InfrastructureThe ‘Infrastructure’ page lists actions and research categorized by target (road, pipeline, electricity, rail, fiber-optic and communication infrastructures). The ‘Arson and Sabotage’ page lists techniques, and is also categorized by target (cars, buildings, heavy machinery). The ‘Guides’ page collects publications on arson, sabotage, blockades, security, hacking, and warrior fieldcraft. The ‘Maps‘ page lists infrastructure and extractive industry mapping projects.
Indigenous Solidarity and Blocking Extractive Infrastructure in Canada
InfrastructureThe appendixes that follow take a look at how extractive infrastructure is vulnerable in more detail. We hope they prove valuable to affinity groups and communities fighting the extractive economy across the territory.
The Gentleperson’s Guide To Forum Spies
TradecraftThere are several techniques for the control and manipulation of a internet forum no matter what, or who is on it. We will go over each technique and demonstrate that only a minimal number of operatives can be used to eventually and effectively gain a control of a ‘uncontrolled forum.’
TradecraftI’m sick and tired of watching good groups fail because of the wicked people who are still being sent among us. Moreso because of our failure to respond appropriately to these wicked people. I don’t blame them so much as I blame us for not doing anything about them. But we who are intelligent people should be wise enough to know that COINTELPRO still exists, both online and in real life. Yet very rarely do I hear about people being “run from among us” nowadays. So we know that they’re here, yet we continue to let them do their work? They’re not gathering info. They’re making us fall apart. And my survey says that they’re being highly successful. So if you can use this to improve your organization, please do so. If not, I’ve said my part. Here’s some qualities to look for, when you are wondering if someone is an agent provacateur:
dropgangs, or the future of darknet markets
Instead of using websites on the darknet, merchants are now operating invite-only channels on widely available mobile messaging systems like Telegram. This allows the merchant to control the reach of their communication better and be less vulnerable to system take-downs. To further stabilize the connection between merchant and customer, repeat customers are given unique messaging contacts that are independent of shared channels and thus even less likely to be found and taken down. Channels are often operated by automated bots that allow customers to inquire about offers and initiate the purchase, often even allowing a fully bot-driven experience without human intervention on the merchant’s side.
Organization ResourcesInstead of the flat hierarchies witnessed with darknet markets, merchants today employ hierarchical structures again. These consist of procurement layer, sales layer, and distribution layer. The people constituting each layer usually do not know the identity of the higher layers nor are ever in personal contact with them. All interaction is digital - messaging systems and cryptocurrencies again, product moves only through dead drops.