Resistance Newsletter November 2018

November 9, 2018

by Max Wilbert

Deep Green Resistance

max@maxwilbert.org

https://www.deepgreenresistance.org

Current atmospheric CO2 level: 406 PPM

A free monthly newsletter providing analysis and commentary on ecology, global capitalism, empire, and revolution.

For back issues, to read this issue online, or to subscribe via email or RSS, visit the Resistance News web page.

These essays also appear on the DGR News Service, which also includes an active comment section.

** *** ***** ******* *********** *************

In this issue:

  1. Underground action calendar
  2. Honduran Migrant March: A Refugee Crisis Caused by US Policy and US Partners
  3. Apocalypto
  4. Run for Sacred Water
  5. Oppression and Subordination
  6. Guiding Principles of Deep Green Resistance
  7. Evaluating Strategy
  8. Capitalism is Killing the World’s Wildlife Populations, not ‘Humanity’
  9. Submit your material to the Deep Green Resistance News Service
  10. Abovegound tactics and operations
  11. Further news and recommended reading / podcasts
  12. How to support DGR or get involved

** *** ***** ******* *********** *************

“We’ve got to stop thinking like vandals and start thinking like field generals.”

– Lierre Keith

** *** ***** ******* *********** *************

Underground Action Calendar

[Link] The Underground Action Calendar exists to publicize and normalize the use of militant and underground tactics in the fight for justice and sustainability. We include below a wide variety of actions from struggles around the world, especially those in which militants target infrastructure, because we believe this sort of action is necessary to dismantle civilization. Listing an action does not necessarily mean we support or stand behind the goals, strategies, or tactics of those actionists.

This page highlights specific actions. See also our Resistance Profiles for broader information on the strategies, tactics, goals, and effectiveness of various historic and contemporary resistance groups.

If you know of a published action appropriate to add to the Calendar, contact us at undergroundpromotion@deepgreenresistance.org

NOTE: We ONLY accept communications about actions that are already publicly known in one form or another. DO NOT send original communiques directly to this email address. THIS IS NOT A SECURE MEANS OF COMMUNICATION.

Several recent entries on the Underground Action Calendar:

——————————————————

June 2018 Pennsylvania, US Liquidation system of excavator on pipeline construction site sabotaged, in such a way as to inflict permanent damage Vehicle Monkey

wrenching

May 24, 2018 Birima, Kirkuk, Iraq Two power lines destroyed simultaneously, triggering blackouts in two cities Powerline, Towers  
May 2018 Philadelphia, Pennsylvania, US Cable housing of cell tower torched Telecomms Arson
April 3, 2018 Exton, Pennsylvania, US Tractors for pipeline construction sabotaged Vehicle Monkey

wrenching

View the full Underground Action Calendar database, which contains hundreds of actions dating back more than 50 years, here.

** *** ***** ******* *********** *************

Honduran Migrant March: A Refugee Crisis Caused by US Policy and US Partners

[Link] by  Honduras Solidarity Network

On October 12, 2018, hundreds of women, men, children, youth and the elderly decided to leave Honduras as a desperate response to survive. The massive exodus that began in the city of San Pedro Sula, reached more than 3 thousand people by the time the group crossed to Guatemala. The caravan, which is headed north to Mexico first, and to the United States as the goal- is the only alternative this people have to reach a bit of the dignity that has been taken from them. They are not alone in their journey. Various waves of Hondurans, whose numbers increase every hour, are being contained by Honduran security forces on their border with El Salvador and Guatemala.

The Honduras Solidarity Network in North America condemns any threats and acts of repression against the refugee caravan, human rights activists and journalists that accompany their journey. The conditions of violence, marginalization and exploitation in which this refugee crisis find its origins, have been created, maintained and reproduced by US-backed social, economic and military interventionist policies, with the support of its Canadian and regional allies. We call on people in the US to reject the criminalization, prosecution, detention, deportation and family separation that threaten the members of this march and the lives of all those refugees forced from their homes in the same way. We urge a change of US policy in Honduras and to cut off security aid to stop human rights abuses and government violence against Hondurans.

This refugee crisis has been exacerbated by the governments of Guatemala and Mexico, who subservient to Donald Trump’s administration, have chosen the path of repression. Bartolo Fuentes, a Honduran journalist and spokesperson for the refugees, has been detained in Guatemala. Meanwhile the Mexican government has sent two planeloads of its National Police to the border with Guatemala. Irineo Mujica, a migrant rights activist and photojournalist, was arrested in Chiapas by agents of the Mexican National Institute of Migration when he was getting ready to support the Honduran migrant march. Today (Friday) in the afternoon, tear gas was fired into the group as they tried to come into Mexico on the border bridge. Honduran human rights organizations report that a 7 month old baby was killed.

The massive forced flight of people from Honduras is not new; it is the legacy of US intervention in the country. Since the 2009 US-backed coup in Honduras, the post-coup regime has perpetuated a system based on disregard for human rights, impunity, corruption, repression and the influence of organized crime groups in the government and in the economic power elite. Since the coup, we have seen the destruction of public education and health services through privatization. The imposition of mining, hydro-electric mega-projects and the concentration of land in agro-industry has plunged 66 percent of the Honduran population into poverty and extreme poverty. In the last 9 years, we have witnessed how the murder of Berta Cáceres and many other activists, indigenous leaders, lawyers, journalists, LGBTQ community members and students has triggered a humanitarian crisis. This crisis is reflected in the internal displacement and the unprecedented exodus of the Honduran people that has caught the public’s eye during recent days.

The fraudulent November 2017 elections, in which Juan Orlando Hernández -president since questionable elections in 2013- was re-elected for a second term in violation of the Honduran constitution, sparked a national outrage. The people’s outrage was confronted by an extremely violent government campaign with military and US-trained security forces to suppress the protests against the fraud. The result of the repression was more than 30 people killed by government forces, more than a thousand arrested and there are currently 20 political prisoners being held in pre-trial prison.

To the repression, intimidation and criminalization faced by the members of the refugee caravan, we respond with a call for solidarity from all the corners of the world. In the face of the violence that has led to the mass exodus of hundreds of thousands of Hondurans, we demand an end to US military and security aid to Juan Orlando’s regime, not as the blackmail tool used by Donald Trump, but as a way to guarantee the protection of the human rights of the Honduran people. We demand justice for Berta Cáceres, for all the victims of political violence as a consequence of the post coup regime, and the approval of the Berta Cáceres Human Rights in Honduras Act H.R. 1299. We demand freedom for all the  political prisoners in Honduras. We demand the US end the criminalization, imprisonment, separation, deportation and killing of migrants and refugees.

Today we fight so that every step, from Honduras to the north of the Americas, is dignified and free.

** *** ***** ******* *********** *************

Apocalypto

[Link] by Boris Forkel / Deep Green Resistance Germany

It is very difficult for me to live in this culture.

I just can’t psychologically survive in the high performance society, where everyone is passionately exploiting themselves, while all life on this planet is being destroyed.

I have severe depression and anxiety disorders, and I have to take good care of myself to be able to take care of my son.

It is very difficult for people who have never experienced poverty to understand what poverty means. The constant nagging fear. The permanent stress and psychological terror of state authorities on which you are dependent, that harass you and try to keep you small and oppressed.

Now they want me to work underpaid, shitty jobs again. I already had a stroke not long ago. I can’t do these jobs and I can‘t stand the pressure.

I live in the age of the greatest mass extinction in 65 million years. And the cause of this mass extinction is our glorious western civilization.

Empire.

Indeed, almost all imperial forces have joined into one: The West.

“In the last eighteen months, the greatest build-up of military forces since World War Two — led by the United States — is taking place along Russia’s western frontier…The United States is encircling China with a network of bases, with ballistic missiles, battle groups, nuclear-armed bombers,” writes John Pilger.

Looks like the West is encircling the strongest probable future enemies, preparing for war.

Full spectrum dominance.

The understanding of the fact that this culture is always at war, and will indeed kill all life on planet earth made me shift my loyalty and become an activist.

My loyalty does not belong to empire and industrial capitalism. My loyalty belongs to the suppressed, the poor, the dying planet.

Where are you when we need people to take responsibility for our fellow creatures, human and nonhuman, and defend them? Always working on your professional self-fulfillment, performing until you burn out.

Do you distract yourself so manically with your work, so you don’t have to see what is happening around us? That the insects disappear, the songbirds disappear, the masses impoverish?

That the West is already bombing the near and middle east to ashes and dust and prepares for more, while you try to overtake yourself, become faster and better, without even stopping once to understand the obvious fact that this system is heading for collapse?

Instead you wonder where all the refugees come from. (Of course they come for a share of the cake of our western wealth, they might even try to take your precious job! You better join one of the aspiring right-wing movements.)

Imperialism creates the illusion of wealth as far as the masses are concerned. It usually serves to hide the fact that the ruling classes are gobbling up the natural resources of the home territory in an improvident manner and are otherwise utilizing the national wealth largely for their own purposes. Eventually the general public is called upon to pay for all of this, frequently after the military machine can no longer maintain external aggression.

    –Jack Forbes

Capitalism 2.0 comes with a like-button and a smiling emoji, and it will always tell you that everything is fine.

Capitalism is exploitation, but neoliberalism is the smart self-exploitation of the alienated and indoctrinated individual. Exploitation on steroids.

Indoctrination is cheaper and more efficient than violence. It is thus called “soft power.” It works with research-based psycho-politics, and the smart manipulation of human feelings and desires.

Capitalism creates an exploited class of workers that will probably organize and resist (as it did many times).

Neoliberalism creates a population of totally alienated and indoctrinated machine-like zombies, who suppress their own humanity. Each individual a perfect slave, with a software programmed in its brain. Owner Inside®.

Zombie apocalypse.

You might already be a zombie, living in your middle class-bubble or your digital hallucination, but I am still a human being, sensitive as a frightened child, with a healthy portion of empathy and love. I‘m trying to live awake and conscious in this real, physical world, and what I see is mass extinction, ecological catastrophe and imperialist wars. Trauma.

Facing the truth isn’t easy.

I carry a trauma with me from reading A Short Account of the Destruction of the Indies by Bartolome de Las Casas.

I carry a trauma with me from reading Jack Forbes’ Only Approved Indians. He writes: “If a creature learns to completely accept captivity or slavery, if they erase all thoughts of freedom, they can suppress the pain. But if one wants to be free, one has to face the pain; one has to agonize, to suffer, through all of the terror.”

That’s where you are. Completely accepting captivity and slavery, driving out the pain.

That‘s where I am. Going through all the terror. Trying to free myself (and the world) of this culture.

I carry a trauma with me from reading Derrick Jensen‘s Endgame.

And I carry a deep trauma with me from seeing that he is right, from seeing my fellow beings and relatives disappear, the insects, the birds, the amphibians, all of my beloved nature, in rapid decline.

I most certainly carry a lot of trauma with me from my parents and grandparents, since I was born only 34 years after World War II. I certainly carry a trauma from watching all the documentaries and from visiting the concentration camp in Dachau.

You do not understand my language. I can say what I want, but you don‘t understand. You do not even understand the language “stroke” (red alert; Individual doesn’t function anymore within this insane culture).

Government to medical complex: Repair individual and re-integrate into the machine.

Sorry, doesn’t work for me. I’m out.

I need a lot of quiet and peaceful time to deal with all the trauma. I can’t just rush through my life and work ever harder to help to accomplish the neoliberal agenda and make Europe more competitive for the global economy (that’s how the politicians sold it to us; in fact, the rich are getting richer and the poor poorer, as always).

Mental illnesses such as depression or burnout are the expression of a deep crisis of freedom. They are a pathological sign that today freedom often turns into coercion. We think we are free today. But in reality we exploit ourselves passionately until we collapse…Neoliberalism is even capable of exploiting freedom itself. The performance society creates more productivity than the disciplinary society, because it makes excessive use of freedom. It doesn’t exploit against freedom, but it exploits freedom itself. Everything that belongs to practices and expressions of freedom, such as emotion, play and communication, is now exploited. It is not efficient to exploit someone against his or her will. With the external exploitation, the yield is very small. Only self-exploitation, as the exploitation of freedom, produces the greatest yield. The first stage of burnout syndrome is, paradoxically, euphoria. Euphorically I plunge into the work. In the end I collapse and slide into depression. 

    —Byung-Chul Han

What will you do when the next economic collapse hits?

What will you do when you loose your job and can‘t numb yourself anymore with your work?

Alcohol, drugs, suicide?

Better to face the truth, go through all the terror, declare your loyalty to justice and life on planet earth and become a revolutionary.

** *** ***** ******* *********** *************

Run for Sacred Water

 

[Story] by Max Wilbert / Deep Green Resistance

 

Last week, I was invited to join a Sacred Water Run-Walk in Nevada by Chief Johnnie Bobb of the Western Shoshone National Council. Chief Bobb attended the Sacred Water, Sacred Forests gathering back in May, and we exchanged contact information.

 

I decided to attend last minute after his phone call, and gathered my supplies and energies. It is a 14 hour drive from my home in Oregon to the area the walk was to take place, so I took two days to make the drive. I stopped along the way and purchased as much food and supplies as I could afford, although I didn’t know exactly what was needed.

 

I slept on the night of October 1st in my car at the Swamp Cedars, where we were supposed to meet. The Swamp Cedars are an ecologically unique stand of Rocky Mountain Junipers on the bottom of Spring Valley. Pure water coming out of the ground, shade from the trees, and rich grasses that brought in game animals made this area a gathering place for Newé (Western Shoshone/Goshute) people for thousands of years. It is also why the people were gathered here when they were massacred by the U.S. Calvary, one of several massacres here.

 

I was awoken before the dawn the next morning when Rupert Steele, the chairman of the Confederated Tribes of the Goshute Reservation, pulled in next to me. We spoke for a while, and then others started to arrive. The others included about 15 or 20 other people from 12 different indigenous nations.

 

Mr. Steele and Chief Johnnie Bobb both said prayers and burned sage as the sun rose over Spring Valley. I introduced myself to various people, including the woman who organized the run (Beverly Harry). I told her about the food, which she was happy about. Then the runners started out. I stuck around for a while and made some coffee for the elders. One of them asked me to join them in the run-walk, a great honor. I ended up doing 10 miles that day. We did it relay style, so at least one person from the group ran or walked every mile.

 

We covered 100 miles that first day, then stayed at Cathedral Gorge State Park. We had a nice night around the fire and got to know each other a bit better. I was able to stay through the second day. We covered another 75 miles the second day, and then I had to leave. The runners continued down to the Moapa Paiute reservation.

 

Our network against the water grab is growing. There were some solid people there. In the event SNWA begins to build the pipeline, there will be serious resistance.

 

 

** *** ***** ******* *********** *************

 

Oppression and Subordination

 

[Story] by Lierre Keith / Deep Green Resistance.

 

At this moment, the liberal basis of most progressive movements is impeding our ability, individually and collectively, to take action. The individualism of liberalism, and of American society generally, renders too many of us unable to think clearly about our dire situation. Individual action is not an effective response to power because human society is political; by definition it is built from groups, not from individuals. That is not to say that individual acts of physical and intellectual courage can’t spearhead movements. But Rosa Parks didn’t end segregation on the Montgomery, Alabama, bus system. Rosa Parks plus the stalwart determination and strategic savvy of the entire black community did.

 

Liberalism also diverges from a radical analysis on the question of the nature of social reality. Liberalism is idealist. This is the belief that reality is a mental activity. Oppression, therefore, consists of attitudes and ideas, and social change happens through rational argument and education. Materialism, in contrast, is the understanding that society is organized by concrete systems of power, not by thoughts and ideas, and that the solution to oppression is to take those systems apart brick by brick. This in no way implies that individuals are exempt from examining their privilege and behaving honorably. It does mean that antiracism workshops will never end racism: only political struggle to rearrange the fundamentals of power will.

 

There are three other key differences between liberals and radicals. Because liberalism erases power, it can only explain the subordinate position of oppressed groups through biology or some other claim to naturalism. A radical analysis of race understands that differences in skin tone are a continuum, not a distinction: race as biology doesn’t exist. Writes Audrey Smedley in Race in North America: Origin and Evolution of a Worldview,

 

Race originated as the imposition of an arbitrary value system on the facts of biological (phenotypic) variations in the human species.… The meanings had social value but no intrinsic relationship to the biological diversity itself. Race … was fabricated as an existential reality out of a combination of recognizable physical differences and some incontrovertible social facts: the conquest of indigenous peoples, their domination and exploitation, and the importation of a vulnerable and controllable population from Africa to service the insatiable greed of some European entrepreneurs. The physical differences were a major tool by which the dominant whites constructed and maintained social barriers and economic inequalities; that is, they consciously sought to create social stratification based on these visible differences.3

 

Her point is that race is about power, not physical differences. Racializing ideology was a tool of the English against the Irish and the Nazis against the Jews, groups that could not be distinguished by phenotypic differences—indeed, that was why the Jews were forced to wear yellow stars.

 

Conservatives actively embrace biological explanations for race and gender oppression. White liberals usually know better than to claim that people of color are naturally inferior, but without the systematic analysis of radicalism, they are stuck with vaguely uncomfortable notions that people of color are just … different, a difference that is often fetishized or sexualized, or that results in patronizing attitudes.

 

Gender is probably the ultimate example of power disguised as biology. There are sociobiological explanations for everything from male spending patterns to rape, all based on the idea that differences between men and women are biological, not, as radicals believe, socially created. This naturalizing of political categories makes them almost impossible to question; there’s no point in challenging nature or four million years of evolution. It’s as useless as confronting God, the right-wing bulwark of misogyny and social stratification.

 

The primary purpose of all this rationalization is to try to remove power from the equation. If God ordained slavery or rape, then this is what shall happen. Victimization becomes naturalized. When these forms of “naturalization” are shown to be self-serving rationalizations the fall-back position is often that the victimization somehow is a benefit to the victims. Today, many of capitalism’s most vocal defenders argue that indigenous people and subsistence farmers want to “develop” (oddly enough, at the point of a gun); many men argue that women “want it” (oddly enough, at the point of a gun); foresters argue that forests (who existed on their own for thousands of years) benefit from their management.

 

With power removed from the equation, victimization looks voluntary, which erases the fact that it is, in fact, social subordination. What liberals don’t understand is that 90 percent of oppression is consensual. As Florynce Kennedy wrote, “There can be no really pervasive system of oppression … without the consent of the oppressed.”4 This does not mean that it is our fault, that the system will crumble if we withdraw consent, or that the oppressed are responsible for their oppression. All it means is that the powerful—capitalists, white supremacists, colonialists, masculinists—can’t stand over vast numbers of people twenty-four hours a day with guns. Luckily for them and depressingly for the rest of us, they don’t have to.

 

People withstand oppression using three psychological methods: denial, accommodation, and consent. Anyone on the receiving end of domination learns early in life to stay in line or risk the consequences. Those consequences only have to be applied once in a while to be effective: the traumatized psyche will then police itself. In the battered women’s movement, it’s generally acknowledged that one beating a year will keep a woman down.

 

While liberals consider it an insult to be identified with a class or group, they further believe that such an identity renders one a victim. I realize that identity is a complex experience. It’s certainly possible to claim membership in an oppressed group but still hold a liberal perspective on one’s experience. This was brought home to me while I was stuck watching television in a doctor’s waiting room. The show was (supposedly) a comedy about people working in an office. One of the black characters found out that he might have been hired because of an affirmative action policy. He was so depressed and humiliated that he quit. Then the female manager found out that she also might have been ultimately advanced to her position because of affirmative action. She collapsed into depression as well. The emotional narrative was almost impossible for me to follow. Considering what men of color and all women are up against—violence, poverty, daily social derision—affirmative action is the least this society can do to rectify systematic injustice. But the fact that these middle-class professionals got where they were because of the successful strategy of social justice movements was self-evidently understood broadly by the audience to be an insult, rather than an instance of both individual and movement success.

 

Note that within this liberal mind-set it’s not the actual material conditions that victimize—it’s naming those unjust conditions in an attempt to do something about them that brings the charge of victimization. But radicals are not the victimizers. We are the people who believe that unjust systems can change—that the oppressed can have real agency and fight to gain control of the material conditions of their lives. We don’t accept versions of God or nature that defend our domination, and we insist on naming the man behind the curtain, on analyzing who is doing what to whom as the first step to resistance.

 

The final difference between liberals and radicals is in their approaches to justice. Since power is rendered invisible in the liberal schema, justice is served by adhering to abstract principles. For instance, in the United States, First Amendment absolutism means that hate groups can actively recruit and organize since hate speech is perfectly legal. The principle of free speech outweighs the material reality of what hate groups do to real human people.

 

For the radicals, justice cannot be blind; concrete conditions must be recognized and addressed for anything to change. Domination will only be dismantled by taking away the rights of the powerful and redistributing social power to the rest of us. People sometimes say that we will know feminism has done its job when half the CEOs are women. That’s not feminism; to quote Catharine MacKinnon, it’s liberalism applied to women. Feminism will have won not when a few women get an equal piece of the oppression pie, served up in our sisters’ sweat, but when all dominating hierarchies—including economic ones—are dismantled.

 

There is no better definition of oppression than Marilyn Frye’s, from her book The Politics of Reality. She writes, “Oppression is a system of interrelated barriers and forces which reduce, immobilize and mold people who belong to a certain group, and effect their subordination to another group.”5 This is radicalism in one elegant sentence. Oppression is not an attitude, it’s about systems of power. One of the harms of subordination is that it creates not only injustice, exploitation, and abuse, but also consent.

 

Subordination has also been defined for us. Andrea Dworkin lists its four elements:6

 

  1. Hierarchy

 

Hierarchy means there is “a group on top and a group on the bottom.” The “bottom” group has fewer rights, fewer resources, and is “held to be inferior.”7

 

  1. Objectification

 

“Objectification occurs when a human being, through social means, is made less than human, turned into a thing or commodity, bought and sold … those who can be used as if they are not fully human are no longer fully human in social terms.”8

 

  1. Submission

 

“In a condition of inferiority and objectification, submission is usually essential for survival … The submission forced on inferior, objectified groups precisely by hierarchy and objectification is taken to be the proof of inherent inferiority and subhuman capacities.”9

 

  1. Violence

 

Committed by members of the group on top, violence is “systematic, endemic enough to be unremarkable and normative, usually taken as an implicit right of the one committing the violence.”10

 

All four of these elements work together to create an almost hermetically sealed world, psychologically and politically, where oppression is as normal and necessary as air. Any show of resistance is met with a continuum that starts with derision and ends in violent force. Yet resistance happens, somehow. Despite everything, people will insist on their humanity.

 

Coming to a political consciousness is not a painless task. To overcome denial means facing the everyday, normative cruelty of a whole society, a society made up of millions of people who are participating in that cruelty, and if not directly, then as bystanders with benefits. A friend of mine who grew up in extreme poverty recalled becoming politicized during her first year in college, a year of anguish over the simple fact that “there were rich people and there were poor people, and there was a relationship between the two.” You may have to face full-on the painful experiences you denied in order to survive, and even the humiliation of your own collusion. But knowledge of oppression starts from the bedrock that subordination is wrong and resistance is possible. The acquired skill of analysis can be psychologically and even spiritually freeing.

 

Once some understanding of oppression is gained, most people are called to action.

 

Read more from the Deep Green Resistance book online.

 

 

** *** ***** ******* *********** *************

 

Guiding Principles of Deep Green Resistance

 

[Link] Statement of Principles

 

The soil, the air, the water, the climate, and the food we eat are created by complex communities of living creatures. The needs of those living communities are primary; individual and social morality must emerge from a humble relationship with the web of life.

 

Civilization, especially industrial civilization, is fundamentally destructive to life on earth. Our task is to create a life-centered resistance movement that will dismantle industrial civilization by any means necessary. Organized political resistance is the only hope for our planet.

 

Deep Green Resistance works to end abuse at the personal, organizational, and cultural levels. We also strive to eradicate domination and subordination from our private lives and sexual practices. Deep Green Resistance aligns itself with feminists and others who seek to eradicate all social domination and to promote solidarity between oppressed peoples.

 

When civilization ends, the living world will rejoice. We must be biophilic people in order to survive. Those of us who have forgotten how must learn again to live with the land and air and water and creatures around us in communities built on respect and thanksgiving. We welcome this future.

 

Deep Green Resistance is a radical feminist organization. Men as a class are waging a war against women. Rape, battering, incest, prostitution, pornography, poverty, and gynocide are both the main weapons in this war and the conditions that create the sex-class women. Gender is not natural, not a choice, and not a feeling: it is the structure of women’s oppression. Attempts to create more “choices” within the sex-caste system only serve to reinforce the brutal realities of male power. As radicals, we intend to dismantle gender and the entire system of patriarchy which it embodies. The freedom of women as a class cannot be separated from the resistance to the dominant culture as a whole.

 

** *** ***** ******* *********** *************

 

Evaluating Strategy

 

[Link] Editor’s note: The following is from the chapter “Introduction to Strategy” of the book Deep Green Resistance: A Strategy to Save the  Planet. This book is now available for free online.

 

Resistance is not one-sided. For any strategy resisters can come up with, those in power will do whatever they can to disrupt and undermine it. Any strategic process—for either side—will change the context of the strategy. A strategic objective is a moving target, and there is an intrinsic delay in implementing any strategy. The way to hit a moving target is by “leading” it—by looking slightly ahead of the target. Don’t aim for where the target is; aim for where it’s going to be.

 

Too often we as activists of whatever stripe don’t do this. We often follow the target, and end up missing badly. This is especially clear when dealing with issues of global ecology, which often involve tremendous lag time. We’re worried about the global warming that’s happening now, but to avert current climate change, we should have acted thirty years ago. Mainstream environmentalism in particular is decades behind the target, and the movement’s priorities show it. The most serious mainstream environmental efforts are for tiny changes that don’t reflect the seriousness of our current situation, let alone the situation thirty years from now. They’ve got us worried about hybrid cars and changing lightbulbs, when we should be trying to head off runaway global warming, cascading ecological collapses, the creation of hundreds of millions of ecological refugees or billions of human casualties, and the social justice disasters that accompany such phenomena. If we can’t avert global ecological collapse, then centuries of social justice gains will go down the toilet.

 

It’s worth spelling this out. There have been substantial improvements in humans rights in recent decades, along with major social justice concessions in many parts of the world. Much of this progress can be rightly attributed to the tireless work of social justice advocates and extensive organized resistance. But look at, for example, the worsening ratio between the income of the average employee and the average CEO. The economy has become less equitable, even though the middle rungs of income now have a higher “standard of living.” And all of this is based on a system that systematically destroys natural biomes and rapidly draws down finite resources. It’s not that everyone is getting an equal slice of the pie, or even that the pie is bigger now. If we’re getting more pie, it’s largely because we’re eating tomorrow’s pie today. And next week’s pie, and next month’s pie.

 

For example, the only reason large-scale agriculture even functions is because of cheap oil; without that, large-scale agriculture goes back to depending on slavery and serfdom, as in most of the history of civilization. In the year 1800, at the dawn of the industrial revolution, close to 80 percent of the human population of this planet was in some form of serfdom or slavery.51 And that was with a fraction of the current human population of seven billion. That was with oceans still relatively full of fish, global forests still relatively intact, with prairie and agricultural lands in far better condition than they are now, with water tables practically brimming by modern standards. What do you think is going to happen to social justice concessions when cheap oil—and hence, almost everything else—runs out? Without a broad-based and militant resistance movement that can focus on these urgent threats, the year 1800 is going to look downright cheerful.

 

If we want to be effective strategists, we must be capable of planning for the long term. We must anticipate changes and trends that affect our struggle. We must plan and prepare for the changing nature of our fight six months down the road, two years down the road, ten years down the road, and beyond.

 

We need to look ahead of the target, but we also need to plan for setbacks and disruptions. That’s one of the reasons that the strategy of protracted popular warfare was so effective for revolutionaries in China and Vietnam. That strategy consisted of three stages: the first was based on survival and the expansion of revolutionary networks; the second was guerrilla warfare; and the third was a transition to conventional engagements to decisively destroy enemy forces. The intrinsic flexibility of this strategy meant that revolutionaries could seamlessly move along that continuum as necessary to deal with a changing balance of power. It was almost impossible to derail the strategy, since even if the revolutionaries faced massive setbacks, they could simply return to a strategy of survival.

 

How does anyone evaluate a particular strategy? There are several key characteristics to check, based on everything we’ve covered in this chapter.

 

Objective. Does the strategy have a well-defined and attainable objective? If there is no clear objective there is no strategy. The objective doesn’t have to be a static end point—it can be a progressive change or a process. However, it should not be a “blank or unrepresentable utopia.”

 

Feasibility. Can the organization get from A to B? Does the strategy have a clear path from the current context to the desired objective? Does the plan include contingencies to deal with setbacks or upsets? Does the strategy make use of appropriate strategic precepts like the nine principles of war? Is the strategy consonant with the nature of asymmetric conflict?

 

Resource Limitations. Does the movement or organization have the number of people with adequate skills and competencies required to carry out the strategy? Does it have the organizational capacity? If not, can it scale up in a reasonable time?

 

Tactics. Are the required tactics available? Are the tactics and operations called for by the plan adequate to the scale, scope, and seriousness of the objective? If the required tactics are not available or not being implemented currently, why not? Is the obstacle organizational or ideological in nature? What would need to happen to make the required tactics available, and how feasible are those requirements?

 

Risk. Is the level of risk required to carry out the plan acceptable given the importance of the objective? Remember, this goes both ways. It is important to ask, what is the risk of acting? as well as what is the risk of not acting? A strategy that overreaches based on available resources and tactics might be risky. And, although it may seem counterintuitive at first, a strategy that is too hesitant or conservative may be even more risky, because it may be unable to achieve the objective. If the objective of the strategy is to prevent catastrophic global warming, taking serious action may indeed seem risky—but the consequences of insufficient action are far more severe.

 

Timeliness. Can the plan accomplish its objective within a suitable time frame? Are events to happen in a reasonable sequence? A strategy that takes too long may be completely useless. Indeed, it may be worse than useless, and become actively harmful by drawing people or resources from more effective and timely strategic alternatives.

 

Simplicity and Consistency. Is the plan simple and consistent? The plan should not depend on a large number of prerequisites or complex chains of events. Only simple plans work in emergencies. The plan itself must be explained in a straightforward manner without the use of weasel words or vague or mystical concepts. The plan must also be internally consistent—it must make sense and be free of serious internal contradictions.

 

Consequences. What are the other consequences or effects of this strategy beyond the immediate objective and operations? Might there be unintended consequences, reprisals, or effects on bystanders? Can such undesirable effects be limited by adjusting the strategy? Does the value of the objective outweigh the cost of those consequences?

 

A solid grand strategy is essential, but it’s not enough. Any strategy is made out of smaller tactical building blocks. In the next chapter, “Tactics and Targets,” I outline the tactics that an effective resistance movement to stop this culture from killing the planet might use, and discuss how such a movement might select targets and plan effective actions.

 

** *** ***** ******* *********** *************

 

Capitalism is Killing the World’s Wildlife Populations, not ‘Humanity’

 

[Link] by Anna Pigott, Swansea University / The Conversation

 

The latest Living Planet report from the WWF makes for grim reading: a 60% decline in wild animal populations since 1970, collapsing ecosystems, and a distinct possibility that the human species will not be far behind. The report repeatedly stresses that humanity’s consumption is to blame for this mass extinction, and journalists have been quick to amplify the message. The Guardian headline reads “Humanity has wiped out 60% of animal populations”, while the BBC runs with “Mass wildlife loss caused by human consumption”. No wonder: in the 148-page report, the word “humanity” appears 14 times, and “consumption” an impressive 54 times.

 

There is one word, however, that fails to make a single appearance: capitalism. It might seem, when 83% of the world’s freshwater ecosystems are collapsing (another horrifying statistic from the report), that this is no time to quibble over semantics. And yet, as the ecologist Robin Wall Kimmerer has written, “finding the words is another step in learning to see”.

 

Although the WWF report comes close to finding the words by identifying culture, economics, and unsustainable production models as the key problems, it fails to name capitalism as the crucial (and often causal) link between these things. It therefore prevents us from seeing the true nature of the problem. If we don’t name it, we can’t tackle it: it’s like aiming at an invisible target.

 

Why capitalism?

 

The WWF report is right to highlight “exploding human consumption”, not population growth, as the main cause of mass extinction, and it goes to great lengths to illustrate the link between levels of consumption and biodiversity loss. But it stops short of pointing out that capitalism is what compels such reckless consumption. Capitalism – particularly in its neoliberal form – is an ideology founded on a principle of endless economic growth driven by consumption, a proposition that is simply impossible.

 

Industrial agriculture, an activity that the report identifies as the biggest single contributor to species loss, is profoundly shaped by capitalism, not least because only a handful of “commodity” species are deemed to have any value, and because, in the sole pursuit of profit and growth, “externalities” such as pollution and biodiversity loss are ignored. And yet instead of calling the irrationality of capitalism out for the ways in which it renders most of life worthless, the WWF report actually extends a capitalist logic by using terms such as “natural assets” and “ecosystem services” to refer to the living world.

 

By obscuring capitalism with a term that is merely one of its symptoms – “consumption” – there is also a risk that blame and responsibility for species loss is disproportionately shifted onto individual lifestyle choices, while the larger and more powerful systems and institutions that are compelling individuals to consume are, worryingly, let off the hook.

 

Who is ‘humanity,’ anyway?

 

The WWF report chooses “humanity” as its unit of analysis, and this totalising language is eagerly picked up by the press. The Guardian, for example, reports that “the global population is destroying the web of life”. This is grossly misleading. The WWF report itself illustrates that it is far from all of humanity doing the consuming, but it does not go as far as revealing that only a small minority of the human population are causing the vast majority of the damage.

 

Global map of Ecological Footprint of consumption, 2014. Although the WWF report highlights disparity in consumption, it says nothing about the capitalism which produces this pattern. WWF Living Planet

 

From carbon emissions to ecological footprints, the richest 10% of people are having the greatest impact. Furthermore, there is no recognition that the effects of climate and biodiversity collapse are overwhelming felt by the poorest people first – the very people who are contributing least to the problem. Identifying these inequalities matters because it is this – not “humanity” per se – that is the problem, and because inequality is endemic to, you guessed it, capitalist systems (and particularly their racist and colonial legacies).

 

The catch-all word “humanity” papers over all of these cracks, preventing us from seeing the situation as it is. It also perpetuates a sense that humans are inherently “bad”, and that it is somehow “in our nature” to consume until there is nothing left. One tweet, posted in response to the WWF publication, retorted that “we are a virus with shoes”, an attitude that hints at growing public apathy.

 

But what would it mean to redirect such self-loathing towards capitalism? Not only would this be a more accurate target, but it might also empower us to see our humanity as a force for good.

 

Breaking the story

 

Words do so much more than simply assign blame to different causes. Words are makers and breakers of the deep stories that we construct about the world, and these stories are especially important for helping us to navigate environmental crises. Using generalised references to “humanity” and “consumption” as drivers of ecological loss is not only inaccurate, it also perpetuates a distorted view of who we are and what we are capable of becoming.

 

By naming capitalism as a root cause, on the other hand, we identify a particular set of practices and ideas that are by no means permanent nor inherent to the condition of being human. In doing so, we learn to see that things could be otherwise. There is a power to naming something in order to expose it. As the writer and environmentalist Rebecca Solnit puts it:

 

Calling things by their true names cuts through the lies that excuse, buffer, muddle, disguise, avoid, or encourage inaction, indifference, obliviousness. It’s not all there is to changing the world, but it’s a key step.

 

The WWF report urges that a “collective voice is crucial if we are to reverse the trend of biodiversity loss”, but a collective voice is useless if it cannot find the right words. As long as we – and influential organisations such as the WWF, in particular – fail to name capitalism as a key cause of mass extinction, we will remain powerless to break its tragic story.

 

** *** ***** ******* *********** *************

 

Contact Deep Green Resistance News Service

 

[Link] To repost DGR original writings or talk with us about anything else, you can contact the Deep Green Resistance News Service by email, on Twitter, or on Facebook.

 

Email: newsservice@deepgreenresistance.org

 

Twitter: @dgrnews

 

Facebook.com/dgrnews

 

Please contact us with news, articles, or pieces that you have written. If we decide to post your submission, it may be posted here, or on the Deep Green Resistance Blog.

 

** *** ***** ******* *********** *************

 

Aboveground Tactics and Operations

[Link] Editor’s note: The following is from the chapter “Tactics and Targets” of the book Deep Green Resistance: A Strategy to Save the  Planet. This book is now available for free online.

 

For me, nonviolence was not a moral principle but a strategy; there is no moral goodness in using an ineffective weapon.

 

—Nelson Mandela

 

Deeds, not words!

 

—Slogan of the Women’s Social and Political Union

 

Recall that all operations—and hence all tactics—can be divided into three categories:

 

Decisive operations, which directly accomplish the objective.

Sustaining operations, which directly assist and support those carrying out decisive operations.

Shaping operations, which help to create the conditions necessary for success.

 

Where tactics fall depends on the strategic goal. If the strategic goal is to be self-sufficient, then planting a garden may very well be a decisive operation, because it directly accomplishes the objective, or part of it. But if the strategic goal is bigger—say, stopping the destruction of the planet—then planting a garden cannot be considered a decisive operation, because it’s not the absence of gardens that is destroying the planet. It’s the presence of an omnicidal capitalist industrial system.

 

If one’s strategic goal is to dismantle that system, then one’s tactical categories would reflect that. The only decisive actions are those that directly accomplish that goal. Planting a garden—as wonderful and important as that may be—is not a decisive operation. It may be a shaping or sustaining operation under the right circumstances, but nothing about gardening will directly stop this culture from killing the planet, nor dismantle the hierarchical and exploitative systems that are causing this ecocide. Remember, the world used to be filled with indigenous societies which were sustainable and enduring. Their sustainability did not prevent civilization from decimating them again and again.

 

In this chapter we’ll break down aboveground and underground tactics into the three operational categories. For each class of operations, we’ll further break tactics down by scale for individuals, affinity groups, and larger organizations. This is summarized in Figures 13-1 and 13-2 below. As a rule, any tactic an individual can carry out can also be accomplished by a larger organization. So the tactics for each scale can nest into the next, like Russian matryoshka dolls.

 

Figure 13-1: https://i2.wp.com/dgrnewsservice.org/wp-content/uploads/sites/18/2018/10/Screenshot-84.jpg?ssl=1

 

Figure 13-2: https://i1.wp.com/dgrnewsservice.org/wp-content/uploads/sites/18/2018/10/Screenshot-85.jpg?ssl=1

 

Every resistance movement has certain basic activities it must carry out: things like supporting combatants, recruitment, and public education. These activities may be decisive, sustaining, or shaping, as shown in the illustration. And they may be carried out at different scales. Operations like education, awareness raising, and propaganda (shown under aboveground shaping) may occur across the range from the individual to large organizations. The scope of education may change as larger and larger groups take it on, but the basic activities are the same.

 

Other operations change as they are undertaken by larger groups and networks. Look in the underground tactics under sustaining. Individuals may use escape and evasion themselves, to start with. Once a cell is formed, they can actually run their own safehouse. And once cells form into networks, they can combine their safehouses to form escape lines or an entire Underground Railroad. The basic operation of escape and evasion evolves into a qualitatively different activity when taken on by larger networks. A similar dynamic is at work in recruitment; individuals are limited to mutual recruitment, but established groups can carry out organizational recruitment and training.

 

And, of course, some resistance units are too small to take on certain tasks, as we shall discuss. Individuals have few options for decisive action aboveground. Underground, they are limited in their sustaining operations, because secrecy demands that they limit contact with other actionists whom they could support. But once organizations become large enough, they can embrace new operations that would otherwise be out of their reach. Aboveground, large movements can use acts of omission like boycotts or they can occupy and reclaim land. And underground networks can use their spread for coordinated large-scale actions or even guerrilla warfare.

 

ABOVEGROUND TACTICS

 

Broadly speaking, aboveground tactics are those that can be carried out openly—in other words, where the gain in publicity or networking outweighs the risk of reprisals. Underground tactics, in contrast, are those where secrecy is needed to carry out the actions to avoid repression or simply to do the actions. The dividing line between underground and aboveground can move. Its position depends on two things: the social and political context, and the audacity of the resisters.

 

There have been times when sabotage and property destruction have been carried out openly. Conversely, there have been times when even basic education and organizing had to happen underground to avoid repression or reprisals. This means, explicitly, that when we use the term underground we do not necessarily mean acts of sabotage or violence: smuggling Jews out of Nazi Germany was an underground activity, and the Underground Railroad was by definition, er, underground. One of the most important jobs of radicals is to push actions across the line from underground to aboveground. That way, more people and larger organizations are able to use what was once a fringe tactic.1

 

Provoking open defiance of the laws or rules in question also impairs the ability of elites to exercise their power. The South African government, for example, was terrified that people of color in South Africa would simply stop obeying the law of the apartheid government. In even the most openly fascist state, the police force is still a minority of the population. If enough people disobey as part of their daily activities, then the country becomes ungovernable; there aren’t enough police to force everyone to perform their jobs at gunpoint.

 

When enough serious people have gathered to push a tactic back into the aboveground arena, those in power have few choices. If they continue to insist that the law be obeyed, resistance sympathizers may increasingly disregard any laws as dissidents begin to view the government as generally illegitimate—often a government’s worst nightmare. Or the government may offer concessions or change the law. Any of the above could be considered a victory. Usually governments strive to retain the image of control through selective concessions or legislation because the other road ends with civil unrest, revolution, or anarchy.

 

The cases of Dr. Martin Luther King Jr. and Malcolm X exemplifies how a strong militant faction can enhance the effectiveness of less militant tactics. In his book Pure Fire: Self-Defense as Activism in the Civil Rights Era, Christopher B. Strain explains that Martin Luther King Jr. pushed his agenda by using Malcolm X “to illustrate the alternative to legislative reform: chaos.… King would usually present the matter in terms of a choice: ‘We can deal with [the problem of second-class citizenship] now, or we can drive a seething humanity to a desperation it tried, asked, and hoped to avoid.’ … [He] suggested if white leaders failed to heed him ‘millions of Negroes, out of frustration and despair’ will ‘seek solace’ in Malcolm X, a development that ‘will lead inevitably to a frightening racial nightmare.’ ”2 But Strain emphasizes that King and Malcolm X were by no means enemies. “Despite their differing opinions, both men recognized that their brands of activism were complementary, serving to shore up the other’s weaknesses.”3

 

Some presume that Malcolm X’s “anger” was ineffective compared to King’s more “reasonable” and conciliatory position. That couldn’t be further from the truth. It was Malcolm X who made King’s demands seem eminently reasonable, by pushing the boundaries of what the status quo would consider extreme.

 

Pushing boundaries doesn’t have to involve underground property destruction or violence. Breaking antisegregation laws through lunch counter sit-ins, for example, pushed the limits of acceptability during the civil rights struggle. The second generation of suffragists, too, got tired of simply asking for what they wanted and started breaking the law. In both cases, the old guard activists were leery at first.

 

To be perfectly explicit: it isn’t just militants who can push the boundaries; even nonviolent groups can and should be pushing the envelope for militancy—vocally and through their actions—wherever and whenever possible. It’s hard to overstate the importance of this for any grand strategy of resistance. In this way, and many others, aboveground and underground activists are mutually supportive and work in tandem.

 

DECISIVE OPERATIONS ABOVEGROUND

 

Open property destruction is not always decisive. Take the Plowshares Movement activists, who break into military installations and use hammers and other tools to attack everything from soldiers’ personal firearms to live nuclear weapons, after which they wait and accept personal legal responsibility for their actions. There’s no doubt that this involves bravery—obviously it requires a lot of guts to take a sledgehammer to a hydrogen bomb—but these acts are not intended to be decisive. They are chiefly symbolic actions; neither the intent nor the effect of the action is to cause a measurable decrease in the military arsenal. (Presumably they could accomplish this if they really wanted to; anyone with the wherewithal to bypass military security and get within arm’s reach of a live nuclear warhead could probably do it more than once.)

 

In fact, open property destruction as a decisive aboveground tactic is historically rare. Remember, those in power view their property as being more important than the lives of those below them on civilization’s hierarchy. If large amounts of their property are being destroyed openly, they have few qualms about using violent retaliation. Because of this, situations where property can be destroyed openly tend to be very unstable. If those in power retaliate, the resistance movement either falters, shifts underground, or escalates. The Boston Tea Party is an excellent example. After the dumping of tea in December 1773, a boycott was imposed on British tea imports. In October 1774, the ship Peggy Stewart was caught attempting to breach the boycott while landing in Annapolis, Maryland. Protesters burned the ship to the waterline, a considerable escalation from the earlier dumping of tea. Within a year, mere property destruction segued into armed conflict and the Revolutionary War broke out.

 

Aboveground acts of omission are the more common tactical choice. An individual’s reduced consumption is not decisive, for reasons already discussed; in a society running short of finite resources like petroleum, well-meaning personal conservation may simply make supplies more available to those who would put them to the worst use, like militaries and corporate industry. But large-scale conservation could reduce the rate of damage slightly, and buy us more time to enact decisive operations, or, at least, when civilization does come down, leave us with slightly more of the world intact.

 

The expropriation or reclamation of land and materiel can be very effective decisive action when the numbers, strategy, and political situation are right. The Landless Workers Movement in Latin America has been highly successful at reclaiming “underutilized” land. Their large numbers (around two million people), proven strategy of reclaiming land, and political and legal framework in Brazil enable their strategy.

 

Many indigenous communities around the world engage in direct reoccupation and reclamation of land, especially after prolonged legal land claims, with mixed success. There are enough examples of success to suggest that direct reclamation can be successful, especially with wider support from both indigenous and settler communities. The specifics of conflicts like those at Kanehsatake and Oka, Caledonia, Gustafsen Lake, Ipperwash, and Wounded Knee (1973), are too varied to get into here. But it’s clear that indigenous land reclamations attack the root of the legitimacy—even the existence—of colonial states, which is why those in power respond so viciously to them, and why those struggles are so critical and pivotal for broader resistance in general.

 

SUSTAINING OPERATIONS ABOVEGROUND

 

Sustaining operations directly support resistance. For individuals aboveground, that means finding comrades through mutual recruitment or offering material or moral support to other groups. But individual mutual recruitment can be difficult (although this is easier if the recruiter in question is strongly driven, charismatic, well organized, persuasive, and so on). Affinity groups, with more people available to prospect, screen, and train new members, are able to recruit and enculturate very effectively. Individual recruiters have personality, but a group, even a small one, has a culture—hopefully a healthy culture of resistance.

 

Aboveground sustaining operations mostly revolve around solidarity, both moral and material. Legal and prisoner support are important ways of supporting direct action. So are other kinds of material support, fund raising, and logistical aid. The hard part is often building a relationship between supporters and combatants. There can be social and cultural barriers between supporters (say, settler solidarity activists) and those on the front lines (say, indigenous resisters). Indigenous activists may be tired of white people telling them how to defend themselves or perhaps simply wary of people whom they don’t know whether they should trust.

 

Propaganda and agitation supporting a particular campaign or struggle are other important sustaining actions. Liberation struggles like those in South Africa and Palestine have been defended internationally by vocal activists and organizers over decades. This propaganda has increased support for those struggles (both moral and material) and made it more difficult for those in power to repress resisters.

 

Larger organizations can undertake sustaining operations like fund raising and recruitment on a larger scale. They may also do a better job of training or enculturation. A single affinity group has many benefits, but can also be a bubble, a cultural fishbowl of people who come together because they believe the same thing. Being part of a larger network can mean that a new member gets a more well-rounded experience. Of course, the opposite can happen—dysfunctional large groups can quash ideological diversity. Often in “legitimate” groups that means quashing more radical, militant, or challenging beliefs in favor of an inoffensive liberal approach.

 

The converse problem is factionalism. There’s a difference between allowing internal dialogue and dissent, on one hand, and having acrimonious internal conflicts (like in the Black Panthers or the Students for a Democratic Society), on the other. The larger an organization is the harder it is to walk the line between unity and splintering (especially when the COINTELPRO types are trying hard to destroy any effective operation).

 

Larger organizations have a better capacity for sustaining operations (and decisive operations, for that matter) than individuals and small groups, but they rarely apply it effectively. Internal conflicts limit operations to the lowest common denominator: the lowest risk, the lowest level of internal controversy, and the lowest level of effectiveness. The big green and big leftist organizations will only go as far as holding press conferences and waving signs. Meanwhile, indigenous people who are struggling (often at gunpoint) to defend and reclaim their lands are ignored if they act outside the government land claims process. Tree sitters, even those who are avowedly nonviolent, get ignored by the big green organizations when police and loggers come in to attack them. The big organizations almost always fail to deploy their resources for sustaining operations when and where they are needed most. On a moral level, that’s deeply deplorable. On a strategic level, it’s unspeakably stupid. On a species and planetary level, it’s simply suicidal.

 

Of course, it doesn’t have to be that way. Effective resistance movements in history are usually composed of a cross section of many different organizations on many different scales, performing the different tasks best suited to them, and larger organizations are an important part of that. History has shown that it’s possible for large organizations to operate in solidarity and with foresight. Even if they don’t actually carry out decisive operations themselves, large aboveground organizations can offer incredibly important support.

 

SHAPING OPERATIONS ABOVEGROUND

 

Most day-to-day aboveground resistance actions are shaping operations of one kind or another. But many actions could be sustaining or shaping operations, depending on the context. Building a big straw-bale house out in the country would be considered a shaping operation if the house were built simply for the purpose of building a straw-bale house. But if that building were used as a retreat center for resistance training, it might then become part of sustaining operations. Consider the Black Panthers. A free breakfast program for children that was devoid of political content would have been a charity or perhaps mutual aid. A breakfast program integrated within a larger political strategy of education, agitation, and recruitment became a sustaining operation (as well as a threat to the state).

 

One of the most important shaping operations is building a culture of resistance. On an individual level, this might mean cultivating the revolutionary character—learning from resisters of the past, and turning their lessons into habits to gain the psychological and analytical tools needed for effective action. Building a culture of resistance goes hand in hand with education, awareness raising, and propaganda. It also ties into support work and building alternatives, especially concrete political and social alternatives to the status quo. As always, every action must be tied into the larger resistance strategy.

 

Most large organizations focus on shaping operations without making sure they are tied to a larger strategy. They try to raise awareness in the hopes that it will lead indirectly to change. This can be a fine choice if made deliberately and intelligently. But I think that most progressive organizations eschew decisive or sustaining operations because they simply don’t consider themselves to be resistance organizations; they identify strongly with those in power and with the culture that is destroying the planet. They keep trying to convince those in power to please change, and it doesn’t work, and they fail to adjust their tactics accordingly. The planet keeps dying, and people drop out of doing progressive work by the thousands, because it so often doesn’t work. We simply don’t have time for that anymore. We need a livable planet, and at this point a livable planet requires a resistance movement.

 

 

** *** ***** ******* *********** *************

 

Further news and recommended reading / podcasts

 

DGR member Kevin Haddock interviewed on RT France [French]

 

DGR book reviewed on prominent YouTube channel [French]

 

Resistance Radio with Jonathan Latham – October 7, 2018

 

Resistance Radio w/ Roderick Campbell – October 14, 2018

 

Resistance Radio w/ Lierre Keith, Deanna Meyer, & Stephany Seay – October 21, 2018

 

Resistance Radio w/ Thomas Linzey – October 28, 2018

 

Resistance Radio w/ Ron Sutherland – November 4, 2018

 

** *** ***** ******* *********** *************

 

How to support DGR or get involved

 

Guide to taking action

 

Bring DGR to your community to provide training

 

Become a member

 

** *** ***** ******* *********** *************

 

 

“Beforehand, all revolutions seem impossible. In retrospect, all revolutions seem inevitable.”

 

– Michael McFaul, Stanford Professor, Rhodes Scholar, former member of the National Security Council

 

 

Please feel free to forward this newsletter to those who will find it valuable. Permission is also granted to reprint this newsletter, but it must be reprinted in whole.

 

Honduran Migrant March: A Refugee Crisis Caused by US Policy and US Partners

Honduran Migrant March: A Refugee Crisis Caused by US Policy and US Partners

     by  Honduras Solidarity Network

On October 12, 2018, hundreds of women, men, children, youth and the elderly decided to leave Honduras as a desperate response to survive. The massive exodus that began in the city of San Pedro Sula, reached more than 3 thousand people by the time the group crossed to Guatemala. The caravan, which is headed north to Mexico first, and to the United States as the goal- is the only alternative this people have to reach a bit of the dignity that has been taken from them. They are not alone in their journey. Various waves of Hondurans, whose numbers increase every hour, are being contained by Honduran security forces on their border with El Salvador and Guatemala.

The Honduras Solidarity Network in North America condemns any threats and acts of repression against the refugee caravan, human rights activists and journalists that accompany their journey. The conditions of violence, marginalization and exploitation in which this refugee crisis find its origins, have been created, maintained and reproduced by US-backed social, economic and military interventionist policies, with the support of its Canadian and regional allies. We call on people in the US to reject the criminalization, prosecution, detention, deportation and family separation that threaten the members of this march and the lives of all those refugees forced from their homes in the same way. We urge a change of US policy in Honduras and to cut off security aid to stop human rights abuses and government violence against Hondurans.

This refugee crisis has been exacerbated by the governments of Guatemala and Mexico, who subservient to Donald Trump’s administration, have chosen the path of repression. Bartolo Fuentes, a Honduran journalist and spokesperson for the refugees, has been detained in Guatemala. Meanwhile the Mexican government has sent two planeloads of its National Police to the border with Guatemala. Irineo Mujica, a migrant rights activist and photojournalist, was arrested in Chiapas by agents of the Mexican National Institute of Migration when he was getting ready to support the Honduran migrant march. Today (Friday) in the afternoon, tear gas was fired into the group as they tried to come into Mexico on the border bridge. Honduran human rights organizations report that a 7 month old baby was killed.

The massive forced flight of people from Honduras is not new; it is the legacy of US intervention in the country. Since the 2009 US-backed coup in Honduras, the post-coup regime has perpetuated a system based on disregard for human rights, impunity, corruption, repression and the influence of organized crime groups in the government and in the economic power elite. Since the coup, we have seen the destruction of public education and health services through privatization. The imposition of mining, hydro-electric mega-projects and the concentration of land in agro-industry has plunged 66 percent of the Honduran population into poverty and extreme poverty. In the last 9 years, we have witnessed how the murder of Berta Cáceres and many other activists, indigenous leaders, lawyers, journalists, LGBTQ community members and students has triggered a humanitarian crisis. This crisis is reflected in the internal displacement and the unprecedented exodus of the Honduran people that has caught the public’s eye during recent days.

The fraudulent November 2017 elections, in which Juan Orlando Hernández -president since questionable elections in 2013- was re-elected for a second term in violation of the Honduran constitution, sparked a national outrage. The people’s outrage was confronted by an extremely violent government campaign with military and US-trained security forces to suppress the protests against the fraud. The result of the repression was more than 30 people killed by government forces, more than a thousand arrested and there are currently 20 political prisoners being held in pre-trial prison.

To the repression, intimidation and criminalization faced by the members of the refugee caravan, we respond with a call for solidarity from all the corners of the world. In the face of the violence that has led to the mass exodus of hundreds of thousands of Hondurans, we demand an end to US military and security aid to Juan Orlando’s regime, not as the blackmail tool used by Donald Trump, but as a way to guarantee the protection of the human rights of the Honduran people. We demand justice for Berta Cáceres, for all the victims of political violence as a consequence of the post coup regime, and the approval of the Berta Cáceres Human Rights in Honduras Act H.R. 1299. We demand freedom for all the  political prisoners in Honduras. We demand the US end the criminalization, imprisonment, separation, deportation and killing of migrants and refugees.

Today we fight so that every step, from Honduras to the north of the Americas, is dignified and free

Honduras Solidarity Network of North America

The Empowering Internet Safety Guide for Women

The Empowering Internet Safety Guide for Women

     by Sara Levavi-Eilat / vpnMentor

Have you ever been harassed in the street? Received a crass message on a dating app? Had a coworker make a comment about your appearance that just didn’t sit right?

You’re not alone.

With the #MeToo movement, it’s easy to log onto Twitter or Facebook and see just how many women are victims of sexual harassment. Whether in person or online, women everywhere have experienced it in one way or another. And with all the new ways the internet has opened avenues of communication, online harassment is more prevalent than ever.

According to a study by the Pew Research Center, most online abuse takes place on social media. Although men are also subject to online harassment – which includes name calling, derision, and physical threats – the study found that online, women are more than twice as likely as men to experience sexual harassment.

In addition, more than half of women ages 18-29 report having been sent sexually explicit images without their consent.

This number is only growing, and while 70% of women believe online harassment to be a major problem, not many know how to prevent it.

Women are often targeted simply because they are women. Attacks are often sexualized or misogynistic, and rhetoric tends to focus on their bodies and sexual violence. This is both physically and emotionally damaging, and women are often intimidated into silence, preferring to disengage rather than put themselves at risk.

However, there are ways we can protect ourselves.

This guide was written with the intention of empowering women to navigate the internet without fear. We discuss common occurrences in which women are subject to harassment in their daily lives – on social media, at work, while dating, and more – and give tips and advice on how women can take control.

It is important for us to note that some of the advice given here encourages anonymity, rather than risking being targeted. While this may seem to run counter to the idea of encouraging self-expression, we believe that every woman should be empowered to make that choice for herself.

Our job is to give you the tools you need to do that.

We hope this guide encourages women everywhere to defend and protect themselves, and to stand up to sexual harassment, both on and off the web.

Harassment on Social Media

The majority of online harassment takes place on social media, which makes sense given how much time most of us spend on these platforms. Broad social networks, often combined with anonymity, leads to a reality in which anything you post, tweet, or share opens you up to potential abuse.

Below, we delve into the most popular social media platforms, and show you how to protect yourself from creeps, trolls, and stalkers.

Twitter

Due to its public nature, Twitter is one of the most notorious social media platforms when it comes to online harassment. And it’s not just celebrities and public figures who get abuse heaped on them. There are endless stories of regular people who have been attacked, often for simply speaking out about political or feminist issues.

In fact, Amnesty International released a report chastising Twitter for not appropriately addressing harassment of women. In the study, dozens of women are quoted about the abuse they experienced on Twitter, many citing unsatisfactory responses from the social media site after having reported the incidents.

Often, the result is a silencing effect, in which women simply choose not to engage for fear of being harassed; many women end up censoring themselves or leaving the platform altogether.  And for some – particularly journalists and activists – this can be detrimental to their careers.

Things came to a head in October 2017 when a series of high profile sexual assault allegations spawned the viral hashtag #MeToo. The hashtag – used by women to identify themselves as having experienced sexual harassment or assault – took over Twitter in a matter of hours, and made crystal clear just how prevalent these incidents are.

Soon thereafter, actress Rose McGowen’s Twitter account was temporarily suspended after she tweeted a series of allegations against sexual predator Harvey Weinstein and several Hollywood bigwigs she claimed enabled him. The violation cited was that one of her tweets included a private phone number.

But with so many abusive tweets against women not resulting in suspended accounts,  many women had had enough. The resulting anger spawned the hashtag #WomenBoycottTwitter, which called on women to boycott the platform for a day in solidarity.

Twitter claims to have improved their system of addressing reports of harassment, but it’s still an issue, and there are still steps individual women can take to mitigate the chance of being targeted.

5 Ways to Protect Yourself on Twitter

1. Use Multiple Profiles

Women whose careers depend on keeping up a public profile may find it helpful to use multiple accounts.

Unlike some other social media platforms, according to Twitter’s terms of service, it’s perfectly acceptable to do this. In fact, businesses often do in order to target different audiences.

You’ll want to create a personal profile and a public one.

Your personal profile should have the strongest privacy settings. Since Twitter’s default setting is public, you’ll have to opt in to this.

Ordinarily, when your tweets are public, anyone can see them – even people who don’t have Twitter can potentially find them. But when your tweets are “protected,” only your approved followers can see them, and no one will be able to retweet them. Make sure that the only people you let follow you are people that you know and trust.

How to Change Your Privacy Settings on Twitter:

Click on your profile and go into Settings and privacy>Privacy and safety>Protect your Tweets.

Making this change retroactively protects your older tweets too. That said, it’s important to note that since Twitter has no control over outside search engines, older tweets may still be visible on the wider internet. So if you want true anonymity, you should open a new personal profile and protect your tweets from the get-go.

It’s also important to note that your replies to other tweets and mentions will also be protected, and will therefore only be seen by your approved followers. This obviously makes it a lot harder to engage in the type of public discussions for which Twitter is famous, so you’ll have to decide if having a private profile is worth it to you.

To create an additional account, click on your profile icon. Then click on the upside down caret next to your name. There you should be given the option to create a new account.

This second profile will be your public one. If you use Twitter for your job, this is going to be the one that represents you professionally, so make sure not to Tweet about anything too personal.

Another option is to simply keep this profile anonymous. That means not using your real name or photos of you, or tweeting anything that could be used to figure out where you live or work.

Note that you can’t keep both accounts open on the same browser at the same time. If you want to have them both open, either use different browsers, or use the Twitter-supported app, TweetDeck.

2. Report and Block Abusers

If you do receive an abusive tweet, you can block the person who sent it.

How to Block Someone on Twitter:

Click on the upside down carrot on the upper right hand corner of the tweet, and choose to block the user.

One of the problems with blocking is that it’s really easy for users to create new accounts – often termed “sock puppets” – that haven’t yet been flagged.

One way to deal with this is with the app Block Together. Block Together will automatically block any account that tries to follow you that’s been active for under 7 days, that has under 15 followers, or that your followers have blocked. It’s most helpful when you’re being attacked by an army of trolls.

In addition to blocking users, you can also report abusive incidents to Twitter.

How to Report Someone on Twitter:

Just click the upside down caret in the upper right corner of the tweet or account, select report, and follow the instructions.

Unfortunately, even though harassment is against Twitter’s user agreement, Twitter is infamous for not doing as much as it could to curb ugly behavior.

In fact, according to an  analysis from the nonprofit, Women Action and the Media (WAM!), 67% of women who reported abuse claimed to have notified Twitter at least once before.

Still, it’s definitely worth reporting abusive tweets and accounts, since doing so is really easy.

Twitter does not currently provide a way of checking the status of reports of abuse. That said, as of January 2018, Twitter notifies you of their assessment once the report has been processed.

3. Don’t Geotag

Geotagging is when your post includes the location from which it was sent. To keep yourself safe from doxing and stalking, it’s best not to use this function. Fortunately, geotagging requires you to opt in, so by default your location won’t be shown.

When you compose a tweet, you’ll see a location button at the bottom. (It looks like a dropped pin.) If you tap it, you’ll have the option of adding your location to your tweet.

Don’t do it.

Also, be aware that you could give away your location even without geotagging, simply by mentioning where you are. We know it’s fun to let people know in the moment that you’re enjoying a new gallery opening or a night on the town, but sometimes it’s better to wait and post about it later, when you’re not there anymore and can tweet about how much fun you HAD (past tense).

4. Prevent Doxing

The most extreme form of online harassment is doxing. Doxing is when someone’s personal information, such as their address, phone number, place of employment, banking details, and even information on their family members, is published online as a call for others to harass them.

You may have heard the term for the first time with reports of #gamergate back in 2014. Gamergate was a movement spawned by the angry ex of video game developer Zoe Quinn, who wrote a blog post accusing her of having slept with a journalist in exchange for a good review.

Despite the fact that no such review was ever written, the post was taken as a battle cry by an unruly mob of mostly white, male gamers, who saw not only their favorite pastime, but free speech and their very masculinity, as under attack by so-called social justice warriors.

The result?

Not only Quinn, but women who defended her, including game developer Brianna Wu and journalist Anita Sarkeesian, came under relentless attack by internet trolls who inundated them with a daily barrage of murder and rape threats, mainly via Twitter.

They were also doxed.

The effects throughout the gaming industry were chilling, and women continue to take extra precautions for fear that they will become targets.

For instance, Tessa,* a competitive intelligence analyst whose work requires her to interact with gamers, knows several women in the industry who have been stalked and harassed, and often faces flirtatious and disrespectful behavior herself. Because a lot of interactions take place on Skype, there’s no hiding the fact that she’s a woman. Still, she takes pains to conceal that she works directly for a gaming company, and doesn’t reveal any personal information about herself like her real name or location.

Of course, those in the gaming industry aren’t the only ones at risk for doxing. Today’s incendiary political climate has resulted in many losing their jobs and having to leave their homes after having been doxed for attending alt-right or antifa rallies.

But you don’t have to engage in controversial political activities to be doxed. Some have been doxed “accidentally.”

For instance, following the Boston Marathon bombing, a Brown University student was doxed when he was wrongly identified as the perpetrator, and following the Charlottesville Unite the Right rally, an Arkansas University engineer was doxed when he was mistakenly identified as a participant.

4 Ways to Keep from Getting Doxed

  1. Google yourself. A simple search will show you what kind of information about you is already online. If that includes data that can be used to identify you, see if you can have it taken down. Social media profiles have privacy settings that can easily be reset, and many websites, such as the White Pages, give you the option of opting out. Unfortunately, it may not be possible to scrub all your information from the internet, but at least searching will let you know what’s out there for others to find.
  2. Subscribe to a service that will delete you from data broker sites: If you find your information on a website like White Pages, chances are it also appears in other online directories, many of which won’t be easy to find. So if you have reason to believe you may targeted for doxing, consider paying for a service such as PrivacyDuck or DeleteMe.
  3. Check that your email account hasn’t been involved in a data breach:You can use the tool https://haveibeenpwned.com/ to see if your email address and password may have been exposed in one of the many large-scale data breaches that have occurred in the past few years. If they have, reset your password, and consider adding two-step verification to your account. This will provide an extra layer of security by requiring additional information (besides your password) in order to log in.
  4. Use a VPN: By using a virtual private network, you can encrypt all your online activity in order to protect yourself from hackers. VPNs work by tunneling your internet data through a third party server, keeping your IP address (and real location) from being exposed. Here are some VPNs we recommend.

5. Prevent Hackers from Taking Over Your Twitter Account
From former President Obama to Britney Spears, over the years plenty of celebrities have had their Twitter accounts hacked by people who want to harm their reputations and cause chaos. That said, regular people also have their accounts hacked with alarming frequency.

4 Ways to Keep Your Twitter Account from Being Hacked

  1. Create a strong password: This sounds obvious, but you’d be surprised how many people use weak, easily discoverable passwords. (Or maybe you won’t be.) To make a strong password, make sure it’s long, has capital and lowercase letters, and includes numbers and symbols.
  2. Enable login verification: This provides an extra layer of security when you’re logging in. Instead of just having to enter your password, you’ll also have to enter a code that Twitter sends to your mobile device. To enable this, click on your profile icon>Account>Security>Login verification. On the same tab you can also choose to require personal information when changing your password.
  3. Be wary of any third party app that requires access to your account: If you have any doubt as to whether an app is legit or not, don’t install it. In order to see which apps do have access to your Twitter account, click on your profile icon and go to Apps. To remove an app, click Revoke access.
  4. Watch out for shortened URLs: Given Twitter’s 280 character limit, it makes sense that lots of people use shortened URLs to link off the platform. The problem is, these make it hard to know where links are taking you, or if it’s to a malicious site. So if you want to be really cautious, don’t click on links you see posted on other people’s tweets.

A good indication that someone has been tampering with your account is if you notice unfamiliar activity, like following someone new or sending out tweets you don’t remember. If you do see this, the first thing you’re going to want to do is change your password. You should also report it to Twitter. You can do this by going to their help center and submitting a ticket.

You also want to submit a ticket if someone hasn’t actually hacked into your account, but has created a brand new one under your name. To help Twitter know that you’re really you, you’ll have the option of uploading an image of a government issued ID or other form of identification.

Facebook

Rachel didn’t think much of it when during a routine Facebook scroll she clicked that she was interested in attending a concert by one of her favorite bands. But she was excited when one of the members of the band friend requested her and started sending her private messages.

The conversation started out casual, but soon he began alluding to her profile picture, telling her that he liked that she didn’t care that her nipple was showing.

Wait, what?

Her nipple was definitely not showing. Or was it? Rachel had been using that profile picture for two years already, and no one had ever said anything. She enlarged the photo and carefully examined it. Maybe what he saw was the shadow from her top?

She told him he was mistaken, and tried to explain the shadow, giving him the benefit of a doubt that he was just confused. But he was insistent, and was soon asking for more nude pics.

In retrospect, Rachel knew she should have stopped the conversation there and blocked him, but at the time it seemed like just a weird misunderstanding. It was kind of a provocative photo, wasn’t it? Maybe she should have expected this kind of a reaction.

She tried to steer the conversation back toward his music and the upcoming concert, but he was like a dog with a bone, and wouldn’t let up on his requests for more photos. Finally she just stopped answering, but she felt pretty icky for a few days after, wondering how others had been viewing her all this time.

Rachel’s story isn’t so shocking. It’s not violent. No one got raped. It actually sounds like a pretty run-of-the-mill social media encounter. But in fact, it’s the banality of it that makes it so depressing. Every day women get solicited by strangers and end up wondering what they did to cause it, and have to walk around knowing that while they’re just trying to live their lives, others are objectifying them.

Research shows that the emotional toll these type of interactions take is especially severe for women, who are twice as likely as men to describe their most recent experience of online harassment as very or extremely upsetting.

And soliciting sexy photos is just one of the myriad forms Facebook harassment can take. Women are regularly sent abusive messages and unwanted dick pics, and instances of being tagged in degrading pictures or even having fake profiles created using their names and photos are far from uncommon.

5 Ways to Protect Yourself on Facebook 

1. Control Exactly Who Sees What

In past years Facebook has done a lot to update the platform to allow you to customize these options, even going as far as letting you hide your info from specific people.

How to Control What People See on Your Facebook Profile:

On your computer, click the upside down caret on the upper right corner of the page and select settings. On the panel on the left click Privacy. From here you’ll be able to manage exactly who can see your posts and how people can contact you.

Next, go to Timeline and Tagging. This lets you control who gets to post on your wall and who gets to see posts you’re tagged in. Here you can also change your settings so you get to review and approve any tags before they get implemented.

Another cool tool you can use is the one that lets you see exactly what others see when they look at your profile. That way you can be sure that certain people won’t see sensitive information if you don’t want them to.

2. Don’t Let Potential Stalkers Know Where You Are

As has been discussed above, tagging your location on posts and photos can be a way for stalkers to find out where you are. On Facebook, when you write a post, you have the option to select Check in, which will add your geolocation for any of your friends to see. It’s best not to use this function.

But Geotagging isn’t the only way people can figure out where you are.

Ever notice how after going to a particular store you suddenly start seeing ads for it on Facebook? Or you meet someone at a party and the next day Facebook suggests them as a friend?

The way Facebook knows to do that is because if you have their mobile app, and you carry your phone around with you (as most of us do) they know your location wherever you go.

If you want, you can actually see exactly where Facebook has been tracking you. This information is not public, so you don’t have to worry about your average Facebook friend using it to locate you.

How to See Where Facebook Has Tracked Your Location:

Go to Settings. Click Location on the panel on the left, and then click View location history. A map will appear along with with a log showing your location for as long as you’ve had location settings enabled. For some, that’s going back years.

 

How to Delete Your Location History:

Click on the three bars on the upper right corner of the screen (or lower right if you have an iPhone). Select Account settings> Location. Tap to turn off Location Services, and below, slide left to turn off Location History.

To delete all your past history, click View your location history and select the three dots in the upper right corner. There you’ll have the option to delete your entire history. You’ll need to re-enter your password to do this. (Resetting your password is actually another great way to prevent others from accessing your location or your Facebook account in general.)

3. Block Harassers and Put Creeps on Your Restricted List

Another helpful option on this page is to place particular people on a restricted list. By putting them here, they’ll be listed as one of your friends, but will only be able to see information that you share publicly. This is especially useful if you want to avoid confrontation with someone you fear will try to intimidate or take advantage of you.

Although it’s easy to say you should be straightforward and be able to tell someone to their face that you don’t want them seeing the personal stuff you post, we all know how quickly a situation can escalate when a certain type of man feels rejected.

So next time you meet a guy at a bar who insists on friending you and watching you accept his request, just slip into the ladies’ room for minute and stick him on your restricted list.

4. Report Imposter Accounts

Even though it goes against their terms of service, Facebook estimates that there are currently66 million fake accounts on the platform. One reason people create fake accounts is to impersonate other users. By using your real name and photos, an imposter is able to friend people in your real life social network, and then post harmful and untruthful content about you.

If you find a fake account using your photos and personal information, you can report it to Facebook and they should take it down.

How to Report a Fake Profile on Facebook:

Go to the fake profile, click on the three dots at the upper right corner of the page, and select Report>Report this profile>They’re pretending to be me or someone I know.

That said, a smart imposter is going to block you so you can’t see the fake account.  If they do that, enlist a friend to report the profile for you.

Facebook has also been trying to be proactive in identifying imposter accounts, and has recently announced an initiative that uses its facial recognition software to flag new profile pictures featuring existing users.

It should be noted, however, that only new accounts will be scanned, so if there’s already a fake profile of you up, unless you or someone you know finds and flags it, there’s no way to catch it. Moreover, the only photos that will be scanned for your face are those within your friend, or friends of friends network –  rather than all the users on the platform.

This calls into question how effective the tactic really is, especially considering how oftenprofiles are faked not in order to carry out personal vendettas, but instead to scam people out of money or promote products or political agendas. Specifically, recent probes into the 2016 American presidential election have revealed an entire industry of Facebook activity artificially generated to sway public opinion.

In these cases, one simple way to protect yourself is to make most of your photos private. If the person making the sham account doesn’t have access to your photos, you’ll be a less attractive target for impersonation.

5. Prevent Revenge Porn

In recent years, sexting has left the realm of kink and become a standard mode of flirtation. In fact, according to one study, 88% of the adults surveyed said they had sent sexually explicit messages or images at least once. This isn’t necessarily a bad thing; the same study showed a correlation between sexting and sexual satisfaction, and found that women often find it particularly empowering.

That said, sending revealing photos can be risky if they get into the wrong hands. Far too many women have found themselves the object of humiliation campaigns, in which vindictive former partners make their lives hell by sending intimate images to their friends, family members, and even employers.

Fortunately, Facebook already has an algorithm that identifies and removes nude images. However, in November 2017 they also announced a new, somewhat novel approach to addressing the ugly epidemic of revenge porn. But the idea, which is first being tested in Australia, is bound to raise some eyebrows.

Basically, if you suspect a particular image may be uploaded to Facebook without your consent, you fill out a form explaining your concern, and then send the image to yourself using the Facebook Messenger app. After assessing the report and the photo, Facebook will then delete it.

Because Facebook owns Instagram, this will prevent the image from being disseminated there as well.

There are a few issues with this approach. First, you have to know the images are out there in the first place. (Sometimes photos and videos are taken without the victim’s knowledge or consent.) Second, you have to have the images in your possession – which may not be the case if they were taken using someone else’s camera. And finally, you have to trust Facebook, and accept that a real person on their end is going to see pictures you explicitly don’t want out there for public consumption.

For many, knowing some anonymous techie has access to their intimate photos, even for a short time, will add to the trauma and anxiety they’re already experiencing.

Instagram and SnapChat 

Photos were not the only thing that changed when Instagram started in 2010 and SnapChat in 2012. Online harassment did too.

By making your photos public, anyone can comment on your pictures. Although it’s hard to understand why someone would dedicate their time to being a troll, there are those who have a field day searching for photos to insult. Public body shaming comments and DMs (Instagram’s version of a private message) with explicit and vulgar language plague millions of accounts every day.

Besides trolling, many women are susceptible to revenge porn, dick pics, and other non-consensual nude photography.

With different techniques, you can fight back and even prevent some of these scenarios from happening in the first place. Yes, trolls and jerks will find a way to you if you’re persistent enough, but by taking the following steps, you can make it that much more difficult for them.

3 Ways to Protect Yourself on Instagram and SnapChat

1. Check Your Pictures for Identifying Data

There are some simple things you can do to make your photos and account a bit safer.

Let’s say you’re at a restaurant and want to Insta a picture of your dish. It’s nice to tag the restaurant because it gives them PR. But, by tagging this restaurant, you place yourself in that location.

Any stalker now knows exactly where you are.

Similarly, if you enable geolocation settings, you’re even more at risk. If you snap a picture of your caramel latte from Starbucks, you can be at any of the 27,339 Starbucks around the world. But if your geolocation is on, whoever sees your picture will know exactly where you are.

Snapchat unveiled a new feature in June 2017 called SnapMap, which shows the locations of all of your friends on a map. While this might seem innocent, it actually let’s others keep constant track of your whereabouts. Turn off the SnapMap feature, and you’ll save yourself from a lot of potentially ugly situations.

2. Don’t Use Your Real Information

When you sign up for SnapChat, you are required to provide your birthday, phone number, and email address – pretty standard for social media apps. But anyone with the slightest bit of tech savvy can then find that information through your SnapChat account. This makes it extremely easy for someone to take their harassment off SnapChat and onto email, WhatsApp, and plenty of other apps.

The best way to protect your information is to hide it. Create a new email address to sign up. Also, use a fake phone number (you know, the one you might give to a creepy guy at the bar who you don’t want to call you), and make up a new birth date.

Another simple trick that makes it much harder for trolls to access you is to change your account from public to private. This goes for both Instagram and Snapchat. Changing your account to private will limit the people who see your posts to friends, family, or anyone else you choose to approve.

How to Make Your Account Private on SnapChat:

Go to Settings>View My Story>My Friends/Custom. While you’re in Settings you can change who can contact you and who can see your location.

 

How to Make Your Account Private on Instagram:

Go to Settings>Private Account (slide right to enable).

If you need to use these apps to promote a product, your company, or yourself, then create a separate account. This way, your personal photos won’t get mixed up with your public photos.

That said, even if you do all that, rude comments could slip through the cracks. In that case, you’ll need to know how to…

3. Block Creeps Both Instagram and Snapchat have blocking options. Using this technique, you can block a user and then delete their comments

How to Block People on Instagram:

Select the person you want to block, tap the three dots in the upper right corner, and then click block.

 

How to Block People on SnapChat:

Select the person you want to block, tap the three lines on the upper left corner, and then click block.

Harassment at Work 

Unfortunately, abuse is also prevalent in work environments. According to one studyone in three women ages 18-34 has been sexually harassed at work. 25% of those women were harassed online via texts or emails, yet 71% of these women did not report it.

We can only speculate the reasons for this, but one could be because sexual harassment is not clearly defined.

However, some examples of sexual harassment include:

1. Sharing sexually innaproporiate images or videos.

2. Sending letters, texts, or emails with suggestive content.

3. Telling lewd jokes or sexual anecdotes.

But even these are ambiguous! If someone sends a dick pick, that is clearly sexual harassment, but an off-hand comment could be misconstrued.

So, how do you know it’s sexual harassment?

For those moments where you’re not sure, think about how you feel. Did that comment make you uncomfortable? Is there something off-putting about it? If yes, chances are there’s an underlying tone that should be considered sexual harassment.

Sexual Harassment at Work

Sexual harassment comes in different forms, and when it’s online it’s often even less obvious. Yet, it still happens. If you’re in a professional situation where you feel uncomfortable, you should immediately start recording it. Often larger cases are built on a pattern of small incidents, which, if not documented properly, won’t be useful as evidence.

Even if you’re not sure if an encounter counts as harassment, it’s better to treat it as such just in case the situation gets worse and you decide to eventually take action.

How to Report Harassment at Work 

1. Document Every Encounter

Any comment, inappropriate email, or other correspondence that can possibly qualify as harassment should be recorded and stored somewhere where only you have access to it (not on the company’s Google Drive, for instance). It could be that one comment was unintentional, but if it happens again, you’ll be able to build a case.

If an encounter involves something said verbally or inappropriate touching, as soon as possible, write yourself an email (from your personal account) describing the incident in as much detail as you can. Include the time, date, and location of the incident.

2. Monitor the Situation

Take screenshots, record times and dates, save emails, and keep a file of everything that makes you uncomfortable.

3. Report It

Once you have evidence, it’s time to file a report. While it is sometimes uncomfortable, reporting harassment in the office is one of the most productive ways you can stop it.

Send your evidence to the HR department, which hopefully already has a policy in place as to how to proceed. If there is no HR at your company, then you should construct a well-informed email and send it to office management or to your manager (as long as they are not the one harassing you).

How to Write an Email to Report Sexual Harassment:

It can seem daunting to construct that first email. For this reason, we included a template for you to use.
Subject line: Official complaint of sexual harassment

Dear [HR] and [boss],

I am writing this email to notify you that [name of harasser] has been sexually harassing me for the past [x amount of time].

The following incidents have occured during that time:

  • [Example 1: Describe what happened and when. Try to include as many facts as possible. ]
  • [Example 2: Describe the second incident that made you feel uncomfortable. Remember to include if you told anyone else at work about it.]
  • [Example 3: Attach any documents or evidence that will support your case.]

[If applicable, include what actions you believe the company should take. For instance, you can write, “I would like to be transferred to a different department” or “I would like this matter to be looked into, and I would like a formal apology from [name of harasser].”]

Thank you for looking into this matter. Should you need any more information, I am happy to provide it.

Sincerely,

[Your name]

Your office should have a policy on how to assess the situation and take action.

If you don’t feel as though your complaint was adequately addressed, remember that you can always seek outside legal counsel. A professional well-versed in the laws in your area should be able to guide you in your next steps.

We should also note that for many, reporting the incident internally is not an option, as many women freelance or are self-employed. In this scenario, you need to take the situation into your own hands.

Sexual Harassment if You’re Self-Employed 

If you’re self-employed and experience an inappropriate encounter, since there’s no one to report to, you need to take care of the situation yourself.

This is exactly what happened to Ariel*, a musician who received sexually charged messages from another professional in her industry. After commenting on the way she shakes while playing music, Ariel responded “don’t be an ass” to which the harasser responded “Oh, I love the way you talk.”

While Ariel decided not to publicly shame him, she did respond that his comments were suggestive and aggressive. The harasser disagreed and left it at that.

Ariel found it empowering to confront the harasser head on. Others may find that the best method of self-preservation is to ignore the harassers. There’s no right or wrong way to address harassment in this scenario. It is your decision.

Sexual Harassment on LinkedIn 

LinkedIn, an online platform for career-networking and business, has unfortunately also become an outlet for sexual harassment. While LinkedIn’s policy prohibits any form of harassment, there’s no way for LinkedIn to totally prevent it, and – unfortunately – sexual harassment still happens there every day.

Because it’s a networking site, some treat it like a dating site. Among other complaints, women have reported men sending them inappropriate messages, and making lewd comments on their appearance based on their profile pictures.

Another potential pitfall: your resume.

Many people upload their resumes without considering that their email address and phone number appear in the header. Unless you want the entire internet to have access to that information, delete it from the version you post.

Unwanted phone calls asking to go out may not seem like sexual harassment to some men, but for women receiving phone calls from strangers, it could definitely feel like it.

But, that’s the problem. Because most harassment is not so blatant, it’s harder for women to validate and report it. While you can’t prevent creepy guys from messaging you on LinkedIn, there are ways you can protect yourself.

4 Ways to Protect Yourself on LinkedIn 

1. Before accepting a LinkedIn connection, check the degrees of separation. Do you have connections in common? Do they work in your industry? If not, don’t accept.

2. If you receive an unsolicited message, you can decide to block them. Just click on the three dots at the top right and then click Report this conversation.

3. You can also block that person from viewing your profile or contacting you. Go to the person’s profile, click More>Report/Block and follow the instructions.

4. If you upload your resume, check to make sure your phone number, home address, and other contact information are not listed. If someone wants to contact you for your work, they can do it through LinkedIn.

There is no guarantee that these suggestions will protect you 100%. However, they do provide you with more control regarding who can contact you.

Online Dating and Sexual Harassment  

Kylie* had been chatting with Marco* for about a month after having connected on OKCupid, but they hadn’t yet met in person. One night, after over an hour of increasingly flirty texts, Marco suggested that they switch to a more visual forum – he wanted to Skype sex.

The next day, Kylie was horrified when one of her friends called to tell her that she received a recording of the encounter. An hour later, Kylie got a message from Marco: pay up, or the recording would be sent to even more people in her social network.

Online dating is where women are most vulnerable to cyber-sexual harassment.

That’s because unlike most social networks, dating sites are where you go with the express purpose of meeting, and potentially getting intimate with strangers. Whereas on other sites strict privacy settings could serve as a shield, on dating sites those tactics for staying safe would just result in another solitary Saturday night.

While dating apps are supposed to be fun, they’ve also been known to lead to some pretty unpleasant encounters.

For instance, Esme* met Raphael on the app Happn. After chatting on the app, the conversation moved to WhatsApp, but when Esme checked his profile picture, she noticed Raphael looked different and his profile did not match the one on the dating app. Not wanting a confrontation, she told Raphael that she had some personal issues to work out before she was ready to date. Instead of accepting her explanation, he started bombarding her with aggressive questions about where she was and who she was with.

Finally, Esme blocked him and reported him to Happn. Knowing he would seek her out on social media she also blocked him on Facebook, WhatsApp, and Instagram. And when he tried to call her, she blocked his number too. Whether Raphael finally got the hint (unlikely) or simply found it too hard to maintain contact, Esme was able to stop the abuse – but not all women are this lucky.

What happened to Esme is known as catfishing – or when someone misrepresents themselves online, often using fake photos and profiles. While Esme was able to clearly see that the person on the Happn profile was different from the person in the WhatsApp profile, most catfishers are smart enough to better hide their tracks.

Similarly, it’s pretty easy to unknowingly become the accomplice of a catfisher. Take Cori*, for instance. One day she got a call from a friend that her Facebook profile picture was being used on someone else’s dating profile. Cori reported the fake profile and it was deleted, but who knows how many people saw her face and information before then?

Unfortunately, there’s no way to both meet people online and ensure you’ll never be a victim. However, there are ways to protect yourself.

3 Ways to Protect Yourself on Dating Sites

1. Do a Background Check

When you first connect with someone online, search them on Google, Facebook, and other dating apps if you’re on them. Look for inconsistencies in their pictures and profile descriptions. If you find any, report the profile to your app.

2. Get to Know Them on the App

Chat on the app before moving the conversation to a different platform. This gives you a sense of who they are before exposing further details about your personal life. Once you do feel comfortable enough to move the conversation to another platform, be aware of what they can see there. For instance, both WhatsApp and Telegram allow profile photos, WhatsApp allows status updates, and Telegram lets you write a little bio about yourself. Both apps also have a “last seen” feature that shows your contacts when you were last on the app. If you don’t want someone to see any of this information, change your privacy settings. And if you do end up getting together in person, make sure to meet in a public place, and let a friend know where you’ll be.

3. Keep Your Social Media Accounts and Pictures Private.

This minimizes the chance of someone stealing your pictures and using them on dating sites.

Safe Sexting

Most adults are familiar with safe sex. But what they may not have given much thought to is safe sexting.

This is especially important, since sexting is on the rise. In fact, according to one studynearly half of the adults surveyed said that they sext.

However, the fact that a lot of people do it doesn’t mean it’s not without its risks. Stories of revenge porn and hacks that have exposed people’s intimate photos are commonplace. And it’s not hard to imagine how having your nudes fall into the wrong hands could devastate your professional and personal life.

The easy answer would be to tell you to stop sexting, but we’re not going to do that. Sexting can be a fun and fulfilling part of your relationship or dating life, and we’re not here to deny you a good time.

What we are going to do is give you some easy tips on how sext safely. Some of these may seem like common sense, but we’re also going to get into some high tech hacks so you can relax while your smartphone gets steamy.

7 Ways to Protect Yourself While Sexting 

1. Don’t Include Your Face or Other Identifiable Features

Your first line of defense if your photos go public is plausible deniability. That means making sure your pics don’t include your face, unusual birthmarks, or tattoos.

2. Don’t Drunk Sext

You may be feeling frisky after a couple of margaritas, but that doesn’t mean it’s the best time to unbutton your top and bust out your camera.

Fortunately, there are several apps available that can prevent morning after regrets. For instance, Drunk Locker is a really comprehensive app for when you know you’re going to be partying. Besides finding you a designated driver, it can also block certain contacts so you can’t get in touch via calls, texts, and social media.

3. Make Your Photos Self-destruct

The app Disckreet is specifically designed for sexting, and requires that both the sender and the receiver input a passcode in order to see a sent image. The main benefit Disckreet offers is that it allows you to delete you images from the phone of the person you sent it to. That said, there’s nothing stopping the person receiving your photos from taking a screenshot and saving them.

An app that somewhat gets around the screenshot issue is the popular SnapChat, whichautomatically deletes photos a few seconds after they’re opened. Although SnapChat allows screenshots, it’ll send you a notification when one is taken. That said, it’s not a perfect solution, because a little Googling provides several ways to bypass the notification – so it’s still possible for someone to save your photo without you knowing.

Confide, a well-encrypted app that automatically deletes messages and photos, doesn’t allow receivers to take screenshots. But again, if someone is really committed to saving your nudes, they’ll find a way.

4. Password Protect Your Phones and Photos

To ensure that no one accidentally gets an eyeful when scrolling through your or your partner’s phone, both of you should protect your phones with passcodes.

You can also download an app that will keep your sexy photos in a seperate, password protected folder. Some options are KeepSafe and Gallery Lock. One of the cool things about Gallery Lock is that you can choose to keep the icon hidden, so others won’t realize it’s on your phone. Plus, if someone repeatedly tries to login and fails, the app will take their picture.

Be aware, however, that not all these apps provide encryption, meaning you could be at risk of having your photos hacked.

5. Securely Save Your Photos

If you happen to snap a pic that makes your butt look like the work of art you know it to be, you may opt to save it rather than have it self-destruct. In that case, it’s better to store it on a desktop, rather than a mobile device, which is more likely to get lost or stolen.

Bear in mind though, even on a desktop it’s possible to get hacked. Therefore, you should save your sensitive photos in an encrypted file. VeraCrypt is a free open source program that allows you to encrypt individual files on either your Mac or your PC.

Bear in mind though, that once your photos are in an encrypted folder, you still need to permanently erase them from your computer. It’s not enough to put them in the trash and then take out the trash.

Until that data is overwritten by new data, it still exists and can be found by an enterprising hacker. Fortunately, there’s software out there to permanently delete files. For Windows, one of the most popular free options is Eraser, and for a Mac you can use Permanent Eraser.

6. Don’t Sync Your Photos

If you have an Android, it’s likely that your photos get automatically saved to to Google Photos, and if you have an iPhone, they get saved to the iCloud.

You may recall the infamous iCloud hack of 2014, in which the private photos of several (mostly female) celebrities, including Jennifer Lawrence and Kirsten Dunst, were leakedfollowing a phishing attack. Since you don’t want that happening to you, you’re best bet is to keep your sensitive photos off the cloud.

That said, we don’t recommend disabling automatic syncing, since that can lead to your losing your info in the event that your phone gets lost or stolen. Instead, you should log into Google Photos or iCloud and delete them individually. Be aware though, that if you have automatic syncing on, this could result in the photo also being deleted from your phone the next time it syncs. So if you want to save the photo, back it up somewhere else – preferably in an encrypted folder (see above).

7. Don’t Send Pictures to People You Don’t Trust

We know, this seems really obvious, but with 16% of people reporting having sent sexts to complete strangers, it’s worth emphasizing.

Not sending potentially compromising photos to someone you’re not sure about is especially important, since as you may have noticed from this list, there’s no condom for sexting, so there’s no way to stay totally safe. So take the precautions you can, and choose your sexting partners wisely.

IRL (In Real Life) Attacks 

Obviously, attacks on women don’t just happen online. Often attacks spill over to the real world, with perpetrators using technology to help them stalk and abuse their victims. In fact, a survey of victim aid providers revealed that 79% dealt with victims who had been surveilled using social media.

Sometimes perpetrators are people we know, like a controlling partner. Other times, attacks are crimes of opportunity, like stealing a cell phone, or taking advantage of someone who’s simply in the wrong place at the wrong time.

In any case, from giving a friend the heads up as to where you’ll be, to encrypting the data on your mobile devices, to keeping your passwords secure, there are precautions you can take to keep yourself safe.

How to Safely Use a Ridesharing App 

Back in 2014, a woman in New Delhi was raped by her Uber driver. After it was revealed that the driver had a decade-long criminal record that included sexual assault, some were calling for the ridesharing app to be banned altogether.

After a slew of bad press, Uber now has a new CEO at the reigns. And it looks like the company is finally ready to take passenger safety seriously by rolling out some new initiatives.

The main one that has already been implemented allows you to share your ride with up to five trusted contacts. This means your friends can follow along during your trip and see that you arrived at your destination. If you want, you can also set the trusted contacts feature so that it’s only enabled for nighttime rides.

Trusted contacts is similar to Lyft’s Send ETA feature, which allows you to send your route and estimated time of arrival to a friend. For both Uber and Lyft, these messages include the car’s make and model, the license plate number, and a photo of the driver.

Uber also has a 911 feature in the works that will allow you to call emergency services with a click of a button, and which automatically provides them with your location in real time. Other initiatives that Uber is planning include driver background checks and scans of new DUI and criminal offenses that can be checked against their list of drivers.

In the meantime, here are a few steps you can take yourself in order to stay safe.

5 Ways to Protect Yourself While Using a Ridesharing App 

1. Make Sure You’re Getting into the Right Car

Before hitting the road, check the car’s license plate, make and model, and the driver’s name and photo to make sure everything matches up.

2. Don’t Let Your Driver Know if Your Pick-up Point or Destination is Your Home or Place of Work

In fact, if it is, you might want to make a little small talk so you can slip in a white lie to make him think otherwise. For instance, if he asks how you’re doing, you can say “great, excited to be going out to meet friends.” Another option is to give a nearby location as your destination, rather than your exact address, and walk an extra block.

3. Check the Driver’s Reviews

One nice feature of ridesharing apps is they allow riders to rate their drivers. If yours has bad reviews, cancel the ride and call another one. To keep from having to wait too long, have a couple of apps already installed on your phone so you can use the one that’ll most quickly get you a reputable driver.

4. Track Your Route

If you’re familiar with the area you’re traveling in, you’ll notice if the driver is going the wrong way. But if you don’t, open the map app on your phone and track your route to make sure you’re headed toward the destination you requested. If the route looks strange, speak up.

5. If Something Doesn’t Feel Right, Get Out

Yes, you may be late for your appointment, and you may be out a few dollars, but if you feel unsafe, ask the driver to pull over and get out of the car. Too often women put themselves in unsafe situations because they think following their gut will lead to awkwardness. Screw that.

What to Do If Your Phone Gets Lost or Stolen 

For many of us, it’s as if our whole lives are on our phones. Our phones contain our contacts, our photos, and the apps we use to navigate, keep up with the news, organize our work and personal schedules, and stay connected with friends and family; it’s a lot of personal information we don’t want in the hands of some stranger.

Fortunately, there are a few simple steps you can take to protect yourself if your phone gets lost or stolen.

4 Ways to Protect the Contents of Your Phone 

1. Password Protect Your Phone 

In order to keep someone from immediately gaining access to the contents of your phone once it’s in their possession, it’s best to already have a password set.

The exact way to set a password will vary depending on your device, but for an Android, you’ll probably have to go to Settings>Security>Screen lock type. Here you can choose to unlock your phone by using a pattern, pin, or password.

A password is the most secure option, but it’s also the most annoying to have to input every time you want to glance at your Facebook notifications. You might also have the option to set your phone so it will only open with your fingerprint.

Another cool feature is the smart lock. If you use this, your lock function won’t kick in while your phone is on you, if you’re at certain locations (e.g. your home), or if you’re near other trusted devices. Some phones will even give you voice and facial recognition options.

2. Locate Your Phone

One of the great things about having a GPS on your phone is that if it goes missing, you can track where it is. However, in order for this feature to work, you need to set it up in advance.

If you have an Android, you have a couple of options. Some devices, like Samsung, have this feature built in – although in order to access it you have to create a Samsung account. By enabling the feature, you’ll be able to locate your phone by going to https://findmymobile.samsung.com/ from a different device and logging in. Another option is to download the Find My Device app from the Google Play Store. This app works the same way as Samsung’s and only requires you to have a Google account. Plus, if you’ve just misplaced your phone somewhere around the house, it has the ability to make it ring, even if your phone is set to silent. Just go to https://myaccount.google.com/intro/find-your-phone, sign in, and you’ll be able to see your phone’s location on a map. From there you’ll also be able to reset your phone’s password.

Bear in mind, however, that if you have an Android, you’ll only be able to locate your device if your location services are enabled and you’re connected to the internet. A smart thief will know to disable those functions so you can’t track where he – and your phone – are.

If you have an iPhone, you’ll need to download the Find My iPhone app. Once it’s installed, you’ll be able to locate your device on a map by going to https://www.icloud.com/#find and signing into the iCloud.

There you can also put your phone into Lost Mode, which will lock it. Lost Model also lets you set a message to the locked screen, so if your phone is simply lost, you can write something like, “Lost phone. Please call 212-555-1234 to return.” Or, if you know your phone has been stolen, you can write something like, “You suck.”   

3. Erase Your Data

This is the nuclear option. If you’re sure you’re not getting your phone back, you can use the Find My Device/Find My iPhone apps to remotely erase all the data on your phone, so even if the thief manages to break through your password protections, they won’t be able to access your personal information.

Bear in mind that when you do this, since all your personal accounts will be deleted, you lose your ability to track your phone remotely.

That said, your phone could still be getting service from your wireless carrier, meaning whoever has it could be making calls from your number and using your data plan. To cut them off, call your service provider and let them know your phone has been stolen.

Knowing you might have to one day erase your phone data is another great reason to backup your phone’s contents (which you should really be doing anyway). If you have an Android, the easiest way to backup your data is to use the Google cloud. If you have an iPhone, use the iCloud.

But what if you didn’t have the foresight to install the Find My Device/Find My iPhone apps, and now you can’t change your passwords, lock your phone, or erase your data remotely? In that case you should…

4. Change the Passwords for All Your Apps

Make a list of all the apps you have on your phone that require passwords, get onto another device, and start changing your passwords. This will likely include your email, social media accounts, bank accounts, and app stores.

Staying Safe on Meetup.com 

One of the amazing things about the internet is that it can bring together total strangers who have something in common, but would never have found each other otherwise.

A great way to do this is through the website Meetup.com, which lets users create and join events and activities based on themes that interest them. Popular categories for meetups include film, health and wellness, LGBTQ, and pets. It’s a fantastic way to make new friends and cultivate your interests.

But didn’t your mom always tell you not to talk to strangers? Was she really onto something, or just being paranoid?

A little of both. You should absolutely get yourself out there and take a big bite out of life… but also, take some precautions.

3 Ways to Protect Yourself on Meetup.com 

1. Don’t Include Too Much Personal Information in Your Profile

Be aware that your profile page is completely accessible to anyone with internet, so only include information you’re comfortable being totally public.

If you have a passion for food, and can’t wait to find culinary meetups in your town, definitely mention the new taco truck you’re totally obsessed with. But don’t say it’s located right outside your building on 333 Main Street, where you live in apartment 4D – which by the way doesn’t have a deadbolt.

Or if you’re looking for family meetups, go ahead and write that you have a ten year old and six year old, but don’t include that their names are Timmy and Sue, and that they go to Lincoln Elementary, from which they usually walk home alone at 2:30 pm.

2. Get to Know People IRL Before Communicating One-on-one 

Meetup has an email forwarding system, so you can get messages from members sent to your email without them having your actual email address.

But even so, if you’re just not interested in people contacting you before meeting and hitting it off in real life, you can choose to block messages from users and only receive messages from event organizers. Just go to your account and click Settings>Privacy.

From there you can choose whether you want your groups or interests listed on your profile. You can also select who can contact you on Meetup – whether that just be organizers, members of your meetups, or anyone on the website.

3. Let a Friend Know Where You’re Going 

For any situation in which you’re going out to meet strangers, it’s good practice to tell a friend where you’re going, and set a time to check in with them so they know you got home safe. Also,if the meetup involves drinks, never leave yours unattended.

Preventing Intimate Partner Violence 

Intimate partner violence (IPV) affects nearly one third of American women. Although technology can provide tools for victims (e.g. for collecting evidence against an abuser), it can also unfortunately be used by perpetrators. That’s because control is an integral element on IPV, and the misuse of technology can give abusers a means of exerting control over their victims.

According to a recent study, while many perpetrators use technology specifically designed for surveillance, it is far more common to repurpose other types of apps in order to achieve the same goals. Some of those used include find my phone apps, and family tracking and child monitoring apps.

The problem with this is that advocates against IPV can’t go after the companies that manufacture these apps, and app stores can’t block them, as most of the time, they’re used for perfectly legitimate purposes.

Many of these apps allow abusers to track their victim’s location, read their messages by having them forwarded to a different device, and even watch and listen to them remotely by activating the phone’s camera and microphone.

As mentioned above, there are also apps explicitly marketed for nonconsensual surveillance. While it’s rare to find these in a legitimate app store, there are plenty that can be found in other corners of the internet. And even though most phones come with a default setting that blocks off-store apps, guides for overriding it can easily be found online.

One of the most nefarious elements of these type of apps is that they can usually be configured so the app icon is hidden, thus making it nearly impossible for the victim to detect it on their phone.

You might think the solution would then be to scan the phone for spyware, but unfortunately, even some of the biggest names in the industry, such as Symantec, Kaspersky, and Avast, have proven largely ineffective at detecting these apps.

So what can you do to protect yourself?

3 Ways to Keep an Abusive Partner from Surveilling You 

1. Keep Your Phone on You at All Times

Almost all the apps studied require that the abuser physically have access to the victim’s phone at least once.

2. Be Cautious Using Any Phone You Didn’t Obtain Yourself

Abusers with a lot of control over their victims often control their money too – and so end up being the ones to purchase their phone. In these cases not only can they pre-install dual purpose apps, but with a little tech savvy, they can can even root the device, giving them the ability to install the most nefarious off-store apps. There are even companies that will sell phones that are already rooted, or that have surveillance software pre-installed.

3. Password Protect Your Phone, and Don’t Share Your Password with Anyone

As mentioned above, having a password to keep your phone locked is the first line of defense in keeping its contents secure. If you suspect your partner is accessing your device, immediately change your password. Make it long and complex, and make sure not to use elements they might be able to guess, like your birthday or pet’s name.

That said, we’re not naive, and can’t ignore the reality that many victims of IPV are coerced into revealing their passwords or “allowing” these dangerous apps to be installed on their phones.

Whether or not you’re in the position to safeguard your device, if you are the victim of IPV, there are resources that can help you get out. These are just a few of the organizations that have made helping victims their mission:

National Network to End Domestic Violence: https://nnedv.org/

The National Domestic Violence Hotline: 1-800-799-7233, http://www.thehotline.org/resources/

Family and Youth Services Bureau: https://www.acf.hhs.gov/fysb/resource/help-fv

SOS Apps 

In general, it’s a good idea to have an emergency app on your phone, just in case. These let you notify friends or family when you’re feeling unsafe, and/or contact emergency services.

Some types of phones have these features built in, so it’s worth checking to see if yours does.  If not, check out these apps, all of which are available for both Android and iOS.

1. ICE, which stands for In Case of Emergency, allows you to send a message and your GPS location to selected contacts when you want your friends or family to keep tabs on your whereabouts. You can also set the message to be delayed, so say, if you don’t come back from your hike by nightfall, that’s when they’ll get the message.

2. React Mobile does the same thing as ICE, but also has an SOS Help Me button that notifies your pre-chosen contacts via email and text, and if you choose, posts a message to Facebook and Twitter. At the same time, the app automatically contacts local emergency services.

1. Siren GPS won’t contact your friends and family, but with a push of a button, will alert emergency services and provide them with your location. You can also set up a personal profile with relevant information that is then passed on to the authorities in case of emergency. This can include medical conditions and emergency contact info.  The app also gives you the option of calling the fire department, an ambulance, or the police.

You can also show certain information on your lock screen to be used in case of a situation in which you’re unable to give information about yourself to emergency services. For instance, you can write something like, “In case of emergency, call [name of your partner]” and then write their phone number. Or, if you have a specific medical issue – like a severe allergy or epilepsy – you can include pertinent information there.

How to set a lock screen message will vary depending on what model phone you have.

Conclusion

Technology and the internet play a big part in our lives both in good ways and in bad. As women, we are targeted online for many different reasons, but that does not mean we should disengage or disconnect.

Our hope is that this guide empowers you to protect and defend yourself online and in person and that the tools we provide will help you to do so.

If you found this guide helpful in any way, please share it with others so more women can learn how to stay safe, both on and off the web.

* Some names and identifying details have been changed to protect the privacy of individuals.

Sara Levavi-Eilat is a long time writer and editor with a passion for cybersecurity and a superior knowledge of Bitcoin.

Book Excerpt: Aboveground Tactics and Operations

Book Excerpt: Aboveground Tactics and Operations

Featured image: the 1774 burning of the cargo ship Peggy Stewart, an escalation of the Boston Tea Party.

Editor’s note: The following is from the chapter “Tactics and Targets” of the book Deep Green Resistance: A Strategy to Save the  Planet. This book is now available for free online.

     by Aric McBay

For me, nonviolence was not a moral principle but a strategy; there is no moral goodness in using an ineffective weapon.

—Nelson Mandela

Deeds, not words!

—Slogan of the Women’s Social and Political Union

Recall that all operations—and hence all tactics—can be divided into three categories:

  • Decisive operations, which directly accomplish the objective.
  • Sustaining operations, which directly assist and support those carrying out decisive operations.
  • Shaping operations, which help to create the conditions necessary for success.

Where tactics fall depends on the strategic goal. If the strategic goal is to be self-sufficient, then planting a garden may very well be a decisive operation, because it directly accomplishes the objective, or part of it. But if the strategic goal is bigger—say, stopping the destruction of the planet—then planting a garden cannot be considered a decisive operation, because it’s not the absence of gardens that is destroying the planet. It’s the presence of an omnicidal capitalist industrial system.

If one’s strategic goal is to dismantle that system, then one’s tactical categories would reflect that. The only decisive actions are those that directly accomplish that goal. Planting a garden—as wonderful and important as that may be—is not a decisive operation. It may be a shaping or sustaining operation under the right circumstances, but nothing about gardening will directly stop this culture from killing the planet, nor dismantle the hierarchical and exploitative systems that are causing this ecocide. Remember, the world used to be filled with indigenous societies which were sustainable and enduring. Their sustainability did not prevent civilization from decimating them again and again.

In this chapter we’ll break down aboveground and underground tactics into the three operational categories. For each class of operations, we’ll further break tactics down by scale for individuals, affinity groups, and larger organizations. This is summarized in Figures 13-1 and 13-2 below. As a rule, any tactic an individual can carry out can also be accomplished by a larger organization. So the tactics for each scale can nest into the next, like Russian matryoshka dolls.

Figure 13-1

 

Figure 13-2

 

Every resistance movement has certain basic activities it must carry out: things like supporting combatants, recruitment, and public education. These activities may be decisive, sustaining, or shaping, as shown in the illustration. And they may be carried out at different scales. Operations like education, awareness raising, and propaganda (shown under aboveground shaping) may occur across the range from the individual to large organizations. The scope of education may change as larger and larger groups take it on, but the basic activities are the same.

Other operations change as they are undertaken by larger groups and networks. Look in the underground tactics under sustaining. Individuals may use escape and evasion themselves, to start with. Once a cell is formed, they can actually run their own safehouse. And once cells form into networks, they can combine their safehouses to form escape lines or an entire Underground Railroad. The basic operation of escape and evasion evolves into a qualitatively different activity when taken on by larger networks. A similar dynamic is at work in recruitment; individuals are limited to mutual recruitment, but established groups can carry out organizational recruitment and training.

And, of course, some resistance units are too small to take on certain tasks, as we shall discuss. Individuals have few options for decisive action aboveground. Underground, they are limited in their sustaining operations, because secrecy demands that they limit contact with other actionists whom they could support. But once organizations become large enough, they can embrace new operations that would otherwise be out of their reach. Aboveground, large movements can use acts of omission like boycotts or they can occupy and reclaim land. And underground networks can use their spread for coordinated large-scale actions or even guerrilla warfare.

ABOVEGROUND TACTICS

Broadly speaking, aboveground tactics are those that can be carried out openly—in other words, where the gain in publicity or networking outweighs the risk of reprisals. Underground tactics, in contrast, are those where secrecy is needed to carry out the actions to avoid repression or simply to do the actions. The dividing line between underground and aboveground can move. Its position depends on two things: the social and political context, and the audacity of the resisters.

There have been times when sabotage and property destruction have been carried out openly. Conversely, there have been times when even basic education and organizing had to happen underground to avoid repression or reprisals. This means, explicitly, that when we use the term underground we do not necessarily mean acts of sabotage or violence: smuggling Jews out of Nazi Germany was an underground activity, and the Underground Railroad was by definition, er, underground. One of the most important jobs of radicals is to push actions across the line from underground to aboveground. That way, more people and larger organizations are able to use what was once a fringe tactic.1

Provoking open defiance of the laws or rules in question also impairs the ability of elites to exercise their power. The South African government, for example, was terrified that people of color in South Africa would simply stop obeying the law of the apartheid government. In even the most openly fascist state, the police force is still a minority of the population. If enough people disobey as part of their daily activities, then the country becomes ungovernable; there aren’t enough police to force everyone to perform their jobs at gunpoint.

When enough serious people have gathered to push a tactic back into the aboveground arena, those in power have few choices. If they continue to insist that the law be obeyed, resistance sympathizers may increasingly disregard any laws as dissidents begin to view the government as generally illegitimate—often a government’s worst nightmare. Or the government may offer concessions or change the law. Any of the above could be considered a victory. Usually governments strive to retain the image of control through selective concessions or legislation because the other road ends with civil unrest, revolution, or anarchy.

The cases of Dr. Martin Luther King Jr. and Malcolm X exemplifies how a strong militant faction can enhance the effectiveness of less militant tactics. In his book Pure Fire: Self-Defense as Activism in the Civil Rights Era, Christopher B. Strain explains that Martin Luther King Jr. pushed his agenda by using Malcolm X “to illustrate the alternative to legislative reform: chaos.… King would usually present the matter in terms of a choice: ‘We can deal with [the problem of second-class citizenship] now, or we can drive a seething humanity to a desperation it tried, asked, and hoped to avoid.’ … [He] suggested if white leaders failed to heed him ‘millions of Negroes, out of frustration and despair’ will ‘seek solace’ in Malcolm X, a development that ‘will lead inevitably to a frightening racial nightmare.’ ”2 But Strain emphasizes that King and Malcolm X were by no means enemies. “Despite their differing opinions, both men recognized that their brands of activism were complementary, serving to shore up the other’s weaknesses.”3

Some presume that Malcolm X’s “anger” was ineffective compared to King’s more “reasonable” and conciliatory position. That couldn’t be further from the truth. It was Malcolm X who made King’s demands seem eminently reasonable, by pushing the boundaries of what the status quo would consider extreme.

Pushing boundaries doesn’t have to involve underground property destruction or violence. Breaking antisegregation laws through lunch counter sit-ins, for example, pushed the limits of acceptability during the civil rights struggle. The second generation of suffragists, too, got tired of simply asking for what they wanted and started breaking the law. In both cases, the old guard activists were leery at first.

To be perfectly explicit: it isn’t just militants who can push the boundaries; even nonviolent groups can and should be pushing the envelope for militancy—vocally and through their actions—wherever and whenever possible. It’s hard to overstate the importance of this for any grand strategy of resistance. In this way, and many others, aboveground and underground activists are mutually supportive and work in tandem.

DECISIVE OPERATIONS ABOVEGROUND

Open property destruction is not always decisive. Take the Plowshares Movement activists, who break into military installations and use hammers and other tools to attack everything from soldiers’ personal firearms to live nuclear weapons, after which they wait and accept personal legal responsibility for their actions. There’s no doubt that this involves bravery—obviously it requires a lot of guts to take a sledgehammer to a hydrogen bomb—but these acts are not intended to be decisive. They are chiefly symbolic actions; neither the intent nor the effect of the action is to cause a measurable decrease in the military arsenal. (Presumably they could accomplish this if they really wanted to; anyone with the wherewithal to bypass military security and get within arm’s reach of a live nuclear warhead could probably do it more than once.)

In fact, open property destruction as a decisive aboveground tactic is historically rare. Remember, those in power view their property as being more important than the lives of those below them on civilization’s hierarchy. If large amounts of their property are being destroyed openly, they have few qualms about using violent retaliation. Because of this, situations where property can be destroyed openly tend to be very unstable. If those in power retaliate, the resistance movement either falters, shifts underground, or escalates. The Boston Tea Party is an excellent example. After the dumping of tea in December 1773, a boycott was imposed on British tea imports. In October 1774, the ship Peggy Stewart was caught attempting to breach the boycott while landing in Annapolis, Maryland. Protesters burned the ship to the waterline, a considerable escalation from the earlier dumping of tea. Within a year, mere property destruction segued into armed conflict and the Revolutionary War broke out.

Aboveground acts of omission are the more common tactical choice. An individual’s reduced consumption is not decisive, for reasons already discussed; in a society running short of finite resources like petroleum, well-meaning personal conservation may simply make supplies more available to those who would put them to the worst use, like militaries and corporate industry. But large-scale conservation could reduce the rate of damage slightly, and buy us more time to enact decisive operations, or, at least, when civilization does come down, leave us with slightly more of the world intact.

The expropriation or reclamation of land and materiel can be very effective decisive action when the numbers, strategy, and political situation are right. The Landless Workers Movement in Latin America has been highly successful at reclaiming “underutilized” land. Their large numbers (around two million people), proven strategy of reclaiming land, and political and legal framework in Brazil enable their strategy.

Many indigenous communities around the world engage in direct reoccupation and reclamation of land, especially after prolonged legal land claims, with mixed success. There are enough examples of success to suggest that direct reclamation can be successful, especially with wider support from both indigenous and settler communities. The specifics of conflicts like those at Kanehsatake and Oka, Caledonia, Gustafsen Lake, Ipperwash, and Wounded Knee (1973), are too varied to get into here. But it’s clear that indigenous land reclamations attack the root of the legitimacy—even the existence—of colonial states, which is why those in power respond so viciously to them, and why those struggles are so critical and pivotal for broader resistance in general.

SUSTAINING OPERATIONS ABOVEGROUND

Sustaining operations directly support resistance. For individuals aboveground, that means finding comrades through mutual recruitment or offering material or moral support to other groups. But individual mutual recruitment can be difficult (although this is easier if the recruiter in question is strongly driven, charismatic, well organized, persuasive, and so on). Affinity groups, with more people available to prospect, screen, and train new members, are able to recruit and enculturate very effectively. Individual recruiters have personality, but a group, even a small one, has a culture—hopefully a healthy culture of resistance.

Aboveground sustaining operations mostly revolve around solidarity, both moral and material. Legal and prisoner support are important ways of supporting direct action. So are other kinds of material support, fund raising, and logistical aid. The hard part is often building a relationship between supporters and combatants. There can be social and cultural barriers between supporters (say, settler solidarity activists) and those on the front lines (say, indigenous resisters). Indigenous activists may be tired of white people telling them how to defend themselves or perhaps simply wary of people whom they don’t know whether they should trust.

Propaganda and agitation supporting a particular campaign or struggle are other important sustaining actions. Liberation struggles like those in South Africa and Palestine have been defended internationally by vocal activists and organizers over decades. This propaganda has increased support for those struggles (both moral and material) and made it more difficult for those in power to repress resisters.

Larger organizations can undertake sustaining operations like fund raising and recruitment on a larger scale. They may also do a better job of training or enculturation. A single affinity group has many benefits, but can also be a bubble, a cultural fishbowl of people who come together because they believe the same thing. Being part of a larger network can mean that a new member gets a more well-rounded experience. Of course, the opposite can happen—dysfunctional large groups can quash ideological diversity. Often in “legitimate” groups that means quashing more radical, militant, or challenging beliefs in favor of an inoffensive liberal approach.

The converse problem is factionalism. There’s a difference between allowing internal dialogue and dissent, on one hand, and having acrimonious internal conflicts (like in the Black Panthers or the Students for a Democratic Society), on the other. The larger an organization is the harder it is to walk the line between unity and splintering (especially when the COINTELPRO types are trying hard to destroy any effective operation).

Larger organizations have a better capacity for sustaining operations (and decisive operations, for that matter) than individuals and small groups, but they rarely apply it effectively. Internal conflicts limit operations to the lowest common denominator: the lowest risk, the lowest level of internal controversy, and the lowest level of effectiveness. The big green and big leftist organizations will only go as far as holding press conferences and waving signs. Meanwhile, indigenous people who are struggling (often at gunpoint) to defend and reclaim their lands are ignored if they act outside the government land claims process. Tree sitters, even those who are avowedly nonviolent, get ignored by the big green organizations when police and loggers come in to attack them. The big organizations almost always fail to deploy their resources for sustaining operations when and where they are needed most. On a moral level, that’s deeply deplorable. On a strategic level, it’s unspeakably stupid. On a species and planetary level, it’s simply suicidal.

Of course, it doesn’t have to be that way. Effective resistance movements in history are usually composed of a cross section of many different organizations on many different scales, performing the different tasks best suited to them, and larger organizations are an important part of that. History has shown that it’s possible for large organizations to operate in solidarity and with foresight. Even if they don’t actually carry out decisive operations themselves, large aboveground organizations can offer incredibly important support.

SHAPING OPERATIONS ABOVEGROUND

Most day-to-day aboveground resistance actions are shaping operations of one kind or another. But many actions could be sustaining or shaping operations, depending on the context. Building a big straw-bale house out in the country would be considered a shaping operation if the house were built simply for the purpose of building a straw-bale house. But if that building were used as a retreat center for resistance training, it might then become part of sustaining operations. Consider the Black Panthers. A free breakfast program for children that was devoid of political content would have been a charity or perhaps mutual aid. A breakfast program integrated within a larger political strategy of education, agitation, and recruitment became a sustaining operation (as well as a threat to the state).

One of the most important shaping operations is building a culture of resistance. On an individual level, this might mean cultivating the revolutionary character—learning from resisters of the past, and turning their lessons into habits to gain the psychological and analytical tools needed for effective action. Building a culture of resistance goes hand in hand with education, awareness raising, and propaganda. It also ties into support work and building alternatives, especially concrete political and social alternatives to the status quo. As always, every action must be tied into the larger resistance strategy.

Most large organizations focus on shaping operations without making sure they are tied to a larger strategy. They try to raise awareness in the hopes that it will lead indirectly to change. This can be a fine choice if made deliberately and intelligently. But I think that most progressive organizations eschew decisive or sustaining operations because they simply don’t consider themselves to be resistance organizations; they identify strongly with those in power and with the culture that is destroying the planet. They keep trying to convince those in power to please change, and it doesn’t work, and they fail to adjust their tactics accordingly. The planet keeps dying, and people drop out of doing progressive work by the thousands, because it so often doesn’t work. We simply don’t have time for that anymore. We need a livable planet, and at this point a livable planet requires a resistance movement.

Resistance Newsletter – October 2018

October 6, 2018

by Max Wilbert

Deep Green Resistance

max@maxwilbert.org

https://www.deepgreenresistance.org

A free monthly newsletter providing analysis and commentary on ecology, global capitalism, empire, and revolution.

For back issues, to read this issue online, or to subscribe via email or RSS, visit the Resistance News web page.

These essays also appear on the DGR News Service, which also includes an active comment section.

** *** ***** ******* *********** *************

In this issue:

  1. A Manifesto for a World in Crisis
  2. FBI contacts DGR member in Oregon
  3. Rights for Nature Update
  4. Deep Green Resistance and Direct Action Manual translated into French
  5. We’ve passed the 1.5º C threshold
  6. Privacy Recommendations for Revolutionaries
  7. Organizational Structures
  8. Further news and recommended reading / podcasts
  9. How to support DGR or get involved

** *** ***** ******* *********** *************

A Manifesto for a World in Crisis

[Link]

THE SITUATION

Our world is in crisis. Species extinction, topsoil loss, deforestation, rising seas, ocean acidification, global warming. It’s no exaggeration to say that the dominant culture is killing the planet. At the same time, societies around the world are staggeringly unjust. Neocolonialism builds up empires on the backs of indigenous peoples, sweatshop workers, unpaid and underpaid women, and the bodies of our nonhuman kin.

FALSE SOLUTIONS

We do not trust electoral politics, NGOs/non-profits, or foundations. Change must come from the grassroots, but the masses can be led astray. False solutions abound in the of vague reforms, half-measures, and technologies that only strengthen empire.

REVOLUTION

We aim for nothing less than total liberation from extractive economics (including capitalism and socialism), white supremacy, patriarchy, colonialism, industrialism, and the culture of empire that we call civilization. This is a war for survival, and we’re losing. We aim to turn the tide. We mean to win. Some will end up in prison. Some will die. This is the price of justice. Revolution will not be tranquil or easy.

STRATEGY

Our main strategy is to build a revolutionary culture that supports outright destruction of the dominant culture (empire/industrial civilization). Specifically, we promote a strategy informed by the history of guerilla warfare that entails coordinated underground cells using sabotage to destroy global energy, transportation, communications, trade, and finance systems. The goal is to stop the global economy, not to harm individuals or the people. We recognize the value in other strategies such as mass movements, building alternatives, and changing laws, but these methods have little chance of stopping or significantly altering the course of global empire.

THE FUTURE

There are countless thousands of examples of land-based, sustainable, just human cultures, the majority of them indigenous. When the global economy collapses, we will need to live this way once again. The people will need to help the land heal by dismantling the vestiges of this system and stewarding toxic waste such as nuclear plants into dormancy. Low-energy societies will thrive in the ruins of civilization. They will face their own challenges, as all people do, but they will be strong if we protect their ability to exist by removing threats to the planet.

IDENTITY POLITICS

The experiences of those who have suffered systematic oppression can never be fully understood by those who have not. We value and lift up those leaders who have true vision and skill, not figureheads or puppets. Being a member of an oppressed group does not automatically lead to wisdom. Anti-oppression politics form the bedrock of our human morality, but our goal is not political correctness; it is revolution.

RACISM AND PATRIARCHY

Racism and patriarchy both exist to further power and domination by turning large groups of people into exploitable others. These toxic ideologies deeply influence our culture and prop up empire by providing a steady stream of cheap and free labor, children to serve as the next generation of consumers and soldiers, and stereotypes to manipulate the population with. As the oppression of women and people of color is so wrapped up in the global industrial economy (via mass media, pornography, the prison-industrial system, housing, etc.), we see dismantling empire as critical to the dismantling of the concrete systems of power enforcing racism and patriarchy.

IMMIGRATION

The global economy creates millions of refugees each year via wars, trade, and propaganda. Most immigration happens because people’s land or livelihoods have been destroyed. Ideally, people should be allowed to live in their homes on land that is healthy and can support their community. Therefore, the best way to address the immigration “problem” is to bring down the global empire. We must stop the problem at the source.

HOW WE WORK

We must be tenacious, smart, strategic, careful, bold, and self-reflective. We must be unapologetic and non-compromising. We’ve got to sacrifice. Those who are ready have to get together and do the tedious work of organizing and building organizations and communities, engaging in political struggles, and carrying out realistic strategies for success. We don’t hope to be effective, we plan to make it happen.

LOYALTY

Throughout history, repressive and counterrevolutionary forces have worked to drive wedges into communities of resistance. Never forget COINTELPRO. Our protection lies in a fierce, forgiving loyalty to those who resist

FBI Contacts DGR member in Oregon

[Story] On Friday, September 7th, Deep Green Resistance member Max Wilbert was contacted by the FBI in regards to his political organizing.

The agent, who identified himself as “Special Agent Michael” from the Seattle Field Office of the FBI, said he was calling “about something [Wilbert] wrote online” in response to “tips submitted to a public tip line.” The same agent also left a card at a family member’s house over the weekend.

Wilbert followed established security culture protocols, a set of best-practices for activists and revolutionaries, by refusing to answer any questions and referring the agent to contact a lawyer.

This is the third time Wilbert has been contacted by the FBI in regards to his organizing. In prior instances in 2014 and 2016, he also declined to answer any questions.

The earlier phone calls were part of a coordinated operation targeting DGR members across multiple US states, in which more than a dozen DGR members and presumed associates were called on the phone or visited at their home or work. FBI agents also intimidated family members and followed activists in cars during this sweep.

Members including Wilbert have also been detained and then turned away at the Canadian border, where a lawyer working with the group similarly faced what The Guardian called “repeated interrogations.”

As Wilbert said in 2016, “This government uses intimidation and violence because these tactics are brutally effective. For me and the people I work with, we expect pushback. That doesn’t make it easy, but in a way, this sort of attention validates the fact that our strategy represents a real threat to the system of power in this country. They’re scared of us because we have a plan to hit them where it hurts.”

Deep Green Resistance advocates a revolutionary environmentalism and calls for forcefully dismantling global capitalism. The organization is well known to the FBI. In fact, members have been told that the book the movement is based on is on the bookshelves at FBI training academy near Quantico, Virginia.

The organization based on the book was created in 2011 and has members located around the world. Their website is available in more than 20 languages and members have been involved in a wide range of protest, resistance, and ecology movements.

The FBI has a long history of surveillance and disruption of organizations working against capitalism and racism. From intimidation and assassination (MLK, Fred Hampton) to more subtle interventions (see COINTELPRO) to destroy the social glue of resistance communities, the FBI has engaged in illegal and undemocratic activity for decades. This is a global trend as well. State security forces from South Africa to China have worked to undermine movements for justice consistently for decades.

DGR expects further state repression against itself and other groups that advocate threatening strategies, but refuses to be intimidated. In fact, they see state repression as a validation. “When she heard I had been called by the FBI, my aunt told me that my grandfather would have said, ‘He must be doing something right,’” Wilbert says.

** *** ***** ******* *********** *************

Rights for Nature Update

[Story] No one is more responsible for the facilitation of life in the American West than the Colorado River. But, headlines across the West warn that the Colorado River is at record low levels and water shortages are inevitable. These headlines are hardly new and many concerned people question whether traditional tactics will truly protect the river.

My name is Will Falk  and I am a writer and lawyer. In the fall of 2017, I helped to file the first-ever federal rights of nature lawsuit  seeking rights for the Colorado River because American law currently fails to protect the natural world. American law fails because it protects corporate rights over the rights of human and nonhuman communities while defining nature as property. Nature, defined as property, is consumed and destroyed. Until nature’s rights are protected over corporate rights, ecological collapse will continue.

Rights of nature are a new judicial framework gaining momentum around the world that would revolutionize humanity’s relationship with the natural world. Rights of nature would give major natural communities like the Colorado River the rights to exist, flourish, regenerate, and naturally evolve while giving humans who depend on these communities the right to sue on behalf of the river.

The Colorado River will not be safe until humans truly understand the destruction being wrought on her. Eye-witness accounts will help humans understand the dire situation the river is in. To understand how the Colorado River’s rights to exist, flourish, regenerate, and naturally evolve can be enforced, we need firsthand accounts describing how these rights are being violated. This is why, after the lawsuit was filed, photographer Michelle McCarron   and I began traveling with the river to give on-the-ground reports  about the river’s health while the lawsuit was pending. Unfortunately, the Colorado Attorney General threatened participants with sanctions for filing the lawsuit and it was dismissed. The Colorado River story we began was left half-finished.

It has never been more important that the Colorado River’s story be completely told. It has never been more important that rights of nature be demanded. Michelle and I are still working on the Colorado River’s story. The Colorado River speaks, and we will not stop until we know her voice has been heard. We recently published a small part of the story with Voices for Biodiversity , but we’ve only been able to travel about half the length of the river. We need help with travel costs.

Specifically, your support will provide us with money for gas, food, and supplies to finish traveling the length of the Colorado River. We will visit the Hoover Dam, Imperial National Wildlife Refuge, major cities who depend on the river like Los Angeles, Las Vegas, and Phoenix as well as meet with First Nations who have lived with the river for generations. Additionally, we hope to travel to the Colorado River delta where vaquita porpoises, the world’s most endangered cetacean, are struggling for their species’ survival. In fact, only a dozen vaquita survive and, in all likelihood, they will be extinct by this time next year. Your support will help us create a biocentric story aimed at catalyzing action to protect the Colorado River while making the case for the urgent need for fundamental legal change.

Fundraiser here.

** *** ***** ******* *********** *************

Deep Green Resistance and Direct Action Manual translated into French

Members of Deep Green Resistance France, as well as volunteers and allies, have now translated the books Deep Green Resistance: Strategy to Save the Planet  and Direct Action Manual into French. They are launching pre-sale now to help pay for printing costs. Deliveries are set for late August for the DGR book and early October for the DAM book.

[Link] Deep Green Resistance

Derrick Jensen pose souvent à son public la question suivante : « Pensez-vous que cette culture s’engagera de manière volontaire vers un mode de vie soutenable et sain ? » Personne n’a jamais répondu par l’affirmative. Deep Green Resistance (DGR) commence donc là où les écologistes « mainstream » se sont arrêtés, en proposant une critique de notre civilisation industrielle manifestement incompatible avec la vie sur Terre. Face à l’urgence de la situation, les « technosolutions » et les achats écoresponsables ne résoudront rien. Nous avons besoin d’une véritable culture de résistance.

Les auteurs

Derrick Jensen est philosophe, militant récompensé et auteur de plus de 20 livres dont plusieurs best-sellers. Sa voix est l’une des plus importantes du mouvement environnemental. Parmi ses ouvrages, on trouve A Language older than Words ; The Culture of Make Believe et les deux volumes de Endgame. Lierre Keith est écrivaine, féministe radicale, écologiste et militante pour la sécurité alimentaire. Son ouvrage Le mythe végétarien : Alimentation, Justice et Durabilité a été appelé « le livre environnemental le plus important de sa génération ». Aric McBay est militant et fermier bio. Il a co-écrit What We Leave Behind avec Derrick Jensen.

L’importance de ce livre

DGR évalue les options stratégiques qui s’offrent à nous, de la non-violence à la guérilla, et pose les conditions nécessaires à une victoire. Ce livre explore aussi les sujets, concepts et modes opératoires des mouvements de résistance et des grandes luttes de ces derniers siècles : les types de structures organisationnelles, le recrutement, la sécurité, les choix des cibles, etc. DGR n’est pas seulement un livre, c’est aussi un mouvement qui propose un plan d’action concret. C’est une lecture obligatoire pour tout militant souhaitant comprendre les enjeux, l’idéologie et les faiblesses de ses adversaires ainsi que les stratégies et tactiques efficaces.

[Link] Manuel d’action directe (Earth First!)

Le Manuel d’action directe d’Earth First! enseigne les bases d’une résistance efficace et novatrice. Ce manuel contient près de 300 pages de diagrammes, des descriptions de techniques et un panorama complet du rôle que joue l’action directe dans la résistance : planifier une action, mettre en place un blocus, occuper un arbre ou paralyser un projet. Ce livre contient aussi des informations juridiques essentielles et un aperçu de l’environnement politico-judiciaire dans lequel les militants doivent naviguer. Ce manuel a été compilé et mis à jour par des militants de première ligne états-uniens. Leur objectif principal est de diffuser des connaissances et compétences clés aux quatre coins du monde.

Unique en son genre, ce livre répond aux attentes des jeunes militants et des militants aguerris à la recherche de tactiques efficaces pour résister et paralyser des projets destructeurs et des entreprises écocidaires.

Le livre (traduit de l’anglais américain) a été modifié pour répondre aux besoins des lecteurs suisses, français, belges et québecois et prend en compte leurs cadres juridiques respectifs.

L’auteur

Earth First! est une organisation écologiste radicale née dans le Sud-Ouest des États-Unis en 1980, inspirée par les livres de Rachel Carson, notamment Printemps silencieux, et d’Edward Abbey, Le gang de la clef à molette, comme par les idées d’Aldo Leopold, dont le mot d’ordre pourrait être le fameux « No Compromise in Defense of Mother Earth! » (« pas de compromis dans la défense de la Terre Mère ! »). Il existe aujourd’hui des mouvements Earth First! aux États-Unis, en France, au Royaume-Uni, au Canada, en Australie, aux Pays-Bas, en Belgique, aux Philippines, en République tchèque, en Inde, au Mexique, en France, en Allemagne, en Nouvelle-Zélande, en Pologne, au Nigeria, en Slovaquie, en Irlande, en Italie et en Espagne.

** *** ***** ******* *********** *************

We’ve passed the 1.5º C threshold

The MCC carbon clock demonstrates just how much carbon can be released into the atmosphere if global warming shall be limited to 1.5°C, or 2°C with high probability. By selecting a choice of temperature targets and estimates, you can see how much time remains in each scenario.

Disclaimer: The numbers are based on the latest Assessment Report (AR5) of the IPCC. It is very likely that these numbers will be updated after the release of the IPCC’s Special Report on 1.5 Degrees. This will then be considered here accordingly. [These are likely significantly conservative]

On September 8th, 2018, the carbon budget to limit the planet to 1.5ºC warming was passed.

** *** ***** ******* *********** *************

Privacy Recommendations for Revolutionaries

[Story] by Max Wilbert / Deep Green Resistance

Lately, I have been writing a series of introductory articles on the importance of skills and equipment for revolutionaries. Part of my thesis is that gaining skills and gathering equipment is important not only for practical reasons, but also because it opens up new possibilities and removes barriers in our thinking that we didn’t even know were there.

The situation is similar when it comes to digital communication.

We all know that we live in a world of ubiquitous surveillance. Most of us walk around every day with a phone in our pockets that is constantly tracking our location and sending that data to corporations, who bundle it and sell it to the highest bidder. All our web traffic is monitored and recorded, as are our phone calls, text messages, emails, video chat calls, and so on.

Political dissidents are an especially high-priority target.

This surveillance leads to a form of self-censorship whereby we don’t discuss important topics essential to developing resistance organizations and planning and carrying our revolutionary actions.

The only final solution is to dismantle the surveillance system and the institutions (capitalism, patriarchy, empire-culture, civilization) that depend on and lead to it. But pending that outcome, we can fight back in other ways. Here are a series of concrete recommendations for upping your privacy and security game.

Once again, this is an introduction to this topic, and isn’t meant to be comprehensive. Do your own research and be cautious.

Use a VPN or Tor for everyday web browsing

A VPN, or Virtual Private Network, adds a reasonable level of privacy and security to everyday web browsing. Look for a well-regarded platform that doesn’t keep any logs and is not based in the United States or in the territory of close allies. These are cheap and essential in the age when net neutrality is dead, and one subscription can work for multiple devices (laptop, tablet, phone, etc.). Take one hour to purchase and start using a VPN as a priority action.

To bring your security to a higher level, use Tor Browser. Tor is not only essential for high risk online activities, but for normalizing privacy for everyone using the web. It’s easy to use side by side with your regular web browser.

Encrypt data

Almost all phones, tablets, and computers now have simple disk encryption built-in. Enable this function on all your devices. Use strong passwords/passphrases. If you have a habit of forgetting passwords, use a password manager to organize your data. Don’t use the same password for multiple accounts.

Use secure chat/call apps

Today there are multiple easy-to-use, free apps for encrypted communication. These include Signal and Wire. Download these apps and use them instead of standard phone calls, text messages, and video chat whenever possible. These apps are well-regarded in the professional security community and your data should be inaccessible to eavesdroppers.

Keep your devices secure

All your encryption is worthless without physical security. If you leave your computer sitting in a hotel room, a state agent can gain access, open your computer case with a screwdriver, and install a keylogger inside. Next time you login, that device can send your passphrase to the agent, and your security is compromised.

This is just one example of a physical attack.

Keep your devices inside your control at all times. Don’t let strangers or people you don’t trust fully use your devices. If the state does gain access to your device, consider keeping that device disconnected from the internet, wiping all your data, selling it, and buying a new one (as I did after my laptop was searched at the U.S./Canada border).

Don’t share all location data

As I mentioned above, all cell phones (including “dumbphones”) track your exact location any time there is service, and share that information with your service provider and any partners/law enforcement agencies. Consider as well that most smartphones have ~6 microphones in them.

The solutions to this are simple. First, consider leaving your phone at home or in another location. Leave it off as much as possible, and in the bottom of a bag or other location where sound is muffled and eavesdropping is not possible. It is not overkill to purchase a “faraday bag” which blocks all radio waves in and out of your device. These can be purchased cheaply and allow you to carry your phone with you privately, only removing it in innocuous locations when you wish to use it.

Cover cameras

Any cameras in internet/cell-network connected devices can be hacked. Cover them with tape or stickers unless they are actively in use.

Other recommendations

Corporations sell data and provide it to government agencies without warrants or probable cause regularly. In general, your data will be much safer if you use non-corporate products, or only corporate products that are zero-data services.

For example, use Firefox (with privacy-enhancing add-ons such as uBlock Origin, Decentraleyes, Disable WebRTC, HTTPS Everywhere, Privacy Badger, NoScript, etc.) instead of Chrome or Safari. Use OpenStreetMap instead of Google Maps. Use DuckDuckGo instead of Google for search.

Conclusion

As I’ve already said, this is just a beginning. While these recommendations will help improve your privacy, they are not foolproof. Attacks and defense methods are always changing. However, the weakest link in most secure computer systems is the human element. Install software updates, use methods recommended by trustworthy privacy advocates, and use common sense. Remember that the goal here is freedom of action, not perfection.

Additional resources:

https://deepgreenresistance.org/get-involved/security-culture

https://prism-break.org/

https://ssd.eff.org/

https://www.privacytools.io/#vpn

https://www.reddit.com/r/privacy/wiki/index

https://inteltechniques.com/podcast.html

** *** ***** ******* *********** *************

Organizational Structures

From Deep Green Resistance, by Lierre Keith, Aric McBay, and Derrick Jensen

Page 293-296

Within both aboveground and underground activism there are several templates for basic organizational structures. These structures have been used by every resistance group in history, although not all groups have chosen the approach best suited for their situations and objec­tives. It is important to understand the pros, cons, and capabilities of the spectrum of different organizations that comprise effective resist­ance movements.

The simplest “unit” of resistance is the individual. Individuals are highly limited in their resistance activities. Aboveground individuals (Figure 8-Ib) are usually limited to personal acts like alterations in diet, material consumption, or spirituality, which, as we’ve said, don’t match the scope of our problems. It’s true that individual aboveground activists can affect big changes at times, but they usually work by engaging other people or institutions. Underground individuals (Figure 8-la) may have to worry about security less, in that they don’t have anyone who can betray their secrets under interrogation; but nor do they have anyone to watch their back. Underground individuals are also limited in their actions, although they can engage in sabotage (and even assassination, as all by himself Georg Elser almost assassinated Hitler).

Individual actions may not qualify as resistance. Julian Jackson wrote on this subject in his important history of the German Occupation of France: “The Resistance was increasingly sustained by hostility of the mass of the population towards the Occupation, but not all acts of indi­vidual hostility can be characterized as resistance, although they are the necessary precondition of it. A distinction needs to be drawn between dis­sidence and resistance.” This distinction is a crucial one for us to make as well.

Jackson continues, “Workers who evaded [compulsory labor], or Jews who escaped the round-ups, or peasants who withheld their pro­ duce from the Germans, were transgressing the law, and their actions were subversive of authority. But they were not resisters in the same way as those who organized the escape of [forced laborers] and Jews. Contesting or disobeying a law on an individual basis is not the same as challenging the authority that makes those laws.'”

Of course, one’s options for resistance are greatly expanded in a group.

The most basic organizational unit is the affinity group. A group of fewer than a dozen people is a good compromise between groups too large to be socially functional, and too small to carry out important tasks. The activist’s affinity group has a mirror in the underground cell, and in the military squad. Groups this size are small enough for participatory decision making to take place, or in the case of a hierarchical group, for orders to be relayed quickly and easily.

The underground affinity group (Figure 8-2a, shown here with a dis­tinct leader) has many benefits for the members. Members can specialize in different areas of expertise, pool their efforts, work together toward shared goals, and watch each others’ backs. The group . can also offer social and emotional support that is much needed for people working underground. Because they do not have direct rela­tionships with other movements or underground groups, they can be relatively secure. However, due to their close working relationships, if one member of the group is compromised, the entire affinity group is likely to be compromised. The more members are in the group, the more risk involved (and the more different relationships to deal with). Also because the affinity group is limited in size, it is limited in terms of the size of objectives it can go after, and their geographic range.

Aboveground affinity groups ( Figure 8-2b) share many of the same clear benefits of a small-scale, deliberate community. However, they may rely more on outside relationships, both for friends and fellow activists. Members may also easily belong to more than one affinity group to follow their own interests and passions. This is not the case with underground groups-members must belong only to one affinity group or they are putting all groups at risk.

The obvious benefit of multiple overlapping aboveground groups is the formation of larger movements or “mesh” networks (Figure 8-3b). These larger, diverse groups are better able to get a lot done, although sometimes they can have coordination or unity problems if they grow beyond a certain size. In naturally forming social networks, each member of the group is likely to be only a few degrees of separation from any other person. This can be fantastic for sharing information or finding new contacts. However, for a group concerned about security issues, this type of organization is a disaster. If any individual were compromised, that person could easily compromise large numbers of people. Even if some members of the network can’t be compromised, the sheer number of connections between people makes it easy to just bypass the people who can’t be compromised. The kind of decentral­ized network that makes social networks so robust is a security nightmare.

Underground groups that want to bring larger numbers of people into the organization must take a different approach. A security-con­scious underground network will largely consist of a number of different cells with limited connections to other cells (Figure 8-3a). One person in a cell would know all of the members in that cell, as well as a single member in another cell or two. This allows coordination and shared information between cells. This network is “compartmentalized.” Like all underground groups, it has a firewall between itself and the above­ ground. But there are also different, internal firewalls between sections.

** *** ***** ******* *********** *************

Further news and recommended reading / podcasts

How Identity Became a Weapon Against the Left

Water Ceremony Shuts Down Line 3 Construction On Mississippi River

52 Percent of World’s Birds of Prey Populations in Decline

Indigenous People in Costa Rica Denounce Forced Removal From Legislature

Corporate Agent PicRights Sends “Cease-and-Desist” Letter to Creators of Nissan Leaf Electric Car Greenwashing Exposé

What Happened to Bill McKibben?

Resistance Radio with Ben Goldfarb (September 23, 2018)

Resistance Radio with Kara Dansky & Andrea Orwoll (September 16, 2018)

Resistance Radio with Malina Fagan & Lynn Pelletier (September 2, 2018)

Resistance Radio with Chris Hedges (August 26, 2018)

DGR member Max Wilbert on Last Born in the Wilderness podcast

Chant It Down Radio

** *** ***** ******* *********** *************

How to support DGR or get involved

Guide to taking action

Bring DGR to your community to provide training

Become a member

** *** ***** ******* *********** *************

“You will never win by staying in a defensive position. If you want to win, you must take the offense!”

— Sun Tzu

 

Please feel free to forward this newsletter to those who will find it valuable. Permission is also granted to reprint this newsletter, but it must be reprinted in whole.