[ home / rules / faq / search ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM / ufo ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]

/leftypol/ - Leftist Politically Incorrect

"The anons of the past have only shitposted on the Internet about the world, in various ways. The point, however, is to change it."
Name
Options
Subject
Comment
Flag
File
Embed
Password(For file deletion.)

Check out our new store at shop.leftypol.org!


File: 1773819275680.jpg (125.49 KB, 2560x1440, csteambby.jpg)

 

The apparatus of surveillance operates on a fundamental asymmetry, and in the USA they seem to assume the tools of surveillance, infiltration, and deception are theirs alone to wield. This assumption is itself a vulnerability, a blind spot carved by decades of impunity. The honey pot, the web of trust, the slow cultivation of access, these are not technologies proprietary to the state and private GWOT actors. They are social dynamics, and like the other social dynamics of repression such as violent force, they can be redirected.

I will not elaborate on specific methods here. That would be not only irresponsible but strategically suicidal. The moment a tactic is named, it is catalogued, and the moment it is catalogued, it becomes less effective. What I can offer, without burning what works, is a confirmation that the web is not one-way. The agent who seeks trust must offer trust. The infiltrator who collects information must receive information. And in that exchange, if one is paying attention, the hunter becomes legible.

This is not theory. This is my experience in Pittsburgh.

Over those years, two individuals I considered comrades, people with whom I shared meals, organizing work, and the ordinary vulnerability of movement life, were turned. I know this now not because they confessed but because a patient, multi-layered honey pot revealed them to us. The method itself is not the story, and I wont burn the method. The story is what the method produced; a pattern. Inconsistencies in their accounts of where they had been, or how they received funding to survive. Questions that lingered too long on details no organizer needed to know. A sudden, inexplicable prosperity during periods of movement quiet, new equipment, paid travel, the kind of financial ease that does not arrive by accident. And finally, the confirmation; information fed to them in confidence, information that had no reason to travel beyond their ears, appearing later in the investigative posture of local authorities.

I now possess testimony from them, though they do not know I possess it. I have documentation of their movements, their communications, their quiet meetings with individuals whose affiliations they never disclosed, both private and public. I have the record of their lives as they lived it while pretending to live ours. And I have the knowledge, cold and finalized upon paper with evidence, that they were asked to gather information on me, and that they abided.

The betrayal is not the discovery. The betrayal is the confirmation of what suspicion already knew but could not prove. And in that confirmation lies a deeper truth; they were caught not because we are smarter, but because they assumed we were not paying attention. They assumed the tools of surveillance were theirs alone. They assumed the web spun only one way. They assumed that because they were watching us, no one was watching them.

Pittsburgh taught me otherwise. The apparatus has its blind spots. The hunters carry their own vulnerabilities. And a movement that learns to read the pattern of attention directed at it can, with patience and creativity, learn to return that attention in kind. Think of some creative ways that this can be done to yourself, and if necessary discuss it with potential comrades as related to the person who is suspicious. Not to surveil for the sake of surveillance, but to survive as organizers. Not to become the state, but to render its instruments visible, and in that visibility, to render them less useful to the bourgeoisie.

I will not say how the web was spun. That knowledge belongs to those who need it, and they will find it in the same place we did, within the realms of human creativity, through loss, through attention, through the slow accumulation of pattern recognition that comes only from having been burned and refusing to be burned again. What I will say is this, the apparatus is not omniscient. It is staffed by people with mortgages, marriages, fears, weaknesses and the same capacity for carelessness as anyone else. They leave traces. They generate records. They hold unrelated secrets that they might do anything to keep from getting out. They live lives that can be read, if one knows how to look. And sometimes, if you are patient, if you are creative, if you are willing to learn from your own near-destruction, you can catch them in the act of attempting to catch you.

File: 1773822496540-0.png (424.03 KB, 497x603, itsighttho.png)

File: 1773822496540-1.png (32.13 KB, 275x161, itsoktho.png)

"If you want to catch a rat, leave a little cheese out"

The mechanics are often more mundane than the mystique suggests. A camera positioned to observe the suspected rats interactions. The suspected informant appears in frame, engaged with someone whose face triggers a match. A biometric scan, run through publicly accessible databases, returns a name. That name leads to a profile, and that profile, more often than not, contains a biography written by the subject themselves, private security consultant, GWOT analyst, counterterrorism specialist. They document their own affiliations with the casual pride of professionals who never imagined the subjects of their attention might one day return the gaze. The response to this, long before you all saw ICE masking up was GWOT feds and analysts began blurring their faces on social media, which made tracing back to pages a bit more hard. Still generally the apparatus teaches its operatives to watch but not to consider who might be watching them, especially outside of cartels, they really assume nobody is competent or high level. They build careers on political surveillance while leaving their own lives exposed to anyone with the patience and resources to look. The web was always there. They simply assumed no one else could use it to gather info.

File: 1773825406994-0.png (560.26 KB, 582x603, okcoolio.png)

File: 1773825406994-1.png (129.48 KB, 1054x232, chilldaddy.png)

File: 1773825406994-2.png (308.5 KB, 882x592, okokshite.png)

>>2744443

The screenshots shared are not isolated captures but fragments of a much larger database of intelligence gathered systematically over years, across networks, through the patient work of paying attention when no one else would. People documented the ICE recruitment wave within far-right circles long before it became legible to the broader public. This was not speculation at all. It was observation, cross-referenced, verified, and filed away while the apparatus moved quietly beneath the surface of electoral politics. During Biden's final years in office, while public attention was fixed on the normal churn of administration and opposition, a parallel structure was being assembled. Recruitment pipelines. Funding surges. Organizational scaffolding designed to emerge, fully formed, when the political conditions of nationalist power ripened. We watched it happen. Tried to tell people. The response, more often than not, was dismissal, the kind of disbelief that assumes the state cannot prepare its auxiliaries in plain sight.

Now the story has shifted. What we knew then has become, for many, the accepted narrative of the past few years. The brownshirt force, the organized paramilitary capacity, the coordination between federal agencies and far-right formations, these are no longer the province of conspiracy theorists but the subject of mainstream reporting. But make no mistake, this was not a spontaneous emergence. It was built. It was funded. It was rehearsed. And it was happening while the last Democratic administration occupied the White House. During this period, there were frequently vague discussions of "i cannot wait" which were clearly referring to future surges post election. Here is a meme pulled from one of the feds who was interacting with a "comrade" behind our back's social media pages, some comments, and a message my lawyers PI team sent to me about a car with weird equipment that was found on security cameras down my block, that pulled up and parked any time I had a friend over, specifically the one who was acting strange. These images are a few years old.

This is kind of a sick ass thread

File: 1773832080989.png (95.86 KB, 1261x1260, honeypotter.png)

After discussion with the comrades, I have concluded that selective disclosure of method serves a strategic purpose. We want this tactic to spread to all who find it useful, because it will increase it's usefulness rather than hinder it. Some methods of honey potting, and counter-surveillance can genuinely be hindered by sharing. This is decidedly not one of them. We want them to know about this. We want them to carry, to every meeting they infiltrate, every organizing space they enter, the same weight of paranoia we have been forced to carry for decades. Not the details, those remain protected, but the certainty that the web spins both ways in the very same spaces they think they have infiltrated.

Years ago, intelligence reached us regarding a private Israeli investigative organization contracted to monitor far-left activity related to a specific struggle in our region. Their focus was specific, a particular axis of organizing they had been paid to map, infiltrate, and ultimately contain. We did not react with panic. We reacted with patient brainstorming. We constructed an organizing space tailored to their mandate, an "event assembly" centered on the very topic we knew they had been hired to surveil. Attendance was controlled. The crowd was small, intentional, composed entirely of comrades who understood the exercise. Discussion was no more than a glorified face to face version of a leftist reddit thread related to the subject at hand; it was kept this way purposely in order to not provide any real intel other than identifying our faces. This also worked to force them to make blatant attempts at directing conversations in a phish for information. This allowed us to build even more intel, by analyzing how they attempted to direct conversation. To any outside observer, it was exactly what it appeared to be, a discussion, a gathering, a moment of daily movement life in the sea of other events.

Hidden cameras recorded everything. Positioned by consent of all comrades involved, visible to none but us, they captured what our eyes could not hold simultaneously. And they captured it plainly; multiple individuals, attending under the guise of solidarity, raising phones at angles that had nothing to do with note-taking. The images were clear. The faces were searchable. And the searches led directly to the organization we had been warned about, their operatives, their contractors, their methods. From there, the web expanded. Who hired them. Who funded them. Who in local law enforcement received their product. Who in the business community paid for their presence. Their personal lives, their marriages, their quiet vulnerabilities all of it became legible, not because we hunted, but because they revealed themselves by reaching for information that appeared to exist in a trap we built.

Bump, and libs think you can vote the bad guys away lmao


Unique IPs: 3

[Return][Go to top] [Catalog] | [Home][Post a Reply]
Delete Post [ ]
[ home / rules / faq / search ] [ overboard / sfw / alt ] [ leftypol / edu / labor / siberia / lgbt / latam / hobby / tech / games / anime / music / draw / AKM / ufo ] [ meta ] [ wiki / shop / tv / tiktok / twitter / patreon ] [ GET / ref / marx / booru ]