Next national climate camp organsing gathering Feb 17/18 in Leeds

The next national organsing gathering will be in Leeds on Sat and Sun Feb 17th/18th. It will be at The Common Place in Leeds city centre and vegan food, accommodationand creche will be provided (please contact us with accommodation, creche or any other needs though so we can plan ahead).

Climate camp logo 2 The next national organsing gathering will be in Leeds on Sat and Sun Feb 17th/18th. It will be at The Common Place in Leeds city centre and vegan food, accommodationand creche will be provided (please contact us with accommodation, creche or any other needs though so we can plan ahead).

Climate campers are at it again! More than seventy people from around the UK met in Leeds in January and decided to organise another Camp for Climate Action this summer from 14th to 21st August. As many of you know, for ten days last August hundreds of people gathered in the shadow of Drax coal-fired power station in Yorkshire to share knowledge and inspiration to tackle the greatest threat to life on Earth, live an example of more just and sustainable alternatives, and confront one of the UK’s biggest polluters in a day of mass direct action.

Following on from this success, Camp for Climate Action 2007 will take place near to a target relating to aviation or the coal or oil industries. The location will be chosen over the coming months. Organising outreach,
fundraising, site practicalities and workshops is underway. Self managed camping, eating and living neighbourhoods around themes and geographical areas are also being planned, contact details are on the website.

There is loads to do, and everyone is invited to get involved – no experience necessary! The next national planning meetings will be held in Leeds at the Common Place, on the 17th and 18th February, and then in
Bristol on the 17th and 18th March.

See www.climatecamp.org.uk for more info. There are lots of ways to get involved without coming to national gatherings, but coming to them is a great way of really feeling part of the whole process, we work with consensus decision making and collective responsibility, everyone gets their say in how the whole thing goes.

For a 20min film of last years camp get
V For Video Activist – SchMOVIES DVD Collection 2006 OUT January 2007
– £6 (including P&P). Contact the SchNEWS Office 01273 685913 or  schnews@brighton.co.uk

leeds@climatecamp.org.uk
http://www.climatecamp.org.uk

Environment minister pied as he tried to GreenWash the governments destructive environmental policies.

On 2 Febuary at around 3pm, a group of people under the guise of fictional company ‘Greenwash & Co’, did a satirical performance at a talk being given by the current UK minister for the environment, David Miliband, at Edinburgh University. The minister was then pied in the face by a lone pie-bearer in an unrelated incident.

Edinburgh greenwash Milliband pieOn 2 Febuary at around 3pm, a group of people under the guise of fictional company ‘Greenwash & Co’, did a satirical performance at a talk being given by the current UK minister for the environment, David Miliband, at Edinburgh University. The minister was then pied in the face by a lone pie-bearer in an unrelated incident.

One Member of GreenWash & co said
“We are here to put a green sheen over the terrible environmental track record of the New Labour government. Our assistance was thought to be particularly important given the presence of the Rt Hon. Mr Miliband as figurehead of the government’s latest wave of environmental spin and green rhetoric. With airport expansions, road building schemes and continued illegal foreign policy in the scramble for oil control, the government need all the help they can get in greening up their image.”

Another Member of GreenWash & co said
“Greenwash has become a widespread and very harmful issue in the fight for environmental sustainability. Now any political body or corporation can reel off a few well-placed buzzwords or implement an insubstantial policy and appear ‘green’ without really having to make any serious changes. This is lulling people into a false sense of security. The purpose of protests like this is to show people what lies beneath the rhetoric and to wake up to the in-action and spin that surrounds us regarding environmental issues. Question everything: ‘green’ is not always what it seems.”

GreenWash & Co use satire and pantomime to perform a new kind of political protest through clowning and audience participation. They aim to change the grounds upon which protest is conducted by performing at a cultural level and mocking existing power structures so as to reveal their contradictions, untruths, spin and control. They have a strictly non-violent philosophy and always try to keep things as light hearted as possible despite the incredible seriousness of issues like climate change.

The group stormed the talk with a banner saying “GREENWASH polluting reality with rhetoric” and got straight to work cleaning all of those dirty government policies and brushing all of our carbon under the carpet (through the carbon market). The crowd cheered at the well humoured theatrics but after a few minutes as the security amassed, the performers made a dignified exit to the applause of the crowd.

Simultaneously in a totally unrelated incident an autonomous individual calling himself Colonel Crust used the theatrics as a distraction to thrust a vegan short-crust pastry confection into the well kept hair of Rt Hon Milliband. Witnesses said the minister appeared displeased until he tasted the bright green custard and was presently surprised by the quality of the pie.

You can contact David Milliband to congratulate him for his Green-washing abilities via his email address, david.miliband (at) defra.gsi.gov.uk

Activist Mediation Network Launched!!!!!

Want to learn mediation skills?
Interested in helping support activist groups engage with internal disagreements and conflict, to make them more effective?
Want to tackle conflicts in your personal life that interfere with your activism?

Want to learn mediation skills?
Interested in helping support activist groups engage with internal disagreements and conflict, to make them more effective?
Want to tackle conflicts in your personal life that interfere with your activism?

Our launch events will be training days:

Northern Launch –
Leeds on 10th March 2007, from 11am – 5pm

Southern Launch
– London on 17 March 2007, from 11am – 5pm.

The aims of these days are:

To train people in conflict resolution skills that they can use in their own lives and activist work
For people interested in volunteering with us to receive training and to meet with us to discuss taking it further.

If you have a specific conflict or situation that you would like to discuss with us, then please get in contact and we’ll see if we can help.

Activist Mediation to the rescue! (not really!)

Details of the training days:

Booking essential: Please email activistmediation [at] aktivix [dot] org
Cost: We are asking for a £10 donation to fund expenses and help set up a travel fund to help with our mediation work. If money would prevent you from attending, then get in touch.
Creche: We are not providing creche facilities, but if childcare issues are preventing you attending, please get in touch and we’ll try and sort something out.
Access: Both venues are wheelchair accessible, and have accessible toilets. For other access needs, please contact us.
Lunch: Not provided. Please bring your own.
Transport and Accommodation: Get in touch if you have any issues or can offer a lift.

For further information have a look at our website www.activistmediation.org.uk
or telephone us on 0845 223 5254, and get in touch.

Background

For the last few years we have both been involved in mainstream mediation, and using these skills at various activist camps and situations (Climate Camp, Earth First!, Radical Routes, Trident Ploughshares). We have also been asked to work with other activist groups to help them resolve internal conflicts. There is obviously a need for this work to be done on an ongoing basis, and so we have decided to set up an activist mediation network. The aim is not for us to solve conflicts, but to skill share and offer impartial mediators in order to help groups and individuals resolve their own conflicts.

Faslane 365 builds

9/1/07 Following on from yesterdays protest by academics from across the world and students from Oxford, Cambridge, Sussex and Edinburgh Universities, today seen elected representatives from across the political spectrum converge on Faslane in protest against nuclear weapons. Yesterdays protest seen academics hold seminars on papers they had researched on the subject of nuclear weapons, … Continue reading “Faslane 365 builds”

Faslane 365 tent
Faslane 365 academics & students
9/1/07
Following on from yesterdays protest by academics from across the world and students from Oxford, Cambridge, Sussex and Edinburgh Universities, today seen elected representatives from across the political spectrum converge on Faslane in protest against nuclear weapons.

Yesterdays protest seen academics hold seminars on papers they had researched on the subject of nuclear weapons, which started on the pavement but eventually moved onto the road. Overwhelmed by sheer numbers, with over thirty students and roughly fifty academics, the police had no option but to leave protestors blocking the main entrance to the nuclear base. When it was clear that police were in no position to clear the road any time soon, and due to the cold temperatures and heavy rain, protestors erected tents, set up a tea table with a gas powered urn and eventually brought a brazier and light a fire in the main road. After five hours Strathclyde police managed to mobilise enough officers and along with roughly twenty MoD police officers spent a further hour clearing the road of people. Protestors managed to keep the gate blocked for just over six hours and five minutes, which works out as three-hundred and sixty five minutes, an obviously significant record for the Faslane 365 project. There was a total of seventeen academics and eighteen students arrested.

Today elected representatives from across the UK and Europe turned out at Faslane to once again protest against nuclear weapons. Politicians from Labour, SNP, SSP, the Green Party and Solidarity along with supporters gathered at ten o’clock to add to the growing protests against nuclear weapons. Krista van Velzen, an MP from Holland, urged police to join the protestors and uphold international law by arresting those who worked on Trident instead of those blockading. She reminded them of German police officers who recently blockaded trains carrying nuclear waste. SSP MSP Rosie Kane pointed out the hypocrisy of the UK government putting pressure on other countries over nuclear weapons, and yet they are preparing to replace the Trident submarines with a possible cost of £76 billion.

After speeches seven elected representatives and two other supporters moved onto the road and blocked traffic. They were Krista van Velzen (Dutch MP, Socialist Party), Carlyn Leckie, Rosie Kane, Frances Curran (MSP’s for the SSP), Leanne Wood (AM, Plaid Cymru), Jill Evans (MEP, Plaid Cymru) and Carolyn Lucas (MEP, Green). The two supporters were Brian Quail and Harry McEachan. They were taken to Clydebank and Dumbarton police stations and were released later this evening without charge. These last two days take the total arrests at Faslane since the start of Faslane 365 to four hundred and seventy three, with sixty one days of presence.

info@faslane365.org
http://www.faslane365.org

PLANE STUPID Newsletter #6

PLANE STUPID Newsletter #6

“This is a deeply traumatized community which has been lied to for years and years

Plane Stupid logo 2PLANE STUPID Newsletter #6

“This is a deeply traumatized community which has been lied to for years and years
by the aviation industry and one political party after another. There is a litany of
broken promises. I wonder just how you might feel if you had endured all this for
years! I am so angry I am almost incandescent with rage at the immorality of it
all.” – A resident of Harmondsworth, near Heathrow

~ VICTORY FOR STOP STANSTED CAMPAIGN! ~

After a sustained and long running campaign by the community near Stansted, the
Uttlesford District Council have blocked the proposed plans for expansion of the
existing runway. BAA however is refusing to accept the democratic ruling and is
taking it to a public enquiry. A campaign fund has been launched to fight the
enquiry. www.stopstanstedexpansion.com

~ OCCUPATION AGAINST BRISTOL EXPANSION ~

On the 4th December, activists from South West Climate Action occupied North
Somerset Environment and Planning Offices to protest against plans for expansion of
Bristol airport. Photos and report at www.indymedia.org.uk

~EASYJET SHUT IN DAY OF ACTION AGAINST SHORT HAUL FLIGHTS! ~

On November 6th, activists from around the country came together to take
action against short haul flights. Plane Stupid activists shut down the London HQ of
EasyGroup, the owners of low-cost carrier Easyjet, and London Rising Tide visited
the Civil Aviation Authority, presenting them with a giant cheque for their £9.2
billion annual subsidy.

In Cambridge, Manchester, Reading and London, there were protests outside
travel agents, while Leeds Bradford airport was plastered with anti-aviation
stickers. Robin Hood airport received a visit from Robin and his Merry Men,
doubly-angry because the airport has been opposing local wind farm applications.
Activists in Manchester dropped a banner, and in Southend a travel agents was shut
when a protestor locked herself to the front door.

30 travel agents across the UK had their front doors chained shut
by activists who left signs on the windows reading, “Closed for a total
rethink. See www.planestupid.com”

A member of staff at Flight Centre said, “Plane Stupid are causing mayhem here
today, everyone is getting all aerated and vexed.” We’ll give them “aerated and
vexed!” What about the 182 million people to die in Africa this century alone
because of climate change, or the residents of ‘hacked off’ Harmondsworth?

The day of action came as new research from HACAN Clearskies shows that 100,000
flights from Heathrow each year are to short haul destinations that are easily
reachable by the more sustainable train alternative.

Reports and photos at www.indymedia.org.uk

~ COURT REJECTS ASBOS FOR NEMA 25 ~

Loughborough Magistrates Court rejected calls from the Crown Prosecution Service to
slap ASBOs on the 24 Plane Stupid activists who they described as “highly organized
extremists” that were arrested in connection with the shut down of Nottingham East
Midlands short haul airport in September.

In an apparent move aimed to avoid having the case heard by a jury, the charge of
public nuisance was dropped, as was the charge relating to an alleged breach of the
aviation and security act.

Campaigner for Plane Stupid, Ellen Rickford, said, “The same day that we learn the
government is pushing ahead with its airport expansion proposals, they try to use
ASBOs to stamp out peaceful protest. Well, it seems their plans were as doomed as
the aviation industry.”

17 activists got one year conditional discharges (the minimum sentence available)
and each was charged £70 in costs. The 5 charged with criminal damage in addition to
aggravated trespass were given varying levels of community service. One person was
referred to Crown Court due to unresolved legal issues and another had his case
adjourned until January 31st. One other activist was unable to attend court due to
illness.

Help us pay our fines! Donate via: www.planestupid.com

~ TOP 100 GREEN CAMPAIGNERS OF ALL TIME ~

Veteran green campaigner and staunch supporter of Plane Stupid, John Stewart, has
been named by the Environment Agency as the 82nd most influential green activist of
all time! Just one position behind Mahatma Gandhi, Plane Stupid is mighty glad he’s
on our side and proud that he’s often been our spokesman!

~ MARKETING GURU PREDICTS END OF SHORT HAUL AIR TRAVEL ~

In a cover-story feature of Marketing Weekly Magazine, triggered by our national day
of action, a PR guru is quoted as saying that he thinks short haul budget air travel
will go the same way that coal did in the 80s because, “they are unnecessary,
outdated and therefore facing decline.” Too right!

~ AVIATION INDUSTRY PUBLISH “TEN REASONS TO KEEP FLYING” ~

Responding to Plane Stupid’s “10 reasons to ground the Plane” – the aviation
industry’s PR people at www.cheapflights.co.uk have come up with, “10 reasons to
keep flying!” This comes after the Stern report singled out aviation as one of the
most significant causes of climate change.

~ ‘ETHICAL MAN’ JOINS PLANE STUPID ON LONDON CLIMATE MARCH ~

Around fifty Plane Stupid-ers marched together with AirportWatch campaigners and
Stansted residents on the Campaign against Climate Change (CaCC) march to Trafalgar
Square on November 4th. There was an 8ft long wooden plane on storks, big banners
and tons of petitioning. Marching with Plane Stupid was Newsnight’s ‘ethical man’
and Seize the Day’s Theo and Shannon. Photos available soon on the website…

In the meantime, see www.indymedia.org.uk

~ POLITICS ROUND-UP ~

Gordon Brown snubbed scientists and campaigners calls for tough new green taxes and
instead opted in his pre-budget report for the pathetic political gesture of
increasing air passenger duty by £5. This news came less than a week after a report
from BA boss, Rod Eddington, who was hired by Gordon Brown and paid by us the
taxpayer, to (shock) suggest airport expansion was a good thing. So we now know that
industry bosses support their own plans. Fancy that!

~ DO YOU WANT US TO SPEAK IN YOUR AREA? ~

Plane Stupid speakers have appeared at the Lib Dem Regional Conference along with
Shadow Environment Minister, Chris Huhne; at the LSE alongside Stop Climate Chaos
director, Ashok Sinha; at student union venues including in London and Sussex; and
at local Greenpeace and FoE meetings across the UK. If you want us to come and talk
in your area, get in touch. info@planestupid.com

————————————————————-EVENTS
———————————-

CAMP FOR CLIMATE ACTION MEETINGS

Following the successful climate camp at Drax, plans are afoot for the next camp
which will be at a different location.get involved with putting plans into action.

www.climatecamp.org.uk

PLANE STUPID BENEFIT GIG/FILM SHOWING

On Friday 26th January, Brixton Jamm presents The Alabama3. Tickets available soon
via www.planestupid.com

——————————————————— RESOURCES
——————————

~ PLANE STUPID: A year in review ~

On November 29th, Plane Stupid had its first anniversary. For a reflection on the
incredible momentum we’ve built up over the last year, with video footage and photos
for download, see www.planestupid.com

~ PLANE STUPID Blog ~

Plane Stupid has established a blog at www.myspace.com/planestupid. Its first blog
entry includes, “The armchair environmentalist’s guide to offsets… or ‘How to save
the world for 38p!’)”

~ LEGAL RESOURCE FOR ACTIVISTS~

Experienced campaigners are offering free advice and training to grassroots groups
including legal skills and more. www.seedsforchange.org.uk

~ THE SHEILA McKECHNIE AWARDS ~

The Sheila McKechnie Awards provide campaign development packages to grassroots
campaigners. Up for grabs is a ‘Transport Award’.anyone wanting to apply should see:
www.sheilamckechnie.org.uk

UK social centres gathering, 27th January Bradford

Saturday 27th January @ The 1in12 Club, Bradford
A day of workshops, discussions & ideas

To be followed by an evening of entertainment from the Mayhem Cabaret featuring…

The Sex Patels Punk meets Bollywood

Saturday 27th January @ The 1in12 Club, Bradford
A day of workshops, discussions & ideas

To be followed by an evening of entertainment from the Mayhem Cabaret featuring…

The Sex Patels Punk meets Bollywood
Spanner Anarcho ska punk from Bristol
BeyONdTV Keeping Underground Media Ugly

Plus benefit Cocktail bar, cheap entry & more entertainment throughout

All Welcome, more details to follow. Contact the club on 01274 734160
or socialcentrenetwork@lists.riseup.net

Faslane action

19.12.2006
Wednesday morning, 7:30am. A dark road somewhere North of Glasgow. Scottish cold and rain beating in my face. I’m chained via a bike lock to Irene, veteran of the Faslane struggle. One arm disappears into a tube, at the other end of which is my mate Steve. There are seven of us, five women and two men, standing in a line stretched across the road.

19.12.2006
Wednesday morning, 7:30am. A dark road somewhere North of Glasgow. Scottish cold and rain beating in my face. I’m chained via a bike lock to Irene, veteran of the Faslane struggle. One arm disappears into a tube, at the other end of which is my mate Steve. There are seven of us, five women and two men, standing in a line stretched across the road.

Headlights approach through the darkness; our high-visibility minders rush forward arms waving: “Slow down, SLOW DOWN, This is a blockade don’t you know!” There are flashing blue lights approaching now from further down the road; one of us makes the call “HO!” and we sink to the ground, laid flat out on the tarmac.

The next forty minutes are spent blinking beating rain out of our eyes, grimacing at police cameras and questions, being fed chocolate by our minders and eventually, sadly, being cut apart by a very efficient Scottish police force. We’re taken away to a mobile processing unit for the usual rigmarole. As we’re driven away we can see the traffic queues backing up in three directions; the Trident nuclear submarine base is the workplace for 7000 loyal subjects of Her Majesty…. and a fair proportion of them are now late for work.

It’s the least we can do…. They’ll be late for work plenty more times in the next twelve months – the Faslane 365 blockade is intent on disrupting activity at the nuclear base throughout that time and GOOD LUCK to them! The weapons that are based at Faslane are some of the most awful ever devised by humanity and if used would usher in oblivion for millions, and misery for millions more.

Our next 24 hours are spent in police lock-ups in Dumbarton and Clydebank. We are yet to hear if the “procurator fiscal” is intent on pressing charges but with 408 arrests so far and only 4 prosecutions it seems unlikely. But either way there are bigger issues at stake than the odd breach of the peace. As our political masters contemplate the renewal of Trident – against the wishes of the majority of the British people – it is incumbent upon the ordinary citizen to express our opposition in every way possible.

Apart from being grossly immoral the renewal of Trident would undermine all international attempts at nuclear non-proliferation, as well as being a financial disaster for Britain. It would signal 24 billion pounds NOT being spent on hospitals, schools, the environment, etc etc. What insanity makes us spend all this money so that we have the option of killing beautiful human beings? In the face of such a prospect a few hours in a police cell seems a minor inconvenience.

The Faslane 365 website (Please, Join the blockade!):
http://www.faslane365.org/

So you think that, were Trident built, there’s no chance it would ever be used? Maybe you should read some history:
http://news.bbc.co.uk/1/hi/world/europe/198173.stm
http://en.wikipedia.org/wiki/Stanislav_Petrov

Greenpeace’s view:
http://www.greenpeace.org.uk/MultimediaFiles/Live/FullReport/7611.pdf

My thoughts while in the cell:
http://nickleberry-huxtable.blogspot.com/2006/12/uncomfortable-truth.html

Privacy, Email and Activism – a brief intro

Recently there was a conference for activists interested in security issues – obviously something that any activist should be interested in. Notes from the gathering are being compiled along with previous documents into a printed booklet for activists which is expected to be distributed next year.

Recently there was a conference for activists interested in security issues – obviously something that any activist should be interested in. Notes from the gathering are being compiled along with previous documents into a printed booklet for activists which is expected to be distributed next year.
In the meantime I’ve been doing a little additional research on solutions specific to securing email communication…

Emails and passwords used by activists are vunerable to snooping from both the state and from private investigation. Even seemingly unimportant information gathered from emails can help build a profile on a person and their associates. Personal information might provide your enemies with leverage to turn somebody you know into a grass or make it easier to place an infiltrator in a position of trust.

What most people do not realise is that by default, the vast majority of email and even passwords are sent over the internet in plain text that can be rmonitored by anyone. Sit down at a computer in a library, college or internet cafe and anyone else on that network can easily read the emails you send and receive, not to mention steal your password. There are several ways to avoid this depending on how you access your mail.

Most activists tend to use web based mail these days so we’ll start with those.

If you look in the address bar on your web browser you will see that most addresses start with the letters http:// but sometimes you will see https://. The ‘s’ indicates that the connection is using SSL, a secure encrypted link between your browser and the web server. Most browsers also display a locked padlock symbol somewhere to provide a visual confirmation that the connection is secure. When you are viewing webpages over a SSL connection (such as on Indymedia), the data being transfered is no longer in plain text and can not be read by people attempting to monitor you. This protection also applies to information you submit in web forms, such as usernames and passwords when checking webmail.

In other words, the most basic and essential thing to do to secure your email is use SSL connections if you use webmail. For example, if you use riseup webmail you should go to https://mail.riseup.net rather than http://mail.riseup.net

We should now breifly look at the use of POP and SMTP for those not using webmail. If you don’t know what these are, don’t worry, they are two of the most common protocols used for downloading and uploading messages using an email client installed on your own computer. Examples of email clients include Outlook, Eudora, Pegasus and Thunderbird. Again, the problem you need to be aware of is that these protocols are by default not secure and all emails and passwords are sent as plain text. You need to configure your account settings within your email client to use a secure authenticated connection such as SSL. It’s beyond the scope of this article to explain how but the help function of your client plus the help pages for your email provider will provide specifics.

It’s obviously essential to use SSL (or similar) to protect your email password. However, when you send an email it will still travel over the internet in plain text as SSL only protects the connection between your computer and the server. To protect the contents of the email for the entire trip it will need to be encrypted so that only the intended recipient can read it.

You may have heard of PGP ( http://en.wikipedia.org/wiki/Pretty_Good_Privacy), a computer program that encrypts (scrambles) and decrypts (unscrambles) documents and emails. The initials stand for pretty good privacy and like it says, it’s pretty good! Some people claim that the worlds most powerful computers could use brute force to break the encryption in a mater of just a few hundred of years while other put the time required at longer than the age of the universe. Of course, computers get faster all the time so either way the time frame might eventually be reduced to within a human lifetime but even so, it’s likely that by the time anyone broke the encryption the content would no longer be valuable. ( http://axion.physics.ubc.ca/pgp-attack.html)

I will not go into detail how PGP works as there is plenty of information about it on the web. More important is how to use it. The trouble with PGP has traditionally been that people not to confident using computers have been unable to use it effectively. However, over the years it has become much easier to use as it has been provided with a simply graphical point and click interface and also intergrated into email clients. Once installed and configured correctly, it’s now a simple mater of click decrypt or encrypt plus typing your passphrase.

There is the saying that a little knowledge is a dangerous thing and that is certainly true of encyrption technology. PGP uses Public Key Cryptography and it is vunerable to what is known as a man in the middle attack. This vunerability exists only during the exchange of public keys required to initiate exchange of encrypted messages. Again, it is beyond the scope of this article to describe the attack and you can easily look up the information elsewhere. The important thing is that if these keys can not be exchanged in person then it is vital to confirm that the keys have not been substituted on route. This is done by comparing the keys ‘fingerprint’ by reading them out on the phone etc.

Finally. They say misery likes company and so, ironicaly, does privacy. The more people who routinely encrypt their communications the more secure everyone becomes. If you were the only one using encryption then it might draw attention to you and anyone you communicate with. If you only use encryption for ‘dodgy’ emails then this might also attract attention. Once you have the software installed and configured it makes sence to use it whenever possible regardless of the contents of the email.

Further reading:
http://en.wikipedia.org/wiki/E-mail_privacy
http://en.wikipedia.org/wiki/Email_Encryption
http://en.wikipedia.org/wiki/Pretty_Good_Privacy
http://www.andrebacard.com/pgp.html
http://en.wikipedia.org/wiki/GNU_Privacy_Guard

Software
http://www.pgpi.org
http://www.gnupg.org/ (also known as gpg, open source version of pgp)
http://www.gpg4win.org/ (gpg installer for windows)
http://macgpg.sourceforge.net/ (Mac OSX port of GnuPG)

Additional software suggestions

Don’t have your own computer or don’t take it with you everywhere you go? Well there are interesting options available now utilising USB memory sticks. These have got really cheap recently and you can get a 1gb drive for under 20 pounds. That’s a lot of space and it fits in your pocket.

People have been developing what are called portable applications ( http://portableapps.com/). These run from the USB stick rather than needing to be actually installed on a specific computer. More importantly they are configured so that temporary files ect are store on the stick so as not to leave a trace on the computer they are running on.

With one of these sticks and the right software you can walk into a library etc and use a public computer to run your own software and access your own files. It is a very useful way to have access to your mail etc and the data on the stick can be encrypted using software such as TrueCrypt.

Anyway, in the context of the article above I wanted to mention a couple of specifc portable applications. Both are portable email clients based on Thunderbird.

One is called Mobility Email and it includes OpenPGP and S/MIME encryption. It supports IMAP, POP, SMTP and web based email. It is designed to from any location with no installation or configuration, allowing access your email and contacts on multiple machines. Most importantly, no personal data is left behind once the application is closed.

http://en.wikipedia.org/wiki/Mobility_Email
http://www.mobilityemail.net/

There is also the official Mozilla Thunderbird Portable Edition (formerly Portable Thunderbird). There are two packages available, one with GPG and Enigmail preconfigured to encrypt and sign your email.
http://portableapps.com/apps/internet/thunderbird_portable

Note. Those npeople who don’t require portability may well be interested in using the orinary Thunderbird email client plus openPGP and the Enigmail extension to provide an easy to use and fully interigrated email encryption system. It’s cross platform, free and has a large community of user and developers. You can even use it with the Webmail extensions to access yahoo, hotmail and gmail accounts etc.
http://enigmail.mozdev.org/

——————————————————————————–

Riseup users and PGP

It’s a little known fact but riseup users can use PGP from within their webmail accounts. I only discovered this recently and as far as I can tell it’s only been an option since riseup upgraded to version 4 of IMP in late 2005.

Only the IMP webmail has the PGP feature, not Squirrelmail which I guess most riseup people use simply because it’s at the top of the login page. However, you can swap between the two without problem if you’ve already been using Squirrel.

The PGP features are not enabled by default and it’s a bit hidden away which might explain why I’ve never heard mention of it. The riseups documentation on security makes no mention of the feature, not even in their PGP page. I checked on google for anything about pgp on riseup but couldn’t find anything either so I decided to write a ‘how to’.

HOW TO SET UP PGP IN RISEUP

To enable the feature you have to login to the IMP webmail (obviously make sure you are using a secure connection https:// as described in the article above). When logged in you click options from the top navigation menu then click ‘PGP Options’ under other options on the right hand side.

Now you tick ‘Enable PGP functionality?’ then click ‘Save Options’ and the page refreshes and you have a bunch more options. I suggest you don’t tick ”Should your PGP public key to be attached to your messages by default?’ but you probably should click ‘Should the body of text/plain messages be scanned for PGP data?’

Further down the page you have two more sections which weren’t there until you enabled PGP. One of these is ‘Your PGP Public/Private Keys’. If you already have a PGP keys then you will need to upload them here by clicking upload and either copy and pasting the approbriate key or browsing the file on your machine and attaching it.

However, if you don’t have a PGP key pair then you can actually create them now from within IMP. Personally I feel this is a bit of a security risk as it requires you to trust riseup, but then again you have to trust riseup if you are planning on using webmail with your email in the first place. Creating a key pair using IMP is easy, just follow the instructions.

Once you have you keys created or uploaded you need to enable the address book. This is perhaps the most illogical part of the configuration. There is a line on the page where the words ‘PGP Options’ appears on the left and the following on the right ‘<< Address Books | S/MIME Options >>’

Click on the link to Address Books and then on the new page you will see a pull down menu towards the bottom with the words ‘Choose the address book to use when adding addresses’ written above. Change the selection from ‘None’ to ‘My Address Book’ within the drop down menu and then click ‘Save Options’ at the very bottom of the page.

You can now return to the PGP Options page and upload your friends PGP public keys to the newly enabled address book. It’s just a matter of cut and pasting the key block from an email etc.

That should be it… click ‘Save Options’ again just incase and then return to your Inbox

USING PGP ON RISEUP

When you create a new message you will find new options below the text body, just below the Send Message button. These are a drop down menu from which you can choose to sign and/or encrypt your message with PGP, and also a tick box enabling you to send a copy of your PGP public key with your message. When you click Send Message you will be asked for your passphrase in a seperate box and then you click Send Message again.

! It’s worth pointing out that if you have popup filtering activated (and you should), then you must configure it to allow popups from tern.riseup.net and petrel.riseup.net otherwise you won’t get the enter passphrase window appearing and you won’t be able to encrypt or decrypt anything.

When you recieve a PGP encrypted message you will find a box that reads “This message has been encrypted with PGP. You must enter the passphrase for your PGP private key to view this message.” (again, popups must be enabled or it won’t work). Obviously you type your passphrase and you get to read your message.

! Don’t forget to log out when you have finished or somebody else might come along and continue using your webmail session with the passphrase still cached so be able to read your encyrpted messages!

That covers it all I think. For the best security it would be preferable to use PGP locally on your own machine which you are sure is secure. However, the PGP option with riseup is still very very useful. DONT FORGET.. YOU MUST USE A SECURE SSL CONNECTION TO HTTPS://RISEUP.NET

Finally, a few quick notes on choosing a PGP passphrase.

Do not use the same password as you use for your email or any other purpose. .
Do not write it down but obviously choose something you can remember.
Avoid dictionary words and names of your family or pets.
Aim for at least 12 to 16 characters
Mix uper case and lower case letters, numbers and punctuation for the strongest passphrase.

——————————————————————————–

Use secure email providers

Following the link to riseups pages on security I found this information which is quite interesting. Basically it’s about a protocal which mail servers can use to talk to each other securely so that emails are passed from source to destination and not be read on route. Not all mail servers offer this service but riseup does and it lists other activist tech collectives that provide such mail mail servers. Obviously it would be better to encrypt all mail using PGP etc but that’s not currently realistic so for those messages that still go as plain text it is a very good idea to be using a mail service that provides StartTLS.

(taken from riseup…)

What is StartTLS?

There are many governments and corporations which are sniffing general traffic on the internet. Even if you use a secure connection to check and send your email, the communication between mail servers is almost always insecure and out in the open.

Fortunately, there is a solution! StartTLS is a fancy name for a very important idea: StartTLS allows mail servers to talk to each other in a secure way.

If you and your friends use only email providers which use StartTLS, then all the mail traffic among you will be encrypted while in transport. If both sender and recipient also use secure connections while talking to the mail servers, then your communications are likely secure over its entire lifetime.

We will repeat that because it is important: to gain any benefit from StartTLS, both sender and recipient must be using StartTLS enabled email providers. For mailing lists, the list provider and each and every list subscriber must use StartTLS.

Which email providers use StartTLS?
Currently, these tech collectives are known to use StartTLS:

* riseup.net
* resist.ca
* mutualaid.org
* autistici.org/inventati.org
* aktivix.org
* boum.org
* squat.net
* tao.ca
* indymedia.org
* eggplantmedia.com
* so36.net

We recommend that you and all your friends get email accounts with these tech collectives!

Additionally, these email providers often have StartTLS enabled:

* universities: berkeley.edu, johnhopkins.edu, hampshire.edu, evergreen.edu, ucsc.edu, reed.edu, oberlin.edu, pdx.edu, usc.edu, bc.edu, uoregon.edu, vassar.edu, temple.edu, ucsf.edu, ucdavis.edu, wisc.edu, rutgers.edu, ucr.edu, umb.edu, simmons.edu.
* organizations: action-mail.org, no-log.org
* companies: speakeasy.net, easystreet.com, runbox.com, hushmail.com, dreamhost.com, frognet.net, frontbridge.com, freenet.de, blarg.net, greennet (gn.apc.org)

What are the advantages of StartTLS?

This combination of secure email providers and secure connections has many advantages:

* It is very easy to use! No special software is needed. No special behavior is needed, other than to make sure you are using secure connections.
* It prevents anyone from creating a map of whom you are communicating with and who is communicating with you (so long as both parties use StartTLS).
* It ensures that your communication is pretty well protected.
* It promotes the alternative mail providers which use StartTLS. The goal is to create a healthy ecology of activist providers–which can only happen if people show these providers strong support. Many of these alternative providers also also incorporate many other important security measures such as limited logging and encrypted storage.

What are the limitations of StartTLS?

However, there are some notable limitations:

* Your computer is a weak link: your computer can be stolen, hacked into, have keylogging software or hardware installed.
* It is difficult to verify: for a particular message to be secure, both the origin and destination mail providers must use StartTLS (and both the sender and recipient must use encrypted connections). Unfortunately, it is difficult to confirm that all of this happened. For this, you need public key encryption (see below).
StartTLS

——————————————————————————–

512 bit encryption broken in less than a second

The problem with technology as a means for secure communication is it’s own advancement. What is secure today may not be secure tomorrow. And people who think they’re safe, using PGP or whathaveyou, then share information over email that should only be shared face-to-face.

source: http://www.khaleejtimes.com/DisplayArticleNew.asp?xfile=data/theworld/2006/November/theworld_November597.xml§ion=theworld
crypt broke

————-
“The report’s authors, Onur Aciicmez, Cetin Kaya Koc and Jean-Pierre Seifert depict a concrete attack on OpenSSL on a Pentium 4 processor, albeit using a key that would be considered quite short by today’s standards (512 bit).”

Hmmm.. What is described requires the attacker to be running hiden software on the machine performing the encryption operation – in other words it requires that attacker to have installed software either with physical access to a machine or remote access. Now certainly, if you are using an insecure operating system like windows then it would be a risk, however a far easier attack in this case would be to use a keylogger, either software or hardware.

In other words, Seifert and his colleagues discovery is unimportant in relation to email security since much easier and more practical exploits exist already.

Bloggers writting about the new technique have suggested it it is the security of applications using Digital Rights Management (DRM) most likely to be threatened by such techniques. For example, user might use the technique to remove the license protection on WMA audio files they purchase so that they can share them with friends. In this situation they would obviously be well placed to install the spy processes required in the attack.

You attempt to discourage people from using the technology employed by financial and government institutions etc is a waste of time. The weak point in all these security measures is the people using them. Obviously there is a lot to be said for low tech ‘cold war’ solutions like going to meet somebody face to face but it’s a lie to suggest they are themselves are without significant risk.

Mobile phones, the stealth ID card, bug and tracking device in your pocket.

Earlier this month it emerged that the FBI had been remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations. The surveillance technique, which “functioned whether the phone was powered on or off.” came to light as a result of a ruling by U.S. District Judge Lewis Kaplan on the legality of the “roving bug”. It had been approved by U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping. Cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations.

Earlier this month it emerged that the FBI had been remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations. The surveillance technique, which “functioned whether the phone was powered on or off.” came to light as a result of a ruling by U.S. District Judge Lewis Kaplan on the legality of the “roving bug”. It had been approved by U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping. Cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations.

The news that the FBI had been remotely activating mobile phones as eaves dropping devices confirms what many activists have been saying for years.

“A cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone. This is done by transmitting to the cell phone a maintenance command on the control channel. This command places the cellular telephone in the ‘diagnostic mode.’ When this is done, conversations in the immediate area of the telephone can be monitored over the voice channel.” – National Reconnaissance Organization newsletter,1997.

As long as I can remember there has been a kind of unspoken rule among activists about taking batteries out of mobile phones during meetings to prevent bugging – along with occasional arguments about it being paranoid. While it has long been know to be a theoretical possibility, the mafia court case confirms it is actually a practical technique and is being used.

It is not clear exactly how the FBI achieve their remote activation but it is known that it is possible to update the software on a mobile phone by sending an unnoticeable SMS message to a particular cell phone. Changes to the phones software than make it possible to spy on the user around the clock, as long as the phone has power. All SMS messages can be read and all calls and conversations can be listened to, including those taking place in the vacinity of the phone. It would also be possible to access and copy address books and other information stored on the phone.

It should be fairly obvious to anyone that simply ‘switching off’ a mobile phone could not prevent the software from reactivating the phone at will. Like most computers, the on/off switch on a mobile phone is simply a button that requests the software to do something, ie.. turn the phone on or off – or more acturately, switch the phone between standby and normal operations. Many have an alarm feature which can operate when the phone is apparently ‘switched off’.

Some of the vunerabilities of mobile phones may only be exploitable by the state or private interests with financial muscle to obtain access to the records of mobile phone networks. Others however are much easier to exploit and well within the capabilities of private investigators. One example is the ability to read mobile phone numbers from all phones in a room as those phone routinely poll and communicate with the nearest cell phone repeater.

And lets not forget the ability to track cell phones (again, potentially even when they are turned off). With the data retention laws requiring mobile phone networks to keep this data for a year or so, it is easy for the authorities (or private agencies with influence) to not only monitor somebodies movements but also cross reference that with other people and build up acturate pictures of networks of association.

As repression on dissent increases, it is vital that we are all aware of the information we provide our enemies and what steps we can take to limit the damage.

What advice might you consider?

Don’t take any mobile phone to a meeting and if you must, remove the battery.
Don’t take your personal mobile phone with you on actions.
Remove the battery if making journeys others should not know about.
Better yet, don’t take the phone or send it out on a walk in the park with a friend.
Don’t power up you ‘clean’ action phone in any building you don’t want assocaited with an action.
Never use ‘clean’ action phones to call comrades personal phone numbers.
Don’t call a ‘clean’ action phone from any ‘non clean’ phone.
Don’t continue to use the same set of action phones on future actions.
Only pay cash for phone credit and don’t not from places with CCTV (difficult).

Further reading…

FBI story:
http://news.zdnet.com/2100-1035_22-6140191.html http://www.informationliberation.com/?id=18443
http://arstechnica.com/news.ars/post/20061203-8343.html

Background:
http://www.wasc.noaa.gov/wrso/security_guide/cellular.htm

Some examples…

Clearly the police are using the location records of phones to link people to actions, some recent examples:

“A GANG of travellers are facing jail for a series of violent ram-raids, robberies and burglaries after they were linked to the crimes through mobile phone records.”

“Mr Farmer said mobile phone records had been crucial in securing guilty pleas and convictions…”

http://www.cambridge-news.co.uk/news/ely/2006/12/13/80f9ff15-a536-4d01-9e77-743d900618d6.lpf

“At a press conference this morning Mr Gull said that officers were looking at mobile phone calls made and received by the girls and were also analysing DNA, but refused to go into more detail.”

“When asked about Anneli and the other women’s mobile phone records, Mr Gull said: “I don’t want to go into details, it’s very sensitive, but it’s something we’re looking at.â€?

http://new.edp24.co.uk/content/news/story.aspx?brand=EDPOnline&category=News&tBrand=EDPOnline&tCategory=news&itemid=NOED16%20Dec%202006%2015%3A37%3A43%3A720

“THE EADT has now filed an official complaint against Suffolk police after its most senior detective obtained the private mobile phone records of a journalist in a bid to discover his sources.”

“Editor Terry Hunt has requested a full explanation for the action taken by Det Supt Roy Lambert in a letter sent yesterday to Chief Constable Alastair McWhirter.”

“As revealed in yesterday’s EADT, confidential mobile phone records of reporter Mark Bulstrode were obtained by Mr Lambert so he could find out who he had been speaking to.”

“The move was taken after the journalist approached the force with information about the reopening of an historic investigation.”

http://www.eadt.co.uk/content/eadt/news/story.aspx?brand=EADOnline&category=News&tBrand=EADOnline&tCategory=news&itemid=IPED01%20Dec%202006%2019%3A35%3A22%3A490

A the pieces are now in place for the electronic police state.

how to make lock-ons (lessons from Faslane 365)

The basic principle of a lock-on is to lock yourself onto something so that you cannot be easily physically removed. That something can be another person or something fixed. The best way is with a climbing carabina and a chain or rope around your wrist. The important thing is to make it very difficult for the police or whoever to cut your lock-on off. Thats where the fun part comes in, covering that lock-on to make it very difficult to get to, thus delaying the authorities and making your blockade as successful as possible. They will possibly have access to specialist equipment.

The basic principle of a lock-on is to lock yourself onto something so that you cannot be easily physically removed. That something can be another person or something fixed. The best way is with a climbing carabina and a chain or rope around your wrist. The important thing is to make it very difficult for the police or whoever to cut your lock-on off. Thats where the fun part comes in, covering that lock-on to make it very difficult to get to, thus delaying the authorities and making your blockade as successful as possible. They will possibly have access to specialist equipment.

Simple steel lock-on tubes are great but can be cut into in 20 minutes with a specialist drill head. The yellow pipes with a 2 cm thick wall are also great because the plastic actually melts around the drill head making them very hard to get into.

To make an oil drum lock-on you simply need an oil drum and some piping – preferably steel – which is just wide enough to fit your arm in and no more, cut so that it is as long as the barrel is wide. Drill a hole in the middle of this pipe section so that a metal rod can be inserted, this is what you actually lock on to. Cut holes on either side of the barrel so that this pipe can fit in in such a way that two people can lock-on on either side. Then simply fill this barrel with concreate and all sorts of hell like scraps of metal (lengths of thick steal wire will hold it together), megamorphic rock (very solid rock), quartz and the odd diamond if you want to bling it up, lengths of shredded polyprop is also very good at stopping the break-up of concreate from the wrath of a jack hammer. If you wanna be real hardcore putting in canisters of camping gas or lighter filler make the cops quite reluctant to cut into them (or even just saying you have, they wont take the risk), this is of course pretty dangerous. It will take the most skilled cutting crew in the country at least a couple of hours to cut you out of there. Two people locked on is better than one because with one person they may just try to lift it out of there with a fork lift truck, two bodies makes this far less likely.

The “Baby barrel� lock on is much more portible, fitting into a normal ruck-sack this one is for the blockader on the go. Its just a steel lock on tube inserted into a small barrel lengthways, its a similar idea as the oil barrel lock on with the concrete mass surrounding where you are locked on to the other person inside the tube. It is a little easier to cut into but its portability and ease of construction makes this the one to have this christmas.

Portability is often an important factor. Being able to stash and camoflage your lock-on will help here but always have a plan B if it gets found. The police will eventually be able to cut you out, no material is unbreakable but the longer you can hold your blockade the more you will have achieved out of your eventual arrest. Happy blockading.