Table of Contents 1.1 The counterfeit-forgery method for getting birth certificates 3.0 The infant death method of getting a birth certificate 7.3 Getting a fake drivers license 8.4 Ancillary Documentation 9.6 Social Security Cards 12.6 Applying for a Social Security Card 22.9 Mail Drops 24.2 Closing
Archive for the ‘From The DarkNet’ Category
How to Get Any Drug Package (Even if Compromised) Conclusion
These are all options that the investigator may take into consideration.
The U.S. Postal Inspection Service is the investigative arm of the U.S. Postal Service.
Postal inspectors are federal law enforcement officers who enforce over 200 federal laws in investigations of crime to include controlled substances.
Under U.S. Code 21, U.S. C841, 843, and 844, postal inspectors initiate investigations related to transportation and distribution of narcotics through the U.S. Mail or other postal facilities.
The U.S. Postal Inspection Service cooperates with local, state, and other federal law enforcement agencies in controlled substance operations.
These joint investigative efforts with local authorities are part of parcel interdiction groups around the country.
How to Get Any Drug Package (Even if Compromised) Part 3
In addition to preparing the anticipatory search warrant, investigators may consider placing an electronic alarm device within the suspect parcel.
This court-ordered tracking device emits a tone once placed inside the parcel.
When the recipient opens the parcel, the device emits a tone that alerts investigators that the parcel has been opened.
The placement and monitoring of this type of electronic device requires issuance of a court order.
Application for a court order-authorized mobile tracking device is a separate document from the anticipatory search warrant. Read the rest of this entry »
How to Get Any Drug Package (Even if Compromised) Part 2
An outgoing parcel investigation should be conducted to verify sender information such as name, address, and telephone number.
Probable cause necessary to obtain a search warrant for the parcel is developed in this way.
It may be necessary for investigators to verify location by driving by the address.
A sender address may not exist or may be part of a large apartment complex with no apartment number.
The sender name must be verified, and typically is a common name or does not exist as it relates to a particular address and telephone number. Read the rest of this entry »
How to Get Any Drug Package (Even if Compromised) Part 1
Here is a great post from the Agora forums posted back in Feb 2014 by DrMDA.
As the title suggested, the post is a guide on how to legally accept any drug package even if it is compromised or contains a large amount of illegal drugs.
The post is an excerpt taken from the book “Drug Interdiction: Partnerships, Legal Principles, and Investigative Methodologies for Law Enforcement”.
This post mainly applies to the laws in the US, but is a very interesting read to say the least!
I would also like to point out that laws change as time passes so this could be outdated by the time you read it.
Dark Web News in no way endorses or encourages illegal activities. Read the rest of this entry »
Massacres: Guide to Maximizing Your Kill Count Conclusion
I’m not saying that this is the best or only proper (?) way to do a mass-murder… I will not argue with anyone who says it is more “courageous” to do a mass-murder in a police station rather than a schoolyard… But the entire focus of this essay is centered on the one goal of MAX. DEATH!
O.k., let us now briefly examine the “element of surprise attack” and it’s importance to mass-murder. I do NOT think it is a very crucial element. The fact is that most EVERY mass-murder is a TOTAL surprise.
NOBODY can EVER predict that a certain person will attempt a mass-shooting on a particular day in a particular place.
The only precautions a gunman needs to take involves simple common sense. If you write threatening letters in which you indicate that you are planning a massacre in a particular location, then you are a FOOL! Read the rest of this entry »
Massacres: Guide to Maximizing Your Kill Count Part 1
By Full Force Frank
Hey! How are y’all doin’? This is Frank, yer eDICKtor. I’m sorry about taking up space with dat disclaimer on top, but I figure that an essay dealing with MAXIMIZING MASS-MURDER KILL COUNTS leaves a noticeable draft on your humble eDICKtor’s valuable position as a respected and law-abiding member of the community. So, I am covering MY ASS with a disclaimer up there! So anyway, today is December 22, 1989, a coupla dayz before Christmas.
The Basics of Terminating Human Life Part 7: Explosives
Explosives have been used for many years as a form of assassination, and terrorism. Probably the most known group who uses explosives are the Mafia. Explosives can be used in many ways: under a car, in a light bulb, a light switch, etc…. There are many ways apply explosives the sky’s the limit.
The explosive is the actual cause of death, it’s the shrapnel which causes injuries that cause death. So keep that in mind when using explosives for assassination. In the following chapter I will supply you with different recipes for explosives use them how you will.
ANFO (original source – TAFE blasting course) (secondary source – Makeshift Arsenal) ANFO is the most commonly used commercial and agricultural explosive as it is cheap and does a good job, this is the explosive farmers use to blow stumps out of the ground and mines also use it on mass. Read the rest of this entry »
—- was ripped from a diskmag called Scenial issue 4 (scenial4.zip) —–
So you wanna be a carthief? Start by taking on a good lawyer. And, eh, don’t steal a car when you are hitch hiking. Imagine this: a hospitable chauffeur stops to piss against a tree and the stupid moron leaves his keys on the ignition.
Resist to the seduction, because that man can give a personality description to the cops, and that can be fatal!
Don’t force the driver to get out of his car either, because that’s a violence delict or something, and that would make only make thing more complicated for your lawyer.
You get much more fun out of stealing a car when the owner is standing right next to it. For instance: you see a man waiting in his ’till the grass turns blue.
Get him out with some fake story (“Sir, I believe you have a flat tire”, works wonders). While he rushes to the back of his car to take a look at the catastrophe, you jump in his car and drive away. EVERYBODY leaves his keys on the ignition when he’s waiting for something.
When you see an unmanned car which you’d love to take for a drive, first of all, check if there’s a dog in it. If there is, forget about it! Dogs in cars are the best way to scare of thieves. Read the rest of this entry »
The Illegal Guide to Credit Card Verifications Part 1: Create Your Own Credit Card Numbers
Subject: Bypassing just about ANY online credit card verification method with credit card numbers you generated. Description: How to use it, common security measures used AND the formula to creating your own.
When it’s usable: If you want to get something.
What the nice possibility is: I forget.
What the evil possibility is: Register all those 30-day trial programs you have. NOTE: this has been written in an very detailed manner, so if you don’t get it, then you might not be as smart as you think you are. Read the rest of this entry »