extremely uneven terrain. In many parts of the world, motorcycles are
more common than cars, so acquiring or stealing a bike from a neighboring country is well
withintheoperative’sgrasp.
In addition to his EDC kit and bolt bag (pages 6 and10), the operative will be carrying
enough fuel, food, and water to last the trip and the clothing and gear needed in order to
disguise himself once he crosses the border; even if the operative is able to forgo drinking
waterbecausewatersourcesarecommonthroughouttheterrain,hismissionsupplieswillbe
extensive. Each phase of the infiltration will also require a unique set of tools and weather-
appropriategear.
Shelter: Though operatives are trained to survive extreme levels of sleep deprivation, an
infiltrationstretchingoverseveraldaysorlongernecessitatesreststops.
Improvised shelters are usually preferred. Unlike nylon tents, shelters built from found
materials such as branches or compacted snow blend into their environments and act as
camouflage. In snow-covered landscapes, igloo-like shelters can be constructed out of
compacted blocks of snow. Despite their temperature, these blocks act as nonporous shields
that effectively shut out exterior weather while sealing in heat, allowing operatives to warm
theshelterwiththeirownbodyheatandtheadditionofalitcandleortwo.Oncetheslabsof
snowareplacedbackintothesnowbank,exposuretoafewhoursofsun,rain,orsnowtakes
careofcoveringtheoperative’stracks.
Navigation: When the terrain dictates that operatives proceed on foot, the most grueling
portion of the multiphase infiltration process has begun. Operatives may walk for days in
extremeweatherconditionstoreachtheirdestination.(Infact,poorweatherconditionsmay
be optimal as a means of erasing the operative’s footprints.) And they must be prepared to
navigateusingonlyacompassandamapintheeventthattheirGPSdevicefails.
Thisprovesmucheasierinmountainousareasorseascapes,wheremountaintopsandother
topographical landmarks provide reference points for orientation. In undifferentiated desert
environmentsthatstretchoutforhundredsofmiles,theriskofstrayingfaroffcourseoreven
walkingincirclesissignificant.
In such instances, pace counting—the practice of counting every other step as a gauge of
distance—canbealifesavingtechnique.Asingleadultstepspansapproximatelyonemeter,so
onehundreddouble-stepsadduptoapproximatelytwohundredmeters.Keepingtrackcanbe
an effective barometer of distance in an environment with few other means of assessing
progress.
Untraceability:Operativesgenerallytravelundercoverofnight, sleepingfor shortstretches
duringdaylighthoursandtimingtheirnightmovementstolunarcycleswhentheycan.Ahalf-
moonoffersalevelofvisibilitythatisparticularlywelcomeonroughterrain,whilefullmoons
may render the operative too visible. Night travel is significantly slower than daytime
movementsbutinvolvesfewerrisksthantravelinginbroaddaylight.
Operatives also plan their routes through terrain that makes detection difficult and take
precautions to avoid leaving clues behind. They urinate off-route, in bodies of water if
possible,andpackandcarrytheirfecalmatter.Whereterrainpermits,theyavoidsoil,sand,
and mud and walk on nonprinting surfaces such as rocks, roots, grass, leaves, and bark.
Footprints are unavoidable, but operatives try to break up a consistent trail anytime the
environmentpermits.
014 ConcealGearUsingCaches
AViolentNomad’smissioniscompleteonlyoncehehassuccessfullyvanishedfromthearea
ofoperation—soheneverundertakesaninfiltrationwithoutawell-plannedexitstrategythat
accounts for all of his post-mission needs. Traveling light is crucial, so particularly when
crossingintoremoteterritoryonfoot,theNomadwillseparatehisgearandsuppliesintotwo
categories:itemsneededforthefirstlegofhisjourney,anditemsneededpost-missionand/or
foremergencyexfiltration.Designedtosupportsurvivalontherun,hissecondarycachewill
storeawell-thought-outresupplyoffood,fuel,communicationdevices,money,andweapons,
hiddenawayonapreplannedrouteoutoftown.
Operationalgearreservedforfutureusecanbecachedviaavarietyofmethods.Protected
fromtheelementsbybeingpackedintodurablecontainerssuchaswaterbottlesorlengthsof
PVCpipe,itcanbeconcealedanywherefromcavestohollowed-outtreetrunkstothebottoms
oflakes.Themoreremotethecachesitethebetter,asthelastthingaNomadwantstodois
recover a cache that has been booby-trapped or put under surveillance. Burying operational
gearwelloutofsightreducestheoddsofaccidentaldiscovery.MarkingitslocationonaGPS
deviceenablestheNomadtorecoverhisgearintheabsenceofvisiblelandmarks.
015 HookandClimbaTargetStructure
Nomadsfrequentlygainaccesstomulti-occupancytargetbuildingsbystrollingintounlocked
lobbiesorpickingrudimentarycommerciallocks(seepage110)onbackdoors.Butinhighly
secured buildings monitored by camera and/or roving patrol, access through front or back
doorsmaynotbenegotiable.
Fortunately,anybuildingwitharowofbalconiesalongitsbacksidepresentsasecondary
option:scalingtheexteriorofthebuildingfrombalconytobalcony.Usingapainter’spole,an
extra-longlengthoftubularnylonorrope,andahook,aNomadcanconstructalightweight
ladder system that will safely hold his body weight—enabling him to perform the simple
“hookandclimb”techniqueusedforcenturiesbypiratesstealingontoenemyships.
Tyingaseriesoffrostknotsintoadoubled-overlengthoftubularnylon(itsbitterendstied
togetherwithanoverhandknot)yieldsadurablestepladder(seediagram);thelineshouldbe
more than twice the length of the target structure’s height. After a heavyweight metal
household hook is inserted into a painter’s pole and tied or snapped onto the ladder, the
apparatus can be hooked onto an upper structure durable enough to hold the operative’s
weight. He then climbs from one floor to the next and repeats the process until the target
destinationisreached.
Evenwhenperformedlateatnight,thismethodoflastresortcomeswithahighpossibility
ofexposure.Butbecausesecuritycamerastypicallyarentsetuptocatchpeopleclimbinginto
abuilding,inahigh-securitycontextitmaystillbethebestoptionforaNomadlookingtoact
with stealth. Building owners seldom set up cameras beyond the first floor—and train those
they do install toward doorways, on the assumption that any invaders will be coming in
throughthegroundfloor.
016 ScaleaHighWall
While a smooth building facade or high wall may not offer an operative the convenience of
climbing from balcony to balcony (see page 40), the use of a one-way friction knot makes
infiltrationviaropeordrainpipeeminentlyfeasible—solongastheclimbingropeistautand
securelyanchoredatbothtopandbottomends.
Asafetyknotusedbyrockclimbersasaformoflifesavingbackup,thePrusikknotistied
in such a way that it can move only up a rope or line; downward pressure causes it to lock
into place. Tied to a climber’s harness, the knot can provide a fail-safe that may catch the
climberintheeventthatotherdevicesfail.Inaninfiltrationorescapescenario,theknotcan
beexploitedforitsabilitytoslideupaline,lockingintoplacewhenitreceivestheoperative’s
bodyweight.
To tie a Prusik knot, first tie a shoelace or an equivalent length of small-gauge nylon or
parachutecordintoaloopusingasquareknot(seepage43).Then,wrapthecordaroundthe
climbing rope or drainpipe and loop the cord through itself (see diagram). Pass the cord
throughtheresultinglooptwicemore.Pulltightly.
Ideally,tiefourPrusikknotstouseashand-andfootholds,aswhenshimmyinguptheline.
Intheeventthatsuppliesarelimited(ifusingshoelacesinthecaseofescape),twoknotsare
enoughtotogglefromasinglehandholdtoasinglefoothold.
If shimmying up a drainpipe, it will be necessary to untie and retie knots around support
brackets.Tosavetime,bringextrapre-loopedcord.
017 BlendintoAnyEnvironment
Whenfittingintoaparticularregion,aNomadworksthroughanenvironmentalchecklist,the
first dimension of which is personal. How do his look and manner stack up to the
environment?Travelerswholookandactlikefishoutofwaterareprimetargetsforcriminals
of all stripes, and operatives who make themselves conspicuous are prime candidates for
discovery.
The secondary dimension of this process is cultivating cultural awareness, which means
constantly weighing actions and preferences against the prevailing cultural context. If the
general population forgoes ketchup on their sandwiches or ice in their drinks, the operative
willfollowsuit.
Nextissituationalawareness,meaningtheoperativecontinuallyscanshisenvironmentfor
potentialdangers,playingoutworst-casescenariosinordertoidentifywhichactionstotake
beforecrisisstrikes.Withinthirtysecondsofhavingenteredarestaurant,hehascanvassedall
exitsandspottedanypotentialimprovisedweaponsinthevicinity.Hehasalsoidentifiedhis
“invisible thresholds,” the imaginary lines whose crossing will spur him into swift, decisive
action.If he spotsan armed guard carryinganautomaticweapon, hewillquickly determine
his“threshold”forescapeordefensiveaction—i.e.,shouldtheguardlookhiswayrepeatedly,
hewillduckoutthebackdoor.
The final dimension of total awareness isthird-party awareness. The operative is always
keenly aware of anyone who might be watching him—whether he’s operating in another
country or using the Internet, his goal is to remain undetected by third parties such as law
enforcementofficials,citizens,criminals,andevenhackers.
PARTIII
INFRASTRUCTUREDEVELOPMENT:
LODGING,TRANSPORTATION,WEAPONS
018 HotelSecurityandSafetyAwareness
Hotelroomsarenotoriouslyunsecurelocations.Especiallyindevelopingnations,eventrusted,
name-brand properties can be susceptible to graft and surveillance—some of it officially
sanctioned. In an era of global uncertainty, aggressive governments go to great lengths to
collectintelligenceonWesterners, whether theybehigh-rankingdiplomatsorrun-of-the-mill
businesspeople.Manytravelblindinthefaceoftheseinvisiblethreats,assumingtheyaresafe
when tucked away in their hotel rooms or rental cars. But any property controlled by an
unknownentityisvulnerabletoamultitudeofthreats.
Some hotels will actually place Westerners in rooms that are wired for surveillance. One
waytothwarttheireffortsistochangeroomsandhotelsfrequently.Becausetheseproperties
are also subject to unexpected emergencies, the safest rooms are those on second or third
floors. Most countries’ fire services are not equipped to reach any higher—but a Nomad
avoidsthegroundfloor,asintheeventofahostileinvasion,havingsomedistancefrom the
lobbyiscrucial.(Terroristswillmostlikelyworktheirwayupfromthegroundfloor.)
Anoperativewilllookforaroomthatisequidistantfromstairwellsandelevators—aroom
too close to the emergency exit exposes him to the risk of being grabbed and shoved into a
stairwell.Toofar,andheisatadisadvantagewhentryingtomakeaspeedygetaway.
CivilianBLUF:Hotelsaretargetsforbothcommoncriminalsandprofessionalconmen,and
lobbiesareparticularlygreatplacesforcriminalstostalktheirpreywithouttheriskofbeing
challenged—thelikelihoodthatthey’llbe questionedbyhotelstaffislow.Fortunatelyhotels
havemanyentrancesandexits;usethemunpredictablytoavoidcreatingroutinesthatcouldbe
observedandanticipated.
019 PreventaHotelRoomInvasion
Hotel guests can mitigate risk by making educated decisions about room and floor selection
(seepage48).Buthotelroomdoorlocksarenotoriouslyflimsy,andeventhemostwell-chosen
room is only as secure as its doorframe, often a slim wooden structure bearing little to no
reinforcement.Socivilianstravelingthroughparticularlyhigh-riskregionsmaywishtoassess
thelayoutoftheirroomsandconstructadditionalfortifications.
Whileasolidlockprovidesameasureofprotectionagainstlockpicking,onlyareinforced
doorframecanpreventanassailantfromkickinginadoor—afewstrongblowswillhammera
metal deadbolt right through a wooden frame. Covering the entire width of the door, an
improviseddoorbarspreadsthepressureoftheblowsalongthebar,relievingthedeadboltof
some of the impact and preventing it from bursting through the doorframe. Fastened with a
pair of small eyelet screws, the reinforcement mechanism leaves behind only a minimal
signatureonceitisremoved.
Inroomswheredoorsopenoutward(morecommonoutsideoftheUnitedStates),invaders
must pull the door, rather than kicking it, in order to force entry—a more difficult task to
beginwith. Asimpletrickmakestheirjobevenmorechallenging:runninga length of nylon
linefromthedoorknobtoafixedstructureortoanotherclosed,lockeddoor.
In rooms where doors open inward, wedging or barricading the door will provide
temporary reinforcement, giving an operative time to plan an escape route or create an
improvisedweaponwhileinvadersstruggleagainsttheobstacleshehassetintheirpath—from
wooden wedges typically used to keep doors open to a lock reinforcement mechanism made
outofabroomstick.Asamethodoflastresort,pilingamassoffurnitureinfrontofthedoor
providesanacceptablemeansofdelayingattackers.
020 ConcealBelongingswithinLodging
When moving within the area of operation, operatives may take refuge in a hotel room
(booked under an assumed name), but they never let their guard down—for they are always
oneroominspectionawayfromdiscovery,andwithitmissionfailure.
Whileitisbestpracticetocarryorhideweaponsandidentificationpapersontheirperson
orinthedeadspacesofanoperationalvehicle,therearetimeswhensensitivegear,tools,or
data need to be securely stowed in a rented room. Hotel safes offer negligible protection, as
they are frequently checked by hotel staff. Instead, operatives rely on elaborate hiding
techniqueswellknowntoprisoninmatestheworldover.
Successfulconcealmentspotsshouldbetime-consumingforintruderstounearth.Intruders
(andhotelstaffalike)alwaysmovequicklywhenthey’recanvassingaroom,asthey’refearful
of being intercepted. Hiding spots that involve screwdrivers (the back panel of a television,
powersockets)willprovetootime-intensiveformostthievestodefeat.Thesespotswillalso
betraytracesoftampering—deliberatelyaligningthescrewsonanoutletoradjustingtherings
onashowercurtainaremeasuresthataresuretotrumptheaverageintruder.
Airventsaretheperfectwidthforhidinglaptopsortabletscontainingvaluableinformation
—just unscrew the grate and place them in the airshaft. Anything flat can be taped to the
undersideofadrawer.
021 BuildaRoomHide
Collectinglong-termintelligenceonatargetisaprocessthatcouldgoonformanydaysand
weeks—pinning down the target’s daily routines and establishing vulnerabilities over time is
key to effective surveillance. But sitting in a parked car for days on end is bound to arouse
suspicion in even the most anonymous of cities. For long-term stakeouts the operative must
createaroom“hide,”anindoorbasefromwhichtocollectintelligenceunobserved.
Thebestroomisonethatprovidesanunobstructedlineofsightoverthesurveillancetarget.
An upper floor will maximize an operative’s field of view while minimizing his visibility.
(Mostciviliansdon’tlifttheirgazeaboveeyelevelastheygoabouttheirdailylives.)Before
buildinghishide,theoperativesurveystheoutsideofthebuildingduringthedayandatnight.
Ifcurtainsinthe buildingare drawnorshut bymaidserviceatcertaintimes oftheday, the
operativefollowssuit.
While collection by night assures a certain level of discretion, daytime surveillance may
yield more valuable information. Tocollectunobserved,theoperativeshields theroomfrom
viewbybuildingavirtualcloakofinvisibility:atemporarydarkroomthatwillenablehimto
disappearbehindawindowinbroaddaylight.Insteadofreflectinglightaswhitewallsdo,its
darkcurtainswillabsorblight,reducingvisibilityintheroomwithoutcompromisingthelook
of the window, which will appear no different than any other when viewed from a ground-
levelvantagepoint.Pinningthesheetstotheceilinginadoublelayerwillpreventlightfrom
leakingintothedarkroomuponentryandexit.
022 StealaVehicle
Unliketheirbig-screencounterparts,ViolentNomadsdontdriveAstonMartins,Porsches,or
anyothertypeofBond-worthyrides.Thebestvehicleforcarryingoutamissionisthevehicle
that attracts the least attention—the vehicle that will allow an operative to tail and sit on a
targetforhourswithoutriskingdetection.Thevehiclethatwillblendintotheflowoftraffic
afteraquickgetaway.
Violent Nomads often rent, cash-purchase, or commandeer vehicles; prepare and modify
themforamission;andthendumpthemwhentheyarenolongerneeded.Stolenvehiclesdon’t
leaveapapertrail—andeventhoughtheNomadwillalwaysusefalseidentificationandcredit
cards, he prefers to avoid leaving behind any potential traces. The vehicle can be used
operationally,andthendumpedorburnedlongbeforeitisreportedmissing.
SelectingaVehicle
Theoptimalvehicleforanymissionistheonethatisunremarkableineverysense.Thiswillbe
dependent upon the setting of the mission, so Nomads carefully survey their operational
environmentstodeterminethebestcarforthejob.Theyselectamake,model,andcolorthat
mirrorthemostpopularchoicesinthearea.Beyondthetypeofcar,detailsaresignificant.If
localsinthe areaofoperationhangminiature country flagsfrom theirrearviewmirrors,the
Nomadwillfollowsuit.
Additionalconsiderationsforidentifyinganoperationalvehicleinclude:
DeadSpaceandVoids:Theenvironmentand/or particularities ofa mission maydictatea
vehicle with plenty of voids where operational gear and weapons can be concealed. A
surveillance mission may require cameras, and a mission in a desert or other secluded
environment may require stocking enough food and water for days. Vehicles with the most
usablespaceincludesedans,SUVs,andutilityvehicles.
Condition:Marks,dents,orscrapesareconspicuousattributesthatthirdpartiesmightnotice
andtransmittoauthorities.Conversely,carsthatlooktoocleanalsoriskattractingnotice.In
mostenvironmentsoutsidewealthyenclaves,asoiledcarwillhaveabetterchanceofblending
inwiththerestofthecarsontheroad.
StealingaVehicle
Thesophisticatedkillswitches,transponders,andothersecurityfeaturesnowinherenttomost
modernvehiclesmakecartheftamuchmorecomplexpropositionthanitoncewas;inorder
togeta cartostart,akeyneeds tobebothcuttotheignitionandembeddedwiththe right
transponder.ThisiswhyNomadsandcommoncarthievesalikeseekoutopportunitiestonab
carkeys,carjackrunningvehicles,andhacktheirwayintoolder-modelcarswithlessstringent
securityfeatures.
Valetanddailyparkingstructurestendtodisplayextremelylaxsecuritymeasures.Keysare
often simply tagged and placed in unlocked drawers at valet booths that are frequently left
unattended,providingNomadswithanopportunitytoquicklyandeasilyfilchasetofcarkeys
tothemodeloftheirchoice.
Nomads may also canvass the streets, seizing opportunities for carjacking as they arise.
Civiliansfrequentlyrenderthemselvesvulnerablebyleavingtheirkeysintheignitionasthey
withdrawcashfromanATMorsettlethegasbillinsidethestation.
When it comes to stealing a car the old-fashioned way, Nomads seek out older-model
vehicles with proven security vulnerabilities—Hondas being one reliable example. Once the
lock cylinder is bypassed, the ignition on these models is easily switched on by the tip of a
screwdriver.
Theirfirstorderofbusinessissearchingforsparekeysand“valetkeys,”thethinkeysmany
automakersembedintovehicles’owner’smanuals;theseallowaccesstodoorsandignitionbut
won’t open trunks or glove compartments. Even high-performance vehicles have their
particular vulnerabilities, and Nomads are keen students in this area. Certain BMW models
havewiringharnessesbytheirtrunksthatcanbeshortedandusedtounlocktheentirevehicle.
To expose the lock cylinder on an older-model vehicle (see diagram), they use a few hard
knockswiththehandleofascrewdrivertobreaktheplastichousingonthesteeringcolumn.
Then,theyusethesametechniquetodisengagethelockcylinderfromthelockbody.
Beforetheoperativestartstheengine,hemustalsobypassthesteeringcolumnlock—avery
simple lock mechanism that can be broken by yanking the wheel in any one direction with
bruteforce.Insertingthetipofthescrewdriverintothelockbodyandturningittotherightis
allittakestostarttheengine.
CivilianBLUF: Never leave a running car unattended, even for a moment. Never leave your
carkeysinyourvehicle,eveninalockedgarage.Checkyourowner’smanualforavaletkey
andmoveittoasafeplace.
023 OperationalVehiclePrep
Once an operational vehicle has been acquired, undertaking a range of adjustments will
enhanceperformanceanddecreasevisibilityandtraceability.Thesemayinclude:
• Commandeering voids and dead space suchas the dashboard on the passenger’s side,
airbag compartments, door panels, and seat covers—a suite of caches well known to
drugsmugglersandmules. Ina surveillanceor combatcontext,these spacescanhold
anythingfromarifletoalife-supportsystemcontainingwater,food,money,laptops,
andothercommunicationdevices.
• Outfitting the vehicle with forged license plates and registration documentation.
ExpiredtagsmightblowaNomad’scoverintheeventthatheispulledover.
•Installinganannycamdisguisedinatissueboxonthereardashasanextrasetofeyes.
Depending on the direction in which it is trained, the camera can be used for
surveillanceortodetermineifsomeoneisfollowingthevehicle.
• Disabling daytime running lights, brake lights, and interior lights and chimes for
inconspicuoustravel.Partiallypullinteriorlightbulbsoutoftheirsockets—farenough
to prevent them from turning on, but not so far that they will dangle and attract
attentionintheeventthattheoperativeispulledover.
•Overinflatingtiresforoptimalperformance.
024 EscapeandEvasionVehiclePrep
Duetotheirhighinherentrisk,escapeandevasiondrivingtechniques areusedbyoperatives
onlyincasesofextremeurgency,invehiclesthathavebeenspeciallychosenandretrofittedto
make maneuvers such as the J-turn or the Reverse 180 (pages220 and222) possible. High-
center-of-gravityvehiclessuchasSUVsarepronetoflipping,whilesmallercarsmightnotfare
aswellincollisions.Examplesofretrofittinginclude:
Selecting Tires: Tires should be replaced with high-performance models inflated to the
recommendedpoundspersquareinch.
Seat-Belt Workaround: In a car that is flipped upside down, the seat belt’s pendulum
locking system could become a deadly liability. If the weight of the operative’s body swings
the pendulum deep into the car door, the belt may lock into place and lose its ability to
unbuckle,soawell-placedrazorbladecanbealifesavingmeasure.
AirbagDisengagement:The lastthinga Nomad wantsis airbags goingoff—andinnewer
vehiclemodels,automaticallykillingtheengineastheydeploy—duringahigh-speedpursuit.
Left-Foot Braking: The human nervous system functions faster and more efficiently when
bothsidesofthebodyworktogether—whichiswhyracecardriversandoperativesusetheleft
footforbrakingandtherightforgas.
Threshold Braking: Learning to depress the brake pedal without locking up the tires is
necessary for precise handling. When deployed at a high speed, this controlled braking
maneuverenablesanoperativetocometoastopwithminimalslidingorskidding.
025 BuildaVehicleHide
Theoptimalhidesiteforstaticsurveillanceisaroomwithaview,butinsomecasesNomads
areforcedtosetuptemporaryhidesitesinsidetheirvehicles.Thisscenarioinvolvesaslewof
vulnerabilitiesanddiscomforts,butexposurecanbemitigatedbytheconstructionofasheet-
baseddarkroomsimilartowhatanoperativewouldbuildinanurbanhidesite(page54).Such
adarkroomallowshimtodisappearasifbehindthedarkestoftintedglass—butunlikeglass,
itdoesnotleavehimvulnerabletobrightsunshineandcuriousonlookers.
AlargesedanorSUVwithtintedwindowsandfoldingseatsgivestheoperativetheability
to set up a full-fledged surveillance suite inside his low-tech darkroom. A tripod, an SLR
camera,andashutterreleasecablewillproducehigher-qualitynightshotsthanthosecaptured
byspecializednightvisionequipment.
Toavoidbeinggivenawaybyenginenoise,runninglights,orexhaustfumes,theoperative
alwaysturnsofftheignition.Incoldweather,heappliesRain-Xtointeriorglassandwearsa
nonporousjacketthatretainsbodyheatinordertopreventwindowsfromfoggingup.Heuses
emptybottlesasreceptaclesforurine;whenfilledandcappedthesecanbeplacedonthefront
orreardashtoactasdefrostingdevices.
Toenterthedarkroom,hewillconstructapretextforleavingthevehiclemomentarily,such
asgoingtothecornerforacupofcoffee.Returningtothecar,hequicklyandcasuallyslips
intothebackdooronthedriver’sside—tomostonlookersitwilllooklikesomeonehasjust
settledintothedriver’sseat.
026 StealaPlane
Mostcivilianswouldbeverysurprisedtolearnthat,forthoseinpossessionofflighttraining,
swiping the world’s most common aircraft—a Cessna 152 or 172—is no more difficult than
picking the lock on a flimsy office desk. But for a Nomad looking to perform aerial
surveillanceorcrossbordersundetected(seepage32),stealingsmall,privatelyownedplanesis
justanothermeansofsecuringanuntraceablemethodoftransportation.
Relatively quiet, fuel-efficient, and reliable, single small-engine planes have several
advantagesforNomads.Theyarehigh-wing(asopposedtolow-wing)aircraft—whichmeans
their wings won’t get in the way if an operative needs to jump out in a hurry. Another
significant advantage is defined by the acronym STOAL, for “Short Takeoff and Landing”:
Small aircraft do not require very much space in which to take off and land, which enables
Nomadstoavoidrunwaysandinsteadlandinopenfieldsandotherdesertedspaces.
Most important, small aircraft tend to be outfitted with flimsy, highly vulnerable wafer
locks, making them extremely easy for an operative to steal using the picking tools and
techniquesthatapplytoanycommondoorlocks(page110).
Small aircraft are typically kept at single-run airports, where security is negligible and
airspace goes unmonitored by transportation or customs authorities. Once an operative has
brokenintothe plane, he willlikely be abletotakeoffandfly away without attractingany
notice.
Civilian BLUF: Owners of private planes are well advised to store their planes in hangars
and/orlockthemdownlikebicycles.
IMPROVISEDWEAPONS
Violent Nomads are always prepared for the eventuality of being captured and stripped of
theirweapons—orthat,inagivencontext,evenawell-concealedweaponwillposetoogreata
riskofdetection.Butbecause theyarewell versedinturningeverydayitemsintoimprovised
weapons,theywillnevertrulybecaughtunaware.
Thereisnosuchthingastheidealimprovisedweapon,asthebestweaponinanyscenariois
simplythe one thatcan be reachedwhenit isneeded.If it canbeeasilyacquiredwithin the
areaofoperationandcarriedwithoutarousingsuspicion,allthebetter.
Thoughimprovisationrulestheroost,someeffectiveweaponsofself-defensecanbecreated
withaminimumofadvanceplanning.
Forcivilians,learningtoseethedangerinherentineverydayobjectshasmultiplebenefits.A
manholdingatightlyrollednewspapermaybeaperpetratorgettingreadytostrike,butonly
thosewiththeforesighttorecognizehisweaponwillbepreparedtofendoffhisassault.And
intheeventofanattack,thecivilianwhoisabletorecognizetheself-defensepotentialinthe
materialsathandwillbeonestepahead.
Civilian BLUF: While the examples used in the following pages describe operatives
repurposing everyday items in the course of a mission, many innocuous everyday items can
standinasimprovisedweaponsofself-defenseasthesituationdemands.Evensaltandpepper
shakers, found on restaurant tables all over the world, can be used to temporarily blind an
assailant—thrownintoanopponent’s eyes,they createamomentarystingingand/or blinding
effectthatmaygiveyouthetimetoescapeorgaintheupperhand.
027 MakeaWaterBottleSilencer
Gunfire’s two biggest giveaways are sparks and sound: an extremely loud bang as the
gunpowder inside the bullet’s cartridge is ignited, along with the resulting flash. But paired
with subsonic bullets from a .22-caliber or .45-caliber pistol, an improvised silencer can
eliminate both. Though some states restrict or outright ban the purchase of silencers and
suppressors,aviablealternativecanbemadefromaplasticwaterbottle,asquareoffinewire
mesh,andastainlesssteelscouringsponge.Theonlyaudiblenoisewillbeatickingsound,the
resultofthepistolshammerinitiatingtheblowbystrikingtheprimer.
Mimickingtheactionofastandardsilencer—aperforatedsteeltubeencasedwithinasolid
steel tube—the improvised version uses a two-pronged muffling device. Rolled into a tight
cylindricalshape,thestifflayerofsteelmeshwillholditsformanddirectthebulletthrough
and out of the water bottle in a straight line. Tugging on the scouring sponge will help it
expandtofilltherestofthespaceinthebottle,creatingametalpillowthattrapsandmuffles
sound. Like a makeshift steel box, the contraption dampens sound and light waves with a
surprisingdegreeofeffectiveness.
CivilianBLUF: For an imaginative predator, lethal materials are readily available. Stainless
steelscourerscanbeobtainedatanygroceryorhardwarestore,andfinewiremeshcanbecut
outofwindowscreensorscreendoors.Awarenessiskey.
028 TransformanUmbrellaintoaLeadPipe
Because bullets and bullet holes leave forensic traces behind, the world’s most common
assassination weapon is neither a rifle nor a handgun but a piece of common lead pipe
concealedinnewspaper.Adenseandheavysapleavesbehindonlyitsintendedeffect:crushed
boneand,ifappliedtoahumanskull,utterannihilation.
Reinforced with lead, a collapsible umbrella has also been used by criminals to the same
effect.Toturnoneintoaweaponofself-defense,acquirethreetofourheavy-dutywrenches.
Slide the wrenches under the canopy and around the handle, zip-tying them to the umbrella
handlebeforesecuringtheoutsideoftheweaponwithadditionalzipties.Blacktiesonablack
umbrella will not be visible—which means that the weapon will look no different from an
ordinaryumbrella(thoughitwillbesignificantlyheavierandisnotrecommendedforeveryday
use).
029 TurnaPenintoaWeapon
The smartest pen is not a personal computing accessory but a deadly and completely
inconspicuous weapon of self-defense. In a pinch, any pen grasped from the bottom of a
handbag or briefcase can be used to inflict harm on an assailant, but one partiuclar make is
especially effective: With a barrel made of 100 percent stainless steel, Zebra’s original steel
pencanmoonlightasanincrediblemakeshiftstabbingtoolstrongenoughtopierceplywood.
Tostrike,holdthepeninatightfist.Useanoverhandgriptostrikeanassailant’sheadand
anunderhandgripifstrikingthethroatorkneeatcloserange.
030 UseaFishingWeightasanImprovisedSap
Theinnocenttrappings ofa fishingtrip,aneight-ouncefishingweight anda bandanawould
attractnonoticeinatraveler’sbackpack.Seenseparately,theitemsposenodiscerniblethreat.
But in the face of imminent danger, they can be turned into an effective, small, and dense
makeshiftsap.
Foldtheweightintothebandana,thenrollthebandanaintoacylinder.Foldthetwoends
together and strike opponents, aiming for knee (to cause buckling) or head (to cause the
assailant to lose consciousness). The resulting weapon will be powerful enough to crack a
coconutanddoequivalentdamagetoahumanskull.
031 MakeaFlexibleChainWeapon
Thoughnowmostcloselyidentifiedwiththeworldofmotorcyclegangs,chainweaponshave
beeninuseforaverylongtime.Modeledafterthemedieval weaponcalledachainmace,a
basicflexiblechainweaponcanbemadebyattachingtwoitemsthatnaturallybelongtogether
(andhenceshouldattractnosuspicion):achainandapadlock.Theresultingweaponwillbe
strongenoughtocrackhumanbone.
Thoughanybicyclistcanusehischainandlockasimprovisedweaponsofself-defense,the
ideal length of chain—slightly longer than an average forearm—is shorter than that used to
lockupabike.Anoverlongchainwillswingtooslowly,givinganassailantplentyoftimeto
react.
032 MakeaNewspaperNailBat
The sight of a person walking down the street holding a newspaper is one so common and
unremarkable that in the surveillance world, newspapers are frequently used as decoys; like
cell phones or cigarettes, they present operatives with an alibi for loitering on park benches
whilesurveyingatarget,ameansofbecomingacreatureoftheirenvironment.Inapinch,they
canalsobeusedasaweapon.
Rolled up into a tight cylinder that is doubled over onto itself and taped together, a few
sheetsofnewspaperbecomeasurprisinglysturdybaton.Wettingthepapergivesthebatona
significantamountofextraweight,andtheadditionofatwo-and-a-half-inchwoodnailturns
thebatonintoapotentiallydevastatingbludgeon.
CivilianBLUF:In a volatile, unsecured environment, even the most innocent of props can be
causeforalarm.
033 DeployaRollofCoins
Foraneasy-to-reachadvantageinhand-to-handcombat,anoperativekeepsarollofcoinsin
hispocketatall times. (ForeigncurrencyclosestinsizetoAmericannickelsor quarters will
resultinoptimal heft.)Grippedinthecenterofthepalm,thecoinswillincreasethedensity
and weight of his fist—a street-fighting trick that will significantly amplify the velocity and
impactofapowerpunchsuchasastraightrightorleftpunch,ahook,oranuppercut.
Stuffedintoasock,pillowcase,orhandkerchief,thatsamerollofcoinscanbeusedasan
improvisedsap.Thistypeofweapongainsasurprisingamountofpowerfromacombination
ofvelocityanddensity.Whenswungwithforce,itcanbreakbones;directedatanopponent’s
head,theimpactcaneasilyresultinaknockout.
Initsbloodiestincarnation,arollofcoinscanbestuddedwithhouseholdnailstocreatea
sharp and deadly version of brass knuckles. A punch with these spiked knuckles (another
hallmark of street fighting) will inflict serious and unexpected damage no matter where it
lands.
Carriedseparately,eachoftheseitems—arollofcoins,afewstraynails,apairofsocks—is
non-alerting. But when a Nomad senses danger ahead, they can be assembled into effective
optionsforself-defenseinunderaminute’stime.
PARTIV
SURVEILLANCE:OBSERVATION,TRACKING,
ANDCOUNTER-SURVEILLANCE
034 DismountedSurveillance
Stalking a subject on foot may be a low-tech proposition, but it is also a complex endeavor
withahighinherentriskofdiscovery.Conductingsurveillancealoneis particularlydifficult,
thestressofpotentiallybeing“burned”amplifiedaspatienceandstaminaaretestedoverlong
hoursanddays.Becauseanoperativecan’tswitchoutwithteammembers,heismorelikelyto
bespottedbythetarget.
Severalrulesofthumbcanmitigaterisk.Whenonfoot,remaininthetargetsblindspotat
all times. While the target eats, sleeps, or works, take the opportunity to change clothes.
Switchoutofclothingasoftenaspossible—atadistance,humanbeingsarerecognizedbythe
color and style of their clothing rather than their facial features. Never wear the same thing
twice.
Usetheenvironmenttogainadvantage.Glass surfacesoffer reflectivecapabilitiesandcan
alsoallowanoperativetoscanthestreetfromapotectedvantagepoint.
Vary the timing of surveillance to learn the target’s patterns while thwarting possible
countersurveillance.Donot attempttofollowthetargetall day, everyday—that’sa surefire
way to arouse suspicion. Around-the-clock surveillance is better suited for a multimember
teamwithplentyofpeoplewhocanrotateinandout.
Eighty-five percent of surveillance teams are detected by third parties rather than by the
targetsthemselves—whichunderlinestheimportanceofblendingintotheenvironment.Look
thepart,andcarrybooks,maps,cigarettes,andotherformsof“pocketlitter”asnon-alerting
excusesforloitering.
035 MobileSurveillance
Volatile, high-speed car chases may light up the silver screen, but the slow-paced reality of
vehicular surveillance is defined by patience and persistence. Its easy to become complacent
when stuck in bumper-to-bumper traffic or waiting outside a movie theater for two hours—
andtolosesightofthe“rabbit’s”vehicleashepullsaquickrightorslipsoutofaparkinglot
duringoneofthosemomentarylapsesinattention.Vigilanceiskey.
It’s also surprisingly easy to be spotted when following a target too closely. To avoid
detection, stay out of the target’s mirrors and lane and remain one car behind at all times.
Always observe the “two-turn limit.” Following the target for more than two consecutive
turns brings a serious risk of being burned. In this and many other regards, mounted
surveillanceisfarbettersuitedtoamultimemberteaminwhichonemembercanblowpasta
turn,lettingthenextsurveillanceteammembertakeoverandbecomethenew“eye.
Avoid mirroring the target’s actions, particularly on U-turns. If the target takes a U-turn,
movetothenextturnpocket,thenturnaroundandcatchup.Don’tfollowarabbitthrougha
series of odd maneuvers such as stairstepping through neighborhoods or pulling into dead
ends; the rabbit is probably performing these maneuvers in order to confirm that he’s being
followed.
Letdensity determinedistance.Staycloseindensetrafficand/or urbanenvironmentswith
manystoplights.Twoorthreecarsbetweenanoperativeandthetargetcouldspellalossifthe
operative misses a light or two because a car ahead of him has stopped to take a turn. In a
ruralareawithlowdensity,stayfarback;fewerdriversontheroadmeanslesscamouflage.
CivilianBLUF: Increase your awareness of cars that seem to be mirroring you as you drive
(particularlythosethatfollowyouonmultipleturns)andyouwilldecreaseyourvulnerability
toabductionsorcarjackings.
036 MakeanImprovisedInfraredLight
Anoperativecollectingintelligencefrominsideatargetshomeorplaceofbusinessmaywait
fordaysforthecoasttoclear—andwhenthatmomentarrives,hiscollectionprocessmustbe
swiftandundetectable.Inthedarkofnight,wheneventhesmallestamountofambientlight
cancompromiseamission,aninfraredlightsourceprovidesanidealrecourse.Invisibletothe
nakedeye,itallowsaNomadtosearcharoomincompletedarkness.
Though infrared bulbs and filters are commercially available, such purchases may create
unwanted scrutiny; an improvised solution, using a flashlight, a piece of camera film or the
slipofplasticinsidefloppydisks,andacameraphone,providesthesameresults.
Whilebothfilmandfloppydisksarebecomingextinctinthedevelopedworld,theyarestill
readilyavailableinmanycountries.Placedinfrontoftheflashlight’sbulb,thefilmactsasa
filter, blocking the flashlight’s visible light rays to undetectable levels. A standard camera
phone(seebelowforexceptions)willallowanoperativetoviewtheobjectslitbytheinfrared
beam emitting from his modified flashlight. Though he’ll be working in complete darkness,
anyobjectthelightisshiningonwillbevisibleinhiscameramonitor.
Note: Some of the newest camera phones come equipped with infrared blocking filters that
render them unsuitable for this usage. To find out if a particular model will work, obtain a
remotecontrol. Turnthecamera onandpointthefrontendoftheremote(the endwiththe
LED lightbulbs built into it) toward the phone’s screen. Press any button on the remote and
lookatitthroughthescreen.Ifthecameradoesdetectinfraredlight,theglowoftheremote’s
LEDbulbswillbevisible.Ifnot,aninexpensivephonepurchasedwithintheareaofoperation
willbelikelytoincludeaninfraredfilter.
037 MakeaTrackingDeviceforNightSurveillance
Mobile surveillance is a uniquely challenging skill set in the intelligence-gathering arsenal.
RequiringaNomadtoengagewithmultiplestreamsofinformationatonce—fromtheflowof
traffic to a target’s sudden turns to the possibility of being spotted—it becomes even more
difficultifavehicle’sdistinguishingfeaturesareeclipsedbythedarkofnight,whenidentifying
a car by its make and model becomes a near impossibility. Similar difficulties emerge if a
Nomadneedstotrackatargetthroughdenseurbanenvironmentsorwhenthetargetdrivesa
commonvehicleinacountrywherelicenseplatesareseenasoptional.
When the ever-present possibility of losing the target is multiplied by these factors, a
rudimentaryinfraredtrackingdevicecanbeusedtoilluminatethetrackedvehicle.Forgedout
ofcamerafilmorfloppy-discmaterialandawhite-lightkeychainLEDflashlight,itfunctions
identicallytoanimprovisedinfraredlight(page90). But insteadof beinghandheld,oncethe
deviceisassembleditiszip-tiedtotheundercarriageofthetargetvehicle.
Camerafilmorfloppy-discmaterialwillsubtractthevisibleraysfromanymechanismthat
emits white light, acting as a barrier that lets only infrared rays (invisible to the naked eye)
through. Lending a telltale glow that is visible only to the Nomad viewing the roadway
throughthelensofadigitalcameraorsmartphone,theresultingmakeshiftdeviceprovidesthe
sortofclose-rangeconfirmationtrackingthatasatellitedevice(seepage100) mightmiss by
several feet. (More suitable for longer-term surveillance, GPS tracking devices enable
surveillanceteamstoestablishthetarget’spatternoflifeovertime.)
038 DetectTamperingofPersonalEffects
Scrutiny of Westerners in developing economies is an increasingly common phenomenon.
Whether seeking trade or government secrets or attempting to determine a visitor’s ulterior
motivesfortravel,inmanycountrieshotelsecurityandgovernmentofficialsworkintandem
tosurreptitiouslypoliceforeignersstayingintheirproperties.
To find out if their belongings have been tampered with and determine their surveillance
status, operatives use discreet alignment techniques to monitor the placement of electronics
andvaluables.
The key word is discreet. Giving host-nation security services reason to believe that an
operative is onto them could result in their upping the ante and moving to detain him—or
worse.
CardinalBearingsTechnique: Use a compass or a compass app to align items in cardinal
directions. Position obstructions around the USB ports on a laptop to determine whether
intrudershaveusedflashdrivestodownloaddata.
SpaceandDepthTechnique:Experiencedhackerswillbypasstheoperatingsystem,flipping
a laptop upside down and unscrewing the hard drive in order to capture the contents of the
computer.Todeterminewhetheralaptophasbeenmoved,useathumbasameasurementtool
whensettingitintoposition.
Traps:The“donotdisturb”signonahoteldoorcanbeputtogooduseasatelltalesignthat
aroomhas,infact,beendisturbed.
Photo Trap: Use Photo Trap or a similar app (see page 126) to compare before and after
shotsof belongings. Suchapps comparebefore andaftershotstakenfromthesame position
andanimateanyportionsthatarentanexactmatch.
039 DetermineSurveillance
Almosteverycriminalact,frompursesnatchingandothermisdemeanorstosexcrimesoracts
ofterrorism,involvessomedegreeofpreoperationalsurveillance.Thoughtheymaybefocused
on watching a target, criminals themselves are actually quite vulnerable to detection during
thistime—particularlyiftheirtargets(unliketheaveragecivilian)remainalertandattunedto
theirsurroundings.
Toconfirmsurveillance,ViolentNomadssearchfor“coincidencesrepeatedovertimeand
distance, employing a multipronged approach governed by the acronym TEDD (Time,
Environment, Distance, and Demeanor). But be subtle—it’s advantageous to let criminals
believethey’velosttheirtargetaccidentally,ratherthanhavethemthinkthetargetisevading
them.
Time:Isthesamepersonorpeopleobservedrepeatedlyovertime,indifferentenvironments?
Todeterminewhetherthisisthecase,payattentiontotheclockthroughouttheday.
Environment:Noticeanypeoplewhosedressorbodylanguagedoesnotfittheenvironment?
Distance: Are the same people popping up in environments separated by a fair amount of
distance? For instance, was the same man in the dark glasses seen ten minutes ago in a
neighborhoodstore(lesssuspicious)ortwohoursagoinasupermarkettenmilesaway(more
suspicious)? Eliminate coincidence in order to confirm surveillance—test out theories by
runningerrandsacrosszipcodes.
Demeanor: In a possible surveillance context, “demeanor” stands for both behavior and
appearance. Be on the lookout for people whose dress or behavior does not fit the
circumstances.
040 DiscreetlyLoseSurveillance
The key to getting rid of a surveillance team without escalating a tail into a heated chase is
letting them believe they have lost their target—and not the other way around. To lose a
mobile surveillance team, forgo highly visible evasive driving techniques in favor of the
followingprotocol:
CreateanAccordionEffect:Breakdownasurveillanceteambydraggingitthroughanarea
withmanylightsand/orstopsigns.Alongstretchofstop-and-gotrafficwillthinoutateam
without alertingitsmemberstotheNomads agenda. Thecarclosesttohimmaystayclose,
buttherestoftheteamwilleventuallygetstuckseverallightsaway.Unabletoswapoutwith
teammembers,thelonetailmaygrowwaryofalertinghistargetandopttodisengage.
StopandStartFrequently:Surveillanceteamstendtolosetargetsonthestartorstopofa
movement—so increase the frequency of stops. An operative parked near an exit could take
tworight-handturnsoutofthelotbeforetheteamrealizesit’stimetostartmoving.
Use Public Transportation: To lose a surveillance team by hopping on public transport,
planinadvance.Arriveatadestinationjustasthebusortrainispullingupandhoponbefore
thetailcanmobilize.
Transit through HighlyPopulated Areas: Density and congestion make it difficult for a
teamtokeepeyesonatarget.Whenonfoot,enterhigh-trafficspotssuchasmalls,amusement
parks,andtouristtrapstoincreasethechanceofaloss.
041 DetectTrackingDevices
Inthesedaysofshrinkingtechnology,affixingamagnetizedtrackingdevicetoavehicleisan
all-too-easy proposition. Readily available for purposes from parenting to surveillance,
tracking devices come in sizes as small as thumb drives—and they’re also preinstalled in a
varietyofcontexts,pingingthelocationsofmobilephonesandrentalcarsalike.Foroperatives
travelinginternationally,it’ssafetoassumethatanyrentalcarwillcomepre-equippedwitha
built-in tracking device used to deter theft. But in the hands of an unfriendly host nation,
there’snotellinghowthisinformationcouldbeused.
Communicating via satellite, cellular towers, and server banks, tracking devices can be
eitherpermanentlymountedtoavehicleortemporarilymagnetizedtoitsframe.Becausetheir
signalscannotpunchthroughmetal,theycannotbehiddenbeneaththeframeormetalpartsof
thecar—whichmeanstherearespecificplaceswheretheyareusuallyfound.
Toavoidgettingcaughtovertlyinspectingavehicle,listenforatelltalestatic.Turnoffany
cell phones, and set the radio to an AM station that’s crackly and out of range. If an
occasionaltickingsoundcanbedetectedbehindthatfuzz,thereissomekindofcellulardevice
at workinsidethecar.(Thesoundarisesfrom theinteractionofthecellularsignalwiththe
radio’sspeakerwireandcoil.)
Donotattempttoremovethetrackingdeviceifthereisreasontobelievethatthetracking
is nefarious rather than a matter of standard protocol; instead, come up with an excuse to
tradeinthecar.
042 DeceiveSurveillanceCameras
Capturing footage of our faces at traffic stops, ATM machines, and outside businesses from
jewelrystorestopizzajoints,surveillance camerasline the streetsinmajorcities. Andgiven
howcheapthey’vebecome,theyarenowfoundinevenremotepartsoftheworld.Toerron
the safe side, a Violent Nomad always assumes he is being filmed and employs several
methodsofconcealmentanddisruptiontoreducetheriskofbeingidentified.
Disguise: Operatives avoid masks or outlandish disguises, Hollywood plot devices that will
quicklygetthemspottedbythirdparties.Instead,theywearhatsorheadcoverings.
Light:Theauto-exposurefeatureonmanycamerasconstrictstheapertureinbrightlight—so
shining a flashlight or LED directly into the camera will result in a lower-quality image, as
will timing movements so that the sun is always behind an operative when he encounters a
camera.
Static:Asecuritycamera’scoresignaltravelsdownacopperconductorsheathedinlayersof
braided metal and rubber. Placing a steel razor blade in contact with that copper conductor
will short the connection, temporarily disrupting the camera’s video feed. After the blade
slides through the rubber jacket, it is wiggled through the braided shield until it reaches the
hardmetalcore.Leftinplace,thebladewillcausethemonitortofillupwithstatic.Assoon
astherazorisremoved,thesignalwillreturntonormal.
PARTV
ACCESS:CLANDESTINEBREAKINGAND
ENTERING
PICKINGALOCK
An operative typically prefers a method of clandestine entry that will allow him repeated
accesstothetarget’sdomicileor placeof business, butmissiontimelinessometimesdemand
moreimmediateaction.Insuchcases,theoperativemayreverttothetime-honoredpracticeof
lockpicking.
Though popular depictions of breaking and entering frequently show thieves bypassing
locked doors with the cursory jiggle of a screwdriver, in reality it takes two hands and two
toolstoopenalock—onetoliftthelockpins,andonetoturnthecylinder.
Still,asthefollowingpageswilldemonstrate,itisremarkablyeasyforintruderstobypass
commondoorlocks.Thebestpreventionisahigher-qualitydoorlock,buttherearemeasures
civilianscantaketoreinforceeventheflimsiestofhotelroomlocks.
043 CreateImprovisedLock-PickingTools
Whileanylockwithakeycantheoreticallybepicked,high-securitylocksfeaturingpinsthat
mustbeliftedandtwistedprobablywon’tbevulnerabletoimprovisedinstruments.Mostpin
tumblerandwaferlocks,however,canbedefeatedwithnothingmorethanacoupleofpaper
clipsandasignificantamountofpractice.
Using two paper clips, along with a pair of pliers and a flat file or hard surface, an
operative can create improvised tools to simulate the actions of a rake pick and a tension
wrenchortorsiontool.
Larger,thicker-gaugedpaperclipsarepreferable,astheywillholdupunderpressure;bobby
pinsorthebandmetalusedtoholdshippingcratestogethercanbeusedasanalternative.
Thinningtheinstrumentswillallowmoreroomformaneuveringandensurethatbothtools
areabletofitinsidethelocksimultaneously.Intheabsenceofafile,thefloororawallcanbe
usedtosandthemdown.
044 PickaLock
A crosscut view of the interior of a common lock reveals its inner workings—along with its
vulnerabilities. The lock case houses two rows of five pins, top and bottom, their lengths
corresponding to the cuts on a key. (Known as a five-pin tumbler lock, this common model
actuallycontainstenseparatepins.)
When there’s no key in the lock, springs in the top of the pin chamber push the top and
bottom pins down so that they obstruct the lock’s shear line. When a properly cut key is
inserted into the lock, the pins are pushed up to the levels that clear the shear line. The
cylinderisfreetorotate,therebyretractingthedeadbolt.
Thetricktolockdefeatisinsimultaneouslyapplyingtensiontothecylinderwhilemoving
the pinsoutofthewayoftheshearline;intheabsenceofakey,therotationaltensionwill
holdtheminplace.
Using the nondominant hand, first insert the tension wrench or torsion tool and apply
rotationalpressure.Insertthepicktoolwithotherhand,usingittomovethepins,onebyone,
untiltheypopintounlockedposition.Usethetipofthepicktooltofindeachpin,employinga
rockingmotiontoliftittotheshearline.
Withimprovisedoroff-the-shelflock-pickinginstrumentsonhand,acommonpintumbler
lockcanbedefeatedviaacombinationofpatience,dexterity,andpractice.
DUPLICATINGAKEY
Because every lock that is picked open must be picked closed, lock picking is actually the
option of last resort. Instead, whenever possible, operatives aim to temporarily appropriate
and duplicate a target’s key. Ensuring a method of repeated access to the target’s home or
business, this enables them to perform surveillance in small, undetectable increments over a
periodofdaysorweeks.
045 ClamaKey
Materials as ordinary and commonplace as a bar of soap, a patch of skin, or a piece of
Styrofoam can be used to physically “clam” a key, producing an embossing that is the first
stepinduplication.
But when operatives are unable to make a physical impression of the target’s key, a
photograph provides one of the simplest and most effective means of replication. All that’s
neededasawindowofopportunityisthatsplitsecondinwhichthetargetmomentarilyplaces
hiskeysonarestauranttableorbarcounter.
Physical methods of clamming provide a more accurate embossing of the target’s key but
canbedifficulttopulloff.Accessmaypresentitselfatanygivenmoment,andtheoperative
mustbereadytoact.Intheabsenceofclammingtools,theoperativecansimplypressthekey
against a soft patch of his own skin; the resulting mark will last several minutes. Once the
operativehasleftthepremises,tracingtheoutlinewithamarkerorpenproducesarendering
that will show up clearly in a photograph or photocopy. More-dependable results can be
obtained by depressing keys into malleable surfaces such as bars of soap, Styrofoam cups or
plates,ortraditionalkeyclamsfilledwithmodelingclay.
046 CloneaKey
Armedwithnothingmorethananaluminumsodacan,apenorpencil,apairofscissors,and
apaper clip, a Violent Nomadcaneffectivelyturnakeyclammingintoa duplicatekeythat
willgranthimdirectaccesstothetarget’sdomicileorbusiness.
Acopymachinecanrenderatrue-to-sizeflatcopyofthetargetkeyclamming.Ifworking
fromaphotograph,resizeorphotocopyprintstoreflectactualkeyproportions.
Use scissors to carefully cut out a paper outline of the key. Set aside. Cut the top and
bottomoffofthealuminumcan,thencuttheremainingcylinderinhalf.Laythekeyoutline
ontopofthealuminumrectangle,thentraceandcutoutthekeyshapeoncemore.Thisisthe
duplicatekey—butbecauseitissomalleable,aseparatetorsiontoolisalsoneeded.
Tomakeone,straightenoutapaperclip,thenbendoneendintoanLshape.
Slide the aluminum key clone into the target lock, partially unlocking the mechanism by
raisingthelockpinstotheshearline.Thekeyclonewillbetooflimsytoturn,soinsertthe
shortendofthepaperclipintothelockbeneathit.Usethepapercliptoturnthelockcylinder.
047 ImpressionaLock
Thecentralchallengeinlockdefeatismomentarilyswipingthetarget’skeyinordertocloneit
(see page 114). In many instances, operatives cannot get close enough to a target to do so
without compromisingmissionintegrityandmustthusproceedwithout a clone.Iftheyseek
one-time access to a target’s residence, they may choose to pick the lock (page 110). But
generally, once they negotiate access to a target’s home or business, their goal is to provide
themselvesarepeatable,reliablemeansofreentry.Operativeswanttheabilitytocomeandgo
without detection in order to accomplish the mission over several entries—a key can allow
them to split an hour-long task into several five-, ten-, or fifteen-minute increments over a
period of thirty days. They may also want to provide copies of the key to other government
entitiesconductingcompartmentalizedoperations.
In the absence of a clone, the key duplication technique of last resort is impressioning a
lock.Thistime-intensivetechnique,onefamiliartomasterlocksmithstheworldover,requires
practiceandmanyriskyminutesspentatthetarget’sdoor.But foranyoneintentongaining
accesstohigh-valuedocumentsandevidence,thetimewillbewellspent.
Toexecute,useaprimarytriptophotographthelockanddeterminewhattypeofkeyblank
to purchase. Or transit to the location with a set of reconnaissance key blanks purchased
withintheareaofoperation;thesewillhavethegreatestprobabilityofprovidingamatch.
Withkeyblank,flatandroundfiles,andpliersinhand,thepainstakingprocessofmanually
impressioning the key begins. First, smooth down the key blank with the flat file. Insert the
keyblankintothelock,andjiggleitupanddown.Thelockpinswillleavebehindarowof
telltale scratches—these become guidelines for key cuts. Using the round file, carefully file
grooves at scratch points. Insert the key blank into the lock and repeat, filing it down at
markedpointsuntilitfinallyclicksandturns.
048 BypassaHotelRoomDoor
Mandatory in many commercial buildings and hotels due to fire codes and disability laws,
leverhandleknobsallowapersoncrawlinginafiretoreachupandquicklypulldownonthe
knob to unlock the deadbolt. But beware: this accessibility feature also renders the locks
vulnerable to intruders.Whenguestslockthemselvesout orleverhandlesmalfunction, hotel
staff members use an under-the-door lever lock tool to trip the lock from the hallway, and
such a tool is easy to replicate using a hanger and piece of string. With a series of simple
maneuvers,thievesandoperativescaneasilydefeatthislock.
Construct an Under-the-Door Tool: Use a set of pliers to cut the hanger at two points,
creatingasmallL-shapedhookandalargerJ-shapedhandle.Bendanadditional“hook”into
theL-shapedhandleandtieafour-foot-longpieceofstringtothishook.
BreachtheDoor:SlidetheL-shapedendofthetoolunderthetargetdoor,holdingontothe
freeendofthestring,andpushitforwarduntiltheJ-shapedendofthetoolisaboutoneinch
awayfromthedoor.
GrasptheDoorknob:RollthetoolontothecurveoftheJ-shapedenduntilanaudibletap
on the other side of the door signals that the tool is now upright. Slide the tool toward the
knobuntilitcatchestheleverhandle.
TriptheLock:Pullonthehangerandstringtopullthehandledownanddisengagethelock.
Civilian BLUF: Lever handle knobs are easy to defeat, but additional protection may be
obtainedbyobstructingthegapbeneaththedoorwithatowel(stuffedintothegapassecurely
aspossible).
049 SurreptitiouslyUnlatchDoorLocks
Commonlyfoundinbothhotelroomsandhomes,doorchainandbarlocksaretheflimsiestof
alllockingmechanisms.Butforoperativeslookingtoaccessatarget’sroomwithoutleavinga
trace,aforcedentrythatleavesbehindasplintereddoorframeandabrokenlockisamethod
oflastresort.Instead,operativesrelyonamethodofentrythatsetsthelockbackintolocked
positionupondeparture.
Adoorthatissecuredbyonlyachainorbarlockwillopenaboutthreeinches—justenough
spaceforanoperative’sorthief’sforearmtosqueezethroughandcreateanauto-unlockdevice
usingarubberband,apushpin,andalengthofdentalfloss.
Onachainlock,looponeendoftherubberbandtotheendofthechain,thenstretchand
pintheotherendtowardthecenterofthedoor.Asthedoorcloses,theincreasedtensionon
therubberbandwillpullthechainoutofthelock(seediagram).
Onabarlock,thetechniqueisslightlymorechallenging.First,affixtherubberbandtothe
bar using a “girth hitch” loop. Then, stretch the other end of the rubber band toward the
doorframe (away from the center of the door) and pin it to the wall beside the door (see
diagram).
Topullthelockclosedasthedoorshuts,loopadoublelengthofdentalflossoveronearm
ofthelockingbarnearitsbase;holdontotheendsoftheflosswhileclosingthedoor,then
pulltolock.Toretrievethefloss,pullitthroughthedooropeningbyoneend.
Civilian BLUF: Never rely on door chain or bar locks to secure doors. Always use your
deadbolt.
050 DefeataPadlock
While padlocks have a heft that communicates a certain impenetrability, in reality they
providelittlemorethanasenseoffalsesecuritytotheirowners.Operativesactuallyseekout
entrancessecuredbypadlocks,ontheveryassumptionthattheywillbeeasytodefeat.Many
are constructed quite flimsily, built with a loose tolerance that makes them extremely
vulnerabletointruders.Insomecasestheycanbebypassedentirely—thepiecestowhichthe
locks are affixed may themselves be vulnerable, as with hasps that can simply be unscrewed
fromagate.
In order to defeat a padlock directly, a set of improvised shims can be made using a
lightweight, pliable aluminum can and a pair of shears. Cutting out two rectangular pieces
withsemicirculartabs(seediagram)yieldstoolsstrongenoughtotakeonmostpadlocks.
Slid down between the shackle and lock case, the shims are rotated so that their tongues
move to the insides of the shackle and jostle the interior ball bearings aside. With the ball
bearings pushed out of the indentation in the shackle, the padlock will unlock with upward
pressure.
Civilian BLUF: When securing an entrance via padlock, be sure to select a top-of-the-line
modelandaddressanyvulnerabilitiesinthesurfacetowhichthepadlockwillbemounted.
051 CovertlyAccessLockedLuggage
Alockedsuitcasepresentsnorealimpedimenttoawell-trainedoperative.Luggagelockscan
easilybeopenedwithmasterkeysorbypassedentirelybysimplynudgingthesuitcase’szipper
open with a ballpoint pen. But an operative conducting a search of a potential target’s
valuablesalwaysseekstoeraseanytraceofhisactions.Whenattemptingtoretrievevaluable
intelligence (or to plant eavesdropping technology or tracking devices that might render the
targetevenmorevulnerable),breakingintolockedluggagewithoutdetectioniskey.
Becausethere’snotellingwhetheratargethasemployeddiscretealignmenttechniques(see
page94)inordertodetecttampering, aViolentNomadcanneverbetoocautious.Together
withthezipper breakingtechnique,the useofappssuchas PhotoTrapcanhelpensure that
thetarget’sbelongingsareleftexactlyastheywerefound.
Oncethesuitcasehas beenbreached,off-the-shelf trackingdevices canbeinsertedintoits
lining—theareabetweenthewheelsandthefabricoftenprovidesadiscreetconcealmentarea.
CivilianBLUF: Any object with a zipper closure can never truly be locked, and any suitcase
madeof clothcanultimatelybeslashedopenbyasharpinstrument.Foradditionalsecurity,
selecthard-sidedortrunk-styleluggagewithclamshellorclipclosures.
052 OpenaCarDoorwithaPieceofString
Older-modelcarswithpull-uplocksarevulnerabletotheunlikeliestofbreak-intools:asingle
pieceofstring,shimmiedintothecarthroughtheopeningbetweenitswindowandframe.The
mostdifficultpartoftheprocessiswedgingthestringpasttherubberizedweathersealaround
thetopofthecardoorframe.Theolderthecar,thelooserthesealwillbe.
TieaSlipknot:Formaloopatthecenterofasix-foot-longpieceofstringorparachutecord.
Cross one end of the string over and under the loop, creating a secondary loop. Hook the
stringbackoverandthroughtheinnermostloop,tighteningitintoaknotwhilemaintaining
theupperloop.
ShimmytheKnotintotheCar:Workingfromtheuppercornerofthecardoorjustabove
thelock,shimmytheknotandlineintothecar,keepingbothendsofthestringoutsideofthe
car. Pull back on the corner of the window to create an opening. In models where the glass
windows don’t have a frame around them, beware of exerting too much pressure on the
windowandcausingtheglasstoshatter.
SnaretheThumbPuller:Guidetheknotdowntowardtheunlockmechanismandsnareit
withtheloop.
TightentheKnot:Pullbothendsofthestringinoppositedirectionstotightentheslipknot
aroundthethumbpuller.
UnlocktheDoor:Oncetheknotistightenedasmuchaspossible,pulluponbothendsofthe
stringtounlockthedoor.
053 DiscreetlyOpenGarageDoors
Lock picking can be an arduous and time-consuming task, which is why operatives tend to
seek out workarounds such as clamming a target’s key (page 114) or bypassing the lock
altogether(page120).Inahomeinfiltrationscenario,anattachedgaragewithadooroperated
byanelectricopeningdeviceprovidesasignificantvulnerabilityfortheNomadtoexploit.
Because they must slide up and back onto rail systems, garage doors are built with space
alongtheirtopedges.Byslidingastraightened-outhangerwithahookatitsendbetweenthe
garagedoorandtheupperdoorframe,thecablethatdisengagestheautomaticopeningsystem
can be hooked. Because most civilians use their automatic door closure systems as default
lockingmechanisms, thisisallthatisneededinorderto“unlock”thedoorbeforemanually
openingit.
Oncetheoperativehaspulledthedooropenjustafewfeet,hewillquicklyslidebeneathit
and immediately pull the door closed. Entry to the house may now be possible—many
homeowners fail to lock the door connecting the garage to the house. Even if that door is
locked,thereisnowasafeandcoveredspacefromwhichtoworkonbypassingthelockforas
longasnecessary.
CivilianBLUF: Cut or tie off the manual-open cable of your garage door so that the cable
becomesunreachablebyatoolinsertedatthetopofthedoor.Eveninasecuredgarage,never
leaveyourcarkeysinyourcar.Lockthedoorbetweenyourhouseandgaragetocreatelayers
ofsecurity.
PARTVI
COLLECTION:AUDIOANDVIDEO
INTELLIGENCE
054 InstallanAudioDevice
What is the optimal concealment spot for an audio surveillance mechanism? The answer
depends on a compromise between available options, time spent on target, and achievable
soundquality.Whileitispossibletocreateafunctionallisteningdeviceusinglittlemorethan
amobilephoneandapairofheadphones(seepage136),abotchedinstallationwillyieldlittle
inthewayofactionableaudio.
In selecting their install points, operatives attempt to determine where unguarded
conversations are likeliest to occur (often in bedrooms or kitchens rather than living rooms)
andaimforlocationsthatputthematthe“centerofconversation.”
Sound quality will also depend on the particularities of the concealment spot. In a car, a
central console or dome light produces intelligible audio from both front- and backseat
conversations,whereasabugplacedtoonearthefrontofthevehiclemaypickupinterference
from the motor or stereo system. The molding of a television offers highly effective
concealmentbutaddsaplasticbarrierthatmayinterferewithsoundquality.
Lastly, operatives will choose between a “hard install,” a semipermanent installation that
utilizes parasitic power from a source such as a television or an electrical outlet, or a “soft
install,”whichmaybeassimpleasplacingarecordingdeviceinsideaboxoftissues.Thefirst
optiontakesagreatdealoftimeontargetbutmeanstheoperativeneverhastoreturninorder
to service the device. A soft installation may require dangerous return trips when the device
runsoutofbatteriesormaxesoutitsmemory.
CivilianBLUF:Whilenoise-cancelingsoftwarecanoverridethesoundsoftelevisionorradio,
it cannot process the sound of running water—which makes bathrooms in potentially
compromisedlocationsidealspotsfordiscreetconversations.
055 TurnaSpeakerintoaMicrophone
Stashing a voice-activated recording device in a target’s room or vehicle is relatively simple,
but without sound amplification, such a setup is unlikely to result in audible intelligence—a
proper audio-surveillance system requires amplification via microphone. In the absence of
dedicatedtools,however,theNomadcanleverageacellphone,anaudiojack,andapairof
headphonesintoaneffectivelisteningdevice.
Becausemicrophonesandspeakersareessentiallythesameinstrument,anyspeaker—from
theearbudsonapairofheadphonestothestereosystemonatelevision—canbeturnedintoa
microphone in a matter of minutes. The simple difference between the two is that their
functionsarereversed.Whileaspeakerturnselectronicsignalsintosound,amicturnssound
intoelectronicsignalstobemanipulatedandamplified.
Thedistinctionturnsontwo wires, onepositive (red)andonenegative(black).Switching
thesewiresreversesthepolarity,andthereforethefunction,ofthedevice(seediagram).
Toexecute,cuttheoutboundendsofthespeakerwiresandattachthemtoanaudiojack.
Plugtheaudiojackintotherecordingdevice.
Any small recording device can be employed, but using a phone set to silent and auto
answerasalisteningdevicehastwoadvantages:Itcapturesintelligenceinrealtimeanddoes
so without the operative having to execute a potentially dangerous return trip on target to
collectthedevice.
Thisaudioinstallationtechniqueishighlyadaptabletoavarietyofenvironments.Tosetup
vehicular surveillance, disable one of the car’s rear speakers, plugging its wires into a voice
recorderorphone;concealtherecordingdeviceinthedeadspaceofarearpassengerdoorora
trunk’slining.Inpublicplaces,earbudsdanglingfromacoatpocketcanfunctionasadiscreet
ambientsurveillancestation.
BUILDINGANDCONCEALINGASURVEILLANCECAMERA
For a Nomad, the optimal surveillance camera begins with an off-the-shelf product from a
local superstore and ends with an object that blends into its environment to the point of
invisibility.Thestartingpoint?Astandard-issuebabymonitor.
Withcamerasgettingsmallerandlighterbytheday,it’spossibletodisguiseasurveillance
setupinaboxofKleenex,thecasingofaguttedhardcoverbook,ortheampledeadspacein
officeequipmentsuchasprinters.Buttosecureaviewovertheexteriorofatarget’shomeor
businessinordertoobtainpositiveidentificationonkeyholdersandvisitors,Nomadscanuse
homemadeplasticanddisguisethecameraasaninnocuousrockorclumpofdirt.
056 ConstructandInstallaPinholeCamera
A pinhole camera starts with a visit to a superstore and the purchase of a wireless baby
monitor. Once in hand, crack open the baby camera housing to reveal its contents (see
diagram). Remove the components—a transmitter, a battery pack, and the camera lens—but
keepthemwiredtogether.Discardthebabycamerahousing.Followtheinstructionstocreate
homemade plastic (see page 142), then place a toothpick in the eye of the camera lens and
mold the plastic around the lens in the shape of a rock; the toothpick will create an
indiscerniblepinholethroughwhichthecamerawilloperate.
Paint the rock in a neutral color or a shade specific to the landscape outside the target’s
homeandenclosethetransmitterandbatterypackinawaterproofziplockbagorTupperware
container.Burythecontainerinashallowhole(toodeepandthetransmitter’ssignalwillfail)
andsetupthecamerasothatitcapturespeople’sfacesastheyenterandexitthebuilding.To
ensurethatthecamera’s“lookangle”isproperlypositioned,leavethetoothpickinplaceuntil
thelastminuteanduseitsangletogaugethefieldofview.
Foranadditionallayerofcamouflage,applyspraygluetotherockduringinstallationand
coveritwithdirtgatheredonsite.Fromaremotesetupinavehicleuptotwohundredyards
away,anoperativewillbeabletoobservethecomingsandgoingsonhismonitorscreenwith
limitedriskofdetection.
057 MakeHomemadePlastic
Allthatisneededtoconcealvaluabledata,keys,orsurveillancedevicessuchascamerasand
microphonesaretwoingredientscommonlyfoundinanyhouseholdkitchen:milkandvinegar.
Heated and strained so that the milk’s casein proteins coagulate into a rubbery, plasticlike
substance,themixturecanbemoldedintoanyshape,dryingtoaclaylikeconsistency.
In contrast to body cavity concealments focused on escape, or to mobile tech solutions
focused on eliminating the Nomad’s digital signature (page 194), plastic concealments are
useful for camouflaging valuables or surveillance devices in a particular environment. The
shape-shifting substance can be formed and painted to resemble rocks, bricks, logs, or any
number of objects, making it a prime candidate for the dead drops Nomads use to
surreptitiouslycommunicateimportantdatatoassociates.
Note:Heattimemayvarydependingonthemicrowave’spowerandsettings.
CivilianBLUF:Camerasareeverywhere—alwaysassumeyouarebeingrecorded.
058 SendAnonymousEmails
Password-protectedemailaccountsandWi-Ficonnectionsarechildsplaytomodernhackers,
a class of information specialists that includes identity thieves, scam artists, and seasoned
terroristsamongitsranks.Tothwartthem,Nomadsemployananonymitynetworkoriginally
developed by members of the U.S. Naval Research Laboratory as a tool for secure
communication.(Ironically,ithasalsobecomethefavorednetworksolutionforcriminalsand
black-marketbusinessesofallstripes.)
Tor, the name of the network, prevents forensic traceback by encrypting and bouncing
informationthroughachainofvolunteerserversallovertheworld.Bydisguisingthesender’s
pointoforigin,thenetworkprotectsNomadsfromthirdpartiesattemptingtofindouttheir
geolocation; an anonymous email account with no connection to the Nomad’s name or
identityprovidesanadditionallayerofsecurity.
Though free Wi-Fi hotspots are known for their lack of security and vulnerability to
hackers, they can be useful toaNomadwhoswary ofhavinghishome or hotel connection
tapped. To set up an anonymous browsing session, transit to a location that falls outside
regularpatterns,thenaccessafreeWi-Ficonnectionthatdoesnotrequirealoginorpassword.
DownloadTails,a user-friendly operatingsystemthatusesTorasits backdropandsavesno
browsing information. Once loaded, use Tails to create a new, completely anonymous email
address. Follow the example of citizens in authoritarian regimes who, wishing to further
decrease the span of their digital footprints, will often share email accounts with close
associates.Insteadofsendingandreceivingemails,theykeeptheircommunicationssecureby
responding back and forth on draft emails, thereby never creating any potentially alerting
traffic.
059 HideInformationinPlainSight
No matter how carefully a Nomad covers his tracks, any exchange of digital information
presents the possibility of a security breach. So operatives secure their messages with a
multiprongedsystem,layeringvariousformsofencryptionintocommunicationssentthrough
ananonymitynetworkandviafalseemailaddresses(page144).Just as spies once concealed
information-filledmicrodotsontheheadofapin,todayoperativesembedtextdocumentsinto
digitalimagesthatmustbedecompressedtorevealtheircontents.
To create a rudimentary form of encryption, start with a program such as TextEdit or
Notepad. Avoid any word processing software that is connected to an update mechanism;
documentscreatedinsuchaprogrammayberecoverablebythirdparties,eveniftheyaren’t
beingsavedtoaharddriveortothecloud.
Beforecomposingamessage,pasteaninnocuousimageintothetextdocument.
Typesensitiveinformationaboveorbelowtheimage.Changethefontcolortowhiteand/or
the fonttoa symbolforadditional cover.Intheshortterm, thiswillconcealactivitiesfrom
onlookerswhilethemessageiscreated.Whenthemessageissent,theimagefilesizewillserve
asafront,disguisinganyadditionalspacetakenupbythetext.
060 HideandExtractDataUsingEverydayPhotos
Whena suspicionof surveillance isconfirmed,there is nosuchthingas asurfeit of caution.
The Nomad hunkers down, limiting anything but the most essential communications and
meetingassociatesincrowdedpublicplaces.Ifhemustsendoutinformation,asingleformof
encryptionorcovertmessagingdoesnotsuffice—varyinghismethodologieswillmakeitmore
difficultforpotentialcodebreakerstodeterminepatternandunlockhiscode.
Althoughelaborate,amethodofencryptionthatreliesonstagingaphysicalartifactwithin
aphotographdeceivesthehumaneyewhilefoilinganykindofautomateddecryptionsoftware.
To set up the decoy, acquire a high-megapixel digital camera. (A smartphone camera will
not produce images of high-enough quality.) Handwrite or print the message on paper.
Concealthephysicalartifactinthebackgroundofaposedshot—atthebaseofabuildingor
camouflagedonabusybulletinboardinthebackgroundofagroupshot.
Photographthescenewiththeentireimageinfocus,thenzoominontheresultingimageto
makesurethemessageislegible.
Instoringoremailingtheimage,besuretosaveitatfullresolution.Mergetheimageintoa
setofinnocuousphotographs.Downloadedtoaflashdriveandsmuggledintoadeaddrop,or
attached to a draft email on an account shared with associates (see page 144), the set will
revealitstruecontentsonlytothosewhoknowtosearchforthem.
PARTVII
OPERATIONALACTIONS:DENY,DISRUPT,
DISABLE
061 DrawaConcealedPistol
Many gun-carrying civilians mistakenly practice their target shooting to the exclusion of
relatedcompetencies.Onefrequentlyneglectedarea,theartofrapidlyandseamlesslydrawing
aconcealedweapon,is crucialtosuccessful self-defense.When confrontingan assailantwho
alreadyhashisweaponinplay,adelayofevenahalfsecondorlesswillseriouslycompromise
chancesofsurvival—sooperativesknowthatworkingondrawingtechnique(alwayswithan
unloadedweapon)andunderstandingtheintricaciesofeachparticularholsterarecrucial.Two
frequentproblemsarefumblingthedrawanddrawingtheholsteralongwiththeweapon.
DrawingaWeaponunderanUntuckedShirt:Adrawoccursinasingleseamlessmotion
thatcanbebrokendownintothreedistinctphases.Inthefirst,theoperativeuseshisthumbto
“hookandsweep”hisshirtoutoftheway,efficientlymovingthefabricasidetopreventthe
weaponfromgettingtangledupinitsfolds.Inthesecond,hisnondominanthandholdsuphis
shirtwhilehisdrawinghandliftstheweaponoutoftheholster.Inthethird,hisnondominant
hand becomes the support hand as he pops the wrist of his drawing hand and points the
weapontowardthetarget.Allthewhile,hiseyesremainfixedonthetarget.
DrawingaWeaponunderaCoat:Acoatthatswingsforwardwhiletheoperativeattempts
to draw can be a very real liability—one that’s neutralized by the simple trick of weighting
down the jacket with a roll of coins. Use the drawing hand to brush the jacket back while
simultaneouslydrawingtheweapon.
Inbothcases,thecrucialsupporthandhelpsstabilizeaimwhilequickeningthedraw—thehumanbody
functionsmorerapidlyandefficientlywhenbothsidesareperformingparallelactionsintandem.
062 ShootfromaVehicle
For drivers and passengers caught in enemy crossfire, the first line of defense against armed
attackersshould bea rapidgetawayby car.If driving away isn’t possible,running for cover
outside the vehicle is preferable to hunkering down. When bullets are flying, a stationary
vehiclecanquicklybecomeaglass-enclosedcoffin.
But for skilled operatives confined in their vehicle, a quick draw and an understanding of
thedynamicsofshootingthroughglassmaymeanthedifferencebetweenlifeanddeath.
Thequestionofwheretoholsteraweaponforeaseofaccesswhiledrivingdependsonthe
individual driver, but for a right-handed person, a weapon holstered on the left hip will be
accessibleviaacross-drawbutunimpededbytheseat-beltbuckle.
Whentakingaim,leaningbackanddownaffordscranialprotectionandkeepstheshooter
outofviewandawayfromglass.Windshieldsareconvex,curvedsurfaceswhosearctendsto
alterthebulletspathway.Tocorrect,operativesaimlow;ashotaimedthroughawindshield
atthetarget’spelvisshouldhitatchestlevel.
Operatives always fire multiple rounds, the first to break glass and the second to hit the
target,bracingforajolt.Becausethefirstshotisfiredinaconfinedenvironment,theresulting
noiseandpressurewillbeacute.
Mostcarwindowsaretemperedandlaminatedsothattheywillbreakintopetalsthatstick
togetherratherthanflyingapartintoshards.Butwhendealingwithglassofanykind,serious
injury can occur. If possible, push or kick the spidered glass out of the way for safety and
improvedaim.
063 WinaKnifeFight
Easy to acquire and menacing to behold, knives are often used by common criminals who
value their intimidation factor but lack a basic knowledge of knife fighting. For this reason,
operatives know that learning proper knife-fighting techniques can play a critical factor in
survivinganattack.
GuardingtheWeapon:Protectvitalorgansfromanopponent’sknifeandpreventtheknife
from being snatched by holding up a sacrificial guard hand and rotating the torso sideways.
Turn knuckles toward the attacker to protect the arteries and veins on the inner wrist and
forearm.
KnifeGrip:Anoperativealwaysmaintainsafullgriponhisknifehandle.Leavingthethumb
stretchedoutoverthetopofthehandleisextremelyunsafe,sohecurlshisthumbaroundthe
handletopreventinjuryandprohibitanopponentfromtakingtheknifeaway.
AnglesofAttack: To weaken an opponent, stab and slice along one of the eight angles of
attack. This kind of motion enables the operative to filet a muscle apart, disabling the
opponentandallowingtheoperativetogaintheupperhand.
CutPoints:Inalife-or-deathstruggle,anoperativewilltrytostabanopponentinoneofthe
body’slargearteriestocausealethalinjury.Thefemoralartery,locatedontheinsideofeach
thigh,hasthegreatestchanceofbeingleftunguarded.
CivilianBLUF: Aknifethatisnot usedsafelyprovidesnodefense atall—it’smorelikelyto
imperiltheuserthantowoundhisattacker.
064 StrikeforaKnockout
Whenoperativesshoot,theyaimtokill—andwhentheystrike,theyaimforaknockout.
Thekeytoachievingaknockoutpunchistolandthehitinsuchawaythatitwillcausethe
brain to bounce back and forth in the cerebrospinal fluid. A hard punch that lands on the
temple,jaw,orchincancreateinjuriesinboththefrontofthebrain(a“coup”injury)andthe
back of the brain (a “contrecoup” injury), causing the opponent to lose consciousness and
givingtheoperativeplentyoftimetoescape.
Thepowerinawell-executedpunchcomesfromarotationalactioninthecore,amplified
by the momentum of a double step forward. To make sure the punch lands forcefully, an
operativewillaimhisknucklesthroughthebackoftheskull.Beforethrowingthepunch,he’ll
employaseriesofjabswithhisnondominanthandtodistractandweardowntheopponent,
usingtheelementofsurprisetodeliverahard-hittingstraightpunchwithhisdominanthand.
While hand-to-hand combat is never strategically desirable, even the best-laid plans are
subjecttounexpecteddevelopments.Whethercaughtoffguardwhilepickingalockorsimply
avictimofbeinginthewrongplaceatthewrongtime,theoperativemayfaceanynumberof
opponents who are incidental to his mission. Drawing a weapon in such a scenario would
attract too much notice, so when taken by surprise the operative seeks to knock out his
opponentandclearthepremisesasquicklyaspossible.
065 DeliveraDevastatingElbowStrike
Trainedtoexecutedeadlyassaultsunderanypossiblecircumstance,ViolentNomadsarewell
versedinthemanyformsofhand-to-handcombat—andtheyarealwayslookingforthemost
efficientwaytoendafight.
The elbow is the hardest and sharpest point on the human body. When combined with
momentum and a calculated angle of attack, an elbow strike can result in a knockout,
breaking skin and causing serious injury. Though both punching and kicking can potentially
knockoutanopponent,elbowstrikesoffermoremaneuverabilitywhenengagingcombatants
in close proximity—and unlike punches, they can be employed in the all-too-common event
thatfightsaretakentotheground.
Properbodypositioningbeginswithabentelbow,withtheactivehandopenandthethumb
anchored to the chest. Keeping the thumb anchored to the chest prevents the arm from
straighteningwhilestriking.Thepowerinanelbowstrikecomeslargelyfromtherotationof
the core, with the elbow becoming the temporary holding spot for that momentum.
Straighteningthearmdilutesmomentumandincreasesrecoverytime.
Theulna,abladelike bonethatrunsthrough theforearm, can berecruitedasasecondary
point of contact; keeping the hand open prevents the forearm muscles from constricting and
envelopingtheulna,allowingthesharpanddeadlybonetorevealitself.
Thetakeaway?Aiminganelbowatthethroat,temple,orchinwillresultinastrikewitha
goodchanceofstunningorseriouslydebilitatinganopponent.
066 MakeanImprovisedTaser
Nothingcouldbelessalertingthanthesightofatouristtakingphotographs—andthat’sgood
news for Nomads looking to create improvised self-defense weapons out of ordinary
disposablecameras.
Nonlethaloptionsforself-defensearecrucialforaveragecitizensandoperativesalike,and
the use of Tasers is legal across most of the United States. Off-the-shelf models, however,
aren’t alwayseasytocomeby,soNomads must sometimes resorttoan improvised hack by
purchasingadisposablecamerawithintheareaofoperation.
Followingaseriesofmodifications,the camerabecomesahighlyeffectiveTaser—rewired
sothattheelectricitynormallyusedtopoweritsflashisdirectedintotwoprotrudingscrews,
their chargepowerful enoughtotemporarily incapacitateanassailant.Anopponent hit with
suchachargeislikelytofalltothegroundandbeincapacitatedforseveralminutes.Acharge
ofanywherefrom120to380voltswillradiatethroughtissueandnerves,interferingwiththe
brain’scommunicationwithmusclesbycreatingstaticwithinthebody.Theresult—impaired
motor skills and involuntary muscle contractions—creates a powerful, nonlethal option for
self-defense.Toconstruct,trainedoperativescarefullyfollowthesesteps:
DraintheCapacitor:Beforetakingthecameraapart,itisabsolutelyessentialtoremovethe
batteryanddepresstheflashbutton.Thiswilldrainthecapacitorofanystoredelectricityand
preventanaccidentalshockduringassembly.Ifthecapacitorisnotproperlydrained,therisk
ofinjuryisveryhigh.
Take the Camera Apart: Carefully remove the camera housing, then remove the circuit
board,flash,film,andbattery.Breakaparttheflashbulbassemblyandthecircuitboard.
Prep the Tools: Acquire a screwdriver, a pair of wire strippers, two four-inch lengths of
insulated wire, and two small screws. Before discarding the roll of film, cut and reserve a
smallpiece.
Rewire the Camera: Strip the lengths of electrical wire at both ends. Wrap the wire ends
aroundtheheadsofthescrews.Twistthescrewsintothecamerahousinginthespacewhere
thefilmrolloncesat.Wraptheopposingwireendstothecapacitorpostsandtapetosecure.
Thisredirectsthecamera’schargefromitsbatteryintothetwoscrews.
PuttheCameraBackTogether:Mountthecircuitboardintoitsoriginallocation,tucking
intheelectricalwirealongsideit.
InserttheSafetyMechanism:Placethepieceofreservedfilmbetweenthebatteryandthe
batteryterminalposttopreventthemechanismfromaccidentallydischarging.
Replace the Housing: With its exterior cardboard casing replaced, the camera will look
virtuallyindistinguishablefromthemodelsfoundinthebackpackofanytypicaltourist.
Incapacitate the Opponent: To use the improvised Taser, employ a stabbing motion to
drive the screws into the opponent’s flesh. A touch will deliver a significant jolt, but in the
eventthatthedevicedoesn’tdischarge,breakingtheskinshouldinjureanattackerenoughfor
theoperativetogaintheupperhandandmakearapidescape.
Note: Creating an improvised Taser is much more dangerous than it seems. Anyone
attempting to do so should avoid touching the camera’s capacitor or any part of its circuit
boardwhilethecapacitor is charged.Theelectricity willdischarge, causingasignificant and
potentiallydisablingshock.OnlydischargetheTaserincasesofextremeemergency.
067 MakeanImprovisedExplosiveDevice
Intheabsenceofbackupfromfellowteammates,theoperativelookingtoinfiltrateatarget’s
homemustrelyonimproviseddiversionarydevicestodistracttheenemy’ssecurityunit.Used
aspartofmilitarycampaignsforcenturies,diversionsareparticularlyhelpfulforcombatants
workingalone.
Two diversionary devices can be made from a disposable lighter. The first creates a
momentary flash that will temporarily blind an opponent without damaging surrounding
property (see page 168); the second launches an explosion equivalent to that created by a
quarter stick of dynamite. Unlike Molotov cocktails and many other types of homemade
explosive devices, this tool can be set off without advance modifications—which means it
won’tarousesuspicioniftheoperativeissearched.Allthat’sneededistapeandalighter.
To create an explosion sizable enough to cause injury, damage property, and create a
sustainedsenseofdisorder,operativeschooseamodelfueledbycompressedratherthanliquid
gas;thoughnolongersoldintheUnitedStatesduetotheirassociatedhazards,compressedgas
lighterscanreadilybefoundoverseas.
The trick works by loosening the flame adjustment gear from the lighter body until gas
beginstoleak.Whenthestrikerwheelisrolledtolighttheflameandthelighterismountedat
adownwardanglewithtapeorzipties,theflamewillbegintomelttheplasticcasing.Aftera
minute or two,theflamewillburn throughthecasing,ignitingallthegas inthecanister in
onefellswoop.
068 MakeaDiversionary“Flash”Device
Explosions, car accidents, fire alarms, power outages . . . These are just some of the
“incidents”thatseemtofollowoperativesaroundtheglobe—handydiversionsthatdrawthe
attention of law enforcement officials, bystanders, or targets while the Nomad accomplishes
his mission and vanishes into the night. In the face of sudden attack, diversions can also be
usedtofacilitateescape,whichiswhycarryingadiscreetandportablediversionarydevicecan
bealifesaver.Madeintwominutesorlessfromanordinarydisposablelighter,theimprovised
devicecreatesablindingflashthat,whenusedindarkness,canimpairthehumaneyeforupto
tenminutes.
Mimicking the action of a stun grenade or “flash bang” device, the device works by
isolatingandheatingupthelighter’sflint—madeofmetalcompoundsthatheatupquicklyand
produceaburstofincandescenceuponcombustion.Whentheheatedflinthitstheground,the
resulting flash is significant enough to be mistaken for an explosion. In essence, the gesture
takesthelighter’slifetimeofsparkandusesitupallatonce.
069 MakeaMolotovCocktail
Theclassicweaponof rebellionandurbanwarfare,theMolotovcocktailearneditsmoniker
during World War II and has been around since the Spanish Civil War. To this day, the
incendiarydeviceremainstheweaponofchoicefordisenfranchisedagitatorsandanyonewho
lacksaccesstomoresophisticatedtoolsofcombat.Becauseitcanbelaunchedoverbarricades
or gates, it creates an option for street-level combat targeting highly guarded buildings or
compounds.
For Violent Nomads seeking to disguise their actions as those of ordinary citizens, a
Molotov cocktail provides a quick-to-assemble solution that can be thrown from a distance
and sow a vast amount of chaos—without leaving any trace of governmental involvement.
Apart from its obvious offensive uses, it may be employed as part of a campaign of
psychological warfare (page 186) or as a diversionary tactic, drawing the attention of
onlookersandsecurityforcestoaflamingcar whiletheNomadstealthilyinfiltratesatarget
building.
Thoughabasicversioncanbemadebyfunnelingfuelintoaglassbottle,additionsofmotor
oilandsoapcreateamoreflammabledevice.Motoroil,beingthickerthangasoline,createsa
longer-lastingfire.Shavingsofsoapcreateagellingeffect(particularlyifthemixtureisleftto
sitovernight),makingforapotentnapalmlikesubstancethatspreadsandstickstosurfacesas
it burns. A fuel-soaked tampon becomes a flammable stopper and fuse. When the fuse is lit
andthebottlethrown,theglassshattersuponimpact,ignitingadeadlyandfast-movingfire.
070 PITaTargetVehicle
Most drivers tend to feel relatively safe when they’re inside their vehicles. Especially when
traveling through familiar areas, they become complacent, failing to pay attention to their
surroundings—whichiswhytargetingabadguy’svehiclealongthemostvulnerablepartofhis
routeprovidesasolidoptionforNomadslookingtocreatean“accident.
As expertsinboth offensive anddefensivedrivingtechniques,ViolentNomads know how
to turn an automobile into a highly effective weapon. A properly executed vehicular attack
willincapacitateor eliminatea target without anyattributiontoofficial channels. One such
method is the PIT (Precision Immobilization Technique). Used for decades by U.S. law
enforcement, PITing is a pursuit tactic that forces a fleeing car to abruptly spin sideways,
causingthedrivertolosecontrolandcometoastop.
ThekeytoPITmaneuversisfortheoperativetomaintainhisspeedthroughoutthecollision
process.PITingatspeedsoflessthanthirty-fivemilesperhourwillcausethetargetedvehicle
to spin sideways and crash. PITing at any speed greater than thirty-five miles per hour is
considered a lethal technique that will likely result in the targeted vehicle rolling over
completely; high-center-of-gravity vehicles such as SUVs and vans are susceptible to rolling
overifPITedatspeedsoflessthanthirty-fivemilesperhour.
ThehighlyskilledNomadwillconductaPITmaneuverwherethereistheleastlikelihood
ofbeingobserved,seamlesslyspeedingawayfromthesceneandanypotentialwitnesses.
071 PistolDisarmament:PointedatChest
If a masked man emerges from the shadows, aiming a weapon at a target’s chest at short
range,receivedwisdomsaysit’stimetoraisehandsandsurrender.Insomecasesthatmaybe
thewisestchoice.Iftheattackerdemandsawallet,avehicle,orvaluables,handthemoverand
allowhimtoescape—butiftheattacker’saimistoabductorshoot,fightingforcontrolofthe
weaponisapropositionwhoseoddsarebetterthanmightbeassumed.Inscenariosbasedona
shooterandanunarmedtarget,militarydrillshaveshownthatthepartywhomakesthefirst
moveismostoftenthepartywhoprevails.Evenwhenstartingfromadistanceofsixtoeight
feet,unarmedtargetsarefrequentlyabletoruntowardanddisarmashooterbeforehepulls
thetrigger—benefitingfromadelayedresponseastheshooterprocessesunexpectedactions.
Whiledisarminganadversaryisahigh-riskmaneuver,Nomadsusethefollowingprotocol
toincreasechancesofsuccess.
PivotandTraptheWeapon:Theoperativeshouldclasptheopponent’shandsandthebody
ofthegunwhilepivotinghisbodyoutofthelineoffire.
DrivetheBarreltowardtheAdversary:Twisttheweapontowardtheadversary’sforearm.
Pull the Weapon Away: Continue to drive the barrel of the weapon over sideways while
wrenchingitaway.
Gain Control of the Weapon: Having pried the weapon from the opponent’s hands, the
operativeshouldbackawayquicklyanddoasystemschecktoensurethattheweaponisready
tofire.Takeaimandbereadytoshootiftheopponentdrawsabackupweapon.
072 PistolDisarmament:PointedatBack
Theelementofsurprisecanbeapowerfulweapon.Whichiswhycriminalstendtosneakup
on their targets from behind—springing out of bushes as targets unlock their front doors,
sliding out from behind parked cars as targets dig around for their keys, slinking out of the
shadowsasthetargetismid-transactionatthecornerATM.
Whileanunseenweaponcancauseaninstinctivelock-and-freezeresponse,evenwithagun
pressed against his back, a well-trained operativecan control the outcome of a violent
altercation. If an attacker simply wants material goods, even an experienced operative may
choosetohandthemoverandallowhimtoescape.Thethreatofkidnappingorbodilyharm,
ontheotherhand,willbemetwithaswiftandsuddenresponse.Attheoutset,theoperative
willpushbackagainsttheweapon;onsemiautomaticmodels,thiscouldpreventtheweapon’s
firing mechanism from engaging. Then, using a pivot-and-sweep motion, he will trap the
weaponinhisarmpitinasurprisinglyeffectivehold.
073 SurviveanActiveShooter
Populardepictionsofshootingspreeshavevictims(orsoon-to-bevictims)coweringhelplessly
in the face of drawn weapons, even when targets vastly outnumber the shooter or shooters.
Historyhasshown,however,thatalackofactioninthefaceoflivefirewillradicallyreducea
target’schanceofsurvival.
Whether they’re under attack from a lone wolf or a band of terrorists, the three tactics
availabletocivilianscaughtinlivefirearerunning,hiding,andfighting.Runningisthefirst
option,andfightingisthelast.
Run:Iftheassailantisfarenoughawayandthereappearstobeanescaperouteimmediately
available,considerattemptingtorun.Leavebelongingsbehindandrunwithaplaninmind.It
isharderforashootertohitamovingtarget,somoveinazigzagpatternand/orfromcoverto
cover.
Hide:Ifexitingthepremisesisnotachievable,thenextstepistofindthesafestareaavailable
andsecureitaswellaspossible.
• Hide somewhere out of the assailant’s view and silence cell phones and other digital
devices.
• Lock the door, if possible, or create a barricade. Block the door using whatever
materials are available: desks, tables, file cabinets, other furniture, books, etc. Close
blindsandcurtains.
•Targetsshouldattempttoputsomethingbetweenthemselvesandtheassailant.Ifina
roomwithacloseddoor,hidebehindsolidobjects,awayfromthedoor.(SeeIdentify
EmergencyBallisticShields,page22,forpreferredobjects.)
• Call out for help using mobile devices, landlines, email, text, and radios to get first
respondersmovingtothelocation.
•Placesignsinexteriorwindowstoidentifythelocationofinjuredpersons.
•Alwaysconsidertheriskentailedbyopeningthedoor.Theassailantmaybangonthe
door,yellforhelp,orotherwiseattempttoenticetargetstoopenthedoortoasecured
area.
Most ricocheting bullets follow the path of the floor, so when bullets are flying, squat or
move to hands and knees rather than lying down; when taking shelter from grenades or
explosives, lie on the floor with mouth open (to prevent pressure from rupturing lungs) and
feettowardtheexplosion,withfingersinterlacedbehindhead(toprotectbrain).
Fight:Fightingisanoptionoflastresort,tobeusedonlywhenallotheroptionshavefailed
orareunavailable.Theimportantthingtounderstand,however,isthatfightingisanoption:
Itis possible for unarmed targets to effectively disarm and incapacitate an armed assailant,
particularlyiftheyoutnumberhim.Remember,aguncanonlybeshotinonedirectionatany
one time. Attackers often assume that their targets will be cowed by the sight of their
weapons;anyoffensivereactionislikelytocatchthemoffguard.
Professionalfighttrainingprovidesadvantages,butevenuntrainedpeopleunaccustomedto
fightingcanbeofservice,particularlyifthey’reactinginagroupinwhichonepersonorteam
aimstosubdueorovercometheshooter’supperbodyandtheothergoesforthelegs.Theaim
istocontroltheweaponandthencontroltheshooter,gettinghimonthegroundorknocking
himoutinordertoescape.
Actwithphysicalaggressionandviolence.
Throwanythingavailableattheassailant.
Workasateamwhenwithothers.
Alwaysactconsciously,nomatterhowlittletimetheremaybe.
Use improvised weapons to strike the shooter—tools, sporting goods, any hard and dense
objects available. Blind the shooter with anything that burns or blinds—cleaning products,
fuel,salt,pepper.Whenstriking,continueuntiltheshooterhasbeenknockedunconsciousand
thereisnofurthermovement—donotstop.
Related Skills: Use Improvised Body Armor,page 20; Identify Emergency Ballistic Shields,
page 22; Pistol Disarmament: Pointed at Chest,page 174; Pistol Disarmament: Pointed at
Back, page176; Deliver a Devastating Elbow Strike, page 160; Strike for a Knockout, page
158;SurviveaGrenadeAttack,page184.
074 MakeanImprovisedGasMask
Alachrymatoryagentfrequentlyusedbylawenforcementasaformofriotcontrol,teargasis
the most common nonlethal chemical weapon in the world. Irritating the eyes, nose, throat,
and skin, the substance causes debilitating short-term effects ranging from sensations of
intensepain,burning,andsuffocationtotears,temporaryblindness,blistering,andvomiting.
Butbeyondthephysicaleffectsliesapotentiallygreaterthreat:Exposuretoteargasmaybe
aprecursortomassdetention.Onceacrowdhasbeenimmobilized,lawenforcementofficials
may take the opportunity to perform a round of indiscriminate arrests. Given that foreign
governments sometimes use Western detainees as a form of political currency, accidentally
gettingcaughtupinsuchagovernmentcrackdownisaveryrealconcernforanytravelersin
unstableregions.
The first tool of self-defense against violent methods of crowd control is a well-honed
awareness of third-party activity. Follow common sense in generally avoiding areas where
protestorscongregate.Ifanoperativepassesthroughsuchanareaandsensesimminentchaos,
heseekstoclearthepremisesasquicklyaspossible.
Ifhecannotavoidtravelingthroughareaswheretheuseofteargasisapossibility,hewill
createanimprovisedgasmaskfromanemptyplasticjug,asponge,andclearpackingtape.
Aspongesaturatedwithcleanwaterbecomesaneffectivefilter,andoncetapeddowntothe
operative’sfacethedevicewillactasanadequate(butnotairtight)temporarygasmask.
075 SurviveaGrenadeAttack
While grenade attacks used to be relegated to active combat zones, they are increasingly a
feature of surprise acts of terrorism as well as civil unrest. Though they are most often
unanticipated,suchattacksposeariskthatcanbemitigated.
Agrenade’sexplosiontakesapredictableupside-downconeshape,generatingablastwitha
six-meter kill zone (depending on its model). While it may be possible for a bystander to
outrun the explosion in the seconds between impact and detonation, an upright posture will
leavehimvulnerabletoshrapnel.Ifcoverisn’tavailablewithinthreesteps,takeonegiantleap
away from the grenade and to the ground. The goal is to move out of the cone-shaped
explosionandawayfromthepathofshrapnel,whichrarelytravelsalongtheground.
Positionfeettowardtheblastinordertoprotect the brain. Crosslegs inordertoprotect
femoralarteries, coveringearstoprevent tympanicmembranesfrom rupturing.Keepelbows
tight against the rib cage and open mouth to regularize internal and external pressure and
preventthelungsfrombursting.
Know that in an urban environment, the danger of the blast will be compounded by the
landscape—cement buildings and glass windows joining a litany of potential hazards. The
explosionwillcreateasecondarysetoflethalprojectilesfromthesesurroundings.
076 WagePsychologicalWarfare
When long-term observation of a known criminal runs dry, operatives may resort to
psychologicalwarfareinordertoprovokeareactioninthetarget.
Ifatargetsuspectshismovementsarebeingwatchedandhaspareddownhisroutineand
contact with associates, inducing paranoia can reveal new intelligence. Who does the target
call when he is feeling cornered? Breaking a pattern might reveal new behaviors or third
partiesfortheoperativetoinvestigate.
Depending on the surveillance context, psychological warfare can involve techniques from
letter drops to “soft attacks” designed primarily to provoke fear rather than create damage.
Besieging a target with anonymous written communications (“We know who you are”) can
contribute to an overall sense of unease. Messages written as if they are coming from
neighbors mayconvincethetargetthatheissurroundedbyanall-seeinghordeof unfriendly
forces—andresultinhiscallingouttoassociatesforassistance.
Harassinggesturesmayescalatetovandalismorsoftattacks.Usinglong-rangetacticssuch
as throwing Molotov cocktails (see page170) or scattering gunshot from a moving vehicle,
operativesworkingalonecancreatetheillusionthattheyarebackedbyabandofmany.
Thegoalinpsychologicalwarfareofanysortistodistortatarget’sperceptionofrealityin
ordertobringaboutachangeinbehavior.Stoppingshortoffull-fledgedattacks,suchtactics
allow the operative to remain unseen, continuing his surveillance mission from a more
powerfulposition.
PARTVIII
SANITIZATION:LEAVENOTRACE
077 LeaveZeroDNABehind
ThoughDNAsamplescanbeliftedfromtracequantitiesofmucusandsweat,therealculprits
inforensicidentificationarehumantissueandskincells—whichiswhythemostmalevolent
classofcriminalsandrapistswillgoasfarasscrubbingdownandshavingtheirentirebodies
andheadsinordertosloughofflooseskincellsandremovethepossibilityofbeingbetrayed
by a stray hair. (Cut hair produces variable forensic results, but cells taken from the root
containvaluablegeneticinformation.)
A thorough full-body scrub highly reduces the odds of leaving trace DNA behind, so an
operativestartsfromthetopandworkshiswaydown,brushinghishairashewashesit.
Heselectsclothingthatcovershisentirebody,hot-washingitmultipletimesorpurchasing
itnew. Denim andcottonarethemost commonfibersintheworld—andthereforetheleast
traceable.Whenbuyingclothing,hetakescarenottotouchit.Hepurchasestheitemsnextto
theclothingthatwillactuallybewornsoastoavoidcontactwhenpullingthemofftherack.
Heappliesglovesbeforegettingdressedandwearsahattocontainhishair.
Onceontarget,hecovershismouthandnosewithasurgicalmaskorafull-faceskimask
to avoid the spread of saliva or mucus. He touches only what is necessary and nothing else.
Attemptingtocleanacontaminatedsiteisasearchforaneedleinahaystack—besttoavoid
leavingtracesfromthestart.Oncesafelyawayfromthetargetzone,heburnsalloperational
clothing.
078 LeaveZeroFingerprintsBehind
As criminals and law enforcement officials know, the efficacy and frequency of fingerprint
matchingtendstobeoverstatedinthepopularmedia.Alegalcorrelationmustdisplayamatch
amongadozenormore“minutiae,”theridges,whirls,andbifurcationsthatrendereachprint
unique—but movement and natural oils often cause smudging and other imperfections. Still,
operativestakeextrememeasurestoavoidleavingidentifyingevidencebehind.
The key to sanitization is covering fingerprints and thoroughly cleaning tools. This is a
lengthyprocessthatlastsfromthebeginningofanoperationtoitsend—foranoperativewho
covershistrackswhileontargetbutfailstoproperlysanitizehisgetawayvehicleortoolsisan
operativeindangerofgettingburned.Aspartofmissionprep,hesanitizesanygear(lockpicks
orweaponsneededforthatparticularmission)bywipingitdownwithanacidsuchaspaint
thinnertobreakdownoils.Hethoroughlysanitizestheoperationalvehicle.
Healso switchesout glovesateachstage of the process to avoid transportingidentifiable
fibersorsubstancesfromthesafe house to thetarget. In asetting where gloveswoulddraw
toomuchnotice—retrievinginformationinanofficeorduringtheday—hefillsinthetroughs
offingerprintswithsuperglueorfilesdownfingerprintswithapumicestone.
Operativesseekingtoerasetheirfingerprintsoveralongerperiodmayseektoprocurethe
chemotherapy drug Capecitabine, as pharmaceuticals are only loosely regulated in many
foreigncountries.Asasideeffect,thedrugcausesinflammationandblisteringonthepalmsof
handsandsolesoffeet,sloughingoffskincellsandprints.
079 LeaveZeroDigitalTraceBehind
Themost dangerous element inanygivenenvironmentmaybe thedevicefoundinthepants
pocket of the majority of civilians in the developed world: a cellular phone, an electronic
tether that could be employed to track a target’s every move. This inadvertent digital
scrapbookcanalsobeusedtocreateadetailedbiography—includingnotonlyaccesstobank
accountsbutalsoinformationaboutfamilyandfriends.
In areas where communications companies are owned and operated by host-nation
governments, digital security becomes particularly relevant. Any foreign phones pop up on
cellular networks as outsider devices, and as such, become increasingly vulnerable to being
tracked.Whenpossible,operativesprefertopurchaseprepaid,contract-freephonesinsidethe
hostnationratherthanbringingintheirown.
Intheeventthattheydotravelwithelectronics,operativesprotectthembyeithershielding
orfullydisablingthem.Cellphones,tablets,andlaptopscanbeshieldedfrombothincoming
and outgoing signals by a pocket made out of a quadruple layer of aluminum foil. (Smart
deviceswillplowthroughsingleordoublelayersbyredirectingalloftheirbatteries’energies
toward finding a signal.) The foil must be tightly compacted around the device, leaving no
gaps.
A more polished option is a discreet shielded carrying case (e.g., Zero Trace) embedded
withadoublelayerofmetalfabricthatblocksallsignals,inobservanceofCIAprotocol.
Because many cell phones employ small backup batteries that run even when phones are
turned off, in the absence of a workable shield, removing all batteries and SIM cards is the
onlywaytorenderaphonecompletelysafefromanyvulnerabilities.Asthisisn’tpossibleon
somephones,sometimestheonlyoptionistoleavethedevicebehind.
080 TrickFacialRecognitionSoftware
ForgedidentificationpapersgrantanactiveNomadanimportantlayerofanonymity—butif
hehasalreadybeenidentifiedbyforeigngovernmentsas aprobablesecurityrisk,hispicture
may come up in a database at border crossings or other high-security checkpoints. Current
facialrecognitionsoftware,basedonimagery,isstillrelativelyeasytobypass,sotheNomad
willproceedasplanned.
Usingalgorithmsthatcompareparticularanchorpointswithinagivendatabaseofimages
noses,thespacebetweeneyes,thesizeofeacheye,theshapeofcheekbones,chins,andears—
the technology focuses on distinctive bony prominences that cannot be readily altered. But
covering up or otherwise obfuscating those anchor points leaves the software little to work
with.
Largesunglassesandlongbangscanbeusedtocovertheforehead,browbone,andpartof
thecheekbones.Ahatpulleddownlowandadownward-tiltedheadcanthrowanoperative’s
faceintoshadow.Smilingchangestheshapeoftheeyesandpushestissueoverthecheekbones,
whichiswhymanycountriesrequireaneutralfacialexpressioninpassportphotos.
FrequentlyinuseinLasVegascasinos,whereitpreventscheatinggamblersfromsiphoning
off millions of dollars in revenue, facial recognition is an ever-evolving science. As social
media platforms begin to use it to tag and sort through images, it will only grow more and
more sophisticated. One day facial recognition will be a well-oiled mechanism utilized to
secureanythingfrombordercrossingsandATMstoprivatehomesandbusinesses,alongwith
the up-and-coming vascular identification technologies that take thermal pictures of human
faces, using the positioning of facial veins and arteries as the basis for identification and
leavingfewifanyoptionsforsubterfuge.Butfornow,thetechnologyleavesplentyofgapsfor
aNomadtoexploit.
081 TrickFingerprintScanningSoftware
The most widely used form of biometrics, fingerprinting is increasingly traveling from the
criminal justice system into the realm of consumer electronics. Harnessed for such uses as
unlockingsmartphones,authorizing payments, and securingdoors or safes, the technology is
becoming more widespread. As it does, its quality becomes more variable, displaying
vulnerabilitiesforNomadsandcommoncriminalstoexploit.
For an operative, collecting fingerprints is frequently a postmortem scenario. Performing
“battledamageassessment”intheaftermathofaplannedeventsuchasanexplosion,hemight
be tasked with gathering biometric information in order to confirm the target’s identity. In
suchcasestheoperativewillgothemostdirectroute:severingthetarget’sthumb.
Butthumbprintscanbereplicatedvialessviolentmeans,oneofwhichinvolvesthechewy
candy known as the gummy bear. Malleable and tacky, gummy bears are exceptionally
receptivetofingerprints.Becausetheyhaveaconsistencysimilartothatofhumantissue,they
arealsowell-suitedtodeceivinglower-qualityfingerprintscanningmechanisms.
Cheap scanners dont read depth, which is why they won’t register the fact that a
fingerprint’stexturalpatternhasbeenreversed—theridgesturnedintovalleys,andviceversa,
as they are transferred onto the gummy bear. When confronted with more sophisticated
technology, Nomads use a combination of Silly Putty and gelatin, impressioning the Silly
Putty, then pouring a gelatin solution into the clay and letting it sit until it gels. Carefully
removingthegelnetsaduplicatefingerprintthat’samatchforpatternandisimpressionedto
properdepth.
082 CreateaHastyDisguise
In the real world of covert operations, disguise doesn’t follow the well-worn conceits of spy
moviesandthrillers—thebathroomdyejob,theuseofmasks.Instead,aneffectiveandrapid
transformation relies on illusion, employing tricks of perception rather than true disguise. A
few props can turn a businessman into a service worker, and a change in color pattern can
causeatargettovanishfromsight.
In attempting to evade surveillance teams, operatives employ a working knowledge of
surveillance psychology.Whatdoes a surveillanceteamactuallysee whenthey’re watchinga
target?Particularlywhenwatchingfromadistance,asurveillanceteamwillhomeinoncolor
blocksratherthanfacialfeaturesorhairstyle,usingbroadvisualstrokestokeeptrackofthe
target’s movements. Over time, the colors of the target’s clothing become ingrained in the
surveillance team’sbrain—insteadofscanningforthetarget, theyunconsciouslyscanforthe
colors he’s wearing. An easy way to subvert their expectations is to duck into a public
restroomorfittingroomandveryquicklyswitchouttodifferentcolors.Ifwearingwhiteover
denim,switchtoblackoverdenimandwalkrightoutthedoorwithoutbeingspotted.
Anotherwaytomanipulatetheexpectationsofasurveillanceteamistostartoutinbright
colors. Thiswillcausetheteamtorelax,secure intheknowledgethattheyarewatchingan
easy mark. When the operative emerges from a stopping point in a muted outfit, he’ll be as
goodasinvisible.
083 GetPastaGuardDog
WhenNomads writeupa reconnaissancereportona target’shomeor business, theyalways
include a full accounting of any animals they come across. Even untrained dogs, when
spooked,cangiveawayaNomad’slocationoralertanownertothefactthatsomethingout
of the ordinary is under way. Any infiltration plan must include measures for distracting or
subduing pets or guard dogs while the Nomad goes about his business—and particularly in
third-worldcountries,operativesmustalsobewaryofthewilddogsthatroamthestreetsin
packs.
Killingguarddogsleavesbehindatrailofunwantedevidence,soNomadsresorttotactics
thattemporarilydisableordistracttheanimal.Acaninedeterrentspray,equivalenttopepper
spray, will irritate a dog’s eyes and carries a smell that dogs find extremely unpleasant. A
burstofcompressedair(theproductusedtodustelectronics)willfreezeadog’snoseandhave
him running for cover. Compressed to fluid form, the mixture of nitrogen and other gasses
undergoes a massive drop in temperature upon being released from the can; when emitted
fromacanthatisturnedupsidedown,thegaswillsprayoutasliquidandimmediatelyfreeze
toice.
Though challenging to come by in any scenario, female dog urine is one of the most
effectivecaninedistractiontoolsinaNomad’sarsenal.Sprayedinadog’sfaceorawayfrom
theentrypoint,itsscentprovesanirresistibleenticementforanyattackdog,nomatterhow
welltrained.
084 DiscreetlyClearaFloodedScubaMask
To operatives carrying out missions with complex logistics, diving is just another form of
clandestine movement—one that is well known to the drug cartels that move thousands of
kilograms of contraband across the world via submarine (the ocean floor being nearly
impossibletopolice).
While swimmingacross openwatersruns the riskofdetection, divingkeeps theoperative
concealeddeepunderwater,givinghimastealthywaytoattackboats,piers,andbridges.Its
also an unexpected means of escape. Upon accessing a cache of scuba gear submerged at a
predeterminedlocation(seepage38),aViolentNomadcoulddisappearforeverwithasingle
breath-hold.
Scuba diving’s flexibility comes with its fair share of vulnerabilities. Entry and exit pose
complex logistical challenges, and medical hazards are abundant, especially for an operative
divingalone.Typically,aNomadcannotstayunderwaterforlongerthanthreehours,soany
tacticalplanmustaccountforthislimitation.
Thoughtheriskofdetectiondiminishesoncetheoperativeisunderwater,onetelltalesign
of activity—easily observed in a quiet harbor—is the trail of bubbles emitted by the overly
hastyclearingofascubamask.
085 DisposeofaBody
Withapreferenceforvehicularcollisionsanduntraceableinjections,aViolentNomadalways
attempts to disguise an assassination so that it looks like an accident. But sometimes a hit
simplygoesbad.ANomadmakesmistakesthatcouldleadtohisidentificationorissurprised
mid-missionbyanincidentalthirdparty.
In order to safely extricate himself from the area of operation, the Nomad must first
disposeofthecorpse.
Land Burial: Compared to a typical horizontal burial site, a vertical grave leaves a
significantly smaller footprint aboveground—and less surface area means a smaller signature
fordogstosniffout.Thegraveisdugtwofeetdeeperthanthelengthofthe body, whichis
lowered down headfirst so that organs (which give off the most scent) are buried deep
underground.
ThermalBurial:Toeradicate alltrace ofa body, a cremationchamber canbe replicatedby
fillingafifty-gallonsteeldrumhalfwayfullwithjetfuel.(Jetfuelcanbecommandeeredfrom
small private airports with minimal security.) After about two hours, bones and teeth will
have turned to dust, making any identification near impossible. This method will give off a
significant amount of smoke (more easily spotted during the day) and flame (more easily
spottedatnight)andmustbeundertakenindesolate,ruralenvironments.
Maritime Burial: The least discoverable burial site is a watery grave at the bottom of the
ocean floor, a few nautical miles offshore. Weighted down by fifty pounds of steel pipe,
bricks,or cinder blocks,thebodyis wrappedinalayer ofperforatedconstructionplasticor
ground cloth so that air bubbles wont prevent it from sinking. An operative will secure the
plasticwithadoublelayerofchickenwiretopreventbodypartsfromfloatingtothesurface
asthebodyisattackedbymarinelifeordegradesovertime.
PARTIX
EXFILTRATIONANDESCAPE:HOWTO
DISAPPEAR
086 CreateaRappellingHarness
Combinedwithanimprovisedrope(see page 212) a rappellingharnessmadeout ofa single
bedsheet could be the key to a safe and fast escape. For an operative, it may also allow for
access to a targets room from a building facade. Once the mission has been executed, the
operativevanishesandthesheetisdiscarded—anuntraceable,anonymousartifactswipedfrom
ahotelroomorpurchasedunderanassumedname.
Aking-sizesheetwillcreateaharnesslargeenoughforadults,whilefull-sizesheetscanbe
used to create harnesses for children. A similar harness can be made from materials such as
one-inch-wide tubular nylon, cargo straps, furniture covers, and the plastic sheeting used in
commercial construction. An important additional layer of safety during rope descents, the
harnessensuresthatanoperativewon’tfalltohisdeathifhelosesholdoftherope.Relatively
safe,secure,andeasytomakeinlessthanthreeminutes,itprovidesthree“pointsoffailure”;
whensecuredtoanimprovisedrope,gravityandtensionshouldensurethatifoneloopfails,
theothertwowillcontinuetohold.
Asecureknotandproperropelengtharekeytoasaferappellingapparatus.Aropethatis
toolongnegatesthepurposeoftheharness,whichshouldallowtheNomadtobounce”(asif
fromabungeecord)afewfeetfromthegroundintheeventthathelosesholdoftherope.In
buildingtherope,useaguidelineofonesheetperstory.
RelatedSkills:EscapeaMultistoryBuilding,page212.
087 EscapeaMultistoryBuilding
The action heroes of the silver screen can be seen scaling the face of skyscrapers using all
manneroffuturisticsuctiondevicesandlaser-cuttingrappellingtechniques.Intherealworld
ofcovertoperations,however,anescapefromamultistorybuildingislikelytobeassistedby
amuchmorehumbleprop:anordinarybedsheet.Whetherescapingafire,ahostagesituation,
or the scene of a crime, learning to create a dependable rope out of bedsheets will ensure a
swift exit from a multistory building, under any set of circumstances. Stronger than some
ropes, high-thread-count sheets represent another case in which improvised materials can
perform with greater effectiveness than their store-bought counterparts: One sheet may hold
hundreds of pounds of body weight. (Tensile strength increases with thread count, and an
increaseintensilestrengthcanhandlemoreweight.)
When checking into a hotel room, opt for a king-size bed—king-size sheets mean more
material,whichtranslatesintoadditionalropelength.Oncecheckedin,callthefrontdeskand
request additional sheets in order to gather enough rope length to make a potential descent.
Buildingstoriesareapproximatelytenfeettall,andoneking-sizesheetshouldprovidetwelve
feetoflength.
Tensilestrengthaside,theropewillonlybeasdependableastheanchortowhichitistied.
Thechosenanchorshouldeitherbepermanentlyaffixedtowalls,largerthanthewindow,or
heavier than the person it is holding—beds, radiators, large dressers or tables, and heavy
couches are all good options. In the absence of those possibilities, a chair wedged behind a
closeddoormaydothetrick.
Tiethesheetstogetherusingsquareknots,whichtightenunderstress,andalwaysleaveat
leastsixinchestoonefootoflengthattheknotends.Ifescapingfire,wetthesheetspriorto
tying them and make sure the anchor isn’t highly flammable. For added security, pair rope
withtheimprovisedrappellingharness,page210.
088 SurviveaDrowningAttempt
When an operative is captured in hostile territory, the odds of survival are low. Instead of
being taken to trial, he will likely simply be made to “disappear”—which is why operatives
practiceescapingwhilewearingundefeatablerestraintsonhandsandfeet,bothinwaterand
on land. Tied up, thrown into open waters, and left to drown to death, the well-trained
operative still has recourse to a few skills that can help extend his life until he is found or
reachessolidground.
Whenitcomestoself-preservationinwater,thekeytosurvivalisbreathcontrol.Withthe
lungs full of air, the human body is buoyant—so deep breaths and quick exhales are key.
Buoyancyinfreshwaterismorechallengingbutstillachievable.Panicking,whichcanleadto
hyperventilation,isthenumber-oneenemytosurvival.
Restraints and body positioning may make breathing a challenge, but repositioning is
always within the Nomad’s grasp. In shallow waters, use a sinking and bouncing approach
(seediagram)totraveltowardshore,ricochetingofftheseabedorlakeflooruptothesurface
foraninhale.
Whenfacingdown,whetherfloatinginplaceorusingabackwardkickingmotiontoswim
toshore,theoperativeshouldarchhisbackinordertoraisehisheadabovewater.
In rough seas, this may not give him enough clearance to get his head out of the water.
Instead,afullbodyrotationwillallowhimtotakeadeepbreathandthencontinuetraveling
forward.
089 EscapefromanAutomobileTrunk
ViolentNomads frequentlyoperateinornearcountriesthatareatwaror inpolitical crisis,
andthusarevulnerabletobeingkidnappedforransom—sometimesasacalculatedattemptto
thwartamission,sometimessimplyasaresultofbeinginthewrongplaceatthewrongtime.
Moreandmorefrequently,travelerstounstableregionsfacethesamerisk.
Themostpredictablepointsofvulnerabilityinatraveler’sschedulearehisdeparturefrom
andreturntohishotelatthebeginningandendofhisday—butanabductionmayalsobethe
result of a staged automobile accident. Common ruses used by kidnappers to apprehend a
targetontheroadinclude:
TheBump:Theattackerbumpsthetargetsvehiclefrombehind.Thetargetgetsouttoassess
thedamageandsuddenlyfindshimselfinthetrunkofacar.
The Good Samaritan: The attackers stage what appears to be an accident or feign a car
problem.Thetargetstopstoassistandsuddenlyfindshimselfinthetrunkofacar.
The Trap: Kidnappers use surveillance to follow the target home. When he pulls into his
drivewayandwaitsforthegatetoopen,theattackerpullsupfrombehindandblockshiscar.
Thetargetfindshimselfinthetrunkofacar.
Ineachofthesescenarios,thetargetendsupimprisoned.Buthedoesnthavetoremainin
that state. Take the time to understand how a vehicle’s trunk operates, learning its
vulnerabilitiesandhowtodefeatthem.Iflockedinatrunk,alwaystrytobepositionedina
waythatallowsaccesstoescapetools.
090 DevelopaBug-OutRoute
While a well-concealed cache of escape tools is an essential component of mission prep (see
page16),themostvitaltoolofescapeisn’tashimoracompassbuta meticulously planned
emergencyroute.Whenunexpecteddevelopmentsarise,operativesmustbeabletoensuretheir
ownsafeexitoutofanareaofoperationtheyneverofficiallybreached.
Planningprimaryandalternateescaperoutesisaweeks-orevenmonths-longendeavorthat
requiresthedevelopmentofasignificantamountofareaknowledge.Operativescanvassroads
to determine the quickest and most discreet routes of escape. They use a thorough research
process that identifies friendly and unfriendly areas—and assume they are at risk of being
followed, ambushed, or chased. They look for routes least likely to be observed by third
parties or to include dead ends, checkpoints, or choke points. And they create bridges from
their primary route to their alternate routes, building a network of secondary branches they
canveerintointheeventthattheyarefollowedorencounterunexpectedroadblocks.
Oncethey’veestablishedtheirroutes,operativesidentifytemporarylodgingorhidesites—
stopping points that will enable them to travel by night and rest by day. Using detailed
calculationsbasedonmileage,speed,andtheavailabilityofsuppliesinsurroundingareas,they
stage caches of food, water, and life support at predetermined points along the routes. They
mayhidealternatevehiclesatcachepointsinordertoshakeoffpotentialtailsorsetuprally
pointswherethey’llmeetknownassociatestohandoffintelligenceorotherassets.
Loadedintoapassword-protectedGPSthatisstashedintheoperative’sboltbag,thebug-
outroutesprovideaneffectiveformofoperationalinsurance.Themorecomplexanddetailed
they are, the better—emergency exfiltration is one of the many areas in which research and
attentiontodetailcanwinoutoverbruteforceandeventhemostwell-armedpursuers.
091 PerformaJ-turn
Onlyinthemoviesdooperativesroutinelydrivethroughbarricades,offofbridges,andonto
thewrongsideofhighways.Inreality,high-octanevehicularmaneuversarerarelydeployedin
thefield.Inmostcases,escalatingatensesituationintoachaseisatacticaldisaster;engaging
ina highlyconspicuousmaneuverwhenitisn’twarrantedonlygives theadversaryreasonto
comeaftertheoperative.
Still, there are times when properly executed evasion techniques can mean the difference
between mission success and detention—which is why Nomads regularly rehearse them in
abandonedparkinglotsoronuntraveledruralroadspriortoanoperation.
The J-turn, Forward 180, or “Bootleg Turn” allows a Nomad to quickly shift the
momentumofthevehiclefromonedirectionoftraveltoanotherwithinthewidthofatwo-
lane road. To properly perform a J-turn, the Nomad must first master the vehicle’s braking
systems.Theinitialattemptisnevermadeduringacrisis.
The coordinated use of the emergency brake and release is essential for the maneuver,
keepingthevehicleundercontrolby“lockingup”therearbrakes.Avoidingtheuseofthefoot
brakepreventsthefronttiresfromslidingorskiddingandwardsoffalossofmomentumby
the keepingtheheavy,engine-bearingfrontof thevehiclefrom degradingand“sinking”—an
effectwhichwouldpreventthevehiclefrompivoting.
The steering wheel must be turned quickly and aggressively. As the car rotates a full 180
degrees,removeleftfootfromtheemergencybrakeanduserightfoottopresstheaccelerator.
Topreventthetiresfromrollingofftherims,ensuretirepressureisaminimumoffivetoten
poundspersquareinchovermaxpressurelimits.Sinceeveryvehicleisdifferent,speedsmust
be greatly reduced when conducting maneuvers in high-center-of-gravity vehicles such as
trucksorSUVs.Evenfortraineddriversanyspeedgreaterthanthirty-fivemilesperhourmay
resultinflippingthevehicleandshouldbeavoided.
092 PerformaReverse180
When time is of the essence, a cumbersome U-turn is not the best tool in an operative’s
arsenal.U-turnsalwaysinvolvetheriskofbecomingtime-intensivethree-pointturns;atahigh
speed,theycanalsoresultinpoppingatireonthecurbordrivingofftheroad.Inanattack
situation,aReverse180isthefastestwaytoreversethedirectionoftravel—butthemaneuver
should be attempted only in extreme emergency, by highly skilled drivers when under
imminent,life-threateningdanger.Performedincorrectly,aReverse180couldflipavehicleor
permanentlydamageitstransmission.
The turn should be performed at speeds no greater than thirty miles per hour. Emergency
brakes must be in good working order, and a seat belt must be used. Though in order to
reducefrictionthemoveisbestperformedonwetorslipperysurfaces,inanyenvironmentit
producesastressthatcarsarenotdesignedtoaccept.Inotherwords,theReverse180isnotto
betakenlightly.
Reverse: Starting from a complete stop, shift into reverse and drive backward for three car
lengths.Stayundertwenty-fivemilesperhour.
TurntheWheel:Shiftgearstoneutral,removefootfromthegaspedal,andyankthewheel
allthewaytotheleftasquicklyaspossible.
HoldtheWheel inPlace: Hold the wheel in place until the vehicle has completed a 180-
degreeturn.Donotbrake.
Accelerate:Shiftbackintodriveandaccelerateawayfromattackers.
Note:If attemptinganescapeonaroadthatdoesnotallowsufficientwidthtoattempt the
turn,drivinginreverseinaslalompatternwillhelphandicaptheattackers’aim.
093 SurviveVehicularImpact
Due to their propensity for high-risk defensive and offensive driving techniques, operatives
have a tendency to fall victim to a higher-than-average rate of vehicular accidents. Surviving
these accidents while minimizing stress on the body is a matter of advance preparation and
posturalknow-how—techniquesthatapplytoanyciviliancaughtinacarcrash,whetherasa
resultofahigh-speedescapeorarun-of-the-millincident.
Whiletheabilitytosurviveacrashmightappeartoqualifyasdefensiveknowledgerather
thana“deadly”skill,self-preservationinthefaceofaccidentsorattemptedassaultsiskeyto
missionsuccess.Inordertoremaindeadly,aViolentNomadmustremainsafe.
One of the most commonly used steering positions—controlling the wheel with a hand
placedattwelveo’clock—isalsothemostdangerous.Onimpact,suchpositioningassuresthat
whentheairbagactivates,itwillviolentlythrustanoperative’sforearmintohisface.Proper
steering positioning (see illustration) may both prevent the operative from ending up with a
forearmfullofteethandprotecthisthumbsfrombreaking.
For passengers, bracing during impact is a simple but lifesaving technique that can
significantly reduce the risk of spinal and brain injuries. (Seat belts adequately restrain
shouldersandhipsbutcannotpreventheadsfromflyingforwardduetocrashmomentum.)In
oneaccidentinvolvingasmallaircraft,passengersweresleepingwhentheplanecollidedwith
astandoftrees. Onepassengerout ofthesixteenawokeandbracedforimpact,andhewas
thelonesurvivor.
IfusingthevehicleforaplannedimpactsuchasaPIT,disengagethe airbagsso thatthey
dontimpedeescape.
094 BreakThroughaTwo-CarBlock
Checkpoints or roadblocks are common sights in many parts of the world. Foreign
governmentsrelyonthemtodetercrimeorterroristinsurrections,particularlyafternightfall
—but the deep cover of night is also a prime time for bad guys to set up false checkpoints
Determining whether a checkpoint is legitimate or a terrorist ruse can be a question of
survival, one that relies heavily on instinct and split-second decision-making. If the Nomad
believesthecheckpointtobehostile,hewillfirstchecktoseeifhecanaccomplishadiscreet
evasiontoavoidtheroadblock.Ifhecannot,breakingthroughtheroadblockmaybehisbest
bet.
Manycheckpointsusecarsasbarriersinordertofunneltrafficintoasingleline;oneguard
interrogates driversas they stop,while thesecond remains inone oftheobstructingvehicles
andbacksoutofthewaywhenacarisallowedtopass.Ifhitintherightplace,theblocking
vehicle is relatively easy to “move.” The momentum of a full-size car traveling at ten to
twentymilesperhourwillalmosteffortlesslycausetheobstructingvehicletospinoutofthe
waywhileinflictingonlyminimumdamagetotheoperative’svehicle.
Aimforapush,notacollision.Iftravelingathighwayspeeds,slowdownsignificantlyor
cometoastopbefore“pushing”theobstructingvehicleoutoftheway.Onecarlengthisall
thatisneeded.Controltheangleofimpactsothatthefrontrightorleftcornersofthevehicle
makes contact with the front axle of the blocking car, protecting radiator and engine
components(seediagram).Significantdamageincurredtothevehiclewilldefeatthelikelihood
ofanescape.
095 EscapeanAmbush
Where do the greatest dangers lurk? For Violent Nomads and civilians alike, it’s the unseen
menaces that pose the most peril—which is why violent attackers so often strike from
concealedpositions,usingtheelementsofspeed,stealth,andsurprisetocatchtheirtargetsoff
guard. From dense underbrush to desolate intersections and dark corners, attackers choose
ambush spots that enable them to strike rapidly, carry out their mission, and disappear
withoutalertingpotentialthirdparties.
Operatives know that the best defense against targeted ambushes is to constantly vary
routes and habits. Take varying routes to and from work. Change up departure times.
Criminals and kidnappers frequently stalk their marks, plotting attacks around the
vulnerabilitiesintheirroutines.Foilthembybeingunpredictable.
Cultivate a constant awareness of possible ambush sites and scenarios. Look out for
desolateareas,chokepointswhereroadsnarrow,andanystructuresorlandmarksthatcould
provide cover for potential assailants. If possible, plan routes to avoid potential ambush
points.Thesimplestwaytodefeatanambushistosidestepthethreatcompletely.
Ifanoperativecannotavoidoranticipateapotentialambushpoint,heshouldincreasehis
speed as he approaches. Particularly when driving, he may be able to speed through the
ambushpointandbackontoalessisolatedstretchofroadbeforetheattackerisabletomake
contact.
Theattackeriscountingontheelementofsurpriseinordertooverwhelmthetarget.Ifthe
targetcangetaheadstartbyanticipatingtheattacker—despitenotbeingabletoseehim—he
willremoveoneoftheattacker’sprimaryadvantages.
ESCAPEABDUCTION
In the face of abduction attempts, the old adage rings true: Never follow an attacker to a
secondlocation.Butsometimesanoperativewillbeoutnumbered,outgunned,ortakingsevere
blowstothehead.He’striedtorun,triedtohide,andputupagoodfight.He’sreachedthe
pointatwhichhehasnochoicebuttotemporarilysurrendertohisabductorsinordertoavoid
severebodilyharmorworse.
Thekeywordistemporarily.AViolentNomad’ssurrenderismerelyamomentaryplayfor
survival.
096 SetUpProperPostureforEscape
Getbig.That’sthecentralmottoofanyescapeplan,anditappliesatthemomentofrestraint.
Defeatinghand restraints comes down to a matter of wrist and palm placement. Keeping
the thumbs together, spread palms apart (see diagram)—this will flex the wrist muscles,
broadeningthediameterofthewrists.Joiningthepalmsatthumblevelwillcreatetheillusion
ofclosedpalmswhileleavingasizablegapatthebackofthewrists.
Frequently used as restraint devices in kidnapping and torture scenarios, chairs provide a
foundationagainstwhichtobraceavictim’slimbs—butalsoastructureagainstwhichtobuck
andstrain.At themomentofrestraint,takedeep breaths toincreasethe widthof the chest,
arch the lower back, straighten arms and knees as much as possible, and move feet to the
outside of the chair legs. Shrinking back down to size once captors have left the room will
creategapsintherestraints.
If restrained with rope or chain, attempt to discreetly create slack in the restraints by
retainingalengthofropeorchaininonehand(seediagram).
097 RepositionRestrainedHands
Itbearsrepeatingthat oneof themostimportantcomponentsofanytypeofrestraintdefeat
happensatthemomentofcapture—whentheoperativetemporarily“surrenders”whilesetting
himselfupforescapeasbesthecan.Anoperativeshouldpresenthishandsinfrontofhimif
possible. Should captors be willing to restrain him in this position, he will have less work
aheadofhim.(Aslawenforcementofficialsknow,themosteffectivewaytosubduedetainees
istorestrainthemwiththeirhandsbehindtheirbacks,thuspreventingthemfromusingtheir
handsortamperingwiththeirrestraints.Thisisalsotherestraintpositionmostoftenseenin
combatandhostagescenarios—butit’soneoperativesarewellequippedtodefeat.)
When being restrained, spread hands and flex wrists to increase girth and improve the
chancesofbeingabletowiggleoutoftherestraints(seepage232).Discreetlydriveforearms
downintothecuffsasthey’reappliedsothattheyareplacedhigheruponthewrists,where
thediameterislarger.
Once cuffed and left alone, visually inspect the restraints in order to determine a defeat
method.Todothatfromaposteriorrestraint,movebothrestrainedhandsalongwaistlineto
one side of body and look down, or leverage any available reflective surfaces (windows or
mirrors)around.Viewrestraintsanddeterminethebestcourseofactionbefore repositioning
hands—the last thing an operative wants to do is get caught with his hands in front of him
withoutaplan.
098 DefeatHandcuffs
Equal parts magic trick, criminal ruse, and defensive operational skill, the art of restraint
defeat comes down to an understanding of the mechanics of the particular restraints used.
Armed with a common bobby pin (preemptively tucked in at the waistband), time, and
patience, anyone can eventually defeat a pair of handcuffs, particularly if they are of an
extremelycommonmake(seediagram).
If wiggling out of the cuffs isn’t feasible, there are several defeat options to try: picking,
shimming,orpryingthecuffsapart.
PicktheLock:Topickacommonpairofhandcuffs,insertoneendofthebobbypinintothe
lockandsweepittowardthewristuntilitcatches.Pulluponthebobbypintodisengagethe
shacklearm.
ShimtheLock: The easiest method of handcuff defeat, shimming involves feeding a bobby
pin or similar instrument between its teeth and ratchet. Driving down the shim temporarily
tightens the cuffs, but will eventually separate the teeth from the ratchet (similarly to the
actionofbreakingazipper).Oncetheshimhasbeenpusheddownfarenough,anupwardpull
willyankopenthelock.
PrytheShacklesApart:Ifhandcuffedinsideavehicle,useaseat-belttonguetobreakthe
doublebowsawayfromtheshacklearm.
099 DefeatZipTies
Efficient,streamlined,andlightweight,ziptiesseemtopresentanoptimalmethodofrestraint
for the criminals who use them. Originally designed to hold together cables and wires, once
appliedthetiesaredesignedtolockpermanently,typicallyremovedbyapairofshears.Just
likehandcuffs,tape,andothermeansofrestraint,however,theyareeminentlydefeatable.
Becauseziptiesaremadeofplastic,theycanbeworndownbyrepeatedfriction.Acinder
block or a brick or cement wall will wear them down quickly, but if a rough surface isn’t
available,theycaneasilybeunlockedwithabobbypinorsimilarinstrument.
100 DefeatDuctTape
Famous for its durability and its many applications, duct tape is the familiar stuff of school
projects, banged-up car bumpers, and patchwork home-improvement jobs. More often than
not,ducttapeisalsoanabductor’srestraintoffirstresort—readilyavailableandinexpensive,
quickandeasytoapply.Onceabductorshavemovedvictimstoasecondlocation,theymay
upgrade to zip ties, handcuffs, or nylon cord; time-consuming to secure, particularly if they
involve knots, such restraints are frequently reserved for the period following the initial
abduction, when abductors have more time to tie the victim down—which makes the
beginningphasesofanabductionsocrucial.
Defeating duct tape or packing tape may seem like an impossibility, especially when it’s
tightly wrappedinmultiplelayers. But througha shrewd useof the body, victims canbreak
throughtheirbonds.
Ducttapeandothertypesofcloth-backedadhesivetapemaytearmoreeasilythanshipping
tape,whichcanhardenintoanundefeatablemassofhardplasticwhenbunchedtogether.The
key with all types of tape is to move quickly and seamlessly, using the momentum of a
snapping action rather than muscle power to shear the tape apart. Whether an operative
defeats ankle restraints by squatting down abruptly or snaps out of wrist restraints by
knockinghisarmsviolentlyintohischest,performingtheactioninonesuddenmovementwill
shearthetaperatherthancrumplingitupintoasolidandundefeatablemass.
TheFinalBLUF
The bottom line underlying each and every skill in this book is that in a world full of
unexpected,ever-changingthreats,anunseenarmyoftrainedciviliansisapowerfulweapon.
When crisis strikes, it takes only a basic level of knowledge to distinguish a victim from a
survivor—orfromthelevelheadedleaderwhoshepherdsapanickedgroupofwould-bevictims
tosafety.
Inotherwords,thetruepurpose ofthisbookis nottomakeyoumore dangerous,but to
makeyousignificantlysafer.
Acivilianwitha workingknowledgeof theskillsdescribedinthisbookisacivilianwho
knowshowtothinklikeapredator—whichwillputhimonestepaheadofattackersandhelp
to prevent him from becoming prey. But beyond any one particular skill, it is the Violent
Nomadmindset,definedbyaspiritofimprovisationandanalertnesstothreatsofallkinds,
thatdistinguishesvictimsfromsurvivors.
In order to protect the integrity of its missions, the world of special ops must by nature
remainshadowyandclandestine.Nothinginthisbookbetraysclassifiedtacticalinformation
that could be used by enemy forces to subvert the public good. But it does provide civilians
withtheabilitytorecognizeandprotectthemselvesfromadiversearrayofthreats.
Danger has become an increasingly common facet of modern reality—a reality in which
deadlymayhavetobecomethenewnormal.
ACKNOWLEDGMENTS
Iamgreatlyanddeeplyindebtedtothosewhohelpedmemakethisbookhappen.
H.K. Melton wasthemavenandthe brainsbehindtheinitialinceptionofthisbook.His
passion for all things spooky, along with his own history of successful book writing, guided
medownthepathtopublication.
Dan Mandel is my literary agent, a man who could sell ice to polar bears and throwing
starstoaninja,andanall-aroundgreatguywhokeptmeoutoftrouble.
Savannahismylittleghostwriter,or perhapsmoreappropriatelythewriter,ofthisbook.
She spent hundreds of hours talking long-distance on the phone with me, pulling from my
memory everything she could to put down on these pages. Without Savannah, and her
tremendouspatience,skill,anddiligence,thisbookwouldhaveneverbeenpossible.
TedSlampyak,whowasthestoryboardillustratorforthehitseriesBreakingBad,wasthe
illustrator for this book. His creative skills are second to none, and his partnership brought
thisbooktoalevelitcouldneverhaveachievedwithouthim.Heisatrueprofessionalanda
masterofhiscraft.
Matthew Benjamin is my badass, wisecracking, chain-smacking editor. If not for his
leadership,patience,andvastexperience,thisbookmayhavenevercometolife.
The publication reviewers at the Pentagon, who ferried the book through a complicated
reviewprocessviaanumberofagencies,representavaluablesystemthatIbelieveallcurrent
andformermilitarywritersshouldembrace.Iamgratefulfortheirtimeandtheireffortson
mybehalf.
AbouttheAuthor
CLINT EMERSON, retired Navy SEAL, spent twenty years conducting special ops all over the
worldwhileattachedtoSEALTeamThree,theNationalSecurityAgency(NSA),andtheelite
SEALTeamSix.Utilizinganarrayofpracticalskillshedevelopedtoprotecthimselfwhileat
home and abroad, he created Violent Nomad—a personal non-kinetic capture/kill program
catalogingtheskillsnecessarytoconfrontanypredatororcrisis.
MEETTHEAUTHORS,WATCHVIDEOSANDMOREAT
SimonandSchuster.com
authors.simonandschuster.com/Clint-Emerson
Facebook.com/TouchstoneBooks
@TouchstoneBooks
WehopeyouenjoyedreadingthisTouchstoneeBook.
Joinourmailinglistandgetupdatesonnewreleases,deals,bonuscontentandothergreatbooksfromTouchstoneandSimon&Schuster.
CLICKHERETOSIGNUP
orvisitusonlinetosignupat
eBookNews.SimonandSchuster.com
GLOSSARY
Existing at the crossroads of military operations and intelligence, Violent Nomads occupy a
worldfilledwithacronymsand codes. Belowarea few of the termsthatappear throughout
thisbook.
areaofoperation:Theregionorcountryinwhichtheoperativewillexecutehismission.
BLUF:BottomLineUpFront.
COA:coursesofaction.
CONOP:ConceptofOperation.
diversionary device: A device that creates an explosion or visual impairment in order to
divertenemyforcesandallowtheoperativetoinfiltrateorescapeatargetarea.
EDCKit:EveryDayCarrykit,theNomad’sportablesystemoflifesupportandself-defense.
helocasting:Usingahelicopterjumptoinfiltrateanareaofoperation.
improvisedweapons:Weaponsmadeofavailablematerials.
pace counting: The practice of counting steps as a navigational aid in undifferentiated
territory.
PIT:ThePrecisionImmobilizationTechnique,apotentiallylethaltechniqueusedtodisablea
dangeroustargetvehicle.
room hide: A temporary darkroom that allows an operative to perform surveillance
unobserved.
Tails:Ananonymousoperatingsystemthatsavesnoinformationtothecloudortotheuser’s
harddrive.
TEDD: Time, Environment, Distance, and Demeanor, the acronym used by operatives to
confirmcountersurveillanceandtracking.
Tor: An anonymity network that prevents third parties from tracking an Internet user’s
location.
RESOURCESANDREFERENCES
Escape/Security
•100deadlyskills.com.
• Escape the Wolf, www.escapethewolf.com: The author’s corporate security and crisis
solutionsfirm.
•Emergency:ThisBookWillSaveYourLifebyNeilStrauss
•SurvivingaDisaster:EvacuationStrategiesandEmergencyKitsforStayingAlivebyTony
Nester
•WhenAllHellBreaksLoose:StuffYouNeedtoSurviveWhenDisasterStrikesby Cody
Lundin
•BuildthePerfectSurvivalKitbyJohnD.McCann
•SASSurvivalHandbook:HowtoSurviveintheWild,inAnyClimate,onLandoratSea
byJohnLoftyWiseman
• Wired Magazine’s Danger Room,http://www.wired.com/dangerroom/: Covers security-
relatedtechdevelopments.
• Door Devil,http://www.doordevil.com/: Sells doorway reinforcement kits that can
actuallypreventhomeinvasions.
LockPicking
•VisualGuidetoLockPicking,3rded.,byMarkMcCloud
•HowtoOpenLockswithImprovisedTools:Practical,Non-DestructiveWaysofGetting
BackintoJustAboutEverythingWhenYouLoseYourKeysbyHansConkel
•TheCompleteGuidetoLockPickingbyEddieTheWire
Military
•MyShareoftheTask:AMemoirbyGeneralStanleyMcChrystal
•Lone Survivor: The Eyewitness Account of Operation Redwing and the Lost Heroes of
SEALTeam10byMarcusLuttrell
•GhostWars:TheSecretHistoryoftheCIA,Afghanistan,andBinLaden,fromtheSoviet
InvasiontoSeptember10,2001byStevenColl
•TheCompleteGuidetoNavySEALFitness,3rded.,byStewartSmith
• Get Selected for Special Forces by Major Joseph J. Martin with Master Sergeant Rex
Dodson
• Sofrep (the Special Operations Forces Situations Report), http://sofrep.com/: Provides
breaking news and opinion on all matters related to the special operations forces of the
UnitedStatesmilitary.
Mindset
•OnCombat:ThePsychologyandPhysiologyofDeadlyConflictinWarandinPeaceby
DaveGrossmanwithLorenW.Christensen
• On Killing: The Psychological Cost of Learning to Kill in War and Society by Dave
Grossman
•SharpeningtheWarrior’sEdge:ThePsychology&ScienceofTrainingbyBruceK.Siddle
•GatesofFire:AnEpicNoveloftheBattleofThermopylaebyStevenPressfield
•AtlasShruggedbyAynRand
• Gym Jones, https://www.gymjones.com/: The website of this hardcore training gym
featuresonlinetrainingpackages.
Mountaineering/Climbing
•KissorKill:ConfessionsofaSerialClimberbyMarkTwight
•ExtremeAlpinism:ClimbingLight,FastandHighbyMarkTwight
•TheCompleteGuidetoClimbingandMountaineeringbyPeteHill
• Urban Climbing,http://urban-climbing.com/: Find resources, tips, and videos on rock
climbingandurbanstructuralclimbing.
Navigation/Tracking
•RangerHandbookbyRangerTrainingBrigade,USPentagon
•U.S.ArmyMapReadingandLandNavigationHandbookbyDepartmentoftheArmy
•TheSASTracking&NavigationHandbookbyNeilWilson
Prep/Survival
•Benchmade,http://www.benchmade.com/:Sellstop-of-the-linesurvivalknivesforoutdoor
enthusiastsandwell-preparedcitizens.
• County Comm, http://www.countycomm.com/: Sells overstocks of tactical and outdoor
gearmanufacturedforgovernmentalagencies.
•Huckberry,https://www.huckberry.com:High-end,stylishgearforurbanadventurers.
•ImminentThreatSolutions,http://www.itstactical.com/:Sellsmilitary-gradegearranging
fromtraumaandsurvivalkitstolock-pickingandescapetools.
•MOTUS,http://motusworld.com/:Articles andresourcesforciviliansreadytotaketheir
survivalskillstothenextlevel.
• Shomer-Tec,http://www.shomer-tec.com: Sells the surveillance and security equipment
usedbypoliceofficersandmembersofthemilitary.
Spycraft
• Spycraft: The Secret History of the CIAs Spytechs, from Communism to Al-Qaeda by
RobertWallaceandH.KeithMelton
• The Official CIA Manual of Trickery and Deception by H. Keith Melton and Robert
Wallace
• Spy Coins,http://www.spy-coins.com/: Sells hollow coins and dead-drop devices for
camouflagingmicrochipsandsensitivedocuments.
• Survival Resources,http://survivalresources.com: Sells a wide variety of emergency-
preparednessandsurvivalgearandsupplies.
Miscellaneous
• Tactical Distributors, http://www.tacticaldistributors.com/: Provides high-end tactical
apparelandgear.
• Trikos International, http://trikos.com/: Provides of top-of-the-line personal protection
canines,trainedbythesamemethodologyasthedogsthatservealongsideNavySEALs.
• The U.S. State Department’s International Travel Guidelines,
http://travel.state.gov/content/passports/english/country.html:Sourceforup-to-datesecurity
alertsandcountry-specificsafetyadvisoriesforinternationaltravelers.
• Aircraft Owners and Pilots Association,http://flighttraining.aopa.org/learntofly/: Find
pilotingcoursesnearyou.
•WingsuitFlying,http://www.wingsuitfly.com/:Learnmoreaboutwingsuitflyingandfind
outwheretogettrained.
INDEX
Anoteabouttheindex:Thepagesreferencedinthisindexrefertothepagenumbersintheprintedition.Clickingonapage
numberwilltakeyoutotheebooklocationthatcorrespondstothebeginningofthatpageintheprintedition.Fora
comprehensivelistoflocationsofanywordorphrase,useyourreadingsystem’ssearchfunction.
Note:Pagenumbersinitalicsrefertoillustrations.
abduction:
defeatingducttape,240,241
defeatinghandcuffs,236,237
defeatingzipties,238,239
escape,231
escapefromautotrunk,216,217
postureforescape,232,233
repositioninghands,234,235
scenarios,216
air,bordercrossingby,32,33
airbagdisengagement,62,63
airgliding,32,33
airplane:
high-wing,66
stealing,66,67
STOAL,66
airvents,52
ambush,escaping,228,229
anonymity,2,45
blendingintoenvironment,44,45
creatingdisguise,200,201
audiolisteningdevice,134,135
speaker/microphone,136,137
autotrunk,escapefrom,216,217
awareness,44,45,243
ballisticshields,22,23
bedsheet:
escapemultistorybuildingvia,212,213
asrappellingharness,210,211
blendingintoenvironment,44,45
BLUF(BottomLineUpFront),xiii,243
body,disposalof,206,207
bodyarmor,20,21
bordercrossings:
byair,32,33
byland,34,35,3637
bysea,28–29,30–31
breakingandentering,107,108
bug-outkit,10
bug-outroute,218,219
caches,38,39,218,219
camera:
hideandextractdataineverydayphotos,148,149
improvisedtaserfrom,16263,164–65
pinhole,140,141
surveillance,102,103,139
caninedeterrentsprays,202,203
Capecitabine,192
carcrash,surviving,224,225
cardinalbearingstechnique,94,95
cellularphone,sanitizing,194,195
chainweapon,78,79
checkpoint,breakingthrough,226,227
clammingakey,114,115
cloningakey,116,117
coins,rollof,82,83
compass,concealable,12,13
concealescapetools,16,17,18,19
containerkit,7,8
cybercommunications,4
anonymousemails,144,145
hideinformation,146,147
sanitizing,194,195
deadbolt,122
digitaldevices,sanitizing,194,195
disguise,creating,200,201
DNA,zeroleftbehind,190,191
doorlocks:
car,openingwithstring,128,129
garage,130,131
unlatching,122,123
seealsolockpicking
drawingconcealedpistol,152,153
drowningattempt,surviving,214,215
ducttape,escaping,240,241
elbowstrike,160,161
emails,anonymous,144,145
encryption,148
escapefrommultistorybuilding,212,213
escaperoute,218,219
everydaycarrykits,67,8
explosivedevice,improvised,166,167
facialrecognitionsoftware,bypassing,196,197
fightingactiveshooter,179,18081
fingerprints,sanitizing,192,193
fingerprintscanningsoftware,tricking,198,199
fire,escapeabuilding,212,213
fishingweight/sap,76,77
“flash”device,diversionary,168,169
forensicidentification,190,191
garagedoors,opening,130,131
gasmask,improvised,182,183
gear,caches,38,39,218,219
goingblack,2,10,32
GoodSamaritan(kidnapping),216
GPS,password-protected,218,219
grenadeattack,surviving,184,185
guarddog,gettingpast,202,203
gummybears,andthumbprintreplication,198,199
handcuffs,escaping,236,237
hands,repositioningforescape,234,235
harassment,186,187
hideandextractdata,148,149
hideinformationinplainsight,146,147
hidingfromactiveshooter,178,179,180
holster,concealable,14,15
hookandclimb,40,41
hotelsecurityandsafety,48,49
bypassinghotelroomdoor,120,121
concealingbelongings,52,53
detectionoftampering,94,95
escapefrommultistorybuilding,212,213
hotelroom,50,51
installlisteningdevice,134,135
roomhide,54,55
unlatchingdoorlocks,122,123
impression,lock,118,119
information,digital,146,147
infraredlight,90,91
J-turn,220,221
key:
clamming,114,115
cloning,116,117
duplicating,113
kidnapping,seeabduction
knifefight,156,157
knockoutpunch,158,159
knots:
Prusicknot,42,43
slipknot,128,129
squareknot,211,212
land,bordercrossingby,34,35,3637
landburialofbody,206,207
lighter,explosivedevicefrom,166,167
listeningdevice,install,134,135
lockpicking,107,110,111
duplicatingakey,11317
handcuffs,236,237
impressionoflock,118,119
improvisedtoolsfor,108,109
unlockingpadlocks,124,125
luggage,covertaccessto,126,127
maritimeburialofbody,206,207
mindset,243
Molotovcocktail,170,171
multistorybuilding,escapefrom,212,213
navigation,36
newspapernailbat,80,81
operationalbag,7,9
padlock:
andchainasweapon,78,79
unlocking,124,125
parachuting,32,33
pens,asweapons,74,75
photos,hideandextractdatain,148,149
pinholecamera,140,141
PIT(PrecisionImmobilizationTechnique),172,173
plastic,homemade,142,143
pocketkit,6,8
Prusikknot,42,43
psychologicalwarfare,186,187
rappellingharness,210,211
rectalconcealment,18,19
reverse180turn,222,223
roadblock,breakingthrough,226,227
roomhide,54,55
RunFightRunworkout,24,25
runningfromactiveshooter,178,179
saltandpeppershakers,69
saps,72,76,77,82,83
scalingahighwall,42,43
scubadivingmask,clearing,204,205
sea:
bordercrossingby,2829,3031
burialofbodyin,206,207
seat-beltworkaround,62,63
shelter,36
shootingsprees,surviving,178,179,18081
SillyPutty,andthumbprintreplication,198,199
slipknot,128,129
“softattacks,”186,187
soundamplification,136,137
spaceanddepthtechnique,94,95
speaker,asmicrophone,136,137
squareknot,211,212
structure:
escapemultistorybuilding,212,213
hookandclimb,40,41
scalingawall,42,43
suitcase,covertaccessto,126,127
surveillance:
accordianeffect,98,99
camera,139,140,141
determining,96,97
dismounted,86,87
losingdiscreetly,98,99
mobile,88,89
night,trackingdevice,92,93
publictransportation,98,99
TEDD(time,environment,distance,anddemeanor),96,97
two-turnlimitin,88
surveillancecameras:
deceiving,102,103
disguise,102,103
light,102,103
static,102,103
tampering,detectionof,94,95
taser,improvised,16263,164–65
teargas,protectionfrom,182,183
TEDD(time,environment,distance,anddemeanor),96,97
thermalburialofbody,206,207
thumbprints,replicating,198,199
Tornetwork,144
trackingdevice,92,93
detecting,100,101
insuitcase,126
trapstodetecttampering,94,95
two-carblock,breakingthrough,226,227
umbrella/leadpipe,72,73
under-the-doortool,120,121
vascularidentificationtechnology,196
vehicle:
airbagdisengagement,62,63
boltbag,10,11
braking,62,63
buildingahidein,64,65
escapeanambush,228,229
escapeandevasionprep,62,63
escapefromtrunk,216,217
J-turn,220,221
listeningdevicein,134,135
opendoorwithstring,128,129
PIT(PrecisionImmobilizationTechnique),172,173
prep,60,61
reverse180turn,222,223
roadblock,breakingthrough,226,227
seat-beltworkaround,62,63
shootingfrom,154,155
stealing,56,57,5859
survivinganimpact,224,225
valetkey,59
ViolentNomad,anatomyof,2,3,4–5
wall,scaling,42,43
waterbottlesilencer,70,71
weapons:
chain,78,79
concealed,drawing,152,153
explosivedevice,166,167
fishingweight/sap,76,77
improvised,68,69
knifefight,156,157
Molotovcocktail,170,171
newspapernailbat,80,81
pens,74,75
pistoldisarmament:pointedatback,176,177
pistoldisarmament:pointedatchest,174,175
rollofcoins,82,83
saltandpeppershakers,69
umbrella/leadpipe,72,73
waterbottlesilencer,70,71
wingsuit,32,33
workout,RunFightRun,24,25
wrenches,72,73
Zebrasteelpen,74,75
zigzagpattern,runningfromshooter,178,179
zipties,defeating,238,239
Touchstone
AnImprintofSimon&Schuster,Inc.
1230AvenueoftheAmericas
NewYork,NY10020
www.SimonandSchuster.com
Copyright©2015byEscapetheWolf,LLC
Allrightsreserved,includingtherighttoreproducethisbookorportionsthereofinanyformwhatsoever.Forinformation
addressTouchstoneSubsidiaryRightsDepartment,1230AvenueoftheAmericas,NewYork,NY10020.
FirstTouchstonetradepaperbackeditionOctober2015
TOUCHSTONEandcolophonareregisteredtrademarksofSimon&Schuster,Inc.
Forinformationaboutspecialdiscountsforbulkpurchases,pleasecontactSimon&SchusterSpecialSalesat1-866-506-1949or
business@simonandschuster.com.
TheSimon&SchusterSpeakersBureaucanbringauthorstoyourliveevent.Formoreinformationortobookanevent,contact
theSimon&SchusterSpeakersBureauat1-866-248-3049orvisitourwebsiteatwww.simonspeakers.com.
SkilltestingbyKenzieEmerson
InteriordesignbyErichHobbing
LibraryofCongressCataloging-in-PublicationData
Emerson,Clint.
100deadlyskills:theSEALoperativesguide/ClintEmerson,retiredNavySEAL;illustrationsbyTedSlampyak.
pagescm
Includesbibliographicalreferencesandindex.
1.UnitedStates.Navy.SEALs—Handbooks,manuals,etc.2.Survival—Handbooks,manuals,etc.I.Slampyak,Ted,illustrator.
II.Title.III.Title:Onehundreddeadlyskills.IV.Title:SEALoperativesguide.
VG87.E642015
613.6'9—dc23
       2015012021
ISBN978-1-4767-9605-5
ISBN978-1-4767-9606-2(ebook)

Navigation menu