Introduction to Security Codes

This article introduces a basic guide of generally accepted “security codes” for movements which can be applied in a variety of direct action, protest, and event situations. More articles related to security can be accessed here. These include topics like physical security for events, operational security, geolocation and tracking and many more. By Max Wilbert … Continue reading Introduction to Security Codes

Physical Security for Events / Actions

Vigilante, paramilitary, and state violence against resistance movements is on the rise. Around the world, regressive forces are violently resisting social movements for justice and sustainability, or using intimidation to create fear. Our movements must prepare for this. This post includes a training on how to protect protests, events, and locations from violent attacks and … Continue reading Physical Security for Events / Actions

An Introduction to Security for Activists, Organizers, and Revolutionaries

The modern surveillance state is unparalleled. Many people are legitimately afraid of state repression. But this fear can easily become paranoia and paralysis. As a result, some people will not get involved in radical organizing at all. Others will stay involved, but their paranoia will drive people away. The result? Our movements die. How do … Continue reading An Introduction to Security for Activists, Organizers, and Revolutionaries

Extinction Rebellion: Security Analysis of Ireland’s Movement

Editor’s note: DGR acknowledges that Extinction Rebellion and Extinction Rebellion Ireland are valuable and necessary contributors to a broader ecosystem of activism. The analysis in this article is relevant for many movements and it’s republished from Medium with permission from the author. Image credit: Truthout.org on Flickr by Roderick Campbell Extinction Rebellion Ireland (XRI) is … Continue reading Extinction Rebellion: Security Analysis of Ireland’s Movement

The Firewall: Assata on This Essential Security Measure

Here at Deep Green Resistance, we are an “aboveground” organization with a firewall between us and underground action. That means that our primary work is legal (although this varies depending on national laws). Our members also take part in non-violent direct action of the sort common among aboveground movements. This is in contrast with “underground” … Continue reading The Firewall: Assata on This Essential Security Measure

The Green Flame Podcast, Episode 3: COINTELPRO and Security Culture

On this episode of the Green Flame, we speak with Claude Marks, former political prisoner and activist, director of the Freedom Archives, about COINTELPRO and state repression of revolutionary movements. We hear from Will Falk, activist, radical movement lawyer and writer, about security culture. And for our skill, we focus on operational security. This show … Continue reading The Green Flame Podcast, Episode 3: COINTELPRO and Security Culture

Operational Security 101 for Activists and Revolutionaries

     by Max Wilbert / Deep Green Resistance Those in power do not hesitate to assault, imprison, torture, and sometimes murder those who fight capitalism, patriarchy, racism, the murder of the planet, and other elements of global empire. In order to do this, they need information. State agencies, private military corporations, investigators, and far-right … Continue reading Operational Security 101 for Activists and Revolutionaries

Activist Guide to Security: Defeating Geolocation and Tracking

     by Max Wilbert / Deep Green Resistance We live in a surveillance state. As the Edward Snowden leaks and subsequent reporting has shown, government and private military corporations regularly target political dissidents for intelligence gathering. This information is used to undermine social movements, foment internecine conflict, discover weaknesses, and to get individuals thrown in jail … Continue reading Activist Guide to Security: Defeating Geolocation and Tracking

Digital Security Low Hanging Fruit

Editor’s note: republished under a Creative Commons License, this article is “A handful of digital security things that that most of us should do almost all of the time,” in the words of the author. We offer it here as a resource for activists who wish to communicate securely, to protect their groups and allies against digital infiltration or … Continue reading Digital Security Low Hanging Fruit

Security Firm Running Dakota Access Pipeline Intelligence Has Ties to U.S. Military Work in Iraq and Afghanistan

     by Steve Horn / Desmog TigerSwan is one of several security firms under investigation for its work guarding the Dakota Access pipeline in North Dakota while potentially without a permit. Besides this recent work on the Standing Rock Sioux protests in North Dakota, this company has offices in Iraq and Afghanistan and is run by a … Continue reading Security Firm Running Dakota Access Pipeline Intelligence Has Ties to U.S. Military Work in Iraq and Afghanistan