Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

FaerieSecurityHandbook

v.1.4 compiledbyFairieUnderground

SuggestedReadingforallFaeries,newandold
Thisisalivedocument.Itlivesathttp://fairieunderground.info/node/72 Thisdocumentisdedicatedtothosethatdidn'tmakeit.I.Enadi Unlessspecificallyquoted,thestatementsherearetheopinionsofFairieUnderground,and anonymoussourceswhichcontributedtoFairieUnderground.

OntheveryfirstdayoftheOccupationofWallStreet,wesawinfiltrationbythe police.WewereleavingZuccottiParkandwerestoppedintrafficbytherearof thepark.Wesawanunmarkedvanopen,inthefrontseatweretwouniformed policeandoutofthebackcametwomendressedasoccupierswearingbackpacks, sweatshirts,andjeans.TheywalkedintoZuccottiParkandbecamepartofthe crowd... Individualswhotookoverthewebsiteand/orsocialmediaandthenremovedthem orhackedthemandtookcontrol:Asnotedabove,thesenetworkshavebeenused inpersonalattacks,aswellastosendinaccuratemessagestothemediaandother occupiers.Onemistakemadeistoallowalargenumberofpeopletohave administrativeprivilegesonthewebsite.i

TableofContents
FaerieSecurityHandbook...................................................................................................................1 BackgroundoftheFaerieMovement...............................................................................................3 PossibleMotivationsforGovernmentActions............................................................................3 WorldwideSocialistAgenda..................................................................................................3 OrganizationofCommunesandRadicalGroups............................................................................5 InfiltrationMethodsandTechnology...............................................................................................6 AgentInfiltrationandRecruitmentatFaerieSanctuaries...........................................................6 PinpointDrugOperations.....................................................................................................6 GenericAntiRadicalOperations(DEradicalization)...........................................................7 IgnoranceasaWeapon:CommunicationsControlled..........................................................8 PhoneTaps..............................................................................................................................9 Microphones(Bugs).............................................................................................................10 IdentifyingInformersandOperatives.......................................................................................10 SexualActivityBetweenOperativesandTargets......................................................................11 ActionsOutsidetheSanctuary..................................................................................................12 Informers..................................................................................................................................12 WhattoDoOnceInfiltrated..........................................................................................................15 FairieUndergroundRecommendations.....................................................................................15 GuidetoComputerSecurity..........................................................................................................17 TechnologyRecommendationsforFaerieSanctuariesandOtherRadicalCommunesorSquats ...................................................................................................................................................17 BasicRecommendationsforComputerSecurityfortheAverageFaerie..................................19 HowtoTravelSecurely..................................................................................................................20 KeepingyourItemsSecure.......................................................................................................20 ShouldYouUseaProxy?..........................................................................................................20 SpecificsoftwareandHardwareRecommendations.................................................................21 BringingyourLaptop................................................................................................................22 Glossary.........................................................................................................................................24

BackgroundoftheFaerieMovement
ThebackgroundoftheFaerieMovementissteepedisSocialism.HarryHaywasasocialistandthe originsofthemovementwereonandoffsurveillancebyfederaloperatives. Themovementhaditsbeginningswiththegayrightsmovement,andabacktonature,reinventing ofgaymalesexuality.

PossibleMotivationsforGovernmentActions
Thegovernmentmayhaveseveralreasonstobeinterestedininfiltratingtheradicalfaerie movement,andradicalfaeriespaces.Onetheonehand,theycanarguedruginterdiction operations.Additionally,inlinewithotherinfiltrationactivities,thegovernmentmayarguethat therearepeopleofinterestthatvisitthesanctuaries.Thepeopleofinterestmaybemedicine shamans,drugusers,antiwaractivists,peoplewithconnectionwiththeRainbowFamily,people thatmayhaveother,personal,legaltroubles.Itisimportanttonoteestimatesmarkthenumberof peopleonUSgovernmentwatchlistsbetween400,000iiand1millioniiipeople.Thatis1/300 peopleintheUnitedStates.Withsuchlargenumbers,itispossiblethatsomefaerieparticipants maybeonthewatchlists. LikethearrestofTaitaJuanAgredaChindoy,ashamanfromColumbia,forpossessionofthe psychedelicconcoctionayahuascaiv,thisisagovernmentthatcannotseethesmokefortheclouds. LaterTaitawasreleasedprovidedheleftbackforColumbia.v Discriminationbyparticularoperativesagainstgaysmayalsocomeintoplay. Thepresenceoftheoperativeshascausedsignificantdamagetofriendships,lovelives,faeries,and friends.

WorldwideSocialistAgenda
Asonearmofaworldwidecrackdownonradicalism,thefairiemovementhasexperience pressurelikeothergroupstoconformorbeconformed. Activistsworldwidearescrutinizedbygovernmentagenciesandcorporateintelligence activities.Numerousorganizationshavebeentheobjectofsurveillanceandinfiltration. Theseorganizationsincludeactivistgroupsthatadvocatesabotageandviolence.Butmost arepeacefulorganizationsthatdonotadvocateviolence. Organizationsaroundtheworldthathavebeentargetsofgovernmentsurveillanceand infiltrationincludeGreenpeaceandAmnestyInternational.Othergroupsincludegayand lesbianrightsorganizations,socialistandCommunistorganizations,environmentalgroups, animalrightsgroups,middleeastorganizations,unions,peaceactivistorganizationsand humanrightsgroups[1].vi TheFairieUndergroundbelievesthefaeriemovementremainsjustoneprongofaworldwide socialistagenda,intheeyesoftheseagents.InAmerica,thegoaloftheagentsistoretain corporatecontrolledhegemoniesoverthought,politics,andaction.

theVictorianpoliceOperationsIntelligenceUnit,inAustralia...monitored316organizations andhadfilesonmorethan700peopleinthestateofVictoria.Exceptionalaboutthiswas nottheamountoforganizationsandindividualsthatwheremonitored,butthefactthatthese covertactivitieswhereexposed.Similaractivitiesbypoliceforcesandintelligence organizationshappenaroundtheworld,butremaincovert..vii Itisalsoimportantthatgovernmentsmaynotbetheonlyindividualsinterestedinthefaerie movement.Byallrights,thefaeriemovementcouldbeclassifiedasaradicalgayagenda.As such,churchesandreligiousorganizations,vigilantelawenforcementofficers,andpolitically motivatedattackscouldallresultindifferenttypesofinfiltrationatthesanctuariesandfaerie houses. Oftenweonlygettoseesinglepiecesoftheintelligencepuzzle.Someoftheexamplesof puzzlepiecesthatwherefoundare: theinfiltrationintotheUSorganization'StudentsforEconomicJustice' undercoverpoliceactivitiesduringprotests failedattemptstorecruitinformers informantsoragentsthathavebeendiscoveredandvolunteeredinformationabout their previouscovertactivities.viii

OrganizationofCommunesandRadicalGroups
Thefaeriemovement,andthefaeries,havebeensinceinceptionaradicalmovement. Youmaysay,whydothisnow?Thedamageisdone.Thefaerieshavebeeninfiltrated.Whatisthe pointofnowusingcounterintelligencetechnology,changingvotingandorganizationalmethods, etc.Willthisnotjustcreatemorefear? FairieUndergroundrespondsasfollows:firstofall,thisisexactlywhattheywantyoutothink. Theinfiltratorswantyoutothinkthattheyhavealltheinformation,andthatthisisdone,after kickingoutkeymembers,andpromotingtheideathatthisisover.Thereality,isthattheyare wantingtostayandmaintainthestatusquo.Theystillwantnewmemberscomingtothe sanctuariesthathavenoideawhathasbeengoingon. Furthermore,foranyorganization,anewadministration,anewAttorneyGeneral,andthefocuses andprioritiesmaychange.Wecouldbeprotectingagainstaseverecrackdownfromanewleader yearsfromnow.Butthedataonthedisklaststhatlong.So,inotherworks,bynotfollowingthese methodsnow,weareprovidingatreasuretroveofinformationtobeuncoveredinthefuture. Thereisonemajorproblemwiththeconsensusprocess.Often,thereisonlyoneortwocandidates runningforanoffice.Theyarequicklyconsented.Itmakesitverylikelythatthepeoplethatrun fortheofficewillbeagents. Thepositionofsecretaryisultimatelythemostimportant,asthispositionthepersonhaspasswords tothedifferentcommunicationmediumsoftheorganization.Ifthispersonisaninformant,they havethepowertotellpeoplenottocometothesanctuary,tocomebacknextmonth,ordon'tcome atall.Theycansaythesanctuaryisclosed,tocertainindividuals,whiletheyconductanongoing operationagainstsometerrorizedfaerieontheland.Theycanspreadalotofmisinformationand doalotofdamage.Inaddition,dependingonhowthesanctuarystoresitsemail,theymayhave accesstothepast5yearsofemails. Itisrecommendedelsewhereinthisdocumenttonotkeepcommunicationsolderthan4weeks.In fact,deleteemails(inandoutbox)assoonaspossible.ItisalsorecommendedtohaveaPGPkey storedonahardwaredevicesuchasasmartcard.Thisway,someoneemailingthesanctuarycanbe assuredthat,attheleast,theyarecommunicatingwithsomeonewhohasthedevice!Otherwise thereisnoindication.

InfiltrationMethodsandTechnology
Espionageorspyinginvolvesagovernmentorindividualobtaininginformationthatis consideredsecretorconfidentialwithoutthepermissionoftheholderoftheinformation. Espionageisinherentlyclandestine,asitistakenforgrantedthatitisunwelcomeand,in manycasesillegalandpunishablebylaw.Itisasubsetofintelligencegatheringwhich otherwisemaybeconductedfrompublicsourcesandusingperfectlylegalandethical means.ix

AgentInfiltrationandRecruitmentatFaerieSanctuaries
Theagentshaveinfiltratedthefaeriemovementsincetheverybeginning.HarryHayhadbeen undersurveillanceregardinghisinvolvementwiththeCommunistparty. Butsincethen,inthelast15yearsofthefaeries,alothaschanged.Typicalmethodshavebeen operativesentrenchingthemselvesinthesefaeriesanctuaries,andpromotingmethodsoflaw breaking,asagentprovocateurs.TherearereportsmainlyfromWolfCreekSanctuary,andShort MountainSanctuary,thatthisisthecase. Itisnotcleartheofferthatthegovernmenthasmadewiththeinfiltrators.Inmanycasesthe informershavebeenarrestedforapreviouscrime,andthegovernmentmadeadealwiththemto avoidaprisonsentence.Infact,thisisthemostcommonmethodforthegovernmenttoobtain informersinorganizationslikethefaeriemovement. Oncetheinformersareinplace,theyuseanumberofmethodsinordertoretaincontrolofthe organization.
PinpointDrugOperations

Overthecourseofyearsofactivity,thegovernmenthasentrenchedthemselvesinthe organization.Atthispoint,theyareabletomotivatepeopletojoinasinformersthroughother enticements,suchaspromisestogetawaywithillegalactivity,suchasdruguseordrugdealing. Theywillalsopaintapicturethattheirtargetsareselfish,greedypeople,initforthemoneythey arenotrealfaeriesanyway. IthasessentiallycreatedanAssemblyline.Whatthismeans,isthatagentsinfaroffcitieslike NewYork,mayrecruitwouldbefaeriestocomevisitagatheringatShortMountain,forinstance. Theagentsatthegatheringarepreparedforthenewarrival.Thenewarrivalisliedto,andtoldthat thefaeriesanctuariesaresafeplaces.Theagentspresentanimageofdoanythingyouwant, andaregenerousandveryopenwithdrugsanddruguse.Thearrivalisoftencoercedintosexual activity,andoftengivendrugs,thathe/sheotherwisewouldnothavedone. Thepointofthisistocreateamole.Theythenusetherecruittoinfiltrateotherdrugdealingrings (oractivistgroups)outsideofthesanctuary.Essentially,therecruitbecomesthebestpossiblespy: he/shedoesn'tevenknowthattheyareworkingasaspy. Later,therecruitwillreturntothesanctuary,andbequestionedabouttheiractivities,andthe availabilityofdrugs.Usuallytheagentswillattempttobuysmallpersonalamountsofthedrugsfor testing,soastonotalarmtherecruit.Often,theywillnotevenattempttobuyanydrugs. Whatishappeningisthattheserecruitsinitiallymayhavebeeninvolvedinpersonaldruguse,and possiblydistributionofpersonalusequantitiestosmallcirclesofpeople.Aftercontactwiththe faeries,therecruitsarefollowedthroughoutthecountry,andareeventuallycoercedintoobtaining

fortheagentslargerandlargerquantitiesofdrugs.Oftentheagentsthemselveswilltelltherecruits wheretobuythedrugs,soastoprotecttheirowncovers.
GenericAntiRadicalOperations(DEradicalization)

Thereisinadditiontothesefocusedoperations,additionaloperationsforsimplyderadicalizingthe organization.Theorganizationhasanumberofleftistandradicalleanings.Newrecruitsare instructedbytheagentsthatitisreallynotaboutthat.Noneofuswanttogetarrested,itsjustabout druguse.Theyalsopromulgatetheideathatthegovernmentdoesn'tknowwhereweare,which isridiculouslyabsurd,butnewrecruitsmaybelievethis,andfeelmoresecure. Thishasanotherpurpose:theycanthenclaimthatweneedtonotgetthesanctuarydirectly involvedinpoliticalactivismsuchasprotests,becausethenthegovernmentwillfindoutaboutus, andthismayhinderouruseofdrugs. Wheninfact,thegovernmentknowsandhadknownaboutthegroupalreadythisissimplya methodtokeepthesanctuariesforbeinganorganizationpointforradicalsandactivists.Wecan't havepeoplelikethathearbecausewewillgetcloseddownwhentheyfindaboutallthedrugswe aredoinghere. Inreality,thegovernmentdoesn'tcareaboutthedruguse.Ifthegovernmentcaredaboutthedrug usetheywouldhavecloseddownthesanctuariesyearsago.Thestatusquoofthesanctuariesbeing controlledbytheagentsservesthepurposesofthegovernmentfortargeting,identifying,and disruptionofpoliticalradicalism,inadditionaltocontrolling(andcreating)largerdistributorsof drugs. Thepsychedelicdrugsusedatthesanctuariescontinuetobeofinteresttothegovernment.Being unabletotrulystoptheuseofthesedrugs,thegovernmenthassettledforcontrollingthesetand settingofthedrugsuse,inordertocreateandmanipulatebeliefsystemsofgroupssuchasthe faeriesonalargescale.Forinstance,iftheycanconvinceyouduringatripthatyouaregoingto getbusted,theycanjustsitbackandwaituntilyoucreatethesituationyourselfforthem.Ormaybe theywillusethedrugsasatruthserum,inanattempttogetyoutotalk.Theycanalsouseother mindcontroltechniquesduringthesetrips,withtheintentionofcausingfeelingsofsecurityor paranoia,dependingontheeffectstheywanttogenerate. Thefactis,thearetrulyunabletodealwithmostofthedealersthathavecomethroughthe sanctuaries.Theironlyoptionhasbeentoremovethedealersorothersthatknowwhatisgoingon throughbanning.Forthemostpart,thereintentionhasbeentodivideandconquer. Theycanthenkeepthenumerousotherfaeriesessentiallybrainwashedbythemselvesproviding largequantitiesofpsychedelicsduringthegatherings. Thecounterradicaloperationsaimtofocustheorganizationonreligiousandspiritualrituals,asone method.Anothermethodistokeepfairiesatthesanctuariesbusywithendlessprojects,whichare oftennotnecessarythisisintunewithcapitalistgovernmentsingeneral,havingtheapproachof keepingthecitizensbusythroughlowwages,highbirthrates,andneverendingbills.The governmentbelievesthatifyouareattemptingtostayatthesanctuary,youhaveaproblemwiththe system.Thenatureofradicalactivismisthatifonedoesnothaveasafeplacetofocusonthis activism,theactivismcannotproceed. Theverypeoplethatarebeingtargetedinthesedruginvestigations,arethesamepeoplethatarekey membersoftheradicalmovement,andviceversatheagentprovocateursattempttogettheradical leadersheavilyinvolvedindrugs,sothattheyareabletolaterthreatenthemwithprosecution.

IgnoranceasaWeapon:CommunicationsControlled

Thefinalkeycomponentofthisstrategyisdealingwiththefaeriesthatjusthappentocometothe sanctuariesfortheirownreasons.Thisisdealtwiththroughignoranceandmisinformation.Anair isputon,thateverythingisnormal.Thenewindividualsmaybeagainstdrugs.Ortheymaybefor drugs.Theseindividuals,inanycase,arenotinformedoftheoperations,anditisanagendaofthe operativestoinsurethattheseindividualsdonotreceivedirectevidenceoftheiractivity. Thisispartiallyaccomplishedbybanningofmembersthathavediscoveredorarebeginningto discovertheinfiltrationoftheorganization.Inaddition,thisisdonebycontrollingthe communicationsofthefaeries.Forinstance,Internetchatboards,forums,andFacebookprofiles allareeventuallycontrolledbythegovernmentoperatives.Theagentsmayalsotrytoinstillafear intheuseofprivacyenhancingtechnologiesasattractingattention.Sothecommunication mediumsofthefaeriesarebeingcutoff,andtheshamansandmedicinemen/womenareunableto communicateinasecuremanner. Additionally,thefactthatmostpeopledon'treallywanttoattractattention,isplayedupon.Most peopledon'twanttousesecuritymeasuresthatareobtrusiveforinstance,PGPencryptedemail. Thisrequirestheinstallationofspecialsoftware,andsomeinstructiononitsuse(notalwayssee https://www.hushmail.com).Mostpeopledon'twanttohavetodoanythingforsecurity. Theagentscanplayonthisindifferenceby,forinstance,movingdiscussionstoFacebook. Facebookrequiresstrongidentificationtocreateprofiles.BygettingpeopletojointheFacebook group,theoperativesarecreatingavastdatabaseofinformationoneveryoneinvolvedinthe movement.xFacebookutilizesdataminingandphotorecognitiontechnologythatiscapableof identifyingindividualswhohaveFacebookprofiles,whotheirfriendsandassociatesare,andoften, wheretheyareorwheretheyhavebeen.Themoreintelligentorknowledgeablepeopleinthe movementwillnotuseFacebook.Inonefellswoop,thegovernmenthasremovedtheintelligentor radicalfaeriesfromthediscussion.Theyarethenessentiallyblockedoutofthediscussionsbecause joiningthediscussionswouldbreaktheiranonymity.WhatisleftontheFacebookboardisthe ignorant,ortheinformant. Thisisoneoftheprimemethodsofbreakingdownthecommunicationsoftheorganization.The effectistocensorthepeoplethatknowwhatisgoingon,throughtheaforementionedbanning,and now,throughmovingdiscussionstoinsecurechannelsthatbenefitthesurveillanceoperation.xi Thespreadofinformationcangofurther,althoughwehaveonlyheardofoneinstanceofthisin regardstothefaeries: CovertManipulationtoMakeALegitimateActivistAppeartobeanAgent:Anactualagent willoftenpointthefingeratagenuine,noncollaboratingandhighlyvaluedgroupmember, claimingthatheorsheistheinfiltrator.Thesameeffect,knownasa"snitchjacket,"has beenachievedbyplantingforgeddocumentswhichappeartobecommunicationsbetweenan activistandtheFBI,orbyreleasingfornootherapparentreasononeofagroupofactivists whowerearrestedtogether.AnothermethodusedunderCOINTELPROwastoarrangefor someactivists,arrestedunderonepretextoranother,tohearoverthepoliceradioaphony broadcastwhichappearedtosetupasecretmeetingbetweenthepoliceandsomeonefrom theirgroup.xii Inaddition,apowerfulpsychologicalattackiscreatingofscapegoats.Thenewscapegoatsfor problemsatthesanctuarieswilleventuallybeidentifiedastheverypeopletheagentsareattacking, theactivists,dissidents,anddrugdealers.Theagentswillsay,forexample,thatthereasonweare havingproblemswiththegovernmentatWolfCreekSanctuary,isbecauseofthedrugdealers.We shouldkickoutthedrugdealersandactivists,theyareathreattothesanctuary.Thisisofcourse afterpeopleatthesanctuaryhaveinvitedandboughtdrugsfromthesedrugdealers.Inessence,the

deradicalizationeffortistoturnthesanctuariesintopseudointerrogationareasthathostthe occasionaldrugfrenziedRave,withtheaddedbenefitoffindinginformationondrugtrafficking. Thisisamethodtofurthermovethesanctuarytobeingmerelyanothergaycommune,fromwereits radicalrootsstarted.Itisalsoamethodofmaintainingcontrolofthesanctuary,bythegovernment operatives. HarryHaywantedthesesanctuariestobeplaceswherefaeriescouldorganize,bepolitical,andbe radical,andbespiritualallofit.Thegovernmentoperationalagendaistoremovethepolitical andradicalpart,andensurethatthedrugsarebeingprovidedfromownedassets.xiii TheFairieUndergroundsuggestsnottobeattachedtopiecesofland.Weneedtoidentifythecore trustedpeopleinthemovement,andeithertakethesanctuariesback,or,inthemeantime,moveto RainbowlikeencampmentsintheNationalforestsorinothercountrieswheretheagentscannot maintainthistypeofcontrol.ByDecentralizing,educationofsecuritymethods,andnotbeing attachedtothesanctuaries,itispossibletoescapethisstranglehold.
PhoneTaps

PhoneTapsareregularlyandoftenlegallyappliedatfaeriesanctuariesandsafehouses.Thetaps areeasytoobtain.Angovernmentagentcomesontothelandwitharecordingdevice,purchasesa smallamountofmarijuanafromanyonethere,andthenreturnstothepolicewaitingoutside.The marijuana,combinedwiththeaudiorecordingofthetransaction,andpossiblymarkedmoney,is sufficienttogetlegalwarrantsonthephonesandcommunicationsleavingthesanctuary. Lesshightechwaysofspyingonactivistcommunicationincludeaphonetap,orapen register.Aphonetapeavesdropsontheactivist'stelephonecalls,recordingtheoral communicationsontape.Apenregistertracksallthenumbersofinboundtelephonecalls. Phonetapsareusedextensivelyinsomecountries,andlessinothercountries...ithasbeen reportedmorethanoncethatpublicphoneswherebeingtappedbythepolice,becausethey whereallegedlybeingusedbycriminalsthattriedtocircumventgovernmenttappingoftheir phone.xiv Itislikelythatthegovernmentuseslistsofnumbersdialedfromthesanctuariestocreatenetworks ofassociationsofpeople.Thisallowsanalysisanddisruptionofactivities.Thesanctuaryphones shouldonlyreallybeusedforsanctuarybusiness.Itshouldbeclearthatthephonesarelikely tapped.Infact,asamethodofattack,thegovernmenthasbeenknowntoblockcallstothe sanctuariesfrompayphones,inanattempttoforcetheindividualtoidentify,byusing(hopefully) theircellphonetocallthesanctuary. Insomecases,operativesatthesanctuarymayalsohavedirectaccesstothephonebills.The operativesmaybeinpositionsofleadershipatthesanctuariesandcansimplyreadthenumbers dialed. Thesetypesoftapswillalsoallowthelegalplacementofbugs,video,andadvancedsurveillance equipmentatthesanctuary.Meanwhile,theoperativeslivingatthesanctuary,willcontinueto maintainthatnoneofthisishappening! Foralongtime,theFaerieUndergroundhasrecommendedremovingthephonesfromthesanctuary alltogether,andusingSkypeforcommunication.TheFairieUndergroundrecommendsnottohave bothinternet/WiFiandtelephones.Pickoneortheother,andpostcorrectusageinstructions.

Agentsatthesanctuarymaytrytoenticeyoutousethephoneforimportantcalls.Thiscreatesa logontheTelephonescompanymainframethatyouwereatthesanctuary.Particularlyifyoucall yourfamily.Theagentswilltrytomakeyoufeelcomfortabledoingthis,byactingnormal,and callingtheirownfamily.Theywillalsotrytomakeyoufeelcomfortable,byregisteringforthe newsletterswiththeirhomeaddress,andthatyoushouldtoo.


Microphones(Bugs)

Bugsaresmalldevicesusedforcovertaudioandvideorecording.Withtheadventofsmartphones, thetraditionalbugshavesomewhatfallenintodisuse,asagentscanjustusetheirsmartphonesfor photorecognition,photography,andaudio/videorecording. MicrophonesandbugshavebeenfoundatWolfCreekSanctuarybarnandShortMountain Sanctuarykitchen,asreportedbyasecondhandsource.Itisrecommendedtodestroythesedevices withahammerorrock.Asacounterintelligencemeasure,itisalsopossibletofeedfalse informationthroughthebugs.

IdentifyingInformersandOperatives
Operativescanbehardtoidentify.Theywillattempttomaintaintheircover.Whenitappearstheir coverwillbeblown,theywillbackoff,orclaimtheyareleavingforavacation.Theywilltryto notbepresentwhenfaeriesthatknowtheyareinformantsarethere.Onceinformantshavebeen identified,theagentsandhandlersbehindthesceneswillbringinanewwaveofinformants.The objectiveistoremovethepeoplethatknowwhatisgoingonfromthesanctuaries. TheAfricanNationalCongressmanualforcovertactionsusedthefollowinglisttoidentify infiltrators: theytrytowinyourconfidencebysmoothtalkandcompliments; theytrytoarouseyourinterestbybigtalkandpromises trytogetinformationandnamesfromyouwhichisnobusinessoftheirs; trytogetyoutorearrangelinesofcommunicationandcontactpointstohelppolice surveillance;mayshowsignsofnervousness,behaveoddly,showexcessivecuriosity; maypressurizeyoutospeeduptheirrecruitmentorsomeonetheyhaverecommended; ignoreinstructions,failtoobserverulesofsecrecy;.xv Agentsandinformersmaydothefollowingthings: 1. Agentsrecommendagainstsecuritymeasures. 2. Theyarebanningorremovingpeoplefromtheorganizationwhichareahindrancetothe operations.Thismayinvolveframingthepersonwithsomemisdeed. 3. Plantingdrugs,givingbadadvicetopeopleinneed. 4. PlantingbugsorGPSdevicesontargetsvehicles. 5. Fomentingdissentbycreatingargumentsaboutunimportantthings. 6. Accusingkeymembersasbeingagentsthemselves. 7. Generallyaskingquestionsaboutwhereyouaregoing,whatyouaredoing,whereyouare comingfrom.Theywillattempttomakethosewishingtonotanswersuchquestionssome kindoftargettotheothers.

8. Simplycreatingreportsandtimesanddatesofarrivalsofdifferentindividualsofinterest. 9. Themostimportantobjectiveistoretaincontrol,andtoretainthestatusquo. 10. Oncekeymembersdorealizewhatisgoingon,theagentswilltellthemthatthisishowit mustbe:Wecanstayhereandkeepdoingdrugsaslongaswepassoccasionalinformation onparticularpeopleofinteresttothegovernment. 11. Statingthattalkingaboutagentinfiltrationisbringinginanegativeenergy,inorderto moveconversationawayfromfindingtheinformants. 12. Takingadvantageofnewyoungpeoplethatcomein.Manyofthesepeoplearejusttheirfor theparty.Theydon'twanttohearanythingaboutagents,theyjustwanttheparty.By makingsuchpeopleappeartobethenormforthesanctuaries,theycanclaimthatthe radicalsandpeopleintheknowareoutoftouchwiththefaeriemovementtoday.In essence,bymanipulatingnewmembers,theyareabletochangethedefinitionoffaerie movement,toadefinitionthatissupportingoftheirongoingoperationalagendas. 13. Usedevicessuchasshamanicritual,tarotcards,andotherspiritualpracticestoattemptto divertattentionfromwhatisactuallygoingon.Orinthecaseofadrugtargetconsidering leavingthesanctuary,orleavingthecountry,theywillsaydoameditationretreat,orpull sometarotcardsfirst.Thisisamethodexploitingthereligiousandspiritualaspectofthe faeries.

SexualActivityBetweenOperativesandTargets
AccordingtoUSlaw,trueagentsarenotsupposedtobeallowedtohavesexwiththeirtargets.If anagenthassexwiththetarget,thiscanresultinanyevidencetheagentobtainedasbeingtaintedin theeyesofthecourt.However,thiscanbecircumventedthroughtheuseofinformants. Furthermore,iftheoperationisjustcallingforintelligencegathering,itmaynotbeimportantthat theinformationisnotadmissible. Keepinmindthatthisisnotthecaseineverycountry.TheUKhasrecentlypassedrulesallowing undercoverpolicetohavesexwithsuspects.xvi Theundercovershoweverarenotbeyondlovestories.Therearemanycasestoname,butoneisan 18yearoldboytrickedintosellingmarijuanatoafemalepoliceofficerhehadfalleninlovewith.xvii Itiscleartheagentshavenomorality. Therealitymaydifferthoughfromthetheory.Pleasekeepthisinmindandbeaware.Forgaymen, cuteorsexyguyscouldbethebiggestlure.Insomecountries,itmaybepossiblethepolicewill actuallypayprostitutestosleepwithtargets. TheFairieUndergroundbelievesthisisagreatimmorality.Itisjustifiedbythepolicebysaying, wearegoingaftercriminals,inadarkcriminalworld.Therealityisthatnoneofthesepeopleare criminalsuntilprovenso,therefore,reallytheyareusingreallydeplorablemeansforpossibly innocentpeople.Ontheotherhand,evenwerethepersonacriminal,thepotentialpsychological andemotionaldamagecausedtoavictimofthistypeofdeceptioncouldbeconsideredatypeof torture.Ifoneconsidersconsentualsextobesexualactivityagreeduponbybothpartiesbeing honestaboutintentions,thenitisnonconsentualsex.Forinstance,ifsomeoneknewthatthe personwasaninformant,theymaynotwanttohavesexlikethat.Sothedeceptiontoobtainthesex isthereforesimilartosomeonenotsayingtheyhaveHIV.Thefactthatthepoliceorganization

(mostlymenwishingtohavesexwithwomen),believesthistobeacceptable,demonstrateshowfar removedfromhumanitysocietyisbecoming.Additionally,sexualactivitywithpeoplethatare vulnerable,particularlywhentheyfindoutaboutthedeception,canleadtosuicidaltendancies, depression,and(youguessedit)criminalbehavior.Itisinevitablethattheopperativewilltryto elicitcriminalbehaviorfromthetarget.Youcannotcountonanoperativetomakemoralorethical decisionsinasexualsituation.Therefore,FairieUndergroundisstronglyapposedtopolice organizationscondoningagentsoreveninformantstoengageinsexwiththeirtargets,except perhapsintheextremecircumstancesoflivesatrisk.

ActionsOutsidetheSanctuary
Outsidethesanctuary,inmanywaysthefaeriecanbesubjectedtomoreproblems,astheagents don'thavetomaintainsuchextremecover,soareusuallyabletogetawaywithagreaterrangeof actions.TheFairieUnderground'sopinionisthatthisiswhyitiscrucial(andobvious)thatthe agentscontrollingWolfCreekNomenus,inparticular,havebannedparticularfaeries.Webelievea decisionwasmadethatthedealswiththegovernmentmandatedtheycouldnotprovidesanctuary fortheindividuals.Faeriescanjustbeapproachedbyrandomoperativesonthestreet,inhotels,in cafe's,etc.Byremovingkeyactivistfaeriesfromthesanctuaries,thisisdoingaseriousblowtothe faeriemovement.IntheopinionoftheFaerieUnderground,wedon'tneedsuchplacesifitcomes toitwegotothewoods.Letthemcome! Operativesatthesanctuariesarelikelytoprovideinformationtotargetsofinterestatthe sanctuaries.Forinstance,theoperativesmayapproachfaeriesatthesanctuaryandtellthemthe locationofsafehouses,orfaeriehouses,insomecityofinteresttothefaerie.Insomecases, thesesafehouses,areactuallyrunbyDEAorotherlawenforcementoperatives,orhaveaheavy informantpresence.Theintentionofthis,istokeepthefaeriegoingplacetoplace,lookingfora safespot,wheninfactallthesafespots,whereprovidedbythegovernment. Insomecases,aleakwasreportedthatamarijuanafarmfrequentedbysomefairieswasinfactrun andcontrolledbythegovernmentforanumberofyears.Thepurposewaslikethegovernment's weaponstoMexicoprogram,wheretheUSBureauofAlcohol,Tobacco,FirearmsandExplosives (ATF)purposefullyallowssomeoftheseweaponstobesmuggledsouthofthebordersoitcantrack themaspartof"OperationFastandFurious.xviii Similarly,someleakshavereportedthegovernmentrunningmarijuanafarms,asafurthermethod ofobtaininginformationonradicalgroups,andprosecutionalpressure.

Informers
Thegovernmentsprimaryweaponfordealingwithactivistgroupsisinformants.Informants operateforanumberformotives.AFresnopeacegroup,PeaceFresno,recentlyreportedtheactivity ofaninformantthatbecameinvolvedintheirmeetings. TheFresnoPolicechiefJerryDyerstated,thatFresnoisahotbedofterroristactivityandthatis whytheJTTFhasbeenestablishedinthisarea.HetoldthisgroupthatFresnocouldhavesleeper cells,thattheyareconnectedwithillegalmethamphetamineproductiontofundterroristactivities, andallofthisissomehowrelatedtoradicalMuslimextremists.xix Somemoreinformationaboutinformants:

Aninformerrevealsconfidentialinformationinreturnformoneyorotherbenefits. Recruitinginformersoftenendsinfailure,andthereforetherearemanyreportsavailable abouttherecruitmentprocess. Informerscanhavearangeofmotivestoturnagainsttheorganizationtheyareinforming about.Theycanbedisenchantedmemberswhovolunteertheirservices.[emphasis added]Anactivistmaybeoverheardbysomeonenotofthegroup,whointurninforms police.Someonemayhavebeenarrestedandmaytrytoavoidprosecutionbyagreeingto infiltrateagroupandobtaininformationaboutactivistactivities.Orsomeonemayhavebeen targetedforrecruitmentbythepolice. ...Activiststhathaveweakspotsaresingledoutforrecruitmentattempts.Aweakspotmay befinancialtrouble,immigrationstatus,pendingprosecutionandarangeofother possibilities.Theactivistmaybethreatenedand/orofferedmoney.Otheroffersthatmaybe madetocoercetheactivistintobecominganinformermayincludeapermanentvisaoffer, orasettlementtopreventprosecution.Familymembersandfriendsoftherecruitment prospectmaybepressured,toconvincetheactivisttobecomeaninformer..xx Asrecentlyaslastyear(2011),thegovernmentwasinfiltratingorganizationsforwhichtherewasno evidenceofillegalactivity.Oneexample,istheAntiWarCommitteeoftheTwinCities.Alaw enforcementofficer,goingbythenameofKarenSullivan,remainedinthegroupfor2years.She evengavespeechesandrosetoleadershipranksintheorganization. Noonewhohasbeenraidedorsubpoenaed,noonehasengagedinanycriminalactivity, saidMr.Iosbaker,andinfact,oneoftheACLU'sexpertsMikeGerman,oneoftheir policyguysintheirWashingtonofficeinreviewingthesubpoenasandwarrantsthatwere usedinSeptember,hiscommentwasthatitwascleartohimthattherewasnocriminal activitythattheywereinvestigating. Whattheywereseekingwasassociationalmaterials.'Theywerelookingfornames,ande mailaddressesandphonenumbers.Theyseizedaddressbooksandcellphones,andtheir warrantsandsubpoenasaidtheywerelookingforinformationaboutactivistsinthose differentorganizations,aswellascontactsinColombiaandinPalestine,whohadbeen visitedbythesehumanrightsdelegations,hesaid.TheFBIwantedtoknowthenamesand contactsofpeopleinvolvedinantiwaractivitiessothattheytoocouldbetrackedand monitored.xxi Inregardstothefaeriesanctuaries,thesituationisevenworse,becausetheagentscanusetheguise ofadruginvestigation,inordertojustifytheinfiltration.However,itisclearthescopeofthe activitieshasbeenaboveandbeyondtargeteddruginvestigations,and,weassume,aboveand beyondthelegalconfinesofanyjudicialorders. InfiltrationofactivistgroupswaspredictablebasedonBusherapolicies.Soonafterthe9/11 attacks...theresultingsurveillancecametoservepoliticalpurposesasitwasroutinely directedagainstactivistgroupsandindividualsexpressingoppositiontotheBush administration. Manylawenforcementagenciesengagedinsurveillanceofactivistgroups.Insomecases, localorstatepolicemonitoredlawfulactivity,whileinothersFBIagentsactedthrougha JointTerrorismTaskForce.Insomecases,evenmilitarypersonnelappeartohavebeen involved.

Surveillanceitselftookavarietyofforms:governmentagentshave monitoredactivistwebsites, sentagentstomonitorandrecordtheidentitiesofindividualsattendinglawfulrallies anddemonstrations, conductedinterrogationsofgroupmembersorpeoplewhoattendedevents, compileddatabasesofnames,organizations,andactivities,and posedundercoverasmembersofgroupspursuinglawfulactivitiesinordertogain insideinformationonthegroupsactivities.xxii AccordingtoFBIguidelines,thefollowingappliestouseofundercoverinformants: (c)Theundercoveroperationwillbeconductedwithminimalintrusionconsistent withtheneedtocollecttheevidenceorinformationinatimelyandeffective manner; (d)Approvalfortheuseofanyconfidentialinformanthasbeenobtained as requiredbytheAttorneyGeneralsGuidelinesRegardingtheUseofConfidential Informantsxxiii[emphasisadded] Inaddition,bytheFBI'sownrules: (2)Undercoveroperationsmaybeauthorizedpursuanttothissubsectionforuptosix monthsandcontinueduponrenewalforanadditionalsixmonthperiod,foratotalofno morethanoneyear.Undercoveroperationsinitiatedpursuanttothissubsectionmaynot involvetheexpenditureofmorethan$50,000($100,000indrugcasesofwhicha maximumof$50,000isforoperationalexpenses),orsuchotheramountthatissetfrom timetotimebytheDirector,withoutapprovalfromFBIHeadquarters(FBIHQ).xxiv [emphasisadded]

WhattoDoOnceInfiltrated
FairieUndergroundisurgingimmediateactionandwakeupcallsforthesanctuariesandthe faeriemovement.Thingshavereachedthepointwherepeopleareactuallydieing,orbeingkilled asaresultoftheactivitiesortheseoperatives. Ifthiswasanynormaldruginvestigation,informantswouldcomeontheland,buydrugsfrom targetswithmarkedbills,leave,andreturnwithaswatteam,searchthesanctuarypremises,make arrests,andclosedownthesanctuary.Thatwouldbenormal. Whatisgoingonisnotnormal.Ithasbeengoingonfor10yearsormore,accordingtosome sources.Normally,investigationslastforacoupleofyears(atmost)asdeterminedbyajudge. Ifyoubelieveyou,oryourorganization,arethetargetofinfiltrationofsurveillance,thebest thingyoucandoisstartbuildingupdocumentationandevidence.Createasmallgroupof trustedindividuals,andstarttoplanningandresearchingthecase.Trytofindoutallthe facts,trytoremembereverydetailthatcanberemembered.Itisnousetohavesuspicions thatcannotbebackedupwithhardfacts.Ifevidencehasbeencollected,itisoftenusefulto doublecheckitfirst,andthenpublishtheevidence.Pleasetrytoalwaysbeextremely carefulaboutparanoiaandunfoundedallegations.Becausethatcancauseasmuch,ormore, harmtoanorganizationasanyintelligenceactivity. Thebestdefense,ifyouhavenothingtohideanyway,istobeextremelytransparent.If transparencydoesnotdeterintelligenceagencies,itwillatleastdiminishyourownfeelings ofparanoiaandpersecution.Secondbestistohaveahighdegreeofawarenessabout securityandknowledgeaboutsurveillancemethodology.Thathelpsindevelopingsecure communicationmechanisms,suchasusingencryption,stenographyandmaintaining anonymity..xxv

FairieUndergroundRecommendations
TheFairieUndergroundrecommendsthefollowingimmediateactions: Revotemembersinrandommanner.Don'tvoteforimportantpersonalitytooccupykey positions.Startappointingpeoplerandomlybasedondicerolls.Unfortunately,the historyshowsthatweasfaerieshavebeenunabletodetermineoperativefromfaerie.By appointingpositionsrandomlywithdicerolls,wewillactuallyhavebetteroddsatnotvoting ininformants,andwheninformantsdogetvotedin,theirlengthoftimeinthepositionwill beshorter. Setcleartimelimitsandscopesontheappointments. Removeallnormaltelephoneequipmentfromthesanctuaries. Voteforbugsearchestotakeplacequarterly. CreateaPGPkeyonahardwaredevice,withnoothercopies,tobeusedforemail. Postsignsatthesanctuarythattherearelikelytobegovernmentagentspresent. Stoppressuringpeopletofilloutregistrationformsfornewslettersthatarelikelyreadbythe government. RunthepubliccomputersonlyoffofNonwritableCd's,andpostamessageinthe computerareastouseTororVPNwhileatthesanctuary,ortonotuseacomputer. OptforSkypeforincomingcalls.

STOPbanningpeopleforanyreasonuntilthisisclearedup.Nofaerieshouldhaveto leaveafaeriesanctuary. Stopplayingthegamethatitsnothappening.Itishappening,ithashappened.Liveshave beenruined.Stopcateringtononradicalpeople,thatjustwanttousethephonelikea normalperson.Forgetit.It'sover,gothesecurityroute. ImmediatelystartusingtheFairieUndergroundforumsandIRCchatchannelforanonymous communications.(WithTororVPN!)IRC,aroundsincethe1970's,remainsthemostsecure communicationmediumforchat.Justmakeupanameandlogin!InstallOTRpluginfor endtoendencryption.

Furthermore,theFairieUndergroundisnotrecommendingderadicalizationordissolution.Weare recommendingchangebecausetheexistingparadigmsdonotbenefitthemovement,thesanctuaries, orthefairies,astheywereintended.Thesanctuariesarenotprovidingsanctuary. Thebottomline,isthesanctuariesneedtocontinuetobeplacesfororganizationandactivism, includingantigovernmentpetitions.Ifthatmeanswecan'thavedrugs,thensobeit.Ifwehaveto abandonthesanctuaries,andsellthemoff,andgivethemoneytoNORMLandACLU,andcreate quasipermanentcampsandcaravansandsafehousesinthewoods,sobeit.FairieUndergroundis callingformoreseriousdiscussionintohowtoresolvetheseissues. Educatenewfaeriesintherealityofthesituation.Faeriescanbegintouseforumsthatactually haveinformationandprotecttheiridentities;wewillbegintoseepositiveresultsinafewyears.

GuidetoComputerSecurity TechnologyRecommendationsforFaerieSanctuariesandOtherRadical CommunesorSquats


WehaveallreadnumerousreportsofhowtheHomelandSecurityorotheragenciesarewatching ourcommunicationsandinfiltratingevenpeacefulgroups.Thisisalistoftipsforthesegroupsto insuretheirownsecurityandalsothesecurityoftheirmembersandvisitors.Thesepointsare particulartoplacesororganizations,forinstance,afaeriesanctuary. 1. CreateandmaintainaPGPkeyCreateaPGPkeyandstoreitonahardwaredeviceif possible.PostthePGPkeyonthewebsite.Thisallowspeopletosendyouencryptedprivate email.Thisalsoallowspeopletosendyouemailanonymouslyusingtheremailers.Most likelyyouhavesometypeofsecretary,responsibleforcheckingtheemails.Thissecretary mayworkforthegovernmentorbesomeothertypeofspy.Thisiswhyitisbesttoputyour PGPkeyonahardwaredevice.Thisway,onlyapersoninpossessionofthedevicecan decrypttheemails.Youvoteinnewsecretariesperiodically,soeventuallytheinfiltratorwill nolongerbesecretary.WithPGPonthedevice,youknownobodyelsecancopythePGP key. 2. Haveapolicyofdatadeletion.Deleteallemailsandcommunicationsmorethan30days oldonaweeklybasis.Thesecretaryshouldberesponsibleforthis.Thisinsuresthatifanew secretaryisaspy,theyonlycouldhaveaccessedthepassed30daysofcommunications,not everyemailforthepast5years. 3. CreateaSkypeaccountandposttheusernameonyourwebsite.Peoplecancreatejunk Skypeaccountsandcontactyouanonymously.SettheSkypeoptiontonotkeepchathistory morethan2weeksold. 4. CreateaPrivacyBox,whichsendsthemessagestoyouremailaddress. 5. Rotatepositionsofpower:Assumethatyouarealreadyinfiltrated,andsomeofyour friends,areinformants.Unlesstheyareinterestedinyou,youareunlikelytorealizethey areworkinginassociationwithsomegovernment.Keepnewpeoplecominginandmake surethatnoonepersonorpersonsarealwaysdominatingeverything.Atthesametime,don't pushouttheelderseither(unlesstheyareclearlyuptonogood).Justtrytoconstructthings asmuchaspossiblesothatthingsreallyarerunningbyconsensus.Thismeanshaving scheduledheartcircleswhichfollowapreagreedformat,scheduledmeetings,withpre agreedformat,etc.Thiswayparticularindividualscannotdominatethesituation. 6. Banning:Bevery,very,carefulwithbanning.Assumethatgovernmentagentsaretryingto bansomeonebecausetheydon'twantthemthereanymore.Assumethatthepersonhasbeen setup.Assumethatwhatpeoplearesayingaboutthepersonisanoverreactionorjust untrue.Ingeneral,onlybansomeoneiftheyreallydidsomethingreallybadandtherewhere witnesses.I.E.seriouspropertydamageorviolence.Stopbanningpeoplebecausetheyare someintangibledanger.Agentsorinfiltratorsareoftenusingbanningasatechniqueto removepeoplethattheyareafterordon'tlikeorknowtomuchorwhatever.Thethingis thesanctuariesreallyareasaferplacethantheoutsideworld,becausetheagentsarereally operatingoutsidethelawthere.Theytrytogettheirtargetsoutofthesanctuaries,where

securityisexpensive,lifeisexpensive,andtheycanoperatemoreopenly.Lookbackon everyoneyouknowhasbeenbannedandaskyourselfifitispossibletheywerea governmenttarget,andifsothinkaboutwhichpeoplewerethemostvociferousinbanning them. 7. MeetingsandHeartCircles:Electronicdevicesshouldnotbepermittedinmeetings. Basically,anytypeofmeetingsshouldtakeplace,ifpossible,inaroomfreeofallelectronic devices.Becausesmartphonesarenowsopowerful,oftenagentsarejustusingtheirsmart phonestorecordaudioandtakepictures.Irepeat,consideringpostingasignforno electronicdevicesinacertainroomformeetingsorheartcircles.Peoplefoundinviolation shouldberemovedfromthesanctuary,particularlyiftheoffensehashappenedmorethen once. 8. Considerperiodicsweepsforbugs.Thesecanbeorganizedasquarterly"fairiebug hunts."Haveallthefairiesgettogetherintheirbughuntingdrag,andsearchthesanctuary forbugs.Bugsaresmallelectronicdeviceswhichcanrecordaudioorvideo.Thesedevices generallytransmittheinformationtosomeotherreceivingstationwhichcanbeamileaway. Orthedevicessavethedataforanagenttopickuplater.Ortheymayworkinsomeother way.Theycanbeverysmall.Concentrateeffortsonpublicareasindoorswherepeople congregate,likethekitchens. 9. Haveapubliccomputerpolicy,nameley,postasignbythepubliccomputerstatingthe following: Thisisaradicalplacewhichhasradicalactivistsandpossiblypeopleofinterestto governmentspassingthroughhere.Pleasebeawareofthis.Formaximumprivacyand security,pleasebootoftheTailsCDprovidedforaccessingpersonalstuffontheInternet.If youareusingyourowncomputerandtheWIFIconnection,pleaseconsideralsousinga TailsCD,ordownloadingandinstallingToronyourcomputer,orusingaproxyand/orVPN ofyourchoice.Ifyouaretrulyparanoid,bringyourownkeyboard,ordonotusetheInternet here.Sitwithyoubacktothewallsopeoplecannotreadyourscreen.TheInternet connectionmaybewatched,oryoumaybeassociatedwiththisplaceviatheipaddress. 10.Createa"cultureofsecurity."Thesituationneedstobereversedsothepeoplethatare againstsecuritymeasuresaretheonesthatarelookedatstrangely,ratherthenthepeoplefor securitymeasures.Often,governmentagentswillbeagainstsecuritymeasures,sayingthey will"attractattention." 11.Assumetelephonesaretapped,possiblybythegovernmentorothervigilanteindividuals. OptforusingSkypeforcallswhencallingfromthesetypesofplaces,oryourowncell phone. 12.Inregardstointernetforums,considerusingaforumlikethoseprovidedbyTheFairie Underground.Ithascometoourattentionthatsomeforumsarebeingrunbyagentsofsome governments.Theyrequirerealemailaddresses,theyblockyoufromconnectingifyouare usingaproxy,andtheyrequireyoutocreateaprofiletoviewtheposts.Theyclaimtheyare concernedwithspam.Thisisnotthecase.Pleaseconsideroptingforforumsthathave securityandanonymityfeaturessuchasFairieUnderground'sFairieForums. 13.Memberlists:Donotpressureorexpectfairiesorvisitorsto"register,"forthenewsletters, orotherwise.Makeitclearthatthisiscompletelyvoluntary,andthatthepersonal informationWILLNOTbestoredsecurely,andwillbeaccessiblebygovernmentagents.

BasicRecommendationsforComputerSecurityfortheAverageFaerie
1. DO:Selectandcreateaseperateemailaddressforyourfaerieactivities.Wearecurrently recommendinghushmailfortheaveragenontechnofaerie.HushmailsupportsPGP encryptionofmessages.https://www.hushmail.comThismeans,ifneeded,otherscansend youencryptedemail. 2. DO:Usefulldiskencryptionforyourlaptop.ThisisavailableviaTruecryptforWindows. 3. DO:Whenatsancturies,communes,orsquates,useaVPNorTortoaccesstheinternet. 4. RECOMMENDED:OptforforumsandsitessuchasFairieUndergroundFairieForums, whichsupportyourdesiretobeprivateandanonymouswithyourcommunications. 5. RECOMMENDED:Forchattingwithotherfairies,considerusingFairieUndergroundIRC atirc:fairieunderground.info.DownloadandinstallaplugincallOTR(offtherecord)for secureendtoendencryptedchats. 6. RECOMMENDED:Whentravelling,considerreadingthetipsinthenextsection. 7. Forgreaterdetailandinstructions,seehttps://fairieunderground.info/security_info

HowtoTravelSecurely
ThisArticleistakenfromablogentryonFairieUnderground: https://fairieunderground.info/node/47 Mostsecurityrecommendationsandsitesareaimedatpeoplethatareprimarilyattheirhouse.Yet thesecurityneedsofpeoplethattraveloftencanbeverydifferent.Thisarticlefocusesonthe securityneedsoftravelers. Firstly,manythingsdifferforatraveler.Someonetravelingoftenismorelikelytolosetheirlaptop, ismorelikelytoberobbed,ismorelikelytobeinInternetcafesasaprimaryInternetconnection, andusuallyneedstokeepaholdoftheirthingsandtravellightly. Iwillfocusonthreeaspectsoftravelercomputersecurity. 1. Keepingyouritemssecureandtravelinglightly 2. Aproxy,whentouseandwhennottouse 3. Specificsoftwareandhardwarerecommendations

KeepingyourItemsSecure
Hostelsandhotelscanbeverybusy,andbealikelyplaceforthievesorsnoopers.Youshouldkeep yourUSBsticksonyourpersonatalltimes,andtrynottoleaveyourlaptopunattendedunlessitis shutdown. WatchforpeoplelookingoveryourshouldattheInternetcafes.AlwaysholdyourUSBsticklow whenenteringthepassphrase.

ShouldYouUseaProxy?
Thisisadifficultquestiontoanswerwithmanydifferentaspectsthatdependonwhyyouwantto useaproxyinthefirstplaceandwhereyouaretraveling. IncertaincountriesusingaproxylikeTormayattractattention.Insomeruralareas,youmaybethe onlytoruserinthearea.Thismayattractattention.Icannotmakespecificrecommendationson Iran,China,Russia,ortheUnitedStates.Willyouruseoftheproxyattractattention? IfyouthinkjustusingTorwillattractattention,TorhastheabilitytobeproxiedthroughaVPN. VPN'smayattractlessattentionastheyarecommonlyusedandneededbybusinesstravelers. However,pleasenotethatusingaVPNcanloweryouranonymityversusaglobalpassiveadversary, andifyouareputunderactivesurveillance,itcanbemoreeasytodeterminewhatyouaredoing andtopossiblystopyoucoldifyouareusingasingleVPN.Itwillalsobemoreeasytotrackyour exactlocation,asyouprobablyaretheonlypersonintheregionthatkeepsconnectingtothat particularVPN. Ingeneral,itisstillrecommendedtouseTorasastraightthroughproxy,particularlyifyouare movingaround,andusingpublicaccesspoints. Thefinalconcern,isifyouwanttoblendinwiththelocals,youshouldjustuseaplainversionof WindowsXPorWindowsforyoureverydaybrowsing.

Ithasalreadybeenstatedelsewhereonthissitethatifyouareinanytypeofradicalsquat, commune,orothertypeoflocation,youshoulduseaproxyasyourdirectconnectionmaybebeing activelywatched. Thatsaid,ingeneralweatFairieUnderground,usuallyrecommendusingaproxyallthetime,in particular,Tor.Thiscanalsoprotectyoufromcensorshipactionsoflocalgovernmentsorcriminals thatmaytrytoredirectyourwebtrafficandconductamaninthemiddleattack. Whentheysay"torisexperimentalsoftware,don'trelyonitforstronganonymity,"theymeanit. Therearestillalotofpublishedattacksontor.TheworstthingIreadwasofcoursetherelay flooding,whereyoujustcreate1000compromisedtorinstances,andhavea1/3chanceauserwill pickyournodesasentriesandexits.OtherattacksincludeDOS'scertainnodestoforcetrafficinto thecompromisednode.Andofcoursetiminganalysisisstillpossibleiftheattackercanbe watchingyourconnectionandaservertheythinkyouwillconnectto.

SpecificsoftwareandHardwareRecommendations Travelinglightly,usingPublicComputers
Wearedealingwithsituationswhereitislikelythatyourcomputermaybestolenorlostatsome point.Wearealsodealingwithsituationswhereyouwanttotravellightly,andnotbelugging aroundaDellXPSWorkstation. HardwareEncryptedUSBStorageDevice. Thetruthbetold,youdon'tneedmuchtohaveahighlevelofsecurity.Ifwethinkaboutthe differentpointsofsecuritysuchasbuggedhardware,publiccomputerspyware,andloosingdevices, thereareonlyafewchoices.Youcanopttousepubliccomputersasyoutravel,oryoucanchooseto bringyourlaptopwithyou. Tousepubliccomputerseffectively,youneedafewitems.OneisanencryptedUSBstick.Thisis essential. Ideally,youwantaUSBstickwithhardwareencryption,andformattedwiththeFATfilesystemso youcanaccessitonapubliccomputer.Therearen'talotoftheseonthemarket,buttheyfunction byactuallytypingapincodeontothesideoftheUSBstick.Enteringthewrongcode3ormore timesresultsinthehardwareautomaticallydestroyingthecontentsofthestick.Thismeansyoucan havearelativelyshortandeasytorememberpincode,andstillhaveahighlevelofsecurity.Ifyou thinkyoucanremembera20digitrandompassphrase,byallmeans,usesoftwareencryptionsuch asLUKSorTruecrypt,withanormalUSBstick.Yourunintoproblemswhenyouhavetowrite downyourpassphrase. Asstated,youareinhostelsandhotels,andpeoplemayatsomepointhaveaccesstoyourbag,and mayfindyourpassphrase.Ifyouarearrestedforsomerandomthing,orsearchedataborder crossing,thepolicemayfindyourwrittendownpassphrase,orothercybercriminalsmaystealit. Soideally,youhaveahardwarebasedUSBmemorystick,aslargeacapacityasyoucanafford. ABootDevice Nowyoumaybeusinginsecurepubliccomputers.Youdon'twanttodothat.Youwanttobootthe computersoffofyourownoperatingsystem.Thiscanbeachievedbyputtingaversionoftailson anotherUSBstick,orcarryingaroundaportableUSBCDdrive/DVDwriter.Thislateroptionhas thebenefitthatyoucanBurnCD'sordoinstallsifyouneedto.SoyoubootoffoftheTAILSCD.

ThefinalbenefitofthisapproachisCD'sareabouttheonlydeviceouttherethatisreallyreadonly. Soifyoursystemgetshackedwhileyouareusingit,theycan'twritethedatatothedisk,andyou stillhaveacleansystemthenexttimeyoulogon. BadKeyboards... Finally,youwantaportablekeyboard.Peoplemayhaveputahardwarekeyloggeronthekeyboard ofthepublicmachine.Thereareextremelylightandflexiblekeyboardsthatactuallyfoldupandcan beputinabackpack. Thesekeyboardshavearangeofdifferentreviewsandratings.Somemaybewaterproof,others morecomfortableforyoutotype.Youmaywanttotrytofindagoodoneinastoreasit'sproperties maybehardtodetermineonline. Soatthispoint,wearetalkingaboutcarryingonlyalightweightflexiblekeyboard,aHardware basedencryptedUSBstick,andaUSBstickwithTAILSoryourfavoriteoperatingsystem. PGPSecurity ForPGPsecurity,youhavetwochoices.YoucaneitherstoreyourPGPkeysintheencryptedUSB stick,oryoucangetacryptographicUSBtokenorsmartcard/smartcardreadercombination. AssumingyouonlyusethetrustedCD'stoboot,youareprobablyOKwithputtingthekeyonthe USBstick.Otherwise,itisbesttouseasmartcardandsmartcardreader.Thesedeviceskeepyour keysecure. Ifyouputyourkeydirectlyontoyourcomputer,youwilleventuallyrunintotheproblemthatyou computerishackedorinfectedwithavirus.Thiscancompromisethekeyonthecomputer.When usingacryptographicdevicesuchasasmartcard,thekeyneverleavesthedevice,sothekeyis neveronthecomputer.Textisstreamedtothedeviceanddecryptedinthedevice. Itisextraordinarilydifficulttodefeatthesetypesofdevices,althoughitmaybepossiblewith significantresources. Summingitupforthesecuretechtraveler: EncryptedHardwarebasedUSBStorageDevice PortableDVD/RWUSBdrivewithaTAILSCDand/orotherCDofyourchoice. Asmartcard/smartcardreadercombination,oraUSBcryptographictoken. AnotherUSBstickwithabackupOSincasesomethinghappenstoyourdrive,orinsteadof theCDdrive. Alightweightflexiblekeyboard Wearetalkinglessthentwopoundsherepossiblyonly1lbofcarryingweight.

BringingyourLaptop
Ifyouwanttocarryalaptopwithyou,youhavealotmoreoptions,butyoualsohavetobemore carefulkeepinganeyeonyourthings,andyouhavemoretocarryaround.Iamnotgoingtorepeat everythingIsaidabove,butforstarterschoosealightweightlaptop. Youreallywanttohavefulldiskencryption.ForWindowsthisiseasyusingTruecrypt.Justselect theoptionforfulldiskencryption,configuringittopullakeyfileoffofyourUSBstickorPGP smartcard. ForLinux,itisabitmorecomplicatedasmostdistributionsdonotsupportaneasywaytodothis.

Archlinuxinstallersupportscreatinganencryptedrootpartition.DebianLinuxprovidesaneasier install.Thatiswhatyouwant.Ihavereadmanyarticlesthatsayyoudonotneedtoencryptyour rootpartition,butInolongerbelievethis.Allyouhavetodoisleaveyourcomputerunattendedfor 15minutesorso,andsomeonecanbootitoffofaUSBstick,andinstallarootkitintoyour computer.Ifallyourpartitionsareencrypted,theyareleftonlywiththeoptionofinstallingsome typeofhardwarekeyloggerorsomeotherhardwaredevice,orpossiblyflashingthebioswithsome buggedbios,orsomeotheradvancedequipment...inanycasethesearealloptionsthatseemmore complicatedandmightbemoreeasilynoticed.TheonlycaveatoffulldiskencryptionforLinuxis thatyoumustuseainitreadimage,andcompilingyourownkernelyouhavetomakesureyouhave thecorrectmodulesbuiltintothekernel.Thesecrettothiswholeideaisyouputyourbootpartition ononeofyourUSBsticks,possiblyonyourhardwareencryptedUSBstick.Youcouldalsoputyour keyfilesfordecryptingthedrivesonthereoryourPGPtoken.Thisway,thesystemcannotbe bootedwithouttheUSBstick,andevenifthesystemisunattended,itisunlikelyanyonecould installrootkits. YoustillwanttheencryptedhardwarebasedUSBstickandasmartcardorUSBcryptographic token.Thereasonissimple:Youmightnotalwaysbeabletocarryyourlaptopwithyoueverywhere (althoughthatshouldbeyourgoal).ButyouprobablycouldcarryasmallUSBstickortwoinyour pocketeverywhere.TheUSBstickshavethekeyfilesfordecryptingyourlaptopharddrives,and alsohaveyourPGPkeys.Optforfulldiskencryptionasstatedabove.Thisistheonlywaytoensure thatsomeonedoesn'ttamperwithyouroperatingsystemwhileyouareaway. Alwayscarryanotherwaytobootthemachinewithyou,suchasTAILSonaCDorUSBstickin caseyouhaveaharddrivefailureorifyouneedtogetanotherlaptopyouarereadytogowithan install.

Glossary
Therearenumeroustermsusedintheintelligencecommunity.Someofoursourcesforthis informationarestatedintheendnotes. AGENT/ASSETpersonobtainingintelligenceforanintelligenceservice,undercontrolofa CASEofficerxxvi AGENTprovocateurforexampleacopposingasmemberofasubversivegroupandenticingriots etc.xxvii BLACKSITEanyclassifiedfacilityforwhichtheUSgovernmentwilldenyexistence(for exampleUStortureprisons). BRAINWASHINGinSocietieswherethegovernmentmaintainstightcontrolofboththemass mediaandeducationsystem,andweremediastandfirmlybehindthegovernment,brainwashingis usedtodisseminatepropagandaonaparticularlyintensivescale,theoveralleffectcanbeto brainwashlargesectionsofthepopulation(SeeFOXNews).Thisisparticularlyeffectivewhere nationalistorreligioussentimentisinvokedandwherethepopulationispoorlyeducatedandhas limitedaccesstoindependentorforeignmedia. BUGacovertlisteningorrecordingdevice.Listeningdeviceiseasiertodetectasitemitssignals. Recordingdeviceis'on'onlyduringrecording,butisusuallybigger.Bothcanberemotelyturned on/off CANARYTRAPAcanarytrapisamethodforexposinganinformationleak,thatinvolvesgiving differentversionsofsensitiveinformationtoeachofagroupofsuspectsandseeingwhichversion getsleaked. COMPARTMENTALIZATIONofinformationmeanstolimitaccesstoinformationtopersonswho directlyneedtoknowcertainsuchinformationinordertoperformcertaintasks.Theideaisthatthe fewerpeopleknow,thebetter,becauseasthenumberofpeople"intheknow"grows,sodoesthe riskorlikelihoodthatsuchinformationcouldbecompromisedorfallintothehandsofthe opposition.Assuch,theretendtobevaryinglevelsofclearancewithinorganizations.However, evenifsomeonehasthehighestclearance,certain"eyesonly"informationmaystillberestrictedto certainoperators,evenoflowerrank.Inintelligenceadministration,itisparticularlyusefultokeep closewatchon"sourcesandmethods"information,soastopreventdisclosureofpeopleandtheir activities,whoselivesmaybeatrisk,ifsuchinformationwerepubliclydisclosed,or,onceagain, fallintothehandsoftheopposition. DEADDROPprearrangedlocationfordroppingoffsecrets/receivinginstructionsandmoney

DEFECTORInpolitics,adefectorisapersonwhogivesupallegiancetoonestateorpolitical entityinexchangeforallegiancetoanother.Thisactisusuallyinamannerwhichviolatesthelaws ofthenationorpoliticalentityfromwhichthepersonisseekingtodepart,asopposedtoachange ofcitizenship,whichdoesnottypicallydefythelawofanynation. DuringtheColdWar,themanypeopleescapingfromtheSovietUnionorEasternBloctotheWest werecalleddefectors. DOUBLESPEAKlanguageusedtodisguiseactualmeaning,usedbymilitaryandgovernment agencies(forexample:'physicalpersuasion'insteadoftorture,'neutralize'insteadofkill,'preemptive war'insteadofillegalinvasion,'terrorist'insteadoffreedomfighter,etc.) EXTRAORDINARYRENDITIONfancytitleusedbytheUSgovernmenttodescribesecond handtorture,thatistorturedoneonbehalfoftheUSgovernmentbyotherregimes. INFILTRATIONpenetration,placementofanagent/operativeinsideadversary'sorganization

PSYOPSPsychologicaloperationsinfluencingbehaviorofthemasses,throughmainstream mediasuchasradio,pressandTV.Sometimescalledbrainwashing. TRUTHDRUG\TRUTHSERUMAtruthdrug(ortruthserum)isadrugusedforthepurposesof obtainingaccurateinformationfromanunwillingsubject,mostoftenbyapolice,intelligence,or militaryorganizationonaprisoner. WALKINsomeonewhovolunteerstoofferitsservicesasanagent WATCHLISTcontainspeoplewhoareofinteresttointelligenceagencies

ihttp://truthout.org/index.php?option=com_k2&view=item&id=6927:infiltrationtodisruptdivide andmisdirectiswidespreadinoccupyparti iiU.S.terrorismwatchlisttops1million.reuters.com http://uk.reuters.com/article/2008/07/14/uksecurityusawatchlistidUKN1447675120080714


iii ACLUWatchLists.http://www.aclu.org/technologyandliberty/watchlists

ivColombianShamanArrestedforAyahuascaonArrivinginUS http://stopthedrugwar.org/chronicle/2010/nov/02/colombian_shaman_arrested_ayahua vTaitaJuanisFree!MorganMaherhttp://www.ayahuasca.com/lawayahuascaoverviews/freetaita juan/


vi OperationsIntelligenceUnitVictorianpolicedatabasefilesat: http://home.vicnet.net.au/~neils/PoliceWatch/spec1.html vii OperationsIntelligenceUnitVictorianpolicedatabasefilesat: http://home.vicnet.net.au/~neils/PoliceWatch/spec1.html viiiOperationsIntelligenceUnitVictorianpolicedatabasefilesat: http://home.vicnet.net.au/~neils/PoliceWatch/spec1.html ix https://en.wikipedia.org/wiki/Espionage

xFBIusingFacebookinfightagainstcrime http://www.guardian.co.uk/world/2010/mar/16/fbifacebookcrimestudy

xi ACTIVISTSANDSPOOKS aboutcovertactivitiesagainstactivistgroups.FelipeRodriquez27September2001 http://felipe.home.xs4all.nl/articles/infiltration_lecture.htm xii Postonwww.streegangs.com,'X'.http://www.streetgangs.com/billboard/viewtopic.php? f=67&t=10894&sid=d83b093cc6e2769da5337e3af7bff5d1 xiiiVitoRussointerviewsHarryHay,afounderoftheMattachineSocietyandtheRadicalFaeries;Theshowis"Our Time",ca.1983.https://fairieunderground.info/node/50 xiv ACTIVISTSANDSPOOKS aboutcovertactivitiesagainstactivistgroups.FelipeRodriquez27September2001 http://felipe.home.xs4all.nl/articles/infiltration_lecture.htm xv OperationsIntelligenceUnitVictorianpolicedatabasefilesat: http://home.vicnet.net.au/~neils/PoliceWatch/spec1.html xvi Undercoverpoliceofficersgivenpermissiontohavesexwithsuspects. http://www.metro.co.uk/news/902022undercoverpoliceofficersgivenpermissiontohavesexwithsuspects xviiTeenFallsInLoveWithUndercoverCopInMarijuanaSting,GetsArrested http://www.huffingtonpost.com/2012/02/21/teenfallsinloveundercovercopmarijuanaoperation_n_1291823.html

xviiiMexicolawmakerslividoverUS'OperationFastandFurious' http://www.csmonitor.com/World/Americas/2011/0309/MexicolawmakerslividoverUS OperationFastandFurious xixFresnoPeaceGroupInfiltratedbyGovernmentAgent.MikeRhodes http://web.mit.edu/thistle/www/v15/3/infiltration.html


xx OperationsIntelligenceUnitVictorianpolicedatabasefilesat: http://home.vicnet.net.au/~neils/PoliceWatch/spec1.html xxiAngryactivistscondemnFBIinfiltrationofpeacemovement,AskiaMuhamma. http://www.finalcall.com/artman/publish/National_News_2/article_7574.shtml xxiiTheReturnofCOINTELPRO:GovernmentInfiltrationofActivistGroups. Wednesday,August12,2009,MaxSoliehttp://www.constitutioncampaign.org/blog/?p=99 xxiiiTHEATTORNEYGENERALSGUIDELINESON FEDERALBUREAUOFINVESTIGATION UNDERCOVEROPERATIONS xxivTHEATTORNEYGENERALSGUIDELINESON FEDERALBUREAUOFINVESTIGATION UNDERCOVEROPERATIONS xxvOperationsIntelligenceUnitVictorianpolicedatabasefilesat: http://home.vicnet.net.au/~neils/PoliceWatch/spec1.html xxvihttp://alanpetersroundup.blogspot.com/2007/12/intelligenceterminology.html xxviihttp://alanpetersroundup.blogspot.com/2007/12/intelligenceterminology.html

You might also like