Resistance Newsletter — December 2018

by Max Wilbert

Deep Green Resistance

max@maxwilbert.org

https://www.deepgreenresistance.org

Current atmospheric CO2 level: 408.02 PPM

A free monthly newsletter providing analysis and commentary on ecology, global capitalism, empire, and revolution.

For back issues, to read this issue online, or to subscribe via email or RSS, visit the Resistance News web page.

These essays also appear on the DGR News Service, which also includes an active comment section.

** *** ***** ******* *********** *************

In this issue:

  1. A New Declaration
  2. Indigenous Solidarity Guidelines
  3. 73 Rules of Spycraft
  4. Blue Angels: The Naked Face of Empire
  5. Activist Guide to Security: Defeating Geolocation and Tracking
  6. DGR France Organizing Update
  7. Amnesia & Lack of Accountability Reign as Wall Street Celebrates Halliburton’s 100-year anniversary
  8. Underground Tactics
  9. Target Selection
  10. Twitter wants me to shut up and the right wants me to join them; I don’t think I should have to do either
  11. Film Review: “First Reformed” Fails to Deliver on Environmental Themes
  12. Guide to Private and Secure Operating Systems
  13. Submit your material to the Deep Green Resistance News Service
  14. Further news and recommended reading / podcasts
  15. How to support DGR or get involved

** *** ***** ******* *********** *************

War and civilization are intertwined. War is not simply an unfortunate byproduct. It’s the driving force in the development of civilization.

–      Peter Turchin, Director of the Seshat Global History Databank

** *** ***** ******* *********** *************

A New Declaration

[Link] by Derrick Jensen

We hold these truths to be self-evident:

That the real world is the source of our own lives, and the lives of others. A weakened planet is less capable of supporting life, human or otherwise. Thus the health of the real world is primary, more important than any social or economic system, because all social or economic systems are dependent upon a living planet: without a living planet you don’t have any social or economic systems whatsoever. It is self-evident that to value a social system that harms the planet’s capacity to support life over life itself is literally insane, in terms of being out of touch with physical reality.

That any way of life based on the use of nonrenewable resources is by definition not sustainable.

That any way of life based on the hyperexploitation of renewable resources is by definition not sustainable: if, for example, there are fewer salmon return every year, eventually there will be none. This means that for a way of life to be sustainable, it must not harm native communities: native prairies, native forests, native fisheries, and so on.

That the real world is interdependent, such that harm done to rivers harms those humans and nonhumans whose lives depend on these rivers, harms forests and prairies and wetlands surrounding these rivers, harms the oceans into which these rivers flow. Harm done to mountains harms rivers flowing through them. Harm done to oceans harms everyone directly or indirectly connected to them.

That you cannot argue with physics. If you burn carbon-based fuels, this carbon will go into the air, and have effects in the real world.

That creating and releasing poisons into the world will poison humans and nonhumans.

That no one, no matter now rich or powerful, should be allowed to create poisons for which there is no antidote.

That no one, no matter how rich or powerful, should be allowed to create messes that cannot be cleaned up.

That no one, no matter how rich or powerful, should be allowed to destroy places humans or nonhumans need to survive.

That no one, no matter how rich or powerful, should be allowed to drive human cultures or nonhuman species extinct.

That reality trumps all belief systems: what you believe is not nearly so important as what is real.

That on a finite planet you cannot have an economy based on or requiring growth. At least you cannot have one and expect to either have a planet or a future.

That the current way of life is not sustainable, and will collapse. The only real questions are what will be left of the world after that collapse, and how bad things will be for the humans and nonhumans who come after. We hold it as self-evident that we should do all that we can to make sure that as much of the real, physical world remains intact until the collapse of the current system, and that humans and nonhumans should be as prepared as possible for this collapse.

That the health of local economies are more important than the health of a global economy.

That a global economy should not be allowed to harm local economies or landbases.

That corporations are not living beings. They are certainly not human beings.

That corporations do not in any real sense exist. They are legal fictions. Limited liability corporations are institutions created explicitly to separate humans from the effects of their actions—making them, by definition, inhuman and inhumane. To the degree that we desire to live in a human and humane world—and, really, to the degree that we wish to survive—limited liability corporations need to be eliminated.

That the health of human and nonhuman communities are more important than the profits of corporations.

We hold it as self-evident, as the Declaration of Independence states, “That whenever any Form of Government becomes destructive of these ends [Life, Liberty, and the Pursuit of Happiness], it is the Right of the People to alter or abolish it. . . .” Further, we hold it as self-evident that it would be more precise to say that it is not the Right of the People, nor even their responsibility, but instead something more like breathing—something that if we fail to do we die. If we as a People fail to rid our communities of destructive institutions, those institutions will destroy our communities. And if we in our communities cannot provide meaningful and nondestructive ways for people to gain food, clothing, and shelter then we must recognize it’s not just specific destructive institutions but the entire economic system that is pushing the natural world past breaking points. Capitalism is killing the planet. Industrial civilization is killing the planet. Once we’ve recognized the destructiveness of capitalism and industrial civilization—both of which are based on systematically converting a living planet into dead commodities—we’ve no choice, unless we wish to sign our own and our children’s death warrants, but to fight for all we’re worth and in every way we can to overturn it.

#

Here is a list of our initial demands. When these demands are met, we will have more, and then more, until we are living sustainably in a just society. In each case, if these demands are not met, we will, because we do not wish to sign our own and our children’s death warrants, put them in place ourselves.

We demand that:

 

Communities, including nonhuman communities, be immediately granted full legal and moral rights.

Corporations be immediately stripped of their personhood, no longer be considered as persons under the law.

Limited liability corporations be immediately stripped of their limited liability protection. If someone wants to perpetrate some action for which there is great risk to others, this person should be prepared to assume this risk him- or herself.

Those whose economic activities cause great harm—including great harm to the real, physical world—be punished commensurate with their harm. So long as prisons and the death penalty exist, Tony Hayward of BP and Don Blankenship of Massey Coal, to provide two examples among many, should face the death penalty or life in prison without parole for murder, both of human beings and of landbases. The same can be said for many others, including those associated with these specific murders and thefts, and including those associated with many other murders and thefts.

Environmental Crimes Tribunals be immediately put in place to try those who have significantly harmed the real, physical world. These tribunals will have force of law and will impose punishment commensurate with the harm caused to the public and to the real world.

The United States immediately withdraw from NAFTA, DR-CAFTA, and other so-called “free trade agreements” (if it really is “free trade,” then why do they need the military and police to enforce it?) as these cause immeasurable and irreparable harm to local economies in the United States and abroad, and to the real, physical world. They cause grievous harm to working people in the United States and elsewhere. Committees should be formed to determine whether to try those who signed on to NAFTA for subverting United States sovereignty, and for Crimes Against Humanity for the deaths caused by these so-called free trade agreements.

The United States remove all support for the World Bank and the International Monetary Fund. Both of these organizations cause immeasurable and irreparable harm to local economies in the United States and abroad, and to the real, physical world. They cause grievous harm to working people in the United States and elsewhere.

The United States recognize that it is founded on land stolen from indigenous peoples. We demand a four stage process to rectify this ongoing atrocity. The first stage consists of immediately overturning the relevant parts of the 1823 U.S. Supreme Court ruling Johnson v. M’Intosh, which includes such rationalizations for murder and theft as, “However extravagant the pretension of converting the discovery of an inhabited country into conquest may appear; if the principle has been asserted in the first instance, and afterwards sustained; if a country has been acquired and held under it; if the property of the great mass of the community originates in it, it becomes the law of the land, and cannot be questioned.” We demand that this pretense, this principle, not only be questioned but rejected. The second is that all lands for which the United States government cannot establish legal title through treaty must immediately be returned to those peoples from whom it was stolen. Large scale landowners, those with over 640 acres, must immediately return all lands over 640 acres to their original and rightful inhabitants. Small scale landowners, those with title to 640 acres or less, who are “innocent purchasers” may retain title to their land (and this same is true for the primary 640 acres of larger landowners), but may not convey this title to others, and on their deaths it passes back to the original and rightful inhabitants. The third phase is for the United States government to pay reparations to those whose land they have taken commensurate with the harm they have caused. The fourth phase is for each and every treaty between the United States government and sovereign indigenous nations to be revisited, with an eye toward determining whether the treaties were signed under physical, emotional, economic, or military duress and whether these treaties have been violated. In either of these cases the wrongs must be redressed, once again commensurate with the harm these wrongs have caused.

The United States government will provide reparations to those whose families have been harmed by chattel slavery, commensurate with the harm caused.

Rivers be restored. There are more than 2 million dams in the United States, more than 60,000 dams over thirteen feet tall and over 70,000 dams over six and a half feet tall. Dams kill rivers. If we removed one of these 70,000 dams each day, it would take 200 years to get rid of them all. Salmon don’t have that time. Sturgeon don’t have that time. We demand that no more dams be built, and we demand the removal of five of those 70,000 dams per day over the next forty years, beginning one year from today. Remember, physical reality is more important than your belief system.

Native prairies, wetlands, and forests be restored, at a rate of five percent per year. Please note that tree farms or “forests” managed for timber are not the same as native forests, any more than lawns or corn fields are prairies, and any more than concrete sluices are wetlands. Please note also that if all of the prairies and forests east of the Mississippi River were restored, the United States could be a net carbon sink within five years, even without reducing carbon emissions.

An immediate end to clearcutting, “leave tree,” “seed tree,” “shelter tree” and all other “even age management” techniques, no matter what they are called, and no matter what rationales are put forward by the timber industry and the government. All remaining native forests are immediately and completely protected.

An immediate end to destruction of prairies and wetlands. All remaining prairies and wetlands are immediately protected.

The United States government immediately begin strict enforcement of the Clean Water Act, Clean Air Act, the Endangered Species Act, and other acts aimed at protecting the real, physical world. All programs associated with these Acts must be fully funded. This includes the immediate designation of Critical Habitat for all species on the wait list.

Each year the United States must survey all endangered species to ascertain if they are increasing in number and range. If not, the United States government will do what is required to make sure they do.

The United States government do whatever is necessary to make sure that there are fewer toxins in every mother’s breast milk every year than the year before, and that there are fewer carcinogens in every stream every year than the year before.

The United States government do whatever is necessary to make sure that there are more migratory songbirds every year than the year before, that there are more native fish every year than the year before, more native reptiles and amphibians, and so on.

Immediate closure of all US military bases on foreign soil. All US military personnel are to be immediately brought home.

An immediate ban on the direct or indirect use of mercenaries (“military contractors”) by the US government and all associated entities.

A reduction in the US military budget by 20 per year, until it reaches 20 percent of its current size. Then it will be maintained at no larger than that except in case of a war that is declared only by a direct vote of more than 50 percent of US citizens (and to last only as long as 50 percent of US citizens back it). This will provide the “peace dividend” politicians lyingly promised us back when the Soviet Union collapsed, and will balance the US budget and more than pay for all necessary domestic programs.

The United States officially recognize that capitalism is based on subsidies, or as Dwayne Andreas, former CEO of ADM said, “There isn’t one grain of anything in the world that is sold in a free market. Not one! The only place you see a free market is in the speeches of politicians.” He’s right. For example, commercial fishing fleets worldwide receive more in subsidies than the entire value of their catch. Timber corporations, oil corporations, banks, would all collapse immediately without massive government subsidies and bailouts. Therefore, we demand that the United States government stop subsidizing environmentally and socially destructive activities, and shift those same subsidies into activities that restore the real, physical, world and that promote local self-sufficiency and vibrant local economies. Instead of subsidizing deforestation, subsidize reforestation. Instead of subsidizing the oil industry, subsidize relocalization. Instead of subsidizing fisheries depletion, subsidize fisheries restoration. Instead of subsidizing plastics production, subsidize cleaning plastics from the ocean. Instead of subsidizing the production of toxics by the chemical industries, subsidize the cleaning up of these toxics, both from our bodies and from the rest of the real, physical world.

Scientific consensus is that to prevent even more catastrophic climate change than we and the rest of the world already face, net carbon emissions must be reduced by 80 percent. Because we wish to continue to live on a habitable planet, we demand a carbon reduction of 20 percent of current emissions per year over the next four years.

The enshrinement in law of the right for workers to collectively bargain. In case of strikes, if police are brought in at all, it must be to protect the right of workers to strike. If police force anyone to come to terms, they must force the capitalists.

That laws against rape be enforced, even against those who are rich, even those who are famous athletes, even those who are politicians, even those who are entertainers.

The enshrinement in law of the precautionary principle, which states that if an action or policy has a suspected risk of causing harm to the public or the real, physical world, then the burden of proof that it is not harmful falls on those taking the action. In the absence of conclusive proof, no action may be taken. For example, no chemicals would be allowed to be released into the environment without conclusive proof that they will not harm the public or the environment.

No new chemicals be released into the real, physical world until all currently used chemicals have been thoroughly tested for toxicity, and if found to have any significant chance of harming the public or the environment, these chemicals must be immediately and without exception withdrawn from use.

The immediate, explicit, and legally binding recognition that perpetual growth is incompatible with life on a finite planet. We demand that economic growth stop, and that economies begin to contract. We demand immediate acknowledgement that if we do not begin this contraction voluntarily, that this contraction will take place against our will, and will cause untold misery.

That overconsumption and overpopulation must be addressed in methods that are not racist, colonialist, or misogynist. We must recognize that humans, and especially industrial humans, have overshot the planet’s carrying capacity. We must recognize further that while overconsumption is more harmful than overpopulation, both are harmful. We must further recognize that right now, more than fifty percent of the children who are born are not wanted. We demand that all children be wanted. We recognize that the single most effective strategy for making certain that all children are wanted is the liberation of women. Therefore we demand that women be given absolute reproductive freedom, and that all forms of reproductive control be freely available to women. We demand that those who attempt to deny women this freedom be punished by law.

The United States government put an immediate end to absentee land ownership. No one shall be allowed to own land more than one-quarter of a mile from his or her home.

Land ownership patterns change. Land ownership is more concentrated in the United States than in many countries the United States derides as antidemocratic: five percent of farmers in Honduras own 67 percent of the arable land, while in the United States five percent of landowners (not citizens) own 75 percent of the land (California is in many ways worse: twenty-five landowners own 58 percent of the farmland). To rectify this, no one shall be allowed to own more than 640 acres. All title to individual or corporate land holdings over 640 acres are to be immediately forfeited. These lands will be first in line for restoration to native forest, prairie, wetland, and so on. Lands not suitable for these purposes will be used to provide housing for those who cannot afford it.

An immediate end to factory farming and to monocrop agriculture, two of the most destructive activities humans have ever perpetrated. We demand a return to perennial polycultures.

An immediate end to soil drawdown. Because soil is the basis of terrestrial life, no activities will be allowed which destroy topsoil. All properties over sixty acres must have soil surveys every ten years (on every sixty acre parcel), and if they have suffered any decrease of health or depth of topsoil the lands will be confiscated and given to those who will build up soil.

An immediate end to aquifer drawdown. No activities will be allowed which draw down aquifers.

Provision of free food, shelter, and medical necessities to all residents.

Immediate increase in the tax rate to 95 percent for all gross earnings over one million dollars per year by persons or entities.

An immediate and permanent halt to all fracking, mountaintop removal, tar sands extraction, nuclear power, and offshore drilling.

An immediate and permanent halt to all energy production that is harmful to the real, physical world. This includes the manufacture of solar photovoltaics, windmills, hybrid cars, and so on.

Removal of plastic from the ocean. Each year the ocean must have 5 percent less plastic in it than the year before.

Each year the oceans must have 5 percent more large fish than the year before.

The United States Constitution be rewritten to destroy the primacy it gives to the privatization of profits and the externalization of costs by the wealthy, and to make its primary purpose not the preservation of the wealth and power of the already wealthy and powerful, but rather to protect human and nonhuman communities—to protect the real, physical world—and enforcably to deprive the rich of their ability to steal from the poor and the powerful of their ability to destroy the planet.

#

We hold these further truths also to be self-evident:

That demands without means to enforce them are nothing more than begging. We are not begging. We are demanding.

Power is not a mistake, and those in power will not suddenly have attacks of conscience. Social change has never occurred through waiting for the rich or powerful to develop consciences, and it never will.

Those in power will not act different than they have acted all along, and they will not act against the power of capital. We hold it as self-evident that the rich and powerful have no reason to stop the rich from stealing from the poor nor the powerful from destroying more of the real, physical world than they already have. That is, they have no reason except us. Our lives and the life of the planet that is our only home is on the line. We no longer have the luxury of allowing those in power to continue. If those in power won’t accede to these demands, then they need to not be in power, and we need to remove them from power, using any means necessary.

We hold it as self-evident, as the Declaration of Independence states, “That whenever any Form of Government becomes destructive of these ends [Life, Liberty, and the Pursuit of Happiness], it is the Right of the People to alter or abolish it. . . .”

It is long past time we asserted our rights.

** *** ***** ******* *********** *************

 Deep Green Resistance Indigenous Solidarity Guidelines

[Link] It’s important that members of settler culture ally themselves with indigenous communities fighting for their rights and survival, but there are right and wrong ways to express solidarity. The following guidelines have been put together by Deep Green Resistance members with the help of indigenous activists. They aren’t a complete how-to guide – every community and every situation is different – but they can hopefully point you in a good direction for acting effectively and with respect.

  1. First and foremost we must recognize that non-indigenous people are occupying stolen land in an ongoing genocide that has lasted for centuries. We must affirm our responsibility to stand with indigenous communities who want support and give everything we can to protect their land and culture from further devastation; they have been on the frontlines of biocide and genocide for centuries, and as allies, we need to step up and join them.
  2. You are doing Indigenous solidarity work not out of guilt, but out of a fierce desire to confront oppressive colonial systems of power.
  3. You are not helping Indigenous people, you are there to: join with, struggle with, and fight with indigenous peoples against these systems of power. You must be willing to put your body on the line.
  4. Recognize your privilege as a member of settler culture.
  5. You are not here to engage in any type of cultural, spiritual or religious needs you think you might have, you are here to engage in political action. Also, remember your political message is secondary to the cause at hand.
  6. Never use drugs or alcohol when engaging in Indigenous solidarity work. Never.
  7. Do more listening than talking, you will be surprised what you can learn.
  8. Recognize that there will be Indigenous people that will not want you to participate in ceremonies. Humbly refrain from participating in ceremonies.
  9. Recognize that you and your Indigenous allies may be in the minority on a cause that is worth fighting for.
  10. Work with integrity and respect, be trustworthy and do what you say you are going to do.

** *** ***** ******* *********** *************

73 Rules of Spycraft

[Link] American diplomat and lawyer Allen Dulles (1893-1969), the 5th Director of Central Intelligence and once head of the CIA listed 73 Rules of Spycraft.

The greatest weapon a man or woman can bring to this type of work in which we are engaged is his or her hard common sense. The following notes aim at being a little common sense and applied form. Simple common sense crystallized by a certain amount of experience into a number of rules and suggestions.

  1. There are many virtues to be striven after in the job. The greatest of them all is security. All else must be subordinated to that.
  2. Security consists not only in avoiding big risks. It consists in carrying out daily tasks with painstaking remembrance of the tiny things that security demands. The little things are in many ways more important than the big ones. It is they which oftenest give the game away. It is consistent care in them, which form the habit and characteristic of security mindedness.
  3. In any case, the man or woman who does not indulge in the daily security routine, boring and useless though it may sometimes appear, will be found lacking in the proper instinctive reaction when dealing with the bigger stuff.
  4. No matter how brilliantly given an individual, no matter how great his goodwill, if he is lacking in security, he will eventually prove more of a liability than asset.
  5. Even though you feel the curious outsider has probably a good idea that you are not what you purport to be, never admit it. Keep on playing the other part. It’s amazing how often people will be led to think they were mistaken. Or at least that you are out ‘in the other stuff’ only in a very mild way. And anyhow, a person is quite free to think what he likes. The important thing is that neither by admission or implication do you let him know.
  6. Security, of course, does not mean stagnation or being afraid to go after things. It means going after things, but reducing all the risks to a minimum by hard work.
  7. Do not overwork your cover to the detriment of your jobs; we must never get so engrossed in the latter as to forget the former.
  8. Never leave things lying about unattended or lay them down where you are liable to forget them. Learn to write lightly; the “blank” page underneath has often been read. Be wary of your piece of blotting paper. If you have to destroy a document, do so thoroughly. Carry as little written matter as possible, and for the shortest possible time. Never carry names or addresses en clair. If you cannot carry them for the time being in your head, put them in a species of personal code, which only you understand. Small papers and envelopes or cards and photographs, ought to be clipped on to the latter, otherwise they are liable to get lost. But when you have conducted an interview or made arrangements for a meeting, write it all down and put it safely away for reference. Your memory can play tricks.
  9. The greatest vice in the game is that of carelessness. Mistakes made generally cannot be rectified.
  10. The next greatest vice is that of vanity. Its offshoots are multiple and malignant. Besides, the man with a swelled head never learns. And there is always a great deal to be learned.
  11. Booze is naturally dangerous. So also is an undisciplined attraction for the other sex. The first loosens the tongue. The second does likewise. It also distorts vision and promotes indolence. They both provide grand weapons to an enemy.
  12. It has been proved time and again, in particular, that sex and business do not mix.
  13. In this job, there are no hours. That is to say, one never leaves it down. It is lived. One never drops one’s guard. All locations are good for laying a false trail (social occasions, for instance, a casual hint here, a phrase there). All locations are good for picking something up, or collecting…for making a useful acquaintance.
  14. In a more normal sense of the term “no hours,” it is certainly not a business where people put their own private arrangements before their work.
  15. That is not to say that one does not take recreation and holidays. Without them it is not possible to do a decent job. If there is a real goodwill and enthusiasm for the work, the two (except in abnormal circumstances) will always be combined without the work having to suffer.
  16. The greatest material curse to the profession, despite all its advantages, is undoubtedly the telephone. It is a constant source of temptation to slackness. And even if you do not use it carelessly yourself, the other fellow, very often will, so in any case, warn him. Always act on the principle that every conversation is listened to, that a call may always give the enemy a line. Naturally, always unplug during confidential conversations. Even better is it to have no phone in your room, or else have it in a box or cupboard.
  17. Sometimes, for quite exceptional reasons, it may be permissible to use open post as a channel of communications. Without these quite exceptional reasons, allowing of no alternative, it is to be completely avoided.
  18. When the post is used, it will be advisable to get through post boxes; that is to say, people who will receive mail for you and pass it on. This ought to be their only function. They should not be part of the show. They will have to be chosen for the personal friendship which they have with you or with one of your agents. The explanation you give them will depend on circumstances; the letters, of course, must be apparently innocent incontinence. A phrase, signature or embodied code will give the message. The letter ought to be concocted in such fashion as to fit in with the recipient’s social background. The writer ought therefore to be given details of the post boxes assigned to them. An insipid letter is in itself suspicious. If however, a signature or phrase is sufficient to convey the message, then a card with greetings will do.
  19. Make a day’s journey, rather than take a risk, either by phone or post. If you do not have a prearranged message to give by phone, never dial your number before having thought about your conversation. Do not improvise even the dummy part of it. But do not be too elaborate. The great rule here, as in all else connected with the job, is to be natural.
  20. If you have phoned a line or a prospective line of yours from a public box and have to look up the number, do not leave the book lying open on that page.
  21. When you choose a safe house to use for meetings or as a depot, let it be safe. If you can, avoid one that is overlooked by other houses. If it is, the main entrance should be that used for other houses as well. Make sure there are no suspicious servants. Especially, of course, be sure of the occupants. Again, these should be chosen for reasons of personal friendship with some member of the organization and should be discreet. The story told to them will once again depend on circumstances. They should have no other place in the show, or if this is unavoidable, then calls at the house should be made as far as possible after dark.
  22. Always be yourself. Always be natural inside the setting you have cast for yourself. This is especially important when meeting people for the first time or when traveling on a job or when in restaurants or public places in the course of one. In trains or restaurants people have ample time to study those nearest them. The calm quiet person attracts little attention. Never strain after an effect. You would not do so in ordinary life. Look upon your job as perfectly normal and natural.
  23. When involved in business, look at other people as little as possible, and don’t dawdle. You will then have a good chance of passing unnoticed. Looks draw looks.
  24. Do not dress in a fashion calculated to strike the eye or to single you out easily.
  25. Do not stand around. And as well as being punctual yourself, see that those with whom you are dealing are punctual. Especially if the meeting is in a public place; a man waiting around will draw attention. But even if it is not in a public place, try to arrive and make others arrive on the dot. An arrival before the time causes as much inconvenience as one after time.
  26. If you have a rendezvous, first make sure you are not followed. Tell the other person to do likewise. But do not act in any exaggerated fashion. Do not take a taxi to a house address connected with your work. If it cannot be avoided, make sure you are not under observation when you get into it. Or give another address, such as that of a café or restaurant nearby.
  27. Try to avoid journeys to places where you will be noticeable. If you have to make such journeys, repeat them as little as possible, and take all means to make yourself fit in quietly with the background.
  28. Make as many of your difficult appointments as you can after dark. Turn the blackout to good use. If you cannot make it after dark, make it very early morning when people are only half awake and not on the lookout for strange goings-on.
  29. Avoid restaurants, cafes and bars for meetings and conversations. Above all never make an initial contact in one of them. Let it be outside. Use abundance of detail and description of persons to be met, and have one or two good distinguishing marks. Have a password that can be given to the wrong person without unduly exciting infestation.
  30. If interviews cannot be conducted in a safe house, then take a walk together in the country. Cemeteries, museums and churches are useful places to bear in mind.
  31. Use your own judgment as to whether or not you ought to talk to chance travel or table companions. It may be useful. It may be the opposite. It may be of no consequence whatsoever. Think, however, before you enter upon a real conversation, whether this particular enlargement of the number of those who will recognize and spot you in the future is liable or not to be a disadvantage. Always carry reading matter. Not only will it save you from being bored, it is protective armor if you want to avoid a conversation or to break off an embarrassing one.
  32. Always be polite to people, but not exaggeratedly so. With the following class of persons who come to know you — hotel and restaurant staffs, taxi drivers, train personnel etc., be pleasant.
  33. Someday, they may prove useful to you. Be generous in your tips to them, but again, not exaggeratedly so. Give just a little more than the other fellow does – unless the cover under which you are working does not permit this. Give only normal tips. however, to waiters and taxi drivers, etc., when you are on the job. Don’t give them any stimulus, even of gratification, to make you stick in their minds. Be as brief and casual as possible.
  34. Easiness and confidence do not come readily to all of us. They must be assiduously cultivated. Not only because they help us personally, but they also help to produce similar reactions in those we are handling.
  35. Never deal out the intense, the dramatic stuff, to a person before you have quietly obtained his confidence in your levelheadedness.
  36. If you’re angling for a man, lead him around to where you want him; put the obvious idea in his head, and make the suggestion of possibilities come to him. Express, if necessary – but with great tact — a wistful disbelief in the possibilities at which you are aiming. “How fine it would be if only someone could… but of course, etc. etc.” And always leave a line of retreat open to yourself.
  37. Never take a person for granted. Very seldom judge a person to be above suspicion. Remember that we live by deceiving others. Others live by deceiving us. Unless others take persons for granted or believe in them, we would never get our results. The others have people as clever as we; if they can be taken in, so can we. Therefore, be suspicious.
  38. Above all, don’t deceive yourself. Don’t decide that the other person is fit or is all right, because you yourself would like it to be that way. You are dealing in people’s lives.
  39. When you have made a contact, till you are absolutely sure of your man — and perhaps even then — be a small but eager intermediary. Have a “They” in the background for whom you act and to whom you are responsible. If “They” are harsh, if “They” decide to break it off, it is never any fault of yours, and indeed you can pretend to have a personal grievance about it. “They” are always great gluttons for results and very stingy with cash until “They” get them. When the results come along, “They” always send messages of congratulation and encouragement.
  40. Try to find agents who do not work for money alone, but for conviction. Remember, however, that not by conviction alone, does the man live. If they need financial help, give it to them. And avoid the “woolly” type of idealist, the fellow who lives in the clouds.
  41. Become a real friend of your agents. Remember that he has a human side so bind him to you by taking an interest in his personal affairs and in his family. But never let the friendship be stronger than your sense of duty to the work. That must always be impervious to any sentimental considerations. Otherwise, your vision will be distorted, your judgment affected, and you may be reluctant, even, to place your men in a position of danger. You may also, by indulgence toward him, let him endanger others.
  42. Gain the confidence of your agents, but be wary of giving them more of yours than is necessary. He may fall by the way side; he may quarrel with you; it may be advisable for a number of reasons to drop him. In that case, obviously, the less information he possesses, the better. Equally obviously, if an agent runs the risk of falling into the hands of the enemy, it is unfair both to him and the show to put him in possession of more knowledge than he needs.
  43. If your agent can be laid off work periodically, this is a very good thing. And during his rest periods, let him show himself in another field and in other capacities.
  44. Teach them at least the elements of technique. Do not merely leave it to his own good judgment, and then hope for the best. Insist, for a long time at least, on his not showing too much initiative, but make him carry out strictly the instructions which you give him. His initiative will he tested when unexpected circumstances arise. Tell him off soundly when he errs; praise him when he does well.
  45. Do not be afraid to be harsh, or even harsh with others, if it is your duty to be so. You are expected to be likewise with yourself. When necessity arises neither your own feelings not those of others matter. Only the job — the lives and safety of those entrusted to you — is what counts.
  46. Remember that you have no right to expect of others what you are not prepared to do yourself. But on the other hand, do not rashly expose yourself in any unnecessary displays of personal courage that may endanger the whole shooting match. It often takes more moral courage to ask another fellow to do a dangerous task than to do it yourself. But if this is the proper course to follow, then you must follow it.
  47. If you have an agent who is really very important to you, who is almost essential to your organization, try not to let them know this. Infer, without belittling him, that there are other lines and other groups of a bigger nature inside the shadow, and that — while he and his particular group are doing fine work — they are but part of a mosaic.
  48. Never let your agent get the bit between his teeth and run away with you. If you cannot manage it easily yourself, there are always the terrible “They.”
  49. But if your agent knows the ground on which he is working better than you, always be ready to listen to his advice and to consult him. The man on the spot is the man who can judge.
  50. In the same way, if you get directives from HQ, which to you seem ill-advised, do not be afraid to oppose these directives. You are there for pointing things out. This is particularly so if there is grave danger to security without a real corresponding advantage for which the risk may be taken. For that, fight anybody with everything you’ve got.
  51. If you have several groups, keep them separate unless the moment comes for concerted action. Keep your lines separate; and within the bounds of reason and security, try to multiply them. Each separation and each multiplication minimizes the danger of total loss. Multiplication of lines also gives the possibility of resting each line, which is often a very desirable thing.
  52. Never set a thing really going, whether it be big or small, before you see it in its details. Do not count on luck. Or only on bad luck.
  53. When using couriers, who are in themselves trustworthy — (here again, the important element of personal friendship ought to be made to play its part) — but whom it is better to keep in the dark as to the real nature of what they are carrying, commercial smuggling will often provide an excellent cover. Apart from being a valid reason for secrecy, it gives people a kick and also provides one with a reason for offering payment. Furthermore, it involves a courier in something in which it is in his own personal advantage to conceal.
  54. To build this cover, should there be no bulk of material to pass, but only a document or a letter, it will be well always to enclose this properly sealed in a field dummy parcel with an unsealed outer wrapping.
  55. The ingredients for any new setup are: serious consideration of the field and of the elements at your disposal; the finding of one key man or more; safe surroundings for encounter; safe houses to meet in; post boxes; couriers; the finding of natural covers and pretext for journeys, etc.; the division of labor; separation into cells; the principal danger in constructing personal friendships between the elements (this is enormously important); avoidance of repetition.
  56. The thing to aim at, unless it is a question of a special job, is not quick results, which may blow up the show, but the initiation of a series of results, which will keep on growing and which, because the show has the proper protective mechanism to keep it under cover, will lead to discovery.
  57. Serious groundwork is much more important than rapid action. The organization does not merely consist of the people actively working but the potential agents whom you have placed where they may be needed, and upon whom you may call, if need arises.
  58. As with an organization, so with a particular individual. His first job in a new field is to forget about everything excepting his groundwork; that is, the effecting of his cover. Once people label him, the job is half done. People take things so much for granted and only with difficulty change their sizing-up of a man once they have made it. They have to be jolted out of it. It is up to you to see that they are not. If they do suspect, do not take it that all is lost and accept the position. Go back to your cover and build it up again. You will at first puzzle them and finally persuade them.
  59. The cover you choose will depend upon the type of work that you have to do. So also will the social life in which you indulge. It may be necessary to lead a full social existence; it may be advisable to stay in the background. You must school yourself not to do any wishful thinking in the sense of persuading yourself that what you want to do is what you ought to do.
  60. Your cover and social behavior, naturally, ought to be chosen to fit in with your background and character. Neither should be too much of a strain. Use them well. Imprint them, gradually but steadfastly on people’s minds. When your name crops up in conversation they must have something to say about you, something concrete outside of your real work.
  61. The place you live in is often a thorny problem. Hotels are seldom satisfactory. A flat of your own where you have everything under control is desirable; if you can share it with a discreet friend who is not in the business, so much the better. You can relax into a normal life when you get home, and he will also give you an opportunity of cover. Obviously the greatest care is to be taken in the choice of servants. But it is preferable to have a reliable servant than to have none at all. People cannot get in to search or fix telephones, etc. in your absence. And if you want to not be at home for awkward callers (either personal or telephonic), servants make that possible.
  62. If a man is married, the presence of his wife may be an advantage or disadvantage. That will depend on the nature of the job — as well as on the nature of the husband and wife.
  63. Should a husband tell his wife what he is doing? It is taken for granted that people in this line are possessed of discretion and judgment. If a man thinks his wife is to be trusted, then he may certainly tell her what he is doing — without necessarily telling her the confidential details of particular jobs. It would be fair to neither husband nor wife to keep her in the dark unless there were serious reasons demanding this. A wife would naturally have to be coached in behavior in the same way as an agent.
  64. Away from the job, among your other contacts, never know too much. Often you will have to bite down on your vanity, which would like to show what you know. This is especially hard when you hear a wrong assertion being made or a misstatement of events.
  65. Not knowing too much does not mean not knowing anything. Unless there is a special reason for it, it is not good either to appear a nitwit or a person lacking in discretion. This does not invite the placing of confidence in you.
  66. Show your intelligence, but be quiet on anything along the line you are working. Make others do the speaking. A good thing sometimes is to be personally interested as “a good patriot and anxious to pass along anything useful to official channels in the hope that it may eventually get to the right quarter.”
  67. When you think a man is possessed of useful knowledge or may in other ways be of value to you, remember that praise is acceptable to the vast majority of men. When honest praise is difficult, a spot of flattery will do equally well.
  68. Within the limits of your principles, be all things to all men. But don’t betray your principles. The strongest force in your show is you. Your sense of right, your sense of respect for yourself and others. And it is your job to bend circumstances to your will, not to let circumstances bend or twist you.
  69. In your work, always be in harmony with your own conscience. Put yourself periodically in the dock for cross examination. You can never do more than your best; only your best is good enough. And remember that only the job counts — not you personally, excepting satisfaction of a job well done.
  70. It is one of the finest jobs going. no matter how small the part you play may appear to be. Countless people would give anything to be in it. Remember that and appreciate the privilege. No matter what others may do, play your part well.
  71. Never get into a rut. Or rest on your oars. There are always new lines around the corner, always changes and variations to be introduced. Unchanging habits of work lead to carelessness and detection.
  72. If anything, overestimate the opposition. Certainly never underestimate it. But do not let that lead to nervousness or lack of confidence. Don’t get rattled, and know that with hard work, calmness, and by never irrevocably compromising yourself, you can always, always best them.
  73. Lastly, and above all — REMEMBER SECURITY.

The above points are not intended for any cursory, even interested, glance. They will bear — each of them — serious attention, and at least occasional re-perusal. It is probable, furthermore, that dotted here and there among them will be found claims that have particular present application for each person who reads them. These, naturally, are meant to be acted upon straightaway.”

** *** ***** ******* *********** *************

Blue Angels: The Naked Face of Empire

[Link] Editor’s note: We live in a world on the brink. As the climate crisis intensifies, racism and patriarchy rise and corporate control expands. What can be done? We Choose to Speak features a collection of essays by writer and organizer Max Wilbert exploring these topics and their solutions.

by Max Wilbert / Deep Green Resistance

The United States is a military empire that was built and is maintained by organized violence.

The origins of this country lie with the military conquest and either destruction or forced resettlement of indigenous people. Today, the modern American lifestyle is maintained, as Thomas Friedman (someone with whom I agree on very little) writes, by the “hidden fist” of the military.

“McDonalds cannot flourish without MacDonald Douglass,” Friedman wrote. “And the hidden fist that keeps the world safe for Silicon Valley’s technologies to flourish is called the US Army, Air Force, Navy, and Marine Corps.”

I am reminded of this fact every August. August brings Seafair to Seattle, and with Seafair comes the Blue Angels, a Navy/Marines squadron of F/A-18 fighter bombers that travels the US each year, entertaining the public for an annual cost of $37 million.

As these jet aircraft roar overhead, I cover my ears and wince at the spectacle of widespread public adulation. These war machines are worshipped. Earlier today, I watched a five-year-old boy cheering and yelling “yee-haw” as the fighter formation shot overhead. Out on Lake Washington, a toxified remnant of what was once an ecological paradise, other Seattle residents on boats and rafts raised their hands towards the jets in supplication. As five aircraft passed directly overhead, I watched one white American man hold a can of beer above his face and pour the liquid directly down his throat.

For thousands of people, the roar of an F/A-18 fighter bomber is the last sound they ever heard. The F/A-18 aircraft played a major role during the 2001 US invasion of Afghanistan and the 2003 US invasion of Iraq. Between these two conflicts, more than a million civilians were killed—many of them in bombings. The same jet continues to be used in Syria, in Yemen, in Somalia, and elsewhere all around the world.

The US military uses its power to promote and protect a certain vision of prosperity and societal development. In 1948, George Kennan, then the Director of Policy Planning for the US State Department, wrote in Memo PPS23 that “[The United States has] about 50 percent of the world’s wealth but only 6.3 percent of its population… Our real task in the coming period is to devise a pattern of relationships, which will permit us to maintain this position of disparity…”

In the 70 years since Kennan wrote that memo, that “pattern of relationships” has been successfully devised and maintained. The US military is the largest in the world by expenditure, with more than $600 billion in annual funding and more than 2 million personnel (including reservists).

The true costs of this are incalculable. They range from the ecocidal, genocidal destruction of Vietnam and Cambodia to the horrors of Gulf War Syndrome to the toxic remnants of weapons manufactories in cities across the country. In Guatemala and El Salvador, the legacy of US-sponsored right-wing terrorism still echoes through a shattered society. In Nevada and across oceania, indigenous lands remain irradiated from decades of weapons testing, and nuclear waste which continues to leak into groundwater and seep into soils will remain deadly for hundreds of thousands of years.

As Friedman reminds us, military might and corporate power remain inextricably linked in creating consumer culture. We are reminded of this at Seafair, where sponsors include 76, Boeing, Starbucks, Amazon, Uber, Oracle, Microsoft, LG, Samsung, CapitalOne, and many others.

Each F/A-18 costs about $29 million, and is produced by Boeing, the second-largest weapons manufacturer in the world, one of the 100 largest companies in the world, with just under $100 billion in annual revenue. Seattle still fawns over Boeing, which brought so much wealth to this region, just as it now fawns over Amazon and Microsoft. Their digital products colonize our minds, just as Boeing’s weapons help control territory.

Seafair also includes public tours of two warships, the USS Momsen (an Arleigh Burke-class guided missile destroyer equipped with 96 missiles) and the USS Somerset (a $2 billion troop transport ship equipped to carry 600+ soldiers and vehicles into combat zones). As thousands of people file through the ships, exclaiming over the might of the empire, we must remember that the US military is also the single largest polluter in the world, responsible for more greenhouse gas emissions than any other single entity.

Some people think that because I critique the US military and US empire, I must support this nation’s opponents. This logic is absurd. The Taliban and ISIS, the Nazi regime, the Stalinist Soviet state; US enemies have included countless reprehensible regimes. Repression must be fought, but this nation always has ulterior motives hidden behind humanitarian rhetoric. In the games of empire, the people and the planet are being sacrificed.

Our enemy is empire itself.

But despite my opposition to imperialist wars, I’m not a pacifist. A friend of mine, Vince Emanuele, served in the Marine Corps during the invasion of Iraq. He became disillusioned with the military, left the service, and became a leading voice of dissent against the war.

In the wake of one of the latest calls for mass regulation of firearms, he wrote:

“Sure, I’ll give up my guns, as soon as the NSA, CIA, FBI, DEA, ATF, police, military, and right-wing militias disarm themselves. Until then, my liberal, progressive, and “leftist” friends can eat tofu, watch MSNBC/Bill Moyers, and go fly a kite. Your collective commentary is akin to the “privileged white-classes” that you so often rail against.

Believe me, I’d love to live in a world without guns, violence, and so forth. But, I’m not naive enough to believe these things are going away anytime soon. This nation is extremely sick, twisted, undereducated, and plagued with an exploding prison population, growing inequality, and ever-expanding military empire and surveillance state. We should be expecting much more violence in the future, not less.

Clearly, within the context of rapid climate change, growing social ills, and a collapsing economic system, giving up your weaponry seems a bit insane and utterly naive. Interestingly, it’s the liberals and progressives, who’ve largely grown up in cosmopolitan/suburban areas, who sound like the spoiled little American brats we so often challenge.

If you’ve never carried, fired, cleaned, taken apart, or counted on a weapon to save your life, I suggest taking a more humble approach to this issue. Conversely, if you’ve only fired your daddy’s handgun, shotgun, and rifle in the backyard, I suggest scaling back the glorification of weapons and violence.

If I thought killing and warfare were fun, I would have stayed in the military–but I didn’t. If I though weapons were unnecessary, I wouldn’t own any–but I do.”

Perhaps it’s time for a people’s army—a left-wing guerrilla force, grounded in feminism, anti-racism, and respect for human rights—to fight back against the imperialist empire, to bring the fight home and make CEOs and corporations and right-wing neofascists afraid again.

Interested readers can check out this and other radical books at BabylonApocalypse.org

** *** ***** ******* *********** *************

Activist Guide to Security: Defeating Geolocation and Tracking

[Link] by Max Wilbert / November 29th, 2018

We live in a surveillance state. As the Edward Snowden leaks and subsequent reporting has shown, government and private military corporations regularly target political dissidents for intelligence gathering. This information is used to undermine social movements, foment internecine conflict, discover weaknesses, and to get individuals thrown in jail for their justified resistance work.

As the idea of the panopticon describes, surveillance creates a culture of self-censorship. There aren’t enough people at security agencies to monitor everything, all of the time. Almost all of the data that is collected is never read or analyzed. In general, specific targeting of an individual for surveillance is the biggest threat. However, because people don’t understand the surveillance and how to defeat it, they subconsciously stop themselves from even considering serious resistance. In this way, they become self-defeating.

Surveillance functions primarily by creating a culture of paranoia through which the people begin to police themselves.

This is a guide to avoiding some of the most dangerous forms of location tracking. This information is meant to demystify tracking so that you can take easy, practical steps to mitigating the worst impacts. Activists and revolutionaries of all sorts may find this information helpful and should incorporate these practices into daily life, whether or not you are involved in any illegal action, as part of security culture.

About modern surveillance

We are likely all familiar with the extent of surveillance conducted by the NSA in the United States and other agencies such as the GCHQ in Britain. These organizations engage in mass data collection on a global scale, recording and storing every cell phone call, text message, email, social media comment, and other form of data they can get their hands on.

Our best defenses against this surveillance network are encryption, face-to-face networking and communication, and building legitimate communities of trust based on robust security culture.

Capitalism has expanded surveillance to every person. Data collection has long been big business, but the internet and smartphones have created a bonanza in data collection. Corporations regularly collect, share, buy, and sell information including your:

Home address

Workplace

Location tracking data

Businesses you frequent

Political affiliations

Hobbies

Family and relationship connections

Purchasing habits

And much more

Much of this information is available on the open marketplace. For example, it was recently reported that many police departments are purchasing location records from cell phones companies such as Verizon that show a record of every tower a given cell phone has connected to. By purchasing this information from a corporation, this allows police to bypass the need to receive a warrant—just one example of how corporations and the state collaborate to protect capitalism and the status quo.

Forms of location tracking

There are two main types of location tracking we are going to look at in this article: cell tower tracking and GPS geolocation.

Cell phone tracking

Whenever a cell phone connects to a cell tower, a unique device ID number is transmitted to the service provider. For most people, their cell phone is connected directly to their identity because they pay a monthly fee, signed up using their real name, and so on. Therefore, any time you connect to a cell network, your location is logged.

The more cell towers are located in your area, the more exact your location may be pinpointed. This same form of tracking applies to smartphones, older cell phones, as well as tablets, computers, cars, and other devices that connect to cell networks. This data can be aggregated over time to form a detailed picture of your movements and connections.

GPS tracking

Many handheld GPS units are “receiver only” units, meaning they can only tell you where you are located. They don’t actually send data to GPS satellites, they only passively receive data. However, this is not the case with all GPS devices.

For example, essentially every new car that is sold today includes built-in GPS geolocation beacons. These are designed to help you recover a stolen car, or call for roadside assistance in remote areas.

Additionally, many smartphones track GPS location data and store that information. The next time you connect to a WiFi or cell phone network, that data is uploaded and shared to external services. GPS tracking can easily reveal your exact location to within 10 feet.

Defeating location tracking

So how do we stop these forms of location tracking from being effective? There are five main techniques we can use, all of which are simple and low-tech.

(a) Don’t carry a cell phone. It’s almost a blasphemy in our modern world, but this is the safest way for activists and revolutionaries to operate.

(b) Use “burner” phones. A “burner” is a prepaid cell phone that can be purchased using cash at big-box stores like Wal-Mart. In the USA, only two phones may be purchased per person, per day. If it is bought with cash and activated using the Tor network, a burner phone cannot typically be linked to your identity.

WORD OF CAUTION: rumor has it that the NSA and other agencies run sophisticated voice identification algorithms via their mass surveillance networks. If you are in a maximum-security situation, you may need to use a voice scrambler, only use text messages, or take other precautions. Also note that burners are meant to be used for a short period of time, then discarded.

(c) Remove the cell phone battery. Cell phones cannot track your location if they are powered off. However, it is believed that spy agencies have the technical capability to remotely turn on cell phones for use as surveillance devices. To defeat this, remove the battery completely. This is only possible with some phones, which brings us to method number four.

(d) Use a faraday bag. A faraday bag (sometimes called a “signal blocking bag”) is made of special materials that block radio waves (WiFi, cell networks, NFC, and Bluetooth all are radio waves). These bags can be purchased for less than $50, and will block all signals while your phones or devices are inside. These bags are often used by cops, for example, to prevent remote wiping of devices in evidence storage. If you are ever arrested with digital devices, you may notice the cops place them in faraday bags.

WORD OF CAUTION: Modern smartphones include multiple sensors including a compass and accelerometer. There have been proof-of-concept experiments showing that a smartphone inside a faraday bag can still track your location by using these sensors in a form of dead reckoning. In high-security situations where you may be targeted individually, this is a real consideration.

(e) Don’t buy any modern car that includes GPS. Note that almost all rental cars contain GPS tracking devices as well. Any time a person is traveling for a serious action, it is safest to use an older vehicle. If you may be under surveillance, it is best to use a vehicle that is not directly connected to you or to the movement.

Conclusion

There are caveats here. I am not a technical expert, I am merely a revolutionary who is highly concerned about mass surveillance. Methods of location tracking are always evolving. And there are many methods.

This article doesn’t, for example, discuss the simple method of placing a GPS tracker on a car. These small magnetic devices can be purchased on the private market and attached to the bottom of any vehicle.

However, these basic principles can be applied across a wide range of scenarios, with some modification, to greatly increase your privacy and security.

Good luck! 

** *** ***** ******* *********** *************

DGR France Organizing Update

[Link] From our Deep Green Resistance comrades in France:

“They talked about DGR twice on Swiss radio RTS. Big station. RTS radio interviewed two members about direct action. We were invited to speak at a big conference festival in Lyon. I talked about how unsustainable this industrial civilization is and how we need more militant and strategic action (50% teenagers 50% adults). Speaking in front of 300+ people was a first for me but it went well. A little chaotic because nobody in the panel had the same analysis.

The DGR book is being published in two volumes. Chapter 1 to 6 is coming out on November 30th. With this launch of the book we will organize membership and local chapters here in France… People are talking a lot about DGR among militant circles. Sociology students want to study us lol.”

** *** ***** ******* *********** *************

Amnesia & Lack of Accountability Reign as Wall Street Celebrates Halliburton’s 100-year anniversary

[Link] by Lauren Smith, guest author

When it comes to the ruling elite’s corporate plunder and crimes against humanity, the U.S. national memory’s short and no one, not even its political henchmen, assume blame or suffer real consequences: take Halliburton and former chief executive and U.S. Vice President Dick Cheney for example.  Not only did Cheney plan and justify the invasion, occupation and pilferage of Iraq’s oil, gold bars and national museum treasures under treasonous false pretenses, but its subsidiary, Kellogg Brown & Root (KBR Inc.), overcharged the U.S. taxpayer to a tune of more than $2 billion due to collusion engendered by sole source contracting methods and shoddy accounting procedures. It’s even forgotten that Cheney received a $34 million payout from Halliburton when he joined the Vice President ticket in 2000, in advance of his unscrupulous maneuvers, according to news commentator, Chris Matthews; because on November 5th 2018, in celebration of its 100-year anniversary, its chief executives rang the New York Stock Exchange’s (NYSE) opening bell.

Sadly, as a nation, the U.S. doesn’t recall Cheney’s lies, or his role in planning the contemptible “Shock and Awe” saturation bombing campaign that destroyed a sovereign nation, which posed no threat to the United States, and left the world’s cradle of civilization in ruins. Conveniently, it doesn’t recall the over 500,000 deaths from war related causes, as reported by the Huffington Post in its 2017 updated article; nor does it recall that obliterating Iraq’s government created a sociopolitical vacuum that enabled the exponential growth of the CIA’s unique brand of Islamofascism and its resulting terrorism, which has culminated in war-torn Syria and Yemen.

Iraq’s only “crime” against the United States, if you want to call it that, was being hogtied by Washington’s sanctions and embargo against it – in what can only be called a Catch 22 situation.  Iraq couldn’t do business with U.S. corporations not because Saddam Hussein was unwilling to, but because the U.S. government effectively barred Iraq from doing so.  This Catch 22 situation is presently being repeated in Venezuela and Iran in advance of its planned invasion and occupation.

Then there is the cost of war itself: according to The Costs of War project at the Watson Institute for International and Public Affairs at Brown University, “The wars in Afghanistan, Pakistan, and Iraq (the war in Pakistan refers to U.S. counterterrorism efforts there, such as drone strikes and other efforts against al Qaeda) cost $4.4 trillion. Included in the cost are: direct Congressional war appropriations; war-related increases to the Pentagon base budget; veterans care and disability; increases in the homeland security budget; interest payments on direct war borrowing; foreign assistance spending; and estimated future obligations for veterans’ care. By 2053, interest payments on the debt alone could reach over $7 trillion.”

Keep in mind that the U.S. taxpayer directly subsidizes the profits of the military industrial complex, and oil & gas industries.  Yet, no U.S. protests against Halliburton are found in the media later than 2007.  And, there are no organized disinvestment campaigns of record.

So Wall Street celebrates Halliburton’s 100-year anniversary with a clear conscience, because no one has graffitied its large four column wide sign or is disinvested from its stock. The nation only recalls, according to IBTimes, in their 2013 article on Iraq war contracts, that Halliburton’s subsidiary, KBR, had the most:  KBR’s war contracts totaled $39.5 billion in just a decade.

Other than the Kuala Lumpur War Crimes Commission, which found Cheney and President Bush et al guilty of war crimes in absentia for the illegal invasion of Iraq, there remains no lasting acknowledgement in the U.S. consciousness of Cheney’s evil doings.  Cheney had recent book deals and continues to ramble on with speaking engagements.  He was scheduled by Cornell University to issue a keynote address as recent as May 2018.  In short, the ruling elite protects those engaged in their dirty work until they prove unnecessary.  In this regard, consider the fact that Saddam Hussein was a former CIA asset and a good corporate customer – as the weapons of mass destruction (WMD), he once possessed, were sold to him by the U.S. and Britain.  However, according to the former United Nations (UN) chief weapon inspector, Scott Ritter, the UN destroyed Iraq’s stockpiles after the Persian Gulf War (1990-1991) – well before the 2003 invasion.  This report was ignored because it contradicted the prevailing narrative that justified the invasion, occupation and looting of Iraq.

Just as the ruling elite engineered Saddam Hussein rise to power when he was useful, they ensured Cheney’s political ascent, and the success of his campaign against Iraq.  To illustrate the persuasive power of the oil & gas industry in politics, note that according to Open Secrets.org, oil & gas lobbyists spent over $175M in 2009 (Obama’s first year in office). Of that amount, ExxonMobil spent the most at $27.4M and Chevron Corp., in second place, spent $20.8M. For the record, ExxonMobil and Chevron are successors of Rockefeller’s Standard Oil Company.  Prior to President Obama & Vice President Biden, the Oil & Gas Industry lobbyists spent approximately half that amount at $86.5M in 2007.  Thus, Bush & Cheney represented a 50% savings for oil & gas lobbyists.

When seeking to “out” the elite, keep in mind that the Rockefeller clan describe themselves “as ExxonMobil’s longest continuous shareholders.”  In Iraq, ExxonMobil has a 60% share of a $50 billion market contract developing the 9-billion-barrels southern West Qurna Phase I field, and ExxonMobil is expanding its oil & gas holdings into the semiautonomous Kurdish region in the country’s north.

Within this context, the enemy is not a corporate office, an oilrig, pipeline or refinery; it’s the ruling elite that own and control the means of production.  If people of conscience don’t hold them accountable for their crimes, they will continue to commit them in countries such as Venezuela and Iran, which are presently locked in their sights.  While henchmen change, the ruling elite remains.  Why should the U.S. allow its military and secret service to be pimped out as corporate stooges and glorified security guards?

Imperialism is insatiable and fascism expedient. The time to hold the ruling elite accountable is now before another invasion and occupation is executed against a fake enemy that just so happens to coincidentally have a large desirable oil reserve.  Let’s follow Iceland’s lead and seek the prosecution of white-collar criminals that hide behind a facade of corporate stock holdings now, before its too late and they strike again in Venezuela and Iran.

So for Halliburton’s 100-year anniversary wish, let’s wish its stock tanks and that its guilty are remembered, held accountable, and that justice is ultimately served.

Lauren Smith has a BA in Politics, Economics and Society from SUNY at Old Westbury and an MPA in International Development Administration from New York University.  Her historical fiction novel based on Nicaragua’s 1979 revolution is due out in 2019.

** *** ***** ******* *********** *************

Book Excerpt: Underground Tactics

[Story] Editor’s note: The following is from the chapter “Tactics and Targets” of the book Deep Green Resistance: A Strategy to Save the  Planet. This book is now available for free online.

by Aric McBay

Some tactics can be carried out underground—like general liberation organizing and propaganda—but are more effective aboveground. Where open speech is dangerous, these types of tactics may move underground to adapt to circumstances. The African National Congress, in its struggle for basic human rights, should have been allowed to work aboveground, but that simply wasn’t possible in repressive apartheid South Africa.

And then there are tactics that are only appropriate for the underground, obligate underground operations that depend on secrecy and security. Escape lines and safehouses for persecuted persons and resistance fugitives are example of those operations. There’s a reason it’s called the “underground” railroad—it’s not transferable to the aboveground, because the entire operation is completely dependent on secrecy. Clandestine intelligence gathering is another case; the French Resistance didn’t gather enemy secrets by walking up to the nearest SS office and asking for a list of their troop deployments.

Some tactics are almost always limited to the underground:

  • Clandestine intelligence
  • Escape
  • Sabotage and attacks on materiel
  • Attacks on troops
  • Intimidation
  • Assassination

As operational categories, intelligence and escape are pretty clear, and few people looking at historical struggles will deny the importance of gathering information or aiding people to escape persecution. Of course, some abolitionists in the antebellum US didn’t support the Underground Railroad. And many Jewish authorities tried to make German Jews cooperate with registration and population control measures. In hindsight, it’s clear to us that these were huge strategic and moral mistakes, but at the time it may only have been clear to the particularly perceptive and farsighted.

Sabotage and attacks on materiel are overlapping tactics. Oftentimes, sabotage is more subtle; for example, machinery may be disabled without being recognized as sabotage. Attacks on materiel are often more overt efforts to destroy and disable the adversary’s equipment and supplies. In any case, they form an inclusive continuum, with sabotage on the more clandestine end of the scale.

It’s true that harm can be caused through sabotage, and that sabotage can be a form of violence. But allowing a machine to operate can also be more violent than sabotaging it. Think of a drift net. How many living creatures does a drift net kill as it passes through the ocean, regardless of whether it’s being used for fishing or not? Destroying a drift net—or sabotaging a boat so that a drift net cannot be deployed—would save countless lives. Sabotaging a drift net is clearly a nonviolent act. However, you could argue conversely that not sabotaging a drift net (provided you had the means and opportunity) is a profoundly violent act—indeed, violent not just for individual creatures, but violent on a massive, ecological scale. The drift net is an obvious example, but we could make a similar (if longer and more roundabout) argument for most any industrial machinery.

You’re opposed to violence? So where’s your monkey wrench?

Sabotage is not categorically violent, but the next few underground categories may involve violence on the part of resisters. Attacks on troops, intimidation, assassination, and the like have been used to great effect by a great many resistance movements in history. From the assassination of SS officers by escaping concentration camp inmates to the killing of slave owners by revolting slaves to the assassination of British torturers by Michael Collins’s Twelve Apostles, the selective use of violence has been essential for victory in a great many resistance and liberation struggles.

Attacks on troops are common where a politically conscious population lives under overt military occupation. In these situations, there is often little distinction between uniformed militaries, police, and government paramilitaries (like the Black and Tans or the miliciens). The violence may be secondary. Sometimes the resistance members are trying to capture equipment, documents, or intelligence; how many guerrillas have gotten started by killing occupying soldiers to get guns? Sometimes the attack is intended to force the enemy to increase its defensive garrisons or pull back to more defended positions and abandon remote or outlying areas. Sometimes the point is to demonstrate the strength or capabilities of the resistance to the population and the occupier. Sometimes the point is actually to kill enemy soldiers and deplete the occupying force. Sometimes the troops are just sentries or guards, and the primary target is an enemy building or facility.

Of course, for these attacks to happen successfully, they must follow the basic rules of asymmetric conflict and general good strategy. When raiding police stations for guns, the IRA chose remote, poorly guarded sites. Guerrillas like to go after locations with only one or two sentries, and any attack on those small sites forces the occupier to make tough choices: abandon an outpost because it can’t be adequately defended or increase security by doubling the number of guards. Either benefits the resistance and saps the resources of the occupier.

And although in industrial conflicts it’s often true that destroying materiel and disrupting logistics can be very effective, that’s sometimes not enough. Take American involvement in the Vietnam War. The American cost in terms of materiel was enormous—in modern dollars, the war cost close to $600 billion. But it wasn’t the cost of replacing helicopters or fueling convoys that turned US sentiment against the war. It was the growing stream of American bodies being flown home in coffins.

There’s a world of difference—socially, organizationally, psychologically—between fighting the occupation of a foreign government and the occupation of a domestic one. There’s something about the psychology of resistance that makes it easier for people to unite against a foreign enemy. Most people make no distinction between the people living in their country and the government of that country, which is why the news will say “America pulls out of climate talks” when they are talking about the US government. This psychology is why millions of Vietnamese people took up arms against the American invasion, but only a handful of Americans took up arms against that invasion (some of them being soldiers who fragged their officers, and some of them being groups like the Weather Underground who went out of their way not to injure the people who were burning Vietnamese peasants alive by the tens of thousands). This psychology explains why some of the patriots who fought in the French Resistance went on to torture people to repress the Algerian Resistance. And it explains why most Germans didn’t even support theoretical resistance against Hitler a decade after the war.

This doesn’t bode well for resistance in the minority world, where the rich and powerful minority live. People in poorer countries may be able to rally against foreign corporations and colonial dictatorships, but those in the center of empire contend with power structures that most people consider natural, familiar, even friendly. But these domestic institutions of power—be they corporate or governmental—are just as foreign, and just as destructive, as an invading army. They may be based in the same geographic region as we are, but they are just as alien as if they were run by robots or little green men.

Intimidation is another tactic related to violence that is usually conducted underground. This tactic is used by the “Gulabi Gang” (also called the Pink Sari Gang) of Uttar Pradesh, a state in India.4 Leader Sampat Pal Devi calls it “a gang for justice.” The Gulabi Gang formed as a response to deeply entrenched and violent patriarchy (especially domestic and sexual violence) and caste-based discrimination. The members use a variety of tactics to fight for women’s rights, but their “vigilante violence” has gained global attention. With over 500 members, they can exert considerable force. They’ve stopped child marriages. They’ve beaten up men who perpetrate domestic violence. The gang forced the police to register crimes against Untouchables by slapping police officers until they complied. They’ve hijacked trucks full of food that were going to be sold for a profit by corrupt officials. Their hundreds of members practice self-defense with the lathi (a traditional Indian stick or staff weapon). It’s no surprise their ranks are growing.

Gulabi Gang

Many of these examples tread the boundary of our aboveground-underground distinction. When struggling against systems of patriarchy that have closely allied themselves with governments and police (which is to say, virtually all systems of patriarchy), women’s groups that have been forced to use violence or the threat of violence may have to operate in a clandestine fashion at least some of the time. At the same time, the effects of their self-defense must be prominent and publicized. Killing a rapist or abuser has the obvious benefit of stopping any future abuses by that individual. But the larger beneficial effect is to intimidate other would-be abusers—to turn the tables and prevent other incidents of rape or abuse by making the consequences for perpetrators known. The Gulabi Gang is so popular and effective in part because they openly defy abuses of male power, so the effect on both men and women is very large. Their aboveground defiance rallies more support than they could by causing abusive men to die in a series of mysterious accidents. The Black Panthers were similarly popular because they publically defied the violent oppression meted out by police on a daily basis. And by openly bearing arms, they were able to intimidate the police (and other people, like drug dealers) into reducing their abuses.

There are limits to the use of intimidation on those in power. The most powerful people are the most physically isolated—they might have bodyguards or live in gated houses. They have far more coercive force at their fingertips than any resistance movement. For that reason, resistance groups have historically used intimidation primarily on low-level functionaries and collaborators who give information to those in power when asked or who cooperate with them in a more limited way.

It’s important to acknowledge the distinction between intimidation and terrorism. Terrorism consists of violent attacks on civilians. Resistance intimidation directly targets those responsible for oppressive and exploitative acts and power structures, and lets those people know that there are consequences for their actions. The reason it gets people so riled up is because it involves violence (or the threat of violence) going up the hierarchy. But resistance intimidation is ultimately, of course, an attempt to reduce violence. Groups like the Gulabi Gang beat abusive men instead of just killing them. There’s a reasonable escalation that gives men a chance to stop their wrongdoing and also makes the consequences for further wrongdoing clear. Rape and domestic abuse are terrorism; they’re senseless and unprovoked acts of violence against unarmed civilians, designed to threaten and terrorize women (and men) into compliance. The intimidation of rapists or domestic abusers is one tactic that can be used to stop their violence while employing the minimum amount of violence possible.

No resistance movement wants to engage in needless cycles of violence and retribution with those in power. But a refusal to employ violent tactics when they are appropriate will very likely lead to more violence. Many abolitionists did not support John Brown because they considered his plan for a defensive liberation struggle to be too violent—but Brown’s failure led inevitably to a lengthy and gruesome Civil War (as well as continued years of bloody slavery), a consequence that was orders of magnitude more violent than Brown’s intended plan.

This leads us to the last major underground tactic: assassination.

In talking about assassination (or any attack on humans) in the context of resistance, two key questions must be asked. First, is the act strategically beneficial, that is, would assassination further the strategy of the group? Second, is the act morally just, given the person in question? (The issue of justice is necessarily particular to the target; it’s assumed that the broader strategy incorporates aims to increase justice.)

As is shown on my two-by-two grid of all combinations, an assassination may be strategic and just, it may be strategic and unjust, it may be unstrategic but just, or it may be both unstrategic and unjust. Obviously, any action in the last category would be out of the question. Any action in the strategic and just category could be a good bet for an armed resistance movement. The other two categories are where things get complex.

Figure 13-3

Hitler exemplified a number of different strategy vs. justice combinations at different points in time. It’s a common moral quandary to ask whether it would be a good idea to go back in time and kill Hitler as a child, provided time travel were possible. There’s a good bet that this would have averted World War II and the Holocaust, which would have been a good thing, so put a check mark in the “strategic” column. The problem is that most people would consider it unjust to murder an innocent child who had yet to commit any crimes, so it would be difficult to call that action just in the immediate sense.

Once Hitler had risen to power in the late 1930s, though, his aim was clear, as he had already been whipping up hate and expanding his control of Nazi Germany. At that point, it would have been both strategic and just to assassinate him. Indeed, elements in the Wehrmacht (army) and the Abwehr (intelligence) considered it, because they knew what Hitler was planning to do. Unfortunately, they were indecisive, and did not commit to the plan. Hitler soon began invading Germany’s neighbors, and as his popularity soared, the assassination plan was shelved. It was years before inside elements would actually stage an assassination attempt.

Figure 13-4

That famous attempt took place—and failed—on July 20, 1944.5What’s interesting is that the Allies were also considering an attempt on Hitler’s life, which they called Operation Foxley. They knew that Hitler routinely went on walks alone in a remote area, and devised a plan to parachute in two operatives dressed as German officers, one of them a sniper, who would lay in wait and assassinate Hitler when he walked by. The plan was never enacted because of internal controversy. Many in the SOE and British government believed that Hitler was a poor strategist, a maniac whose overreach would be his downfall. If he were assassinated, they believed, his replacement (likely Himmler) would be a more competent leader, and this would draw out the war and increase Allied losses. In the opinion of the Allies it was unquestionably just to kill Hitler, but no longer strategically beneficial.

There is no shortage of situations where assassination would have been just, but of questionable strategic value. Resistance groups pondering assassination have many questions to ask themselves in deciding whether they are being strategic or not. What is the value of this potential target to the enemy? Is this an exceptional person or does his or her influence come from his or her role in the organization? Who would replace this person, and would that person be better or worse for the struggle? Will it make any difference on an organizational scale or is the potential target simply an interchangeable cog? Uniquely valuable individuals make uniquely valuable targets for assassination by resistance groups.

Of course, in a military context (and this overlaps with attacks on troops), snipers routinely target officers over enlisted soldiers. In theory, officers or enlisted soldiers are standardized and replaceable, but, in practice, officers constitute more valuable targets. There’s a difference between theoretical and practical equivalence; there might be other officers to replace an assassinated one, but the replacement might not arrive in a timely manner nor would he have the experience of his predecessor (experience being a key reason that Michael Collins assassinated intelligence officers). That said, snipers don’t just target officers. Snipers target any enemy soldiers available, because war is essentially about destroying the other side’s ability to wage war.

The benefits must also outweigh costs or side effects. Resistance members may be captured or killed in the attempt. Assassination also provokes a major response—and major reprisals—because it is a direct attack on those in power. When SS boss Reinhard Heydrich (“the butcher of Prague”) was assassinated in 1942, the Nazis massacred more than 1,000 Czech people in response. In Canada, martial law (via the War Measures Act) has only ever been declared three times—during WWI and WWII, and again after the assassination of the Quebec Vice Premier of Quebec by the Front de Libération du Québec. Remember, aboveground allies may bear the brunt of reprisals for assassinations, and those reprisals can range from martial law and police crackdowns to mass arrests or even executions.

There’s an important distinction to be made between assassination as an ideological tactic versus as a military tactic. As a military tactic, employed by countless snipers in the history of war, assassination decisively weakens the adversary by killing people with important experience or talents, weakening the entire organization. Assassination as an ideological tactic—attacking or killing prominent figures because of ideological disagreements—almost always goes sour, and quickly. There are few more effective ways to create martyrs and trigger cycles of violence without actually accomplishing anything decisive. The assassination of Michael Collins, for example, by his former allies led only to bloody civil war.

DECISIVE OPERATIONS UNDERGROUND

Individuals working underground focus mostly on small-scale acts of sabotage and subversion that make the most of their skill and opportunity. Because they lack escape networks, and because they must be opportunistic, it’s ideal for their actions to be what French resisters called insaisissable–untraceable or appearing like an accident—unless the nature of the action requires otherwise.

Individual saboteurs are more effective with some informal coordination—if, for example, a general day of action has been called. It also helps if the individuals seize an opportunity by springing into action when those in power are already off balance or under attack, like the two teenaged French girls who sabotaged trains carrying German tanks after D-Day, thus hampering the German ability to respond to the Allied landing.

One individual resister who attempted truly decisive action was Georg Elser, a German-born carpenter who opposed Hitler from the beginning. When Hitler started the World War II in 1939, Elser resolved to assassinate Hitler. He spent hours every night secretly hollowing out a hidden cavity in the beer hall where Hitler spoke each year on the anniversary of his failed coup. Elser used knowledge he learned from working at a watch factory to build a timer, and planted a bomb in the hidden cavity. The bomb went off on time, but by chance Hilter left early and survived. When Elser was captured, the Gestapo tortured him for information, refusing to believe that a single tradesperson with a grade-school education could come so close to killing Hitler without help. But Elser, indeed, worked entirely alone.

Underground networks can accomplish decisive operations that require greater coordination, numbers, and geographic scope. This is crucial. Large-scale coordination can turn even minor tactics—like simple sabotage—into dramatically decisive events. Underground saboteurs from the French Resistance to the ANC relied on simple techniques, homemade tools, and “appropriate technology.” With synchronization between even a handful of groups, these underground networks can make an entire economy grind to a halt.

The change is more than quantitative, it’s qualitative. A massively coordinated set of actions is fundamentally different from an uncoordinated set of the same actions. Complex systems respond in a nonlinear fashion. They can adapt and maintain equilibrium in the face of small insults, minor disruptions. But beyond a certain point, increasing attacks undermine the entire system, causing widespread failure or collapse.

Because of this, coordination is perhaps the most compelling argument for underground networks over mere isolated cells. I’ll discuss coordinated actions in more detail in the next chapter: Decisive Ecological Warfare.

SUSTAINING OPERATIONS UNDERGROUND

Since individuals working underground are pretty much alone, they have very few options for sustaining operations. They may potentially recruit or train others to form an underground cell. Or they may try to make contact with other people or groups (either underground or aboveground) to work as an auxiliary of some kind, such as an intelligence source, especially if they are able to pass on information from inside a government or corporate bureaucracy. But making this connection is often very challenging.

Individual escape and evasion may also be a decisive or sustaining action, at least on a small scale. Antebellum American slavery offers some examples. In a discussion of slave revolts, historian Deborah Gray White explains, “[I]ndividual resistance did not overthrow slavery, but it might have encouraged masters to make perpetual servitude more tolerable and lasting. Still, for many African Americans, individual rebellions against the authority of slaveholders fulfilled much the same function as did the slave family, Christianity, and folk religion: it created the psychic space that enabled Black people to survive.”

Historian John Michael Vlach observes: “Southern plantations actually served as the training grounds for those most inclined to seek their freedom.” Slaves would often escape for short periods of time as a temporary respite from compelled labor before returning to plantations, a practice often tolerated by owners. These escapes provided opportunities to build a camp or even steal and stock up on provisions for another escape. Sometimes slaves would use temporary escapes as attempts to compel better behavior from plantation owners.7 In any case, these escapes and minor thefts helped to build a culture of resistance by challenging the omnipotence of slave owners and reclaiming some small measure of autonomy and freedom.

Individuals have some ability to assert power, but recruitment is key in underground sustaining operations. A single cell can gather or steal equipment and supplies for itself, but it can’t participate in wider sustaining operations unless it forms a network by recruiting organizationally, training new members and auxiliaries, and extending into new cells. One underground cell is all you need to create an entire network. Creating the first cell—finding those first few trusted comrades, developing communications and signals—is the hardest part, because other cells can be founded on the same template, and the members of the existing cell can be used to recruit, screen, and train new members.

Even though it’s inherently difficult for an underground group to coordinate with other distinct underground groups, it is possible for an underground cell to offer supporting operations to aboveground campaigns. It was an underground group—the Citizen’s Commission to Investigate the FBI—that exposed COINTELPRO, and allowed many aboveground groups to understand and counteract the FBI’s covert attacks on them. And the judicious use of sabotage could buy valuable time for aboveground groups to mobilize in a given campaign.

There are clearly campaigns in which aboveground groups have no desire for help from the underground, in which case it’s best for the underground to focus on other projects. But the two can work together on the same strategy without direct coordination. If a popular aboveground campaign against a big-box store or unwanted new industrial site fails because of corrupt politicians, an underground group can always pick up the slack and damage or destroy the facility under construction. Sometimes people argue that there’s no point in sabotaging anything, because those in power will just build it again. But there may come a day when those in power start to say “there’s no point in building it—they’ll just burn it down again.”

Underground cells may also run a safehouse or safehouses for themselves and allies. Single cells can’t run true underground railroads, but even single safehouses are valuable in dealing with repression or persecution. A key challenge in underground railroads and escape lines is that the escapees have to make contact with underground helpers without exposing themselves to those in power. Larger, more “formalized” underground networks have specialized methods and personnel for this, but a single cell running a safehouse may not. If an underground cell is conscientious, its members will be the only ones aware that the safehouse exists at all, which puts the burden on them to contact someone who requires refuge.

Mass persecution and repression has happened enough times in history to provide a wealth of examples where this would be appropriate. The internment of Japanese Canadians during World War II is quite well-known. Less well-known is the internment of hundreds of leftist radicals and labor activists starting in 1940. Leading activists associated with certain other ethnic organizations (especially Ukrainian), the labor movement, and the Communist party were arrested and sent to isolated work camps in various locations around Canada. A few managed to go into hiding, at least temporarily, but the vast majority were captured and sent to the camps, where a number of them died.8 In a situation like that, an underground cell could offer shelter to a persecuted aboveground activist or activists on an invitational basis without having to expose themselves openly.

Many of these operations work in tandem. Resistance networks from the SOE to the ANC have used their escape lines and underground railroads to sneak recruits to training sites in friendly areas and then infiltrated those people back into occupied territory to take up the fight.

Underground networks may be large enough to create “areas of persistence” where they exert a sizeable influence and have developed an underground infrastructure rooted in a culture of resistance. If an underground network reaches a critical mass in a certain area, it may be able to significantly disrupt the command and control systems of those in power, allowing resisters both aboveground and underground a greater amount of latitude in their work.

There are a number of examples of resistance movements successfully creating areas of persistence. The Zapatistas in Mexico exert considerable influence in Chiapas, so much so that they can post signs to that effect. “You are in Zapatista rebel territory” proclaims one typical sign (translated from Spanish). “Here the people give the orders and the government obeys.” The posting also warns against drug and alcohol trafficking or use and against the illegal sale of wood. “No to the destruction of nature.”9 Other Latin American resistance movements, such as the FMLN in El Salvador and the Sandinistas in Nicaragua, created areas of persistence in Latin America in the late twentieth century. Hamas in Palestine and Hezbollah in Lebanon have similarly established large areas of persistence in the Middle East.

SHAPING OPERATIONS UNDERGROUND

Because working underground is dangerous and difficult, effective resisters mostly focus on decisive and sustaining operations that will be worth their while. That said, there are still some shaping operations for the underground.

This includes general counterintelligence and security work. Ferreting out and removing informers and infiltrators is a key step in allowing resistance organizations of every type to grow and resistance strategies to succeed. Neither the ANC nor the IRA were able to win until they could deal effectively with such people.

Underground cells can also carry out some specialized propaganda operations. For reasons already discussed, propaganda in general is best carried out by aboveground groups, but there are exceptions. In particularly repressive regimes, basic propaganda and education projects must move underground to continue to function and protect identities. Underground newspapers and forms of pirate radio are two examples. Entire, vast underground networks have been built on this principle. In Soviet Russia, samizdat was the secret copying of and distribution of illegal or censored texts. A person who received a piece of illegal literature—say, Vaclav Havel’s Power of the Powerless—was expected to make more copies and pass them on. In a pre–personal computer age, in a country where copy machines and printing presses were under state control, this often meant laboriously copying books by hand or typewriter.

Underground groups may also want to carry out certain high-profile or spectacular “demonstration” actions to demonstrate that underground resistance is possible and that it is happening, and to offer a model for a particular tactic or target to be emulated by others. Of course, demonstrative actions may be valuable, but they can also degrade into symbolism for the sake of symbolism. Plenty of underground groups, the Weather Underground included, hoped to use their actions to “ignite a revolution.” But, in general—and especially when “the masses” can’t be reasonably expected to join in the fight—underground groups must get their job done by being as decisive as possible.

Editor’s note: continue reading at Target Selection.

** *** ***** ******* *********** *************

Book Excerpt: Target Selection

[Story] Editor’s note: The following is from the chapter “Tactics and Targets” of the book Deep Green Resistance: A Strategy to Save the  Planet. This book is now available for free online.

by Aric McBay

A good tactic used on a poor target has little effect.

The Field Manual on Guerrilla Warfare identifies four “important factors related to the target which influence its final selection,”10 later expanded to six with the CARVER matrix.13 These criteria are meant specifically for targets to be disrupted or destroyed, not necessarily when choosing potential targets for intelligence gathering or further investigation. The six criteria are as follows:

Criticality. How important is this target to the enemy and to enemy operations? “A target is critical when its destruction or damage will exercise a significant influence upon the enemy’s ability to conduct or support operations. Such targets as bridges, tunnels, ravines, and mountain passes are critical to lines of communication; engines, ties, and POL [petroleum, oil, and lubricant] stores are critical to transportation. Each target is considered in relationship to other elements of the target system.” Resistance movements (and the military) look for bottlenecks when selecting a target. And they make sure to think in big picture terms, rather than just in terms of a specific individual target. What target(s) can be disrupted or destroyed to cause maximum damage to the entire enemy system? Multiple concurrent surprise attacks are ideal for resistance movements, and can cause cascading failures.

Accessibility. How easy is it to get near the target? “Accessibility is measured by the ability of the attacker to infiltrate into the target area. In studying a target for accessibility, security controls around the target area, location of the target, and means of infiltration are considered.” It’s important to make a clear distinction between accessibility and vulnerability. For a resister in Occupied France, a well-guarded fuel depot might be explosively vulnerable, but not very accessible. For resisters in German-occupied Warsaw, the heavy wall surrounding the Warsaw Ghetto might be easily accessible, but not very vulnerable unless they carried powerful explosives. Good intelligence and reconnaissance are key to identifying and bypassing obstacles to access.

Recuperability. How much effort would it take to rebuild or replace the target? “Recuperability is the enemy’s ability to restore a damaged facility to normal operating capacity. It is affected by the enemy capability to repair and replace damaged portions of the target.” Specialized installations, hard-to-find parts, or people with special unique skills are difficult to replace. Targets with very common or mass-produced and stockpiled components would be poorer targets in terms of recuperability. Undermining enemy recuperability can be done with good planning and multiple attacks: SOE saboteurs were trained to target the same important parts on every machine. If they were to sabotage all of the locomotives in a stockyard, they would blow up the same part on each train, thus preventing the engineers from cannibalizing parts from other trains to make a working one.

Vulnerability. How tough is the target? “Vulnerability is a target’s susceptibility to attack by means available to [resistance] forces. Vulnerability is influenced by the nature of the target, i.e., type, size, disposition and composition.” In military terminology, a “soft target” is one that is relatively vulnerable, while a “hard target” is well defended or fortified. A soft target could be a sensitive electrical component, a flammable storage shed, or a person. A hard target might be a roadway, a concrete bunker, or a military installation. Hard targets require more capacity or armament to disable. A battle tank might have lower vulnerability when faced with a resister armed with a Molotov cocktail, but high vulnerability against someone armed with a rocket-propelled grenade.

Effect. Will a successful attack increase the chances of achieving larger goals? What consequences might result, intended and unintended? An attack on a pipeline might result in an oil spill, with collateral damage to life in the immediate vicinity. Escalation of sabotage might result in increased surveillance and repression of the general populace.

Recognizability. How difficult is it to identify the target during the operation, under different conditions of daylight, weather, and season? A brightly lit facility adjacent to a road is easy to locate, even at night, but it may be difficult to pick out a particular oil derrick owned by a particular company amidst acres of wells, or a specific CEO in a crowd of businesspeople.

From this perspective the ideal target would be highly critical (such that damage would cause cascading systems failures), highly vulnerable, very accessible and easy to identify, difficult and time-consuming to repair or replace, and unlikely to cause undesirable side effects. The poorest target would be of low importance for enemy operations but with high risk of negative side effects, hardened, inaccessible and hard to find, and easily replaced. You’ll note that there’s no category for “symbolic value” to the enemy, because the writers of the manual weren’t interested in symbolic targets. They consistently emphasize that successful operations will undermine the morale of the adversary, while increasing morale of the resisters and their supporters. The point is to carry out decisively effective action with the knowledge that such action will have emotional benefits for your side, not to carry out operations that seem emotionally appealing in the hopes that those choices will lead to effective action.

An additional criterion not discussed above would be destructivity. How damaging is the existence of the target to people and other living creatures? A natural gas–burning power plant might be more valuable based on the six criteria, but a coal-fired power plant could be more destructive, making it a higher priority from a practical and symbolic perspective.

It’s rare to find a perfect target. It’s more likely that choosing among targets will require certain trade-offs. A remote enemy installation might be more vulnerable, but it could also be more difficult to access and possibly less important to the adversary. Larger, more critical installations are often better guarded and less vulnerable. Target decisions have to be made in the context of the larger strategy, taking into account tactics and organizational capability.

One of the reasons that the Earth Liberation Front (ELF) has had limited decisive success so far is that its targets have had low criticality and high recuperability. New suburban subdivisions are certainly crimes against ecology, but partially constructed homes are not very important to those in power, and they are relatively replaceable. The effect is primarily symbolic, and it’s hard to find a case in which a construction project has actually been given up because of ELF activity—although many have certainly been made more expensive.

Most often, it seems that resistance targets in North America are chosen on the basis of vulnerability and accessibility, rather than on criticality. It’s easy to walk up to a Walmart window and smash it in the middle of the night or to destroy a Foot Locker storefront during a protest march. Aggressive symbolic attacks do get attention, and if a person’s main indicator of success is a furor on the 10:00 pm news, then igniting the local Burger King is likely to achieve that. But making a decisive impact on systems of power and their basis of support is more difficult to measure. If those in power are clever, they’ll downplay the really damaging actions to make themselves seem invulnerable, but scream bloody murder over a smashed window in order to whip up public opinion. And isn’t that what often happens on the news? If a biotech office is smashed and not a single person injured, the corporate journalists and pundits start pontificating about “violence” and “terrorism.” But if a dozen US soldiers are blown up by insurgents in Iraq, the White House press secretary will calmly repeat over and over that “America” is winning and that these incidents are only minor setbacks.

The Black Liberation Army (BLA) is an example of a group that chose targets in alignment with its goals. The BLA formed as an offshoot (or, some would argue, as a parallel development) of the Black Panther Party. The BLA was not interested in symbolic targets, but in directly targeting those who oppressed people of color. Writes historian Dan Berger: “The BLA’s Program included three components: retaliation against police violence in Black communities; elimination of drugs and drug dealers from Black communities; and helping captured BLA members escape from prison.”11 The BLA essentially believed that aboveground black organizing was doomed because of violent COINTELPRO-style tactics, and that the BPP had become a reformist organization. They argued that “the character of reformism is based on unprincipled class collaboration with our enemy.”12 In part because of their direct personal experience of violent repression at the hands of the state, they did not hesitate to kill white police officers in retaliation for attacks on the black community.

The IRA was also ruthless in their target selection, though they had limited choices in terms of attacking their occupiers. By the time WWII rolled around, resisters in Europe had a wide variety of potential and critical targets for sabotage, such as rail and telegraph lines, and further industrialization has only increased the number of critical mechanical targets, but a century ago, Ireland was hardly mechanized at all. That is why Michael Collins correctly identified British intelligence agents as the most critical and least recuperable targets available. Furthermore, his networks of spies and assassins made those agents—already soft targets—highly accessible. They were a perfect match for all six target selection criteria.

It’s worth noting that these six criteria are not just applicable to targets that are going to be destroyed. The same criteria are used to select “pressure points” on which to exert political force for any strategy of resistance, even one that is explicitly nonviolent. Effective strikes or acts of civil disobedience can exert more political force by disrupting more critical and vulnerable targets—the more accessible, the better.

These criteria for target selection go both ways. Our own resistance movements are targets for those in power, and it’s important to understand our organizations as potential targets. Leaders have often been attacked because they were crucial to the organization. Underground leaders are less accessible, but potentially more vulnerable if they can be isolated from their base of support. And aboveground groups often have better recuperability, because they have a larger pool to draw from and fewer training requirements; recall the waves after waves of civil rights activists willing to be arrested in Birmingham, Alabama.

Anyone who casts their lot with a resistance movement must be prepared for reprisals. Those reprisals will come whether the actionists are aboveground or underground, choosing violence or nonviolence. Many activists, especially from privileged backgrounds, naïvely assume that fighting fair will somehow cause those in power to do the same. Nothing could be further from the truth. The moment that any power structure feels threatened, it will retaliate. It will torture Buddhists and nuns, turn fire hoses on school children, and kill innocent civilians. A brief perusal of Amnesty International’s website will acquaint you with nonviolent protestors around the globe currently being detained and tortured or who have disappeared for simple actions like letter writing or peaceably demonstrating.

This is a reality that privileged people must come to terms with or else any movement risks a rupture when power comes down on actionists. Those retaliations are not anyone’s fault; they are to be expected. Any serious resistance movement should be intellectually and emotionally prepared for the power structure’s response. People are arrested, detained, and killed—often in large numbers—when power strikes back. Those who provide a challenge to power will be faced with consequences, some of them inhumanly cruel. The sooner everyone understands that, the better prepared we all will be to handle it.

Now, having discussed what makes good strategy, how resistance groups organize effectively, and what sort of culture resistance groups need to support them, it is time to take a deep breath. A real deep breath.

This culture is killing the planet. It systematically dispossesses sustainable indigenous cultures. Runaway global warming (and other toxic effects of this culture) could easily lead to billions of human deaths, and indeed the murder of the oceans, and even more, the effective destruction of this planet’s capacity to support life.

The question becomes: what is to be done?

** *** ***** ******* *********** *************

Twitter wants me to shut up and the right wants me to join them; I don’t think I should have to do either

[Link] by Meghan Murphy / Feminist Current

In August, I was locked out of my Twitter account for the first time. I was told that I had “violated [Twitter’s] rules against hateful conduct” and that I had to delete four tweets in order to gain access to my account again. In this case, the tweets in question named Lisa Kreut, a trans-identified male, as the individual who targetedFeminist Current’s ad revenue and led efforts to have Vancouver Rape Relief blacklisted at the 2016 BCFED Convention.

I deleted the tweets in question, then publicly complained on Twitter, saying, “Hi @Twitter, I’m a journalist. Am I no longer permitted to report facts on your platform?” I was promptly locked out of my account again, told I had to delete the tweet in question, and suspended for 12 hours. I appealed the suspension, as it seemed clear to me that my tweets were not “hateful,” but simply stated the truth, but received no response from Twitter.

On November 15th, my account was locked again. This time, I was told I must delete a tweet from October, saying, “Women aren’t men,” and another, asking, “How are transwomen not men? What is the difference between a man and a transwoman?”

After dutifully deleting the tweets in question in order to gain access to my account again, I tweeted, angrily, “This is fucking bullshit, @twitter. I’m not allowed to say that men aren’t women or ask questions about the notion of transgenderism at all anymore? That a multi-billion dollar company is censoring basic facts and silencing people who ask questions about this dogma is insane.” This tweet went viral, racking up 20,000 likes before Twitter locked my account again on Monday morning, demanding I delete it. This time they offered no explanation at all — not even a vague accusation of “hateful conduct.”

To be fair, it’s not that insane. Multi-billion dollar companies are clearly primarily interested in profit, not free speech or women’s rights. But Twitter is a company that represents itself as a platform for communication, for debate, and for sharing ideas, news, and information. While of course, as a private company, Twitter has the right to limit who participates on the platform and what is said, we, the public, have become accustomed to understanding this social media platform as a relatively free space, wherein everyone from politicians, to celebrities, to pornographers, to activists, to students, to anonymous gamers, to feminists, to men’s rights activists may say what they wish.

Despite my disinterest in seeing graphic pornography on Twitter and in being called a “TERF cunt” who should “drink bleach,” I accept that this is something I am likely to be exposed to on Twitter, and choose to use the platform anyway. Cruel and graphic comments are things, for better or for worse, I am accustomed to and that, frankly, don’t bother me much at this point. If you are a public figure, you do just get used to this kind of thing.

What is insane to me, though, is that while Twitter knowingly permits graphic pornography and death threats on the platform (I have reported countless violent threats, the vast majority of which have gone unaddressed), they won’t allow me to state very basic facts, such as “men aren’t women.” This is hardly an abhorrent thing to say, nor should it be considered “hateful” to ask questions about the notion that people can change sex, or ask for explanations about transgender ideology. These are now, like it or not, public debates — debates that are impacting people’s lives, as legislation and policy are being imposed based on gender identity ideology (that is, the belief that a male person can “identify” as female or vice versa). That trans activists and their allies may find my questions about what “transgender” means or how a person can literally change sex uncomfortable, as they seem not to be able to respond to them, which I can imagine feels uncomfortably embarrassing, feeling uncomfortable is not a good enough reason to censor and silence people.

As a result of these attempts by Twitter to silence me, the right has leapt to support me, or at least engage with me, and criticize Twitter’s nonsensical, unwritten policies (nowhere in their Terms of Service does it say users may not differentiate between men and women or ask questions about transgender ideology). While the left continues to vilify me, and liberal and mainstream media continue to mostly ignore feminist analysis of gender identity, people like Dave Rubin and Ben Shapiro (and hundreds of right wingers and free speech advocates online), and right wing media outlets like the Daily Wire and The Blaze have either attempted to speak with me and understand my perspective, expressed support, or covered this undeniably ridiculous decision on the part of Twitter.

Anger at Twitter’s now ongoing attempts to silence me (I remain locked out of my account, awaiting an appeal process that is likely to result in nothing, and received a second notice today that I have been locked out doubly, on account of a tweet posted in May, criticizing Lisa Kreut for participating in a smear campaign against a local feminist, anti-poverty activist. Kreut has publicly admitted to “knowing someone” at Twitter Safety, so this is unsurprising, perhaps, albeit disconcerting) is not limited to the right or to free speech advocates, of course. There are numerous feminists around the world and unaffiliated members of the general public who see transgender ideology as dangerous (or simply ridiculous), and are critical of the ongoing silencing and smearing of those who challenge it. But one thing that does seem undeniable to me — something that the left should consider carefully, in terms of their own political strategizing — is that while the left seems to have taken to ignoring or refusing to engage with detractors or those who have opinions they disagree with or don’t like, the right continues to be interested in and open to engaging. And I think this is a good thing.

In light of my years of negative experiences trying to engage progressives on issues like pornography, prostitution, male violence, and now gender identity, I’ve unfortunately come to see many of them as cowardly, hypocritical, lacking in political and intellectual integrity, and disingenuous. While of course there are leftists who are critical of the sex trade and trans activism, far too many of those who represent progressives (in North America, in particular) — politicians and leftist political parties, as well as activists and representatives of the labour movement — will not speak out about these issues nor will they defend the women being ripped to shreds for speaking out. Radical feminists are largely on their own on these issues, and don’t have the numbers or the access to media or platforms that liberals, leftists, or the right do. I have personally been able to create and build a large platform, and am grateful for this. But I am being punished harshly for having succeeded in doing so. Twitter and their trans activist insiders seem to be working force me off the platform entirely, the left has shunned me, and Canadian media has yet to engage with my arguments with regard to gender identity ideology and legislation at all. Members of the left here in Canada who agree with me are afraid to be associated with me, and anyone who fails to disassociate is vilified or bullied.

I have been thinking about all this a lot lately, not only due to the debate around transgenderism and consequent no-platforming of critics, but more broadly, in terms of political strategy and the general advancement of good ideas and policy. As such, I want to acknowledge some things I once believed, but have changed my mind about.

I no longer believe leftist positions are necessarily most right or most ethical. I no longer believe everyone on the right is wrong about everything. I do not believe all those on the right necessarily have ill intentions, and suspect that many, like those on the left, believe they are working towards a better world. I don’t believe that it’s productive to position everyone who disagrees with the left as “right wing,” and therefore an enemy. I regret refusing to engage with or trying to understand those who are called “right wing” or “free speechers,” flat out. I think this is the wrong approach. I think it is, in fact, very important that we engage with those we may disagree with on various issues, and don’t think it serves us to ignore, mock, or dismiss people because they don’t share our exact political ideology. I am genuinely interested in speaking with people I may disagree with on various issues and am open to the possibility that we may agree on some ideas and not others. I think we should, as leftists and feminists, challenge and question our own ideas and mantras, rather than become too comfortable in the echo chamber.

What this means is that I will speak to and engage with whomever I like — left, right, and centre. I do not wish to play the game of guilt by association. I am tired of limiting ourselves to those who already share our views, and think this approach is unproductive if we genuinely want to effect change and understand the world around us. I think we need to open up, rather than shut down. I think we should model the behaviour we are asking of others — that is, to hear us out, and to engage with integrity. Even when that means engaging with ideas we don’t like, that we may find abhorrent or wrong or insulting. I don’t want to write people off any more than I want to be written off. And I regret only coming to this conclusion and speaking out about it recently, though I am grateful for my ability to think critically about discourse and strategy, and change my mind accordingly, regardless of who I may anger in the process.

I think sometimes we are afraid to engage genuinely and fairly with new ideas because we are afraid we might agree or change our minds. I suspect that many of those who support trans activism fear just this. That engaging with radical feminist analysis and other critiques of gender identity might leave them forced to admit we have a point.

The truth is that if we want our ideas to be good and coherent and evidence-based and convincing, we need to challenge ourselves and question those ideas, and even be open to the possibility that we might be wrong or that we might change our minds as a result.

Michael Knowles at the Daily Wire says I now must choose to “ally with conservatives, who support free speech and insist that ‘facts don’t care about your feelings,’ or persist with a Left that would annihilate feminism altogether.”

But I don’t think I need to choose either. I choose to think independently and critically. I choose to make strategic and thoughtful decisions about who to ally with. I choose to support free speech and also to reject right wing positions on things like abortion and the free market. I choose to continue to support universal healthcare, social housing, reproductive justice, and a viable welfare system. I choose to continue to oppose exploitative labour practices, privatization, and war. I choose to continue to advocate against male violence against women, sexual exploitation, porn culture, and legislation I consider to be harmful to women and girls. I choose to consider facts and take what I consider to be ethical positions based on those facts, even if those facts and positions don’t fit whatever is considered to be politically correct.

There are people on the right who are bad and who are good, who are smart and who are stupid, who are wrong and who are right, and then there are a million combinations in between. The same can be said of the left. And to pretend things are any more simple than that is, in my opinion, a mistake. While we may not agree on much else, the right and I both agree that transgenderism is nonsense, which may be awkward, but is better than being wrong or dishonest. Speaking of which, I reserve the right to be wrong about all of this, and change my mind accordingly, though I suspect I am not.

** *** ***** ******* *********** *************

Film Review: “First Reformed” Fails to Deliver on Environmental Themes

[Link] by Max Wilbert / Deep Green Resistance

“And for destroying the destroyers of the earth…” — Revelations, 11-18

The film “First Reformed” has an interesting premise. Toller (Ethan Hawke) is the sad, solitary  pastor of a small church who is asked to help Michael (Philip Ettinger), an activist and member of his congregation, who is struggling.

The two begin a dialogue, and Michael shares a sense of hopelessness in the face of ecological collapse. “It’s 2017,” he says, “and the IPCC said in 2010 that if drastic changes weren’t made by 2015, the entire planet’s ecology might collapse.” He also points out that hundreds of environmental activists are killed worldwide every year.

As Toller grapples with the existential questions brought on by this conversation, Michael’s wife Mary (played by Amanda Seyfried) finds explosives and a suicide vest hidden in the garage, and shows them to Toller, who takes them away. After discovering that his stash gone, Michael commits suicide.

The first major flaw in the film is the perpetuation of the stereotype that being aware of the state of the planet—toxification, species extinction, global warming, the refugee crisis, etc.—is to be consumed by all-encompassing depression. Michael is also described as having “no friends” and being “barely even sociable.”

These ideas are inaccurate and dangerous. The key message is this: if contemplating ecological collapse will drive you to suicide, then the science and discourse around ecological collapse is dangerous and should be avoided at all costs. This idea strengthens and validates the culture of denial that dominates popular discourse, and the stereotype that revolutionaries are depressed and alone.

In my experience, the opposite is true: those of us who fight back have rich communities and better mental health than the average. These themes resurface later in the film as well.

Toller is left to provide some small support to Mary, now a widow. But he remains deeply troubled by the statistics and trends on ecological collapse that the film accurately depicts.

The film sets up a tension between Toller’s small, struggling church and a massive nearby congregation—generously funded by a large fossil fuel corporation. The subtext is clear, and meant to examine the tension between religion at its best, as a source of moral guidance and inspiration for freedom fighters such as those on the underground railroad, and at its worst, as a narcotic, as the opiate of the masses and a tool of colonization.

At this point in the film, Toller’s simmering rage, sadness, and emotion waiting to explode become more apparent. Hidden beneath the puritan veneer of a small-town preacher lies alcoholism and a deep sadness. “No sooner do I close my eyes than desolation is upon me,” he says at one point in the film, after recounting the death of his son in Iraq—a war he encouraged his son to join, then later came to see as unjust.

After a promising start, the film takes a nosedive. There are two points on which the ending of the film fails completely. The first is feminist, the second environmental.

I thought, at first, naively, that this film wasn’t going to fall into casting the female lead as a sex object. But, predictably, it did, in a strange scene in which Mary, who is presumed to be in her early 30’s and who is pregnant and recently widowed, asks Toller, in his late 40’s, alcoholic and a minister, to snuggle with her. However, the scene seems to remain platonic, despite its strangeness and improbability.

After this, tortured by the thought of environmental collapse and by the collaboration between the oil company and his fellow Christians, Hawke decides to take the suicide vest (which he has kept) into a public event and blow himself—and the oil executives—up. After seeing Mary unexpectedly arrive, he doffs the explosives, wraps himself in rusty barbed wire, and prepares to commit suicide himself by drinking drain cleaner. Then Mary comes into the room, her and Toller begin kissing, and film ends abruptly.

What the fuck?

This is why I hate Hollywood and don’t really watch movies. Provided with a fascinating topic and a talented cast, all the filmmaker can muster is this emotional trainwreck, this pointlessness.

As is so common in popular culture, the artist (the director, in this case) confuses emotional turmoil with deep meaning. The final message might as well be a line Toller reads from his bible: “…the knowledge of the emptiness of all things, which can only be filled by the knowledge of our savior.”

Both of Toller’s final approaches—the suicide vest and the barbed wire—represent the self-flagellation of total helplessness. They are only personal solutions, not social or moral or political ones.

Revolutionaries don’t need this shit. We need cultural products—art, music, film, books, poetry, etc.—which nurture our resistance spirit, encourage our hearts, and teach us about healthy lives and effective ways of fighting empire.

Don’t waste your time on this film, or any other bullshit coming out of Hollywood.

** *** ***** ******* *********** *************

Guide to Private and Secure Operating Systems

[Link] by Max Wilbert / Deep Green Resistance

We live inside an unprecedented surveillance state. Government and corporations monitor all non-encrypted digital communications for the purposes of political control and profit.

Political dissidents who wish to challenge capitalism need to learn to use more secure methods for communication, research, and other digital tasks. This guide is aimed at serious dissidents and revolutionaries. It is not aimed at the everyday activist, who will likely find these practices to be overkill.

Privacy vs. Security

It is important to understand that privacy and security are two different things. Privacy is related to anonymity. Security protects from eavesdropping, but does not necessarily anonymize.

To use an analogy: privacy means that the government doesn’t know who sent the message, but can read the contents. Security means they know who sent the message, but cannot read it. This is a simplified understanding, but it’s important to distinguish between the two.

In general, most aboveground activists who are already operating in the public sphere prioritize security. Underground operators and revolutionaries generally prioritize anonymity, since being unmasked and identified is the primary danger.  Of course, this is a generalization. Both security and privacy are important for anyone involved in anti-capitalist resistance.

Note that these tools require some relatively advanced technological skills. However, it’s worth learning to use these tools. Whonix is probably the easiest to use for a beginner.

Operating Systems

An operating system, or OS, is the basic software running on a computing device. Windows and Mac OS are the most common operating systems. However, Linux is the most secure family of operating systems. This guide will look at operating systems for desktop computer use.

The following information is copied from the websites for these projects.

TAILS

Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.

It is a complete operating system designed to be used from a USB stick or a DVD independently of the computer’s original operating system. It is Free Software and based on Debian GNU/Linux.

Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.

Tails relies on the Tor anonymity network to protect your privacy online:

  • all software is configured to connect to the Internet through Tor
  • if an application tries to connect to the Internet directly, the connection is automatically blocked for security.

Tor is an open and distributed network that helps defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Tor protects you by bouncing your communications around a network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Using Tor you can:

  • be anonymous online by hiding your location,
  • connect to services that would be censored otherwise;
  • resist attacks that block the usage of Tor using circumvention tools such as bridges.

To learn more about Tor, see the official Tor website, particularly the following pages:

Tor overview: Why we need Tor

Tor overview: How does Tor work

Who uses Tor?

Understanding and Using Tor — An Introduction for the Layman

Using Tails on a computer doesn’t alter or depend on the operating system installed on it. So you can use it in the same way on your computer, a friend’s computer, or one at your local library. After shutting down Tails, the computer will start again with its usual operating system.

Tails is configured with special care to not use the computer’s hard-disks, even if there is some swap space on them. The only storage space used by Tails is in RAM, which is automatically erased when the computer shuts down. So you won’t leave any trace on the computer either of the Tails system itself or what you used it for. That’s why we call Tails “amnesic”.

This allows you to work with sensitive documents on any computer and protects you from data recovery after shutdown. Of course, you can still explicitly save specific documents to another USB stick or external hard-disk and take them away for future use.

https://tails.boum.org/

Whonix

Whonix is a desktop operating system designed for advanced security and privacy. Whonix mitigates the threat of common attack vectors while maintaining usability. Online anonymity is realized via fail-safe, automatic, and desktop-wide use of the Tor network. A heavily reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP address leaks. Commonly used applications are pre-installed and safely pre-configured for immediate use. The user is not jeopardized by installing additional applications or personalizing the desktop. Whonix is under active development and is the only operating system designed to be run inside a VM and paired with Tor.

Whonix utilizes Tor’s free software, which provides an open and distributed relay network to defend against network surveillance. Connections through Tor are enforced. DNS leaks are impossible, and even malware with root privileges cannot discover the user’s real IP address. Whonix is available for all major operating systems. Most commonly used applications are compatible with the Whonix design.

https://www.whonix.org/

Qubes OS

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit it.

Why is OS security important?

Most people use an operating system like Windows or OS X on their desktop and laptop computers. These OSes are popular because they tend to be easy to use and usually come pre-installed on the computers people buy. However, they present problems when it comes to security. For example, you might open an innocent-looking email attachment or website, not realizing that you’re actually allowing malware (malicious software) to run on your computer. Depending on what kind of malware it is, it might do anything from showing you unwanted advertisements to logging your keystrokes to taking over your entire computer. This could jeopardize all the information stored on or accessed by this computer, such as health records, confidential communications, or thoughts written in a private journal. Malware can also interfere with the activities you perform with your computer. For example, if you use your computer to conduct financial transactions, the malware might allow its creator to make fraudulent transactions in your name.

Aren’t antivirus programs and firewalls enough?

Unfortunately, conventional security approaches like antivirus programs and (software and/or hardware) firewalls are no longer enough to keep out sophisticated attackers. For example, nowadays it’s common for malware creators to check to see if their malware is recognized by any signature-based antivirus programs. If it’s recognized, they scramble their code until it’s no longer recognizable by the antivirus programs, then send it out. The best of these programs will subsequently get updated once the antivirus programmers discover the new threat, but this usually occurs at least a few days after the new attacks start to appear in the wild. By then, it’s too late for those who have already been compromised. More advanced antivirus software may perform better in this regard, but it’s still limited to a detection-based approach. New zero-day vulnerabilities are constantly being discovered in the common software we all use, such as our web browsers, and no antivirus program or firewall can prevent all of these vulnerabilities from being exploited.

How does Qubes OS provide security?

Qubes takes an approach called security by compartmentalization, which allows you to compartmentalize the various parts of your digital life into securely isolated compartments called qubes.

This approach allows you to keep the different things you do on your computer securely separated from each other in isolated qubes so that one qube getting compromised won’t affect the others. For example, you might have one qube for visiting untrusted websites and a different qube for doing online banking. This way, if your untrusted browsing qube gets compromised by a malware-laden website, your online banking activities won’t be at risk. Similarly, if you’re concerned about malicious email attachments, Qubes can make it so that every attachment gets opened in its own single-use disposable qube. In this way, Qubes allows you to do everything on the same physical computer without having to worry about a single successful cyberattack taking down your entire digital life in one fell swoop.

Moreover, all of these isolated qubes are integrated into a single, usable system. Programs are isolated in their own separate qubes, but all windows are displayed in a single, unified desktop environment with unforgeable colored window borders so that you can easily identify windows from different security levels. Common attack vectors like network cards and USB controllers are isolated in their own hardware qubes while their functionality is preserved through secure networking, firewalls, and USB device management. Integrated file and clipboard copy and paste operations make it easy to work across various qubes without compromising security. The innovative Template system separates software installation from software use, allowing qubes to share a root filesystem without sacrificing security (and saving disk space, to boot). Qubes even allows you to sanitize PDFs and images in a few clicks. Users concerned about privacy will appreciate the integration of Whonix with Qubes, which makes it easy to use Tor securely, while those concerned about physical hardware attacks will benefit from Anti Evil Maid.

How does Qubes OS compare to using a “live CD” OS?

Booting your computer from a live CD (or DVD) when you need to perform sensitive activities can certainly be more secure than simply using your main OS, but this method still preserves many of the risks of conventional OSes. For example, popular live OSes (such as Tails and other Linux distributions) are still monolithic in the sense that all software is still running in the same OS. This means, once again, that if your session is compromised, then all the data and activities performed within that same session are also potentially compromised.

How does Qubes OS compare to running VMs in a conventional OS?

Not all virtual machine software is equal when it comes to security. You may have used or heard of VMs in relation to software like VirtualBox or VMware Workstation. These are known as “Type 2” or “hosted” hypervisors. (The hypervisor is the software, firmware, or hardware that creates and runs virtual machines.) These programs are popular because they’re designed primarily to be easy to use and run under popular OSes like Windows (which is called the host OS, since it “hosts” the VMs). However, the fact that Type 2 hypervisors run under the host OS means that they’re really only as secure as the host OS itself. If the host OS is ever compromised, then any VMs it hosts are also effectively compromised.

By contrast, Qubes uses a “Type 1” or “bare metal” hypervisor called Xen. Instead of running inside an OS, Type 1 hypervisors run directly on the “bare metal” of the hardware. This means that an attacker must be capable of subverting the hypervisor itself in order to compromise the entire system, which is vastly more difficult.

Qubes makes it so that multiple VMs running under a Type 1 hypervisor can be securely used as an integrated OS. For example, it puts all of your application windows on the same desktop with special colored borders indicating the trust levels of their respective VMs. It also allows for things like secure copy/paste operations between VMs, securely copying and transferring files between VMs, and secure networking between VMs and the Internet.

How does Qubes OS compare to using a separate physical machine?

Using a separate physical computer for sensitive activities can certainly be more secure than using one computer with a conventional OS for everything, but there are still risks to consider. Briefly, here are some of the main pros and cons of this approach relative to Qubes:

Pros

  • Physical separation doesn’t rely on a hypervisor. (It’s very unlikely that an attacker will break out of Qubes’ hypervisor, but if one were to manage to do so, one could potentially gain control over the entire system.)
  • Physical separation can be a natural complement to physical security. (For example, you might find it natural to lock your secure laptop in a safe when you take your unsecure laptop out with you.)

Cons

  • Physical separation can be cumbersome and expensive, since we may have to obtain and set up a separate physical machine for each security level we need.
  • There’s generally no secure way to transfer data between physically separate computers running conventional OSes. (Qubes has a secure inter-VM file transfer system to handle this.)
  • Physically separate computers running conventional OSes are still independently vulnerable to most conventional attacks due to their monolithic nature.
  • Malware which can bridge air gaps has existed for several years now and is becoming increasingly common.

(For more on this topic, please see the paper Software compartmentalization vs. physical separation.)

Get Qubes

Qubes OS is free to use, can run , and integrates with Whonix for secure web browsing and internet usage via Tor.

https://www.qubes-os.org/

Summary

  • TAILS is a “live” OS that runs from a USB stick or DVD, and can be used to browse anonymously from any computer. It doesn’t save files or history; it is designed mainly for ephemeral use.
  • Whonix is an OS made to run as a virtual machine, and provide security and anonymity for web browsing by routing all connections via the Tor browser.
  • Qubes OS is made to use as a permanent OS, and uses compartmentalization for security. Whonix is automatically installed inside Qubes. Used by Edward Snowden.

** *** ***** ******* *********** *************

Contact Deep Green Resistance News Service

[Link] To repost DGR original writings or talk with us about anything else, you can contact the Deep Green Resistance News Service by email, on Twitter, or on Facebook.

Email: newsservice@deepgreenresistance.org

Twitter: @dgrnews

Facebook.com/dgrnews

Please contact us with news, articles, or pieces that you have written. If we decide to post your submission, it may be posted here, or on the Deep Green Resistance Blog.

** *** ***** ******* *********** *************

Further news and recommended reading / podcasts

Resistance Radio w/ Graham Linelan – December 9, 2018

Resistance Radio w/ Harriet Wistrich – December 2, 2018

Resistance Radio w/ Benjamin Vogt – November 25, 2018

Resistance Radio w/ Breanne Fahs – November 18, 2018

Resistance Radio w/ George Wuerthner – November 11, 2018

Resistance Radio w/ Ron Sutherland – November 4, 2018

Another End of the World is Possible – Last Born in the Wilderness

Mental Health Under Late Capitalism

Green Tech FAQ

Gas Fracking Industry Using Using Military Psychological Warfare Tactics and Personnel In U.S. Communities

Whose land do you live on?

** *** ***** ******* *********** *************

How to support DGR or get involved

Guide to taking action

Bring DGR to your community to provide training

Become a member

** *** ***** ******* *********** *************

I’m sick and tired of middle class liberals telling people to compromise. Compromise has led us to where we are today: on the verge of ecological collapse and the genocide of the human species (if you believe the science). Incessant compromise will kill us all.

–      Vince Emanuele

 

Please feel free to forward this newsletter to those who will find it valuable. Permission is also granted to reprint this newsletter, but it must be reprinted in whole.

Leave a Reply

Your email address will not be published. Required fields are marked *