Security & Counter-Surveillance

Information Against t e !olice State

Revised & Updated: New Surveillance Technology & Techniques New Section on Informant & Infiltration Operations

2009 edition; Vancouver !anada"!oast Salish Territory

0ig 0rot er is watc ing3 more t an ever 4efore In countless 8ays surveillance is emerging as the dominant 8ay the modern 8orld organi:es itself; 3ritain no8 has an estimated %;2 million
!!TV cameras<one for every 7% citi:ens; +eople in central -ondon are no8 caught on camera a*out $00 times a day; Surveillance is a condition of modernity integral to the development of the nation9 state and capitalism;;; )ore than ever *efore our lives are visi*le to others from government agencies and security services to the o8ners of the 8e*sites 8e surf and the stores 8here 8e shop; They trac1 us in pu*lic in 8or1places and online compiling our personal information in massive data*ases and sorting us into categories of ris1 value and trust8orthiness; !!TV cameras are =ust one of their tools; Others include radio frequency identification >?'I.@ chips A+S location trac1ers 8e*site coo1ies facial recognition soft8are and store loyalty cards; !omputer programs used *y security services can monitor and analy:e *illions of phone calls and e9mails in real time; Be even ma1e it easier for our trac1ers *y 8illingly disclosing pieces of our lives on social net8or1ing sites li1e 'ace*oo1 or in online contests & questionnaires; In one form or another surveillance has al8ays *een a part of human society; Bhat&s ne8 is computer technology that has made it possi*le to integrate vast and diverse *its of information; 6s 8ell our post99"77 o*session 8ith eliminating ris1 has produced an architecture of mass surveillance in 8hich everyone is treated as a suspect;
.on 3utler C3ig 3rother is 8atching more than ever *eforeD Vancouver Sun 'e*; $ 2009

1"Introduction######################### $ #" Surveillance $ $" Security $ %" !rinciples of Surveillance $ &" ! ysical Surveillance############## % Operator&s & Vehicles % 'i(ed Surveillance % )o*ile Surveillance % 'our +hases of )o*ile############# , Other 'orms , '" (ec nical Surveillance , Telecommunications , -istening .evices##################/ +ara*olic )ics / Video !ameras#################### 0 Still +hotography 0 Trac1ing .evices 0 2ight Vision & Thermal 0 3iometrics#########################4 56V&s 4 Satellite 4 )" Surveillance *etection#############9 +hysical Surveillance 9 Technical Surveillance############70 Security 6gainst Technical 70 +" Surveillance and ,vasion#########7$ -" Informants & Infiltrators 7$ .ealing 8ith"#####################7, 1." /0I Cointel-!ro################## 7/ !ointel9+ro Techniques 7/ !ointel9+ro !ase Studies######### 74 11" Case Studies of Informants and Infiltrators1111111111111111174 1#" Security 2uidelines#############79

"Those in authority fear the mask for their power partly resides in identifying, stamping and cataloguing: in knowing who you are... our masks are not to conceal our identity but to reveal it...” Text on inside of 9,000 masks distributed at the Carnival Against Capitalism, London, June 1999

6nd for those 8ho really are &suspects& read on;;;


poli e in militar!*st!le amouflage se retl! ondu t surveillan e at a mu h loser range# $" Security Security n. or a do%en operators in six vehi les . infiltrators " informants are espe iall! dangerous# Technical surveillance is far more ommon# 1ith $idespread use of tele ommuni ations . ivilians re ruited b! poli e. air raft. banks. tapped telephones. s hools. planes " heli opters ma! also be used# (n this ategor! $e must also onsider informants.b! ground teams. in order to gain information# There are two types of surveillance: physical & technical. homes. streets " interse tions# (n rural areas. routes of travel. ph!si al surveillan e is more often ne essar! due to the la k of tele ommuni ations. it onsists of te hni al devi es to re ord. there are also tens of thousands of CCT3 video %" !rinciples of Surveillance As noted. The! are a danger to !ou and the movement# This in ludes persons $ho talk too mu h. fax-. or a tivities on $hi h $ . or satellite in high priorit! situations-# (n some ases. pager.# &or these reasons. and their abilit! to influen e events. neutrali%e. lo ations. internet. $ithout $hi h the enem! does not kno$ $ho. surveillan e an be diffi ult to dete t be ause it strives to be overt " hidden# :eveloping information through surveillan e is a progressive " often length! pro ess# (t is from man! pie es of information that an overall pi ture of the target. life or death# 'ot onl! for !ourself. 1# 2easures adopted to guard against atta k.s thoughts. freedom or imprisonment. surveillan e is the se retive. al oholi s. malls. et #-.# 0e ause of the sensitive nature of personal information the! are able to gather. but others around !ou# (nformation gathered from various sour es. ell. pla e. the purpose of se urit! is to prote t our movement# A vital part of this is to limit or den! the flo$ of information to enem! for es# The follo$ing 7 prin iples should be seen as basi " fundamental se urit! guidelines8 1# Do not send or discuss sensitive information over any form of telecommunications . Physical surveillance is arried out b! enem! personnel on foot and+or b! vehi le# (t is the onl! $a! a target person an be ontinuousl! observed over an extended period of time# Surveillan e teams an be omprised of t$o persons in one vehi le.s da! to da! a tivities. " vehi les in $hi h operators " devi es an be on ealed# (n the it!. personal relationships. vehi les.i#e#. infiltrators " ollaborators# The! ma! be poli e agents. all of $hi h are vulnerable to inter eption# Cell Phones an be made into a tive listening devi es and should have their batteries removed before dis ussing an! se ret information# 5# Never discuss sensitive information in any enclosed area vulnerable to listening devi es . et #-# 9# Follow the Need-to-Know-Only ule: (f a person is not involved in the information. ell. stru tures. things or ob)e ts. due to the large masses of people. $ho do not take se urit! seriousl!. et # Lo$ population densities also serve to identif! surveillan e operators as /outsiders. onversations.1" Introduction Se urit! is vital to the su ess " survival of the resistan e movement# This is be ause $e have an enem! $ho a tivel! $orks to undermine. night*vision devi es. et # 2ore generall!. se retive observation of persons. ph!si al surveillan e in rural areas often re4uires long*range observation . afes. in stores. et # 2ore info $ill be developed in order to identif! times. et # The urban environment is far more ondu ive to surveillan e. onta ts. or ob)e t in order to gain information# (n order to be effe tive. $here or $hen to strike# Se urit! " Counter*Surveillan e measures are designed to limit " den! the flo$ of information to enem! for es# (t is based on the prin iple that ounter*insurgen ! is a permanent part of so iet! and that those engaged in resistan e are al$a!s vulnerable to surveillan e " repression# ameras. or a tivities# This in ludes listening devi es in homes " ars. monitoring of internet a tivit!. roads.s movements. bikes. the! $ill alter their behavior " on eal an! /suspi ious. as $ell as stop the flo$ of information# &or this reason. ontinuous $at hing of a person. do ument or monitor a target individual.s patterns is developed# Surveillan e $ill normall! begin $ith limited information on a targeted individual. theft or dis losure# 5# Something that gives or assures safet! " onfiden e6 As noted. or former omrades# This form of ph!si al surveillan e is the main sour e of intelligen e on people. CCT3 video. the less danger there is the! an tell others# 7# !void those una"le to follow "asic security codes. ommuni ations " ele tri al s!stems. a tivities. $hat. motor ! les.or even more.s a tivities. then the! do not need to kno$ its ontents# The less a person kno$s. internet. vehi le. te hni al surveillan e is a main sour e of intelligen e on a person. of ourse-# (n addition. tra king devi es. et # #" Surveillance Surveillance is the ontinuous. pla es. is alled intelligence# The gathering of intelligen e is a vital part of ounter*insurgen ! operations. offi es. " that is sub)e ted to anal!sis " omparison. a residen e or $orkpla e. " ultimatel! destro! us# &ailure to remain a$are of se urit! on erns an mean the differen e bet$een vi tor! or defeat. plans " a tivities# (t is sometimes referred to as /human intelligen e. surveillan e must go unnoti ed and be undete ted# As soon as the target is a$are he+ she is under surveillan

although the! annot sa! for ertain $ho drove the vehi le $ithout some form of line of sight observation-# 'evertheless.s on overlooking hills or mountainsides.soft target vs# hard target-# Just reading this manual an make !ou a harder target# 0e ause of the resour es " apabilities of our enem!. the surveillan e box $ill over all kno$n routes in and out of an area and an literall! surround the target# (f a person drives. the ba k. the surveillan e then be omes mobile# <n foot or b! vehi le. or vehi les parked in the area# &ixed surveillan e an hange into mobile surveillan e $ith operators pre*positioned and read! to follo$# '''' Rural: (n a rural area. and overing it $ith the top la!er of earth-# &" ! ysical Surveillance . to observe a tivities. and onstru t amouflaged hide positions . hats. and mi rophones atta hed to )a kets or shirts at hest level or in ollars# A volume. !outh. amouflage-. ethni it!.this is the trigger. ommuni ations bod! gear is $orn b! operators# This usuall! onsists of lear. abandoned buildings. as an @. plasti earpie es pla ed in one ear.meaning it doesn=t move.9 pla!ers or i.=s =1at hers= of the earl! 19?0s-# Like$ise. $ith some modifi ations# Surveillance Operators & Vehicles Surveillan e operators an be of an! ra e. the target is follo$ed until he+she stops# A surveillan e box is again set up $ith one operator having dire t line of sight on the vehi le or lo ation . et # Appearan e b! itself $ill rarel! reveal a sophisti ated surveillan e effort# (nstead. $ho alerts other operators as to a tions of target-# As the targeted individual re*appears on the move. fields. sides. $hile the! are observing them# Mobile Surveillance <n e a target person has been observed and is leaving the lo ation. or in nearb! forest.poli e or militar!. si%e. it is their a tivities $hi h must be observed# (n order to oordinate the efforts of man! team members.i#e#. and other items of lothing in order to avoid dete tion# <n e dete ted.if not probable-# Fixed Surveillance &ixed surveillan e .shifting command-# Sophisti ated surveillan e efforts an involve man! different operators " vehi les# (n su h ases. in luding =ghillie suits=.ods. listening to an! t!pe of musi . et #. and ma! have been for some time before ph!si al surveillan e began# This is be ause ph!si al surveillan e re4uires multiple operators if it is to be su esful.hunting rifles-# Teams ma! set up <. and the target. et # <perators ma! $ear amouflage lothing.stakeout-# Another term for a fixed surveillan e position is $"servation Post %$P&# (t is usuall! ondu ted from overlooking positions su h as hills. foot operators ma! hange )a kets.i#e#.S tra king devi es . patterns of movement. setting up overhead support. the greater the amount of intelligen e produ ed# The extent of surveillan e depends upon the importan e pla ed on the target b! poli e* intelligen e. and an be draining on personnel and resour es# (t=s therefore possible that surveillan e operators ma! have a ess to audio re ordings of the target=s onversations in a residen e or vehi le.h!si al surveillan e is arried out b! enem! personnel . so that no one operator or team is in dire t sight of the target for too long a time .s expe ted level of a$areness " ounter*surveillan e kno$ledge . stops and $alks around. the! $ill be removed from the operation and repla ed# <perators ma! also use bi ! les if the target moves b! bike or foot# Rural: mobile vehi le surveillan e in rural areas presents some problems to operators due to the la k of over on roads## Aerial surveillan e an greatl! assist.s fo us the surveillan e effort .taking up positions from $hi h it an observe the target lo ation# 0e ause this t!pe of surveillan e re4uires spe ial field raft skills . $earing an! st!le of lothing. vehi les used b! surveillan e teams an be of an! model. ondition. et # 'ot onl! are poli e " intelligen e agents used. of the target# (n order to avoid dete tion. olour. and its intent to monitor " repress rebellious tenden ies .operators. fixed surveillan e an onsist of an armed re onnaissan e team . $omen.of $hi h $e must assume $e are a part of-. and on parallel routes-# (f ph!si al surveillan e is being arried out. or assist in the foot surveillan e b! pi king up and dropping off operators# &or their part. buildings. so too are ivilians " famil! members# The! an be men. or elders . surveillan e vehi les $ill also drop off foot operators# The! $ill then position themselves in a box around the target. et # The proliferation of these devi es an make it ver! diffi ult to identif! surveillan e operators based simpl! on the fa t that the! are plugged into some kind of devi e# % .digging out an area large enough to lie in. surveillan e against our movements must al$a!s be onsidered as being possible .referred to as a target pattern analysis-# The more extensive the surveillan e effort. teams are deplo!ed all around the target in a /floating "o#. . 2. a business. the >C2. asso iations. then it an be assumed that te hni al surveillan e is also o urring.s vehi le. operators must keep their surveillan e target in sight# A team assigned to maintain this line*of*sight is said to have /command. rural mobile surveillan e $ill follo$ these basi patterns. the ommand is fre4uentl! shifted. the fixed surveillan e box again transitions to a mobile surveillan e# (n high*priorit! ases. or even to begin surveillan e of a target expe ted to appear at the lo ation . it is most often ondu ted b! spe iall! trained poli e or militar! units# Another fa tor is the greater likelihood of firearms in rural areas .on foot and+or b! vehi le# (t is the onl! $a! a target person an be ontinuousl! observed over an extended period of time# <n foot or in a vehi le. shape. et front. !ear. apartments. using hi*po$ered long*range ameras " teles set up around a target. bushes. on+off s$it h or devi e ma! be ontained in a po ket# 3ariants of this in lude ell phones $ith ear and mi atta hments.

usuall! in a box to over all routes of travel in+out# (t ma! be a target. ells. et # An <. et #. (nternet. and pager are espe iall! vulnerable to surveillan e due to their ontrol b! government " orporations. dra$ings. vehi les parked in the street. $hile redu ing the visibilit! of the operator $ith a amera . Follow: begins immediatel! after the pi k*up# This phase overs all aspe ts of surveillan e $hile target moves from one lo ation to the next# /. bills. et #-# Neigh"orhood 2atch)3igilante Citi4ens: these entities often have dire t onta t $ith poli e through neighborhood $at h groups or ommunit! poli ing entres# The! should be onsidered a form of ph!si al surveillan e in that the! an report an! observations the! have made of !ou. friends. te hni al surveillan e is $idespread in so iet!. an be used to tra k a person. the (nternet is a ver! inse ure form of ommuni ations# Amails !ou send. and then re*seal it# (t is not a se ure form of ommuni ations or transporting items# 1ar"age: going through people=s personal trash is a ommon pra tise used b! poli e. Surveillance 0o#: begins as soon as the target stops at another lo ation# A standard surveillan e box overs all routes in+out of a spe ified area# The main differen e bet$een a stakeout " a surveillan e box is that in a stakeout. invoi es. intelligen e. even $hen not in use# 2an! also have built*in digital ameras and video apabilit!# The proliferation of ell phones and their apabilities greatl! expands the potential for surveillan e. retrieval and anal!sis of ommuni ations.osts . $ebsite visits. in luding letters and pa kages# Agents an gain authori%ation to inter ept mail. hemi als.=s-# (n urban areas this ould be overlooking apartments or houses. letters. an be inter epted )ust like a phone all# (f !our omputer is ever sei%ed or stolen b! poli e. bodil! fluids. et # The! ma! also help provide poli e $ith residen es or businesses to use for surveillan e# Sta7eout8Surveillance 0o5 *. and the use of omputeri%ed digital te hnolog! in tele ommuni ations s!stems# This allo$s for greater a ess. due to the ongoing development of ne$ te hnologies and e4uipment# Telecommunications . fax. and private investigators# This in ludes old notes. do uments. fl!ers. re eipts.residue.<. !our a tivities. $hi h is then dela!ed from deliver! $hile the! open it. it is anti ipated that the target $ill appear# (n a surveillan e box. storage. the! an a ess large amounts of data .. emails. Pic+-up: o urs $hen the surveillan e team establishes ommand of the target entering and then leaving the area# . all of $hi h an provide personal or business information# @arbage an also be a sour e of forensi eviden e .Four Phases of (o"ile Surveillance %foot and)or vehicle& 6t er /orms of ! ysical Surveillance (ail: although not used as mu h as email.or ommun iations devi e-# 5nternet & Computer: Like ell phones. limits possibilit! of dete tion over a long period of time# .even if !ou have deleted it# This is be ause instead of a tuall! deleting /loating 0o5 & . te hni al surveillan e is the use of devi es or te hnologies to monitor and+or re ord the a tivities of a target# Toda!. or $eb sites !ou visit on !our personal omputer. $ithout the need for ph!si al a ess to a residen e or $orkpla e# Telephones: Telephones an be made into a tive listening devi es through a te hni4ue kno$n as a hook s$it h b!pass.. it is kno$n that the target is in a spe ifi area or lo ation# '" (ec nical Surveillance As noted. even $hen not in use# Cellular " ordless phones are among the least se ure forms of ommuni ation as the! an be inter epted b! ommer iall! available s anners# Cell Phones: Cell phones. photos. be ause the! operate through satellite " transmission to$er net$orks.hones.i#e#. he k the ontents. poli e and intelligen e agen ies have a long histor! of inter epting postal deliveries.s movements " lo ation# Cell phones an also be made into a tive listening devi es. hair. Sta+eout: surveillan e team members are pre*positioned in a spe ifi area.s residen e or a lo ation to $hi h the target is expe ted to visit# A stakeout an involve <bservation . pres riptions.

also kno$n as "ugs. bags. $alls.(. behind paintings. photos or video# Listening Devices Audio surveillan e is one of the main methods of re ording onversations for both intelligen e gathering as $ell as riminal harges# (n fa t.people aught making in riminating statements to either under over ops or informants-# fresh batteries# :evi es an also be $ired to household or vehi le energ! sour es# Another t!pe of listening devi e is the wired mi . this does not ensure areas are se ure# 'e$ te hnologies an over ome su h dete tion devi es. kit hen. poli e have used planes to re eive transmissions $hen it $asn=t possible to get a ground vehi le lose enough to a hidden transmitter . depending on the devi e# At times. and vehi les# The! an be hidden in $all so kets. thereb! re ording onversations in offi es. i#e#. !our omputer=s hard drive onl! over$rites data as it needs to# Be!stroke loggers an be installed on omputers. a nearb! observation post+vehi le-# The proximit! of the re eiver $ill depend on the effe tive range of the devi e# (n some ases. address then a 4uire video surveillan e of the suspe t posting ne$ threats# . it $ill have a small on ealable mi rophone atta hed to a transmitter " batter!# 2ore sophisti ated listening devi es an also be on ealed in an! 6 listening number of ob)e ts .. batter! pa ks are strapped together and hidden along $ith the mi # <f ourse. poli e have to use abandoned buildings. the top one can be wired to a battery or electrical source in the residence/vehicle. multi*million dollar investigations and trials are often based almost entirel! on re orded onversations . $hen !ou are online $ith !our omputer. an be remotel! turned off. lamps. enabling surveillan e to read ever!thing !ou=ve t!ped# (n addition. temporaril! utting an! >& transmissions# The mone! " effort spent a 4uiring su h gear $ill onl! alert the surveillan e team# !s a general rule6 all enclosed spaces should "e considered vulnera"le to surveillance "y listening devices6 especially those used or fre7uented "y movement mem"ers) associates6 etc. light s$it hes. poli e identif! an (. or other areas $hile posing as $orkers in order to re eive transmissions from a devi e# The most ommon listening devi es are wireless and transmit to a nearb! re eiver using radio fre4uen ies# The! must have an energ! sour e# (n sophisti ated devi es. bedrooms. and some atta h to bino ulars .o$erful mi rophones are designed to eavesdrop on onversations over a long distan e# Also referred to as a /bioni ear.items. Listening devi es.addresses# The &0( have a program the! an do$nload to !our omputer via email that provides a ess to !our internet a tivit!# These methods have been used to arrest people making internet threats# (n some ases.via the $ire-# Listening devi es are pla ed in areas $here onversations usuall! o ur. et #-# Listening contained in this devi es used b! the &0( " AT& in 8atch. bulkier batter! pa ks are more easil! dete ted and must sooner or later be repla ed $ith ' .oli e also ommonl! he k people=s &a ebook a ounts and similar sites for in riminating text. apartments. in eilings. $hi h is usuall! in the area . pens.$hi h $ill have a small boom mi sti king out-# Two commercially available wireless listening devices. Another t!pe of listening devi e is that $orn on the bod! b! an informant or infiltrator# Like other t!pes of devi es.. living rooms. paraboli mi s are hand*held devi es usuall! $ith a boom mi and a round dis atta hed# The operator $ears ear*phones# Some paraboli mi s have effe tive ranges of 900 metres# Civilian versions are sold for hunting.$orn b! an informant-# 0uildings and heav! traffi an disrupt transmissions. soft$are programs an be overtl! do$nloaded onto !our omputer that enable another omputer to a ess it and gather information# An!time !ou go online to he k !our email. et # (n high*level operations. et # arabolic Microphones . devi es have also been pla ed in park ben hes " afes fre4uented b! the target# Although s anners " other spe iali%ed e4uipment an be used to lo ate devi es. that lo ation an be tra ed through (nternet . ameras. $orkpla e. rooftops. device is $at hes. ups. and /bugs. under over operations against biker gangs $ere hidden in pagers and ell phone batteries# The! had on+off s$it hes so the! ould be turned off if there $as a s anner being used to dete t hidden transmitters# Laser devi es are also used to olle t $indo$ vibrations and onvert them into audio signals. in $hi h a $ire runs from the mi dire tl! to the re eiver. are usuall! small mi rophones atta hed to a transmitter " an energ! sour e that are pla ed in a residen e. vehi le.roto ol . air vents. et # The! an be as small as 1#CD x 1D# The! transmit to a re eiver. the larger.i#e#. small but po$erful batteries are used that an last months# (n heaper models. usuall! in a nearb! room+apartment# 1ired mi rophones do not need an energ! sour e as the! are po$ered b! the monitor through the $ire# 1ired mi s have a better sound 4ualit! but are not as ommonl! used toda! due to their greater potential for being dis overed . The bottom one is connected to a 9 battery.

$ith a small pin*hole aperture-# Like )ini9!!TV camera listening devi es. 9Cmm film and hi*4ualit! digital ameras provide sharp. banks. and one month in standb!# >e ent @. mini*video ameras an be hidden in almost an!thing. planes and Gnmanned Aerial 3ehi les .CCT3. in # a pager. et # (n parti ular.hotographs must be taken b! an operator $ith line of sight observation of the target# 1ith hi*po$ered %oom lenses.S te hnolog! are alread! apable of being tra ked . the <nStar net$ork-# As noted. et # 1hile night*vision enables the vie$er to see at night or in lo$*light onditions. et # Trac#ing Devices Gsuall! atta hed to the rear underside of vehi les.GA3-# These vehi les an hover or ir le an area at ver! high altitudes. heav! rain.i#e#. ontaining 7 lithium :*si%e batteries. these devi es emit a signal $hi h an be tra ked b! satellite " ellular te hnolog! . $as a !lindri al metal tube 15 H long# The omponent box $as the si%e of a +roScout trac1ing paperba k book# 1ith this. GB poli e adapted a head*mounted mini* amera that an be $orn b! uniformed offi ers to re ord in idents " suspe ts# (t resembles a small flashlight# There are also ne$ shoulder*radios used b! some poli e for es that have mini* video " photo ameras in them# Still hotograph" The use of 9Cmm amera " digital ameras remains an important tool in surveillan e $ork# (t is espe iall! useful for do umenting " identif!ing individuals. fog. " bombs. transit. or illegal a tivities o urred at too long an interval. a tedd! small as a grain of ri e. this is espe iall! true if the vehi le is impounded or left for long periods unattended-# A variant of tra king devi es is the >adio &re4uen ! (: .the global positioning s!stem8 @.S-# An! vehi les e4uipped $ith @. onne ted b! $ires. mini*CCT3 video ameras have been overtl! set up outside a residen e# The! are motion*sensitive and onl! re ord data $hen there is movement# (n @erman! 500F this te hni4ue $as reportedl! used to monitor the homes of persons suspe ted of arr!ing out sporadi atta ks over the ourse of several months . a ellular antennae. a smoke dete tor.potential vi tims of kidnapping-# The &0( has also used >&(: and @. thermal imaging dete ts alterations in temperature# Thermal imaging ameras an see ) . is done during barri aded suspe t situations-# 2ini*CCT3 devi es must have a po$er sour e " a transmitter to rela! the information to a nearb! monitorEthe surveillan e team . vehi les. a radio. surveillan e teams an gain a ess and drill a pin*hole through $alls. offi es. allo$ing the vie$er to see in $hat $ould other$ise be total darkness# This is usuall! as a grain! green image# 'ight vision an be limited b! la k of an! light sour e. and atta hed to the underside of vehi les b! extremel! strong magnets# The batter! pa one of the most $idespread examples of te hni al surveillan e in so iet!# (n ever! it! there are tens of thousands of CCT3 video ameras.>&(:-. a lo k.not )ust the under arriage. and a omponent box# These $ere en ased in bla k metal boxes. onsist of a one bla k metal box $ith strong magnets# (t is 7#JD b! 5#CD in si%e and has a batter! life of 70 hours in tra ker mode. lo ations. or an! ad)oining stru tures. as $ell as making in riminating statements# 2ini*CCT3 ameras an be as small as a dime in diameter . miniature CCT3 video ameras are also routinel! used# The! have filmed people making and selling drugs.or re order-# Like a listending devi e.S transmitter. et # . and still identif! an individual=s fa e# 2an! ell phones and digital ameras no$ have video apabilit!# 2ore poli e for es mount video ameras in their ars# (n 500F.S devi es to tra k the shipment of drugs# $ight%Vision & Thermal &mager" 'ight*vision devi es .S Tra ker. virtuall! out of sight and sound range. $eapons. a 3C>.'3:=s.S devi es available on the ommer ial market are almost as small as a $rist$at h# Sophisti ated tra king devi es an be installed an!$here on a vehi le . ell phones are also tra king devi es# <ne do umented version of a tra king devi e used b! the &0( onsists of a @.magnif! existing moon " star light. lear pi tures as opposed to images taken from a video# . the po$er sour e ma! be a batter! or it ma! be dire tl! $ired to a residen e or vehi le po$er suppl!# Sophisti ated video ameras also have night*vision# (n ases $here ph!si al surveillan e of a suspe t $as either too diffi ult. streets " interse tions# &or surveillan e operations.o$erful video ameras are also mounted on heli opters.i#e#. s hools.that emits a signal# (t is used b! orporations to tra k the shipment of goods and to prevent shoplifting# 2iniature >&(:=s are surgi all! implanted in the skin of persons for medi al reasons .su h devi es are available on the ommer ial market-# (n apartments or motel rooms. $hen ph!si al surveillan e $ould be largel! unprodu tive-# . eilings or floors. su h as the Iui ktra k @. and insert a pin*hole amera . li ense ontains their medi al histor!as $ell as for se urit! . a batter! pa k. in stores. the device >*i*le si:ed@ lo ation of a devi e ould be determined $ithin a fe$ !ards# Commer iall!*available tra king devi es.Video !ameras Closed* ir uit television . a small devi e . lose* ups an be a hieved over great distan es# 2an! ell phones no$ have digital ameras installed and an be used to take photos of persons. do uments.

driver=s li enses " passports-.$hi h monitor radio and mobile phone traffi # There are an estimated 100 GS national se urit! satellites in orbit.from hundreds of miles in spa e-# The! also use radar. navigation. and therefore annot provide real* time video of a single lo ation# Aerial vie$s of tops of heads are also not ver! useful# <ther surveillan e satellites are those used for S(@('T . re entl! dug up earth. bases. su h as the >aven.through fog and smoke. '3:=s are far more ommon and are issued to regular ombat soldiers and spe iali%ed poli e teams# 0oth '3:=s and thermal devi es an be in the form of goggles. voi e re ognition. or rifle !" #oe Thermal $eapon %ight s opes# The! are ommonl! used in rural surveillan e $here there is far less artifi ial light# Keli opters. $hi h the! then maintain during the ourse of their life . the use of biometri s in identif!ing " tra king people has be ome more $idespread# po$erful video ameras e4uipped $ith night*vision " thermal# The! are remotel! ontrolled b! a ground operator $ho observes the flight path and area through the GA3=s onboard amera# Small versions. but all serve as aerial surveillan e platforms and arr! Satellite Satellites are used b! militar!. in luding iris s ans " fa ial re ognition# Antr! into an in reasing number of industrial " government fa ilities.signals intelligen e. planes and Gnmanned Aerial 3ehi les . infrared and ele tromagtneti sensors to see through loud over.up to 10 !ears in some ases-# There are hundreds of satellites in orbit around the earth# The most advan ed sp! satellites are those deplo!ed b! the GS. based on fa ial re ognition or bod! imaging# Telephone alls an be anal!%ed to identif! speakers# &ingerprints an be digitall! s anned b! hand*held devi es to onfirm or establish identities. et ## The! are laun hed into spe ifi orbits.redator are the si%e of a small plane and an remain in flight for nearl! 57 hours and fl! long ranges# The! an also hover at high altitudes# These larger GA3=s an be e4uipped $ith missiles and have been used in targetted assassinations b! (sraeli and GS for es# %kylark () used by *anadian +orces in )fghanistan "ris scanning device &on left' (n terms of surveillan e. fingerprints. iris s anning.series of imaging satellites# The BK*15 and BK*19 versions an identit! ob)e ts as small as CD on the ground . lasers. et # :ue to omputer " te hnologi al advan es. su h as fa ial re ognition. intelligen e and ommer ial agen ies for a variet! of purposes. and 9*11 being S(@('T# Canada and other allied states share intelligen e $ith the GS through net$orks su h as A helon. human forms. et # an all be dete ted# Spe iali%ed thermal imaging e4uipment an also be used to monitor the movement of people inside a stru ture# &or these reasons. ommuni ations. and even on rete stru tures. $eapons positions. $ith J*F of them being imaging. total bod! imaging. in luding the =Be! Kole= . to reate images or gather data# (maging satellites are used primaril! for militar! intelligen e to monitor troop movements. bino be e4uipped $ith night vision and thermal imaging devi es# 'iometrics The use of uni4ue individual ph!siologi al traits. et # The! are limited in their use for suveillan e of individuals be ause the! are in orbit and annot hover over a spe ifi area. et # no$ re4uires biometri s anning# (nmanned )erial Vehicles GA3=s are ommonl! used b! militar! for es for surveillan e and re onnaissan e# There are man! t!pes of GA3=s. in luding digital imaging.GA3=s. argo ships. offi e omplexes. Sk!lark or AagleS an are the si%e of miniature airplanes and an be hand* laun hed# The! have a shorter flight time and are meant to be used b! frontline ombat troops $ho re4uire a re on of a nearb! area# Larger GA3=s su h as the Keron " . and are routinel! used b! fire fighters to dete t the a tual fire point $hen it is engulfed b! thi k smoke# >e entl! used vehi le engines. posture " $alk. in luding data from GS sp! satellites# + . forest anopies.BK.on the spot-# 2an! ountries are no$ adopting biometri features for ne$ identit! ards . biometri te hnologies an be used to identif! persons and tra k them in a ro$d. both thermal imager! " night* vision are routinel! used in poli e " militar! heli opters# <f the t$o. ports.

or dire tl! talking to other team members# Detection Techni. amper home.)" Surveillance *etection Confirming surveillan e an often be diffi ult# (t is usuall! done to determine if surveillan e exists . the target individual dis reetl! observes for signs of a trigger . begin b! observing those around !ou# Assume that all are potential operators# 0egin eliminating those $ho are most likel! to not be engaged in surveillan e. is the parking of a vehi le $ith either a devi e and re iever to re ord a nearb! transmitter . and then at subse4uent lo ations# *eneral !haracteristics o+ Surveillance Operators . marks. or using hand*held devi es to ad)ust volume or signal team members . et # Gnder over poli e have also infiltrated biker gangs.ues <ne of the best times to dete t surveillan e is $hen a surveillance box has been established around a lo ation# Surveillan e teams are most vulnerable to dete tion during this phase of an operation# (n some ases.Foot & Vehicle-: ● ● Can be of an! ra e or ethni it!. both of $hi h ould be potential surveillan e# Sometimes. and ma! believe the target is going to arr! out some /illegal. ad)usting ear*pie es. and an in lude old Asian ladies. an! distinguishing marks or features an greatl! assist in retention " the abilit! to later identif! the same individual or vehi le# 2ost operators $ill attempt to blend in and to minimi%e an! attention being dra$n to them# Colorful or odd lothing. fa ilitated in part b! their o$n personal interest in tattoos. ontained in po ket-# Can be observed signaling . operator $ith line of sight. make note of their lothing. dra$n blinds or a building or on a person. nervous " tense . $ill be marked b! its la k of a tivit! and b! an inabilit! to see into the rear ompartment area# Curtains or some other over are also pla ed on the $indo$s# 3ehi le <.or $ith a mini*CCT3 video amera installed# The operator leaves the ar for the duration of the surveillan e operation then retrieves it later# '''' 1hen leaving a lo ation. most operators $ill be marked b! their /unnoti eable. mini*van.s an remain parked for da!s or be moved around and repla ed# A possible indi ator of surveillan e is the near* onstant presen e of some kind of vehi le $ith a rear ompartment in the vi init!# (f a vehi le mat hing these des riptions is parked " the driver $alks a$a!. and not shaving# (t is most important to evaluate $hat people do and their behavior. and fa ial features . si%e. usuall! designed to neutrali%e the target through fear and paranoia# ● ● ● The! ma! appear out of pla e. the parked vehi le is a potential surveillan e post# (n some ases. poli e have parked a normal passenger ar $ith an operator hidden in the trunk# The operator an monitor a transmitter and+or video re ord a tivities through a peep hole# A variation of the vehi le <. either b! foot or vehi le. an! si%e or shape. !oung or old# The! $ill usuall! avoid e!e onta t and an even appear a$k$ard in their efforts to do so# - . the easier it is to identif! ne$ vehi les " even neighbors. or ube tru kElarge enough to ontain operators " surveillan e e4uipment# Like the apartment s enario. it is usuall! a van. not their appearan e or $hat the! look like# 3ehi les an be observed b! their olor.b! hand.overt surveillan e-# <bvious surveillan e b! poli e is sometimes used to intimidate targets as part of a larger ps! hologi al $arfare operation. and li ense plates# At night. a vehi le <bservation . a vehi le <. head $ell as $hen leaving+entering the area# &or surveillan e teams. in order to fo us on those that are# Beep in mind that some surveillan e teams onsist of persons $ho look as if the! ould not pass a basi ph!si al fitness test. all the! ma! re4uire is a slight opening for a amera lens or teles ope# . fat short men. the ideal lo ation has good line*of*sight observation of the target. the! do not $ant !ou to see in# (n order to see out. model. then gets into another vehi le. a tivit!# (n most $ell as the followEa person or vehi le $hi h also pulls out and begins to follo$ behind# *etection of ! ysical Surveillance The ke! to su essful surveillan e dete tion is awareness and o"servation of one. musta he.using the method des ribed above.s surroundings. the sillhouette of the vehi le and the position of its headlights an assist in identif!ing possible surveillan e operators# A main goal in dete tion is to observe an individual and+or vehi le in one lo ation. hairst!les.ossible <.in order to evade it-# &or this reason. it is impra ti al for poli e to rent out apartments or use the homes of ivilians# Then. the! ma! sit for hours $aiting for the target to move or appear# $"servation Posts in overlooking apartments or houses an often be identified b! their apparent la k of a tivit!.ost is used# (f a 3ehicle $"servation Post is used. surveillan e teams ma! maintain ommand of the target even if dete ted . gro$ing their hair long. noti eable marks+dents. et #. in luding persons and vehi les# (n identif!ing potential operators. the! ma! be ome more sophisti ated in their approa h. obvious surveillan e dete tion should be avoided# (f operators think a target is engaging in ounter*surveillan e. lo ations an be observed from $ithin the target lo ation . and normal appearan e# (n identif!ing possible luding hair st!le " olor.s front door and vehi le# The more familiar one is $ith their neighborhood. mannerisms.. surveillan e operators $ill $ithdra$ if the! believe the! have been dete ted# Surveillan e itself ma! be stopped# (n other situations. shape of head " fa e. et # $ill be avoided due to the involuntar! attention the! attra t# ause the! are-# Can be heard or observed speaking into hest mi rophones. or some other overings over $indo$s# Although the! $ant to see out. et #-# (n parti ular.

this provides good exposure of fa ial features and an for e unnatural responses from operators# <bserve those $ho arrive at bus stop after !ou and board the same bus.8aywal+. mirroring is $hen a surveillan e operator dupli ates !our a tions as the! follo$ !our lead. operators $ill be ome suspi ious# :ete tion of surveillan e is best done as overtl! as possible# (n a vehi le.A person an also $alk around the neighborhood and observe for possible surveillan e# Leaving and then returning . !hanneli/ed Terrain: operator et # (n order to keep must commit to crossing to keep ommand. 1. and those $ho board at subse4uent stops# &oot operators ma! also be dropped off after the target gets off.s an be identified# The! must have line*of*sight observation# The onl! $a! to find possible <. surveillan e operators an also be aught off guard# 2oving through channeli4ed terrain an expose surveillan e operators to observation# Channeli%ed terrain is $hen all traffi . pulling off onto the shoulder prior to a rest area ma! for e surveillan e vehi les to pull off and $ait# :riving through the rest area. . as $ell as those alread! on the bus and seated to the rear.foot or vehi le. the onl! opportunit! to dis reetl! observe to the rear is $hen rossing an interse tion# Sudden rossings in the middle of the street . back. a "lind turn an be used to for e an unexpe ted response b! surveillan e operators# A blind turn is a sudden turn at a orner in $hi h the target then stops and $aits to observe the a tions of potential surveillan e operators# A standard response b! surveillan e $ill be to ontinue past 'lind Turn the orner $hile glan ing to observe the $hereabouts of the target# Ke+she $ill then ommuni ate this to other operators and pass ommand on to another team member# Less experien ed operators ma! simpl! turn the orner also and be onfronted b! the target. et #. unpredi table or sudden moves an for e surveillan e teams to rea t# Ko$ note the response of other foot traffi # 1hen $alking or driving. blind*turns.double-back-** as if something $as forgotten** an for e operators to re*establish a surveillan e box.oorl! trained operators or overt surveillan e $ill 4ui kl! u*turn as $ell " resume the follo$# A $ell*trained operator $ill ontinue past and then turn off.. a target an observe $hi h vehi les are there and then identif! them at subse4uent lo ations# Like sub$a!s. handing ommand over to another vehi le+operator# Standard Response to a U-Turn: command vehicle continues straight. a tunnel.s lo ation. et # :uring mobile surveillan e. slo$ing do$n and speeding up to keep pa e# 0! taking ertain routes or a tions. this is a possible indi ator of surveillan e# <n highways. stop as if to en)o! the vie$. an for e surveillan e to enter $ith !ou and expose themselves to loser observation# @oing up or do$n a series of es alators allo$s for logi al 1?0*degree turns to observe to the rear# Alevators ould for e operators into even loser proximit!# 2ultiple levels also enable a target to observe large areas from a dominant " overlooking position# Pu"lic transit an also be used for dete tion purposes# @etting on buses or sub$a!s an for e operators to get into lose proximit! $ith the target or risk losing ommand# 1hen operators must get on transit $ith a target. if !our pattern up this point has been routine " predi table. turn offs.also allo$ for rear vie$s and ma! at h operators off guard# Antering pu"lic locations. rest areas. ommand ma! be shifted fre4uentl! to minimi%e exposure of operators# <ften. then turn and $alk ba k . or $ho exit abruptl!. therefore if the same vehi le is seen near bus stops en route. potential <..up vehicle pulls off to begin follow 1hen $alking or driving. thereb! revealing their a tivit!# . a command of target surveillan e team must ommit to entering " rossing the terrain# <n foot. su h as malls. et # an all be exploited on high$a!s# Kigh$a!s also offer observation over longer ranges and for extended periods of time# (n both foot " vehi le surveillan e.u*turn. high$a!s are hara teri%ed b! high speeds $hi h an at h surveillan e operators off*guard# Axit ramps. it is often the rea tions b! operators $hi h reveal their a tivit!# Some of this is sub ons ious and be omes part of the routine of surveillan e operations# &or example. or vi e+versa# <bserve for persons $ho rush unexpe tedl! to enter a vehi le. u*turns. or even follo$ing the bus. potentiall! exposing themselves# Another time $hen surveillan e operators are vulnerable to dete tion is during the transition from foot to vehi le. possibl! for ing an unexpe ted rea tion# <n foot. use rear*vie$ mirrors# 1rap*around sun glasses an also aid in dis reet observation b! shielding the e!es# Rural: &rom one. espe iall! in vehi le surveillan e# Pacing is $hen the! maintain the same onstant distan e bet$een themselves " the target. sudden and abrupt u-turns an for e a surveillan e operator to respond. offi e omplexes.must pass through a restri ted passage or opening# A bridge is an example of su h terrain. a target ould $alk to the middle of a bridge.s is to ph!si all! $alk the area# <.

avoid dis ussing personal information on the phone or internet. smoke dete tors. garage. or phones begin pi king up different fre4uen ies. and later returned.and inspe t under arriage for tra king devi es atta hed b! magnet# Che k inside the trunk and engine# Che k the interior. in luding roof.tro)an horse-# A possible indi ator of ele troni surveillan e . and return# (n man! ases. desks. furniture. et # The! determine the best lo ations and t!pes of devi es to be used# The! then leave. all paintings " mirrors removed# :rapes " should be he ked.. phone tapping an be done more effe ientl! $ith no tell* tale noises# Searches +or technical devices should be ondu ted as dis reetl! as possible. ho$ever. ele tri al repair re$s or plumbers ma! be used to gain a ess# A o*operative landlord might provide ke!s# . devi es. et # Bno$ledge of tra king an greatl! assist in identif!ing potential <.oli e raids " sear hes are also good times for devi es to be put in pla e# (tems sei%ed b! poli e during a raid. and+or more sophisti ated devi es to repla e them# 2isinformation an be provided# At the last moment. The best form of ommuni ation is fa e*to*fa e# The rule is8 against a high-tech enemy. as $ell as tra ks. litter. et # Toda!. tra king devi es an be re*atta hed to another vehi le. T3. la!out. it is almost impossible to se ure against te hni al surveillan e# 1hen prote ted information or a tivities must be dis ussed. C: pla!ers. su h as omputers. and seats for devi es# Listening devi es $hi h rel! on radio fre4uen ies an also be dete ted b! >& monitors# (f radios. visors. in luding a ess to tele ommuni ations fa ilities. gossip.=s ma! onsist of a hide left in pla e# :ete tion an be greatl! assisted b! dogs. $orkpla e.$$$#A tivistSe urit!#og-# <verall. ele tri al man! poli e raids. as $ell as observing the responses of animals " birds .i#e#. orporations. dogs have been the first to be shot-# inspe ted.bugs or ameras transmitting. ould have devi es planted in them# The same is true for vehi les impounded over night or unexpe ted gifts su h as steros or T3=s . ob)e ts. or on an! tele ommuni aitons. :o not attempt to over ome te hni al surveillan e using te hni al means# Telecommunications Assume all tele ommuni ations are vulnerable to surveillan e and avoid dis ussing prote ted information or a tivities on the phone. light fixtures. or behaving strangel!. et # Sin e ounter*insurgen ! operations are based on all sour es.ark vehi le in dis reet lo ation . et # urtains # enter a as ne$ *etection of (ec nical Surveillance Te hni al surveillan e is diffi ult to dete t. sites# Longer term <. dash board. ma! be dete ted# Gsing a small flashlight to fo us on small areas helps in observation# All ele tri al items should be dismantled " Vehicle searches should be arried out after a ar* $ash# . et # This determines our means of se urit! against te hni al surveillan e# <ne purpose of ph!si al surveillan e is to enable poli e*intelligen e agents to plan ph!si al break*and*enters in order to put in pla e te hni al devi es# Spe ial entr! teams ma! first break into a residen e. small T3. T3. in luding rumours. door paneling. this is a possible indi ator of surveillan e# (f te hni al devi es are found. suspe ts have been raided shortl! after finding listening devi es in their residen es " vehi les# Sear hes should be s!stemati and planned. light s$it hes. or pin*holes. there is no obvious sign of entr! and nothing is taken# (f dogs are inside the house. from the eiling to the floor. and avoid using telecommunications. air vents. et #.s. this is a lear onfirmation of surveillan e# 1hat is done $ith this information depends on the situation# :evi es an be left in pla e. fixtures. or vehi le and photograph interior $alls. the! ma! a t strange due to ultra*soni devi es used to ontrol them during poli e overt entr!# (n other ases.sites an be identified b! flattened out or disturbed areas used for sitting or sleeping. phone tapping $as lums! and often resulted in li king sounds. stati . 3C>s. small off* olour pie es. go low-tech (or no-tech). espe iall! that involving tele ommuni ations# A general rule in regards to te hni al surveillan e is to assume it is al$a!s possible and to prote t information as if it $ere sub)e t to eavesdropping# Aven using te hni al ounter*measures to dete t surveillan e devi es or te hnologies is not a guarantee of se urit!# <ur enem! has far greater te hnologi al resour es. T3 or ell phone onne tions# 0efore digital te hnolog!. in luding all ob)e ts.s lives# Gse pre*arranged ode $ords and names if it is ne essar! to ommuni ate over tele ommuni ations# !ell hones Cell phones an be used as both tra king " listening devi es and should not be arried during an! se ret a tivit! or $hen dis ussing sensitive matters# The batter! should be removed# !omputers and &nternet The follo$ing are basi tips from A Practical Security Handbook for Activists & Campaign. a publi ation from resistan e in the GB . arried out $hile pretending to lean up. e4uipment dropped b! operators. et # in ea h room# <n $all surfa es. as removing them an prompt a poli e raid to retrieve them. et # (n some ases. differen es in texture. burglaries ma! be staged# Telephone. on ealed in gifts su h lo ks. prepare the devi es. as $ell as plants. radios. lo$er volumes. et Listening devi es or mini* ameras an also lo ation as a /tro)an horse.are irregularities in radio. and private details of individual. internet. all tele ommuni ations should be onsidered inse ure forms of ommuni ating# 11 . avoid all enclosed spaces asso iated $ith oneself or movement members. et # Securit" )gainst Technical Surveillance (n en losed spa es su h as rooms " vehi les kno$n to poli e*intelligen e agents.

kno$n onl! to a sele t fe$. a lubhouse-# This for ed under over operators to pull ba k and find safe areas from $hi h the! ould re eive transmissions# Another te hni4ue $as to meet in one lo ation . strong lo ks on doors " $indo$s. (nstall and regularl! update anti*virus and fire$all soft$are# &ree programmes su h as A3@ . do not use personal vehi les for se ret a tivities# 'e$er model ars also have built*in @.. drug labs. and ver! eas! to monitor# To keep them private. or even li k on the links to $ebsites ontained in unsoli ited emails### .@-# (deall!. Beep important+sensitve data and . use an anon!mi%er $ebsite or an internet afP# (f !ou suspe t !ou are being monitored. ke!s on removable media su h as memor! sti ksNGS0 drivesO# 5nternet Privacy *.. ondu t se ret talks $hile $alking in se luded areas or in impromptu lo ations# Gse pre*arranged ode $ords and names to avoid referring to a tual information# Code letter*number ke!# Choose a ten letter $ord in $hi h no letter is repeated and assign a number to ea h letter8 JA2 A S 0 ><1' 159 7 C JF ? 9 0 !"ample 1>A*10'A Q 9F7*9J05 Code on phone8 the bla k singer Trac#ing Devices To ounter the use of tra king devi finished using the omputer# Alternativel! use disk en r!ption 9. limiting the use of an air raft used as a ba k up re iever# To ounter listening devi es.ass$ord prote ted omputers are not se ure to the prepared infiltrator so en r!pting an!thing sensitive is also needed# ● . in luding upper and lo$er ase letters.$$$#grisoft# om. . and lubhouses.are available for 1indo$s# The important feature is that live update is a tivated so the! are ontinuall! up*to*date# .in # paraboli mi s-. commercially available = old=** unatta hed to !ou 1# . :eleting a file does not remove it from !our hard drive. An r!pt an! sensitive files on !our omputer. use . alarms.S tra kers. bikers began using dr!* erase or halk*boards to $rite do$n se ret information.$$$#pgpi# om-# :on. Consider s$it hing a$a! from 1indo$s to other operation s!stems su h as Linux or 2a # <. and dogs# 3ehi les an be parked in se ure garages $ith an alarm s!stem# 'one of these measures $ill guarantee se urit! against overt entr!.and en r!pt that# This means that even the file names are hidden# 1ipe the original files# This should be done ever! night $hen !ou.ass$ords should be hanged on a regular basis# ● :o not $rite them do$n and sti k them under !our hair or desk M these are the first pla es that a sp! $ill look# ● :o not base them on the names of famil!. even if the! look genuine.Computer Security *.. !ou $ill stuff all files in to one big ar hive .$$$#%onealarm# om.t $ant people to kno$ !ou are interested in. Avoid $ireless ke!boards as the! transmit 4uite a distan e as $ell as to !our omputer# =.a rende%vous point. et # (n order to do this it needs to be properl! $iped. standard anti*burglar measures are used# These in lude good. do not do an!thing sensitive from !our home omputer# 1at h out for CCT3 in internet afes so pi k small. pets or dates of birth ● :o not simpl! use di tionar! $ords avoid impressions. that offered good ounter* surveillan e terrain# (n one ase.i#e#. su h as from a bank# 'ever bu! an! using 1inLip or Stuff(t.then destro!ing them after reading is a variation of this te hni4ue# To avoid listening devi es .S tra ker on a bi ! le# An! vehi le used to ounter surveillan e must be or an! omrades# $orldTracker !-% tracker. surveillan e ameras. Chose pass$ords that are effe tive M longer than 1J hara ters. (nstall a sp!$are dete tor programme su h as Ad*A$are $hi h is free from $$$#lavasoft#de# . then erasing it# 1riting notes on single pie es of paper against a hard surfa e .. using a programme dedi ated to doing this# >e ommended ones are Clean :isk Se urit! and .t sa! an!thing in an email !ou $ould not be prepared to )ustif! in ourt# (f !ou $ant to onta t another person $ithout those $at hing !ou kno$ing $ho it is !ou are in onta t $ith set up fake email a ounts### and use them instead# Consider using it as a maildrop s!stem Ndo not send emails.@. ho$ever# 0iker gangs began using s anners in their residen es and lubhouses to dete t transmitters hidden on infiltrators or informants# (n response. obs ure ones Nor use disguiseO# Listening Devices0Mini%!ameras To prote t against overt entr! " pla ement of devi es in a residen e or vehi le.# /. en r!ption . biker gangs $ould position sentries and have patrols for a four*blo k radius around a meeting point . to monitor them for overt or for ed entries# Kidden voi e* a tivated re orders $ere also used in efforts to identif! overt entries# To disrupt poli e surveillan e. number and s!mbols if permitted# 1eak pass$ords are easil! broken# . 0e a$are of spam M unsoli ited emails. save them as draftsE !ou ommuni ate $ith others through the draft emails leftO# .and LoneAlarm . Amails are not se ure. 0a k up !our omputer in ase it is stolen but keep the ba k* ups se ure some$here else# .@. su h as <n*Star# 2an! rental ar ompanies no$ install @. poli e reated re ording devi es on ealed as pagers $ith on+off s$it hes so that if a s anner $as kno$n to be in use the devi e ould be turned off# 0ikers $ould also bu! and set up CCT3 amera s!stems in their residen es.or @.and then go to another. the bikers met in a rural area near an airport.@. Aver! time !ou a ess the internet !ou leave a tra e that an be used to tie ba k to !ou# (f visiting a $ebsite !ou don.@. C:s or flopp! disks using a programme su h as ..S devi es to tra k their vehi les# (t is also possible that poli e ould pla e a @.

$hi h also redu es thermal signature-# +" Surveillance & . et #. tunnels.i#e#.and $ater immersion . su h as u*turns. a fire alarm. so no matter ho$ man! turns " u*turns are used. reating division and paranoia# The! an also re ord in riminating statements and a tions# <verall. double* ba ks. operators still kno$ $here the vehi le is# (n ontrast. or an! building that has multiple exits and large ro$ds# Change )a ket and hat if possible# To evade night time aerial surveillan e . garages. and mannerisms# <ne. apartment buildings.$hi h an be gained in no other $a!# (n addition.)erial Surveillance & $ight Vision To evade aerial surveillan e go inside malls. and an! one else doing so $ould be highl! suspi ious# 1aiting at transit stops as buses or sub$a! trains pass b! an for e operators to board at least one of these. usuall! friends or asso iates of the target group# The! ould be embittered omrades $ho feel isolated or even betra!ed b! the group# <r. elevators. dress. a sheet of foil that traps bod! heat . et # (n rural areas go under bridges.ubli transit an be utili%ed to break up surveillan e teams en route to a suitable publi lo ation.vasion Anti*surveillan e a tions are usuall! taken in order to evade poli e*intelligen e $hile arr!ing out se ret a tivities# 1hen preparing for anti*surveillan e. drainage pipes. different floor levels. lo ations. anti*surveillan e a tions arried out on foot have more likelihood of su ess than those done b! vehi le# There are a limited number of areas a vehi le an travel . et #. into se$age or tunnel s!stems. are diffi ult for operators to follo$ on. the target then defeats surveillan e and an move $ithout threat of being observed# Te hni4ues used to dete t surveillan e. under on rete bridges. intentions. and death# The term ollaborator is used for an! member or iti%en $ho aids or assists our enem!# (nformants " infiltrators provide uni4ue " spe ial human intelligence . for example. high$a!s.-.$hi h ma! also alert operators that !ou are arr!ing out some kind of anti* surveillan e a tions-# Taking an elevator one floor and then $alking ba k do$n is illogi al. night vision+thermal.ubli lo ation su h as malls. et # . espe iall! sub$a!s.i#e#. blind orners.streets. the! ould be genuine members arrested and sub)e t to pressure# . offi e omplexes. a targeted individual should onsider their patterns of movement " a tivities over the previous time period# This identifies possible times. thi k forest. an also be used " built upon in order to evade surveillan e# Avading stakeouts or surveillan e boxes an be done from an! lo ation and need not begin $ith one. transit stations.and redu es thermal signature.i#e#. surveillan e operators $ill assume the target is intent on evading their efforts and is preparing to arr! out some prote ted a tivit!# @reat are " planning should be put into an! anti*surveillan e a tion. the! ould have tra king devi es atta hed.ubli lo ations $ith multiple " even hidden exits an be used# . foot travel is almost limitless# Targets moving on foot an exploit terrain " routes of travel to break up or elude surveillan e teams# .oli e refer to them as =Confidential (nformants= or =Confidential Sour es=# 1$ . plans. et #-# (n addition.i#e#. under vehi les. the! are an essential " a tive element in ounter*insurgen ! operations as $ell as riminal investigations# &n+ormants are persons re ruited b! the state se urit! for es to provide information# The! are ivilians. due to the high*speeds. arrests. a rain*storm. in order to limit visibilit!# (n an urban setting. imprisonment. or risk exposure# Taking a bus or train to the end of the line and then returning an also identif! potential operators# @etting on " off transit repeatedl! an further break up a surveillan e team# -" Informants & Infiltrators (nformants and infiltrators are spies $ho gather information on the resistan e " provide it to the enem!# The! ma! also take a more a tive role# These a ts an result in apture. es alators. operators also rel! on form.ubli transit. it is often the most illogi al moves $hi h an identif! surveillan e operators or limit their abilit! to follo$ . operators ma! themselves fall vi tim to this routine and be ome vulnerable to anti* surveillan e a tions# The main goal of anti*surveillan e is to evade poli e* intelligen e agents# (f able to es ape the initial stakeout or surveillan e box.s residen e# . and in publi lo ations. et # (n an emergen ! . multiple exits from stations. emotional states. infiltrators " ollaborators an ph!si all! disrupt " sabotage movement a tivities# The! an spread disinformation " poisonous gossip. et # to evade aerial vehi les at night# <ne danger in hiding in a fixed position is if !ou=re alread! being tra ked b! aerial surveillan e the! $ill see this and dire t ground units to !our lo ation# Rou ma! not be a$are !ou are being observed due to aerial surveillan e being ondu ted at an altitude be!ond !our hearing range# Some measures reportedl! used to ounter infra*red and thermal imager! in lude the use of =survival blankets=. abilit! to hange dire tions. under$ater. or methods b! $hi h to evade surveillan e# After a long time doing surveillan an urban or suburban area.s ph!si al appearan e an be altered in a number of $a!s8 ● 0agg! or loose*fitting lothing an alter form# &illing them out an make a person look larger " bulkier# ● Changing lothing st!le " olors# ● Changing one. et # Disguises an greatl! enhan e anti*surveillan e a tions# <perators must re ogni%e the target in order to follo$ him+her# Although fa ial features are the best $a! to identif! spe ifi individuals. alle!s. and disguises must be effe tive# Consideration should also be given to hanging shoes# (n an urban environment.operators $ould have even more diffi ult! follo$ing a target# Avading surveillan e is best done at night or in bad $eather . under ro k! over rops.s posture " pa e# ● Gse of $igs and theatre make*up# (f the use of disguise is dete ted. are also diffi ult due to multiple exits. et #. go into large buildings.

in an effort to establish redibilit!# A ommon over used for radi al groups is that of a studentS in fa t. ex ept that their absorption of information is used to a tivate their role at a later date# The Tnovi eT t!pe8 presents a some$hat more a tive role. oer ed. or informationEthings $hi h are of great value " $hi h raise their profile " influen e in the group# The! ma! also atta h themselves to ke! leaders or assume leadership and se urit! positions in order to extend their influen e " a ess to information . or to have been at ertain pla es " events. usuall! illegal and $hi h lead to arrests-# &n+iltrators are ivilians re ruited b! the state se urit! for es . for example# <n e a person is turned informant. internal po$er struggles. or an a tion. $eapons. $hose enthusiasm and ommitment is so strong that she+he $ants to fight the po$er ever! minute of the da!# ● ● ● H(t should be said that $ith several of these modus operandi. or intimidated. are the result of extensive surveillan e and ps! hologi al profiling . $here the! first made onta t $ith the movement# The! an laim to kno$ ertain people.>< Te hni4ues-# . those seeking revenge. universities are re ruiting grounds for intelligen e agen ies in general# (n some ases. this ma! result from a la k of faith in the struggle# (t is important that members are not pressured.ov /001 edition: Types of 5nformants ● The Thang aroundT t!pe8 the! are persons $ho regularl! sho$ at meetings and a tions but generall! don=t get involved# The! olle t do uments. the behaviour is hard to distinguish from a sin ere ne$ person=s involvement# Ko$ do $e tell them apartU 1ell. for prote tion. $hile others ma! be en ouraged to be ome more a tive b! their handlers. and ho$ to a t-# <ne ommon method is for an informant to introdu e the infiltrator to the group# (nfiltrators might befriend one member in order to gain onta t $ith the entire group# (nfiltrators an also enter a group as genuine members from another area or region. personalit! onfli ts.bla kmail-# (ntimidation " oer ion ma! also be used to make a person be ome an informant# 2one! an also be a motivating fa tor in making a person turn informant. rallies. are all anal!%ed in order to find an opening through $hi h to exert pressure on a potential informant# 2ovement members $ho are arrested " sub)e t to pressure ma! break do$n and ollaborate $ith poli e# (n some ases.often illegal. et #. looking and a ting the part .i#e#. or poli e*intelligen e agents# The! insert themselves into the group b! posing as genuine members of the resistan e.oli e infiltrators have proven on o asion to be ver! adept at pla!ing their role.otes from Security Culture: A Handbook for Activists. and in maintaining their servi es over an extended period of time# . sexual a tivities. but the $ork the! do is valued# This helps them build trust and redibilit!# The Tsuper a tivistT t!pe8 the! ome out of no$here and all of a sudden. listen to onversations and note $ho=s $ho# This observation role is relativel! ina tive# The TsleeperT t!pe8 is similar to the Thang aroundT modus operandi.the! kno$ $hen " $here to be. under over investigations of biker gangs-# (nfiltrators an be long*term " deepl! imbedded in a group.i#e#. " those in ompromised situations . having betra!ed their former friends " omrades# (nformants ma! be lo$*ke! members or asso iates $ho 4uietl! gather information " observe.or orporations-. to greater or lesser extents# The! an be of an! ra e or ethni it!.see belo$. &0( C<('TAL*.otential informants ma! also be identified through surveillan e# .depending on the target group of ourse-# . a planted infiltrator $ill ask a lot of 4uestions about the dire t a tion groups. this person $ill be right in the thi k of it# Beep in mind ho$ever that this an also be the mark of a ne$ a tivist.ersonal relationships. having a general intelligen e gathering role or as part of a riminal investigation# <r the! an be temporar! operatives perhaps $ith a spe ifi goal .A standard method of recruiting informants is to find eo le (in or near the grou ) with roblems! . but onfines themselves to less prominent $ork# The! don=t take initiative. individuals and illegal a tivities# She+he ma! suggest targets and volunteer to do re onnaissan e as $ell as take part 1% . the! are ever!$here# 1hether it=s a meeting. a ting as an agents provocateur . to neutrali%e ke! leaders or groups-# Some infiltrators are also referred to as agents provocateurs for their leading role in instigating . during $hi h the! meet " establish rapport . in luding mone!.a friendl! relation$ith members of the target group# This ould begin $ith han e en informant or agent $ho provokes a tions. meetings. si%e or shape.a tivities# (nfiltrators are usuall! developed over a period of time. of ourse. et # All these.ersons most vulnerable to be oming informants are those seeking prote tion. al oholi s. . drug addi ts. forming intimate friendships. into arr!ing out a tivit!. infiltrators provide resour es. those fa ing long prison senten es. but that the! do so out of a strong belief in its ne essit!# Studies have found that those most resistant to torture are motivated b! ideolog!. vehi les. et #. shared interests. the! are in reasingl! dependent on their poli e*intelligen e /handlers. drug or mone! problems. events. not e onomi self*interest or so ial prestige. those suffering from trauma or mental illness. protest.

but the! A>A someone !ou should be areful $ith# At the ver! least.and $ho $ill later notif! the poli e that someone $as in4uiring-# The agent=s ba kground ma! be kept lose to the truth to prevent slip*ups# &inall! a deep over agent ma! $ork a real ) the a tion# (nfiltrators also tr! to build profiles on individuals. unless !ou have on rete reasons or eviden e that someone is an infiltrator. and lo!alt! the!=ve displa!ed# The! use emotional responses to gain s!mpath! from other group members . infiltrators $ill shield their true selves from other a tivists# HAn!one $ho asks a lot of 4uestions about dire t a tions isn=t ne essaril! an infiltrator. b! Rves Lavigne. pp# 59F*9?1hen the! had to ommuni ate over telephone.Hells Angels &nto the Abyss. their onversations $ere limited and oded8 HTait paged 2 Binle! N&0( handlerO in <akland to break the ne$s# Ke never alled 2 Binle!=s house be ause the Kells Angels had a ess to telephone ompan! re ords### Like$ise. has rented apartments for informant and handler to meet at. su h as a business o$ner $ho $ill verif! that so*and*so $orked for them . along $ith other intelligen e sour es. p# 17F- 'ac#ground !hec#s H1hat are some $a!s of looking into the possibilit! that someone is an informerU &irstl!.<peration 0la k 0is uit-.$ho ma! be una$are or un onvin ed the person is an informant or infiltrator-# (f a person is identified as an infiltrator or informant . photos should be taken of them in order to inform others# A video taped statement should be obtained if possible# An! materials or areas a onfirmed informant or infiltrator has had a ess to should be assessed for risks. dis ussions on ta ti s " strateg!.usuall! retaining the real first name so he+she doesn=t forget to respond to their name-. rent a house or apartment. et #. habits. as a =dead*drop= to leave messages.i#e#. et #-# 1hen infiltrators and informants have been onfronted. there is a problem and appropriate measures must be taken# A tivists $ho an=t understand the need for se urit! should be kept a$a! from situations in $hi h the! might in riminate others#D *ealing wit Informants & Infiltrators Like surveillan e.though some risks are $orth takingVand that asking a lot of 4uestions endangers people# (f the person persists in asking 4uestions. their most ommon rea tion is to den! the harge outright# The! often emphasi%e all the risks.Hells Angels &nto the Abyss. observation. p# 59J-# &n+ormant%1andler Meetings As part of an under over operation. &oreman and Ka!$ood. failed to un over their true identit!# .s a tivities " ondu t an help identif! possible informants " infiltrators# 0a kground he ks should be arried out on suspi ious persons to onfirm their identit! .!codefense A #ield $uide to %onkeywrenching.ress.ublishers Ltd#. the infiltrator+informant must ex hange information. and $eaknesses# At the same time.i#e#. dete ting informants " infiltrators an be diffi ult# Some $ork ver! hard to on eal their a tivities and to pla! the role of a genuine member of the movement# (ntuition. friends. and a skeleton of personal histor!. re ordings. sa rafi es. e4uipment or mone! $ith their =handlers=# The most se ure method is fa e*to* fa e meetings# The &0(.from Security Culture A Handbook for Activists(n one AT& under over operation against the Kells Angels . 2 Binel! al$a!s paged Tait#D . personal atta ks+rivalr!. Ab%%ug . their involvementU :id problems ever ome upU <ne important advantage of having links $ith far a$a! pla es is that it makes it more diffi ult for informers to fabri ate laims about their a tivities# H1hat are a person=s means of livingU 1ho are her or his friendsU 1hat sorts of ontradi tions exist bet$een their professed ideals and ho$ the! liveUD . the agents $ere so $ell =ba kstopped= $ith fake (: and histories that the biker=s ounter* intelligen e. and provided a false sense of se urit! to the gang# 1& . or through admission-. Tait Nan informant in the Kells AngelsO and the agents met in se ret pla es### An agent $ould stop in an indoor parking lot and Tait $ould hop into his ar# The! $ould drive to another it! to talk in a motel or publi pla e $hile t$o other agents arried out ounter*surveillan e#D . one getting into the other=s ar8 HTo maintain se urit!. $hi h involved extensive ba kground he ks. KarperCollins . transportation. the! need to be informed about se urit! issues# 'e$ a tivists should understand that dire t a tion ta ti s an be risk! . in other pla es# :o !our onta ts in those pla es kno$ of the person. espe iall! a tivism the! laimed to have parti ipated in. their beliefs.rivate investigators hired b! the bikers. for example. and live the role 57 hours a da!# HAn under over op $orking under TlightT over ma! also have a false (:. espe iall! if there is no hard eviden e# (n man! ases. as a result of ourt dis losure. Toronto 199J.usuall! in another it!-# Sometimes nar oti s offi ers and other spe iall! trained agents $ill be alled on for these assignments#D . spreading rumours $ill damage the movement# >umours that !ou do hear of should be 4uestioned and tra ed ba k# A person=s ba kground an be looked into. but $ill most likel! go home to his famil! and TrealT life . and as a safe house to sleep at# At other times the informant and handler $ould meet in parking lots. onl! re* affirmed the fake (:=s of the agents. finding notes or re ording devi es. et # The (ndercover &n+iltrator HA deep over agent is e4uipped $ith false (: . suspe ted infiltrators an be dis reetl! prevented from involvement in riti al a tivities . et #.although a $ell organi%ed operation $ill have =ba kstopped= an! infiltrator=s fake (:-# @roup=s an also organi%e their o$n surveillan e operations to learn more about suspi ious persons# Gnless there is strong eviden e. se urit! odes hanged. ommuni ations. and anal!sis of a person.Chi o CA 199J. publi a usations " denoun ements an sometimes ause more damage than good# The! ma! appear as overl! paranoid. funds. one $ould phone the other=s pager and leave a phone number the! ould be rea hed at# Aven then.

0C. poli e " intelligen e agen ies# (n Canada.enns!lvania offi es in 19F1# @overnment hearings and in4uiries gave the impression that C<('TAL*.s # Leonard .>< operations# &0( " lo al poli e agen ies. photo " film. . and man! are still imprisoned# Among the hardest hit $ere the 0la k . fabri ated ommuni ations. along $ith other la$ enfor ement agen ies. burglar!. 2umia Abu*Jamal. domesti repression ontinued throughout the 19F0s. ne$ anti*terrorist la$s su h as the .>< $as expanded nation* $ide. and some killed# 3iolent assaults " deaths ontributed to over* greater paranoia " inse urit!# 0! exploiting internal divisions during a time of intense repression. vandalism. killed b! the &0(. as $ell as the bla k ivil rights movement# (n the 19J0s. C<('TAL*. ollaborators.should serve as a hilling reminder of the length to $hi h our enem! $ill go to rush our resistan e# This is espe iall! true sin e veterans of this time are still $ith us.but the! ouldn. fabri ated shooting in idents " used lethal for e in agreed*upon =no shoot= %ones# An >C2.><# (nformants. et # (nfiltrators in luded &0( agents.>< endedS ho$ever. the! $ere often promoted to high*ranking positions in the organi%ation. smear " disinformation ampaigns.9-!R6 (ec ni<ues: 23 Surveillance Axtensive " $ide*spread surveillan e $as used to gather information on groups " individuals.C<('TAL*. and anti*$ar movements $ere also targeted# The goal of this ounter*insurgen ! ampaign $as to destro! organi%ed resistan e movements. " paramilitaries during the 19J0. /?0s.><.>< had its roots in the anti* ommunist ampaign of the 19C0s .s C<('TAL*. $ere exposed for arr!ing out illegal a tivities against dissident groups in luding burglaries.the >C2. poli e. serving as a similar national poli e for e $ith a role as a =politi al poli e= as $ell as an earl! for e of olonialism# (n the 19F0s the >C2. as $ell as lethal for e# 2an! ke! organi%ers $ere assassinated. $ith some being in harge of se urit! for hapters or leaders# 1' .9-!R6: *omestic Counter-Insurgency Campaign :1-'. mail. imprisonment. usuall! disaffe ted members or asso iates of a group. ne$ liberation movements emerged around the $orld# GS involvement in 3ietnam " the fier e resistan e of the 3ietnamese people ontributed to a limate of insurgen ! " rebellion.anthers " the Ameri an (ndian 2ovement.s " F0. one that extended into the GS itself# At this time.AT>(<T ACT have legitimi%ed mu h of $hat o urred under C<('TAL*.>< $as exposed after unkno$n persons broke into the &0(.bugs. vandalism.s infamous Counter*(ntelligen e .eltier. ." ph!si al .b! surveillan e being obvious " belligerent-# 43 &n+iltrators5 in+ormants & collaborators 1idespread use of infiltrators " informants $as a ke! part of the &0(. and ivilians# (n some poli e departments. arson. the &0(+poli e $ere su essful in neutrali%ing this first phase of urrent resistan e in 'orth Ameri a . and arson# :uring the 199C siege at Ts=. under over poli e. The &0(. /red s4uads.s# <ur failure to learn from this time $ould not onl! leave us vulnerable to the same ta ti s. $iretaps. it $ould be a dishonor to the sa rifi es made b! the previous generation# C<('TAL*. theft. " man! remain in prison to this da! as a result .@ustafsen Lake. $ere re ruited through intimidation and+or mone!# The! provided riti al human intelligen e# (n the ase of infiltrators " ollaborators.via their &0(+poli e handlers. media relations offi er $as aught on video sa!ing8 =Smear ampaigns are our spe ialt!=# C6IN(. both te hni al . although the Chi ano. et #-# 2an! are also dead. the >C2.t kill the spirit-# C<('TAL*.rogram . $ere involved# Surveillan e itself $as often used as a means to indu e paranoia " fear .$hen the Cold 1ar began-# (ts first targets $ere ommunist " so ialist groups. false harges.eten . assaults. telephone. using an! means ne essar!# A ma)or fo us $as instilling a sense of aranoia " fear among movements.uerto >i an. frame* the group# 0e ause of their experien e $ith $eapons " violen e. and /90s# Toda!. have been one of the best students of the &0(. the! also a tivel! disrupted organi%ations " enabled &0(+poli e to arr! out deadl! assaults.>< and have even extended the po$ers of &0(. informants. in order to neutrali%e them# Those $ho refused to submit $ere targeted $ith harsher methods.personal " vehi le-# This info often formed the basis for further C<('TAL*." /0I C6IN(.s-). involving extensive surveillan e. $orked $ith anti*gang units to prevent unit! bet$een gangs " resistan e movements# The! also re ruited infiltrators from gang members fa ing )ail or for mone!# (nfiltrators $ere often able to provide information " resour es .s.1.

. emplo!ed b! a orrupt tribal president. and supported b! the &0( as part of its ounter* insurgen ! effort against (ndigenous resistan e# The! arried out a reign of terror against A(2 " traditionalists on the reserve. rallies.3 Other harassment <ther forms of harassment used b! the &0( " poli e in luded approa hing members at their homes or $orkpla es for intervie$s. et # (n their efforts to atta h a bad*)a ket. allegations of sexual affairs bet$een members. at least JF members or asso iates of A(2 $ere killed b! 0(A poli e.anther hapter. and killings# <ther examples of the use of paramilitar! " vigilante groups in lude the &0(.anther.$ere both killed during a poli e raid on their Chi ago home. $as himself /bad*)a keted. $as killed during an alleged es ape attempt in 19F1# ● &red 0ennett. the &0( set up man! pseudo*gangs to disrupt ampaigns . stealing funds.><# Arrests " imprisonment also served to riminali%e movements " groups# . posters.Ko$ did the movements be ome so heavil! infiltratedU The! $ere ompletel! open " publi organi%ations. &0(.from 19F9*FJ# The @<<'s. b! an &0( infiltrator. a rapist. having them evi ted. an S& 0la k . or as a result of /bad*)a keting. this $as exploited to the point $here assaults " even deaths o urred# Another example of false ommuni ations $as the produ tion of fake ne$sletters. in 19J9# <ne of the . drive*b! shootings. portra!ing them as violent.anthers$ere killed in 19J9 b! members of a rival group in a C<('TAL*.anther.0la k .>< instigated feud# ● @eorge Ja kson.ine >idge reservation in S# :akota. ar hives. e4uipment and $eapons to arr! out assaults and lethal atta ks# Some $ere also linked to GS militar! intelligen e units# . sabotage of e4uipment or organi%ing efforts.anthers. in luding8 ● &red Kampton " 2ark Clark .i#e#. or insane# :3 )rrests0+alse evidence0+rame%ups . fre4uentl! in harge of se urit! for the group itself# Some pla!ed the role of an /ultra*militant.the @uardians <f the <glala 'ation. et #-# <ften.i#e#. op! them.uerto >i an independistas. assaults. anti*$ar groups. riminal. $as exe uted b! omrades after being su essfull! /bad*)a keted. $hi h a tivel! re ruited members from the general publi # (nfiltrators $ere eas! to pla e# The onl! area in $hi h se urit! measures $ere taken $as at the leadership level. in 19J9# ● Alprenti e Carter " Jon Kuggins . death threats.ett! harges " outright frame*ups $ere used to tie peop le " groups up in the ourt s!stem. e4uipped. poli e ma! fre4uentl! arrest a target during raids. et #-# 1hen hostilities existed bet$een groups. emplo!ers or famil! members to exert pressure on members .0la k . imprisoned in the 19F0s as a result of C<('TAL*.anthers " A(2. @<<'s.oli e themselves ma! gossip or leave eviden e indi ating a person is an informant# The purpose of the bad*)a ket is to neutrali%e the target individual as an effe tive organi%er# This te hni4ue resulted in interrogations. approa hing landlords. et #-# 2>3 Lethal +orce Be! organi%ers $ere killed b! poli e during raids " assaults.anthers in 19F5 . losing their )obs. among . the &0( " poli e $ould ondu t /smear " disinformation. ampaigns against movements. $eapons. " division# 63 'ad%7ac#et5 or snitch%7ac#et 1hen a genuine movement member is portra!ed as being an informant . assaults. promoting violen e " attempting to dra$ the group into arr!ing out illegal a tions# Criminals+hustlers turned infiltrators $ere also sour es of drugs. or fa ing ostra ism b! famil!-# Agents $ould also an el bus reservations on behalf of an organi%ing group. $ere armed. Se ret Arm! < o urred among the 0la k . files. diverting them from resistan e to legal defense# (mprisonment served to neutrali%e organi%ers $hile s aring a$a! the less* ommitted# S ores of politi al prisoners " . as $ell as spreading disinformation.anthers-# 83 False communications &ake letters $ere sent bet$een individuals or groups $ith misinformation . and this is $here some of the greatest mistakes $ere made# (n both the 0la k . as the! referred to themselves. and exe uted b! other . terrorist.$hile others remain in )ail-# . and the Bu Blux Blan# These and other groups $ere provided information. or announ e that meetings.or a thief. Jimmie Carr. " anti*so ial violen e $ithin groups# <ther a tivities in luded planting eviden e. et # b! the &0(+poli e. a prisoner " a prominent 0la k . and paramilitar! for es . /J0s and /F0s. et # had been an elled# <3 'urglar"5 Vandalism5 and )rson &0( and lo al poli e routinel! broke into offi es and homes in order to steal files. and to imprison man! $ith harsh senten es# Constant or massive arrests " harges drained movements of time " resour es.s breakfast program after offensive omi s $ere sent to funders# 93 Media disin+ormation (n ollaboration $ith orporate media.aramilitar! death s4uads are ommon in the global south# 1) . destro!ing valuable resour es su h as printing presses.# S ores $ere killed during the 19C0s. other informants are used to spread rumours. but then 4ui kl! let him+her go . et # =3 seudo%*angs &alse groups set up b! poli e*intelligen e agents to dis redit the movement " entrap genuine movement members# (n the 19J0s " /F0s. infiltrators gained a ess to this inner ir le. b! &0(* poli e infiltrators.uads <n the .in luding right*$ing ra ists-.V-# 223 )ssisting aramilitar" Death S. in luding fire*bombings.s assistan e to right*$ing groups su h as the 2inutemen. b! vigilantes . and even exe utions of suspe ted informants . paranoia.anthers involved in this. suppl!ing information leading to arrests or deaths. and distributed as genuine movement publi ations# This te hni4ue $as effe tive in utting funding for one . and+or to destro! e4uipment# <ffi es $ere also set on fire. plant eviden e. " individuals.<1s remain in GS prisons to this da!. organi%ations.i#e#.

'eal )oined the hapter# <. instigated b! <.in luding funds-# Like other infiltrators. &0( infiltrator 1illiam <. <. fourteen heavil! armed poli e raided the apartment using a $arrant to sear h for Hillegal $eapons#D Aarlier that night. et # in order to sabotage their efforts# The &0( also manufa tured fake omi s.anther offi es# Su h raids $ere again arried out in Jul! " < tober of that !ear# <. <. in luding the 0la kstone >angers# (n 19J?.art!# Kampton $as a !oung " promising leader. :urham a kno$ledged his role as a federal infiltrator# Kis exposure further demorali%ed A(2. :urham be ame head of se urit! for national A(2 and a bod! guard to :ennis 0anks.s bed $as and in the area of his head# 0oth Kampton and Clark $ere killed.anthers $as $hen Clark. posing as a reporter# Ke then )oined the (o$a hapter of A(2. et # (n the earl! 19J0s he $as involved $ith organi%ed rime.the /ultra*militant. $ho $as seated in the front room and armed $ith a shotgun .-# Ke re ommended getting a plane to bomb it! hall. assaults.later governor$ith rape# (n 2ar h 19FC.9 :ouglas :urham $as a non*'ative infiltrator into the Ameri an (ndian 2ovement.&LI. $ho died as a result of a violent assault b! :urham in Jul! 19J7# Ke $as fired from the poli e and found to be a violent s hi%oid Hunfit for publi servi e#D :urham again began $orking as a poli e intelligen e agent in 19F1# Ke $as present during the siege at 1ounded Bnee 19F9.arti Iebe ois a tivist. Clark $as passed out due to <. et # Ke is suspe ted in the death of at least one personEJan ita Aagle :eer. as $ell as taking ontrol of mu h of A(2.6%. and imprisonment of its members# For (ore 5nfo on these case studies: Agents of 'epression the #(&)s Secret *ar Against the (lack Panther Party and the American &ndian %ovement6 b! 1ard Chur hill " Jim 3ander 1all. armed onfrontations. :urham advo ated outrageous s hemes in luding kidnapping politi ians. :urham oversa$ all legal dis ussions " strategies. books. tapes. $ho $as killed in April 19FC# :urham $as the last person seen $ith her after he pi ked her up from a relative.anthers.'eal. $hile others $ere $ounded# Chi ago poli e laimed it $as a /$ild shootout.'eal had made a dinner for the residents. that all . sabotage.anther finan ial re ords. one of $hi h ontained a report signed b! :urham# 1hen onfronted.s Bool*Aid# . la$!ers $orking on the 1ounded Bnee defense ommittee obtained &0( files as part of ourt dis losures.IS she disagreed $ith the militant &LI a tions sin e it threatened the =legitimate= $ork of the . in luding deaths. films. fake letters $ere sent to both groups $ith $arning " threats about one or the other# This later resulted in violent onfli ts bet$een the groups. a sovereigntist group that shared a similar goal to the &LI of independen e# She $as dra$n to the &LI=s struggle.'eal onstantl! 1illiam <='eal.s house# Aagle :eer had harged 1illiam Janklo$.s apartment. 1990 edition# 11" Case Studies of Informants & Infiltrators ?uebec5 FL? &n+iltrator (n the 19J0s and earl! =F0s. in luding a prostitution ring# This a tivit! led to onfli ts $ith his $ife. the Iuebe Liberation &ront .all refused-# Ke himself brought in firearms used as a pretext for a poli e raid in June 19J9 of the .I# This is an example of an informant that both infiltrates a group but is at the same time an a tivist*turned informant# 1+ . burglar!.anther+0la kstone >anger allian e. files.s overall administration through its national offi e in 2inneapolis . the &0( and lo al poli e began planning the assassination of Kampton# <. also stole .ress.s bod!guard# This $as based on his experien e $ith $eapons " violen e# (n order to stop the . South And . and that an ele tri hair be installed in order to interrogate+torture suspe ted informants . $ith heavil! armed . but then be ame a paid informant# Ker real a tivism $as $ith the reformist .'eal.arried out urban guerrilla struggle# Carole de 3ault $as a !oung .rogram# The omi s $ere so offensive that man! funders $ithdre$ their support# (n 'ovember 19J9. offering training " $eapons .'eal $as a pett! riminal. a highl! effe tive organi%er $ho had begun forming allian es $ith other movements and even street gangs in Chi ago.<='eial reportedl! killed himself in the 19?0=s- Douglas Durham5 2=. although the onl! shot fired b! the . $hi h $ere sent to funders of the 0reakfast . in luding Bool*Aid spiked $ith a sleeping agent# At around 7890 A2.'eal agreed to infiltrate the Chi ago hapter# Ke 4ui kl! be ame head of se urit! and Kampton. along $ith other infiltrators. poli e ki ked in the door and immediatel! shot 2ark Clark.s shotgun $ent off in reflex to his being shot b! poli e# . in luding his bed and the lo ation of his head $hile sleeping# <n :e ember 7+J9. d!eing his hair bla k and $earing bro$n onta t lenses# Ke laimed to be a 4uarter Chippe$a# 0ased on his ba kground " skills. harged $ith ar theft and impersonating an &0( agent using false (:# (n ex hange for dropping these harges.'eal supplied a detailed floor*plan of urit! against )ust su h a raid-# Gnfortunatel!. $hi h $as then suffering under intense repression.oli e then dire ted their gunfire against the $all $here Kampton. one of A(2.!OI2TE-9+?O !ase Studies )ssassination o+ Fred 1ampton & Mar# !lar# 2=:= &red Kampton " 2ark Clark $ere members of the Chi ago hapter of the 0la k .anther . agitated for armed atta ks " &0( gangsta (nfiltrator robberies.'eal# <. then*attorne! general of S# :akota .s national leaders# :uring the 1ounded Bnee trials of 19F7*FC. $orking for the &0(# Ke $as a former (o$a poli e offi er $ho had also $orked for the C(A and $ho had some Spe ial &or es militar! experien e# Ke $as trained in demolitions.anthers be armed.

%et up a group of trusted members who others can go to with concerns about security. and Thunderflashes . merging seven investigations in its . fake (:=s. This makes other groups aware of repression and can limit further harassment through e>posure. =3 )lert others i+ police or intelligence harassment increases. and store at a safe 6 secret location. offi e# These involved 1J different atta ks arried out b! the Aarth Liberation &ront .o discussion of illegal activities in any public meeting or space. police infiltration. especially over telecommunications. etc.. to ensure they have not been cancelled or changed by others. $ere the target of a poli e operation based on surveillan e that indi ated that one member of the group $as looking for a )ob# . &hold meetings. Try to get fotos of agents involved. to identify patterns and targets. publi onta ts. <regon. staffed b! under over poli e agents. These can also be used for reports and legal defense. $here the &0( sie%ed omputers. surveillance.ortland. -ersonal communication between estranged members could have prevented or limited many +:" operations in the 1980s. etc. lothing. the &0( indi ted five $omen and six men on a total of JC harges. )void gossip about others. 3eep control of access to keys. <3 Do $OT tal# Aith an" police or intelligence agents3 <o . and who may also have access to weapons or other resources they want to share with the group. attempts to recruit informants.90s. within the hands of trusted members.oli e set up a fake furniture moving ompan!. e4uipment. smoke grenades.a po$erful =fire ra ker= used b! the militar! as a grenade simulator during training-# :espite this. etc. . and postered the neighborhood $here the member resided# Ke applied. . 63 'e aAare o+ Agents Provocateurs & criminal elements who constantly advocate risky illegal actions. manuals. transportation. use of destru tive devi es.3 Document all +orms o+ harassment.=T allow them into any residence without a warrant. :3 Veri+" & double%chec# all arrangements for housing. 2>3 repare group members to continue organi/ing if leaders are arrested. burglary. onspira !. raids. and for several months $orked alongside a poli e agent $ho eventuall! infiltrated the group# Their arrests $ere on the eve of the mass protests of April 50*$een 199J*5005 throughout the $estern GS that aused over W?0 million in damages# (n :e ember 500C " Januar! 500J..90s clearly compromised basic principles in order to accommodate this type of infiltrator. 93 Do not pass on harm+ul rumours about others. 5any groups in the 1980s. poli e and media portra!ed them as an =armed group=# This example sho$s ho$ poli e $ith huge budgets for ma)or se urit! operations an invest tens of thousands of dollars for high*profile arrests of lo$*level militants# 1#" Security 2uidelines 23 @stablish securit" guidelines appropriate for your group2s level of activity. whether the person is a suspected agent. meeting rooms. etc. funds. the &0( laun hed <peration 0a kfire. and $ere the fo us of intense media overage $hi h poli e used to further )ustif! their massive se urit! operation# Those arrested $ere aught $ith gas masks. tools and other e4uipment that $ere sub)e ted to forensi investigations# &erguson $as reportedl! a long*time heroin addi t $ho began ollaborating $ith the &0( in 5007# :espite his addi tion he appears to have had the trust " onfiden e of the to trusted friends &or group members responsible for dealing with covert intervention'. or is simply na7ve. etc. and des* tru tion of an energ! fa ilit!# <ne prisoner killed himself $hile in ustod!# These arrests $ere primaril! the result &0( hipp! (nformant Ja ob &erguson of one single informant8 Ja ob &erguson# &erguson had parti ipated in some of the AL& a tions under investigation and provided the &0( $ith the names of others that $ere involved# Ke $ore re ording devi es to at h them making in riminating statements about the a tions# 0ased on these.*erminal )rrests5 4>>2 The arrests of the militant group =@erminal= on their $a! to the anti*&ree Trade Area of the Ameri as protests in Iuebe Cit!. files. e>plain the harm that could result. make press releases. informants. based in 2ontreal. 5ake duplicates of important files/info. assaults. et # This in ludes sharing kno$ledge " skills. $ho spoke openl! $ith him about illegal a tions $hile he se retl! taped them# 1- . April 5001.o collaboration with police or intelligence agencies is a good starting point. $as the end of a months*long under over operation# The group. omplete $ith offi e and tru ks. 43 Deal openl" & directl" with the form and content of what anyone says or does. 83 DonBt accept ever"thing "ou hear or read as +act3 *heck with the supposed source of the information before you act. et # Operation 'ac#+ire: F'& )rrests o+ @LF5 4>>8%4>>: (n 5007.AL&. . arrests. sear h $arrants $ere issued for homes and businesses. in luding arson. etc. has emotional problems. "f na7ve members do engage in conversations with police or agents.'.

>>> .SIS(. !69IC.Resist t e System of Surveillance & Social Control A4ove: )em*ers of !anadian military Hoint Tas1 'orce 2. S(A(. 0elow: Surveillance cameras in -ondon England /ig t /or /reedom> Anti-Copyrig t: Reprint & *istri4ute At =ill F'or photocopying purposes print out at /00 dpiG R.SIS( (?.SIS(-R.R.

Sign up to vote on this title
UsefulNot useful