Académique Documents
Professionnel Documents
Culture Documents
Intro
This is a reprint of a guide called What is Security Culture? published by the CrimethInc collective. As far as we know, it first appeared in their book Recipes for Disaster: An Anarchist Cookbook and then appeared in a slightly updated form in 2009 on their website, Crimethinc.com. Were reprinting this because the information contained within cannot be shared enough within our communities. Over the past several years, weve seen various instances of anarchists getting serious federal charges. Eric McDavid was entrapped by a federal informant Anna with whom he hatched a plot to blow up a dam and was later sentenced to several years in prison. At the 2008 protests against the Republican National Convention (RNC), several folks were entrapped by federal informants Bradley Crowder, David McKay, and Matthew Depalma. While one certainly cant say that more easily accessible information on security culture would have prevented these situations, it seems that the more widely available the information is the safer we will all be. We chose to reprint this guide specifically because it focuses on general principles rather than specific tactics necessary to building secure communities of resistance. Please read this guide, share it, enact these principles in your life, and explain them to people who arent familiar with them. Most importantly, please, please take security culture seriously. Finally, folks would also do well to do some additional research on the subject of social networking and computer security. As computers dominate more and more of our lives, it is important that folks think about the risks that their use can pose for those in conflict with the state.
Dont make it too easy for your enemies to figure out what youre up to.
Dont be too predictable in the methods you employ, or the targets you choose, or the times and places you meet to discuss things. Dont be too visible in the public aspects of the struggle in which you do your most serious direct action: keep your name off mailing lists and out of the media, perhaps avoid association with aboveground organizations and campaigns entirely. If youre involved in really serious clandestine activities with a few comrades, you may want to limit your interactions in public, if not avoid each other altogether. Federal agents can easily get access to the phone numbers dialed from your phone, and will use such lists to establish connections between individuals; the same goes for your email, and the books you check out from libraries, and especially social networking sites like Myspace. Dont leave a trail: credit card use, gas cards, cell phone calls all leave a record of your motions, purchases, and contacts. Have a cover story, supported by verifiable facts, if you might need one. Be careful about what your trash could reveal about youdropouts arent the only ones who go dumpstering! Keep track of every written document and incriminating photocopykeep them all in one place, so you cant accidentally forget oneand destroy them as soon as you dont need them. The fewer there are in the first place, the better; get used to using your memory. Make sure there arent any ghosts of such writing left behind in impressions on the surfaces you were writing on, whether these be wooden desks or pads of paper. Assume that every use of computers leaves a trail, too.
Dont throw any direct action ideas around in public that you think you might want to try at some point.
Wait to propose an idea until you can gather a group of individuals that you expect will all be interested in trying it; the exception is the bosom companion with whom you brainstorm and hash out details in advancesafely outside your home and away from mixed company, of course. Dont propose your idea until you think the time is right for it to be tried. Invite only those you are pretty certain will want to join ineveryone you invite who doesnt end up participating is a needless security risk, and this can be doubly problematic if it turns out they feel your proposed activity is laughably dumb or morally wrong. Only invite people who can keep secretsthis is critical whether or not they decide to participate.
Dont get too distracted worrying about whether people are infiltrators or not; if your security measures are effective, it shouldnt even matter.
Dont waste your energy and make yourself paranoid and unsociable suspecting everybody you meet. If you keep all sensitive information inside the circle of people it concerns, only collaborate with reliable and experienced friends whose history you can verify, and never give away anything about your private activities, agents and police informers will be powerless to gather evidence to use against you. A good security culture should make it practically irrelevant whether these vermin are active in your community or not. The important thing is not whether or not a person is involved with the cops, but whether or not he constitutes a security risk; if he is deemed insecure (double meaning intended), he should never be permitted to end up in a situation in which anyones safety depends on him.
Learn and abide by the security expectations of each person you interact with, and respect differences in style.
To collaborate with others, you have to make sure they feel at home with you; even if youre not collaborating with them, you dont want to make them uncomfortable or disregard a danger they understand better than you. When it comes to planning direct action, not abiding
by the security culture accepted in a given community can wreck not only your chances to cooperate with others on a project, but the possibility of the project happening at allfor example, if you bring up an idea others were planning to try in a setting they deem insecure, they may be forced to abandon the plan as it may now be associated with them. Ask people to outline for you their specific security needs before you even broach the subject of direct action.
Let others know exactly what your needs are when it comes to security.
The corollary of abiding by others expectations is that you must make it easy for others to abide by yours. At the beginning of any relationship in which your private political life may become an issue, emphasize that there are details of your activities that you need to keep to yourself. This can save you a lot of drama in situations that are already stressful enough; the last thing you need on returning from a secret mission gone awry is to end up in a fight with your lover: But if you trusted me, you would tell me about this! How do I know youre not out there sleeping with! Its not a matter of trustsensitive information isnt a reward to be earned or deserved.
Security culture is a form of etiquette, a way to avoid needless misunderstandings and potentially disastrous conflicts.
Security concerns should never be an excuse for making others feel left out or inferiorthough it can take some finesse to avoid that! just as no one should feel they have a right to be in on anything others prefer to keep to themselves. Those who violate the security culture of their communities should not be rebuked too harshly the first timethis isnt a question of being hip enough to activist decorum to join the in-group, but of establishing group expectations and gently helping people understand their importance; besides, people are least able to absorb constructive criticism when theyre put on the defensive. Nevertheless, such people should always be told immediately how theyre putting others at risk, and what the consequences will be should they continue to. Those who cant grasp this must be tactfully but effectively shut out of all sensitive situations.
Security culture is not paranoia institutionalized, but a way to avoid unhealthy paranoia by minimizing risks ahead of time.
It is counterproductive to spend more energy worrying about how much surveillance you are under than is useful for decreasing the danger it poses, just as it is debilitating to be constantly second-guessing your precautions and doubting the authenticity of potential comrades. A good security culture should make everyone feel more relaxed and confident, not less. At the same time, its equally unproductive to accuse those who adhere to security measures stricter than yours of being paranoidremember, our enemies are out to get us.
Police attention and surveillance is not necessarily an indication that they know anything specific about your plans or activities: often it indicates that they do not and are trying to frighten you out of continuing with them. Develop an instinct with which to sense when your cover has actually been blown and when your enemies are just trying to distress you into doing their work for them.
Always be prepared for the possibility that you are under observation, but dont mistake attracting surveillance for being effective.
Even if everything you are doing is perfectly legal, you may still receive attention and harassment from intelligence organizations if they feel you pose an inconvenience to their masters. In some regards, this can be for the best; the more they have to monitor, the more thinly spread their energies are, and the harder it is for them to pinpoint and neutralize subversives. At the same time, dont get caught up in the excitement of being under surveillance and begin to assume that the more the authorities pay attention to you, the more dangerous to them you must betheyre not that smart. They tend to be preoccupied with the resistance organizations whose approaches most resemble their own; take advantage of this. The best tactics are the ones that reach people, make points, and exert leverage while not showing up on the radar of the powers that be, at least not until it is too late. Ideally, your activities should be well known to everyone except the authorities.
Balance the need to escape detection by your enemies against the need to be accessible to potential friends.
In the long run, secrecy alone cannot protect ussooner or later they are going to find all of us, and if no one else understands what were doing and what we want, theyll be able to liquidate us with impunity. Only the power of an informed and sympathetic (and hopefully similarly equipped) public can help us then. There should always be entryways into communities in which direct action is practiced, so more and more people can join in. Those doing really serious stuff should keep it to themselves, of course, but every community should also have a person or two who vocally advocates and educates about direct action, and who can discreetly help trustworthy novices link up with others getting started.
When youre planning an action, begin by establishing the security level appropriate to it, and act accordingly from there on.
Learning to gauge the risks posed by an activity or situation and how to deal with them appropriately is not just a crucial part of staying out of jail; it also helps to know what youre not worried about, so you dont waste energy on unwarranted, cumbersome security measures. Keep in mind that a given action may have different aspects that demand different degrees of security; make sure to keep these distinct. Heres an example of a possible rating system for security levels:
1. Only those who are directly involved in the action know of its existence. 2. Trusted support persons also know about the action, but everyone in the group decides together who these will be. 3. It is acceptable for the group to invite people to participate who might choose not tothat is, some outside the group may know about
the action, but are still expected to keep it a secret. 4. The group does not set a strict list of who is invited; participants are free to invite others and encourage them to do the same, while emphasizing that knowledge of the action is to be kept within the circles of those who can be trusted with secrets. 5. Rumors of the action can be spread far and wide through the community, but the identities of those at the center of the organizing are to be kept a secret. 6. The action is announced openly, but with at least some degree of discretion, so as not to tip off the sleepier of the authorities. 7. The action is totally announced and aboveground in all ways. To give examples, security level #1 would be appropriate for a group planning to firebomb an SUV dealership, while level #2 would be acceptable for those planning more minor acts of property destruction, such as spraypainting. Level #3 or #4 would be appropriate for
calling a spokescouncil preceding a black bloc at a large demonstration or for a group planning to do a newspaper wrap, depending on the ratio of risk versus need for numbers. Level #5 would be perfect for a project such as initiating a surprise unpermitted march: for example, everyone hears in advance that the Ani DiFranco performance is going to end in a spontaneous antiwar march, so people can prepare accordingly, but as no one knows whose idea it is, no one can be targeted as an organizer. Level #6 would be appropriate for announcing a Critical Mass bicycle ride: fliers are wrapped around the handlebars of every civilian bicycle, but no announcements are sent to the papers, so the cops wont be there at the beginning while the mass is still vulnerable. Level #7 is appropriate for a permitted antiwar march or independent media video screening, unless youre so dysfunctionally paranoid you even want to keep community outreach projects a secret. It also makes sense to choose the means of communication you will use according to the level of security demanded. Heres an example of different levels of communications security, corresponding to the system just outlined above:
1. No communication about the action except in person, outside the homes of those involved, in surveillance-free environments (e.g. the
group goes camping to discuss plans); no discussion of the action except when it is absolutely necessary. 2. Outside group meetings, involved individuals are free to discuss the action in surveillance-free spaces. 3. Discussions are permitted in homes not definitely under surveillance. 4. Communication by encrypted email or on neutral telephone lines is acceptable. 5. People can speak about the action over telephones, email, etc. provided theyre careful not to give away certain detailswho, what, when, where. 6. Telephones, email, etc. are all fair game; email listservs, fliering in public spaces, announcements to newspapers, etc. may or may not be acceptable, on a case-by-case basis. 7. Communication and proclamation by every possible medium are encouraged.
If you keep hazardous information out of circulation and you follow suitable security measures in every project you undertake, youll be well on your way to fulfilling what early CrimethInc. agent Abbie Hoffman described as the first duty of the revolutionary: not getting caught. All the best in your adventures and misadventures, and rememberyou didnt hear it from us!
2) Infiltration:
Three kinds of informants are used by authorities: undercover law enforcement agents, outside individuals paid to infiltrate groups, and group members who inform on others, either voluntarily or due to coercion. Informants can serve two functions (often simultaneously): they can collect information, and they can act as agents provocateur. Some informants simply report on the activities they witness and take part in while others intentionally disrupt these activities or attempt to pressure members to commit illegal acts. Because most informants work for incentivesmoney, promotions, prison sentence reductions, etc.they are often motivated to create greater legal threats than would otherwise exist, for which they will then receive greater incentives for helping to expose. Even in the absence of a real threat, informants will sometimes fabricate evidence of one.
St. Paul, Minnesota. As a result, eight members of the RNC Welcoming Committee, the group that organized logistics for the protests, were preemptively arrested and charged with conspiracy to riot in the 2nd degree in furtherance of terrorism and 1st degree conspiracy to commit criminal damage to property in furtherance of terrorism. The terrorism enhancements have since been dropped, but the RNC 8 still face conspiracy charges.[6] Additionally, two protesters were arrested for making Molotov cocktails on information provided by Brandon Darby, a longtime activist from Austin who offered his services to the FBI after reportedly becoming disillusioned with violent elements in the activist community. Questions remain, however, regarding Darbys own role in pushing the two young men to manufacture the explosives.[7]
Attempting to verify this information using public records, the internet, and references provided by the suspected individuals. If evidence is found confirming that individuals are informants: Have members of the group confront them with the evidence and ask them to leave the group. Share information about the identity of the informant, including photographs, with other groups. Consider contacting the press with evidence of the infiltration. If evidence is inconclusive but suspicions remain: Meet without the suspected informant to decide how to proceed. Possible options include asking the person to leave the group, or allowing them to remain in the group but with restricted access to sensitive material or participation in potentially illegal actions.
2) Computers:
If your computer contains sensitive or possible incriminating data, require logins with a username and password for when your computer boots, and to unlock the screensaver. Choose a complex passwordthe longer the better, combining upper- and lower-case letters, numerical digits, special characters (e.g.
10
@, #, $), and no names or proper words. Change your password regularly. Encrypt your data. According to the Electronic Frontier Foundations Surveillance Self-Defense Project (SSD)[9] aside from writing on paper and then destroying it, face-to-face oral communication is the most secure method of communicationabout 100 times more warrants were issued in 2007 for electronic wiretaps than for hidden recording devices (bugs). The next safest method is encrypted email, followed in order of security by landline telephones, cellular phones, unencrypted email, and finally text messages, which are the least secure of all forms of communication. The SSD therefore suggests: Think before you communicate!. Do you really want the phone company to have a record of this callwho you called, when, and how long you talked? Do you really want a copy of this email floating around in the recipients inbox, or on your or his email provider's system? Do you really want your cell phone provider to have a copy of that embarrassing SMS text message? Do you really want Google to know that you're searching for that? Delete emails from your providers server as soon as you first access the messages, and store your sent and draft emails locally in your email client software, rather than with your provider. In order to minimize the number of emails stored with your providerbe they received, sent, or draftavoid using webmail if at all possible, or, if you do use a webmail account, avoid the web interface and instead configure your email client software to send and receive emails directly via POP. Encrypt your emails whenever possible.[10]
[4] Green is the New Red, http://www.greenisthenewred.com; Crimethinc. Ex-Workers Collective, Green Scared? Preliminary Lessons
of the Green Scare, http://www.crimethinc.com/texts/recentfeatures/greenscared.php
[5] Thomas Cincotta, From Movements to Mosques, Informants Endanger Democracy, The Public Eye, Summer 2009,
http://www.publiceye.org/magazine/v24n2/movements-to-mosques.html. On Anna http://www.greenisthenewred.com/blog/elle_anna/421/; http://milwaukee.indymedia.org/en/2006/06/205624.shtml
see
[6] RNC 08 Report, http://rnc08report.org/archive/542.shtml; Defend the RNC 8, http://rnc8.org/; Randy Furst, Terrorism Charges
against RNC 8 are Dropped, Star-Tribune, April 10, 2009, http://www.startribune.com/politics/national/conventions/42749517.html Brandon Darby: Proud Snitch, http://brandondarby.com/
[7] Colin Moynihan, Activist Unmasks Himself as Federal Informant in G.O.P. Convention Case, New York Times, January 4, 2009; [8] http://www.crimethinc.com/texts/images/green_scare_chart.gif [9] https://ssd.eff.org [10] See https://ssd.eff.org/tech/encryption
11
12
(IN)SECURE PRACTICES
Activists like to talk, we generally can spend hours and hours discussing theory, tactics, and strategy. Mostly this is useful in building our analysis and our work, but in other cases this can be dangerous.
THREE EXCEPTIONS
There are only three times that it is acceptable to speak about specific actions and activist involvement. The first situation would be if you were planning an action with other members of your small group (your cell or affinity group). However, these discussions should never take place over the Internet (email), phone line, through the mail, or in an activists home or car, as these places and forms of communication are frequently monitored. The only people who should hear this discussion would include those who are actively participating in the action. Anyone who is not involved does not need to know and, therefore, should not know. The second exception occurs after an activist has been arrested and brought to trial. If s/he is found guilty, this activist can freely speak of the actions for which s/he was convicted. However, s/he must never give information that would help the authorities determine who else participated in illegal activities. The third exception is for anonymous letters and interviews with the media. This must be done very carefully and without compromising security. Advice on secure communication techniques can be found at http://security.tao.ca. These are the only situations when it is appropriate to speak about your own or someone elses involvement or intent to commit illegal direct action.
SECURITY MEASURES
Veteran activists only allow a select few to know about their involvement with direct action groups. Those few consist of the cell members who they do the actions with AND NO ONE ELSE! The reason for these security precautions is obvious: if people dont know anything, they cant talk about it.When activists who do not share the same serious consequences know who did an illegal direct action, they are far more likely to talk after being harassed and intimidated by the authorities, because they are not the ones who will go to jail. Even those people who are trustworthy can often be tricked by the authorities into revealing damaging and incriminating information. It is safest for all cell members to keep their involvement in the group amongst themselves. The fewer people who know, the less evidence there is in the long run.
13
been said or implied. In most every situation, the desire to be accepted is the root cause. Those people who tend to be the greatest security risks are those activists who have low self-esteem and strongly desire the approval of their peers. Certainly it is natural to seek friendship and recognition for our efforts, but it is imperative that we keep these desires in check so we do not jeopardize the safety of other activists or ourselves. People who place their desire for friendship over the importance of the cause can do serious damage to our security.
The following are examples of security-violating behaviours: Lying: To impress others, liars claim to have done illegal actions. Such lies not only compromise the persons security as cops will not
take what is said as a lie but also hinders solidarity and trust.
Gossiping: Some people think they can win friends because they are privy to special information. These gossips will tell others about
who did what action or, if they dont know who did it, guess at who they think did what actions or just spread rumors about who did it. This sort of talk is very damaging. People need to remember that rumors are all that are needed to instigate an investigation or even lay charges.
Bragging: Some people who partake in illegal direct action might be tempted to brag about it to their friends. This not only jeopardizes
the braggers security, but also that of the other people involved with the action (as they may be suspected by association). As well the people who s/he told can be charged as accessories after the fact. An activist who brags also sets a bad example.
Indirect-Bragging: Indirect braggers are people who make a big production on how they want to remain anonymous, avoid protests,
and stay underground. They might not come out and say that they do illegal direct action, but they make sure everyone within earshot knows they are up to something.
They are no better than braggers, but they try to be more sophisticated about it by pretending to maintain security. However, if they were serious about security, they would just make up a good excuse as to why they are not as active, or why they cant make it to the protest . Concealing sensitive information from even trusted comrades is far better than jeopardising underground work.
EDUCATE TO LIBERATE
The unfortunate truth is there are some security-ignorant people in the movement and others who have possibly been raised in a scene that thrives on bragging and gossiping. It doesnt mean these people are bad, but it does mean they need to inform themselves and learn about personal and group security. Even seasoned activists make mistakes when there is a general lack of security consciousness in our groups. And thats where those of you who are reading this can help. We must ALWAYS act to inform persons whose behaviour breaches security. If someone you know is bragging about doing an action or spreading security-compromising gossip, it is your responsibility to explain to her or him why that sort of talk violates security and is inappropriate. You should strive to share this knowledge in a manner that encourages the persons understanding and changes her/his behaviour. It should be done without damaging the persons pride. Show your sincere interest in helping him/her to become a more effective activist. Keep your humility and avoid presenting an attitude of superiority. An insensitive approach can raise an individuals defences and prevent them from listening to and using the advice offered. The goal of addressing these issues with others is to reduce insecure behaviour, rather than showing how much more security-conscious you are. Share your concerns and knowledge in private, so that the person does not feel as if they are being publicly humiliated. Addressing the person as soon as possible after the security violation increases effectiveness. If each of us remains responsible for discussing security information with people who slip up, we can dramatically improve security in our groups and activities. When people recognise that lying, gossiping, bragging, and inappropriate debriefing damages both themselves and others, these behaviours will soon end. By developing a culture where breaches of security are pointed out and discouraged, all sincere activists will quickly understand.
14
With law enforcement budgets on the increase, new anti-terrorist laws that call for stiffer sentences for political actions, and with courts handing down long sentences for political crimes, the stakes are too high to allow chronic security offenders to work among us. By creating a security culture, we have an effective defence against informers and agents who try to infiltrate groups. Imagine an informer who, every time they ask another activist about their activities, receives information about security. It would frustrate the informers work. When other activists discovered that she/he continued to violate security precautions after being repeatedly informed, there would be grounds for isolating the person from our groups. And that would be one less informer for us to deal with! A brief primer on the Canadian state security apparatus Recent incidents of repression against activists in British Columbia illuminate the need for grassroots people to understand and practice movement security. Police monitoring, infiltration and agent provocateurs are routinely used by the state to collect information about our groups, or specific individuals in them, and to subvert our activities. For example, during the APEC hearings, it was revealed that over seventy groups and individuals were monitored before and during the APEC meetings in 1997. A paid industry informant/disruptor was identified at a wilderness action camp in 1999. Provocateurs also targeted some Vancouver activists, trying to convince them to disclose information and as well, to break the law. The Canadian security apparatus identifies a number of our groups and activities as a threat to national security. People and organizations are widely targeted; even avowed pacifists have been included in surveillance and repressive measures. According to the Canadian Security and Intelligence Services (CSIS) annual reports, activities targeted in the late 1990s included: native resistance, environmental & animal rights movements, anti-poverty, anti-globalization, anti police brutality, anti-racist, anarchist and communist groups. With the rise in militant First Nations struggles; covert direct action against corporations; the renewed militancy and strength of popular struggles; and the mass-medias increasing focus on anarchists and anti-globalization protests, there is also a growing level of police surveillance and repression. The need for security in our movements is obvious however, it is incredibly important that we dont fall into the trap of using our awareness of security issues to shut other people out of our growing movements. One of the key aims of the FBIs Counter-Intelligence Program (COINTELPRO) operations against the Black Panthers and American Indian Movement (AIM) was to spread distrust and paranoia so that these activists would be reluctant to integrate new people into their struggles. A security culture can exist in a large movement; indeed, it is one indication of a movements strength.Arming ourselves with knowledge about how the system works and works against activists is essential in building security culture. The aim of this section is to give a brief run down of the working of domestic intelligence in Canada. In this way, we can better understand how to avoid its traps.
15
Ottawa. It is believed that the Vancouver NSIS employs between 12 and 18 members. Within NSIS there are several sub-groups called Team 1, Team 2, Team 3 etc. that have different investigative targets. They employ informants, infiltrators, personal physical surveillance, electronic surveillance including phone and room bugs and other means of investigation and research. The RCMP/NSIS also have other resources at their disposal during counter-insurgency operations. Special O is a team of surveillance specialists that may be called upon. Special I is a penetration team whose specialty is to break into homes, vehicles and other properties for investigative purposes. They are the team, which among other things, installs listening devices, photographs building interiors, etc. In a long-running case based in Vancouver, all of these methods of surveillance were used against several Vancouver activists. During the Vancouver investigation, house and vehicle bugs were located by some targeted individuals. The bugs had large battery packs attached to facilitate less frequent battery changes. The NSIS also visited several activists across Canada in an attempt to question them regarding the individuals under investigation.
Most Western nation-states follow a model of counterinsurgency developed by a British intelligence expert named Kitson who wrote, Low Intensity Operations, after much field work in the colonies. He broke down movement development into three stages: The Preparatory Phase: The movement is small, tends to focus on education, publishing and groundwork. The Non-Violent Phase: The movement takes on more of a mass character. Large demonstrations are the norm. The Insurgency Phase: The movement has taken on a popular character. Perhaps a more assertive, guerrilla component has emerged.
Kitson advises that the primary work of the intelligence agency should occur during the preparatory phase. At this time the movements are most vulnerable. They have not experienced a high degree of repression. They consider talk of security as mere paranoia. As they are not breaking laws they believe that it is safe to organize completely openly. The intelligence agency is therefore able to exploit these conditions and develop detailed dossiers on a wide range of people. The information will be extremely valuable to them later on.
16
Important historical revolutionary activities and groups began as small, serious-minded projects that grew in spite of surveillance and repression. It is therefore important to practice security at all points in the movements development. State agents gather more than just hard evidence; they are interested in knowing about radicals beliefs as well. Police try to control with fear; dont be intimidated. Remember If an agent comes knockin, do no talkin.
WHO IS AN INFORMER?
There are actually two kinds of informers. The deliberate informer is an undercover agent on the payroll of government or industry. The second type is the activist-turned-informer. Both kinds try to infiltrate our ranks and are equally dangerous to our movements. Lets discuss the deliberate informers first. They are often difficult to identify. Informers can be of any age and any profile, but they do have a few discernible methods or operation, or modus operandi. These are: *The hang around type they are persons who regularly show at meetings and actions but generally dont get involved. They collect documents, listen to conversations and note whos who. This observation role is relatively inactive. *The sleeper type is similar to the hang around modus operandi, except that their absorption of information is used to activate their role at a later date. *The novice type presents a somewhat more active role, but confines themselves to less prominent work. They dont take initiatives, but the work they do is valued. This helps them build trust and credibility. *The super activist type comes out of nowhere and all of a sudden, they are everywhere. Whether its a meeting, protest, or an action, this person will be right in the thick of it. Keep in mind however that this can also be the mark of a new activist, whose enthusiasm and commitment is so strong that she/he wants to fight the power every minute of the day. It should be said that with several of these modus operandi, the behaviour is hard to distinguish from a sincere new persons involvement. How do we tell them apart? Well, a planted infiltrator will ask a lot of questions about the direct action groups, individuals and illegal activities. She/he may suggest targets and volunteer to do reconnaissance as well as take part in the action. Infiltrators also try to build profiles on individuals, their beliefs, habits, friends, and weaknesses. At the same time, infiltrators will shield their true selves from other activists. Anyone who asks a lot of questions about direct actions isnt necessarily an infiltrator, but they ARE someone you should be careful with. At the very least, they need to be informed about security issues. New activists should understand that direct action tactics can be risky (though some risks are worth taking!) and that asking a lot of questions endangers people. If the person persists in asking questions, there is a problem and appropriate measures must be taken. Activists who cant understand the need for security should be shunned and kept away from the movement. Some types of infiltrators stay in the background and offer material support, other informants may have nothing to do with the group or action, but initially heard certain plans and tipped off the police. Among the more active types of infiltrators can be a gregarious person that quickly wins group trust. Some infiltrators will attempt to gain key forms of control, such as of communications, secretarial, or finances. Other informants can use charm and sex to get intimate with activists, to better spy or potentially destabilize group dynamics. Active infiltrators can also be provocateurs specializing in disruptive tactics such as sowing disorder and demoralizing meetings or demos, heightening conflicts whether they are interpersonal or about action or theory, or pushing things further with bravado and violent proposals. Infiltrators often need to build credibility; theymay do this by claiming to have participated in past actions.
17
Also, infiltrators will try to exploit activist sensibilities regarding oppression and diversity. Intelligence organizations will send in someone who will pose as a person experiencing the common oppression of the particular activist group. For example, in the 1960 s, the Weather Underground (Weathermen a white anti-imperialist armed struggle in the US) was infiltrated by an ordinary Joe informant with a working class image. Black war veterans infiltrated the Black Panther Party. A fresh example of police infiltration and manipulation tactics is that of Germinal, a group targeted for arrest two days prior to the April 2001 anti-FTAA demonstrations in Quebec City. Five months prior, the police set up a false transport company and specifically postered opportunities for employment in the vicinity of a Germinal member seeking employment. The trap worked. Tipped off by an initial informant, two undercover cops worked for four months in the group. This operation resulted in the media-hyped dismantlement of the group on the eve of the summit. Seven Germinal members were arrested, 5 of whom spent 41 days in preventive custody, only to be released under draconian bail conditions. The polices covert action was in part about dismantling the group, but it was also about creating a media/propaganda campaign to justify the policestate security for the summit.
18
Keep in mind that the categories of planted informer and activist-turned-informer can, and have been blurred. In 1970, during the height of the FLQs activities, Carole de Vault a young Parti Quebecois (PQ) activist was drawn to the FLQ, but then became a paid police agent. Her activism was with the PQ; she disagreed with the heavier FLQ actions since it threatened the legitimate work of the PQ. Her involvement with the FLQ was as a planted police informer.
19
Assuming that the security people within the group have suspicions about a group member being an informer/provocateur, it is useful for security/leadership to resolve certain questions both before and after the investigation:
(a) How badly do you want to know whether the person is in agent or not? Clearly, if the person under suspicion is relatively important to
the groups functioning, then leadership must know one way or the other. The more important the person under suspicion is to the group, the more intensive the investigation. We may suggest methods of investigation which are unorthodox and from a certain point of view morally indefensible. But the question is always how badly the group needs to know. No group need use all or any of the methods we describe. But under the condition that the correct information is a life-and-death matter for the group, certain drastic measures may be justified.
(b) What will be done if the information is inconclusive? Often there is not enough evidence to confirm that someone is a police agent,
but there IS enough evidence to confirm certain suspicions. A great deal will depend upon what is at stake with the person under suspicion. In general, the choices come down to:
1) labeling the person a security risk and acting accordingly; 2) doing nothing outwardly but continuing the investigation; 3) isolating the person from sensitive work but keeping him or her in the group; 4) moving to a higher stage of investigation. (c) What will be done If the person does turn out to be an agent? While common sense dictates that the person be exposed and severed
from the group, other actions might be initiated. If the presence of the agent is a real threat to the group, then the agent should be neutralized in an effective manner. Usually wide exposure of the agent will accomplish an effective neutralization. But if the agent is no great threat to the groups functioning, the agent staying inside the group may be useful for other purposes. The group might decide that they prefer to keep the agent, rather than risk not knowing who would replace a known quantity. It the agent is not in a sensitive position, can be monitored and isolated from important work, the group may want to keep such an agent at a low organizational level. Or the agent might be given tasks that seem to be sensitive but are in reality not crucial to the group. Under the cover of doing sensitive work, false and semi-false information about the group can be relayed to the intelligence agencies that the agent belongs to. Or perhaps certain information that is in fact true about the group can be willfully discredited by creation of pseudo-events and/or false information. Remember that when the intelligence agencies have a great deal of contradictory information, it decreases their ability to act decisively against the group.
(d) What are the responsibilities to other groups of the groups knowledge of an informer? If the group makes a decision to sever
connection with the agent it is certainly the groups responsibility to quietly contact leadership in other groups to warn them about the agent. Often public exposure is done through the groups newspaper/newsletter/journal; in this case, the news article should be sent to a wide variety of groups. The more pressing problem is the instance where there are only suspicions but not decisive evidence. Experience has shown that suspicions are taken seriously only when then is a political bond that exists between persons with long movement experience. People who have been in the movement a long time, and who are known to each other and trusted as dedicated movement people, can convey agent suspicions that will get a favorable hearing or be readily believed. This old hands trust network is relatively independent of political point of view; veteran leaders of rival radical organizations can freely and easily exchange information on matters of security.
YOUR RIGHTS
(Remember, this was written in 2001 for Canadians. It is best to talk with a qualified lawyer to learn about your rights as they exist today in your nation. ~Ed.)
1. YOU DONT HAVE TO TALK TO THE POLICE OR INVESTIGATORS. You do not have to talk to them on the street, if youve been
arrested, or even if youre in jail. Do not talk about illegal actions with fellow inmates in holding as they may be plants.
2. YOU DONT HAVE TO LET CSIS OR THE POLICE INTO YOUR HOME OR OFFICE UNLESS THEY HAVE A SEARCH OR ARREST
WARRANT. Demand to see the warrant. It must specifically describe the place to be searched and things to be seized. It must be
20
3. IF THE POLICE DO PRESENT A WARRANT, YOU DO NOT HAVE TO TELL THEM ANYTHING OTHER THAN YOU NAME,
ADDRESS AND BIRTH DATE. Carefully observe the officers; youre in your own home youre not required to stay in one room. You should take written notes of what they do, their names, badge numbers, and what agency theyre from. Have friends who are present act as witnesses. Its risky to let cops roam around alone in your place.
4. IF THE POLICE TRY TO QUESTION YOU OR TRY TO ENTER YOUR HOME WITHOUT A WARRANT, JUST SAY NO. The police are
very skilled at getting information from people, so attempting to outwit them is very risky. You can never tell how a seemingly harmless bit of information can hurt you or someone else.
5. ANYTHING YOU SAY TO THE POLICE MAY BE USED AGAINST YOU AND OTHER PEOPLE. Once youve been arrested, you cant
talk you way out of it. Dont try to engage cops in a dialogue or respond to accusations.
6. YOU DO NOT HAVE TO REVEAL YOUR HIV STATUS TO THE POLICE OR JAIL PERSONNEL. If youve been arrested you should
refuse to take a blood test until youve been brought before a judge and have a lawyer of your choice.
7. YOU HAVE A RIGHT TO TELEPHONE A LAWYER OF YOUR CHOICE AS SOON AS POSSIBLE. This means after youve been arrested,
charged and booked into jail. This does not mean however, that youll be given the right to speak with you family and friends. This is left up to the discretion of the police involved in your case.
8. LYING TO THE POLICE IS A CRIME. 9. IF YOU ARE NERVOUS ABOUT SIMPLY REFUSING TO TALK, YOU MAY FIND IT EASIER TO TELL THEM TO CONTACT YOUR
LAWYER. Once a lawyer is involved, people will know more about your state i.e. charges, bail, court date, etc. ####
Related: Guerrilla Warfare by Che Guevara (1960) (Read Chapter I: General Principles of Guerrilla Warfare here or here.) For a more detailed discussion of developing an activist security culture in todays world, read Deep Green Resistance by Aric McBay, Lierre Keith, and Derrick Jensen. (Seven Stories Press, 2011, 556 pp.) Watch more videos from DGR at http://www.youtube.com/user/DeepGreenResistance Material collected by Rady Ananda.
21
22