100 Deadly Skills - Clint Emerson - Literatura (2024)

IFSP

Cezar Rossi 22/06/2024

100 Deadly Skills - Clint Emerson - Literatura (2)

100 Deadly Skills - Clint Emerson - Literatura (3)

100 Deadly Skills - Clint Emerson - Literatura (4)

100 Deadly Skills - Clint Emerson - Literatura (5)

100 Deadly Skills - Clint Emerson - Literatura (6)

100 Deadly Skills - Clint Emerson - Literatura (7)

100 Deadly Skills - Clint Emerson - Literatura (8)

100 Deadly Skills - Clint Emerson - Literatura (9)

100 Deadly Skills - Clint Emerson - Literatura (10)

100 Deadly Skills - Clint Emerson - Literatura (11)

Prévia do material em texto

ThankyoufordownloadingthisTouchstoneeBook.Joinourmailinglistandgetupdatesonnewreleases,deals,bonuscontentandothergreatbooksfromTouchstoneandSimon&Schuster.CLICKHERETOSIGNUPorvisitusonlinetosignupateBookNews.SimonandSchuster.comhttp://eBookNews.SimonandSchuster.com/front/9781476796062http://eBookNews.SimonandSchuster.com/front/9781476796062CONTENTSANotetoReadersEpigraphIntroductionPARTI:MISSIONPREP001AnatomyofaViolentNomad002CreateanEveryDayCarryKit003BuildaVehicleBoltBag004MakeaConcealableCompass005BuildanImprovisedConcealableHolster006ConcealEscapeTools007ConstructaRectalConcealment008UseImprovisedBodyArmor009IdentifyEmergencyBallisticShields010TheViolentNomadWorkoutPARTII:INFILTRATION011CrossEnemyBordersbySea012CrossEnemyBordersbyAir013CrossEnemyBordersbyLand014ConcealGearUsingCaches015HookandClimbaTargetStructure016ScaleaHighWall017BlendintoAnyEnvironmentPARTIII:INFRASTRUCTUREDEVELOPMENT018HotelSecurityandSafetyAwareness019PreventaHotelRoomInvasion020ConcealBelongingswithinLodging021BuildaRoomHide022StealaVehicle023OperationalVehiclePrep024EscapeandEvasionVehiclePrep025BuildaVehicleHide026StealaPlane027MakeaWaterBottleSilencer028TransformanUmbrellaintoaLeadPipe029TurnaPenintoaWeapon030UseaFishingWeightasanImprovisedSap031MakeaFlexibleChainWeapon032MakeaNewspaperNailBat033DeployaRollofCoinsPARTIV:SURVEILLANCE034DismountedSurveillance035MobileSurveillance036MakeanImprovisedInfraredLight037MakeaTrackingDeviceforNightSurveillance038DetectTamperingofPersonalEffects039DetermineSurveillance040DiscreetlyLoseSurveillance041DetectTrackingDevices042DeceiveSurveillanceCamerasPARTV:ACCESS043CreateImprovisedLock-PickingTools044PickaLock045ClamaKey046CloneaKey047ImpressionaLock048BypassaHotelRoomDoor049SurreptitiouslyUnlatchDoorLocks050DefeataPadlock051CovertlyAccessLockedLuggage052OpenaCarDoorwithaPieceofString053DiscreetlyOpenGarageDoorsPARTVI:COLLECTION054InstallanAudioDevice055TurnaSpeakerintoaMicrophone056ConstructandInstallaPinholeCamera057MakeHomemadePlastic058SendAnonymousEmails059HideInformationinPlainSight060HideandExtractDataUsingEverydayPhotosPARTVII:OPERATIONALACTIONS061DrawaConcealedPistol062ShootfromaVehicle063WinaKnifeFight064StrikeforaKnockout065DeliveraDevastatingElbowStrike066MakeanImprovisedTaser067MakeanImprovisedExplosiveDevice068MakeaDiversionary“Flash”Device069MakeaMolotovco*cktail070PITaTargetVehicle071PistolDisarmament:PointedatChest072PistolDisarmament:PointedatBack073SurviveanActiveShooter074MakeanImprovisedGasMask075SurviveaGrenadeAttack076WagePsychologicalWarfarePARTVIII:SANITIZATION077LeaveZeroDNABehind078LeaveZeroFingerprintsBehind079LeaveZeroDigitalTraceBehind080TrickFacialRecognitionSoftware081TrickFingerprintScanningSoftware082CreateaHastyDisguise083GetPastaGuardDog084DiscreetlyClearaFloodedScubaMask085DisposeofaBodyPARTIX:EXFILTRATIONANDESCAPE086CreateaRappellingHarness087EscapeaMultistoryBuilding088SurviveaDrowningAttempt089EscapefromanAutomobileTrunk090DevelopaBug-OutRoute091PerformaJ-turn092PerformaReverse180093SurviveVehicularImpact094BreakThroughaTwo-CarBlock095EscapeanAmbush096SetUpProperPostureforEscape097RepositionRestrainedHands098DefeatHandcuffs099DefeatZipTies100DefeatDuctTapeTheFinalBLUFAcknowledgmentsAbouttheAuthorGlossaryResourcesandReferencesIndexANotetoReadersTheskillsdescribedinthefollowingpagesarecalled“deadly”forareason—andnotjustbecauseofthedangertheyposetoothers.Developedbyhighlytrainedoperativeswho regularly face life-threatening conditions, these skills push thelimitsofhumanendurance,precision,andingenuity.Andoften,theboundariesofthelaw.Thebookyouareholdinginyourhands(orreadingonyourdevice)containsactionable information adapted from theworld of special operations.Much ofthatinformation,sharedherewithciviliansinthespiritofself-defense,istobeusedinonlythedirestemergencies.Whenconfrontedwithunexpecteddanger,inmanycasesthesafestcourseofactionisescape.Inthefaceofanactiveshooter(seepage178),thefirstoption(if conditions allow) is to run—and the last is to fight. If a thief wants yourvaluables,handthemover.If theendoftheworldtrulydoescometopass. . .well,thenallbetsareoff.The author and publisher disclaim any liability from any injury that mayresult from the use, proper or improper, of the information contained in thisbook.Thestatedgoalofthisbookisnottoenableadeadlyclassofcitizensbuttoentertainwhilesimultaneouslyimpartingabodyofknowledgethatmaycomeinhandyintheabsolutedirestofemergencies.Bedeadlyinspirit,butnotinaction.Respecttherightsofothersandthelawsoftheland.Ourfateisdeterminedbyhowfarwearepreparedtopushourselvestostayalive—thedecisionswemaketosurvive.Wemustdowhateverittakestoendureandmakeitthroughalive.—BEARGRYLLSINTRODUCTIONPotential dangers lurk everywhere these days. Disasters strike in war-tornregionsandfar-flunglocations—butwithalarmingregularity,theyalsoseemtoinchcloserandclosertohome.Spanningactsofterror,massshootings,andtheunseen(andsometimesvirtual)matrixofeverydaycrime,dangerrefuses tobeconfinedtodarkalleys,unstablenations,ordistantzipcodes.People tend to imagine worst-case scenarios in highly colorful terms, butchaos and crime are the real apocalyptic scenarios.We picture aliens, frozentundra,andintergalacticwarfare,wheninfactthecatastrophiceventwe’vebeenwaiting for ismore likely to look like amundane report of vandalism on lastnight’s news—or themassive Internet shutdown in tomorrow’s headlines. Or,indeed,theviolentcriminalhidingintheshadowsofadesolateparkinggarage.Inthefaceoftruecatastrophe,abasem*ntfullofcannedpeasanddistilledwaterisn’tlikelytobemuchhelp.Inafuturewhereeverystrangerposesapotentialthreat,knowingthepredatormindsetistheonlysafehaven.Whatarethetricksusedbythestealthiest,mostdangeroushumanbeingsinourmidst?Howcanyouspotandavoidthedangersthatsurroundus?Youcouldturntothecriminalclasstofindout.Oryoucouldgoonebetterbytakingapagefromsomeofthemosthighlytrainedspecialistsontheplanet.Theonehundreddeadlyskillsyouareabout toencounterareadapted fromtheworld of special operations, a complexweb of associations dominated byoperativeswithasharedpredilectionforintrigueanddanger.Theseelite,highlyskilledwarriorsarechargedwithriskingtheir livesunder themostchallenginganddireconditionsonearth.Asoperativeswhoroutinely infiltrate theworld’smostdangerousandvolatileregions,theymustbeequalpartsspies,soldiers,andlawlessrule-breakers.They are action heroes for modern times, one-part James Bond, the otherRambo.Somecallthesehighlyskilledoperatives“ViolentNomads,”asanodtotheirdisregardforinternationalbordersandtheirbiasforswift,brutalaction.ManyofthetechniquesthatmakeuptheViolentNomadbodyofknowledgecannot be divulged without severe risk to public safety, but a great deal ofpotentiallylifesavinginformationcanstillbeshared.Eachskillisbrokendownintoitsmostcriticalparts,orCoursesofAction(COAs),andsummedupbyaBLUF (Bottom Line Up Front), which spells out the key takeaway from theoperative’s perspective; Civilian BLUFs flip the skills around and outlinepreventivemeasurescivilianscantaketoarmthemselvesagainstpredatorsusingtheseparticulartechniques.Asa retiredNavySEALwho spent severalyears inside theNSA (NationalSecurity Agency), in writing this book I drew on an unusual breadth ofexperiencethatspanstwentyyearsspentrunningspecialopsallovertheworld,both in teams and alone, and merges lessons learned from both combat andsurveillance.Theskillsinthisbookrepresentapotentialpathtosurvivalinthefaceofanynumberofdangeroussituations,fromeludingpursuersandescapingabduction to self-defense. And theymay even provide a blueprint for gettingthroughdoomsday.Theworld isn’tgettinganysafer,butyoucanbeprepared.Whetheryou’refacedwithanalieninvasionoranassailantwieldingaseeminglyinnocuousitemsuch as a water bottleI or an umbrella, learning how to think like a ViolentNomadwillradicallyimproveyourchancesofcomingoutontop.I.Turntopage70ifyou’reinterestedindevelopinganirrationalfearofwaterbottles.PARTIMISSIONPREP001 AnatomyofaViolentNomadBeyondthedefensivepotentialcommontomanyoftheskillsinthisbook,thereismuch the average civilian can learn from an operative’smindset. First andforemost, thatmindset is defined by preparedness and awareness.Whether inhome territory or under deepest cover, operatives are continually scanning thegenerallandscapeforthreatsevenwhenthey’renotontheclock.Civilians,too,can train their minds toward habits such as scouting exit routes in crowdedrestaurantsorbuildingspur-of-the-momentescapeplans.Thiskindofvigilanceallowsanoperativeconfrontedwithsuddendangertotakeimmediateaction.Whether he is crossing borders, executing surveillance, or eliminatingdangerous targets and disappearing without a trace, the clandestine operativefrequentlyworksalone.Giventhathesooftenfindshimselfbehindenemylineswithoutreinforcements,anoperative’scombatandcounterintelligenceskillsaremetbyanequallysophisticatedaptitudeforriskassessmentandanalysis.Inanincreasingly dangerous world, civilians who are attuned to potential risk(particularlybutnotexclusivelywhentraveling)willbemanystepsaheadofthegeneralpopulace.•••The operative also demonstrates a baseline predisposition toward anonymity.Each clandestine operative is trained to “go black,” operating for extendedperiodsoftimewithlimitedcommunicationtoassociates.Whileoperatingundertheradar,hemayassumetheoutwardappearanceofastudent,abusinessperson,oratraveler,asheunderstandsthatterroristgroupsorhost-nationgovernmentsmay be targeting him during his travels—and that if perceived as a spy andarrested,hewillbesubjecttodetentionandharshinterrogations.Additionally,asatraveler,heisvulnerabletotherisksofpettycrimeandkidnappingthatapplytoanycivilian travelingabroad.Tocounter such risks, theoperativeadoptsasneutralanappearanceaspossible.Thegeneral rule is the lessconspicuous theNomad,thesafer.Due to the highly covert nature of their missions, operatives go to greatlengths to ensure that theyblend into their surroundings.Acarefullymanagedappearanceallowsthemtooperateundetectedbypotentialwitnessesaswellashost-country police and security services. But beyond their unremarkability,clothingandgearmusthavethecapabilitytoconcealtheequipmentrequiredforanoperationoranescape.(Thewaistbandandcuffsofpantsandthetonguesofshoes,forexample,areidealhidingplacesforhandcuffkeysandrazorblades.)OperativesfavorbrandssuchasPanerai,whicharedurableandwellmadebutstill have a civilian-friendly look. Always ready to run or fight, they wearclosed-toed shoes with Kevlar laces and conceal weapons and spread escapeequipmentthroughouttheirclothing.Lightersandcigarettesarealwayscarried,even by nonsmokers, as theymay be used as a tool of escape or to create adistraction or diversion. (See pages 86, 166, and 168.) LED flashlights areessentialforseeinginthedarkorsignalingforhelp.•••When it comes to gear, preparedness doesn’t look quite the way moviegoershavecome toexpect.Becauseclandestineoperativescannotboardcommercialflights with concealed weapons or high-tech spy gear tucked away in theirluggage,theyfavora“no-tech”or“low-tech”approachthatishighlydependenton improvisation.Though fictional spiesemployallmannerof shiny,complexcontraptions,intherealworld,everyhigh-techtoyincreasesanoperative’sriskofdetentionorarrest.Hence,operativeslearntoadapt,improvise,andovercometechnical obstaclesusing tools and technology that are readily available in thecountry of operation.One example:Every hotel roomhas aBible or aKoranstashedinabedsidedrawer—andtapingacoupleofthosetogetheryieldsasetofimprovisedbodyarmorthatprovidessignificantprotectionagainstprojectiles.Thoughlow-techdoesn’tusuallyextendtoanoperative’scommunications,hetakesahighlycautiousapproachtocybersecurity.Theoperativeavoidsleavingbehind trails of digital breadcrumbs at all costs, understanding that anycybercommunication is fundamentally insecure. In an age where savingsaccountsandthelocationsoffriendsandfamilyarevulnerabletoanythirdpartywithaccesstoaWi-Ficonnectionandthewilltodoharm,thereisnosuchthingasasurfeitofprecaution.Civilian BLUF: Particularly when traveling, civilians are well served byadopting the operative’s predilection for anonymity. Choose clothing andaccessoriesforusefulnessandgeneralneutrality.Inavolatileurbancrisis,brightcolorsandeye-catchinglogoscanbecomeconvenientaimingpointsforapairofriflesights.002 CreateanEveryDayCarryKitWhile the average civilian approaches emergency preparedness from a life-support perspective that prioritizes food andwater supplies (stashed deep in ahomebasem*nt)totheexclusionofweaponsandescapetools,truepreparednessacknowledgesandconfrontstheviolenceofthemodernworld.Toensureastateofconstantpreparedness,theViolentNomadcarriesuptothreetypesofEveryDayCarry(EDC)kits,eachdesignedtosupporthismissionandhelphimevadecrisis.Whetherthecallcomesornot,theEDCkitsalsoprovideanedgeagainstunexpected threatsofall sorts, fromenvironmentaldisasters to terrorist strikesandlone-wolfattacks.Whentravelingthroughpotentiallyhostileterritoryorduringturbulenttimes,aNomadwilldistributeseverallayersoflife-supportandpersonal-safetyitemsthroughout his clothing and outerwear; in the event that he is stripped of hisprimaryweapon,thispracticemayleavehimwithseveralundetectedoptionsoflast resort. Escape gear in particular should be spread out in such away thatsomeofitremainsavailableiftheNomadisrestrained.The most basic kit, the “pocket kit,” should be comprised of essentialweapons,escapeandevasionequipment,andone“black”(covert)mobilephone.Rather than being consolidated into a single container or concealment, theseitemsshouldbedistributedthroughoutclothing.Ahandgunshouldbeconcealedinawaistbandholster, for themostaccessibledraw. (Seepage152 for tipsondrawingaholsteredweapon.)Anemergencycommunicationdeviceisessential,butothercontentswillvarydependingontheterrain.AstainlesssteelZebrapencanbeusedtoleavenotesforpotentialrescuers—ortostrikeanassailant.Inthecase of abduction or detention, a handcuff key and LED light camouflagedalongsidecarorhotelkeysarepotential lifesavers;asbackup in theevent thatclothespocketsaresearched,aconcealablehandcuffkeycanbehiddeninashirtcufforonazipperpull.Someoperativescarrymouthpieces,whichcanbevitalduringhand-to-handcombat.The“containerkit”—generallytuckedintoajacketoranoperationalbag(seebelow)—functions as backup in the event that an operative is stripped of hisprimary weapon and/or operational bag. This highly condensed kit containssmall improvised weapons (loose coins tied up in a handkerchief) andnavigational aids (a headlamp and a handheld GPS device) that changedependingontheenvironment,aswellaslock-pickingtoolsthatcouldprovideaccesstoinformation,food,orshelter.Purchasedwithintheareaofoperation,aset of “recci” (reconnaissance) key blanks provides an advantage in breaking-and-enteringscenarios.Durableandreliablydiscreet,arigidsunglasscaseistheoptimalcontainerforthiskit.The final piece of the puzzle is the operational bag. To prepare for thepossibility of escape in the face of surveillance or attack, its contents shouldincludeanemptycollapsiblebackpackandachangeofclothesincolorsoppositefrom the ones the operative is wearing. Even shoes should be taken intoconsideration—ifwearingsneakers,packapairofrubbersandals.Aconcealedpocketholdshighlysensitivedataonmemorydevicessuchas thumbdrivesorSDcards,aKevlarclipboardactsasan innocuous-lookingformof improvisedballisticarmor,andawadofcashallowstheNomadtosubsistindeepcoverforaslongasthesituationdemands.RelatedSkills:BuildaVehicleBoltBag,page10;CreateaHastyDisguise,page200; Use Improvised Body Armor, page 20; Identify Emergency BallisticShields,page22.003 BuildaVehicleBoltBagOperativesdon’thavetheluxuryofbeingabletoreturntobasetostockuponfoodor ammunition, so their effectiveness as free-rangeagents isbuilt aroundpreparation—andpreparationmeansalwaysbeingpreparedfortheworst.Whenanoperativeisconductingamissionabroad,oneofthefirstordersofbusinessuponbeingcalled intoaction isbuildingaboltbag. In thecaseofemergency,this bag (also known as a “bug-out kit”) becomes an essential life-supportsystem.Itcontainseverythingneededtokeeptheoperativealive,shouldhehaveto“goblack,”hidingoutofsightuntilhecaneitherresumehismissionormakearrangementstosafelyexittheareaofoperation.A bolt bag typically consists of a day or two of life support—water, food,cash, emergency medical supplies, navigation aids, and a “black” or covertphone similar to the typeknown in the criminalworld as a “burner.”Thebagshouldbe stashed in the operational vehicle, concealed in a spot that is easilyaccessible from the driver’s seat, such as the center console compartment(betweentheseats)orundertheseat.(Shouldtheoperativefindhimselfupsidedownastheresultofacollisionwithaggressors,thekitshouldbewithinarm’sreach.)Asitsnameimplies,theboltbagneedstobelightenoughtobecarried—canned foods and other heavy supplies do not lend themselves to ease oftransport.Civilian BLUF: In day-to-day life, bolt bags can be used as precautionarydisastermeasures—notonlybycivilianslivinginregionsathighriskfornaturaldisasters,butbyanyonealerttothethreatofurbandisastersorterrorism.004 MakeaConcealableCompassCovertsituationsoftencallforeasilyconcealable,dependablelow-fialternatives—and in the case of a compass, a simple pair of magnets fits the bill. Anoperativemay have been stripped of hisGPS device upon capture ormay beworkinginacontextinwhichtheuseofahandheldGPSsystemwouldattracttoomuchnotice.AconcealablecompassensuresthattheNomadisalwaysabletoeffectivelynavigatethroughunknownterritory,nomatterhowremote.Though microcompasses may be found at any adventure store in thedevelopedworld, theymaynotbeavailableelsewhere. Improvisedcompasses,on the other hand, are easy tomake using resources readily available inmostcountries. The tool works by harnessing the power of rare-earthmagnets, thebaselinemechanismused topowercompasses.Tuned to thedialof theearth’smagneticfield,whenconnectedandallowedtodanglefromalengthofthread,therodsbecomeanaturalcompass;onepointssouth,theothernorth.Because the purchase of rare-earth magnets can arouse suspicion, it isadvisable to seek out less alerting products such as refrigerator magnets,whiteboard magnets, or magnetic handbag closures, always in pairs. Anyimprovisationsmustbetestedthoroughly,lesttheNomadbeconfrontedwithaninaccurateimprovisedtoolmid-escape.Civilian BLUF: The standard instructions for building a compass (seeillustration) involve a pair of rare-earth rod magnets and a length of Kevlarthread (chosen for its durability), but a similar effect may be achieved bypiercingamagnetizedneedlethroughacorkandfloatingthedeviceinwater.005 BuildanImprovisedConcealableHolsterOperatives arewell versed in using underground channels to acquireweaponswithintheareaofoperation,asgunsandothermunitionscannotbetransportedacrossinternationalborderswithoutpermissionfromboththecountryoforiginand the destination country. But specialized equipment such as concealableholstersareoftenhardertocomeby,andanyattempttosmuggletheminwouldcertainlygetaNomadpulledintoanunwanteddetainmentatcustoms.In order tomaintain a low profile, operatives generally travel as lightly aspossible, utilizing off-the-shelf resources to fulfill their mission requirements.Thispredispositiontowardminimalismpresentschallengesbutdoesnottendtoleave operatives in a disadvantaged position, as many improvised tools—theholsterincluded—provideabettercapabilitythanmanufacturedversions.Commercially available holsters tend tomake concealment difficult. Bulkyandinflexible,theyincreasetheoverallsignatureoftheweaponinanoperative’swaistlineandcanmakeextractionachallenge.Apistol that cannotbequicklyandseamlesslyremovedfromanoperative’sholsterbecomesadeadlyliability,sothechoiceofholsteriscrucial.Thisimprovisedmodel,madeofwirehangerandtape,contributesvirtuallynoadditionalbulkandensuresaquickandglitch-freedraw.RelatedSkills:DrawaConcealedPistol,page152.006 ConcealEscapeToolsThe possibility of being captured, kidnapped, or taken hostage exists for alltravelers,butit’sonethat’sespeciallyrealforoperativeswhocannotrelyuponbeingbailedoutbytheirhome-nationgovernments.If captured, operatives can expect to be immediately frisked for concealedweapons,atwhichpointtheyarelikelytohavemostoftheirgearconfiscatedbytheir captors. Escape aids concealed in clothingmay remain undetected for awhile, but operativesknow that if they are in captivity long enough, theywilleventually be stripped naked and have to rely solely upon the escape toolsthey’veconcealed on and inside their bodies. Given a lack of institutionalbackup,self-escapepreparationsareanessentialcomponentofaNomad’severyoperationalplan.Ahumanaversiontobloodybandagesmeanscaptorsareunlikelytocloselyexamine lesions or scars, so a Nomad can utilize medical adhesive to gluespecifictoolsontothebodyunderneathmanufacturedwounds.There is alsoanear-universal reluctanceon thepartof captors for frisking,pattingdown,orprobingthenetherregionsoftheirdetainees—andthisuneaseprovides operatives with exploitable opportunities for concealment of escapetoolsinaxilla(armpit)hairorpubichair.Bodyconcealmentscanbeaselaborateassuppositoriesplacedinthepenis(urethraandforeskin),vagin*,orrectumorin the nostrils, ears, mouth, and navel. And they can be as simple as barelyperceptiblecondoms.Note:ThisadvantagecanworktoaNomad’sbenefit,butdiminishes quickly as he or she is transferred to increasingly higher levels ofdetentionandsecurity.RelatedSkills:ConstructaRectalConcealment,page18.007 ConstructaRectalConcealmentWhenamissioninvolvesahighpotentialforcapture,operativesprepareforthepossibility that they will be detained, searched, and stripped of any visibleweapons. This leaves the operative only one method of recourse: theconcealmentofweaponsandescapetoolsinhisbodilycavities.Navigationaids,money, escape tools, and even makeshift weapons such as an improvised icepick(seeillustration)canbeconcealedinsideatamponapplicatororaluminumcigartubethatisinsertedintotheanalcavity.Theuseoftherectalpassageasahidingplaceforillegalitemsorweaponsiscommon in the shadow worlds of drug trafficking and terrorism. But thetechnique is also well known to operatives as an extreme measure of self-preservationusedduringgroundzeroofhigh-riskmissions.Such a concealment is surprisingly immune to high-tech methods ofdetection. Full-body scanners bounce electromagnetic waves off the body insearchofmetallicobjectsandothercontraband.Whiletheirlow-frequencyradarcandetectweapons that protrude from thebody, it cannot see through skinorbone. Even X-ray machines don’t do a very good job of rendering itemscamouflagedintissue,andMRImachinesusedinmedicalcontextswouldrenderaconcealmentasashadowthat,givenits location,couldbemistakenforfecalmatter.Note: Any improvised containers must be waterproof, nontoxic, smooth, andsealedontheirupperend.008 UseImprovisedBodyArmorWhether engaging armed targets or caught in the crossfire of social unrest,operativesfrequentlyfindthemselvesinneedofbodyarmor.Government-issuedarmorprovidesthebestprotectionagainstinjury—butbecauseofitstraceability,operativesoncovertmissionsarenotauthorizedtouseit.Tosurvive,theymustlearntocreateimprovisedbodyarmorusingeverydayitemsandmaterials.When taped tightly together in units of two, hardcover books such asencyclopedias and dictionaries become rigid bundles or “plates” that candissipatetheenergyofaprojectile.Tapingcommonlyavailableceramictilestotheouterfacingofeachplateprovidesanadditionallayerofprotection,andtheresulting armor can be concealed by a jacket or coat or easily carried in amessengerbagorbackpack.Plates should be suspended on the front and back of the torso in order toprotect“centermass”—thespineandvitalorganssuchasheartandlungs.Another layer of protection can be achieved via a commercially availableKevlar clipboard rated to stop 9mm pistol bullets. Lightweight and portable,oncepaintedwithaflatbrownpainttheclipboardisnon-alertingandwillpassscrutinyifexaminedatabordercrossingorairport.Improvisedarmormustbethickenoughtosloworstopaprojectileandthinenoughtobewearable.Dependingonavailablematerials,ViolentNomadsmaybe able to create improvised armor thick enough to stop a projectile. Pistolroundstravelmoreslowly(9mmprojectileat1,100feetpersecond);fasterriflerounds(5.56mmprojectileatapproximately3,000feetpersecond)requiremoreprotectivematerial.Butanoperativeneverquiteknowswhathewillencounter,andsotendstobuildfortheworst-casescenario.009 IdentifyEmergencyBallisticShieldsWhen bullets are flying, the odds of survival are determined by split-seconddecisions.Whether those decisions are educated ones, rather thanunconsciousmovesmadeintheclutchesoffightorflight,canmeanthedifferencebetweensafetyandseriousinjuryordeath.The instinct to run for cover is universal, but it must be coupled with anunderstanding of the relationship between ballistics and everyday materials.Densewood,concrete,steel,andgranitearethepreferredmaterialsinthefaceofopen fire—these thick, heavy materials can stop bullets and save lives.Sheetrockwallsmayofferconcealment—thusdiminishingashooter’saccuracy—andgivetheappearanceofsolidity,buttheywillnotstopbullets.Evenasmall.22-caliber pistol can rip through drywall. Concrete or steel columns, on theother hand, provide better ballistic protection, despite their relative lack ofcoverage.Incasesofemergency,theseprinciplescanbeappliedtomanyoftheobjectsin civilian environments. Granite-top tables, concrete planters, and steelappliances all fit the bill. Countertops, desks, and tables in hotel rooms arefrequentlymadeofgraniteorsteel.Butsomeeverydayobjectsappearsolidyetaremadeoutoflightweightmaterials thatwon’tholduptogunfire.Mailboxesandtrashcansaregenerallymadeoutofaluminum.Hulkingvendingmachinesaremostlycomprisedofglassandplastic.Carsarepartiallymadeofsteel,butasteel so lightweight that it fails tooffer adequateprotection; in the absenceofother options, hiding behind the engine side of the car, rather than the emptytrunk, puts an additional layer of dense materials between an operative orcivilianandtheshooter.Related Skills: Use Improvised Body Armor, page 20; Survive an ActiveShooter,page178.010 TheViolentNomadWorkoutNo strangers to ruthless obstacle courses and drills that combine sleepdeprivationandliveexplosivestosimulatethehardshipsofreal-worldcombat,operatives are trained under the toughest conditions on earth.Once past basictraining, they remain combat-ready by incorporating the “Run Fight Run”formulaintotheirworkouts.Repeatedly lifting a pair of dumbbells doesn’t translate into an ability todefeatanassailant inhand-to-handcombatafteranarduouschaseover ruggedterrain—soViolent Nomad training prizes real-world combat and self-defensetechniques over muscle-building reps. Traditional strength-building andcardiovascular exercises have their place, but integrating the Run Fight Runphilosophyintoworkoutroutinesbuildstheendurancetooutlastanopponentinafightand/orchase.Consisting of integrated repetitive strikingmovements stackedwith sprints,RunFightRunworkoutsdonotrequireagymoranysophisticatedequipment.Allthat’sneededisaplacetosprintandanobjecttocarryandstrike,preferablyaheavypunchingbag;designedforstriking,itisversatileenoughtobeusedforsquats, dead lifts, carrying, and presses.A heavy bag can also be thrown andstruckontheground,whichiswheremostfightsendup.CivilianBLUF:Use theheavybagtoperformamixofexercises,withsprintsintegrated between reps. Increase duration and weight as needed to ramp upintensity over time.Aworthy conditioninggoal is to be able to perform threesetsofstrikingfor threeminutesstraightand thensprint foronemile insevenminutesorless.PARTIIINFILTRATION:ACCESSTOENEMYTERRITORY011 CrossEnemyBordersbySeaAssmugglersandrefugeestheworldoverwellknow,maritimebordersineventhe most secure countries tend to display high degrees of porosity. For anoperative bent on discretion and stealth, in the right kind of landscape helocastingbecomesapreferentialmethodofentry.Dropping from a slow-moving helicopter into frigidwaters is a high-level,dangerousskill.Evenwhilehovering,helicopterscancreatehurricanelikewindsthatresultinblindingmistsandskin-stingingwaterblasts.Practiceisessential,and leapingoutofahelicopter intodarkseas requiresproperaltitudeandsafeforwardspeed.Onlybyfollowingspecificprotocolscanoperativessurvivethejump.At an altitude of twenty feet, the helicopter’s forward speed should notexceed ten knots; at an altitude of ten feet, forward speed should not exceedtwentyknots.Thisisknownasthe“10for20,20for10”rule.Correctbodypositioning (seediagram)prevents injuryandensures that theforceofimpacthits thedivingfins(ratherthananyprotrudingbodyparts)anddoes not dislodge the diving mask. Although the jump prohibits the use ofheavy-duty diving equipment, a wetsuit, a mask or goggles, fins, and aninflatablelifejacketareessential.Allothergearmustbestowedinawaterproofbackpack or “dry bag” and strapped onto the operativewith lanyards so as toprevent its being lost to the depth of the ocean. Its contents should includemission-specificgearsuchasachangeofclothesthatwillallowtheoperativetoblend into the area of operation and an additionalweapon, alongwith a handshovel. The operative’s primary weapon, anMP7 submachine gun, should beloaded and carried bolt forward; a condom stretched over itsmuzzle preventswaterfromenteringthebarrelbutwon’timpedeabullet’sexitpath.The dry bag is slung over one shoulder so it can easily be shed if theoperative runs into difficulties in the water. Strapping a bag on too securelycouldimpedetheoperative’sswimmingstrokeandposeariskofdrowning.To swim to shore, operatives use the combat recovery stroke, a side strokewithaminimizedprofileinwhichthearmsdon’texitthewater.Onceoutofthewater,theychangeintodryclothesandusethehandshoveltocachetheirgear.012 CrossEnemyBordersbyAirFor most civilians, illegal border crossings conjure up tunnels dug deepunderground,passagefeespaidtoshadowyguides,andcaravanridestodistantwaystations.ButforViolentNomads,bordercrossingsaresolitaryaffairsbestaccomplished via a territory’s most unmonitored, unguarded spaces: by sea(page28),by land(page34),orbyair.Whenexecuted inacountry’sdesolatecorners and under cover of darkness, such infiltrations can be entirelyundetectable.For trained operatives, an infiltration by air is built on a two-prongedapproach:appropriationofanunmannedprivateplane(page66)anddescentviawingsuitandparachute.Globallawsdictatethatmaritimeairspacerevertstointernationalrulewithintwelve nautical miles of any country’s coastline—and that guideline shouldinformanyattemptatinfiltration.Oncewithinenemyairspace,theaircraftmust“goblack,”itstransponder,radios,andlightsshutoffinordertoavoidalertingenemyair-trafficcontroltowerstoitspresence.Acombinationofairglidingandparachutingfromtheplanedownontoruralterrainoffersthequietestandleastvisiblemeansofentry.Oncealandingpointhas been identified, calculating the jump point involves a universal equation:When jumping fromamoving aircraft in awingsuitmadeout of a nonporousnylon,everytwoandahalffeetdroppedmeansasimultaneousgainofonefootof forward glide, more if going downwind. Such a suit essentially turns anoperativeintoahumankite,allowinghimtousehislegsandarmstosteerlikeanaircraft.Parachutingisaslow-movingandmuchmorevisibleproposition,soaNomadshouldwaituntilthelastpossibleminutetoactivatehischute.Once on ground, the nylon wingsuit and parachute can be melted into ahandfulofglasslikebeads.013 CrossEnemyBordersbyLandEvery nation displays some weaknesses along its borders, particularly in itsuninhabitedspaces,andoperativesalwaysseek toexploit thesevulnerabilities.But thewilder the terrain, themorechallenging itwillbe tocross.Aseasonedoperativecrossingenemyborderson footmight spenddaysorweeks trekkingalonethroughscorchingdeserts,freezingmountaintops,anddensejungleasheslowly wends his way toward the area of operation. Despite the pace andphysicalchallengesofsuchanapproach,themostdifficultrouteislikelytobethemostdesirableone—forthemoreruggedtheterrain,thefreeritwillbefromscrutinyandsurveillance.Ifairspaceisheavilyguarded,infiltrationonlandmayalsobetheoperative’sonlyrecourse.GearandTransportation:Almostinevitably,aportionofthejourneywilloccuronfoot,buttheidealscenariowillallowtheoperativetoclockafairnumberofmiles on an off-roadmotorbikewith the horsepower to carry a two- to three-hundred-pound load and thedurability to takeon extremelyuneven terrain. Inmanypartsoftheworld,motorcyclesaremorecommonthancars,soacquiringor stealing a bike from a neighboring country is well within the operative’sgrasp.InadditiontohisEDCkitandboltbag(pages6and10),theoperativewillbecarryingenoughfuel,food,andwater tolast thetripandtheclothingandgearneeded in order to disguise himself once he crosses the border; even if theoperative is able to forgo drinking water because water sources are commonthroughouttheterrain,hismissionsupplieswillbeextensive.Eachphaseoftheinfiltrationwillalsorequireauniquesetoftoolsandweather-appropriategear.Shelter: Though operatives are trained to survive extreme levels of sleepdeprivation,aninfiltrationstretchingoverseveraldaysorlongernecessitatesreststops.Improvised shelters are usually preferred. Unlike nylon tents, shelters builtfrom found materials such as branches or compacted snow blend into theirenvironments and act as camouflage. In snow-covered landscapes, igloo-likeshelters can be constructed out of compacted blocks of snow. Despite theirtemperature, these blocks act as nonporous shields that effectively shut outexteriorweatherwhilesealing inheat,allowingoperatives towarmtheshelterwiththeirownbodyheatandtheadditionofalitcandleortwo.Oncetheslabsof snoware placed back into the snowbank, exposure to a fewhours of sun,rain,orsnowtakescareofcoveringtheoperative’stracks.Navigation:Whentheterraindictatesthatoperativesproceedonfoot, themostgrueling portion of the multiphase infiltration process has begun. Operativesmaywalkfordaysinextremeweatherconditionstoreachtheirdestination.(Infact, poor weather conditions may be optimal as a means of erasing theoperative’s footprints.) And they must be prepared to navigate using only acompassandamapintheeventthattheirGPSdevicefails.This proves much easier in mountainous areas or seascapes, wheremountaintops and other topographical landmarks provide reference points fororientation.Inundifferentiateddesertenvironmentsthatstretchoutforhundredsof miles, the risk of straying far off course or even walking in circles issignificant.Insuchinstances,pacecounting—thepracticeofcountingeveryotherstepasa gauge of distance—can be a lifesaving technique.A single adult step spansapproximatelyonemeter,soonehundreddouble-stepsadduptoapproximatelytwohundredmeters.Keepingtrackcanbeaneffectivebarometerofdistanceinanenvironmentwithfewothermeansofassessingprogress.Untraceability: Operatives generally travel under cover of night, sleeping forshortstretchesduringdaylighthoursandtimingtheirnightmovementstolunarcycleswhentheycan.Ahalf-moonoffersalevelofvisibilitythatisparticularlywelcomeonroughterrain,whilefullmoonsmayrendertheoperativetoovisible.Nighttravelissignificantlyslowerthandaytimemovementsbutinvolvesfewerrisksthantravelinginbroaddaylight.Operativesalsoplantheirroutesthroughterrainthatmakesdetectiondifficultand take precautions to avoid leaving clues behind. They urinate off-route, inbodiesofwaterifpossible,andpackandcarrytheirfecalmatter.Whereterrainpermits,theyavoidsoil,sand,andmudandwalkonnonprintingsurfacessuchasrocks, roots,grass, leaves,andbark.Footprintsareunavoidable,butoperativestrytobreakupaconsistenttrailanytimetheenvironmentpermits.014 ConcealGearUsingCachesAViolentNomad’smissioniscompleteonlyoncehehassuccessfullyvanishedfrom the area of operation—so he never undertakes an infiltration without awell-planned exit strategy that accounts for all of his post-mission needs.Travelinglightiscrucial,soparticularlywhencrossingintoremoteterritoryonfoot, theNomadwill separatehisgear and supplies into twocategories: itemsneededforthefirstlegofhisjourney,anditemsneededpost-missionand/orforemergencyexfiltration.Designed to support survivalon the run,his secondarycache will store a well-thought-out resupply of food, fuel, communicationdevices,money,andweapons,hiddenawayonapreplannedrouteoutoftown.Operational gear reserved for future use can be cached via a variety ofmethods.Protected from theelementsbybeingpacked intodurablecontainerssuchaswaterbottlesorlengthsofPVCpipe,itcanbeconcealedanywherefromcavestohollowed-outtreetrunkstothebottomsoflakes.Themoreremotethecachesitethebetter,asthelastthingaNomadwantstodoisrecoveracachethathasbeenbooby-trappedorputundersurveillance.Buryingoperationalgearwelloutofsightreducestheoddsofaccidentaldiscovery.MarkingitslocationonaGPS device enables the Nomad to recover his gear in the absence of visiblelandmarks.015 HookandClimbaTargetStructureNomadsfrequentlygainaccesstomulti-occupancytargetbuildingsbystrollingintounlocked lobbiesorpicking rudimentarycommercial locks (seepage110)on back doors. But in highly secured buildings monitored by camera and/orrovingpatrol,accessthroughfrontorbackdoorsmaynotbenegotiable.Fortunately,anybuildingwitharowofbalconiesalongitsbacksidepresentsasecondaryoption:scalingtheexteriorofthebuildingfrombalconytobalcony.Usingapainter’spole,anextra-longlengthoftubularnylonorrope,andahook,aNomadcanconstructalightweightladdersystemthatwillsafelyholdhisbodyweight—enablinghim toperform thesimple“hookandclimb” techniqueusedforcenturiesbypiratesstealingontoenemyships.Tyingaseriesoffrostknotsintoadoubled-overlengthoftubularnylon(itsbitterendstiedtogetherwithanoverhandknot)yieldsadurablestepladder(seediagram);thelineshouldbemorethantwicethelengthofthetargetstructure’sheight. After a heavyweightmetal household hook is inserted into a painter’spoleand tiedorsnappedonto the ladder, theapparatuscanbehookedontoanupper structuredurable enough tohold theoperative’sweight.He then climbsfromonefloortothenextandrepeatstheprocessuntilthetargetdestinationisreached.Evenwhenperformed lateatnight, thismethodof last resort comeswithahighpossibilityofexposure.Butbecausesecuritycamerastypicallyaren’tsetuptocatchpeopleclimbingintoabuilding,inahigh-securitycontextitmaystillbethebestoptionforaNomadlookingtoactwithstealth.Buildingownersseldomset up cameras beyond the first floor—and train those they do install towarddoorways, on the assumption that any invaderswill be coming in through thegroundfloor.016 ScaleaHighWallWhile a smooth building facade or high wall may not offer an operative theconvenience of climbing from balcony to balcony (see page 40), the use of aone-wayfrictionknotmakesinfiltrationviaropeordrainpipeeminentlyfeasible—so long as the climbing rope is taut and securely anchored at both top andbottomends.Asafetyknotusedbyrockclimbersasaformoflifesavingbackup,thePrusikknot is tied in such away that it canmoveonlyup a ropeor line; downwardpressure causes it to lock intoplace.Tied to a climber’sharness, theknot canprovideafail-safethatmaycatchtheclimberintheeventthatotherdevicesfail.Inan infiltrationorescapescenario, theknotcanbeexploitedfor itsability toslideupaline,lockingintoplacewhenitreceivestheoperative’sbodyweight.TotieaPrusikknot,firsttieashoelaceoranequivalentlengthofsmall-gaugenylon or parachute cord into a loop using a square knot (see page 43). Then,wrapthecordaroundtheclimbingropeordrainpipeandloopthecordthroughitself (see diagram).Pass the cord through the resulting loop twicemore. Pulltightly.Ideally, tie four Prusik knots to use as hand- and footholds, as whenshimmyinguptheline.Intheeventthatsuppliesarelimited(ifusingshoelacesinthecaseofescape),twoknotsareenoughtotogglefromasinglehandholdtoasinglefoothold.If shimmying up a drainpipe, it will be necessary to untie and retie knotsaroundsupportbrackets.Tosavetime,bringextrapre-loopedcord.017 BlendintoAnyEnvironmentWhenfittingintoaparticularregion,aNomadworksthroughanenvironmentalchecklist,thefirstdimensionofwhichispersonal.Howdohislookandmannerstackuptotheenvironment?Travelerswholookandact likefishoutofwaterare prime targets for criminals of all stripes, and operatives who makethemselvesconspicuousareprimecandidatesfordiscovery.The secondary dimension of this process is cultivating cultural awareness,whichmeansconstantlyweighingactionsandpreferencesagainsttheprevailingculturalcontext. If thegeneralpopulation forgoesketchupon their sandwichesoriceintheirdrinks,theoperativewillfollowsuit.Next is situational awareness,meaning the operative continually scans hisenvironmentforpotentialdangers,playingoutworst-casescenarios inorder toidentify which actions to take before crisis strikes. Within thirty seconds ofhavingenteredarestaurant,hehascanvassedallexitsandspottedanypotentialimprovised weapons in the vicinity. He has also identified his “invisiblethresholds,” the imaginary lines whose crossing will spur him into swift,decisive action. If he spots an armed guard carrying anautomaticweapon, hewill quickly determine his “threshold” for escape or defensive action—i.e.,shouldtheguardlookhiswayrepeatedly,hewillduckoutthebackdoor.The final dimension of total awareness is third-party awareness. Theoperative is always keenly aware of anyone who might be watching him—whether he’s operating in another country or using the Internet, his goal is toremain undetected by third parties such as law enforcement officials, citizens,criminals,andevenhackers.PARTIIIINFRASTRUCTUREDEVELOPMENT:LODGING,TRANSPORTATION,WEAPONS018 HotelSecurityandSafetyAwarenessHotel rooms are notoriously unsecure locations. Especially in developingnations, even trusted, name-brand properties can be susceptible to graft andsurveillance—some of it officially sanctioned. In an era of global uncertainty,aggressivegovernmentsgotogreatlengthstocollectintelligenceonWesterners,whethertheybehigh-rankingdiplomatsorrun-of-the-millbusinesspeople.Manytravelblind in the faceof these invisible threats, assuming theyare safewhentuckedawayintheirhotelroomsorrentalcars.Butanypropertycontrolledbyanunknownentityisvulnerabletoamultitudeofthreats.Some hotels will actually place Westerners in rooms that are wired forsurveillance. One way to thwart their efforts is to change rooms and hotelsfrequently.Becausethesepropertiesarealsosubjecttounexpectedemergencies,thesafestroomsarethoseonsecondorthirdfloors.Mostcountries’fireservicesarenotequippedtoreachanyhigher—butaNomadavoidsthegroundfloor,asintheeventofahostileinvasion,havingsomedistancefromthelobbyiscrucial.(Terroristswillmostlikelyworktheirwayupfromthegroundfloor.)An operative will look for a room that is equidistant from stairwells andelevators—a room too close to the emergency exit exposes him to the risk ofbeinggrabbedandshovedintoastairwell.Toofar,andheisatadisadvantagewhentryingtomakeaspeedygetaway.CivilianBLUF:Hotelsare targets forbothcommoncriminalsandprofessionalconmen,andlobbiesareparticularlygreatplacesforcriminalstostalktheirpreywithout the riskofbeingchallenged—the likelihood that they’llbequestionedbyhotelstaffislow.Fortunatelyhotelshavemanyentrancesandexits;usethemunpredictablytoavoidcreatingroutinesthatcouldbeobservedandanticipated.019 PreventaHotelRoomInvasionHotel guests canmitigate risk bymaking educated decisions about room andfloorselection(seepage48).Buthotelroomdoorlocksarenotoriouslyflimsy,andeventhemostwell-chosenroomisonlyassecureasitsdoorframe,oftenaslimwooden structurebearing little tono reinforcement.Socivilians travelingthrough particularly high-risk regions may wish to assess the layout of theirroomsandconstructadditionalfortifications.Whileasolidlockprovidesameasureofprotectionagainstlockpicking,onlyareinforceddoorframecanpreventanassailantfromkickinginadoor—afewstrong blows will hammer a metal deadbolt right through a wooden frame.Covering the entire width of the door, an improvised door bar spreads thepressureoftheblowsalongthebar,relievingthedeadboltofsomeoftheimpactandpreventingit fromburstingthroughthedoorframe.Fastenedwithapairofsmalleyeletscrews,thereinforcementmechanismleavesbehindonlyaminimalsignatureonceitisremoved.In roomswhere doors open outward (more common outside of the UnitedStates),invadersmustpullthedoor,ratherthankickingit,inordertoforceentry—amoredifficulttasktobeginwith.Asimpletrickmakestheirjobevenmorechallenging: running a length of nylon line from the doorknob to a fixedstructureortoanotherclosed,lockeddoor.In rooms where doors open inward, wedging or barricading the door willprovide temporary reinforcement, giving an operative time to plan an escaperoute or create an improvised weapon while invaders struggle against theobstacleshehassetintheirpath—fromwoodenwedgestypicallyusedtokeepdoorsopentoalockreinforcementmechanismmadeoutofabroomstick.Asamethodoflastresort,pilingamassoffurnitureinfrontofthedoorprovidesanacceptablemeansofdelayingattackers.020 ConcealBelongingswithinLodgingWhenmovingwithintheareaofoperation,operativesmaytakerefugeinahotelroom(bookedunderanassumedname),but theynever let theirguarddown—for they are always one room inspection away from discovery, and with itmissionfailure.Whileitisbestpracticetocarryorhideweaponsandidentificationpapersontheirpersonorinthedeadspacesofanoperationalvehicle,therearetimeswhensensitivegear,tools,ordataneedtobesecurelystowedinarentedroom.Hotelsafesoffer negligibleprotection, as they are frequently checkedbyhotel staff.Instead, operatives rely on elaborate hiding techniques well known to prisoninmatestheworldover.Successful concealment spots should be time-consuming for intruders tounearth. Intruders (and hotel staff alike) always move quickly when they’recanvassing a room, as they’re fearful of being intercepted. Hiding spots thatinvolvescrewdrivers(thebackpanelofa television,powersockets)willprovetootime-intensiveformostthievestodefeat.Thesespotswillalsobetraytracesof tampering—deliberately aligning the screws on an outlet or adjusting therings on a shower curtain are measures that are sure to trump the averageintruder.Air vents are the perfect width for hiding laptops or tablets containingvaluable information—just unscrew the grate and place them in the airshaft.Anythingflatcanbetapedtotheundersideofadrawer.021 BuildaRoomHideCollecting long-term intelligence on a target is a process that could go on formanydaysandweeks—pinningdownthetarget’sdailyroutinesandestablishingvulnerabilitiesovertimeiskeytoeffectivesurveillance.Butsittinginaparkedcarfordaysonendisboundtoarousesuspicionineventhemostanonymousofcities. For long-term stakeouts the operative must create a room “hide,” anindoorbasefromwhichtocollectintelligenceunobserved.The best room is one that provides an unobstructed line of sight over thesurveillance target.An upper floorwillmaximize an operative’s field of viewwhileminimizing his visibility. (Most civilians don’t lift their gaze above eyelevelastheygoabouttheirdailylives.)Beforebuildinghishide,theoperativesurveystheoutsideofthebuildingduringthedayandatnight.Ifcurtainsinthebuilding are drawn or shut by maid service at certain times of the day, theoperativefollowssuit.While collection by night assures a certain level of discretion, daytimesurveillancemay yield more valuable information. To collect unobserved, theoperativeshieldstheroomfromviewbybuildingavirtualcloakofinvisibility:atemporarydarkroomthatwillenablehimtodisappearbehindawindowinbroaddaylight. Instead of reflecting light as white walls do, its dark curtains willabsorb light, reducingvisibility in the roomwithoutcompromising the lookofthewindow,whichwillappearnodifferentthananyotherwhenviewedfromaground-level vantagepoint. Pinning the sheets to the ceiling in a double layerwillpreventlightfromleakingintothedarkroomuponentryandexit.022 StealaVehicleUnliketheirbig-screencounterparts,ViolentNomadsdon’tdriveAstonMartins,Porsches,oranyothertypeofBond-worthyrides.Thebestvehicleforcarryingoutamissionisthevehiclethatattractstheleastattention—thevehiclethatwillallowanoperativetotailandsitonatargetforhourswithoutriskingdetection.Thevehiclethatwillblendintotheflowoftrafficafteraquickgetaway.ViolentNomadsoftenrent,cash-purchase,orcommandeervehicles;prepareandmodify themforamission;and thendump themwhen theyareno longerneeded.Stolenvehiclesdon’t leaveapaper trail—andeventhoughtheNomadwillalwaysusefalseidentificationandcreditcards,hepreferstoavoidleavingbehind any potential traces. The vehicle can be used operationally, and thendumpedorburnedlongbeforeitisreportedmissing.SelectingaVehicleThe optimal vehicle for anymission is the one that is unremarkable in everysense. This will be dependent upon the setting of the mission, so Nomadscarefullysurveytheiroperationalenvironmentstodeterminethebestcarforthejob.Theyselectamake,model,andcolorthatmirrorthemostpopularchoicesinthearea.Beyondthetypeofcar,detailsaresignificant.Iflocalsintheareaofoperationhangminiaturecountryflagsfromtheirrearviewmirrors,theNomadwillfollowsuit.Additionalconsiderationsforidentifyinganoperationalvehicleinclude:DeadSpaceandVoids:Theenvironmentand/orparticularitiesofamissionmaydictateavehiclewithplentyofvoidswhereoperationalgearandweaponscanbeconcealed. A surveillance mission may require cameras, and a mission in adesert or other secluded environment may require stocking enough food andwaterfordays.Vehicleswiththemostusablespaceincludesedans,SUVs,andutilityvehicles.Condition:Marks,dents,orscrapesareconspicuousattributesthatthirdpartiesmightnoticeandtransmittoauthorities.Conversely,carsthatlooktoocleanalsorisk attractingnotice. Inmost environmentsoutsidewealthyenclaves, a soiledcarwillhaveabetterchanceofblendinginwiththerestofthecarsontheroad.StealingaVehicleThe sophisticated kill switches, transponders, and other security features nowinherent to most modern vehicles make car theft a much more complexpropositionthanitoncewas;inordertogetacartostart,akeyneedstobebothcuttotheignitionandembeddedwiththerighttransponder.ThisiswhyNomadsand common car thieves alike seek out opportunities to nab car keys, carjackrunning vehicles, and hack theirway into older-model carswith less stringentsecurityfeatures.Valet and daily parking structures tend to display extremely lax securitymeasures.Keysareoftensimplytaggedandplacedinunlockeddrawersatvaletbooths that are frequently left unattended, providing Nomads with anopportunity to quickly and easily filch a set of car keys to themodel of theirchoice.Nomadsmayalsocanvassthestreets,seizingopportunitiesforcarjackingasthey arise. Civilians frequently render themselves vulnerable by leaving theirkeys in the ignition as theywithdrawcash fromanATMor settle thegasbillinsidethestation.When it comes to stealing a car the old-fashioned way, Nomads seek outolder-model vehicles with proven security vulnerabilities—Hondas being onereliable example. Once the lock cylinder is bypassed, the ignition on thesemodelsiseasilyswitchedonbythetipofascrewdriver.Theirfirstorderofbusinessissearchingforsparekeysand“valetkeys,”thethinkeysmanyautomakersembedintovehicles’owner’smanuals; theseallowaccesstodoorsandignitionbutwon’topentrunksorglovecompartments.Evenhigh-performancevehicleshavetheirparticularvulnerabilities,andNomadsarekeenstudentsinthisarea.CertainBMWmodelshavewiringharnessesbytheirtrunksthatcanbeshortedandusedtounlocktheentirevehicle.Toexposethelockcylinderonanolder-modelvehicle(seediagram),theyuseafewhardknockswiththehandleofascrewdrivertobreaktheplastichousingonthesteeringcolumn.Then,theyusethesametechniquetodisengagethelockcylinderfromthelockbody.Before the operative starts the engine, he must also bypass the steeringcolumnlock—averysimplelockmechanismthatcanbebrokenbyyankingthewheelinanyonedirectionwithbruteforce.Insertingthetipofthescrewdriverintothelockbodyandturningittotherightisallittakestostarttheengine.CivilianBLUF:Neverleavearunningcarunattended,evenforamoment.Neverleave your car keys in your vehicle, even in a locked garage. Check yourowner’smanualforavaletkeyandmoveittoasafeplace.023 OperationalVehiclePrepOnce an operational vehicle has been acquired, undertaking a range ofadjustmentswill enhance performance and decrease visibility and traceability.Thesemayinclude:• Commandeering voids and dead space such as the dashboard on thepassenger’sside,airbagcompartments,doorpanels,andseatcovers—asuite of caches well known to drug smugglers and mules. In asurveillanceor combat context, these spaces canhold anything fromarifletoalife-supportsystemcontainingwater,food,money,laptops,andothercommunicationdevices.• Outfitting the vehicle with forged license plates and registrationdocumentation.Expired tagsmightblowaNomad’scover in theeventthatheispulledover.• Installinganannycamdisguised ina tissueboxon thereardashasanextrasetofeyes.Dependingonthedirectioninwhichit is trained, thecamera can be used for surveillance or to determine if someone isfollowingthevehicle.• Disabling daytime running lights, brake lights, and interior lights andchimesfor inconspicuoustravel.Partiallypull interior lightbulbsoutoftheirsockets—farenoughtopreventthemfromturningon,butnotsofarthattheywilldangleandattractattentionintheeventthattheoperativeispulledover.•Overinflatingtiresforoptimalperformance.024 EscapeandEvasionVehiclePrepDuetotheirhighinherentrisk,escapeandevasiondrivingtechniquesareusedby operatives only in cases of extreme urgency, in vehicles that have beenspecially chosen and retrofitted to make maneuvers such as the J-turn or theReverse180(pages220and222)possible.High-center-of-gravityvehiclessuchas SUVs are prone to flipping, while smaller cars might not fare as well incollisions.Examplesofretrofittinginclude:SelectingTires:Tiresshouldbereplacedwithhigh-performancemodelsinflatedtotherecommendedpoundspersquareinch.Seat-Belt Workaround: In a car that is flipped upside down, the seat belt’spendulum lockingsystemcouldbecomeadeadly liability. If theweightof theoperative’sbodyswingsthependulumdeepintothecardoor,thebeltmaylockintoplaceandloseitsabilitytounbuckle,soawell-placedrazorbladecanbealifesavingmeasure.AirbagDisengagement:ThelastthingaNomadwantsisairbagsgoingoff—andin newer vehicle models, automatically killing the engine as they deploy—duringahigh-speedpursuit.Left-Foot Braking: The human nervous system functions faster and moreefficientlywhenboth sidesof thebodywork together—which iswhy racecardriversandoperativesusetheleftfootforbrakingandtherightforgas.ThresholdBraking:Learningtodepressthebrakepedalwithoutlockingupthetires is necessary for precise handling. When deployed at a high speed, thiscontrolled braking maneuver enables an operative to come to a stopwithminimalslidingorskidding.025 BuildaVehicleHideTheoptimalhidesiteforstaticsurveillanceisaroomwithaview,butinsomecasesNomadsareforcedtosetuptemporaryhidesitesinsidetheirvehicles.Thisscenarioinvolvesaslewofvulnerabilitiesanddiscomforts,butexposurecanbemitigated by the construction of a sheet-based darkroom similar to what anoperativewouldbuildinanurbanhidesite(page54).Suchadarkroomallowshimtodisappearasifbehindthedarkestoftintedglass—butunlikeglass,itdoesnotleavehimvulnerabletobrightsunshineandcuriousonlookers.A large sedan or SUV with tinted windows and folding seats gives theoperativetheabilitytosetupafull-fledgedsurveillancesuiteinsidehislow-techdarkroom.A tripod, an SLR camera, and a shutter release cablewill producehigher-quality night shots than those captured by specialized night visionequipment.Toavoidbeinggivenawaybyenginenoise,runninglights,orexhaustfumes,theoperativealwaysturnsofftheignition.Incoldweather,heappliesRain-Xtointerior glass andwears a nonporous jacket that retains body heat in order toprevent windows from fogging up. He uses empty bottles as receptacles forurine;whenfilledandcappedthesecanbeplacedonthefrontorreardashtoactasdefrostingdevices.To enter the darkroom, he will construct a pretext for leaving the vehiclemomentarily, suchasgoing to thecorner for a cupof coffee.Returning to thecar, he quickly and casually slips into the back door on the driver’s side—tomostonlookersitwilllooklikesomeonehasjustsettledintothedriver’sseat.026 StealaPlaneMostcivilianswouldbeverysurprisedto learnthat, for thoseinpossessionofflighttraining,swipingtheworld’smostcommonaircraft—aCessna152or172—isnomoredifficult thanpicking the lockona flimsyofficedesk.But foraNomad looking toperformaerial surveillanceorcrossbordersundetected (seepage 32), stealing small, privately owned planes is just another means ofsecuringanuntraceablemethodoftransportation.Relativelyquiet, fuel-efficient,andreliable,singlesmall-engineplaneshaveseveral advantages forNomads.Theyarehigh-wing (asopposed to low-wing)aircraft—whichmeanstheirwingswon’tgetinthewayifanoperativeneedstojump out in a hurry.Another significant advantage is defined by the acronymSTOAL, for “Short Takeoff and Landing”: Small aircraft do not require verymuch space in which to take off and land, which enables Nomads to avoidrunwaysandinsteadlandinopenfieldsandotherdesertedspaces.Most important, small aircraft tend to be outfitted with flimsy, highlyvulnerablewafer locks,making them extremely easy for an operative to stealusing the picking tools and techniques that apply to any common door locks(page110).Small aircraft are typically kept at single-run airports, where security isnegligible and airspace goes unmonitored by transportation or customsauthorities.Onceanoperativehasbrokenintotheplane,hewilllikelybeabletotakeoffandflyawaywithoutattractinganynotice.CivilianBLUF:Ownersofprivateplanesarewelladvisedtostoretheirplanesinhangarsand/orlockthemdownlikebicycles.IMPROVISEDWEAPONSViolentNomadsarealwaysprepared for theeventualityofbeingcapturedandstripped of their weapons—or that, in a given context, even a well-concealedweaponwillposetoogreatariskofdetection.Butbecausetheyarewellversedin turning everyday items into improvised weapons, they will never truly becaughtunaware.Thereisnosuchthingastheidealimprovisedweapon,asthebestweaponinanyscenarioissimplytheonethatcanbereachedwhenitisneeded.Ifitcanbeeasily acquired within the area of operation and carried without arousingsuspicion,allthebetter.Thoughimprovisationrulestheroost,someeffectiveweaponsofself-defensecanbecreatedwithaminimumofadvanceplanning.For civilians, learning to see the danger inherent in everyday objects hasmultiplebenefits.Amanholdingatightlyrollednewspapermaybeaperpetratorgettingreadytostrike,butonlythosewiththeforesighttorecognizehisweaponwillbepreparedtofendoffhisassault.Andintheeventofanattack,thecivilianwhoisabletorecognizetheself-defensepotentialinthematerialsathandwillbeonestepahead.Civilian BLUF: While the examples used in the following pages describeoperatives repurposing everyday items in the course of a mission, manyinnocuouseverydayitemscanstandinasimprovisedweaponsofself-defenseasthesituationdemands.Evensaltandpeppershakers,foundonrestauranttablesallovertheworld,canbeusedtotemporarilyblindanassailant—thrownintoanopponent’s eyes, they create amomentary stinging and/or blinding effect thatmaygiveyouthetimetoescapeorgaintheupperhand.027 MakeaWaterBottleSilencerGunfire’stwobiggestgiveawaysaresparksandsound:anextremelyloudbangasthegunpowderinsidethebullet’scartridgeisignited,alongwiththeresultingflash.Butpairedwithsubsonicbulletsfroma.22-caliberor.45-caliberpistol,animprovisedsilencercaneliminateboth.Thoughsomestates restrictoroutrightbanthepurchaseofsilencersandsuppressors,aviablealternativecanbemadefrom a plastic water bottle, a square of fine wire mesh, and a stainless steelscouringsponge.Theonlyaudiblenoisewillbeatickingsound,theresultofthepistol’shammerinitiatingtheblowbystrikingtheprimer.Mimickingtheactionofastandardsilencer—aperforatedsteeltubeencasedwithinasolidsteel tube—the improvisedversionusesa two-prongedmufflingdevice. Rolled into a tight cylindrical shape, the stiff layer of steelmeshwillholditsformanddirectthebulletthroughandoutofthewaterbottleinastraightline.Tuggingon the scouring spongewill help it expand to fill the restof thespaceinthebottle,creatingametalpillowthattrapsandmufflessound.Likeamakeshift steel box, the contraption dampens sound and light waves with asurprisingdegreeofeffectiveness.Civilian BLUF: For an imaginative predator, lethal materials are readilyavailable. Stainless steel scourers can be obtained at any grocery or hardwarestore, and finewiremesh can be cut out of window screens or screen doors.Awarenessiskey.028 TransformanUmbrellaintoaLeadPipeBecausebulletsandbulletholes leaveforensic tracesbehind, theworld’smostcommon assassinationweapon is neither a rifle nor a handgun but a piece ofcommonleadpipeconcealedinnewspaper.Adenseandheavysapleavesbehindonly its intended effect: crushed bone and, if applied to a human skull, utterannihilation.Reinforcedwithlead,acollapsibleumbrellahasalsobeenusedbycriminalsto the sameeffect.To turnone intoaweaponof self-defense, acquire three tofourheavy-dutywrenches.Slidethewrenchesunderthecanopyandaroundthehandle,zip-tyingthemtotheumbrellahandlebeforesecuringtheoutsideoftheweapon with additional zip ties. Black ties on a black umbrella will not bevisible—whichmeans that theweaponwill looknodifferent fromanordinaryumbrella (though it will be significantly heavier and is not recommended foreverydayuse).029 TurnaPenintoaWeaponThe smartest pen is not a personal computing accessory but a deadly andcompletely inconspicuousweaponofself-defense. Inapinch,anypengraspedfrom the bottom of a handbag or briefcase can be used to inflict harm on anassailant,butoneparticularmakeisespeciallyeffective:Withabarrelmadeof100 percent stainless steel, Zebra’s original steel pen can moonlight as anincrediblemakeshiftstabbingtoolstrongenoughtopierceplywood.To strike, hold the pen in a tight fist. Use an overhand grip to strike anassailant’s head and an underhand grip if striking the throat or knee at closerange.030 UseaFishingWeightasanImprovisedSapThe innocent trappings of a fishing trip, an eight-ounce fishing weight and abandanawould attract no notice in a traveler’s backpack. Seen separately, theitemsposenodiscerniblethreat.Butinthefaceofimminentdanger,theycanbeturnedintoaneffective,small,anddensemakeshiftsap.Foldtheweightintothebandana,thenrollthebandanaintoacylinder.Foldthetwoendstogetherandstrikeopponents,aimingforknee(tocausebuckling)orhead(tocausetheassailanttoloseconsciousness).Theresultingweaponwillbepowerful enough tocracka coconut anddoequivalentdamage toahumanskull.031 MakeaFlexibleChainWeaponThoughnowmostcloselyidentifiedwiththeworldofmotorcyclegangs,chainweapons have been in use for a very long time. Modeled after the medievalweapon called a chain mace, a basic flexible chain weapon can be made byattaching two items thatnaturallybelong together (andhenceshouldattractnosuspicion):achainandapadlock.Theresultingweaponwillbestrongenoughtocrackhumanbone.Thoughanybicyclist canusehis chain and lock as improvisedweaponsofself-defense,theideallengthofchain—slightlylongerthananaverageforearm—isshorterthanthatusedtolockupabike.Anoverlongchainwillswingtooslowly,givinganassailantplentyoftimetoreact.032 MakeaNewspaperNailBatThe sight of a personwalking down the street holding a newspaper is one socommon and unremarkable that in the surveillance world, newspapers arefrequentlyusedasdecoys;likecellphonesorcigarettes,theypresentoperativeswithanalibiforloiteringonparkbencheswhilesurveyingatarget,ameansofbecomingacreatureoftheirenvironment.Inapinch,theycanalsobeusedasaweapon.Rolled up into a tight cylinder that is doubled over onto itself and tapedtogether,afewsheetsofnewspaperbecomeasurprisinglysturdybaton.Wettingthepapergivesthebatonasignificantamountofextraweight,andtheadditionofatwo-and-a-half-inchwoodnailturnsthebatonintoapotentiallydevastatingbludgeon.CivilianBLUF:Inavolatile,unsecuredenvironment,eventhemostinnocentofpropscanbecauseforalarm.033 DeployaRollofCoinsFor an easy-to-reach advantage in hand-to-hand combat, an operative keeps aroll of coins in his pocket at all times. (Foreign currency closest in size toAmericannickelsorquarterswillresultinoptimalheft.)Grippedinthecenterofthe palm, the coins will increase the density andweight of his fist—a street-fightingtrickthatwillsignificantlyamplifythevelocityandimpactofapowerpunchsuchasastraightrightorleftpunch,ahook,oranuppercut.Stuffedintoasock,pillowcase,orhandkerchief,thatsamerollofcoinscanbeused as an improvised sap.This type ofweapongains a surprising amount ofpower fromacombinationofvelocity anddensity.When swungwith force, itcanbreakbones;directedatanopponent’shead,theimpactcaneasilyresultinaknockout.In its bloodiest incarnation, a roll of coins can be studded with householdnailstocreateasharpanddeadlyversionofbrassknuckles.Apunchwiththesespiked knuckles (another hallmark of street fighting) will inflict serious andunexpecteddamagenomatterwhereitlands.Carriedseparately,eachof these items—arollofcoins,a fewstraynails,apairofsocks—isnon-alerting.ButwhenaNomadsensesdangerahead,theycanbeassembledintoeffectiveoptionsforself-defenseinunderaminute’stime.PARTIVSURVEILLANCE:OBSERVATION,TRACKING,ANDCOUNTER-SURVEILLANCE034 DismountedSurveillanceStalkingasubjectonfootmaybealow-techproposition,butitisalsoacomplexendeavorwithahighinherentriskofdiscovery.Conductingsurveillancealoneisparticularly difficult, the stress of potentially being “burned” amplified aspatienceandstaminaaretestedoverlonghoursanddays.Becauseanoperativecan’t switch out with team members, he is more likely to be spotted by thetarget.Severalrulesofthumbcanmitigaterisk.Whenonfoot,remaininthetarget’sblind spot at all times. While the target eats, sleeps, or works, take theopportunitytochangeclothes.Switchoutofclothingasoftenaspossible—atadistance, humanbeings are recognizedby the color and styleof their clothingratherthantheirfacialfeatures.Neverwearthesamethingtwice.Use the environment to gain advantage. Glass surfaces offer reflectivecapabilitiesandcanalsoallowanoperative toscan thestreet fromaprotectedvantagepoint.Varythetimingofsurveillanceto learnthetarget’spatternswhile thwartingpossiblecountersurveillance.Donotattempt to follow the targetallday,everyday—that’sasurefirewaytoarousesuspicion.Around-the-clocksurveillanceisbettersuitedforamultimemberteamwithplentyofpeoplewhocanrotateinandout.Eighty-fivepercentofsurveillanceteamsaredetectedbythirdpartiesratherthan by the targets themselves—which underlines the importance of blendingintotheenvironment.Lookthepart,andcarrybooks,maps,cigarettes,andotherformsof“pocketlitter”asnon-alertingexcusesforloitering.035 MobileSurveillanceVolatile,high-speedcarchasesmaylightupthesilverscreen,buttheslow-pacedrealityofvehicularsurveillanceisdefinedbypatienceandpersistence.It’seasyto become complacent when stuck in bumper-to-bumper traffic or waitingoutsideamovietheaterfortwohours—andtolosesightofthe“rabbit’s”vehicleas he pulls a quick right or slips out of a parking lot during one of thosemomentarylapsesinattention.Vigilanceiskey.It’salsosurprisinglyeasy tobespottedwhenfollowinga target tooclosely.Toavoiddetection,stayoutofthetarget’smirrorsandlaneandremainonecarbehindatalltimes.Alwaysobservethe“two-turnlimit.”Followingthetargetformore than twoconsecutive turnsbrings a serious riskof beingburned. In thisand many other regards, mounted surveillance is far better suited to amultimemberteaminwhichonemembercanblowpastaturn, lettingthenextsurveillanceteammembertakeoverandbecomethenew“eye.”Avoid mirroring the target’s actions, particularly on U-turns. If the targettakes a U-turn,move to the next turn pocket, then turn around and catch up.Don’t followa rabbit through a series of oddmaneuvers such as stairsteppingthrough neighborhoods or pulling into dead ends; the rabbit is probablyperformingthesemaneuversinordertoconfirmthathe’sbeingfollowed.Let density determine distance. Stay close in dense traffic and/or urbanenvironmentswithmanystoplights.Twoorthreecarsbetweenanoperativeandthetargetcouldspellalossiftheoperativemissesalightortwobecauseacaraheadofhimhasstoppedtotakeaturn.Inaruralareawithlowdensity,stayfarback;fewerdriversontheroadmeanslesscamouflage.CivilianBLUF:Increaseyourawarenessofcarsthatseemtobemirroringyouas
  • O Ladrão Quântico
  • DOM CASMURRO
  • O livro - Design de livros didáticos digitais
  • oliver_twist_-_uma_critica_social_por_charles_dickens_0
  • Relação Interdisciplinar Literatura e Música
  • Autoria Feminina na Literatura
  • Literatura e Marcas nas Redes Sociais
  • O maior empresário que o Brasil já teve
  • Características do Modernismo
  • Lições de Fábulas
  • Níveis de Alumínio e Zinco em água coletada em dois municípios 2006
  • Turismo e mudanças climáticas ameaçam o Lago Baikal um tesouro global único
  • De buracos de mandril de madeira a buracos de vermes - Um olhar para os cadernos de John Wheeler
  • Sobre um dos objetivos do Planejamento Estratégico do Sistema de Informação, assinale a alternativa correta. Identificar os "requisitos de info...
  • A obra de Fernão Lopes tem um caráter: Escolha uma opção: A. Basicamente histórico, pela fidelidade à documentação e pela objetividade da linguag...
  • (UEM-2017, adaptado) Sobre os festivais de música promovidos por canais de televisão brasileiros, da metade dos anos 60 ao início dos anos 80, assi...
  • Na entrevista concedida por Perrenoud, ele discute e apresenta os maiores desafios para a educação hoje, não só no Brasil, mas no mundo inteiro. Es...
  • Questão 1/10 - Literatura Clássica Considere a citação: “Primeiro, os gregos desenvolveram uma escrita de caráter silabar (baseada nas sílabas),...
  • os estudos de helenistas – no que diz respeito às epopeias homéricas – mostram que todas as evidências, [...] por exemplo técnicas de memorização e...
  • RECUPERAÇÃO 2° BIMESTRE 2° SÉRIE Texto IV "Da tribo pujante, Que agora anda errante, Por todo inconstante, Guerreiros, nasci; Sou bravo, sou forte,...
  • Marque a alternativa que delimita os aspectos que relacionam as gerações aos autores. Escolha uma opção: A. nacionalista - Almeida Garrett B. u...
  • O que é teoria literária? CLIQUE NA SUA RESPOSTA ABAIXO É uma ciência que prioriza o estudo das manifestações literárias É uma ciência que trabal...
  • Marque a opção que corresponde a uma obra considerada um romance-reportagem: Escolha uma opção: A. Vidas Secas, de Graciliano Ramos. B. Os Sert...
  • Na LÍRICA de Camões Escolha uma opção: A. Encontram-se sonetos, odes, sátiras e autos. B. A mulher é vista em seus aspectos físicos, despojada ...
  • "E em arte aos de Minerva se não rendem Teus alvos, curtos dedos melindrosos." Indique a característica presente nos versos acima, de autoria de Bo...
  • A "áurea mediocridade", a fuga à vida citadina, o bucolismo definem-se como tendências do: Escolha uma opção: A. Parnasianismo. B. Arcadismo. ...
  • TMI 1 Ergonomia
  • EGT0104 - SAÚDE, SEGURANÇA E QUALIDADE DE VIDA NO TRABALHO ACERTO 10/10

Perguntas dessa disciplina

Áurea escreveu uma sentença para Émerson completar, de modo que a torne verdadeira: 99 + 104 = 100 + 100 _______. Ele pensou e apresentou duas poss...
What are the seven deadly sins according to the Catholic Church? I- The seven deadly sins are the sins that generate other sins and vices.II- The...
Qual o nome completo do presidente Clinton?
Quem deveria ter morrido a Natasha ou o Clint?
Leia o texto abaixo e responda as questões de 1 a 4 Texto 1 De acordo com o texto, ao se aproximarem da costa, as ondas do tsunami Escolha uma o...
100 Deadly Skills - Clint Emerson - Literatura (2024)

References

Top Articles
Latest Posts
Article information

Author: Tish Haag

Last Updated:

Views: 6323

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Tish Haag

Birthday: 1999-11-18

Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

Phone: +4215847628708

Job: Internal Consulting Engineer

Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.