73 Rules of Spycraft

73 Rules of Spycraft

American diplomat and lawyer Allen Dulles (1893-1969), the 5th Director of Central Intelligence and once head of the CIA listed 73 Rules of Spycraft.

“The greatest weapon a man or woman can bring to this type of work in which we are engaged is his or her hard common sense. The following notes aim at being a little common sense and applied form. Simple common sense crystallized by a certain amount of experience into a number of rules and suggestions.

  1. There are many virtues to be striven after in the job. The greatest of them all is security. All else must be subordinated to that.
  2. Security consists not only in avoiding big risks. It consists in carrying out daily tasks with painstaking remembrance of the tiny things that security demands. The little things are in many ways more important than the big ones. It is they which oftenest give the game away. It is consistent care in them, which form the habit and characteristic of security mindedness.
  3. In any case, the man or woman who does not indulge in the daily security routine, boring and useless though it may sometimes appear, will be found lacking in the proper instinctive reaction when dealing with the bigger stuff.
  4. No matter how brilliantly given an individual, no matter how great his goodwill, if he is lacking in security, he will eventually prove more of a liability than asset.
  5. Even though you feel the curious outsider has probably a good idea that you are not what you purport to be, never admit it. Keep on playing the other part. It’s amazing how often people will be led to think they were mistaken. Or at least that you are out ‘in the other stuff’ only in a very mild way. And anyhow, a person is quite free to think what he likes. The important thing is that neither by admission or implication do you let him know.
  6. Security, of course, does not mean stagnation or being afraid to go after things. It means going after things, but reducing all the risks to a minimum by hard work.
  7. Do not overwork your cover to the detriment of your jobs; we must never get so engrossed in the latter as to forget the former.
  8. Never leave things lying about unattended or lay them down where you are liable to forget them. Learn to write lightly; the “blank” page underneath has often been read. Be wary of your piece of blotting paper. If you have to destroy a document, do so thoroughly. Carry as little written matter as possible, and for the shortest possible time. Never carry names or addresses en clair. If you cannot carry them for the time being in your head, put them in a species of personal code, which only you understand. Small papers and envelopes or cards and photographs, ought to be clipped on to the latter, otherwise they are liable to get lost. But when you have conducted an interview or made arrangements for a meeting, write it all down and put it safely away for reference. Your memory can play tricks.
  9. The greatest vice in the game is that of carelessness. Mistakes made generally cannot be rectified.
  10. The next greatest vice is that of vanity. Its offshoots are multiple and malignant. Besides, the man with a swelled head never learns. And there is always a great deal to be learned.
  11. Booze is naturally dangerous. So also is an undisciplined attraction for the other sex. The first loosens the tongue. The second does likewise. It also distorts vision and promotes indolence. They both provide grand weapons to an enemy.
  12. It has been proved time and again, in particular, that sex and business do not mix.
  13. In this job, there are no hours. That is to say, one never leaves it down. It is lived. One never drops one’s guard. All locations are good for laying a false trail (social occasions, for instance, a casual hint here, a phrase there). All locations are good for picking something up, or collecting…for making a useful acquaintance.
  14. In a more normal sense of the term “no hours,” it is certainly not a business where people put their own private arrangements before their work.
  15. That is not to say that one does not take recreation and holidays. Without them it is not possible to do a decent job. If there is a real goodwill and enthusiasm for the work, the two (except in abnormal circumstances) will always be combined without the work having to suffer.
  16. The greatest material curse to the profession, despite all its advantages, is undoubtedly the telephone. It is a constant source of temptation to slackness. And even if you do not use it carelessly yourself, the other fellow, very often will, so in any case, warn him. Always act on the principle that every conversation is listened to, that a call may always give the enemy a line. Naturally, always unplug during confidential conversations. Even better is it to have no phone in your room, or else have it in a box or cupboard.
  17. Sometimes, for quite exceptional reasons, it may be permissible to use open post as a channel of communications. Without these quite exceptional reasons, allowing of no alternative, it is to be completely avoided.
  18. When the post is used, it will be advisable to get through post boxes; that is to say, people who will receive mail for you and pass it on. This ought to be their only function. They should not be part of the show. They will have to be chosen for the personal friendship which they have with you or with one of your agents. The explanation you give them will depend on circumstances; the letters, of course, must be apparently innocent incontinence. A phrase, signature or embodied code will give the message. The letter ought to be concocted in such fashion as to fit in with the recipient’s social background. The writer ought therefore to be given details of the post boxes assigned to them. An insipid letter is in itself suspicious. If however, a signature or phrase is sufficient to convey the message, then a card with greetings will do.
  19. Make a day’s journey, rather than take a risk, either by phone or post. If you do not have a prearranged message to give by phone, never dial your number before having thought about your conversation. Do not improvise even the dummy part of it. But do not be too elaborate. The great rule here, as in all else connected with the job, is to be natural.
  20. If you have phoned a line or a prospective line of yours from a public box and have to look up the number, do not leave the book lying open on that page.
  21. When you choose a safe house to use for meetings or as a depot, let it be safe. If you can, avoid one that is overlooked by other houses. If it is, the main entrance should be that used for other houses as well. Make sure there are no suspicious servants. Especially, of course, be sure of the occupants. Again, these should be chosen for reasons of personal friendship with some member of the organization and should be discreet. The story told to them will once again depend on circumstances. They should have no other place in the show, or if this is unavoidable, then calls at the house should be made as far as possible after dark.
  22. Always be yourself. Always be natural inside the setting you have cast for yourself. This is especially important when meeting people for the first time or when traveling on a job or when in restaurants or public places in the course of one. In trains or restaurants people have ample time to study those nearest them. The calm quiet person attracts little attention. Never strain after an effect. You would not do so in ordinary life. Look upon your job as perfectly normal and natural.
  23. When involved in business, look at other people as little as possible, and don’t dawdle. You will then have a good chance of passing unnoticed. Looks draw looks.
  24. Do not dress in a fashion calculated to strike the eye or to single you out easily.
  25. Do not stand around. And as well as being punctual yourself, see that those with whom you are dealing are punctual. Especially if the meeting is in a public place; a man waiting around will draw attention. But even if it is not in a public place, try to arrive and make others arrive on the dot. An arrival before the time causes as much inconvenience as one after time.
  26. If you have a rendezvous, first make sure you are not followed. Tell the other person to do likewise. But do not act in any exaggerated fashion. Do not take a taxi to a house address connected with your work. If it cannot be avoided, make sure you are not under observation when you get into it. Or give another address, such as that of a café or restaurant nearby.
  27. Try to avoid journeys to places where you will be noticeable. If you have to make such journeys, repeat them as little as possible, and take all means to make yourself fit in quietly with the background.
  28. Make as many of your difficult appointments as you can after dark. Turn the blackout to good use. If you cannot make it after dark, make it very early morning when people are only half awake and not on the lookout for strange goings-on.
  29. Avoid restaurants, cafes and bars for meetings and conversations. Above all never make an initial contact in one of them. Let it be outside. Use abundance of detail and description of persons to be met, and have one or two good distinguishing marks. Have a password that can be given to the wrong person without unduly exciting infestation.
  30. If interviews cannot be conducted in a safe house, then take a walk together in the country. Cemeteries, museums and churches are useful places to bear in mind.
  31. Use your own judgment as to whether or not you ought to talk to chance travel or table companions. It may be useful. It may be the opposite. It may be of no consequence whatsoever. Think, however, before you enter upon a real conversation, whether this particular enlargement of the number of those who will recognize and spot you in the future is liable or not to be a disadvantage. Always carry reading matter. Not only will it save you from being bored, it is protective armor if you want to avoid a conversation or to break off an embarrassing one.
  32. Always be polite to people, but not exaggeratedly so. With the following class of persons who come to know you — hotel and restaurant staffs, taxi drivers, train personnel etc., be pleasant.
  33. Someday, they may prove useful to you. Be generous in your tips to them, but again, not exaggeratedly so. Give just a little more than the other fellow does – unless the cover under which you are working does not permit this. Give only normal tips. however, to waiters and taxi drivers, etc., when you are on the job. Don’t give them any stimulus, even of gratification, to make you stick in their minds. Be as brief and casual as possible.
  34. Easiness and confidence do not come readily to all of us. They must be assiduously cultivated. Not only because they help us personally, but they also help to produce similar reactions in those we are handling.
  35. Never deal out the intense, the dramatic stuff, to a person before you have quietly obtained his confidence in your levelheadedness.
  36. If you’re angling for a man, lead him around to where you want him; put the obvious idea in his head, and make the suggestion of possibilities come to him. Express, if necessary – but with great tact — a wistful disbelief in the possibilities at which you are aiming. “How fine it would be if only someone could… but of course, etc. etc.” And always leave a line of retreat open to yourself.
  37. Never take a person for granted. Very seldom judge a person to be above suspicion. Remember that we live by deceiving others. Others live by deceiving us. Unless others take persons for granted or believe in them, we would never get our results. The others have people as clever as we; if they can be taken in, so can we. Therefore, be suspicious.
  38. Above all, don’t deceive yourself. Don’t decide that the other person is fit or is all right, because you yourself would like it to be that way. You are dealing in people’s lives.
  39. When you have made a contact, till you are absolutely sure of your man — and perhaps even then — be a small but eager intermediary. Have a “They” in the background for whom you act and to whom you are responsible. If “They” are harsh, if “They” decide to break it off, it is never any fault of yours, and indeed you can pretend to have a personal grievance about it. “They” are always great gluttons for results and very stingy with cash until “They” get them. When the results come along, “They” always send messages of congratulation and encouragement.
  40. Try to find agents who do not work for money alone, but for conviction. Remember, however, that not by conviction alone, does the man live. If they need financial help, give it to them. And avoid the “woolly” type of idealist, the fellow who lives in the clouds.
  41. Become a real friend of your agents. Remember that he has a human side so bind him to you by taking an interest in his personal affairs and in his family. But never let the friendship be stronger than your sense of duty to the work. That must always be impervious to any sentimental considerations. Otherwise, your vision will be distorted, your judgment affected, and you may be reluctant, even, to place your men in a position of danger. You may also, by indulgence toward him, let him endanger others.
  42. Gain the confidence of your agents, but be wary of giving them more of yours than is necessary. He may fall by the way side; he may quarrel with you; it may be advisable for a number of reasons to drop him. In that case, obviously, the less information he possesses, the better. Equally obviously, if an agent runs the risk of falling into the hands of the enemy, it is unfair both to him and the show to put him in possession of more knowledge than he needs.
  43. If your agent can be laid off work periodically, this is a very good thing. And during his rest periods, let him show himself in another field and in other capacities.
  44. Teach them at least the elements of technique. Do not merely leave it to his own good judgment, and then hope for the best. Insist, for a long time at least, on his not showing too much initiative, but make him carry out strictly the instructions which you give him. His initiative will he tested when unexpected circumstances arise. Tell him off soundly when he errs; praise him when he does well.
  45. Do not be afraid to be harsh, or even harsh with others, if it is your duty to be so. You are expected to be likewise with yourself. When necessity arises neither your own feelings not those of others matter. Only the job — the lives and safety of those entrusted to you — is what counts.
  46. Remember that you have no right to expect of others what you are not prepared to do yourself. But on the other hand, do not rashly expose yourself in any unnecessary displays of personal courage that may endanger the whole shooting match. It often takes more moral courage to ask another fellow to do a dangerous task than to do it yourself. But if this is the proper course to follow, then you must follow it.
  47. If you have an agent who is really very important to you, who is almost essential to your organization, try not to let them know this. Infer, without belittling him, that there are other lines and other groups of a bigger nature inside the shadow, and that — while he and his particular group are doing fine work — they are but part of a mosaic.
  48. Never let your agent get the bit between his teeth and run away with you. If you cannot manage it easily yourself, there are always the terrible “They.”
  49. But if your agent knows the ground on which he is working better than you, always be ready to listen to his advice and to consult him. The man on the spot is the man who can judge.
  50. In the same way, if you get directives from HQ, which to you seem ill-advised, do not be afraid to oppose these directives. You are there for pointing things out. This is particularly so if there is grave danger to security without a real corresponding advantage for which the risk may be taken. For that, fight anybody with everything you’ve got.
  51. If you have several groups, keep them separate unless the moment comes for concerted action. Keep your lines separate; and within the bounds of reason and security, try to multiply them. Each separation and each multiplication minimizes the danger of total loss. Multiplication of lines also gives the possibility of resting each line, which is often a very desirable thing.
  52. Never set a thing really going, whether it be big or small, before you see it in its details. Do not count on luck. Or only on bad luck.
  53. When using couriers, who are in themselves trustworthy — (here again, the important element of personal friendship ought to be made to play its part) — but whom it is better to keep in the dark as to the real nature of what they are carrying, commercial smuggling will often provide an excellent cover. Apart from being a valid reason for secrecy, it gives people a kick and also provides one with a reason for offering payment. Furthermore, it involves a courier in something in which it is in his own personal advantage to conceal.
  54. To build this cover, should there be no bulk of material to pass, but only a document or a letter, it will be well always to enclose this properly sealed in a field dummy parcel with an unsealed outer wrapping.
  55. The ingredients for any new setup are: serious consideration of the field and of the elements at your disposal; the finding of one key man or more; safe surroundings for encounter; safe houses to meet in; post boxes; couriers; the finding of natural covers and pretext for journeys, etc.; the division of labor; separation into cells; the principal danger in constructing personal friendships between the elements (this is enormously important); avoidance of repetition.
  56. The thing to aim at, unless it is a question of a special job, is not quick results, which may blow up the show, but the initiation of a series of results, which will keep on growing and which, because the show has the proper protective mechanism to keep it under cover, will lead to discovery.
  57. Serious groundwork is much more important than rapid action. The organization does not merely consist of the people actively working but the potential agents whom you have placed where they may be needed, and upon whom you may call, if need arises.
  58. As with an organization, so with a particular individual. His first job in a new field is to forget about everything excepting his groundwork; that is, the effecting of his cover. Once people label him, the job is half done. People take things so much for granted and only with difficulty change their sizing-up of a man once they have made it. They have to be jolted out of it. It is up to you to see that they are not. If they do suspect, do not take it that all is lost and accept the position. Go back to your cover and build it up again. You will at first puzzle them and finally persuade them.
  59. The cover you choose will depend upon the type of work that you have to do. So also will the social life in which you indulge. It may be necessary to lead a full social existence; it may be advisable to stay in the background. You must school yourself not to do any wishful thinking in the sense of persuading yourself that what you want to do is what you ought to do.
  60. Your cover and social behavior, naturally, ought to be chosen to fit in with your background and character. Neither should be too much of a strain. Use them well. Imprint them, gradually but steadfastly on people’s minds. When your name crops up in conversation they must have something to say about you, something concrete outside of your real work.
  61. The place you live in is often a thorny problem. Hotels are seldom satisfactory. A flat of your own where you have everything under control is desirable; if you can share it with a discreet friend who is not in the business, so much the better. You can relax into a normal life when you get home, and he will also give you an opportunity of cover. Obviously the greatest care is to be taken in the choice of servants. But it is preferable to have a reliable servant than to have none at all. People cannot get in to search or fix telephones, etc. in your absence. And if you want to not be at home for awkward callers (either personal or telephonic), servants make that possible.
  62. If a man is married, the presence of his wife may be an advantage or disadvantage. That will depend on the nature of the job — as well as on the nature of the husband and wife.
  63. Should a husband tell his wife what he is doing? It is taken for granted that people in this line are possessed of discretion and judgment. If a man thinks his wife is to be trusted, then he may certainly tell her what he is doing — without necessarily telling her the confidential details of particular jobs. It would be fair to neither husband nor wife to keep her in the dark unless there were serious reasons demanding this. A wife would naturally have to be coached in behavior in the same way as an agent.
  64. Away from the job, among your other contacts, never know too much. Often you will have to bite down on your vanity, which would like to show what you know. This is especially hard when you hear a wrong assertion being made or a misstatement of events.
  65. Not knowing too much does not mean not knowing anything. Unless there is a special reason for it, it is not good either to appear a nitwit or a person lacking in discretion. This does not invite the placing of confidence in you.
  66. Show your intelligence, but be quiet on anything along the line you are working. Make others do the speaking. A good thing sometimes is to be personally interested as “a good patriot and anxious to pass along anything useful to official channels in the hope that it may eventually get to the right quarter.”
  67. When you think a man is possessed of useful knowledge or may in other ways be of value to you, remember that praise is acceptable to the vast majority of men. When honest praise is difficult, a spot of flattery will do equally well.
  68. Within the limits of your principles, be all things to all men. But don’t betray your principles. The strongest force in your show is you. Your sense of right, your sense of respect for yourself and others. And it is your job to bend circumstances to your will, not to let circumstances bend or twist you.
  69. In your work, always be in harmony with your own conscience. Put yourself periodically in the dock for cross examination. You can never do more than your best; only your best is good enough. And remember that only the job counts — not you personally, excepting satisfaction of a job well done.
  70. It is one of the finest jobs going. no matter how small the part you play may appear to be. Countless people would give anything to be in it. Remember that and appreciate the privilege. No matter what others may do, play your part well.
  71. Never get into a rut. Or rest on your oars. There are always new lines around the corner, always changes and variations to be introduced. Unchanging habits of work lead to carelessness and detection.
  72. If anything, overestimate the opposition. Certainly never underestimate it. But do not let that lead to nervousness or lack of confidence. Don’t get rattled, and know that with hard work, calmness, and by never irrevocably compromising yourself, you can always, always best them.
  73. Lastly, and above all — REMEMBER SECURITY.
PS. The above points are not intended for any cursory, even interested, glance. They will bear — each of them — serious attention, and at least occasional re-perusal. It is probable, furthermore, that dotted here and there among them will be found claims that have particular present application for each person who reads them. These, naturally, are meant to be acted upon straightaway.”
Book Excerpt: Collapse Scenarios: No Resistance

Book Excerpt: Collapse Scenarios: No Resistance

Editor’s note: The following is from the chapter “Decisive Ecological Warfare” of the book Deep Green Resistance: A Strategy to Save the  Planet. This book is now available for free online.

     by Aric McBay

There’s a time when the operation of the machine becomes so odious, makes you so sick at heart, that you can’t take part, you can’t even passively take part, and you’ve got to put your bodies upon the gears and upon the wheels, upon the levers, upon all the apparatus, and you’ve got to make it stop!

—Mario Savio, Berkeley Free Speech Movement

To gain what is worth having, it may be necessary to lose everything else.

—Bernadette Devlin, Irish activist and politician

BRINGING IT DOWN: COLLAPSE SCENARIOS

At this point in history, there are no good short-term outcomes for global human society. Some are better and some are worse, and in the long term some are very good, but in the short term we’re in a bind. I’m not going to lie to you—the hour is too late for cheermongering. The only way to find the best outcome is to confront our dire situation head on, and not to be diverted by false hopes.

Human society—because of civilization, specifically—has painted itself into a corner. As a species we’re dependent on the draw down of finite supplies of oil, soil, and water. Industrial agriculture (and annual grain agriculture before that) has put us into a vicious pattern of population growth and overshoot. We long ago exceeded carrying capacity, and the workings of civilization are destroying that carrying capacity by the second. This is largely the fault of those in power, the wealthiest, the states and corporations. But the consequences—and the responsibility for dealing with it—fall to the rest of us, including nonhumans.

Physically, it’s not too late for a crash program to limit births to reduce the population, cut fossil fuel consumption to nil, replace agricultural monocrops with perennial polycultures, end overfishing, and cease industrial encroachment on (or destruction of) remaining wild areas. There’s no physical reason we couldn’t start all of these things tomorrow, stop global warming in its tracks, reverse overshoot, reverse erosion, reverse aquifer drawdown, and bring back all the species and biomes currently on the brink. There’s no physical reason we couldn’t get together and act like adults and fix these problems, in the sense that it isn’t against the laws of physics.

But socially and politically, we know this is a pipe dream. There are material systems of power that make this impossible as long as those systems are still intact. Those in power get too much money and privilege from destroying the planet. We aren’t going to save the planet—or our own future as a species—without a fight.

What’s realistic? What options are actually available to us, and what are the consequences? What follows are three broad and illustrative scenarios: one in which there is no substantive or decisive resistance, one in which there is limited resistance and a relatively prolonged collapse, and one in which all-out resistance leads to the immediate collapse of civilization and global industrial infrastructure.

NO RESISTANCE

If there is no substantive resistance, likely there will be a few more years of business as usual, though with increasing economic disruption and upset. According to the best available data, the impacts of peak oil start to hit somewhere between 2011 and 2015, resulting in a rapid decline in global energy availability.1 It’s possible that this may happen slightly later if all-out attempts are made to extract remaining fossil fuels, but that would only prolong the inevitable, worsen global warming, and make the eventual decline that much steeper and more severe. Once peak oil sets in, the increasing cost and decreasing supply of energy undermines manufacturing and transportation, especially on a global scale.

The energy slide will cause economic turmoil, and a self-perpetuating cycle of economic contraction will take place. Businesses will be unable to pay their workers, workers will be unable to buy things, and more companies will shrink or go out of business (and will be unable to pay their workers). Unable to pay their debts and mortgages, homeowners, companies, and even states will go bankrupt. (It’s possible that this process has already begun.) International trade will nosedive because of a global depression and increasing transportation and manufacturing costs. Though it’s likely that the price of oil will increase over time, there will be times when the contracting economy causes falling demand for oil, thus suppressing the price. The lower cost of oil may, ironically but beneficially, limit investment in new oil infrastructure.

At first the collapse will resemble a traditional recession or depression, with the poor being hit especially hard by the increasing costs of basic goods, particularly of electricity and heating in cold areas. After a few years, the financial limits will become physical ones; large-scale energy-intensive manufacturing will become not only uneconomical, but impossible.

A direct result of this will be the collapse of industrial agriculture. Dependent on vast amounts of energy for tractor fuel, synthesized pesticides and fertilizers, irrigation, greenhouse heating, packaging, and transportation, global industrial agriculture will run up against hard limits to production (driven at first by intense competition for energy from other sectors). This will be worsened by the depletion of groundwater and aquifers, a long history of soil erosion, and the early stages of climate change. At first this will cause a food and economic crisis mostly felt by the poor. Over time, the situation will worsen and industrial food production will fall below that required to sustain the population.

There will be three main responses to this global food shortage. In some areas people will return to growing their own food and build sustainable local food initiatives. This will be a positive sign, but public involvement will be belated and inadequate, as most people still won’t have caught on to the permanency of collapse and won’t want to have to grow their own food. It will also be made far more difficult by the massive urbanization that has occurred in the last century, by the destruction of the land, and by climate change. Furthermore, most subsistence cultures will have been destroyed or uprooted from their land—land inequalities will hamper people from growing their own food (just as they do now in the majority of the world). Without well-organized resisters, land reform will not happen, and displaced people will not be able to access land. As a result, widespread hunger and starvation (worsening to famine in bad agricultural years) will become endemic in many parts of the world. The lack of energy for industrial agriculture will cause a resurgence in the institutions of slavery and serfdom.

Slavery does not occur in a political vacuum. Threatened by economic and energy collapse, some governments will fall entirely, turning into failed states. With no one to stop them, warlords will set up shop in the rubble. Others, desperate to maintain power against emboldened secessionists and civil unrest, will turn to authoritarian forms of government. In a world of diminishing but critical resources, governments will get leaner and meaner. We will see a resurgence of authoritarianism in modern forms: technofascism and corporation feudalism. The rich will increasingly move to private and well-defended enclaves. Their country estates will not look apocalyptic—they will look like eco-Edens, with well-tended organic gardens, clean private lakes, and wildlife refuges. In some cases these enclaves will be tiny, and in others they could fill entire countries.

Meanwhile, the poor will see their own condition worsen. The millions of refugees created by economic and energy collapse will be on the move, but no one will want them. In some brittle areas the influx of refugees will overwhelm basic services and cause a local collapse, resulting in cascading waves of refugees radiating from collapse and disaster epicenters. In some areas refugees will be turned back by force of arms. In other areas, racism and discrimination will come to the fore as an excuse for authoritarians to put marginalized people and dissidents in “special settlements,” leaving more resources for the privileged.2 Desperate people will be the only candidates for the dangerous and dirty manual labor required to keep industrial manufacturing going once the energy supply dwindles. Hence, those in power will consider autonomous and self-sustaining communities a threat to their labor supply, and suppress or destroy them.

Despite all of this, technological “progress” will not yet stop. For a time it will continue in fits and starts, although humanity will be split into increasingly divergent groups. Those on the bottom will be unable to meet their basic subsistence needs, while those on the top will attempt to live lives of privilege as they had in the past, even seeing some technological advancements, many of which will be intended to cement the superiority of those in power in an increasingly crowded and hostile world.

Technofascists will develop and perfect social control technologies (already currently in their early stages): autonomous drones for surveillance and assassination; microwave crowd-control devices; MRI-assisted brain scans that will allow for infallible lie detection, even mind reading and torture. There will be no substantive organized resistance in this scenario, but in each year that passes the technofascists will make themselves more and more able to destroy resistance even in its smallest expression. As time slips by, the window of opportunity for resistance will swiftly close. Technofascists of the early to mid-twenty-first century will have technology for coercion and surveillance that will make the most practiced of the Stasi or the SS look like rank amateurs. Their ability to debase humanity will make their predecessors appear saintly by comparison.

Not all governments will take this turn, of course. But the authoritarian governments—those that will continue ruthlessly exploiting people and resources regardless of the consequences—will have more sway and more muscle, and will take resources from their neighbors and failed states as they please. There will be no one to stop them. It won’t matter if you are the most sustainable eco-village on the planet if you live next door to an eternally resource-hungry fascist state.

Meanwhile, with industrial powers increasingly desperate for energy, the tenuous remaining environmental and social regulations will be cast aside. The worst of the worst, practices like drilling offshore and in wildlife refuges, and mountaintop removal for coal will become commonplace. These will be merely the dregs of prehistoric energy reserves. The drilling will only prolong the endurance of industrial civilization for a matter of months or years, but ecological damage will be long-term or permanent (as is happening in the Arctic National Wildlife Refuge). Because in our scenario there is no substantive resistance, this will all proceed unobstructed.

Investment in renewable industrial energy will also take place, although it will be belated and hampered by economic challenges, government bankruptcies, and budget cuts.3 Furthermore, long-distance power transmission lines will be insufficient and crumbling from age. Replacing and upgrading them will prove difficult and expensive. As a result, even once in place, electric renewables will only produce a tiny fraction of the energy produced by petroleum. That electric energy will not be suitable to run the vast majority of tractors, trucks, and other vehicles or similar infrastructure.

As a consequence, renewable energy will have only a minimal moderating effect on the energy cliff. In fact, the energy invested in the new infrastructure will take years to pay itself back with electricity generated. Massive infrastructure upgrades will actually steepen the energy cliff by decreasing the amount of energy available for daily activities. There will be a constant struggle to allocate limited supplies of energy under successive crises. There will be some rationing to prevent riots, but most energy (regardless of the source) will go to governments, the military, corporations, and the rich.

Energy constraints will make it impossible to even attempt any full-scale infrastructure overhauls like hydrogen economies (which wouldn’t solve the problem anyway). Biofuels will take off in many areas, despite the fact that they mostly have a poor ratio of energy returned on energy invested (EROEI). The EROEI will be better in tropical countries, so remaining tropical forests will be massively logged to clear land for biofuel production. (Often, forests will be logged en masse simply to burn for fuel.) Heavy machinery will be too expensive for most plantations, so their labor will come from slavery and serfdom under authoritarian governments and corporate feudalism. (Slavery is currently used in Brazil to log forests and produce charcoal by hand for the steel industry, after all.)4 The global effects of biofuel production will be increases in the cost of food, increases in water and irrigation drawdown for agriculture, and worsening soil erosion. Regardless, its production will amount to only a small fraction of the liquid hydrocarbons available at the peak of civilization.

All of this will have immediate ecological consequences. The oceans, wracked by increased fishing (to compensate for food shortages) and warming-induced acidity and coral die-offs, will be mostly dead. The expansion of biofuels will destroy many remaining wild areas and global biodiversity will plummet. Tropical forests like the Amazon produce the moist climate they require through their own vast transpiration, but expanded logging and agriculture will cut transpiration and tip the balance toward permanent drought. Even where the forest is not actually cut, the drying local climate will be enough to kill it. The Amazon will turn into a desert, and other tropical forests will follow suit.

Projections vary, but it’s almost certain that if the majority of the remaining fossil fuels are extracted and burned, global warming would become self-perpetuating and catastrophic. However, the worst effects will not be felt until decades into the future, once most fossil fuels have already been exhausted. By then, there will be very little energy or industrial capacity left for humans to try to compensate for the effects of global warming.

Furthermore, as intense climate change takes over, ecological remediation through perennial polycultures and forest replanting will become impossible. The heat and drought will turn forests into net carbon emitters, as northern forests die from heat, pests, and disease, and then burn in continent-wide fires that will make early twenty-first century conflagrations look minor.5 Even intact pastures won’t survive the temperature extremes as carbon is literally baked out of remaining agricultural soils.

Resource wars between nuclear states will break out. War between the US and Russia is less likely than it was in the Cold War, but ascending superpowers like China will want their piece of the global resource pie. Nuclear powers such as India and Pakistan will be densely populated and ecologically precarious; climate change will dry up major rivers previously fed by melting glaciers, and hundreds of millions of people in South Asia will live bare meters above sea level. With few resources to equip and field a mechanized army or air force, nuclear strikes will seem an increasingly effective action for desperate states.

If resource wars escalate to nuclear wars, the effects will be severe, even in the case of a “minor” nuclear war between countries like India and Pakistan. Even if each country uses only fifty Hiroshima-sized bombs as air bursts above urban centers, a nuclear winter will result.6Although lethal levels of fallout last only a matter of weeks, the ecological effects will be far more severe. The five megatons of smoke produced will darken the sky around the world. Stratospheric heating will destroy most of what remains of the ozone layer.7 In contrast to the overall warming trend, a “little ice age” will begin immediately and last for several years. During that period, temperatures in major agricultural regions will routinely drop below freezing in summer. Massive and immediate starvation will occur around the world.

That’s in the case of a small war. The explosive power of one hundred Hiroshima-sized bombs accounts for only 0.03 percent of the global arsenal. If a larger number of more powerful bombs are used—or if cobalt bombs are used to produce long-term irradiation and wipe out surface life—the effects will be even worse.8 There will be few human survivors. The nuclear winter effect will be temporary, but the bombing and subsequent fires will put large amounts of carbon into the atmosphere, kill plants, and impair photosynthesis. As a result, after the ash settles, global warming will be even more rapid and worse than before.

Nuclear war or not, the long-term prospects are dim. Global warming will continue to worsen long after fossil fuels are exhausted. For the planet, the time to ecological recovery is measured in tens of millions of years, if ever.9 As James Lovelock has pointed out, a major warming event could push the planet into a different equilibrium, one much warmer than the current one.10 It’s possible that large plants and animals might only be able to survive near the poles.11 It’s also possible that the entire planet could become essentially uninhabitable to large plants and animals, with a climate more like Venus than Earth.

All that is required for this to occur is for current trends to continue without substantive and effective resistance. All that is required for evil to succeed is for good people to do nothing. But this future is not inevitable.

Image: public domain

Activist Guide to Security: Defeating Geolocation and Tracking

Activist Guide to Security: Defeating Geolocation and Tracking

     by Max Wilbert / Deep Green Resistance

We live in a surveillance state. As the Edward Snowden leaks and subsequent reporting has shown, government and private military corporations regularly target political dissidents for intelligence gathering. This information is used to undermine social movements, foment internecine conflict, discover weaknesses, and to get individuals thrown in jail for their justified resistance work.

As the idea of the panopticon describes, surveillance creates a culture of self-censorship. There aren’t enough people at security agencies to monitor everything, all of the time. Almost all of the data that is collected is never read or analyzed. In general, specific targeting of an individual for surveillance is the biggest threat. However, because people don’t understand the surveillance and how to defeat it, they subconsciously stop themselves from even considering serious resistance. In this way, they become self-defeating.

Surveillance functions primarily by creating a culture of paranoia through which the people begin to police themselves.

This is a guide to avoiding some of the most dangerous forms of location tracking. This information is meant to demystify tracking so that you can take easy, practical steps to mitigating the worst impacts. Activists and revolutionaries of all sorts may find this information helpful and should incorporate these practices into daily life, whether or not you are involved in any illegal action, as part of security culture.

About modern surveillance

We are likely all familiar with the extent of surveillance conducted by the NSA in the United States and other agencies such as the GCHQ in Britain. These organizations engage in mass data collection on a global scale, recording and storing every cell phone call, text message, email, social media comment, and other form of data they can get their hands on.

Our best defenses against this surveillance network are encryption, face-to-face networking and communication, and building legitimate communities of trust based on robust security culture.

Capitalism has expanded surveillance to every person. Data collection has long been big business, but the internet and smartphones have created a bonanza in data collection. Corporations regularly collect, share, buy, and sell information including your:

  • Home address
  • Workplace
  • Location tracking data
  • Businesses you frequent
  • Political affiliations
  • Hobbies
  • Family and relationship connections
  • Purchasing habits
  • And much more

Much of this information is available on the open marketplace. For example, it was recently reported that many police departments are purchasing location records from cell phones companies such as Verizon that show a record of every tower a given cell phone has connected to. By purchasing this information from a corporation, this allows police to bypass the need to receive a warrant—just one example of how corporations and the state collaborate to protect capitalism and the status quo.

Forms of location tracking

There are two main types of location tracking we are going to look at in this article: cell tower tracking and GPS geolocation.

Cell phone tracking

Whenever a cell phone connects to a cell tower, a unique device ID number is transmitted to the service provider. For most people, their cell phone is connected directly to their identity because they pay a monthly fee, signed up using their real name, and so on. Therefore, any time you connect to a cell network, your location is logged.

The more cell towers are located in your area, the more exact your location may be pinpointed. This same form of tracking applies to smartphones, older cell phones, as well as tablets, computers, cars, and other devices that connect to cell networks. This data can be aggregated over time to form a detailed picture of your movements and connections.

GPS tracking

Many handheld GPS units are “receiver only” units, meaning they can only tell you where you are located. They don’t actually send data to GPS satellites, they only passively receive data. However, this is not the case with all GPS devices.

For example, essentially every new car that is sold today includes built-in GPS geolocation beacons. These are designed to help you recover a stolen car, or call for roadside assistance in remote areas.

Additionally, many smartphones track GPS location data and store that information. The next time you connect to a WiFi or cell phone network, that data is uploaded and shared to external services. GPS tracking can easily reveal your exact location to within 10 feet.

Defeating location tracking

So how do we stop these forms of location tracking from being effective? There are five main techniques we can use, all of which are simple and low-tech.

(a) Don’t carry a cell phone. It’s almost a blasphemy in our modern world, but this is the safest way for activists and revolutionaries to operate.

(b) Use “burner” phones. A “burner” is a prepaid cell phone that can be purchased using cash at big-box stores like Wal-Mart. In the USA, only two phones may be purchased per person, per day. If it is bought with cash and activated using the Tor network, a burner phone cannot typically be linked to your identity.

WORD OF CAUTION: rumor has it that the NSA and other agencies run sophisticated voice identification algorithms via their mass surveillance networks. If you are in a maximum-security situation, you may need to use a voice scrambler, only use text messages, or take other precautions. Also note that burners are meant to be used for a short period of time, then discarded.

(c) Remove the cell phone battery. Cell phones cannot track your location if they are powered off. However, it is believed that spy agencies have the technical capability to remotely turn on cell phones for use as surveillance devices. To defeat this, remove the battery completely. This is only possible with some phones, which brings us to method number four.

(d) Use a faraday bag. A faraday bag (sometimes called a “signal blocking bag”) is made of special materials that block radio waves (WiFi, cell networks, NFC, and Bluetooth all are radio waves). These bags can be purchased for less than $50, and will block all signals while your phones or devices are inside. These bags are often used by cops, for example, to prevent remote wiping of devices in evidence storage. If you are ever arrested with digital devices, you may notice the cops place them in faraday bags.

WORD OF CAUTION: Modern smartphones include multiple sensors including a compass and accelerometer. There have been proof-of-concept experiments showing that a smartphone inside a faraday bag can still track your location by using these sensors in a form of dead reckoning. In high-security situations where you may be targeted individually, this is a real consideration.

(e) Don’t buy any modern car that includes GPS. Note that almost all rental cars contain GPS tracking devices as well. Any time a person is traveling for a serious action, it is safest to use an older vehicle. If you may be under surveillance, it is best to use a vehicle that is not directly connected to you or to the movement.

Conclusion

There are caveats here. I am not a technical expert, I am merely a revolutionary who is highly concerned about mass surveillance. Methods of location tracking are always evolving. And there are many methods.

This article doesn’t, for example, discuss the simple method of placing a GPS tracker on a car. These small magnetic devices can be purchased on the private market and attached to the bottom of any vehicle.

However, these basic principles can be applied across a wide range of scenarios, with some modification, to greatly increase your privacy and security.

Good luck!

Book Excerpt: Target Selection

Book Excerpt: Target Selection

Editor’s note: The following is from the chapter “Tactics and Targets” of the book Deep Green Resistance: A Strategy to Save the  Planet. This book is now available for free online.

     by Aric McBay

A good tactic used on a poor target has little effect.

The Field Manual on Guerrilla Warfare identifies four “important factors related to the target which influence its final selection,”10 later expanded to six with the CARVER matrix.13 These criteria are meant specifically for targets to be disrupted or destroyed, not necessarily when choosing potential targets for intelligence gathering or further investigation. The six criteria are as follows:

Criticality. How important is this target to the enemy and to enemy operations? “A target is critical when its destruction or damage will exercise a significant influence upon the enemy’s ability to conduct or support operations. Such targets as bridges, tunnels, ravines, and mountain passes are critical to lines of communication; engines, ties, and POL [petroleum, oil, and lubricant] stores are critical to transportation. Each target is considered in relationship to other elements of the target system.” Resistance movements (and the military) look for bottlenecks when selecting a target. And they make sure to think in big picture terms, rather than just in terms of a specific individual target. What target(s) can be disrupted or destroyed to cause maximum damage to the entire enemy system? Multiple concurrent surprise attacks are ideal for resistance movements, and can cause cascading failures.

Accessibility. How easy is it to get near the target? “Accessibility is measured by the ability of the attacker to infiltrate into the target area. In studying a target for accessibility, security controls around the target area, location of the target, and means of infiltration are considered.” It’s important to make a clear distinction between accessibility and vulnerability. For a resister in Occupied France, a well-guarded fuel depot might be explosively vulnerable, but not very accessible. For resisters in German-occupied Warsaw, the heavy wall surrounding the Warsaw Ghetto might be easily accessible, but not very vulnerable unless they carried powerful explosives. Good intelligence and reconnaissance are key to identifying and bypassing obstacles to access.

Recuperability. How much effort would it take to rebuild or replace the target? “Recuperability is the enemy’s ability to restore a damaged facility to normal operating capacity. It is affected by the enemy capability to repair and replace damaged portions of the target.” Specialized installations, hard-to-find parts, or people with special unique skills are difficult to replace. Targets with very common or mass-produced and stockpiled components would be poorer targets in terms of recuperability. Undermining enemy recuperability can be done with good planning and multiple attacks: SOE saboteurs were trained to target the same important parts on every machine. If they were to sabotage all of the locomotives in a stockyard, they would blow up the same part on each train, thus preventing the engineers from cannibalizing parts from other trains to make a working one.

Vulnerability. How tough is the target? “Vulnerability is a target’s susceptibility to attack by means available to [resistance] forces. Vulnerability is influenced by the nature of the target, i.e., type, size, disposition and composition.” In military terminology, a “soft target” is one that is relatively vulnerable, while a “hard target” is well defended or fortified. A soft target could be a sensitive electrical component, a flammable storage shed, or a person. A hard target might be a roadway, a concrete bunker, or a military installation. Hard targets require more capacity or armament to disable. A battle tank might have lower vulnerability when faced with a resister armed with a Molotov cocktail, but high vulnerability against someone armed with a rocket-propelled grenade.

Effect. Will a successful attack increase the chances of achieving larger goals? What consequences might result, intended and unintended? An attack on a pipeline might result in an oil spill, with collateral damage to life in the immediate vicinity. Escalation of sabotage might result in increased surveillance and repression of the general populace.

Recognizability. How difficult is it to identify the target during the operation, under different conditions of daylight, weather, and season? A brightly lit facility adjacent to a road is easy to locate, even at night, but it may be difficult to pick out a particular oil derrick owned by a particular company amidst acres of wells, or a specific CEO in a crowd of businesspeople.

From this perspective the ideal target would be highly critical (such that damage would cause cascading systems failures), highly vulnerable, very accessible and easy to identify, difficult and time-consuming to repair or replace, and unlikely to cause undesirable side effects. The poorest target would be of low importance for enemy operations but with high risk of negative side effects, hardened, inaccessible and hard to find, and easily replaced. You’ll note that there’s no category for “symbolic value” to the enemy, because the writers of the manual weren’t interested in symbolic targets. They consistently emphasize that successful operations will undermine the morale of the adversary, while increasing morale of the resisters and their supporters. The point is to carry out decisively effective action with the knowledge that such action will have emotional benefits for your side, not to carry out operations that seem emotionally appealing in the hopes that those choices will lead to effective action.

An additional criterion not discussed above would be destructivity. How damaging is the existence of the target to people and other living creatures? A natural gas–burning power plant might be more valuable based on the six criteria, but a coal-fired power plant could be more destructive, making it a higher priority from a practical and symbolic perspective.

It’s rare to find a perfect target. It’s more likely that choosing among targets will require certain trade-offs. A remote enemy installation might be more vulnerable, but it could also be more difficult to access and possibly less important to the adversary. Larger, more critical installations are often better guarded and less vulnerable. Target decisions have to be made in the context of the larger strategy, taking into account tactics and organizational capability.

One of the reasons that the Earth Liberation Front (ELF) has had limited decisive success so far is that its targets have had low criticality and high recuperability. New suburban subdivisions are certainly crimes against ecology, but partially constructed homes are not very important to those in power, and they are relatively replaceable. The effect is primarily symbolic, and it’s hard to find a case in which a construction project has actually been given up because of ELF activity—although many have certainly been made more expensive.

Most often, it seems that resistance targets in North America are chosen on the basis of vulnerability and accessibility, rather than on criticality. It’s easy to walk up to a Walmart window and smash it in the middle of the night or to destroy a Foot Locker storefront during a protest march. Aggressive symbolic attacks do get attention, and if a person’s main indicator of success is a furor on the 10:00 pm news, then igniting the local Burger King is likely to achieve that. But making a decisive impact on systems of power and their basis of support is more difficult to measure. If those in power are clever, they’ll downplay the really damaging actions to make themselves seem invulnerable, but scream bloody murder over a smashed window in order to whip up public opinion. And isn’t that what often happens on the news? If a biotech office is smashed and not a single person injured, the corporate journalists and pundits start pontificating about “violence” and “terrorism.” But if a dozen US soldiers are blown up by insurgents in Iraq, the White House press secretary will calmly repeat over and over that “America” is winning and that these incidents are only minor setbacks.

The Black Liberation Army (BLA) is an example of a group that chose targets in alignment with its goals. The BLA formed as an offshoot (or, some would argue, as a parallel development) of the Black Panther Party. The BLA was not interested in symbolic targets, but in directly targeting those who oppressed people of color. Writes historian Dan Berger: “The BLA’s Program included three components: retaliation against police violence in Black communities; elimination of drugs and drug dealers from Black communities; and helping captured BLA members escape from prison.”11 The BLA essentially believed that aboveground black organizing was doomed because of violent COINTELPRO-style tactics, and that the BPP had become a reformist organization. They argued that “the character of reformism is based on unprincipled class collaboration with our enemy.”12 In part because of their direct personal experience of violent repression at the hands of the state, they did not hesitate to kill white police officers in retaliation for attacks on the black community.

The IRA was also ruthless in their target selection, though they had limited choices in terms of attacking their occupiers. By the time WWII rolled around, resisters in Europe had a wide variety of potential and critical targets for sabotage, such as rail and telegraph lines, and further industrialization has only increased the number of critical mechanical targets, but a century ago, Ireland was hardly mechanized at all. That is why Michael Collins correctly identified British intelligence agents as the most critical and least recuperable targets available. Furthermore, his networks of spies and assassins made those agents—already soft targets—highly accessible. They were a perfect match for all six target selection criteria.

It’s worth noting that these six criteria are not just applicable to targets that are going to be destroyed. The same criteria are used to select “pressure points” on which to exert political force for any strategy of resistance, even one that is explicitly nonviolent. Effective strikes or acts of civil disobedience can exert more political force by disrupting more critical and vulnerable targets—the more accessible, the better.

These criteria for target selection go both ways. Our own resistance movements are targets for those in power, and it’s important to understand our organizations as potential targets. Leaders have often been attacked because they were crucial to the organization. Underground leaders are less accessible, but potentially more vulnerable if they can be isolated from their base of support. And aboveground groups often have better recuperability, because they have a larger pool to draw from and fewer training requirements; recall the waves after waves of civil rights activists willing to be arrested in Birmingham, Alabama.

Anyone who casts their lot with a resistance movement must be prepared for reprisals. Those reprisals will come whether the actionists are aboveground or underground, choosing violence or nonviolence. Many activists, especially from privileged backgrounds, naïvely assume that fighting fair will somehow cause those in power to do the same. Nothing could be further from the truth. The moment that any power structure feels threatened, it will retaliate. It will torture Buddhists and nuns, turn fire hoses on school children, and kill innocent civilians. A brief perusal of Amnesty International’s website will acquaint you with nonviolent protestors around the globe currently being detained and tortured or who have disappeared for simple actions like letter writing or peaceably demonstrating.

This is a reality that privileged people must come to terms with or else any movement risks a rupture when power comes down on actionists. Those retaliations are not anyone’s fault; they are to be expected. Any serious resistance movement should be intellectually and emotionally prepared for the power structure’s response. People are arrested, detained, and killed—often in large numbers—when power strikes back. Those who provide a challenge to power will be faced with consequences, some of them inhumanly cruel. The sooner everyone understands that, the better prepared we all will be to handle it.

Now, having discussed what makes good strategy, how resistance groups organize effectively, and what sort of culture resistance groups need to support them, it is time to take a deep breath. A real deep breath.

This culture is killing the planet. It systematically dispossesses sustainable indigenous cultures. Runaway global warming (and other toxic effects of this culture) could easily lead to billions of human deaths, and indeed the murder of the oceans, and even more, the effective destruction of this planet’s capacity to support life.

The question becomes: what is to be done?

Guide to Private and Secure Operating Systems

Guide to Private and Secure Operating Systems

     by Max Wilbert / Deep Green Resistance

We live inside an unprecedented surveillance state. Government and corporations monitor all non-encrypted digital communications for the purposes of political control and profit.

Political dissidents who wish to challenge capitalism need to learn to use more secure methods for communication, research, and other digital tasks. This guide is aimed at serious dissidents and revolutionaries. It is not aimed at the everyday activist, who will likely find these practices to be overkill.

Privacy vs. Security

It is important to understand that privacy and security are two different things. Privacy is related to anonymity. Security protects from eavesdropping, but does not necessarily anonymize.

To use an analogy: privacy means that the government doesn’t know who sent the message, but can read the contents. Security means they know who sent the message, but cannot read it. This is a simplified understanding, but it’s important to distinguish between the two.

In general, most aboveground activists who are already operating in the public sphere prioritize security. Underground operators and revolutionaries generally prioritize anonymity, since being unmasked and identified is the primary danger.  Of course, this is a generalization. Both security and privacy are important for anyone involved in anti-capitalist resistance.

Note that these tools require some relatively advanced technological skills. However, it’s worth learning to use these tools. Whonix is probably the easiest to use for a beginner.

Operating Systems

An operating system, or OS, is the basic software running on a computing device. Windows and Mac OS are the most common operating systems. However, Linux is the most secure family of operating systems. This guide will look at operating systems for desktop computer use.

The following information is copied from the websites for these projects.

TAILS

Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.

It is a complete operating system designed to be used from a USB stick or a DVD independently of the computer’s original operating system. It is Free Software and based on Debian GNU/Linux.

Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.

Tails relies on the Tor anonymity network to protect your privacy online:

  • all software is configured to connect to the Internet through Tor
  • if an application tries to connect to the Internet directly, the connection is automatically blocked for security.

Tor is an open and distributed network that helps defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Tor protects you by bouncing your communications around a network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Using Tor you can:

  • be anonymous online by hiding your location,
  • connect to services that would be censored otherwise;
  • resist attacks that block the usage of Tor using circumvention tools such as bridges.

To learn more about Tor, see the official Tor website, particularly the following pages:

  • Tor overview: Why we need Tor
  • Tor overview: How does Tor work
  • Who uses Tor?
  • Understanding and Using Tor — An Introduction for the Layman

Using Tails on a computer doesn’t alter or depend on the operating system installed on it. So you can use it in the same way on your computer, a friend’s computer, or one at your local library. After shutting down Tails, the computer will start again with its usual operating system.

Tails is configured with special care to not use the computer’s hard-disks, even if there is some swap space on them. The only storage space used by Tails is in RAM, which is automatically erased when the computer shuts down. So you won’t leave any trace on the computer either of the Tails system itself or what you used it for. That’s why we call Tails “amnesic”.

This allows you to work with sensitive documents on any computer and protects you from data recovery after shutdown. Of course, you can still explicitly save specific documents to another USB stick or external hard-disk and take them away for future use.

https://tails.boum.org/

Whonix

Whonix is a desktop operating system designed for advanced security and privacy. Whonix mitigates the threat of common attack vectors while maintaining usability. Online anonymity is realized via fail-safe, automatic, and desktop-wide use of the Tor network. A heavily reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP address leaks. Commonly used applications are pre-installed and safely pre-configured for immediate use. The user is not jeopardized by installing additional applications or personalizing the desktop. Whonix is under active development and is the only operating system designed to be run inside a VM and paired with Tor.

Whonix utilizes Tor’s free software, which provides an open and distributed relay network to defend against network surveillance. Connections through Tor are enforced. DNS leaks are impossible, and even malware with root privileges cannot discover the user’s real IP address. Whonix is available for all major operating systems. Most commonly used applications are compatible with the Whonix design.

https://www.whonix.org/

Qubes OS

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit it.

Why is OS security important?

Most people use an operating system like Windows or OS X on their desktop and laptop computers. These OSes are popular because they tend to be easy to use and usually come pre-installed on the computers people buy. However, they present problems when it comes to security. For example, you might open an innocent-looking email attachment or website, not realizing that you’re actually allowing malware (malicious software) to run on your computer. Depending on what kind of malware it is, it might do anything from showing you unwanted advertisements to logging your keystrokes to taking over your entire computer. This could jeopardize all the information stored on or accessed by this computer, such as health records, confidential communications, or thoughts written in a private journal. Malware can also interfere with the activities you perform with your computer. For example, if you use your computer to conduct financial transactions, the malware might allow its creator to make fraudulent transactions in your name.

Aren’t antivirus programs and firewalls enough?

Unfortunately, conventional security approaches like antivirus programs and (software and/or hardware) firewalls are no longer enough to keep out sophisticated attackers. For example, nowadays it’s common for malware creators to check to see if their malware is recognized by any signature-based antivirus programs. If it’s recognized, they scramble their code until it’s no longer recognizable by the antivirus programs, then send it out. The best of these programs will subsequently get updated once the antivirus programmers discover the new threat, but this usually occurs at least a few days after the new attacks start to appear in the wild. By then, it’s too late for those who have already been compromised. More advanced antivirus software may perform better in this regard, but it’s still limited to a detection-based approach. New zero-day vulnerabilities are constantly being discovered in the common software we all use, such as our web browsers, and no antivirus program or firewall can prevent all of these vulnerabilities from being exploited.

How does Qubes OS provide security?

Qubes takes an approach called security by compartmentalization, which allows you to compartmentalize the various parts of your digital life into securely isolated compartments called qubes.

This approach allows you to keep the different things you do on your computer securely separated from each other in isolated qubes so that one qube getting compromised won’t affect the others. For example, you might have one qube for visiting untrusted websites and a different qube for doing online banking. This way, if your untrusted browsing qube gets compromised by a malware-laden website, your online banking activities won’t be at risk. Similarly, if you’re concerned about malicious email attachments, Qubes can make it so that every attachment gets opened in its own single-use disposable qube. In this way, Qubes allows you to do everything on the same physical computer without having to worry about a single successful cyberattack taking down your entire digital life in one fell swoop.

Moreover, all of these isolated qubes are integrated into a single, usable system. Programs are isolated in their own separate qubes, but all windows are displayed in a single, unified desktop environment with unforgeable colored window borders so that you can easily identify windows from different security levels. Common attack vectors like network cards and USB controllers are isolated in their own hardware qubes while their functionality is preserved through secure networking, firewalls, and USB device management. Integrated file and clipboard copy and paste operations make it easy to work across various qubes without compromising security. The innovative Template system separates software installation from software use, allowing qubes to share a root filesystem without sacrificing security (and saving disk space, to boot). Qubes even allows you to sanitize PDFs and images in a few clicks. Users concerned about privacy will appreciate the integration of Whonix with Qubes, which makes it easy to use Tor securely, while those concerned about physical hardware attacks will benefit from Anti Evil Maid.

How does Qubes OS compare to using a “live CD” OS?

Booting your computer from a live CD (or DVD) when you need to perform sensitive activities can certainly be more secure than simply using your main OS, but this method still preserves many of the risks of conventional OSes. For example, popular live OSes (such as Tails and other Linux distributions) are still monolithic in the sense that all software is still running in the same OS. This means, once again, that if your session is compromised, then all the data and activities performed within that same session are also potentially compromised.

How does Qubes OS compare to running VMs in a conventional OS?

Not all virtual machine software is equal when it comes to security. You may have used or heard of VMs in relation to software like VirtualBox or VMware Workstation. These are known as “Type 2” or “hosted” hypervisors. (The hypervisor is the software, firmware, or hardware that creates and runs virtual machines.) These programs are popular because they’re designed primarily to be easy to use and run under popular OSes like Windows (which is called the host OS, since it “hosts” the VMs). However, the fact that Type 2 hypervisors run under the host OS means that they’re really only as secure as the host OS itself. If the host OS is ever compromised, then any VMs it hosts are also effectively compromised.

By contrast, Qubes uses a “Type 1” or “bare metal” hypervisor called Xen. Instead of running inside an OS, Type 1 hypervisors run directly on the “bare metal” of the hardware. This means that an attacker must be capable of subverting the hypervisor itself in order to compromise the entire system, which is vastly more difficult.

Qubes makes it so that multiple VMs running under a Type 1 hypervisor can be securely used as an integrated OS. For example, it puts all of your application windows on the same desktop with special colored borders indicating the trust levels of their respective VMs. It also allows for things like secure copy/paste operations between VMs, securely copying and transferring files between VMs, and secure networking between VMs and the Internet.

How does Qubes OS compare to using a separate physical machine?

Using a separate physical computer for sensitive activities can certainly be more secure than using one computer with a conventional OS for everything, but there are still risks to consider. Briefly, here are some of the main pros and cons of this approach relative to Qubes:

Pros

  • Physical separation doesn’t rely on a hypervisor. (It’s very unlikely that an attacker will break out of Qubes’ hypervisor, but if one were to manage to do so, one could potentially gain control over the entire system.)
  • Physical separation can be a natural complement to physical security. (For example, you might find it natural to lock your secure laptop in a safe when you take your unsecure laptop out with you.)

 

Cons

  • Physical separation can be cumbersome and expensive, since we may have to obtain and set up a separate physical machine for each security level we need.
  • There’s generally no secure way to transfer data between physically separate computers running conventional OSes. (Qubes has a secure inter-VM file transfer system to handle this.)
  • Physically separate computers running conventional OSes are still independently vulnerable to most conventional attacks due to their monolithic nature.
  • Malware which can bridge air gaps has existed for several years now and is becoming increasingly common.

(For more on this topic, please see the paper Software compartmentalization vs. physical separation.)

Get Qubes

Qubes OS is free to use, can run , and integrates with Whonix for secure web browsing and internet usage via Tor.

https://www.qubes-os.org/

Summary

  • TAILS is a “live” OS that runs from a USB stick or DVD, and can be used to browse anonymously from any computer. It doesn’t save files or history; it is designed mainly for ephemeral use.
  • Whonix is an OS made to run as a virtual machine, and provide security and anonymity for web browsing by routing all connections via the Tor browser.
  • Qubes OS is made to use as a permanent OS, and uses compartmentalization for security. Whonix is automatically installed inside Qubes. Used by Edward Snowden.

Image: Chris, https://www.flickr.com/photos/44730926@N07/32681532676, CC BY 2.0

Book Excerpt: Underground Tactics

Book Excerpt: Underground Tactics

Featured image: power line sabotaged by the African National Congress

Editor’s note: The following is from the chapter “Tactics and Targets” of the book Deep Green Resistance: A Strategy to Save the  Planet. This book is now available for free online.

     by Aric McBay

Some tactics can be carried out underground—like general liberation organizing and propaganda—but are more effective aboveground. Where open speech is dangerous, these types of tactics may move underground to adapt to circumstances. The African National Congress, in its struggle for basic human rights, should have been allowed to work aboveground, but that simply wasn’t possible in repressive apartheid South Africa.

And then there are tactics that are only appropriate for the underground, obligate underground operations that depend on secrecy and security. Escape lines and safehouses for persecuted persons and resistance fugitives are example of those operations. There’s a reason it’s called the “underground” railroad—it’s not transferable to the aboveground, because the entire operation is completely dependent on secrecy. Clandestine intelligence gathering is another case; the French Resistance didn’t gather enemy secrets by walking up to the nearest SS office and asking for a list of their troop deployments.

Some tactics are almost always limited to the underground:

  • Clandestine intelligence
  • Escape
  • Sabotage and attacks on materiel
  • Attacks on troops
  • Intimidation
  • Assassination

As operational categories, intelligence and escape are pretty clear, and few people looking at historical struggles will deny the importance of gathering information or aiding people to escape persecution. Of course, some abolitionists in the antebellum US didn’t support the Underground Railroad. And many Jewish authorities tried to make German Jews cooperate with registration and population control measures. In hindsight, it’s clear to us that these were huge strategic and moral mistakes, but at the time it may only have been clear to the particularly perceptive and farsighted.

Sabotage and attacks on materiel are overlapping tactics. Oftentimes, sabotage is more subtle; for example, machinery may be disabled without being recognized as sabotage. Attacks on materiel are often more overt efforts to destroy and disable the adversary’s equipment and supplies. In any case, they form an inclusive continuum, with sabotage on the more clandestine end of the scale.

It’s true that harm can be caused through sabotage, and that sabotage can be a form of violence. But allowing a machine to operate can also be more violent than sabotaging it. Think of a drift net. How many living creatures does a drift net kill as it passes through the ocean, regardless of whether it’s being used for fishing or not? Destroying a drift net—or sabotaging a boat so that a drift net cannot be deployed—would save countless lives. Sabotaging a drift net is clearly a nonviolent act. However, you could argue conversely that not sabotaging a drift net (provided you had the means and opportunity) is a profoundly violent act—indeed, violent not just for individual creatures, but violent on a massive, ecological scale. The drift net is an obvious example, but we could make a similar (if longer and more roundabout) argument for most any industrial machinery.

You’re opposed to violence? So where’s your monkey wrench?

Sabotage is not categorically violent, but the next few underground categories may involve violence on the part of resisters. Attacks on troops, intimidation, assassination, and the like have been used to great effect by a great many resistance movements in history. From the assassination of SS officers by escaping concentration camp inmates to the killing of slave owners by revolting slaves to the assassination of British torturers by Michael Collins’s Twelve Apostles, the selective use of violence has been essential for victory in a great many resistance and liberation struggles.

Attacks on troops are common where a politically conscious population lives under overt military occupation. In these situations, there is often little distinction between uniformed militaries, police, and government paramilitaries (like the Black and Tans or the miliciens). The violence may be secondary. Sometimes the resistance members are trying to capture equipment, documents, or intelligence; how many guerrillas have gotten started by killing occupying soldiers to get guns? Sometimes the attack is intended to force the enemy to increase its defensive garrisons or pull back to more defended positions and abandon remote or outlying areas. Sometimes the point is to demonstrate the strength or capabilities of the resistance to the population and the occupier. Sometimes the point is actually to kill enemy soldiers and deplete the occupying force. Sometimes the troops are just sentries or guards, and the primary target is an enemy building or facility.

Of course, for these attacks to happen successfully, they must follow the basic rules of asymmetric conflict and general good strategy. When raiding police stations for guns, the IRA chose remote, poorly guarded sites. Guerrillas like to go after locations with only one or two sentries, and any attack on those small sites forces the occupier to make tough choices: abandon an outpost because it can’t be adequately defended or increase security by doubling the number of guards. Either benefits the resistance and saps the resources of the occupier.

And although in industrial conflicts it’s often true that destroying materiel and disrupting logistics can be very effective, that’s sometimes not enough. Take American involvement in the Vietnam War. The American cost in terms of materiel was enormous—in modern dollars, the war cost close to $600 billion. But it wasn’t the cost of replacing helicopters or fueling convoys that turned US sentiment against the war. It was the growing stream of American bodies being flown home in coffins.

There’s a world of difference—socially, organizationally, psychologically—between fighting the occupation of a foreign government and the occupation of a domestic one. There’s something about the psychology of resistance that makes it easier for people to unite against a foreign enemy. Most people make no distinction between the people living in their country and the government of that country, which is why the news will say “America pulls out of climate talks” when they are talking about the US government. This psychology is why millions of Vietnamese people took up arms against the American invasion, but only a handful of Americans took up arms against that invasion (some of them being soldiers who fragged their officers, and some of them being groups like the Weather Underground who went out of their way not to injure the people who were burning Vietnamese peasants alive by the tens of thousands). This psychology explains why some of the patriots who fought in the French Resistance went on to torture people to repress the Algerian Resistance. And it explains why most Germans didn’t even support theoretical resistance against Hitler a decade after the war.

This doesn’t bode well for resistance in the minority world, where the rich and powerful minority live. People in poorer countries may be able to rally against foreign corporations and colonial dictatorships, but those in the center of empire contend with power structures that most people consider natural, familiar, even friendly. But these domestic institutions of power—be they corporate or governmental—are just as foreign, and just as destructive, as an invading army. They may be based in the same geographic region as we are, but they are just as alien as if they were run by robots or little green men.

Intimidation is another tactic related to violence that is usually conducted underground. This tactic is used by the “Gulabi Gang” (also called the Pink Sari Gang) of Uttar Pradesh, a state in India.4 Leader Sampat Pal Devi calls it “a gang for justice.” The Gulabi Gang formed as a response to deeply entrenched and violent patriarchy (especially domestic and sexual violence) and caste-based discrimination. The members use a variety of tactics to fight for women’s rights, but their “vigilante violence” has gained global attention. With over 500 members, they can exert considerable force. They’ve stopped child marriages. They’ve beaten up men who perpetrate domestic violence. The gang forced the police to register crimes against Untouchables by slapping police officers until they complied. They’ve hijacked trucks full of food that were going to be sold for a profit by corrupt officials. Their hundreds of members practice self-defense with the lathi (a traditional Indian stick or staff weapon). It’s no surprise their ranks are growing.

Gulabi Gang

Many of these examples tread the boundary of our aboveground-underground distinction. When struggling against systems of patriarchy that have closely allied themselves with governments and police (which is to say, virtually all systems of patriarchy), women’s groups that have been forced to use violence or the threat of violence may have to operate in a clandestine fashion at least some of the time. At the same time, the effects of their self-defense must be prominent and publicized. Killing a rapist or abuser has the obvious benefit of stopping any future abuses by that individual. But the larger beneficial effect is to intimidate other would-be abusers—to turn the tables and prevent other incidents of rape or abuse by making the consequences for perpetrators known. The Gulabi Gang is so popular and effective in part because they openly defy abuses of male power, so the effect on both men and women is very large. Their aboveground defiance rallies more support than they could by causing abusive men to die in a series of mysterious accidents. The Black Panthers were similarly popular because they publically defied the violent oppression meted out by police on a daily basis. And by openly bearing arms, they were able to intimidate the police (and other people, like drug dealers) into reducing their abuses.

There are limits to the use of intimidation on those in power. The most powerful people are the most physically isolated—they might have bodyguards or live in gated houses. They have far more coercive force at their fingertips than any resistance movement. For that reason, resistance groups have historically used intimidation primarily on low-level functionaries and collaborators who give information to those in power when asked or who cooperate with them in a more limited way.

It’s important to acknowledge the distinction between intimidation and terrorism. Terrorism consists of violent attacks on civilians. Resistance intimidation directly targets those responsible for oppressive and exploitative acts and power structures, and lets those people know that there are consequences for their actions. The reason it gets people so riled up is because it involves violence (or the threat of violence) going up the hierarchy. But resistance intimidation is ultimately, of course, an attempt to reduce violence. Groups like the Gulabi Gang beat abusive men instead of just killing them. There’s a reasonable escalation that gives men a chance to stop their wrongdoing and also makes the consequences for further wrongdoing clear. Rape and domestic abuse are terrorism; they’re senseless and unprovoked acts of violence against unarmed civilians, designed to threaten and terrorize women (and men) into compliance. The intimidation of rapists or domestic abusers is one tactic that can be used to stop their violence while employing the minimum amount of violence possible.

No resistance movement wants to engage in needless cycles of violence and retribution with those in power. But a refusal to employ violent tactics when they are appropriate will very likely lead to more violence. Many abolitionists did not support John Brown because they considered his plan for a defensive liberation struggle to be too violent—but Brown’s failure led inevitably to a lengthy and gruesome Civil War (as well as continued years of bloody slavery), a consequence that was orders of magnitude more violent than Brown’s intended plan.

This leads us to the last major underground tactic: assassination.

In talking about assassination (or any attack on humans) in the context of resistance, two key questions must be asked. First, is the act strategically beneficial, that is, would assassination further the strategy of the group? Second, is the act morally just, given the person in question? (The issue of justice is necessarily particular to the target; it’s assumed that the broader strategy incorporates aims to increase justice.)

As is shown on my two-by-two grid of all combinations, an assassination may be strategic and just, it may be strategic and unjust, it may be unstrategic but just, or it may be both unstrategic and unjust. Obviously, any action in the last category would be out of the question. Any action in the strategic and just category could be a good bet for an armed resistance movement. The other two categories are where things get complex.

Figure 13-3

Hitler exemplified a number of different strategy vs. justice combinations at different points in time. It’s a common moral quandary to ask whether it would be a good idea to go back in time and kill Hitler as a child, provided time travel were possible. There’s a good bet that this would have averted World War II and the Holocaust, which would have been a good thing, so put a check mark in the “strategic” column. The problem is that most people would consider it unjust to murder an innocent child who had yet to commit any crimes, so it would be difficult to call that action just in the immediate sense.

Once Hitler had risen to power in the late 1930s, though, his aim was clear, as he had already been whipping up hate and expanding his control of Nazi Germany. At that point, it would have been both strategic and just to assassinate him. Indeed, elements in the Wehrmacht (army) and the Abwehr (intelligence) considered it, because they knew what Hitler was planning to do. Unfortunately, they were indecisive, and did not commit to the plan. Hitler soon began invading Germany’s neighbors, and as his popularity soared, the assassination plan was shelved. It was years before inside elements would actually stage an assassination attempt.

Figure 13-4

That famous attempt took place—and failed—on July 20, 1944.5What’s interesting is that the Allies were also considering an attempt on Hitler’s life, which they called Operation Foxley. They knew that Hitler routinely went on walks alone in a remote area, and devised a plan to parachute in two operatives dressed as German officers, one of them a sniper, who would lay in wait and assassinate Hitler when he walked by. The plan was never enacted because of internal controversy. Many in the SOE and British government believed that Hitler was a poor strategist, a maniac whose overreach would be his downfall. If he were assassinated, they believed, his replacement (likely Himmler) would be a more competent leader, and this would draw out the war and increase Allied losses. In the opinion of the Allies it was unquestionably just to kill Hitler, but no longer strategically beneficial.

There is no shortage of situations where assassination would have been just, but of questionable strategic value. Resistance groups pondering assassination have many questions to ask themselves in deciding whether they are being strategic or not. What is the value of this potential target to the enemy? Is this an exceptional person or does his or her influence come from his or her role in the organization? Who would replace this person, and would that person be better or worse for the struggle? Will it make any difference on an organizational scale or is the potential target simply an interchangeable cog? Uniquely valuable individuals make uniquely valuable targets for assassination by resistance groups.

Of course, in a military context (and this overlaps with attacks on troops), snipers routinely target officers over enlisted soldiers. In theory, officers or enlisted soldiers are standardized and replaceable, but, in practice, officers constitute more valuable targets. There’s a difference between theoretical and practical equivalence; there might be other officers to replace an assassinated one, but the replacement might not arrive in a timely manner nor would he have the experience of his predecessor (experience being a key reason that Michael Collins assassinated intelligence officers). That said, snipers don’t just target officers. Snipers target any enemy soldiers available, because war is essentially about destroying the other side’s ability to wage war.

The benefits must also outweigh costs or side effects. Resistance members may be captured or killed in the attempt. Assassination also provokes a major response—and major reprisals—because it is a direct attack on those in power. When SS boss Reinhard Heydrich (“the butcher of Prague”) was assassinated in 1942, the Nazis massacred more than 1,000 Czech people in response. In Canada, martial law (via the War Measures Act) has only ever been declared three times—during WWI and WWII, and again after the assassination of the Quebec Vice Premier of Quebec by the Front de Libération du Québec. Remember, aboveground allies may bear the brunt of reprisals for assassinations, and those reprisals can range from martial law and police crackdowns to mass arrests or even executions.

There’s an important distinction to be made between assassination as an ideological tactic versus as a military tactic. As a military tactic, employed by countless snipers in the history of war, assassination decisively weakens the adversary by killing people with important experience or talents, weakening the entire organization. Assassination as an ideological tactic—attacking or killing prominent figures because of ideological disagreements—almost always goes sour, and quickly. There are few more effective ways to create martyrs and trigger cycles of violence without actually accomplishing anything decisive. The assassination of Michael Collins, for example, by his former allies led only to bloody civil war.

DECISIVE OPERATIONS UNDERGROUND

Individuals working underground focus mostly on small-scale acts of sabotage and subversion that make the most of their skill and opportunity. Because they lack escape networks, and because they must be opportunistic, it’s ideal for their actions to be what French resisters called insaisissable–untraceable or appearing like an accident—unless the nature of the action requires otherwise.

Individual saboteurs are more effective with some informal coordination—if, for example, a general day of action has been called. It also helps if the individuals seize an opportunity by springing into action when those in power are already off balance or under attack, like the two teenaged French girls who sabotaged trains carrying German tanks after D-Day, thus hampering the German ability to respond to the Allied landing.

One individual resister who attempted truly decisive action was Georg Elser, a German-born carpenter who opposed Hitler from the beginning. When Hitler started the World War II in 1939, Elser resolved to assassinate Hitler. He spent hours every night secretly hollowing out a hidden cavity in the beer hall where Hitler spoke each year on the anniversary of his failed coup. Elser used knowledge he learned from working at a watch factory to build a timer, and planted a bomb in the hidden cavity. The bomb went off on time, but by chance Hilter left early and survived. When Elser was captured, the Gestapo tortured him for information, refusing to believe that a single tradesperson with a grade-school education could come so close to killing Hitler without help. But Elser, indeed, worked entirely alone.

Underground networks can accomplish decisive operations that require greater coordination, numbers, and geographic scope. This is crucial. Large-scale coordination can turn even minor tactics—like simple sabotage—into dramatically decisive events. Underground saboteurs from the French Resistance to the ANC relied on simple techniques, homemade tools, and “appropriate technology.” With synchronization between even a handful of groups, these underground networks can make an entire economy grind to a halt.

The change is more than quantitative, it’s qualitative. A massively coordinated set of actions is fundamentally different from an uncoordinated set of the same actions. Complex systems respond in a nonlinear fashion. They can adapt and maintain equilibrium in the face of small insults, minor disruptions. But beyond a certain point, increasing attacks undermine the entire system, causing widespread failure or collapse.

Because of this, coordination is perhaps the most compelling argument for underground networks over mere isolated cells. I’ll discuss coordinated actions in more detail in the next chapter: Decisive Ecological Warfare.

SUSTAINING OPERATIONS UNDERGROUND

Since individuals working underground are pretty much alone, they have very few options for sustaining operations. They may potentially recruit or train others to form an underground cell. Or they may try to make contact with other people or groups (either underground or aboveground) to work as an auxiliary of some kind, such as an intelligence source, especially if they are able to pass on information from inside a government or corporate bureaucracy. But making this connection is often very challenging.

Individual escape and evasion may also be a decisive or sustaining action, at least on a small scale. Antebellum American slavery offers some examples. In a discussion of slave revolts, historian Deborah Gray White explains, “[I]ndividual resistance did not overthrow slavery, but it might have encouraged masters to make perpetual servitude more tolerable and lasting. Still, for many African Americans, individual rebellions against the authority of slaveholders fulfilled much the same function as did the slave family, Christianity, and folk religion: it created the psychic space that enabled Black people to survive.”6

Historian John Michael Vlach observes: “Southern plantations actually served as the training grounds for those most inclined to seek their freedom.” Slaves would often escape for short periods of time as a temporary respite from compelled labor before returning to plantations, a practice often tolerated by owners. These escapes provided opportunities to build a camp or even steal and stock up on provisions for another escape. Sometimes slaves would use temporary escapes as attempts to compel better behavior from plantation owners.7 In any case, these escapes and minor thefts helped to build a culture of resistance by challenging the omnipotence of slave owners and reclaiming some small measure of autonomy and freedom.

Individuals have some ability to assert power, but recruitment is key in underground sustaining operations. A single cell can gather or steal equipment and supplies for itself, but it can’t participate in wider sustaining operations unless it forms a network by recruiting organizationally, training new members and auxiliaries, and extending into new cells. One underground cell is all you need to create an entire network. Creating the first cell—finding those first few trusted comrades, developing communications and signals—is the hardest part, because other cells can be founded on the same template, and the members of the existing cell can be used to recruit, screen, and train new members.

Even though it’s inherently difficult for an underground group to coordinate with other distinct underground groups, it is possible for an underground cell to offer supporting operations to aboveground campaigns. It was an underground group—the Citizen’s Commission to Investigate the FBI—that exposed COINTELPRO, and allowed many aboveground groups to understand and counteract the FBI’s covert attacks on them. And the judicious use of sabotage could buy valuable time for aboveground groups to mobilize in a given campaign.

There are clearly campaigns in which aboveground groups have no desire for help from the underground, in which case it’s best for the underground to focus on other projects. But the two can work together on the same strategy without direct coordination. If a popular aboveground campaign against a big-box store or unwanted new industrial site fails because of corrupt politicians, an underground group can always pick up the slack and damage or destroy the facility under construction. Sometimes people argue that there’s no point in sabotaging anything, because those in power will just build it again. But there may come a day when those in power start to say “there’s no point in building it—they’ll just burn it down again.”

Underground cells may also run a safehouse or safehouses for themselves and allies. Single cells can’t run true underground railroads, but even single safehouses are valuable in dealing with repression or persecution. A key challenge in underground railroads and escape lines is that the escapees have to make contact with underground helpers without exposing themselves to those in power. Larger, more “formalized” underground networks have specialized methods and personnel for this, but a single cell running a safehouse may not. If an underground cell is conscientious, its members will be the only ones aware that the safehouse exists at all, which puts the burden on them to contact someone who requires refuge.

Mass persecution and repression has happened enough times in history to provide a wealth of examples where this would be appropriate. The internment of Japanese Canadians during World War II is quite well-known. Less well-known is the internment of hundreds of leftist radicals and labor activists starting in 1940. Leading activists associated with certain other ethnic organizations (especially Ukrainian), the labor movement, and the Communist party were arrested and sent to isolated work camps in various locations around Canada. A few managed to go into hiding, at least temporarily, but the vast majority were captured and sent to the camps, where a number of them died.8 In a situation like that, an underground cell could offer shelter to a persecuted aboveground activist or activists on an invitational basis without having to expose themselves openly.

Many of these operations work in tandem. Resistance networks from the SOE to the ANC have used their escape lines and underground railroads to sneak recruits to training sites in friendly areas and then infiltrated those people back into occupied territory to take up the fight.

Underground networks may be large enough to create “areas of persistence” where they exert a sizeable influence and have developed an underground infrastructure rooted in a culture of resistance. If an underground network reaches a critical mass in a certain area, it may be able to significantly disrupt the command and control systems of those in power, allowing resisters both aboveground and underground a greater amount of latitude in their work.

There are a number of examples of resistance movements successfully creating areas of persistence. The Zapatistas in Mexico exert considerable influence in Chiapas, so much so that they can post signs to that effect. “You are in Zapatista rebel territory” proclaims one typical sign (translated from Spanish). “Here the people give the orders and the government obeys.” The posting also warns against drug and alcohol trafficking or use and against the illegal sale of wood. “No to the destruction of nature.”9 Other Latin American resistance movements, such as the FMLN in El Salvador and the Sandinistas in Nicaragua, created areas of persistence in Latin America in the late twentieth century. Hamas in Palestine and Hezbollah in Lebanon have similarly established large areas of persistence in the Middle East.

SHAPING OPERATIONS UNDERGROUND

Because working underground is dangerous and difficult, effective resisters mostly focus on decisive and sustaining operations that will be worth their while. That said, there are still some shaping operations for the underground.

This includes general counterintelligence and security work. Ferreting out and removing informers and infiltrators is a key step in allowing resistance organizations of every type to grow and resistance strategies to succeed. Neither the ANC nor the IRA were able to win until they could deal effectively with such people.

Underground cells can also carry out some specialized propaganda operations. For reasons already discussed, propaganda in general is best carried out by aboveground groups, but there are exceptions. In particularly repressive regimes, basic propaganda and education projects must move underground to continue to function and protect identities. Underground newspapers and forms of pirate radio are two examples. Entire, vast underground networks have been built on this principle. In Soviet Russia, samizdat was the secret copying of and distribution of illegal or censored texts. A person who received a piece of illegal literature—say, Vaclav Havel’s Power of the Powerless—was expected to make more copies and pass them on. In a pre–personal computer age, in a country where copy machines and printing presses were under state control, this often meant laboriously copying books by hand or typewriter.

Underground groups may also want to carry out certain high-profile or spectacular “demonstration” actions to demonstrate that underground resistance is possible and that it is happening, and to offer a model for a particular tactic or target to be emulated by others. Of course, demonstrative actions may be valuable, but they can also degrade into symbolism for the sake of symbolism. Plenty of underground groups, the Weather Underground included, hoped to use their actions to “ignite a revolution.” But, in general—and especially when “the masses” can’t be reasonably expected to join in the fight—underground groups must get their job done by being as decisive as possible.

Editor’s note: continue reading at Target Selection.