Searching...
English
EnglishEnglish
EspañolSpanish
简体中文Chinese
FrançaisFrench
DeutschGerman
日本語Japanese
PortuguêsPortuguese
ItalianoItalian
한국어Korean
РусскийRussian
NederlandsDutch
العربيةArabic
PolskiPolish
हिन्दीHindi
Tiếng ViệtVietnamese
SvenskaSwedish
ΕλληνικάGreek
TürkçeTurkish
ไทยThai
ČeštinaCzech
RomânăRomanian
MagyarHungarian
УкраїнськаUkrainian
Bahasa IndonesiaIndonesian
DanskDanish
SuomiFinnish
БългарскиBulgarian
עבריתHebrew
NorskNorwegian
HrvatskiCroatian
CatalàCatalan
SlovenčinaSlovak
LietuviųLithuanian
SlovenščinaSlovenian
СрпскиSerbian
EestiEstonian
LatviešuLatvian
فارسیPersian
മലയാളംMalayalam
தமிழ்Tamil
اردوUrdu
The Anarchist Cookbook

The Anarchist Cookbook

by William Powell 1971 160 pages
3.50
2.5K ratings
Listen
Try Full Access for 7 Days
Unlock listening & more!
Continue

Key Takeaways

1. Unleash Chaos: The Power of Forbidden Knowledge

The stakes are high, but the payoff is worth it.

Knowledge is power. This book is a compilation of information, some of which is illegal, that can be used to disrupt and challenge established systems. It provides instructions on everything from counterfeiting money to creating explosives, offering readers the tools to potentially undermine authority and create chaos.

Ethical considerations. The book explicitly acknowledges the high stakes involved in using this information, implying that the potential rewards justify the risks. However, it also carries a heavy ethical burden, as the knowledge can be used for destructive and harmful purposes.

Empowerment through information. The book suggests that access to forbidden knowledge can be empowering, allowing individuals to challenge authority and potentially disrupt systems they perceive as unjust. This empowerment, however, comes with significant legal and ethical responsibilities.

2. Counterfeit Currency: Printing Your Own Reality

The Canon can replicate ANYTHING in vibrant color, including US currency.

Mastering the craft. The book details the process of counterfeiting U.S. currency using photo offset printing, emphasizing the need for familiarity with the printing process. It outlines the steps involved, from creating negatives to mixing inks, to produce passable counterfeit bills.

Technological shortcuts. The book also mentions the use of Canon color laser copiers as an alternative method for counterfeiting, acknowledging the importance of experimenting with paper to achieve a convincing result. This highlights the potential for technology to simplify illegal activities.

The allure of easy money. The book presents counterfeiting as a way to obtain money easily, but it also acknowledges the risks involved, including the potential for severe legal consequences. It encourages readers to experiment and take their chances.

3. Credit Card Conquest: The Art of Plastic Plunder

With the recent advent of plastic money (credit cards), it is easy to use someone else's credit card to order the items you have always desired in life.

Exploiting vulnerabilities. The book outlines methods for obtaining credit card information, including scavenging carbons from trash and using deceptive phone calls to trick individuals into revealing their card numbers. This highlights the vulnerabilities in credit card security and the potential for exploitation.

Recognizing card types. The book provides detailed information on how to recognize different types of credit cards, including Visa, Mastercard, and American Express, and their associated features and security measures. This knowledge is intended to help readers make informed decisions about which cards to target.

The drop and the transaction. The book emphasizes the importance of using a reliable drop site for receiving stolen goods and provides tips for making transactions, such as ordering from catalogs and mail-order houses and avoiding suspicious behavior. This underscores the need for careful planning and execution in credit card fraud.

4. Explosive Alchemy: From Household to Havoc

Potassium chlorate is an extremely volatile explosive compound.

Transforming the mundane. The book provides instructions for creating plastic explosives from common household bleach, highlighting the potential for everyday materials to be transformed into dangerous weapons. This underscores the need for caution and awareness regarding the potential misuse of common chemicals.

The science of destruction. The book details the chemical processes involved in extracting potassium chlorate from bleach and combining it with other ingredients to create a volatile explosive. This knowledge, while potentially dangerous, offers insight into the science behind explosives.

A word of caution. The book includes a warning about the dangers of working with explosives, emphasizing the need for extreme caution and the potential for serious injury or death. This serves as a reminder of the risks involved in engaging with such information.

5. Lockpicking Unveiled: Mastering the Art of Entry

Have you ever tried to impress someone by picking one of those Master combination locks and failed?

Bypassing security. The book provides instructions for picking Master combination locks, exploiting a flaw in older models that allows them to be opened with a specific sequence of movements. This demonstrates the potential for bypassing security measures with the right knowledge and technique.

Tools of the trade. The book also discusses various tools and techniques for lockpicking, including the use of Slim Jims, lock aid guns, and electronic picks. This offers a glimpse into the world of locksmithing and the potential for unauthorized entry.

A changing landscape. The book acknowledges that lockpicking techniques are constantly evolving, with manufacturers developing new mechanisms to prevent unauthorized entry. This underscores the ongoing cat-and-mouse game between security professionals and those seeking to bypass security measures.

6. Phone Phreaking: A Symphony of Subversion

There are many uses for a Beige Box.

Exploiting the network. The book provides instructions for building a "Beige Box," a device that allows users to tap into phone lines and make free calls. This highlights the potential for exploiting vulnerabilities in telecommunications systems for personal gain.

Eavesdropping and anonymity. The book also discusses various techniques for eavesdropping on phone conversations and maintaining anonymity while using the phone system, including the use of pay phones and blue boxes. This underscores the potential for technology to be used for surveillance and deception.

A world of possibilities. The book suggests that phone phreaking can open up a world of possibilities, from making free long-distance calls to harassing operators and disrupting phone service. This underscores the potential for technology to be used for both harmless pranks and malicious activities.

7. High-Tech Revenge: Weaponizing Everyday Objects

Now, light it and run like hell!

Turning the ordinary into the extraordinary. The book provides instructions for creating a COý bomb from a COý cartridge, highlighting the potential for everyday objects to be repurposed as weapons. This underscores the need for awareness regarding the potential misuse of common items.

Thermite and touch explosives. The book also includes recipes for creating thermite and touch explosives, demonstrating the potential for chemical reactions to be harnessed for destructive purposes. This knowledge, while potentially dangerous, offers insight into the science behind explosives.

A word of caution. The book includes a warning about the dangers of working with explosives, emphasizing the need for extreme caution and the potential for serious injury or death. This serves as a reminder of the risks involved in engaging with such information.

8. Culinary Anarchy: Recipes for Chaos and Mayhem

With some testing you can time this to a science.

Paint bombs and more. The book provides instructions for creating paint bombs, letter bombs, and other destructive devices, highlighting the potential for everyday materials to be used for vandalism and harm. This underscores the need for awareness regarding the potential misuse of common items.

Thermite and touch explosives. The book also includes recipes for creating thermite and touch explosives, demonstrating the potential for chemical reactions to be harnessed for destructive purposes. This knowledge, while potentially dangerous, offers insight into the science behind explosives.

A word of caution. The book includes a warning about the dangers of working with explosives, emphasizing the need for extreme caution and the potential for serious injury or death. This serves as a reminder of the risks involved in engaging with such information.

9. School's Out: Guerrilla Tactics for Academic Freedom

USE YOUR IMAGINATION!

Disrupting the system. The book provides instructions for disrupting school activities, including calling in bomb threats, creating smoke bombs, and stealing computer passwords. This highlights the potential for individuals to challenge authority and disrupt established systems.

Creative chaos. The book encourages readers to use their imagination to come up with new and innovative ways to disrupt school activities, suggesting that the possibilities are endless. This underscores the importance of critical thinking and creativity in challenging authority.

A word of caution. The book includes a warning about the potential consequences of engaging in such activities, emphasizing the need for caution and awareness of the risks involved. This serves as a reminder of the potential for serious legal and disciplinary repercussions.

10. Car-nage: Turning Automobiles into Instruments of Destruction

There are 1001 ways to destroy a car but I am going to cover only the ones that are the most fun (for you), the most destructive (for them), and the hardest to trace (for the cops).

Creative destruction. The book provides a variety of methods for damaging or destroying cars, ranging from simple acts of vandalism to more elaborate schemes involving explosives and sabotage. This underscores the potential for everyday objects to be repurposed as weapons.

The art of the untraceable. The book emphasizes the importance of making the damage difficult to trace back to the perpetrator, suggesting methods such as using thermite, COý bombs, and dissolving substances in the gas tank. This highlights the need for careful planning and execution in avoiding detection.

A word of caution. The book includes a warning about the potential consequences of engaging in such activities, emphasizing the need for caution and awareness of the risks involved. This serves as a reminder of the potential for serious legal repercussions.

11. The Art of Vanishing: Creating a New Identity

REMEMBER, no one has ANY IDEA who the hell you are when you are talking on the phone, so you can be anyone you damn well please!

Exploiting bureaucratic loopholes. The book provides instructions for obtaining unlisted phone numbers and creating a new identity, exploiting loopholes in bureaucratic systems and relying on deception and social engineering. This highlights the potential for individuals to manipulate systems for personal gain.

The power of anonymity. The book emphasizes the importance of anonymity in avoiding detection and suggests methods for concealing one's true identity, such as using pay phones and creating fake personas. This underscores the potential for technology to be used for deception and evasion.

A word of caution. The book includes a warning about the potential consequences of engaging in such activities, emphasizing the need for caution and awareness of the risks involved. This serves as a reminder of the potential for serious legal repercussions.

Last updated:

Want to read the full book?

FAQ

What is "The Anarchist Cookbook" by William Powell about?

  • Comprehensive underground manual: "The Anarchist Cookbook" is a detailed guide to a wide range of illicit and subversive activities, including making explosives, phone phreaking, hacking, credit card fraud, and lockpicking.
  • Technical and practical focus: The book provides step-by-step instructions, technical schematics, and recipes for constructing devices, making drugs, and bypassing security systems.
  • Historical and cultural context: It reflects the countercultural spirit of the 1970s and 1980s, documenting underground communities and their methods, and includes anecdotes about legendary figures in hacking and phreaking.

Why should I read "The Anarchist Cookbook" by William Powell?

  • Historical insight: The book offers a rare look into the early days of hacking, phreaking, and underground resistance, capturing the mindset and culture of these communities.
  • Technical knowledge: Readers interested in electronics, chemistry, or security will find detailed DIY instructions and technical explanations not commonly found in mainstream literature.
  • Awareness of risks: The book emphasizes the legal and safety risks of these activities, providing warnings and disclaimers to help readers understand the consequences.

What are the key takeaways from "The Anarchist Cookbook" by William Powell?

  • Empowerment through knowledge: The book aims to equip readers with information often suppressed or hidden, encouraging self-reliance and critical thinking.
  • Risks and consequences: It repeatedly stresses the dangers—both legal and physical—of engaging in the activities described, urging caution and responsibility.
  • Historical documentation: "The Anarchist Cookbook" serves as a snapshot of underground techniques and subcultures from its era, offering context for the evolution of hacking and resistance movements.

What are the main methods of phone phreaking described in "The Anarchist Cookbook" by William Powell?

  • Blue Box and 2600 Hz tone: The book details how to use devices like the Blue Box to generate tones that manipulate telephone switching systems, allowing free long-distance calls.
  • Red Box and payphone fraud: Instructions are provided for simulating coin tones to trick payphones into registering false deposits.
  • Conference lines and jargon: It explains how phreakers set up conference lines, use operator codes, and understand Bell System jargon to navigate and exploit phone networks.

How does "The Anarchist Cookbook" by William Powell explain hacking computer systems and networks?

  • System access techniques: The book covers methods for gaining unauthorized access to systems like UNIX, VAX, and networks such as NSFnet and Tymnet, including scanning for numbers and exploiting vulnerabilities.
  • Network protocols and commands: It explains foundational protocols like TCP/IP, FTP, Telnet, and SMTP, and provides command examples for interacting with remote systems.
  • Avoiding detection: Advice is given on minimizing the risk of being caught, such as varying usage times and avoiding suspicious systems.

What are the key recipes and safety warnings for making explosives in "The Anarchist Cookbook" by William Powell?

  • Detailed explosive formulas: The book provides step-by-step instructions for making substances like black powder, thermite, napalm, and plastic explosives from household materials.
  • Ignition and delay systems: It covers various ignition methods, including fuses, electrical igniters, and chemical or mechanical timers for controlled detonation.
  • Emphasis on safety: Strong warnings are given about the volatility and dangers of homemade explosives, with advice to avoid storage and handle all materials with extreme caution.

How does "The Anarchist Cookbook" by William Powell instruct on counterfeiting money and credit card fraud?

  • Counterfeiting techniques: The book describes photo offset printing for duplicating currency, including manipulating serial numbers and aging paper to mimic real bills.
  • Credit card fraud methods: It explains how to obtain card information, interpret card details, and use drop sites for receiving goods, while warning about the legal risks involved.
  • Practical advice and risks: Readers are cautioned about detection and prosecution, with tips for minimizing exposure but clear disclaimers about the consequences.

What are the main drug recipes and information included in "The Anarchist Cookbook" by William Powell?

  • LSD and psychedelics: Instructions are given for extracting LSD from seeds, with notes on dosages, potency, and safety regarding toxic coatings.
  • Marijuana edibles: The book includes recipes for pot brownies, soup, and loaf, aiming to make consumption more effective and palatable.
  • Other substances: It mentions mild psychedelics like bananadine and offers tips for sourcing and preparing various substances, always with safety warnings.

What is the Infinity Transmitter and how is it constructed according to "The Anarchist Cookbook" by William Powell?

  • Bugging device purpose: The Infinity Transmitter is designed to activate a microphone via a phone call, allowing remote eavesdropping without ringing the phone.
  • Technical assembly: The book lists all necessary electronic components and provides a circuit diagram, explaining how the device intercepts the ring signal and powers the microphone.
  • Setup and troubleshooting: Instructions cover wiring, adjusting sensitivity, and resolving common issues, with encouragement to seek help if needed.

What legal rights and protections for arrested individuals are outlined in "The Anarchist Cookbook" by William Powell?

  • Basic post-arrest rights: The book details rights such as a hearing before a magistrate, notification of charges, reasonable bail, and the right to a fair trial and legal representation.
  • Juvenile protections: Special rights for minors are explained, including separate custody, closed proceedings, and appointed counsel.
  • Importance of enforcement: The book stresses that violations of these rights can lead to mistrials or release, and encourages readers to assert their legal protections.

What are Remobs and how are they used according to "The Anarchist Cookbook" by William Powell?

  • Remote monitoring devices: Remobs are systems installed by phone companies to allow silent monitoring of a phone line from anywhere using a touch-tone phone.
  • Operation and privacy risks: The book explains how Remobs are activated and notes that their presence cannot be detected by the subscriber, posing a significant privacy threat.
  • Legal warnings: Unauthorized use of Remobs is illegal, and the book cautions readers about strict wiretapping laws and the consequences of misuse.

What are the main types of ignition and delay systems for explosives described in "The Anarchist Cookbook" by William Powell?

  • Fuse-based systems: Instructions are given for making waterproof fuses, blackmatch, and slow-burning fuses, with guidance on calculating burn rates.
  • Electrical and impact ignition: The book covers electric igniters using bulbs or steel wool, as well as impact methods like percussion caps and mercury switches.
  • Timer and chemical delays: Mechanical, electronic, and chemical delay systems are described, allowing for precise or extended detonation timing, with strong safety warnings throughout.

Review Summary

3.50 out of 5
Average of 2.5K ratings from Goodreads and Amazon.

The Anarchist Cookbook receives mixed reviews, with an average rating of 3.50. Some praise its commentary on society and counterculture, while others criticize its outdated and potentially dangerous information. Many readers view it as a product of its time, reflecting 1970s anti-establishment sentiment. Critics warn against attempting the book's recipes, citing inaccuracies and safety concerns. Some find value in its historical context, while others dismiss it as ineffective for modern revolutionaries. The author has since disavowed the book, requesting its discontinuation.

Your rating:
4.16
38 ratings

About the Author

William Powell is an American writer best known for "The Anarchist Cookbook," published in 1971. He has since denounced the book, calling it misguided and potentially dangerous, and requesting its discontinuation. Powell wrote the book at age 19, motivated by anger over the Vietnam War draft. He later became a teacher and changed his views on violence as a means of political change. Currently, Powell is co-director of Education Across Frontiers, an organization focused on international education. He has authored several books on this subject, reflecting his shift from anarchist ideals to educational pursuits.

Download PDF

To save this The Anarchist Cookbook summary for later, download the free PDF. You can print it out, or read offline at your convenience.
Download PDF
File size: 0.20 MB     Pages: 13

Download EPUB

To read this The Anarchist Cookbook summary on your e-reader device or app, download the free EPUB. The .epub digital book format is ideal for reading ebooks on phones, tablets, and e-readers.
Download EPUB
File size: 2.94 MB     Pages: 11
Listen
Now playing
The Anarchist Cookbook
0:00
-0:00
Now playing
The Anarchist Cookbook
0:00
-0:00
1x
Voice
Speed
Dan
Andrew
Michelle
Lauren
1.0×
+
200 words per minute
Queue
Home
Swipe
Library
Get App
Create a free account to unlock:
Recommendations: Personalized for you
Requests: Request new book summaries
Bookmarks: Save your favorite books
History: Revisit books later
Ratings: Rate books & see your ratings
200,000+ readers
Try Full Access for 7 Days
Listen, bookmark, and more
Compare Features Free Pro
📖 Read Summaries
Read unlimited summaries. Free users get 3 per month
🎧 Listen to Summaries
Listen to unlimited summaries in 40 languages
❤️ Unlimited Bookmarks
Free users are limited to 4
📜 Unlimited History
Free users are limited to 4
📥 Unlimited Downloads
Free users are limited to 1
Risk-Free Timeline
Today: Get Instant Access
Listen to full summaries of 73,530 books. That's 12,000+ hours of audio!
Day 4: Trial Reminder
We'll send you a notification that your trial is ending soon.
Day 7: Your subscription begins
You'll be charged on Aug 9,
cancel anytime before.
Consume 2.8x More Books
2.8x more books Listening Reading
Our users love us
200,000+ readers
"...I can 10x the number of books I can read..."
"...exceptionally accurate, engaging, and beautifully presented..."
"...better than any amazon review when I'm making a book-buying decision..."
Save 62%
Yearly
$119.88 $44.99/year
$3.75/mo
Monthly
$9.99/mo
Start a 7-Day Free Trial
7 days free, then $44.99/year. Cancel anytime.
Scanner
Find a barcode to scan

Settings
General
Widget
Loading...