Green Flame: Nuclear Waste: A Million Years of Cancer

Green Flame: Nuclear Waste: A Million Years of Cancer

This episode of the Green Flame podcast is a discussion based on the film “Ocean Poubelles.” We talk about nuclear waste, the nuclear waste industry, nuclear waste dumping, and the production of nuclear weapons, nuclear power, and nuclear medicine that results in this highly dangerous and long-lasting radioactive material.

Nuclear waste is a massive issue. It’s actually a much more serious danger in the nuclear industry than a meltdown or some Chernobyl type incident. Nuclear waste is something that is ubiquitous in the nuclear industry and nobody really knows what to do with it. There’s no safe way to store it. There’s nothing that can be done to safely “dispose” of materials that will be deadly for tens of thousands, hundreds of thousands, millions of years into the future. Our discussion this week is on this topic of nuclear waste, which in many ways is a fascinating insight into industrial civilization, how it functions, the mindset of the technocrats that run the largest corporations in the world, the militaries and so on.

Subscribe to The Green Flame Podcast

About The Green Flame

The Green Flame is a Deep Green Resistance podcast offering revolutionary analysis, skill sharing, and inspiration for the movement to save the planet by any means necessary. Our hosts are Max Wilbert and Jennifer Murnan.

Power Requires Structure, Structure Requires Discipline

Power Requires Structure, Structure Requires Discipline

By Vince Emanuele / Counterpunch

“Kind-hearted people might of course think there was some ingenious way to disarm or defeat an enemy without too much bloodshed and might imagine this is the true goal of the art of war. Pleasant as it sounds, it is a fallacy that must be exposed; war is such a dangerous business that the mistakes which come from kindness are the very worst.”

Carl von Clausewitz

“In practice, we always base our preparations against an enemy on the assumption that his plans are good; indeed, it is right to rest our hopes not on a belief in his blunders, but on the soundness of our provisions. Nor ought we to believe that there is much difference between man and man, but to think that the superiority lies with him who is reared in the severest school.”

Thucydides

Ordinary Americans will never win the reforms we need to survive until or unless hundreds of thousands of poor and working-class people across the United States participate in the political process.

It’s really that simple.

The existing left does not have the numbers or resources, hence power, to win meaningful reforms.

The primary impediment to political organizing efforts is the lack of left-wing political institutions and structures. Unions must be rebuilt. Political institutions, perhaps in the form of new parties or structures somewhat similar to the DSA, must be developed. Community organizations, churches, tenants’ unions, and cultural projects will also play vital roles. In short, we need it all, and we need it now.

One of the obstructions to building structures and institutions is the unhealthy and unproductive cultural habits of poor and working-class people, including those already involved with political efforts. Here, I’m not so much talking about our eating habits or lack of exercise, though both are worthy of debate and discussion — I’m specifically thinking about the inordinate amount of time American adults spend on immature cultural activities that hinder organizing efforts: binge drinking, drug abuse, video games, Netflix, cosplay, etc. In my experience, Americans, particularly progressives, can muster any number of excuses to avoid cultural and political engagement.

To paraphrase the late-great comedian, Bill Hicks, the right is up at 4:00am, ready to fuck the world, whereas my left-wing friends wake up at noon, hungover and depressed.

We face a tremendous contradiction: on the one hand, serious, long-lasting, strategic, and powerful political structures must be developed in order to successfully channel the righteous anger and frustration felt by so many poor and working-class Americans, but in order to build those structures, we need poor and working-class Americans prepared to take the helm.

Here, things get tricky. While it’s true that we can find plenty of examples of successful single-issue or union campaigns — it’s also true that such efforts are limited in scope and do not represent bigger trends in American society.

This is the case for many reasons.

First, existing activists and organizers do not adhere to a strict set of methods and skills that are absolutely required to build long-lasting structures. Second, existing activists and organizers (not all, but many) treat their efforts like a hobby or job. Politics is neither.

Politics is war. And we’re fighting for our lives. Over 320,000+ Americans have died of COVID-19. Tens of millions of people have been catapulted into poverty, with millions facing eviction on January 1st, 2021. Nurses, warehouse workers, teachers, retail, grocery store, and service-sector workers of all stripes have been used, abused, killed, and discarded by a ruthless economic system and a federal government beholden to it.

The time for uplifting stories about resistance is long gone.

We’re not here to speak truth to power— we’re organizing to survive, and survival requires winning. What do I mean by winning? In the short-term, winning would look like Medicare For All, free childcare, increasing Social Security payments, expanding public housing, abolishing student debt, substantially increasing funds to public schools, and enacting some form of UBI, basically Bernie’s program, but with minor additions.

But Vince, why not go bigger? Because it doesn’t matter how badly we want or wish or scream for certain policies: the U.S. left lacks the basic institutions necessary to shift the balance of power away from elites and to ordinary people, hence we’re in no position to demand more. If we want more, we have to organize a base capable of demanding more. That requires a lot of hard work (social media posts, YouTube channels, and pithy essays won’t cut it).

We face unprecedented challenges:

climate change, increasing risk of global pandemics, nuclear proliferation, a fully globalized and technologically integrated financial system/economy, and an increasingly fragmented social and cultural landscape, with each trend fueling right-wing movements across the planet. That’s the context in which we’re living, fighting, organizing, and dying.

Do I want more than Bernie’s reforms? Fuck yes. I’m with Jim Morrison: “We want the world, and we want it now!” But wanting and actually doing are two different things.  Achieving the goals I laid out above would significantly improve the lives of poor and working-class people. For many, such reforms would mean the difference between life or death.

If, of course, an opportunity to push a more radical agenda presents itself, existing activists and organizers should jump on it, but they should do so with a vision and strategy.

Indeed, the uprisings following the murder of George Floyd represent the limitations of what a non-organized left can achieve. Yes, millions can turn out for protests, but without organizations and institutions to keep them engaged, little is accomplished in terms of meaningful reforms or long-lasting institution-building.

All that said, in order to build successful institutions, especially long-lasting structures capable of taking on and defeating the most murderous and powerful government and corporate sector in the world, the U.S. left will need heavy doses of discipline, accountability, commitment, and seriousness, which requires challenging people.

Right now, I have friends, neighbors, and former coworkers in their mid-50s, unemployed, sitting at home playing video games all day. I have friends in their 30s, trade union members, who spend their weekends cosplaying. They’re not alone. Americans spend a disproportionate amount of their time distracted from the political world. Can you imagine our grandparents playing dress-up while fascism marched through Europe?

To be clear, I’m not prescribing misery — what I’m saying is that people in this country need to grow the fuck up.

Remember, everything is on the line. Yes, I also enjoy sports, parties, concerts, art, working out, my cat, going to the beach, visiting historical sites, family gatherings, and a whole host of shit that must, for the moment, take a backseat to political organizing efforts.

Creating institutions and cultural norms that facilitate solidarity, love, creativity, and fun should be the ultimate goals of our political efforts. In other words, let’s organize and fight back, then truly enjoy life. Yes, we can find enjoyment while fighting back, but I worry that too many Americans, particularly self-identified leftists, process politics as entertainment.  In fact, the absurd proliferation of left-wing podcasts and media outlets is perhaps the best measure of this ongoing and troubling trend. For every left political organization that’s created, at least one hundred left media outlets are born — another sign of the deeply immature, narcissistic, and unserious nature of left politics in the U.S.

Here, I’m not prescribing burn out, nor am I prescribing workaholism.

I’m not asking you to discipline yourself for a corporation, government agency, or ungrateful spouse, nor am I encouraging you to beat yourself up in order to live up to some unobtainable cultural or beauty standard — I’m encouraging you to get disciplined and fight back for yourself and your loved ones, and yes, even for the people you don’t personally know.

I’m arguing that you should take politics seriously, which first requires taking yourself seriously — your life, desires, values, family, and friends. That means waking up early. That means making daily plans. That means making weekly work schedules. That means sticking to them. The best political organizers I’ve met over the years are also, unsurprisingly, quite organized in their personal lives. We should cultivate more.

In the end, the left will never accomplish much without building structures and institutions, and building successful structures and institutions requires disciplined, accountable, and serious people. Everything self-proclaimed leftists do in terms of organizing or activism should take place with these things in mind.

We’re fighting a war, not hosting a dinner party.

Act accordingly.


Vincent Emanuele is a writer, antiwar veteran, and podcaster. He is the co-founder of PARC | Politics Art Roots Culture Media and the PARC Community-Cultural Center located in Michigan City, Indiana. Vincent is a member of Veterans For Peace and OURMC | Organized & United Residents of Michigan City. He is also a member of Collective 20. He can be reached at vincent.emanuele333@gmail.com

You can read the original article here. 

The Nuclear Question: Are We “Hostages to Modernity”?

The Nuclear Question: Are We “Hostages to Modernity”?

Deep Green Resistance advocates for ending industrialization and moving to a localized, low-energy society. What about nuclear reactors?

If the DGR vision were carried out and the electrical grid dismantled, wouldn’t it lead to nuclear meltdowns?

By Max Wilbert


These are very important questions. They deserve a detailed response.

We must begin with this: no one has a plan to deal with nuclear issues, because there are no solutions. This is the insanity of the nuclear industry: to willfully unearth and concentrate radioactive material in a way that increases its deadliness by millions of times. Nuclear waste will remain toxic for billions of years.

How do we react to this? Where do we go from here? It’s essential to debate this issue. Let’s begin by examining the three main parts of the nuclear industry: nuclear weapons, nuclear power plants and reactors, and nuclear waste.

Nuclear Weapons

Nuclear weapons are quite stable, and will not—as far as we know—explode on their own.

Alan Weisman writes, “The fissionable material inside a basic uranium bomb is separated into chunks that, to achieve the critical mass necessary for detonation, must be slammed together with a speed and precision that don’t occur in nature.”

The biggest danger of nuclear weapons is that they will be used in warfare. The threat is very real. And this risk will continue as long as nuclear arsenals are maintained in working order. And they are not just being maintained. They’re being expanded.

Even if nuclear weapons are never again used, they will corrode over time, releasing radiation from the weapons-grade uranium and plutonium inside them. This radiation will seep into groundwater and soil.

While high-energy industrial societies continue, the threat of nuclear war will only grow more serious. We support all efforts to reduce the risk of nuclear war through de-armament, dismantling of the industry, regulation and control measures, etc.

Nuclear Power Plants and Reactors

There are more than 440 nuclear reactors around the world, and each is a disaster waiting to happen.

Nuclear reactors are most dangerous in two situations: first, as at Fukushima, when direct physical damage to the plant disables back-up generators and other safety equipment. And second, as at Chernobyl, when design flaws combine with user error to create a catastrophic failure.

Charles Perrow called these types of situations “system accidents.” A system accident is when multiple failures in a complex system interact with each other in unforeseen ways, creating a larger unexpected problem. His conclusion was that nuclear technology should be abandoned completely.

Reactors are designed to cope with simple black-outs, so failure of the electrical grid is one of the least dangerous of possible disruptions to a nuclear plant. It is unlikely that a single dramatic blackout will collapse the industrial economy and cause widespread nuclear catastrophe.

However, lasting power disruptions to nuclear facilities can lead to meltdowns. This will happen no matter what. Increasing extreme weather events, economic instability, refugee crises and war will lead to blackouts and brownouts. Societies must prepare for this by safely dismantling nuclear power plants as quickly as possible.

It is possible that in the future, an increasing number of medium-scale power disruptions will encourage the decommission of nuclear power plants, or at least force closer attention to safety precautions. For example, several countries have started to shut down or put on hold their nuclear programs since the Fukushima disaster in Japan.

We support the expansion of these efforts. The nuclear power industry must be shut down. Engineers, politicians, and civil society have a responsibility to shut down the nuclear industry and dismantle it as “safely” as possible. The problem is, there is no safe when you are dealing with materials that will kill for billions of years.

And not only is the nuclear industry not shutting down—it is expanding. According to the World Nuclear Association, there are 55 nuclear power plants currently under construction.

Nuclear Waste

The most serious problem related to the nuclear industry isn’t reactors, but the radioactive waste they create. In the United States alone, there is at least 500,000 tons of Uranium-235—depleted uranium leftover from nuclear reactors. This material has a radioactive half-life of 4.5 billion years.

Depleted reactor fuel is (oddly enough) is more than a million times as radioactive as when it was raw ore. And the amount of it is growing steadily. Globally, around 13,000 tons of depleted fuel accumulates every year.

Ironically, depleted Uranium is often used in warfare, since it makes effective armor-piercing ammunition. In some locations, notably Falluja, U.S. military depleted uranium ammunition has led to explosions in birth defects and cancer.

Stored radioactive waste was the major issue with the Fukushima meltdown in 2011—not the power plant itself. Stored radioactive waste was the largest concern during the fires near the Los Alamos nuclear waste storage area in both 2000 and 2011, and after the near-flooding of a nuclear reactor in Mississippi in 2011. The reactor at any given nuclear plant contains only a small amount of active fuel compared to the spent fuel held within temporary storage facilities.

There is no good way to store this waste. No matter how it is contained—baked into glass sheets, poured into 55-gallon drums, encased in giant steel flasks and entombed in concrete, buried under mountains—it is still a threat to future life. Metal corrodes. Glass breaks. Earthquakes upend mountains. And 500 million years from now, this material will still kill any living creature that approaches it.

Are We “Hostages to Modernity”?

In a recent public panel, a public intellectual used the phrase “hostages to modernity” to describe how we are ‘locked in’ to a high-energy, industrial way of life because we must steward the nuclear industry. Is this true? Are we hostages to modernity?

In a sense, we are. The technical knowledge and engineering capacity to deal with nuclear issues as safely as possible is the sole domain of industrial society.

And yet this is an oversimplification of a complex situation. As we have seen, industrial societies are creating more nuclear power, more weapons, and more toxic waste far faster than any dismantling or cleanup is proceeding. And any “cleanup” that is being done is necessarily partial. Chernobyl is still toxic, as is Rocky Flats, Los Alamos, and Fukushima. There is no way to clean up these problems—only to mitigate some of the dangers.

So What Is To Be Done?

We believe the most responsible approach combines accelerated dismantling and cleanup of the nuclear industry using modern tools with a rapid dismantling of industrialism itself.

The ruling class is building more nuclear power and pushing us ever deeper into a full-on ecological apocalypse. Species extinctions. Extreme weather. Ocean acidification. Dead zones. Overfishing. Desertification. We are in a situation of converging crises.

In these dangerous times, nuclear meltdowns are just one of the catastrophes we face. And regardless of the scale of their horror, we have seen that life can survive nuclear catastrophe. The current “exclusion” zone around Fukushima encompasses about 600 square kilometres of land. This temporary boundary will probably — like Chernobyl—ironically end up ecologically richer over the coming decades.  Chernobyl was a horrible disaster. Yet it has had a positive ecological outcome: industrial human activity has been kept out of the area and wildlife is flourishing. There are now packs of wolves, endangered horses, wild boar and roe deer running wild in Chernobyl. It’s one of the most important wild bird areas in all of Europe. Hanford is the same. The nuclear waste at Hanford keeps one stretch of the Columbia River more wild than anywhere else, and it is this stretch that is the most important section of the river for wild fish.

This is not to say that the radiation doesn’t harm wildlife. It’s estimated that there is 50% less biodiversity in the most radioactive areas around Chernobyl.

Nonetheless, it is clear that the day-to-day workings of industrial civilization are more destructive to life on this planet than a nuclear catastrophe. It would be hard to do worse than Chernobyl.

More nuclear disasters will almost inevitably occur in the coming decades, whether or not the electrical grid is dismantled. Hazardous radioactive waste will accumulate as long as industrial civilization continues, and there are no safe long-term storage facilities anywhere in the world. So nuclear reactors will become more and more dangerous as larger and larger stockpiles of spent fuel are kept on-site.

Future nuclear disasters from shoddily-maintained plants will be very bad, but business as usual is far more destructive. And while nuclear radiation diminishes over time, unless something decisive is done, greenhouse gases levels will increase faster and faster as they pass tipping points.

There is no easy answer here. There is no simple solution. There is only the urgency that comes from confronting a stark reality. The nuclear industry must be dismantled—just like the fossil fuel industry, the mining industry, the industrial logging and fishing industries, the industrial agriculture industry. It must be shut down.

Further Reading and Videos

Nuclear weapons, power and waste create an immense amount of risk to the entire natural world (including humans). A number of civilian and military nuclear accidents have happened. These lists are incomplete, only include accidents, and do not account for the planned and deliberate harm caused by the mining, production, storage, waste disposal, or use of radioactive materials at weapons.

On top of that, mining for uranium itself is destructive to the land as well as the lives that depend on the land. Here’s an article about Uranium Mining On Navajo Indian Land.

Watch the following videos related to the topic.

Photo by Boudewijn Huysmans on Unsplash

The Empowering Internet Safety Guide for Women

The Empowering Internet Safety Guide for Women

     by Sara Levavi-Eilat / vpnMentor

Have you ever been harassed in the street? Received a crass message on a dating app? Had a coworker make a comment about your appearance that just didn’t sit right?

You’re not alone.

With the #MeToo movement, it’s easy to log onto Twitter or Facebook and see just how many women are victims of sexual harassment. Whether in person or online, women everywhere have experienced it in one way or another. And with all the new ways the internet has opened avenues of communication, online harassment is more prevalent than ever.

According to a study by the Pew Research Center, most online abuse takes place on social media. Although men are also subject to online harassment – which includes name calling, derision, and physical threats – the study found that online, women are more than twice as likely as men to experience sexual harassment.

In addition, more than half of women ages 18-29 report having been sent sexually explicit images without their consent.

This number is only growing, and while 70% of women believe online harassment to be a major problem, not many know how to prevent it.

Women are often targeted simply because they are women. Attacks are often sexualized or misogynistic, and rhetoric tends to focus on their bodies and sexual violence. This is both physically and emotionally damaging, and women are often intimidated into silence, preferring to disengage rather than put themselves at risk.

However, there are ways we can protect ourselves.

This guide was written with the intention of empowering women to navigate the internet without fear. We discuss common occurrences in which women are subject to harassment in their daily lives – on social media, at work, while dating, and more – and give tips and advice on how women can take control.

It is important for us to note that some of the advice given here encourages anonymity, rather than risking being targeted. While this may seem to run counter to the idea of encouraging self-expression, we believe that every woman should be empowered to make that choice for herself.

Our job is to give you the tools you need to do that.

We hope this guide encourages women everywhere to defend and protect themselves, and to stand up to sexual harassment, both on and off the web.

Harassment on Social Media

The majority of online harassment takes place on social media, which makes sense given how much time most of us spend on these platforms. Broad social networks, often combined with anonymity, leads to a reality in which anything you post, tweet, or share opens you up to potential abuse.

Below, we delve into the most popular social media platforms, and show you how to protect yourself from creeps, trolls, and stalkers.

Twitter

Due to its public nature, Twitter is one of the most notorious social media platforms when it comes to online harassment. And it’s not just celebrities and public figures who get abuse heaped on them. There are endless stories of regular people who have been attacked, often for simply speaking out about political or feminist issues.

In fact, Amnesty International released a report chastising Twitter for not appropriately addressing harassment of women. In the study, dozens of women are quoted about the abuse they experienced on Twitter, many citing unsatisfactory responses from the social media site after having reported the incidents.

Often, the result is a silencing effect, in which women simply choose not to engage for fear of being harassed; many women end up censoring themselves or leaving the platform altogether.  And for some – particularly journalists and activists – this can be detrimental to their careers.

Things came to a head in October 2017 when a series of high profile sexual assault allegations spawned the viral hashtag #MeToo. The hashtag – used by women to identify themselves as having experienced sexual harassment or assault – took over Twitter in a matter of hours, and made crystal clear just how prevalent these incidents are.

Soon thereafter, actress Rose McGowen’s Twitter account was temporarily suspended after she tweeted a series of allegations against sexual predator Harvey Weinstein and several Hollywood bigwigs she claimed enabled him. The violation cited was that one of her tweets included a private phone number.

But with so many abusive tweets against women not resulting in suspended accounts,  many women had had enough. The resulting anger spawned the hashtag #WomenBoycottTwitter, which called on women to boycott the platform for a day in solidarity.

Twitter claims to have improved their system of addressing reports of harassment, but it’s still an issue, and there are still steps individual women can take to mitigate the chance of being targeted.

5 Ways to Protect Yourself on Twitter

1. Use Multiple Profiles

Women whose careers depend on keeping up a public profile may find it helpful to use multiple accounts.

Unlike some other social media platforms, according to Twitter’s terms of service, it’s perfectly acceptable to do this. In fact, businesses often do in order to target different audiences.

You’ll want to create a personal profile and a public one.

Your personal profile should have the strongest privacy settings. Since Twitter’s default setting is public, you’ll have to opt in to this.

Ordinarily, when your tweets are public, anyone can see them – even people who don’t have Twitter can potentially find them. But when your tweets are “protected,” only your approved followers can see them, and no one will be able to retweet them. Make sure that the only people you let follow you are people that you know and trust.

How to Change Your Privacy Settings on Twitter:

Click on your profile and go into Settings and privacy>Privacy and safety>Protect your Tweets.

Making this change retroactively protects your older tweets too. That said, it’s important to note that since Twitter has no control over outside search engines, older tweets may still be visible on the wider internet. So if you want true anonymity, you should open a new personal profile and protect your tweets from the get-go.

It’s also important to note that your replies to other tweets and mentions will also be protected, and will therefore only be seen by your approved followers. This obviously makes it a lot harder to engage in the type of public discussions for which Twitter is famous, so you’ll have to decide if having a private profile is worth it to you.

To create an additional account, click on your profile icon. Then click on the upside down caret next to your name. There you should be given the option to create a new account.

This second profile will be your public one. If you use Twitter for your job, this is going to be the one that represents you professionally, so make sure not to Tweet about anything too personal.

Another option is to simply keep this profile anonymous. That means not using your real name or photos of you, or tweeting anything that could be used to figure out where you live or work.

Note that you can’t keep both accounts open on the same browser at the same time. If you want to have them both open, either use different browsers, or use the Twitter-supported app, TweetDeck.

2. Report and Block Abusers

If you do receive an abusive tweet, you can block the person who sent it.

How to Block Someone on Twitter:

Click on the upside down carrot on the upper right hand corner of the tweet, and choose to block the user.

One of the problems with blocking is that it’s really easy for users to create new accounts – often termed “sock puppets” – that haven’t yet been flagged.

One way to deal with this is with the app Block Together. Block Together will automatically block any account that tries to follow you that’s been active for under 7 days, that has under 15 followers, or that your followers have blocked. It’s most helpful when you’re being attacked by an army of trolls.

In addition to blocking users, you can also report abusive incidents to Twitter.

How to Report Someone on Twitter:

Just click the upside down caret in the upper right corner of the tweet or account, select report, and follow the instructions.

Unfortunately, even though harassment is against Twitter’s user agreement, Twitter is infamous for not doing as much as it could to curb ugly behavior.

In fact, according to an  analysis from the nonprofit, Women Action and the Media (WAM!), 67% of women who reported abuse claimed to have notified Twitter at least once before.

Still, it’s definitely worth reporting abusive tweets and accounts, since doing so is really easy.

Twitter does not currently provide a way of checking the status of reports of abuse. That said, as of January 2018, Twitter notifies you of their assessment once the report has been processed.

3. Don’t Geotag

Geotagging is when your post includes the location from which it was sent. To keep yourself safe from doxing and stalking, it’s best not to use this function. Fortunately, geotagging requires you to opt in, so by default your location won’t be shown.

When you compose a tweet, you’ll see a location button at the bottom. (It looks like a dropped pin.) If you tap it, you’ll have the option of adding your location to your tweet.

Don’t do it.

Also, be aware that you could give away your location even without geotagging, simply by mentioning where you are. We know it’s fun to let people know in the moment that you’re enjoying a new gallery opening or a night on the town, but sometimes it’s better to wait and post about it later, when you’re not there anymore and can tweet about how much fun you HAD (past tense).

4. Prevent Doxing

The most extreme form of online harassment is doxing. Doxing is when someone’s personal information, such as their address, phone number, place of employment, banking details, and even information on their family members, is published online as a call for others to harass them.

You may have heard the term for the first time with reports of #gamergate back in 2014. Gamergate was a movement spawned by the angry ex of video game developer Zoe Quinn, who wrote a blog post accusing her of having slept with a journalist in exchange for a good review.

Despite the fact that no such review was ever written, the post was taken as a battle cry by an unruly mob of mostly white, male gamers, who saw not only their favorite pastime, but free speech and their very masculinity, as under attack by so-called social justice warriors.

The result?

Not only Quinn, but women who defended her, including game developer Brianna Wu and journalist Anita Sarkeesian, came under relentless attack by internet trolls who inundated them with a daily barrage of murder and rape threats, mainly via Twitter.

They were also doxed.

The effects throughout the gaming industry were chilling, and women continue to take extra precautions for fear that they will become targets.

For instance, Tessa,* a competitive intelligence analyst whose work requires her to interact with gamers, knows several women in the industry who have been stalked and harassed, and often faces flirtatious and disrespectful behavior herself. Because a lot of interactions take place on Skype, there’s no hiding the fact that she’s a woman. Still, she takes pains to conceal that she works directly for a gaming company, and doesn’t reveal any personal information about herself like her real name or location.

Of course, those in the gaming industry aren’t the only ones at risk for doxing. Today’s incendiary political climate has resulted in many losing their jobs and having to leave their homes after having been doxed for attending alt-right or antifa rallies.

But you don’t have to engage in controversial political activities to be doxed. Some have been doxed “accidentally.”

For instance, following the Boston Marathon bombing, a Brown University student was doxed when he was wrongly identified as the perpetrator, and following the Charlottesville Unite the Right rally, an Arkansas University engineer was doxed when he was mistakenly identified as a participant.

4 Ways to Keep from Getting Doxed

  1. Google yourself. A simple search will show you what kind of information about you is already online. If that includes data that can be used to identify you, see if you can have it taken down. Social media profiles have privacy settings that can easily be reset, and many websites, such as the White Pages, give you the option of opting out. Unfortunately, it may not be possible to scrub all your information from the internet, but at least searching will let you know what’s out there for others to find.
  2. Subscribe to a service that will delete you from data broker sites: If you find your information on a website like White Pages, chances are it also appears in other online directories, many of which won’t be easy to find. So if you have reason to believe you may targeted for doxing, consider paying for a service such as PrivacyDuck or DeleteMe.
  3. Check that your email account hasn’t been involved in a data breach:You can use the tool https://haveibeenpwned.com/ to see if your email address and password may have been exposed in one of the many large-scale data breaches that have occurred in the past few years. If they have, reset your password, and consider adding two-step verification to your account. This will provide an extra layer of security by requiring additional information (besides your password) in order to log in.
  4. Use a VPN: By using a virtual private network, you can encrypt all your online activity in order to protect yourself from hackers. VPNs work by tunneling your internet data through a third party server, keeping your IP address (and real location) from being exposed. Here are some VPNs we recommend.

5. Prevent Hackers from Taking Over Your Twitter Account
From former President Obama to Britney Spears, over the years plenty of celebrities have had their Twitter accounts hacked by people who want to harm their reputations and cause chaos. That said, regular people also have their accounts hacked with alarming frequency.

4 Ways to Keep Your Twitter Account from Being Hacked

  1. Create a strong password: This sounds obvious, but you’d be surprised how many people use weak, easily discoverable passwords. (Or maybe you won’t be.) To make a strong password, make sure it’s long, has capital and lowercase letters, and includes numbers and symbols.
  2. Enable login verification: This provides an extra layer of security when you’re logging in. Instead of just having to enter your password, you’ll also have to enter a code that Twitter sends to your mobile device. To enable this, click on your profile icon>Account>Security>Login verification. On the same tab you can also choose to require personal information when changing your password.
  3. Be wary of any third party app that requires access to your account: If you have any doubt as to whether an app is legit or not, don’t install it. In order to see which apps do have access to your Twitter account, click on your profile icon and go to Apps. To remove an app, click Revoke access.
  4. Watch out for shortened URLs: Given Twitter’s 280 character limit, it makes sense that lots of people use shortened URLs to link off the platform. The problem is, these make it hard to know where links are taking you, or if it’s to a malicious site. So if you want to be really cautious, don’t click on links you see posted on other people’s tweets.

A good indication that someone has been tampering with your account is if you notice unfamiliar activity, like following someone new or sending out tweets you don’t remember. If you do see this, the first thing you’re going to want to do is change your password. You should also report it to Twitter. You can do this by going to their help center and submitting a ticket.

You also want to submit a ticket if someone hasn’t actually hacked into your account, but has created a brand new one under your name. To help Twitter know that you’re really you, you’ll have the option of uploading an image of a government issued ID or other form of identification.

Facebook

Rachel didn’t think much of it when during a routine Facebook scroll she clicked that she was interested in attending a concert by one of her favorite bands. But she was excited when one of the members of the band friend requested her and started sending her private messages.

The conversation started out casual, but soon he began alluding to her profile picture, telling her that he liked that she didn’t care that her nipple was showing.

Wait, what?

Her nipple was definitely not showing. Or was it? Rachel had been using that profile picture for two years already, and no one had ever said anything. She enlarged the photo and carefully examined it. Maybe what he saw was the shadow from her top?

She told him he was mistaken, and tried to explain the shadow, giving him the benefit of a doubt that he was just confused. But he was insistent, and was soon asking for more nude pics.

In retrospect, Rachel knew she should have stopped the conversation there and blocked him, but at the time it seemed like just a weird misunderstanding. It was kind of a provocative photo, wasn’t it? Maybe she should have expected this kind of a reaction.

She tried to steer the conversation back toward his music and the upcoming concert, but he was like a dog with a bone, and wouldn’t let up on his requests for more photos. Finally she just stopped answering, but she felt pretty icky for a few days after, wondering how others had been viewing her all this time.

Rachel’s story isn’t so shocking. It’s not violent. No one got raped. It actually sounds like a pretty run-of-the-mill social media encounter. But in fact, it’s the banality of it that makes it so depressing. Every day women get solicited by strangers and end up wondering what they did to cause it, and have to walk around knowing that while they’re just trying to live their lives, others are objectifying them.

Research shows that the emotional toll these type of interactions take is especially severe for women, who are twice as likely as men to describe their most recent experience of online harassment as very or extremely upsetting.

And soliciting sexy photos is just one of the myriad forms Facebook harassment can take. Women are regularly sent abusive messages and unwanted dick pics, and instances of being tagged in degrading pictures or even having fake profiles created using their names and photos are far from uncommon.

5 Ways to Protect Yourself on Facebook 

1. Control Exactly Who Sees What

In past years Facebook has done a lot to update the platform to allow you to customize these options, even going as far as letting you hide your info from specific people.

How to Control What People See on Your Facebook Profile:

On your computer, click the upside down caret on the upper right corner of the page and select settings. On the panel on the left click Privacy. From here you’ll be able to manage exactly who can see your posts and how people can contact you.

Next, go to Timeline and Tagging. This lets you control who gets to post on your wall and who gets to see posts you’re tagged in. Here you can also change your settings so you get to review and approve any tags before they get implemented.

Another cool tool you can use is the one that lets you see exactly what others see when they look at your profile. That way you can be sure that certain people won’t see sensitive information if you don’t want them to.

2. Don’t Let Potential Stalkers Know Where You Are

As has been discussed above, tagging your location on posts and photos can be a way for stalkers to find out where you are. On Facebook, when you write a post, you have the option to select Check in, which will add your geolocation for any of your friends to see. It’s best not to use this function.

But Geotagging isn’t the only way people can figure out where you are.

Ever notice how after going to a particular store you suddenly start seeing ads for it on Facebook? Or you meet someone at a party and the next day Facebook suggests them as a friend?

The way Facebook knows to do that is because if you have their mobile app, and you carry your phone around with you (as most of us do) they know your location wherever you go.

If you want, you can actually see exactly where Facebook has been tracking you. This information is not public, so you don’t have to worry about your average Facebook friend using it to locate you.

How to See Where Facebook Has Tracked Your Location:

Go to Settings. Click Location on the panel on the left, and then click View location history. A map will appear along with with a log showing your location for as long as you’ve had location settings enabled. For some, that’s going back years.

 

How to Delete Your Location History:

Click on the three bars on the upper right corner of the screen (or lower right if you have an iPhone). Select Account settings> Location. Tap to turn off Location Services, and below, slide left to turn off Location History.

To delete all your past history, click View your location history and select the three dots in the upper right corner. There you’ll have the option to delete your entire history. You’ll need to re-enter your password to do this. (Resetting your password is actually another great way to prevent others from accessing your location or your Facebook account in general.)

3. Block Harassers and Put Creeps on Your Restricted List

Another helpful option on this page is to place particular people on a restricted list. By putting them here, they’ll be listed as one of your friends, but will only be able to see information that you share publicly. This is especially useful if you want to avoid confrontation with someone you fear will try to intimidate or take advantage of you.

Although it’s easy to say you should be straightforward and be able to tell someone to their face that you don’t want them seeing the personal stuff you post, we all know how quickly a situation can escalate when a certain type of man feels rejected.

So next time you meet a guy at a bar who insists on friending you and watching you accept his request, just slip into the ladies’ room for minute and stick him on your restricted list.

4. Report Imposter Accounts

Even though it goes against their terms of service, Facebook estimates that there are currently66 million fake accounts on the platform. One reason people create fake accounts is to impersonate other users. By using your real name and photos, an imposter is able to friend people in your real life social network, and then post harmful and untruthful content about you.

If you find a fake account using your photos and personal information, you can report it to Facebook and they should take it down.

How to Report a Fake Profile on Facebook:

Go to the fake profile, click on the three dots at the upper right corner of the page, and select Report>Report this profile>They’re pretending to be me or someone I know.

That said, a smart imposter is going to block you so you can’t see the fake account.  If they do that, enlist a friend to report the profile for you.

Facebook has also been trying to be proactive in identifying imposter accounts, and has recently announced an initiative that uses its facial recognition software to flag new profile pictures featuring existing users.

It should be noted, however, that only new accounts will be scanned, so if there’s already a fake profile of you up, unless you or someone you know finds and flags it, there’s no way to catch it. Moreover, the only photos that will be scanned for your face are those within your friend, or friends of friends network –  rather than all the users on the platform.

This calls into question how effective the tactic really is, especially considering how oftenprofiles are faked not in order to carry out personal vendettas, but instead to scam people out of money or promote products or political agendas. Specifically, recent probes into the 2016 American presidential election have revealed an entire industry of Facebook activity artificially generated to sway public opinion.

In these cases, one simple way to protect yourself is to make most of your photos private. If the person making the sham account doesn’t have access to your photos, you’ll be a less attractive target for impersonation.

5. Prevent Revenge Porn

In recent years, sexting has left the realm of kink and become a standard mode of flirtation. In fact, according to one study, 88% of the adults surveyed said they had sent sexually explicit messages or images at least once. This isn’t necessarily a bad thing; the same study showed a correlation between sexting and sexual satisfaction, and found that women often find it particularly empowering.

That said, sending revealing photos can be risky if they get into the wrong hands. Far too many women have found themselves the object of humiliation campaigns, in which vindictive former partners make their lives hell by sending intimate images to their friends, family members, and even employers.

Fortunately, Facebook already has an algorithm that identifies and removes nude images. However, in November 2017 they also announced a new, somewhat novel approach to addressing the ugly epidemic of revenge porn. But the idea, which is first being tested in Australia, is bound to raise some eyebrows.

Basically, if you suspect a particular image may be uploaded to Facebook without your consent, you fill out a form explaining your concern, and then send the image to yourself using the Facebook Messenger app. After assessing the report and the photo, Facebook will then delete it.

Because Facebook owns Instagram, this will prevent the image from being disseminated there as well.

There are a few issues with this approach. First, you have to know the images are out there in the first place. (Sometimes photos and videos are taken without the victim’s knowledge or consent.) Second, you have to have the images in your possession – which may not be the case if they were taken using someone else’s camera. And finally, you have to trust Facebook, and accept that a real person on their end is going to see pictures you explicitly don’t want out there for public consumption.

For many, knowing some anonymous techie has access to their intimate photos, even for a short time, will add to the trauma and anxiety they’re already experiencing.

Instagram and SnapChat 

Photos were not the only thing that changed when Instagram started in 2010 and SnapChat in 2012. Online harassment did too.

By making your photos public, anyone can comment on your pictures. Although it’s hard to understand why someone would dedicate their time to being a troll, there are those who have a field day searching for photos to insult. Public body shaming comments and DMs (Instagram’s version of a private message) with explicit and vulgar language plague millions of accounts every day.

Besides trolling, many women are susceptible to revenge porn, dick pics, and other non-consensual nude photography.

With different techniques, you can fight back and even prevent some of these scenarios from happening in the first place. Yes, trolls and jerks will find a way to you if you’re persistent enough, but by taking the following steps, you can make it that much more difficult for them.

3 Ways to Protect Yourself on Instagram and SnapChat

1. Check Your Pictures for Identifying Data

There are some simple things you can do to make your photos and account a bit safer.

Let’s say you’re at a restaurant and want to Insta a picture of your dish. It’s nice to tag the restaurant because it gives them PR. But, by tagging this restaurant, you place yourself in that location.

Any stalker now knows exactly where you are.

Similarly, if you enable geolocation settings, you’re even more at risk. If you snap a picture of your caramel latte from Starbucks, you can be at any of the 27,339 Starbucks around the world. But if your geolocation is on, whoever sees your picture will know exactly where you are.

Snapchat unveiled a new feature in June 2017 called SnapMap, which shows the locations of all of your friends on a map. While this might seem innocent, it actually let’s others keep constant track of your whereabouts. Turn off the SnapMap feature, and you’ll save yourself from a lot of potentially ugly situations.

2. Don’t Use Your Real Information

When you sign up for SnapChat, you are required to provide your birthday, phone number, and email address – pretty standard for social media apps. But anyone with the slightest bit of tech savvy can then find that information through your SnapChat account. This makes it extremely easy for someone to take their harassment off SnapChat and onto email, WhatsApp, and plenty of other apps.

The best way to protect your information is to hide it. Create a new email address to sign up. Also, use a fake phone number (you know, the one you might give to a creepy guy at the bar who you don’t want to call you), and make up a new birth date.

Another simple trick that makes it much harder for trolls to access you is to change your account from public to private. This goes for both Instagram and Snapchat. Changing your account to private will limit the people who see your posts to friends, family, or anyone else you choose to approve.

How to Make Your Account Private on SnapChat:

Go to Settings>View My Story>My Friends/Custom. While you’re in Settings you can change who can contact you and who can see your location.

 

How to Make Your Account Private on Instagram:

Go to Settings>Private Account (slide right to enable).

If you need to use these apps to promote a product, your company, or yourself, then create a separate account. This way, your personal photos won’t get mixed up with your public photos.

That said, even if you do all that, rude comments could slip through the cracks. In that case, you’ll need to know how to…

3. Block Creeps Both Instagram and Snapchat have blocking options. Using this technique, you can block a user and then delete their comments

How to Block People on Instagram:

Select the person you want to block, tap the three dots in the upper right corner, and then click block.

 

How to Block People on SnapChat:

Select the person you want to block, tap the three lines on the upper left corner, and then click block.

Harassment at Work 

Unfortunately, abuse is also prevalent in work environments. According to one studyone in three women ages 18-34 has been sexually harassed at work. 25% of those women were harassed online via texts or emails, yet 71% of these women did not report it.

We can only speculate the reasons for this, but one could be because sexual harassment is not clearly defined.

However, some examples of sexual harassment include:

1. Sharing sexually innaproporiate images or videos.

2. Sending letters, texts, or emails with suggestive content.

3. Telling lewd jokes or sexual anecdotes.

But even these are ambiguous! If someone sends a dick pick, that is clearly sexual harassment, but an off-hand comment could be misconstrued.

So, how do you know it’s sexual harassment?

For those moments where you’re not sure, think about how you feel. Did that comment make you uncomfortable? Is there something off-putting about it? If yes, chances are there’s an underlying tone that should be considered sexual harassment.

Sexual Harassment at Work

Sexual harassment comes in different forms, and when it’s online it’s often even less obvious. Yet, it still happens. If you’re in a professional situation where you feel uncomfortable, you should immediately start recording it. Often larger cases are built on a pattern of small incidents, which, if not documented properly, won’t be useful as evidence.

Even if you’re not sure if an encounter counts as harassment, it’s better to treat it as such just in case the situation gets worse and you decide to eventually take action.

How to Report Harassment at Work 

1. Document Every Encounter

Any comment, inappropriate email, or other correspondence that can possibly qualify as harassment should be recorded and stored somewhere where only you have access to it (not on the company’s Google Drive, for instance). It could be that one comment was unintentional, but if it happens again, you’ll be able to build a case.

If an encounter involves something said verbally or inappropriate touching, as soon as possible, write yourself an email (from your personal account) describing the incident in as much detail as you can. Include the time, date, and location of the incident.

2. Monitor the Situation

Take screenshots, record times and dates, save emails, and keep a file of everything that makes you uncomfortable.

3. Report It

Once you have evidence, it’s time to file a report. While it is sometimes uncomfortable, reporting harassment in the office is one of the most productive ways you can stop it.

Send your evidence to the HR department, which hopefully already has a policy in place as to how to proceed. If there is no HR at your company, then you should construct a well-informed email and send it to office management or to your manager (as long as they are not the one harassing you).

How to Write an Email to Report Sexual Harassment:

It can seem daunting to construct that first email. For this reason, we included a template for you to use.
Subject line: Official complaint of sexual harassment

Dear [HR] and [boss],

I am writing this email to notify you that [name of harasser] has been sexually harassing me for the past [x amount of time].

The following incidents have occured during that time:

  • [Example 1: Describe what happened and when. Try to include as many facts as possible. ]
  • [Example 2: Describe the second incident that made you feel uncomfortable. Remember to include if you told anyone else at work about it.]
  • [Example 3: Attach any documents or evidence that will support your case.]

[If applicable, include what actions you believe the company should take. For instance, you can write, “I would like to be transferred to a different department” or “I would like this matter to be looked into, and I would like a formal apology from [name of harasser].”]

Thank you for looking into this matter. Should you need any more information, I am happy to provide it.

Sincerely,

[Your name]

Your office should have a policy on how to assess the situation and take action.

If you don’t feel as though your complaint was adequately addressed, remember that you can always seek outside legal counsel. A professional well-versed in the laws in your area should be able to guide you in your next steps.

We should also note that for many, reporting the incident internally is not an option, as many women freelance or are self-employed. In this scenario, you need to take the situation into your own hands.

Sexual Harassment if You’re Self-Employed 

If you’re self-employed and experience an inappropriate encounter, since there’s no one to report to, you need to take care of the situation yourself.

This is exactly what happened to Ariel*, a musician who received sexually charged messages from another professional in her industry. After commenting on the way she shakes while playing music, Ariel responded “don’t be an ass” to which the harasser responded “Oh, I love the way you talk.”

While Ariel decided not to publicly shame him, she did respond that his comments were suggestive and aggressive. The harasser disagreed and left it at that.

Ariel found it empowering to confront the harasser head on. Others may find that the best method of self-preservation is to ignore the harassers. There’s no right or wrong way to address harassment in this scenario. It is your decision.

Sexual Harassment on LinkedIn 

LinkedIn, an online platform for career-networking and business, has unfortunately also become an outlet for sexual harassment. While LinkedIn’s policy prohibits any form of harassment, there’s no way for LinkedIn to totally prevent it, and – unfortunately – sexual harassment still happens there every day.

Because it’s a networking site, some treat it like a dating site. Among other complaints, women have reported men sending them inappropriate messages, and making lewd comments on their appearance based on their profile pictures.

Another potential pitfall: your resume.

Many people upload their resumes without considering that their email address and phone number appear in the header. Unless you want the entire internet to have access to that information, delete it from the version you post.

Unwanted phone calls asking to go out may not seem like sexual harassment to some men, but for women receiving phone calls from strangers, it could definitely feel like it.

But, that’s the problem. Because most harassment is not so blatant, it’s harder for women to validate and report it. While you can’t prevent creepy guys from messaging you on LinkedIn, there are ways you can protect yourself.

4 Ways to Protect Yourself on LinkedIn 

1. Before accepting a LinkedIn connection, check the degrees of separation. Do you have connections in common? Do they work in your industry? If not, don’t accept.

2. If you receive an unsolicited message, you can decide to block them. Just click on the three dots at the top right and then click Report this conversation.

3. You can also block that person from viewing your profile or contacting you. Go to the person’s profile, click More>Report/Block and follow the instructions.

4. If you upload your resume, check to make sure your phone number, home address, and other contact information are not listed. If someone wants to contact you for your work, they can do it through LinkedIn.

There is no guarantee that these suggestions will protect you 100%. However, they do provide you with more control regarding who can contact you.

Online Dating and Sexual Harassment  

Kylie* had been chatting with Marco* for about a month after having connected on OKCupid, but they hadn’t yet met in person. One night, after over an hour of increasingly flirty texts, Marco suggested that they switch to a more visual forum – he wanted to Skype sex.

The next day, Kylie was horrified when one of her friends called to tell her that she received a recording of the encounter. An hour later, Kylie got a message from Marco: pay up, or the recording would be sent to even more people in her social network.

Online dating is where women are most vulnerable to cyber-sexual harassment.

That’s because unlike most social networks, dating sites are where you go with the express purpose of meeting, and potentially getting intimate with strangers. Whereas on other sites strict privacy settings could serve as a shield, on dating sites those tactics for staying safe would just result in another solitary Saturday night.

While dating apps are supposed to be fun, they’ve also been known to lead to some pretty unpleasant encounters.

For instance, Esme* met Raphael on the app Happn. After chatting on the app, the conversation moved to WhatsApp, but when Esme checked his profile picture, she noticed Raphael looked different and his profile did not match the one on the dating app. Not wanting a confrontation, she told Raphael that she had some personal issues to work out before she was ready to date. Instead of accepting her explanation, he started bombarding her with aggressive questions about where she was and who she was with.

Finally, Esme blocked him and reported him to Happn. Knowing he would seek her out on social media she also blocked him on Facebook, WhatsApp, and Instagram. And when he tried to call her, she blocked his number too. Whether Raphael finally got the hint (unlikely) or simply found it too hard to maintain contact, Esme was able to stop the abuse – but not all women are this lucky.

What happened to Esme is known as catfishing – or when someone misrepresents themselves online, often using fake photos and profiles. While Esme was able to clearly see that the person on the Happn profile was different from the person in the WhatsApp profile, most catfishers are smart enough to better hide their tracks.

Similarly, it’s pretty easy to unknowingly become the accomplice of a catfisher. Take Cori*, for instance. One day she got a call from a friend that her Facebook profile picture was being used on someone else’s dating profile. Cori reported the fake profile and it was deleted, but who knows how many people saw her face and information before then?

Unfortunately, there’s no way to both meet people online and ensure you’ll never be a victim. However, there are ways to protect yourself.

3 Ways to Protect Yourself on Dating Sites

1. Do a Background Check

When you first connect with someone online, search them on Google, Facebook, and other dating apps if you’re on them. Look for inconsistencies in their pictures and profile descriptions. If you find any, report the profile to your app.

2. Get to Know Them on the App

Chat on the app before moving the conversation to a different platform. This gives you a sense of who they are before exposing further details about your personal life. Once you do feel comfortable enough to move the conversation to another platform, be aware of what they can see there. For instance, both WhatsApp and Telegram allow profile photos, WhatsApp allows status updates, and Telegram lets you write a little bio about yourself. Both apps also have a “last seen” feature that shows your contacts when you were last on the app. If you don’t want someone to see any of this information, change your privacy settings. And if you do end up getting together in person, make sure to meet in a public place, and let a friend know where you’ll be.

3. Keep Your Social Media Accounts and Pictures Private.

This minimizes the chance of someone stealing your pictures and using them on dating sites.

Safe Sexting

Most adults are familiar with safe sex. But what they may not have given much thought to is safe sexting.

This is especially important, since sexting is on the rise. In fact, according to one studynearly half of the adults surveyed said that they sext.

However, the fact that a lot of people do it doesn’t mean it’s not without its risks. Stories of revenge porn and hacks that have exposed people’s intimate photos are commonplace. And it’s not hard to imagine how having your nudes fall into the wrong hands could devastate your professional and personal life.

The easy answer would be to tell you to stop sexting, but we’re not going to do that. Sexting can be a fun and fulfilling part of your relationship or dating life, and we’re not here to deny you a good time.

What we are going to do is give you some easy tips on how sext safely. Some of these may seem like common sense, but we’re also going to get into some high tech hacks so you can relax while your smartphone gets steamy.

7 Ways to Protect Yourself While Sexting 

1. Don’t Include Your Face or Other Identifiable Features

Your first line of defense if your photos go public is plausible deniability. That means making sure your pics don’t include your face, unusual birthmarks, or tattoos.

2. Don’t Drunk Sext

You may be feeling frisky after a couple of margaritas, but that doesn’t mean it’s the best time to unbutton your top and bust out your camera.

Fortunately, there are several apps available that can prevent morning after regrets. For instance, Drunk Locker is a really comprehensive app for when you know you’re going to be partying. Besides finding you a designated driver, it can also block certain contacts so you can’t get in touch via calls, texts, and social media.

3. Make Your Photos Self-destruct

The app Disckreet is specifically designed for sexting, and requires that both the sender and the receiver input a passcode in order to see a sent image. The main benefit Disckreet offers is that it allows you to delete you images from the phone of the person you sent it to. That said, there’s nothing stopping the person receiving your photos from taking a screenshot and saving them.

An app that somewhat gets around the screenshot issue is the popular SnapChat, whichautomatically deletes photos a few seconds after they’re opened. Although SnapChat allows screenshots, it’ll send you a notification when one is taken. That said, it’s not a perfect solution, because a little Googling provides several ways to bypass the notification – so it’s still possible for someone to save your photo without you knowing.

Confide, a well-encrypted app that automatically deletes messages and photos, doesn’t allow receivers to take screenshots. But again, if someone is really committed to saving your nudes, they’ll find a way.

4. Password Protect Your Phones and Photos

To ensure that no one accidentally gets an eyeful when scrolling through your or your partner’s phone, both of you should protect your phones with passcodes.

You can also download an app that will keep your sexy photos in a seperate, password protected folder. Some options are KeepSafe and Gallery Lock. One of the cool things about Gallery Lock is that you can choose to keep the icon hidden, so others won’t realize it’s on your phone. Plus, if someone repeatedly tries to login and fails, the app will take their picture.

Be aware, however, that not all these apps provide encryption, meaning you could be at risk of having your photos hacked.

5. Securely Save Your Photos

If you happen to snap a pic that makes your butt look like the work of art you know it to be, you may opt to save it rather than have it self-destruct. In that case, it’s better to store it on a desktop, rather than a mobile device, which is more likely to get lost or stolen.

Bear in mind though, even on a desktop it’s possible to get hacked. Therefore, you should save your sensitive photos in an encrypted file. VeraCrypt is a free open source program that allows you to encrypt individual files on either your Mac or your PC.

Bear in mind though, that once your photos are in an encrypted folder, you still need to permanently erase them from your computer. It’s not enough to put them in the trash and then take out the trash.

Until that data is overwritten by new data, it still exists and can be found by an enterprising hacker. Fortunately, there’s software out there to permanently delete files. For Windows, one of the most popular free options is Eraser, and for a Mac you can use Permanent Eraser.

6. Don’t Sync Your Photos

If you have an Android, it’s likely that your photos get automatically saved to to Google Photos, and if you have an iPhone, they get saved to the iCloud.

You may recall the infamous iCloud hack of 2014, in which the private photos of several (mostly female) celebrities, including Jennifer Lawrence and Kirsten Dunst, were leakedfollowing a phishing attack. Since you don’t want that happening to you, you’re best bet is to keep your sensitive photos off the cloud.

That said, we don’t recommend disabling automatic syncing, since that can lead to your losing your info in the event that your phone gets lost or stolen. Instead, you should log into Google Photos or iCloud and delete them individually. Be aware though, that if you have automatic syncing on, this could result in the photo also being deleted from your phone the next time it syncs. So if you want to save the photo, back it up somewhere else – preferably in an encrypted folder (see above).

7. Don’t Send Pictures to People You Don’t Trust

We know, this seems really obvious, but with 16% of people reporting having sent sexts to complete strangers, it’s worth emphasizing.

Not sending potentially compromising photos to someone you’re not sure about is especially important, since as you may have noticed from this list, there’s no condom for sexting, so there’s no way to stay totally safe. So take the precautions you can, and choose your sexting partners wisely.

IRL (In Real Life) Attacks 

Obviously, attacks on women don’t just happen online. Often attacks spill over to the real world, with perpetrators using technology to help them stalk and abuse their victims. In fact, a survey of victim aid providers revealed that 79% dealt with victims who had been surveilled using social media.

Sometimes perpetrators are people we know, like a controlling partner. Other times, attacks are crimes of opportunity, like stealing a cell phone, or taking advantage of someone who’s simply in the wrong place at the wrong time.

In any case, from giving a friend the heads up as to where you’ll be, to encrypting the data on your mobile devices, to keeping your passwords secure, there are precautions you can take to keep yourself safe.

How to Safely Use a Ridesharing App 

Back in 2014, a woman in New Delhi was raped by her Uber driver. After it was revealed that the driver had a decade-long criminal record that included sexual assault, some were calling for the ridesharing app to be banned altogether.

After a slew of bad press, Uber now has a new CEO at the reigns. And it looks like the company is finally ready to take passenger safety seriously by rolling out some new initiatives.

The main one that has already been implemented allows you to share your ride with up to five trusted contacts. This means your friends can follow along during your trip and see that you arrived at your destination. If you want, you can also set the trusted contacts feature so that it’s only enabled for nighttime rides.

Trusted contacts is similar to Lyft’s Send ETA feature, which allows you to send your route and estimated time of arrival to a friend. For both Uber and Lyft, these messages include the car’s make and model, the license plate number, and a photo of the driver.

Uber also has a 911 feature in the works that will allow you to call emergency services with a click of a button, and which automatically provides them with your location in real time. Other initiatives that Uber is planning include driver background checks and scans of new DUI and criminal offenses that can be checked against their list of drivers.

In the meantime, here are a few steps you can take yourself in order to stay safe.

5 Ways to Protect Yourself While Using a Ridesharing App 

1. Make Sure You’re Getting into the Right Car

Before hitting the road, check the car’s license plate, make and model, and the driver’s name and photo to make sure everything matches up.

2. Don’t Let Your Driver Know if Your Pick-up Point or Destination is Your Home or Place of Work

In fact, if it is, you might want to make a little small talk so you can slip in a white lie to make him think otherwise. For instance, if he asks how you’re doing, you can say “great, excited to be going out to meet friends.” Another option is to give a nearby location as your destination, rather than your exact address, and walk an extra block.

3. Check the Driver’s Reviews

One nice feature of ridesharing apps is they allow riders to rate their drivers. If yours has bad reviews, cancel the ride and call another one. To keep from having to wait too long, have a couple of apps already installed on your phone so you can use the one that’ll most quickly get you a reputable driver.

4. Track Your Route

If you’re familiar with the area you’re traveling in, you’ll notice if the driver is going the wrong way. But if you don’t, open the map app on your phone and track your route to make sure you’re headed toward the destination you requested. If the route looks strange, speak up.

5. If Something Doesn’t Feel Right, Get Out

Yes, you may be late for your appointment, and you may be out a few dollars, but if you feel unsafe, ask the driver to pull over and get out of the car. Too often women put themselves in unsafe situations because they think following their gut will lead to awkwardness. Screw that.

What to Do If Your Phone Gets Lost or Stolen 

For many of us, it’s as if our whole lives are on our phones. Our phones contain our contacts, our photos, and the apps we use to navigate, keep up with the news, organize our work and personal schedules, and stay connected with friends and family; it’s a lot of personal information we don’t want in the hands of some stranger.

Fortunately, there are a few simple steps you can take to protect yourself if your phone gets lost or stolen.

4 Ways to Protect the Contents of Your Phone 

1. Password Protect Your Phone 

In order to keep someone from immediately gaining access to the contents of your phone once it’s in their possession, it’s best to already have a password set.

The exact way to set a password will vary depending on your device, but for an Android, you’ll probably have to go to Settings>Security>Screen lock type. Here you can choose to unlock your phone by using a pattern, pin, or password.

A password is the most secure option, but it’s also the most annoying to have to input every time you want to glance at your Facebook notifications. You might also have the option to set your phone so it will only open with your fingerprint.

Another cool feature is the smart lock. If you use this, your lock function won’t kick in while your phone is on you, if you’re at certain locations (e.g. your home), or if you’re near other trusted devices. Some phones will even give you voice and facial recognition options.

2. Locate Your Phone

One of the great things about having a GPS on your phone is that if it goes missing, you can track where it is. However, in order for this feature to work, you need to set it up in advance.

If you have an Android, you have a couple of options. Some devices, like Samsung, have this feature built in – although in order to access it you have to create a Samsung account. By enabling the feature, you’ll be able to locate your phone by going to https://findmymobile.samsung.com/ from a different device and logging in. Another option is to download the Find My Device app from the Google Play Store. This app works the same way as Samsung’s and only requires you to have a Google account. Plus, if you’ve just misplaced your phone somewhere around the house, it has the ability to make it ring, even if your phone is set to silent. Just go to https://myaccount.google.com/intro/find-your-phone, sign in, and you’ll be able to see your phone’s location on a map. From there you’ll also be able to reset your phone’s password.

Bear in mind, however, that if you have an Android, you’ll only be able to locate your device if your location services are enabled and you’re connected to the internet. A smart thief will know to disable those functions so you can’t track where he – and your phone – are.

If you have an iPhone, you’ll need to download the Find My iPhone app. Once it’s installed, you’ll be able to locate your device on a map by going to https://www.icloud.com/#find and signing into the iCloud.

There you can also put your phone into Lost Mode, which will lock it. Lost Model also lets you set a message to the locked screen, so if your phone is simply lost, you can write something like, “Lost phone. Please call 212-555-1234 to return.” Or, if you know your phone has been stolen, you can write something like, “You suck.”   

3. Erase Your Data

This is the nuclear option. If you’re sure you’re not getting your phone back, you can use the Find My Device/Find My iPhone apps to remotely erase all the data on your phone, so even if the thief manages to break through your password protections, they won’t be able to access your personal information.

Bear in mind that when you do this, since all your personal accounts will be deleted, you lose your ability to track your phone remotely.

That said, your phone could still be getting service from your wireless carrier, meaning whoever has it could be making calls from your number and using your data plan. To cut them off, call your service provider and let them know your phone has been stolen.

Knowing you might have to one day erase your phone data is another great reason to backup your phone’s contents (which you should really be doing anyway). If you have an Android, the easiest way to backup your data is to use the Google cloud. If you have an iPhone, use the iCloud.

But what if you didn’t have the foresight to install the Find My Device/Find My iPhone apps, and now you can’t change your passwords, lock your phone, or erase your data remotely? In that case you should…

4. Change the Passwords for All Your Apps

Make a list of all the apps you have on your phone that require passwords, get onto another device, and start changing your passwords. This will likely include your email, social media accounts, bank accounts, and app stores.

Staying Safe on Meetup.com 

One of the amazing things about the internet is that it can bring together total strangers who have something in common, but would never have found each other otherwise.

A great way to do this is through the website Meetup.com, which lets users create and join events and activities based on themes that interest them. Popular categories for meetups include film, health and wellness, LGBTQ, and pets. It’s a fantastic way to make new friends and cultivate your interests.

But didn’t your mom always tell you not to talk to strangers? Was she really onto something, or just being paranoid?

A little of both. You should absolutely get yourself out there and take a big bite out of life… but also, take some precautions.

3 Ways to Protect Yourself on Meetup.com 

1. Don’t Include Too Much Personal Information in Your Profile

Be aware that your profile page is completely accessible to anyone with internet, so only include information you’re comfortable being totally public.

If you have a passion for food, and can’t wait to find culinary meetups in your town, definitely mention the new taco truck you’re totally obsessed with. But don’t say it’s located right outside your building on 333 Main Street, where you live in apartment 4D – which by the way doesn’t have a deadbolt.

Or if you’re looking for family meetups, go ahead and write that you have a ten year old and six year old, but don’t include that their names are Timmy and Sue, and that they go to Lincoln Elementary, from which they usually walk home alone at 2:30 pm.

2. Get to Know People IRL Before Communicating One-on-one 

Meetup has an email forwarding system, so you can get messages from members sent to your email without them having your actual email address.

But even so, if you’re just not interested in people contacting you before meeting and hitting it off in real life, you can choose to block messages from users and only receive messages from event organizers. Just go to your account and click Settings>Privacy.

From there you can choose whether you want your groups or interests listed on your profile. You can also select who can contact you on Meetup – whether that just be organizers, members of your meetups, or anyone on the website.

3. Let a Friend Know Where You’re Going 

For any situation in which you’re going out to meet strangers, it’s good practice to tell a friend where you’re going, and set a time to check in with them so they know you got home safe. Also,if the meetup involves drinks, never leave yours unattended.

Preventing Intimate Partner Violence 

Intimate partner violence (IPV) affects nearly one third of American women. Although technology can provide tools for victims (e.g. for collecting evidence against an abuser), it can also unfortunately be used by perpetrators. That’s because control is an integral element on IPV, and the misuse of technology can give abusers a means of exerting control over their victims.

According to a recent study, while many perpetrators use technology specifically designed for surveillance, it is far more common to repurpose other types of apps in order to achieve the same goals. Some of those used include find my phone apps, and family tracking and child monitoring apps.

The problem with this is that advocates against IPV can’t go after the companies that manufacture these apps, and app stores can’t block them, as most of the time, they’re used for perfectly legitimate purposes.

Many of these apps allow abusers to track their victim’s location, read their messages by having them forwarded to a different device, and even watch and listen to them remotely by activating the phone’s camera and microphone.

As mentioned above, there are also apps explicitly marketed for nonconsensual surveillance. While it’s rare to find these in a legitimate app store, there are plenty that can be found in other corners of the internet. And even though most phones come with a default setting that blocks off-store apps, guides for overriding it can easily be found online.

One of the most nefarious elements of these type of apps is that they can usually be configured so the app icon is hidden, thus making it nearly impossible for the victim to detect it on their phone.

You might think the solution would then be to scan the phone for spyware, but unfortunately, even some of the biggest names in the industry, such as Symantec, Kaspersky, and Avast, have proven largely ineffective at detecting these apps.

So what can you do to protect yourself?

3 Ways to Keep an Abusive Partner from Surveilling You 

1. Keep Your Phone on You at All Times

Almost all the apps studied require that the abuser physically have access to the victim’s phone at least once.

2. Be Cautious Using Any Phone You Didn’t Obtain Yourself

Abusers with a lot of control over their victims often control their money too – and so end up being the ones to purchase their phone. In these cases not only can they pre-install dual purpose apps, but with a little tech savvy, they can can even root the device, giving them the ability to install the most nefarious off-store apps. There are even companies that will sell phones that are already rooted, or that have surveillance software pre-installed.

3. Password Protect Your Phone, and Don’t Share Your Password with Anyone

As mentioned above, having a password to keep your phone locked is the first line of defense in keeping its contents secure. If you suspect your partner is accessing your device, immediately change your password. Make it long and complex, and make sure not to use elements they might be able to guess, like your birthday or pet’s name.

That said, we’re not naive, and can’t ignore the reality that many victims of IPV are coerced into revealing their passwords or “allowing” these dangerous apps to be installed on their phones.

Whether or not you’re in the position to safeguard your device, if you are the victim of IPV, there are resources that can help you get out. These are just a few of the organizations that have made helping victims their mission:

National Network to End Domestic Violence: https://nnedv.org/

The National Domestic Violence Hotline: 1-800-799-7233, http://www.thehotline.org/resources/

Family and Youth Services Bureau: https://www.acf.hhs.gov/fysb/resource/help-fv

SOS Apps 

In general, it’s a good idea to have an emergency app on your phone, just in case. These let you notify friends or family when you’re feeling unsafe, and/or contact emergency services.

Some types of phones have these features built in, so it’s worth checking to see if yours does.  If not, check out these apps, all of which are available for both Android and iOS.

1. ICE, which stands for In Case of Emergency, allows you to send a message and your GPS location to selected contacts when you want your friends or family to keep tabs on your whereabouts. You can also set the message to be delayed, so say, if you don’t come back from your hike by nightfall, that’s when they’ll get the message.

2. React Mobile does the same thing as ICE, but also has an SOS Help Me button that notifies your pre-chosen contacts via email and text, and if you choose, posts a message to Facebook and Twitter. At the same time, the app automatically contacts local emergency services.

1. Siren GPS won’t contact your friends and family, but with a push of a button, will alert emergency services and provide them with your location. You can also set up a personal profile with relevant information that is then passed on to the authorities in case of emergency. This can include medical conditions and emergency contact info.  The app also gives you the option of calling the fire department, an ambulance, or the police.

You can also show certain information on your lock screen to be used in case of a situation in which you’re unable to give information about yourself to emergency services. For instance, you can write something like, “In case of emergency, call [name of your partner]” and then write their phone number. Or, if you have a specific medical issue – like a severe allergy or epilepsy – you can include pertinent information there.

How to set a lock screen message will vary depending on what model phone you have.

Conclusion

Technology and the internet play a big part in our lives both in good ways and in bad. As women, we are targeted online for many different reasons, but that does not mean we should disengage or disconnect.

Our hope is that this guide empowers you to protect and defend yourself online and in person and that the tools we provide will help you to do so.

If you found this guide helpful in any way, please share it with others so more women can learn how to stay safe, both on and off the web.

* Some names and identifying details have been changed to protect the privacy of individuals.

Sara Levavi-Eilat is a long time writer and editor with a passion for cybersecurity and a superior knowledge of Bitcoin.

Book Excerpt: Four Ways to Directly Confront Those in Power

Editor’s note: The following is from the chapter “A Taxonomy of Action” of the book Deep Green Resistance: A Strategy to Save the  Planet.  This book is now available for free online.

     by Aric McBay

There are four basic ways to directly confront those in power. Three deal with land, property, or infrastructure, and one deals specifically with human beings. They include:

Obstruction and occupation;

Reclamation and expropriation;

Property and material destruction (threats or acts); and

Violence against humans (threats or acts)

In other words, in a physical confrontation, the resistance has three main options for any (nonhuman) target: block it, take it, or break it.

Let’s start with nondestructive obstruction or occupation—block it. This includes the blockade of a highway, a tree sit, a lockdown, or the occupation of a building. These acts prevent those in power from using or physically destroying the places in question. Provided you have enough dedicated people, these actions can be very effective.

But there are challenges. Any prolonged obstruction or occupation requires the same larger support structure as any direct action. If the target is important to those in power, they will retaliate. The more important the site, the stronger the response. In order to maintain the occupation, activists must be willing to fight off that response or suffer the consequences.

An example worth studying for many reasons is the Oka crisis of 1990. Mohawk land, including a burial ground, was taken by the town of Oka, Quebec, for—get ready—a golf course. The only deeper insult would have been a garbage dump. After months of legal protests and negotiations, the Mohawk barricaded the roads to keep the land from being destroyed. This defense of their land (“We are the pines,” one defender said) triggered a full-scale military response by the Canadian government. It also inspired acts of solidarity by other First Nations people, including a blockade of the Mercier Bridge. The bridge connects the Island of Montreal with the southern suburbs of the city—and it also runs through the Mohawk territory of Kahnawake. This was a fantastic use of a strategic resource. Enormous lines of traffic backed up, affecting the entire area for days.

At Kanehsatake, the Mohawk town near Oka, the standoff lasted a total of seventy-eight days. The police gave way to RCMP, who were then replaced by the army, complete with tanks, aircraft, and serious weapons. Every road into Oka was turned into a checkpoint. Within two weeks, there were food shortages.

Until your resistance group has participated in a siege or occupation, you may not appreciate that on top of strategy, training, and stalwart courage—a courage that the Mohawk have displayed for hundreds of years—you need basic supplies and a plan for getting more. If an army marches on its stomach, an occupation lasts as long as its stores. Getting food and supplies into Kanehsatake and then to the people behind the barricades was a constant struggle for the support workers, and gave the police and army plenty of opportunity to harass and humiliate resisters. With the whole world watching, the government couldn’t starve the Mohawk outright, but few indigenous groups engaged in land struggles are lucky enough to garner that level of media interest. Food wasn’t hard to collect: the Quebec Native Women’s Association started a food depot and donations poured in. But the supplies had to be arduously hauled through the woods to circumvent the checkpoints. Trucks of food were kept waiting for hours only to be turned away.31 Women were subjected to strip searches by male soldiers. At least one Mohawk man had a burning cigarette put out on his stomach, then dropped down the front of his pants.32 Human rights observers were harassed by both the police and by angry white mobs.33

The overwhelming threat of force eventually got the blockade on the bridge removed. At Kanehsatake, the army pushed the defenders to one building. Inside, thirteen men, sixteen women, and six children tried to withstand the weight of the Canadian military. No amount of spiritual strength or committed courage could have prevailed.

The siege ended when the defenders decided to disengage. In their history of the crisis, People of the Pines, Geoffrey York and Loreen Pindera write, “Their negotiating prospects were bleak, they were isolated and powerless, and their living conditions were increasingly stressful … tempers were flaring and arguments were breaking out. The psychological warfare and the constant noise of military helicopters had worn down their resistance.”34 Without the presence of the media, they could have been raped, hacked to pieces, gunned down, or incinerated to ash, things that routinely happen to indigenous people who fight back. The film Kanehsatake: 270 Years of Resistance documents how viciously they were treated when the military found the retreating group on the road.

One reason small guerilla groups are so effective against larger and better-equipped armies is because they can use their secrecy and mobility to choose when, where, and under what circumstances they fight their enemy. They only engage in it when they reasonably expect to win, and avoid combat the rest of the time. But by engaging in the tactic of obstruction or occupation a resistance group gives up mobility, allowing the enemy to attack when it is favorable to them and giving up the very thing that makes small guerilla groups so effective.

The people at Kanehsatake had no choice but to give up that mobility. They had to defend their land which was under imminent threat. The end was written into the beginning; even 1,000 well-armed warriors could not have held off the Canadian armed forces. The Mohawk should not have been in a position where they had no choice, and the blame here belongs to the white people who claim to be their allies. Why does the defense of the land always fall to the indigenous people? Why do we, with our privileges and resources, leave the dirty and dangerous work of real resistance to the poor and embattled? Some white people did step up, from international observers to local church folks. But the support needs to be overwhelming and it needs to come before a doomed battle is the only option. A Mohawk burial ground should never have been threatened with a golf course. Enough white people standing behind the legal efforts would have stopped this before it escalated into razor wire and strip searches. Oka was ultimately a failure of systematic solidarity.

Let’s start with nondestructive obstruction or occupation—block it. This includes the blockade of a highway, a tree sit, a lockdown, or the occupation of a building. These acts prevent those in power from using or physically destroying the places in question. Provided you have enough dedicated people, these actions can be very effective.

But there are challenges. Any prolonged obstruction or occupation requires the same larger support structure as any direct action. If the target is important to those in power, they will retaliate. The more important the site, the stronger the response. In order to maintain the occupation, activists must be willing to fight off that response or suffer the consequences.

An example worth studying for many reasons is the Oka crisis of 1990. Mohawk land, including a burial ground, was taken by the town of Oka, Quebec, for—get ready—a golf course. The only deeper insult would have been a garbage dump. After months of legal protests and negotiations, the Mohawk barricaded the roads to keep the land from being destroyed. This defense of their land (“We are the pines,” one defender said) triggered a full-scale military response by the Canadian government. It also inspired acts of solidarity by other First Nations people, including a blockade of the Mercier Bridge. The bridge connects the Island of Montreal with the southern suburbs of the city—and it also runs through the Mohawk territory of Kahnawake. This was a fantastic use of a strategic resource. Enormous lines of traffic backed up, affecting the entire area for days.

At Kanehsatake, the Mohawk town near Oka, the standoff lasted a total of seventy-eight days. The police gave way to RCMP, who were then replaced by the army, complete with tanks, aircraft, and serious weapons. Every road into Oka was turned into a checkpoint. Within two weeks, there were food shortages.

Until your resistance group has participated in a siege or occupation, you may not appreciate that on top of strategy, training, and stalwart courage—a courage that the Mohawk have displayed for hundreds of years—you need basic supplies and a plan for getting more. If an army marches on its stomach, an occupation lasts as long as its stores. Getting food and supplies into Kanehsatake and then to the people behind the barricades was a constant struggle for the support workers, and gave the police and army plenty of opportunity to harass and humiliate resisters. With the whole world watching, the government couldn’t starve the Mohawk outright, but few indigenous groups engaged in land struggles are lucky enough to garner that level of media interest. Food wasn’t hard to collect: the Quebec Native Women’s Association started a food depot and donations poured in. But the supplies had to be arduously hauled through the woods to circumvent the checkpoints. Trucks of food were kept waiting for hours only to be turned away.31 Women were subjected to strip searches by male soldiers. At least one Mohawk man had a burning cigarette put out on his stomach, then dropped down the front of his pants.32 Human rights observers were harassed by both the police and by angry white mobs.33

The overwhelming threat of force eventually got the blockade on the bridge removed. At Kanehsatake, the army pushed the defenders to one building. Inside, thirteen men, sixteen women, and six children tried to withstand the weight of the Canadian military. No amount of spiritual strength or committed courage could have prevailed.

The siege ended when the defenders decided to disengage. In their history of the crisis, People of the Pines, Geoffrey York and Loreen Pindera write, “Their negotiating prospects were bleak, they were isolated and powerless, and their living conditions were increasingly stressful … tempers were flaring and arguments were breaking out. The psychological warfare and the constant noise of military helicopters had worn down their resistance.”34 Without the presence of the media, they could have been raped, hacked to pieces, gunned down, or incinerated to ash, things that routinely happen to indigenous people who fight back. The film Kanehsatake: 270 Years of Resistance documents how viciously they were treated when the military found the retreating group on the road.

One reason small guerilla groups are so effective against larger and better-equipped armies is because they can use their secrecy and mobility to choose when, where, and under what circumstances they fight their enemy. They only engage in it when they reasonably expect to win, and avoid combat the rest of the time. But by engaging in the tactic of obstruction or occupation a resistance group gives up mobility, allowing the enemy to attack when it is favorable to them and giving up the very thing that makes small guerilla groups so effective.

The people at Kanehsatake had no choice but to give up that mobility. They had to defend their land which was under imminent threat. The end was written into the beginning; even 1,000 well-armed warriors could not have held off the Canadian armed forces. The Mohawk should not have been in a position where they had no choice, and the blame here belongs to the white people who claim to be their allies. Why does the defense of the land always fall to the indigenous people? Why do we, with our privileges and resources, leave the dirty and dangerous work of real resistance to the poor and embattled? Some white people did step up, from international observers to local church folks. But the support needs to be overwhelming and it needs to come before a doomed battle is the only option. A Mohawk burial ground should never have been threatened with a golf course. Enough white people standing behind the legal efforts would have stopped this before it escalated into razor wire and strip searches. Oka was ultimately a failure of systematic solidarity.

The second means of direct conflict is reclamation and expropriation—take it. Instead of blocking the use of land or property, the resistance takes it for their own use. For example, the Landless Workers Movement—centered in Brazil, a country renowned for unjust land distribution—occupies “underused” rural farmland (typically owned by wealthy absentee landlords) and sets up farming villages for landless or displaced people. Thanks to a land reform clause in the Brazilian constitution, the occupiers have been able to compel the government to expropriate the land and give them title. The movement has also engaged in direct action like blockades, and has set up its own education and literacy programs, as well as sustainable agriculture initiatives. The Landless Workers Movement is considered the largest social movement in Latin America, with an estimated 1.5 million members.35

Expropriation has been a common tactic in various stages of revolution. “Loot the looters!” proclaimed the Bolsheviks during Russia’s October Revolution. Early on, the Bolsheviks staged bank robberies to acquire funds for their cause.36 Successful revolutionaries, as well as mainstream leftists, have also engaged in more “legitimate” activities, but these are no less likely to trigger reprisals. When the democratically elected government of Iran nationalized an oil company in 1953, the CIA responded by staging a coup.37 And, of course, guerilla movements commonly “liberate” equipment from occupiers in order to carry out their own activities.

The third means of direct conflict is property and material destruction—break it. This category includes sabotage. Some say the word sabotage comes from early Luddites tossing wooden shoes (sabots) into machinery, stopping the gears. But the term probably comes from a 1910 French railway strike, when workers destroyed the wooden shoes holding the rails—a good example of moving up the infrastructure. And sabotage can be more than just physical damage to machines; labor activism has long included work slowdowns and deliberate bungling.

Sabotage is an essential part of war and resistance to occupation. This is widely recognized by armed forces, and the US military has published a number of manuals and pamphlets on sabotage for use by occupied people. The Simple Sabotage Field Manual published by the Office of Strategic Services during World War II offers suggestions on how to deploy and motivate saboteurs, and specific means that can be used. “Simple sabotage is more than malicious mischief,” it warns, “and it should always consist of acts whose results will be detrimental to the materials and manpower of the enemy.”38 It warns that a saboteur should never attack targets beyond his or her capacity, and should try to damage materials in use, or destined for use, by the enemy. “It will be safe for him to assume that almost any product of heavy industry is destined for enemy use, and that the most efficient fuels and lubricants also are destined for enemy use.”39 It encourages the saboteur to target transportation and communications systems and devices in particular, as well as other critical materials for the functioning of those systems and of the broader occupational apparatus. Its particular instructions range from burning enemy infrastructure to blocking toilets and jamming locks, from working slowly or inefficiently in factories to damaging work tools through deliberate negligence, from spreading false rumors or misleading information to the occupiers to engaging in long and inefficient workplace meetings.

Ever since the industrial revolution, targeting infrastructure has been a highly effective means of engaging in conflict. It may be surprising to some that the end of the American Civil War was brought about in large part by attacks on infrastructure. From its onset in 1861, the Civil War was extremely bloody, killing more American combatants than all other wars before or since, combined.40 After several years of this, President Lincoln and his chief generals agreed to move from a “limited war” to a “total war” in an attempt to decisively end the war and bring about victory.41

Historian Bruce Catton described the 1864 shift, when Union general “[William Tecumseh] Sherman led his army deep into the Confederate heartland of Georgia and South Carolina, destroying their economic infrastructures.”42Catton writes that “it was also the nineteenth-century equivalent of the modern bombing raid, a blow at the civilian underpinning of the military machine. Bridges, railroads, machine shops, warehouses—anything of this nature that lay in Sherman’s path was burned or dismantled.”43 Telegraph lines were targeted as well, but so was the agricultural base. The Union Army selectively burned barns, mills, and cotton gins, and occasionally burned crops or captured livestock. This was partly an attack on agriculture-based slavery, and partly a way of provisioning the Union Army while undermining the Confederates. These attacks did take place with a specific code of conduct, and General Sherman ordered his men to distinguish “between the rich, who are usually hostile, and the poor or industrious, usually neutral or friendly.”44

Catton argues that military engagements were “incidental” to the overall goal of striking the infrastructure, a goal which was successfully carried out.45 As historian David J. Eicher wrote, “Sherman had accomplished an amazing task. He had defied military principles by operating deep within enemy territory and without lines of supply or communication. He destroyed much of the South’s potential and psychology to wage war.”46 The strategy was crucial to the northern victory.

The fourth and final means of direct conflict is violence against humans. Here we’re using violence specifically and explicitly to mean harm or injury to living creatures. Smashing a window, of course, is not violence; violence doesinclude psychological harm or injury. The vast majority of resistance movements know the importance of violence in self-defense. Malcolm X was typically direct: “We are nonviolent with people who are nonviolent with us.”47

In resistance movements, offensive violence is rare—virtually all violence used by historical resistance groups, from revolting slaves to escaping concentration camp prisoners to women shooting abusive partners, is a response to greater violence from power, and so is both justifiable and defensive. When prisoners in the Sobibór extermination camp quietly killed SS guards in the hours leading up to their planned escape, some might argue that they committed acts of offensive violence. But they were only responding to much more extensive violence already committed by the Nazis, and were acting to avert worse violence in the immediate future.

There have been groups which engaged in systematic offensive violence and attacks directed at people rather than infrastructure. The Red Army Faction (RAF) was a militant leftist group operating in West Germany, mostly in the 1970s and 1980s. They carried out a campaign of bombings and assassination attempts mostly aimed at police, soldiers, and high-ranking government or business officials. Another example would be the Palestinian group Hamas, which has carried out a large number of violent attacks on both civilians and military personnel in Israel. (It is also a political party and holds a legally elected majority in the Palestinian National Authority. It’s often ignored that much of Hamas’s popularity comes from its many social programs, which long predate its election to government. About 90 percent of Hamas’s activities are these social programs, which include medical clinics, soup kitchens, schools and literacy programs, and orphanages.48)

It’s sometimes argued that the use of violence is never justifiable strategically, because the state will always have the larger ability to escalate beyond the resistance in a cycle of violence. In a narrow sense that’s true, but in a wider sense it’s misleading. Successful resistance groups almost never attempt to engage in overt armed conflict with those in power (except in late-stage revolutions, when the state has weakened and revolutionary forces are large and well-equipped). Guerilla groups focus on attacking where they are strongest, and those in power are weakest. The mobile, covert, hit-and-run nature of their strategy means that they can cause extensive disruption while (hopefully) avoiding government reprisals.

Furthermore, the state’s violent response isn’t just due to the use of violence by the resistance, it’s a response to the effectiveness of the resistance. We’ve seen that again and again, even where acts of omission have been the primary tactics. Those in power will use force and violence to put down any major threat to their power, regardless of the particular tactics used. So trying to avoid a violent state response is hardly a universal argument against the use of defensive violence by a resistance group.

The purpose of violent resistance isn’t simply to do violence or exact revenge, as some dogmatic critics of violence seem to believe. The purpose is to reduce the capacity of those in power to do further violence. The US guerilla warfare manual explicitly states that a “guerrilla’s objective is to diminish the enemy’s military potential.”49 (Remember what historian Bruce Catton wrote about the Union Army’s engagements with Confederate soldiers being incidental to their attacks on infrastructure.) To attack those in power without a strategy, simply to inflict indiscriminant damage, would be foolish.

The RAF used offensive violence, but probably not in a way that decreased the capacity of those in power to do violence. Starting in 1971, they shot two police and killed one. They bombed a US barracks, killing one and wounding thirteen. They bombed a police station, wounding five officers. They bombed the car of a judge. They bombed a newspaper headquarters. They bombed an officers’ club, killing three and injuring five. They attacked the West German embassy, killing two and losing two RAF members. They undertook a failed attack against an army base (which held nuclear weapons) and lost several RAF members. They assassinated the federal prosecutor general and the director of a bank in an attempted kidnapping. They hijacked an airliner, and three hijackers were killed. They kidnapped the chairman of a German industry organization (who was also a former SS officer), killing three police and a driver in the attack. When the government refused to give in to their demands to release imprisoned RAF members, they killed the chairman. They shot a policeman in a bar. They attempted to assassinate the head of NATO, blew up a car bomb in an air base parking lot, attempted to assassinate an army commander, attempted to bomb a NATO officer school, and blew up another car bomb in another air base parking lot. They separately assassinated a corporate manager and the head of an East German state trust agency. And as their final militant act, in 1993 they blew up the construction site of a new prison, causing more than one hundred million Deutsche Marks of damage. Throughout this period, they killed a number of secondary targets such as chauffeurs and bodyguards.

Setting aside for the time being the ethical questions of using offensive violence, and the strategic implications of giving up the moral high ground, how many of these acts seem like effective ways to reduce the state’s capacity for violence? In an industrial civilization, most of those in government and business are essentially interchangeable functionaries, people who perform a certain task, who can easily be replaced by another. Sure, there are unique individuals who are especially important driving forces—people like Hitler—but even if you believe Carlyle’s Great Man theory, you have to admit that most individual police, business managers, and so on will be quickly and easily replaced in their respective organizations.50 How many police and corporate functionaries are there in one country? Conversely, how many primary oil pipelines and electrical transmission lines are there? Which are most heavily guarded and surveilled, bank directors or remote electrical lines? Which will be replaced sooner, bureaucratic functionaries or bus-sized electrical components? And which attack has the greatest “return on investment?” In other words, which offers the most leverage for impact in exchange for the risk undertaken?

As we’ve said many times, the incredible level of day-to-day violence inflicted by this culture on human beings and on the natural world means that to refrain from fighting back will not prevent violence. It simply means that those in power will direct their violence at different people and over a much longer period of time. The question, as ever, is which particular strategy—violent or not—will actually work.