Security & Counter-

Information Against the Police State

Revised & Updated: New Surveillance Technology & Techniques New Section on Informant & Infiltration Operations 1 Contents Big Brother is watching, more than 2009 edition; Vancouver, Canada/Coast Salish Territory ever before 1.Introduction______3 In countless ways, surveillance is 2. Surveillance 3 emerging as the dominant way the 3. Security 3 modern world organizes itself. 4. Principles of Surveillance 3 5. Physical Surveillance______4 Britain now has an estimated 4.2 million Operator's & Vehicles 4 CCTV cameras—one for every 14 citizens. Fixed Surveillance 4 People in central London are now caught on Mobile Surveillance 4 camera about 300 times a day. Four Phases of Mobile______5 Other Forms 5 Surveillance is a condition of modernity, 6. Technical Surveillance 5 integral to the development of the nation- Telecommunications 5 state and capitalism... Listening Devices______6 Parabolic Mics 6 More than ever before, our lives are visible Video Cameras______7 to others, from government agencies and security services to the owners of the Still Photography 7 websites we surf and the stores where we Tracking Devices 7 shop. They track us in public, in Night Vision & Thermal 7 workplaces and online, compiling our Biometrics______8 personal information in massive databases UAV's 8 and sorting us into categories of risk, value Satellite 8 and trustworthiness. 7. Surveillance Detection______9 Physical Surveillance 9 CCTV cameras are just one of their tools. Technical Surveillance______10 Others include Security Against Technical 10 identification (RFID) chips, GPS location 8. Surveillance and Evasion______13 trackers, website cookies, facial recognition software and store loyalty cards. Computer 9. Informants & Infiltrators 13 programs used by security services can Dealing with/______15 monitor and analyze billions of phone calls 10. FBI Cointel-Pro______16 and e-mails in real time. We even make it Cointel-Pro Techniques 16 easier for our trackers by willingly Cointel-Pro Case Studies______18 disclosing pieces of our lives on social 11. Case Studies of Informants networking sites like Facebook or in online and Infiltrators______18 contests & questionnaires. 12. Security Guidelines______19 In one form or another, surveillance has always been a part of human society. What's new is computer technology that "Those in authority fear the has made it possible to integrate vast and mask for their power partly diverse bits of information. As well, our resides in identifying, stamping post-9/11 obsession with eliminating risk and cataloguing: in knowing who has produced an architecture of mass you are... our masks are not to surveillance in which everyone is treated as conceal our identity but to reveal a suspect. it...” Don Butler, “Big Brother is watching, more than ever Text on inside of 9,000 masks before”, Vancouver Sun, Feb. 3, 2009 distributed at the Carnival Against Capitalism, London, June 1999 And for those who really are 'suspects', read on...

2 cameras, in stores, banks, malls, offices, schools, transit, streets 1. Introduction & intersections. In rural areas, physical surveillance is more often Security is vital to the success & survival of the necessary due to the lack of telecommunications, roads, etc. resistance movement. This is because we have an enemy who Low population densities also serve to identify surveillance actively works to undermine, neutralize, & ultimately destroy operators as ‘outsiders’. For these reasons, physical us. Failure to remain aware of security concerns can mean the surveillance in rural areas often requires long-range observation difference between victory or defeat, freedom or imprisonment, (by ground teams, aircraft, or satellite in high priority life or death. Not only for yourself, but others around you. situations). In some cases, police in military-style camouflage Information gathere