THE ENCYCLOPEDIA OF DIRECT ACTION Development Issue 0.3 - Dated 9th Feb. '95 About this 'Encyclopedia' This 'encyclopedia' is not a activists guide, such a guide might be considered as 'incitement' in some countries. This 'encyclopedia' covers progressive direct action groups, their campaigns and some of the many tactics that have been or could be, used by these groups. The information here is given in the spirit of free speech and is not intended to incite individuals or groups to commit any acts of physical violence against any living being. Direct Action is not new, however it is a developing area and as such new groups, campaigns and tactics are evolving all the time. The 'encyclopedia' is a 'living document', growing and expanding all the time. It is created by no specific person and takes contributions from anyone who has something of worth to add. The editor wishes to thank those whom have contributed their time and knowledge to improving the 'encyclopedia' at this early stage - they know who they are. Further contributions are welcome, if you have somthing to add, please do. At this time, there is no easy way by which contributions can be made without possible danger to the contributor or the editor. However, a PGP public key is now available at the end of this document and soon from public key servers. Using the key, contributors will be able to safely submit additions to the 'encyclopedia'. Full details will be anounced in the next issue. CONTENTS Tactics 1.0 - Demonstrations & Protests 1.1 - Blockades and Occupations How not to be moved Action in the water coming soon..! 1.2 - Contamination and 'Vandalism' Tree Spiking Pelt Painting Product Contamination 1.3 - Windows and glass Blow Torch Masking tape etc. Catapults Glass etching fluids Stickers and posters Spring loaded center punches 1.4 - Privacy and Keeping Secrets Tapped phones and spoken codes Intercepted mail and written cyphers Computer encryption Public key cryptology Pretty Good Privacy Under construction... ?.? - Breaking and Entering Further reading - Guide to Lock Picking Locksmiths FAQ ?.? - Anti-Blood Sports Further reading - Hunt Sabs ?.? - Ethical Shoplifting Further reading - CRISP actions ?.? - Economic Sabotage Damage to vehicles Further reading - The Terrorist Handbook 'Underground' magazines ?.? - Bomb scares and other hoaxes see also 'Profuct contaminations' ?.? - Dealing with the Police Further reading - Don't talk to coppers ?.? - Publicity and publicity stunts Roof-top demos ?.? - Watch your backs Further reading - How to kill a citizens movement Infiltration Informers INDEX DISCLAIMER Direct Action Campaigns, Organizations, Grass-roots groups Sea Shepherd Green Peace Earth First No M11 link road Animal Liberation Campaigns against Live Export Hunt Sabs Campaigns against Criminal Injustice Act 1.0 - DEMONSTRATIONS & PROTESTS 1.1 - Blockades and Occupations > How not to be moved. Why would you want to prevent yourself from being moved? Not moving is a major tactic for direct action. Not moving can is a method used successfully to prevent things from happening; missiles entering a base by road, live animals being loaded onto ships for export, trees being cut down, buildings being demolished, etc. It is practically impossible to prevent yourself from being moved, however some methods have been used with varying success as a means to delay the inevitable. Delays can cost the opposition considerable sums of money and can result in victory. Sit downs / sit in's Sitting down is often used as a method to prevent a demonstration being moved on. It can work but it seems increasingly ineffective in most cases. It is naive to think that being in a sitting position will make it significantly difficult for you to be forcibly moved. However, it does require a lot of people to move a large crowd of people sitting down. It also takes a long time. During the time it takes to move people out of the area, people who have already been moved off have the opportunity to move back in and sit down again, unless there are great numbers of police or security etc. to prevent this from happening. Sitting down can work, but if the opposition really want you moved they will do so, it just takes time and a lot of people. Linking arms Linking arms with other protesters (or objects) can also make removing protesters more difficult. Doing this means that greater effort is required to move each protester, it may also requires more people and will certainly mean it takes a longer time to clear the protesters. However it also invites more violence and a greater chance of injury to the protesters. This can be used to advantage when there are a lot of reporters and cameras around, violence to non-violent protests makes good publicity. Chains and handcuffs People don't like pain. This is used by the opposition when trying to detached protesters from things they are clinging too (whether other protesters or objects like railings). Bending back thumbs and fingers etc. will usually result in the grip being loosed or given up voluntarily to stop the pain. To prevent this from occurring, protesters sometimes chain or handcuff themselves to things. This method is not particularly effective since it is usually only done by small numbers of protesters. When the unchained protesters have finally been removed, the opposition is free to use bolt cutters or a hacksaw to remove the chained protesters. It is perhaps the cost of the hardware that prevents the technique from being used in large numbers. Even if a large crowd of protesters did all handcuff themselves to each other and around lamp posts etc. eventually all the cuffs would be cut off. A very expensive delaying tactics from the point of view of the protesters. Hi-bred systems Used to great effect by groups such as the 'No M11 link road campaign', hi-bred systems are very successfully in delay the removal of protesters. The basic principle in most of these systems is to place protesters in a way that only they can choice to leave, efforts to force them to leave will be very dangerous either to the protester or better still, to the opposition and the protester. One such method is to use the handcuffing tactic but to do it in such a way as to make it virtually impossible to get to the 'handcuff' in order to remove them. Take a plastic pipe of large enough diameter to place your entire arm inside. Drive a metal rod or pipe through the plastic pipe so that it passes though at right angles. Place this object into something large and cumbersome then cement it in so that at least one end on the pipe is free to place your arm down. Now take a careabena hook (as used in rock climbing, sailing etc.) and fix this to your wrist with strong but comfortable binds of rope. You can now place you arm down the pipe and hock onto the metal bar. Only you can unhook yourself, if anyone else wishes to move you, they most either move both you and the object at the same time, or they must take apart the object until then can unhook you, or carry you away attached to a smaller part of the object. Another method used by the 'No M11 link road campaign' was an impressive scaffold tower built onto of the roof of a house which they were trying to protect from being demolished. The tower was so tall that the 'cherry picker' cranes that the opposition usually used to remove protesters who were occupying pile driver etc., could not reach the protesters on the tower. It proved to be to dangerous to send normal police officers up the tower to remove the protesters. In the end it was the cold weather and lack of food and water that made the final protester come down voluntarily after an incredible 5 day eviction attempt. 1.2 - Contamination and 'Vandalism' Many methods have been used in the past and no doubt others will be used in the future. When used as a form of direct action these methods are an effective means of economic sabotage. Some of the methods discussed here have also been used for immoral ends and personal gain. Tree Spiking Tree spiking involves hammering big nails into trees, in a ring around the stem where you would expect it to be cut. The tactic is pointless and very dangerous if used without warning the workers and the company that the trees have been spiked. If a saw hits one of those nails or spikes, the people in the imeadiate area may be injured by flying fragments. In the one celebrated case, a mill worker was injured and he actually ended up sueing the loggin company for negligence. It has been said that a lumberjack in the US was killed when trying to cut a spiked tree. However, the incident is apparently an urban myth encouraged by the establishment. The aim of tree spiking is not to harm the logger. It is to create the potential of damage to expensive saws and blades in the mill (some of which cost upwards of $10,000). Presenting a logging company with a potential loss of money may encourage them to leave the spiked section of forest alone. Pelt Painting Used as economic sabotage, this form of direct action attracted great media attention and public support during the early eighties. The culling of seal pubs was made economically less viable when activists from groups like Sea Shepherd, used indelible dies and paints of the fur of the baby seals. Although the coloring may have wrecked the baby seals camouflage, it also wrecked the economic value of the pelts. Product Contamination A tactic used occasionally by groups in the animal liberation movement, it is also used by greedy individuals in an attempt to make a quick buck from blackmail. A product sold by the opposition is contaminated in some way, rendering it unsellable. With consumable products such as food or drink, the claimed contamination could be anything from mercury, rat poison etc. to razor blades or broken glass. Animal liberation activists prefer substances like salt which produce an unpleasant taste but produce no ill effects should someone actually consume it. Often a claim is made that a product has been contaminated when really nothing has been done at all. These hoaxes are often as effective for economic sabotage as the real thing. Such hoaxes may be quite elaborate; with real contaminated products being sent to media to aid the illusion. 1.3 - Windows and glass Plate glass windows found on shops etc. are not cheap. Destroying them is an effective method of economic sabotage. The same is true for vehicle windows which are also expensive to replace. Windows are also possible means of entry into buildings and vehicles. Burglars and activists involved in Animal Liberation are quite adept at breaking windows in a numbers of ways, each with advantages and disadvantages. Blow Torch As used by burglars. A blow torch is used to heat a windows glass before a cold water is applied, for example, with a damp cloth. The cold water causes the hot glass to crack and it does so much more quietly than using a brick! Masking tape and sticky paper During the blitz in the second world war, people put masking tape on their windows. They did this to prevent the glass from shattering everywhere if a bomb blast should occur nearby. Today, masking tape, sticky paper etc. is used by activists to prevent broken glass from making lots of noise when it falls and also to help prevent the mess of broken glass causing injury to themselves when they enter the building. Catapults Catapults and hard, heavy objects such as marbles, ball bearings or stones are used as a means to break windows as a distance for the purpose of economic sabotage. A catapult can be purchased easily (or shop lifted) from fishing tackle shops. Glass etching fluids Used by activists in the animal liberation movement, glass etching fluid a quiet method of economic sabotage. Usually used on butchers windows or car windscreens belonging to companies or individuals involved with animal abuse. Stickers, posters and graffiti Stickers are available that use adhesive that is very difficult to remove from glass. Such stickers are used in some areas on windows of cars that park in no-parking areas. Posters or graffiti can usually be removed from windows without much effort and fairly quickly. One method of slowing down the removal of the slogan or poster and also necessitating the need to replace the glass, is to glue a sheet of glass over the poster or slogan directly onto the windows glass. This is probably not a very popular action since it may be difficult to achieve and also time consuming. Spring loaded center punches A spring loaded center punch is a tool used to make a dent in metal before using a drill to make a hole. Unlike a normal center punch, it does not need to be hit with a hammer since it is spring loaded and requires very little effort. These tools are used by car stereo thieves and also adopted by ALF activists like Keith Mann. They break windows easily and quickly and can be bought from any decent hardware store. Privacy & Keeping Secrets In this the age of; national computer databases, video surveillance cameras, DNA finger-printing, eroding civil rights and ever increasing police powers, the privacy of the individual is seriously at risk. However some of the very technology that helps to deprive people of privacy, may now help them to regain it. When a citizens movement questions authority or challenges the status quo, there is a possibility that the interests threatened will attempt to monitor their actions. This may be done in order to; ascertain the danger posed, identify the individuals involved, discover ways to reduce the effectiveness of the movement or, if possible, destroy it. It is the communications between the members of the movement that are perhaps the most useful to the opposition and it should come as no surprise that phone taping and intercepting mail are amongst the methods commonly used against citizen movements. Thankfully there are methods that can be used to help minimize the problem, but most traditional methods are far from fool proof and hardly convenient, so inconvenient in fact that it is doubtful that they are used by many to any great degree. Tapped phones and spoken codes When making phone calls, some form of code could be implemented, substituting incriminating words with 'innocent' ones and also disguising sensitive information like times, dates and places. Producing an effective and flexible code is very difficult, rather like trying to invent a new language. All the people who are meant to understand the code must have been taught how to use it and the information about the workings of the code must be passed in private and must not be allowed to fall into the wrong hands at any time since all messages; past, previous and future, would be compromised. Most codes are also cumbersome in use, restrictive and easy to crack unless the code is changed frequently. Intercepted mail and written cyphers Slightly harder to crack and less restrictive would be the use of written messages that have been manualy encrypted and then sent through the post. A safe method of passing the 'key' is still necessary and manual encryption can be very cumbersome to use. The drawbacks may make this method impractical to use routinely and so when used, it could appear highly suspicious. Even if the opposition could not imeadiately understand the message, they might have their interest raised sufficiently to step-up surveillance, while putting resourses into cracking the code. Computer encryption So what's left? With a computer, military standard encryption algorithms may be used, that are virtually impossible to crack. They are flexible, fast and easy to use and since they are so easy to use they can be used routinely so there would be no additional suspicion raised, regardless of the importance of the actual message. While encryption offers a solution to the problems of phone tapping or mail interception, conventional methods have their own problems. To de-cipher a message requires the recipient to have the same key as that used by the sender to encrypt it. If the sender and recipient get the opportunity to meet face to face then the key can be exchanged, however there are situations when no safe channel is available. Public key cryptology Public key cryptology provides the solution. Each person using the system has two related keys; one secret, one public. The public key can be distributed freely, it doesn't mater if it falls into the hands of the opposition. Possessing the public key does not enable anyone to deduce the corresponding secret key. The secret key must be kept secure, however in case it should it fall into the wrong hands, the best systems add further protection by requiring a 'pass-phrase', known only by the owner, whenever the key is used. Before sending a message, the sender encrypt its using the public key belonging to the intended recipient. The resulting encrypted file can then be sent by Electronic Mail (or by disk in the standard post). The encrypted message can not be read by anyone (even with the public key), only by the person with the matching secret key and its 'pass-phrase'. The system also provides message authentication. The sender's own secret key can be used to encrypt a message, thereby 'signing' it. This creates a digital signature of a message, which anyone can check by using the sender's public key to decrypt it. This proves that the sender was the true originator of the message, and that the message has not been subsequently altered by anyone else. Forgery is not feasible, and the sender cannot later disown his signature. Both privacy and authentication can be provided by first signing a message then encrypting it with the recipient's public key. The recipient reverses these steps by first decrypting the message with their own secret key, then checking the enclosed signature with the senders public key. The advanced algorithms used by Public Key Cryptology and conventional single-key cryptology may be practically uncrackable and potentially helps to solve the problems of phone tapping and mail interception. However no system can free us from the threat of infiltration or stupidity! Even if the intended recipient of an encrypted message is the only person who can read them, if that person is careless or, not as trustworthy as hoped, all the senders efforts will have been wasted. Pretty Good Privacy Pretty Good Privacy (PGP), is a high security cryptographic software application based on "public key" cryptography (described elsewhere). PGP allows people to exchange files or messages with privacy, authentication, and convenience. PGP is available for most major computers and operating systems, including ; IBM PC, Apple, Amiga, Atari and UNIX systems. It is `free-ware' which means it costs nothing and is easy to obtain from any decent shareware library, computer bulletin board or anonymous FTP site. INDEX (Does the encyclopedia actualy need an index? After all, an index is usualy only needed in book as a means to find specific things withing the book. On the computer, a 'search' or 'find' tool is usualy available. What do you think?) Blow Torches Catapults Fur Glass Glass etching fluids Graffiti Green Peace Hunt Sabotage Locks Logging Masking tape etc. Pelt painting PGP Privacy Product Contamination Road Protesters Stickers and posters Spring loaded center punches Sit downs & sit in's Sea Shepherd Seal culling Tree spiking Windows < h1>APPENDIX DISCLAIMER Once again. This document is not a guide for activists! It is a document for academic interest and reference. It is hoped that a better understanding of the tactics used by direct action activists will come from reading this document.