Resistance Newsletter – October 2018

October 6, 2018

by Max Wilbert

Deep Green Resistance

max@maxwilbert.org

https://www.deepgreenresistance.org

A free monthly newsletter providing analysis and commentary on ecology, global capitalism, empire, and revolution.

For back issues, to read this issue online, or to subscribe via email or RSS, visit the Resistance News web page.

These essays also appear on the DGR News Service, which also includes an active comment section.

** *** ***** ******* *********** *************

In this issue:

  1. A Manifesto for a World in Crisis
  2. FBI contacts DGR member in Oregon
  3. Rights for Nature Update
  4. Deep Green Resistance and Direct Action Manual translated into French
  5. We’ve passed the 1.5º C threshold
  6. Privacy Recommendations for Revolutionaries
  7. Organizational Structures
  8. Further news and recommended reading / podcasts
  9. How to support DGR or get involved

** *** ***** ******* *********** *************

A Manifesto for a World in Crisis

[Link]

THE SITUATION

Our world is in crisis. Species extinction, topsoil loss, deforestation, rising seas, ocean acidification, global warming. It’s no exaggeration to say that the dominant culture is killing the planet. At the same time, societies around the world are staggeringly unjust. Neocolonialism builds up empires on the backs of indigenous peoples, sweatshop workers, unpaid and underpaid women, and the bodies of our nonhuman kin.

FALSE SOLUTIONS

We do not trust electoral politics, NGOs/non-profits, or foundations. Change must come from the grassroots, but the masses can be led astray. False solutions abound in the of vague reforms, half-measures, and technologies that only strengthen empire.

REVOLUTION

We aim for nothing less than total liberation from extractive economics (including capitalism and socialism), white supremacy, patriarchy, colonialism, industrialism, and the culture of empire that we call civilization. This is a war for survival, and we’re losing. We aim to turn the tide. We mean to win. Some will end up in prison. Some will die. This is the price of justice. Revolution will not be tranquil or easy.

STRATEGY

Our main strategy is to build a revolutionary culture that supports outright destruction of the dominant culture (empire/industrial civilization). Specifically, we promote a strategy informed by the history of guerilla warfare that entails coordinated underground cells using sabotage to destroy global energy, transportation, communications, trade, and finance systems. The goal is to stop the global economy, not to harm individuals or the people. We recognize the value in other strategies such as mass movements, building alternatives, and changing laws, but these methods have little chance of stopping or significantly altering the course of global empire.

THE FUTURE

There are countless thousands of examples of land-based, sustainable, just human cultures, the majority of them indigenous. When the global economy collapses, we will need to live this way once again. The people will need to help the land heal by dismantling the vestiges of this system and stewarding toxic waste such as nuclear plants into dormancy. Low-energy societies will thrive in the ruins of civilization. They will face their own challenges, as all people do, but they will be strong if we protect their ability to exist by removing threats to the planet.

IDENTITY POLITICS

The experiences of those who have suffered systematic oppression can never be fully understood by those who have not. We value and lift up those leaders who have true vision and skill, not figureheads or puppets. Being a member of an oppressed group does not automatically lead to wisdom. Anti-oppression politics form the bedrock of our human morality, but our goal is not political correctness; it is revolution.

RACISM AND PATRIARCHY

Racism and patriarchy both exist to further power and domination by turning large groups of people into exploitable others. These toxic ideologies deeply influence our culture and prop up empire by providing a steady stream of cheap and free labor, children to serve as the next generation of consumers and soldiers, and stereotypes to manipulate the population with. As the oppression of women and people of color is so wrapped up in the global industrial economy (via mass media, pornography, the prison-industrial system, housing, etc.), we see dismantling empire as critical to the dismantling of the concrete systems of power enforcing racism and patriarchy.

IMMIGRATION

The global economy creates millions of refugees each year via wars, trade, and propaganda. Most immigration happens because people’s land or livelihoods have been destroyed. Ideally, people should be allowed to live in their homes on land that is healthy and can support their community. Therefore, the best way to address the immigration “problem” is to bring down the global empire. We must stop the problem at the source.

HOW WE WORK

We must be tenacious, smart, strategic, careful, bold, and self-reflective. We must be unapologetic and non-compromising. We’ve got to sacrifice. Those who are ready have to get together and do the tedious work of organizing and building organizations and communities, engaging in political struggles, and carrying out realistic strategies for success. We don’t hope to be effective, we plan to make it happen.

LOYALTY

Throughout history, repressive and counterrevolutionary forces have worked to drive wedges into communities of resistance. Never forget COINTELPRO. Our protection lies in a fierce, forgiving loyalty to those who resist

FBI Contacts DGR member in Oregon

[Story] On Friday, September 7th, Deep Green Resistance member Max Wilbert was contacted by the FBI in regards to his political organizing.

The agent, who identified himself as “Special Agent Michael” from the Seattle Field Office of the FBI, said he was calling “about something [Wilbert] wrote online” in response to “tips submitted to a public tip line.” The same agent also left a card at a family member’s house over the weekend.

Wilbert followed established security culture protocols, a set of best-practices for activists and revolutionaries, by refusing to answer any questions and referring the agent to contact a lawyer.

This is the third time Wilbert has been contacted by the FBI in regards to his organizing. In prior instances in 2014 and 2016, he also declined to answer any questions.

The earlier phone calls were part of a coordinated operation targeting DGR members across multiple US states, in which more than a dozen DGR members and presumed associates were called on the phone or visited at their home or work. FBI agents also intimidated family members and followed activists in cars during this sweep.

Members including Wilbert have also been detained and then turned away at the Canadian border, where a lawyer working with the group similarly faced what The Guardian called “repeated interrogations.”

As Wilbert said in 2016, “This government uses intimidation and violence because these tactics are brutally effective. For me and the people I work with, we expect pushback. That doesn’t make it easy, but in a way, this sort of attention validates the fact that our strategy represents a real threat to the system of power in this country. They’re scared of us because we have a plan to hit them where it hurts.”

Deep Green Resistance advocates a revolutionary environmentalism and calls for forcefully dismantling global capitalism. The organization is well known to the FBI. In fact, members have been told that the book the movement is based on is on the bookshelves at FBI training academy near Quantico, Virginia.

The organization based on the book was created in 2011 and has members located around the world. Their website is available in more than 20 languages and members have been involved in a wide range of protest, resistance, and ecology movements.

The FBI has a long history of surveillance and disruption of organizations working against capitalism and racism. From intimidation and assassination (MLK, Fred Hampton) to more subtle interventions (see COINTELPRO) to destroy the social glue of resistance communities, the FBI has engaged in illegal and undemocratic activity for decades. This is a global trend as well. State security forces from South Africa to China have worked to undermine movements for justice consistently for decades.

DGR expects further state repression against itself and other groups that advocate threatening strategies, but refuses to be intimidated. In fact, they see state repression as a validation. “When she heard I had been called by the FBI, my aunt told me that my grandfather would have said, ‘He must be doing something right,’” Wilbert says.

** *** ***** ******* *********** *************

Rights for Nature Update

[Story] No one is more responsible for the facilitation of life in the American West than the Colorado River. But, headlines across the West warn that the Colorado River is at record low levels and water shortages are inevitable. These headlines are hardly new and many concerned people question whether traditional tactics will truly protect the river.

My name is Will Falk  and I am a writer and lawyer. In the fall of 2017, I helped to file the first-ever federal rights of nature lawsuit  seeking rights for the Colorado River because American law currently fails to protect the natural world. American law fails because it protects corporate rights over the rights of human and nonhuman communities while defining nature as property. Nature, defined as property, is consumed and destroyed. Until nature’s rights are protected over corporate rights, ecological collapse will continue.

Rights of nature are a new judicial framework gaining momentum around the world that would revolutionize humanity’s relationship with the natural world. Rights of nature would give major natural communities like the Colorado River the rights to exist, flourish, regenerate, and naturally evolve while giving humans who depend on these communities the right to sue on behalf of the river.

The Colorado River will not be safe until humans truly understand the destruction being wrought on her. Eye-witness accounts will help humans understand the dire situation the river is in. To understand how the Colorado River’s rights to exist, flourish, regenerate, and naturally evolve can be enforced, we need firsthand accounts describing how these rights are being violated. This is why, after the lawsuit was filed, photographer Michelle McCarron   and I began traveling with the river to give on-the-ground reports  about the river’s health while the lawsuit was pending. Unfortunately, the Colorado Attorney General threatened participants with sanctions for filing the lawsuit and it was dismissed. The Colorado River story we began was left half-finished.

It has never been more important that the Colorado River’s story be completely told. It has never been more important that rights of nature be demanded. Michelle and I are still working on the Colorado River’s story. The Colorado River speaks, and we will not stop until we know her voice has been heard. We recently published a small part of the story with Voices for Biodiversity , but we’ve only been able to travel about half the length of the river. We need help with travel costs.

Specifically, your support will provide us with money for gas, food, and supplies to finish traveling the length of the Colorado River. We will visit the Hoover Dam, Imperial National Wildlife Refuge, major cities who depend on the river like Los Angeles, Las Vegas, and Phoenix as well as meet with First Nations who have lived with the river for generations. Additionally, we hope to travel to the Colorado River delta where vaquita porpoises, the world’s most endangered cetacean, are struggling for their species’ survival. In fact, only a dozen vaquita survive and, in all likelihood, they will be extinct by this time next year. Your support will help us create a biocentric story aimed at catalyzing action to protect the Colorado River while making the case for the urgent need for fundamental legal change.

Fundraiser here.

** *** ***** ******* *********** *************

Deep Green Resistance and Direct Action Manual translated into French

Members of Deep Green Resistance France, as well as volunteers and allies, have now translated the books Deep Green Resistance: Strategy to Save the Planet  and Direct Action Manual into French. They are launching pre-sale now to help pay for printing costs. Deliveries are set for late August for the DGR book and early October for the DAM book.

[Link] Deep Green Resistance

Derrick Jensen pose souvent à son public la question suivante : « Pensez-vous que cette culture s’engagera de manière volontaire vers un mode de vie soutenable et sain ? » Personne n’a jamais répondu par l’affirmative. Deep Green Resistance (DGR) commence donc là où les écologistes « mainstream » se sont arrêtés, en proposant une critique de notre civilisation industrielle manifestement incompatible avec la vie sur Terre. Face à l’urgence de la situation, les « technosolutions » et les achats écoresponsables ne résoudront rien. Nous avons besoin d’une véritable culture de résistance.

Les auteurs

Derrick Jensen est philosophe, militant récompensé et auteur de plus de 20 livres dont plusieurs best-sellers. Sa voix est l’une des plus importantes du mouvement environnemental. Parmi ses ouvrages, on trouve A Language older than Words ; The Culture of Make Believe et les deux volumes de Endgame. Lierre Keith est écrivaine, féministe radicale, écologiste et militante pour la sécurité alimentaire. Son ouvrage Le mythe végétarien : Alimentation, Justice et Durabilité a été appelé « le livre environnemental le plus important de sa génération ». Aric McBay est militant et fermier bio. Il a co-écrit What We Leave Behind avec Derrick Jensen.

L’importance de ce livre

DGR évalue les options stratégiques qui s’offrent à nous, de la non-violence à la guérilla, et pose les conditions nécessaires à une victoire. Ce livre explore aussi les sujets, concepts et modes opératoires des mouvements de résistance et des grandes luttes de ces derniers siècles : les types de structures organisationnelles, le recrutement, la sécurité, les choix des cibles, etc. DGR n’est pas seulement un livre, c’est aussi un mouvement qui propose un plan d’action concret. C’est une lecture obligatoire pour tout militant souhaitant comprendre les enjeux, l’idéologie et les faiblesses de ses adversaires ainsi que les stratégies et tactiques efficaces.

[Link] Manuel d’action directe (Earth First!)

Le Manuel d’action directe d’Earth First! enseigne les bases d’une résistance efficace et novatrice. Ce manuel contient près de 300 pages de diagrammes, des descriptions de techniques et un panorama complet du rôle que joue l’action directe dans la résistance : planifier une action, mettre en place un blocus, occuper un arbre ou paralyser un projet. Ce livre contient aussi des informations juridiques essentielles et un aperçu de l’environnement politico-judiciaire dans lequel les militants doivent naviguer. Ce manuel a été compilé et mis à jour par des militants de première ligne états-uniens. Leur objectif principal est de diffuser des connaissances et compétences clés aux quatre coins du monde.

Unique en son genre, ce livre répond aux attentes des jeunes militants et des militants aguerris à la recherche de tactiques efficaces pour résister et paralyser des projets destructeurs et des entreprises écocidaires.

Le livre (traduit de l’anglais américain) a été modifié pour répondre aux besoins des lecteurs suisses, français, belges et québecois et prend en compte leurs cadres juridiques respectifs.

L’auteur

Earth First! est une organisation écologiste radicale née dans le Sud-Ouest des États-Unis en 1980, inspirée par les livres de Rachel Carson, notamment Printemps silencieux, et d’Edward Abbey, Le gang de la clef à molette, comme par les idées d’Aldo Leopold, dont le mot d’ordre pourrait être le fameux « No Compromise in Defense of Mother Earth! » (« pas de compromis dans la défense de la Terre Mère ! »). Il existe aujourd’hui des mouvements Earth First! aux États-Unis, en France, au Royaume-Uni, au Canada, en Australie, aux Pays-Bas, en Belgique, aux Philippines, en République tchèque, en Inde, au Mexique, en France, en Allemagne, en Nouvelle-Zélande, en Pologne, au Nigeria, en Slovaquie, en Irlande, en Italie et en Espagne.

** *** ***** ******* *********** *************

We’ve passed the 1.5º C threshold

The MCC carbon clock demonstrates just how much carbon can be released into the atmosphere if global warming shall be limited to 1.5°C, or 2°C with high probability. By selecting a choice of temperature targets and estimates, you can see how much time remains in each scenario.

Disclaimer: The numbers are based on the latest Assessment Report (AR5) of the IPCC. It is very likely that these numbers will be updated after the release of the IPCC’s Special Report on 1.5 Degrees. This will then be considered here accordingly. [These are likely significantly conservative]

On September 8th, 2018, the carbon budget to limit the planet to 1.5ºC warming was passed.

** *** ***** ******* *********** *************

Privacy Recommendations for Revolutionaries

[Story] by Max Wilbert / Deep Green Resistance

Lately, I have been writing a series of introductory articles on the importance of skills and equipment for revolutionaries. Part of my thesis is that gaining skills and gathering equipment is important not only for practical reasons, but also because it opens up new possibilities and removes barriers in our thinking that we didn’t even know were there.

The situation is similar when it comes to digital communication.

We all know that we live in a world of ubiquitous surveillance. Most of us walk around every day with a phone in our pockets that is constantly tracking our location and sending that data to corporations, who bundle it and sell it to the highest bidder. All our web traffic is monitored and recorded, as are our phone calls, text messages, emails, video chat calls, and so on.

Political dissidents are an especially high-priority target.

This surveillance leads to a form of self-censorship whereby we don’t discuss important topics essential to developing resistance organizations and planning and carrying our revolutionary actions.

The only final solution is to dismantle the surveillance system and the institutions (capitalism, patriarchy, empire-culture, civilization) that depend on and lead to it. But pending that outcome, we can fight back in other ways. Here are a series of concrete recommendations for upping your privacy and security game.

Once again, this is an introduction to this topic, and isn’t meant to be comprehensive. Do your own research and be cautious.

Use a VPN or Tor for everyday web browsing

A VPN, or Virtual Private Network, adds a reasonable level of privacy and security to everyday web browsing. Look for a well-regarded platform that doesn’t keep any logs and is not based in the United States or in the territory of close allies. These are cheap and essential in the age when net neutrality is dead, and one subscription can work for multiple devices (laptop, tablet, phone, etc.). Take one hour to purchase and start using a VPN as a priority action.

To bring your security to a higher level, use Tor Browser. Tor is not only essential for high risk online activities, but for normalizing privacy for everyone using the web. It’s easy to use side by side with your regular web browser.

Encrypt data

Almost all phones, tablets, and computers now have simple disk encryption built-in. Enable this function on all your devices. Use strong passwords/passphrases. If you have a habit of forgetting passwords, use a password manager to organize your data. Don’t use the same password for multiple accounts.

Use secure chat/call apps

Today there are multiple easy-to-use, free apps for encrypted communication. These include Signal and Wire. Download these apps and use them instead of standard phone calls, text messages, and video chat whenever possible. These apps are well-regarded in the professional security community and your data should be inaccessible to eavesdroppers.

Keep your devices secure

All your encryption is worthless without physical security. If you leave your computer sitting in a hotel room, a state agent can gain access, open your computer case with a screwdriver, and install a keylogger inside. Next time you login, that device can send your passphrase to the agent, and your security is compromised.

This is just one example of a physical attack.

Keep your devices inside your control at all times. Don’t let strangers or people you don’t trust fully use your devices. If the state does gain access to your device, consider keeping that device disconnected from the internet, wiping all your data, selling it, and buying a new one (as I did after my laptop was searched at the U.S./Canada border).

Don’t share all location data

As I mentioned above, all cell phones (including “dumbphones”) track your exact location any time there is service, and share that information with your service provider and any partners/law enforcement agencies. Consider as well that most smartphones have ~6 microphones in them.

The solutions to this are simple. First, consider leaving your phone at home or in another location. Leave it off as much as possible, and in the bottom of a bag or other location where sound is muffled and eavesdropping is not possible. It is not overkill to purchase a “faraday bag” which blocks all radio waves in and out of your device. These can be purchased cheaply and allow you to carry your phone with you privately, only removing it in innocuous locations when you wish to use it.

Cover cameras

Any cameras in internet/cell-network connected devices can be hacked. Cover them with tape or stickers unless they are actively in use.

Other recommendations

Corporations sell data and provide it to government agencies without warrants or probable cause regularly. In general, your data will be much safer if you use non-corporate products, or only corporate products that are zero-data services.

For example, use Firefox (with privacy-enhancing add-ons such as uBlock Origin, Decentraleyes, Disable WebRTC, HTTPS Everywhere, Privacy Badger, NoScript, etc.) instead of Chrome or Safari. Use OpenStreetMap instead of Google Maps. Use DuckDuckGo instead of Google for search.

Conclusion

As I’ve already said, this is just a beginning. While these recommendations will help improve your privacy, they are not foolproof. Attacks and defense methods are always changing. However, the weakest link in most secure computer systems is the human element. Install software updates, use methods recommended by trustworthy privacy advocates, and use common sense. Remember that the goal here is freedom of action, not perfection.

Additional resources:

https://deepgreenresistance.org/get-involved/security-culture

https://prism-break.org/

https://ssd.eff.org/

https://www.privacytools.io/#vpn

https://www.reddit.com/r/privacy/wiki/index

https://inteltechniques.com/podcast.html

** *** ***** ******* *********** *************

Organizational Structures

From Deep Green Resistance, by Lierre Keith, Aric McBay, and Derrick Jensen

Page 293-296

Within both aboveground and underground activism there are several templates for basic organizational structures. These structures have been used by every resistance group in history, although not all groups have chosen the approach best suited for their situations and objec­tives. It is important to understand the pros, cons, and capabilities of the spectrum of different organizations that comprise effective resist­ance movements.

The simplest “unit” of resistance is the individual. Individuals are highly limited in their resistance activities. Aboveground individuals (Figure 8-Ib) are usually limited to personal acts like alterations in diet, material consumption, or spirituality, which, as we’ve said, don’t match the scope of our problems. It’s true that individual aboveground activists can affect big changes at times, but they usually work by engaging other people or institutions. Underground individuals (Figure 8-la) may have to worry about security less, in that they don’t have anyone who can betray their secrets under interrogation; but nor do they have anyone to watch their back. Underground individuals are also limited in their actions, although they can engage in sabotage (and even assassination, as all by himself Georg Elser almost assassinated Hitler).

Individual actions may not qualify as resistance. Julian Jackson wrote on this subject in his important history of the German Occupation of France: “The Resistance was increasingly sustained by hostility of the mass of the population towards the Occupation, but not all acts of indi­vidual hostility can be characterized as resistance, although they are the necessary precondition of it. A distinction needs to be drawn between dis­sidence and resistance.” This distinction is a crucial one for us to make as well.

Jackson continues, “Workers who evaded [compulsory labor], or Jews who escaped the round-ups, or peasants who withheld their pro­ duce from the Germans, were transgressing the law, and their actions were subversive of authority. But they were not resisters in the same way as those who organized the escape of [forced laborers] and Jews. Contesting or disobeying a law on an individual basis is not the same as challenging the authority that makes those laws.'”

Of course, one’s options for resistance are greatly expanded in a group.

The most basic organizational unit is the affinity group. A group of fewer than a dozen people is a good compromise between groups too large to be socially functional, and too small to carry out important tasks. The activist’s affinity group has a mirror in the underground cell, and in the military squad. Groups this size are small enough for participatory decision making to take place, or in the case of a hierarchical group, for orders to be relayed quickly and easily.

The underground affinity group (Figure 8-2a, shown here with a dis­tinct leader) has many benefits for the members. Members can specialize in different areas of expertise, pool their efforts, work together toward shared goals, and watch each others’ backs. The group . can also offer social and emotional support that is much needed for people working underground. Because they do not have direct rela­tionships with other movements or underground groups, they can be relatively secure. However, due to their close working relationships, if one member of the group is compromised, the entire affinity group is likely to be compromised. The more members are in the group, the more risk involved (and the more different relationships to deal with). Also because the affinity group is limited in size, it is limited in terms of the size of objectives it can go after, and their geographic range.

Aboveground affinity groups ( Figure 8-2b) share many of the same clear benefits of a small-scale, deliberate community. However, they may rely more on outside relationships, both for friends and fellow activists. Members may also easily belong to more than one affinity group to follow their own interests and passions. This is not the case with underground groups-members must belong only to one affinity group or they are putting all groups at risk.

The obvious benefit of multiple overlapping aboveground groups is the formation of larger movements or “mesh” networks (Figure 8-3b). These larger, diverse groups are better able to get a lot done, although sometimes they can have coordination or unity problems if they grow beyond a certain size. In naturally forming social networks, each member of the group is likely to be only a few degrees of separation from any other person. This can be fantastic for sharing information or finding new contacts. However, for a group concerned about security issues, this type of organization is a disaster. If any individual were compromised, that person could easily compromise large numbers of people. Even if some members of the network can’t be compromised, the sheer number of connections between people makes it easy to just bypass the people who can’t be compromised. The kind of decentral­ized network that makes social networks so robust is a security nightmare.

Underground groups that want to bring larger numbers of people into the organization must take a different approach. A security-con­scious underground network will largely consist of a number of different cells with limited connections to other cells (Figure 8-3a). One person in a cell would know all of the members in that cell, as well as a single member in another cell or two. This allows coordination and shared information between cells. This network is “compartmentalized.” Like all underground groups, it has a firewall between itself and the above­ ground. But there are also different, internal firewalls between sections.

** *** ***** ******* *********** *************

Further news and recommended reading / podcasts

How Identity Became a Weapon Against the Left

Water Ceremony Shuts Down Line 3 Construction On Mississippi River

52 Percent of World’s Birds of Prey Populations in Decline

Indigenous People in Costa Rica Denounce Forced Removal From Legislature

Corporate Agent PicRights Sends “Cease-and-Desist” Letter to Creators of Nissan Leaf Electric Car Greenwashing Exposé

What Happened to Bill McKibben?

Resistance Radio with Ben Goldfarb (September 23, 2018)

Resistance Radio with Kara Dansky & Andrea Orwoll (September 16, 2018)

Resistance Radio with Malina Fagan & Lynn Pelletier (September 2, 2018)

Resistance Radio with Chris Hedges (August 26, 2018)

DGR member Max Wilbert on Last Born in the Wilderness podcast

Chant It Down Radio

** *** ***** ******* *********** *************

How to support DGR or get involved

Guide to taking action

Bring DGR to your community to provide training

Become a member

** *** ***** ******* *********** *************

“You will never win by staying in a defensive position. If you want to win, you must take the offense!”

— Sun Tzu

 

Please feel free to forward this newsletter to those who will find it valuable. Permission is also granted to reprint this newsletter, but it must be reprinted in whole.

Environmental Activists Face FBI Harassment

Environmental Activists Face FBI Harassment

On Friday, September 7th, Deep Green Resistance member Max Wilbert was contacted by the FBI in regards to his political organizing.

The agent, who identified himself as “Special Agent Michael” from the Seattle Field Office of the FBI, said he was calling “about something [Wilbert] wrote online” in response to “tips submitted to a public tip line.” The same agent also left a card at a family member’s house over the weekend.

Wilbert followed established security culture protocols, a set of best-practices for activists and revolutionaries, by refusing to answer any questions and referring the agent to contact a lawyer.

This is the third time Wilbert has been contacted by the FBI in regards to his organizing. In prior instances in 2014 and 2016, he also declined to answer any questions.

The earlier phone calls were part of a coordinated operation targeting DGR members across multiple US states, in which more than a dozen DGR members and presumed associates were called on the phone or visited at their home or work. FBI agents also intimidated family members and followed activists in cars during this sweep.

Members including Wilbert have also been detained and then turned away at the Canadian border, where a lawyer working with the group similarly faced what The Guardian called “repeated interrogations.

As Wilbert said in 2016, “This government uses intimidation and violence because these tactics are brutally effective. For me and the people I work with, we expect pushback. That doesn’t make it easy, but in a way, this sort of attention validates the fact that our strategy represents a real threat to the system of power in this country. They’re scared of us because we have a plan to hit them where it hurts.”

Deep Green Resistance advocates a revolutionary environmentalism and calls for forcefully dismantling global capitalism. The organization is well known to the FBI. In fact, members have been told that the book the movement is based on is on the bookshelves at FBI training academy near Quantico, Virginia.

The organization based on the book was created in 2011 and has members located around the world. Their website is available in more than 20 languages and members have been involved in a wide range of protest, resistance, and ecology movements.

The FBI has a long history of surveillance and disruption of organizations working against capitalism and racism. From intimidation and assassination (MLK, Fred Hampton) to more subtle interventions (see COINTELPRO) to destroy the social glue of resistance communities, the FBI has engaged in illegal and undemocratic activity for decades. This is a global trend as well. State security forces from South Africa to China have worked to undermine movements for justice consistently for decades.

DGR expects further state repression against itself and other groups that advocate threatening strategies, but refuses to be intimidated. In fact, they see state repression as a validation. “When she heard I had been called by the FBI, my aunt told me that my grandfather would have said, ‘He must be doing something right,’” Wilbert says.

This War Has Two Side, Part 2

Editor’s note: This is an edited transcript of a presentation given at the 2016 Public Interest Environmental Law Conference by DGR’s Dillon Thomson and Jonah Mix on the failure of the contemporary environmental movement to meaningfully stop the destruction of the planet. Using examples from past and current resistance movements, Mix and Thomson chart a more serious, strategic path forward that takes into account the urgency of the ecological crises we face.  Part 1 can be found here, and a video of the presentation can be found here

If you want to make a decisive strike against the industrial system, you need two things: a target and a strategy. Many organizations use the CARVER matrix as the gold standard for target selection. The United States Military has used the CARVER matrix to identify targets in every war since Vietnam. Police agencies use CARVER to target organized crime. Even CEOs use it when they are trying to buy another company. Since the American military, the police, and CEOs are kicking our asses in this struggle, we should look at what’s made them so effective.

CARVER is an acronym. It stands for Criticality, Accessibility, Recuperability, Vulnerability, Effect, and Recognizability. Criticality means, how important is the target? Accessibility: how easy is it to get to the target? Recuperability: how long will it take the system to replace or repair the target? Vulnerability: how easy is it to damage the target? Effect: how will losing the target hurt the system? Recognizability: how easy is the target to identify?

Some of these things tend to group together and others don’t. Plenty of targets may be recognizable, vulnerable, and easily accessible. Those targets aren’t usually critical, though, and they can usually be repaired easily. Examples include a Starbucks windows or a police station. Other targets are critical, almost impossible to repair, and have a massive effect, but they are hard to identify, access, and damage. These include oil refineries and hydroelectric dams.

The purpose of CARVER is to identify which target hits the most categories with the greatest impact. You will never find a target that is critical, accessible, not recuperable, vulnerable, highly effective, and recognizable, but with CARVER, you can figure out which target is most likely to succeed. The matrix is simple: you sit down with a list of targets and assign each one a score from 1 to 10 in every category. You then add up or average the scores. There are arguments about adding versus averaging, but you can do either one. You then look for which target has the highest score.

Let’s say you’ve decided on a target using CARVER. Now you need to decide what to do. DGR uses a chart called the Taxonomy of Action. The Taxonomy of Action organizes a variety of strategies and approaches that activists can against any system but especially against industrial civilization. We divided them into two categories: acts of omission (not doing something) and are acts of commission (doing something). Acts of omission are usually low-risk but require a lot of people. These include strikes, boycotts, and protests. Acts of commission require fewer people but come with greater risk.

Click for larger image

To be clear, when DGR talks about the need for offensive and underground action, the intent is not to disparage acts of omission. All of it is needed: we need boycotts, strikes, protests, workers’ cooperatives, permaculture groups, songs and plays, and more. Our movement isn’t inherently ineffective; it’s just incomplete. Many other organizations happily focus on the lower-risk acts of omission, and they are valuable. However, there is a lack of discussion about the higher-risk offensive actions. This does not mean that defensive actions aren’t valuable or that the people who do them are somehow lazy or traitorous.

There are four major categories of offensive action:

1) Obstruction and occupation;

2) Reclamation and expropriation;

3) Property and material destruction; and

4) Violence against humans.

Obstruction and occupation mean seizing a node of infrastructure and holding it, which prevents the system from using that node to extract or process resources. Reclamation and expropriation mean seizing resources from the system and putting them to our use. Property and material destruction is exactly what it sounds like: damaging the system so that it cannot be used. Defensive and offensive violence against humans is a last resort.

These four tactics work together. For example, a hypothetical underground could seize a mining outpost and reclaim explosives that are later used for material destruction. A group of aboveground activists could occupy an oil pipeline checkpoint while underground actors take the opportunity to strike at the pipeline down the road. Again, this is all strictly hypothetical. The point is that just as our movement needs both offense and defense, it also needs different kinds of offense done together in strategic pursuit of a larger goal.

This is a lot of information and it is a little abstract. The need for security culture can make it even more difficult to talk about these things as concretely as we would like. We’ve often found that the best method is to look to history to see which struggles have succeeded through the use of these tactics and how. Historical struggles have used these tactics and come out victorious. I’m going to describe two historical movements and one ongoing movement in more detail. All of these movements have utilized a broad range of tactics described in the Taxonomy of Action.

The first example is the African National Congress. The goal of the ANC was equal rights for all South Africans regardless of their ethnicity. It put pressure on the South African apartheid government to implement constitutional reform and return the freedoms denied under the apartheid regime.

Power pylons sabotaged by Umkhonto We Sizwe

From 1912 to 1960, the ANC existed as an aboveground organization. It organized strikes, boycotts, protests, demonstrations, and alternative political education. These actions were all aboveground because the ANC figured it could achieve its goals by making its activities visible to the public and the government. In 1960, though, the government enacted the Pass Laws, which required blacks to carry identification cards. The ANC had protested similar oppression before, but the Pass Laws were much more stringent.

The opposition came to a head in a town called Sharpeville, where police killed 69 protesters and injured 180 more. After the Sharpeville massacre, the ANC was deemed illegal and driven underground. In response, the militant wing of the ANC formed in 1961. It was called the Umkhonto we Sizwe or “Spear of the Nation.”

Umkhonto we Sizwe had the same goal as the ANC but a different strategy. The situation was more desperate and the ANC’s aboveground strategies hadn’t worked. Umkhonto we Sizwe decided to use guerrilla warfare to bring the South African government to the bargaining table. In the early stages, the ANC underground did most of the organization and strategy for Umkhonto we Sizwe, but Umkhonto we Sizwe later broke off and developed its own command structure.

In the early 1960s it began sabotaging government installations, police stations, electric pylons, pass offices, and other symbols of apartheid rule. In the mid-1960s through the mid-70s, Phase 2 focused on political mobilization and developing underground structures. The Revolutionary Council was established in 1969 to train military cadres as part of a long-term plan to build a robust underground network. Most of this training took place in neighboring countries. In Phase 3, from the mid-1970s to 1983, Umkhonto we Sizwe engaged in large-scale guerrilla warfare and armed attacks. It sabotaged railway lines, administrative offices, police stations, oil refineries, fuel depots, the COVRA nuclear plant, military targets, and military personnel.

When it began Phase 4 in 1983, Umkhonto we Sizwe wanted to take the war into the white areas and make it a people’s war. The Revolutionary Council was replaced by the Political Military Council, which controlled and integrated the activities of the now-numerous sections of the organization. It continued attacks on economic, strategic, and military installations in white suburbs.

The ANC and Umkhonto we Sizwe simultaneously rejected the values of the system and attacked the structure, which successfully ended apartheid. ANC’s work to promote mass political struggle combined with Umkhonto we Sizwe’s armed struggle succeeded in pressuring the apartheid government to legitimize the ANC in 1990, and South Africa held its first multiracial elections in April, 1994. Nelson Mandela became South Africa’s first black president.

Umkhonto We Sizwe combatants

Despite Nelson Mandela’s fame, his specific actions are largely unacknowledged. He had an integral role in creating Umkhonto we Sizwe. He himself organized sabotage and assassinations. Concerning these actions, Mandela himself said, “I do not deny that I planned sabotage. I did not plan it in a spirit of recklessness, nor because I have any love of violence. I planned it as a result of a calm and sober assessment of the political situation that had arisen after many years of tyranny, exploitation, and oppression of my people by the Whites.”

The next example is the Irish Republican Army. Its goal was the end of British rule to form a free, independent republic. Despite Irish resistance, Great Britain had colonized and oppressed the Irish people for 500 years. The IRA developed a new strategy to make the occupation impossible: guerrilla warfare.

The Irish Republican Army was the underground wing of the aboveground Sinn Féin or Irish Republican Party. The Sinn Féin formed a breakaway government and declared independence from Britain. The British government declared Sinn Féin illegal in 1919, and the need for new strategy led to the creation of the IRA, just as Umkhonto we Sizwe grew out of the ANC in South Africa. Heavy repression led to broad support for the IRA within Ireland.

The IRA operated in “flying columns” of 15 to 30 people who trained in guerrilla warfare, often up in the hills with sticks as substitutes for rifles. Its tactics included hit-and-run raids, ambushes, and assassinations. It blew up police and military bases, destroyed coast guard stations, burnt courthouses and tax collector’s offices, and killed police and military personnel.

The IRA understood that an independent Irish republic was only achievable through confrontation with the British. It chose tactics based on the available resources and training. This was an asymmetrical conflict. The IRA was an underdog against the British military, but its broad base of support provided the necessary food, supplies, safe houses, and medical aid.

Military historians have concluded that the IRA waged a highly successful campaign against the British because the British military determined that the IRA could not be defeated militarily.

Flying Column No. 2 of the 3rd Tipperary Brigade of the Old IRA, photographed in 1921

The final example of a successful movement that uses the full spectrum described by the Taxonomy of Action is the contemporary Movement for the Emancipation of the Niger Delta or MEND. Since Nigeria’s independence from British colonial rule, multinational oil companies like Chevron and Royal Dutch Shell have enjoyed the support of successive dictators to appropriate oil from the Niger Delta. The people living in the delta have seen their way of life destroyed. Most are fishing people, but the rivers are full of oil. People have been dispossessed in favor of foreign interests and rarely see any revenue from the oil.

Here we see the same pattern that we saw in South Africa and Ireland. Over the past 20 years, the Ogoni people have led a large nonviolent civil disobedience movement in the Niger Delta. Ken Saro-Wiwa was a poet turned activist who protested the collusion between the government and the oil companies. He and eight others were executed in 1995 under what many believe were falsified charges designed to silence his opposition to the oil interests in Nigeria. In his footsteps came people who saw the government’s reaction to nonviolent activism and advocated using force to resist what they saw as the enslavement of their people.

MEND’s goals are the control of oil production/revenue for the Ogoni people and the withdrawal of the Nigerian military from the Niger Delta. It intends to reach them by destroying the capacity of the Nigerian government to export oil from the Niger Delta, which would force the multinational companies to discontinue operations and likely precipitate a national budgetary and economic crisis. Its tactic: sabotage.

MEND sabotages oil infrastructure with very few people and resources. It has resorted to bombings, theft, guerrilla warfare, and kidnapping foreign oil workers for ransom. It is organized into underground cells with a few spokespeople who communicate with international media. Leaders are always on the move and extremely cautious. They do not take telephone calls personally, knowing that soldiers hunting for them have electronic devices capable of pinpointing mobile phone signals. Fighters wear masks to protect their identities during raids, use aliases, and rely on clandestine recruitment.

MEND’s organizational structure has proven effective, and despite its small numbers and hodge-podge networking, it has been quite successful. Between 2006 and 2009, it made a cut of more than 28% in Nigerian oil output. In total, it has reduced oil output in the Niger Delta by 40%. This is an incredible number given its lack of resources.

MEND

These are just a few examples of movements that have used a broad spectrum of actions on the Taxonomy of Action chart. They demonstrate that the precedent for full-spectrum resistance has been set many times; many more groups have utilized force because they understand that those in power understand the language of force best. They tried nonviolence, asking nicely, and making concessions, but it doesn’t always work – and when it doesn’t work, this does.

This is a message that MEND sent to the Shell Oil Company: “It must be clear that the Nigerian government cannot protect your workers or assets. Leave our land while you can or die in it.” You have heard about people building bombs, picking up guns, and committing sabotage. These types of resistance are necessary if an environmental movement is to succeed like the IRA, ANC, or MEND succeeded, but this doesn’t mean that the only role in a militant struggle is either blowing something up or staying home and keeping quiet. As Lierre Keith said, “For those of us who can’t be active on the front lines – and this will be most of us – our job is to create a culture that will encourage and promote political resistance. The main tasks will be loyalty and material support.”

During the armed struggle against the British, only about 2% of people involved with the Irish Republican Army ever took up arms. For every MEND soldier, there were hundreds or even thousands of Nigerians who would help them in any way they could. The first role of an aboveground activist is underground promotion.

Underground promotion is anything that creates the conditions for an underground to develop and work effectively. There are, broadly speaking, two types of underground promotion. The first is passive promotion, which describes after-the-fact or roundabout promotion. This is all some people can safely do. You might talk about failures in the modern environmental movement, and even if you don’t suggest a militant solution, frank discussion of our situation may inspire people to look further. You can shift the culture slowly toward resistance values, and if sabotage does occur, you can support it – or if that’s not safe for you, you can at least take the opportunity to criticize the system and not those who struck against it.

If you are in a position to be more vocal, you can explicitly critique traditional environmentalist ideology. This includes critiquing pacifism or a defense-focused movement, arguing in public and among comrades for the necessity of revolutionary violence or strategic militancy, and promoting or encouraging such acts whenever possible. This is especially important after acts of sabotage or militancy do occur.

If you are an aboveground activist who takes on the project of underground promotion, or, hypothetically, an underground activist, you need to have good security culture. Security culture is a set of customs in a community that people adopt to make sure that anyone who performs illegal or sensitive action has their risks minimized and their safety supported. You are practicing security culture when you consider what you say or do in light of its potential effects on the people around you.

Security culture can be broken down into simple “dos and don’ts.” The first “do” is to keep all sensitive information on a strict need-to-know basis. This includes names, plans, past actions, and even loose ideas. Unless there is a tangible material benefit to sharing information and it can be done safely, you need to keep quiet. People bragging to their friends or getting drunk and letting a name slip have undone more radical movements than all the bullets, bombs, and prisons combined. A good way to make sure you follow this rule is to assume that you are always being monitored.

I wrote this assuming that FBI agents or police may read it. I don’t know if they will or not; they very well may not. The decision to take surveillance as a given reminds us not to say anything in public that they shouldn’t hear. That doesn’t mean we should be paranoid or always worry about who is an infiltrator or a plant, because if we are following security culture well, it shouldn’t matter. When you practice security culture well, it doesn’t make you paranoid; it frees you from paranoia.

Security culture boils down to respecting people’s boundaries and learning to establish your own. Feminism is essential to the radical struggle because patriarchy celebrates boundary breaking. Masculinity demands that men don’t respect “no” and blow past anyone who says, “I don’t want to do that” or “I don’t want to talk about that.” True security culture means that we develop the skills to say no and the skills to say nothing at all if we don’t feel safe or think that speaking will be valuable.

There’s a great article called “Misogynists Make Great Informants: How Gender Violence on the Left Enables State Violence in Radical Movements.” It’s about the role that masculine culture and macho posture can play in wrecking our movements. Boundary setting is the end-all and be-all of security culture. The best way to cultivate boundary setting in a community is to adopt a strict and central role for feminism in your movement.

“Don’ts” are even simpler: don’t ask questions that could endanger people involved in direct action. This is the flipside of need-to-know: if you don’t need to know it, don’t ask it. Even if you do need to know it, considering waiting for someone to bring it to you. If they bring it to you in a way that isn’t safe, you also need to say no.

You need to make sure that your underground promotion doesn’t cross the line into incitement. If you tell a crowd of people, “go out and blow up this dam,” or “that bridge,” you’ve crossed the line from promotion to incitement. Incitement has serious legal consequences for you or other people in the movement. You should talk to a lawyer or another experienced activist if you want to know where the line is, as it does vary state by state.

Finally, of course, don’t speak to the police or the FBI. They are not your friends. They can lie to you. If they come to you and say, “We know that someone is doing this and you need to tell us about it,” don’t trust them. You will never lose anything by asking for a lawyer and you will never gain anything by talking to the cops.

We also encourage people to avoid drugs, alcohol, and other non-political illegal activities that might compromise their ability to follow these rules. Good activists who fell into addiction or became otherwise compromised have hurt our movement.

None of us have come to our positions lightly. Most of us in the environmental movement started out as liberals. We bought the right soap, went to the right marches, and some of us even put our bodies on the line in protests and direct actions. Each one of us, for whatever reason, has come to the conclusion that this isn’t enough. We love the planet too much not to consider every option. We respectfully ask that you sit with whatever feelings you have, whether moral uncertainty, anger, or something else, and if you don’t feel in your heart that the next step needs to be taken, we don’t judge or condemn you. We need you. The struggle needs you to do one of the million other jobs that a nonviolent activist can do for this movement.

But we’d ask that you do one thing before you decide: go down to a riverbank, watch the salmon spawn, watch bison roam, look up at the sky, listen to songbirds and crickets, and ask yourself, if these people could talk, what would they ask of me? What would the pine tree cry out over the hum of the chainsaw blades? The starfish mother who is watching her babies cook to death in an acid ocean – if she could speak, what would she ask you to do? These people matter. Their lives matter, every bit as much as our lives matter to you and me. And they need us. They need us to be smart, strong, strategic, and effective.

We welcome everyone, supporters, promoters, and warriors, to move past fifty years of frustration and insufficient action toward a strategic environmental movement that will do what it takes.

I often hear people say, “I can’t handle violence, I can’t stand violence.” And I say, “I can’t stand violence either.” I can’t stand violence against indigenous people, against bison and wolves, against centipedes and snails, and against women. I can’t stand violence against the people whose lives are fodder for this system. We in DGR don’t like violence any more than you do.

If you are a human being in civilization, especially an American or a white man like me, you can’t choose between violence and nonviolence. That question was decided for me long ago; my life is based on violence. Our lives as human beings in civilization are based on violence. The question is whether we will use that violence to keep killing the world or use it to bring about something new. I encourage you to remember that there is violence out there already. It is happening to people who can’t tell us what’s going on. It happens to people whose screams we don’t hear because we aren’t listening. If you read this and say, “I just can’t handle violence,” I say welcome aboard, because we can’t handle it either.

Celebrating Seven Years of Self-Governance in Cherán, Michoacán, Mexico

Celebrating Seven Years of Self-Governance in Cherán, Michoacán, Mexico

PURÉPECHA MUNICIPALITY NAMES THIRD COUNCIL OF ELDERS TO THEIR COMMUNAL GOVERNMENT

     by Intercontinental Cry

On Sunday May 27, 2018, the indigenous Purépecha municipality of Cherán, Michoacán, named its Third Council of Elders (Consejo Mayor, Consejo de Keris) to their communal government.

Cherán has been practicing a traditional form of self-government for seven years. Earlier this year, on April 15, 2018, the community celebrated the seven-year anniversary of its uprising against what they all call today “the narco government.”

The narco government included a wide variety of characters, including cartel thugs or “sicarios” working alongside illegal loggers who conspired to ravish Cherán’s forests and anyone who got in their way. Cherán lost over 50 community members between 2007 and 2011. Many of those simply disappeared, never to be seen again.

When Cherán rose up, the local mayor, his cabinet, and all the local police fled the community and left community members to fend for themselves. This and many other details that would come to light during first months of the uprising exposed the collusion of local politicians and the police with organized crime and the very violent and illicit logging activity.

When Cherán rose up, over 300 campfire barricades were erected at intersections throughout the community. An additional five checkpoints were established at entry roadways to the community. As the police fled Cherán, they also left their weapons, uniforms, and vehicles at the police barracks. The community recovered all of these elements to establish their “ronda comunitaria” or community guard.

Photo: El Enemigo Común

Nobody will say it on record to this day, but everyone knows that all cell phone service, all television service, and all radio service was shut off immediately after the uprising. Cherán was disconnected from the rest of the world.

It was during this time that one of the most absolutely astonishing elements of the uprising came to function on a nightly basis: the “fogatas” or campfire barricades. Again, 300 of these barricades were erected throughout the community for security purposes, but they also became core meeting points and the basis for the collective decision making process that Cherán established at that time and continues to practice today.

Each fogata belongs to one of four neighborhoods in Cherán: 1st barrio or Karhákua, 2nd barrio or Jarhukutini, 3rd barrio or Ketsikua and 4th barrio or Paríkutini, also jokingly known as Paris. The fogatas met every night during the uprising. Each fogata would send proposals and a representative to neighborhood assemblies and then to community assemblies. The fogata element of the communal government in Cherán was the only new element.

The neighborhood assemblies and the larger general assembly are part of the traditional forms of self-governance that Cherán practiced 40 years earlier, before political parties and institutional forms of government came to the community.

In these general assemblies, the community of Cherán came to a consensus. They decided to return to their traditional form of self-governance, which also required the recreation of governing councils.

The naming of Cherán’s third Council of Eldersa process that takes place every three yearsmarks the seventh year of self-governance in the community.

Photo: El Enemigo Común

This article was originally published at El Enemigo Común. It has been edited and re-published by Intercontinental Cry under a Creative Commons License.

Fighting US Psychological Operations (PSYOPS) in Cyber Warfare and Winning

Fighting US Psychological Operations (PSYOPS) in Cyber Warfare and Winning

THE CIA, NSA, FBI AND DOD ARE YOUR “FRIENDS” ON FACEBOOK

     by Lauren Smith / Wrong Kind of Green

Social media and Google serve three strategic purposes for the United States government. First, they allow Washington to conduct espionage; second, they facilitate the spread of disinformation campaigns, and third, they serve as conduits for the transmission of social contagions. In deploying thought control against the users of social media and Google, the US government regulates civil unrest both domestic and abroad. As such, social media and Google can best be understood as unconventional weapons (UW). In this capacity, they can be used in proxy wars against the governments of non-compliant Non-Aligned Movement (NAM) nations to accomplish regime change.

Through geopolitical manipulations that eliminate opposition, the United States government can actualize the ruling elites’ vision of a corporate controlled global economy without the deployment of troops. This model of “non-violence” or “soft-coup” as a method of unconventional warfare can be traced to Gene Sharp and the Albert Einstein Institution. It is organized through the efforts of the NGOs it oversees such as Freedom House and the National Endowment for Democracy (NED). And, it can be observed in the various Color Revolutions that occurred in Eastern European countries, the Middle East and now Latin America.

The NED is the coordinating Washington agency for regime destabilization and change. It is active from Tibet to Ukraine, from Venezuela to Tunisia, from Kuwait to Morocco in reshaping the world after the collapse of the Soviet Union into what George H.W. Bush in a 1991 speech to Congress proclaimed triumphantly as the dawn of a New World Order.”

Within this context, activists and the NAM must consider Facebook, Twitter, YouTube and Google hostile territory that is ultimately controlled by the United States Intelligence Community (IC) and the Department of Defense (DoD). Despite user-friendly packaging and attractive advertisements, social media and Google remain militarized programs. As such, activists and NAM users must enter with caution, prepared to do battle to win at PSYOPS in cyber warfare.

Using the US DoD model, cyber warfare can be upgraded to a department on par with the NAM armed forces. In this regard, Polytechnic universities are strategic and can be controlled by NAM governments and their operatives, as they are in the US by the IC and DoD. NAM military institutions can recruit cyber warfare teachers/activists, develop educational curriculum, set career paths and train cyber soldiers to counter US engagements. Useful information can be taken directly from any of the US military’s cyberspace recruitment sites, which promise to develop capabilities to defend national security as well as to create effects in cyberspace to achieve national objectives.

The first step for the NAM is to create public awareness of the threat that social media possesses to protect users and the NAM governments against its influence. In doing so, a cadre of civilian cyber PSYOP content monitors can be created. Additionally, software is now commercially available that can search, monitor, analyze and manage social media content. Presently, large corporations as well at the IC and DoD are using this social media software – since it is useful in business marketing strategies. NAM governments can deploy this software in their communication offices. Through vigilance, PSYOP efforts against NAM governments by social media and Google can be thwarted.

Concurrently, it is critical to guard against cyber invasion through the passing of cyber laws with strong penalties, as done by Germany with its groundbreaking Network Enforcement Act (NetzDG). Also, it is key to ensure through news media communications that workers in the IT industry understand the ramifications of the work in which they engage as well the nefarious intent of their respective employers. The “Never Again Pledge” taken by US tech workers in 2017 is promising.

Germany’s Network Enforcement Act (NetzDG)

Germany has blazed a trail for the NAM against PSYOPS in social media with its Network Enforcement Act (NetzDG) and it’s setting of finesof up to $50 million euros.ii The NAM must immediately follow suit with the setting of robust laws and fines against: the dissemination of propaganda; the encouragement of violent offences endangering the state; treasonous forgery; public incitement to crime; breaching of the public peace by threatening to commit offences; the forming of criminal or terrorist organizations.

Never Again Pledge

As reported by the New Yorker in its March 14, 2017 article titled: Why Protesters Gathered Outside Peter Thiel’s Mansion This Weekend, a group of about fifty tech workers, attorneys and anti-surveillance activists stood outside the home of Peter Thiel. Thiel is co-founded of Palantir Technologies, a Trump advisor, and was Facebook’s first investor. He remains a board member of Facebook as well as a member of the Bilderberg Steering Committee. The protest was organized to bring attention to software developed by Plantir called Investigative Case Management that is used by Immigration and Customs Enforcement (ICE) for mass deportation. Amongst other data sources to identify and track a given target, it uses social media content.

Since the presidential election, nearly three thousand tech workers signed the Never Again Pledge, promising to not work on databases that the Trump Administration might use to target vulnerable groups. The name is a nod to I.B.M.’s alleged role, during the Second World War, in systematizing Nazi genocide by providing punch-card technology.

“The banality of evil today is the person sitting in a cubicle in San Francisco, or in Silicon Valley, building the tools of digital fascism that are being used by those in Washington,”

To understand the US governments offensive against unfavorable NAM regimes, it is important to understand two things: first, the origin of Facebook and Google; and second, the influence they collectively wield over human motivation through coercion and the spread of social contagions through distorted reality. Within this context, it is of primary concern that activists become adept at the stealth guerilla tactic of hit-and-run, as flexibility and anonymity become key to survival. With the stakes of financial ruin, imprisonment and death so high under the USA Patriot Act, no dissident remains safe.

USA Patriot Act

As dissent and protest both international and domestic becomes increasingly illegal in the United States, and the governmental powers to investigate “terrorism” expand and morph under the USA Patriot Act, activists and the NAM must develop and foster skill sets that protect sympathetic Internet hosts, contributors and content against attack wherever they reside. According to the American Civil Liberties Union (ACLU), the Patriot Act increases the government’s surveillance powers in four areas:

  1. Records searches. It expands the government’s ability to look at records on an individual’s activity being held by a third party. (Section 215)

  1. Secret searches. It expands the government’s ability to search private property without notice to the owner. (Section 213)

  1. Intelligence searches. It expands a narrow exception to the Fourth Amendment that had been created for the collection of foreign intelligence information (Section 218).

  1. “Trap and trace” searches. It expands another Fourth Amendment exception for spying that collects “addressing” information about the origin and destination of communications, as opposed to the content (Section 214).

Accordingly, as described by the ACLU:

  • The government no longer has to show evidence that the subjects of search orders are an “agent of a foreign power,” a requirement that previously protected Americans against abuse of this authority.

  • The FBI does not even have to show a reasonable suspicion that the records are related to criminal activity, much less the requirement for “probable cause” that is listed in the Fourth Amendment to the Constitution. All the government needs to do is make the broad assertion that the request is related to an ongoing terrorism or foreign intelligence investigation.

  • Judicial oversight of these new powers is essentially non-existent. The government must only certify to a judge – with no need for evidence or proof – that such a search meets the statute’s broad criteria, and the judge does not even have the authority to reject the application.

  • Surveillance orders can be based in part on a person’s First Amendment activities, such as the books they read, the Web sites they visit, or a letter to the editor they have written.

  • A person or organization forced to turn over records is prohibited from disclosing the search to anyone. As a result of this gag order, the subjects of surveillance never even find out that their personal records have been examined by the government. That undercuts an important check and balance on this power: the ability of individuals to challenge illegitimate searches.

The ACLU also describes non-surveillance provisions in the Act, which remain the most serious as they enable the indefinite detention of non-citizens without trial. The provisions:

  • Give the Director of Central Intelligence the power to identify domestic intelligence requirements. As the director is appointed by the president, this extraordinary unchecked executive power opens the door to the same abuses that took place in the 1970s and before, when the CIA engaged in widespread spying on protest groups and other Americans.

  • Create a new crime of “domestic terrorism.” The Patriot Act transforms protesters into terrorists if they engage in conduct that “involves acts dangerous to human life” to “influence the policy of a government by intimidation or coercion.” The words “influence” and “coercion” have a wide range of meanings and allow for unbridled discretion. Furthermore, the law gives the attorney general and the secretary of state the power to detain or deport any non-citizen who belongs to or donates money to a broadly defined “domestic terrorist” group.

  • Allow for the indefinite detention of non-citizens. The attorney general can order detention based on a certification that he or she has “reasonable grounds to believe” a non-citizen endangers national security. Tangible proof is not a requirement, only a “reasonable belief”. Worse yet, if the foreigner does not have a country that will accept them, they can be detained indefinitely without trial.

US News Media: Counterpunch, Alice Donovan & the FBI

On December 25, 2017, a troubling article appeared in Counterpunch, a US media news outlet, regarding the writing of an alleged journalist/Russian troll, Alice Donovan.  Links to an additional article appeared on Counterpunch’s Facebook page on July 27, 2018. Overall, the articles allege Donavan is either an unimaginative writer that committed plagiarism as a sport, or that she is a Russian troll. However, Donovan’s transgressions and intent are irrevelant, what the story revealed in all its gory horror is how the US government concocts justifications to learn the identity and location of a given dissident, and how easily it scared an independent and alternative US news media outlet into become its slobbering accomplice.

In this case, the FBI alleged Donovan was a Russian agent that spread disinformation in the Clinton/Trump presidential campaign with the intent of effecting the national election, despite the fact that she did not submit articles specifically on Clinton or Trump. What the US government’s fishing expedition also revealed is that all US news media can’t be trusted, even ones with cute sounding reactionary names, such as Counterpunch. As Counterpunch not only admitted to bending over backwards to cooperate with the FBI, it also proudly declared its decision to up-the-ante and conduct its own investigation and exposé. Counterpunch analyzed the transmission times and IP address of Donovan’s submission emails; it included photos of the alleged Alice Donovan from other media sources in its articles about her; it interviewed other news media that hosted Donovan’s articles, and most outrageously actually asked Donovan to call them by phone and send a photo of her utility bill disclosing her physical location. Without surprise, Donovan declined both requests stating: “security reasons.” If there was ever a reason to give up US hosted media, write under a nom de plume, use a Virtual Private Network (VPN), and accept payment only in crypto currency, this is it!

As anyone honestly committed to telling the truth will explain, it’s not about the messenger; it’s about the message. Under the Patriot Act, writers are safer in anonymity. But as anyone committed to telling the truth will also explain, when you eliminate one activist, ten are energized to take their respective place. Contrary to what PSYOPS wants the 99 percent to believe, there is strength in numbers. While imperialist greed through big payoffs may make for fast friendships, the shared love of truth and justice is priceless. It engenders a loyalty so strong it overcomes setbacks and hardship.

Origin of Facebook & Google

While the development of the Internet, data collection, surveillance and the global positioning system (GPS) can be attributed to the Department of Defense (DoD), Facebook and Google are also inexplicably linked to the CIA’s non-profit venture capital corporation, In-Q-Tel (IQT).

Within this context, Facebook can best be understood as the “friendly” replacement of DoD’s unpopular Information Awareness Office (IAO) which was created by its Defense Advanced Research Projects Agency (DARPA) in 2002 and defunded shortly thereafter in February 2003 by congress, due to public criticism that the development and deployment of its technology could potentially lead to an Orwellian styled mass surveillance system. The timing of Facebook’s development from the standpoint of DoD can at minimum be understood in regard to continuity as fortuitous if not planned – since Zuckerberg is credited with having launched Facebook on February 4, 2004 (within one year of IAO’s defunding).

Information Awareness Office (IAOthe Precursor to Facebook

As the precursor to Facebook, the Information Awareness Office (IAO) brought together several DARPA projects focused on applying surveillance with information technology by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.

This information was then analyzed to look for suspicious activities, connections between individuals, and threats with the goal to increase the probability that authorized agencies of the United States could preempt adverse actions. It is important to note that adverse actions within this context are nebulous and thereby include any action that is perceived to counter US corporate short-term interests and security. Adverse actions as defined can include protests on both international and domestic issues by groups or individuals in thought, word or deed. Thus, internationally, those seeking to defend NAM countries against destabilization, invasion and occupation are engaged in adverse actions; and domestically, those seeking to protect human rights, constitutional rights and the environment are involved in adverse actions.

Just like IAO, Facebook invades and collects the email and telephone numbers of its users’ contacts in its Messenger component. Additionally, Facebook logs all photos and communications. Through its facial recognition component, Facebook links physical identities with names, locations, dates and times for easy surveillance. It also has a payment option, which allows Facebook to gain access to the financial institutions of its users. Groups centered on medical topics are densely populated on Facebook, and they encourage users to share their medical issues upon joining.

Facebook encourages its users to “complete their online profile” and list highly personal information such as: birthdate, gender, family members, school, workplace, intimate relationship, interests, religious and political views, hometown, current city as well as group affiliations. Through the recording of “likes” a granular sense of its users’ values and interests is also made known. This information, when taken in aggregate, allows for a profile so detailed and comprehensive that it amounts to a DoD agent’s wet dream.

According to Dave Chaffey in the Global Social Media Research summary, the number of social media users worldwide in 2018 is3.196 billion. Statista claims Facebook has 2.2 billion active monthly user accounts; YouTube has 1.9 billion; Instagram has 1 billion; and Twitter has 336 thousand. Within this context, social media’s sphere of influence is enormous, as the earth’s population is estimated to be 7.6 billion in 2018, according to Worldometers.

Cutting Edge Social Media Metadata Scanning, Analysis and Management Software

Realizing anything written on this topic is already expired and anything truly mind-bending is classified and beyond reach, there is still a nifty development worth mentioning regarding social media data scanning, analysis and management software. Clearly NAM can benefit by utilizing social media software of this ilk to transmit communications to constituents, gauge reactions to proposed initiatives, and most importantly in the context of this article, quickly identify and stave off destabilizing social media surprise attacks by imperialist powers and their agents. This technology can be considered a 2018 anti ballistic missile (ABM) to social media attacks.

According to Wired media, in its 2009 article titled U.S. Spies Buy Stake in Firm that Monitors Blogs & Tweets, the CIA’s venture capital nonprofit, IQT wanted Visible Technologies, a software firm that specializes in monitoring social media, to keep track of foreign social media, and provide early-warning detection on how issues are playing internationally. With this technology it is also possible for intelligence agencies to compile information on political figures, critics, journalists or others, and to exploit such information for political advantage. Visible’s foreign languages capabilities include Arabic, French, Spanish and nine other languages.

According to G2 Crowd, a Software & Services marketing firm, the latest 2018 must-have in business software is a Social Media Suite. The suite has the capability to manage, monitor, and analyze information related to one or multiple social media accounts through a single product. As such, it can:

  • Plan and publish digital content via social media

  • Engage with communities via social media

  • Report on effectiveness of social media practices

  • Track regions and demographics of audience

  • Analyze performance of posts and campaigns

  • Monitor for related mentions and trends

Facebook and the Cambridge Analytica Scandal

Through third parties, Facebook, alike its forerunner IAO, permitted the analysis of its users data. In the Cambridge Analytica (CA) scandal it was revealed that Facebook exposed the personal data of 87 million users to a political consulting firm in which Trump advisor, Steve Bannon, was its vice president and founder. The intent was to use personal data against users to influence their respective vote in the 2016 US presidential election in favor of Trump. The work of CA was done by the SCL Group, its parent company. SCL describes its capabilities as Vox’s Andrew Prokop writes:

“SCL tends to describe its capabilities in grandiose and somewhat unsettling language – the company has touted its expertise at ”psychological warfare” and “influence operations.” It’s long claimed that its sophisticated understanding of human psychology helps it target and persuade people of its clients’ preferred message.”

It is important to note that SCL’s main client is NATO and the defense department of its member states. Another company that was involved in this scandal is Palantir. Peter Thiel, is Palantir’s chairman and founder, as well as a major contributor in the Trump campaign. Palantir not only has numerous contracts with the US Intelligence Community and Department of Defense like the SCL Group, but Thiel was Facebook’s primary investor, and he remains on its board of directors.

CA whistleblower Chris Wylie told British Members of Parliament that senior Palantir employees worked with the firm on the Facebook data to help it build models off of the dataset to use for political ad targeting purposes.

Facebook’s Social Contagion Study Scandal

Another known scandal involving Facebook is the Social Contagion Study, which was undertaken in 2012 by researchers from Facebook, Cornell University, and the University of California.

In the study, the posts of approximately 700,000 unsuspecting users of Facebook were secretly manipulated, for a week, to determine how emotional states were transmitted over the platform. In the experiment, Facebook altered the news feed content of users to control the number of posts that contained words with positive or negative charged emotions to spy on the users’ reactions. They found negative feeds resulted in the user making negative posts, where as positive feeds resulted in the user making positive posts.

The team concluded its study by saying that emotions are spread via contagion through social networks.

The study appeared in the June edition of the journal Proceedings of the National Academy of Scientists (PNAS) under the title: Experimental evidence of massive-scale emotional contagion through social networks. According to the researchers:

Emotional states can be transferred to others via emotional contagion, leading people to experience the same emotions without their awareness. We provide experimental evidence that emotional contagion occurs without direct interaction between people (exposure to a friend expressing an emotion is sufficient), and in the complete absence of nonverbal cues.”

Facebook was publicly condemned when it became known that it conducted this Orwellian thought policing on unsuspecting users. The attack against Facebook worsened when it was discovered that one of the researchers of Facebook’s mind control study, Jeffrey T. Hancock of Cornell University, also received funding from the DoD’s Minerva Research Initiative to conduct a similar study entitled “Modeling Discourse and Social Dynamics in Authoritarian Regimes”.

Additionally, Cornell University was engaged with the Minerva Initiative and had a study funded through 2017 managed by the US Air Force Office of Scientific Research, which aimed to develop an empirical model “of the dynamics of social movement mobilization and contagions”.

The project aimed to determine the “critical mass” (tipping point) of social contagions by studying their “digital traces” in the cases of “the 2011 Egyptian revolution, the 2011 Russian Duma elections, the 2012 Nigerian fuel subsidy crisis and the 2013 Gazi park protests in Turkey.”

Facebook’s social contagion scandal also illustrates the disturbing ease that US educational facilities have in cooperating with the US military in experiments on human subjects without their knowledge or permission, in violation of ethical standards and protections.

DoD & the Minerva Initiative

The stated goal of the Minerva Initiative is to improve DoD’s basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the U.S. The program seeks to achieve this by sponsoring research designed to bring together universities, research institutions, and individual scholars. In 2008, the project was provided $50 million by the United States Department of Defense. The journalist Nafeez Ahmed has expressed concern that Minerva research, in its effort to understand mass mobilization, may be targeting peaceful activists, NGOs and protest movements.

Social Network Analysis (SNA) & Unconventional Warfare (UW)

According to LTC Glenn Johnson, CW4 Maurice Duclos, Mr. Dan LeRoy in their article tittled: Mapping the Human Terrain: Applying Social Network Analysis (SNA) to an Unconventional Warfare (UW) Framework:

“Without a detailed understanding of the human terrain the Unconventional Warfare (UW) planner is uninformed about key aspects of the operating environment. SNA can provide the human terrain map needed to plan and execute UW operations. By developing a map of the human domain, SNA helps provide a description and picture of the resistance, opposition, or neutral entities, and can uncover how the population is segmented and how members interact with one another. SNA focuses on people’s behavior and how it is profoundly affected by their ties to other people and the social networks in which they are embedded.

Using SNA provides visualizations of people within their social spaces and assists in ranking their potential ability to influence those social spaces. This provides an understanding of the organizational dynamics of a resistance, insurgency, or counterinsurgency and highlights how to best influence, coerce, support, attack or exploit them. Collecting human terrain data to support SNA must be driven by commanders through focused efforts and should be conducted during every engagement with a foreign country.”

Examples of Social Network Analysis (SNA) & Unconventional Warfare (UW)

The US funded National Endowment for Democracy (NED), which is credited for numerous destabilization efforts in NAM nation states under the guise of “democracy” or imperialist subjugation as it is better known and practiced, has some great information in its numerous articles discussing the tactical use of social media to fight proxy wars. Only in the examples it provides and resources it cites, just the Chinese and Russians and NAM nation states utilize this technology. NED remains absolutely silent on its US sponsor’s activities.

According to a brief prepared by Dean Jackson for NED through the International Forum for Democratic Studies: The velocity and volume of disinformation in the contemporary information space has amplified its effectiveness and left many members of the public increasingly angry, fearful, or disoriented. This leaves the public even more vulnerable to future manipulation, resulting in a cycle of declining public trust in objective sources of information which some analysts call truth decay.

According to NED, effective ways to use social media as an unconventional weapon in proxy wars is to:

  • React or create crisis by flooding information space and drowning out discussion via online trolling, harassment, and distraction, especially with highly active automated accounts. These techniques push independent voices out of public spaces and are can be considered a new form of political censorship.

  • Falsify evidence, push misleading narratives, and spread falsehoods. Use media and diplomatic resources concurrently to promote false stories at times of rising anti-government sentiment.

  • Create accounts that are partially automated and partially controlled by human users to avoid detection. These are often referred to as cyborg or sock puppet accounts.

  • Use preexisting divides within target societies to produce content for which there is societal demand. Disinformation is more effective when it’s amplifying existing political beliefs and divisions, as opposed to introducing new narratives into the public sphere.

  • Use proactive disinformation campaigns to achieve real-world impact by influencing the actions of consumers.

  • Use disinformation around elections to influence citizens’ decisions to vote or to abstain from voting.

  • Use disinformation to promote a larger narrative over time or to degrade civic discourse by promoting division or cynicism.

Role of Social Media in Arab Uprisings

In an article by Heather Brown, Emily Guskin and Amy Mitchell titled: the Role of Social Media in the Arab Uprisings they state that the Arab uprisings could be deemed

“Facebook or Twitter revolutions” as the news media focused heavily on young political opposition protesters mobilizing in the streets, armed with smartphones.

“As almost immediately after the Arab uprisings began, there was debate over the role and influence of social media in the ouster of Tunisian president Zine El Abidine Ben Ali and the overthrow of Mubarak. “Social media indeed played a part in the Arab uprisings. Networks formed online were crucial in organizing a core group of activists, specifically in Egypt. Civil society leaders in Arab countries emphasized the role of the internet, mobile phones, and social media in the protests.”

Reality becomes distorted when all social media reference points endlessly repeat the same message concurrently. Within this context, civil unrest is born out of social contagion frenzy. An Egyptian man, who was a student protestor against Mubarak in 2011, confided in me that a crescendo of social media chatter goaded him into taking part in the protests. While he had been beaten by Mubarak’s police in an earlier incident and had personal reasons to protest, he still believes he was driven and manipulated through social media – especially since the locations to which he and his friends were led were followed by film crews and riot police too quickly after their arrival to have been un-staged.

Looking back, he now regrets taking part in the protests, as the removal of Mubarak created a power vacuum that led to greater economic and social struggle, and allowed imperial powers to take advantage of Egypt’s resources.

Personal Account of Facebook’s use of Unconventional Warfare (UW)

On April 18, 2018, I witnessed the Facebook Nicaragua expatriate groups I belong to transform its sleepy pages, that focused on advertising the best music and drink specials in town, to revolutionary pages seeking to overthrow the democratically elected sovereign government of Nicaragua.

Having just returned from Nicaragua two weeks earlier, after spending two peaceful months in San Juan Del Sur, I was shocked at the sudden and widespread vitriol controlling my newsfeed. First, I read how the government was corrupt in making changes to their social security system, and then I read how the government was murdering protestors. I knew from my understanding of Nicaragua’s history; President Ortega’s longstanding commitment to the country; its highly successful model of community policing; and the international context Nicaragua is forced to operate in due to repressive IMF loans and trade agreements, that there was more to this story.

Yet, there was no analysis anywhere to be found, only baseless accusations from predominantly white men and an occasional white woman living in Miami, Texas and Costa Rica. A number of Latinos from various locations in the United States later joined in the chatter claiming they were born in Nicaragua and thus justified in posting hostilities, when engaged in debate.

Property owners I personally knew also spoke against the government and joined in with inflammatory remarks. It is important to understand that President Ortega and the FSLN did not conduct purging campaigns to remove its bitter rightwing enemies/Somozistas. Under President Ortega’s compassionate and practical leadership, Nicaragua even forgave the Contras that its FSLN fought against once they agreed to lay down their arms.

Everywhere I looked the message of hate was the same, be it Facebook, Twitter or mainstream news media from the mouths of rightwing senators Marco Rubio and Ileana Ross-Lehtinen who staged meetings with protestors as well as alternative media such as Democracy Now and the Guardian. The understated president, Daniel Ortega, went from being an astute and beloved aged revolutionary hero to a merciless dictator in social media and the press within a few hours. The news feed was so similar, overwhelming, relentless and well packaged, that it seemed immediately like an expertly orchestrated massive disinformation campaign set by the imperial United States to remove President Ortega and the FSLN from office yet again.

Anytime I questioned the prevailing narrative on the Facebook expatriate groups, 10 to 15 users, with questionable profiles, ganged up on me. I was personally insulted, told to remove my posts, and threatened. They feared my comments. Additionally, my Facebook friends were contacted and insulted and told to “make me remove my posts”. I received phone calls on Facebook Messenger despite the fact that my friend’s list is hidden.

The questionable profiles that contacted me often listed present employment with an obscure non governmental organization (NGO), and/or prior employment with the US State Department, US military, or in one case a user listed his job as a “private investigator” that just returned from “doing security in Venezuela.”

Yet, what was most troubling to me was that people I knew from San Juan Del Sur were brainwashed by the massive and unrelenting wave of disinformation. PSYOPS temporarily worked. They began repeating hostile catch phrases against the government as if it was Holy Scripture. They would not read or watch anything in favor of the government, despite my best efforts through verbal and written communication. They made up their minds, based on social media and Google’s distorted reality, that revolution was what the majority of people in Nicaragua wanted. This distortion couldn’t be farther from the truth, as President Daniel Ortega was elected with over 70 percent of the vote. However, the barrage of repeating fake propaganda videos resulted in social contagion frenzy, similar to that experienced by the Arab students in Egypt.

As it turned out, many of the photos and videos posted and used to incite violence were actually taken in Mexico and Honduras years earlier and many of the “dead” were found resurrected in other parts of Nicaragua alive and well. However, armed criminal mercenaries called “peaceful student protestors” by the news and social media did murder police and civilians. Fortunately, distorted reality can only last a short time.

In Nicaragua, the government had control over the county within three months, as the news and social media lies became apparent to citizens and foreigners. Essentially, the criminal mercenaries that infiltrated the protests were not content to restrict their activities to the ones dictated by their US government employers. To supplement their wages, they robbed, raped and pillaged the communities to which they held hostage, and were systematically removed by local residents as well as the police.

Facebook’s Biased Reaction

Facebook automatically flagged and blocked my posts on Nicaragua’s expatriate groups, and group administrators removed the ones that slipped through. My posts merely explained the US government’s longstanding disinformation campaigns against Nicaragua. Then, Facebook and/or group administrators removed my access to the pages. Eventually, due to threats, I deleted my Facebook profile. However, PSYOPS did not succeed in silencing me; instead, it encouraged me to write for a larger audience.

Control over Dissent Using Facebook

In late July 2018, I created a new Facebook profile and began again to monitor Nicaragua expatriate news groups and post articles that support its sovereign government against slanderous untruths. On July 29th, Facebook removed and considered spam two articles that I posted: “The Case Against Daniel Ortega” by Chuck Kaufman hosted on the Libya360.Worldpress.com website and “Opposition Beyond the Violence in Nicaragua” by John Perry hosted on The Guardian website. Both articles non-violently support the sovereign government of Nicaragua. Fortunately, I was able in both instances to get the posts restored after clicking a few buttons. Yet I still remain unable to get Facebook or group administrators to remove articles that promote violence against the government. Despite my flagging of these fake articles for deletion under the Facebook categories: terrorism, violence, harassment, and hate speech, Facebook allows this vitriol to remain.

After posting a third article titled: “After the Failed Coup, After All the Lies, Nicaragua Rebuilds” by Tortilla Con Sal, hosted on the Telesur website, Facebook locked me out of my user account. The article I posted promoted peace and reconstruction. For the record, none of the articles I posted were ever in violation of Facebook’s community standards.

To unlock my user account, Facebook required me to upload a close-up photo of my face. Facebook’s clear bias against the content of my posts coupled with its desire to invade my physical privacy proved intimidating. Facebook, a corporate behemoth, had me vulnerable and exposed, as I could not access my account to delete it without first revealing my personal identity. Facebook is like the mighty Wizard of Oz in that its master is concealed behind a curtain and unreachable. Facebook lists no email address or phone number for “customer service”.

Did Facebook’s version of Orwell’s Thought Police flag my account? After a few deep breaths, I took a chance that Facebook would use its facial recognition software to confirm my physical identity against an Internet search. So, I found a close-up photo online that corresponded with the fake name I used to open my Facebook account, and uploaded it hoping for the best. It worked. I had access to my profile by the next morning. However, I continue to wonder if Facebook was fooled or if I am merely being given more opportunity to violate the Patriot Act in thought and word? Are my CIA, NSA, FBI and DoD “friends” continuing their surveillance of my personal communications on Facebook’s Messenger and WhatsApp applications just more closely? Under the Patriot Act, Facebook is mostly prohibited from disclosing law enforcement surveillance. According to Facebook, in its summary of its 2017 transparency report, it states:

“The US government requests for account data remained roughly even at 32,742, of which 62% included a non-disclosure order prohibiting Facebook from notifying the user, which is up from 57% during the first half of 2017.”

Other transparency report findings of note for Google, Verizon and AT&T are as follow:

“Google received 48,941 government data requests affecting 83,345 user accounts in the first six months of 2017.” And, “In the reporting period between 2016 and 2017, local, state and federal government authorities seeking information related to national security, counter-terrorism or criminal concerns issued more than 260,000 subpoenas, court orders, warrants, and other legal requests to Verizon and more than 250,000 such requests to AT&T.”

On May 24, 2018, the ACLU filed a Freedom of Information Act request to find out how agencies like the FBI and the Department of Homeland Security are collecting and analyzing content from Facebook, Twitter, and other social media sites.

Government surveillance of social media can have serious consequences, whether you’re a U.S. citizen, a lawful resident, or are seeking to immigrate to or visit the United States. The FBI appears to be using social media as a basis for deciding who to interview, investigate, or target with informants or undercover agents. A single Facebook post or tweet may be all it takes to place someone on a watch list, with effects that can range from repeated, invasive screening at airports to detention and questioning in the United States or abroad.”

With the proliferation of US government non-discloser surveillance, the use of facial recognition software, and the requirement to upload close-up photos to gain access to existing profiles, the velvet gloves are completely off Facebook as an iron fisted US government spy tool. The justification that this intrusive level of policing is merely to remove “fake profiles” doesn’t fly. There are alternate methods that do not compromise our constitutional and civil rights. This is a ruse, engineered by the NSA. Be warned.

Facebook Facial Recognition Software and the US National Security Agency (NSA)

As discussed by James Risen and Laura Poitras in their May 31, 2014 article titled: N.S.A. Collecting Millions of Faces From Web Images, the National Security Agency (NSA) is actively harvesting massive amounts of images of people from communications that it intercepts through its global surveillance efforts for use in sophisticated facial recognition programs, according to top-secret documents.

“The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. The agency intercepts millions of images per day including about 55,000 facial recognition quality images which translate into tremendous untapped potential, according to 2011 documents obtained from the former agency contractor Edward J. Snowden.”

In-Q-Tel (IQT)

In early 1999, with funding directed by the US Central Intelligence Agency (CIA), input from Silicon Valley consultants and Norman Augustine, a former CEO of Lockheed-Martin, In-Q-It, a non-profit corporation was formed. Its core mission to improve the data collection and analysis capabilities of the CIA through access and control over emerging Information Technology (IT) remains intact to date. By March of 1999, the corporation received its first contract. In 2000, its name was changed to In-Q-Tel (IQT).

IQT invests in areas where there is both a CIA need and private sector interest. Examples of commercial applications that also support intelligence functions are: data warehousing and mining, knowledge management, profiling search agents, geographic information systems, imagery analysis and pattern recognition, statistical data analysis tools, language translation, targeted information systems, mobile computing, and secure computing.

Though IQT, the CIA has the option of purchasing products directly from the vendor or launching Research & Development (R&D) projects. While IQT’s present budget remains secret, its first year budget was $28 million. According to a 2013 Fox Business News report, IQT claims that for every dollar it invests in a company, the venture community invests over $9. Further, it claimed that it had leveraged more than $3.9 billion in private-sector funds.

R&D remains the core of its activities. Sometimes IQT assembles teams of companies to create the solution it seeks; other times it is a co-investor in a fledgling company with additional business partners. IQT also uses request for proposal. Essentially, IQT is empowered to use whatever model meets its objective.

In the area of R&D, the CIA’s agreement with IQT allows it and/or its partners to retain title to the innovations created, and to freely negotiate the allocation of Intellectual Property (IP) derived revenues. The only major stipulation is that the CIA retain traditional “government purpose rights” to the innovations. This agreement has allowed IQT to amass considerable financial resources secretly over the last nineteen years since its inception. Also, this agreement has permitted collaborating and beholden individuals to become extremely wealthy and powerful.

To restrict contracting to specific entities, and to achieve privacy from oversight authorities, IQT uses DARPA’s contract model called “Other Transactions” (OT). OT contracts enable IQT to bypass Federal Acquisition Regulations (FAR), which requires competition in federal contracting.

Because of the clandestine nature of IQT’s work and its key relationship to the CIA, both entities remain extremely vulnerable to security risks during solution transfer.

Origin of Facebook

While no record of the CIA directly funding Facebook through IQT is apparent, members of IQT’s top management are founding members and/or board members of Facebook. Some of Facebook’s allure to users is that Mark Zuckerberg and his friends started the company from a Harvard dorm room and that he remains the chairman and chief operating officer. If he didn’t exist, he would need to be invented by Facebook’s marketing department. Primarily, the legend and image of a fresh faced Zuckerberg provides a palatable context that entices young people to voluntarily part with their constitutional right to privacy for social acceptance. Though subtle coercion, young people come to believe that in order to be “liked” by their peers, they need to be part of the Facebook brand.

A few months after Facebook was formed in 2004, it received its first capital injection from Peter Thiel, a member of the Steering Committee of the exclusive Bilderberg Group, the drivers of globalization. Members include political leaders, key members from the intelligence community, and experts from industry, finance, academia and the media. According to Global Research’s Stephen Lendman, in his May 2014 article titled: The True Story of the Bilderberg Group and What they May Be Planning Now:

“Bilderbergers want to supplant individual nation-state sovereignty with an all-powerful global government, corporate controlled, that’s check-mated by militarized enforcement.”

In August of 2004, Thiel acquired a 10.2% stake in Facebook for $500,000. The next two capital injections were $12.7 million from Thiel and Accel Partners in May 2005 and then $27.5 million from an Accel-led round of financing that included Thiel, Accel and Greylock Partners in April 2006. In 2012, Thiel sold the majority of his shares for over $1 billion, but remains on the board of directors.

Essentially, IQT is linked to Facebook through Thiel, and Thiel is linked to IQT through his firm Palantir. So, to understand Facebook it is first necessary to understand Palantir, then Thiel.

Palantir

According to Wikipedia, Palantir was started in 2004. Its only outside backer was the CIA’s nonprofit venture capital firm, IQT. Through pilots facilitated by IQT with computer scientists and analysts from intelligence agencies, Palantir’s technology was developed over a three-year period. A document leaked to TechCrunch revealed that Palantir’s clients as of 2013 included at least twelve groups within the U.S. government, including the CIA, DHS, FBI, CDC, the Marine Corps, the Air Force, Special Operations Command, West Point, the Joint Improvised-Threat Defeat Organization and Allies, the Recovery Accountability and Transparency Board and the National Center for Missing and Exploited Children.

Peter Thiel

According to Wikipedia, Peter Thiel was born in Germany and holds German, American and New Zealand citizenship. Besides being a member of the Bilderberg Group’s Steering Committee as referred to earlier, Thiel is the co-author of an anti-multicultural book titled “The Diversity Myth: Multiculturalism and Political Intolerance on Campus”, where his racist and misogynist bias is apparent in his argument that multiculturalism in colleges is hurting education and that some cases of alleged date rape are actually seductions that are later regretted.

Despite his apology, issued 20 years after the book was published, he gave $1.2 million to the campaign of then Republican presidential nominee Donald Trump, who ran on a white nationalist campaign. Thiel is also is a member of the super PAC called: Make America Number 1. The super PAC is credited with donating funds to Steve Bannon, via a shell company he heads named Glittering Steel. Bannon is widely considered a racist, anti-Semite and white nationalist. The supper PAC also donated funds to rightwing Senator Ted Cruz. With Thiel’s clear intent and bias, it should be no surprise that the Facebook Cambridge Analytica scandal favored Trump in the election, and that the violent prevailing narrative against Nicaragua, supported by Ted Cruz, is impossible to remove from Facebook’s expatriate group pages.

Accel Partners: In 2004, Accel partner James Breyer sat on the board of directors of military defense contractor Bolt, Beranek and Newman (BBN) with IQT’s CEO Gilman Louie. BBN is known for essentially helping to create email and the Internet for the DoD. Breyer is a member of the Council on Foreign Relations.

Greylock Partners: Howard Cox, the head of Greylock, served on IQT’s board of directors. Before Greylock, Cox served two years in the Office of the Secretary of Defense.

Origin of Google

Launched in 1998, Google is one of the world’s largest media companies. While the Department of Defense (DoD), CIA, NSA and Google’s marketing department would like users to believe that its founders, Stanford University students, Larry Page and Sergey Brin developed software independent of the DoD, the truth is they didn’t. They were both on the payroll of the National Science Foundation (NSF) while working on its Stanford Digital Library Project (SDLP). This library project is similar to Google in that it involved the creation of search algorithms to scan large quantities of data to find relationships.

The NSF is funded by the US federal government and expresses in its mission statement its intention to “secure the national defense”. NSF has a longstanding relationship with the DoD’s Defense Advanced Research Projects Agency (DARPA). Nothing requiring serious funding and real paychecks involving Information Technology and US Universities is done without DARPA knowledge as detailed below:

“In the 1970s, the agency responsible for developing emerging technologies for military, intelligence, and national security purposes the Defense Advanced Research Projects Agency (DARPA) linked four supercomputers to handle massive data transfers. It handed the operations off to the National Science Foundation (NSF) a decade or so later, which proliferated the network across thousands of universities and, eventually, the public, thus creating the architecture and scaffolding of the World Wide Web.”

Not only was Google’s development nurtured by NSF/DARPA, but Google was also was aided by the secretive Massive Digital Data Systems (MDDS) program which was administered by private contractors for the CIA and NSA. The MDDS program sought to identify the digital fingerprints of users inside the World Wide Web so information requests could be tracked, sorted and aggregated to reveal individual proclivities and that of like-minded others with the intention of assembling target groups for easy surveillance so as to predict and counter their plans. The MDDS project was named Birds of a Feather with the thinking that like-minded individuals will engage in coordinated action together, just as birds fly in predictable V-formations. Predictability is key to the CIA in its efforts to weaponize social unrest. MDDS is considered to have helped create the design breakthrough that Google was built upon

Google has been an obvious partner with the CIA since 2004 when the company bought Keyhole from IQT, the CIA’s venture capital nonprofit. EarthViewer, Keyhole’s mapping technology software, became Google Earth.

Google and Social Media’s Influence

Besides geographic and locational tracking, Google assists the government in its efforts to write, and rewrite, history. According to its Google’s transparency report, the US government has named 79,901 items for removal since 2009. To add perspective to this number, consider that for this same period in time, Venezuela has named 10 items for removal, and Nicaragua has named 1 item for removal.

Content Placement in Social Media and Google

Olivia Solon and Sam Levin detail, in their December 16, 2016 article for The Guardian, How Google’s Search Algorithm Spreads False Information with a Rightwing Bias. According to the authors, search and autocomplete algorithms prioritize sites with rightwing bias, and far-right groups trick it to boost propaganda and misinformation in search rankings. As described below, the authors uncovered this bias in environmental as well as social and political examples:

“Following a recent investigation by the Observer, which found that Google’s search engine prominently suggests neo-Nazi websites and anti-Semitic writing, the Guardian has uncovered a dozen additional examples of biased search results. Google’s search algorithm and its autocomplete function prioritize websites that, for example, declare that climate change is a hoax, being gay is a sin, and the Sandy Hook mass shooting never happened.”

To test this allegation out, I entered the following text: “Socialism is…” Autocomplete added: “…is for figs.” The full sentence with autocomplete then read: “Socialism is for figs.” Photos of a red t-shirt appeared. On the t-shirt is a drawing of Che Guevara, a limp wrist, and text. Upon review, I found that an extreme rightwing group is marketing this t-shirt. The word “figs” in the text is written with a missing “I” that is replaced with the drawing of a fig hanging from a tree branch. Because of drawing of a limp wrist, this text can be interpreted by the reader to mean that socialism is for “fags.” In the US, the word “fag” is a derogatory name for homosexuals, and a limp wrist is a derogatory symbol. This supports the Guardian’s observation of Google’s bias against homosexuals as well its bias against socialists. Additionally, the fig fruit represents the name of the village in Bolivia where Che Guevara was captured and murdered. Thus, the fig represents a death threat against socialists. Hopefully, a socialist cyber activist can remove this blight against a beloved revolutionary hero.

Google’s Influence in Elections

As explained by Robert Epstein, from the American Institute for Behavioral Research and Technology, Google has the power to rig elections through something he calls the search engine manipulation effect (SEME). Based on his four years trying to reverse engineer Google’s search algorithms, he concludes that:

“We know that if there’s a negative autocomplete suggestion in the list, it will draw somewhere between 5 and 15 times as many clicks as a neutral suggestion,” Epstein said. “If you omit negatives for one perspective, one hotel chain or one candidate, you have a heck of a lot of people who are going to see only positive things for whatever the perspective you are supporting. Even changing the order in which certain search terms appear in the autocompleted list can make a huge impact, with the first result drawing the most clicks, he said.”

Appearing on the first page of Google search results can give websites undue authority and traffic.

“These platforms are structured in such a way that they are allowing and enabling, consciously or unconsciously, more extreme views to dominate,” said Martin Moore from Kings College London’s Centre for the Study of Media, Communication and Power.”

Epstein believes these two manipulations work together and have a profound impact on people, since they are unaware it is being done. He believes this is compounded by Google’s personalization of search results. This means users see different results based on their interests.

According to politico.com, the problem is that more than 75 percent of all online searches in the United States are conducted on Google. Thus, if Google’s CEO, a rogue employee or the search algorithm favors one candidate, there is no way to counteract that influence. Politico’s research shows that even when people do notice they are seeing biased search rankings, their voting preferences still shift in the desired directions toward the bias. It’s as if the bias is serving as a form of social proof. The thinking is that if the search engine prefers one candidate, that candidate must be the best. Biased rankings are hard for individuals, regulators and election watchdogs to detect as SEME is easy to hide through customized search results.

In Wired’s 2010 article titled: Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring, it discusses the company Recorded Future, that is funded by both the CIA’s IQT non-profit and Google. Both IQT and Google Ventures have seats on Recorded Future’s board. Not only does the software, Recorded Future, scour websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents in the present, but also in the future. In looking at the invisible links between documents that mention similar or related entities and events, it can figure out the participants, the location, and predict when it might occur. According to Recoded Future, the software can assemble actual real-time dossiers on people. Recoded Future maintains an index with more than 100 million events.

“The cool thing is, you can actually predict the curve, in many cases,” says company CEO Christopher Ahlberg, a former Swedish Army Ranger with a PhD in computer science.”

Content Placement in Social Media and Google

Besides taking proactive security measures, activists and the NAM can benefit by controlling the technology that decides the placement of supportive material on social media and Google. As most involved in the drafting and dissemination of content already know, everything that departs from the prevailing imperialist narrative is automatically considered subversive and blocked. While quality content continues to exist, locating it on the Internet is like finding a needle in a haystack, even when one already knows what is being sought, by whom, and from where.

The latest trick is for a news item of interest to be blocked by a message warning of an “expired security certificate” and threatening “a virus upon opening”. This was found on an article titled: Cyber warfare: Challenge of Tomorrow, by none other than Counterpunch’s plagiarist spy Alice Donovan.

The Cost of US Cyber Warfare

The United States 2019 proposed intelligence budget at $73 billion has nearly doubled since 2005. This figure includes the National Intelligence Program (NIP) budget at $54.6 billion and Military Intelligence Program (MIP) budget at $18.4 billion. Back in 2005, there was no MIP budget. The total NIP Budget was $39.8 billion, which is still an exorbitant amount of money.

The NIP funds Intelligence Community (IC) activities in six Federal Departments and two independent agencies: the Department of Defense, the Department of Justice, the Department of Homeland Security, the Department of State, the Department of Energy, the Department of Treasury, the Central Intelligence Agency, and the Office of the Director of National Intelligence.

As described in by the Washington Post in its article titled: “The Black Budget”, the CIA, NSA and National Reconnaissance Office (NRO) received more than 68 percent of the 2013 black budget. The CIA received $14.7 billion, the NSA $10.8 billion, and NRO $10.3 billion. Within its funding mission categories, $20.3 billion was for Warning U.S. leaders about critical events and $17.2 billion was for Combating Terrorism.

In looking at the new 2019 MIP budget, one can better understand how new initiatives and training in cyber warfare are being funded. Take for example the US Air Force Cyberspace Defense Operations (IB4X1) Summary description:

“Personnel in the Cyber Warfare Operations specialty perform duties to develop, sustain, and enhance cyberspace capabilities. These capabilities are used to defend national interests from attack and to create effects in cyberspace to achieve national objectives.” “They conduct both offensive and defensive cyberspace operations. They act to protect cyberspace systems from adversarial access and attack. They execute command and control (C2) of assigned cyberspace forces and de-conflict cyberspace operations. They will partner with Department of Defense, interagency, and Coalition Forces.”

While the US government clearly takes the lead in unconventional warfare technology, due to its massive resources and funding, it leaves in its wake tons of technological opportunities ripe to be exploited. What can’t be appropriated can be protested. Just don’t post anything tactical on the Internet or use smart phones, because your “friends” in the US government are watching. Take heart, this elaborate surveillance system was devised because the ruling elite is outnumbered. Knowledge is power.

Lauren Smith, author of historical fiction, has a BA in Politics, Economics and Society from SUNY at Old Westbury and an MPA in International Development Administration from New York University. Her novel on Nicaragua’s 1979 revolution is due out in 2019.

Originally published at Wrong Kind of Green.  Republished under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.