Security Culture: What it Is, Why We Need It, and How We Implement It



The bottom line is this: Never talk to others about illegal activity unless you yourself are currently engaging with them in it. — Jenny Esquivel [1]
In the edited volume Life During Wartime, Jenny Esquivel’s chapter ‘Building Conspiracy: Informants in the Case of Eric McDavid’ referenced “the classic zine”[2] entitled above. From it, she drew “four common examples of security violating behaviors” as well as “a list of topics which are inappropriate for conversation”[3] for activists engaged in illegal activity. Desiring to read the whole thing, I hunted down an online copy. For a text version see here, and for a printable pamphlet see here. The pamphlet is courtesy of the Tolerated Identity zine library, which has other anarchist and direct action material. The text version and the pamphlet are not identical, and both leave something to be desired in presentation. The material presented here could be considered a synthesis of both. Those with the patience can compare with the originals (the differences are minimal). The zine itself is effectively split into two parts, dealing with ‘Activism and State Repression’ and ‘Everything You Ever Wanted To Know About Informers and Infiltrators’. Esquivel asserts that the “edition referenced was revised in 1999”[4] but, strangely, it does not appear in her endnotes. In contrast, the zine edition here is stated to be the third, last revised in 2001.
In her chapter, Esquivel states upfront that “[i]nformants are at the heart of the U.S. judicial system”[5]. What are informants? In general, they are people “paid to lie”[6] by enforcement agencies. Esquivel demonstrates through McDavid’s case that they can be “incredibly skilled at manipulation”[7]. Informants encourage people to incriminate themselves; everything they are doing is intended to end with convictions. Informants aren’t necessarily paid, however. They can be people who are under threat of conviction themselves—unless they cooperate and “flip”. Esquivel consequently stresses “adherence to the most basic of Security Culture principles: never talk about past actions”[8]. Informants are there to sniff out any illegal activity, past, present, or future. Keeping your mouth shut, even to those whom once performed the actions with you, is the best defense.
You can never know for sure whether someone is an informant (at the time). “There is no ‘test’ for informants—the government can and will do anything in their pursuit of a conviction”[9], and, as Esquivel notes, “[m]isidentifying someone as an informant is an incredibly serious error”[10]. “That is why it is essential that nothing be reported as ‘fact’ until there is undeniable documentation about a person’s status as a cooperator (a plea agreement, for instance)”[11]. The information presented below, therefore, is intended to provide a guide on how activists and others might handle the problem of infiltrators and informants. In no way, shape, or form should it be considered an infallible method for unmasking paid or coerced informants, or professional infiltrators. Instead of relying on such procedures, “[s]ecurity culture needs to be revived, respected, and deeply embedded”[12]. A conspiracy of silence is a conspiracy of equals—one difficult to crack.
In light of this, all of the information below is offered with a very important caveat: there is almost no such thing as a fool-proof snitch test, and none of the observations below should be considered as such.[13]


This handbook is the third edition of what we has been an evolving and growing document dealing with security issues and Canadian activism. We would like to say a big thanks to the Collective Opposing Police Brutality in Montreal for editing some of the text of the original pamphlet and adding so many great examples to the Informants and Infiltrators section. We have replicated many of their changes in this edition. Thanks also goes out to Eric Drooker whose artwork we used throughout this pamphlet.
For more information or to make contributions to this document—please email
Third edition—prepared November 2001. [Edited by Point Zero, February 2018.]


Resistance has been on the rise for the past few years, with activists adopting more and more  effective tactics for fighting back. Our increased activity and effectiveness has meant that the  RCMP, FBI, and local police have continued to escalate their activities against us. As well, the events of September 11th and ensuing state hysteria are no small footnote to the way that our radical and revolutionary movements have and will be targeted by repressive state forces. If we want our direct action movement to continue, it is imperative we start tightening our security and taking ourselves more seriously. Now is the time to adopt a security culture. Good security is certainly the strongest defense we have.
This is a handbook for the Canadian activist who is interested in creating and maintaining security awareness and culture in the radical movements. We are always looking for contributions—so please feel free to email with any images or text you think belong in a handbook such as this. This is the third edition of this zine that we have put out in order to add and improve on the original text (thanks for the work of the Collective Opposing Police Brutality in Montreal for their help). There will be future editions of this handbook so keep putting forward suggestions to us. We hope that you will put the material contained within to good use. Now more than ever is the time to act!

Part One


This pamphlet has essential information for anyone associated with groups advocating or using economic disruption or sabotage, theft, arson, self-defense from police or more militant tactics. The advice that follows also applies to anyone associated with groups practicing civil disobedience, especially since people often work in several groups at the same time and gossip travels freely between them. Even if you’ve never expressed your politics by doing property damage, pitching cobblestones, or getting arrested for civil disobedience; even if you think you have nothing to hide, these guidelines are presented here to enhance your personal safety as well as the overall effectiveness of our movements.
The simple reality is that governments in industrialized countries target groups that advocate economic sabotage and groups that don’t, movements that are militant and movements that are markedly pacifist. The government’s security machinery serves the elitist political and economic objectives of capitalism. There are over 250 political prisoners in Canada and the US that can testify to this from first-hand experience. By adopting a security culture, we can limit or  neutralize counter-intelligence operations meant to disrupt our political organizing, be it  mainstream or underground. Peasant-rebels; communards; liberationists; abolitionists; labor organizers; revolutionaries; from large uprisings challenging the entire political structure, to isolated environmental and social struggles, people have constantly worked to create a better world. The response of government has always been repression to preserve the status quo. Historically, government surveillance and harassment has increased relative to the ascendancy of direct action movements. Minimizing the destructiveness of political repression requires that we implement and promote a security culture within our movements.
The first step in recognizing security risks in a community is working towards creating a security culture. Below we have compiled some relevant material that should be used in conducting security workshops and educating activists that you work with. As our direct action movement becomes more effective, government harassment will only increase. To minimize the destructiveness of this government harassment, it is imperative that we create a “security culture” within our movement. Violations of security culture include behavior is inappropriate because it intensifies government harassment, jeopardizes the freedom of other activists, and destroys the trust within the movement.


It was not that long ago that discussions about security culture were seen as not relevant to the vast majority of community organizers. As long as one didn’t “break the law” it was assumed that social freedoms in North America and Europe would allow for the expression of dissent without a rise in repression. A number of events have conspired since the late nineties to change the landscape of organizing considerably.
New legislation—the PATRIOT Act in the US and Bill C-36 in Canada—which have been sold to the public as required to fight the specter of terrorism in a post-911 world, serve double-duty in giving the state new laws with which to crack down on internal dissent. A rise in state-hyped racist hysteria has made community organizers from Middle Eastern origins (or other “suspicious” backgrounds) increasingly targets of incarceration without cause, and other abuse at the hands of governments eager to deflect attention from the real issues of failing economies and unpopular wars. In many countries, governments have enacted laws to make it illegal to work with overseas organizations now declared “terrorist”—putting at risk communities who have worked to support liberation fighters around the world.
It follows that those who fight to change the world will be met with resistance by those who do not want it changed. One does not have to participate in extralegal activities to raise the interest of state security forces (whether those be local, regional or national agencies). Security culture must no longer be thought of as merely the domain of those who might break unjust laws—but as something that is part of the organizing toolbox as a mechanism for community self-defense. The guidelines presented here are designed to enhance your personal safety as well as the overall effectiveness of our movements. By adopting a security culture, we can limit or neutralize counter-intelligence operations meant to disrupt our political organizing, be it mainstream or underground.


Creating secure communities is about more than being educated about the state and its security forces. Fundamentally, it means creating working dynamics of respect, education, and inclusion in all our work. Building strong communities that act in solidarity with one another is the best protection against infiltration, disruption, and other conditions of repression.
So what is a security culture? It’s a culture where the people know their rights and, more  importantly, assert them. Those who belong to a security culture also know what behavior compromises security and they are quick to educate those people who, out of ignorance,  forgetfulness, or personal weakness, partake in insecure behavior. This security consciousness  becomes a culture when the group as a whole makes security violations socially unacceptable in the group.


Security culture is about more than just targeting specific behaviors in individuals such as bragging, gossiping, or lying. It is also about checking movement behaviors and practices as a whole to ensure that oppressive practices aren’t feeding into intelligence operations being carried out against our community. Within the histories of groups targeted by COINTELPRO (such as AIM and the BPP), and certainly within the animal rights and environmental movements, there are many example of how oppressive behaviors created conditions ripe for FBI manipulation.
Underlying sexism in some groups has meant that women trying to raise security concerns are not taken seriously, or, (on the other end), are not suspected as informers simply because they are women. A tokenized approach to recruitment has lead socialist organizations to bring in new members who fit their ‘ideal’ of what the working class should be—only have them to later turn out working for the British Home Office.
Racism, sexism, homophobia, and transphobia in the movement spread division that create overall weaknesses and openings easily manipulable by state operatives. Those who feel marginalized by group practices can be more open to sympathetic infiltrators. Obviously, our movements still have a lot of work to do before we have satisfactorily addressed issues of oppression—but what is important here is a recognition that oppressive behaviors feed into poor community security.


The following section was originally written for an audience engaged or on the periphery of extralegal activity, and so focuses on “underground” groups. We would like to add that the same rules apply to discussions about individuals involved in or providing support to groups considered “terrorist” by western governments (but who are, in actual fact, liberation fighters at odds with US foreign policy). It is generally good practice to limit discussion about movement individuals where you are unsure what information about them is “public” knowledge. As community organizers, a lot of activists like to verbally engage with each other and have no trouble spending hours discussing theory, tactics, and strategy. This is an essential part of building our analysis and work, but in some cases this can put ourselves or others in jeopardy.


To begin with, there are certain things that are inappropriate to discuss. These things include:
  • your own or someone else’s involvement with an underground group
  • someone else’s desire to get involved with such a group
  • asking others if they are a member of an underground group
  • your own or someone else’s participation in any action that was illegal
  • someone else’s advocacy for such actions
  • your plans or someone else’s plans for a future action
Essentially, it is a bad idea to speak about an individual’s involvement (past, present or future) with illegal activities, or with activities that may raise the interest of the state (such as advocacy of certain groups or tactics). These are unacceptable topics of discussion regardless of whether they are rumor, speculation, or personal knowledge.
Please note: this is not to say that it is incorrect to speak about direct action in general terms—just be sure that you don’t link individual activists to specific actions or groups. It is perfectly legal, secure, and desirable that people speak out in support of all forms of resistance (though if you’re involved with illegal activity, it is probably best that you don’t openly advocate for breaking the law as that alone can raise state interest in your life).


There are only three times that it is acceptable to speak about specific actions that may be against the law. These are the only situations when it is appropriate to speak about your own or someone else’s involvement or intent to commit an illegal act.
The first situation would be if you were planning an action with other members of your small group (your “cell” or “affinity group”). These discussions should never take place over the Internet (e-mail), phone line, through the mail, or in an activist’s home or car, as these places and forms of communication are frequently monitored. The only people who should hear this discussion would include those who are actively participating in the action. Anyone who is not involved does not need to know and, therefore, should not know.
The second exception occurs after an activist has been arrested and brought to trial. If s/he is found guilty, this activist can freely speak of the actions for which s/he was convicted. However, s/he must never give information that would help the authorities determine who else participated in illegal activities.
The third exception is for anonymous letters and interviews with the media. This must be done carefully and without compromising security. Advice on secure communication techniques can be found at [now defunct].


If you are engaged in activity that is considered illegal, it is best to take a lesson from veteran activists of the direct action movements and only allow a select few to know about your activity. Those few people should consist of only the individuals who you are doing work and actions with AND NO ONE ELSE!
The reason for these security precautions is obvious: if people don’t know anything, they can’t talk about it. When activists who do not share the same serious consequences know who did an illegal direct action, they are far more likely to talk after being harassed and intimidated by the authorities, because they are not the ones who will go to jail. Even those people who are trustworthy can often be tricked by the authorities into revealing damaging and incriminating information. It is safest for all cell members to keep their involvement in the group amongst themselves. The fewer people who know, the less evidence there is in the long run.


In an attempt to impress others, activists may behave in ways that compromise security. Some people do this frequently—they are habitually gossiping and bragging. Some activists say inappropriate things only when they consume alcohol. Many activists make occasional breaches of security because there was a momentary temptation to say something or hint at something that shouldn’t have been said or implied. In most every situation, the desire to be accepted is the root cause.
Those people who tend to be the greatest security risks are those activists who have low self-esteem and strongly desire the approval of their peers. Certainly it is natural to seek friendship and recognition for our efforts, but it is imperative that we keep these desires in check so we do not jeopardize the safety of other activists or ourselves. People who place their desire for friendship over the importance of the cause can do serious damage to our security.
The following are examples of security-violating behaviors:
  • Lying: To impress others, liars claim to have done illegal actions. Such lies not only compromise the person’s security — as cops will not take what is said as a lie — but also hinders solidarity and trust.
  • Gossip & Rumor: Some people think they can win friends because they are privy to special information. These gossips will tell others about who did what action or, if they don’t know who did it, guess at who they think did what actions or just spread rumors about who did it. This sort of talk is very damaging. People need to remember that rumors are all that are needed to instigate an investigation, or even lay charges. New anti-terrorist laws in both Canada and the United States allows state security forces to carry out raids on individuals based on nothing more than hearsay evidence.
  • Bragging: Some people who partake in illegal direct action might be tempted to brag about it to their friends. This not only jeopardizes the bragger’s security, but also that of the other people involved with the action (as they may be suspected by association), and the people who s/he told can be charged as accessories after the fact.
  • Indirect-Bragging: Indirect braggers are people who make a big production on how they want to remain anonymous, avoid protests, and stay “underground.” They might not come out and say that they do illegal direct action, but they make sure everyone within earshot knows they are up to something. They are no better than braggers, but they try to be more sophisticated about it by pretending to maintain security. However, if they were serious about security, they would just make up a good excuse as to why they are not as active, or why they can’t make it to the protest. Concealing sensitive information from even trusted comrades is far better than jeopardizing underground work.


With the above information about security, it should be easier to spot those activists who compromise our movement’s security. So what do we do with people who display these behaviors? Do we shun or expel them from our groups and projects? Actually, no—not for the first security violation, at least.
The unfortunate truth is there are some security-ignorant people in the movement and others who have possibly been raised in a “scene” that thrives on bragging and gossiping. It doesn’t mean these people are bad, but it does mean they need to inform themselves and learn about personal and group security. Even seasoned activists make mistakes when there is a general lack of security consciousness in our groups. And that’s where those of you reading this can help. We must ALWAYS act to inform persons whose behavior breaches security. If someone you know is bragging about doing an action or spreading security-compromising gossip, it is your responsibility to explain to her or him why that sort of talk violates security and is inappropriate.
You should strive to share this knowledge in a manner that encourages the person’s understanding and changes her/his behavior. It should be done without damaging the person’s pride. Show your sincere interest in helping him/her to become a more effective activist. Keep your humility and avoid presenting a superior, “holier-than-thou” attitude. Such an attitude can raise an individual’s defenses and prevent them from listening to and using the advice offered. The goal of addressing these issues with others is to reduce insecure behavior, rather than showing how much more security-conscious you are. Share your concerns and knowledge in private, so that the person does not feel as if they are being publicly humiliated. Addressing the person as soon as possible after the security violation increases effectiveness.
If each of us remains responsible for discussing security information with people who slip up, we can dramatically improve security in our groups and activities. When people recognize that lying, gossiping, bragging, and inappropriate debriefing damages both themselves and others, these behaviors will soon end. By developing a culture where breaches of security are pointed out and discouraged, all sincere activists will quickly understand.


So what do we do with activists who repeatedly violate security precautions even after being informed several times? Unfortunately for them, the best thing to do is to cut them loose. Discuss the issue openly and ask them to leave your meetings, base-camps, and organizations. With law enforcement budgets on the increase and with courts handing down long sentences for political “crimes”, the stakes are too high to allow chronic security offenders to work among us.
By creating a security culture, we have an effective defense against informers and agents who try to infiltrate groups. Imagine an informer who, every time they ask another activist about their activities, receives information about security. It would frustrate the informer’s work. When other activists discovered that she/he continued to violate security precautions after being repeatedly informed, there would be grounds for isolating the person from our groups. And that would be one less informer for us to deal with!


Activists are restless and resistance is on the rise. Some people are adopting radical and confrontational tactics. The more we organize and are effective, the more police forces continue to escalate their activities against us. For direct action movements to continue, we need to consider our security more seriously. Good security should be made one of our strengths.


Recent incidents of repression against activists in British Columbia illuminate the need for grassroots people to understand and practice movement security. Police monitoring, infiltration, and agent provocateurs are routinely used by the state to collect information about our groups, or specific individuals in them, and to subvert our activities. For example, during the APEC hearings, it was revealed that over seventy groups and individuals were monitored before and during the APEC meetings in 1997. A paid industry informant/disruptor was identified at a wilderness action camp in 1999. Provocateurs also targeted some Vancouver activists, trying to convince them to disclose information, and, as well, to break the law. The Canadian security apparatus identifies a number of our groups and activities as a threat to “national security”. People and organizations are widely targeted; even avowed pacifists have been included in surveillance and repressive measures. According to the Canadian Security and Intelligence Service’s (CSIS) annual reports, activities targeted in the late 1990s included: native resistance, environmental & animal rights movements, anti-poverty, anti-globalization, anti police brutality, anti-racist, anarchist, and communist groups. With the rise in militant First Nations’ struggles; covert direct action against corporations; the renewed militancy and strength of popular struggles; and the mass-media’s increasing focus on anarchists and anti-globalization protests, there is also a growing level of police surveillance and repression.
The need for security in our movements is obvious—however, it is incredibly important that we don’t fall into the trap of using our awareness of security issues to shut other people out of our growing movements. One of the key aims of the FBI’s Counter-Intelligence Program  (“COINTELPRO”) operations against the Black Panthers and American Indian Movement (AIM) was to spread distrust and paranoia so that these activists would be reluctant to integrate new people into their struggles. A security culture can exist in a large movement; indeed, it is one indication of a movement’s strength. Arming ourselves with knowledge about how the system works and works against activists is essential in building security culture. The aim of this section is to give a brief run down of the working of domestic intelligence in Canada. In this way, we can better understand how to avoid its traps.


The Canadian Security and Intelligence Service (CSIS) is probably the best known of the “security” agencies that deal with activist “threats”. Its predecessor was the Security Service division of the Royal Canadian Mounted Police (RCMP-SS). In 1984, following the MacDonald Commission on the illegal activities of the RCMP, the civilian spy agency CSIS took over RCMP spy work. That said, the RCMP did not abandon its intelligence gathering, it’s just that CSIS specifically gathers political intelligence. The split from the RCMP allowed the new spy agency to do legally what the Mounties had been doing illegally. At the operations level, the new agency was granted more leeway in terms of public accountability than the Mounties had ever had.
CSIS carries out a wide range of surveillance activities. Since they are not a law-enforcement agency and since their evidence is not used in court, nothing stops them from contravening the few regulations that do exist regarding privacy rights. For example, CSIS is not required to inform people, as is RCMP, ninety days after a wiretap (or bugging) is over. Agents working for CSIS are allowed, with “authorization”, to enter people’s homes to plant bugs, wiretap phones, open mail and look into health, employment, and government records without ever having to
tell a targeted individual what they are doing. The information that they gather is used to build profiles and dossiers (files) on individuals, organizations, networks, etc. This information is also passed on to other wings of the federal security system who are responsible for “law enforcement”, and will then obtain whatever warrants are necessary for legal surveillance (to be brought into court as evidence).
The National Security Investigation Service (NSIS) is the  primary law-enforcement wing in Canada. The NSIS is a section of the Royal Canadian Mounted Police (RCMP). Most major cities across the country have an NSIS office including Vancouver, Edmonton, Montreal, Ottawa, and Toronto. The NSIS maintains a computer database on activists, immigrants, and so called  “terrorists” which is housed in Ottawa. It is believed that the Vancouver NSIS employs between 12 and 18 members. Within NSIS there are several  sub-groups called Team 1, Team 2, Team 3 – etc. that have different investigative targets. They employ informants, infiltrators, personal physical surveillance, electronic surveillance including phone and room “bugs”, and other means of investigation and research.
The RCMP/NSIS also have other resources at their disposal during counter-insurgency operations. “Special O” is a team of surveillance specialists that may be called upon. “Special I” is a penetration team whose specialty is to break into homes, vehicles, and other properties for investigative purposes. They are the team, which, among other things, installs listening devices, photographs building interiors, etc. In a long-running case based in Vancouver, all of these methods of surveillance were used against several Vancouver activists. During the Vancouver investigation, house and vehicle bugs were located by some targeted individuals. The bugs had large battery packs attached to facilitate less frequent battery changes. The NSIS also visited several activists across Canada in an attempt to question them regarding the individuals under investigation.
The Communications Security Establishment (CSE) is an agency of the National Defense/War department, which has been long clouded in secrecy. They collect and process telephone, fax, and computer communications of foreign states, corporations, and individuals. The federal government uses the intelligence gleaned from the data to “support troops” abroad, catch “terrorists” and “further Canada’s economic goals” (what that means is up to them). Although the CSE is not technically allowed to collect the communications of Canadian citizens, it is known to be a partner in the Echelon project—a multinational monitoring operation which sees CSE and counterpart agencies in the United States, Britain, Australia, and New Zealand share intercepted   communications of interest with one another, effectively creating a global surveillance network.
The Terrorist Extremist Section (TES Unit) is British Columbia’s anti-terrorist unit. A joint   Vancouver/Victoria Police Department/RCMP unit called the Organized Crime Agency (formerly the Coordinated Law Enforcement Unit—CLEU), it is believed that this unit employs two or three members only.
Most activists will be intimately familiar with their local police forces. Beware that cops do not only show up in blue uniforms but routinely practice crowd infiltration, and carry out surveillance and investigative activities either alone or jointly with the RCMP depending on the type of case. Watch for them during demonstrations as they like to come along and take photographs and video for the record, and they often appear in crowds as “fellow demonstrators”.
Most Western nation-states follow a model of counter-insurgency developed by a British intelligence expert named [Frank] Kitson who wrote Low Intensity Operations after much field work in the colonies. He broke down movement development into three stages:
  • The Preparatory Phase: is when the movement is small, tends to focus on education, publishing and groundwork.
  • The Non-Violent Phase: is when the movement takes on more of a mass character. Large demonstrations are the norm.
  • In the Insurgency Phase: the movement has taken on a popular character. Perhaps a more assertive, guerrilla component has emerged.
Kitson advises that the primary work of the intelligence agency should occur during the preparatory phase. At this time the movements are most vulnerable. They have not experienced a high degree of repression. They consider talk of security as mere paranoia. As they are not breaking laws they believe that it is safe to organize completely openly. The intelligence agency is therefore able to exploit these conditions and develop detailed dossiers on a wide range of people. The information will be extremely valuable to them later on. Important historical revolutionary activities and groups began as small, serious-minded projects that grew in spite of surveillance and repression. It is therefore important to practice security at all points in the movement’s development. State agents gather more than just “hard evidence”; they are interested in knowing about radicals’ beliefs as well.


It needs to be stressed throughout our movements that no one is under any legal obligation to provide to the police any more information than one’s own name, address and birth date, and this only if one is under arrest. That is it! Saying anything more jeopardizes security. Even answering seemingly insignificant questions can assist the police in developing personality profiles on a range of activists. It may not be “evidence” but it is used to give police “leads” on other suspects and construct intent during legal proceedings. The only principled response to police questioning when under arrest is to say nothing more than your name, birth date, and address. If questioned further you can simply tell them “I have nothing to say except in the presence of my lawyer”.
Police try to control with fear; don’t be intimidated.
Remember—If an agent comes a-knockin’, do no talkin’.

 Part Two


Infiltrators seek information on most radical groups. The return of mass mobilizations and radical actions in anti-globalization, anti-poverty, anti-racism, and anti-police brutality demonstrations, as well as declarations to continue struggling in the streets and underground, has drawn attention from the state’s secret police. More infiltrators will be sent into our ranks to try to bribe, entice, or manipulate individuals. The extent to which they are able to infiltrate our groups depends on our seriousness and responsibility in learning about, promoting, and working within a security culture. Radical movements can learn to better identify covert enemies in our projects. Once identified, appropriate action is needed to undo, contain, or remove the danger. This section is intended to arm you with information on how to spot and deal with informers, infiltrators, and provocateurs in our ranks.


There are actually two kinds of informers. The deliberate informer is an undercover agent on the payroll of government or industry. The second type is the activist-turned-informer. Both kinds try to infiltrate our ranks and are equally dangerous to our movements. Let’s discuss the deliberate informers first. They are often difficult to identify. Informers can be of any age and any profile, but they do have a few discernible methods of operation, or “modus operandi”. These are:
  • The “hang around” type: they are persons who regularly show at meetings and actions but generally don’t get involved. They collect documents, listen to conversations and note who’s who. This observation role is relatively inactive.
  • The “sleeper” type: is similar to the “hang around” modus operandi, except that their absorption of information is used to activate their role at a later date.
  • The “novice” type: presents a somewhat more active role, but confines themselves to less prominent work. They don’t take initiatives, but the work they do is valued. This helps them build trust and credibility.
  • The “super activist” type: they come out of nowhere and all of a sudden, they are everywhere. Whether it’s a meeting, protest, or an action, this person will be right in the thick of it. Keep in mind however that this can also be the mark of a new activist, whose enthusiasm and commitment is so strong that s/he wants to fight the power every minute of the day.
It should be said that with several of these modus operandi, the behavior is hard to distinguish from a sincere new person’s involvement. How do we tell them apart? Well, a planted infiltrator will ask a lot of questions about the direct action groups, individuals, and illegal activities. S/he may suggest targets and volunteer to do reconnaissance as well as take part in the action. Infiltrators also try to build profiles on individuals, their beliefs, habits, friends, and weaknesses. At the same time, infiltrators will shield their true selves from other activists.
Anyone who asks a lot of questions about direct actions isn’t necessarily an infiltrator, but they ARE someone you should be careful with. At the very least, they need to be informed about security issues. New activists should understand that direct action tactics can be risky (though some risks are worth taking!) and that asking a lot of questions endangers people. If the person persists in asking questions, there is a problem and appropriate measures must be taken. Activists who can’t understand the need for security should be shunned and kept away from the movement.
Some types of infiltrators stay in the background and offer material support, other informants may have nothing to do with the group or action, but initially heard certain plans and tipped off the police. Among the more active types of infiltrators can be a gregarious person that quickly wins group trust. Some infiltrators will attempt to gain key forms of control, such as of communications/secretarial, or finances. Other informants can use charm and sex to get intimate with activists, to better spy or potentially destabilize group dynamics.
Active infiltrators can also be provocateurs specializing in disruptive tactics such as sowing disorder and demoralizing meetings or demos, heightening conflicts whether they are interpersonal or about action or theory, or pushing things further with bravado and violent proposals. Infiltrators often need to build credibility; they may do this by claiming to have participated in past actions. Also, infiltrators will try to exploit activist sensibilities regarding oppression and diversity. Intelligence organizations will send in someone who will pose as a person experiencing the common oppression of the particular activist group. For example, in the 1960’s the Weather Underground (“Weathermen”—a white anti-imperialist armed struggle in the US) was infiltrated by an “ordinary Joe” informant with a working class image. Black war veterans infiltrated the Black Panther Party.
A fresher example of police infiltration and manipulation tactics is that of Germinal, a group targeted for arrest two days prior to the April 2001 anti-FTAA demonstrations in Quebec City. Five months prior, the police set up a false transport company and specifically posted opportunities for employment in the vicinity of a Germinal member seeking employment. The trap worked. Tipped off by an initial informant, two under-cover cops worked for four months in the group. This operation resulted in the media-hyped “dismantlement” of the group on the eve of the summit. Seven Germinal members were arrested, 5 of whom spent 41 days in preventive custody, only to be released under draconian bail conditions. The police’s covert action was in part about dismantling the group, but it was also about creating a media/propaganda campaign to justify the police-state security for the summit.


What are some ways of looking into the possibility that someone is an informer? Firstly, unless you have concrete reasons or evidence that someone is an infiltrator, spreading rumors will damage the movement. Rumors that you do hear of should be questioned and traced back. A person’s background can be looked into, especially activism they claimed to have participated in, in other places. Do your contacts in those places know of the person, their involvement? Did problems ever come up? One important advantage of having links with far away places is that it makes it more difficult for informers to fabricate claims about their activities. What are a person’s means of living? Who are her or his friends? What sorts of contradictions exist between their professed ideals and how they live? One of our strengths as activists is our ideas and values, our counterculture, our attitudes towards the dominant society. Our sincerity in discussing these things is also a way of learning about each other.
When planning for new actions, care must be taken concerning who is approached. As little as possible should be said about the actual action plan until a person’s political philosophy, ideas about strategy, and levels of risk they are willing to engage in have been discussed on an abstract basis. If there is a strong basis for believing this person might be interested in the action, then the general idea of an action can be run by them. Only when they have agreed to participate, do they come to the group to discuss action details. During the trials of activists, police often reveal the kinds of information that they have gathered concerning our groups and activities. Note what revelations come out of these trials. What are the possible and likely sources of the information? Speak to persons that have been arrested and interrogated to see what they may have said to the police, or discussed in their jail cell.
Placing infiltrators in social justice and revolutionary movements is an established practice. It was done to the Black Panthers, AIM, the Front de Libération du Québec (FLQ), and the peace/anti-war/and anti-nuclear movements on a large scale. Small groups, such as affinity groups, or working groups of larger more open organisations, need to be especially careful with new members. Direct action organising is ideally done with long-standing, trusted members of the activist community. This doesn’t mean that no one else should ever be allowed into these groups. On the contrary, if our movement is to continue to grow, new people should be welcome and recruited; we just need to keep security in mind and exercise caution at all times.


Possibly an even greater threat to our movements than the covert operative is the activist-turned-informer, either unwittingly or through coercion. The unwitting informer is the activist who can’t keep his/her mouth shut. If someone brags to you about what they’ve done, make sure this person never has any knowledge that can incriminate you, because sooner or later, the wrong person will hear of it. These activists don’t mean to do harm, but their bragging can be very damaging. It is your responsibility to instruct these people on the importance of security culture.
The other type of activist-informer is the person who cracks under pressure and starts talking to save his or her own skin. Many activists get drawn into situations they are not able to handle, and some are so caught up in the “excitement” that they either don’t realize what the consequences can be, or they just don’t think they’ll ever have to face them.
Keep in mind that the categories of “planted informer” and “activist-turned-informer” can and have been blurred. In 1970, during the height of the FLQ’s activities, Carole de Vault—a young Parti Quebecois (PQ) activist was drawn to the FLQ, but then became a paid police agent. Her “activism” was with the PQ; she disagreed with the heavier FLQ actions since it threatened the “legitimate” work of the PQ. Her involvement with the FLQ was as a planted police informer.


We have to know the possible consequences of every action we take and be prepared to deal with them. There is no shame in not being able to do an action because of responsibilities or circumstances that make it impossible for you to do jail time at this point in your life. As long as capitalism and all of its evils exist, there will be resistance. In other words, there will be plenty of great actions for you to participate in when your life circumstances are more favorable.
If others are dependent on you for support, you aren’t willing to lose your job, or drop out of school or ruin your future career, DON’T DO THE ACTION. If you are addicted to an illicit drug and/or have a lengthy criminal record, the cops will use this to pressure you for information. If you don’t feel capable of detoxing under interrogation and brutality, or doing a hell of a lot more time than your comrades, DON’T DO THE ACTION.
Make certain that you talk with others in your affinity group about situations that make you uncertain whether you should be involved in particular actions, especially those that are at a high risk of being criminalized. Remember—there is no excuse for turning in comrades to the police, and those activists that do effectively excommunicate themselves from our movements. We must offer no legal or jail support to those activists who turn in others for their impact on our movement is far-reaching and can have devastating effects.


Covert (or “Special”) Action from police and secret service is also done outside of the group, with or without infiltration. These efforts include: intimidation and harassment, blackmail and manipulation, propaganda, informing employers and security checks, as well as physical sabotage like theft and arson. Intimidation and harassment can include visits from secret service agents, calling you or your partner by their first name on the street, thefts where obvious clues are left. Police will try to blackmail people if they want to recruit or neutralize them.
Police uses propaganda in an attempt to poison the atmosphere and manipulate media and public opinion. In December 1971, when the FLQ was near its end and heavily infiltrated, the RCMP issued a false FLQ communiqué in the name of the “Minerve” cell. The communiqué adopted a hard-line position, denouncing the abandonment of terrorist action by a well-known activist, Pierre Vallières, and urging the continuation of armed struggle. In Genoa, Italy, police played an active covert role in trying to discredit black bloc anarchists during the July 2001 meeting of the G8. Several reports reveal that Italian police masked as black bloc members attacked demonstrators and small shops. With a lack of public information, the police help manipulate public discourse along the lines of “how do legitimate demonstrators isolate activist thugs?”
Slanderous propaganda can take the form of anonymous letters, or rumors aimed at the activist milieu. There are also examples where police will make uncorroborated, casual accusations to journalists that, to use two examples, a person is a drug dealer, or that at a demonstration a person aimed a handgun at an officer. It is often for slanderous reasons that police charge activists with “weapons possession” for having a penknife, or charges of violence like “assault.” The growth of the anti-globalization movement has been accompanied by renewed anarchist-scare propaganda on the part of authorities. Politicians and police attempt to massage public opinion, preparing people for a crack down, in order to legitimate the use of heavier methods of social control, exclusion, and repression.
Manipulative disinformation spread through the media needs to be denounced as lies. There are activist-friendly lawyers who can help us demand retractions and corrections. Speak to the journalists involved, call them on their sloppy, dishonest work, expose their hypocrisy, and complain to the journalists’ ethics body. We can not rely on capitalist, private-media for any kind of fairness.
It is valuable for us to learn more about the covert actions of the police. There exists a long and documented history. Factual information about police covert activities also comes out as evidence presented in court. An important, too often neglected part of our strength is our knowledge of, and our protection from, police action against us.


the Anti-Repression Resource Team—Jackson, Mississippi)
Assuming that the security people within the group have suspicions about a group member being an informer/provocateur, it is useful for security/leadership to resolve certain questions both before and after the investigation:
(a) How badly do you want to know whether the person is in agent or not?
Clearly, if the person under suspicion is relatively important to the group’s functioning, then leadership must know one way or the other. The more important the person under suspicion is to the group, the more intensive the investigation. We may suggest methods of investigation which are unorthodox and from a certain point of view morally indefensible. But the question is always how badly the group needs to know. No group need use all or any of the methods we describe. But under the condition that the correct information is a life-and-death matter for the group, certain drastic measures may be justified.
(b) What will be done if the information is inconclusive?
Often there is not enough evidence to confirm that someone is a police agent, but there IS enough evidence to confirm certain suspicions. A great deal will depend upon what is at stake with the person under suspicion. In general, the choices come down to
1) labeling the person a security risk and acting accordingly;
2) doing nothing outwardly but continuing the investigation;
3) isolating the person from sensitive work but keeping him or her in the group;
4) moving to a higher stage of investigation.
(c) What will be done If the person does turn out to be an agent?
While common sense dictates that the person be exposed and severed from the group, other actions might be initiated. If the presence of the agent is a real threat to the group, then the agent should be neutralized in an effective manner. Usually wide exposure of the agent will accomplish an effective neutralization. But if the agent is no great threat to the group’s functioning, the agent staying inside the group may be useful for other purposes.
The group might decide that they prefer to keep the agent, rather than risk not knowing who would replace a known quantity. It the agent is not in a sensitive position, can be monitored and isolated from important work, the group may want to keep such an agent at a low organizational level. Or the agent might be given tasks that seem to be sensitive but are in reality not crucial to the group. Under the cover of doing “sensitive” work, false and semi-false information about the group can be relayed to the intelligence agencies that the agent belongs to. Or perhaps certain information that is in fact true about the group can be willfully discredited by creation of pseudo-events and/or false information. Remember that when the intelligence agencies have a great deal of contradictory information, it decreases their ability to act decisively against the group.
(d) What are the responsibilities to other groups of the group’s knowledge of an informer?
If the group makes a decision to sever connection with the agent it is certainly the group’s responsibility to quietly contact leadership in other groups to warn them about the agent. Often public exposure is done through the group’s newspaper/newsletter/journal; in this case, the news article should be sent to a wide variety of groups. The more pressing problem is the instance where there are only suspicions but not decisive evidence.
Experience has shown that suspicions are taken seriously only when then is a political bond that exists between persons with long movement experience. People who have been in the movement a long time, and who are known to each other and trusted as dedicated movement people, can convey agent suspicions that will get a favorable hearing or be readily believed. This “old hands trust network” is relatively independent of political point of view; veteran leaders of rival radical organizations can freely and easily exchange information on matters of security.


1. YOU DON’T HAVE TO TALK TO THE POLICE OR INVESTIGATORS. You do not have to talk to them on the street, if you’ve been arrested, or even if you’re in jail. Do not talk about illegal actions with fellow “inmates” in holding as they may be plants.
2. YOU DON’T HAVE TO LET CSIS OR THE POLICE INTO YOUR HOME OR OFFICE UNLESS THEY HAVE A SEARCH OR ARREST WARRANT. Demand to see the warrant. It must specifically describe the place to be searched and things to be seized. It must be authorized by a judge and should bear a signature.
3. IF THE POLICE DO PRESENT A WARRANT, YOU DO NOT HAVE TO TELL THEM ANYTHING OTHER THAN YOUR NAME, ADDRESS, AND BIRTH DATE. Carefully observe the officers; you’re in your own home, you’re not required to stay in one room. You should take written notes of what they do, their names, badge numbers, and what agency they’re from. Have friends who are present act as witnesses. It’s risky to let cops roam around alone in your place.
4. IF THE POLICE TRY TO QUESTION YOU OR TRY TO ENTER YOUR HOME WITHOUT A WARRANT, JUST SAY NO. The police are very skilled at getting information from people, so attempting to outwit them is very risky. You can never tell how a seemingly harmless bit of information can hurt you or someone else.
5. ANYTHING YOU SAY TO THE POLICE MAY BE USED AGAINST YOU AND OTHER PEOPLE. Once you’ve been arrested, you can’t talk your way out of it. Don’t try to engage cops in a dialogue or respond to accusations.
6. YOU DO NOT HAVE TO REVEAL YOUR HIV STATUS TO THE POLICE OR JAIL PERSONNEL. If you’ve been arrested you should refuse to take a blood test until you’ve been brought before a judge and have a lawyer of your choice.
7. YOU HAVE A RIGHT TO TELEPHONE A LAWYER OF YOUR CHOICE AS SOON AS POSSIBLE. This means after you’ve been arrested, charged, and booked into jail. This does not mean, however, that you’ll be given the right to speak with your family or friends. This is left up to the discretion of the police involved in your case.
9. IF YOU ARE NERVOUS ABOUT SIMPLY REFUSING TO TALK, YOU MAY FIND IT EASIER TO TELL THEM TO CONTACT YOUR LAWYER. Once a lawyer is involved, people will know more about your state i.e. charges, bail, court date, etc.



[1] Jenny Esquivel, “Building Conspiracy: Informants in the Case of Eric McDavid”, in Life During Wartime: Resisting Counterinsurgency, eds. Kristian Williams, Will Munger, & Lara Messersmith-Glavin, Oakland: AK Press, 2013, p. 341.
[2] Ibid.
[3] Ibid.
[4] Ibid. pp. 341-342.
[5] Ibid. p. 315.
[6] Ibid. p. 339.
[7] Ibid. p. 324.
[8] Ibid. p. 334.
[9] Ibid. p. 339.
[10] Ibid. p. 318.
[11] Ibid. p. 335.
[12] Ibid. p. 340.
[13] Ibid. p. 318.

Two threads from Twitter


Its occurred to me that since Twitter is a shitty imageboard complete with random bans, tripcode users (the notorious blue tick), and unaccountable admins, I should probably backup whatever Twitter content I produce that shows a flash of insight. So here’s two recent threads people seemed to like. They are unmodified from the originals (warts and all).

Urban warfare: rhizomes and rubble

Seeing those pictures of Mosul devastated, and seeing the same thing happening, on a smaller scale, in Raqqa has me thinking. Before the Great War we saw microcosms of the mass destruction and suffering that was to come in various colonies and other small wars. Concentration camps in South Africa against the Boers. Machine guns slaughtering massed infantry and cavalry, as witnessed by Churchill. Bombs being dropped for the first (and not the last) time in Libya. Many other such examples, point being it was all laid out before us, ready to be combined into a phenomenally brutal and traumatic event.
As people are saying, urban combat is now the norm not the exception as it was a century ago. Mosul does more than echo Stalingrad. It points the way towards average level of destruction that can be expected from any large scale war, in any city fought over. Daesh was resilient, well-organized, and fanatical. But they weren’t the best trained, equipped, or even experienced combatants. (In Mosul). All the same, the destruction required to root them out was excessive, the entire process costing 40% of Iraq’s spec ops. Never mind the civilian trauma. What we see in Mosul, soon enough Raqqa, is the future devastation of any European, American, etc. city. That is, if there’s another large-scale war. Not necessarily a World War, though it must be said all wars are essentially global now. Jihadis from the world over fought for Daesh, same as self-styled revolutionaries flocked to serve in Rojava’s international brigades. The US, from well over the Atlantic and Mediterranean horizon, intervened, as did Russia, Qatar, SA, Iran, Turkey, and many others. Few, if any, significant conflicts are fought in isolation from global capitalism and thus away from the eyes of its major states.
Urban combat is not new; what is unsettling is how ferocious it has become. Precision weapons are no small influence on this. Hypothetically, if the US and Russia were to marshal their forces on a flat plain and fight, the result would be Pyrrhic for any victor. The Soviets recognized this in the 1980s, IIRC, as a new military revolution in progress; one potentially more destructive than nukes. How so? Because there would be no restriction on the use of these precision weapons. Their mass deployment would result in mass destruction. Not the kind that churned the fields of Europe into a bloody pulp, but the kind that would render openly deployed armies mere targets. Aside from the usual stuff, like contesting air superiority, the only option was to enter an environment where you were less of a target.
Enter the city. Daesh learned the lessons of the Viet Cong very well in this regard (their love of tunnels), and many other conflicts. Walking through walls, “inverse geometry“, is a way of evading the sight of precision weapons. If the enemy uses buildings as, essentially, rhizomes, then it often becomes impossible to destroy the enemy without destroying their cover. “Unlike a structure, which is defined by a set of points and positions, the rhizome is made only of lines”—Deleuze and Guattari. “[T]he rhizome pertains to a map that must be produced, constructed, a map that is always detatchable, connectable, reversable, modifiable and has multiple entranceways and exits and its own lines of flight.” In this way, any city can become a rhizome in urban combat. Add tunnels in, and the result is a truly byzantine complex of death awaiting those who do not utilize mass destruction to compromise it.
The Israeli army was probably the first to assign post-structuralist texts like D&G in response to their experiences in places like Lebanon. Thousands of soldiers/guerrillas can maneuver through the urban rhizome but very few are simultaneously visible from the air. This is a marked change from traditional urban combat, which took place the streets, alleyways, lanes, and roads. What Daesh has demonstrated that even a relatively small number of soldiers crammed into around 250m2 can be tenacious. Provided they are 1) networked, and 2) operate in a rhizome, perhaps with tunnels to boot. Add their IEDs, drones and it’s a slaughter. This kind of combat simply impracticable outside of a city. Plausible in a jungle, as demonstrated in the Vietnam war, but not at its best. Daesh has been unable to hold vast swathes of desert and scattered villages with anything like the iron grip they’ve kept on many cities.
A December 2016 document highlights the increasing recognition by the US that combat in “megacities” will be a feature of future warfare. “[C]ities are in some ways a great leveler in warfare, negating many of the advantages of high technology”. The need for an “urban warfare” school is also on the agenda (as of April 2017). “The Army is fighting in cities today,” Spencer wrote. “It will find itself fighting in cities in the future.” What we are seeing, in Mosul, in Aleppo, in Raqqa, is not the future of urban warfare but its current reality. The mass destruction, the horrific toll on civilians, the increased ferocity, the perilous and ingenious traps, all in the urban rhizome.
The war in Syria, the “civil” war, the small war, which has displaced millions and killed thousands upon thousands, is the current model. All you need to do is scale it up. Just as what could have been done a century ago. The evidence is right there in front of us. Instead of tens of thousands of soldiers, think hundreds of thousands, even millions. Think megacities like Tokyo becoming like Mosul. In a situation like this, where a megacity becomes an urban rhizome, where even precision weapons are blunted, what could be the outcome? What’s the easiest way to destroy the rhizome without engaging in what could potentially be the most protracted warfare since the trenches?


Do I need to say it?
That specter is still very much with us. It hangs over this small war in Syria, as the US and Russia jostle for position. I haven’t covered everything here, but I think the main thrust has achieved its purpose. We see an embryo of warfare here. Just as Engels saw the embryo of the Great War shortly before his death. Warfare that seems difficult to imagine. But Syria has shown us.

Proletarian and homeless in the Neoliberal city

“[T]he growth in pseudo-public spaces is a reflection of the neoliberal city“. The removal of the “urban commons”, “a new era of ‘urban enclosure’”. Except this time there’s no literal gates, just rules you don’t know. Only certain people are excluded, sometimes for being what they are (e.g. homeless), or for doing things that displease the landowners.
The land is open until the (arbitrary) rules are broken, which is usually the time it’s discovered that the land is private. In effect, outsourcing not only the ownership and administration of “pseudo-public” places but their policing as well. Challenge the security guards and then the police show up to enforce the landowner’s property rights. Otherwise the police aren’t needed. It’s “neoliberal” because ownership is hidden. Gate communities, which typified 19th century London, aren’t subtle. Rules-based ones are. You can find out if you bother to dig around and ask questions; but as this story showed the rules change from place to place. It’s a widespread development and yet so unnoticed that it has to be mapped, which suggests it has been very effective thus far.
My gut is telling me that this is some kind of process inherent to late bourgeois society. Hide authority, hide the rules, hide ownership. Cover it beneath a surface appearance of normalcy and openness. Deploy enforcement against those considered undesirables. (Those most people won’t bother noticing anyway.) Cover the iron gauntlet with a velvet glove and people aren’t aware it’ll strike them too. Broad exclusion—gates, police, signs—is replaced by targeted exclusion. The homeless demonstrate the barriers are invisible to most. Yet they are concrete. They exist, and they are social in nature. Thoroughly material. Those who do not move do not notice their chains. The homeless notice because they run smack into barriers other people can traverse unmolested. The homeless are aware of their chains.
Proletarians are as well, but not in the same way. Being forced to work is different from being excluded from certain spaces. If you don’t go to work, the company security guards don’t show up to your door to drag you there (yet). You’re simply fired. The difference is the proletarian is disciplined in a covert way. The homeless remain disciplined by overt force. Nonetheless, the homeless are aware of things proletarians are not. Being a proletarian is to be disciplined by covert (hidden) force. Being homeless, terminally jobless, is to be disciplined by the regular application of overt force. It’s a less advanced, older method. Proletarians only notice their chains once they move against capital and landowners (e.g. strikes, protesting, etc.). They only confront the older, overt force in open confrontation with capitalism. The covert discipline is scarcely noticed until a crisis. Otherwise proletarians remain unmolested through spaces the homeless cannot traverse. The homeless are ignored, but they shouldn’t be. What happens to the homeless is merely what will happen to the proletarian, once they notice their chains. Just some thoughts.

To get rid of evil or to be rid of class? A review of Bini Adamczak’s ‘Communism for Kids’


Bini Adamczak has written a very clever little book. It is no mean feat to make communism as a concept intelligible to all, while at the same time reviewing – in brief and simplified form – the numerous failures of the movement. One could do worse than to begin here. The question of what communism is, as acknowledged by Adamczak, remains “contested”1. Communism as a word “names a field of political conflict”2 not only in the wider political sense, but one involving critique between “communisms and other socialist utopias in a struggle over the future”3. The origin of these “many communisms” to Adamczak was “one communism”4. The progenitor goes unnamed. It could be interpreted to refer to communism’s modern form conceptualized by Marx and Engels, referred to as “Traditional Marxism”5, but this would be a mistake. Adamczak is very clear about what constitutes this “one communism” and why “other communisms”6 and utopias have failed. The first two parts of the book deal with the trial and error of a series of communisms as well as answering basic questions, like ‘what is capitalism?’ The third part, the epilogue, was added in 2014 by the author to reflect on its 10th anniversary7, and discusses both the content of the book and the author’s views on the future of the communist movement, the latter of which – in true communist form – should not be accepted uncritically. While Adamczak has performed an admirable service in penning such an accessible and clear introduction to a contested movement, the conclusions she has drawn in the epilogue are, at times, disquieting.
Adamczak’s book draws a sharp dividing line between what the communist movement is, and is not; therefore, what communism is emerges out of this negative critique. The first sentence of the book presents in plain language what Adamczak considers the core of the movement. “Communism names the society that gets rid of all the evils people suffer today in our society under capitalism”8. As Ross Wolfe noticed, this is repeated no less than four times9. Fortunately, she is quick to assert this does not mean the elimination of all evils: “it’s no cure-all. It’s only a remedy for the evils caused by capitalism”10. Walking the reader through the essentials of life under capitalism, she eventually arrives at a critical juncture. “[T]he best kind of communism is the one that can get rid of the most evils”11. This and the opening line are eventually repeated together on the final page of the first part12, highlighting their central importance. Immediately preceding this repetition is a defining section:
The people now know two things. First, they know that capitalism doesn’t make them happy, and second, they know that communism does. So they decide to try communism. But it’s not so simple. Since true communism has never existed in the entire history of humankind, no one has any clue what it looks like. What the people do have are various ideas of what a communist society should look like13.
Its true significance is revealed through exploring the trials of the people as they attempt communism. In an interview with Viewpoint Magazine, Adamczak labels these “social democracy, syndicalism, state socialism, luddism, and some form of techno-hedonism14. Unmentioned by her is the sixth and final trial, what might be considered the beginning of “true” communism. The main clue is the illustrated people rising up against the narrator and asserting that, now, they are “making history ourselves”15, recalling a line from Engels’ Socialism: Utopian and Scientific that, in communism, “[t]he extraneous objective forces that have hitherto governed history pass under the control of man himself”16. Adamczak believes the “main question” that communism as a movement addresses is “[h]ow do we want to live?”17 It is this question that “other communisms” ignore; undermined, in the main, by their focus on things over relations between peoples. Louis Menand, in his 2003 ‘Forward’ to Edmund Wilson’s To the Finland Station, asserts that the “deeper attraction” to communism, especially in its Marxist form, “was the discovery of meaning, a meaning in which human beings might participate, in history itself”18. History “holds the key to the meaning of life”19 and thus the answer to Adamczak’s question. Nonetheless, what this answer means remains obscure; it has to be worked out amongst all peoples. “No one really knows unless they try it out”20, and of the previous attempts none achieved the elimination of all the evils of capitalism suffered in society today. Neither did they abolish class.
Adamczak reflected that the book “started as a theoretical exegesis of Karl Marx’s ideas on the future”21 and that much shows, with one notable exception: class struggle is completely absent. The great strength of this book is its focus on capital – “it’s called capitalism because capital rules”22 – but the price of its insistence that “people no longer rule over society”23 is the disappearance of the bourgeoisie and their opposite, the proletariat. Throughout the first part it is the factories, not people, who speak “with [their] own special voice”24 – illustrating the operation of value production in capitalist society. It is the factories who “tell us how we should produce, what we should produce, and how much we should produce”25, and it is also the factories who decide “how much everyone should get in return for doing all this work”26. There is “a boss person who makes sure everybody does what the factory wants them to do”27, yet they are no more in control of this process than the workers. The book acknowledges the existence of state bureaucrats – “pot people”28 – while the role of the bourgeoisie and their position in class society are conspicuously absent. The outcome is Adamczak ignores the existence of class itself, which is why it is not the proletariat attempting to build communism in the six trials, just people. This is a deliberate choice on her part. “[T]he problems of surplus value production and the reproduction of classes… are not touched on here at all”29. Without the exploitation of one class by another, class itself disappears from view; without class, a fundamental antagonism of capitalist society is absent. Adamczak frames each trial as “introduced to overcome the flaws of the one before”30 in the absence of class struggle. The effective denial of class struggle, and its importance in the history of communist failures, demonstrates that while she started with Marx’s ideas she did not follow through entirely. This has the result of robbing the book of any kind of narrative power, the overcoming of collective exploitation through solidarity in class struggle. Whether Adamczak omitted the bourgeoisie for the purposes of simplification, or to keep the focus on capital as the evil to be rid of (not capitalists), the book consequently lacks any real sense of urgency or danger as people calmly and methodically work their way through trial-and-error communisms. In that sense, Adamczak has presented a true fairy tale.
Communism for Kids was written during a specific period of time where, according to Adamczak, “we had to reopen a utopian perspective”31. The book’s “task” was “to reinvent the future during the end of history”32, the “narrative” of which “gave expression to a certain undeniable reality”33 – “instead of hope for a better future, there’s only a totalizing fear of a worsening present”34. To counter this, she urges “a form of desire capable of jamming images of a better world into every fracture of daily life”35. Refashioning the utopian impulse into a communist desire “against every compromise”36 goes hand-in-hand with the historical defeat of communism on the field of class struggle. As Wolfe remarks, “[r]evolution will not result from merely wanting it more, and the idea that it will is usually a sign of desperation”37. Appropriately, Giorgio Agamben argued that “[a]ny radical thought always adopts the most extreme position of desperation”38. Adamczak asserts that her book “is about the availability and desirability of radical dreams”39; in other words, utopias. She is not the only one advancing utopianism as the vanguard of a rehabilitated communism. Žižek laments that “rare are those who dare even to dream utopian dreams about possible alternatives”40, while Fredric Jameson’s An American Utopia41 acts as a provocation to take the construction of positive utopias seriously. Žižek frames Jameson’s utopianism as “to change society one should begin by changing one’s dreams about an emancipated society”42. Adamczak similarly writes, “[p]erhaps some kind of prophetic prosthesis is required to transform the desire for communism into a communist desire43. Jameson argues we are experiencing “a political time in which politics must again begin by igniting individual fantasies”44; more than that, “the task of utopianism today is rather to propose more elaborated versions of an alternate social system than simply to argue the need for one”45. For Jameson, anti-utopianism is potentially synonymous with anti-communism, as the concept of utopia itself “has again changed its meaning and has become… a virtual synonym for socialism or communism”46. This is the terrain in which Adamczak treads when she writes a book that “addresses the reader as one who can dream radically”47 rather than one who can engage in class struggle. The regression of the communist movement back into a speculative utopianism closes the circle which began with Marx and Engels’ critique of the utopian socialists who had preceded them. Perhaps this resurgence of utopianism will, in turn, give rise to a new ‘scientific critique’. The only hope is, this time, we manage to escape Marx’s dictum “the first time as tragedy, the second time as farce”48.
In retrospect, the utopian tone was set by Adamczak’s very first sentence, and reinforced by her assertion that the communist movement revolves not around the contradictions of capitalism and their negation, but the construction of a communist desire: a dream of how we are to live. She is well aware, however, that whatever dream that emerges from this utopian desire “cannot truly be the thoughts, ideas, and images of a different reality, a different organization of society”49. Critiquing previous critiques of capitalism as various forms of anti-capitalist utopianism – including Marx’s critique, which she labels “productivist anticapitalism”50 – she concludes that “our only possible standpoint lies in the future”51.
The hope is that the absurdity and unnecessary brutality of capitalist society will leap out to the people of future generations, the same way that the binary gender system or flatness of the earth seems crazy to us today52.
One is reminded of Kafka’s expression that there is plenty of hope, infinite hope—but not for us. This is a position that denies the possibility of struggle, here and now. It is with no small amount of irony that Adamczak advances
[t]he paradox that the eternal standpoint cannot be taken up and yet must be taken up protects us from fetishizing our own criticisms, and thus saves us from the illusion of utopianism: the fantasy that we can already show, here and now, what a liberated society looks like. In short, the unattainability of the communist viewpoint guards it from occupying capitalist ground53.
But the only ground communism as a movement has known is capitalist ground. The entire critique emerged out of the development of capitalism and its struggle against the feudalism which preceded it. Utopianism is not only a fantasy but an eternally unattainable standpoint, one which constantly reinvents itself in order to construct a positive image of the future. Adamczak acknowledges she seeks a “place of no-place in capitalism”54. What “saves us” from the utopianism of “ideals” – “[a]n image of the future becoming a model for the future”55 – is an intrinsically utopian communist viewpoint. Ultimately, Adamczak does present a paradox – critiquing communist illusions with a viewpoint completely detached from capitalist social relations – but not the one she first proposed. A better position would be recognizing, as Terry Eagleton argued, that “[t]here is no need to struggle out of your skin in order to make fundamental criticisms of your situation”56. Furthermore, Marx already identified the role of critique itself in preventing the fetishism of any particular standpoint: “if constructing the future and settling everything for all times are not our affair, it is all the more clear what we have to accomplish at present: I am referring to ruthless criticism of all that exists”57. A negative critique and the construction of a positive, constantly mutating utopian desire seem distinctly at odds; indeed, this is the point. Adamczak wishes for “communist criticism… to move beyond its habit of bitter negation”58. Having critiqued various anti-capitalisms as “latently capitalist”59 she ignores how desire has been fetishized as having qualities capable of resisting capture by the capitalist present. Unfortunately, utopian desire undermines communist critique, especially if Jameson’s suggestion that anti-utopianism equates to anti-communism is taken seriously.
Within Adamczak’s ‘utopianism of the desire’ lies not a movement but an Idea. Žižek, explaining the concept of desire from a Lacanian perspective, notes “that the question of desire, its original enigma, is not primarily “What do I want?” but “What do others want from me?””60 In other words, the question is not so much “how do we want to live?” but “how do others want me to live?” This is a far more difficult question to answer than the one first posed by Adamczak. Revisiting the concept, Žižek argues that “[d]esire is always a desire for its own nonsatisfaction: its ultimate aim is always to reproduce itself as desire… i.e., desire is a gap, a void, in the heart of every demand”61. Adamczak’s desire is ultimately a demand: “Communist desire: the desire that misery finally comes to an end”62. This is a direct contradiction of her early assertion that communism is only a remedy for the evils of capitalism, not misery itself. What’s more, the desire at the heart of this demand is insatiable, at least according to Žižek’s view, transforming communism into something “eternal”, a “Platonic Idea”63, rather than a movement contingent on the negation of bourgeois social relations. Adamczak’s “critique of critique(s)”64 is thus undermined by her misplaced fear of the material bedrock of capitalist social relations and her subsequent utopianism. A provisional answer to the aforementioned question (“how do others want me to live?”) becomes complicated by the need for the desire of others to end misery for people in general, not only themselves. The Idea of communism is swiftly “passing into absurdity”65. It has become emptied of what should be its “real content”, argued by Engels as “the demand for the abolition of classes66, not the end of capitalist evil then extended into the end of misery, which is necessarily precluded by the insatiability of desire. Constant self-criticism cannot overcome this particular impasse67. Eagleton once asserted that “[t]he role of the prophet is not to predict the future, but to remind the people that if they carry on as they are doing, the future will be exceedingly bleak”68. He also argued that “imagining a more just future may confiscate some of the energies necessary to achieve it”69. In Adamczak’s case, much energy will be spent constructing and self-criticising an individual’s or group’s utopian (yet still communist) desire. The great strength of the communist movement has been its clear aims, articulated on a class basis, not a politics of desire that diverts the attention of those who can struggle.
The current fascination with utopia will hopefully run its course and prove only to be a product of that moment in history which drove Adamczak to write Communism for Kids. It may seem slightly absurd to write such a lengthy critique of a very short book. By no means is this an unimportant book, however, especially with its translation into English. It is a book written to address a specific zeitgeist, and its conception of communism, due to its accessibility, is one that could serve as a beginning for many young communists today (their children too). Brevity is also no barrier to the kind of theoretical sophistication that Adamczak demonstrates in writing it, especially the epilogue. It is hard not to admire the fearlessness with which she has pursued some very difficult questions. The quality of her answers, however, is something which must be examined, and a critique of those is what this review has attempted to accomplish. It has hopefully been demonstrated that, while Adamczak has an understandable frustration with the popular inability to imagine a world beyond capitalism, the foray into utopianism and a politics of desire will not fundamentally change anything. In fact, it leads down a blind alley, confronting not the emancipatory potential of desire but its devouring insatiability; an insatiability that finds greater kinship with that she wishes to undermine, capitalism. For capitalism “has a Faustian horror of fixed boundaries, of anything which offers an obstacle to the infinite accumulation of capital”70. An insatiable desire confronts accumulation without boundaries. Utopianism offers no barrier, either: “Materiality is what gets in it way. It is the inert, recalcitrant stuff which puts up resistance to its grandiose schemes”71. What is needed is something more fundamental, which Adamczak has purposefully excluded. The kind of solidarity she imagines as “not just an instrumental means of social change… but also the goal of emancipation, of communism”72 has to be found in a renewed class struggle.


[1] Bini Adamczak, Communism for Kids, Massachusetts: The MIT Press, 2017, p.78.
[2] Ibid.
[3] Ibid.
[4] Ibid.
[5] Ibid. p.85.
[6] Ibid. p.78.
[7] Ross Wolfe, “‘This Tale Is About You!’: On Bini Adamczak’s ‘Communism for Kids’”, Los Angeles Review of Books, June 27, 2017;; last accessed mid-July 2017. Archive link:
[8] Adamczak, p.1.
[9] A minor quibble: it could have been better presented without a certain redundancy. “Communism names the society that gets rid of all the evils people suffer today under capitalism”. In fact this redundancy is eliminated in later repetitions (e.g. p.36), making it a frustrating choice on the part of the translators.
[10] Adamczak, p.1.
[11] Ibid.
[12] Ibid. p.36.
[13] Ibid. pp.35-36. Emphasis original.
[14] Bini Adamczak and Jacob Blumenfeld, “‘Communism for Everbody’: An Interview with Bini Adamczak, author of Communism for Kids”, Viewpoint Magazine, May 16, 2017;; last accessed mid-July 2017. Archive link:
[15] Adamczak, p.69.
[16] Frederick Engels, “Part III: ‘Historical Materialism’”, in Socialism: Utopian and Scientific, 1880, Marxists Internet Archive;; last accessed mid-July 2017.
[17] Adamczak, p.62.
[18] Louis Menand, ‘Forward: The Historical Romance’, in To the Finland Station: A Study in the Writing and Acting of History, auth. Edmund Wilson, New York: The New York Review of Books, 2003, p.xiii.
[19] Ibid. p.x.
[20] Adamczak, p.36.
[21] Adamczak and Blumenfeld, “‘Communism for Everybody’”.
[22] Adamczak, p.5.
[23] Ibid.
[24] Ibid. p.19.
[25] Ibid. p.21. Emphasis original.
[26] Ibid.
[27] Ibid. p.26.
[28] Ibid. p.51.
[29] Ibid. p.81.
[30] Adamczak and Blumenfeld, “‘Communism for Everybody’”.
[31] Ibid.
[32] Ibid.
[33] Adamczak, p.71.
[34] Ibid. p.72.
[35] Ibid. p.74.
[36] Ibid. p.75.
[37] Wolfe, “‘This Tale Is About You!’”.
[38] Jordan Skinner, “Thought is the courage of hopelessness: an interview with philosopher Giorgio Agamben”, Verso, 17 June, 2014;; last accessed mid-July 2017. Archive link:
[39] Adamczak and Blumenfeld, “‘Communism for Everybody’”.
[40] Slavoj Žižek, First as Tragedy, then as Farce, London: Verso, 2009, p.77.
[41] Fredric Jameson, “An American Utopia”, in An American Utopia: Dual Power and the Universal Army, ed. Slavoj Žižek, London: Verso, 2016, pp.1-96.
[42] Slavoj Žižek, “Forward: The Need to Censor Our Dreams”, in An American Utopia: Dual Power and the Universal Army, ed. Slavoj Žižek, London: Verso, 2016, p.vii.
[43] Adamczak, p.75. Emphasis original.
[44] Jameson, p.41.
[45] Ibid. p.43.
[46] Ibid. p.42.
[47] Adamczak and Blumenfeld, “‘Communism for Everybody’”.
[48] Karl Marx, “Chapter I”, in The Eighteenth Brumaire of Louis Bonaparte, 1852, Marxists Internet Archive;; last accessed mid-July 2017.
[49] Adamczak, p.74.
[50] Ibid. p.85.
[51] Ibid. p.90.
[52] Ibid.
[53] Ibid. pp.90-91.
[54] Ibid. p.89. It is, however, rhetorically framed as a question.
[55] Ibid. p.74.
[56] Terry Eagleton, After Theory, London: Penguin Books, 2004, p.61.
[57] Karl Marx, “Marx to Ruge: Kreuznach, September 1843”, in Letters from the Deutsch-Französische Jahrbücher, Marxists Internet Archive;; last accessed mid-July 2017. Emphasis original.
[58] Adamczak, p.73.
[59] Ibid. p.89.
[60] Žižek, First as Tragedy, p.64.
[61] Slavoj Žižek, “The Seeds of Imagination”, in An American Utopia: Dual Power and the Universal Army, ed. Slavoj Žižek, London: Verso, 2016, p.283.
[62] Adamczak, p.94.
[63] Žižek, First as Tragedy, pp.125-126.
[64] Adamczak, p.89.
[65] Frederick Engels, “Part 1: Philosophy, X. Morality and Law. Equality”, in Anti-Dühring, 1877, Marxists Internet Archive;; last accessed mid-July 2017.
[66] Ibid.
[67] Adamczak argues that “by making use of our broadest historical knowledge and deepest theoretical criticism, we have to constantly ask ourselves how such desires might lead to impasses that could be avoided”, p.75. Emphasis mine.
[68] Eagleton, p.175.
[69] Ibid. p.100.
[70] Ibid. p.118.
[71] Ibid.
[72] Adamczak and Blumenfeld, “‘Communism for Everybody’”.

Research note: excerpts from “Julian Assange speaks about AI controlled Facebook propaganda”, June 12, Wikileaks.

Photo: Copyright Timothy Allen .


“Human beings have always been influenced by sophisticated systems of production, of information and experience” which, in turn, shape the thoughts of human beings.

“What I think is probably the most important development happening as far as the fate of human beings is concerned, is that we are getting close to the threshold where the traditional propaganda function that is employed by BBC, Daily Mail, etc. […] can be encapsulated by AI processes.”

“When you have artificial intelligence programs harvesting [data uploaded to social media] and it starts to lay out perceptual influence campaigns 20-30 moves ahead this starts to become totally beneath the level of human perception. And once a computer augmented organization such as Google is able to engage in influencing human beings…beneath human perception there’s nothing we can do about it because we can’t see it”.

“[A]nd if you can do that more than others can do it, you win… so that’s where I think we’re going in terms of politics. If you look at that kind of prediction of the future, we’re all doomed from that viewpoint because reality becomes invisible. Reality becomes something that is unperceivable by us as individuals.”

“[T]he most immediate way of generating capital from artificial intelligence is to sell access to it. Just like Google sells access to Google search…[by] you sell[ing] yourself. You sell what you wanted to search and you sell your attention to Google by searching. That’s surveillance capitalism. You give a little bit of your insight to who you are to Google by searching and in exchange all the resources it has and its capacities you can use to get the result.”

“[I]nsofar it has a very serious increase in AI capacity it can lease that AI capacity to other organizations to get knowledge about those other organizations in terms of surveillance capital flow, or just for money. It’s a way getting profit fast for Google… [I]n that dynamic of acquisition of capital, exchange of intelligence capacity, who ends up winning?

You end up with, basically, [either] a diversification like is done to a degree with Google search, where every individual who has access to it effectively ends up with something like the ability that the state department once had. So you have access to enormous archives produced around the world.

Or, we move towards a situation where Google or an equivalent organization is able to acquire so much more in terms of capital flows, in terms of knowledge, about how organizations are working by collecting what they want to do with this AI capacity.

Then you can end up with very, very substantial [and] powerful organizations that are operating at a level beneath what human beings can perceive, and ultimately move into a situation where what human beings are interested in becomes totally irrelevant because you have computerized organizations and manufacturing processes, and automated transport flows, etc. which make human beings just inefficient and irrelevant… and [human beings] are treated like we treat irritating animals like moles, for example, that are getting in the way of our ability to use the land for something else.”

“[H]uman beings have been extremely foolish. Surveillance capitalism, as a model, has meant that we’ve all been in the process of putting our lives onto the internet… giving our lives over to these Silicon Valley companies, so Silicon Valley datastores now have a very, very rich description of reality as experienced by human beings, and some bits of data not experienced by human beings like stock market indexes and so on—and that is what artificial intelligences are trained on.”

“[W]hat we have done is given [Google, Facebook, etc.] Rosetta Stones, keys to how human beings think and how we manage our political structures and our social structures and our language structures—visual and word examples in the trillions—so it’s all there, the full description of humanity is all there in all its beauty, horror, and detail—it’s all there to be gleaned from, learned from, and extracted like an open cut mine. And you just need to construct various… types of artificial intelligence that simply mine this out—the collective digitized experience of humanity.”

For one, I think it perfectly illustrates the contradiction between social production and private appropriation. Social media is just that: social. Yet its ownership and administration is private. So is all the data produced by our interaction with each other digitally. It’s not used, by and large, for a social purpose but a private purpose: profit. What Google etc. are attempting is algorithmic automation; essentially, that’s AI. When algorithms can maintain and write themselves the less programmers and other support staff are needed. On the consumer side, the actual interests and emotions of the humans producing the data appropriated by these companies are irrelevant. Assange’s Surveillance Capitalism is the dominance of the producer by the product. I.e. social media dominating the individual. Every tweet on Twitter or post to Facebook is value production. It’s digital socializing as free labor-power. The old adage of “if it’s free you’re the product” rings especially true with social media, and just as it is with selling your labor-power to an employer, interacting with your family, friends, strangers etc. on social media is cloaked in the appearance of a free and equal exchange. Your time and input in exchange for access to the network. In fact, you are being exploited. But due to the nature of the exchange the exploitation is hidden. Further still, the value of your time and input and the value your time and input creates for the company “are two different magnitudes”, to cite Engels. The aggregate of that data, as illustrated by Assange, provides a rich source of income to Silicon Valley giants by them selling access to advertisers, for example, while the algorithms (perhaps AI eventually) can be leased to other enterprises, further expanding the market opportunities of the company. What you produce for the company is orders of magnitudes more valuable than what your input would suggest, especially the mundane details and dramas of your everyday life; and yet, you are producing value when these are uploaded to social media. More attention and more rigorous analysis is required to either prove or disprove these conjectures.

Research note on the relationship between State & Capital



Just another signpost on another important question. Again, no citations and very rough. Special thanks to Jehu for asking the question in the first place via Twitter.
To what degree does the state control capital? Originally, the state was conceived in these terms – it was the instrument of capitalist exploitation (Engels) and the executive committee of the bourgeoisie (Marx). Many other Marxist theories of the state been developed since. Bob Jessop is one the of leading Marxist authorities on the state, just as an indicator.
Leaving that point aside, if monetary or exchange control is examined then the relationship of state to capital becomes a little more clear. The United States of America enjoys a privileged position in world politics due to the USD being effectively the world reserve currency. Many smaller states use the USD as their own currency, and the USD is traded and accepted globally as legal tender even in nations where this is not the case. US economic preponderance owes a lot to this development, and the US takes a dim view to states attempting to challenge it directly (e.g. China).
The EU is another case, where the Euro acts as the effective reserve currency of Europe and is legal tender in almost every member state integrated into the internal market (the UK being a notable exception). Similar to the US, some smaller states use the Euro as their own currency. The EU differs from the US in that it is a supranational arrangement where no one state, officially, dominates the agenda. In reality, the old Continental powers of France and Germany, particularly the latter, exercise inordinate influence in the EU. The Euro developed out of the European Economic Community, set up in 1957 with the Treaty of Rome, which paved the way to the creation of a single internal market (the Eurozone).
The difference between the USD and the Euro is that the former is a global reserve currency whereas the Euro is mainly, but not exclusively, regional. The Euro is the second most important currency in the world, which is nothing to dismiss. All other nations in the world are subject to the two reserve currencies according to various regimes – floating exchange rates and other monetary policies. In this sense, the difference between a superpower or a supranational union and a single state is significant indeed.
So what this means about the state and capital is this: in a superpower the state and capital are bound tightly together, control over monetary policy is ironclad, a cornerstone of its economic preponderance. Other states who cannot hope to match the superpower on their own must band together into supranational unions and develop a single internal market with a single currency. Lesser states who join that arrangement are subject to the influence of the larger states within, but aren’t as vulnerable as they would be on their own. The relationship between state and capital is diffused into a bureaucratic mechanism which mimics (unsatisfactorily) the arrangement of a superpower – tight monetary control. Other states, struck out on their own, have less control over their monetary policy and as a result less control over their own economies. More controversially, this melding of state and corporate power in the US and EU has distinct fascist overtones.
Consequently, a superpower and a supranational union are less subject to the whims of nominally ‘free’ market forces. However, when crisis grips their economies it affects the entire world; it threatens to collapse the global economy. This explains why Russia has made moves to construct its own Eurasian Union, though without much success, and why China seeks to construct its own international organizations which parallel the World Bank and the IMF. Both are attempts to secure greater control over their own economic conditions.
It can also be seen how the EU was an attempt by the national bourgeoisies of Europe to a) avoid another disastrous Europe-wide war, b) counter the economic preponderance of the US and thus the US bourgeoisie, and c) provide an economic bloc counter to the Warsaw Pact and the USSR. The relationship between state and capital is tightest where the greatest capital can be found. This should be possible to demonstrate in empirical terms.