securebooklet

Document Sample
securebooklet Powered By Docstoc
					        Security Culture:
     a handbook for activists




28                              1
                                                                                                  Rights
                                                                              5. ANYTHING YOU SAY TO THE POLICE MAY BE
                                                                              USED AGAINST YOU AND OTHER PEOPLE. Once
                                                                              you've been arrested, you can't talk you way out of it.
                                                                              Don't try to engage cops in a dialogue or respond to
                                                                              accusations.

                                                                              6. YOU DO NOT HAVE TO REVEAL YOUR HIV STA-
                                                                              TUS TO THE POLICE OR JAIL PERSONNEL. If
                                                                              you've been arrested you should refuse to take a blood
                                                                              test until you've been brought before a judge and
                                                                              have a lawyer of your choice.

                                                                              7. YOU HAVE A RIGHT TO TELEPHONE A LAWYER
                                                                              OF YOUR CHOICE AS SOON AS POSSIBLE. This
                                                                              means after you've been arrested, charged and booked
                                                                              into jail. This does not mean however, that you'll be
                                                                              given the right to speak with you family and friends.
                                                                              This is left up to the discretion of the police involved in
                                                                              your case.

                                                                              8. LYING TO THE POLICE IS A CRIME.

                                                                              9. IF YOU ARE NERVOUS ABOUT SIMPLY REFUS-
                                                                              ING TO TALK, YOU MAY FIND IT EASIER TO TELL
                                                                              THEM TO CONTACT YOUR LAWYER. Once a lawyer
                                                                              is involved, people will know more about your state i.e.
This handbook is the third edition of what we has been an evolving and        charges, bail, court date, etc.
growing document dealing with security issues and canadian activism.
We would like to say a big thanks to the Collective Opposing Police
Brutality in Montreal for editing some of the text of the original pamphlet
and adding so many great examples to the Informants and Infiltrators
section. We have replicated many of their changes in this edition.Thanks
also goes out to Eric Drooker whose artwork we used throughout this
pamphlet.

For more information or to make contributions to this document - please
email securitysite@tao.ca

Third edition - prepared November 2001.
2                                                                                                                                        27
                                                                 Introduction:

                        Your                                     Resistance has been on the rise for the past few
                                                                 years, with activists adopting more and more effective
                                                                 tactics for fighting back. Our increased activity and
     1. YOU DON'T HAVE TO TALK TO THE POLICE OR                  effectiveness has meant that the RCMP, FBI, and
     INVESTIGATORS. You do not have to talk to them on           local police have continued to escalate their activities
     the street, if you've been arrested, or even if you're in   against us. As well, the events of September 11th and
     jail. Do not talk about illegal actions with fellow “in-
     mates” in holding as they may be plants.                    ensuing state hysteria are no small footnote to the
                                                                 way that our radical and revolutionary movements
     2. YOU DON'T HAVE TO LET CSIS OR THE POLICE                 have and will be targeted by repressive state forces.
     INTO YOUR HOME OR OFFICE UNLESS THEY
     HAVE A SEARCH OR ARREST WARRANT. Demand
     to see the warrant. It must specificallydescribe the        If we want our direct action movement to continue, it
     place to be searched and things to be seized. It must       is imperative we start tightening our security and
     be authorized by a judge and should bear a signature.
                                                                 taking ourselves more seriously. Now is the time to
     3. IF THE POLICE DO PRESENT A WARRANT, YOU                  adopt a security culture. Good security is certainly the
     DO NOT HAVE TO TELL THEM ANYTHING OTHER                     strongest defense we have.
     THAN YOU NAME, ADDRESS AND BIRTH DATE.
     Carefully observe the officers; you're in your own
     home you're not required to stay in one room. You           This is a handbook for the Canadian activist who is
     should take written notes of what they do, their            interested in creating and maintaining security
     names, badge numbers, and what agency they're               awareness and culture in the radical movements. We
     from. Have friends who are present act as witnesses.
     It's risky to let cops roam around alone in your place.     are always looking for contributions - so please feel
                                                                 free to email securitysite@tao.ca with any images or
     4. IF THE POLICE TRY TO QUESTION YOU OR TRY                 text you think belong in a handbook such as this.
     TO ENTER YOUR HOME WITHOUT A WARRANT,
     JUST SAY NO. The police are very skilled at getting
     information from people, so attempting to outwit them       This is the third edition of this zine that we have put
     is very risky. You can never tell how a seemingly           out in order to add and improve on the original text
     harmless bit of information can hurt you or someone
     else.                                                       (thanks for the work of the Collective Opposing Police
                                                                 Brutality in Montreal for their help). There will be
                                                                 future editions of this handbook so keep putting
                                                                 forward suggestions to us.

                                                                 We hope that you will put the material contained
                                                                 within to good use. Now more than ever is the time to
                                                                 act!


26                                                                                                                      3
    of the agent will accomplish an        connection with the agent it is
    effective neutralization. But if the   certainly the group's responsibil-
    agent is no great threat to the        ity to quietly contact leadership
    group's functioning, the agent         in other groups to warn them
    staying inside the group may be        about the agent. Often public
    useful for other purposes.             exposure is done through the
                                           group's newspaper/newsletter/
    The group might decide that            journal; in this case, the news
    they prefer to keep the agent,         article should be sent to a wide
    rather than risk not knowing who       variety of groups. The more
    would replace a known quantity.        pressing problem is the instance
    It the agent is not in a sensitive     where there are only suspicions
    position, can be monitored and         but not decisive evidence.
    isolated from important work, the
    group may want to keep such an         Experience has shown that
    agent at a low organizational          suspicions are taken seriously
    level. Or the agent might be           only when then is a political
    given tasks that seem to be            bond that exists between
    sensitive but are in reality not       persons with long movement
    crucial to the group. Under the        experience. People who have
    cover of doing "sensitive" work,       been in the movement a long
    false and semi-false information       time, and who are known to
    about the group can be relayed         each other and trusted as
    to the intelligence agencies that      dedicated movement people,
    the agent belongs to. Or per-          can convey agent suspicions
    haps certain information that is       that will get a favorable hearing
    in fact true about the group can       or be readily believed. This "old
    be willfully discredited by crea-      hands trust network" is relatively
    tion of pseudo-events and/or           independent of political point of
    false information. Remember            view; veteran leaders of rival
    that when the intelligence             radical organizations can freely
    agencies have a great deal of          and easily exchange information
    contradictory information, it          on matters of security.
    decreases their ability to act
    decisively against the group.

    (d) What are the responsibilities
    to other groups of the group's
    knowledge of an informer? If the
    group makes a decision to sever


4                                                                        25
         MOVING AGAINST INFORMERS:
                                                                              Sec uri t y
                                                                          What it is, why we need it
      CONSIDERATIONS AND ALTERNATIVES
                                                                          and how to implement it...              C ult ure
(Taken from PROTECTING OURSELVES FROM STATE REPRESSION:
A MANUAL FOR REVOLUTIONARY ACTIVISTS. Published in 1984 by
the Anti-Repression Resource Team - Jackson, Mississippi)                 A CTIV ISM A ND STATE              ments that are militant and
                                                                          REPRESSION                         movements that are markedly
                                                                                                             pacifist. The government's
Assuming that the security           (b) What will be done if the         This pamphlet has essential        security machinery serves the
people within the group have         information is inconclusive?         information for anyone asso -      elitist political and economic
suspicions about a group             Often there is not enough            ciated with groups advocating      objectives of capitalism. There
member being an informer/            evidence to confirm that some-       or using economic disruption       are over 250 political prison-
provocateur, it is useful for        one is a police agent, but there     or sabotage, theft, arson, self-   ers in Canada and the US that
security/leadership to resolve       IS enough evidence to confirm        defence from police or more        can testify to this from first-
certain questions both before        certain suspicions. A great deal     militant tactics. The advice       hand experience. By adopting
and after the investigation:         will depend upon what is at          that followsalso applies to        a security culture, we can limit
                                     stake with the person under          anyone associated with             or neutralize counter-intell-
(a) How badly do you want to         suspicion. In general, the           groups practising civil dis-       igence operations meant to
know whether the person is in                                             obedience, especially since        disrupt our political organ-
                                     choices come down to
agent or not? Clearly, if the                                             people often work in several       izing, be it mainstream or
                                     1) labelling the person a security
person under suspicion is                                                 groups at the same time and        underground.
                                     risk and acting accordingly;
relatively important to the                                               gossip travels freely between
                                     2) doing nothing outwardly but       them.                              Peasant-rebels; communards;
group's functioning, then leader-    continuing the investigation;
ship must know one way or the                                                                                liberationists; abolitionists;
                                     3) isolating the person from         Even if you've never
other. The more important the                                                                                labour organizers; revolut-
                                     sensitive work but keeping him       expressed your politics by
person under suspicion is to the                                                                             ionaries; from large uprisings
                                     or her in the group;                 doing property damage,
group, the more intensive the                                                                                challenging the entire political
                                     4) moving to a higher stage of       pitching cobblestones, or          structure, to isolated environ-
investigation. We may suggest        investigation.                       getting arrested for civil         mental and social struggles,
methods of investigation which                                            disobedience; even if you          people have constantly worked
are unorthodox and from a            (c) What will be done If the         think you have nothing to          to create a better world. The
certain point of view morally        person does turn out to be an        hide, these guidelines are         response of government has
indefensible. But the question is    agent? While common sense            presented here to enhance          always been repression to
always how badly the group           dictates that the person be          your personal safety as well       preserve the status quo..
needs to know. No group need         exposed and severed from the         as the overall effectiveness of
use all or any of the methods we     group, other actions might be        our movements.                     Historically, government
describe. But under the condi-       initiated. If the presence of the                                       surveillance and harassment
tion that the correct information    agent is a real threat to the        The simple reality is that         has increased relative to the
is a life-and-death matter for the   group, then the agent should be      governments in industrialized      ascendancy of direct action
group, certain drastic measures      neutralized in an effective          countries target groups that       movements. Minimizing the
may be justified.                    manner. Usually wide exposure        advocate economic sabotage         destructiveness of political
                                                                          and groups that don’t, move-       repression requires that we
24                                                                                                                                              5
                                    movements have a lot of work to
implement and promote a
                                    do before we address the bigger      are activist-friendly lawyers who can help us demand retractions and
security culture within our
                                    questions - what’s important         corrections. Speak to the journalists involved, call them on their
movements.
                                    here is to recognize how             sloppy, dishonest work, expose their hypocrisy, and complain to the
                                    oppressive behaviours play into      journalists' ethics body. We can not rely on capitalist, private-media
SO WHAT IS A SECURITY               bad security culture overall.        for any kind of fairness.
CULTURE?
                                    (IN)SECURE PRACTICES                 It is valuable for us to learn more about the covert actions of the
It’s a culture where the people                                          police. There exists a long and documented history. Factual informa-
know their rights and, more         Activists like to talk, we
                                                                         tion about police covert activities also comes out as evidence pre-
importantly, assert them. Those     generally can spend hours and
                                                                         sented in court. An important, too often neglected part of our strength
who belong to a security culture    hours discussing theory, tactics,
                                                                         is our knowledge of, and our protection from, police action against
also know what behaviour            and strategy. Mostly this is
compromises security and they       useful in building our analysis      us.
are quick to educate those          and our work, but in other cases
people who, out of ignorance,       this can be dangerous.
forgetfulness, or personal
weakness, partake in insecure       WHAT NOT TO SAY
behaviour. This security con-
sciousness becomes a culture        To begin with, there are certain
when the group as a whole           things that are inappropriate to
makes security violations           discuss. These things include:
socially unacceptable in the
group.                              > your involvement or someone
                                    else’s involvement with an
Security culture is about more      undergound group
than just targetting specific
behaviours in individuals such      > someone else’s desire to get
as bragging, gossipping or lying.   involved with such a group
It is also about checking
movement behaviours and             > asking others if they are a
practices as a whole to ensure      member of an underground
that our own oppressive             group
practices don’t feed into
intelligence operations being       > your participation or someone
carried out against our             else’s participating in any action
community.                          that was illegal

For example, racism or sexism       > someone else’s advocacy for
in the movement can help to         such actions
spread division, make some
people more open to infiltrators    > your plans or someone else’s
(those who feel marginalized by     plans for a future action
group practices), and create
openings that can be used by        Essentially, it is a bad idea to
state operatives. Obviously, our    speak about an individual's

6                                                                                                                                          23
COVERT ACTION OTHER                   during the July 2001 meeting of      involvement (past, present or         arrested and brought to trial. If
                                      the G8. Several reports reveal       future) with illegal activities.      s/he is found guilty, this activist
THAN INFILTRATION
                                      that Italian police masked as        These are unacceptable topics         can freely speak of the actions
                                      black bloc members attacked          of discussion regardless of           for which s/he was convicted.
Covert (or "Special") Action
                                      demonstrators and small shops.       whether it is rumor, speculation      However, s/he must never give
from police and secret service is                                          or personal knowledge.
                                      With a lack of public information,                                         information that would help the
also done outside of the group,
                                      the police help manipulate                                                 authorities determine who else
with or without infiltration. These                                        Please note: this is not to say
                                      public discourse along the lines                                           participated in illegal activities.
efforts include: intimidation and                                          that it is incorrect to speak about   The third exception is for anony-
harassment, blackmail and             of "how do legitimate demon-
                                                                           direct action in general terms. It    mous letters and interviews with
manipulation, propaganda,             strators isolate activist thugs?"
                                                                           is perfectly legal, secure and        the media. This must be done
informing employers and                                                    desirable that people speak out       very carefully and without
security checks, as well as           Slanderous propaganda can            in support of mokeywrenching          compromising security. Advice
physical sabotage like theft and      take the form of anonymous           and all forms of resistance. The      on secure communication
arson.                                letters, or rumours aimed at the     danger lies in linking individual     techniques can be found at
                                      activist milieu. There are also      activists to specific actions or      http://security.tao.ca.
Intimidation and harassment           examples where police will           groups.
can include visits from secret        make uncorroborated, casual                                                These are the only situations
service agents, calling you or        accusations to journalists that,                                           when it is appropriate to speak
your partner by their first name      to use two examples, a person        THREE EXCEPTIONS                      about your own or someone
on the street, thefts where           is a drug dealer, or that at a                                             else's involvement or intent to
obvious clues are left. Police        demonstration, a person aimed        There are only three times that it    commit illegal direct action.
will try to blackmail people if       a handgun at an officer. It is       is acceptable to speak about
                                      often for slanderous reasons         specific actions and activist
they want to recruit or neutralize
                                      that police charge activists with    involvement.                          SECURITY MEASURES
them.
                                      "weapons possession" for
                                      having a penknife, or charges of     The first situation would be if       Veteran activists only allow a
Police uses propaganda in an
                                      violence like "assault."             you were planning an action           select few to know about their
attempt to poison the atmos-                                               with other members of your            involvement with direct action
phere and manipulate media
                                      The growth of the anti-globaliza-    small group (your “cell” or           groups. Those few consist of the
and public opinion. In Decem-                                              “affinity group”). However, these
                                      tion movement has been ac-                                                 cell members who they do the
ber 1971, when the FLQ was                                                 discussions should never take
                                      companied by renewed anar-                                                 actions with AND NO ONE
near its end and heavily infil-                                            place over the Internet (email),      ELSE!
trated, the RCMP issued a false       chist-scare propaganda on the
                                                                           phone line, through the mail, or
FLQ communiqué in the name            part of authorities. Politicians
                                                                           in an activist's home or car, as      The reason for these security
of the "Minerve" cell. The            and police attempt to massage
                                                                           these places and forms of             precautions is obvious: if people
communiqué adopted a hard-            public opinion, preparing            communication are frequently          don't know anything, they can't
line position, denouncing the         people for a crack down, in          monitored. The only people who        talk about it. When activists who
abandonment of terrorist action       order to legitimate the use of       should7dear this discussion           do not share the same serious
by a well-known activist, Pierre      heavier methods of social            would include those who are           consequences know who did an
Vallières, and urging the con-        control, exclusion and               actively participating iXäthe         illegal direct action, they are far
tinuation of armed struggle.          repression.                          action. Anyone who is not             more likely to talk after being
                                                                           involved does not need to know        harassed and intimidated by the
In Genoa, Italy, police played an     Manipulative disinformation          and, therefore, should not know.      authorities, because they are
active covert role in trying to       spread through the media needs       The second exception occures          not the ones who will go to jail.
discredit black bloc anarchists       to be denounced as lies. There       after an activist has been            Even those people who are
                                                                                                                 trustworthy can often be tricked
22                                                                                                                                               7
by the authorities into revealing   do serious damage to our             It is your responsibility to       jail time at this point in your life.
damaging and incriminating          security.                            instruct these people on the       As long as capitalism and all of
information. It is safest for all                                        importance of security culture.    its evils exist, there will be
cell members to keep their          The following are examples of                                           resistance. In other words, there
involvement in the group            security-violating behaviours:       The other type of activist-        will be plenty of great actions for
amongst themselves. The fewer                                            informer is the person who         you to participate in when your
people who know, the less           Lying: To impress others, liars      cracks under pressure and          life circumstances are more
evidence there is in the long       claim to have done illegal           starts talking to save his or      favourable.
run.                                actions. Such lies not only          her own skin. Many activists get
                                    compromise the person's              drawn into situations they are     If others are dependent on you
                                    security -- as cops will not take    not able to handle, and some       for support, you aren't willing to
SECURITY VIOLATING                  what is said as a lie-- but also
                                                                         are so caught up in the "excite-   lose your job, or drop out of
BEHAVIOURS                          hinders solidarity and trust.
                                                                         ment" that they either don't       school or ruin your future career,
                                                                         realize what the consequences      DON'T DO THE ACTION. If you
In an attempt to impress others,    Gossiping: Some people think
activists may behave in ways        they can win friends because         can be, or they just don't think   are addicted to an illicit drug
that compromise security. Some      they are privy to special            they'll ever have to face them.    and/or have a lengthy
people do this frequently - they    information. These gossips will                                         criminal record, the cops will
are habitually gossiping and        tell others about who did what       Keep in mind that the catego-      use this to pressure you for
bragging. Some activists say        action or, if they don't know who    ries of "planted informer" and     information. If you don’t feel
inappropriate things only when      did it, guess at who they think      "activist-turned-informer" can,    capable of detoxing under
they consume alcohol. Many          did what actions or just spread      and have been blurred. In 1970,    interrogation and brutality, or
activists make occasional           rumors about who did it.             during the height of the FLQ's     doing a hell of a lot more time
breeches of security because                                             activities, Carole de Vault - a    than your comrades, DON’T DO
there was a momentary               This sort of talk is very dama-      young Parti Quebecois (PQ)         THE ACTION.
temptation to say something or      ging. People need to remember        activist was drawn to the FLQ,
hint at something that shouldn’t    that rumors are all that are         but then became a paid police      Make certain that you talk with
have been said or implied. In       needed to instigate an               agent. Her "activism" was with     others in your affinity group
most every situation, the desire    investigation or even lay            the PQ; she disagreed with the     about situations that make you
to be accepted is the root          charges.                             heavier FLQ actions since it       uncertain whether you should
cause.                                                                   threatened the "legitimate" work   be involved in particular actions,
                                    Bragging: Some people who            of the PQ. Her involvement         especially those that are at a
Those people who tend to be         partake in illegal direct action     with the FLQ was as a planted      high risk of being criminalized.
the greatest security risks are     might be tempted to brag about       police informer.
those activists who have low        it to their friends. This not only
                                                                                                            Remember - there is no excuse
self-esteem and strongly desire     jeopardizes the bragger's
the approval of their peers.        security, but also that of the       KNOW YOUR OWN LIMITS               for turning in comrades to the
                                                                                                            police - and those activists that
Certainly it is natural to seek     other people involved with the
friendship and recognition for      action (as they may be               We have to know the possible       do effectively excommunicate
our efforts, but it is imperative   suspected by association). As        consequences of every action       themselves from our move-
that we keep these desires in-      well the people who s/he told        we take and be prepared to         ments. We must offer no legal
check so we do not jeopardize       can be charged as accessories        deal with them. There is no        or jail support to those activists
the safety of other activists or    after the fact. An activist who      shame in not being able to do      who turn in others for their
ourselves. People who place         brags also sets a bad example.       an action because of responsi-     impact on our movement is far-
their desire for friendship over    Indirect-Bragging: Indirect-         bilities or circumstances that     reaching and can have devas-
the importance of the cause can     braggers are people who make         make it impossible for you to do   tating effects.

8                                                                                                                                            21
fessed ideals and how they live?     tice. It was done to the Black      a big production on how they       persons whose behaviour
One of our strengths as activists    Panthers, AIM, the Front de         want to remain anonymous,          breaches security. If someone
is our ideas and values, our         Libération du Québec (FLQ),         avoid protests, and stay           you know is bragging about
counterculture, our attitudes        and the peace/ anti-war/and         "underground." They might not      doing an action or spreading
towards the dominant society.        anti-nuclear movements on a         come out and say that they do      security-compromising gossip, it
Our sincerity in discussing these    large scale. Small groups, such     illegal direct action, but they    is your responsibility to explain
things is also a way of learning     as affinity groups, or working      make sure everyone within ear-     to her or him why that sort of
about each other.                    groups of larger more open          shot knows they are up to          talk violates security and is
                                     organizations, need to be           something.                         inappropriate.
When planning for new actions,       especially careful with new
                                                                         They are no better than            You should strive to share this
care must be taken concerning        members. Direct action organiz-
                                                                         braggers, but they try to be       knowledge in a manner that
who is approached. As little as      ing is ideally done with
                                                                         more sophisticated about it by     encourages the person' s
possible should be said about        longstanding, trusted members       pretending to maintain security.   understanding and changes her/
the actual action plan until a       of the activist community.          However, if they were serious      his behaviour. It should be done
person’s political philosophy,                                           about security, they would just    without damaging the person’s
ideas about strategy, and levels     This doesn't mean that no one       make up a good excuse as to        pride. Show your sincere
of risk they are willing to engage   else should ever be allowed into    why they are not as active, or     interest in helping him/her to
in have been discussed on an         these groups. On the contrary, if   why they can't make it to the      become a more effective
abstract basis. If there is a        our movement is to continue to      protest . Concealing sensitive     activist. Keep your humility and
strong basis for believing this      grow, new people should be          information from even trusted      avoid presenting an attitude of
person might be interested in        welcome and recruited; we just      comrades is far better than        superiority. An insensitive
the action, then the general idea    need to keep security in mind       jeopardising underground work.     approach can raise an
of an action can be run by           and exercise caution at all                                            individual’s defences and
 them. Only when they have           times.                                                                 prevent them from listening to
agreed to participate, do they                                           EDUCATE TO LIBERATE                and using the advice offered.
come to the group to discuss         The Unwitting Informer                                                 The goal of addressing these
action details.                                                          The unfortunate truth is there     issues with others is to reduce
                                     Possibly an even greater threat     are some security-ignorant         insecure behaviour, rather than
During the trials of activists,      to our movements than the           people in the movement and         showing how much more
police often reveal the kinds of                                         others who have possibly been      security-conscious you are.
                                     covert operative is the activist-
information that they have                                               raised in a "scene" that thrives
                                     turned-informer, either unwit-
gathered concerning our groups                                           on bragging and gossiping. It      Share your concerns and
                                     tingly or through coercion.
and activities. Note what revela-                                        doesn't mean these people are      knowledge in private, so that the
                                                                         bad, but it does mean they need    person does not feel as if they
tions come out of these trials.      The unwitting informer is the       to inform themselves and learn     are being publicly humiliated.
What are the possible and likely     activist who can't keep his/her     about personal and group           Addressing the person as soon
sources of the information?          mouth shut. If someone brags to     security. Even seasoned            as possible after the security
Speak to persons that have           you about what they’ve done,        activists make mistakes when       violation increases effective-
been arrested and interrogated       make sure this person never         there is a general lack of         ness.
to see what they may have said       has any knowledge that can          security consciousness in our
to the police, or discussed in       incriminate you, because sooner     groups.                            If each of us remains res-
their jail cell.                     or later, the wrong person will                                        ponsible for discussing security
                                     hear of it. These activists don't   And that's where those of you      information with people who slip
Placing infiltrators in social       mean to do harm, but their          who are reading this can help.     up, we can dramatically improve
justice and revolutionary move-      bragging can be very damaging.      We must ALWAYS act to inform       security in our groups and
ments is an established prac-
20                                                                                                                                          9
activities. When people              stiffer sentences for political      posals. Infiltrators often need to       spent 41 days in preventive
recognise that lying, gossiping,     actions, and with courts             build credibility; they may do this      custody, only to be released
bragging, and inappropriate          handing down long sentences          by claiming to have participated         under draconian bail conditions.
debriefing damages both              for political "crimes", the stakes   in past actions.
themselves and others, these         are too high to allow chronic                                                 The police's covert action was in
behaviours will soon end.            security offenders to work           Also, infiltrators will try to exploit   part about dismantling the
                                     among us.                            activist sensibilities regarding         group, but it was also about
By developing a culture where                                             oppression and diversity. Intelli-       creating a media/propaganda
breaches of security are pointed     By creating a security culture,      gence organizations will send in         campaign to justify the police-
out and discouraged, all sincere     we have an effective defence                                                  state security for the summit.
                                                                          someone who will pose as a
activists will quickly understand.   against informers and agents         person experiencing the com-
                                     who try to infiltrate groups.        mon oppression of the particular
                                     Imagine an informer who, every
DEALING WITH CHRONIC                                                      activist group. For example, in          BACKGROUND CHECKS -
                                     time they ask another activist       the 1960's, the Weather Under-           AN ESSENTIAL TOOL
SECURITY PROBLEMS                    about their activities, receives
                                                                          ground ("Weathermen" - a white
                                     information about security. It
So what do we do with activists                                           anti-imperialist armed struggle          What are some ways of looking
                                     would frustrate the informer's
who repeatedly violate security                                           in the US) was infiltrated by an         into the possibility that someone
                                     work. When other activists
precautions even after being         discovered that she/he               "ordinary Joe" informant with a          is an informer? Firstly, unless
informed several times?              continued to violate security        working class image. Black war           you have concrete reasons or
                                     precautions after being              veterans infiltrated the Black           evidence that someone is an
Unfortunately for them, the best     repeatedly informed, there           Panther Party.                           infiltrator, spreading rumours will
thing to do is to cut them loose.    would be grounds for isolating                                                damage the movement. Ru-
Discuss the issue openly and         the person from our groups. And      A fresh example of police                mours that you do hear of
ask them to leave your meet-         that would be one less informer      infiltration and manipulation            should be questioned and
ings, basecamps and organ-           for us to deal with!                 tactics is that of Germinal, a           traced back.
izations. With law enforcement                                            group targeted for arrest two
budgets on the increase, new                                              days prior to the April 2001 anti-       A person's background can be
anti-terrorist laws that call for                                         FTAA demonstrations in Quebec            looked into, especially activism
                                                                          City. Five months prior, the             they claimed to have partici-
                                                                          police set up a false transport          pated in, in other places. Do
                                                                          company and specifically                 your contacts in those places
                                                                          postered opportunities for               know of the person, their in-
                                                                          employment in the vicinity of a          volvement? Did problems ever
                                                                          Germinal member seeking                  come up? One important
                                                                          employment.                              advantage of having links with
                                                                                                                   far away places is that it makes
                                                                          The trap worked. Tipped off by           it more difficult for informers to
                                                                          an initial informant, two under-         fabricate claims about their
                                                                          cover cops worked for four               activities.
                                                                          months in the group. This
                                                                          operation resulted in the media-           What are a person's means of
                                                                          hyped "dismantlement" of                 living? Who are her or his
                                                                          the group on the eve of the              friends? What sorts of contradic-
                                                                          summit. Seven Germinal mem-              tions exist between their pro-
                                                                          bers were arrested, 5 of whom
10                                                                                                                                              19
**The "novice" type: presents a         should be careful with. At the
somewhat more active role, but          very least, they need to be                   a brief primer on the
confines themselves to less             informed about security issues.
prominent work. They don't take         New activists should understand         canadian state security apparatus
initiatives, but the work they do       that direct action tactics can be
is valued. This helps them build        risky (though some risks are
trust and credibility.                  worth taking!) and that asking a
                                        lot of questions endangers
**The "super activist" type: they       people. If the person persists in
come out of nowhere and all of          asking questions, there is a         Recent incidents of repression        Intelligence Service's (CSIS)
a sudden, they are everywhere.          problem and appropriate meas-        against activists in British          annual reports, activities
Whether it's a meeting, protest,        ures must be taken. Activists        Columbia illuminate the need for      targeted in the late 1990s
or an action, this person will be       who can't understand the need        grassroots people to understand       included: native resistance,
right in the thick of it. Keep in       for security should be shunned       and practice movement security.       environmental & animal rights
mind however that this can              and kept away from the move-         Police monitoring, infiltration and   movements, anti-poverty, anti-
also be the mark of a new               ment.                                agent provocateurs are routinely      globalization, anti police
activist, whose enthusiasm and                                               used by the state to collect          brutality, anti-racist, anarchist
commitment is so strong that            Some types of infiltrators stay in   information about our groups, or      and communist groups.
she/he wants to fight the power         the background and offer             specific individuals in them, and
every minute of the day.                material support, other inform-      to subvert our activities.            With the rise in militant First
                                        ants may have nothing to do                                                Nations' struggles; covert direct
It should be said that with             with the group or action, but        For example, during the APEC          action against corporations; the
several of these modus oper-            initially heard certain plans and    hearings, it was revealed that        renewed militancy and strength
andi, the behaviour is hard to          tipped off the police. Among the     over seventy groups and               of popular struggles; and the
distinguish from a sincere new          more active types of infiltrators    individuals were monitored            mass-media's increasing focus
person’s involvement. How do            can be a gregarious person that      before and during the APEC            on anarchists and anti-
we tell them apart? Well, a             quickly wins group trust. Some       meetings in 1997. A paid              globalization protests, there is
planted infiltrator will ask a lot of   infiltrators will attempt to gain    industry informant/disruptor was      also a growing level of police
questions about the direct action       key forms of control, such as of     identified at a wilderness action     surveillance and repression.
groups, individuals and illegal         communications/ secretarial, or      camp in 1999. Provocateurs
activities. She/he may suggest          finances. Other informants can       also targeted some Vancouver          The need for security in our
targets and volunteer to do             use charm and sex to get             activists, trying to convince them    movements is obvious -
reconnaissance as well as take          intimate with activists, to better   to disclose information and as        however, it is incredibly
part in the action. Infiltrators        spy or potentially destabilize       well, to break the law.               important that we don't fall into
also try to build profiles on           group dynamics.                                                            the trap of using our awareness
individuals, their beliefs, habits,                                          The Canadian security                 of security issues to shut other
friends, and weaknesses. At the         Active infiltrators can also be      apparatus identifies a number of      people out of our growing
same time, infiltrators will shield     provocateurs specializing in         our groups and activities as a        movements.
their true selves from other            disruptive tactics such as           threat to "national security".
activists.                              sowing disorder and demoraliz-       People and organizations are          One of the key aims of the FBI's
                                        ing meetings or demos, height-       widely targeted; even avowed          Counter-Intelligence Program
 Anyone who asks a lot of               ening conflicts whether they are     pacifists have been included in       ("COINTELPRO") operations
questions about direct actions          interpersonal or about action or     surveillance and repressive           against the Black Panthers and
isn’t necessarily an infiltrator,       theory, or pushing things further    measures. According to the            American Indian Movement
but they ARE someone you                with bravado and violent pro-        Canadian Security and                 (AIM) was to spread distrust and
18                                                                                                                                               11
paranoia so that these activists
would be reluctant to integrate
                                     operations level, the new
                                     agency was granted more lee-
                                                                         everything you ever wanted to know
new people into their struggles.     way in terms of public account-             about informers and
                                     ability than the Mounties had
A security culture can exist in a    ever had.                                       infiltrators
large movement; indeed, it is
one indication of a movement's       CSIS carries out a wide range of
strength. Arming ourselves with      surveillance activities. Since
knowledge about how the              they are not a law-enforcement      Infiltrators seek information on most radical groups. The return of
system works and works against       agency and since their evidence     mass mobilizations and radical actions in anti-globalization, anti-
activists is essential in building   is not used in court, nothing       poverty, anti-racism and anti-police brutality demonstrations, as well
security culture. The aim of this    stops them from contravening        as declarations to continue struggling in the streets and underground
section is to give a brief run       the few regulations that do         has drawn attention from the state's secret police. More infiltrators will
down of the working of domestic      exist regarding privacy rights.     be sent into our ranks to try to bribe, entice or manipulate individuals.
intelligence in Canada. In this      For example, CSIS is not            The extent to which
way, we can better understand        required to inform people, as is    they are able to infiltrate our groups depends on our seriousness and
how to avoid its traps.              RCMP, ninety days after a           responsibility in learning about, promoting, and working within a
                                     wiretap (or bugging) is over.       security culture.
AN OVERVIEW OF
DOMESTIC INTELLIGENCE                Agents working for CSIS are         Radical movements can learn to better identify covert enemies in our
ORGANIZATIONS                        allowed, with "authorization", to   projects. Once identified, appropriate action is needed to undo,
                                     enter people's homes to plant       contain, or remove the danger.
The Canadian Security and            bugs, wiretap phones, open mail
Intelligence Service (CSIS) is       and look into health,               This section is intended to arm you with information on how to spot
probably the best known of the       employment and government           and deal with informers, infiltrators, and provocateurs in our ranks.
"security" agencies that deal        records without ever having to
with activist "threats". Its         tell a targeted individual what
predecessor was the Security         they are doing. The information                                            ible methods or operation, or
Service division of the Royal        that they gather is used to build   WHO IS AN INFORMER?                    “modus operandi”. These are:
Canadian Mounted Police,             profiles and dossiers (files) on
(RCMP-SS). In 1984, following        individuals, organizations,         There are actually two kinds of        **The "hang around" type: they
the MacDonald Commission on          networks, etc. This information     informers. The deliberate              are persons who regularly show
the illegal activities of the        is also passed on to other wings    informer is an undercover agent        at meetings and actions but
RCMP, the civilian spy agency        of the federal security system      on the payroll of government or        generally don't get involved.
CSIS took over RCMP spy              who are responsible for "law-       industry. The second type is the       They collect documents, listen
work. That said, the RCMP did        enforcement", and will then         activist-turned-informer. Both         to conversations and note who's
not abandon its intelligence         obtain whatever warrants are        kinds try to infiltrate our ranks      who. This observation role is
gathering, it’s just that CSIS       necessary for legal surveillance    and are equally dangerous to           relatively inactive.
specifically gathers political       (to be brought into court as        our movements.
intelligence.                        evidence).                                                                 **The "sleeper" type: is similar
                                                                         Let's discuss the deliberate           to the "hang around" modus
The split from the RCMP              The National Security Invest-       informers first. They are often        operandi, except that their
allowed the new spy agency to        igation Service (NSIS) is the       difficult to identify. Informers can   absorption of information is
do legally what the Mounties         primary law-enforcement wing in     be of any age and any profile,         used to activate their role at a
had been doing illegally. At the     Canada. The NSIS is a section       but they do have a few discern-        later date.
12                                                                                                                                           17
     of the Royal Canadian Mounted       of surveillance were used
     Police (RCMP). Most major           against several Vancouver
     cities across the country have      activists. During the Vancouver
     an NSIS office including Van-       investigation, house and vehicle
     couver, Edmonton, Montreal,         bugs were located by some
     Ottawa, and Toronto. The NSIS       targeted individuals. The bugs
     maintains a computer database       had large battery packs
     on activists, immigrants and so     attached to facilitate less
     called "terrorists" which is        frequent battery changes. The
     housed in Ottawa.                   NSIS also visited several
                                         activists across Canada in an
     It is believed that the Vancouver   attempt to question them
     NSIS employs between 12 and         regarding the individuals under
     18 members. Within NSIS there       investigation.
     are several sub-groups called
     Team 1, Team 2, Team 3 - etc.       THE GOLDEN RULE OF
     that have different investigative   SILENCE
     targets.
                                         It needs to be stressed
     They employ informants,             throughout our movements that
     infiltrators, personal physical     no one is under any legal
     surveillance, electronic            obligation to provide to the
     surveillance including phone        police anymore information than
     and room "bugs" and other           one's own name, address and
     means of investigation and          birth date, and this only if one is
     research.                           under arrest. That is it! Saying
                                         anything more jeopardizes
                                         security. Even answering seem-
     The RCMP/NSIS also have
                                         ingly insignificant questions can
     other resources at their disposal
                                         assist the police in developing
     during counter-insurgency
                                         personality profiles on a range of
     operations. "Special O" is a        activists. It may not be
     team of surveillance specialists    "evidence" but it is used to give
     that may be called upon.            police "leads" on other suspects
     "Special I" is a penetration team   and construct intent during legal
     whose specialty is to break into    proceedings. The only principled
     homes, vehicles and other           response to police questioning
     properties for investigative        when under arrest is to say
     purposes. They are the team,        nothing more than your name,
     which among other things,           birth date and address. If
     installs listening devices,         questioned further you can
     photographs building interiors,     simply say "I have nothing to say
     etc.                                (except in the presence of my
                                         lawyer".
     In a long-running case based in
     Vancouver, all of these methods
16                                                                    13
The Communications Security          Most activists will be initimately
Establishment (CSE) is an            familiar with their local police     Kitson advises that the primary work of the intelligence agency should
agency of the National Defence       forces. Be aware that cops do        occur during the preparatory phase. At this time the movements are
/ War department, which has          not only show up in blue             most vulnerable. They have not experienced a high degree of
been long clouded in secrecy.        uniforms - but routinely practice    repression. They consider talk of security as mere paranoia. As they
                                     crowd infiltration and carry out     are not breaking laws they believe that it is safe to organize completely
They collect and process             surveillance and investigative       openly. The intelligence agency is therefore able to exploit these
telephone, fax and computer          activities either alone or jointly   conditions and develop detailed dossiers on a wide range of people.
communications of foreign            with the RCMP depending on           The information will be extremely valuable to them later on.
states, corporations and             the type of case. Watch for them
individuals. The federal             on demonstrations - as they like     Important historical revolutionary activities and groups began as small,
government uses the                  to come along and take photo-        serious-minded projects that grew in spite of surveillance and
intelligence gleaned from the        graphs and video for the record -    repression. It is therefore important to practice security at all points in
data to support troops abroad,       and they often appear in crowds      the movement's development. State agents gather more than just
catch "terrorists" and "further      as “fellow demonstrators”.           "hard evidence;" they are interested in knowing about radicals' beliefs
Canada's economic goals"                                                  as well.
(what that means is up to them).
                                     THE COUNTER-                         Police try to control with fear; don't be intimidated. Remember - If an
Although the CSE is not              INSURGENCY MODEL                     agent comes knockin', do no talkin'.
technically allowed to collect the
communications of Canadian           Most Western nation-states
citizens, it is known to be a        follow a model of counter-
partner in the Echelon project -     insurgency developed by a
a multinational monitoring           British intelligence expert named
operation which sees CSE and         Kitson who wrote, Low Intensity
counterpart agencies in the          Operations, after much field
United States, Britain, Australia    work in the colonies. He broke
and New Zealand share                down movement development
intercepted communications of        into three stages:
interest with one another,
effectively creating a global        The Preparatory Phase: is
surveillance web.                    when the movement is small,
                                     tends to focus on education,
The Terrorist Extremist Section      publishing and groundwork.
(TES Unit) is British Columbia's
anti-terrorist unit. A joint         The Non-Violent Phase: is
Vancouver/Victoria Police            when the movement takes on
Department/RCMP unit called          more of a mass character. Large
the Organized Crime Agency           demonstrations are the norm.
(formerly the Coordinated Law
Enforcement Unit - CLEU), it is      In the Insurgency Phase: the
believed that the this unit          movement has taken on a
employs two or three members         popular character. Perhaps a
only.                                more assertive, guerrilla
                                     component has emerged.
14                                                                                                                                              15

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:5
posted:6/18/2012
language:
pages:14
Supattra Chimchaeng Supattra Chimchaeng SupattraOnce http://www.youtube.com/CutetvOnce
About ้ำHello, I active for ads. love you all SupattraOnce@gmail.com