Street Safety hosts resources for protesters.
(In)secure practices
As community organizers, activists spend hours discussing theory, tactics, and strategy. This is an essential part of building our analysis and work. In some cases it can put ourselves or others in jeopardy. The following was originally written for an audience engaged, or on the periphery of extralegal activity, so focuses on “underground” groups. It is generally good practice to limit discussion about movement individuals where you are unsure what information about them is “public” knowledge.
What not to say
To begin with, there are certain things that are inappropriate to discuss. These things include:
- your own or someone else’s involvement with an underground group
- someone else’s desire to get involved with such a group
- asking others if they are a member of an underground group
- your own or someone else’s participation in any action that was illegal
- someone else’s advocacy for such actions
- your plans or someone else’s plans for a future action
Essentially, it is a bad idea to speak about an individual’s involvement (past, present or future) with illegal activities, or with activities that may raise the interest of the state (such as advocacy of certain groups or tactics). These are unacceptable topics of discussion regardless of whether they are rumor, speculation or personal knowledge.
This is not to say that it is incorrect to speak about direct action in general terms -- just be sure that you don’t link individual activists to specific actions or groups. It is perfectly legal, secure and desirable that people speak out in support of all forms of resistance (though if you’re involved with illegal activity, it is probably best that you don’t openly advocate for breaking the law as that alone can raise state interest in you).
Three exceptions
There are only three times that it is acceptable to speak about specific actions that may be against the law. These are the only situations when it is appropriate to speak about your own or someone else’s involvement or intent to commit an illegal act.
The first situation would be if you were planning an action with other members of your small group (your “cell” or “affinity group”). These discussions should never take place over e-mail, unencrypted phonecalls, texts, or chat, or in an activist’s home or car, as these places and forms of communication are frequently monitored. The only people who should hear this discussion would include those who are actively participating in the action. Anyone who is not involved does not need to know and, therefore, should not know.
The second exception occurs after an activist has been arrested and brought to trial. If s/he is found guilty, this activist can freely speak of the actions for which s/he was convicted. However, s/he must never give information that would help the authorities determine who else participated in illegal activities.
The third exception is for anonymous letters and interviews with the media. This must be done carefully and without compromising security. Advice on secure communication techniques can be found elsewhere.
Bottom line security
If you are engaged in activity that is considered illegal, it is best to take a lesson from veteran activists of the direct action movements and only allow a select few to know about your activity. Those few people should consist of only the individuals who you are doing work and actions with and and no one else!
The reason for these security precautions is obvious: if people don’t know anything, they can’t talk about it. When activists who do not share the same serious consequences know who did an illegal direct action, they are far more likely to talk after being harassed and intimidated by the authorities, because they are not the ones who will go to jail. Even those people who are trustworthy can often be tricked by the authorities into revealing damaging and incriminating information. It is safest for all cell members to keep their involvement in the group among themselves. The fewer people who know, the less evidence there is in the long run.
Security violating behaviors
In an attempt to impress others, activists may behave in ways that compromise security. Some people do this frequently -- they are habitually gossiping and bragging. Some activists say inappropriate things only when they consume alcohol. Many activists make occasional breaches of security because there was a momentary temptation to say something or hint at something that shouldn’t have been said or implied. In most every situation, the desire to be accepted is the root cause.
Those people who tend to be the greatest security risks are those activists who have low self-esteem and strongly desire the approval of their peers. Certainly it is natural to seek friendship and recognition for our efforts, but it is imperative that we keep these desires in check so we do not jeopardize the safety of other activists or ourselves. People who place their desire for friendship over the importance of the cause can do serious damage to our security.
The following are examples of security-violating behaviors:
Lying: To impress others, liars claim to have done illegal actions. Such lies not only compromise the person’s security -- as cops will not take what is said as a lie -- but also hinder solidarity and trust.
Gossip & Rumors: Some people think they can win friends because they are privy to special information. These gossips will tell others about who did what action or, if they don’t know who did it, guess at who they think did what actions or just spread rumors about who did it. This sort of talk is very damaging. People need to remember that rumors are all that are needed to authorize an investigation, or even lay charges. Anti-terrorist law in both Canada and the United States allows state security forces to carry out raids on individuals based on nothing more than hearsay evidence.
Bragging: Some people who partake in illegal direct action might be tempted to brag about it to their friends. This not only jeopardizes the bragger’s security, but also that of the other people involved with the action (as they may be suspected by association). As well the people who s/he told can be charged as accessories after the fact.
Indirect-Bragging: Indirect braggers are people who make a big production on how they want to remain anonymous, avoid protests, and stay “underground.” They might not come out and say that they do illegal direct action, but they make sure everyone within earshot knows they are up to something. They are no better than braggers, but they try to be more sophisticated about it by pretending to maintain security. However, if they were serious about security, they would just make up a good excuse as to why they are not as active, or why they can’t make it to the protest. Concealing sensitive information from even trusted comrades is far better than jeopardizing underground work.
Self-education towards liberation
With the above information about security, it should be easier to spot those activists who compromise our movement’s security. So what do we do with people who display these behaviors? Do we shun or expel them from our groups and projects? Actually, no -- not for the first security violation, at least.
The unfortunate truth is there are some security-ignorant people in the movement and others who have possibly been raised in a “scene” that thrives on bragging and gossiping. It doesn’t mean these people are bad, but it does mean they need to inform themselves and learn about personal and group security. Even seasoned activists make mistakes when there is a general lack of security consciousness in our groups. And that’s where those of you reading this can help. We must always act to inform persons whose behavior breaches security. If someone you know is bragging about doing an action or spreading security-compromising gossip, it is your responsibility to explain to her or him why that sort of talk violates security and is inappropriate.
You should strive to share this knowledge in a manner that encourages the person’s understanding and changes her/his behavior. It should be done without damaging the person’s pride. Show your sincere interest in helping him/her to become a more effective activist. Keep your humility and avoid presenting a superior, “holier than-thou” attitude. Such an attitude can raise an individual’s defenses and prevent them from listening to and using the advice offered. The goal of addressing these issues with others is to reduce insecure behavior, rather than showing how much more security-conscious you are.
Share your concerns and knowledge in private, so that the person does not feel as if they are being publicly humiliated. Addressing the person as soon as possible after the security violation increases effectiveness.
If each of us remains responsible for discussing security information with people who slip up, we can dramatically improve security in our groups and activities. When people recognize that lying, gossiping, bragging, and inappropriate debriefing damages both themselves and others, these behaviors will soon end. By developing a culture where breaches of security are pointed out and discouraged, all sincere activists will quickly understand.
Dealing with chronic security problems
So what do we do with activists who repeatedly violate security precautions even after being informed several times? Unfortunately for them, the best thing to do is to cut them loose. Discuss the issue openly and ask them to leave your meetings, basecamps and organizations. With law enforcement budgets on the increase and with courts handing down long sentences for political “crimes”, the stakes are too high to allow chronic security offenders to work among us.
By creating a security culture, we have an effective defense against informers and agents who try to infiltrate groups. Imagine an informer who, every time they ask another activist about their activities, receives information about security. It would frustrate the informer’s work. When other activists discovered that she/he continued to violate security precautions after being repeatedly informed, there would be grounds for isolating the person from our groups. And that would be one less informer for us to deal with!
Adopt a security culture now!
Activists are restless and resistance is on the rise. Some people are adopting radical and confrontational tactics. The more we organize and are effective, the more police forces continue to escalate their activities against us. For direct action movements to continue, we need to consider our security more seriously. Good security should be made one of our strengths.
Links
- Poster: The Riot Is One Night... But Metadata Lasts Forever.
- EFF's protest surveillance self-defense.
- Crash Override's resources for potential victims of doxxing and online bullying.
Source
CC BY-SA. Derived from Creating A Security Culture: What It Is, Why We Need It & How To Implement It, a widely-circulated 'zine (unknown author, unknown date). A modified version by resist.ca was included in the Security Culture: A Handbook For Activists (pdf) 'zine, which went through three editions (3rd ed. 2001).