Editor’s note: The following conceptual tool is designed to help community organizers to categorize community groups, businesses, government bodies, and individuals along a “spectrum of allies.” This exercise teaches a fundamental tenet of community organizing: that our goal is not only to find people who agree with us fully, but to gradually shift those who disagree with us into greater political alignment.
Movements seldom win by overpowering the opposition; they win by shifting support out from under it. Use a spectrum-of-allies analysis to identify the social groups (students, workers) that are affected by your issue, and locate those groups along a spectrum, from active opposition to active allies, so you can focus your efforts on shifting those groups closer to your position. Identifying specific stakeholders (e.g. not just students, but students at public colleges; not just workers, but domestic workers) can help you identify the most effective ways of moving different social groups closer to your position, in order to win your campaign.
When mapping out your campaign, it is useful to look at society as a collection of specific communities, blocs, or networks, some of which are institutions (unions, churches, schools), others of which are less visible or cohesive, like youth subcultures or demographic groupings. The more precisely you can identify stakeholders and impacted communities, the better you can prepare to persuade those groups or individuals to move closer to your position. You can then weigh the relative costs and benefits of focusing on different blocs.
Evaluating your spectrum of allies can help you avoid some common pitfalls. Some activist groups, for instance, only concern themselves with their active allies, which runs the risk of “preaching to the choir” — building marginal subcultures that are incomprehensible to everyone else, while ignoring the people you actually need to convince. Others behave as if everyone who disagrees with their position is an active opponent, playing out the “story of the righteous few,” acting as if the whole world is against them. Yet others take a “speak truth to power” approach, figuring that through moral appeal or force of logical argument, they can somehow win over their most entrenched active opponents. All three of these extreme approaches virtually guarantee failure.
Movements and campaigns are won not by overpowering one’s active opposition, but by shifting each group one notch around the spectrum (passive allies into active allies, neutrals into passive allies, and passive opponents into neutrals), thereby increasing people power in favour of change and weakening your opposition.
For example, in 1964 in the U.S., the Student Nonviolent Coordinating Committee (SNCC), a major driver of the African-American civil rights movement in the racially segregated South, realized that in order to win desegregation and voting rights for African Americans, they needed to make active allies of sympathetic white northerners. Many students in the North were sympathetic, but had no entry point into the movement. They didn’t need to be educated or convinced, they needed an invitation to enter the struggle. (Or in the spectrum-of-allies schema, they needed to be moved from passive allies into active allies.) Moreover, these white students had extended communities of white families and friends who were not directly impacted by the struggles of African-American southerners. As the struggle escalated, these groups could be shifted from neutral to passive allies or even active allies.
Based on this analysis, the SNCC made a strategic decision to focus on reaching neutral white communities in the North by engaging sympathetic white students in their Freedom Summer program. Busloads of students travelled to the South to assist with voter registration, and many were deeply radicalized in the process. They witnessed lynchings, violent police abuse, and angry white mobs, all a response to black Southerners simply trying to exercise their right to vote.
Many wrote letters home to their parents, who suddenly had a personal connection to the struggle. This triggered another desired shift: Their families became passive allies, often bringing their workplaces and social networks with them. The students, meanwhile, returned to school in the fall as active allies, and proceeded to organize their campuses — more shifts in the direction of civil rights. The result: a profound transformation of the political landscape.
This cascading shift of support wasn’t spontaneous; it was part of a deliberate movement strategy that, to this day, carries profound lessons for other movements.
How to use
Use this tool to identify the constituencies that could be moved one notch along the spectrum, as well as to assess the relative costs of reaching, educating, or mobilizing each of these constituencies. Do not use this tool to identify your arch enemies and go after them — it’s the people in the middle you’ll most often want to focus on. The groupings or individuals you identify should be as specific as possible: not just unions, for instance, but specific unions. The more specific you can be, the better this tool will serve you.
Here’s how to do a spectrum-of-allies analysis:
1. Set up a “half-pie” drawing (see diagram).
Label the entire drawing with the name of the specific movement or campaign you are discussing, and put yourself on the left side, with your opposition on the right side.
2. Divide the half-pie into five slices:
active allies, or people who agree with you and are fighting alongside you;
passive allies, or people who agree with you but aren’t (yet) doing anything about it;
neutrals, or the unengaged and uninformed;
passive opposition, or people who disagree with you but aren’t actively trying to stop you; and
active opposition, or people who not only disagree with you, but are actively organizing against you.
In the appropriate wedges, place different constituencies, organizations, or individuals. Spend a significant amount of time brainstorming the groups and individuals that belong in each of the sections. Be specific: list them with as many identifying characteristics as possible. And make sure to cover every wedge; neglecting sections will limit your strategic planning and your potential effectiveness.
3. Step back and see if you’re being specific enough
For every group or bloc you listed in the diagram, ask yourself whether you could be more specific — are there more adjectives or qualifiers you could add to give more definition to the description? You might be tempted to say “mothers,” but the reality might be that “wealthy mothers who live in gated communities” might belong in one wedge, and “mothers who work as market vendors” would belong in another. The more specific you can be, the better this tool will serve you.
4. Identify what else you need to know.
When you come up against the limits of your knowledge, make sure to start a list of follow-up questions — and commit to doing the research you’ll need to get the answers.
Combine with other tools
The spectrum of allies can also work well in combination with other methodologies:
First, use pillars of power to map out the biggest forces at play.
Combine with a SWOT matrix in order to help you identify all key constituencies.
Follow up with points of intervention in order to identify tactics and actions to engage the key constituencies you’ve identified.
Nadine Bloch is currently Training Director for Beautiful Trouble, as well as an artist, political organizer, direct action trainer, and puppetista. If you have a question for Nadine about this tool you can contact her via the form at the bottom on the Beautiful Uprising Spectrum of Allies article.
We are living in an ecological catastrophe. Our world is being killed before our eyes. This hurts. And so for many people, their response is either apathy, complete emotional shutdown, or a nihilistic embrace of powerlessness.
There is another option. While our power to change the course of ecological collapse is indeed limited, limited is different from non-existent. The truth is, we do have power. And we can change the world. No, our power is not limitless. No, the world will not change easily. And no, we cannot fix everything. Some things are broken beyond fixing. But these difficulties do not absolve us of responsibility.
There is an old warrior’s saying that “duty is heavier than a mountain, and death is lighter than a feather.” The duty of humans with moral conscience in this era is heavy indeed. And yet, what would we be if we abandoned this world to its fate? If we abandoned our forests, our oceans, our mountains? If we abandoned our non-human relatives? If we abandoned our communities and future generations of children? What would we be, then?
Some people argue that humanity is simply a cancer. That we will destroy ourselves. That our nature is fundamentally destructive. That our actions have proven us unfit to survive in the long-term, unfit to participate in the community of life, which we are destroying.
But if human destructiveness is one part of our potential, then humans defending the land is another. Those who defend the land are part of the immune system of the world. We are defenders of wholeness. We bring balance. We are the consciousness of the Earth, our bones like mountains, our blood like rivers. We are an evolutionary force, an outgrowth of the planet itself, taking action to defend our community.
And we will not give up, because ultimately, to abandon responsibility is to abandon our own souls. There is only one way we can guarantee the worst possible outcome for the future: if we take no action at all.
And so today, I wish to thank the activists and land defenders of the world. Your hearts are the conscience of our society. Your tears are our prayers. Your dedication is the salvation of life. Your effort is not in vain. You are valuable.
Editor’s Note: Jane Anne Morris’ 2005 essay “Help! I’ve Been Colonized and I Can’t Get Up” is considered a classic text within the community rights movement. It criticizes the regulatory regime of environmental and public health protection, which has ultimately helped corporations standardize and de-risk investments, while failing to prevent ecological collapse. Instead of participating in this system, Morris proposes six legal changes which would substantially limit corporate power.
The problems described in this essay have only become even worse since 2005. Barriers to challenging corporate-friendly legal structures are numerous, deeply embedded, and well-defended by teams of lawyers, lobbyists, and politicians who are entrenched in government and other institutions like military units employing defense-in-depth. Seventeen years of anti-corporate-power organizing, since this essay was written, has yet to breach these barricades.
Morris’ essay today can be read in at least two ways: first, as calling for a populist effort to reign in corporate power, as she originally intended the piece; and second, as a historic account of advancing corporate power which calls for strategic and ethical escalation in defense of planet Earth.
Take a Lawyer and an Expert To a Hearing and Call Me In a Decade
By Jane Anne Morris
A third of your friends are locked down Reclaiming the Bill of Rights, Building a Movement in an old growth grove or at a corporate headquarters, with law enforcement officers rubbing pepper spray in their eyes. Another third are preparing testimony so you can be persuasive at a generic regulatory agency hearing while you’re begging them to enforce a tiny portion of our laws. The third third are trying to raise money to pay lawyers to get your friends out of jail (after they’ve been released from the hospital) or take the regulatory agency to court (after it declines to enforce the law).
The pepper spray, groveling and money-grubbing might not be so bad if we could honestly say that the earth is better off today than it was four years ago. I can’t honestly say that.
This diatribe is an effort to take a hard look at what we’re doing and insinuate some new elements into the debate. It’s not intended to belittle any of our efforts, point fingers, or assign blame, so don’t take it personally. We are all earthlings.
Our campaigns follow the gambling addiction model. The last bet didn’t pay off but the next one might if… if… if we just had a new, improved tripod, three more experts, more labor or church support, ten more elected officials on our side, a hundred more people at the demo, or a thousand more letters in the mail…. Who are we kidding? We are just doing the “same old thing” over and over again and fooling ourselves that it might work next time.
We are stuck in a feedback loop where our failures are interpreted as signs that we should repeat our failed tactics, but try harder. This is what it is to be colonized. The telltale sign is not that we’re failing, but that we’re fooling ourselves, and don’t see it as a feedback loop.
If our minds are not colonized, then how come almost every Earth First! Journal action piece starts with a banner or a lockdown and ends with a plea to write a letter to a white male bigshot? (Go ahead, look through back issues. It goes on for years and years.)
Over at corporate headquarters they have a steeper learning curve.
Despite the occasional bag of guts on the committee table or clever banner, it must be reassuring for corporate executives and those who serve them to sit back and smile at the success of their containment efforts, and the predictability of our campaigns.
The issue of whose minds are colonized is a delicate one. We all know people whose minds have been colonized. Who are they? They are other people — people out there. They are somebody else. Not us.
It’s time we did the unthinkable and asked ourselves if we have been colonized. What do we see when we compare our strategies to corporate strategies?
Many of our groups are organized to save wolves, butterflies, trees, prairie flowers, rivers, deserts, or estuaries. But corporation executives don’t organize to destroy the wolves, butterflies… flowers… estuaries. Nor do they organize to pollute the air, spoil the rivers, or promote five-legged frogs.
This asymmetry should give us pause as we try to understand why corporations are on a roll while we’re stuck in a feedback loop. Let’s look again.
Corporate strategy leverages their power; their efforts reinforce and magnify each other. Our strategy splits our resources and dissipates our power.
Corporate strategy aims to increase the power that corporations have over people. That means that when a single corporation gets a victory, it helps all other corporations, too. They are all stronger, they all have more power, and the people have less.
We work on separate harms. When we lock down to one old growth stand, others go unprotected. When we protest about one chemical, others go unprotested. When we testify to preserve one watershed, others are not spoken for.
We have whole campaigns directed at one chemical, one corporation, one species, one grove of trees, one article of clothing.
In doing so, we fracture our resources. While we’re out working on a “Chlorine is Bad” or “Wolves are Good” campaign, we’re not working on all of the other chemicals, animals, trees, etc., that also need attention.
Some of us argue that this fracturing is inevitable, because there’s so much wrong in the world. (Declaring a problem to be inevitable is a great way to justify not talking about it. Another gift to the corporate world view.)
Others of us think that the fracturing results from not being organized enough, or not being organized right. This opens the door for endless bickering about whether we should organize by bioregion or by article of clothing, by species or by chemical, by issue or by occupation. Either way, we’re still fractured.
Being fractured is another way of being colonized.
Another sure sign of being colonized is when you censor yourselves, and don’t even wait for others to do it. Some of our self-imposed limitations are right off of a corporate wish list.
We have a strange “but it’s the law” syndrome. Why can’t we bring up important issues at EPA hearings? It’s regulatory (administrative) law. Why can’t we get our views accurately presented on TV? It’s (corporate) private property law and FCC regulations. Why can’t we imprison corporate executives for what their corporations do? It’s liability law.
So what do we do? We toe the line at the EPA hearing. We dress up as animals to get a moment on TV. We let lying corporate executives lie.
That is, we work around the defining laws that are the groundwork for a rigged system. We’re looking for favors, lucky breaks. We don’t even dream of control, yet we call this a democracy.
This is being colonized.
Corporation representatives do not feel constrained in this way. Nothing is too destructive, too audacious, too outrageous for them to attempt. After all, they have most of us believing and not even objecting to the idea that corporations have “rights.” In early 1998 an association of corporations (itself a corporation that supposedly has “free speech” rights, according to prevailing legal opinion) sued a talk show host in Texas for saying that she’s going to stop eating hamburgers.[1]
Then there’s the Zen of “Describing The Problem.”
We need our storytellers, we need our scribes, we need our analysts, we need our own human fonts of crazy ideas. We needed Silent Spring.[2] By now we have the equivalent of Son of Silent Spring, Daughter of Silent Spring, Second Cousin Once Removed of Silent Spring. But habitat destruction continues as fast as we can describe it, if not faster. Our compulsion to Describe The Problem (something we do really well) serves a purpose, especially for people who think there’s no problem, but the people who need to hear it the most aren’t hearing it. We’re Describing The Problem to each other in lavish detail, which crowds out efforts to rethink our whole strategy.
Are we doing anything other than lurching back and forth between Describing The Problem and then buckling the seatbelt on our feedback loop? I for one think I’ve heard enough “Bad Things About Corporations,” and I’m pretty tired of working on campaigns that will not only fail, but fail in predictable ways.
How have we been colonized? Let me count the ways. We interpret failures as signals to do the same things over again. We are predictable. Our strategies and styles of organizing fracture and dilute our resources. We either accept this dilution as inevitable, or blame each other for not organizing right. We censor ourselves, in thought and action. We act as though if we Describe The Problem to each other enough, it might go away.
And now, we can argue about whether we’ve been colonized or not. Corporate management is popping extra popcorn for this one.
But enough of what we do. What do corporations do? (The question should be, “What do people do behind the fiction of corporations?” One of the signs of our being colonized is that we personify corporations. I’ve been trying to avoid that in this piece but… help, I’ve been colonized and I need help getting up….)
Corporate management figured out a hundred years ago that fighting against each other, competing and diluting their resources was weakening them and limiting their power. So they don’t do that any more.
So what do people do while hiding behind the corporate shield? The short version is that they write a script for us, and we follow it. Then they write a script for themselves, and we don’t even read it.
A big part of the script written for us involves Regulatory Law (including environmental and administrative law). It assumes that corporations have the rights of constitutional “persons.”
It outlines procedures for what We the People can do (not much); what government can do (a little more); and what corporations can do (a lot).
At regulatory agencies, corporate “persons” (that is, corporations) have constitutional rights to due process and equal protection that human persons, affected citizens, do not have. For non-corporate human citizens there’s a “Democracy Theme Park” where we can pull levers on voting machines and talk into microphones at hearings. But don’t worry, they’re not connected to anything and nobody’s listening ‘cept us.
What Regulatory Law regulates is citizen input, not corporate behavior. So when we cooperate in regulatory law proceedings, we are following the script that corporation representatives wrote for us. We’re either colonized, or we’re collaborators. That the regulatory agencies fail to protect the public is clear. Why they fail is another matter.
One reason is that they were set up with the cooperation of and sometimes at the urging of big corporations. Today regulatory agencies and trade associations work together to do the work that the “trusts” of the last century were set up to do.
A second reason for regulatory failure concerns the nature of the corporation, to which we turn briefly.
Corporations are not natural entities, like karner blue butterflies or white pines. Corporations are artificial creations that are set up by state corporation codes. These state laws, plus a bunch of court cases, form the basis for the notion that corporations have powers and “rights.”
This law is Defining Law. This law is the script that corporate lawyers write for corporations. This law is the law that we don’t even read.
It’s right there in the law books in black and white, just like the “regs” that we spend so much time on. But this Defining Law is invisible to us because we’ve been colonized and have accepted it as a given. We leave this defining law — in corporation codes, bankruptcy law, insurance law, etc. — to corporation lawyers, who rewrite it every few years without so much as a whimper from citizen activists. Then we wonder why the parts-per-million regulations aren’t enforced.
So, the second reason that regulatory agencies fail to protect the public is that we have allowed corporate lawyers to write the Defining Law of corporations. This law bestows upon corporations powers and rights that exceed those of human persons and sometimes of government as well. It seems pretty obvious, then, that we need to rewrite the Defining Law.
Sooner or later we come up against the claim that all this stuff about “rights” and so on is just too legalistic. None of us wants to be involved in narrow and excessively legalistic strategies.
However, a glance through any Earth First! journal will confirm that we’re constantly dealing with The Law, whether we’re filing testimony or engaged in direct action. As long as we’re in the legal arena, we might as well be dealing with Defining Law, and not the regulatory frufru that we’ve allowed to distract us.
If the civil rights movement had been afraid to touch the deep defining “law of the land” we’d still be laboring under “separate but equal.” For as long as we stick with Regulatory Law and leave Defining Law to corporate lawyers, we’ll have corporate government.
What are we going to do tomorrow morning?
We could keep doing what hasn’t worked in case it works next time; we could denounce people who suggest that what we’re doing isn’t working; we could declare victory so our folks won’t get so depressed and discouraged. I’d like to steer clear of those options.
I’d also like to avoid “negotiating” with corporations as though they were persons with a role in a democratic system, and avoid doing anything else that accepts that corporations have the constitutional rights of human persons.
Here is one cluster of ideas for rewriting the Defining Law of corporations. It’s not a 3-point plan, and it’s not the beginning of a twenty point plan — just some ideas to think about.
1. Prohibit corporations from owning stock in other corporations. Owning stock in other corporations enables corporations to control huge markets and shift responsibility, liability, resources, assets and taxes back and forth among parent corporations, subsidiaries and other members of their unholy families. By defining corporations in such a way to prohibit such ownership, much of the anti-trust regulatory law becomes unnecessary and superfluous.
2. Prohibit corporations from being able to choose when to go out of business (in legalese, no voluntary dissolution). This would prevent corporations from dissolving themselves when it came time to pay taxes, repay government loans, pay creditors, pay pensions, pay for health care, and pay for toxic cleanups.
3. Make stockholders liable for a corporation’s debts. People who want to be stockholders would reallocate their resources to corporations that they knew something about, that weren’t engaged in risky, toxic projects. (This would encourage local, sustainable businesses and healthy local economies. Imagine that.)
These three measures might seem “unrealistic” to some, but it beats the heck out of a voluntary code of conduct, or a wasted decade at a regulatory agency. All three of these provisions were once common features of state corporation codes. No wonder corporate apologists prefer that we hang around in the regulatory agencies with our heads spinning with parts per million and habitat conservation plans.
These three measures were quite effective, which is why corporation lawyers worked so hard to get rid of them. But they address only a tiny portion of what needs to be done.
Here’s another cluster of ideas for ways to shape a democratic process that is about people. (The idea that corporations have “rights” would seem nonsensical to any but a colonized mind.)
1. No corporate participation in the democratic process. Democracy is for and about human beings. Corporations should be prohibited from paying for any political advertisements, making any campaign contributions, or seeking to influence the democratic process in any way.
2. Corporations have no constitutional rights.
A corporation is an artificial creation set up to serve a public need, not an independent entity with intrinsic “rights.”
3. Corporations should be prohibited from making any civic, charitable, or educational donations. Such donations are used to warp the entire social and economic fabric of society, and make people afraid to speak out against corporations.
These probably seem even more “unrealistic” than the first batch. Imagine how good it is for corporate executives that we find these ideas “impractical.” And by the way, these were all once law, too.
The final objection to be raised is that we’ll never get anywhere as long as the “news media” are against us, refuse to cover our issues, and distort our views. Agreed.
But the “news media” are corporations, key players in a system of propaganda that encompasses not only television, radio and newspapers, but also the entire educational system. The “airwaves” belong to the public.
Why have we allowed a puppet federal agency to “lease” the public airwaves to huge corporations? Ya wanna lock down? Lock down to a TV or radio station and make the public airwaves public again. Not for a day but for a lifetime.
Ya like boycotts? What if a regulatory agency gave a hearing and nobody came? The outcome would be the same but we wouldn’t have wasted all the time and resources, nor would we have helped grant an aura of legitimacy to a sham proceeding.
What could we do instead? We could get together with the lawyer and the expert and begin to figure out how to stop being collaborators.
Jane Anne Morris was a corporate anthropologist who lived in Madison, Wisconsin. She was the author of Not in My Backyard: The Handbook, and a member of POCLAD, the program on Corporations, Law and Democracy. Some of her work has appeared previously in Rachel’s (#488, #489, and #502). In its present form, this essay originally appeared in Defying Corporations, Defining Democracy. This article originally appeared on POCLAD.
Editor’s note: People who confront the destruction of the planet find a legal system that prioritizes corporations and not uncommonly become the targets of police surveillance. Unless we take precautions, police surveillance tools can uncover our plans and organizational structures—and can contribute to a culture of paranoia that discourages action.
This training, from the Freedom of the Press Foundation, consists of interactive materials for learning what sort of tools law enforcement agencies use against journalists, but the material is practically applicable for organizers as well. We encourage our readers to study this material and consider appropriate countermeasures.
by Freedom of the Press Foundation
The Digital Security Training team at Freedom of the Press Foundation works with news organizations to better protect themselves, their colleagues, and sources by upgrading their security posture. In an environment where journalists are increasingly under attack, experiencing targeted hacking, harassment, and worse, we want to see systemic change in the way news organizations learn about and address their digital security concerns. While journalists come from many professional backgrounds, one place we can most reliably address this need for digital security education systemically is within journalism schools, where students are already learning many of the skills they will need in a contemporary newsroom. We know many programs feel underprepared for education of this kind, so we built this curriculum to better support J-schools’ goals for digital security education.
Below, we have created modules responsive to a variety of digital security topics. We intend for this resource to be used by journalism professors and educators looking for a starting point for digital security education. Ultimately, it’s our hope that by tinkering with these materials, you might take advantage of the parts most useful or inspiring to you, and make this curriculum your own.
Police Surveillance Tools Training
This section on surveillance tools used by law enforcement is discussion focused, and intends to get students to think critically about the relationship between surveillance, privacy, and transparency. It begins with lecture canvassing a variety of law enforcement surveillance technology, based on research from from the Electronic Frontier Foundation. Afterward, the module opens into an activity to investigate surveillance technology used in a location of their choice, followed by a discussion of their interpretation of law enforcement surveillance technologies they’ve discovered.
Upon successful completion of this lesson, students will be able to distinguish between technology commonly used by law enforcement to conduct surveillance in physical spaces.
Students will be able to identify which of these tools are used in a specific physical location, based on publicly-accessible reporting tools.
Why this matters
The technical capabilities of law enforcement actors may affect journalists’ threat models when conducting work in risky situations. For example, when meeting a sensitive source their location may be tracked through a constellation of surveillance equipment, or their phone numbers and current call or text data may be scooped up when covering protests.
Read this, debating the use of law enforcement surveillance technology, by Hamid Khan, Ken Montenegro, and Myke Cole: In McSweeney’s End of Trust – “Should Law Enforcement Use Surveillance?”
Read this, on organizing to prevent untargeted police surveillance, by Camille Fassett: “It Takes a Village“
Have students open up Atlas of Surveillance and report back for the group with surveillance technology used in a location where they’ve lived in the U.S. (e.g., where their hometown is; the campus).
Questions for discussion
In terms of their ability to compromise journalistic work, which one of these technical law enforcement capabilities is most concerning to you? What makes it concerning?
If that’s not especially concerning, why is that?
Out of respect for peoples’ privacy, are there any issues you think should be “off the table” for journalistic coverage? If so, what are those issues, and why do you think they should be off the table?
We often talk about privacy for people, but transparency for institutions. Why the distinction? Are there times when individual actions demand transparency, and when institutions have a meaningful claim to privacy?
Editor’s note: Online privacy is an essential layer of self-defense and security in our modern internet-driven world. This issue can be confusing and overwhelming. This article is aimed at beginners, and will provide a starting point for you to consider these issues and improve your security.
Why should I care about online privacy?
“I have nothing to hide. Why should I care about my privacy?”
Much like the right to interracial marriage, woman’s suffrage, and freedom of speech, we didn’t always have the right to privacy. Generations before ours fought for our right to privacy. Privacy is a human right inherent to all of us, that we are entitled to without discrimination.
But despite this, governments and corporations around the world regularly abuse our right to privacy for profit and power.
What should I do?
First, you need to make a plan.
Trying to protect all your data from everyone all the time is impractical, expensive, and exhausting. But, don’t worry! Security is a process, and by thinking ahead you can put together a plan that’s right for you. Security isn’t just about the tools you use or the software you download. Rather, it begins with understanding the unique threats you face, and how you can counter them.
Your Security Plan
Trying to protect all your data from everyone all the time is impractical and exhausting. But, have no fear! Security is a process, and through thoughtful planning, you can put together a plan that’s right for you. Security isn’t just about the tools you use or the software you download. It begins with understanding the unique threats you face and how you can counter those threats.
In computer security, a threat is a potential event that could undermine your efforts to defend your data. You can counter the threats you face by determining what you need to protect and from whom you need to protect it. This is the process of security planning, often referred to as “threat modeling.”
This guide will teach you how to make a security plan for your digital information and how to determine what solutions are best for you.
What does a security plan look like? Let’s say you want to keep your house and possessions safe. Here are a few questions you might ask:
What do I have inside my home that is worth protecting?
Assets could include: jewelry, electronics, financial documents, passports, or photos
Who do I want to protect it from?
Adversaries could include: burglars, roommates, or guests — as well as government or corporate agents.
How likely is it that I will need to protect it?
Does my neighborhood have a history of burglaries? How trustworthy are my roommates/guests? Am I involved in risky political activity? What are the capabilities of my adversaries? What are the risks I should consider?
How bad are the consequences if I fail?
Do I have anything in my house that I cannot replace? Do I have the time or money to replace these things? Do I have insurance that covers goods stolen from my home? Will our movement be harmed if the information or digital files I have are seized?
How much trouble am I willing to go through to prevent these consequences?
Am I willing to buy a safe for sensitive documents? Can I afford to buy a high-quality lock? Do I have time to open a security box at my local bank and keep my valuables there? Can I use encryption to protect my files?
Once you have asked yourself these questions, you are in a position to assess what measures to take. If your possessions are valuable, but the probability of a break-in is low, then you may not want to invest too much money in a lock. But, if the probability of a break-in is high, you’ll want to get the best lock on the market, and consider adding a security system.
The risk that something bad might happen, and the potential level of harm should it happen, should both be taken into account.
Making a security plan will help you to understand the threats that are unique to you and to evaluate your assets, your adversaries, and your adversaries’ capabilities, along with the likelihood of risks you face.
How do I make my own security plan? Where do I start?
Security planning helps you to identify what could happen to the things you value and determine from whom you need to protect them. When building a security plan, answer these five questions:
What do I want to protect?
Who do I want to protect it from?
How bad are the consequences if I fail?
How likely is it that I will need to protect it?
How much trouble am I willing to go through to try to prevent potential consequences?
Let’s take a closer look at each of these questions.
What do I want to protect?
An “asset” is something you value and want to protect. In the context of digital security, an asset is usually some kind of information. For example, your emails, contact lists, passwords and access to websites, instant messages, discussion forums, notes, plans, location, and files are all possible assets. Your devices may also be assets.
Make a list of your assets: data that you keep, where it’s kept, who has access to it, and what stops others from accessing it.
Who do I want to protect it from?
To answer this question, it’s important to identify who might want to target you or your information. A person or entity that poses a threat to your assets is an “adversary.” Examples of potential adversaries are your boss, your former partner, your business competition, your government, or a hacker on a public network.
Make a list of your adversaries, or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.
Depending on who your adversaries are, under some circumstances this list might be something you want to destroy after you’re done security planning.
How bad are the consequences if I fail?
There are many ways that an adversary could gain access to your data. For example, an adversary can read your private communications as they pass through the network, or they can delete or corrupt your data.
The motives of adversaries differ widely, as do their tactics. A government trying to prevent the spread of a video showing police violence may be content to simply delete or reduce the availability of that video. In contrast, a political opponent may wish to gain access to secret content and publish that content without you knowing.
Security planning involves understanding how bad the consequences could be if an adversary successfully gains access to one of your assets. To determine this, you should consider the capability of your adversary. For example, your mobile phone provider has access to all your phone records. A hacker on an open Wi-Fi network can access your unencrypted communications. Your government might have stronger capabilities.
Write down what your adversary might want to do with your private data.
How likely is it that I will need to protect it?
Risk is the likelihood that a particular threat against a particular asset will actually occur. It goes hand-in-hand with capability. While your mobile phone provider has the capability to access all of your data, the risk of them posting your private data online to harm your reputation is low.
It is important to distinguish between what might happen and the probability it may happen. For instance, there is a threat that your building might collapse, but the risk of this happening is far greater in San Francisco (where earthquakes are common) than in Stockholm (where they are not).
Assessing risks is both a personal and a subjective process. Many people find certain threats unacceptable no matter the likelihood they will occur because the mere presence of the threat at any likelihood is not worth the cost. In other cases, people disregard high risks because they don’t view the threat as a problem.
Write down which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about.
How much trouble am I willing to go through to try to prevent potential consequences?
There is no perfect option for security. Not everyone has the same priorities, concerns, or access to resources. Your risk assessment will allow you to plan the right strategy for you, balancing convenience, cost, and privacy.
For example, an attorney representing a client in a national security case may be willing to go to greater lengths to protect communications about that case, such as using encrypted email, than a family member who regularly emails funny cat videos.
Write down what options you have available to you to help mitigate your unique threats. Note if you have any financial constraints, technical constraints, or social constraints.
Security planning as a regular practice
Keep in mind your security plan can change as your situation changes. Thus, revisiting your security plan frequently is good practice.
Create your own security plan based on your own unique situation. Then mark your calendar for a date in the future. This will prompt you to review your plan and check back in to determine whether it’s still relevant to your situation.
Specific online privacy tools, methods, and apps
From here, you can start to consider and put in place specific protective measures. These might include things like:
Shredding or burning old notes and files.
Using a password manager and ensuring that your passwords are unique and strong.
Enabling encryption on your phone, tablet, computer, and any other devices you own.
Removing unused apps from your phone, tablet, or computer, and checking which apps have permission to access which features.
Using a privacy-oriented web browser, such as Firefox, rather than Google Chrome.
Use more-secure communication tools such as Signal, Wire, Protonmail, Tutanota, etc. rather than regular email, text messages, and phone calls.
Stop using non-private services such as Google Drive and Dropbox with end-to-end encrypted alternatives such as Skiff, Tresorit, Sync, and Cryptpad.
This article has been assembled from a mix of sources including the Electronic Frontier Foundation, PrivacyGuides.org, and our own knowledge here at the Deep Green Resistance News Service. We will publish additional guides on this topic in the future. This article is published under the Creative Commons-Share Alike Attribution 4.0 license.
The Fitzroy River in the Kimberley region of Western Australia, one of the country’s most ecologically and culturally significant waterways, is facing proposals of further agriculture and mining development, including irrigation and fracking.
In response, First Nations communities in the region have developed different methods to promote the conservation of the river, including curating cultural festivals, funding awareness campaigns, and working with digital technologies.
First Nations land rights are held along the length of the Fitzroy River, the first time this has occurred across an entire catchment area in Australia.
The catchment is the last stronghold of the world’s most “evolutionarily distinct and globally endangered” species, the freshwater sawfish (Pristis pristis) and is home to the threatened northern river shark (Glyphis garricki).
WEST KIMBERLEY, Australia — November marks the end of the dry season in the Kimberley, the northernmost region of Western Australia, the country’s largest state. As the monsoonal rains start to fall, the country comes alive with the cries of red winged parrots (Aprosmictus erythropterus) and the Fitzroy River begins to run.
Stretching more than 700 kilometers (435 miles), the Fitzroy River is one of Australia’s most powerful waterways, a free-flowing system that passes through range, savanna and desert country to empty into the Indian Ocean each year.
Anne Poelina, a Nyikina Warrwa traditional Indigenous custodian of the river, said it’s her duty to care for the Martuwarra, the river’s original and enduring name.
“Martuwarra is a living, ancestral being,” she said. “It has a right to life, to live and to flow. We live by an obligatory law to protect the River of Life. It is the essence of our spirituality, identity, culture and law.”
The river was granted National Heritage Listing in 2011 due to its spiritual, cultural and environmental values. Native title, a federally recognized titling to traditional Indigenous lands and waters, is now held along the entire length of the river, the first time land rights have been held across an entire catchment area in Australia.
The Fitzroy is also the last stronghold of the world’s most “evolutionarily distinct and globally endangered” species, the freshwater sawfish (Pristis pristis). According to a 2019 study, its continued existence in the waters is due to the low level of human disturbance — namely mining and agriculture — compared to other rivers around the world. The authors recommended that any “further anthropogenic disturbance [to the Fitzroy River] should be minimized to maintain what is still a relatively pristine habitat.”
However, on the world’s driest inhabited continent, these life-giving waters are now a source of contention. Currently, agricultural and mining development proposals are being assessed to develop the Fitzroy catchment and the greater Kimberley region.
Such is the cultural significance of the river, that proposals have been met with scrutiny by traditional owners, and have led some to implement methods to preserve the river’s cultural and ecological significance.
Agriculture debate continues as fracking proposals arise
Chief among the industrial proposals earmarked for the Fitzroy are those linked to agriculture. Pastoral opportunities have long been debated in the Fitzroy catchment, with dams unsuccessfully planned along the river since the 1990s. In 2018, however, the incumbent state government pledged that there would be no future dams along the Fitzroy or its tributaries.
Despite this, the future of the Fitzroy remains uncertain. First announced in November 2020, the WA state government is currently assessing the feasibility of allowing up to 300 billion liters (79 billion gallons) of surface water to be taken out of the river each year through irrigation development to grow fodder for livestock. Conservationists say this will affect the flow of the river and, consequently, the diverse and unique ecosystem it supports, with threatened species including the northern river shark (Glyphis garricki), one of the world’s rarest fish.
While the debate rages on over pastoral activities in the catchment, there are other questions being raised about opening up the catchment to hydrofracturing stimulation.
Commonly known as fracking, hydrofracturing stimulation is an extractive process that involves injecting a high-pressure fluid made of sand, water and chemical additives into a drilled well to crack the rock and free natural gas from deep underground.
As much of the Fitzroy catchment sits on the Canning Basin, the largest shale gas reserve in Australia, the region has become a central focus of the federal government to boost the country’s post-COVID-19 economic recovery and strengthen the local energy market.
As Mongabay previously reported, a 2016 moratorium on fracking in WA state was lifted three years ago, allowing fracking in just 2% of the state. Much of that area falls in the western Kimberley, including parts of the Fitzroy catchment. In October 2021, the state government further backtracked on this minor concession and granted an exemption to the policy for an oil and gas company, Bennett Resources.
A subsidiary of Texas mining company Black Mountain Metals, the company has proposed drilling 20 exploratory wells, one of which lies just a kilometer (0.6 miles) from a tributary of the Fitzroy.
Bennett Resources did not respond to requests for comment from Mongabay. However, the company announced that it is seeking to extract up to 900 terajoules (953 million cubic feet) of gas a day once the gas fields peak.
In Australia, companies are able to secure mining leases that incorporate land recognized as native title. Rather than grant First Nations complete autonomy over their land, native title legislation mandates that communities enter into negotiations with mining companies regardless of whether they welcome industry on their land or not. Consequently, mining leases can incorporate the lands of multiple groups divided over development. As such, while the wells proposed by Bennett Resources are located in the territory of one community that has entered into fracking agreements, other groups on the lease either remain opposed to the process or are still undecided.
Roger Cook, the WA minister for state development and deputy premier, did not respond to requests by Mongabay for comment on industrial development in the Fitzroy catchment. However, in October, Cook told national broadcaster ABC that the exemption for Bennett Resources was granted because the project would help build gas pipelines to connect the area to the broader WA energy network.
Just how significant the resulting pipeline will be or whether it will cross native title land or the river itself remains to be seen.
Bennett Resources’ proposal says potential impacts could include contamination of surface aquifers due to well integrity failure. WA’s Environmental Protection Authority is currently assessing the proposal to ascertain whether the catchment will be compromised and the effects on species.
A festival to protect the river
For Joe Ross, director of the Bunuba Dawangirri Aboriginal Corporation, his connections to the river are ancient. An Indigenous Bunuba man whose ancestors come from the area, Ross is a seasoned advocate for the protection of the Fitzroy River catchment. In the late 1990s, he was influential in stopping the damming of the river for irrigation proposals.
In July this year, Ross organized a festival on his ancestral territory of Danggu, also known by its colonial name, Geikie Gorge. Named Yajilarra, meaning “let us dream” in the Bunuba language, the three-day festival included traditional stories told through stage performance. According to Ross, this enabled Bunuba children to interact with their elders and explore their identity.
“The aim of the festival was to celebrate our culture and revitalize our language,” Ross told Mongabay. “In doing so, we were promoting local industry, leadership for our younger people and our connection to country and the river itself.”
Following this, the festival featured a night of music and discussion about the river’s cultural and ecological values, bringing together some of the most influential and powerful individuals and corporations in Australia, including Australia’s richest man, mining mogul Andrew Forrest.
Significantly, Forrest’s investments in the Kimberley in recent years relate to the industrial proposals the Fitzroy catchment now faces. In 2019, Forrest’s privately owned energy company, Squadron Energy, bought into fracking interests in the western Kimberley. And in December 2020, he finalized a deal that saw the purchase of two pastoral stations bordering the Fitzroy River, giving livestock access to the water.
“We are passionate about the unique environment of the Kimberley, and the precious waterway and lifeforce that is the Fitzroy River,” Forrest said in a media statement last year.
“We strongly believe in the principle of balancing the need for sustainable agriculture and job creation for local communities, with the need to preserve culture and heritage sites, while restoring the land and its original fauna to its natural habitat.”
However, shortly after the Yajilarra festival, Squadron Energy abandoned its fracking interests in the Kimberley, calling the move a strategic decision given that the process is at odds with the organization’s climate policy.
For Ross, the festival achieved what it set out to.
“The feedback we have received is that the Yajilarra festival was as good as could be,” he said. “What this shows is that we have the capacity to continue these events, to promote our culture and to build ongoing dialogue about the future of the Kimberley.”
A campaign to encourage public engagement
The Kimberley Land Council (KLC), one of Australia’s most prominent First Nations land rights organizations, has also backed proposals to protect the Fitzroy catchment. Though the KLC is tasked chiefly with advocating for its member communities, taking a stand against disputes is rare given the organization is constantly entering into negotiations with government and industry. However, the KLC’s stance became unequivocable in regards to the future of the river.
Declaring that traditional owners “have never consented to the extraction of water and oppose development of the river and its floodplain,” the KLC encouraged the general public to support the protection of the river. This was done by making submissions to the state government’s call for public consultation titled the “Fitzroy River Water Discussion Paper.”
The KLC followed this through with an awareness campaign that involved running an advertisement in WA’s highest-selling daily newspaper. This resulted in more than 43,000 submissions to the discussion paper, one of the largest results in public feedback for an environmental issue in state history.
According to a media statement by the KLC, the river should be preserved in its current state as a cultural and linguistic landscape.
“The cultural management of the Fitzroy River catchment is a responsibility that traditional owners have had since creation and take very seriously,” said the organization’s CEO. “Traditional owners have not consented to large-scale irrigation extraction processes and want to see the river protected as a healthy and thriving ecosystem.”
New media and digital technologies
When the proposals began, Anne Poelina, an adjunct senior research fellow with the University of Notre Dame, Australia, who focuses on Indigenous environmental policy, was driven to act, given the risks she felt were posed to the river system and beyond.
“The first element that needs to be acknowledged is that we believe these living water systems are already fully allocated,” she said. “Any alteration to the river, the taking of water or the compromising of the catchment, will impact our lifeways, our culture, our conservation and our values.”
Concerned at the potential for industry to hinder the flow of the river and its consequential effects on culture and ecology, Poelina, as executive chair, helped unite six native title nations along the river together to form the Martuwarra Fitzroy River Council (MFRC).
Formed in 2018, the MFRC brought nations from across the river’s reaches into a united body through which to engage with government and industry. Under Poelina, the council used digital technologies to promote the cultural and ecological values of the river, producing multiple films to encourage traditional owners throughout the catchment to promote the multiple values of the river.
“Digital storytelling has had a remarkable impact,” Poelina said. “We have a global platform from which to discuss our relationship with the river and the response to our work has been overwhelming. We have been asked to address global forums and be a part of multiple film festivals around the world.”
These resources have also helped in the preservation of Indigenous and scientific knowledge. By engaging with scientists and geographers, Poelina has been able to orchestrate studies that have confirmed the ecological, cultural and legal significance of the river country, one of which has included Martuwarra itself as a co-author. This has advanced the argument for legal recognition of the river as a living ancestral being and granting it certain rights.
“We have also used technology to create a whole database of maps, like the water and vegetation types of the river,” Poelina said. “This has helped map and conserve our cultural heritage, our songs and our ongoing, ancestral connection to the Martuwarra.”
Questions for the future
Anthony Ingraffea, the Dwight C. Baum professor of engineering emeritus at Cornell University, told Mongabay there’s no straightforward way to answer how many fracking wells would be needed to produce Bennett Resources’ goal of extracting up to 900 terajoules of gas a day.
Drawing on examples from the United States, Ingraffea said that at a certain rate and with advanced technology, “it would take a few hundred wells to produce 850 million cubic feet a day over a sustained period of time.”
However, he said that in any case, three factors are at play: the length of time for a certain production rate, how quickly the operator can put wells into production, and the quality of the shale gas produced.
“All shale gas wells experience what is called a decline curve of production, that is, the rate of production rapidly decreases over time,” he said.
Ingraffea highlighted a case in Texas in which approximately 2,000 wells were drilled over a cumulative period of six years to produce 850 million cubic feet a day, the same output that Bennet Resources is aiming for.
Given the significance of the Fitzroy River’s aquatic and mineral resources, the future of the catchment will be discussed at all levels of government as the feedback from the Fitzroy River Water Discussion Paper is released and future fracking development is proposed.
Ross and Poelina say they would like to ensure that the ecological and cultural significance of the river to First Nations communities is taken into account in that conversation.
“The Kimberley is one of the last places in the world that has not been taken over by mass industrialization,” Poelina said. “Our people have walked this country since the dawn of time, we know it better than anyone. We want to continue to care for the land as she looks after us.”
Citations:
Lear, K. O., Gleiss, A. C., Whitty, J. M., Fazeldean, T., Albert, J. R., Green, N., … Morgan, D. L. (2019). Recruitment of a critically endangered sawfish into a riverine nursery depends on natural flow regimes. Scientific Reports, 9(1). doi:10.1038/s41598-019-53511-9
RiverOfLife, M., Poelina, A., Bagnall, D., & Lim, M. (2020). Recognizing the Martuwarra’s First Law right to life as a living ancestral being. Transnational Environmental Law,9(3), 541-568. doi:10.1017/S2047102520000163
Banner image: The Freshwater Sawfish (Pristis pristis) is the most Evolutionary Distinct and Greatly Endangered (EDGE) animal in the world. Its last stronghold is the Fitzroy River catchment. Image courtesy of Peter Kyne/Wikimedia Commons.