Activist Mediation Network Launched!!!!!

Want to learn mediation skills?
Interested in helping support activist groups engage with internal disagreements and conflict, to make them more effective?
Want to tackle conflicts in your personal life that interfere with your activism?

Want to learn mediation skills?
Interested in helping support activist groups engage with internal disagreements and conflict, to make them more effective?
Want to tackle conflicts in your personal life that interfere with your activism?

Our launch events will be training days:

Northern Launch –
Leeds on 10th March 2007, from 11am – 5pm

Southern Launch
– London on 17 March 2007, from 11am – 5pm.

The aims of these days are:

To train people in conflict resolution skills that they can use in their own lives and activist work
For people interested in volunteering with us to receive training and to meet with us to discuss taking it further.

If you have a specific conflict or situation that you would like to discuss with us, then please get in contact and we’ll see if we can help.

Activist Mediation to the rescue! (not really!)

Details of the training days:

Booking essential: Please email activistmediation [at] aktivix [dot] org
Cost: We are asking for a £10 donation to fund expenses and help set up a travel fund to help with our mediation work. If money would prevent you from attending, then get in touch.
Creche: We are not providing creche facilities, but if childcare issues are preventing you attending, please get in touch and we’ll try and sort something out.
Access: Both venues are wheelchair accessible, and have accessible toilets. For other access needs, please contact us.
Lunch: Not provided. Please bring your own.
Transport and Accommodation: Get in touch if you have any issues or can offer a lift.

For further information have a look at our website www.activistmediation.org.uk
or telephone us on 0845 223 5254, and get in touch.

Background

For the last few years we have both been involved in mainstream mediation, and using these skills at various activist camps and situations (Climate Camp, Earth First!, Radical Routes, Trident Ploughshares). We have also been asked to work with other activist groups to help them resolve internal conflicts. There is obviously a need for this work to be done on an ongoing basis, and so we have decided to set up an activist mediation network. The aim is not for us to solve conflicts, but to skill share and offer impartial mediators in order to help groups and individuals resolve their own conflicts.

critical mass 29 december Mcr – a story from the ride

critical mass fri 29 december

We met at the usual time and place of 6pm at central library in Manchester city centre. There were about ten of us, numbers being a bit low becasue many people had gone to other towns and cities for christmas and new year, but making up the numbers we had people from Aberdeen, York and Swansea!

critical mass fri 29 december

We met at the usual time and place of 6pm at central library in Manchester city centre. There were about ten of us, numbers being a bit low becasue many people had gone to other towns and cities for christmas and new year, but making up the numbers we had people from Aberdeen, York and Swansea!

We rode around the roads for an hour and a half with the bicycle
soundsystem playing a mixture of Slayer and Country/ folk. Some people cheered us and some drivers tried to kill us by dangerously overtaking us and driving on the wrong side of the road nearly into on-coming cars.

One woman said that we were being mean to her children becasue we were slowing her down and so I explained that we were celebrating bikes over car culture because amongst other things (and in addition to other groups of society) cars give children asthma and run them over and so maybe she’d like to reconsider and support us, but she later overtook us slowing down an ambulance that we were making space for to get through, she didnt get very far, about 200 yards to the next lights! She would have been quicker on a bike (of course!) Oh well. but that was really the only randomly vaguely negative incident most people seemed pleased to see us or inquisistive about why we were riding.

It was a fun ride and nice that some new people came on it. Hopefully
we’ll see them again. After the ride some of us went for a beer in the bar. nice.

We were going to have a benefit night on the january mass but as its
pangea (a big student night) where lots of people seem to be going and lots of our friends bands seem to be playing at we thought that february mass would be better (its also my birthday!). But at the next one someone will hopefully come down and film and interview some people on the mass for a film about cycling in Manchester I’m trying to make. On that note can anyone that knows film stuff that might be up for helping get in touch.

thought you might like to see this too posted by someone in the GMCC
http://www.manchestereveningnews.co.uk/postbag/template/2006/12/28.html?1

critical mass 29 dec 06

PLANE STUPID Newsletter #6

PLANE STUPID Newsletter #6

“This is a deeply traumatized community which has been lied to for years and years

Plane Stupid logo 2PLANE STUPID Newsletter #6

“This is a deeply traumatized community which has been lied to for years and years
by the aviation industry and one political party after another. There is a litany of
broken promises. I wonder just how you might feel if you had endured all this for
years! I am so angry I am almost incandescent with rage at the immorality of it
all.” – A resident of Harmondsworth, near Heathrow

~ VICTORY FOR STOP STANSTED CAMPAIGN! ~

After a sustained and long running campaign by the community near Stansted, the
Uttlesford District Council have blocked the proposed plans for expansion of the
existing runway. BAA however is refusing to accept the democratic ruling and is
taking it to a public enquiry. A campaign fund has been launched to fight the
enquiry. www.stopstanstedexpansion.com

~ OCCUPATION AGAINST BRISTOL EXPANSION ~

On the 4th December, activists from South West Climate Action occupied North
Somerset Environment and Planning Offices to protest against plans for expansion of
Bristol airport. Photos and report at www.indymedia.org.uk

~EASYJET SHUT IN DAY OF ACTION AGAINST SHORT HAUL FLIGHTS! ~

On November 6th, activists from around the country came together to take
action against short haul flights. Plane Stupid activists shut down the London HQ of
EasyGroup, the owners of low-cost carrier Easyjet, and London Rising Tide visited
the Civil Aviation Authority, presenting them with a giant cheque for their £9.2
billion annual subsidy.

In Cambridge, Manchester, Reading and London, there were protests outside
travel agents, while Leeds Bradford airport was plastered with anti-aviation
stickers. Robin Hood airport received a visit from Robin and his Merry Men,
doubly-angry because the airport has been opposing local wind farm applications.
Activists in Manchester dropped a banner, and in Southend a travel agents was shut
when a protestor locked herself to the front door.

30 travel agents across the UK had their front doors chained shut
by activists who left signs on the windows reading, “Closed for a total
rethink. See www.planestupid.com”

A member of staff at Flight Centre said, “Plane Stupid are causing mayhem here
today, everyone is getting all aerated and vexed.” We’ll give them “aerated and
vexed!” What about the 182 million people to die in Africa this century alone
because of climate change, or the residents of ‘hacked off’ Harmondsworth?

The day of action came as new research from HACAN Clearskies shows that 100,000
flights from Heathrow each year are to short haul destinations that are easily
reachable by the more sustainable train alternative.

Reports and photos at www.indymedia.org.uk

~ COURT REJECTS ASBOS FOR NEMA 25 ~

Loughborough Magistrates Court rejected calls from the Crown Prosecution Service to
slap ASBOs on the 24 Plane Stupid activists who they described as “highly organized
extremists” that were arrested in connection with the shut down of Nottingham East
Midlands short haul airport in September.

In an apparent move aimed to avoid having the case heard by a jury, the charge of
public nuisance was dropped, as was the charge relating to an alleged breach of the
aviation and security act.

Campaigner for Plane Stupid, Ellen Rickford, said, “The same day that we learn the
government is pushing ahead with its airport expansion proposals, they try to use
ASBOs to stamp out peaceful protest. Well, it seems their plans were as doomed as
the aviation industry.”

17 activists got one year conditional discharges (the minimum sentence available)
and each was charged £70 in costs. The 5 charged with criminal damage in addition to
aggravated trespass were given varying levels of community service. One person was
referred to Crown Court due to unresolved legal issues and another had his case
adjourned until January 31st. One other activist was unable to attend court due to
illness.

Help us pay our fines! Donate via: www.planestupid.com

~ TOP 100 GREEN CAMPAIGNERS OF ALL TIME ~

Veteran green campaigner and staunch supporter of Plane Stupid, John Stewart, has
been named by the Environment Agency as the 82nd most influential green activist of
all time! Just one position behind Mahatma Gandhi, Plane Stupid is mighty glad he’s
on our side and proud that he’s often been our spokesman!

~ MARKETING GURU PREDICTS END OF SHORT HAUL AIR TRAVEL ~

In a cover-story feature of Marketing Weekly Magazine, triggered by our national day
of action, a PR guru is quoted as saying that he thinks short haul budget air travel
will go the same way that coal did in the 80s because, “they are unnecessary,
outdated and therefore facing decline.” Too right!

~ AVIATION INDUSTRY PUBLISH “TEN REASONS TO KEEP FLYING” ~

Responding to Plane Stupid’s “10 reasons to ground the Plane” – the aviation
industry’s PR people at www.cheapflights.co.uk have come up with, “10 reasons to
keep flying!” This comes after the Stern report singled out aviation as one of the
most significant causes of climate change.

~ ‘ETHICAL MAN’ JOINS PLANE STUPID ON LONDON CLIMATE MARCH ~

Around fifty Plane Stupid-ers marched together with AirportWatch campaigners and
Stansted residents on the Campaign against Climate Change (CaCC) march to Trafalgar
Square on November 4th. There was an 8ft long wooden plane on storks, big banners
and tons of petitioning. Marching with Plane Stupid was Newsnight’s ‘ethical man’
and Seize the Day’s Theo and Shannon. Photos available soon on the website…

In the meantime, see www.indymedia.org.uk

~ POLITICS ROUND-UP ~

Gordon Brown snubbed scientists and campaigners calls for tough new green taxes and
instead opted in his pre-budget report for the pathetic political gesture of
increasing air passenger duty by £5. This news came less than a week after a report
from BA boss, Rod Eddington, who was hired by Gordon Brown and paid by us the
taxpayer, to (shock) suggest airport expansion was a good thing. So we now know that
industry bosses support their own plans. Fancy that!

~ DO YOU WANT US TO SPEAK IN YOUR AREA? ~

Plane Stupid speakers have appeared at the Lib Dem Regional Conference along with
Shadow Environment Minister, Chris Huhne; at the LSE alongside Stop Climate Chaos
director, Ashok Sinha; at student union venues including in London and Sussex; and
at local Greenpeace and FoE meetings across the UK. If you want us to come and talk
in your area, get in touch. info@planestupid.com

————————————————————-EVENTS
———————————-

CAMP FOR CLIMATE ACTION MEETINGS

Following the successful climate camp at Drax, plans are afoot for the next camp
which will be at a different location.get involved with putting plans into action.

www.climatecamp.org.uk

PLANE STUPID BENEFIT GIG/FILM SHOWING

On Friday 26th January, Brixton Jamm presents The Alabama3. Tickets available soon
via www.planestupid.com

——————————————————— RESOURCES
——————————

~ PLANE STUPID: A year in review ~

On November 29th, Plane Stupid had its first anniversary. For a reflection on the
incredible momentum we’ve built up over the last year, with video footage and photos
for download, see www.planestupid.com

~ PLANE STUPID Blog ~

Plane Stupid has established a blog at www.myspace.com/planestupid. Its first blog
entry includes, “The armchair environmentalist’s guide to offsets… or ‘How to save
the world for 38p!’)”

~ LEGAL RESOURCE FOR ACTIVISTS~

Experienced campaigners are offering free advice and training to grassroots groups
including legal skills and more. www.seedsforchange.org.uk

~ THE SHEILA McKECHNIE AWARDS ~

The Sheila McKechnie Awards provide campaign development packages to grassroots
campaigners. Up for grabs is a ‘Transport Award’.anyone wanting to apply should see:
www.sheilamckechnie.org.uk

Critical mass this Friday 29th Dec, Manchester

The next critical mass bike ride in Manchester is Friday 29th December
We suspect lots of santa’s will be on bicycles!

The next critical mass bike ride in Manchester is Friday 29th December
We suspect lots of santa’s will be on bicycles!
Xmas Manchester Critical Mass flier
Critical Mass: last friday of the month 6pm at central library
After this one the next dates are:
jan 26 (’07), feb 23, mar 30, apr 27, may 25

We cycle round the city to celebrate the bicycle:

It’s for anyone that rides a bike;
Its a celebration of getting round the city without polluting it;
Its about every journey being an adventure instead of just sitting on a boring bus or in a stressful car;
Its about cyclists riding together to demand more respect from other road users;
Its a way to meet other cyclistas;

also at that time on friday hundreds of cities around the world do the same thing…all get together for critical mass. its beautiful to know that as you ride with your mates through your own city that all around the world thousands of people are doing the same thing.

The next manchester critical mass cycling club bicycle ride will be on Sunday January 28th (the sunday after Jan CM)
There will be two parts to the ride. If you want a real long ride then meeting in Manchester to ride out to the peaks. If you want less of a long ride then catch a train with your bike to the peaks and we’ll all meet for a nice ride and lunch. Details will be posted here very shortly.

Everyone welcome!

mcrcriticalmass@yahoo.co.uk
http://velorution.x21.org.uk

UK social centres gathering, 27th January Bradford

Saturday 27th January @ The 1in12 Club, Bradford
A day of workshops, discussions & ideas

To be followed by an evening of entertainment from the Mayhem Cabaret featuring…

The Sex Patels Punk meets Bollywood

Saturday 27th January @ The 1in12 Club, Bradford
A day of workshops, discussions & ideas

To be followed by an evening of entertainment from the Mayhem Cabaret featuring…

The Sex Patels Punk meets Bollywood
Spanner Anarcho ska punk from Bristol
BeyONdTV Keeping Underground Media Ugly

Plus benefit Cocktail bar, cheap entry & more entertainment throughout

All Welcome, more details to follow. Contact the club on 01274 734160
or socialcentrenetwork@lists.riseup.net

Privacy, Email and Activism – a brief intro

Recently there was a conference for activists interested in security issues – obviously something that any activist should be interested in. Notes from the gathering are being compiled along with previous documents into a printed booklet for activists which is expected to be distributed next year.

Recently there was a conference for activists interested in security issues – obviously something that any activist should be interested in. Notes from the gathering are being compiled along with previous documents into a printed booklet for activists which is expected to be distributed next year.
In the meantime I’ve been doing a little additional research on solutions specific to securing email communication…

Emails and passwords used by activists are vunerable to snooping from both the state and from private investigation. Even seemingly unimportant information gathered from emails can help build a profile on a person and their associates. Personal information might provide your enemies with leverage to turn somebody you know into a grass or make it easier to place an infiltrator in a position of trust.

What most people do not realise is that by default, the vast majority of email and even passwords are sent over the internet in plain text that can be rmonitored by anyone. Sit down at a computer in a library, college or internet cafe and anyone else on that network can easily read the emails you send and receive, not to mention steal your password. There are several ways to avoid this depending on how you access your mail.

Most activists tend to use web based mail these days so we’ll start with those.

If you look in the address bar on your web browser you will see that most addresses start with the letters http:// but sometimes you will see https://. The ‘s’ indicates that the connection is using SSL, a secure encrypted link between your browser and the web server. Most browsers also display a locked padlock symbol somewhere to provide a visual confirmation that the connection is secure. When you are viewing webpages over a SSL connection (such as on Indymedia), the data being transfered is no longer in plain text and can not be read by people attempting to monitor you. This protection also applies to information you submit in web forms, such as usernames and passwords when checking webmail.

In other words, the most basic and essential thing to do to secure your email is use SSL connections if you use webmail. For example, if you use riseup webmail you should go to https://mail.riseup.net rather than http://mail.riseup.net

We should now breifly look at the use of POP and SMTP for those not using webmail. If you don’t know what these are, don’t worry, they are two of the most common protocols used for downloading and uploading messages using an email client installed on your own computer. Examples of email clients include Outlook, Eudora, Pegasus and Thunderbird. Again, the problem you need to be aware of is that these protocols are by default not secure and all emails and passwords are sent as plain text. You need to configure your account settings within your email client to use a secure authenticated connection such as SSL. It’s beyond the scope of this article to explain how but the help function of your client plus the help pages for your email provider will provide specifics.

It’s obviously essential to use SSL (or similar) to protect your email password. However, when you send an email it will still travel over the internet in plain text as SSL only protects the connection between your computer and the server. To protect the contents of the email for the entire trip it will need to be encrypted so that only the intended recipient can read it.

You may have heard of PGP ( http://en.wikipedia.org/wiki/Pretty_Good_Privacy), a computer program that encrypts (scrambles) and decrypts (unscrambles) documents and emails. The initials stand for pretty good privacy and like it says, it’s pretty good! Some people claim that the worlds most powerful computers could use brute force to break the encryption in a mater of just a few hundred of years while other put the time required at longer than the age of the universe. Of course, computers get faster all the time so either way the time frame might eventually be reduced to within a human lifetime but even so, it’s likely that by the time anyone broke the encryption the content would no longer be valuable. ( http://axion.physics.ubc.ca/pgp-attack.html)

I will not go into detail how PGP works as there is plenty of information about it on the web. More important is how to use it. The trouble with PGP has traditionally been that people not to confident using computers have been unable to use it effectively. However, over the years it has become much easier to use as it has been provided with a simply graphical point and click interface and also intergrated into email clients. Once installed and configured correctly, it’s now a simple mater of click decrypt or encrypt plus typing your passphrase.

There is the saying that a little knowledge is a dangerous thing and that is certainly true of encyrption technology. PGP uses Public Key Cryptography and it is vunerable to what is known as a man in the middle attack. This vunerability exists only during the exchange of public keys required to initiate exchange of encrypted messages. Again, it is beyond the scope of this article to describe the attack and you can easily look up the information elsewhere. The important thing is that if these keys can not be exchanged in person then it is vital to confirm that the keys have not been substituted on route. This is done by comparing the keys ‘fingerprint’ by reading them out on the phone etc.

Finally. They say misery likes company and so, ironicaly, does privacy. The more people who routinely encrypt their communications the more secure everyone becomes. If you were the only one using encryption then it might draw attention to you and anyone you communicate with. If you only use encryption for ‘dodgy’ emails then this might also attract attention. Once you have the software installed and configured it makes sence to use it whenever possible regardless of the contents of the email.

Further reading:
http://en.wikipedia.org/wiki/E-mail_privacy
http://en.wikipedia.org/wiki/Email_Encryption
http://en.wikipedia.org/wiki/Pretty_Good_Privacy
http://www.andrebacard.com/pgp.html
http://en.wikipedia.org/wiki/GNU_Privacy_Guard

Software
http://www.pgpi.org
http://www.gnupg.org/ (also known as gpg, open source version of pgp)
http://www.gpg4win.org/ (gpg installer for windows)
http://macgpg.sourceforge.net/ (Mac OSX port of GnuPG)

Additional software suggestions

Don’t have your own computer or don’t take it with you everywhere you go? Well there are interesting options available now utilising USB memory sticks. These have got really cheap recently and you can get a 1gb drive for under 20 pounds. That’s a lot of space and it fits in your pocket.

People have been developing what are called portable applications ( http://portableapps.com/). These run from the USB stick rather than needing to be actually installed on a specific computer. More importantly they are configured so that temporary files ect are store on the stick so as not to leave a trace on the computer they are running on.

With one of these sticks and the right software you can walk into a library etc and use a public computer to run your own software and access your own files. It is a very useful way to have access to your mail etc and the data on the stick can be encrypted using software such as TrueCrypt.

Anyway, in the context of the article above I wanted to mention a couple of specifc portable applications. Both are portable email clients based on Thunderbird.

One is called Mobility Email and it includes OpenPGP and S/MIME encryption. It supports IMAP, POP, SMTP and web based email. It is designed to from any location with no installation or configuration, allowing access your email and contacts on multiple machines. Most importantly, no personal data is left behind once the application is closed.

http://en.wikipedia.org/wiki/Mobility_Email
http://www.mobilityemail.net/

There is also the official Mozilla Thunderbird Portable Edition (formerly Portable Thunderbird). There are two packages available, one with GPG and Enigmail preconfigured to encrypt and sign your email.
http://portableapps.com/apps/internet/thunderbird_portable

Note. Those npeople who don’t require portability may well be interested in using the orinary Thunderbird email client plus openPGP and the Enigmail extension to provide an easy to use and fully interigrated email encryption system. It’s cross platform, free and has a large community of user and developers. You can even use it with the Webmail extensions to access yahoo, hotmail and gmail accounts etc.
http://enigmail.mozdev.org/

——————————————————————————–

Riseup users and PGP

It’s a little known fact but riseup users can use PGP from within their webmail accounts. I only discovered this recently and as far as I can tell it’s only been an option since riseup upgraded to version 4 of IMP in late 2005.

Only the IMP webmail has the PGP feature, not Squirrelmail which I guess most riseup people use simply because it’s at the top of the login page. However, you can swap between the two without problem if you’ve already been using Squirrel.

The PGP features are not enabled by default and it’s a bit hidden away which might explain why I’ve never heard mention of it. The riseups documentation on security makes no mention of the feature, not even in their PGP page. I checked on google for anything about pgp on riseup but couldn’t find anything either so I decided to write a ‘how to’.

HOW TO SET UP PGP IN RISEUP

To enable the feature you have to login to the IMP webmail (obviously make sure you are using a secure connection https:// as described in the article above). When logged in you click options from the top navigation menu then click ‘PGP Options’ under other options on the right hand side.

Now you tick ‘Enable PGP functionality?’ then click ‘Save Options’ and the page refreshes and you have a bunch more options. I suggest you don’t tick ”Should your PGP public key to be attached to your messages by default?’ but you probably should click ‘Should the body of text/plain messages be scanned for PGP data?’

Further down the page you have two more sections which weren’t there until you enabled PGP. One of these is ‘Your PGP Public/Private Keys’. If you already have a PGP keys then you will need to upload them here by clicking upload and either copy and pasting the approbriate key or browsing the file on your machine and attaching it.

However, if you don’t have a PGP key pair then you can actually create them now from within IMP. Personally I feel this is a bit of a security risk as it requires you to trust riseup, but then again you have to trust riseup if you are planning on using webmail with your email in the first place. Creating a key pair using IMP is easy, just follow the instructions.

Once you have you keys created or uploaded you need to enable the address book. This is perhaps the most illogical part of the configuration. There is a line on the page where the words ‘PGP Options’ appears on the left and the following on the right ‘<< Address Books | S/MIME Options >>’

Click on the link to Address Books and then on the new page you will see a pull down menu towards the bottom with the words ‘Choose the address book to use when adding addresses’ written above. Change the selection from ‘None’ to ‘My Address Book’ within the drop down menu and then click ‘Save Options’ at the very bottom of the page.

You can now return to the PGP Options page and upload your friends PGP public keys to the newly enabled address book. It’s just a matter of cut and pasting the key block from an email etc.

That should be it… click ‘Save Options’ again just incase and then return to your Inbox

USING PGP ON RISEUP

When you create a new message you will find new options below the text body, just below the Send Message button. These are a drop down menu from which you can choose to sign and/or encrypt your message with PGP, and also a tick box enabling you to send a copy of your PGP public key with your message. When you click Send Message you will be asked for your passphrase in a seperate box and then you click Send Message again.

! It’s worth pointing out that if you have popup filtering activated (and you should), then you must configure it to allow popups from tern.riseup.net and petrel.riseup.net otherwise you won’t get the enter passphrase window appearing and you won’t be able to encrypt or decrypt anything.

When you recieve a PGP encrypted message you will find a box that reads “This message has been encrypted with PGP. You must enter the passphrase for your PGP private key to view this message.” (again, popups must be enabled or it won’t work). Obviously you type your passphrase and you get to read your message.

! Don’t forget to log out when you have finished or somebody else might come along and continue using your webmail session with the passphrase still cached so be able to read your encyrpted messages!

That covers it all I think. For the best security it would be preferable to use PGP locally on your own machine which you are sure is secure. However, the PGP option with riseup is still very very useful. DONT FORGET.. YOU MUST USE A SECURE SSL CONNECTION TO HTTPS://RISEUP.NET

Finally, a few quick notes on choosing a PGP passphrase.

Do not use the same password as you use for your email or any other purpose. .
Do not write it down but obviously choose something you can remember.
Avoid dictionary words and names of your family or pets.
Aim for at least 12 to 16 characters
Mix uper case and lower case letters, numbers and punctuation for the strongest passphrase.

——————————————————————————–

Use secure email providers

Following the link to riseups pages on security I found this information which is quite interesting. Basically it’s about a protocal which mail servers can use to talk to each other securely so that emails are passed from source to destination and not be read on route. Not all mail servers offer this service but riseup does and it lists other activist tech collectives that provide such mail mail servers. Obviously it would be better to encrypt all mail using PGP etc but that’s not currently realistic so for those messages that still go as plain text it is a very good idea to be using a mail service that provides StartTLS.

(taken from riseup…)

What is StartTLS?

There are many governments and corporations which are sniffing general traffic on the internet. Even if you use a secure connection to check and send your email, the communication between mail servers is almost always insecure and out in the open.

Fortunately, there is a solution! StartTLS is a fancy name for a very important idea: StartTLS allows mail servers to talk to each other in a secure way.

If you and your friends use only email providers which use StartTLS, then all the mail traffic among you will be encrypted while in transport. If both sender and recipient also use secure connections while talking to the mail servers, then your communications are likely secure over its entire lifetime.

We will repeat that because it is important: to gain any benefit from StartTLS, both sender and recipient must be using StartTLS enabled email providers. For mailing lists, the list provider and each and every list subscriber must use StartTLS.

Which email providers use StartTLS?
Currently, these tech collectives are known to use StartTLS:

* riseup.net
* resist.ca
* mutualaid.org
* autistici.org/inventati.org
* aktivix.org
* boum.org
* squat.net
* tao.ca
* indymedia.org
* eggplantmedia.com
* so36.net

We recommend that you and all your friends get email accounts with these tech collectives!

Additionally, these email providers often have StartTLS enabled:

* universities: berkeley.edu, johnhopkins.edu, hampshire.edu, evergreen.edu, ucsc.edu, reed.edu, oberlin.edu, pdx.edu, usc.edu, bc.edu, uoregon.edu, vassar.edu, temple.edu, ucsf.edu, ucdavis.edu, wisc.edu, rutgers.edu, ucr.edu, umb.edu, simmons.edu.
* organizations: action-mail.org, no-log.org
* companies: speakeasy.net, easystreet.com, runbox.com, hushmail.com, dreamhost.com, frognet.net, frontbridge.com, freenet.de, blarg.net, greennet (gn.apc.org)

What are the advantages of StartTLS?

This combination of secure email providers and secure connections has many advantages:

* It is very easy to use! No special software is needed. No special behavior is needed, other than to make sure you are using secure connections.
* It prevents anyone from creating a map of whom you are communicating with and who is communicating with you (so long as both parties use StartTLS).
* It ensures that your communication is pretty well protected.
* It promotes the alternative mail providers which use StartTLS. The goal is to create a healthy ecology of activist providers–which can only happen if people show these providers strong support. Many of these alternative providers also also incorporate many other important security measures such as limited logging and encrypted storage.

What are the limitations of StartTLS?

However, there are some notable limitations:

* Your computer is a weak link: your computer can be stolen, hacked into, have keylogging software or hardware installed.
* It is difficult to verify: for a particular message to be secure, both the origin and destination mail providers must use StartTLS (and both the sender and recipient must use encrypted connections). Unfortunately, it is difficult to confirm that all of this happened. For this, you need public key encryption (see below).
StartTLS

——————————————————————————–

512 bit encryption broken in less than a second

The problem with technology as a means for secure communication is it’s own advancement. What is secure today may not be secure tomorrow. And people who think they’re safe, using PGP or whathaveyou, then share information over email that should only be shared face-to-face.

source: http://www.khaleejtimes.com/DisplayArticleNew.asp?xfile=data/theworld/2006/November/theworld_November597.xml§ion=theworld
crypt broke

————-
“The report’s authors, Onur Aciicmez, Cetin Kaya Koc and Jean-Pierre Seifert depict a concrete attack on OpenSSL on a Pentium 4 processor, albeit using a key that would be considered quite short by today’s standards (512 bit).”

Hmmm.. What is described requires the attacker to be running hiden software on the machine performing the encryption operation – in other words it requires that attacker to have installed software either with physical access to a machine or remote access. Now certainly, if you are using an insecure operating system like windows then it would be a risk, however a far easier attack in this case would be to use a keylogger, either software or hardware.

In other words, Seifert and his colleagues discovery is unimportant in relation to email security since much easier and more practical exploits exist already.

Bloggers writting about the new technique have suggested it it is the security of applications using Digital Rights Management (DRM) most likely to be threatened by such techniques. For example, user might use the technique to remove the license protection on WMA audio files they purchase so that they can share them with friends. In this situation they would obviously be well placed to install the spy processes required in the attack.

You attempt to discourage people from using the technology employed by financial and government institutions etc is a waste of time. The weak point in all these security measures is the people using them. Obviously there is a lot to be said for low tech ‘cold war’ solutions like going to meet somebody face to face but it’s a lie to suggest they are themselves are without significant risk.

Mobile phones, the stealth ID card, bug and tracking device in your pocket.

Earlier this month it emerged that the FBI had been remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations. The surveillance technique, which “functioned whether the phone was powered on or off.” came to light as a result of a ruling by U.S. District Judge Lewis Kaplan on the legality of the “roving bug”. It had been approved by U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping. Cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations.

Earlier this month it emerged that the FBI had been remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations. The surveillance technique, which “functioned whether the phone was powered on or off.” came to light as a result of a ruling by U.S. District Judge Lewis Kaplan on the legality of the “roving bug”. It had been approved by U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping. Cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations.

The news that the FBI had been remotely activating mobile phones as eaves dropping devices confirms what many activists have been saying for years.

“A cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone. This is done by transmitting to the cell phone a maintenance command on the control channel. This command places the cellular telephone in the ‘diagnostic mode.’ When this is done, conversations in the immediate area of the telephone can be monitored over the voice channel.” – National Reconnaissance Organization newsletter,1997.

As long as I can remember there has been a kind of unspoken rule among activists about taking batteries out of mobile phones during meetings to prevent bugging – along with occasional arguments about it being paranoid. While it has long been know to be a theoretical possibility, the mafia court case confirms it is actually a practical technique and is being used.

It is not clear exactly how the FBI achieve their remote activation but it is known that it is possible to update the software on a mobile phone by sending an unnoticeable SMS message to a particular cell phone. Changes to the phones software than make it possible to spy on the user around the clock, as long as the phone has power. All SMS messages can be read and all calls and conversations can be listened to, including those taking place in the vacinity of the phone. It would also be possible to access and copy address books and other information stored on the phone.

It should be fairly obvious to anyone that simply ‘switching off’ a mobile phone could not prevent the software from reactivating the phone at will. Like most computers, the on/off switch on a mobile phone is simply a button that requests the software to do something, ie.. turn the phone on or off – or more acturately, switch the phone between standby and normal operations. Many have an alarm feature which can operate when the phone is apparently ‘switched off’.

Some of the vunerabilities of mobile phones may only be exploitable by the state or private interests with financial muscle to obtain access to the records of mobile phone networks. Others however are much easier to exploit and well within the capabilities of private investigators. One example is the ability to read mobile phone numbers from all phones in a room as those phone routinely poll and communicate with the nearest cell phone repeater.

And lets not forget the ability to track cell phones (again, potentially even when they are turned off). With the data retention laws requiring mobile phone networks to keep this data for a year or so, it is easy for the authorities (or private agencies with influence) to not only monitor somebodies movements but also cross reference that with other people and build up acturate pictures of networks of association.

As repression on dissent increases, it is vital that we are all aware of the information we provide our enemies and what steps we can take to limit the damage.

What advice might you consider?

Don’t take any mobile phone to a meeting and if you must, remove the battery.
Don’t take your personal mobile phone with you on actions.
Remove the battery if making journeys others should not know about.
Better yet, don’t take the phone or send it out on a walk in the park with a friend.
Don’t power up you ‘clean’ action phone in any building you don’t want assocaited with an action.
Never use ‘clean’ action phones to call comrades personal phone numbers.
Don’t call a ‘clean’ action phone from any ‘non clean’ phone.
Don’t continue to use the same set of action phones on future actions.
Only pay cash for phone credit and don’t not from places with CCTV (difficult).

Further reading…

FBI story:
http://news.zdnet.com/2100-1035_22-6140191.html http://www.informationliberation.com/?id=18443
http://arstechnica.com/news.ars/post/20061203-8343.html

Background:
http://www.wasc.noaa.gov/wrso/security_guide/cellular.htm

Some examples…

Clearly the police are using the location records of phones to link people to actions, some recent examples:

“A GANG of travellers are facing jail for a series of violent ram-raids, robberies and burglaries after they were linked to the crimes through mobile phone records.”

“Mr Farmer said mobile phone records had been crucial in securing guilty pleas and convictions…”

http://www.cambridge-news.co.uk/news/ely/2006/12/13/80f9ff15-a536-4d01-9e77-743d900618d6.lpf

“At a press conference this morning Mr Gull said that officers were looking at mobile phone calls made and received by the girls and were also analysing DNA, but refused to go into more detail.”

“When asked about Anneli and the other women’s mobile phone records, Mr Gull said: “I don’t want to go into details, it’s very sensitive, but it’s something we’re looking at.â€?

http://new.edp24.co.uk/content/news/story.aspx?brand=EDPOnline&category=News&tBrand=EDPOnline&tCategory=news&itemid=NOED16%20Dec%202006%2015%3A37%3A43%3A720

“THE EADT has now filed an official complaint against Suffolk police after its most senior detective obtained the private mobile phone records of a journalist in a bid to discover his sources.”

“Editor Terry Hunt has requested a full explanation for the action taken by Det Supt Roy Lambert in a letter sent yesterday to Chief Constable Alastair McWhirter.”

“As revealed in yesterday’s EADT, confidential mobile phone records of reporter Mark Bulstrode were obtained by Mr Lambert so he could find out who he had been speaking to.”

“The move was taken after the journalist approached the force with information about the reopening of an historic investigation.”

http://www.eadt.co.uk/content/eadt/news/story.aspx?brand=EADOnline&category=News&tBrand=EADOnline&tCategory=news&itemid=IPED01%20Dec%202006%2019%3A35%3A22%3A490

A the pieces are now in place for the electronic police state.

how to make lock-ons (lessons from Faslane 365)

The basic principle of a lock-on is to lock yourself onto something so that you cannot be easily physically removed. That something can be another person or something fixed. The best way is with a climbing carabina and a chain or rope around your wrist. The important thing is to make it very difficult for the police or whoever to cut your lock-on off. Thats where the fun part comes in, covering that lock-on to make it very difficult to get to, thus delaying the authorities and making your blockade as successful as possible. They will possibly have access to specialist equipment.

The basic principle of a lock-on is to lock yourself onto something so that you cannot be easily physically removed. That something can be another person or something fixed. The best way is with a climbing carabina and a chain or rope around your wrist. The important thing is to make it very difficult for the police or whoever to cut your lock-on off. Thats where the fun part comes in, covering that lock-on to make it very difficult to get to, thus delaying the authorities and making your blockade as successful as possible. They will possibly have access to specialist equipment.

Simple steel lock-on tubes are great but can be cut into in 20 minutes with a specialist drill head. The yellow pipes with a 2 cm thick wall are also great because the plastic actually melts around the drill head making them very hard to get into.

To make an oil drum lock-on you simply need an oil drum and some piping – preferably steel – which is just wide enough to fit your arm in and no more, cut so that it is as long as the barrel is wide. Drill a hole in the middle of this pipe section so that a metal rod can be inserted, this is what you actually lock on to. Cut holes on either side of the barrel so that this pipe can fit in in such a way that two people can lock-on on either side. Then simply fill this barrel with concreate and all sorts of hell like scraps of metal (lengths of thick steal wire will hold it together), megamorphic rock (very solid rock), quartz and the odd diamond if you want to bling it up, lengths of shredded polyprop is also very good at stopping the break-up of concreate from the wrath of a jack hammer. If you wanna be real hardcore putting in canisters of camping gas or lighter filler make the cops quite reluctant to cut into them (or even just saying you have, they wont take the risk), this is of course pretty dangerous. It will take the most skilled cutting crew in the country at least a couple of hours to cut you out of there. Two people locked on is better than one because with one person they may just try to lift it out of there with a fork lift truck, two bodies makes this far less likely.

The “Baby barrel� lock on is much more portible, fitting into a normal ruck-sack this one is for the blockader on the go. Its just a steel lock on tube inserted into a small barrel lengthways, its a similar idea as the oil barrel lock on with the concrete mass surrounding where you are locked on to the other person inside the tube. It is a little easier to cut into but its portability and ease of construction makes this the one to have this christmas.

Portability is often an important factor. Being able to stash and camoflage your lock-on will help here but always have a plan B if it gets found. The police will eventually be able to cut you out, no material is unbreakable but the longer you can hold your blockade the more you will have achieved out of your eventual arrest. Happy blockading.

Your mission, should you choose to accept it… (report from activist security gathering)

ID cards, injunctions, CCTV with voice activated alerts, national license plate monitoring, face recognition, directional microphones, network profiling, DNA databases, keylogging, phone taping, bugging and tracking, these are just some of the tools of repression being used against those battling to save the world from total domination and destruction.

ID cards, injunctions, CCTV with voice activated alerts, national license plate monitoring, face recognition, directional microphones, network profiling, DNA databases, keylogging, phone taping, bugging and tracking, these are just some of the tools of repression being used against those battling to save the world from total domination and destruction.

This message will self destruct in 10 seconds…. 9.. 8.. 6.. 5.. 4.. 3.. 2..

One might think that this is some cloak and dagger spy thriller, or orwellian distopia – but todays world is one of overt and covert surveillance and repression. The likes of you and me are the target and this is no paranoid delussion – they really are out to get us.

This was the stark reality presented at a top secret conference on activist security that took place this month. Meeting in a quite location somewhere near the coast, dozens of campaigners from around the country came together to learn about the technology and techniques being used by the authorities and private agencies as they attempt to gathering information and disrupt and destroy campaigns.

The aim of the gathering however was not to make everyone paranoid and feel helpless in the face of the technological assaults on our privacy, but rather to equipe people with the awareness and knowledge to enable them to take steps to reduce the risk to themselves and those they associate with.

The two day conference involved a wide variety of workshops, some discussion-based, some practical or computer-based. Lessons learned by those attending included the importance of ‘need to know’, the now proven fact that switching off a mobile phone is not enough to prevent it being remotely activated as a bug or tracking device. Also discussed was how to spot and loss a tail, how to trap and expose infiltrators, issues of security for campaign groups and their offices such as maintaining a secure contacts database. Computer based skills covered included encryption of stored data and electronic communication, and ways to use the internet for research etc without leaving a trace.

Mush of the information presented during the workshops came from the document ‘Practical Security Advice for Campaigns and Activists’ and this, along with the experiences and ideas contributed by the participants of the gathering are apparently going to be put together as a printed booklet for distrubution next year. Additionally there are plans for a ‘walls have ears’ style poster outlining basic precautions which can be displace in meeting spaces and social centres etc to remind people of the need to consider security.

info@activistsecurity.org
http://www.activistsecurity.org/

Invitation:building support for action against climate change: 14th December, Manchester

What can we do to support and encourage radical action against climate chaos?

One of the follow-up meetings after the climate camp focused on what we can best do to support action taking place on climate change. There will be another in Manchester on Dec 14th.

What can we do to support and encourage radical action against climate chaos?

One of the follow-up meetings after the climate camp focused on what we can best do to support action taking place on climate change. There will be another in Manchester on Dec 14th.

We met at the Northern Eco-Action gathering in Bradford on November 11. At a productive and energising meeting, we came up with a list of concrete suggestions, and a whole load more questions to be answered. A report of
the meeting is attached.

We’ll be taking these questions forward at a further meeting, which will look at what we can best do to support local actions and groups taking radical action on climate change, consider how best to stay in touch and share skills and resources. Proposals from this meeting will be brought to the next gathering in Leeds in January.

We’ll be meeting in Manchester on Thursday, December 14, 11am-5pm. Bring food to share for lunch.
The venue is at Bridge-5 Mill (otherwise known as MERCi) – fully accessible & close to Manchester Piccadilly train station, details at http://www.merci.org.uk/visiting-b5m.php

We will be putting people’s thoughts and responses online in the lead-up to the meeting. Two of these are below: one a report from a workshop at the EarthFirst! Summer Gathering, one the reflections of one of the participants at the meeting in Bradford. If you have something to contribute to the debate that you would like people to read before we
meet, please email it to actionsupport@climatecamp.org.uk and we’ll circulate it to those who are coming.

If you want to read any other thoughts sent out before the meeting, or if you’re likely to arrive late or need somewhere to stay, please email actionsupport@climatecamp.org.uk to let us know you’re coming.

“Supporting radical action against climate change across the country

Report from meeting Saturday 11 November, Bradford Resource Centre
(Meeting to develop ways of supporting local climate action groups and actions, how to stay in touch and how to share skills and resources. Plus co-ordinated days of actions.)

We started by looking at what we need in order for lots of actions to be taking place.

Broadly speaking, they fell into two categories. The more abstract:

– inspiration
– buzz
– energy
– (feeling of) a critical mass taking part in actions
– sense of urgency
– hope

and the more concrete:

– people finding out about actions so they can get involved
– feeling of success (and publicising our successes)
– skills
– money
– information resources
– feeling of difference from approaches and tactics that haven’t worked in the past
– lessening/avoiding/ability to resist state oppression
– strategic reflection

We felt that the more concrete needs would follow relatively easily if the first were met: people’s energy and inspiration would mean that money is raised, information resources get researched and distributed, etc..

We identified as the main catalyst to inspiration and energy was positive reports of success from lots of actions taking place. So, the question became: where is the best place to concentrate our energy and resources to influence and establish the positive feedback loop that would lead to an escalation of direct action taking place?

As a precursor to evaluating this, we tried to list some of the more and less concrete things that would be likely to have this input, some steps that could be taken. This list is not comprehensive, but reflects the directions our thinking and discussion took on the day.

Resource packs
– briefings
– template actions
– press releases
– potential targets
– legal briefings
– reports of success stories
– leaflets
– stickers
– other merchandise: beer mats, branded condoms, lollipops etc.
– different modes of how local groups might organise
– potentially useful action tat (e.g. dinghies)

Skillsharing

Secure means of communicating and networking

Convergence
– face-to-face meetings
– parties
– big actions
– treeplanting

Publicising actions
– print media: ours
– EF! update
– schnews
– local newssheets
– print media: others’ (we provide the stories, they publish)
– liberal press (often keen for stories, sometimes sympathetic)
– more mainstream press
– cascading, decentralised methods, e.g.:
– word-of-mouth
– stickers
– graffiti
– email
– film showings
– web-based
– EF! action reports
– indymedia
– indymedia climate
– rising tide
– climate camp
(also use of email and web for distribution of paper-based media)

Ways in
– distribution of newssheets
– distribution lists
– people to help!
– friendship networks
– local groups contacts — publicised (not necessarily a group: can be person(s) up for stiff if more want to get involved)
– public meetings and gatherings
– presence on demos, at conferences, festivals
– big, advertised public actions
– stalls
– gateway actions/groups
– roadshow

Kickstart actions
– local
– bigger

Identity
– network identity rather than movement identity
– heterogeneous membership
– existing networks
– individuals
– groups
– friendship groups

Note on local organising (particularly relevant for contacts and for resource packs)
All local groups are different, and what works somewhere might not be the best way of organising in a different area. There are lots of successful ways of organising, including
– one ‘action group’ with a broadly consistent membership but changing focus, perhaps doing actions under different banners
– different groups with people who attend more than one as informal links
– different groups with a forum in which they come together
– there is no local group, but people occasionally come together to do stuff
We shouldn’t be prescriptive: there are as many sorts of local organising as there are local groups.

The way forward from here:
The main task ahead is to work out how we can best use our resources for the greatest effect. This goes both for which areas we prioritise, and how we can best tackle each area. In looking at, say, web-based publicity, we need to look at what it is we need to fulfill our aims, evaluate whether any of the existing fora meet these aims, and if not, if it would be possible to transform them into something more useful for our purposes, and the likely effort involved in this (worth comparing with, say, resources to set something up from scratch.)”

“NOTES FROM EF! Summer Gathering Workshop:
Building a movement for climate justice beyond the Camp for Climate Action

Most interesting is section 3 – HOW WOULD THE NETWORK BE ORGANISED?

1 WHAT SHOULD IT ACHIEVE?
* Dismantle the fossil fuel industry (and therefore Capitalism)
* Place CC at the center of social thinking/culture in wider society, not just us
* Provide support for each other – knowing that others are working on the same issues
* Develop renewable energy, decentralised around the country, locally run
* Develop and set up workable alternatives
* Awareness raising and education
* Work to reduce consumption/demand – also means reshaping how we think about economic growth/progress
* Focus on aviation/aviation as a new anti-roads movement?
* Focus on Nuclear be ready for nuclear new build with strong arguments and analysis

2 WHAT WOULD THE NETWORK DO/ HOW WOULD IT BE DIFFERENT?
* Direct action!
* Building housing co-op movement, urban/rural links to re-localisation
* Radical analysis not pissing about
* Think long term re-localisatiom (within the movment also)
* Working in communities allotments, residents groups.
* Works with NIMBY groups re aviation/nuclear.
* Links with majority world.
* Find weak points in system now increasingly info/communications rather than physical spaces.

3 HOW WOULD THE NETWORK BE ORGANISED?
* Need a group/named network to feel part of, to feel belonging and sense of support
* Setting up new network seems inefficient why not use whats already there Rising Tide Network? has basic structure in place, communication and decision making structures, news-sheet, web-hosting, etc., international element RT North America, Australia, etc
* No time for lobbying government
* Use social centres
* Gatherings for decisions making
* Regionally based support for local individuals

4 WHAT NEXT?
* Recognise that people are motivated to come together to work on a specific action or project, rather than form a group for the sake of a group
* So harness the energy coming out of the camp by calling for everyone to take part in specific upcoming actions it is this that will kick-start local groups
* Oct 3-4 Day of Action coinciding with G8 Energy and Enviro ministers meeting in Mexico (called by Rising Tide North America) soon but maybe good because there will still be a buzz on after the camp
* Oct 21st Shell sponsored Wildlife photographer of the year award RT is doing a tour of the country with people from Shell affected communities (eg. Rossport, Nigeria), along with an alternative exhibition, in the run up to the award winner being announced on Oct 21st. RT will only be able to get to a few cities people who come to the the camp could be part of/expand this?
* February 2007 possible International Day of Action against Shell (called by Rossport Solidarity)

* Another camp? Maybe local camps are more sustainable, so no big camp next year but lots of small regional camps.

* Also recognised that some new local groups will need support Rising Tide might be able to help, or at least help link up people who need skills/training with people who could provide this”