Anarchy Amerika
Search the documents.
Find relevant information.
Expose corruption.
Destroy for win.

On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files,  over five million e-mails from the Texas headquartered  “global  intelligence” company Stratfor. The e-mails date between July  2004 and  late December 2011. They reveal the inner workings of a company  that  fronts as an intelligence publisher, but provides confidential   intelligence services to large corporations, such as Bhopal’s Dow   Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government   agencies, including the US Department of Homeland Security, the US   Marines and the US Defence Intelligence Agency. The emails show   Stratfor’s web of informers, pay-off structure, payment laundering  techniques and psychological methods.

Search the documents.

Find relevant information.

Expose corruption.

Destroy for win.

On Monday February 27th, 2012, WikiLeaks began publishing The Global Intelligence Files, over five million e-mails from the Texas headquartered “global intelligence” company Stratfor. The e-mails date between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defence Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment laundering techniques and psychological methods.

Anonymity/Security: A new guide to computer security for anarchists
Zine Library
We present a new guide on the ins and outs of computer anonymity and security.
From the introduction:
Every day we see new evidence of the State’s surveillance apparatus at work. Our cell phones are tracking devices; RFID chips threaten to make privacy impossible; surveillance cameras are on every street corner. Each new technological development brings with it a new encroachment into our lives and a new tool in the State’s arsenal of repression. With this techno-development increasing at an exponential rate, it is difficult not to feel lost, paranoid, or caged. We live in panopticon - even if the State’s eyes cannot be on us all at once, we can never be sure that we are not being watched at any given moment. This psychic omnipresence, coupled with the very real evidence of the surveillance apparatus’s repression of agents of revolt, creates paralysis. The threat of handcuff, court room, and jail cell stay our hand.
It is impossible to ever have perfect security or foolproof anonymity. The structure of the world as a massive prison prevents our movements from ever being invisible and our actions from ever being risk-free. Our situation is far from perfect - in fact, it is frightening - but if we allow the State’s surveillance to deter our revolt, we ensure the impossibility of a world free of domination. We can reject paranoia and employ strategic anonymity that seeks to interfere with surveillance and repression wherever possible. While we cannot become invisible, we can evade their eyes where it counts.
This project is the product of research and self-education. It grew from our desire to learn how to increase our digital anonymity and security and expanded from there. Hours of wading through manuals and websites full of technological jargon and coming back with only a basic idea of how to practically apply any of it made the necessity of an accessible, comprehensive guide apparent.
Our intention with this guide is to provide a basic outline of the following: specific ways in which you can be digitally identified and how to anonymize your internet presence; how to secure your computer and make your files or hard drive (theoretically) inaccessible to prying eyes; how to control and effectively dispose of the records of activity your computer stores; how to protect your computer from malicious processes and programs; how to more securely use email; and other issues related to these subjects.
This guide is designed for beginners and focuses on the concrete skills; we know those were the two things we hoped for in the guides we read when we started our research. We wrote this from a subjective point-of-view; it is for our “likes,” our friends we hold dear and those we have not yet met. We’re poor, so most of these tools are free, and most of what isn’t can be pirated. We hate technoindustrial society, so we refuse to engage in the techno-fetishism of most computer guides; we refuse to speak of any technology as “liberating” and reject idea that the internet is democratic - both because we hate alienating technologies and because we hate democracy.
We are not experts; we may be misinformed about aspects of security and anonymity and this is why with every concept, program, or activity explained, we provide an extensive list of resources for further independent research, which we encourage and recommend. The rate at which technology develops also makes information quickly outdated or impractical, so staying up to date on developments is essential to any understanding of technology and how it affects us. We know computers can be overwhelming and frustrating to learn about, but we are not hackers and, with some concerted effort, we went from a below-average knowledge of computers to a working knowledge of what affects us most about them. Anyone with some time and dedication can figure this all out, and we hope that this guide can be an aid in such research.
Future editions of this guide may be compiled as we learn more and expand our knowledge of computers and associated technology.
Toward the generalization of tactical knowledge,Anarchists

Anonymity/Security: A new guide to computer security for anarchists

Zine Library

We present a new guide on the ins and outs of computer anonymity and security.

From the introduction:

Every day we see new evidence of the State’s surveillance apparatus at work. Our cell phones are tracking devices; RFID chips threaten to make privacy impossible; surveillance cameras are on every street corner. Each new technological development brings with it a new encroachment into our lives and a new tool in the State’s arsenal of repression. With this techno-development increasing at an exponential rate, it is difficult not to feel lost, paranoid, or caged. We live in panopticon - even if the State’s eyes cannot be on us all at once, we can never be sure that we are not being watched at any given moment. This psychic omnipresence, coupled with the very real evidence of the surveillance apparatus’s repression of agents of revolt, creates paralysis. The threat of handcuff, court room, and jail cell stay our hand.

It is impossible to ever have perfect security or foolproof anonymity. The structure of the world as a massive prison prevents our movements from ever being invisible and our actions from ever being risk-free. Our situation is far from perfect - in fact, it is frightening - but if we allow the State’s surveillance to deter our revolt, we ensure the impossibility of a world free of domination. We can reject paranoia and employ strategic anonymity that seeks to interfere with surveillance and repression wherever possible. While we cannot become invisible, we can evade their eyes where it counts.

This project is the product of research and self-education. It grew from our desire to learn how to increase our digital anonymity and security and expanded from there. Hours of wading through manuals and websites full of technological jargon and coming back with only a basic idea of how to practically apply any of it made the necessity of an accessible, comprehensive guide apparent.

Our intention with this guide is to provide a basic outline of the following: specific ways in which you can be digitally identified and how to anonymize your internet presence; how to secure your computer and make your files or hard drive (theoretically) inaccessible to prying eyes; how to control and effectively dispose of the records of activity your computer stores; how to protect your computer from malicious processes and programs; how to more securely use email; and other issues related to these subjects.

This guide is designed for beginners and focuses on the concrete skills; we know those were the two things we hoped for in the guides we read when we started our research. We wrote this from a subjective point-of-view; it is for our “likes,” our friends we hold dear and those we have not yet met. We’re poor, so most of these tools are free, and most of what isn’t can be pirated. We hate technoindustrial society, so we refuse to engage in the techno-fetishism of most computer guides; we refuse to speak of any technology as “liberating” and reject idea that the internet is democratic - both because we hate alienating technologies and because we hate democracy.

We are not experts; we may be misinformed about aspects of security and anonymity and this is why with every concept, program, or activity explained, we provide an extensive list of resources for further independent research, which we encourage and recommend. The rate at which technology develops also makes information quickly outdated or impractical, so staying up to date on developments is essential to any understanding of technology and how it affects us. We know computers can be overwhelming and frustrating to learn about, but we are not hackers and, with some concerted effort, we went from a below-average knowledge of computers to a working knowledge of what affects us most about them. Anyone with some time and dedication can figure this all out, and we hope that this guide can be an aid in such research.

Future editions of this guide may be compiled as we learn more and expand our knowledge of computers and associated technology.

Toward the generalization of tactical knowledge,
Anarchists

Eight Simple Steps towards Revolution
From Crimethinc
Over the winter, the social momentum that picked up with the occupation of Zuccotti Park has predictably cooled. We can be sure that conflict will intensify again soon, whether with the coming of spring or later; if overseas examples are any indication, we should anticipate new waves of unrest, each   sweeping in new sectors of the population. In hopes of helping to   prepare for the next phase, we present an eight-point program distilled   from the experiences of the last several months.
Once again, please forward this and print out copies to distribute in your community!
http://news.infoshop.org/article.php?story=20120210133934615

Eight Simple Steps towards Revolution

From Crimethinc

Over the winter, the social momentum that picked up with the occupation of Zuccotti Park has predictably cooled. We can be sure that conflict will intensify again soon, whether with the coming of spring or later; if overseas examples are any indication, we should anticipate new waves of unrest, each sweeping in new sectors of the population. In hopes of helping to prepare for the next phase, we present an eight-point program distilled from the experiences of the last several months.

Once again, please forward this and print out copies to distribute in your community!

http://news.infoshop.org/article.php?story=20120210133934615

The Interrupters (2011)
One of the best documentaries from the last year that has no hollywood recognition. Ceasefire is a violence interrupting organization that seeks to end the daily shooting deaths around chicago. Ex-gang members formed Ceasefire as a direct community response to the terrifying escalation of teenage gun play. In cities across Amerika youths experience a life they believe will not reach 30. The film follows community organizers who narrate about their lives in our violent country and through directly engaging in these communities we see how people result to violence ,not by ‘nature’, but based on the environment they grew up in. A must see for anyone that doesn’t believe people are inherently good to each other and deserve a constructive second chance. The film does fall short by not analyzing the structural and systematic racism of Amerika which fosters destitution and violence as opposed to actual human dignity.

The Interrupters (2011)

One of the best documentaries from the last year that has no hollywood recognition. Ceasefire is a violence interrupting organization that seeks to end the daily shooting deaths around chicago. Ex-gang members formed Ceasefire as a direct community response to the terrifying escalation of teenage gun play. In cities across Amerika youths experience a life they believe will not reach 30. The film follows community organizers who narrate about their lives in our violent country and through directly engaging in these communities we see how people result to violence ,not by ‘nature’, but based on the environment they grew up in. A must see for anyone that doesn’t believe people are inherently good to each other and deserve a constructive second chance. The film does fall short by not analyzing the structural and systematic racism of Amerika which fosters destitution and violence as opposed to actual human dignity.

If an agent knocks: What to do if you or your organization are targeted by federal law enforcement.
Read this before involving yourself in any from of activism. The federal government does not want us to succeed and has a history of repeatedly targeting progressive organizations. Raids, threats, arrest, detention, and general paranoia should be expected when becoming an activist or organizer. Prepare yourself to outsmart them so if they do come you have no incriminating evidence. We can never be too prepared or ready and encounters with pig (law) enforcement should be understood as inevitable.
http://ccrjustice.org/ifanagentknocks

If an agent knocks: What to do if you or your organization are targeted by federal law enforcement.

Read this before involving yourself in any from of activism. The federal government does not want us to succeed and has a history of repeatedly targeting progressive organizations. Raids, threats, arrest, detention, and general paranoia should be expected when becoming an activist or organizer. Prepare yourself to outsmart them so if they do come you have no incriminating evidence. We can never be too prepared or ready and encounters with pig (law) enforcement should be understood as inevitable.

http://ccrjustice.org/ifanagentknocks

Ecodefense is a bit outdated, 1993, like sabotage it is reminiscent of the 1990’s idealism of direct action. A source of basic knowledge that should be taken in stride. Not everything applies to current society so read with reservation. Here is the first paragraph introduction:
Ecodefense is a historical artifact. It be argued that it is  the most controversial environmental book ever published; more  importantly, though, it is a key exhibit in the legal history of freedom  of the press in the United States. The First Amendment to the United  States Constitution was ratified in 1791. It reads in part, “Congress  shall make no law … abridging the freedom of speech, or of the press.”  That enshrined freedom of the press and speech sets the United States  of America apart from all other nations. No other country so jealously  defends the right of its citizens to speak and publish controversial  ideas.

Ecodefense is a bit outdated, 1993, like sabotage it is reminiscent of the 1990’s idealism of direct action. A source of basic knowledge that should be taken in stride. Not everything applies to current society so read with reservation. Here is the first paragraph introduction:

Ecodefense is a historical artifact. It be argued that it is the most controversial environmental book ever published; more importantly, though, it is a key exhibit in the legal history of freedom of the press in the United States. The First Amendment to the United States Constitution was ratified in 1791. It reads in part, “Congress shall make no law … abridging the freedom of speech, or of the press.” That enshrined freedom of the press and speech sets the United States of America apart from all other nations. No other country so jealously defends the right of its citizens to speak and publish controversial ideas.

CLASS WAR: A Citizen’s Guide to  Insurrectionary Warfare is a handbook to aid you in demolishing  government. With 588 pages and hundreds of detailed diagrams, it teaches  you all the skills necessary for effecting the continual struggle for  individual sovereignty.
http://www.lulu.com/product/ebook/class-war-a-citizens-guide-to-insurrectionary-warfare/17401579

CLASS WAR: A Citizen’s Guide to Insurrectionary Warfare is a handbook to aid you in demolishing government. With 588 pages and hundreds of detailed diagrams, it teaches you all the skills necessary for effecting the continual struggle for individual sovereignty.

http://www.lulu.com/product/ebook/class-war-a-citizens-guide-to-insurrectionary-warfare/17401579

Organizing for power, organizing for change.
Action
The Art & Science of Actions: Shutting Things Down to Open Things Up
https://organizingforpower.wordpress.com/action/

Organizing for power, organizing for change.

Action

The Art & Science of Actions: Shutting Things Down to Open Things Up

https://organizingforpower.wordpress.com/action/

Dumping Handbooks on Sabotage. Please read carefully (if anything ‘without a trace’) so you don’t get caught. Keep in mind that the feds are watching us now and forever. Some of these tactics do not apply to our current state rule. To be a successful revolution we need a diversity of tactics with popular support being the most influential form of POWER. It is all about gaining power by the people which means we have to be careful in creating a welcoming image. Resistance will eventually need direct action against the state and corporations but chose your target with good strategy. Ask yourself: Will the public immediately identify my cause? Is the action easily understood? Read the next article on direct action logic to better prepare your strategy. Set a goal (dismantling capitalism). Pick target (Bank of America). Strategy (Shut the mother fucker down). Tactic (?). Be safe comrades, Don’t talk to anyone. Need to know basis will keep you safe from snitches. If you read this you are now being watch by the federal government and you might as well consider yourself a terrorist.
https://blackcatsabotage.wordpress.com/2011/07/19/download-the-entire-handbook/

Dumping Handbooks on Sabotage. Please read carefully (if anything ‘without a trace’) so you don’t get caught. Keep in mind that the feds are watching us now and forever. Some of these tactics do not apply to our current state rule. To be a successful revolution we need a diversity of tactics with popular support being the most influential form of POWER. It is all about gaining power by the people which means we have to be careful in creating a welcoming image. Resistance will eventually need direct action against the state and corporations but chose your target with good strategy. Ask yourself: Will the public immediately identify my cause? Is the action easily understood? Read the next article on direct action logic to better prepare your strategy. Set a goal (dismantling capitalism). Pick target (Bank of America). Strategy (Shut the mother fucker down). Tactic (?). Be safe comrades, Don’t talk to anyone. Need to know basis will keep you safe from snitches. If you read this you are now being watch by the federal government and you might as well consider yourself a terrorist.

https://blackcatsabotage.wordpress.com/2011/07/19/download-the-entire-handbook/

TACTICAL URBANISM - Definition
Improving the livability of our towns and cities commonly starts  at the street, block, or building scale. While larger scale efforts do  have their place, incremental,  small scale improvements are  increasingly seen as a way to stage more substantial investments. This  approach allows a host of local actors to test new concepts before  making substantial political and financial commitments. Sometimes  sanctioned, sometimes not, these actions are commonly referred to as  “guerilla urbanism,” “popup urbanism,” “city repair,” or “D.I.Y.  urbanism.” For the moment, we like “Tactical Urbanism,” which is an  approach that features the following five characteristics:
A deliberate, phased approach to instigating change; 
The offering of local solutions for local planning challenges; 
Short-term commitment and realistic expectations; 
Low-risks, with a possibly a high reward; and 
The development of social capital between citizens and the  building of organizational capacity between public-private institutions,  non-profits, and their constituents. 
http://www.ctdatahaven.org/know/index.php/File:Tactical_Urbanism_Guide_2011_sml.pdf

TACTICAL URBANISM - Definition

Improving the livability of our towns and cities commonly starts at the street, block, or building scale. While larger scale efforts do have their place, incremental, small scale improvements are increasingly seen as a way to stage more substantial investments. This approach allows a host of local actors to test new concepts before making substantial political and financial commitments. Sometimes sanctioned, sometimes not, these actions are commonly referred to as “guerilla urbanism,” “popup urbanism,” “city repair,” or “D.I.Y. urbanism.” For the moment, we like “Tactical Urbanism,” which is an approach that features the following five characteristics:

  • A deliberate, phased approach to instigating change;
  • The offering of local solutions for local planning challenges;
  • Short-term commitment and realistic expectations;
  • Low-risks, with a possibly a high reward; and
  • The development of social capital between citizens and the building of organizational capacity between public-private institutions, non-profits, and their constituents.

http://www.ctdatahaven.org/know/index.php/File:Tactical_Urbanism_Guide_2011_sml.pdf

The Battle of Algiers (1966)

A historical fiction with a cast that actually participated in the revolution. Documenting the Algerian guerrilla war for independence against the French colonist from 1954-1962. An excellent film that demonstrates the repression of colonial life and what lengths a community will go to free themselves of oppressive rulers.

Start learning the basics from those who have decades of experience. The tactics used by the C.I.A to topple governments around the world were developed from the guerrilla tactics of the Algerian revolution 1954. The Algerian guerrilla war against the French became a template for state governments to combat the growing threat of insurgency. Colonist governments began to topple based on strategies of guerrilla warfare targeting institutions at random clandestinely. The French government would later train other state governments in what to except and how to combat this new style of war. For the last 60 years the C.I.A has used this information to understand the strategy of guerrilla war but also to implement such tactics to overthrow democratically elected governments worldwide. 
CIA Sabotage Manual
In the early 1980s, the right-wing Reagan U.S. Government was  determined to  undermine or overthrow the leftist government of  Nicaragua. 
As part of this  campaign, the Central Intelligence Agency produced a  small illustrated booklet  in both Spanish and English designed to  destabilise the Nicaraguan Government  and economic system. It instructed disaffected individuals on acts of  sabotage they could carry out to this end.
http://crapaganda.com/cia/cia-sabotage-manual/
Sabotage.
The conscious withdrawal of the workers industrial efficiency. Pamphlet by Industrial Workers of the World.
by Elizabeth Gurley Flynn
http://www.zinelibrary.info/sabotage
Be careful and prepared!

Start learning the basics from those who have decades of experience. The tactics used by the C.I.A to topple governments around the world were developed from the guerrilla tactics of the Algerian revolution 1954. The Algerian guerrilla war against the French became a template for state governments to combat the growing threat of insurgency. Colonist governments began to topple based on strategies of guerrilla warfare targeting institutions at random clandestinely. The French government would later train other state governments in what to except and how to combat this new style of war. For the last 60 years the C.I.A has used this information to understand the strategy of guerrilla war but also to implement such tactics to overthrow democratically elected governments worldwide. 

CIA Sabotage Manual

In the early 1980s, the right-wing Reagan U.S. Government was determined to undermine or overthrow the leftist government of Nicaragua.

As part of this campaign, the Central Intelligence Agency produced a small illustrated booklet in both Spanish and English designed to destabilise the Nicaraguan Government and economic system.
It instructed disaffected individuals on acts of sabotage they could carry out to this end.

http://crapaganda.com/cia/cia-sabotage-manual/

Sabotage.

The conscious withdrawal of the workers industrial efficiency. Pamphlet by Industrial Workers of the World.

by Elizabeth Gurley Flynn

http://www.zinelibrary.info/sabotage

Be careful and prepared!

Born In Flames (1983)- directed by Lizzie Borden

10 year post social-democratic revolution the plight of women has not changed. A group of women form the Women’s Army to raise awareness and revolt against the hetero/homo white normative of Amerikan society. Take notes. Wake up. Revolt!

http://stagevu.com/video/tfxaomdzrfds

http://www.imdb.com/title/tt0085267/

The Century of the Self   (2002)  is an award winning British television documentary film. It focuses on how Sigmund Freud, Anna Freud, and Edward Bernays influenced the way corporations and governments have thought about,‭ dealt with, and controlled ‬people.

Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! Destroy Capitalism! FUCKIN’ NOW!