UK social centres gathering, 27th January Bradford

Saturday 27th January @ The 1in12 Club, Bradford
A day of workshops, discussions & ideas

To be followed by an evening of entertainment from the Mayhem Cabaret featuring…

The Sex Patels Punk meets Bollywood

Saturday 27th January @ The 1in12 Club, Bradford
A day of workshops, discussions & ideas

To be followed by an evening of entertainment from the Mayhem Cabaret featuring…

The Sex Patels Punk meets Bollywood
Spanner Anarcho ska punk from Bristol
BeyONdTV Keeping Underground Media Ugly

Plus benefit Cocktail bar, cheap entry & more entertainment throughout

All Welcome, more details to follow. Contact the club on 01274 734160
or socialcentrenetwork@lists.riseup.net

Faslane action

19.12.2006
Wednesday morning, 7:30am. A dark road somewhere North of Glasgow. Scottish cold and rain beating in my face. I’m chained via a bike lock to Irene, veteran of the Faslane struggle. One arm disappears into a tube, at the other end of which is my mate Steve. There are seven of us, five women and two men, standing in a line stretched across the road.

19.12.2006
Wednesday morning, 7:30am. A dark road somewhere North of Glasgow. Scottish cold and rain beating in my face. I’m chained via a bike lock to Irene, veteran of the Faslane struggle. One arm disappears into a tube, at the other end of which is my mate Steve. There are seven of us, five women and two men, standing in a line stretched across the road.

Headlights approach through the darkness; our high-visibility minders rush forward arms waving: “Slow down, SLOW DOWN, This is a blockade don’t you know!” There are flashing blue lights approaching now from further down the road; one of us makes the call “HO!” and we sink to the ground, laid flat out on the tarmac.

The next forty minutes are spent blinking beating rain out of our eyes, grimacing at police cameras and questions, being fed chocolate by our minders and eventually, sadly, being cut apart by a very efficient Scottish police force. We’re taken away to a mobile processing unit for the usual rigmarole. As we’re driven away we can see the traffic queues backing up in three directions; the Trident nuclear submarine base is the workplace for 7000 loyal subjects of Her Majesty…. and a fair proportion of them are now late for work.

It’s the least we can do…. They’ll be late for work plenty more times in the next twelve months – the Faslane 365 blockade is intent on disrupting activity at the nuclear base throughout that time and GOOD LUCK to them! The weapons that are based at Faslane are some of the most awful ever devised by humanity and if used would usher in oblivion for millions, and misery for millions more.

Our next 24 hours are spent in police lock-ups in Dumbarton and Clydebank. We are yet to hear if the “procurator fiscal” is intent on pressing charges but with 408 arrests so far and only 4 prosecutions it seems unlikely. But either way there are bigger issues at stake than the odd breach of the peace. As our political masters contemplate the renewal of Trident – against the wishes of the majority of the British people – it is incumbent upon the ordinary citizen to express our opposition in every way possible.

Apart from being grossly immoral the renewal of Trident would undermine all international attempts at nuclear non-proliferation, as well as being a financial disaster for Britain. It would signal 24 billion pounds NOT being spent on hospitals, schools, the environment, etc etc. What insanity makes us spend all this money so that we have the option of killing beautiful human beings? In the face of such a prospect a few hours in a police cell seems a minor inconvenience.

The Faslane 365 website (Please, Join the blockade!):
http://www.faslane365.org/

So you think that, were Trident built, there’s no chance it would ever be used? Maybe you should read some history:
http://news.bbc.co.uk/1/hi/world/europe/198173.stm
http://en.wikipedia.org/wiki/Stanislav_Petrov

Greenpeace’s view:
http://www.greenpeace.org.uk/MultimediaFiles/Live/FullReport/7611.pdf

My thoughts while in the cell:
http://nickleberry-huxtable.blogspot.com/2006/12/uncomfortable-truth.html

Violent protests in Copenhagen – “Ungdomshuset-The Youth House Stays”

Sunday December 17
More than 300 demonstrators were arrested in the Danish capital on Saturday after violent clashes between police and youths who were protesting against the planned closure of a youth centre in the city.

Sunday December 17
More than 300 demonstrators were arrested in the Danish capital on Saturday after violent clashes between police and youths who were protesting against the planned closure of a youth centre in the city.
“Ungdomshuset-The Youth House Stays”


1 – Protestors throw stones at police vans in a Copenhagen street December 16, 2006. Riots broke out when hundreds of young people started an unannounced demonstration to avoid eviction from Ungdomshuset (youth house). The use of the building was granted to young people for cultural purposes some twenty years ago by the City Council, but now the building has been sold to a Christian organization.

2 – Protestors occupy the Ungdomshuset (youth house) as a banner hangs from it in Copenhagen December 16, 2006. Riots broke out when hundreds of young people started an unannounced demonstration to avoid eviction from Ungdomshuset. The use of the building was granted to young people for cultural purposes some twenty years ago by the City Council, but now the building has been sold to a Christian organization. A police spokesman said some 300 people had been arrested. The banner reads ‘Some things are worth fighting for – the Youth House never surrenders (the address is 69 Jagvejen)’
Ungdomshuset 3
3 – A group of youths wearing masks and helmets demonstrate in a Copenhagen street December 16, 2006. Riots broke out when hundreds of young people started an unannounced demonstration to avoid eviction from Ungdomshuset (youth house). The use of the building was granted to young people for cultural purposes some twenty years ago by the City Council, but now the building has been sold to a Christian organization. The banner reads ‘The Youth House Stays’.

video

http://search.bbc.co.uk/cgi-bin/search/results.pl?q=Copenhagen&edition=i&go.x=27&go.y=9

——————————————————————————–

Videos!

Video clips from yestoday can be found on the following links:

http://www.youtube.com/watch?v=IClRITwCjsc – Danish TV2
http://www.youtube.com/watch?v=RmWP5PPxKFk – Swedish SVT
http://www.youtube.com/watch?v=5Ljdt6d5Tnk – Clip 1
http://www.youtube.com/watch?v=_MjcuyU9uHA – Clip 2
http://www.youtube.com/watch?v=epiiE2iRnIU – Clip 3
http://politiken.dk/poltv/?ExtID=1237

Privacy, Email and Activism – a brief intro

Recently there was a conference for activists interested in security issues – obviously something that any activist should be interested in. Notes from the gathering are being compiled along with previous documents into a printed booklet for activists which is expected to be distributed next year.

Recently there was a conference for activists interested in security issues – obviously something that any activist should be interested in. Notes from the gathering are being compiled along with previous documents into a printed booklet for activists which is expected to be distributed next year.
In the meantime I’ve been doing a little additional research on solutions specific to securing email communication…

Emails and passwords used by activists are vunerable to snooping from both the state and from private investigation. Even seemingly unimportant information gathered from emails can help build a profile on a person and their associates. Personal information might provide your enemies with leverage to turn somebody you know into a grass or make it easier to place an infiltrator in a position of trust.

What most people do not realise is that by default, the vast majority of email and even passwords are sent over the internet in plain text that can be rmonitored by anyone. Sit down at a computer in a library, college or internet cafe and anyone else on that network can easily read the emails you send and receive, not to mention steal your password. There are several ways to avoid this depending on how you access your mail.

Most activists tend to use web based mail these days so we’ll start with those.

If you look in the address bar on your web browser you will see that most addresses start with the letters http:// but sometimes you will see https://. The ‘s’ indicates that the connection is using SSL, a secure encrypted link between your browser and the web server. Most browsers also display a locked padlock symbol somewhere to provide a visual confirmation that the connection is secure. When you are viewing webpages over a SSL connection (such as on Indymedia), the data being transfered is no longer in plain text and can not be read by people attempting to monitor you. This protection also applies to information you submit in web forms, such as usernames and passwords when checking webmail.

In other words, the most basic and essential thing to do to secure your email is use SSL connections if you use webmail. For example, if you use riseup webmail you should go to https://mail.riseup.net rather than http://mail.riseup.net

We should now breifly look at the use of POP and SMTP for those not using webmail. If you don’t know what these are, don’t worry, they are two of the most common protocols used for downloading and uploading messages using an email client installed on your own computer. Examples of email clients include Outlook, Eudora, Pegasus and Thunderbird. Again, the problem you need to be aware of is that these protocols are by default not secure and all emails and passwords are sent as plain text. You need to configure your account settings within your email client to use a secure authenticated connection such as SSL. It’s beyond the scope of this article to explain how but the help function of your client plus the help pages for your email provider will provide specifics.

It’s obviously essential to use SSL (or similar) to protect your email password. However, when you send an email it will still travel over the internet in plain text as SSL only protects the connection between your computer and the server. To protect the contents of the email for the entire trip it will need to be encrypted so that only the intended recipient can read it.

You may have heard of PGP ( http://en.wikipedia.org/wiki/Pretty_Good_Privacy), a computer program that encrypts (scrambles) and decrypts (unscrambles) documents and emails. The initials stand for pretty good privacy and like it says, it’s pretty good! Some people claim that the worlds most powerful computers could use brute force to break the encryption in a mater of just a few hundred of years while other put the time required at longer than the age of the universe. Of course, computers get faster all the time so either way the time frame might eventually be reduced to within a human lifetime but even so, it’s likely that by the time anyone broke the encryption the content would no longer be valuable. ( http://axion.physics.ubc.ca/pgp-attack.html)

I will not go into detail how PGP works as there is plenty of information about it on the web. More important is how to use it. The trouble with PGP has traditionally been that people not to confident using computers have been unable to use it effectively. However, over the years it has become much easier to use as it has been provided with a simply graphical point and click interface and also intergrated into email clients. Once installed and configured correctly, it’s now a simple mater of click decrypt or encrypt plus typing your passphrase.

There is the saying that a little knowledge is a dangerous thing and that is certainly true of encyrption technology. PGP uses Public Key Cryptography and it is vunerable to what is known as a man in the middle attack. This vunerability exists only during the exchange of public keys required to initiate exchange of encrypted messages. Again, it is beyond the scope of this article to describe the attack and you can easily look up the information elsewhere. The important thing is that if these keys can not be exchanged in person then it is vital to confirm that the keys have not been substituted on route. This is done by comparing the keys ‘fingerprint’ by reading them out on the phone etc.

Finally. They say misery likes company and so, ironicaly, does privacy. The more people who routinely encrypt their communications the more secure everyone becomes. If you were the only one using encryption then it might draw attention to you and anyone you communicate with. If you only use encryption for ‘dodgy’ emails then this might also attract attention. Once you have the software installed and configured it makes sence to use it whenever possible regardless of the contents of the email.

Further reading:
http://en.wikipedia.org/wiki/E-mail_privacy
http://en.wikipedia.org/wiki/Email_Encryption
http://en.wikipedia.org/wiki/Pretty_Good_Privacy
http://www.andrebacard.com/pgp.html
http://en.wikipedia.org/wiki/GNU_Privacy_Guard

Software
http://www.pgpi.org
http://www.gnupg.org/ (also known as gpg, open source version of pgp)
http://www.gpg4win.org/ (gpg installer for windows)
http://macgpg.sourceforge.net/ (Mac OSX port of GnuPG)

Additional software suggestions

Don’t have your own computer or don’t take it with you everywhere you go? Well there are interesting options available now utilising USB memory sticks. These have got really cheap recently and you can get a 1gb drive for under 20 pounds. That’s a lot of space and it fits in your pocket.

People have been developing what are called portable applications ( http://portableapps.com/). These run from the USB stick rather than needing to be actually installed on a specific computer. More importantly they are configured so that temporary files ect are store on the stick so as not to leave a trace on the computer they are running on.

With one of these sticks and the right software you can walk into a library etc and use a public computer to run your own software and access your own files. It is a very useful way to have access to your mail etc and the data on the stick can be encrypted using software such as TrueCrypt.

Anyway, in the context of the article above I wanted to mention a couple of specifc portable applications. Both are portable email clients based on Thunderbird.

One is called Mobility Email and it includes OpenPGP and S/MIME encryption. It supports IMAP, POP, SMTP and web based email. It is designed to from any location with no installation or configuration, allowing access your email and contacts on multiple machines. Most importantly, no personal data is left behind once the application is closed.

http://en.wikipedia.org/wiki/Mobility_Email
http://www.mobilityemail.net/

There is also the official Mozilla Thunderbird Portable Edition (formerly Portable Thunderbird). There are two packages available, one with GPG and Enigmail preconfigured to encrypt and sign your email.
http://portableapps.com/apps/internet/thunderbird_portable

Note. Those npeople who don’t require portability may well be interested in using the orinary Thunderbird email client plus openPGP and the Enigmail extension to provide an easy to use and fully interigrated email encryption system. It’s cross platform, free and has a large community of user and developers. You can even use it with the Webmail extensions to access yahoo, hotmail and gmail accounts etc.
http://enigmail.mozdev.org/

——————————————————————————–

Riseup users and PGP

It’s a little known fact but riseup users can use PGP from within their webmail accounts. I only discovered this recently and as far as I can tell it’s only been an option since riseup upgraded to version 4 of IMP in late 2005.

Only the IMP webmail has the PGP feature, not Squirrelmail which I guess most riseup people use simply because it’s at the top of the login page. However, you can swap between the two without problem if you’ve already been using Squirrel.

The PGP features are not enabled by default and it’s a bit hidden away which might explain why I’ve never heard mention of it. The riseups documentation on security makes no mention of the feature, not even in their PGP page. I checked on google for anything about pgp on riseup but couldn’t find anything either so I decided to write a ‘how to’.

HOW TO SET UP PGP IN RISEUP

To enable the feature you have to login to the IMP webmail (obviously make sure you are using a secure connection https:// as described in the article above). When logged in you click options from the top navigation menu then click ‘PGP Options’ under other options on the right hand side.

Now you tick ‘Enable PGP functionality?’ then click ‘Save Options’ and the page refreshes and you have a bunch more options. I suggest you don’t tick ”Should your PGP public key to be attached to your messages by default?’ but you probably should click ‘Should the body of text/plain messages be scanned for PGP data?’

Further down the page you have two more sections which weren’t there until you enabled PGP. One of these is ‘Your PGP Public/Private Keys’. If you already have a PGP keys then you will need to upload them here by clicking upload and either copy and pasting the approbriate key or browsing the file on your machine and attaching it.

However, if you don’t have a PGP key pair then you can actually create them now from within IMP. Personally I feel this is a bit of a security risk as it requires you to trust riseup, but then again you have to trust riseup if you are planning on using webmail with your email in the first place. Creating a key pair using IMP is easy, just follow the instructions.

Once you have you keys created or uploaded you need to enable the address book. This is perhaps the most illogical part of the configuration. There is a line on the page where the words ‘PGP Options’ appears on the left and the following on the right ‘<< Address Books | S/MIME Options >>’

Click on the link to Address Books and then on the new page you will see a pull down menu towards the bottom with the words ‘Choose the address book to use when adding addresses’ written above. Change the selection from ‘None’ to ‘My Address Book’ within the drop down menu and then click ‘Save Options’ at the very bottom of the page.

You can now return to the PGP Options page and upload your friends PGP public keys to the newly enabled address book. It’s just a matter of cut and pasting the key block from an email etc.

That should be it… click ‘Save Options’ again just incase and then return to your Inbox

USING PGP ON RISEUP

When you create a new message you will find new options below the text body, just below the Send Message button. These are a drop down menu from which you can choose to sign and/or encrypt your message with PGP, and also a tick box enabling you to send a copy of your PGP public key with your message. When you click Send Message you will be asked for your passphrase in a seperate box and then you click Send Message again.

! It’s worth pointing out that if you have popup filtering activated (and you should), then you must configure it to allow popups from tern.riseup.net and petrel.riseup.net otherwise you won’t get the enter passphrase window appearing and you won’t be able to encrypt or decrypt anything.

When you recieve a PGP encrypted message you will find a box that reads “This message has been encrypted with PGP. You must enter the passphrase for your PGP private key to view this message.” (again, popups must be enabled or it won’t work). Obviously you type your passphrase and you get to read your message.

! Don’t forget to log out when you have finished or somebody else might come along and continue using your webmail session with the passphrase still cached so be able to read your encyrpted messages!

That covers it all I think. For the best security it would be preferable to use PGP locally on your own machine which you are sure is secure. However, the PGP option with riseup is still very very useful. DONT FORGET.. YOU MUST USE A SECURE SSL CONNECTION TO HTTPS://RISEUP.NET

Finally, a few quick notes on choosing a PGP passphrase.

Do not use the same password as you use for your email or any other purpose. .
Do not write it down but obviously choose something you can remember.
Avoid dictionary words and names of your family or pets.
Aim for at least 12 to 16 characters
Mix uper case and lower case letters, numbers and punctuation for the strongest passphrase.

——————————————————————————–

Use secure email providers

Following the link to riseups pages on security I found this information which is quite interesting. Basically it’s about a protocal which mail servers can use to talk to each other securely so that emails are passed from source to destination and not be read on route. Not all mail servers offer this service but riseup does and it lists other activist tech collectives that provide such mail mail servers. Obviously it would be better to encrypt all mail using PGP etc but that’s not currently realistic so for those messages that still go as plain text it is a very good idea to be using a mail service that provides StartTLS.

(taken from riseup…)

What is StartTLS?

There are many governments and corporations which are sniffing general traffic on the internet. Even if you use a secure connection to check and send your email, the communication between mail servers is almost always insecure and out in the open.

Fortunately, there is a solution! StartTLS is a fancy name for a very important idea: StartTLS allows mail servers to talk to each other in a secure way.

If you and your friends use only email providers which use StartTLS, then all the mail traffic among you will be encrypted while in transport. If both sender and recipient also use secure connections while talking to the mail servers, then your communications are likely secure over its entire lifetime.

We will repeat that because it is important: to gain any benefit from StartTLS, both sender and recipient must be using StartTLS enabled email providers. For mailing lists, the list provider and each and every list subscriber must use StartTLS.

Which email providers use StartTLS?
Currently, these tech collectives are known to use StartTLS:

* riseup.net
* resist.ca
* mutualaid.org
* autistici.org/inventati.org
* aktivix.org
* boum.org
* squat.net
* tao.ca
* indymedia.org
* eggplantmedia.com
* so36.net

We recommend that you and all your friends get email accounts with these tech collectives!

Additionally, these email providers often have StartTLS enabled:

* universities: berkeley.edu, johnhopkins.edu, hampshire.edu, evergreen.edu, ucsc.edu, reed.edu, oberlin.edu, pdx.edu, usc.edu, bc.edu, uoregon.edu, vassar.edu, temple.edu, ucsf.edu, ucdavis.edu, wisc.edu, rutgers.edu, ucr.edu, umb.edu, simmons.edu.
* organizations: action-mail.org, no-log.org
* companies: speakeasy.net, easystreet.com, runbox.com, hushmail.com, dreamhost.com, frognet.net, frontbridge.com, freenet.de, blarg.net, greennet (gn.apc.org)

What are the advantages of StartTLS?

This combination of secure email providers and secure connections has many advantages:

* It is very easy to use! No special software is needed. No special behavior is needed, other than to make sure you are using secure connections.
* It prevents anyone from creating a map of whom you are communicating with and who is communicating with you (so long as both parties use StartTLS).
* It ensures that your communication is pretty well protected.
* It promotes the alternative mail providers which use StartTLS. The goal is to create a healthy ecology of activist providers–which can only happen if people show these providers strong support. Many of these alternative providers also also incorporate many other important security measures such as limited logging and encrypted storage.

What are the limitations of StartTLS?

However, there are some notable limitations:

* Your computer is a weak link: your computer can be stolen, hacked into, have keylogging software or hardware installed.
* It is difficult to verify: for a particular message to be secure, both the origin and destination mail providers must use StartTLS (and both the sender and recipient must use encrypted connections). Unfortunately, it is difficult to confirm that all of this happened. For this, you need public key encryption (see below).
StartTLS

——————————————————————————–

512 bit encryption broken in less than a second

The problem with technology as a means for secure communication is it’s own advancement. What is secure today may not be secure tomorrow. And people who think they’re safe, using PGP or whathaveyou, then share information over email that should only be shared face-to-face.

source: http://www.khaleejtimes.com/DisplayArticleNew.asp?xfile=data/theworld/2006/November/theworld_November597.xml§ion=theworld
crypt broke

————-
“The report’s authors, Onur Aciicmez, Cetin Kaya Koc and Jean-Pierre Seifert depict a concrete attack on OpenSSL on a Pentium 4 processor, albeit using a key that would be considered quite short by today’s standards (512 bit).”

Hmmm.. What is described requires the attacker to be running hiden software on the machine performing the encryption operation – in other words it requires that attacker to have installed software either with physical access to a machine or remote access. Now certainly, if you are using an insecure operating system like windows then it would be a risk, however a far easier attack in this case would be to use a keylogger, either software or hardware.

In other words, Seifert and his colleagues discovery is unimportant in relation to email security since much easier and more practical exploits exist already.

Bloggers writting about the new technique have suggested it it is the security of applications using Digital Rights Management (DRM) most likely to be threatened by such techniques. For example, user might use the technique to remove the license protection on WMA audio files they purchase so that they can share them with friends. In this situation they would obviously be well placed to install the spy processes required in the attack.

You attempt to discourage people from using the technology employed by financial and government institutions etc is a waste of time. The weak point in all these security measures is the people using them. Obviously there is a lot to be said for low tech ‘cold war’ solutions like going to meet somebody face to face but it’s a lie to suggest they are themselves are without significant risk.

Mobile phones, the stealth ID card, bug and tracking device in your pocket.

Earlier this month it emerged that the FBI had been remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations. The surveillance technique, which “functioned whether the phone was powered on or off.” came to light as a result of a ruling by U.S. District Judge Lewis Kaplan on the legality of the “roving bug”. It had been approved by U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping. Cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations.

Earlier this month it emerged that the FBI had been remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations. The surveillance technique, which “functioned whether the phone was powered on or off.” came to light as a result of a ruling by U.S. District Judge Lewis Kaplan on the legality of the “roving bug”. It had been approved by U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping. Cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations.

The news that the FBI had been remotely activating mobile phones as eaves dropping devices confirms what many activists have been saying for years.

“A cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone. This is done by transmitting to the cell phone a maintenance command on the control channel. This command places the cellular telephone in the ‘diagnostic mode.’ When this is done, conversations in the immediate area of the telephone can be monitored over the voice channel.” – National Reconnaissance Organization newsletter,1997.

As long as I can remember there has been a kind of unspoken rule among activists about taking batteries out of mobile phones during meetings to prevent bugging – along with occasional arguments about it being paranoid. While it has long been know to be a theoretical possibility, the mafia court case confirms it is actually a practical technique and is being used.

It is not clear exactly how the FBI achieve their remote activation but it is known that it is possible to update the software on a mobile phone by sending an unnoticeable SMS message to a particular cell phone. Changes to the phones software than make it possible to spy on the user around the clock, as long as the phone has power. All SMS messages can be read and all calls and conversations can be listened to, including those taking place in the vacinity of the phone. It would also be possible to access and copy address books and other information stored on the phone.

It should be fairly obvious to anyone that simply ‘switching off’ a mobile phone could not prevent the software from reactivating the phone at will. Like most computers, the on/off switch on a mobile phone is simply a button that requests the software to do something, ie.. turn the phone on or off – or more acturately, switch the phone between standby and normal operations. Many have an alarm feature which can operate when the phone is apparently ‘switched off’.

Some of the vunerabilities of mobile phones may only be exploitable by the state or private interests with financial muscle to obtain access to the records of mobile phone networks. Others however are much easier to exploit and well within the capabilities of private investigators. One example is the ability to read mobile phone numbers from all phones in a room as those phone routinely poll and communicate with the nearest cell phone repeater.

And lets not forget the ability to track cell phones (again, potentially even when they are turned off). With the data retention laws requiring mobile phone networks to keep this data for a year or so, it is easy for the authorities (or private agencies with influence) to not only monitor somebodies movements but also cross reference that with other people and build up acturate pictures of networks of association.

As repression on dissent increases, it is vital that we are all aware of the information we provide our enemies and what steps we can take to limit the damage.

What advice might you consider?

Don’t take any mobile phone to a meeting and if you must, remove the battery.
Don’t take your personal mobile phone with you on actions.
Remove the battery if making journeys others should not know about.
Better yet, don’t take the phone or send it out on a walk in the park with a friend.
Don’t power up you ‘clean’ action phone in any building you don’t want assocaited with an action.
Never use ‘clean’ action phones to call comrades personal phone numbers.
Don’t call a ‘clean’ action phone from any ‘non clean’ phone.
Don’t continue to use the same set of action phones on future actions.
Only pay cash for phone credit and don’t not from places with CCTV (difficult).

Further reading…

FBI story:
http://news.zdnet.com/2100-1035_22-6140191.html http://www.informationliberation.com/?id=18443
http://arstechnica.com/news.ars/post/20061203-8343.html

Background:
http://www.wasc.noaa.gov/wrso/security_guide/cellular.htm

Some examples…

Clearly the police are using the location records of phones to link people to actions, some recent examples:

“A GANG of travellers are facing jail for a series of violent ram-raids, robberies and burglaries after they were linked to the crimes through mobile phone records.”

“Mr Farmer said mobile phone records had been crucial in securing guilty pleas and convictions…”

http://www.cambridge-news.co.uk/news/ely/2006/12/13/80f9ff15-a536-4d01-9e77-743d900618d6.lpf

“At a press conference this morning Mr Gull said that officers were looking at mobile phone calls made and received by the girls and were also analysing DNA, but refused to go into more detail.”

“When asked about Anneli and the other women’s mobile phone records, Mr Gull said: “I don’t want to go into details, it’s very sensitive, but it’s something we’re looking at.â€?

http://new.edp24.co.uk/content/news/story.aspx?brand=EDPOnline&category=News&tBrand=EDPOnline&tCategory=news&itemid=NOED16%20Dec%202006%2015%3A37%3A43%3A720

“THE EADT has now filed an official complaint against Suffolk police after its most senior detective obtained the private mobile phone records of a journalist in a bid to discover his sources.”

“Editor Terry Hunt has requested a full explanation for the action taken by Det Supt Roy Lambert in a letter sent yesterday to Chief Constable Alastair McWhirter.”

“As revealed in yesterday’s EADT, confidential mobile phone records of reporter Mark Bulstrode were obtained by Mr Lambert so he could find out who he had been speaking to.”

“The move was taken after the journalist approached the force with information about the reopening of an historic investigation.”

http://www.eadt.co.uk/content/eadt/news/story.aspx?brand=EADOnline&category=News&tBrand=EADOnline&tCategory=news&itemid=IPED01%20Dec%202006%2019%3A35%3A22%3A490

A the pieces are now in place for the electronic police state.

Court rejects ASBOS for airport activists

On Friday, Loughborough Magistrates Court rejected calls from the Crown Prosecution Service to slap ASBOs on the 24 Plane Stupid activists who they described as “highly organised extremists� that were arrested in connection with the shut down of Nottingham East Midlands short haul airport in September.

On Friday, Loughborough Magistrates Court rejected calls from the Crown Prosecution Service to slap ASBOs on the 24 Plane Stupid activists who they described as “highly organised extremists� that were arrested in connection with the shut down of Nottingham East Midlands short haul airport in September.

In an apparent move aimed to avoid having the case heard by a jury, the charge of public nuisance was dropped, as was the charge relating to an alleged breach of the aviation and security act.

Plane Stupid lawyer, Mike Schwarz, described the action to the court as a “classic piece of civil disobedience� and reminded the court that “Tony Blair himself has described climate change as the greatest threat facing mankind.�

Campaigner for Plane Stupid, Ellen Rickford, said, “The same day that we learn the government is pushing ahead with its airport expansion proposals, they try to use ASBOs to stamp out peaceful protest. Well, it seems their plans for that were as doomed as the aviation industry.�

17 activists got one year conditional discharges (the minimum sentence available) and each was charged £70 in costs. The 5 charged with criminal damage in addition to aggravated trespass were given varying levels of community service.

One person was referred to Crown Court due to unresolved legal issues and another had his case adjourned until January 31st. One other activist was unable to attend court due to illness.

Help us pay our fines! Donate via: www.planestupid.com

Santas Against Excessive Consumption hit London, 16.12.06

Santas Against Excessive Consumption (SAEC) went out to play for the second year running on Saturday December 16th 2006, dropping in on the Shell-sponsored Natural History Museum (NHM) on the way to the consumer hell that is Oxford Street.

Santas Against Excessive Consumption (SAEC) went out to play for the second year running on Saturday December 16th 2006, dropping in on the Shell-sponsored Natural History Museum (NHM) on the way to the consumer hell that is Oxford Street.

At the NHM we wandered through the crowds holding our ‘Lappland is melting’ and ‘Reindeer can’t swim’ placards, explaining that excessive consumption was melting our ho-ho-home, and as such it was going to be tough to ensure a good supply of presents in the future. We had a bit of interaction with people waiting to skate on the British Airways-sponsored ice rink. Half the rink was closed because it was too wet and slushy – the ice had melted. The employee with the thankless task of trying to herd us out disagreed with me when I suggested that this was symbolic. His word? ‘Ironic.’

‘See you next year!’, promised the mouthiest Santa as we left, (since monthly visits are planned by SAEC’s friends London Rising Tide in 2007.) Then it was on to join reinforcements in Oxford Street, using the tube journey as a chance to thank the punters for taking public transport a well as smiling at bewildered nippers wondering if we could have any connection to the real thing. Taking up residence at Oxford Circus, some anti-corporate carols were given a good seeing to, and leaflets distributed. A festive foray into Niketown resulted in a swift but friendly expulsion, while a minstrel-like wander into the big Apple shop triggered a grumpier response. The plea to ‘Sing your own songs to eachother this Christmas!’ was interpreted as some sort of advertising by a competitor, and this as well as some live and direct carolling inside the shop led to the police being called. But we stood our ground when asked by the humbugging coppers to move away from the shop window, and soon enough they evaporated.

By that time we were pretty much Santa-d out, so decamped to a caff to fill up on caffeine and divest ourselves of the magic but by this time somewhat bedraggled beards and suits that made people smile at us and take our subversive leaflets. Take care until next year…

www.londonrisingtide.org.uk
www.artnotoil.org.uk/gallery/v/Shell
www.shelloiledwildlife.org.uk
07708 794665
london@risingtide.org.uk
—————————
Text of the Oxford Street leaflet:

LAPPLAND IS MELTING!

Today is the busiest shopping day of the year. Oxford Street is crammed with consumers all scrambling for the latest must-have item, the perfect present that will buy Christmas joy. Most of us find this part of Christmas incredibly stressful – there’s never enough time, tensions run high, and the obligation of gift exchange rules the season.

So why do we buy in to Christmas shopping madness? Maybe it’s time to start figuring out why we so desperately need a 5-speed electric toothbrush in the first place, or why our children will be devastated if they don’t get the latest McNikeSoft Godzilla Action Figure that tops The List. It might well boil down to the fact that we are each exposed to 3,500 adverts per day. (No really, try counting!)

Corporate advertising can actually be seen as the largest single psychological project undertaken by the human race. We are told from the day we are born that increasing our material wealth will make us happier people, and if we want to show someone that we love them, we must buy them something – the more expensive, the more we love them.

Christmas consumption causes climate chaos!

The problem is, corporate consumer culture doesn’t just breed stress – it creates environmental catastrophe. If everyone in the world were to consume at the level we do in the West, we would need 5 extra planets. But it’s not just about disappearing rainforests and mountains of rubbish. Our excessive consumption is also causing climate chaos, with disastrous effects like hurricanes, flooding and other freak weather patterns.

We know that climate change is directly caused by the burning of fossil fuels (oil, coal and natural gas) to power our offices, heat our homes, and fuel our cars & planes. But tackling climate change is not only about taking the bus and switching off lights. Every product that is produced, transported, bought, used and thrown away eats up energy that we don’t have, and creates pollution that our climate can’t handle. And if that product is made of plastic (and think how many are), then it’s literally made of oil.

Us Santas aren’t suggesting you don’t give your loved ones presents this year. But why not make one or two of them, trade with friends, or buy locally. Think about the products you’re buying – what they’re made of, where they came from, how they got from there to here…and whether they’re actually going to make someone any happier.

—————–
Text of NHM leaflet:

WHAT LIES BENEATH SHELL’S WILD LIE?

Hello and Merry Christmas. We are Santas Against Excessive Consumption, and we’ve dropped into the Natural History Museum on our way to Oxford Street, to sing a few carols and to remind museum-goers that excessive consumption of oil is causing Lappland – our home! – to melt.

Why is this relevant to the NHM? Because Shell, the world’s third largest oil company, is also the new sponsor of the its Wildlife Photographer of the Year exhibition.

Could you join the campaign opposing this sponsorship, write to the Museum or lend images to our ‘Shell’s Wild Lie’ counter-exhibition?

Despite attempts to ‘greenwash’ its reputation via blanket advertising and cultural sponsorship, Shell is still heavily implicated in producing ever-greater quantities of the oil and gas that are destabilising our climate to such an alarming degree. Climate change is set to wipe out millions of plant and animal species and to devastate the poorest regions of the planet. Shell’s activities also result in oil spills which are major causes of death and destruction for many varieties of life. Its planned refinery and pipeline project in Country Mayo, Ireland, threatens a pristine ecosysystem, not to mention the homes and livelihoods of the inhabitants. Lastly, Shell is currently constructing a massive development at Sakhalin Island in Russia which is threatening the survival of the Western Pacific Grey Whale. For all these reasons, Shell should not be sponsoring the Wildlife Photographer of the Year exhibition. We call on the Natural History Museum to end its sponsorship deal with Shell.

Tell NHM boss Michael Dixon directly what you think of Shell (not to mention BP, which is a Museum partner):
(020) 7942 5000; m.dixon@nhm.ac.uk, cc’ing to feedback@nhm.ac.uk & us.

…and get more involved in the Art Not Oil campaign/exhibition via London Rising Tide, taking creative direct action on the root causes of climate chaos

london@risingtide.org.uk
http://www.londonrisingtide.org.uk

Cambridge March for Consumerism

On Saturday December 16 a group of people in Cambridge held a March for Consumerism. They set off outside the Grafton Centre shopping mall carrying placards with slogans such as “Spend”, “Buy more stuff”, and “Climate change is someone else’s problem”.

On Saturday December 16 a group of people in Cambridge held a March for Consumerism. They set off outside the Grafton Centre shopping mall carrying placards with slogans such as “Spend”, “Buy more stuff”, and “Climate change is someone else’s problem”.

The protesters received many quizzical glances and even struck up a few conversations with people walking down Burleigh Street and Fitzroy Street. A police officer stopped to talk to the protesters but seemed to be happy for them to continue their march as long as they didn’t go in the mall. The protesters also gave out a leaflet which pointed out the links between unnecessary consumerism, the exploitation of workers, and environmental problems such as climate change.

Websites listed on the leaflet were:
Exploitation of workers: www.nosweat.org.uk
Climate change: www.stopclimatechaos.org
Consumerism: www.enough.org.uk

http://www.cambridgeaction.net

Shell education in Barnsley

On Saturday 16th December potential customers at a Shell petrol station in Barnsley were given information about the activities of Shell in Mayo and encouraged to boycott the company.

Barnsley Shell protest 1Barnsley Shell protest 2On Saturday 16th December potential customers at a Shell petrol station in Barnsley were given information about the activities of Shell in Mayo and encouraged to boycott the company.

A group from Rhythms of Resistance North moved in on the petrol station mid-afternoon. The entrance and exit were blocked, banners hung and leaflets given to motorists and pedestrians with information about the Mayo pipeline. Many people received the information sympathetically. One motorist returned from the nearest alternative source of petrol, two miles away, so people could be diverted to it.

Several car drivers however were very confrontational, driving into sambistas and in one case forcing a player on to their car bonnet before braking to cause her to fall off.
The first police to arrive read out various threats, which couldn’t be heard above the drum beats. Eventually reinforcements arrived, adding to the chaos with a number of vehicles of their own. For a while they held up the traffic so their photographers could get a better view.

When it came to the point of inevitable arrest for continuing the blockade the sambistas decided it would be more productive to move to the pavement and continue drawing people’s attention so they could be given more information. A fair proportion of car drivers chose not to enter the station even when the entrance was unblocked.

http://www.corribsos.com/

FARMER PULLS OUT OF GM CROP TRIAL (updated)

15 December 2006
A Farmer who had agreed to genetically modified potatoes being grown on his land has pulled out of the scheme after receiving threats.

The crops were to be planted in Borrowash by BASF Plant Science, which was granted permission for the project by the Government earlier this year.

15 December 2006
A Farmer who had agreed to genetically modified potatoes being grown on his land has pulled out of the scheme after receiving threats.

The crops were to be planted in Borrowash by BASF Plant Science, which was granted permission for the project by the Government earlier this year.

But yesterday, it was revealed the farmer with whom the company had agreed a deal was not willing to go ahead.

BASF is also planning a GM trial in Cambridgeshire.

A spokesman for the Department for Environment, Food and Rural Affairs, condemned the people who had targeted the farmer.

He said: “This gentleman has had some threats made against him and his family and so decided he didn’t want to participate.

“It is up to the company to decide whether it will look for an alternative site.

“We think it is outrageous this man has been threatened in this way.”

The potatoes would have been chemically altered to contain a gene from a variety of wild potato that would have made them resistant to the late blight disease.

Late blight, which sparked the Irish potato famine, affects between five and 10 per cent of UK potato crops each year.

BASF Plant Science had planned to start the trial in Derbyshire next March or April. It would have lasted several years.

The company did not reveal the location of the trial to try to protect the farmer from opponents of the scheme, who claim GM crops pose a threat to the environment when seeds spread in the wild.

Some residents of Borrowash were concerned about the crops trial. Jackie Flint, of Cole Lane, said: “There were many people who were worried about it going ahead around here, so I think it will be seen as good news that it’s been stopped.”

No-one from BASF Plant Science, a plant biotechnology company based in London, was available for comment last night.
————-
BASF is expect to confirm another trial site within two weeks, but could not say if it would be in Derbyshire.