Security Culture for Digital Resistance: Stop Being A Fucking Liability
15 min read
Listen up, you glorious idiot. Yeah, you. The one reading this on a phone that's currently broadcasting your location to every three-letter agency with a warrant (or hell, even without one anymore - who needs paperwork when you can just buy it from a data broker, right?).
You think you're ready to resist? You think downloading Signal makes you some kind of digital ninja? Bullshit. You're probably still the weak link that'll get everyone around you disappeared into a black site.
This isn't a game. This isn't roleplay. This is about not getting yourself and your entire fucking network thrown into a cage because you were too stupid to follow basic operational security.
What The Fuck Is Security Culture And Why Should You Care
Security culture isn't some edgy conspiracy theory. It's the goddamn practices and behaviors that keep you, your comrades, and your operations from getting infiltrated, surveilled, and ultimately crushed by the state.
Think of it like this: you wouldn't walk into a police station and announce you're planning a protest, right? (Actually, don't answer that - I've seen some truly spectacular levels of stupidity in my time). Then why the hell are you doing the digital equivalent?
The state doesn't need to break your encryption when you're voluntarily handing them everything on a silver platter. Your metadata. Your contacts. Your location history. Your search queries. You're basically rolling out a red carpet for the surveillance apparatus.
Here's the cold hard truth: if you're not practicing security culture, you're not an activist. You're a snitch. An unwitting one, sure, but a snitch nonetheless.
The Five Pillars of Not Getting Fucked
Let me break this down into something even your addled, dopamine-fried brain can process.
1. Compartmentalization (Or: Stop Connecting Everything)
Your personal phone should have NOTHING to do with your activist work. Nothing. Zilch. Zero.
I don't care if it's "convenient." I don't care if you "don't have anything to hide." That's the kind of thinking that lands people in federal prison.
| DO THIS | NOT THAT |
|---|---|
| Separate burner phone for organizing | Using your personal iPhone with your real name |
| Different email addresses for different purposes | One Gmail account for everything |
| Isolated devices for sensitive work | Doing everything on your main laptop |
| Need-to-know information sharing | Group chats where everyone knows everyone |
See the difference? One shows basic fucking intelligence. The other shows you haven't learned anything from the last fifty years of COINTELPRO.
2. Encryption Is Your Friend (But It's Not Magic)
Yes, use Signal. Yes, use PGP for email if you're doing something that actually requires it. But understand this: encryption protects content, not metadata.
They might not know WHAT you said, but they know WHO you talked to, WHEN, and for HOW LONG. That's often enough to build a case. Enough to identify networks. Enough to justify a "investigative stop."
And for fuck's sake, stop using WhatsApp. It's owned by Meta. META. The company that built its entire business model on harvesting human behavioral data. Using WhatsApp for organizing is like using a megaphone in a library while screaming "I'M BREAKING THE LAW."
(Actually that's not a perfect analogy because at least a megaphone doesn't record everyone who hears it and sell that information to advertisers. So maybe it's worse than a megaphone.)
3. Assume Compromise (Because You Probably Are)
Here's a fun fact: your devices are already compromised. Not in the dramatic Hollywood sense with red text scrolling across a black screen, but in the mundane, everyday sense.
Your phone's operating system has backdoors. Your apps are harvesting data. Your ISP is logging everything. Your smart TV is listening (yes, really - look up the Vizio settlement from 2017, they were caught tracking viewing habits across 11 million TVs without consent).
So operate accordingly. Assume everything you do on a connected device is known to the adversary. Plan your actions with that assumption baked in.
The paranoia isn't paranoia if they're actually out to get you.
4. Human Intelligence Is The Weakest Link (That's You)
You can have the most secure setup imaginable. Quantum-proof encryption. Air-gapped devices. Dead drops for communication. And it all means NOTHING if you're careless with your mouth.
Social engineering works because humans are fundamentally stupid. We trust too easily. We overshare. We want to be liked. We want to seem knowledgeable.
Stop it.
Don't talk about operations outside of secure channels. Don't brag about what you're planning. Don't try to impress people with inside knowledge. Don't - and this is a big one - don't talk to journalists without explicit operational security agreements in place.
Journalists will burn you. Not because they're evil (well, some of them are), but because their incentive structure is completely different from yours. They want the story. You want to not get arrested. These goals are not aligned.
5. Digital Hygiene (The Boring Shit That Saves Your Ass)
Update your fucking software. I don't care if the new iOS breaks your favorite app. I don't care if Windows Update takes forty-five minutes. Update. Every. Single. Time.
Those updates often patch security vulnerabilities that intelligence agencies and criminals alike are exploiting. Every day you run outdated software is a day you're unnecessarily vulnerable.
Other digital hygiene basics: - Use a password manager (Bitwarden, KeePass, not fucking LastPass) - Enable two-factor authentication everywhere (use an authenticator app, NOT SMS) - Review app permissions regularly (why does your flashlight app need access to your contacts?) - Clear your browsing data. Regularly. - Use a VPN (but understand its limitations - it's not anonymity, it's encryption in transit)
The Panopticon Isn't A Theory Anymore
Jeremy Bentham designed the panopticon as a prison where guards could watch all prisoners but prisoners couldn't see the guards. The uncertainty of being watched was supposed to enforce compliance.
Foucault wrote about it as a metaphor for modern disciplinary society.
Well, guess what? We're living in the fucking panopticon now. Except instead of a guard tower, we've got: - Cell towers triangulating your position - License plate readers tracking your movements - Facial recognition cameras on every corner - Smart devices listening in your home - Algorithms predicting your behavior before you even act
And the compliance isn't enforced by uncertainty. It's enforced by the certainty that resistance is futile when they know everything about you.
They don't need to break down your door when they can just watch you from inside your own devices.
Counter-Surveillance: Fighting Back
Okay, so we're all thoroughly fucked. What now?
Well, there are tactics. Not perfect ones. Not ones that'll make you invisible. But ones that'll make you a harder target.
Operational Security Basics
- Change your routines. Don't leave home at the same time every day. Don't take the same route. Predictability is vulnerability.
- Leave your phone at home. For certain activities, the best security measure is not bringing a tracking device at all. Yes, this is inconvenient. Yes, it's worth it.
- Use cash. Digital payments create records. Records create trails. Trails lead to arrests. Cash leaves no digital footprint.
- Meet in person, away from cameras. Yes, this requires actual physical effort. Yes, it's harder than a Zoom call. No, there's no alternative if you actually care about security.
- Practice need-to-know. Nobody needs to know everything. Compartmentalize information. Your network should look like a star, not a web - if one person flips, they can only flip on you, not on everyone else.
Technical Countermeasures
- Faraday bags for when you need to truly isolate a device
- Burner phones purchased with cash, registered to fake information
- Tails OS for sensitive computer work (it routes everything through Tor and leaves no trace)
- Mesh networks for local communication that doesn't rely on infrastructure
- Dead drops - both physical and digital - for asynchronous communication
None of this is perfect. None of this makes you safe. But it makes you safer than the idiot scrolling through Instagram while discussing operational details in a Telegram group chat.
(Yes, I know people who've done exactly that. No, I won't name them. Yes, they got caught.)
The Informant Problem
Let's talk about something nobody wants to discuss: informants.
The FBI has over 100,000 confidential informants in the United States alone. One hundred thousand. That's not a typo. They're everywhere. In activist groups. In labor unions. In religious organizations. In your fucking book club, probably.
Informants aren't always coerced. Often they're volunteers. People who believe they're "helping prevent violence." People who want to feel important. People who got caught with something and are looking to cut a deal.
Red flags to watch for: - Someone who's overly interested in operational details - Someone pushing for more "direct action" than the group is comfortable with - Someone with an inconsistent backstory - Someone who's always available, never has work conflicts - Someone who tries to isolate individuals from the group - Someone recording conversations without consent (yes, this still happens)
If you spot these behaviors, don't confront the person. Don't make accusations. Document everything. Share concerns with trusted comrades. And if the evidence is strong enough, remove the person from the network.
Quietly. Safely. Without drama.
Legal Considerations (Not Legal Advice, I'm Not Your Lawyer)
Here's what happens when you get caught:
- They'll offer you a deal. It's always a bad deal.
- They'll lie to you. It's legal for them to lie.
- They'll say your friends already flipped. They probably haven't, but you don't know that.
- They'll keep you in isolation until you break.
The only winning move is not to get caught in the first place.
But if you do get caught: - Shut the fuck up. Invoke your right to remain silent. Then remain silent. - Don't sign anything. Not a statement. Not a deal. Nothing. - Demand a lawyer. Then shut up until the lawyer arrives. - Trust no one. The person in the next cell might be working for them.
Remember: you can't be flipped if you're already dead. That's not a threat. That's a reminder that some things are worth dying for. And if you're not prepared for that possibility, maybe you shouldn't be doing this work.
The Mental Health Factor
Nobody talks about this part. The constant vigilance. The paranoia. The knowledge that your government considers you an enemy.
It wears on you. It fractures relationships. It creates trust issues that bleed into every corner of your life.
You need support. You need community. You need to remember why you're doing this in the first place.
Resistance isn't just about tactics. It's about sustainability.
Burnout helps the state more than any informant ever could. A burned-out activist is an inactive activist. An inactive activist is a former activist. And a former activist might just become an informant if the pressure gets high enough.
Take care of yourself. Take care of your comrades. Build something worth protecting.
Final Thoughts (If You've Made It This Far)
Security culture isn't optional. It's not a nice-to-have. It's not something you can skip because it's "too much work."
Either you're serious about resistance, or you're not. If you're not, that's fine. Go back to scrolling. Go back to posting angry emojis. Go back to feeling like you're making a difference while changing absolutely nothing.
But if you ARE serious, then act like it.
Protect yourself. Protect your comrades. Protect your operations.
The state has unlimited resources. Unlimited time. Unlimited patience. They can afford to wait for you to make a mistake.
You can't.
One mistake. That's all it takes. One unencrypted message. One careless conversation. One compromised device.
Don't be the mistake.
Don't be the liability.
Don't be the reason your entire network ends up in handcuffs.
Be better. Be smarter. Be fucking dangerous.
Sources And Further Reading
- Security Culture: A Handbook for Activists - CrimethInc. (2008). The classic text on operational security for direct action.
- The Art of Invisibility - Kevin Mitnick (2017). Former hacker turned security consultant explains surveillance and countermeasures.
- Sandworm - Andy Greenberg (2019). Chronicles Russian cyber warfare and the reality of state-level hacking capabilities.
- Permanent Record - Edward Snowden (2019). The NSA whistleblower's account of the surveillance apparatus from the inside.
- FBI Counterintelligence Resources - Public FBI training materials on informant handling and surveillance techniques.
- Vizio Settlement - FTC v. Vizio Inc. (2017). $2.2 million settlement for smart TV surveillance without consent.
- COINTELPRO Papers - Ward Churchill and Jim Vander Wall (1990). Historical documentation of FBI infiltration of activist groups.
- Dark Matters: On the Surveillance of Blackness - Simone Browne (2015). Academic analysis of surveillance and racial capitalism.
- The Panopticon Writings - Jeremy Bentham (1791). Original architectural design for total surveillance.
- Discipline and Punish - Michel Foucault (1975). Philosophical analysis of surveillance and social control.
This article is for educational purposes only. The author is not responsible for how you use this information. The author is also not a lawyer and this is not legal advice. If you get arrested, that's on you. Stay safe. Stay dangerous. Stay free.
Member discussion