Blog
Safety culture
Revolutionary strategy

Security culture, a foundation for collective trust

By
S.C
03
April
2023
Share this article

Security culture refers to habits, practices, and attitudes that are accessible to everyone and aimed at enhancing the safety of our communities. In the face of increasingly sophisticated tools of coercion and repression, resistance must adopt a culture that learns from past security breaches, striking a balance between paranoia and complacency, while remaining adaptable and up-to-date. This introduction provides a starting point, with further resources available at the end of the article for deeper understanding.

Principles of Security Culture

  • In a group, protecting yourself means protecting others, and vice versa. There can be no collective security without trust: limit discussions to the information strictly necessary to accomplish your mission.
  • Do not discuss involvement in clandestine or illegal activities, whether yours or others’. Do not question others about such matters. If someone brings it up, explain that you do not need to be informed about their actions.
  • You may discuss publicly known acts of civil disobedience, but avoid providing specific details. Do so only with individuals who are either already aligned with your cause or who could become allies.
  • You can promote resistance in all its forms, including sabotage, but only in favorable settings (e.g., among sympathetic individuals, known groups, or a larger audience if you are well-trained). Do not share specifics or issue explicit calls for violence.
  • Regarding police and intelligence services: Never speak to them. Their goal is not truth or justice but to extract information and bring charges against you. You are only obligated to justify yourself in court. Maintaining silence is the safest way to avoid divulging information without resorting to lies. If they attempt to enter your home, insist on seeing a warrant authorized by a judge. Without it, they have no right to access private spaces. Regularly destroy documents you no longer need.
  • Stay informed about current and upcoming laws as well as relevant legal precedents. Surround yourself with skilled lawyers and legal experts. Share and update information regularly with your group.
  • Strong security relies on a clear understanding of digital tools. Follow best practices, train collectively, and establish consistent security routines.

Aboveground Organization and Underground Organization

Aboveground Groups operate within the boundaries of the law or on its fringes while relying on various safeguards (media coverage, mass support, legal counsel, repression funds). Though they are easily identifiable, they are not obligated to maintain full transparency. Thus, withholding sensitive information is crucial. Lolipop is and will always remain a legal, non-violent organization. It will never initiate actions that exceed these parameters.

Clandestine or Underground Organizations operate in secrecy to avoid the potentially crippling repression that could jeopardize the group. Their security protocols are far stricter than those of aboveground organizations. It is crucial to decide between aboveground and underground involvement before fully committing to activism. Working on both fronts simultaneously risks compromising your cover or exposing your identifiable organization to persecution by authorities.

Questions & Answers

Wouldn’t it be safer if everyone completely hid their identity?”

Our activities inevitably leave traces that intelligence services can exploit, and it would be naive to think we can remain entirely anonymous. Burdening ourselves with overly restrictive measures can stifle our ability to act effectively. A strong security culture serves as a robust preventive shield, providing adequate protection while legitimizing our actions.

Using the internet for a revolution is foolish; you’d be so easy to track.”

While using digital tools does carry risks of tracking and data theft, these are outweighed by the utility such tools provide. It would be impractical for an aboveground organization to forgo the efficiency of digital tools for communication, collaboration, or training. By adopting proper protocols and behaviors, most risks can be significantly mitigated. For instance, information is shared through channels that align with the sensitivity and urgency of the message.

How should reckless individuals be handled?”

Security culture is a learned practice, and developing the necessary habits takes time. Approach those who overstep with patience and guidance, emphasizing their responsibility to ensure the group’s safety. Avoid prematurely accusing someone of being an infiltrator without concrete evidence, as most mistakes stem from well-intentioned but misguided actions. However, if an individual repeatedly violates security protocols despite clear reminders, they should be excluded from the group to safeguard its integrity.

Share this post

Don't miss out on any of our posts.

Subscribe to our newsletter to get the latest news.

Access the form

Further Reading

Join the resistance.

ATR is constantly welcoming and training new recruits determined to combat the technological system.