Showing posts with label Security Culture. Show all posts
Showing posts with label Security Culture. Show all posts

Monday, May 23, 2011

Searching for Snitches: A response to "To take on the Wild Beast"

from Puget Sound Anarchists:

On May 13th, an article called "To take on the Wild Beast" was posted on Portland Indymedia, calling for readers to snitch on a big list of leftists, radicals, and anarchists. Back in January, an article similar to "To take on the Wild Beast" showed up on Portland Indymedia and a bunch of other Indymedia websites around the world. The article insinuated (but did not outright say) that a bunch of different radical (and some not-so-radical) activist-type groups and ideologies were wanted by the police and FBI. The article encouraged readers to call a number of snitch hotlines and report for cash rewards.

At the time, Olympia Rising Tide (one of the groups mentioned) released this statement, originally posted at http://anarchistnews.org/?q=node/13524 and http://portland.indymedia.org/en/2011/01/405571.shtml:
"An article titled 'In the Fight to Make a Better World' recently appeared on several Indymedia websites, including Portland Indymedia. The article began,
'You read indymedia, chances are you know some protesters who are wanted by the police and the FBI. The good news is that now you can receive a big cash reward for information leading to the arrest and conviction of crimanals [sic]. It's easy just a quick call. and if you know more that one person you can get multiple REWARDS up to $2000 for each . for information leading to the arrest of known criminals and subversive group activity.'

"The article then listed a wide-ranging and diverse collection of activist groups, movements, and political parties, including Democracy Now!, the Animal Liberation Front, Socialist Labor Party, and 'Anarcist [sic] book fair,' among many others. We were very surprised to see our name on this list, right in between Cascadia Rising Ecodefense and Freedom for Animals. The article finishes by providing contact information for various federal agency snitch lines, including the FBI and Homeland Security.

"Although the implicit premise of this article is that Olympia Rising Tide (and everyone else mentioned) are wanted by the police and FBI for criminal activity, it is important to note that Shayne O'Neill, the supposed author of this fishing expedition article, never actually accuses us of any criminal activity, nor of being wanted by the police or FBI. Olympia Rising Tide is a legal, aboveground community group. We have never carried out any illegal actions in the fight for a just and sustainable world. Some people do perform underground actions to dismantle oppressive power structures, but those are tactics that Olympia Rising Tide chooses not to use. The police and FBI have no grounds on which to accuse us of any illegal activity - that is why they are looking for people who read Indymedia to provide that non-existent information.

"Fishing expeditions (searches for information on groups disliked by the State and Capital but about whom the State has no incriminating information) are a scare tactic used to neutralize groups who are effective at creating change. The police wish to silence us by sowing fear, distrust, and misinformation in our community. We believe we are being targeted because we are vocal, uncompromising, and effective (qualities any social or climate justice group should be proud to claim), not because we have broken any laws.

"It is important to remember that nothing good ever comes from talking to the police. If you don't talk, they won't have any information. The majority of convictions of activists would not be possible were it not for informants, undercover agents, and snitches. Even if you think you are going to 'clear up our name,' it is better to say nothing at all. If questioned by police, remember that the only thing you should say is 'I am going to remain silent. I would like to speak with my lawyer.' Without voluntary snitches, the police would be much less effective at neutralizing activist groups. However much reward money you are offered (and do you really think they'll deliver on that promise?), it is never worth it to betray your friends, comrades, and the movement. And statistically, people who snitch receive sentences that are just as long, if not longer, than those who refuse to talk. If you snitch you're not 'just telling them what they already know,' you're giving them the tools to fabricate charges where they couldn't before, and you're setting back the movement. If you incriminate others, you are also incriminating yourself and making yourself a target of investigation.

"This false insinuation that Olympia Rising Tide is comprised of known criminals and is wanted by the police and FBI is part of the larger crackdown on environmental and animal rights activists known as the Green Scare. Activists who carry out non-violent but illegal activities in furtherance of animal or earth liberation are demonized as violent terrorists. This 'terrorism' rhetoric is used to prevent people from speaking out in the first place, and justify the criminalization of previously free speech. The government is not going after us for breaking the law, they're going after us because we're effective. For more information on the Green Scare, check out www.greenisthenewred.com.

"Anyone who has information on Shayne O'Neill or the source of the original article is asked to please contact Olympia Rising Tide at olympia@risingtidenorthamerica.org. If you believe you have been harassed because of your political beliefs, affiliations, or perceived political beliefs and affiliations, please contact the National Lawyers Guild's Green Scare hotline: 1-888-NLG-ECOL.

"Olympia Rising Tide will not be scared into passivity, nor will we allow ourselves to be neutralized by unfounded allegations of criminal activity. We will continue to remain vocal, uncompromising, and effective in confronting the root causes of climate change."

(To be clear, the article you are reading now was not written by Olympia Rising Tide, just some anarchists who appreciated their previous commentary and found it to still be pertinent.)

The most significant difference between the article that appeared in January and the one that appeared on May 13 is the terrorism rhetoric. In the previous article, the author only insinuated that the people and organizations listed were known criminals and wanted by the police and FBI. In this article, the author goes ones step further and insinuates that the groups and people are domestic terrorists. Whatever government agency wrote this call for snitches can get away with the terrorism rhetoric because they didn't outright say “such-and-such group is a terrorist organization,” although the FBI and police have certainly done so in the past with many of the groups listed here, and could certainly get away with calling every one of these groups terrorists – not because anyone on this list inspires terror, but because the FBI and police can get away with whatever they want, including lying through their teeth.

We (the authors of what you are reading now) are anarchists. We are under no illusions that the State has our best interests at heart. This attempt to gather information on radical and revolutionary groups is not the result of a few “bad apples.” This is how the State functions. We are under no illusions that the State will follow its own rules of conduct. If the State is ever forced to follow its own rules, it simply revises them. So while we are not surprised that it is gathering information on radicals (really, this is nothing new), we are pissed off and sick of this shit.

In their response to the initial snitching article, Olympia Rising Tide wrote of the criminalization of free speech. While we agree that the State is always looking for ways to silence more and more oppositional voices, we would like to shatter the illusion of “free speech.” Under the State and capitalism, speech has never been free for People of Color, poor people, queer and trans people, or any other number of targets of oppression. While it is crucial to support Green Scare prisoners and note how the government has fractured earth and animal liberation movements into “legal” versus “illegal” and “violent” versus “non-violent,” it is just as important to note the ways in which the government has also done so (and continues to do so) in communities of color, poor communities, and queer and trans communities.
To be clear, we are at war. Against the forces that oppress us and keep us miserable in all aspects of our lives, against capitalism and the State. We don't expect the State to play nice, but we expect people to recognize which side they're on and not sell out their comrades. Playing by the State's rules (whether that means avoiding illegality or adhering to Nonviolence) doesn't guarantee you won't be targeted. Debates over violence versus Nonviolence and whether or not property destruction constitutes “violence” are a dead end that serve to further neutralize all forms of resistance and further fracture the movement.
Finally, we would like to note that this snitch search has appeared on Indymedias all over the world. Almost every article is attributed to the name of a different author. We don't believe that the names listed are the actual authors (in all likelihood, whatever agency that wrote this bullshit just gathered a bunch of names from the internet), and we caution against taking action against anyone whose name appears on this article unless it can be verified that they actually had a hand in this.
- Some anarchists

Tuesday, February 15, 2011

Anonymous Annihilates Infiltrator: Full Story

 from ars technica:

It has been an embarrassing week for security firm HBGary and its HBGary Federal offshoot. HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year.

When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary's servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced. As an added bonus, a second site owned and operated by Greg Hoglund, owner of HBGary, was taken offline and the user registration database published.

Over the last week, I've talked to some of those who participated in the HBGary hack to learn in detail how they penetrated HBGary's defenses and gave the company such a stunning black eye—and what the HBGary example means for the rest of us mere mortals who use the Internet.

Anonymous: more than kids

HBGary and HBGary Federal position themselves as experts in computer security. The companies offer both software and services to both the public and private sectors. On the software side, HBGary has a range of computer forensics and malware analysis tools to enable the detection, isolation, and analysis of worms, viruses, and trojans. On the services side, it offers expertise in implementing intrusion detection systems and secure networking, and performs vulnerability assessment and penetration testing of systems and software. A variety of three letter agencies, including the NSA, appeared to be in regular contact with the HBGary companies, as did Interpol, and HBGary also worked with well-known security firm McAfee. At one time, even Apple expressed an interest in the company's products or services.

Monday, November 22, 2010

Teen Popped for Torching Cop Car in '08

A bummer from Albany:

COLONIE -- Police say they've made an arrest in a two-year investigation into the torching of a Colonie Police Department patrol vehicle.

Jacob Lester, 19, of Cohoes was arrested for allegedly setting fire to the patrol car on Aug. 25, 2008. An off-duty Colonie Police traffic investigator discovered the marked 2005 Ford Crown Victoria on fire in front of his home in the Boght Corners section of town at about 2 a.m., according to Lt. Robert Winn.

A confidential informant told police in November 2008 that Lester was connected to the incident, but it took two years of following up on leads and conducting interviews to corroborate the informant's tip, according to Lt. Winn.

There was no apparent motive in the arson. Lt. Winn said Lester set out to torch the vehicle but was not targeting the officer.

Lester was charged with felony third-degree arson and felony second-degree criminal mischief. He was released from jail on $15,000 bail.

Loose lips sink ships! Keep your mouth shut!

Saturday, November 13, 2010

Britain Stop Snitching

A pretty sickening report from the other side of the Atlantic after the November 10th occupation and improvisational demolition of Tory Party Headquarters in London earlier this week has surfaced. The media in the UK is assisting the State in tracking down rioters (that's why you mask up you silly geese! Say what you want about the "black bloc" set of tactics, but if there's a throw down with a bunch of media snapping pictures all over, I'd rather look like a mob of ninjas. ESPECIALLY in the most heavy surveillance state in the world. Fuck.), just as Big Media typically ends up being a perfect engine for repression.

Luckily, some kind of badass legalese underground railroad is forming up to help anyone presently splayed up on a wanted poster or likely waiting patiently to be identified by some software program. Check out the November 10th Defense Campaign, which is a really excellent idea:

"2. DO NOT say anything to anyone

You have the right to silence and the right not to incriminate yourself. So we recommend you do NOT. SAY NOTHING TO NO-ONE ONLINE OR OFFLINE, ON THE PHONE OR IN PERSON about the events. These are valuable resources for the Police to find you via internet trawling and phone tapping in order to pin a prosecution on you.

DO NOT SAY ANYTHING TO THE POLICE even if they say “it is in your best interests”. The Police are the arm of the State and a bureaucratic military organisation NEVER to be trusted. Even if the Police put your name and photo in the newspaper, arrest you, take your photo request a solicitor (see Christian Khan below) and demand your Solicitor advises you to say nothing. That way you can say the Solicitor advised you to say nothing in the event the State tries to infer guilty from the fact you said nothing!

Even if they have your picture, and say you committed an offence it does not mean you committed THAT offence or any offence at all. A picture of you holding an item that could cause damage to property does not amount to evidence of you causing damage with that item. So on these matters, like everything else, SAY NOTHING!"

Terrific advice!

Friday, August 20, 2010

Got the Hollow Points for the Snitches (FTTP #4)

Snitch culture: historical examples and current proposals

"Homeboy was talking to the po-po, we had to let everybody that was a no-no, he thought he was on the low low, and was surprised when I hit him with the fou(4)-fou(4)" -Uncle Murda, "Bullet, Bullet"

With the growing wave of repression by the state towards direct action oriented struggles, radicals have been bombarded with the shameful concern of snitches and informants. In a struggle which is purely of choice and individual realization, as opposed to a rich cultural or family heritage, a valor dedication to one's community has been shamefully neglected by some. The following article provides a brief look into how radical communities of the past have approached traitors to the community, while at the same time proposing how more unique struggles can learn from it. It is an excerpt from the zine; "Got the Hollow Points for the Snitches".

To order a copy of this pamphlet, you can contact the email below: thegreenscare@gmail.com (Ed note: defunct as shit, thanks anon)

Wednesday, July 21, 2010

Jeremy Hammond: A Statement from Hackbloc

UPDATE: Jeremy has replied to this post in three parts below.

via HackBloc

Throughout the past few years our association with Jeremy has caused some controversy. Every time we release a new issue of Hack This Zine or announce an event of ours, somebody is there to ask us why our zine is "edited by a known snitch" or how we can tout security culture while still associating with Jeremy.

We support the anarchist community and resist systems of oppression like the state, police and snitch culture. To this end we would like to explain the situation as we currently understand it (partially quoted from communications with other folk) and make clear our plans of dealing with these accusations.

Jeremy was a member of Hack This Site, a Hackbloc-like project. We worked with Jeremy on a lot of projects including Hack This Zine (the first few issues were written entirely by them). Jeremy also worked very closely with Hackbloc during the first few years and without his help early on we certainly wouldn't be where we are today.

In Chicago on June 27, 2004 there was an anarchist bloc in the Gay Pride Parade. When the anarchist bloc reached the parade there was a violent clash between homophobes and the anarchist bloc. Three people were immediately arrested from the anarchist bloc, one of (Halstead 3) them was Jeremy. Someone associated with Chicago Indymedia videotaped the clash. In December 2004 the tape, which Jeremy was tasked with destroying, was given to the lawyers representing the Halsted 3. Nobody else was charged with a crime after the tape was given to the lawyers and the charges the Halsted 3 were facing were not changed after the tape was given to the lawyers at the CAN meeting in January 2005 Jeremy was first accused of snitching. There was not consensus regarding this at the meeting which created conflict at the Crimethinc convergence that year where some members supporting Jeremy were tabling HTZ.

On March 17, 2005, Hammond's apartment in Chicago was raided by FBI agents who seized his computers, written records and various electronic media. He was eventually arrested and charged with felony-level offenses relating to computer hacking and credit card fraud, arising from the 2004 intrusion into the website belonging to the activist group Protest Warrior.

As far as we know Jeremy was the only one arrested resulting from this raid. There is no evidence showing that any credentials that may have been stolen from him by the police in that raid were used to prosecute anyone other them himself.

While engaging in direct action, being identified, raided, and or charged is always a possibility one has to realize and make preparations for. If a person home is raided there is the possibility that evidence that leads to the arrest/investigation of other activists will be found. As a part of consent, each person living at an at risk house or working with others should be made aware of and understand the risk. Like wise with those who are tasked with maintaining tech infrastructure for radical communities should make sure they have mechanisms in place to protect the data of those they are supporting. If the safety of others is affected as a result of such a raid we would consider it a breach of security culture. However, in that scenario we don't see the person as willingly malicious. And that person certainly does not deserve to be lumped in the same category as Anna [2], Brandon Darby [3], or Adrian Lamo [4]. Such a situation should be carefully dissected to see where things went wrong, hold those accountable, and be available to others so as to prevent future mistakes of that nature.

We have been attempting to contact those involved with the group and others who have made claims about Jeremy being a snitch. We are interested in finding out what their story is and if there is anyway we can support an accountability process. Hackbloc's plan is to be transparent about this process and provide documentation detailing our involvement. Hackbloc wants to help support the needs and demands of victims of consent violation and snitch culture. We are dedicated to looking into the accusations made against us.

We had a number of question that we hoped would have been answered by the time this issue went to press, but it turns out this is hard work and it has been difficult to get a hold of folk. We are dedicated to continuing research and documenting this process because of our involvement with Jeremy in the past and because we understand that alternative justice systems handled by our own communities is important for the sustainability of the anarchist movement. To this end we will continue to post our updates on this issue at:
https://hackbloc.org/category/tags/accountability.

Solidarity,
Hackbloc Collective

PS. There is currently a group in Portland that is attempting to document different alternative justice systems of radical communities if you have been apart of an accountability process they would love to hear from you and find out what worked and what didn't. They are especially available to hear from folk who do not feel comfortable talking with members of Hackbloc about issues they have had with Jeremy. The group can be reached at altjustice@gmail.com.

Accountability process notes:
2010-07-03
- Received a big picture perspective� from a third-party.

2010-06-29
- received a response from questions surrounding the nature of the raid on Jeremy's house on 2005-03-17. Received good analysis on consent and security culture as related to computer security.

2010-06-27
- discussed the situation around the raid and Jeremy's earlier arrest with persons that are currently working with Jeremy and in the past had worked with Jeremy. These persons have performed their own analysis of all of the facts and have determined that they do not believe that Jeremy is or was at any point a snitch.

2010-06-18
- Was contacted by a former member of CAN (Chicagoland Anarchist Network) who
gave their perspective on the events that happened with the videotape of the
Halstead 3. Individual provided good background for what happened. Wrote back
asking for more information about what if any accountability process has taken
place.

2010-06-02
- Wrote letter with more questions about the accusations and asking for more contacts related to the accusations.
- Wrote 5 contacts asking them to talk about their experiences with this case.

2010-06-01
- finished reading through legal paperwork relevant to the Halstead 3 cases.

2010-05-29
- received printed copies of legal paperwork relevant to the Halstead 3 case.

2010-04-29
- talked with folk about the situation and got contact information for a number of folks who could speak to the accusations of being a snitch.

[1] http://en.wikipedia.org/wiki/Jeremy_Hammond

[2] Confidential Source (Informant) Anna as relating to the arrest of Eric McDavid, Zachary Jensen and Lauren Weiner: http://portland.indymedia.org/en/2006/01/332735.shtml

[3] Brandon Darby (agent provocateur) as related to the arrest of David Guy McKay and Bradley Neal Crowder: http://en.wikipedia.org/wiki/Brandon_Darby

[4] Adrian Lamo (Informant) as related to the arrest of Bradley Manning: https://hackbloc.org/node/2123

Friday, January 22, 2010

Olympia PMR Suing Snitch Bastards and Their Handlers

Non-violent anti-war group Olympia Port Militarization Resistance filed a suit against Fort Lewis operatives, the City of Olympia, the Olympia Police Department, and several individuals including those covered here last summer John Towery and Cathie Butler just to name a few, the Olympian reports. PMR conducted its own investigation leading to these "allegations" after being harassed, assaulted and wrongfully arrested but the Army is looking into the matter themselves, acknowledging that Towery is a Fort Lewis employee but not much else. As an analyst for the US Army, Towery was violating the United State's government's Posse Comitatus Act which forbids active military personnel from performing acts of law enforcement.

A lawsuit like this, especially in wake of the FBI's admittance that they spied on everyone for years, should hit the feds right in the gut. SnitchWire is excited to see the damages claims, mostly to assess what kind of legal expropriation the resistance gets this week. Also on the table is what happened to the John Towery website, which was hacked and brought down more than a month ago and whether any of the accused operatives had anything to do with it.

Wednesday, December 23, 2009

Ariel Attack Gets a Year Probation


Colorado anarchist Ariel Attack (SW's 2009 nomination for most fabulous anarchist pseudonym and/or self-determined identity) was arrested in August for allegedly smashing up windows at the Denver HQ of the Democratic Party on the year anniversary of the ill-fated black bloc at the DNC mobilization. Even after being slandered and misidentified in the media, Ariel has held strong in the face of repression, and with a little help from friends, Attack is beating the rap. After pleading down felony charges down to misdemeanor criminal mischief and taking out a loan to pay over five grand in restitution, Ariel will be staying in the streets of Denver on unsupervised probation for just under a year. If you can give Ariel some love and help pay off some of the restitution debt, please contact friendsofariel@riseup.net. They'll even hook you up with a Hammer Time shirt!

Another lesson of this story is that when Ariel was caught, there was an accomplice involved who was never identified. Attack should be commended for not turning on this individual even while under intense prosecution and we think this should set a new standard for radicals who are apprehended. Although Denver ABC and the Friends of Ariel support group are planning on releasing a narrative of events to detail the case, we would speculate that achieving this is as easy as keeping your mouth shut when being interrogated by the pigs and working with people you trust. Ariel also had the benefit of having a bad-ass community of support for back up, allowing for a lot more bravery when making legal decisions.

Mad, MAD respect and support to Ariel "It's Hammer Time" Attack. Remember, NOBODY TALKS, EVERYBODY WALKS:

Tuesday, September 29, 2009

Security Update

SnitchWire is always looking to improve security for our contributors, whistle-blowers, tipsters, and even those wily government agents sending threatening emails or trying to spread disinformation. We are pleased to announce that communications sent to SnitchWire can from now on be sent to a new, more secure address from Riseup.net instead of to our Gmail account. Riseup is email designed specifically for activists with secure communication in mind, which is an excellent step up from free webmail that could easily be read by a third party. Have a look at Riseup's mail policy:
  • We do not log your IP address. (Most services keep detailed records of every machine which connects to the servers. We keep only information which cannot be used to uniquely identify your machine.)
  • All your data, including your mail, is stored by riseup.net in encrypted form.
  • We work hard to keep our servers secure and well defended against any malicious attack.
  • We do not share any of our user data with anyone.
  • We will actively fight any attempt to subpoena or otherwise acquire any user information or logs.
  • We will not read, search, or process any of your incoming or outgoing mail other than by automatic means to protect you from viruses and spam or when directed to do so by you when troubleshooting.
This should provide more open communication with this project as well as better security. Rest assured, our PGP encryption key has not changed and can still be used when sending mail to the new Riseup address, SnitchWire [at] riseup [dot] net. Our Gmail account will still be checked on a regular basis until it is clear that Riseup dominates communication for this project.

We're also excited about implementing a tor2web protocol for EVEN MORE anonymity. More news on this soon, as it is in development, but pretty soon even the Department of Homeland Security will realize SnitchWire (on our MIGHTY PUBLIC BLOGSPOT SERVER :P) is an impregnable fortress of cyber security and anonymous communication.

The reason for all of this is because you should trust no one. Not even your lovable foul-mouthed anarchist pals at SnitchWire. By providing resources in which sources and tipsters can remain as anonymous as technologically possible, we hope that by removing the ramifications associated with identity, more information about infiltrators and snitches within radical communities and activist circle can be shared and news spread quickly with SnitchWire.

This is a similar ethos to Cryptome and Wikileaks. Simply put, send us relevant shit as anonymously as possible to our new Riseup email address, we will publish and disseminate that shit after some fact checking and judgment calls, and you walk away knowing you did a service to everyone in struggle by helping expose an informant. This process will refine as this project matures, but the bottom line is to take identity out of the equation and utilize a monk-like form of security culture in trusting nobody. This is better for everyone. You don't know who we are, we don't know who you are, and valuable information is still distributed via a newsblog like SnitchWire.

Tuesday, September 22, 2009

A Warning About "GUN" The New Social Networking Website for Radicals

According to posts on Indymedia sites:

'The Guerrilla Underground Network (GUN) is an autonomous & rhizomal co-mutiny of resistance, & is open to all who seek social change from below.

You can customize your page, share photos, post your own videos and music, post blogs, start your own groups, CHAT, and much more! Feel free to invite your friends.

Obviously social networking (mapping) sites are sketch as fuck and should be approached with caution and the utmost security culture (see our Online Security discussion for tips on internet anonymity), but hey, it's better than facebook or myspace.

Hope to see you there.

guerrillaunderground.ning.com"



SnitchWire STRONGLY cautions people to NOT USE this site. Here are our reasons for doing so.

1. It is hosted on a third party host (ning.com) (like Geocities or Blogger for social networking sites). This means that ALL information gathered by this site is viewable by a third party.

2. The domain registration information for Ning.com does not list any real names, only their postal address (735 Emerson St. Pal Alto, CA).

3. The property listed in the domain registration is owned by "Strategic Decisions Group" which sounds like an intel collection firm if we've ever heard of one. According to their website "Strategic Decisions Group is a strategy consulting firm renowned for its expertise in strategic decision-making, risk management, and shareholder value creation." On their website, they list their allies and customers. Among the list is Nuclear Power, known gentrifying forces, and pretty much anybody evil you can think of. They were targeted by Santa Cruz activists for their association with military recruiting centers.

4. The advertising on ning.com will hand over your IP address to advertisers such as Google and anybody who chooses to buy an ad (as they must be displayed to you, causing you to connect to them). If you have javascript enabled, these banners can grab your browser history. If you have javascript and flash enabled (if YouTube works for you), even using the "clear private data" function on your computer/browser won't protect you from things such as flash cookies.

5. Ning.com has a horrible privacy policy, allowing them source information about you from external sources and release your personally identifiable information if "we have a good-faith belief that doing so is required by a subpoena or other judicial or administrative order or otherwise required by law". In other words, they don't require a warrant or other legal process, only the threat that it will be enforced. "Additionally, Ning may disclose Personal Information where we, in good faith, deem it appropriate or necessary to prevent violation of the Ning Terms of Service, or our other agreements; take precautions against liability; protect the rights, property, or safety of Ning, any individual, or the general public; maintain and protect the security and integrity of our services or infrastructure; protect ourselves and our services from fraudulent, abusive, or unlawful uses; investigate and defend ourselves against third-party claims or allegations; or assist government enforcement agencies." SO, they'll be giving your information to anybody in a suit who asks for it if they aren't the suits themselves. They will also give your information to any entity who buys Ning. It's worth nothing that many such services and organizations have been set up by spooks in the past for the purpose of gathering information.

6. Social networking in general is a bad idea. There's no reason to use it given the privacy you're giving up.

7. Tech collectives that have a long track record in the activist world such as Riseup.net already have social networking platforms such as crabgrass (we.riseup.net) if you really must use social networking.

8. Unlike Riseup and other activist-run services who encrypt the data on their servers and have vowed to protect their user information (and only gather it when absolutely necessary), Ning does not encrypt their information or at least I couldn't find any proof of it.

9. In their posts advertising their site, they encourage people to check out the "security advice" on their website, which suggests that people use a one-hop proxy to "protect their anonymity" but these proxies are completely worthless. They also provide non-https links to https://www.torproject.org and other legitimate anonymity/encryption systems, allowing an intermediary (such as the NSA) to see what you're doing on those sites with ease. It also allows an intermediary to inject a fake program in place of the real program without your knowledge.

Anybody with additional interesting information is encouraged to contact SnitchWire (at) gmail [ dot] com. If you get down with encryption, use our PGP key.

Monday, June 29, 2009

SnitchWire's Public GPG Key

We have received a few emails from people encouraging SnitchWire to use email encryption on our Riseup account snitchwire [at] riseup [dot] net. We've decided to take them up on that as well as publish our public key information for any interested parties out there. From what we have read, the matter is as simple as finding our public key and publishing it like so:

-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2.0.10 (MingW32) mQGiBEpIme0RBAD2UUnGTSieInKYPtscEVKVcNeMaizJagVHdyojLlMKdS9Cu9L4 B26nvbAkek/DYUbqp9Qw8ovXj/4sD0NIMhnUGypm8EGqleFZ86LlZWwJ8r+26ruh +NQJvrxUBjWtiM2tCviPq/bzt1Wxwg02ehInxFD2k1C0mZX8GCdw8QgzZwCgl9cQ oljd3Lvq1WaEUB97C1HCBZsEAIRoxM7hcO6sfcFBJ8wh/AE1MwS3hrDsUIBOpkrE chexxVfcuUcntmtTJ75IT2SHRCIxkh3OeWaC28TRrjfJZp/xKP5cKHbrj1kQc7Vb YqXfFK9FC6KKBuT/wdO/rcsZ7HNNjeIJOoax+cZY5EOTrqtSMGDOXt65bdZ77/JN esHlA/93dWGBlVG7/Yh8PNCFwwiv/Jhh0Pqvxe12SV8cKLtGUHKSAWs/l9Nhrbu4 Y90a8kRd8/omQXgS6obK9qfKz/kXxpn9KwnHOBSI6tW+piHNVZYLx43H5cygElvd bhty82raRGWluPoS2ozRlaVV5/aXlf4YVuYUF4iXDWGtrRifa7QhU25pdGNoV2ly ZSA8c25pdGNod2lyZUBnbWFpbC5jb20+iGAEExECACAFAkpIme0CGyMGCwkIBwMC BBUCCAMEFgIDAQIeAQIXgAAKCRCD5uHNB/z4yGmnAJ9fb1H3ApjDdYsOXU0PCyQS iI+rwACcCYq7pP70yohB9pJ2fsR87vNmGNy5AQ0ESkiZ7RAEAPn/O1ko7O/BYtpE u2CKjaXQMICbU2hT/X329f0hU4Gi5SkrDd+msz3UEfat43dA4/6reqIsXQjvSN7G 8QyvfxfAEO/rj/VkwgVs9cwQY2iAIsfrxyzLWUFfSxqSFDqSliRSQiK961Hz4UaI h/+HX8/OnE7DTdIIrLjuNntzfb7DAAMGA/98yG+L05ZmbC2DvAVHqg6mZFA9OTwe qiALAlHs42GU22+jgbAzXGGNZDGyM+vvw6X5naZ1OaIOTI4SItDsiMs+8KvwUspd 8vVt6N5T27lJriIECwUwYK/ubuu4W7t5fu5omUpjI9RWg/ComZQAKsdS4lrtSWSY 7dtDctUbkirh6YhJBBgRAgAJBQJKSJntAhsMAAoJEIPm4c0H/PjIwigAoI8uIB+A emxGod3+SosFcB93hEo8AJ4+Ck3dCaJhow0byAe3w0wO+9foRg== =d5d/ -----END PGP PUBLIC KEY BLOCK-----

Apparently, that is all we are supposed to do. Those of you who wish to send us mail through encrypted means, you now have our public key. Because we still hold access to our super-secret key that decrypts all of those good tips you zipped up for us, only SnitchWire will be able to read it and nobody else. From now on, we will also be digitally signing our emails so people communicating with us can be sure they are talking to the operators of this blog. Thank you all for the tips on how to get this system up and running, hopefully it will provide secure communication for this ongoing project.

Friday, June 26, 2009

Remember Harold Thompson!

In honor of the death of Harold Thompson, who died at 66 after serving time since 1979 for killing a pig snitch that took out the mother of one of his children, we are posting his seminal "Anarchist Survival Guide for Understanding Gestapo Swine Interrogation Techniques;" which in our opinion should be read by everyone who has ever even had to look down the snout of a pig and into their beady fucking eyes. Our man Harold had his ashes scattered in Northern Ireland, and he continues to be an inspiration to those who appropriate from the State without asking nicely and fight back in the face of oppression. His insight will be missed dearly.

--------------------------------

The primary thought you must have firmly in your mind, keep in your minds forefront, when questioned by police is if they, your police interrogators, possessed a solid, airtight, open and shut case against you they would not be bothering to question you at all. When you are approached refuse to be question and immediately demand an attorney be present to advise you of your constitutional rights before any questioning takes place. In an ideal world, and by well, established law, at this point all questioning is supposed to stop but that does not always happen as "clever" ploys are used by police to get you to volunteer for questioning or be forthcoming with information that rarely benefits you, a suspect but furthers the goal of their investigation. Never answer any questions, no matter how innocent they sound, after you have invoked your right to an attorney. Do not respond to any question no matter how fucking tempted or how harmless you think it to be! When read the Miranda rights you were told anything you say can and will be used against you in a court of law and that is precisely what it means. Anything you might say of even a microscopic incriminating nature will be interpreted as a major admission by creative minds which can and will be used against you. You can take that fact to the bank.

Police interrogators aren't your friends! Don't provide them with anything to use against you, only provide your basic statistical personal information such as name, age, address, birthday and social security! [Different states have different laws about what information one is required to give, check out you local laws.] They're your enemy if questioning you! Volunteer nothing! Either you are a suspect, friends or comrades are suspects or they are attempting to gather information to be used against you or your associates in the future. Your best interests, for you as a person, is the last thing on their minds. They're merely performing their government job. Don't allow yourself to become frightened or worse still to be lulled into a false sense of security. If they assault you, you can practice the popular American martial art of "I Sue!" Politely listen to their games. Remain silent no matter how long questioning lasts and don't allow yourself to be wore down with time, a favorite tactic employed by skilled questioners. Recognize their games and realize their societal job function is to lock you up, to clear a case file that may result in the destruction of your life, making you, your family and loved ones suffer, sometimes for months and in the worse scenario for years! Remain silent. Sooner or later they will give up questioning you altogether. They will move on to a weak willed person to manipulate into prolonged imprisonment.

There are two logical outcomes to interrogations. When questioning is done you are free to leave to join family, friends or comrades within the movement, a wiser, stronger willed soldier tested by fire, or you are locked up. If locked up, and you kept your mouth shut, as soon as possible as the opportunity presents itself after you request your one allowed phone call then call a bail bonding company or your lawyer. Your attorney will be pleased he/she has a client who remained silent and did not give a statement! Because of your wise silence your attorney may be able to perform the magic taught in law universities and colleges of law. Your attorney may be able to have the case dismissed in court later due to the lack of evidence at preliminary hearing if you are charged with a crime! If you have felt the need of confession other than to a priest then forget about lack of evidence dismissals. You volunteered so endeavor to enjoy your unique incarceration experience, dummy! Should there be other evidence against you ("Opps! Forgot my gloves! Fingerprints are Hollywood bull shit, right?!") by choosing to remain silent you have expanded your lawyer's defense strategy choices which may win your case in court in front of a jury made up of people of average ignorance. Those of you who immediately thought of the O.J. jury, shame on you!

Give up nothing! Give up nobody! Don't let your mouth put your ass in jail! Retain your rights! Remember you have the right not to incriminate yourself! Say nothing you or your friends will regret later in court while facing a stern faced judge and anal retentive, irate government prosecutor!

If you stayed with me to this point, the following will be some shallow, laughable mind games they may try to play on you with all the intensity of a child examining the first insect they encounter! Remember the cops talking to you, cajoling you to bear your soul, clear your conscience, "make yourself feel better" by telling them what happened because they "understand" after you do will laugh in your face, later in their locker room howl with laughter with each other about how utterly naive and gullible you are, call you an ignoramus and various other things, pat each other and themselves on the back and then pleased with their day's work go home to screw their wife, boyfriend or girlfriend and kick their dog, or vice versa.

After the interrogation is over as a just reward for your cooperation with these hardworking public servants who serve and protect the public, you will be led away to a filthy barren cell reeking with combined odors of sweat, body waste in liquid and solid form, stale tobacco smoke and hopelessness with dubious characters as your cell mates. You may have to fight to keep a food tray, a place to sit or sleep if you aren't immediately bailed out, you may discover yourself in a struggle to retain your shoes, shirt or jacket from predatory social prisoners. Remember how you felt your privacy was violated when a bathroom door was accidentally opened by another person on you at home, office, workplace, or elsewhere? Well, prepare yourself to forfeit all privacy expectation when Nature calls and you must answer the call in the sight, presence or within arm's reach of other hapless people! You may be forced to learn what it means to literally and figuratively stand your ground for the first time in your life in a jail or in prison. You may be forced to defend your sexuality, defend yourself against sexual predators or some people are forced to temporarily switch their sexual preferences becoming bisexual by circumstance to survive incarceration intact. Yell for help? None is forthcoming except in cases of extreme brutality or mutually combative situations as those who swore to serve and protect usually turn a blind eye to prisoners. If you confessed to police interrogators, aided with the crime investigation efforts, in an ill-fated effort to prove yourself intellectually superior to those questioning you stuck your foot in your mouth, you have condemned yourself with your own words, then you will in all likelihood, not pay the slightest attention to the following word of caution. Once booked, fingerprinted and slammed in a cell you should not talk about your case with those around you who may express interest in why you are locked up! Each prisoner willing to listen to your tale of woe is a potential threat of showing up in court to testify against you as a jailhouse informant or a cop put in the cell with you whose sole purpose was to gain confidence and solicit a confession! You may be a target so realize this fact and shut the fuck up! A classic example of this is years ago in the early 1980's, a State prisoner in Tennessee named Gary Hartman confided to a cell partner, Raymond Frazier, about a murder in which he was involved. Frazier got with another prisoner, Kenneth King, and they, with the aid of prison officials, contacted the attorney general's office and law enforcement, collected a $1,000 reward and Hartman was convicted and sentenced to death. After a decade plus on death row Hartman's death sentence was overturned on appeal and he was sentenced to life in prison. Just like during W.W. I and W.W. II, loose lips sink ships!

If you made a statement you may as well be pleased with your lousy career, life and health choices since you have volunteered for a stint, however prolonged or brief, in your chosen hell by "cooperating" with police? Not exactly a Norman Rockwell picture, is it? I refuse to "sugarcoat" this description of a potential first confinement experience horror to save your sensitivity or cater to your squeamishness. I would rather shock you to serious thought by speaking truth motivated by love for my sincere activist brothers and sisters engaged in struggle against the monsters of the earth guided by their hearts and knowledge of what is right rather than let you find out the painful hard way and begin a nightmare which will rob you of your life, of your productive years, and the progress you could have made during those forever lost years to the struggle.

GESTAPO STYLE INTERROGATION, 101

Subject Credit: Remaining Free

Following are some of the mind games the police play on the unwary to extract "voluntary" confessions. Know your enemy well, recognize their games and the many variations of them, as many and as varied as personalities of the accused and their interrogators. Your ability to remain free may someday well depend on your strength of character and knowledge of the tactics used, techniques employed and psychological pressures. Each one is designed to elicit a response from the person on whom they are employed.

1. The interrogator displays confidence in the guilt of the suspect with an air of "Convince me otherwise?"

2. The questioner points out some, but by no means all, of the circumstantial evidence indicative of a subject's guilt. This is a variation of I know more than I am saying and you are fucked if your story does not match what I know." More often than not they know zip, nothing, and so capitalize on any information you may provide, turn it around and throw it back at you to extract additional information.

3. The interrogator often calls attention to a subject's physical or psychological manifestations that may predict guilt, pulsation of the carotid artery, excessive activity of the Adam's Apple; avoidance of eye contact, foot wiggling, wringing of hands, finger tapping, picking at fingernails, other individualized nervous mannerisms or gestures evidencing themselves when a person is under stress/pressure. These are common "tells" high roller gamblers are aware of when exhibited by players. If a suspect is emotional then the questioner calls attention to the "peculiar feeling inside," playing on the concept of moral guilt attempting to extract a confession.

4. Interrogators often sympathize with subjects being questioned by commenting to the person something to the general effect of "...I might have done the same thing myself." or "...Anybody else under similar conditions (circumstances) might have done the same thing". This is to portray themselves as an "ally" or "friendly" in a hostile environment who can be trusted to help the subject ... but only If the targeted subject accepts the offered "common ground of friendship and understanding" deception bonding and confesses, opens up, to incriminate themselves or others.

5. An interrogator often will attempt to extract a confession during a questioning session by using phrases to reduce a subject's guilt feelings by minimizing the seriousness of the offense/crime, especially with charges of murder or violence. Examples: "Lots of other people would have done the same thing under the circumstances of your situation." "If somebody done me the way he/she/they done you, I would have done the same thing myself!"

6. A skillful questioner may suggest a less revolting, more morally acceptable motivation or reason for the offense you are charged with than that which is presumed.

7. In order to break an accused will to extract a confession a skilled interrogator will often sympathize with the suspect by (a) Condemning the victim; (b) Condemning any possible, or charged, accomplice suspects; or (c) Condemning anybody that any degree of moral responsibility might conceivably be bestowed on for commission of the offense in question or already charged.

8. Interrogators fake understanding and sympathy to urge a subject to confess while making some physical contact, pat on a hand or shoulder, grip of a hand often followed by proclamations by the interrogator that if his mother, father, brother, sister, wife, child, girlfriend, gay lover, etc., was charged with the subject's crime he would "...advise them to confess...", "...speak (tell) the truth..." Interrogators will often invoke moral concepts with phrases like "Confessing is the only decent and honorable thing to do." or "You should relieve your conscience and get it over with so you feel better..." in low, sympathetic tones to attempt to establish an emotional link with a subject, particularly with a person who has been subjected to several lengthy periods of intensive questioning and underwent an emotional battering from continuous questioning most often with interrogators performing in "shifts". The infamous "Good Cop-Bad Cop" or friendly/unfriendly routine is most often used after other tried techniques and ploys utilizing mock sympathy and understanding have proven ineffective to the dismay of Chief Inspector Impotent, Officer Orifice or Detective Dinky Winky. Whoever hasn't seen this Mutt & Jeff routine used to death on television and in movies, please raise your hand? However, believe it or not, as sad as it is, these theatrics often work after a dullard is subjected to a prolonged period of psychological battering. Falling for this merits a groaned Duh!

9. A skilled interrogator often uses a ploy of pointing out the possibility of exaggeration on the part of the accuser or victim or exaggerates the nature or seriousness of the offense charged in order to frighten a subject into making a "justification statement" wherein they attempt to explain away "what really happened" and thereby hopelessly incriminate themselves! This merits a double "Duh!"!

10. An interrogator will attempt to have a questioned person hypothetically place themselves at the scene of the crime, in some sort of contact with the victim or the occurrence giving rise to the crime or crimes they are subjected to questioning about to gather information or attempt to have the person inadvertently make an admission of guilt through a slip of the tongue.

11. If a person is naive enough to admit to being at the scene of a crime the interrogator will watch for inconsistencies in the subject's version of what happened by requesting repetitious telling of the subjects story then point out discovered inconsistencies to seek admissions of lying about some incidental aspect of the occurrence or crime. Each such admission elicited from a subject makes the subject more psychologically susceptible to coughing up the "whole story".

12. An interrogator will often appeal to the subject's ego and pride through well selected flattery or a direct challenge to honor thereby using against a subject, and capitalizing on, the basic human trait to seek and enjoy the approval of others as if predator and prey are in a normal societal environment or setting.

13. The futility of resistance to telling the truth or confessing will be repeatedly pointed out during questioning.

14. A skillful interrogator will repeatedly point out to the subject the grave consequences of a continuation of his/her "criminal behavior". This is an argument which falls flat on its' face, is a guaranteed failure with politically motivated suspects who are motivated out of a sense of righteousness. This ploy quite often works with social crime suspects because during the course of their ill chosen criminal careers many repeat offenders experience a fleeting desire, or possess intentions, to rehabilitate or reform themselves.

15. Sometimes interrogators rather than seek a general admission of guilt will first ask the suspect a question about some aspect or detail of the crime or make inquiries as to the "reason" for its commission as if puzzled as to why it happened? This is nothing more than a play on the impulse to confess which becomes more intensified the longer most people are grilled and especially with the young and inexperienced.

16. When suspects are questioned after previously listed grilling techniques have met with failure or it is surmised they will fail if employed, interrogators will often take pleasure in pitting suspects against another. They are separated during questioning and each told the other, or others, gave statements placing primary blame on the subject each interrogator is questioning. The person is asked to "Set the record straight before he/she/they make you the fall guy!" or "You are stupid for not making a statement! Your buddy gave you up so you may as well tell ­us what happened!" Revelations such as these are accompanied by angry gestures and bullying. If a suspect shows weakness he or she is then displayed mock sympathy. Know the people you are with when you do a direct action! Have your stories straight before you go on any action! Keep your mouth shut! Depend on them as they are depending on you. Don't fall for transparent games. This most successful of questioning techniques requires no further explanation as it has been portrayed ad nauseam in cheap B-Grade gangster movies for decades. This is a tried and true, timeworn, method of obtaining confessions which few accused should logically fall for but many do in the criminal world due to distrust of their associates. With politically motivated suspects divide and conquer ploys have much smaller success rate but still sometimes succeed.

17. Interrogators will seek admissions of knowledge of a crime being investigated by asking if a suspect knows "why" they are being questioned. A grievous error is committed when a suspect volunteers information or any knowledge of a crime providing details which he/she could only possess if that person committed the crime or was present when it was committed. Admission of such knowledge aids investigation efforts as the interrogator is aware the subject of questioning is either the perpetrator of the crime, was complicit in the commission of the crime or is a witness. The best advice is volunteer nothing and remain mute except for required personal identity information. Protestations of innocence only serve to open a dialogue with questioners, often proving counterproductive to the interest of the accused.

18. The interrogator begins a questioning session by asking a subject to relate all he/she knows about the victim and other possible suspects leading up to questions about the actual incident/offense/crime. It often proves difficult for most subjects of questioning to stop talking once they have started than to never start talking in the first place. People enjoy talking and trying to impress others with what they know on any subject.

19. Skilled interrogators will attempt to obtain detailed information from the subject about their activities before, at the time of and after the crime. Some subjects will attempt to place themselves at the scene either before or after a crime has been committed or in close proximity to where the crime occurred thereby driving nails into their own coffin at future prosecution.

20. When facts of a crime are already known by police interrogators they will often ask about these known facts in a casual manner as though the facts was not already known by the authorities to rattle a suspect's nerves and make them more vulnerable to aggressive interrogation techniques. This is done in order to create suspicion in a suspect others involved have already made a confession. The volatile emotional mixture of fear, distrust and suspicion has turned friends, lovers, partners and family members against each other. If interrogators can pit one against another to achieve a confession they will do it with immense pleasure, wrecking friendships, causing betrayed trust and destroying families! Your family, friends and you are about as important to them as discarded toilet tissue! If you realize this you are light-years ahead of falling for pressure tactic mind games!

At demonstrations where there is even the slightest chance of a cop riot try to always stay close to trusted friends in case you get swooped up by the cops! Trust them if you are arrested or if you all are nicked! If you are arrested in the chaos and confusion of a cop riot, they will know what happened and can get you a bail bondsman or attorney while you are trucked off to jail. If you are all busted then there is morale strength in numbers, you can pool resources and all get out of the can. The old concept of all for one and one for all! Go to demonstrations and other direct action activities with your trusted friends. Take only those tried and true friends you trust on all direct action operations! When your ass is on the line then it is the wrong time to test their loyalty. Realize the strength of your comrades during questioning, shut the fuck up, stifle any urge to talk, and definitely don't confess to anything to effectively volunteer to become a jail or prison population statistic.

21. An interrogator during a questioning session will sometimes at intervals ask a suspect questions about other people in a manner implying correct answers are already known. One such question would be asking how long you have known John Smith rather than if you knew John Smith. Another ploy consists of prefacing a question that does not bear directly on guilt or innocence with an admonishment to think carefully before you answer the next question. It is most commonly used while the interrogator shuffles through papers or while holding papers, a question is posed and followed by an expression of doubt after you give an answer to whatever question was asked. This type of questioning is a probe for a justification response from you. Offer nothing whether you think it is already known or not and ignore this category of question entirely.

22. An interrogator might refer to some nonexistent piece of incriminating "evidence" to see if the suspect will attempt to explain it away. If a suspect does it suggests guilt as the guilty are concerned about covering their tracks and worry about the police discovering incriminating evidence inadvertently overlooked at the crime scene. An innocent suspect has no tracks to cover so obviously does not have to speculate about the discovery of incriminating evidence.

23. A skilled questioner may ask if a person being questioned has ever "thought" about committing the offense being investigated or one similar to it. If you are clueless enough to answer such an inquiry your questioner is likely to show up in court to testify about how you bragged or boasted about thinking of committing the crime! A resounding reply of "No!" is a characteristic response of innocent people. If you allowed yourself to slip and answer in the affirmative the next logical question will be something like "Thinking like that finally got to the point where during one of your weakest moments, when you were under the extreme pressure, you gave in? I can understand that so tell me about it?" Duh!

24. With vandalism, property destruction or theft cases the interrogator will attempt to coerce a suspect into an offer of restitution which is a dear indicator of guilt. The normal response of an innocent suspect when restitution is mentioned is a loud and clear statement from them they are not going to pay for something they did not do or steal. The response being fished for from a guilty person is agreement the aggrieved individual, party or business should be reimbursed for their loss followed by a proclamation the suspect did not have anything to do with whatever it was defaced, destroyed or stolen. The suspect has placed himself in the position of appearing to be a guilty dunce!

25. A suspect is often asked if they are willing to take a polygraph test? Innocent people almost always agree to take practically any test immediately to prove their innocence. A guilty person is prone to refuse a lie detector test immediately or find excuses to back out of taking it after agreeing. The truth is few communities have this service available as an investigative tool and are using the only resource available, a skilled, common sense interrogation without aid of electronic instrument assistance in their quest to pin the tail on the donkey. Should you agree to take a polygraph examination 99.9% of the time the offer to provide the test proves nothing but a smoke screen, a bluff or ploy to determine your willingness to prove your innocence. A savvy person will press the issue and demand such a test in these circumstances. The back pedaling of the authority figure might even prove amusing to watch for comic relief in a stressful situation?

26. Police investigators know, beyond any doubt, the suspect who states something like "All right, I will tell you what you want but I didn't do It!" is, in all probability, guilty.

THERE ARE AS MANY VARIATIONS OF INTERROGATION TECHNIQUES AS THERE ARE COPS! THOSE PREVIOUSLY LISTED ARE MERELY A FEW OF THE MOST POPULAR, THE MOST OFTEN USED ONES.

THE BEST ADVICE I CAN GIVE REGARDING POLICE INTERROGATION, IF THE ENEMY PERSIST IN QUESTIONING YOU IN SPITE OF YOUR REQUEST FOR AN ATTORNEY, IS TO REMAIN SILENT DURING ALL QUESTIONING AND ANSWER NOTHING ASKED!

DO NOT OFFER INFORMATION NO MATTER HOW UNIMPORTANT OR TRIVIAL YOU DEEM IT TO BE, BECAUSE YOU MAY UNBEKNOWNST BE OFFERING UP THE TIDBIT OF INFORMATION WHICH IS THE PIECE THAT COMPLETES THE PUZZLE FOR THEM TO PROSECUTE YOU OR OTHERS!

NEVER TRY TO FISH FOR INFORMATION AS POLICE WILL ALWAYS OBTAIN MORE INFORMATION THAN THEY GIVE! ALWAYS! NEVER FORGET IT!

PLAIN AND SIMPLE, STAY QUIET, MUTE, AND FREE AND GIVE YOURSELF THE BEST CHANCE TO WIN YOUR CASE IF BROUGHT TO TRIAL BY USING YOUR RIGHT TO REMAIN SILENT!

I APOLOGIZE TO ALL PIGS EVERYWHERE FOR DEFAMING YOUR SPECIES BUT I AM A PRODUCT OF THE SIXTIES WHEN JACK. BOOTED GESTAPO SNOUTS WITH BADGES WAS CALLED "PIGS"!

I WISH ALL MY BROTHERS AND SISTERS IN STRUGGLE THE BEST OF LUCK! I HOPE I NEVER SEE YOU IN HERE WITH ME! CONFUSION TO OUR ENEMIES! STAY SILENT, STAY FREE! THEY WILL NEVER GET US ALL!

Thank you to the original host.

Wednesday, June 24, 2009

An Open Invitation to Those Resisting the G20

SnitchWire is typically used as a clearinghouse for above-ground or independent news sources regarding police infiltration activity, snitches, and agent provocateurs. This is all well and good, considering it gives people the opportunity to research into the methodology and tactics as well as delve into contemporary cases and possibly launch support for incarcerated comrades or victims of a money-motivated informant's frame; but this is not what SnitchWire was intended to be when it was put up.

SnitchWire's primary function was meant to be a blog where anyone with a reason to be concerned about security culture could learn the names, faces, and regional locations of rats. Basically, a gallery of people not worth talking to or organizing with because of their nefarious relationship with the State. This is the only kind of blacklist worth keeping, and with good reason. SnitchWire is supposed to be a conduit transmitting crucial, verified information in an open, public format about such kinds of characters to parties who could be potentially hurt by their actions.

This project was started as a reaction to the Green Scare cases, the RNC8 (+2), Brandon fucking Darby and countless other cases in which government sponsored informants ratted out activists, anarchists, and revolutionaries. This project aspires for autonomy, and a world where neighbors and communities are strong enough and tight enough to live without the need to tattle on each other, because ideally there is nobody to tattle on. People are getting locked up for a long time to make that kind of shit possible, and most of them could have got away if it weren't for loose lips or somebody who hung around that "everyone thought was totally sketchy but we didn't want to like, be jerks."

With the G20 coming up in Pittsburgh, all sorts of protest cliques are heating up and getting down and dirty with some motherfucking logistics and organizing. Also, the Crimethinc Convergence is in Pittsburgh next month, allowing a fantastic networking opportunity the State has used before to infiltrate anarchist groups. SnitchWire wants to find out who these people are and tell the goddamn world before they implicate good people into a bullshit conspiracy. SnitchWire is encouraging affinity groups, regional federations, concerned individuals, and those pesky counter-snitches from all different political or organizational backgrounds to send any information on possible informant activity. Our only request is that the information or accusations are not unfounded. Here are some guidelines if you think you have a snitch in your midst:
  • Don't start pointing fingers! You don't know shit yet. No need to unnecessarily alienate others with paranoid, baseless accusations.
  • Consult with other members of your group or organization. If they are harboring similar feelings, investigate further into the matter discreetly. If there are other people that can corroborate your accusation, please encourage them to drop us a line as well should we investigate your case further. Should it become apparent that the accused is guilty of cooperating with the State and selling out people they are supposed to be a friend to, ask them to cease interacting with the group.
  • Gather your evidence, write up a short report, attach whatever sort of media you can provide, and send it to us at snitchwire (at) gmail (dot) com. Please provide the names, preferred genders, and all other information that is pertinent to identifying the rat. SnitchWire's purpose is to make sure nobody is ever fooled by the same person twice, and that the State has very little time before their moles are rooted out.
We are in the business of naming names. We won't drag anyone's name through the mud unless we are 100% positive that they deserve it. Exposing the State's pawns is important to making sure communities in resistance can communicate freely and organize without being afraid of trumped up ramifications. Please assist SnitchWire to inform people all over the world of the people that cannot be trusted by sending tips to us. We will respond within 48 hours, and you're more than welcome to remain anonymous.

Friday, June 19, 2009

The SHAC Model (via Crimethinc)

(SW note: Back from unannounced hiatus, regular posting to commence ASAP)

“We were aware of the activists, but I don’t think we understood exactly to what lengths they would go.”
–Warren Stevens, on dropping a $33 million loan to
Huntingdon Life Sciences despite having vowed never to do so,
following rioting at his offices in Little Rock and vandalism of his property


“The number of activists isn’t huge, but their impact has been incredible . . . There needs to be an understanding that this is a threat to all industries.
The tactics could be extended to any other sectors of the economy.”
–Brian Cass, managing director of HLS


“Where all animal welfare and most animal rights groups insist on working within the legal boundaries of society, animal liberationists argue that the state is irrevocably corrupt and that legal approaches alone will never win justice for the animals.”
–ALF Press Office

Over the past decade, Stop Huntingdon Animal Cruelty—SHAC—has waged an international direct action campaign against Huntingdon Life Sciences, Europe’s largest contract animal testing corporation. By targeting investors and business partners of HLS, SHAC repeatedly brought HLS to the brink of collapse, and it took direct assistance from the British government and an international counter-campaign of severe legal repression to keep the corporation afloat.

In the wake of this campaign, there was talk of applying the SHAC model in other contexts, such as environmental defense and anti-war organizing. But what is the SHAC model, precisely? What are its strengths and limitations? Is it, in fact, an effective model? If so, for what?

First, a Glossary of Terms

Viewed from outside, the animal rights milieu can be confusing, even for other radicals. On one hand, the intense focus on this single issue can contribute to an insular mindset, if not outright myopia; on the other hand, there are countless animal liberation activists who see their efforts as part of a larger struggle against all forms of oppression. Those not familiar with the inner workings of the milieu often conflate the positions of opposing factions. At the risk of oversimplifying, it is possible to identify three distinct schools of thought:

Animal Welfare–The idea that animals should be treated with mercy and compassion, especially when they are used for human benefit such as food production. For example, some animal welfare advocates lobby the government for more humane slaughter laws.

Example: the Humane Society of the United States (HSUS)

Animal Rights–The idea that animals have their own interests and deserve legislation to protect them. Those who believe in animal rights often maintain vegan diets and oppose the use of animals for entertainment, experimentation, food, or clothing. While they may participate in protests or civil disobedience, they also generally believe in working within the system, through lobbying, marketing, outreach, and use of the corporate media.

Example: People for the Ethical Treatment of Animals (PETA)

Animal Liberation–The idea that animals should not be domesticated or held in captivity. Since this is not possible within the logic of the current social and economic system, animal liberationists often tend towards anarchism, and may break laws in order to rescue animals or to preserve habitat.

Example: the Animal Liberation Front (ALF)[1][1] Unlike HSUS and PETA, the ALF is not technically an organization, but rather a banner taken up by autonomous cells which do not necessarily have any connection to each other.

Many groups focused on animal welfare and animal rights have criticized those who engage in direct action, arguing that such actions hurt the image of animal advocates and alienate potential sympathizers. It’s also possible to interpret this criticism as motivated by the economic inducement of building up a wealthy membership base and the fear of running afoul of government repression. In addition to denouncing direct action, prohibiting their employees from interacting with those who countenance it, and pulling out of conferences including more militant speakers, organizations such as HSUS have gone so far as to laud the FBI for cracking down on animal liberation efforts. In 2008, HSUS ostentatiously offered a $2500 reward to anyone providing information leading to the conviction of persons involved with an arson alleged by the FBI to be the work of animal rights activists.

The SHAC Story: Overseas Beginnings

The SHAC campaign originated in Britain, following a series of successful closures of laboratory animal breeders involving tactics from picketing to ALF raids and clashes with the police. Video footage shot covertly inside HLS in 1997 was aired on British television, showing staff shaking, punching, and shouting at beagles in an HLS lab. PETA stopped organizing protests against HLS after being threatened with legal action, and SHAC formed to take over the campaign in November 1999.

Huntingdon Life Sciences was a more formidable target than any individual animal breeder; the SHAC campaign constituted an escalation in animal rights activism in Britain. The idea was to focus specifically on the corporation’s finances, utilizing the tactics that had closed small businesses to shut down an entire corporation. Activists set out to isolate HLS by harassing anyone involved with any corporation that did business with them. The role of SHAC as an organization was simply to distribute information about potential targets and report on actions as they occurred.

In January 2000, British activists publicized a list of the largest shareholders in HLS, including those who held shares through third parties for anonymity—one of which was Britain’s Labour Party. Following two weeks of pitched demonstrations, many shareholders sold their holdings; finally, 32 million shares were placed on the London Stock Exchange for one penny each and HLS stocks crashed. In the ensuing chaos, the Royal Bank of Scotland wrote off an £11.6 million loan in exchange for a payment of just £1 in order to distance itself from the company, and the British government arranged for the state-owned Bank of England to give them an account because no other bank would do business with them. The company’s share price, worth around £300 in the 1990s, fell to £1.75 in January 2001, stabilizing at 3 pence by mid-2001.

On December 21, 2000, HLS was dropped from the New York Stock Exchange; three months later, it lost its place on the main platform of the London Stock Exchange as well. HLS was only saved from bankruptcy when its largest remaining shareholder, the American investment bank Stephens, gave the company a $15 million loan. This chapter of the story closed with HLS moving its financial center to the United States to take advantage of US laws allowing greater anonymity for shareholders.

In the USA

Meanwhile, in the United States, the anti-fur campaigns that had characterized much of 1990s animal rights organizing had plateaued; the tactics of civil disobedience developed in those campaigns had reached a point of diminishing returns, and many activists were casting around for new targets and strategies. One faction of the animal rights movement, exemplified by groups like Vegan Outreach and DC Compassion Over Killing,[2][2] According to reports, the main organizers of this group have since joined HSUS. This is an example of the subtle conflicts and power dynamics that play out in the animal rights movement: SHAC organizers complain that HSUS absorbs committed activists by giving them paying jobs and forbidding them to collaborate with more militant activists. moved on to promoting veganism. More militant activists sought other points of departure. Some, like Kevin Kjonaas, who went on to become president of SHAC USA, had been in Britain and witnessed the apex of the British SHAC campaign, just as anti-globalization activists visiting Britain in the 1990s had brought back heady tales of Reclaim the Streets actions.

The US SHAC campaign came out of conversations between animal rights activists in different parts of the country. While the vegan outreach campaign sought to appeal to the lowest common denominator in order to win over consumers, SHAC attracted militants who wanted to make the most efficient use of their individual efforts. Some reasoned that it was unlikely that the entire market base for animal products would be won over to veganism, especially insofar as people tend to be defensive about their lifestyle choices, but practically everyone could agree that punching puppies is inexcusable.

SHAC USA got started in January 2001, just as Stephens, Inc. saved HLS from bankruptcy. Stephens was based in Little Rock, Arkansas, so a number of activists moved there to organize. In April, 14 beagles were liberated from the new HLS lab in New Jersey; at the end of October, hundreds of people gathered in Little Rock for a weekend of demonstrations at Warren Stephens’ home and the offices of Stephens, Inc. By the following spring, Stephens had ditched HLS, breaking off a five-year contract after only one year.

Unrivaled by any campaign of comparable scale and effectiveness, SHAC took off quickly in the US. Thanks in part to superior funding,[3][3] Unlike many social movements, the animal rights movement is supported by wealthy donors, and we can assume that some of them have contributed to SHAC. the propaganda was colorful and exciting, as were promotional videos that juxtaposed heart-wrenching clips of animal cruelty with inspiring demonstration footage to a pulse-racing soundtrack of techno music. The campaign offered participants a wide range of options, including civil disobedience, office disruptions, property destruction, call-ins, pranks, tabling, and home demonstrations. In contrast to the heyday of anti-globalization summit-hopping, targets were available all around the country, limited only by activists’ imaginations and research. The intermediate goals of forcing specific investors and business partners to disconnect from HLS were often easily accomplished, providing immediate gratification to participants.

Whereas an individual might feel insignificant at an antiwar march of thousands, if she was one of a dozen people at a home demonstration that caused an investor to pull out, she could feel that she had personally accomplished something concrete. The SHAC campaign offered the kind of sustained low-intensity conflict through which people can become radicalized and develop a sense of collective power. Running in black blocs with friends, evading police after demonstrations, listening to inspirational speeches together, walking through offices yelling on bullhorns, reading other activists’ reports online, the feeling of being on the winning side of an effective liberation struggle—all these contributed to the seemingly unstoppable momentum of the SHAC campaign.

Action

“Carr Securities began marketing the Huntingdon Life Sciences stock. The next day, the Manhasset Bay Yacht Club, to which certain Carr executives reportedly belong, was vandalized by animal rights activists. The extremists sent a claim of responsibility to the SHAC website, and three days after the incident, Carr terminated its business relationship with HLS.”
John Lewis, Deputy Assistant Director
FBI Oversight on so-called “Eco-terrorism”


Direct action against those doing business with HLS has taken many forms, occasionally escalating to arson and violence. In February 2001, HLS managing director Brian Cass was hospitalized after being attacked with axe handles at his home. That July, the Pirates for Animal Liberation sank the yacht of a Bank of New York executive, and the bank soon severed ties with the lab. A year later, smoke bombs were set off at the offices of Marsh Corp. in Seattle, causing the evacuation of the high rise and their disassociation from HLS. In fall of 2003, incendiary devices were left at Chiron and Shaklee corporations for their contracting with HLS. In 2005, Vancouver-based brokerage Canaccord Capital announced that it had dropped a client, Phytopharm PLC, in response to the ALF firebombing of a car belonging to a Canaccord executive; Phytopharm had been doing business with HLS. All this took place against a backdrop of constant smaller-scale actions.

In December 2006, HLS was prevented from being listed on the New York Stock Exchange, an unprecedented development that resulted in a full page ad in the New York Times portraying a masked, apparently leather-jacketed caricature of an activist declaring “I control Wall Street.”[4][4] This advertisement is all the more ironic in view of the role masked thugs in nations like Colombia continue to play in defending the interests of corporations who trade on Wall Street. In 2007, eight companies dropped HLS, including their two biggest investors, AXA and Wachovia, following home demonstrations and ALF visits to executives’ houses. In 2008, incendiary devices were left under Staples trucks and Staples outlets were vandalized. About 250 companies altogether have dropped in the course of the campaign, including Citibank, the world’s largest financial institution; HSBC, the world’s largest bank; Marsh, the world’s largest insurance broker; and Bank of America.

Maintaining Momentum

It’s interesting to compare the arc of the SHAC campaign to that of the so-called anti-globalization movement. Both took off in Britain before catching on in the United States. SHAC was founded in England the same month as the historic WTO protests in Seattle; it got going in North America at the tail end of the anti-globalization surge, and maintained momentum after the US wing of the anti-globalization movement collapsed in the wake of the terrorist attacks of September 11, 2001.

How was the SHAC campaign able to maintain momentum while practically every other direct action-based campaign foundered or was co-opted by liberals? Can we derive lessons about how to weather crises from its example?

SHAC activists differed from participants in most other social movements in that they neither perceived themselves to need positive press coverage nor regarded negative press coverage as a bad thing. Their goal was to terrify corporations out of doing business with HLS, not to win converts to the animal rights movement. The more fearsome and crazy they appeared in the media, the easier it was to intimidate potential investors and business partners. Activists in other circles feared that the terrorism scare would make it easy for the government to isolate them by portraying them as dangerous extremists; for SHAC, the more dangerous and extreme they appeared, the better.

All this came back to haunt them in the end, when the most influential organizers went to trial and it was easy for the prosecution to frame them as representatives of a frankly terroristic underground. In this regard, the greatest strengths of the SHAC campaign—the relationship between public and covert organizing, the fearsome reputation—also proved to be its Achilles heel. The lesson seems to be that this approach can be effective on a small scale, so long as organizers do not provoke a confrontation with forces much stronger than themselves.

In addition to the matter of press coverage, it may be instructive to look at the way SHAC organizers framed the issues. SHAC spokespeople never backed down from emphasizing the necessity of direct action for animal liberation, even when the rest of the nation was fixated on Al Qaeda; the historic mobilization in Little Rock took place only a month and a half after the attacks on the World Trade Center and the Pentagon. Regardless of what happened in New York or Afghanistan, they emphasized that there were animals suffering at that very moment, who could be spared if people took a few concrete steps. Had organizers in other circles been able to maintain this kind of focus and urgency, history might have taken a different turn at the beginning of this decade.

It’s possible, also, that with other forms of organizing at a lower ebb, SHAC picked up more participants than it would have if other direct action campaigns had maintained momentum. In contrast to the massive symbolic actions of the antiwar movement, the SHAC campaign was a hotbed of experimentation, in which new tactics were constantly being tested. For direct action enthusiasts concerned with making the most of their efforts—or simply bored with being treated as a number in a crowd estimate—it must have been seductive by comparison.

Whatever the cause, the SHAC campaign was able to maintain momentum until federal repression finally began to take its toll. Unlike many campaigns, which have faded due to attrition or cooptation, it took the full power of the state to check its advance.

Repression

All the accomplishments of the SHAC campaign came at a price. The more businesses dropped relations with HLS, the more attention the campaign attracted from law enforcement agencies and right wing think tanks. SHAC organizers in general were not an easily intimidated breed; it was common for participants in the campaign to joke about all the lawsuits and injunctions they had racked up and how little it mattered if they were sued as they had no money anyway.

The US and British governments ratcheted up repression steadily over the years, placing activists under surveillance, hitting them with lawsuits, blocking their fundraising efforts, intimidating organizations like PETA out of interacting with them, passing new laws against demonstrations in residential neighborhoods, and shutting down their websites. This culminated in the US with the trial of the so-called SHAC 7: six organizers and the SHAC USA corporation itself.

On May 26, 2004, Lauren Gazzola, Jake Conroy, Josh Harper, Kevin Kjonaas, Andrew Stepanian, and Darius Fullmer were indicted on various federal charges for their alleged roles in the campaign. Teams of FBI agents in riot gear invaded their homes at dawn, threatening them and their pets with guns and handcuffing their relatives. The investigation leading up to the arrest was reportedly the FBI’s largest investigation of 2003; court documents confirm that wiretap intercepts in the investigation outnumbered the intercepted communications of that year’s second largest investigation 5 to 1.

The defendants were all charged with violating the Animal Enterprise Protection Act, a controversial law intended to punish anyone who disrupts a corporation that profits from animal exploitation; some were also charged with interstate stalking and other offenses. The defendants were never charged with engaging personally in any threatening acts; the government based its case on the notion that they should be held responsible for all the illegal actions taken to further the SHAC campaign, regardless of their involvement. They were found guilty on March 2, 2006, sentenced to prison terms ranging from one to six years, and ordered to pay tremendous quantities of money to HLS.

The SHAC 7 trial was clearly intended to set a precedent for targeting public organizers of campaigns that include covert action; its repercussions were felt as far away as England. In 2005, the British government passed the “Serious Organized Crime and Police Act” specifically to protect animal research organizations. On May 1, 2007, after a series of raids involving 700 police officers in England, Holland, and Belgium, 32 people linked to SHAC were arrested, including Heather Nicholson and Greg and Natasha Avery, among the founders of SHAC in Britain. In January 2009, seven of them were sentenced to prison terms between four and eleven years.

The Future of SHAC

Despite all these setbacks, the SHAC campaign continues to this day, though it faces serious challenges in the United States. Some regional organizations are still active, and autonomous actions continue to occur, but there is no nationwide organizing body, no newsletter, no reliable website to publicize targets and action reports. Consequently, there is less strategic targeting, less outreach and networking, and a lack of national events. The upside is that it has become more difficult for companies to figure out who to subpoena or seek injunctions against—but that’s a narrow silver lining.

This downturn can be attributed to government repression in general and the SHAC 7 trial specifically. Fear of legal repercussions has increased at the same time as key organizers have been taken out of action. With new local laws prohibiting residential picketing, and the Animal Enterprise Terrorism Act of 2006 making interstate tertiary targeting illegal, many tactics that once involved little risk are no longer feasible. Now that more public forms of organizing are being more aggressively punished, it seems possible that the next generation of animal liberation activists will focus more on clandestine tactics. One of the strongest features of the SHAC campaign was the combination of public and clandestine approaches, so this is not necessarily good news for the movement.

It’s actually quite surprising that HLS is still in existence; half a decade ago, SHAC organizers must have been banking on already having won by this point. When Stephens, Inc. divested, their loans were all that kept HLS running; it was only the British government intervening again that enabled HLS to negotiate a refinancing and continue. Essentially, SHAC did win, only to have its victory stolen away. The same situation recurred when SHAC forced Marsh Inc. to break off ties, and HLS was faced with the prospect of operating without the insurance mandated by law. Again, the British government intervened, and HLS was given unprecedented coverage by the Department of Trade and Industry. Without this protection from the very pinnacle of power, HLS would be long gone—but that’s precisely why governments exist: to protect corporations and preserve the smooth functioning of the capitalist economy. Perhaps it was naïve to believe that the governments of Britain and the USA would permit even the fiercest animal liberation campaign to run an influential corporation out of business.

One can’t fight like there’s no tomorrow indefinitely, and the repeated return of HLS from the dead must have been maddening for long-term SHAC organizers who staked everything again and again on one final push. Participants disagree as to how significant a factor burnout has been, but it would be foolish to rule it out. The SHAC campaign has been oriented towards full-time activism from the beginning, the mindset being that, as HLS employees work full time, their opponents must work at least that hard. Newsletter articles such as the “SHACtivist workout routine” indicate a high-pressure approach that probably correlates with a high rate of burnout. In any case, as difficult as it may be to distinguish the effects of burnout from those of fear, many activists have indeed dropped out of SHAC without moving on to other campaigns.

SHAC is currently active in mainland Europe and Latin America, and unrelenting in Britain. The British SHAC campaign may offer a better model for how to handle federal repression; from this vantage point, it appears that British activists were prepared in advance for it, had people ready to take over for central organizers, and were more open to new people getting involved. But Britain is more densely populated than much of the United States and has a richer history of animal rights organizing, so it is unfair to compare the two campaigns too closely.

Will SHAC ultimately succeed in shutting down HLS? It’s still possible, though it looks less likely than it did a few years ago. Some still feel that the most important thing is to close HLS at all costs, to win an historic victory that will inspire activists and terrify executives for decades to come. Others think that, whether or not HLS shuts down, SHAC has served its purpose, demonstrating the strengths and limitations of a new model for anticapitalist organizing.

Hallmarks of the SHAC Model

When people think of SHAC, they picture demonstrations at the homes of employees and investors; some anarchists mean nothing more than this when they refer to the “SHAC model.” But home demonstrations are merely incidental to the formula that has enabled SHAC to wreak such havoc upon HLS. To understand what made the campaign effective, we have to look at all its essential characteristics together.

• Secondary and tertiary targeting:[5][5] Secondary targeting means going after a person or entity who does business with the primary target of a campaign. Tertiary targeting means going after a person or entity who is connected to a secondary target. The SHAC campaign set about depriving HLS of its support structure. Just as a living organism depends on an entire ecosystem for the resources and relationships it needs to survive, a corporation cannot function without investors and business partners. In this regard, more so than any standard boycott, property destruction, or publicity campaign, SHAC confronted HLS on the terms most threatening to a corporation. Starbucks could easily afford a thousand times the cost of the windows smashed by the black bloc during the Seattle WTO protests, but if no one would replace those windows—or the windows had been broken at the houses of investors, so no one would invest in the corporation—it would be another story. SHAC organizers made a point of learning the inner workings of the capitalist economy, so they could strike most strategically.

Secondary and tertiary targeting works because the targets do not have a vested interest in continuing their involvement with the primary target. There are other places they can take their business, and they have no reason not to do so. This is a vital aspect of the SHAC model. If a business is cornered, they’ll fight to the death, and nothing will matter in the conflict except the pure force each party is able to bring to bear on the other; this is not generally to the advantage of activists, as corporations can bring in the police and government. This is why, apart from the axe handle incident, so few efforts in the SHAC campaign have been directed at HLS itself. Somewhere between the primary target and the associated corporations that provide its support structure, there appears to be a fulcrum where action is most effective. It might seem strange to go after tertiary targets that have no connection to the primary target themselves, but countless HLS customers have dropped relations after a client of theirs was embarrassed.

Complementary relationship between public and underground organizing: More than any other direct action campaign in recent history, the SHAC campaign achieved a perfect symbiosis of public organizing and underground action. To this end, the campaign was characterized by an extremely savvy use of technology and modern networking. The SHAC websites disseminated information about targets and provided a forum for action reports to raise morale and expectations, enabling anyone sympathetic to the goals of the campaign to play a part without drawing attention to themselves.

• Diversity of tactics: Rather than pitting exponents of different tactics against each other, SHAC integrated all possible tactics into one campaign, in which each approach complemented the others. This meant that participants could choose from a practically limitless array of options, which opened the campaign to a wide range of people and averted needless conflicts.

• Concrete targets, concrete motivations: The fact that there were specific animals suffering, whose lives could be saved by specific direct action, made the issues concrete and lent the campaign a sense of urgency that translated into a willingness on the part of participants to push themselves out of their comfort zones. Likewise, at every juncture in the SHAC campaign, there were intermediate goals that could easily be accomplished, so the monumental task of undermining an entire corporation never felt overwhelming.

This contrasts sharply with the way momentum in certain green anarchist circles died off after the turn of the century, when the goals and targets became too expansive and abstract. It had been easy for individuals to motivate themselves to defend specific trees and natural areas, but once the point for some participants was to “destroy civilization” and everything less was mere reformism, it was impossible to work out what constituted meaningful action.

Advantages of the SHAC Model

When the model pioneered by SHAC is applied correctly, its advantages are obvious. It hits corporations where they are most vulnerable: corporations do not do what they do because of ethical commitments or in order to obtain a certain public image, but in single-minded pursuit of profit, and the SHAC model focuses exclusively on making corporate wrongdoings unprofitable. In terms of building and maintaining a long-running direct action campaign, the SHAC model offers direction and motivation for participants, providing a framework for concrete rather than symbolic actions. The SHAC model sidesteps conflicts over tactics, offering the opportunity for activists of a range of abilities and comfort levels to work together. In establishing a wide array of targets, it gives activists the opportunity to pick the time, place, and character of their actions, rather than constantly reacting to their opponents. Above all, the SHAC model is efficient: SHAC USA has never had more than a few hundred active participants at any given time.

In contrast to most current organizing strategies, the SHAC model is an offensive approach. It offers a means of attacking and defeating established capitalist projects—of taking the initiative rather than simply responding to the advance of corporate power. SHAC did not set out to block the construction of a new animal testing facility or the passage of new legislation, but to defeat and destroy an animal testing corporation that had existed for decades.

The SHAC model demands and fosters a culture that not only celebrates direct action but constantly engages in it, encouraging participants to push their own limits. This contrasts sharply with certain so-called insurrectionist circles, in which anarchists talk a lot about rioting and resistance without engaging in day-to-day confrontations with the powers that be. Anti-globalization activists in Chicago sometimes asked SHAC organizers to lead chants at their protests, as the latter had a reputation for being boisterous and energetic: those who cut their teeth in the SHAC campaign, if they have not dropped out of direct action organizing entirely, are equipped to be effective in a wide range of contexts.

A subtler strength of the SHAC approach is that it draws on class tensions that are usually submerged in the United States. Activists from lower middle- and working-class backgrounds can find it gratifying to confront wealthy executives on their own turf. This also exposes single-issue activists to the interconnections of the ruling class. In visiting the houses of executives, one discovers that all the pharmaceutical and investment corporations are intertwined: they all own shares of each other’s companies, sit on each other’s boards, and live in identical suburban mansions in sprawling gated communities.

Finally, the SHAC model took advantage of opportunities offered by larger events and communities. Home demonstrations were often organized to take place after a conference or show; the ubiquity of potential targets meant there was always one close at hand. For several years running, SHAC demonstrations took place during the National Conference on Organized Resistance in Washington, DC, and they also occurred following anti-biotech protests in Philadelphia and Chicago. Though these sometimes provoked conflicts with other organizers, it only takes a couple dozen people to make an effective home demonstration, so it was always easy to pull one together.

SHAC itself tended to create and propagate a subculture of its own, complete with internal reference points and rituals. At conferences and major mobilizations activists compared notes about investors, local campaigns, and legal troubles. Sympathetic music scenes helped fund organizing and introduced new blood to the campaign. It would be difficult to imagine the SHAC campaign in the USA without the hardcore scene of the past two decades, which has consistently served as a social base for the militant animal rights movement. There are certainly drawbacks to identifying a campaign too closely with a specific youth-oriented subculture, but it is better to draw participants and momentum from at least one community than from none at all.

Spurious Charges

Some anarchists have thoughtlessly charged SHAC with reformism. This is absurd: SHAC’s goal is not to change the way HLS conducts itself, but to shut it down. It is more precise to describe SHAC as an abolitionist campaign: not being able to bring about the end of animal exploitation in one fell blow, it seeks to accomplish the most ambitious but feasible step toward that end. Similarly, certain idle critics deride animal liberation efforts on the grounds that they are “activism,” with the implication that this is a bad thing in and of itself. Those who adopt this position should go ahead and acknowledge that they are unmoved by the oppression of their fellow living creatures and see no value in attempting to put an end to it—that is to say, they are hardly anarchists.

Drawbacks and Limitations

Spurious critiques aside, the SHAC model has some real limitations, which deserve examination.

First, there are certain prerequisites without which it will fail. For example, the SHAC model cannot succeed outside a setting in which direct action is regularly applied. All the strategic thinking in the world is worthless if no one is actually willing to act. In the militant animal rights milieu, the issues at stake are felt to be concrete and poignant enough that participants are motivated to take risks on a regular basis; without this motivation, the SHAC campaign would not have gotten off the ground. Likewise, the SHAC model is powerless against a target that does not depend on secondary and tertiary targets, or has an endless supply of them to choose from. Above all, the secondary and tertiary targets must have somewhere else to take their business—the SHAC model relies on the rest of the capitalist market to offer better options. In this regard, while it is not reformist, neither does it provide a strategy for taking on capitalism itself.

Secondly, as effective as they might be in purely economic terms, secondary and tertiary targeting locate the site of confrontation far from the cause for which the participants are fighting. Generally speaking, the more abstract the object of a campaign feels, the worse for morale. Much of the vitality of eco-defense struggles in the 1980s and ’90s came from the immediate, visceral connection forest defenders experienced with the land they were occupying; when environmental activism began shifting to more urban terrain a decade ago, it lost some of its impetus. It is perhaps specific to the SHAC campaign that participants have been able to maintain their outrage and audacity so far from the object of their concern; it is risky to assume this will always occur in other contexts.

Apart from these challenges, the SHAC model may be ineffective precisely because of its effectiveness. Is it realistic to set out to shut down powerful corporations, or will the government always intercede? It may be that in posing a threat to corporations in the economic terms they take most seriously, the SHAC model picks a fight it cannot win. Once the government is involved in a conflict, it takes more than a tight network of militants to win—it takes an entire large-scale social movement, and the SHAC approach alone cannot give rise to such a thing. In this regard, the SHAC model’s greatest strength is also a fatal flaw.

Time will tell if HLS was too ambitious a target; the corporation might still collapse. Even so, it would probably be wise for the next ones who experiment with the model to set smaller goals, rather than even more ambitious ones, since the SHAC campaign itself has yet to succeed. Perhaps some unexplored middle ground awaits between shutting down individual fur stores and attempting to close Europe’s largest animal testing corporation.

This is not to say that the SHAC model is useless if it does not result in the closure of the target. Sometimes it is worth fighting a losing battle so as to discourage an opponent from starting another battle; other times, even in losing one can gain valuable experience and allies. Ironically, the SHAC model may be more effective for recruiting people to direct action organizing than for its professed goal—precisely because, in bypassing recruitment to focus on other goals, it attracts participants who are serious and committed.

But if the point is to bring more people into direct action organizing rather than simply to shut down a single corporation, there are significant drawbacks to the SHAC model, too—for example, the high stress levels and likelihood of burnout. In this regard, it is not necessarily an advantage that the SHAC model teaches activists to think in the same terms as capitalist economists—efficiency, finances, chain of command—rather than prioritizing the social skills necessary to build long-term communities of resistance.

Likewise, in focusing on secondary and tertiary targeting, the SHAC model emphasizes and rewards an aggressive attitude that is less advantageous in other situations. What are the long-term psychological effects on organizers who spend half a decade or more screaming over a bullhorn at employees in their homes? What kind of people are drawn to a campaign that consists primarily of making other people miserable? It cannot go unsaid that some anarchists have reported frustrating interactions with SHAC organizers.

Considering the model from an anarchist perspective—to what extent does the SHAC approach tend to consolidate or undermine hierarchies? The secure organizing necessary for clandestine direct action can promote a cliquishness than intensifies as repression increases, thus preventing a campaign from drawing in new participation when it needs it most. Informal hierarchies plague organizing of all kinds; in the case of the SHAC campaign, those who do the research often have disproportionate influence over the direction of a campaign and end up making judgment calls with far-reaching effects.

It could be argued that the single-issue focus and goal-oriented nature of the SHAC campaign deprioritizes addressing forms of hierarchy other than the oppression of animals. It is no secret that some SHAC organizing groups have been wracked by conflicts over gender dynamics[6][6] If there have not been corresponding conflicts regarding race and class, this may simply indicate that SHAC organizing has been predominantly white and middle class. Some have charged that the animal rights movement in the US attracts many from this demographic who are more comfortable protesting the oppression and exploitation of animals than addressing the power imbalances in their relationships with other human beings. and some participants have not always been held accountable for their behavior. In a campaign that emphasizes victory above all else, this should not be surprising—if the most important thing is to win, it’s easy to put off addressing internal conflicts, especially with the added stress of federal repression. Inevitably, the people who have bad experiences drop out of the campaign, taking with them the criticism others need to hear.

These questionable priorities have also manifested themselves in certain tasteless tactics. In one instance, a target who was struggling to escape alcoholism received a can of beer with a nasty note; in another, a woman’s underwear was stolen and reportedly put up for sale. Utilizing the power imbalances of patriarchal society to target accomplices in the oppression of animals hardly sets an example of struggle against all forms of domination.

There are other ethical questions about secondary and tertiary targeting. Is it acceptable to risk frightening or injuring secretaries, children, and other uninvolved parties? What distinguishes anarchists from governments and other terrorists, if not the refusal to countenance collateral damage?

In essence, the SHAC model is a blueprint for a campaign of coercion, to be used in situations in which there is no other possible accountability process. This does not conflict with anarchist values—when an oppressor refuses to be accountable for his actions, it is necessary to compel him to stop, and this extends to those who aid and abet him as well. But targeting people who are not themselves involved in oppression muddies the waters. When an organizer publicizes a target, there is no telling what actions others will carry out. Perhaps the value of ending animal exploitation outweighs these risks and costs, but anarchists should not get too comfortable making such rationalizations.

Other Applications of the SHAC Model

There has been much talk of applying the SHAC model in other contexts, but few such efforts have produced anything comparable to the SHAC campaign. This bears some reflection. It’s worth pointing out that some of the hype about the far-reaching applicability of the SHAC model has come straight from HLS, and so should be taken with a grain of salt. HLS is not interested in promoting effective new direct action methods, but rather in creating enough of a scare that other members of the ruling class will come to their assistance; it follows that even if they claim that SHAC tactics can be used effectively against any target, this is not necessarily the case. The same goes for sensationalist analyses by organizations such as Stratfor, whose primary goal seems to be terrorizing the public into feeling a need for their “intelligence.”

It may be that, because the SHAC campaign maintained momentum while other forms of organizing dropped off, it has exerted a disproportionate influence upon the imaginations of current anarchists, to such an extent that many now tend to imitate the SHAC model in their organizing even when it is not strategically effective. Failures can be more instructive than successes; unfortunately, as they are more readily forgotten, they are often repeated over and over. For this reason, any consideration of the SHAC model should begin with the example of Root Force.

Root Force arose out of Earth First! circles a couple years ago with the intention of promoting a SHAC-style campaign targeting the infrastructure of global capitalism—an exponentially more ambitious goal than shutting down HLS. The organizers researched the corporations involved in pivotal infrastructural projects such as transcontinental highways and power plants. A website was set up to publicize this information and any actions that occurred; road shows toured the country to spread the word. It seemed that all the pieces were in place, and yet nothing happened.

Early in 2008, Root Force released a statement entitled “A Revised Strategy” in which they acknowledged that their efforts had failed to produce an effective direct action campaign and described the difficulties of attempting to inspire action against infrastructural projects located so far away as to seem entirely abstract.

Root Force misunderstood how direct action campaigns take off. Action and inaction are both contagious. If some people are invested enough in a cause to risk their freedom for it, others may do the same; but as no one wishes to go out on a limb in isolation, a sound strategy alone is not sufficient to inspire actions.[7][7] Compare this to the critique of calls for “autonomous actions” at mass mobilizations in “Demonstrating Resistance,” available in the recent features section of the reading library on this site. Properly publicized, one serious direct action in the Root Force campaign would have been worth a hundred road shows.

The Root Force campaign had other flaws as well. If the goal was simply to give demonstrators something to do, the strategy was as good as any other; but if they hoped to block the construction of the highways and power plants most essential to the expansion of the capitalist market, they would have had to mobilize a lot more force than the SHAC campaign. If the targets they picked really were of critical importance to the powers that be, it follows that the government would have mobilized every resource to defend them. Overextension is the number one error of small-scale resistance movements: rather than setting attainable goals and building slowly on modest successes, organizers set themselves up for defeat by attempting to skip directly to the final showdown with global capitalism. We can fight and win ambitious battles, but to do so we have to assess our capabilities realistically.

Other SHAC-influenced approaches have been characterized by an emphasis on home demonstrations. For example, over the past few years, protesters against the IMF and World Bank have experimented with targeting executives and corporate sponsors. In 2006, while Paul Wolfowitz was president of the World Bank, there were a series of demonstrations at his girlfriend’s home; eventually she moved. This does not seem to have impacted the IMF to the same extent as the worldwide upheavals associated with the anti-globalization movement. Sarcasm aside, there’s little to be gained from harassing people like Wolfowitz: unlike the tertiary parties SHAC targeted, they are not simply going to take their business elsewhere.

Similarly, at the 2004 Republican National Convention, some organizers called for demonstrators to focus on harassing the delegates. The risk of this approach is that it can frame the conflict as a private grudge match between activists and authorities, rather than a social movement that is able to attract mass participation. Like Wolfowitz, Republican delegates are hardly going to retire because a few protesters shout at them—and even if some did, they would instantly be replaced. One proposal for the 2008 RNC protests involved activists targeting corporations that would be providing services to the convention. Targeting corporations providing services might have helped build momentum in the lead-up to the RNC, but it’s unlikely that it could have succeeded in depriving an organization as powerful as the Republican Party of necessary resources. The same probably goes for proposals to target weapons contractors serving the US government—it might give demonstrators something exciting to do, but no one should underestimate what it would take to make a corporation like Boeing break off relations with the US military.

Some see the Rising Tide and Rainforest Action Network campaigns against Bank of America as relatives of the SHAC campaign; these did use secondary targeting, although they were directly descended from environmental campaigns that preceded it. At the end of 2008, in a context of broader economic turmoil, Bank of America declared that they were pulling their financing from companies predominantly involved in mountain-top removal. However insincere this declaration may be, it at least indicates that the campaign forced BOA to take notice. Environmentalists in Indiana have had less success attempting to stop the construction of highway I-69 via a combination of home and office demonstrations and forest occupation tactics. In “A Revised Strategy,” Root Force cited I-69 as a pivotal infrastructural project; it will be interesting to see how the state responds if the struggle against I-69 ever becomes formidable.

All this is not to say that the SHAC model cannot be applied effectively, but simply to emphasize that activists must be intentional and strategic about where and how they attempt to do so. There are probably some situations in which the model could accomplish even more than it has for SHAC; without a doubt, there are other contexts in which it can actually be counterproductive.

To repeat, the SHAC campaign in the US has only involved a few hundred participants at any given time; a few thousand could possibly take on a bigger target. Even forcing the government to bail out a corporation, whether or not the target was successfully bankrupted, could still constitute an important victory. As of today, it remains to be seen where effective applications of the SHAC model will be found beyond the campaign that spawned it.