By Dave Maass and Matthew Guariglia / November 19, 2020 / Electronic Frontier Foundation A few years ago, when you saw a security camera, you may have thought that the video feed went to a VCR somewhere in a back office that could only be accessed when a crime occurs. Or maybe you imagined a … Continue reading How Modern Video Surveillance Works→
This article introduces a basic guide of generally accepted “security codes” for movements which can be applied in a variety of direct action, protest, and event situations. More articles related to security can be accessed here. These include topics like physical security for events, operational security, geolocation and tracking and many more. By Max Wilbert … Continue reading Introduction to Security Codes→
Vigilante, paramilitary, and state violence against resistance movements is on the rise. Around the world, regressive forces are violently resisting social movements for justice and sustainability, or using intimidation to create fear. Our movements must prepare for this. This post includes a training on how to protect protests, events, and locations from violent attacks and … Continue reading Physical Security for Events / Actions→
This story is dated from 2014, but still provides a critical insight into the operations of federal intelligence agencies to discredit and disrupt social movements. We recommend activists and revolutionaries carefully study this information. By Glenn Greenwald / The Intercept One of the many pressing stories that remains to be told from the Snowden archive … Continue reading How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations→
Editor’s note: Signal provides good protection against dragnet surveillance, but the capabilities of state agencies and large corporations probably allow them to bypass the security provided by apps like this in targeted cases. In other words, Signal is not bulletproof. If your device is compromised, your message are compromised. We recommend Signal and other end-to-end … Continue reading Signal For Beginners→
Anytime you browse the internet, your ISP (Internet Service Provider), government agencies such as the NSA and GCHQ, and most of the websites you visit are tracking everything you do. This data is often used to generate profiles of individuals preferences, purchasing behavior, travel, habits, etc, then packaged and sold to marketing companies, political advertisers, … Continue reading How to Browse the Internet Anonymously→
by Liam Campbell What Is GDPR? GDPR is a European legal framework intended to protect personal data, provide greater data transparency, and give people greater control over their data. It requires any group that stores or processes data to follow strict policies to ensure security. It also entitles individuals to request personal data reports and … Continue reading Weaponising Europe’s General Data Protection Regulations→
Editor’s note: DGR acknowledges that Extinction Rebellion and Extinction Rebellion Ireland are valuable and necessary contributors to a broader ecosystem of activism. The analysis in this article is relevant for many movements and it’s republished from Medium with permission from the author. Image credit: Truthout.org on Flickr by Roderick Campbell Extinction Rebellion Ireland (XRI) is … Continue reading Extinction Rebellion: Security Analysis of Ireland’s Movement→
Editor’s note: this article contains extensive excerpts from the Irish Republican Army’s Green Book, one of their key training documents during their 20th-century struggle against British occupation. Written by Liam Campbell “Don’t be seen in public marches, demonstrations or protests. Don’t be seen in the company of known Republicans, don’t frequent known Republican houses. Your … Continue reading Lessons from the Irish Republican Army’s Green Book→
Here at Deep Green Resistance, we are an “aboveground” organization with a firewall between us and underground action. That means that our primary work is legal (although this varies depending on national laws). Our members also take part in non-violent direct action of the sort common among aboveground movements. This is in contrast with “underground” … Continue reading The Firewall: Assata on This Essential Security Measure→