The apparatus of surveillance operates on a fundamental asymmetry, and in the USA they seem to assume the tools of surveillance, infiltration, and deception are theirs alone to wield. This assumption is itself a vulnerability, a blind spot carved by decades of impunity. The honey pot, the web of trust, the slow cultivation of access, these are not technologies proprietary to the state and private GWOT actors. They are social dynamics, and like the other social dynamics of repression such as violent force, they can be redirected.
I will not elaborate on specific methods here. That would be not only irresponsible but strategically suicidal. The moment a tactic is named, it is catalogued, and the moment it is catalogued, it becomes less effective. What I can offer, without burning what works, is a confirmation that the web is not one-way. The agent who seeks trust must offer trust. The infiltrator who collects information must receive information. And in that exchange, if one is paying attention, the hunter becomes legible.
This is not theory. This is my experience in Pittsburgh.
Over those years, two individuals I considered comrades, people with whom I shared meals, organizing work, and the ordinary vulnerability of movement life, were turned. I know this now not because they confessed but because a patient, multi-layered honey pot revealed them to us. The method itself is not the story, and I wont burn the method. The story is what the method produced; a pattern. Inconsistencies in their accounts of where they had been, or how they received funding to survive. Questions that lingered too long on details no organizer needed to know. A sudden, inexplicable prosperity during periods of movement quiet, new equipment, paid travel, the kind of financial ease that does not arrive by accident. And finally, the confirmation; information fed to them in confidence, information that had no reason to travel beyond their ears, appearing later in the investigative posture of local authorities.
I now possess testimony from them, though they do not know I possess it. I have documentation of their movements, their communications, their quiet meetings with individuals whose affiliations they never disclosed, both private and public. I have the record of their lives as they lived it while pretending to live ours. And I have the knowledge, cold and finalized upon paper with evidence, that they were asked to gather information on me, and tha
Post too long. Click here to view the full text.