Security Culture: A Handbook For Activists

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Security Culture:

a handbook for activists


This handbook is the first edition of what we hope will be an evolving and
growing document dealing with security issues and canadian activism.

A lot of this information is general and can be applied to any locality -


other information is easily adapted to fit other situations.

For more information or to make contributions to this document - please


email securitysite@tao.ca

Second edition - prepared August 2000


Introduction:

Resistance has been on the rise for the past few


years, with activists adopting more and more effective
tactics for fighting back. Now, more than ever, we
pose some threat to the status quo. Our increased
activity and effectiveness has meant that the RCMP,
FBI, and local police have continued to escalate their
activities against us. If we want our direct action
movement to continue, it is imperative we start
tightening our security and taking ourselves more
seriously. Now is the time to adopt a security culture.
Good security is certainly the strongest defense we
have.

This is a handbook for the Canadian (and even US)


activist who is interested in creating and maintaining
security awareness and culture in the radical move-
ments. It is not nearly complete - but is what we have
got finished at the moment. We are always looking for
contributions - so please feel free to email
securitysite@tao.ca with any images or text you think
belong in a handbook such as this.

If this material appears familiar to you - its because


this is the second edition of this zine that we have put
out... mostly to correct spelling errors and other small
things. The three articles in this pamphlet have been
mostly cobbled together from other writings that al-
ready exist on this subject out there so we don’t claim
any of this to be 100% original material - though we
have included quite a bit of fresh info on the Canadian
state and its operation (mostly because we have
found the majority of info out there to be very
focussed on US law enforcement). We hope that you
will put the material contained within to good use!
4
Security
What it is, why we need it
and how we implement it...
Culture

A
gitators; liberationists;
abolitionists; union
organizers; Even if you have never picked
revolutionaries... From large up a monkeywrench or been
uprisings challenging the entire arrested for civil disobedience,
political structure, to isolated even if you think you have
environmental and social nothing to hide, these guidelines
struggles, people have always will enhance your personal
worked to create a better world. safety as well as the move-
For government the response ment’s overall effective-ness.
has usually been to jail activists Surveillance has been set up on
and revolutionaries through use all sections of political
of the courts and police forces. movements in the past.

As direct action movements Governments in the western


become more effective, industrialized world have
government surveillance and targeted groups that have
harassment will increase. To advocated sabotage and groups
minimize the destructiveness of that have not, movements that
this political repression, it is have been militant and move-
imperative that we create a ments that have been markedly
security culture within our pacificst. The government’s
movements. security machinery serves
political and economic
This pamphlet is essential objectives, and there are over
reading for anyone who is 250 political prisoners in
associated with groups that Canada and the US that can
advocate and/or utilize testify to this from firsthand
sabotage, theft, arson and more experience. By adopting a
militant tactics. The advice security culture, we can defeat
herein also applies to anyone various counterintelligence
who is associated with groups operations that would otherwise
that practice civil disobedience, disrupt both mainstream
especially since membership organizing and underground
often overlaps and gossip resistance.
travels freely between groups.

5
SO WHAT IS A SECURITY Essentially, it is wrong to speak
about a specific individual's
CULTURE? involvement (past, present or
future) with illegal activities.
It’s a culture where the people These are unacceptable topics
know their rights and, more of discussion regardless of
importantly, assert them. Those whether it is rumor, speculation
who belong to a security culture or personal knowledge.
also know what behaviour
compromises security and they Please note: this is not to say
are quick to educate those that it is wrong to speak about
people who, out of ignorance, direct action in general terms. It
forgetfulness, or personal is perfectly legal, secure and
weakness, partake in insecure desirable that people speak out
behaviour. This security con- in support of mokeywrenching
sciousness becomes a culture and all forms of resistance. The
when the group as a whole danger lies in linking individual
makes security violations activists to specific actions or
socially unacceptable in the groups.
group.

THREE EXCEPTIONS
WHAT NOT TO SAY
There are only three times that it
To begin with, there are certain is acceptable to speak
things that are inappropriate to specifically about actions and
discuss. These things include: involvements.

> your involvement or someone The first situation would be if


else’s involvement with an you were planning an action
undergound group with other members of your
small group (your “cell” or
> someone else’s desire to get “affinity group”). However, you
involved with such a group should never discuss these
things over the Internet (email),
> asking others if they are a phone line, through the mail, or
member of an underground in an activist's home or car, as
group these places and forms of
communication are frequently
> your participation or someone monitored. The only people who
else’s participating in any action should hear this discussion
that was illegal would include those who are
actively participating in the
> someone else’s advocacy for action. Anyone who is not
such actions involved does not need to know
and, therefore, should not know.
> your plans or someone else’s
plans for a future action

6
The second exception occures to talk after being harassed and
after an activist has been intimidated by the authorities,
arrested and brought to trial. If because they are not the ones
she is found guilty, this activist who will go to jail. Even those
can freely speak of the actions people who are trustworthy can
for which she was convicted. often be tricked by the
However, she must never give authorities into revealing
information that would help the damaging and incriminating
authorities determine who else information. It is safest for all
participated in illegal activities. cell members to keep their
involvement in the group
The third exception is for anony- amongst themselves. The fewer
mous letters and interviews with people who know, the less
the media. This must be done evidence there is in the long
very carefully and without run.
compromising security. Advice
on secure communication
techniques can be found in SECURITY VIOLATING
other publications.
BEHAVIOURS
These are the only situations
when it is appropriate to speak In an attempt to impress others,
about your own or someone activists may behave in ways
else's involvement or intent to that compromise security. Some
commit illegal direct action. people do this frequently - they
are habitually gossiping and
bragging. Some activists say
SECURITY MEASURES inappropriate things only when
they consume alcohol. Many
Veteran activists only allow a activists make occasional
select few to know about their breeches of security because
involvement with direct action there was a momentary
groups. Those few consist of the temptation to say something or
cell members who they do the hint at something that shouldn’t
actions with AND NO ONE have been said or implied. In
ELSE! most every situation, the desire
to be accepted is the root
The reason for these security cause.
precautions is quite obvious: if
people don't know anything, Those people who tend to be
they can't talk about it. It also the greatest security risks are
means that only the people who those activists who have low
know the secret can also face self-esteem and strongly desire
jail time if the secret gets out. the approval of their peers.
When activists who do not share Certainly it is natural to seek
the same serious consequences friendship and recognition for
know who did an illegal direct our efforts, but it is imperative
action, they are far more likely that we keep these selfish
desires in-check so we do not
7
jeopardize the safety of other Indirect-Bragging: Indirect-
activists or ourselves. People braggers are people who make
who place their desire for a big production on how they
friendship over the importance want to remain anonymous,
of the cause can do serious avoid protests, and stay
damage to our security. "underground." They might not
come out and say that they do
illegal direct action, but they
The following are examples of make sure everyone within ear-
security-violating behaviours: shot knows they are up to
something. They are no better
Lying: To impress others, liars than braggers, but they try to be
claim to have done illegal more sophisticated about it by
actions. Such lies not only pretending to maintain security.
compromise the person's However, if they were serious
security--as cops will not take about security, they would just
what is said as a lie--but also make up a good excuse as to
hinders movement solidarity and why they are not as active, or
trust. why they can't make it to the
protest (that kind of lying is
Gossiping: Some weak acceptable).
characters think they can win
friends because they are privy
to special information. These
gossips will tell others about EDUCATE TO LIBERATE
who did what action or, if they
don't know who did it, guess at It is fairly easy to spot those
who they think did what actions activists who compromise our
or just spread rumors about who movement’s security. So what
did it. This sort of talk is very do we do with people who
damaging. People need to exhibit these behaviours? Do
remember that rumors are all we excommunicate them from
that are needed to instigate a our movement? Actually, no--at
grand jury or other investigation. least, not for a first offense.

Bragging: Some people who The unfortunate truth is there


partake in illegal direct action are numerous security-ignorant
might be tempted to brag about people in the movement and
it to their friends. This not only others who have possibly been
jeopardizes the bragger's raised in a "scene" that thrives
security, but also that of the on bragging and gossiping. It
other people involved with the doesn't mean these people are
action (as they may be bad, but it does mean they need
suspected by association), as to be educated. Even seasoned
well as the people who he told activists can make mistakes
(they can become accessories when there is a general lack of
after the fact). An activist who security consciousness in our
brags also sets a horrible groups. And that’s where those
example to other activists. of you who are reading this can
8
help. We must NEVER let a damaging behaviours that they
breach in security occur without are, they will soon end. When
acting to correct it. If an we develop a culture where all
acquaintance of yours is breaches of security result in an
bragging about doing an action immediate reprimand, all
or spreading security- sincere activists will quickly get
compromising gossip, it is your with the program.
responsibility to explain to her or
him why that sort of talk violates
security and is inappropriate. DEALING WITH CHRONIC
You should strive to educate this SECURITY PROBLEMS
person in a manner that en-
courages him to listen and to So what do we do with activists
change his behaviour. It should who repeatedly violate security
be done without damaging his precautions even after multiple
pride. You should be humble educational sessions? It's
and sincerely interested in unfortunate, but the best thing to
helping him to become a better do with these people is cut them
person and a more effective loose and kick them out of our
activists. Do not maintain a meetings, basecamps and
"holier than-thou" attitude. This organizations. With law
will inevitably raise his defenses enforcement budgets on the
and prevent him from absorbing increase and with courts
or using any of the advice you handing down long sentences
offer. Remember, the goal of for political “crimes”, the stakes
educating people is to change are too high to allow chronic
their behavior, not boost your security-offenders to work
ego by showing them how much among us.
more security-conscious you
are. By creating a security culture, we
have an effective defense
If possible the educational against informers and agents
session should be done in who try to infiltrate groups.
private, so the person does not Imagine an informer who, every
have to contend with the time she asked another activist
potential ‘pride’ issues. The about that person’s activity ,
educational reprimand should received a reprimand and an
also be done as soon as education on security. That
possible after the mistake to informer would get frustrated
increase its effectiveness. really easily. Once the activists
discovered she continued to
If each of us takes on the violate security precautions after
responsibility of educating those being repeatedly educated, they
who slip up, we can dramatically would have grounds for her
improve movement security. dismissal. And that would be one
Once people recognize lying, less informer for us to deal with!
gossiping, bragging, and
indirect-bragging as the
9
10
a brief primer on the
canadian state security apparatus

Recent repression against activ- The Canadian security appara-


ists in British Columbia illuminates tus has identified a number of
the need for grassroots people to our movements as threatening
understand and practice move- to national security. They have
ment security. Police monitoring, targeted people and organiza-
infiltration and agent provocateurs tions widely. Even avowed
are all techniques used by the pacifists have been included in
state routinely against activists to surveillance and repressive
turn up information about the ac- measures. According to Cana-
tivities of our movements and our- dian Security Intelligence
selves. Service (CSIS) annual reports of
the past five years, the Native
Although many activists have Resistance and the Environ-
trouble believing that state mental/Animal Rights move-
security agencies have that ments have been primary
much interest in their affairs, a targets.
few key court cases and hear-
ings have helped activists to With the rise in militant First
gain access to information that Nations struggles, covert direct
proves that police spying on action against corporations, and
activists is routine in Canada. the growing focus by the media
on general "anarchist" politics
During the APEC hearings, it due to events in Seattle around
was revealed that over seventy the WTO among other major
groups and individuals were increases in movement strength
monitored before and during the and militancy, we can be pretty
APEC meetings in 1997. A paid sure that this has been marked
industry informant/disruptor was by a growing level of surveil-
identified at a wilderness action lance and monitoring as well.
camp in 1999, and local activists
have been targeted by provoca- The need for security in our
teurs who have tried to convince movements is obvious - how-
them not only to disclose ever, it is incredibly important
information but to break the law. that we don't fall into the trap of
using our awareness of security
issues to shut other people out

11
of our growing movements. One been doing illegally. At the
of the key aims of COINTEL- operations level, the new
PRO operations against the agency was granted more
Black Panthers and American freedom and more leeway than
Indian Movement was to spread the Mounties ever had.
paranoia and distrust among
those freedom fighters so that Today they continue to carry out
they would find it hard to accept a wide range of surveillance. As
new people into their work. they are not a law-enforcement
agency and therefore their
It is possible to build a move- evidence is not used in court,
ment large and at the same time there is nothing stopping them
create security culture. Arming from contravening the few
ourselves with knowledge about regulations that exist regarding
how the system works against privacy rights. For example,
activists is the first step to CSIS is not required to inform
creating that culture. The central people, as the RCMP does,
aim of this article is to give a ninety days after they have
brief run-down of how domestic been wiretapped or bugged.
intelligence works in Canada so
that we can better understand Agents working for CSIS are
how to avoid its traps. allowed, with "authorization", to
enter people's homes to plant
bugs, wiretap phones, open mail
AN OVERVIEW OF and look into health, employ-
DOMESTIC INTELLIGENCE ment and government records
without ever having to tell a
ORGANIZATIONS targeted individual what they are
doing. The information that they
The Canadian Security and gather is used to build profiles
Intelligence Service (CSIS) is and dossiers (files) on individu-
probably the best known of the als, organizations, networks,
"security" agencies that deal etc. The information that they
with activist "threats". They were gather is often passed on to
originally a special surveillance other wings of the federal
wing of the RCMP until 1983 security system who are respon-
when they were split off into a sible for "law-enforcement", and
separate agency due to protests will then obtain whatever war-
that they were acting as a secret rants are necessary for legal
organization that was contra- surveillance (to be brought into
vening Canadians' democratic court as evidence).
rights to organize. Essentially,
the split from the RCMP allowed The National Security Investiga-
the new spy agency to do tion Service (NSIS) is the
legally what the Mounties had primary law-enforcement wing
12
of domestic security. The NSIS against several Vancouver
is a section of the Royal Cana- activists. During the Vancouver
dian Mounted Police (RCMP). investigation, house and vehicle
Most cities across Canada have bugs were located by some
an NSIS office including Van- targeted individuals. The bugs
couver, Edmonton, Montreal, had large battery packs at-
Ottawa, and Toronto. The NSIS tached to facilitate less frequent
maintains a computer database battery changes. The NSIS also
on activists, immigrants and so visited several activists across
called "terrorists" which is Canada in an attempt to ques-
housed in Ottawa. tion them regarding the individu-
als under investigation.
It is believed that the Vancouver
NSIS employs between 12 and It cannot be stressed enough
18 members. Within NSIS there that no one is under any legal
are several sub-groups called obligation to provide the police
Team 1, Team 2, Team 3 - etc. with any information other than
that have different investigative one's own name and address.
targets. That is it. Saying anything more
jeopardizes individuals' and
They employ informants, infiltra- movement security. Even
tors, personal physical surveil- answering seemingly insignifi-
lance, electronic surveillance cant questions can assist the
including phone and room police in developing personality
"bugs" and other means of profiles on a range of activists
investigation and research. which may not contain "evi-
dence" but may instead be used
The RCMP/NSIS also have to give police “leads” on other
other resources at their disposal suspects and to construct intent
during counter-insurgency during legal proceedings. The
operations. "Special O" is a only principled response to
team of surveillance specialists police questioning is to say
that may be called upon. "Spe- nothing more than name and
cial I" is a penetration team address.
whose specialty is to break into
homes, vehicles and other The Communications Security
properties for investigative Establishment is an agency of
purposes. They are the team, the defence department which
which among other things, has been long clouded in
installs listening devices, photo- secrecy. They collect and
graphs building interiors, etc. process telephone, fax and
computer communications of
In a long-running case based in foreign states, corporations and
Vancouver, all of these methods individuals. The federal govern-
of surveillance were used ment uses the intelligence
13
gleaned from the data to sup- - and they often appear in
port troops abroad, catch crowds as “fellow demonstra-
“terrorists” and “further Cana- tors”.
da's economic goals” (and what
that means is up to them).
THE COUNTER-
Although the CSE is not techni- INSURGENCY MODEL
cally allowed to collect the
communications of Canadian Most Western nation-states
citizens, it is known to be a follow a model of counter-
partner in the Echelon project - insurgency developed by a
a multinational monitoring British intelligence expert named
operation which sees CSE and Kitson who wrote, Low Intensity
counterpart agencies in the Operations, after much field
United States, Britain, Australia work in the colonies. He broke
and New Zealand share inter- down movement development
cepted communications of into three stages:
interest with one another,
effectively creating a global The Preparatory Phase: is
surveillance web. when the movement is small,
tends to focus on education,
The Terrorist Extremist Section publishing and groundwork.
(TES Unit) is British Columbia's
anti-terrorist unit. A joint Vancou- The Non-Violent Phase: is
ver/Victoria Police Department/ when the movement takes on
RCMP unit called the Organized more of a mass character. Large
Crime Agency (formerly the demonstrations are the norm.
Coordinated Law Enforcement
Unit - CLEU), it is believed that In the Insurgency Phase: the
the this unit employs two or movement has taken on a
three members only. popular character. Perhaps a
more assertive, guerrilla compo-
Most activists will be initimately nent has emerged.
familiar with their local police
forces. Be aware that cops do Kitson advises that the primary
not only show up in blue uni- work of the intelligence agency
forms - but routinely practice should occur during the prepara-
crowd infiltration and carry out tory phase. At this time the
surveillance and investigative movements are most vulnerable.
activities either alone or jointly They have not experienced a
with the RCMP depending on high degree of repression. They
the type of case. Watch for them consider talk of security as mere
on demonstrations - as they like paranoia. As they are not break-
to come along and take photo- ing laws they believe that it is
graphs and video for the record
14
safe to organize completely
openly. The intelligence agency
is therefore able to exploit these
conditions and develop detailed
dossiers on a wide range of
people. The information will be
extremely valuable to them later
on.

It is important that as a move-


ment in we need to learn to
practice security at all points in
the movement's development.
Remember that the State is
interested in knowing about
activists' beliefs, not just in "hard
evidence". Learn and practice
security to protect ourselves and
our peoples. Don't be afraid.
Remember - If an agent comes
knockin', do no talkin'.

15
16
everything you ever wanted to know
about informers and
infiltrators

Informants and infiltrators incriminating evidence against


operate in every radical move- activists or even setting them up
ment. The rise of militant radi- to be arrested. These infiltrators
calism as seen at the WTO are either on the payroll of a
protests in Seattle, and the government agency or may be
declarations by activists to hired by industry. The second
continue the struggle in the type of informer is the activist-
streets and underground - mean turned-informant--either unwit-
that more and more attention tingly or because of pressure
will be paid to activists by law put on them by the authorities.
enforcement. Part of this will Make no mistake, both kinds
mean sending more infiltrators exist throughout our ranks and
amongst our ranks to bribe and are equally dangerous.
entice those weak individuals
already involved. Let's discuss the deliberate
informer (infiltrator) first. They
Non-violent movements need to are often difficult to identify, they
learn to identify such people and come in all ages and types, but
and let them know that their they usually have a similar
actions will never be tolerated modus operandi--they come out
by activists in any way. of nowhere and all of a sudden,
they are everywhere. Whether
This section is intended to arm it's a meeting, a protest, or an
you with information on how to action, this person will be right
spot and deal with informers in the thick of it.
and infiltrators in our ranks.
Keep in mind however that this
is also the hallmark of a new
Who is an informer? activist, whose enthusiasm and
commitment is so strong that s/
There are actually two kinds of he wants to fight the power
informers. The deliberate every minute of the day.
informer is someone who
infiltrates an organization with How to tell them apart? Well, a
the specific intent of getting planted infiltrator will ask a lot of

17
questions about the direct action Any activist who can't under-
groups, individuals and illegal stand the need for security is
activities. S/he will suggest someone that should be held at
targets and volunteer to do arm’s length from the move-
reconnaissance as well as take ment.
part in the action.
Placing infiltrators into social
An example of infiltration tactics justice movements isn't anything
can be found in an incident that new. It was done to the Black
occured a few years ago when Panthers and the peace move-
U.S. Surgical hired a security ment in a big way. Unless you
firm to infiltrate Friends of are only working with people
Animals in Connecticut. Their you've known for years and who
operative convinced an activist have earned your trust, you
to put a pipe bomb in the car of should assume there is an
the president of U.S. Surgical. informant in your midst and act
Needless to say, the police were accordingly.
waiting for her and she ended
up being charged with at- This doesn't mean that no one
tempted murder. else should ever be allowed into
the "inner circle." On the con-
State and industry infiltrators trary, if our movement is to
have been identified in opera- continue to grow, we must
tion in British Columbia over the always be recruiting new mem-
past few years - attempting to bers; we just need to keep
incite illegal activity, sowing security uppermost in our minds
disruption in action camps, and and exercise caution at all
gathering information on the times.
who, what and when of our
movement’s activities Possibly an even greater threat
is the activist-turned-informer,
Everyone who asks a lot of either unwittingly or through
questions about the direct action coercion.
isn't necessarily an infiltrator,
but they ARE the ones to watch The unwitting informer is the
(at the very least, we should be activist who can't keep his/her
educating them about security mouth shut. If someone brags to
culture). Explain to new activists you about what s/he's done,
that direct action tactics can be make sure this person never
risky (though some risks are has any knowledge that can
worth taking!) and that it is incriminate you, because sooner
dangerous to ask a lot of ques- or later, the wrong person will
tions about it. If the person hear of it. These activists don't
persists in asking questions, mean to do harm, but the results
STAY AWAY FROM THEM! of their bragging can be serious.
18
It is your responsibility to in- criminal records and drug
struct these people on security addictions which can often be
culture and the importance of it. used by the police to pressure
activists into giving them infor-
The other type of activist- mation. Two activists were
informer is person who cracks recently put in jail in Canada
under pressure and starts because a third party panicked -
talking to save his/her own skin. mainly about not being able to
Many activists get drawn into get his drugs in jail - and talked
situations they are not able to to free himself. (This is not to
handle, and some are so caught condemn those who have drug
up in the "excitement" that they habits or criminal records - but
either don't realize what the are certainly things to keep in
consequences can be or they mind).
just don't think they'll ever have
to face them. Don't be afraid to talk about this.
Ask hard questions, and if you
We have to know the possible aren't convinced that someone
consequences of every action will be able to stay strong if the
we take and be prepared to deal worst happens, then designate
with them. Someone who is that person to do support. Make
easily influenced by his/her sure that those who go into
parents or dependent on them battle with you are willing and
for support is not a good candi- able to take whatever comes,
date for actions as they can be even if it means giving up their
persuaded too easily to cooper- freedom for your goals.
ate with the authorities. There is
no shame in not being able to Remember - there is no excuse
do an action because of respon- for turning in action comrades to
sibilities that make it impossible the police - and those activists
to do jail time. If others are that do effectively excommuni-
depending on you for support or cate themselves from our
you aren't willing to lose your movements. We must offer no
job or drop out of school, DON'T legal or jail support to those
DO THE ACTION. activists who turn-in others for
their impact on our movement is
Make certain that others in your far-reaching and can have
affinity group are not in situa- devastating effects.
tions which may cause them to
cooperate with the police or
abandon their friends.

Some things to look out for in


people you choose to do illegal
direct action with are lengthy
19

You might also like