The apparatus of surveillance operates on a fundamental asymmetry, and in the USA they seem to assume the tools of surveillance, infiltration, and deception are theirs alone to wield. This assumption is itself a vulnerability, a blind spot carved by decades of impunity. The honey pot, the web of trust, the slow cultivation of access, these are not technologies proprietary to the state and private GWOT actors. They are social dynamics, and like the other social dynamics of repression such as violent force, they can be redirected.
I will not elaborate on specific methods here. That would be not only irresponsible but strategically suicidal. The moment a tactic is named, it is catalogued, and the moment it is catalogued, it becomes less effective. What I can offer, without burning what works, is a confirmation that the web is not one-way. The agent who seeks trust must offer trust. The infiltrator who collects information must receive information. And in that exchange, if one is paying attention, the hunter becomes legible.
This is not theory. This is my experience in Pittsburgh.
Over those years, two individuals I considered comrades, people with whom I shared meals, organizing work, and the ordinary vulnerability of movement life, were turned. I know this now not because they confessed but because a patient, multi-layered honey pot revealed them to us. The method itself is not the story, and I wont burn the method. The story is what the method produced; a pattern. Inconsistencies in their accounts of where they had been, or how they received funding to survive. Questions that lingered too long on details no organizer needed to know. A sudden, inexplicable prosperity during periods of movement quiet, new equipment, paid travel, the kind of financial ease that does not arrive by accident. And finally, the confirmation; information fed to them in confidence, information that had no reason to travel beyond their ears, appearing later in the investigative posture of local authorities.
I now possess testimony from them, though they do not know I possess it. I have documentation of their movements, their communications, their quiet meetings with individuals whose affiliations they never disclosed, both private and public. I have the record of their lives as they lived it while pretending to live ours. And I have the knowledge, cold and finalized upon paper with evidence, that they were asked to gather information on me, and that they abided.
The betrayal is not the discovery. The betrayal is the confirmation of what suspicion already knew but could not prove. And in that confirmation lies a deeper truth; they were caught not because we are smarter, but because they assumed we were not paying attention. They assumed the tools of surveillance were theirs alone. They assumed the web spun only one way. They assumed that because they were watching us, no one was watching them.
Pittsburgh taught me otherwise. The apparatus has its blind spots. The hunters carry their own vulnerabilities. And a movement that learns to read the pattern of attention directed at it can, with patience and creativity, learn to return that attention in kind. Think of some creative ways that this can be done to yourself, and if necessary discuss it with potential comrades as related to the person who is suspicious. Not to surveil for the sake of surveillance, but to survive as organizers. Not to become the state, but to render its instruments visible, and in that visibility, to render them less useful to the bourgeoisie.
I will not say how the web was spun. That knowledge belongs to those who need it, and they will find it in the same place we did, within the realms of human creativity, through loss, through attention, through the slow accumulation of pattern recognition that comes only from having been burned and refusing to be burned again. What I will say is this, the apparatus is not omniscient. It is staffed by people with mortgages, marriages, fears, weaknesses and the same capacity for carelessness as anyone else. They leave traces. They generate records. They hold unrelated secrets that they might do anything to keep from getting out. They live lives that can be read, if one knows how to look. And sometimes, if you are patient, if you are creative, if you are willing to learn from your own near-destruction, you can catch them in the act of attempting to catch you.
"If you want to catch a rat, leave a little cheese out"
The mechanics are often more mundane than the mystique suggests. A camera positioned to observe the suspected rats interactions. The suspected informant appears in frame, engaged with someone whose face triggers a match. A biometric scan, run through publicly accessible databases, returns a name. That name leads to a profile, and that profile, more often than not, contains a biography written by the subject themselves, private security consultant, GWOT analyst, counterterrorism specialist. They document their own affiliations with the casual pride of professionals who never imagined the subjects of their attention might one day return the gaze. The response to this, long before you all saw ICE masking up was GWOT feds and analysts began blurring their faces on social media, which made tracing back to pages a bit more hard. Still generally the apparatus teaches its operatives to watch but not to consider who might be watching them, especially outside of cartels, they really assume nobody is competent or high level. They build careers on political surveillance while leaving their own lives exposed to anyone with the patience and resources to look. The web was always there. They simply assumed no one else could use it to gather info.
>>2744443The screenshots shared are not isolated captures but fragments of a much larger database of intelligence gathered systematically over years, across networks, through the patient work of paying attention when no one else would. People documented the ICE recruitment wave within far-right circles long before it became legible to the broader public. This was not speculation at all. It was observation, cross-referenced, verified, and filed away while the apparatus moved quietly beneath the surface of electoral politics. During Biden's final years in office, while public attention was fixed on the normal churn of administration and opposition, a parallel structure was being assembled. Recruitment pipelines. Funding surges. Organizational scaffolding designed to emerge, fully formed, when the political conditions of nationalist power ripened. We watched it happen. Tried to tell people. The response, more often than not, was dismissal, the kind of disbelief that assumes the state cannot prepare its auxiliaries in plain sight.
Now the story has shifted. What we knew then has become, for many, the accepted narrative of the past few years. The brownshirt force, the organized paramilitary capacity, the coordination between federal agencies and far-right formations, these are no longer the province of conspiracy theorists but the subject of mainstream reporting. But make no mistake, this was not a spontaneous emergence. It was built. It was funded. It was rehearsed. And it was happening while the last Democratic administration occupied the White House. During this period, there were frequently vague discussions of "i cannot wait" which were clearly referring to future surges post election. Here is a meme pulled from one of the feds who was interacting with a "comrade" behind our back's social media pages, some comments, and a message my lawyers PI team sent to me about a car with weird equipment that was found on security cameras down my block, that pulled up and parked any time I had a friend over, specifically the one who was acting strange. These images are a few years old.
This is kind of a sick ass thread
After discussion with the comrades, I have concluded that selective disclosure of method serves a strategic purpose. We want this tactic to spread to all who find it useful, because it will increase it's usefulness rather than hinder it. Some methods of honey potting, and counter-surveillance can genuinely be hindered by sharing. This is decidedly not one of them. We want them to know about this. We want them to carry, to every meeting they infiltrate, every organizing space they enter, the same weight of paranoia we have been forced to carry for decades. Not the details, those remain protected, but the certainty that the web spins both ways in the very same spaces they think they have infiltrated.
Years ago, intelligence reached us regarding a private Israeli investigative organization contracted to monitor far-left activity related to a specific struggle in our region. Their focus was specific, a particular axis of organizing they had been paid to map, infiltrate, and ultimately contain. We did not react with panic. We reacted with patient brainstorming. We constructed an organizing space tailored to their mandate, an "event assembly" centered on the very topic we knew they had been hired to surveil. Attendance was controlled. The crowd was small, intentional, composed entirely of comrades who understood the exercise. Discussion was no more than a glorified face to face version of a leftist reddit thread related to the subject at hand; it was kept this way purposely in order to not provide any real intel other than identifying our faces. This also worked to force them to make blatant attempts at directing conversations in a phish for information. This allowed us to build even more intel, by analyzing how they attempted to direct conversation. To any outside observer, it was exactly what it appeared to be, a discussion, a gathering, a moment of daily movement life in the sea of other events.
Hidden cameras recorded everything. Positioned by consent of all comrades involved, visible to none but us, they captured what our eyes could not hold simultaneously. And they captured it plainly; multiple individuals, attending under the guise of solidarity, raising phones at angles that had nothing to do with note-taking. The images were clear. The faces were searchable. And the searches led directly to the organization we had been warned about, their operatives, their contractors, their methods. From there, the web expanded. Who hired them. Who funded them. Who in local law enforcement received their product. Who in the business community paid for their presence. Their personal lives, their marriages, their quiet vulnerabilities all of it became legible, not because we hunted, but because they revealed themselves by reaching for information that appeared to exist in a trap we built.
Bump, and libs think you can vote the bad guys away lmao
We will share another fragment of intel before this bus arrives and takes me elsewhere. Among the profiles surfaced through our ongoing work, this one belongs to a federal agent whose digital footprint betrays a particular curiosity. Their attention gravitates toward a vaguely defined program operating in the shadows of private-sector GWOT contracting, an initiative whose full architecture remains opaque to us despite sustained efforts to fully unveil. What we have managed to piece together suggests a methodology calibrated to a very specific threshold; forms of harassment so subtle, so layered, so deniable that those subjected to them appear, to any outside observer, merely paranoid. The kind of campaign that makes its targets doubt their own perception. The kind that drives someone to say "I am being followed" and hear in response only silence, or laughter, or the gentle suggestion that perhaps they should rest. We do not yet understand the full scope of this program, its funding, its chain of command. But we have its scent. And now, so do you. Watch for patterns that seem designed to make you feel insane. That is often the point.
From what we have observed, this approach constitutes a distinct operational modality, one deployed when formal investigation fails to establish probable cause, when criminal behavior cannot be substantiated, or when the state seeks to preemptively disrupt organizing activity without triggering the legal safeguards and public scrutiny that accompany formal prosecution. It is, in essence, the application of soft neutralization; a spectrum of extra-legal interventions designed to erode capacity, sow confusion, and isolate targets through means that leave no paper trail, invite no oversight, and register in the public consciousness as nothing at all. The target experiences pressure, surveillance, harassment but can prove none of it. The state and or private actors achieves its objective without ever entering a courtroom. And the public, seeing nothing, assumes nothing happened. Some people are probably unaware that it even occurs to them.
>>2745480They ain't wrong though, the rest of the left is too busy voting or critical supporting which makes the "revolutionary socialists" agitating in social movements de facto highest tier
I've been saying for many years now that the left seriously needs to get its shit together in ways that are relevant to this thread. these days more people seem to know about opsec and infosec compared to like 2016 when no one even knew what Signal was or why you should use encrypted communications, or that you should have a threat model, but these sorts of things are only bare minimum defensive strategies. when you're playing a real high-stakes game like people in the intelligence community do, you're not just trying to make it harder for people to eavesdrop and leak information to a hostile party but actively working to expose the enemy.
one objection I have to this though is the idea that we can't talk about these things because that burns the method. security by obscurity is not real security. but at this stage when hardly anyone on the left seems to be thinking about these things, it's at least not appropriate to have these discussions somewhere public and insecure like leftypol, so I'll just say that I think on the level of affinity groups at least, more people should be thinking about how these methods can be tested, systematized, and ultimately disseminated. a good example of this in fact would be doing something like war games with your comrades.
>>2744549I've gotta say I'm not surprised to find out that literal gangstalking is a real thing because I've always suspected there was some kernel of truth to stuff like that and the Targeted Individual phenomenon but it's reassuring to know that my paranoia is entirely justified.
>>2745520The reality of a tactic is not negated by the existence of those who imagine it. Fact that some experience delusions of persecution does not erase the documented history of actual persecution. I will not pretend I understood the full scope from the beginning. I imagined this as police, local, predictable, the kind of surveillance you can spot if you pay attention. But the deeper I went, the clearer it became that police and even feds are just the visible tip of something much larger. There are fusion centers stitching together federal, state, and local intelligence. There are shadow networks of civilians, of former military and intelligence personnel who cycle through private contracting and back again. There are actors whose affiliations shift depending on who is funding them. We have not uncovered clear evidence of how the program operates as a whole, not the full architecture, not the chain of command, not the funding streams. But I have seen enough to know it exists. And what is striking is the political texture of the people involved. There are certainly far-right elements drawn to this work, and that increased drastically over the last 3 years. There are a lot of this civilian type who never shed their GWOT orientation and simply refocused it on domestic targets, within their daily lives. In this program, like there are the far right, there are also neoliberals, the kind who would never call themselves reactionaries, who staff and engage in these covert operations while sincerely believing in "diversity" and "inclusion" within society.
>>I am not going to name the city, but this is footage of me from fall 2024. That period was consumed with reconnaissance,mapping threats, building intelligence networks alongside investigative journalists and our own private teams. I was walking back from a squat that had just hosted a major potluck and Black revolution film screenings. As I left to catch my bus, a car caught my attention. Something about it felt wrong, so I engaged in counter-surveillance maneuvering. I walked around the block. The car followed. I circled again, five times. It followed. Five times around the same block, and they stayed with me the entire way. I eventually called them out and they started talking about lets find a sneaker store, when we hitting the sneaker stores, all types of weird shit. >>2745480>"it's not a bug – it's a feature."I love these retards self-lobotomizing to the point that they can't even write 100 word infographic blurbs
>>2745520could this be related in any way?
https://www.newsweek.com/exclusive-inside-militarys-secret-undercover-army-1591881>>2745825looks like they were even paranoid about their camouflaged arm being caught hanging out the window on camera. pretty dark tints too.
>>2745513>>one objection I have to this though is the idea that we can't talk about these things because that burns the method. security by obscurity is not real security. Most security measures should be open to all. Opacity for its own sake is just paranoia, and paranoia isolates. But a honeypot built in the complex way I'm thinking of is different. A honeypot is essentially a scam. Instead of financial extraction, it is extraction of intelligence and surveillance. The target walks in thinking they are gathering information, and the whole time they are the one being gathered. And like any scam, certain methods burn the moment they are made public. Scammers know this instinctively; once the scheme is described in detail, it begins to lose effectiveness; this isn't the case for every scam, and it isn't the case for every honeypot method as mentioned in
>>2744505 Eventually the mark learns to recognize the trap. The same principle applies here. We are running a long game against an apparatus with unlimited resources but limited imagination. They assume we are always the prey. They assume surveillance flows one way. Every method we keep quiet is a method that keeps working. The method I will not disclose is one that is currently deployed against the 2 informants I mentioned in the OP, considering they suddenly reappeared in a new city, with our time in Pittsburgh years behind us, it was necessary to redeploy the honey pot to gather intel. Every informant walking into those webs will learn, eventually, that the trap was always meant for them, but we are not in the business of accelerating that. The longer they linger without knowledge, the more intel they readily feed our most in depth recon teams.
>>This is a meme shared by a private Israeli analyst who followed one of our comrades into a supermarket two years ago. What the analyst did not know was that the trip to the supermarket was not errand but invitation. The comrade went in specifically after being followed, to draw attention, to give the analyst something to engage. While the analyst was focused on capturing images of the target, someone else was capturing images of them. That photograph, run through Pimeyes, returned a name. That name led to social media. That social media revealed affiliations, methods, and the full architecture of who they were working for. The hunter walked in believing they were documenting the hunted. They walked out documented themselves. >>2745825Holy batman, lay off the meth pipe already. You need to get some real help, bro. Nobody was tailing you in that video. Some masked dude clearly having a full on psychotic break made those people roll their windows down to check if YOU were the one about to go full psycho on em. You have cracked hard, man. Years of this mental-illness hidden in revolutionary cosplay and you're still this far gone without maturing? it's dangerous and it's embarrassing and sooner or later youll be right back where you were.
You’re out here paranoid that somebody was watching you THEN in 2024, when you never even noticed that we had eyes on your whole pathetic little road-trip DC → Baltimore → NYC → Oakland. Shadowed you the entire way. Snapped a clean pic of your dumb ass too, like we cant see past the mask. right in frame, zero awareness. Amateur hour shit but you mislead people here like you're some hot deep covert shit. You're just black houdini sleeping in shitting motels around the country awaiting eventual arrest. Sleep tight, genius.
sp00ky
>>2751318You can talk to our lawyers you sick freak. I'm not going to even refute anything, because this is weird behavior.
So is ICE I'm airports specifically to intimidate TSA into doing their job? They're not doing anything but standing around and arresting one woman in San Francisco.
>>2753404What we are witnessing is not a series of isolated provocations but a coordinated stress‑test, a deliberate probing of movement capacities, surveillance responses, and legal boundaries. Those behind it are dipping toes into waters they intend to fully occupy. The endgame is the construction of a paramilitary apparatus, a reactionary police force explicitly designed to operate outside the norms of civilian oversight, deployed against domestic adversaries under the guise of a return to old order. This force does not derive solely from the Trump administration; it is the culmination of long‑standing efforts by the most shadowed corridors of the intelligence and police community networks that have been building such capacity across administrations, quietly seeding the infrastructure for a direct‑action wing of the reactionary security state. The continuity runs deeper than any presidency, and its final form will be paramilitary in practice.
https://www.borderreport.com/news/bannon-says-ice-at-airports-test-run-for-2026-elections/ Unique IPs: 8