The Voice of the Anti-Imperialist Movement from

Under Lock & Key

Got a keyboard? Help type articles, letters and study group discussions from prisoners. help out
[Security] [MIM(Prisons)]
expand

Lavabit Court Case Over FBI Right to Demand Encryption Keys

While news of online spying by the U.$. government is growing, a court case may provide even broader access for government agencies. This case involves Lavabit, the former email provider for MIM(Prisons). On January 28, the owner of Lavabit went to court to appeal the contempt of court ruling against the company for failing to hand over encryption keys to his email service. The 4th US Circuit Court of Appeals has not yet rendered a verdict, but it will have significant implications on what the government can demand of email providers in the future. This case revolves around the Lavabit SSL keys. These keys were used to decrypt incoming traffic from Lavabit users accessing via an encrypted connection. If Lavabit had given up the keys before shutting down their operation, the government could capture every users password next time they logged in and have full access to their email.

Last June Lavabit was ordered to give the government a live feed of email activity for a specific account. People generally assume this was Edward Snowden's account based on court filing information that refers to his violations of the Espionage Act and theft of government property. Lavabit founder Lader Levison offered to transmit the information requested after 60 days, claiming he needed time to reprogram his system to collect the information. We can't be sure what Levison would have ultimately handed over, but this is further evidence that users can not rely on their email providers for security. In fact, in court Lavabit's attorney claims that Levison had complied with at least one similar court order in the past.(1)

In July, after Levison's delay, the FBI served Levison with a search warrant demanding the private SSL keys that would enable them to decrypt all traffic to and from the site. The government promised to only use the keys for the individual targeted and said they would not spy on the other 410,000 Lavabit users.(2)

The FBI had already begun collecting encrypted data from Lavabit's upstream provider in anticipation of getting the key to decrypt it, and they still have this data.(2) If the government has the SSL keys, all emails for an unknown period of time for all users on the Lavabit email system are in the hands of the government.

After an August 1 court order upholding the government's demand for the Lavabit SSL keys, Levison did turn them over, but as an 11 page printout in 4-point type.(1) This was clearly an attempt to comply in form without making the key usable, or at least delaying its usability. But in spite of the paper form, the government now has the Lavabit SSL keys, all they need to do is manually enter the 2,560 characters. While tedious, this is certainly doable and we think it likely that they quickly completed this work.

The government responded to the printout by demanding an electronic format and on August 6 began fining Levison $5,000 per day until he complied with the FBI's order. Levison shut down Lavabit altogether on August 8.(2)

Although the government and the appellate court Judge hearing the case both claim the SSL keys could not be used for anything other than the individual target in question, the search warrant and sanctions order both place no restrictions on what can be done with the key.(2) Not that we think the government complies with these sorts of formalities anyway.

chain
[Security] [MIM] [ULK Issue 37]
expand

Documents Reveal Imperialist Spies' Online Attacks on Activists

NSA and GCHQ presentation
British Joint Threat Research Intelligence Group (JTRIG) presentation to the U.$,
Australian, Canadian and New Zealand intelligence agencies

Newly released information about the British GCHQ and Amerikan NSA expose the agencies' work to manipulate and undermine online individuals and organizations. In addition to the monitoring of online activity, email, and phone calls, the government tactics include Denial of Service attacks to shut down websites, releasing viruses to destroy computers, traps to lure people into compromising situations using sex, and release of false information to destroy reputations.

Previous Snowden documents revealed widespread spying by U.$ and British government agencies. These new documents confirm what we've said for years: the government has a long running infiltration and misinformation campaign to disrupt and manipulate individuals and groups they see as dangerous. This is particularly focused on political activists.

The online attacks were detailed in a 2012 presentation from the British Joint Threat Research Intelligence Group (JTRIG) presented to the U.$, Australian, Canadian and New Zealand intelligence agencies. The slides describe this "Cyber Offensive" as "Pushing the Boundaries and Action Against Hacktivism." Essentially this is a way to attack people who are not charged with any crimes but are seen as somehow dangerous, generally because of their political protests.

One of the tactics, called false flag operations, involves posting material online that is falsely attributed to someone, and includes "write a blog purporting to be one of their victims", "email/text their colleagues, neighbours, friends etc," and "change their photos on social networking sites." This is a continuation of the COINTELPRO work of the Amerikan spy agencies targeting activist organizations in the 1960s, moved online for faster and more efficient attacks on enemies of the government. Those who have studied the Black Panther Party know about the government-led infiltratration and misleadership, false letters sent to disrupt internal communication and create divisions, and many other tactics used to imprison and destroy the most advanced and effective revolutionary organization of its time. Maoism is just as dangerous to the U.$. government today as it was in the 1960s, and just as our organizing work has advanced, their COINTELPRO work has also advanced.

It is right for our readers to ask, as one reader did in 2012, "I am concerned you have been already infiltrated or you're a CIA front organization claiming revolutionary organizing." We should question all individuals and organizations in this way, and judge them by their actions. You can't just take someone's word that they are a revolutionary; their political line and actions must be correct. And even then, there is no reason to give out more information about yourself than absolutely necessary. As we outlined in our article "Self-Defense and Secure Communications", we can make the government's job much more difficult by taking some basic security precautions in our work.

These latest Snowden revelations remind us of the struggle of the Maoist Internationalist Party - Amerika (the vanguard party of the Maoist Internationalist Movement in the United $tates in the 1980s to 2000s) which had its information hosted on the etext.org website. Throughout their decades of work they often encountered forces on the internet that they characterized as cops based on their politics and behavior. This goes much deeper than our warnings against using corporate online social networks for organizing work. It requires a continued study of politics in order to guard against online pigs who will often outnumber the proletariat forces in that forum. Without a continued study and application of politics in such work, people quickly degenerate into nihilism because they are unable to trust anyone they interact with online. An unwillingness to engage in scientific skepticism will often lead to such nihilism and/or a degeneration to doing work that does not threaten imperialism to avoid these struggles.

Before MIP-Amerika ceased to exist one of its underground leaders went public with his name and persynal information in an attempt to fight back against behind-the-scenes government attacks. Many of the attacks he described come right out of this JTRIG playbook. In response to the situation, many of the MIM posts on etext.org were focused on security and confusing to most readers. But that doesn't make the struggle undertaken there incorrect, and these latest revelations lend further credence to the revelations from MIM. We can only assume that as the organization with the most correct revolutionary line within the United $tates, the government spy agencies focused significant attention on disrupting and destroying the MIP-Amerika. While that specific organization no longer exists, there are new Maoist groups like MIM(Prisons) continuing the legacy of MIM, and we have a responsibility to be diligent about security to ensure our continued existence.

chain
[Security] [First World Lumpen]
expand

Secure Communications is Key to Organizing the Lumpen

In response to the May 2013 article Rats Undermine United Front Unity, as a brother of the struggle, originally from Texas, I send mine to all you brothers and sisters back home.

As leaders, we have to be serious about our roles in the movement, accepting responsibility for any personal miscalculation made while representing our units, party, cell, etc.

Period. No cut on it.

Communication is key when organizing the lumpen to unite. And most times having a safe and secure line of communication can be just as important, if not more important, than what is actually being said. Because what is a line of communication if it is always being disturbed, interfered and disrupted? I don't know, but it isn't effective communication I tell you that.

So often we hear prisoners commenting on how great the power of snitches and provocateurs are, and it bothers me that we are able to concentrate so much energy on them instead of on the tactics of countering their elementary crosses, and their state.

Sometimes we revolutionaries have to accept the consequences of our miscalculation so that we can learn an experience that allows us to identify the signs of the problem when it approaches again, instead of being so quick to place blame or responsibility on another person.

I personally was caught slipping while in the possession of a wire regarding economical development involving a select few. The flashlight turtles ran up at an unexpected time to my assigned quarters. With the choice of catching a narcotics possession/distribution charge or dropping my line in order to dispose, I took the latter option and became guilty of losing an important wire. I didn't agree with the charge by my peers or the penalty, but I did take responsibility for the wire being lost. It is very likely that someone very close to me set the authorities to get with my program, but the point is it was my responsibility to safe guard the wire. I lost a lot due to one miscalculation - like a comrade at arms on the battlefield - from great allies who can never again support my campaigns, to resources of a collective committee with it's tentacles reaching into places all across the seas. But on the other hand I learned that the ability to secure and stabilize a line of communication with very important factions behind the wire from state to state is very powerful. But for most it's a learned ability.

I suggest to all comrades that we learn to say who did it less, and practice doing it more. Securing and stabilizing lines of communication is a great place to start.


MIM(Prisons) adds: We've written extensively about the importance of secure communications both behind the bars and on the streets. This is a critical element of self-defense for the revolutionary movement. As the state expands it's tactics of infiltration and information gathering, we must expand our defenses.

chain
[MIM(Prisons)] [Security] [ULK Issue 35]
expand

NSA Hacking Google and Yahoo Data Centers Reveals Broad U.$. Government Spying

In a joint U.$. and UK spying operation, agencies hacked into links to Yahoo and Google data centers, allowing them to freely collect information from user accounts on those systems. This data collection project, called MUSCULAR, is a joint operation between the U.$. National Security Agency (NSA) and the British Government Communications Headquarters (GCHQ). Documents released by former National Security Agency (NSA) contractor, Edward Snowden and "interviews with knowledgeable officials" are the sources for this news that was broken by The Washington Post on October 30, 2013. Google was "outraged" at this revelation, and many Amerikans were shocked to learn of the violation of their privacy by their own government.

Of course, for those of us serious about security in our political organizing work, this is not breaking news. It is just further confirmation of what we've been saying for a long time: email is not secure, especially email on the major service providers like Google and Yahoo. Back in August MIM(Prisons) had our email account shut down when the U.$. government demanded that our email server, lavabit.com, turn over information on the accounts it provided. Lavabit decided it would rather stop providing services at all than comply with the government's demand. We can only assume that any email service still in operation is supplying information to the U.$. government.

What is interesting about this story is not that the NSA is caught red handed snooping on people's email, but that they would even need to do this in the first place, when major companies are freely providing backdoor access to the U.$. government. A court-approved process provides the NSA with access to Yahoo and Google user accounts, through a program known as PRISM. Through PRISM, the NSA can demand online communications records that match specific search terms. Apparently this restriction to court approved search terms was too limiting for the NSA, who has been siphoning off vast portions of the data held in Google and Yahoo data centers, for analysis and more targeted snooping.

MUSCULAR gets around the already lax U.$. government policies on spying on Americans by exploiting links between data centers holding information outside of the U.$. where intelligence gathering falls under presidential authority and has little oversight or restriction.

As we pointed out in the article Self-Defense and Secure Communications: "Currently, we do not have the ability to defend the movement militarily, but we do have the ability to defend it with a well-informed electronic self-defense strategy. And just as computer technology, and the internet in particular, was a victory for free speech, it has played a role in leveling the battlefield to the point that the imperialists recognize computer warfare as a material vulnerability to their hegemony." In that article we provided some basic suggestions for communications self-defense, most of which are only possible for people outside of prisons.

As more information comes out on the vast resources invested in electronic surveillance it is clearer that improving our technology is a form of offensive work as well, even if we aren't launching attacks. The imperialists are spending a lot of resources trying to defeat the tools we mention in our last article. In using these tools in our day-to-day work we tie up those resources that could be used to fight other battles against the oppressed elsewhere. This should be stressed to those who think security is taking time away from "real work."

Some will not organize until they've read all of Marx's writings to ensure they understand Marxism. This is a mistake, just like waiting to get the perfect electronic security before doing any organizing work. But you should assume that all of our communications are being intercepted. Take whatever precautions you can to ensure your information cannot be accessed, or if it can, that it cannot be used against you or others. Security is like theory and any organizing skill; it should be constantly improved upon, but it should not paralyze your work.

chain
[United Front] [Security] [Organizing] [Texas] [ULK Issue 35]
expand

Report on United Front for Peace Work in Texas

I do all I can here to educate prisoners in the science of revolution. I share Under Lock & Key, I pass MIM(Prisons)'s address around, I conduct study groups, I raise consciousness and awareness while showing solidarity. Yet, the Texas Department of Criminal Justice officials are agents of repression using all kinds of divide and conquer tactics against these efforts.

The other day I was conducting a study group in solitary confinement and the pigs were using disruption by instigating a racial argument between two Black prisoners and a Mexican prisoner. I tried to keep the peace and unity among prisoners, but the pigs are constantly breaking the unity and provoking racial conflict. I tried to intervene by telling these three prisoners to stop arguing about insignificant things and to set aside their differences and come together in unity, solidarity and cooperation. Then two of the Black prisoners started caling me "wet back." I just had to terminate the study group at that moment to prevent further altercations and racial conflict among these three inmates. I had similar experiences in the past when I tried to educate fellow prisoners; sooner or later the pigs manipulated the situation and use these ignorant inmates to turn against me and start calling me racial slurs.

Look comrades, I have to be very cautious when I give your address to some of these prisoners because some of them are agent provocateurs, snitches, double agents, pretenders, informants and just brainwashed. So be aware of this matter. I just don't let these pigs get to me with their dirty tactics of divide and conquer. Some comrades over here are willing to learn, others are just playing games, and others are just brainwashed and it will take too long to make them conscious of revolutionary knowledge so I rather concentrate more on those comrades willing to learn and to assimilate Maoism into their thinking.


MIM(Prisons) responds: This report from a United Struggle from Within (USW) comrade is an example of United Front work among the imprisoned lumpen. This is the more tedious stuff that dedicated comrades must engage in over years and decades before getting to more glorious examples like 30,000 prisoners refusing food on the same day in California. So we want to recognize all who, like this comrade, keep working and not letting the pigs get to them.

It's true those who follow the pigs' manipulations are ignorant, and someday they will probably recognize that and feel great shame. But this story itself is an example of a teaching moment. By setting a good example, others learned something that day about the roles of the pigs because of the efforts this comrade made to build unity. And it is by consistently providing examples like this to the masses that ignorance is overcome. When an individual overcomes their ignorance and opens up to new ideas, those are the people who should get your persynalized attention to develop their theory and practice.

Finally, we are aware that many people write us with bad intentions. Some have requested that we not send materials to such people. But this allows the very people we are trying to avoid to manipulate us into censoring ourselves. And in the current format of our work, there is no certain way for us to identify all pigs. As we have written in articles about security in the past, we must judge people based on their actions, and only give out information on an as needed basis. So we are very conscious about what information is public and what is not, and we will spread public information as widely as we can. As we recently wrote, comrades should not mistake Under Lock & Key subscribers for USW members. Just because we send someone mail, does not tell you anything about our assessment of that individual's political reliability.

chain
[Spanish] [Security]
expand

El Negocio del Web en el U.$. no es Seguro - MIM(Prisiones) Cierre del Correo Electrónico

El burguesía parece estar perdiendo la batalla por libre empresa contra el gobierno represivo de Estados Unidos, y no puede más ser que algún servicio comercial de correo electrónico que no proporcione acceso directo a toda la información de los usuarios a Las Agencias del Inteligencia del los Estados unidos. Nos enteramos de esto hoy cuando nuestro servicio de correo electrónico, Lavabit.com, no estaba más accesible y el propietario envío puso un mensaje declarando,

He sido forzado a hacer una difícil decisión: estar en complicidad con crímines contra la gente americana o alejarme de cerca diez años de duro trabajo cerrando Lavabit. Después de significativo examen de conciencia, he decidido suspender operaciones.

La clara implicación es que los federales se acercaron a el a demandarle acceso a las comunicaciones en su servicio. Comunicaciones que existen fueron anunciadas como inaccesibles a cualquiera menos a el usuario quien poseyere la cuenta. Para no soltar mas información del usuario a los federales el cerro la mesa de servicio; una decisión seguramente no tomada a la ligera cuando personas dependían en sus correos electrónicos para mucho en sus vidas diarias.

Justo a principios de esta semana esto fue revelado por un servicio popular de presentación, que Tor Hidden Servicios estaba comprometido y sitios en ese servicio estaban infectados con malicioso lenguaje computarizado (Javascript) para revelar las direcciones IP de los usuarios (usualmente escondidos por la Red Tor) a un servicio localizado en Virginia. La implicación evidente allí esta operación estaba relacionada a las Agencias de Inteligencia del Estados Unido$ las cuales dominaban la región. Uno de los más populares sitios afectados por este ataque fue Tor mail, otro proclamado el mismo como un servicio seguro de correo electrónico.

Todo esto comenzó inmediatamente después de la liberaciones de información sobre el sistema de la Agencia de Seguridad Nacional (NSA) de los Estados Unido$, de monitorear todas las comunicaciones electrónicas en el mundo. La información publicado hace esto claro que todas las mayores compañías comerciales de computadoras (software) han proporcionado acceso para entrar en la red de sus computadoras y servicios por linea, al gobierno de Estados Unido$. Con la destrucción de Lavabit y Tormail, esto parece evidente que los Estado$ Unido$ no tiene intención de dejar algunas excepciones para que ese sistema continuara. El anunciador, Edward Snowden era conocido por usar Lavabit, como su correo electrónico, llevando a muchos a deducir que Lavabit fue una víctima de la cacería de Estados Unido$ por Snowden mismo. Otros han especulado que el ataque a Tor fue un intento de asustar gente de la tan llamada Red Oscura (Darknet) y de regresarlos a los brazos amistosos de Google, Microsoft, et al.

Mientras que usando supuestamente servicios seguros en línea que puedan proporcionar una capa extra de protección, no puedes confiar en un grupo desconocido para tu seguridad en todo caso. Eso es porque servicios con medidas de seguridad PGP encriptadas, como hushmail.com, son un chiste desde el principio. Hushmail.com, trabaja abiertamente con el gobierno americano aunque ellos no son una compañía de Estado$ Unido$. Ciertamente otras naciones intentaran apoderarse de la ventaja competitiva que ellos ahora tienen sobre un negocio que hace tiempo ha sido dominado por las compañías del Estado$ Unido$. Y como recientemente dijimos, lo positivo de todo esto es un aumento en demanda e innovación en el terreno de seguridad informática.

Por ahora, no puedes enviar correos electrónicos a MIM(Prisones); en vez de eso, ve a nuestra pagina de contacto. Estaremos investigando soluciones alternativas y las imprimiremos en nuestros anuncios en la pagina de contacto una vez que ellos estén disponibles. Si todavía estas usando correo electrónico sin inscripción para trabajo político, tomate el tiempo y empieza estudiando nuestras conexiones de seguridad en nuestra pagina de contacto. La última generación revolucionaria subestimado el papel de COINTELPRO hasta que esto fue demasiado tarde. Esto sería un crimen contra la gente como para que nosotros hagamos el mismo error con todo lo que sabemos hoy.

chain
[Security] [Civil Liberties] [ULK Issue 34]
expand

No More Secure Web Business in U.$. - MIM(Prisons) Email Shut Down

mimprisons@lavabit shut down by thought police

The bourgeoisie seems to be losing the battle for free enterprise against the repressive U.$. government. There can no longer be any commercial email service that does not provide direct access to all its users' information to the U.$. intelligence agencies. We discovered this today when our email server, lavabit.com, was no longer accessible and the owner posted a message stating,

I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations.

The clear implication is that the feds approached him to demand access to the communications on his server. Existing communications were advertised as not accessible to anyone but the user who owns the account. In order to not release any future user info to the feds he shut down the server; a decision surely not taken lightly when people depend on their email for so much of their lives.

Just earlier this week it was revealed that a popular hosting service for Tor hidden services was comprimised and sites on that server were infected with malicious javascript to reveal users' IP addresses (usually hidden by the Tor network) to a server located in Virginia. The obvious implication there was that this operation was related to U.$. intelligence agencies which dominate the region. One of the more popular sites affected by this attack was Tormail, another self-proclaimed secure email service.

All of this comes on the heels of the release of information on the U.$. National Security Agency's (NSA) system of monitoring all electronic communications in the world. Information released makes it clear that all major commercial software companies have provided backdoors to their software and online services to the U.$. government. With the destruction of Lavabit and TorMail, it seems clear that the United $tates has no intention of letting any exceptions to that rule continue. Whistleblower Edward Snowden was known to use lavabit.com for his email, leading many to conclude that Lavabit was a victim of the U.$. hunt for Snowden himself. Others have speculated that the attack on Tor was an attempt to scare people out of the so-called darknet and back into the friendly arms of Google, Microsoft, et al.

While using allegedly secure online services can provide an extra layer of protection, you cannot rely on an unknown party for your security anyway. That is why services with built in PGP encryption, like hushmail.com, are a joke from the get go. Hushmail.com openly works with the Amerikan government already even though they are not a U.$. company. Certainly other nations will attempt to seize the competitive advantage they now have over a business that has long been dominated by U.$. companies. And as we recently said, the positive of all this is a surge in demand and innovation in the realm of computer security.

For now, you cannot email MIM(Prisons); instead, see our contact page. We will be investigating alternative solutions and post them on our announcements and contact page once they are available. If you're still using unencrypted email for political work, get with the times and start studying our security links on our contact page. The last revolutionary generation underestimated the role of COINTELPRO until it was too late. It would be a crime against the people for us to make the same mistake with everything we know today.

chain
[U.S. Imperialism] [Security] [ULK Issue 33]
expand

Global Telecom Monitoring for Global Domination

A lot of talk and discussion has been flying lately about the recent exposure of the United $tates's massive worldwide spying apparatus. While the European Union superstructure of imperialist nations and empires cry "Foul!," their cries are for show only. In January 2012 the E.U super-state shot down a proposal that would have made it illegal for the United $tates to spy on E.U. citizens. The Amerikans threatened economic warfare and the U.$. administration heavily lobbied E.U. officials to crush the proposal before it was brought to member nations for referendum. E.U. officials promptly did so, proving the United $tates to be the current dominant world imperialist superpower.(1)

A reason some European countries/empires are reluctant to raise much of an outcry is because most communications at some point have to travel thru U.$. telecom and internet servers. European imperialist countries can then backdoor their own countries' warrant requirements by just requesting the information from U.$. spy agencies. Britain has also been known to do this to monitor insurgencies in its colonies.(2)(3) These revelations bring about the question, how else does this issue affect colonized peoples and the Third World?

The United $tates set up the notoriously corrupt Mexican government's entire telecommunications network to spy on its own citizenry, and of course to allow the United $tates to monitor all communications passing thru Mexico.(4) As stated above most of the world's communications will pass thru U.$. systems and systems set up by the United $tates. This allows the Amerikans to spy on the entire world's communications, thereby helping them to control entire populations, and manipulate governments and markets, which explains why the United $tates is so willing to export this technology.(5)

The United $tates and Israel have been exporting this technology for years.(6) One of the largest electronic surveillance companies Verint was founded by former Israeli intelligence officer Jacob "Kobi" Alexander. The CEO is Dan Bonder, former Israeli army engineer.(7) The United $tates uses a lot of Verint software for eavesdropping. Another major client of Verint is the government of Vietnam, who uses Verint technology to monitor dissidents and silence them.(8)

Another large U.$./Israeli intelligence firm, Narus, provides eavesdropping technology to the Chinese Government, which uses the technology to monitor citizens, silence dissidents and to prevent Chinese workers from organizing. Narus also provides and has provided its services to the oppressive regimes in Egypt (Mubarak), Libya, and Saudi Arabia.(9)

Without this U.$./Israeli technology these repressive governments could not track VOIP calls or block "unapproved" websites or track dissidents.(10) These systems allow these repressive regimes to impose a stranglehold on their citizenry/workers on behalf of the U.$. imperialists. This makes these U.$./Israeli firms not only responsible for helping to maintain this stranglehold but also largely responsible for the death, torture, and detention of the citizens and workers of these countries.


MIM(Prisons) adds:In issue 33 of Under Lock & Key we are focusing on the importance of independence in order to achieve self-determination. U.$. surveillance is just one more thing to consider in trying to maintain independence. One positive result coming out of the information released about the NSA's global data mining operations is a flurry of support in the First World (from people who haven't had to worry about things like COINTELPRO in the past) for independent, open source technology projects that focus on providing security to all. Many of these we mentioned in our article Self-Defense and Secure Communications in ULK 31. But using better technology is not the only lesson to take from this. Another lesson is that more traditional forms of communication, in societies less integrated into the imperialist system (where resistance also happens to be more fertile) will be an even better route than depending on technologies, such as social media, where the imperialists can easily dominate.

Sources:
1. James Fontaella-Khan, "Brussels bows to US over data protection", Financial Times, Thursday 13 June 2013.
article is called by
2. J.Mooney & O'Toole. Black Operations, Maverick House, 2005.
3. James Bamford. The Shadow Factory, Anchor Press, 2009.
4. ibid pg. 225-228
5. ibid pgs. 177,181,184,186,209,291,304
6. ibid pg. 254
7. ibid pg. 238
8. ibid pgs. 254 & 259
9. ibid pgs. 259
10. ibid pgs. 256 & 260

chain
[Security] [ULK Issue 31]
expand

Self-Defense and Secure Communications

Self-Defense arm yourself physically and mentally
The digital age is slowly reaching behind prison walls. So much so that the California Department of Corrections and Rehabilitation recently began implementing cell phone blocking technology around its prisons. MIM(Prisons) regularly receives emails from comrades behind bars via state-run email systems for prisoners. While we have long promoted careful study and practice around the use of computers for revolutionary work, we have generally felt this material had little immediate relevance for our comrades behind bars. This is changing.

While pointing to resources for further study and giving pointers on what the risks of using computers and cell phones are, we have historically veered away from recommending certain technology. This was partly due to a desire to prevent the state from building a profile of the technologies that we rely on, and partly because there are organizations more focused on these questions that will have more up-to-date and in-depth information to offer. While the latter is still true, there are a few technologies that are so standard that we see little risk in mentioning them by name.

Another thing we want to touch on here is imposing higher standards for our electronic communications from other revolutionary organizations. Recent communications we've received have reinforced to us the need for diligence in having secure communication networks. So let us begin with some basic principles.

Assuming that we have a practical interest in developing communications with another revolutionary organization, there are three political questions that we must ask about the organization: 1) what is their political line? 2) what practice can we see to prove they are consistent in implementing that political line? 3) can we confirm that we are talking to someone that represents the organization? Once we decide to communicate with an organization we must then be concerned with who knows that we are communicating and who knows what we are saying to each other.

On our website we have our public email address, a form to submit anonymous messages, and our public GPG key to encrypt messages to us. Our website has been online for over 5 years and has material dating back that far demonstrating our work and our political line. We believe this is a good model that would allow another group to confirm who we are and communicate with us securely and anonymously via the internet.

The downside to the public email address is that it is easily targeted for monitoring, allowing the state to know who is contacting us. This is why we have the anonymous form and why we tell people to email us from addresses that are not linked to them persynally. For prisoners, one may think that one's mail is monitored anyway, so emailing is no greater risk than sending a letter. However, there is an increased risk in that digital communications provide for permanent documentation of who you communicate with and what you say, allowing for easy data mining of that information later. This is possible with snail mail, but it requires more effort by the state and is not done consistently; at least for most people. Emailing is convenient, and is a fine way for prisoners to contact us, but be aware of the increased ease of surveillance. If you are using non-state-sponsored technology, then you should consider using the tools we mention below if you have access to them.

For other revolutionary organizations, if our only communication is via anonymous email then we need a way to confirm who you are. Having an established website with your public email address and public GPG key on it and then using that GPG key to encrypt all email is a way to do this. GNU Privacy Guard (GPG) encryption should be used for all communications. Not only does it prevent a snooper from reading intercepted messages, it allows the receiver to confirm the identity of the sender if they have a trusted GPG key from that party. Email addresses are easy to spoof, while it is practically impossible to spoof GPG signatures.

One of the documents we link to on this subject is titled Surveillance Self-Defense. We think this is an appropriate title, and we need comrades to think beyond fists and guns when they think about "security" and "self-defense." Even if you don't use computers or cell phones at all, then you must have a basic understanding of the risks to come to that decision (unless you are in prison and have no choice in the matter). While martial arts are great in many ways, we do not see hand-to-hand combat as a decisive aspect of the struggle at this time. And since we have assessed our strategic stage to be one where armed struggle would be a fatal mistake, we do not require or promote weapons training. We do require regular study, review and practice of anti-surveillance technology of our members. And we hold those we relate to to similar standards. The worse your security practice, the more risk you are to us, and the less we will interact with you. Simple as that.

While being effective in self-defense requires further study than this document, we want to give some simplified recommendations here to get people started:

  1. When you carry a cellphone it is easy for the state to know where you are and to electronically record sound and even video of your surroundings, even if your phone is off
  2. Encrypt your data, if possible encrypt your whole drive including your operating system; there are different tools to do this effectively, but TrueCrypt is a popular cross-platform tool
  3. When connecting to a website or your email you can be identified by your IP address; the best way to hide this is through The Onion Router via the Tor Browser Bundle, the TAILS operating system or Orbot for Android cell phones
  4. As discussed above use GPG to encrypt messages and confirm who messages are from

how tor works

Of course, prisoners using state-owned computers will not have the option to use any of these technologies, so it is mostly just a question of using email or snail mail. But if you are looking forward to a release date and hope to keep in touch with MIM(Prisons) then it would be worth learning more about these technologies and tactics to protect yourself.

How we approach self-defense is very much informed by our political line. Our line leads us to focus more on the First Amendment than the Second. But ultimately there are no rights, only power struggles. Currently, we do not have the ability to defend the movement militarily, but we do have the ability to defend it with a well-informed electronic self-defense strategy. And just as computer technology, and the internet in particular, was a victory for free speech, it has played a role in leveling the battlefield to the point that the imperialists recognize computer warfare as a material vulnerability to their hegemony. The Obama administration has gone so far as to call journalist Julian Assange a "terrorist" after WikiLeaks published documents that the United $tates did not want the world to see.(1) As the means of production advance, we must learn to utilize the emerging technologies for both offense and defense in the interests of the international proletariat.

chain
[Abuse] [Security] [Calipatria State Prison] [California] [ULK Issue 31]
expand

Confusion About Snitching Means Pig Gets Away with Murder

do not snitch CA prisons
The pigs have been up to the same old stuff around here. Three days ago they shot and killed one of the brown brothers with the mini 14 assault rifle, the same rifle type the media and congress has been trying to ban. Two guys were attacking another guy and they were on him and wouldn't stop. So the pig stopped it with the assault rifle. The official report is that the victim had a stabbing instrument in his hand. But the men who were closest to the incident said they saw no weapon.

Of course they did the routine investigation and sent out some COs to ask if anybody saw anything. And of course no one wanted to talk. The pigs have brainwashed so many of us that we believe if we report on the pigs' wrongdoing then that makes you a snitch. A lot of guys are afraid to write a grievance for fear of being labeled. The bad thing is the pigs have their compradors in place to push this point.

Some guys here on a facility organized a food strike to protest the fact the kitchen has a mice/rodent problem. It was only one building. There was no communication that it was going to take place. They did it and got some people's attention. Inspectors came out and looked at the kitchen and gave the kitchen workers a pep talk and told them they needed to tell the population that the problem was being taken care of. All they did was put some mouse traps down and nothing else.

Hopefully the population continues to stand up for themselves. If this is a sign of change I hope it continues because the pigs got nervous when those guys refused to eat.


MIM(Prisons) adds: The righteousness of opposing "snitching" is in the idea that you don't go running to the oppressor to deal with problems among the oppressed people. In other words, don't snitch to the oppressor on the oppressed. There is no such thing as snitching on the oppressor. To report abuse of the pigs, you are not bringing the oppressor into a conflict among the oppressed; the oppressor already is the source of the conflict. And if the oppressed don't have the means to resolve that conflict, then it may be tactically correct to turn to other oppressors to resolve that conflict.

It is true that the prison administration gets nervous when prisoners organize. The more we can unite around common goals, the more power we will have. If the oppressed stay quiet and disunited, there is no counterbalance to the abuse that prisoners face.

chain