by Deep Green Resistance News Service | Dec 5, 2018 | The Solution: Resistance
Featured image: Occupy Wall Street. Wikipedia
by Derrick Jensen
We hold these truths to be self-evident:
That the real world is the source of our own lives, and the lives of others. A weakened planet is less capable of supporting life, human or otherwise. Thus the health of the real world is primary, more important than any social or economic system, because all social or economic systems are dependent upon a living planet: without a living planet you don’t have any social or economic systems whatsoever. It is self-evident that to value a social system that harms the planet’s capacity to support life over life itself is literally insane, in terms of being out of touch with physical reality.
That any way of life based on the use of nonrenewable resources is by definition not sustainable.
That any way of life based on the hyperexploitation of renewable resources is by definition not sustainable: if, for example, there are fewer salmon return every year, eventually there will be none. This means that for a way of life to be sustainable, it must not harm native communities: native prairies, native forests, native fisheries, and so on.
That the real world is interdependent, such that harm done to rivers harms those humans and nonhumans whose lives depend on these rivers, harms forests and prairies and wetlands surrounding these rivers, harms the oceans into which these rivers flow. Harm done to mountains harms rivers flowing through them. Harm done to oceans harms everyone directly or indirectly connected to them.
That you cannot argue with physics. If you burn carbon-based fuels, this carbon will go into the air, and have effects in the real world.
That creating and releasing poisons into the world will poison humans and nonhumans.
That no one, no matter now rich or powerful, should be allowed to create poisons for which there is no antidote.
That no one, no matter how rich or powerful, should be allowed to create messes that cannot be cleaned up.
That no one, no matter how rich or powerful, should be allowed to destroy places humans or nonhumans need to survive.
That no one, no matter how rich or powerful, should be allowed to drive human cultures or nonhuman species extinct.
That reality trumps all belief systems: what you believe is not nearly so important as what is real.
That on a finite planet you cannot have an economy based on or requiring growth. At least you cannot have one and expect to either have a planet or a future.
That the current way of life is not sustainable, and will collapse. The only real questions are what will be left of the world after that collapse, and how bad things will be for the humans and nonhumans who come after. We hold it as self-evident that we should do all that we can to make sure that as much of the real, physical world remains intact until the collapse of the current system, and that humans and nonhumans should be as prepared as possible for this collapse.
That the health of local economies are more important than the health of a global economy.
That a global economy should not be allowed to harm local economies or landbases.
That corporations are not living beings. They are certainly not human beings.
That corporations do not in any real sense exist. They are legal fictions. Limited liability corporations are institutions created explicitly to separate humans from the effects of their actions—making them, by definition, inhuman and inhumane. To the degree that we desire to live in a human and humane world—and, really, to the degree that we wish to survive—limited liability corporations need to be eliminated.
That the health of human and nonhuman communities are more important than the profits of corporations.
We hold it as self-evident, as the Declaration of Independence states, “That whenever any Form of Government becomes destructive of these ends [Life, Liberty, and the Pursuit of Happiness], it is the Right of the People to alter or abolish it. . . .” Further, we hold it as self-evident that it would be more precise to say that it is not the Right of the People, nor even their responsibility, but instead something more like breathing—something that if we fail to do we die. If we as a People fail to rid our communities of destructive institutions, those institutions will destroy our communities. And if we in our communities cannot provide meaningful and nondestructive ways for people to gain food, clothing, and shelter then we must recognize it’s not just specific destructive institutions but the entire economic system that is pushing the natural world past breaking points. Capitalism is killing the planet. Industrial civilization is killing the planet. Once we’ve recognized the destructiveness of capitalism and industrial civilization—both of which are based on systematically converting a living planet into dead commodities—we’ve no choice, unless we wish to sign our own and our children’s death warrants, but to fight for all we’re worth and in every way we can to overturn it.
#
Here is a list of our initial demands. When these demands are met, we will have more, and then more, until we are living sustainably in a just society. In each case, if these demands are not met, we will, because we do not wish to sign our own and our children’s death warrants, put them in place ourselves.
We demand that:
- Communities, including nonhuman communities, be immediately granted full legal and moral rights.
- Corporations be immediately stripped of their personhood, no longer be considered as persons under the law.
- Limited liability corporations be immediately stripped of their limited liability protection. If someone wants to perpetrate some action for which there is great risk to others, this person should be prepared to assume this risk him- or herself.
- Those whose economic activities cause great harm—including great harm to the real, physical world—be punished commensurate with their harm. So long as prisons and the death penalty exist, Tony Hayward of BP and Don Blankenship of Massey Coal, to provide two examples among many, should face the death penalty or life in prison without parole for murder, both of human beings and of landbases. The same can be said for many others, including those associated with these specific murders and thefts, and including those associated with many other murders and thefts.
- Environmental Crimes Tribunals be immediately put in place to try those who have significantly harmed the real, physical world. These tribunals will have force of law and will impose punishment commensurate with the harm caused to the public and to the real world.
- The United States immediately withdraw from NAFTA, DR-CAFTA, and other so-called “free trade agreements” (if it really is “free trade,” then why do they need the military and police to enforce it?) as these cause immeasurable and irreparable harm to local economies in the United States and abroad, and to the real, physical world. They cause grievous harm to working people in the United States and elsewhere. Committees should be formed to determine whether to try those who signed on to NAFTA for subverting United States sovereignty, and for Crimes Against Humanity for the deaths caused by these so-called free trade agreements.
- The United States remove all support for the World Bank and the International Monetary Fund. Both of these organizations cause immeasurable and irreparable harm to local economies in the United States and abroad, and to the real, physical world. They cause grievous harm to working people in the United States and elsewhere.
- The United States recognize that it is founded on land stolen from indigenous peoples. We demand a four stage process to rectify this ongoing atrocity. The first stage consists of immediately overturning the relevant parts of the 1823 U.S. Supreme Court ruling Johnson v. M’Intosh, which includes such rationalizations for murder and theft as, “However extravagant the pretension of converting the discovery of an inhabited country into conquest may appear; if the principle has been asserted in the first instance, and afterwards sustained; if a country has been acquired and held under it; if the property of the great mass of the community originates in it, it becomes the law of the land, and cannot be questioned.” We demand that this pretense, this principle, not only be questioned but rejected. The second is that all lands for which the United States government cannot establish legal title through treaty must immediately be returned to those peoples from whom it was stolen. Large scale landowners, those with over 640 acres, must immediately return all lands over 640 acres to their original and rightful inhabitants. Small scale landowners, those with title to 640 acres or less, who are “innocent purchasers” may retain title to their land (and this same is true for the primary 640 acres of larger landowners), but may not convey this title to others, and on their deaths it passes back to the original and rightful inhabitants. The third phase is for the United States government to pay reparations to those whose land they have taken commensurate with the harm they have caused. The fourth phase is for each and every treaty between the United States government and sovereign indigenous nations to be revisited, with an eye toward determining whether the treaties were signed under physical, emotional, economic, or military duress and whether these treaties have been violated. In either of these cases the wrongs must be redressed, once again commensurate with the harm these wrongs have caused.
- The United States government will provide reparations to those whose families have been harmed by chattel slavery, commensurate with the harm caused.
- Rivers be restored. There are more than 2 million dams in the United States, more than 60,000 dams over thirteen feet tall and over 70,000 dams over six and a half feet tall. Dams kill rivers. If we removed one of these 70,000 dams each day, it would take 200 years to get rid of them all. Salmon don’t have that time. Sturgeon don’t have that time. We demand that no more dams be built, and we demand the removal of five of those 70,000 dams per day over the next forty years, beginning one year from today. Remember, physical reality is more important than your belief system.
- Native prairies, wetlands, and forests be restored, at a rate of five percent per year. Please note that tree farms or “forests” managed for timber are not the same as native forests, any more than lawns or corn fields are prairies, and any more than concrete sluices are wetlands. Please note also that if all of the prairies and forests east of the Mississippi River were restored, the United States could be a net carbon sink within five years, even without reducing carbon emissions.
- An immediate end to clearcutting, “leave tree,” “seed tree,” “shelter tree” and all other “even age management” techniques, no matter what they are called, and no matter what rationales are put forward by the timber industry and the government. All remaining native forests are immediately and completely protected.
- An immediate end to destruction of prairies and wetlands. All remaining prairies and wetlands are immediately protected.
- The United States government immediately begin strict enforcement of the Clean Water Act, Clean Air Act, the Endangered Species Act, and other acts aimed at protecting the real, physical world. All programs associated with these Acts must be fully funded. This includes the immediate designation of Critical Habitat for all species on the wait list.
- Each year the United States must survey all endangered species to ascertain if they are increasing in number and range. If not, the United States government will do what is required to make sure they do.
- The United States government do whatever is necessary to make sure that there are fewer toxins in every mother’s breast milk every year than the year before, and that there are fewer carcinogens in every stream every year than the year before.
- The United States government do whatever is necessary to make sure that there are more migratory songbirds every year than the year before, that there are more native fish every year than the year before, more native reptiles and amphibians, and so on.
- Immediate closure of all US military bases on foreign soil. All US military personnel are to be immediately brought home.
- An immediate ban on the direct or indirect use of mercenaries (“military contractors”) by the US government and all associated entities.
- A reduction in the US military budget by 20 per year, until it reaches 20 percent of its current size. Then it will be maintained at no larger than that except in case of a war that is declared only by a direct vote of more than 50 percent of US citizens (and to last only as long as 50 percent of US citizens back it). This will provide the “peace dividend” politicians lyingly promised us back when the Soviet Union collapsed, and will balance the US budget and more than pay for all necessary domestic programs.
- The United States officially recognize that capitalism is based on subsidies, or as Dwayne Andreas, former CEO of ADM said, “There isn’t one grain of anything in the world that is sold in a free market. Not one! The only place you see a free market is in the speeches of politicians.” He’s right. For example, commercial fishing fleets worldwide receive more in subsidies than the entire value of their catch. Timber corporations, oil corporations, banks, would all collapse immediately without massive government subsidies and bailouts. Therefore, we demand that the United States government stop subsidizing environmentally and socially destructive activities, and shift those same subsidies into activities that restore the real, physical, world and that promote local self-sufficiency and vibrant local economies. Instead of subsidizing deforestation, subsidize reforestation. Instead of subsidizing the oil industry, subsidize relocalization. Instead of subsidizing fisheries depletion, subsidize fisheries restoration. Instead of subsidizing plastics production, subsidize cleaning plastics from the ocean. Instead of subsidizing the production of toxics by the chemical industries, subsidize the cleaning up of these toxics, both from our bodies and from the rest of the real, physical world.
- Scientific consensus is that to prevent even more catastrophic climate change than we and the rest of the world already face, net carbon emissions must be reduced by 80 percent. Because we wish to continue to live on a habitable planet, we demand a carbon reduction of 20 percent of current emissions per year over the next four years.
- The enshrinement in law of the right for workers to collectively bargain. In case of strikes, if police are brought in at all, it must be to protect the right of workers to strike. If police force anyone to come to terms, they must force the capitalists.
- That laws against rape be enforced, even against those who are rich, even those who are famous athletes, even those who are politicians, even those who are entertainers.
- The enshrinement in law of the precautionary principle, which states that if an action or policy has a suspected risk of causing harm to the public or the real, physical world, then the burden of proof that it is not harmful falls on those taking the action. In the absence of conclusive proof, no action may be taken. For example, no chemicals would be allowed to be released into the environment without conclusive proof that they will not harm the public or the environment.
- No new chemicals be released into the real, physical world until all currently used chemicals have been thoroughly tested for toxicity, and if found to have any significant chance of harming the public or the environment, these chemicals must be immediately and without exception withdrawn from use.
- The immediate, explicit, and legally binding recognition that perpetual growth is incompatible with life on a finite planet. We demand that economic growth stop, and that economies begin to contract. We demand immediate acknowledgement that if we do not begin this contraction voluntarily, that this contraction will take place against our will, and will cause untold misery.
- That overconsumption and overpopulation must be addressed in methods that are not racist, colonialist, or misogynist. We must recognize that humans, and especially industrial humans, have overshot the planet’s carrying capacity. We must recognize further that while overconsumption is more harmful than overpopulation, both are harmful. We must further recognize that right now, more than fifty percent of the children who are born are not wanted. We demand that all children be wanted. We recognize that the single most effective strategy for making certain that all children are wanted is the liberation of women. Therefore we demand that women be given absolute reproductive freedom, and that all forms of reproductive control be freely available to women. We demand that those who attempt to deny women this freedom be punished by law.
- The United States government put an immediate end to absentee land ownership. No one shall be allowed to own land more than one-quarter of a mile from his or her home.
- Land ownership patterns change. Land ownership is more concentrated in the United States than in many countries the United States derides as antidemocratic: five percent of farmers in Honduras own 67 percent of the arable land, while in the United States five percent of landowners (not citizens) own 75 percent of the land (California is in many ways worse: twenty-five landowners own 58 percent of the farmland). To rectify this, no one shall be allowed to own more than 640 acres. All title to individual or corporate land holdings over 640 acres are to be immediately forfeited. These lands will be first in line for restoration to native forest, prairie, wetland, and so on. Lands not suitable for these purposes will be used to provide housing for those who cannot afford it.
- An immediate end to factory farming and to monocrop agriculture, two of the most destructive activities humans have ever perpetrated. We demand a return to perennial polycultures.
- An immediate end to soil drawdown. Because soil is the basis of terrestrial life, no activities will be allowed which destroy topsoil. All properties over sixty acres must have soil surveys every ten years (on every sixty acre parcel), and if they have suffered any decrease of health or depth of topsoil the lands will be confiscated and given to those who will build up soil.
- An immediate end to aquifer drawdown. No activities will be allowed which draw down aquifers.
- Provision of free food, shelter, and medical necessities to all residents.
- Immediate increase in the tax rate to 95 percent for all gross earnings over one million dollars per year by persons or entities.
- An immediate and permanent halt to all fracking, mountaintop removal, tar sands extraction, nuclear power, and offshore drilling.
- An immediate and permanent halt to all energy production that is harmful to the real, physical world. This includes the manufacture of solar photovoltaics, windmills, hybrid cars, and so on.
- Removal of plastic from the ocean. Each year the ocean must have 5 percent less plastic in it than the year before.
- Each year the oceans must have 5 percent more large fish than the year before.
- The United States Constitution be rewritten to destroy the primacy it gives to the privatization of profits and the externalization of costs by the wealthy, and to make its primary purpose not the preservation of the wealth and power of the already wealthy and powerful, but rather to protect human and nonhuman communities—to protect the real, physical world—and enforcably to deprive the rich of their ability to steal from the poor and the powerful of their ability to destroy the planet.
#
We hold these further truths also to be self-evident:
That demands without means to enforce them are nothing more than begging. We are not begging. We are demanding.
Power is not a mistake, and those in power will not suddenly have attacks of conscience. Social change has never occurred through waiting for the rich or powerful to develop consciences, and it never will.
Those in power will not act different than they have acted all along, and they will not act against the power of capital. We hold it as self-evident that the rich and powerful have no reason to stop the rich from stealing from the poor nor the powerful from destroying more of the real, physical world than they already have. That is, they have no reason except us. Our lives and the life of the planet that is our only home is on the line. We no longer have the luxury of allowing those in power to continue. If those in power won’t accede to these demands, then they need to not be in power, and we need to remove them from power, using any means necessary.
We hold it as self-evident, as the Declaration of Independence states, “That whenever any Form of Government becomes destructive of these ends [Life, Liberty, and the Pursuit of Happiness], it is the Right of the People to alter or abolish it. . . .”
It is long past time we asserted our rights.
by Deep Green Resistance News Service | Dec 1, 2018 | Strategy & Analysis
Editor’s note: The following is from the chapter “Decisive Ecological Warfare” of the book Deep Green Resistance: A Strategy to Save the Planet. This book is now available for free online.
by Aric McBay
There’s a time when the operation of the machine becomes so odious, makes you so sick at heart, that you can’t take part, you can’t even passively take part, and you’ve got to put your bodies upon the gears and upon the wheels, upon the levers, upon all the apparatus, and you’ve got to make it stop!
—Mario Savio, Berkeley Free Speech Movement
To gain what is worth having, it may be necessary to lose everything else.
—Bernadette Devlin, Irish activist and politician
BRINGING IT DOWN: COLLAPSE SCENARIOS
At this point in history, there are no good short-term outcomes for global human society. Some are better and some are worse, and in the long term some are very good, but in the short term we’re in a bind. I’m not going to lie to you—the hour is too late for cheermongering. The only way to find the best outcome is to confront our dire situation head on, and not to be diverted by false hopes.
Human society—because of civilization, specifically—has painted itself into a corner. As a species we’re dependent on the draw down of finite supplies of oil, soil, and water. Industrial agriculture (and annual grain agriculture before that) has put us into a vicious pattern of population growth and overshoot. We long ago exceeded carrying capacity, and the workings of civilization are destroying that carrying capacity by the second. This is largely the fault of those in power, the wealthiest, the states and corporations. But the consequences—and the responsibility for dealing with it—fall to the rest of us, including nonhumans.
Physically, it’s not too late for a crash program to limit births to reduce the population, cut fossil fuel consumption to nil, replace agricultural monocrops with perennial polycultures, end overfishing, and cease industrial encroachment on (or destruction of) remaining wild areas. There’s no physical reason we couldn’t start all of these things tomorrow, stop global warming in its tracks, reverse overshoot, reverse erosion, reverse aquifer drawdown, and bring back all the species and biomes currently on the brink. There’s no physical reason we couldn’t get together and act like adults and fix these problems, in the sense that it isn’t against the laws of physics.
But socially and politically, we know this is a pipe dream. There are material systems of power that make this impossible as long as those systems are still intact. Those in power get too much money and privilege from destroying the planet. We aren’t going to save the planet—or our own future as a species—without a fight.
What’s realistic? What options are actually available to us, and what are the consequences? What follows are three broad and illustrative scenarios: one in which there is no substantive or decisive resistance, one in which there is limited resistance and a relatively prolonged collapse, and one in which all-out resistance leads to the immediate collapse of civilization and global industrial infrastructure.
NO RESISTANCE
If there is no substantive resistance, likely there will be a few more years of business as usual, though with increasing economic disruption and upset. According to the best available data, the impacts of peak oil start to hit somewhere between 2011 and 2015, resulting in a rapid decline in global energy availability.1 It’s possible that this may happen slightly later if all-out attempts are made to extract remaining fossil fuels, but that would only prolong the inevitable, worsen global warming, and make the eventual decline that much steeper and more severe. Once peak oil sets in, the increasing cost and decreasing supply of energy undermines manufacturing and transportation, especially on a global scale.
The energy slide will cause economic turmoil, and a self-perpetuating cycle of economic contraction will take place. Businesses will be unable to pay their workers, workers will be unable to buy things, and more companies will shrink or go out of business (and will be unable to pay their workers). Unable to pay their debts and mortgages, homeowners, companies, and even states will go bankrupt. (It’s possible that this process has already begun.) International trade will nosedive because of a global depression and increasing transportation and manufacturing costs. Though it’s likely that the price of oil will increase over time, there will be times when the contracting economy causes falling demand for oil, thus suppressing the price. The lower cost of oil may, ironically but beneficially, limit investment in new oil infrastructure.
At first the collapse will resemble a traditional recession or depression, with the poor being hit especially hard by the increasing costs of basic goods, particularly of electricity and heating in cold areas. After a few years, the financial limits will become physical ones; large-scale energy-intensive manufacturing will become not only uneconomical, but impossible.
A direct result of this will be the collapse of industrial agriculture. Dependent on vast amounts of energy for tractor fuel, synthesized pesticides and fertilizers, irrigation, greenhouse heating, packaging, and transportation, global industrial agriculture will run up against hard limits to production (driven at first by intense competition for energy from other sectors). This will be worsened by the depletion of groundwater and aquifers, a long history of soil erosion, and the early stages of climate change. At first this will cause a food and economic crisis mostly felt by the poor. Over time, the situation will worsen and industrial food production will fall below that required to sustain the population.
There will be three main responses to this global food shortage. In some areas people will return to growing their own food and build sustainable local food initiatives. This will be a positive sign, but public involvement will be belated and inadequate, as most people still won’t have caught on to the permanency of collapse and won’t want to have to grow their own food. It will also be made far more difficult by the massive urbanization that has occurred in the last century, by the destruction of the land, and by climate change. Furthermore, most subsistence cultures will have been destroyed or uprooted from their land—land inequalities will hamper people from growing their own food (just as they do now in the majority of the world). Without well-organized resisters, land reform will not happen, and displaced people will not be able to access land. As a result, widespread hunger and starvation (worsening to famine in bad agricultural years) will become endemic in many parts of the world. The lack of energy for industrial agriculture will cause a resurgence in the institutions of slavery and serfdom.
Slavery does not occur in a political vacuum. Threatened by economic and energy collapse, some governments will fall entirely, turning into failed states. With no one to stop them, warlords will set up shop in the rubble. Others, desperate to maintain power against emboldened secessionists and civil unrest, will turn to authoritarian forms of government. In a world of diminishing but critical resources, governments will get leaner and meaner. We will see a resurgence of authoritarianism in modern forms: technofascism and corporation feudalism. The rich will increasingly move to private and well-defended enclaves. Their country estates will not look apocalyptic—they will look like eco-Edens, with well-tended organic gardens, clean private lakes, and wildlife refuges. In some cases these enclaves will be tiny, and in others they could fill entire countries.
Meanwhile, the poor will see their own condition worsen. The millions of refugees created by economic and energy collapse will be on the move, but no one will want them. In some brittle areas the influx of refugees will overwhelm basic services and cause a local collapse, resulting in cascading waves of refugees radiating from collapse and disaster epicenters. In some areas refugees will be turned back by force of arms. In other areas, racism and discrimination will come to the fore as an excuse for authoritarians to put marginalized people and dissidents in “special settlements,” leaving more resources for the privileged.2 Desperate people will be the only candidates for the dangerous and dirty manual labor required to keep industrial manufacturing going once the energy supply dwindles. Hence, those in power will consider autonomous and self-sustaining communities a threat to their labor supply, and suppress or destroy them.
Despite all of this, technological “progress” will not yet stop. For a time it will continue in fits and starts, although humanity will be split into increasingly divergent groups. Those on the bottom will be unable to meet their basic subsistence needs, while those on the top will attempt to live lives of privilege as they had in the past, even seeing some technological advancements, many of which will be intended to cement the superiority of those in power in an increasingly crowded and hostile world.
Technofascists will develop and perfect social control technologies (already currently in their early stages): autonomous drones for surveillance and assassination; microwave crowd-control devices; MRI-assisted brain scans that will allow for infallible lie detection, even mind reading and torture. There will be no substantive organized resistance in this scenario, but in each year that passes the technofascists will make themselves more and more able to destroy resistance even in its smallest expression. As time slips by, the window of opportunity for resistance will swiftly close. Technofascists of the early to mid-twenty-first century will have technology for coercion and surveillance that will make the most practiced of the Stasi or the SS look like rank amateurs. Their ability to debase humanity will make their predecessors appear saintly by comparison.
Not all governments will take this turn, of course. But the authoritarian governments—those that will continue ruthlessly exploiting people and resources regardless of the consequences—will have more sway and more muscle, and will take resources from their neighbors and failed states as they please. There will be no one to stop them. It won’t matter if you are the most sustainable eco-village on the planet if you live next door to an eternally resource-hungry fascist state.
Meanwhile, with industrial powers increasingly desperate for energy, the tenuous remaining environmental and social regulations will be cast aside. The worst of the worst, practices like drilling offshore and in wildlife refuges, and mountaintop removal for coal will become commonplace. These will be merely the dregs of prehistoric energy reserves. The drilling will only prolong the endurance of industrial civilization for a matter of months or years, but ecological damage will be long-term or permanent (as is happening in the Arctic National Wildlife Refuge). Because in our scenario there is no substantive resistance, this will all proceed unobstructed.
Investment in renewable industrial energy will also take place, although it will be belated and hampered by economic challenges, government bankruptcies, and budget cuts.3 Furthermore, long-distance power transmission lines will be insufficient and crumbling from age. Replacing and upgrading them will prove difficult and expensive. As a result, even once in place, electric renewables will only produce a tiny fraction of the energy produced by petroleum. That electric energy will not be suitable to run the vast majority of tractors, trucks, and other vehicles or similar infrastructure.
As a consequence, renewable energy will have only a minimal moderating effect on the energy cliff. In fact, the energy invested in the new infrastructure will take years to pay itself back with electricity generated. Massive infrastructure upgrades will actually steepen the energy cliff by decreasing the amount of energy available for daily activities. There will be a constant struggle to allocate limited supplies of energy under successive crises. There will be some rationing to prevent riots, but most energy (regardless of the source) will go to governments, the military, corporations, and the rich.
Energy constraints will make it impossible to even attempt any full-scale infrastructure overhauls like hydrogen economies (which wouldn’t solve the problem anyway). Biofuels will take off in many areas, despite the fact that they mostly have a poor ratio of energy returned on energy invested (EROEI). The EROEI will be better in tropical countries, so remaining tropical forests will be massively logged to clear land for biofuel production. (Often, forests will be logged en masse simply to burn for fuel.) Heavy machinery will be too expensive for most plantations, so their labor will come from slavery and serfdom under authoritarian governments and corporate feudalism. (Slavery is currently used in Brazil to log forests and produce charcoal by hand for the steel industry, after all.)4 The global effects of biofuel production will be increases in the cost of food, increases in water and irrigation drawdown for agriculture, and worsening soil erosion. Regardless, its production will amount to only a small fraction of the liquid hydrocarbons available at the peak of civilization.
All of this will have immediate ecological consequences. The oceans, wracked by increased fishing (to compensate for food shortages) and warming-induced acidity and coral die-offs, will be mostly dead. The expansion of biofuels will destroy many remaining wild areas and global biodiversity will plummet. Tropical forests like the Amazon produce the moist climate they require through their own vast transpiration, but expanded logging and agriculture will cut transpiration and tip the balance toward permanent drought. Even where the forest is not actually cut, the drying local climate will be enough to kill it. The Amazon will turn into a desert, and other tropical forests will follow suit.
Projections vary, but it’s almost certain that if the majority of the remaining fossil fuels are extracted and burned, global warming would become self-perpetuating and catastrophic. However, the worst effects will not be felt until decades into the future, once most fossil fuels have already been exhausted. By then, there will be very little energy or industrial capacity left for humans to try to compensate for the effects of global warming.
Furthermore, as intense climate change takes over, ecological remediation through perennial polycultures and forest replanting will become impossible. The heat and drought will turn forests into net carbon emitters, as northern forests die from heat, pests, and disease, and then burn in continent-wide fires that will make early twenty-first century conflagrations look minor.5 Even intact pastures won’t survive the temperature extremes as carbon is literally baked out of remaining agricultural soils.
Resource wars between nuclear states will break out. War between the US and Russia is less likely than it was in the Cold War, but ascending superpowers like China will want their piece of the global resource pie. Nuclear powers such as India and Pakistan will be densely populated and ecologically precarious; climate change will dry up major rivers previously fed by melting glaciers, and hundreds of millions of people in South Asia will live bare meters above sea level. With few resources to equip and field a mechanized army or air force, nuclear strikes will seem an increasingly effective action for desperate states.
If resource wars escalate to nuclear wars, the effects will be severe, even in the case of a “minor” nuclear war between countries like India and Pakistan. Even if each country uses only fifty Hiroshima-sized bombs as air bursts above urban centers, a nuclear winter will result.6Although lethal levels of fallout last only a matter of weeks, the ecological effects will be far more severe. The five megatons of smoke produced will darken the sky around the world. Stratospheric heating will destroy most of what remains of the ozone layer.7 In contrast to the overall warming trend, a “little ice age” will begin immediately and last for several years. During that period, temperatures in major agricultural regions will routinely drop below freezing in summer. Massive and immediate starvation will occur around the world.
That’s in the case of a small war. The explosive power of one hundred Hiroshima-sized bombs accounts for only 0.03 percent of the global arsenal. If a larger number of more powerful bombs are used—or if cobalt bombs are used to produce long-term irradiation and wipe out surface life—the effects will be even worse.8 There will be few human survivors. The nuclear winter effect will be temporary, but the bombing and subsequent fires will put large amounts of carbon into the atmosphere, kill plants, and impair photosynthesis. As a result, after the ash settles, global warming will be even more rapid and worse than before.
Nuclear war or not, the long-term prospects are dim. Global warming will continue to worsen long after fossil fuels are exhausted. For the planet, the time to ecological recovery is measured in tens of millions of years, if ever.9 As James Lovelock has pointed out, a major warming event could push the planet into a different equilibrium, one much warmer than the current one.10 It’s possible that large plants and animals might only be able to survive near the poles.11 It’s also possible that the entire planet could become essentially uninhabitable to large plants and animals, with a climate more like Venus than Earth.
All that is required for this to occur is for current trends to continue without substantive and effective resistance. All that is required for evil to succeed is for good people to do nothing. But this future is not inevitable.
Image: public domain
by Deep Green Resistance News Service | Nov 30, 2018 | Strategy & Analysis
by Max Wilbert / Deep Green Resistance
We live in a surveillance state. As the Edward Snowden leaks and subsequent reporting has shown, government and private military corporations regularly target political dissidents for intelligence gathering. This information is used to undermine social movements, foment internecine conflict, discover weaknesses, and to get individuals thrown in jail for their justified resistance work.
As the idea of the panopticon describes, surveillance creates a culture of self-censorship. There aren’t enough people at security agencies to monitor everything, all of the time. Almost all of the data that is collected is never read or analyzed. In general, specific targeting of an individual for surveillance is the biggest threat. However, because people don’t understand the surveillance and how to defeat it, they subconsciously stop themselves from even considering serious resistance. In this way, they become self-defeating.
Surveillance functions primarily by creating a culture of paranoia through which the people begin to police themselves.
This is a guide to avoiding some of the most dangerous forms of location tracking. This information is meant to demystify tracking so that you can take easy, practical steps to mitigating the worst impacts. Activists and revolutionaries of all sorts may find this information helpful and should incorporate these practices into daily life, whether or not you are involved in any illegal action, as part of security culture.
About modern surveillance
We are likely all familiar with the extent of surveillance conducted by the NSA in the United States and other agencies such as the GCHQ in Britain. These organizations engage in mass data collection on a global scale, recording and storing every cell phone call, text message, email, social media comment, and other form of data they can get their hands on.
Our best defenses against this surveillance network are encryption, face-to-face networking and communication, and building legitimate communities of trust based on robust security culture.
Capitalism has expanded surveillance to every person. Data collection has long been big business, but the internet and smartphones have created a bonanza in data collection. Corporations regularly collect, share, buy, and sell information including your:
- Home address
- Workplace
- Location tracking data
- Businesses you frequent
- Political affiliations
- Hobbies
- Family and relationship connections
- Purchasing habits
- And much more
Much of this information is available on the open marketplace. For example, it was recently reported that many police departments are purchasing location records from cell phones companies such as Verizon that show a record of every tower a given cell phone has connected to. By purchasing this information from a corporation, this allows police to bypass the need to receive a warrant—just one example of how corporations and the state collaborate to protect capitalism and the status quo.
Forms of location tracking
There are two main types of location tracking we are going to look at in this article: cell tower tracking and GPS geolocation.
Cell phone tracking
Whenever a cell phone connects to a cell tower, a unique device ID number is transmitted to the service provider. For most people, their cell phone is connected directly to their identity because they pay a monthly fee, signed up using their real name, and so on. Therefore, any time you connect to a cell network, your location is logged.
The more cell towers are located in your area, the more exact your location may be pinpointed. This same form of tracking applies to smartphones, older cell phones, as well as tablets, computers, cars, and other devices that connect to cell networks. This data can be aggregated over time to form a detailed picture of your movements and connections.
GPS tracking
Many handheld GPS units are “receiver only” units, meaning they can only tell you where you are located. They don’t actually send data to GPS satellites, they only passively receive data. However, this is not the case with all GPS devices.
For example, essentially every new car that is sold today includes built-in GPS geolocation beacons. These are designed to help you recover a stolen car, or call for roadside assistance in remote areas.
Additionally, many smartphones track GPS location data and store that information. The next time you connect to a WiFi or cell phone network, that data is uploaded and shared to external services. GPS tracking can easily reveal your exact location to within 10 feet.
Defeating location tracking
So how do we stop these forms of location tracking from being effective? There are five main techniques we can use, all of which are simple and low-tech.
(a) Don’t carry a cell phone. It’s almost a blasphemy in our modern world, but this is the safest way for activists and revolutionaries to operate.
(b) Use “burner” phones. A “burner” is a prepaid cell phone that can be purchased using cash at big-box stores like Wal-Mart. In the USA, only two phones may be purchased per person, per day. If it is bought with cash and activated using the Tor network, a burner phone cannot typically be linked to your identity.
WORD OF CAUTION: rumor has it that the NSA and other agencies run sophisticated voice identification algorithms via their mass surveillance networks. If you are in a maximum-security situation, you may need to use a voice scrambler, only use text messages, or take other precautions. Also note that burners are meant to be used for a short period of time, then discarded.
(c) Remove the cell phone battery. Cell phones cannot track your location if they are powered off. However, it is believed that spy agencies have the technical capability to remotely turn on cell phones for use as surveillance devices. To defeat this, remove the battery completely. This is only possible with some phones, which brings us to method number four.
(d) Use a faraday bag. A faraday bag (sometimes called a “signal blocking bag”) is made of special materials that block radio waves (WiFi, cell networks, NFC, and Bluetooth all are radio waves). These bags can be purchased for less than $50, and will block all signals while your phones or devices are inside. These bags are often used by cops, for example, to prevent remote wiping of devices in evidence storage. If you are ever arrested with digital devices, you may notice the cops place them in faraday bags.
WORD OF CAUTION: Modern smartphones include multiple sensors including a compass and accelerometer. There have been proof-of-concept experiments showing that a smartphone inside a faraday bag can still track your location by using these sensors in a form of dead reckoning. In high-security situations where you may be targeted individually, this is a real consideration.
(e) Don’t buy any modern car that includes GPS. Note that almost all rental cars contain GPS tracking devices as well. Any time a person is traveling for a serious action, it is safest to use an older vehicle. If you may be under surveillance, it is best to use a vehicle that is not directly connected to you or to the movement.
Conclusion
There are caveats here. I am not a technical expert, I am merely a revolutionary who is highly concerned about mass surveillance. Methods of location tracking are always evolving. And there are many methods.
This article doesn’t, for example, discuss the simple method of placing a GPS tracker on a car. These small magnetic devices can be purchased on the private market and attached to the bottom of any vehicle.
However, these basic principles can be applied across a wide range of scenarios, with some modification, to greatly increase your privacy and security.
Good luck!
by Deep Green Resistance News Service | Nov 24, 2018 | Strategy & Analysis
Editor’s note: The following is from the chapter “Tactics and Targets” of the book Deep Green Resistance: A Strategy to Save the Planet. This book is now available for free online.
by Aric McBay
A good tactic used on a poor target has little effect.
The Field Manual on Guerrilla Warfare identifies four “important factors related to the target which influence its final selection,”10 later expanded to six with the CARVER matrix.13 These criteria are meant specifically for targets to be disrupted or destroyed, not necessarily when choosing potential targets for intelligence gathering or further investigation. The six criteria are as follows:
Criticality. How important is this target to the enemy and to enemy operations? “A target is critical when its destruction or damage will exercise a significant influence upon the enemy’s ability to conduct or support operations. Such targets as bridges, tunnels, ravines, and mountain passes are critical to lines of communication; engines, ties, and POL [petroleum, oil, and lubricant] stores are critical to transportation. Each target is considered in relationship to other elements of the target system.” Resistance movements (and the military) look for bottlenecks when selecting a target. And they make sure to think in big picture terms, rather than just in terms of a specific individual target. What target(s) can be disrupted or destroyed to cause maximum damage to the entire enemy system? Multiple concurrent surprise attacks are ideal for resistance movements, and can cause cascading failures.
Accessibility. How easy is it to get near the target? “Accessibility is measured by the ability of the attacker to infiltrate into the target area. In studying a target for accessibility, security controls around the target area, location of the target, and means of infiltration are considered.” It’s important to make a clear distinction between accessibility and vulnerability. For a resister in Occupied France, a well-guarded fuel depot might be explosively vulnerable, but not very accessible. For resisters in German-occupied Warsaw, the heavy wall surrounding the Warsaw Ghetto might be easily accessible, but not very vulnerable unless they carried powerful explosives. Good intelligence and reconnaissance are key to identifying and bypassing obstacles to access.
Recuperability. How much effort would it take to rebuild or replace the target? “Recuperability is the enemy’s ability to restore a damaged facility to normal operating capacity. It is affected by the enemy capability to repair and replace damaged portions of the target.” Specialized installations, hard-to-find parts, or people with special unique skills are difficult to replace. Targets with very common or mass-produced and stockpiled components would be poorer targets in terms of recuperability. Undermining enemy recuperability can be done with good planning and multiple attacks: SOE saboteurs were trained to target the same important parts on every machine. If they were to sabotage all of the locomotives in a stockyard, they would blow up the same part on each train, thus preventing the engineers from cannibalizing parts from other trains to make a working one.
Vulnerability. How tough is the target? “Vulnerability is a target’s susceptibility to attack by means available to [resistance] forces. Vulnerability is influenced by the nature of the target, i.e., type, size, disposition and composition.” In military terminology, a “soft target” is one that is relatively vulnerable, while a “hard target” is well defended or fortified. A soft target could be a sensitive electrical component, a flammable storage shed, or a person. A hard target might be a roadway, a concrete bunker, or a military installation. Hard targets require more capacity or armament to disable. A battle tank might have lower vulnerability when faced with a resister armed with a Molotov cocktail, but high vulnerability against someone armed with a rocket-propelled grenade.
Effect. Will a successful attack increase the chances of achieving larger goals? What consequences might result, intended and unintended? An attack on a pipeline might result in an oil spill, with collateral damage to life in the immediate vicinity. Escalation of sabotage might result in increased surveillance and repression of the general populace.
Recognizability. How difficult is it to identify the target during the operation, under different conditions of daylight, weather, and season? A brightly lit facility adjacent to a road is easy to locate, even at night, but it may be difficult to pick out a particular oil derrick owned by a particular company amidst acres of wells, or a specific CEO in a crowd of businesspeople.
From this perspective the ideal target would be highly critical (such that damage would cause cascading systems failures), highly vulnerable, very accessible and easy to identify, difficult and time-consuming to repair or replace, and unlikely to cause undesirable side effects. The poorest target would be of low importance for enemy operations but with high risk of negative side effects, hardened, inaccessible and hard to find, and easily replaced. You’ll note that there’s no category for “symbolic value” to the enemy, because the writers of the manual weren’t interested in symbolic targets. They consistently emphasize that successful operations will undermine the morale of the adversary, while increasing morale of the resisters and their supporters. The point is to carry out decisively effective action with the knowledge that such action will have emotional benefits for your side, not to carry out operations that seem emotionally appealing in the hopes that those choices will lead to effective action.
An additional criterion not discussed above would be destructivity. How damaging is the existence of the target to people and other living creatures? A natural gas–burning power plant might be more valuable based on the six criteria, but a coal-fired power plant could be more destructive, making it a higher priority from a practical and symbolic perspective.
It’s rare to find a perfect target. It’s more likely that choosing among targets will require certain trade-offs. A remote enemy installation might be more vulnerable, but it could also be more difficult to access and possibly less important to the adversary. Larger, more critical installations are often better guarded and less vulnerable. Target decisions have to be made in the context of the larger strategy, taking into account tactics and organizational capability.
One of the reasons that the Earth Liberation Front (ELF) has had limited decisive success so far is that its targets have had low criticality and high recuperability. New suburban subdivisions are certainly crimes against ecology, but partially constructed homes are not very important to those in power, and they are relatively replaceable. The effect is primarily symbolic, and it’s hard to find a case in which a construction project has actually been given up because of ELF activity—although many have certainly been made more expensive.
Most often, it seems that resistance targets in North America are chosen on the basis of vulnerability and accessibility, rather than on criticality. It’s easy to walk up to a Walmart window and smash it in the middle of the night or to destroy a Foot Locker storefront during a protest march. Aggressive symbolic attacks do get attention, and if a person’s main indicator of success is a furor on the 10:00 pm news, then igniting the local Burger King is likely to achieve that. But making a decisive impact on systems of power and their basis of support is more difficult to measure. If those in power are clever, they’ll downplay the really damaging actions to make themselves seem invulnerable, but scream bloody murder over a smashed window in order to whip up public opinion. And isn’t that what often happens on the news? If a biotech office is smashed and not a single person injured, the corporate journalists and pundits start pontificating about “violence” and “terrorism.” But if a dozen US soldiers are blown up by insurgents in Iraq, the White House press secretary will calmly repeat over and over that “America” is winning and that these incidents are only minor setbacks.
The Black Liberation Army (BLA) is an example of a group that chose targets in alignment with its goals. The BLA formed as an offshoot (or, some would argue, as a parallel development) of the Black Panther Party. The BLA was not interested in symbolic targets, but in directly targeting those who oppressed people of color. Writes historian Dan Berger: “The BLA’s Program included three components: retaliation against police violence in Black communities; elimination of drugs and drug dealers from Black communities; and helping captured BLA members escape from prison.”11 The BLA essentially believed that aboveground black organizing was doomed because of violent COINTELPRO-style tactics, and that the BPP had become a reformist organization. They argued that “the character of reformism is based on unprincipled class collaboration with our enemy.”12 In part because of their direct personal experience of violent repression at the hands of the state, they did not hesitate to kill white police officers in retaliation for attacks on the black community.
The IRA was also ruthless in their target selection, though they had limited choices in terms of attacking their occupiers. By the time WWII rolled around, resisters in Europe had a wide variety of potential and critical targets for sabotage, such as rail and telegraph lines, and further industrialization has only increased the number of critical mechanical targets, but a century ago, Ireland was hardly mechanized at all. That is why Michael Collins correctly identified British intelligence agents as the most critical and least recuperable targets available. Furthermore, his networks of spies and assassins made those agents—already soft targets—highly accessible. They were a perfect match for all six target selection criteria.
It’s worth noting that these six criteria are not just applicable to targets that are going to be destroyed. The same criteria are used to select “pressure points” on which to exert political force for any strategy of resistance, even one that is explicitly nonviolent. Effective strikes or acts of civil disobedience can exert more political force by disrupting more critical and vulnerable targets—the more accessible, the better.
These criteria for target selection go both ways. Our own resistance movements are targets for those in power, and it’s important to understand our organizations as potential targets. Leaders have often been attacked because they were crucial to the organization. Underground leaders are less accessible, but potentially more vulnerable if they can be isolated from their base of support. And aboveground groups often have better recuperability, because they have a larger pool to draw from and fewer training requirements; recall the waves after waves of civil rights activists willing to be arrested in Birmingham, Alabama.
Anyone who casts their lot with a resistance movement must be prepared for reprisals. Those reprisals will come whether the actionists are aboveground or underground, choosing violence or nonviolence. Many activists, especially from privileged backgrounds, naïvely assume that fighting fair will somehow cause those in power to do the same. Nothing could be further from the truth. The moment that any power structure feels threatened, it will retaliate. It will torture Buddhists and nuns, turn fire hoses on school children, and kill innocent civilians. A brief perusal of Amnesty International’s website will acquaint you with nonviolent protestors around the globe currently being detained and tortured or who have disappeared for simple actions like letter writing or peaceably demonstrating.
This is a reality that privileged people must come to terms with or else any movement risks a rupture when power comes down on actionists. Those retaliations are not anyone’s fault; they are to be expected. Any serious resistance movement should be intellectually and emotionally prepared for the power structure’s response. People are arrested, detained, and killed—often in large numbers—when power strikes back. Those who provide a challenge to power will be faced with consequences, some of them inhumanly cruel. The sooner everyone understands that, the better prepared we all will be to handle it.

Now, having discussed what makes good strategy, how resistance groups organize effectively, and what sort of culture resistance groups need to support them, it is time to take a deep breath. A real deep breath.
This culture is killing the planet. It systematically dispossesses sustainable indigenous cultures. Runaway global warming (and other toxic effects of this culture) could easily lead to billions of human deaths, and indeed the murder of the oceans, and even more, the effective destruction of this planet’s capacity to support life.
The question becomes: what is to be done?
by Deep Green Resistance News Service | Nov 23, 2018 | Strategy & Analysis
by Max Wilbert / Deep Green Resistance
We live inside an unprecedented surveillance state. Government and corporations monitor all non-encrypted digital communications for the purposes of political control and profit.
Political dissidents who wish to challenge capitalism need to learn to use more secure methods for communication, research, and other digital tasks. This guide is aimed at serious dissidents and revolutionaries. It is not aimed at the everyday activist, who will likely find these practices to be overkill.
Privacy vs. Security
It is important to understand that privacy and security are two different things. Privacy is related to anonymity. Security protects from eavesdropping, but does not necessarily anonymize.
To use an analogy: privacy means that the government doesn’t know who sent the message, but can read the contents. Security means they know who sent the message, but cannot read it. This is a simplified understanding, but it’s important to distinguish between the two.
In general, most aboveground activists who are already operating in the public sphere prioritize security. Underground operators and revolutionaries generally prioritize anonymity, since being unmasked and identified is the primary danger. Of course, this is a generalization. Both security and privacy are important for anyone involved in anti-capitalist resistance.
Note that these tools require some relatively advanced technological skills. However, it’s worth learning to use these tools. Whonix is probably the easiest to use for a beginner.
Operating Systems
An operating system, or OS, is the basic software running on a computing device. Windows and Mac OS are the most common operating systems. However, Linux is the most secure family of operating systems. This guide will look at operating systems for desktop computer use.
The following information is copied from the websites for these projects.
TAILS
Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.
It is a complete operating system designed to be used from a USB stick or a DVD independently of the computer’s original operating system. It is Free Software and based on Debian GNU/Linux.
Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.
Tails relies on the Tor anonymity network to protect your privacy online:
- all software is configured to connect to the Internet through Tor
- if an application tries to connect to the Internet directly, the connection is automatically blocked for security.
Tor is an open and distributed network that helps defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
Tor protects you by bouncing your communications around a network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.
Using Tor you can:
- be anonymous online by hiding your location,
- connect to services that would be censored otherwise;
- resist attacks that block the usage of Tor using circumvention tools such as bridges.
To learn more about Tor, see the official Tor website, particularly the following pages:
- Tor overview: Why we need Tor
- Tor overview: How does Tor work
- Who uses Tor?
- Understanding and Using Tor — An Introduction for the Layman
Using Tails on a computer doesn’t alter or depend on the operating system installed on it. So you can use it in the same way on your computer, a friend’s computer, or one at your local library. After shutting down Tails, the computer will start again with its usual operating system.
Tails is configured with special care to not use the computer’s hard-disks, even if there is some swap space on them. The only storage space used by Tails is in RAM, which is automatically erased when the computer shuts down. So you won’t leave any trace on the computer either of the Tails system itself or what you used it for. That’s why we call Tails “amnesic”.
This allows you to work with sensitive documents on any computer and protects you from data recovery after shutdown. Of course, you can still explicitly save specific documents to another USB stick or external hard-disk and take them away for future use.
https://tails.boum.org/
Whonix
Whonix is a desktop operating system designed for advanced security and privacy. Whonix mitigates the threat of common attack vectors while maintaining usability. Online anonymity is realized via fail-safe, automatic, and desktop-wide use of the Tor network. A heavily reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP address leaks. Commonly used applications are pre-installed and safely pre-configured for immediate use. The user is not jeopardized by installing additional applications or personalizing the desktop. Whonix is under active development and is the only operating system designed to be run inside a VM and paired with Tor.
Whonix utilizes Tor’s free software, which provides an open and distributed relay network to defend against network surveillance. Connections through Tor are enforced. DNS leaks are impossible, and even malware with root privileges cannot discover the user’s real IP address. Whonix is available for all major operating systems. Most commonly used applications are compatible with the Whonix design.
https://www.whonix.org/
Qubes OS
Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit it.
Why is OS security important?
Most people use an operating system like Windows or OS X on their desktop and laptop computers. These OSes are popular because they tend to be easy to use and usually come pre-installed on the computers people buy. However, they present problems when it comes to security. For example, you might open an innocent-looking email attachment or website, not realizing that you’re actually allowing malware (malicious software) to run on your computer. Depending on what kind of malware it is, it might do anything from showing you unwanted advertisements to logging your keystrokes to taking over your entire computer. This could jeopardize all the information stored on or accessed by this computer, such as health records, confidential communications, or thoughts written in a private journal. Malware can also interfere with the activities you perform with your computer. For example, if you use your computer to conduct financial transactions, the malware might allow its creator to make fraudulent transactions in your name.
Aren’t antivirus programs and firewalls enough?
Unfortunately, conventional security approaches like antivirus programs and (software and/or hardware) firewalls are no longer enough to keep out sophisticated attackers. For example, nowadays it’s common for malware creators to check to see if their malware is recognized by any signature-based antivirus programs. If it’s recognized, they scramble their code until it’s no longer recognizable by the antivirus programs, then send it out. The best of these programs will subsequently get updated once the antivirus programmers discover the new threat, but this usually occurs at least a few days after the new attacks start to appear in the wild. By then, it’s too late for those who have already been compromised. More advanced antivirus software may perform better in this regard, but it’s still limited to a detection-based approach. New zero-day vulnerabilities are constantly being discovered in the common software we all use, such as our web browsers, and no antivirus program or firewall can prevent all of these vulnerabilities from being exploited.
How does Qubes OS provide security?
Qubes takes an approach called security by compartmentalization, which allows you to compartmentalize the various parts of your digital life into securely isolated compartments called qubes.
This approach allows you to keep the different things you do on your computer securely separated from each other in isolated qubes so that one qube getting compromised won’t affect the others. For example, you might have one qube for visiting untrusted websites and a different qube for doing online banking. This way, if your untrusted browsing qube gets compromised by a malware-laden website, your online banking activities won’t be at risk. Similarly, if you’re concerned about malicious email attachments, Qubes can make it so that every attachment gets opened in its own single-use disposable qube. In this way, Qubes allows you to do everything on the same physical computer without having to worry about a single successful cyberattack taking down your entire digital life in one fell swoop.
Moreover, all of these isolated qubes are integrated into a single, usable system. Programs are isolated in their own separate qubes, but all windows are displayed in a single, unified desktop environment with unforgeable colored window borders so that you can easily identify windows from different security levels. Common attack vectors like network cards and USB controllers are isolated in their own hardware qubes while their functionality is preserved through secure networking, firewalls, and USB device management. Integrated file and clipboard copy and paste operations make it easy to work across various qubes without compromising security. The innovative Template system separates software installation from software use, allowing qubes to share a root filesystem without sacrificing security (and saving disk space, to boot). Qubes even allows you to sanitize PDFs and images in a few clicks. Users concerned about privacy will appreciate the integration of Whonix with Qubes, which makes it easy to use Tor securely, while those concerned about physical hardware attacks will benefit from Anti Evil Maid.
How does Qubes OS compare to using a “live CD” OS?
Booting your computer from a live CD (or DVD) when you need to perform sensitive activities can certainly be more secure than simply using your main OS, but this method still preserves many of the risks of conventional OSes. For example, popular live OSes (such as Tails and other Linux distributions) are still monolithic in the sense that all software is still running in the same OS. This means, once again, that if your session is compromised, then all the data and activities performed within that same session are also potentially compromised.
How does Qubes OS compare to running VMs in a conventional OS?
Not all virtual machine software is equal when it comes to security. You may have used or heard of VMs in relation to software like VirtualBox or VMware Workstation. These are known as “Type 2” or “hosted” hypervisors. (The hypervisor is the software, firmware, or hardware that creates and runs virtual machines.) These programs are popular because they’re designed primarily to be easy to use and run under popular OSes like Windows (which is called the host OS, since it “hosts” the VMs). However, the fact that Type 2 hypervisors run under the host OS means that they’re really only as secure as the host OS itself. If the host OS is ever compromised, then any VMs it hosts are also effectively compromised.
By contrast, Qubes uses a “Type 1” or “bare metal” hypervisor called Xen. Instead of running inside an OS, Type 1 hypervisors run directly on the “bare metal” of the hardware. This means that an attacker must be capable of subverting the hypervisor itself in order to compromise the entire system, which is vastly more difficult.
Qubes makes it so that multiple VMs running under a Type 1 hypervisor can be securely used as an integrated OS. For example, it puts all of your application windows on the same desktop with special colored borders indicating the trust levels of their respective VMs. It also allows for things like secure copy/paste operations between VMs, securely copying and transferring files between VMs, and secure networking between VMs and the Internet.
How does Qubes OS compare to using a separate physical machine?
Using a separate physical computer for sensitive activities can certainly be more secure than using one computer with a conventional OS for everything, but there are still risks to consider. Briefly, here are some of the main pros and cons of this approach relative to Qubes:
Pros
- Physical separation doesn’t rely on a hypervisor. (It’s very unlikely that an attacker will break out of Qubes’ hypervisor, but if one were to manage to do so, one could potentially gain control over the entire system.)
- Physical separation can be a natural complement to physical security. (For example, you might find it natural to lock your secure laptop in a safe when you take your unsecure laptop out with you.)
Cons
- Physical separation can be cumbersome and expensive, since we may have to obtain and set up a separate physical machine for each security level we need.
- There’s generally no secure way to transfer data between physically separate computers running conventional OSes. (Qubes has a secure inter-VM file transfer system to handle this.)
- Physically separate computers running conventional OSes are still independently vulnerable to most conventional attacks due to their monolithic nature.
- Malware which can bridge air gaps has existed for several years now and is becoming increasingly common.
(For more on this topic, please see the paper Software compartmentalization vs. physical separation.)
Get Qubes
Qubes OS is free to use, can run , and integrates with Whonix for secure web browsing and internet usage via Tor.
https://www.qubes-os.org/
Summary
- TAILS is a “live” OS that runs from a USB stick or DVD, and can be used to browse anonymously from any computer. It doesn’t save files or history; it is designed mainly for ephemeral use.
- Whonix is an OS made to run as a virtual machine, and provide security and anonymity for web browsing by routing all connections via the Tor browser.
- Qubes OS is made to use as a permanent OS, and uses compartmentalization for security. Whonix is automatically installed inside Qubes. Used by Edward Snowden.
Image: Chris, https://www.flickr.com/photos/44730926@N07/32681532676, CC BY 2.0