Tags Archives: Security culture

Introduction to Security Codes

This article introduces a basic guide of generally accepted “security codes” for movements which can be applied in a variety of direct action, protest, and event situations. More articles related to security can be accessed here. These include topics like physical security for events, operational security, geolocation and tracking and many more. By Max Wilbert … Continue reading Introduction to Security Codes

Physical Security for Events / Actions

Vigilante, paramilitary, and state violence against resistance movements is on the rise. Around the world, regressive forces are violently resisting social movements for justice and sustainability, or using intimidation to create fear. Our movements must prepare for this. This post includes a training on how to protect protests, events, and locations from violent attacks and … Continue reading Physical Security for Events / Actions

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

This story is dated from 2014, but still provides a critical insight into the operations of federal intelligence agencies to discredit and disrupt social movements. We recommend activists and revolutionaries carefully study this information. By Glenn Greenwald / The Intercept One of the many pressing stories that remains to be told from the Snowden archive … Continue reading How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Signal For Beginners

Editor’s note: Signal provides good protection against dragnet surveillance, but the capabilities of state agencies and large corporations probably allow them to bypass the security provided by apps like this in targeted cases. In other words, Signal is not bulletproof. If your device is compromised, your message are compromised. We recommend Signal and other end-to-end … Continue reading Signal For Beginners

How to Browse the Internet Anonymously

Anytime you browse the internet, your ISP (Internet Service Provider), government agencies such as the NSA and GCHQ, and most of the websites you visit are tracking everything you do. This data is often used to generate profiles of individuals preferences, purchasing behavior, travel, habits, etc, then packaged and sold to marketing companies, political advertisers, … Continue reading How to Browse the Internet Anonymously

Weaponising Europe’s General Data Protection Regulations

by Liam Campbell What Is GDPR? GDPR is a European legal framework intended to protect personal data, provide greater data transparency, and give people greater control over their data. It requires any group that stores or processes data to follow strict policies to ensure security. It also entitles individuals to request personal data reports and … Continue reading Weaponising Europe’s General Data Protection Regulations

Extinction Rebellion: Security Analysis of Ireland’s Movement

Editor’s note: DGR acknowledges that Extinction Rebellion and Extinction Rebellion Ireland are valuable and necessary contributors to a broader ecosystem of activism. The analysis in this article is relevant for many movements and it’s republished from Medium with permission from the author. Image credit: Truthout.org on Flickr by Roderick Campbell Extinction Rebellion Ireland (XRI) is … Continue reading Extinction Rebellion: Security Analysis of Ireland’s Movement

Lessons from the Irish Republican Army’s Green Book

Editor’s note: this article contains extensive excerpts from the Irish Republican Army’s Green Book, one of their key training documents during their 20th-century struggle against British occupation. Written by Liam Campbell “Don’t be seen in public marches, demonstrations or protests. Don’t be seen in the company of known Republicans, don’t frequent known Republican houses. Your … Continue reading Lessons from the Irish Republican Army’s Green Book

The Firewall: Assata on This Essential Security Measure

Here at Deep Green Resistance, we are an “aboveground” organization with a firewall between us and underground action. That means that our primary work is legal (although this varies depending on national laws). Our members also take part in non-violent direct action of the sort common among aboveground movements. This is in contrast with “underground” … Continue reading The Firewall: Assata on This Essential Security Measure

The Green Flame Podcast, Episode 3: COINTELPRO and Security Culture

On this episode of the Green Flame, we speak with Claude Marks, former political prisoner and activist, director of the Freedom Archives, about COINTELPRO and state repression of revolutionary movements. We hear from Will Falk, activist, radical movement lawyer and writer, about security culture. And for our skill, we focus on operational security. This show … Continue reading The Green Flame Podcast, Episode 3: COINTELPRO and Security Culture