How do we organize in the face of modern mass surveillance when they ban being a communist? How should an underground party organize itself? What underground tactics should be adopted? How can an underground party build dual power and threaten the state?
Why aren't you, personally, organizing underground cells? They won't let you beat them legally, you know.
By not posting it on anonymous image boards
Meshtastic is off grid and uses low power radio frequencies.
If you can get enough nodes up, you can have functional messaging while cell towers are down.
>>2687969Why not use Tor or I2P instead? Say what you will about the relevance of newspapers in the modern day but if you're hyper-local in terms of infrastructure it's hard to act on a national level. There's a reason Lenin pushed for an all-Russian reach for propaganda early on.
we need tunnels
>>2687972Mesh would work even in the event that power was cut. Really all you need for mesh node is a rpi0w with a battery.
>>2687978I mean ideally you probably want both, but you want to avoid having a receiver that can be physically triangulated if you can help it. Unsure how well meshtastic works in that regard. And ideally you need some kind of mass influence (e.g. via front organizations) not being so underground that you're irrelevant, and not being so aboveground that you're impotent and legalist. A Tor or I2P based Iskra wouldn't be a bad starting place I think.
Here's my notes. Hope they don't break tor posting again like last time I talked about this
Strategic stages in terms of concrete activity:
(stages may retreat in unfavorable conditions, e.g. state concessions. We know that concessions are a key counter-insurgency strategy and are usually successful in shrinking the support of the insurgent movement, so we need to prepare to maintain activities clandestinely and at a low level for a long period in order to exhaust their will or ability to maintain or expand concessions)
> Strategic Defensive: operation in poor neighborhoods, growing to the point that advanced operations cover 100% of working class population in given city
Operational stages within defensive:
(Each is to build off of the practical activity/organization of the last, and lower functions are sustained as higher functions are taken up. All work is to be done clandestinely, some within fronts/community orgs and some out of sight.)
Rapport building: alleviation programs for poverty issues, community defense
Informational: social survey, mass line, educational programs, news distribution (word of mouth, speech at gathering, or physical paper), boycott of bourgeois media and entertainment, socialist controlled social media focusing on local and topic based discourse
Organizational: funnel anyone who wants to be helpful into specific programs. E.g.: arms training, fundraising for arms, procuring arms in a centralized way, working on distributed communication network infrastructure, provision of secure communication devices, journalism, social mapping, educational work, alleviation work, collecting donations for alleviation work, spreading socialist news media and bourgeois media and entertainment boycott, organizing new community and recreation events and programs, building tunnels and underground facilities, developing explosives, developing rockets and delivery systems, developing mortars, building or procuring body armor, developing surveillance technology (e.g. drones, stingray devices, packet sniffers, facial recognition, etc.), developing non-GPS tracking devices, deploying and maintaining surveillance technology in order to map enemy patterns and forces, infiltrating key infrastructural workplaces, infiltrating enemy forces, active surveillance and broadcast of threats to protect neighborhoods with clandestine activity/organizers, illicit economic activities, funding higher education in areas needed by the organization, donating time for repair and DIY activities in order to reduce community’s costs and decrease dependence on outside regions,
> Strategic Stalemate: insurrectionary takeover at city level, moving from control of residential areas to infrastructure (communications, grid, etc.), defensive positions, building new defensive positions (tunnels), implementation of immediate reforms, etc.
> Strategic Offensive: mobile warfare to take smaller towns and rural areas
Structure of communist movement:
>Communist Center:
- study and create policy
- lead through mass line
- educational qualifications (basics of Marxism) to become member
>Revolutionary Organization:
- engaged in political combination with the intention of administering society as the new state and defeating the bourgeois state
- led by communist center policy and strategy
- may contain those with low theoretical level who simply agree with the need for a new state
- engaged in activities such as: military training, canvassing, creation of propaganda/popular education materials on communist policy and analysis, social organizing in communities, collecting dues, reconnaissance and surveillance of bourgeois state forces (including infiltration), clandestine disruption and destruction of bourgeois forces, harassing the enemy, enacting justice when it’s a popular demand, administering a system of mutual aid from pooled resources and pledged skilled volunteering, encourage and engage in clandestine production of otherwise monopolized/IP’d goods and sell below market value; build underground tunnels and spaces for production and meeting; counterfeits and forgery; production of weapons and technical systems which support martial efforts; maintenance of servers and software in support of revolution (from websites to social mapping software to alternative social media); enforce eviction freezes and negotiate rents
- collect optional/sliding-scale dues from members
- collect donations with sales of media (e.g. newspaper, pamphlets, etc.) to community members
>Fronts:
- defined as spaces and occasions where people can get together and converse, socialize, etc.
- the domain of the new revolutionary state
- may eventually look like a united front, but that will come after the revolutionary organization gives the bourgeois state enough existential fear for reforms and concessions to come back
- carry out social organizational work (the same as workplace organizing but towards all of society – to solicit grievances and organize around them; to share information between locals such as shared grievances, possibilities for action, and bourgeois repression tactics; to share the official communist position on certain issues and educational literature/media if possible; to inspire confidence in the working class; to create distance and eventually sever ties between the workers and the bourgeoisie and its influence; to engage in social mapping (like workplace mapping but for neighborhoods/cities); to solicit information for social investigation; to recruit for the revolutionary organization and party of communists
- we should engage in all preexisting communities as well as create our own, with the ultimate goal that the communities we operate in cover 100% of the working class population
- a major goal should be for us to exert influence via these communities to isolate the working class from the media and entertainment of the bourgeoisie. That means ample recreation and socializing to take up people’s time, as well as spreading socialist media and even clandestinely socialist social media platforms in order to replace the bourgeoisie’s influence over the working class with it’s own independent discourse and recreation
What about recruitment? How do we accomplish that without too much COINTELPRO infiltration or a complete failure to get off the ground?
>>2687989>deploying and maintaining surveillance technology in order to map enemy patterns and forcesI think projects that aim to map stuff like networks of flock cameras are already a useful precursor to stuff like this, but we should ideally aim to expand this further and to really map out other systemic vulnerabilities. Things like rail lines, electrical grids, other key infrastructure sites so your protesting isn't just chasing the purely symbolic targets but you're capable of actively contesting control of critical logistic centers of power.
>>2687983All radio transmissions can be triangulated. I think the only thing that helps that is using geography like mountains to bounce waves off, and directional transmission. But if it transmits it can be found, basically. Realistically if you're in an active urban guerrilla situation, you just broadcast short messages from somewhere not important to your operations and then move so it doesn't help the gov locate you. Mesh is cool in a solarpunk way but they'd either take it down and/or criminalize whoever physically hosts it if it was used in an adversarial manner.
Realistically though we should just use existing infrastructure in an anonymous way. The safest way is tor over public wifi. If we needed during a conflict phones correctly (anonymously) procured could work, they just aren't useful for day to day operations since their location is always tracked and nothing is encrypted. Any revolutionary org should provision their members with means of secure communication and give them protocols to follow in order to not let our NSA AI overlords see their new patterns of life and draw the conclusion they've been recruited. For most things email could work. So e.g. take your full disk encrypted whonix/tails/qubes laptop, drive to a shopping center, park, connect to wifi, connect to party-provided (non-commercial) vpn, connect to tor, check email, copy email contents to pgp to decrypt
But overall we really need to find a key place to begin, and we need a center that can bring together lots of disparate efforts. That's where I think things like Tor and I2P are very promising as a coordination center.
>>2687998I absolutely agree. Meshtastic could maybe work if it's a purely encrypted stream that they could triangulate but not associate with revolutionary activity unless you're a member with decryption keys, and even then I see risks if there's infiltration. But I think the point of a central platform like Iskra was that anyone could read it but few people knew the true identities of the people writing for it under pseudonyms. That probably also holds in the modern climate.
>>2687996There's
https://openinframap.org/>>2688000I think the key first thing is that we have conscious communist leadership communicate securely and pseudonymously in order to coordinate study efforts and lead initiatives at first. One thing past movements did wrong is make their ideological leadership identical with their activist leadership, which means they're the first to be locked up or killed (like the panthers). An invite-only forum would work great for something like this but for some reason the online left is totally dead right now
I feel like since an APT would totally burn an 0day on cracking a revolutionary dark web site if it was threatening enough there should be further defensive measures so that even if the domain is cracked you can still reorganize a new one without getting deanonymized and hunted down.
>>2688004>for some reason the online left is totally dead right nowScrolling, commenting, and being snarky is easy. Risking your life and putting in months of dedicated work to build an organization is not.
>>2687992The safest means of recruiting is where organizers scout and vet potential recruits that they meet in real life scenarios. This could be the workplace, but we should also open as many fronts for recruitment work as possible. (E.g. community events, block parties, recreation clubs, volunteer orgs, etc.)
Also to be pedantic, recruitment is just one facet of social organizational work that a revolutionary has to do. We locate the most advanced, the intermediate, and the backwards. We recruit the advanced, but it's important also to know who can maybe be reached with educational material or social work initiatives, and who is an enemy who might need to be taken out at some point. So the overall work is to map out every social setting, such that ideally in the end we get a full picture of every working class person's political orientation, where they work, where they live, etc. Our goal is bringing together the best of our society in order to inspire and rally the middle, then repress the reactionaries to complete the act of bringing our class into total unity of action. Once we're united they can't stop us. And also only then would we have a real chance at winning over some of the military to our side. Plus we could ventilate nazis and use their property as bribes
>>2688015But no recruiting is foolproof, since anyone can be turned. Especially if they have kids, addictions, debts, etc. That just means we need compartmentalization in our networks, and anonymization of info sent from locals up to higher levels.
>>2688015I mean I think a good recruiting base right now is probably just people who are already communists but who just can't find a suitable organization that they can put their faith in, to build a vanguard. Then we can move towards the broader public.
>>2688011I guess it would have to be no JS? And for extra security site owner should host 3-5 public guard nodes and set them as the only ones for the hidden service to use. And the site owner should obvs rent the server properly with monero, over tor, ssh over tor etc. and keep private keys local rather than on the server. And sign messages with a key they keep locally. That way even if the server is taken no one would be deanonymized, site owner would be safe, and they could put up a new site and verify it's real. It also means we'd need back channel communication. Email can do this. All members could be given (or just buy for themselves) a gmail to access over tor, and use pgp. That way it's not like they can shut down gmail to stop us. Maybe they could have google delete or lock those accounts though, so maybe just having tons of them. They're pretty cheap, you could give each person a different email to reach you at so if someone is a fed they don't compromise everything. And communicate it e2ee. That way the whole human network could be brought back in if the admin makes a new site.
>>2688019>gmailWas with you until this. Are you completely out of your mind? But no I'm pretty sure there are solid anonymized chat over Tor applications, and even without that shit like Proton is better. I don't know if they even allow gmail over Tor and obviously every gmail message is scanned.
>>2688021You can buy gmails in bulk with crypto and just use them over tor, it's very secure. You can then encrypt the contents yourself. Bam, anonymous and encrypted email. Idk what chat apps are out there right now, but that's either another server that can be compromised if it's federated, or another company that can be coerced if it's centralized, or it'd have to be p2p and i think ricochet was the main one and idk if it's still around? p2p over tor is hard for obvious reasons, and non-tor p2p is dangerous
>>2688021Also a second thing, you could even use discord or some other shitty malware safely over tor like this: rent a vps (over tor, with monero, etc.), set up your apps or browser or whatever you want on there, and then vnc over tor. To the app or website it looks like non-tor normal traffic (though not perfect because it's not a residential IP but that isn't really an issue) but it's not tied back to you. I don't expect everyone to do this though because it adds cost
>>2688023Okay that's slightly less retarded. I think Ricochet (an old model) was actually the thing the German police compromised back in the day. There miiight be some other Tor p2p apps as well I think, like IRC over Tor or something.
But I think a good scaffolding is probably an online newspaper hosted securely on Tor/I2P. It could have a field that allows non-members to write correspondence for the paper, reviewed with high standards by the editorial board, and maybe if you publish enough as a guest correspondent you could get some conditional, limited membership that doesn't involve divulging compromising secrets. Idk.
>>2688032there's also cwtch
https://docs.cwtch.im/security/introI still think buying and using gmails over tor is better for emergency communication since it can't be taken down and doesn't lead back to your home IP (hosting a hidden service on your device seems sketch, there's lots to do to make hidden services more safe and you don't get to do any of it with ricochet/cwtch/whatever p2p over tor protocols). We could even use facebook over tor with VNC :^) ISIS uses facebook. Though you'd want a dedicated computer for it so they can't correlate your mouse movement/speed and things profile to your other activities
>>2688040Will it be substantially different from the plethora of newspapers that already exist? I think a better model for the current level of organization would be a handful of self-organized study groups on different topics with the purpose of compiling definitive reports on the subject, in order to advance organizational knowledge as well as influence the wider conscious communist element in society.
>>2688061The "newspaper" could be like the publishing ground for all of these study groups I guess. Could also have an invite-only forum attached. We also probably need to find a way to influence social media for agitprop directly without it being traced back, so buying bot accounts run over Tor could be useful maybe.
Organic centralism
>>2688004>https://openinframap.org/Is it based on OpenStreetMap? I would recommend to any anon who wants to map cameras to do it on OSM, you can detail even the direction they are pointed to and it will be uploaded to a database that will be accessible by everyone very soon
word of mouth.
only 100% fail-proof.
Honestly I think the best way is trying to infiltrate the military in key positions, e.g. maintenance worker at an airbase. Modern militaries can absolutely crush a working class insurrection with only guns as weapons, but they also have the weakness of having way more moving parts. If the people involved at any stage of the "kill chain" were to fuck something up, the entire thing stops working. So if you were to, say, pour water into the fuel tank while refueling an ISR drone, dump gravel into a warship's engines, insufficiently tighten some screws on a fighter jet, etc. this could not only cause extremely expensive damage but also cause missions to be delayed or abandoned due to part of the kill chain being nonfunctional.
>>2688320This could also become catastrophic damage from just a single person if you were in a position like that of a drone controller or pilot, you could suddenly strike your own assets and torch entire lineups of vehicles or an ammo stockpile before someone stops you.
interesting larp, friends. glad you could get those revolutionary impulses out in a safe and harmless manner
>>2687957if you're in Europe, who are you going to organise? the Euro supremacists who believe all Russians and Chinese should die? Most Europeans would (will) side with fascism/nazism before they accept a multipolar world or recognise Russians and Chinese as human beings.
>>2688569Who cares europe is irrelevant. What matters is the united states, india and lat am most of all. Europe is toast has no resources and its a one trick pony that got beat by ai.
>>2688582Rveryone in the future either clise or distant will be a kalergi creature. A eurasian black either by conquest or by evolution. Conquest being the fastest route. The sooner this is accepted the sooner we can carry on with the orogrom.
Is telegram a good app to use for local organizating?
>>2688793Well if its for legal organizing i guess. They cracked down on tg. If its iffy youll want to use sessions. It uses a crypto version of tor.
>>2688793Telegram is just like any other non-encrypted messaging app. There's nothing special about it. If you need an encrypted messaging app Signal is decent
>>2688320As shown by both the Russian and Chinese revolutions, infiltrating the enemy's military is an important aspect of the work. It just can't be the only aspect, because it's also necessary to grow the number of revolutionaries, and that's achieved by organizing within the working class. The US military is especially harsh on any attempts to organize their forces. It doesn't mean we can't spread ideas or put ourselves in positions to do sabotage, but it means we'll have much less success than with the civilian population.
Also it's not necessarily true that the military can easily stop an insurrection. Insurrection is a surprise attack by a large portion of the population on the forces already stationed in a city. All the military can do is come in later to try to root out the now entrenched insurgents, who are also the popular and legitimate governing force. The US has fought in similar conditions, and it only has two methods of dealing with it: 1. genocide the population, 2. turn on the money faucet and bribe the population to be loyal to the previously established government. The second one is the most dangerous because it actually works. The first method, killing everyone until they happen to kill all insurgents, or until the population gives in, can be countered somewhat with moving key leaders, money, equipment etc. to another city, and building bunkers and tunnels underground to evade bombs. Really if they go the genocide route there's nothing anyone can do to totally defend against it, but in a civil war setting they're also destroying their own economic base, and thus their logistics. I
n the stage in preparation for insurrection, they could really hamper us if they do intense information gathering and targeted killings/arrests (and they already know this, which is why they're doing everything they're doing), but it seems like they have some trouble actually following through on this, meaning there must be too many enemies of the state for them to risk the political unrest it would cause to suddenly kill us all. Also their surveillance is not perfect. The stage where we're still trying to grow the number of armed communists, and when they begin to use violent repression, is the most dangerous for us. We'll have to quickly re-organize in order to avoid deadly raids while not yet strong enough to make any offensive moves. That's the point where they could easily snuff us out. But if we have enough support of the population we should be able to survive this. And if our organization is sufficiently compartmentalized and diverse we'll be able to keep growing it (even if armed comrades are known and not able to organize freely, others will be able to)
Unique IPs: 13