đŸ Archived View for library.inu.red âș file âș anonymous-confidence-courage-connection-trust.gmi captured on 2023-01-29 at 06:36:24. Gemini links have been rewritten to link to archived content
âĄïž Next capture (2024-06-20)
-=-=-=-=-=-=-
Title: Confidence. Courage. Connection. Trust Author: Anonymous Date: 2019, November Language: en Topics: security culture Source: Retrieved on December 29, 2019 from https://north-shore.info/2019/11/05/confidence-courage-connection-trust-a-proposal-for-security-culture/
When we talk about security culture, people tend to have one of two
kinds of experiences. The first is of building walls and keeping people
out, the second is of being excluded or mistrusted. Both of these come
with negative feelings â fear and suspicion for the former and
alienation and resentment for the latter. I would say that they are two
sides of the same coin, two experiences of a security culture that isnât
working well.
I want to be welcoming and open to new people in my organizing. I also
want to protect myself as best I can from efforts to disrupt that
organizing, especially from the state but also from bosses or the
far-right. That means I want to have the kinds of security practices
that allow me to be open while knowing that Iâve assessed the risk I
face and am taking smart steps to minimize it. Security culture should
make openness more possible, not less.
This proposal for security culture is based on reframing â on shifting
our focus from fear to confidence, from risk-aversion to courage, from
isolation to connection, and from suspicion to trust.
It makes sense to feel fear â the state is very powerful, repression is
common, and it has the power to crush us and all our projects. But I
donât want to stay in that fear, and with accurate information and good
plans we can begin to transform fear into confidence, knowing we have
security practices that are up to the risk we face. In fact, without
transforming fear, itâs hard to imagine how we could manage to take
action at all in face of the power of our enemies.
I donât want to be risk-averse. I want to decide on my actions based on
effectiveness, appropriateness, my analysis, and my ethics. Good
security culture lays the groundwork for us to show courage in our
tactics collectively, since we know we can handle the risk. When we
donât transform risk-aversion, we self-police and stay narrowly in the
space for symbolic opposition that is provided to us.
Repression functions by isolating people. I donât want to contribute to
isolation through the things I do to keep myself and my friends safe. I
want a security culture rooted in deepening our connection with each
other. When we donât transform isolation, organizing can feel no
different than work and we donât build the kinds of relationships that
truly transform us, such that we can begin to feel the world we wish to
create.
I donât want to feel suspicion when I meet people, thatâs toxic and
erodes the spaces of struggle we create. Rather than feel suspicious of
someone, I want to ask myself âwhat would it take for me to trust this
person?â I want to go towards people and try to transform suspicion into
trust.
I would like to offer a definition of security culture to frame this
conversation. Security culture refers to a set of practices developed to
assess risks, control the flow of information through your networks, and
to build solid organizing relationships. There are countless different
possible security cultures, but the important thing is that they come
from clear, explicit conversations about risk that are ongoing and
respond to change. In the following example, the ongoing conversation
about risk reacts to changes in our actions and in how we are being
targeted. The various security culture practices mentioned will be
explained further down.
In a pipeline campaign where I live, we wanted to emphasize mass direct
actions targeting oil infrastructure. We decided that our risk for the
early stages of that campaign as we focused on outreach and research was
very slight and that we could safely involve many people in that work
and share information about it openly on any platform. As we began
planning symbolic protest actions, this consideration didnât
significantly change, but when we began planning things like blocking
roads or picketing a police station, the element of surprise became a
larger consideration. Regardless of possible criminal charges, our
actions would simply be less effective if they were known in advance. So
we stopped using public or easily surveilled means to communicate and
began asking that people only share details to trusted individuals who
intended to participate.
Soon after this phase of the campaign began, a national-level policing
apparatus called a Joint Intelligence Group (JIG) came together around
defending pipelines, involving many levels of police and intelligence
services. JIGs and configurations like them are a specific threat to
struggles of all kinds, since they aim vast resources directly at
disrupting organizing. So even though our actions didnât change, we
revisited our conversation about risk and decided to insulate the
organizers of actions from possible conspiracy charges by doing the
planning in a small, opaque group. We could invite people to participate
who we trusted, and we might take steps to build up that trust, like
doing identity checks of each other. But we would no longer plan actions
openly in the larger network of people interested in the education and
outreach work. This shift meant that when we moved on to shutting down
critical infrastructure, we just had to scale up from this organizing
node we had formed and encourage other crews to organize similarly,
coordinating through a meeting of representatives from vouched groups to
take on different roles.
(Of course, this organizing model, like all such models, comes with
drawbacks as well as strengths. Itâs not my intention in this text to
advocate for one particular way of organizing, though inevitably I have
more experience with some than with others.)
Before digging more into specific ideas and practices, I want to speak
to a common objection people have to discussions of security culture in
their organizing: âIâm not doing anything illegal so I donât need to
think about security.â This could come up in a more specific way, like
âIâm not discussing anything sensitive, so I donât need to worry about
it being surveilled,â or âIâm not usually stopped at the border, so I
donât need to worry about the stacks of anarchist journals in my car,â
but the underlying objection is the same.
The choice to repress or to disrupt organizing belongs only to the state
â it doesnât necessarily have very much to do with the actions being
criminalized. Personally, I have a number of criminal convictions, have
spent about a year in jail, two years on house arrest, and something
like five years on various kinds of conditions. All of these convictions
are for routine organizing tasks that the state chose to target with
repression for its own reasons. I was sentenced to eight months in jail
for facilitating meetings and for writing and distributing a callout for
a march in the context of a big summit; some years later, I was
sentenced to a year for distributing a leaflet announcing a march and
then being in attendance at the march. In both of these cases, there was
property destruction during the demonstration, but I was never accused
of it. Rather, the state chose to use conspiracy charges to target
people doing visible, routine organizing of the kind I have done many
times. Similar dynamics have played out in other conspiracy cases in
both the US and Canada, my experience was not exceptional.
I donât tell these stories to position myself as a victim â I want my
organizing to be threatening to power, it makes sense to me that it
would be targeted. The important part is that the state chose to
criminalize leafleting and facilitating meetings in order to intimidate
or to make an example. Even if this kind of repression were to occur
only 1% of the time (though it seems somewhat more common), we need to
be aware of it and organize with forms of security that are adapted to
it, otherwise the only option is to restrict our own activities
preemptively, to internalize that repression and integrate timidity and
weakness into our work.
However, security culture is not only about resisting criminal charges.
Itâs about preventing our activity from being disrupted. Criminal
charges are a particular threat, but theyâre far from the only one.
During the big summit where I caught conspiracy charges, only two of the
JIGâs 16 undercovers were involved in the case. Other undercovers
changed passwords on websites and email addresses, directed buses to the
wrong locations, stole medical supplies, spread harmful rumours to
aggravate social conflict, and even attempted to entrap youth in a weird
bomb plot. All of these police actions were immensely disruptive,
without ever needing to rely on the power of the courts, and we will
probably never have a full picture of their impact.
We already saw that often maintaining the element of surprise is an
important security consideration â an example in our area is organizing
prison demos to support people who are locked up: organizing them
quietly means we can have freedom of movement and action for a period of
time before the police are able to mount a response. Or consider an IWW
chapter trying to do a reclaim your pay campaign against a boss â they
will need to take steps to protect themselves from civil lawsuits or
from being targeted by private security. Or consider the work
antifascists do to identify the far-right â they need to be mindful to
avoid having their own personal information become public and targets of
violence in the street. There are also private security companies that
are increasingly hired to defend private interests in ways that the
police canât or wonât, which has come up repeatedly around
indigenous-led land defense struggles in recent years.
Security concerns are already integrated into much of the organizing we
do. Building a security culture involves being explicit about assessment
of risk beyond just specific actions and adopting clear practices
designed to keep us safe and our actions effective across all the forms
our organizing takes. Good security culture means doing this while
emphasising strong connections, building trust, and feeling confident.
Here are a couple of general principles that underline security culture
as I understand it.
The Two Nevers. These points are somewhat well-known, but also quite
inadequate. Their most basic framing is âNever talk about your or
someone elseâs involvement in illegal activity. Never talk about someone
elseâs interest in illegal activity.â
The most obvious inadequacy is that a lot of what we do doesnât involve
obviously illegal stuff. We could reframe the Two Nevers like this:
âNever talk about your or someone elseâs involvement in activity that
risks being criminalized. Never talk about someone elseâs interest in
criminalized activity.â
This is still inadequate, since we arenât only concerned about criminal
charges. But having a clear rule that is widely agreed on about not
running your mouth about illegal stuff is a good idea no matter what
space youâre in. This includes things we might feel are jokes â loose
talk about fighting cops or attacking property might not seem harmless
when entered into a snitchâs notes.
One of the most common reasons people become suspicious of someone is if
that person is trying to take people off to one side to discuss illegal
tactics. Rather than saying, âthis person is a cop trying to entrap meâ,
we can reframe and say, âI need to clarify my understanding of security
culture with this person if we are going to work togetherâ. The
rephrased version of the Two Nevers can be one simple way of doing that.
It also reminds us to not try to figure out or speculate about who
pulled off actions happening anonymously around us â thatâs the copsâ
job. If others ask about anonymous illegal actions, you can gently
remind them the action was done anonymously, it doesnât matter who did
it, and it speaks for itself.
(A less recognized form of bad security culture is how callouts around
security culture can reinforce negative power dynamics. We should
absolutely talk to each other about interactions we have security
concerns about, but this should always be mutual and done privately when
possible â describe what you heard, present your idea of security
culture, ask if they think thatâs a reasonable boundary, be willing to
hear them disagree. The goal is to build shared understandings to widen
the range of organizing we can engage in together, not shut people down
or make them feel ashamed (or to make ourselves seem more hardcore). An
extreme form of this is snitch-jacketing, where people are falsely
called a snitch, which can have huge consequences in peoples lives and
were a part of eroding revolutionary movements in the 70âs, but a
smaller example could be a more âexperiencedâ person shutting down
others in front of a group for talking about actions they found
inspiring or for who they are talking to.)
Another point is to privilege face-to-face meetings. Regardless of the
platform or how secure or insecure it is, we build better trust,
stronger relationships, and come to better decisions when we take the
time to meet in person. When electronic means of communication replace
the face-to-face, our conversations are easier to surveil,
misunderstandings come up more often, and they can be disrupted by
decisions or problems at far-away companies. For all the uses of
electronic communication in your organizing, ask yourself if itâs
replacing face-to-face meetings, and if it is, ask if it really needs
to. Consider reducing your reliance on these things and begin trying to
shift more conversations back to in person. (More on tech stuff in a
bitâŠ)
An objection to this is that many people have social anxiety and prefer
to communicate using their devices; another is that physically traveling
places is a barrier for some. Like other sensitive issues that come up
around security culture, I encourage you to deal with them head on and
dig into other ways of accommodating those needs while still attempting
to prioritize meeting in person. After all, these technologies are very
new and people with disabilities of all kinds have a long history of
finding each other to organise around the issues that effect them.
Repression is inevitable, or avoiding it at all costs isnât worthwhile.
Regardless of the struggle, if itâs taken far enough it will become a
struggle against the police, those defenders of the world as it is. If
we take as a starting point that we will avoid repression at all costs,
then we will only use forms of struggle approved of by the police, which
makes it pretty much impossible to build collective power capable of
transformative change. If we donât accept these limitations, then we
need to be prepared to face repression.
One way of preparing is to centre police and prisons in our organizing
from the beginning. In this, we can learn from anti-racist movements who
almost always keep in mind the physical, racist violence of those
institutions, even as they might choose to engage in a wider range of
issues. The advantage is we already build up a politic that isnât
shocked by police violence and that is realistic about prison. We can
take it a step further and incorporate practices of solidarity into our
organizing. We might be organizing in a labour space â look at labour
struggles elsewhere and find practical acts of solidarity to do towards
those facing repression. We might be organizing around queer stuff â
find and support queer prisoners, this way youâll know how to navigate
prisons in your area if and when you need that knowledge. If youâre
interesting in environmental struggles and land defense, there are land
defenders in jail, fighting charges, and facing the physical violence of
the state all across the continent â incorporating practices of
solidarity with them into your work can give some powerful inspiration
for creative, courageous resistance.
A further benefit is that you are more likely to receive solidarity in
turn, since prisons are a great unifying force, linking all the various
struggles against domination and oppression. Being in a resistance
culture that shows active solidarity in the face of repression can go a
long way towards keeping yourselves safer. And again â we combat fear
with accurate information. The more we know about how police and prisons
work, the more we can shift from fear to preparation and confidence.
With these points in mind, letâs look in more detail at what it means to
assess risk. The important thing here is to do this openly and
consistently, and to focus on how it makes possible the actions you
think are effective and appropriate. It can be easy to get into a
risk-averse mindset and self-police more than the state has the power to
control us. Being explicit about risk can make it easier to focus on
courage and possibility.
If youâre sitting down to plan a demo, think about tone. Are you
anticipating it to be calm and orderly? Or combative and uncontrollable?
If the police try to block you, will you go along with it or will you
try to push through? Are there actions you would be excited to see
happen in the demo that risk being criminalized more than the act of
taking the streets? This could be as simple as stickering or could be
spraypainting or breaking windows. Will your plans be jeopardized if you
lose the element of surprise? Who do you not want to find out? How will
you reach the people you want to reach without risking the wrong people
catching wind? Communicating clearly about the tone of an action can
help others come with autonomous plans that are suitable.
Itâs important to avoid complacency or taking too much for granted.
Hereâs an example from 2018:
The organizers of an anarchist bookfair decided to call a night demo for
after the event. They were putting much more energy into other aspects
of the day and were complacent about risk at the demo, because theyâd
organized a hundred demos before. However, the demo ended up being much
more combative than others and a lot of property destruction occurred â
they hadnât assessed risk explicitly and hadnât taken the time to
consider it in an ongoing way as the start time got closer. As well,
they hadnât taken into account that a JIG focused on a G7 summit in a
different province that summer might have meant there were additional
police resources aimed at them during this period. This meant that their
security practices in the lead up were not adapted to the level of risk
the action ended up having, and all of the bookfair organizers were
charged with conspiracy.
This is an extreme example, but there will always be unexpected things
that happen, and thatâs generally a good thing, since we canât fully
plan our way to an insurrectional situation. Staying active in our risk
assessment can mean we are less likely to be caught by surprise, and
having strong security culture practices that we always use can reduce
the harm when situations like this occur. In this case, good data
security, a culture of non-cooperation with police, active and
persistent solidarity, effective masking, and a refusal to give up or
submit meant that this unexpected situation was much less harmful than
it could have been and people got through it with their heads up.
Another example could be developing a mass organization, say an
antifascist organization. What kinds of questions about risk should we
be asking even in the absence of planning any particular mobilization?
What level of trust do we need in each other for the kinds of things we
want to do? It might be that we are at risk of undercover police
infiltrattion, so knowing that we all are who we say we are could
matter. We could also be concerned about infiltration by the far-right,
in which case understanding each others politics and building trust
gradually through slowly escalating actions could be key. Our principle
around face-to-face organizing above online activities will likely make
it easier to achieve both of these goals.
If the intention is to build towards street action, then a part of the
security conversation could be about discipline and how to plan. What
are our expectations of each other in tense situations? Itâs hard to
honour expectations when expectation are vague, and itâs easier to act
smart when have a clear plan for what youâre there to do and can tell if
itâs working or not. Building good organizing habits about what to
consider as a group has major consequences for safety in the streets â
itâs not the same as security culture, but the conversations are closely
related. For instance, risks around antifascist mobilizations might
include ending up outnumbered, getting ambushed or separated, being
followed or being identified by the far-right or by police, or suffering
unnecessary injuries or arrests.
Some organizing practices for mobilizations that address risk include:
cut-off numbers (a number of participants below which the action is
either canceled or shifts to a lower intensity back-up plan), exit
strategies (when will you leave, how do you tell people, where do you
separate, how do you avoid being followed, how do you check people are
home safe?), meet-up points (gathering as a group before heading
together to an action site), appropriate street tactics (positioning in
two lines with complementary roles, for instance), clear communication
practices (How will you communicate in the streets, will you bring
phones, what names will you use for each other?), and scheduled
check-ins (How will you check in with each other after leaving to make
sure everyone is safe, getting together soon after to debrief an offer
support).
There are many different security culture practices that groups have
experimented with and Iâm not going to try to be exhaustive. Rather, Iâd
like to share a few that I and the people around me have had success
with. These are ID checks, vouching, circles of trust, flexible
organizing structures, and proactively addressing bad dynamics.
ID checks are for establishing that someone is who they say they are. In
the pipeline campaign I described above, when we wanted to shift towards
more intense direct actions, we needed to deepen the trust and
collective strength among those weâd been organizing with. Because we
were talking about risk regularly, we understood that the security
practices we had used for protests, rallies, short-term occupations, and
educational events werenât appropriate for this. Since we were concerned
about infiltrators, we decided to ID check each other. This would look
like taking a person out for coffee and, without advance warning,
producing my ID and maybe a family photo or school yearbook. I would
tell the person I wanted them to be able to trust I was I said I was,
because I wanted us to be able to take riskier actions together. We then
discussed what that person could show me. Sometimes this involved phone
calls to work or to family members on speaker phone, so I could hear the
person on the other end provide details of someoneâs life or employment.
Other times ID was enough. Sometimes we would go back to each othersâ
apartments. The idea was to be as mutual as possible (which is hard
since in practice someone is initiating it) and to keep the focus on
building trust.
Itâs not useful to incorporate ID checks with people you donât trust or
with whom you wonât feel comfortable taking riskier actions regardless
of how they go. This is not about finding cops, itâs about deepening
trust and confidence. Checking each other in this way should be a sign
of respect.
There are a lot of factors that can come into play to make this less
straight forward. For instance, people who immigrated to the country
might not have family nearby or have the same kinds of documentation.
Queer and trans people often donât use the names on their documents and
might not be comfortable sharing legal names or old pictures. However,
these are things to take into account and to adapt to, not reasons to
skip getting to know someone. One undercover cop in my area claimed to
be escaping an abusive relationship and used our politics around
supporting survivors to shut down any conversation about her past. Our
discomfort around complex and sensitive issues creates blind spots that
people who wish us harm can walk into â we need to be brave and find
ways of addressing this complexity, not avoid it.
One friend with experience doing this added there might be moments where
its OK to be less mutual, where you might not want to give people as
much control over what proof looks like. They also emphasised that this
wont necessarily help with snitches (as opposed to undercovers) who are
who they say they are but have bad motives. You also need to have a
clear sense in advance of what you will do if someone canât or wonât go
along, or if you turn up something that requires you to rethink your
trust in the person.
Vouching is a practice for bringing new people into an existing group or
organizing space. Like our other practices, it is best when it is
explicit and done consistently. The first step is to have a clear basis
for trust within your group. Perhaps your basis is just that someone has
politics compatible with yours and is reliable. Perhaps you need to know
people are who they say they are, that they stay solid under pressure,
that they have certain kinds of organizing experience, and are
comfortable with certain kinds of action. Whatever it is, vouching
involves one or more people introducing a new person and stating
explicitly that the person meets the basis for trust. Others present
should explicitly accept or reject the vouch. Being explicit in this way
avoids some of the risk of implicitly trusting people for superficial
reasons, like for fitting certain subcultural norms or being read as
having a certain identity.
Hereâs an example of a vouch: âI have known this person for five years.
During that time, weâve worked closely together on public projects and I
trust them to have my back when things get tough. I went for dinner at
their dadâs house one time and Iâve picked them up from work
frequently.â Hereâs another example: âI met this person last year at a
public event about climate change and weâve seen each other around at
environmental events regularly since. Weâve talked a lot about the
issues and I like them a lot. I know theyâre looking to gain some
experience organizing actions and I think theyâd be a good fit with us.â
An exception to being explicit about why you trust someone is that you
shouldnât breach the Two Nevers. If you are organizing clandestine
actions, bringing in new people or introducing crews to each other is
tricky, and the concerns are different. Vouching is still a good idea,
but you also donât want to increase risk for anyone by talking about
past actions. Since there needs to be a strong basis of trust to be
doing those actions in the first place, it could be possible to take a
vouch on someoneâs word without details about specific activities.
Circles of trust are mostly for informal networks and affinity-based
organizing (which, to be clear, is most of my organizing experience). It
involves writing out the names of people in your network in a circle,
and then drawing different kinds of lines between them to represent the
kinds of relationships people have. A solid line could mean a strong,
trusting relationship with a lot of capacity. A dashed line could mean
some trust, and a dotted line means you donât know each other well. This
collaborative process will reveal a lot about group dynamics and also
show where there is work to be done in building more trust.
It might show that only one person has strong relationships with
everyone and that other peoplesâ relationships are less solid. This
means there is work to do in making that more balanced, which makes
groups more resilient (in case that one person gets arrested or even
just gets sick or burns out) and also more egalitarian, since the
ability to initiate projects is tied to the amount of trust people have
in the person initiating them. The exercise might also reveal that some
people are trusted by no one. This shows that work needs to be done to
get to know that person better and see if trust can be built there.
Oftentimes, infiltrators will first approach one community, then use the
contacts from there to name drop their way into a different scene.
Vouching and circles of trust are great defenses against this. But more
than finding hostile people, circles of trust encourages us to build
strength in our networks by trying to turn as many of those dashed lines
solid as we can.
Flexible organising structures refer to the ability of our organising to
adapt to reflect the needs of various kinds of activity. The practice of
informal, affinity-based organizing is one that has developed to respond
specifically to this need. In an informal (as in, without a fixed form)
network, individuals communicate about their ideas and intentions, and
affinity groups form around a specific project or around a shared desire
to intervene on a common basis. The strength here is that itâs very easy
to initiate projects of various risk levels with security culture
practices adapted to each. As well, there is an element of need-to-know
incorporated automatically, in that only those involved in the
organizing know its details or who is involved, unless those people
decide otherwise.
Similar flexibility can be incorporated into other organizing models.
The key is to respect and legitimate individual initiative, by not for
instance demanding that all activity pass through some sort of central
body (this can happen as an unspoken norm in loosely structured activist
groups as well, not just as a rule in groups with fixed decision-making
process). As well, respect for voluntary association, meaning itâs seen
as normal for people to work together in smaller, chosen groups
alongside larger, more open structures. In a formal way, this can look
like the use of committees or working groups that have the ability to
set their own standard for participation. It can also just look like
being open to elements of affinity-based organizing as described above,
or by being explicit about what kinds of information are need-to-know.
Finally, proactively addressing bad dynamics is just a good habit to
have in general, but itâs so important to security that it should be
emphasized in every conversation about security culture. There are a lot
of dynamics that erode trust and can make organizing harder. Bullying is
one example. Another is oppressive behaviour rooted in patriarchy or
white supremacy. Yet another is centralizing contacts and resources,
which means only certain people can lead projects. Others might be shit
talk, boasting, or poor security practices like violating the Two Nevers
by asking about peopleâs involvement in criminalized activity. Anyone
who has been involved in an activist subculture for any amount of time
wonât have any trouble listing bad dynamics.
Like I said above when talking about complex and sensitve issues related
to ID checks, our difficulty in dealing with bad dynamics and issues of
oppression in our scenes creates a blind spot that police and
intelligence agencies are increasingly aware of. I mentioned the cop who
pretended to be a survivor to worm her way into peoplesâ lives (she was
even brought in as a roommate to someoneâs house). Another undercover
experience involved a cop who was a middle-aged brown guy who, when
people would talk about how he made them uncomfortable (notably for
breaching the Two Nevers), he was able to deflect concerns by claiming
they were being racist towards him. He found a group of anti-racist
activists in a different community from the ones he was most targeting
to back him, and he successfully resisted multiple efforts to expel him
from organizing spaces. Ultimately, he went on to testify in a case that
sent six people to jail. He doubtless experienced racism in our scenes,
and this and his cynical manipulation of anti-racism should also cause
us to examine the weakness of our anti-racist politic. Having clear
politics about race, gender, and other oppressions (meaning that you are
comfortable saying in detail what your analysis is around them and why)
as well as practices of addressing those issues head on when they come
up can make it less likely that plays like this will work.
There are many reasons why someone might be untrustworthy and many kinds
of predatory behaviour that arenât being a secret cop. We donât usually
need to be asking ourselves if people are cops. An example is Brandon
Darby. In the text âWhy Misogynists Make Great Informantsâ, the authors
make the point that people should have tried to do more to deal with
Darbyâs awful sexist behaviour before he ever began cooperating with the
FBI, ultimately entrapping several people. He is an extreme example, but
itâs very common in our scenes for people to be made uncomfortable by
patriarchal behaviour from men. Sometimes people will develop suspicion
towards those making them uncomfortable in those ways, and this is
understandable, but itâs a mistake to begin looking for infiltrators
when there is sexism right before our eyes. Destructive behaviour is
worth dealing with in its own right, and if it helps us avoid informants
like Darby too, all the better.
A note on formal, mass-membership organizations. Such kinds of
organizing are often very resistant to conversations about security
culture, since these discourses are most common in forms of organizing
that look different than what they aspire to. Security culture can sound
like a more general critique of their organizing than a proposal for how
to strengthen it. Some of the practices above might not apply to formal,
mass-membership organizations, but I would argue that all the general
principles do. In fact, I think if such organizations look closely at
how they operate, they will see that security practices already exist.
For instance, in branches of the IWW, itâs not uncommon to attempt to
keep workplace organizing drives secret. People involved in supporting
the shop floor organizers might use code names with those not directly
involved, or might make public only general information. As well, itâs
common for such organizations to strike smaller committees to take on
specific tasks, like organizing a demonstration, and their conversations
might not be open to those not involved, or they might communicate
through different channels, for instance avoiding large mailing lists or
social media.
All I would suggest is that explicit conversations about risk and
security be incorporated into the different kinds of work such
organizations take on, since they have different needs. Empowering
committees to decide their own security practices and basis of unity is
a great step, as is welcoming individual initiatives by members
associating on the basis of affinity, meaning the organising structure
is flexible enough to accommodate different ways of organising for
different kinds of activity.
In practice though, such objections to security culture come up most
these days around the use of social media, of which Facebook remains the
most common. To that end, I would like to offer a few critiques of
Facebook organizing and offer a proposal for how large organizations
that depend on it could respond.
A crucial point is that corporate social media reduces the field of
possibility for organizing. Since itâs about as private as organizing in
the lobby of a police station and at this point almost everyone knows
it, there are stark limits to what can safely be discussed there. Which
means if we are dependant on Facebook as our primary organizing space,
the limits of what can be thought or planned are taken on as our own.
This kind of preventive disarmament is a real position of weakness.
Such platforms are also vulnerable to being swamped by hostile
reactions. We canât control how our actions will be received, and
sometimes things we do will be unpopular â we are afterall seeking a
world without capitalism that is organized on a radically different
basis. The online aftershock from an unpopular action can be
destabilizing. In a recent antifascist mobilization in my town, the
far-right and mainstream media successfully provoked a backlash against
antifascists that flooded social media with threats and anger.
Antifascists were heavily dependant on Facebook for their organizing and
so were presented with a choice: either stay offline and avoid the
backlash but be isolated from your comrades, or go online and talk with
people, but have your conversations dominated by stress and hostility.
This dynamic makes organizing much less resilient and means our work can
essentially be disrupted by bad press.
An extension of this is the corporate control of the platforms. Facebook
is an enormous, rich corporation whose interests are utterly opposed to
ours â whatâs good for us is bad for them. If we depend on their
infrastructure, they have the discretion to shut us down at any time,
for any reason. Companies like this are very susceptible to public
pressure and we donât have to think hard to find examples of projects
that became unpopular and lost their pages, and along with it most of
their ability to reach their base. This can be a disaster if we are over
dependant on these companies. Ask yourselves what you would do if all of
your pages and accounts dissappeared tonight â how would you organize
tomorrow?
There is also the issue of surveillance, which shouldnât be
controversial. Everything that is typed into Facebook is saved forever
in a database that police can access any time. Facebook software (like
Google and others) tracks you and spies on your device, information that
is also available to security and intelligence agencies. This is not a
theory, it has been proven over and over again, and cases against
activists relying on such information have only become more common
across Europe and North America in recent years.
My proposal for social media is as follows. Privilege in person meetings
and have them regularly if possible, so the next meetup is already set
in case online communication is disrupted. When weâre using social
media, letâs ask ourselves if itâs really necessary and see if we can
shift that conversation to another platform. I would encourage you to
think of social media as a megaphone, a way of amplifying your voice,
and not as a living room, for discussing and getting to know people. Use
it to promote, to announce, to disseminate, but move conversations
elsewhere. In my own organizing, we delete almost all comments from
pages we manage and shift most messages to other platforms as soon as we
receive them. We use shared accounts wherever possible and reduce our
reliance on accounts tied to personal information. Perhaps you donât
want to go this far, perhaps you want to go further, but this is one way
of making use of social mediaâs strengths while avoiding its massive
drawbacks.
A transition in our use of social media can happen gradually, looking
critically at our use of it and shifting these uses firstly to in person
meetings and secondarily to other platforms, piece by piece. It took a
long time for so much of our lives to be captured by these disgusting
companies, and it might take us a while to build new organizing habits
and cultures that are resistant to them.
Finally, a word about tech security. This topic is complex and itâs easy
to get bogged down on. However, there are a few simple steps we can take
to greatly improve our data security. Here are three quick points.
One: Use end-to-end encryption unless you have a reason not to. This
technology can be tricky, but at this point many applications exist that
make it exactly as easy to use as conventional messaging. I recommend
Signal, from Open Whisper Systems, though WhatsApp also uses similar
encryption protocols, but without the metadata protection. The drawback
is that these are not cross platform, while something like PGP, since it
can work as just copy-pasteable blocks of text, can be used anywhere â
any different email client, facebook and twitter, even text message. But
itâs harder to get started, and experience has shown that people arenât
willing to put much work into their tech.
Two: Encrypt data where it is stored. Unless you have a reason not to,
you should immediately encrypt your cellphone (Android has an option for
this, many iphones are encrypted by default). For data stored on
computers, external hard drives, USB keys, or online, I recommend
VeraCrypt. It allows you to make encrypted âboxesâ that you throw your
files into. This wonât help you if your encryption is unlocked when your
device is captured though. If you think you might be arrested, avoid
traveling between places with your (encrypted) phone turned on. Consider
getting an old-school alarm clock so you can turn your phones and
computers off at night (which enables the encryption typically removed
at startup), especially if you might be at risk of a house raid. Make
encrypted backups of your data and store it somewhere else.
Three: Hide your online identity whenever possible. Your IP address is
visible to every website or service you use and links your activity
together in the eyes of your service provider and the state, even if you
take steps to protect your privacy like using private browsing. I
recommend using Tor for any browsing or research. Corporate social media
usually blocks Tor (reddit is an exception, and Twitter will let you Tor
if you ask them), so if you are trying to have an anonymous account, an
option is to use a VPN â a free one for use by anarchists and activists
is available at riseup.net.
There is of course a lot more than can be done for tech security, but
these three steps will already go a huge part of the way. A few years
ago, we had a house raid hit us. The police captured something like
fifteen laptops and phones, as well as many USBs and hard drives. Out of
all this, only one laptop was not encrypted, since it had been left
turned on. But out of the rest, not one piece of information was
recovered. Similarly, our text and call history that could be accessed
through our phone companies revealed nothing, since we use end-to-end
encryption on services that protect meta data. We donât use social media
or google to communicate, and so their searches of those platforms also
gave them nothing. These tech security practices work when used
correctly and consistently. There is a real difference in outcome when
we use them and when we donât. They let us feel confident while
connecting with others and contribute to building trust.
Thanks for reading! This text ended up longer than I expected, but I
hope itâs useful. I wrote this because there arenât a ton of good
security culture resources out there, so I hope this will inspire people
to have conversations about what kinds of practices are right for them,
animated by a spirit of confidence, courage, connection, and trust.
Letâs us all keep our sights fixed on the world we are trying to create
through our actions, instead of fearing the movements of our enemies.
Good luck!
A few links to go further:
The G20 Main Conspiracy: A very thorough account of police using
undercovers and surveillance to target anarchists
Damage Control: An activistâs groups experience of staying strong and
safe in the face of infiltration
Bounty Hunters and Child Predators: Inside the FBIâs entrapment strategy
What is Security Culture: A list of points for thinking about planning
direct action
Why Misogynists Make Great Informants
Need to Know Basis: Reflections from the RNC 8 conspiracy case
Crimethincâs J20 Zine Series: Several texts analyzing different aspects
of the massive conspiracy case following a demonstration against the
2016 US presidential inauguration