Category Archives: Technology

Liaizon Wakest on Autonomous Social Media and the Fediverse

Liaizon Wakest on Autonomous Social Media and the Fediverse

proposed vediverse logo of multicolor pentagon/pentagram with logos for 6 different fediverse projects around it
Download This Episode

This week, we spoke with Liaizon Wakest. Liaizon grew up in an anarchist commune in rural America. They can be found climbing into dumpsters from Mexico to Kazakhstan looking for trash to make art with. In recent years they have been focused on research into ethical technology and infrastructural anarchism. For the hour we speak about the interoperable, open source ensemble of federated online publishing servers and platforms known as the Fediverse and its most popular component, Mastodon. This conversation takes place in the context of media hullabaloo about Elon Musk seeking to purchase Twitter, the paradigm in which a rich egomaniac can own the addictive social media platforms over which so much social and political life is engaged and what positives we can draw from alternatives like Mastodon and the Fediverse.

  • Transcript
  • PDF (Unimposed) – pending
  • Zine (Imposed PDF) – pending

You can find Liaizon’s account on Mastodon (an analog of twitter) at @liaizon@social.wake.st or on Pixelfed (an analog of Instagram) at @wakest@pixelfed.social. And you can follow us on Mastodon by finding @TheFinalStrawRadio@Chaos.Social or by visiting https://chaos.social/@TheFinalStrawRadio in a web browser.

Another interesting anarchist media project engaging the Fediverse is Kolektiva, which has a PeerTube instance at https://Kolektiva.Media (analog of youtube) and Mastodon at https://Kolektiva.Social where they’re welcoming new users. Kolektiva includes participation from projects like Sub.Media and AntiMidia

You can find a real good interview by our comrades at From Embers about Mastodon which I mention in the interview from February 3rd, 2022 entitled Social Networks, Online Life and The Fediverse: https://fromembers.libsyn.com/social-networks-online-life-and-the-fediverse

Announcement

Eric King Arrives at USP Lee: call-in continues

As a quick update on the situation of Eric King, he has been transferred this week from USP Atlanta to USP Lee where he and his supporters are concerned he’ll be placed into solitary and isolated for attack. You can find info on his situation as well as who to contact to press for his return to a medium security facility to match his current security points, visit SupportEricKing.Org and find the May 3rd, 2022 post whose title starts “Eric Transferred

. … . ..

Featured Track

. … . ..

Transcription

Liaizon: My name is Liaizon Wakest. I’m involved in too many projects, I don’t even know where to start in that space. But, I am from a commune in Wisconsin that I grew up on and was there for the first large part of my life. So, I’m a second-generation freak. The commune I grew up at was involved in a lot of— Our two main points were hypermedia and permaculture: the convergence of plant stuff and weird tech stuff, and thinking of life as performance art. I currently live in New Orleans. I’ve been out here for about eight years now. I’m currently working on building a treehouse, which is a very different type of thing than doing weird anarcho-tech stuff.

TFSR: What do you or the commune mean by hypermedia?

L: The H from HTML also is hyper. So… hypermedia was an early term that fell out of vogue in the 90s. But it’s the idea that you break down all the walls between different types of creation. All art forms and all creation are one in the world of— When you start integrating new technologies that enable new types of creation, those walls start breaking down, and you can just think of life as art and life as creation. But especially hypertext and the idea of hypertext and of the internet came from some of the same rhetoric in the sense of breaking down the linearity of the different types of media.

TFSR: I guess, it means more than text in some ways, right? Because suddenly you can embed links to other texts and go down this weird rabbit hole that you wouldn’t have been able to with a necessarily linear published pamphlet or book.

L: In the sense of hypertext, but then in hypermedia, it’s everything. It’s audio and video and interactive stuff, and a noise show. It’s the term that is meant to embrace all creation.

TFSR: We were going to speak about anarchistic tech stuff. I guess social media is what I was hoping to speak with you about.

Recently, a big thing in the news — and we’ve been talking about having this conversation well before this hit the news — but this is just one specific set of ripples in the pond… Elon Musk is talking about purchasing, getting control over, and going private with Twitter. There’s a lot there: we can talk about the role that non-legacy media and, in particular, social media plays in the political landscape, in terms of government surveillance, corporate surveillance… In terms of the way that government functioned in the last administration, quite literally, where presidential edicts were coming down via Twitter posts.

A thing that the media does is to focus on an individual like Musk and all the companies that he’s owned, are the statements that he makes in the media or on social media, or whatever. And that becomes a story. The story that I want to get at and I’d love to hear your comments on is more about the fact that someone can decide to take this thing that has such big political consequences, insert their ego into it and control what happens in it in a way that’s consequential to politics and sociality in our society. I wonder if you have any comments about the implications of that.

L: I have lots of thoughts on the matter for sure. I think that in the long run, this will probably be a good thing because it puts more of a spotlight on how weak this system is that we have, the system of all of the news sources and mainstream media sources and social media, and these internet companies, all being these trading blocks between a handful of billionaires. And the more people realize how messed up that is, maybe the more visibility the alternative ways of organizing this stuff can have.

After this happened, we’ve gotten about almost 200,000 new people signing up on the Fediverse in the last week, from people being “Oh, fuck, no, I don’t want to be a pawn in Musk’s game, I need to find an alternative.” It seems anytime something this happens, it pushes more people to look for alternative infrastructure. And in a lot of ways, whether Twitter is owned by a bunch of venture capitalists, stakeholder companies, or some billionaires, it’s still a giant ad machine either way, and there are still a few people who have all the power. In the long run, I don’t think that Elon theoretically owning it really makes that much difference. Though, I guess that might be a little bit of the accelerationist take or something. It’s okay for something to get slightly worse if it pushes the future probabilities closer to actualization or something.

TFSR: I definitely want to get into a bit about what the Fediverse is, and what are its some of its constituents. Can you talk a little bit — before we go into the specifics of that — of what benefits do you think people are going to see crossing over to the Fediverse, for instance, over what they would be experiencing on Facebook or on Instagram or on Twitter?

L: There are a lot of different angles to go at it to answer that question. The Fediverse is a lot of things. It’s not one platform. So all of the other options or examples that you just laid out, other than the Fediverse, are companies owned by shareholders. Those companies decide exactly what happens and how it works and what it looks like and who’s invited and have complete technical control over how their network functions and what kind of activities can happen on it, how those things work, and how to collect money, how to exploit the people who are using it, etc.

If you’re familiar with the Fediverse at all, you’re familiar with Mastodon, which is the biggest piece of software that is a part of the Fediverse. But the Fediverse is much more than just that. Mastodon was made as an alternative to Twitter using an already existing protocol that has actually been around for about 13 years in various forms under various names. The Fediverse actually started about 13 years ago. And it originally started as an alternative to a very early Twitter, 13 years ago, Twitter was a very different thing than it is today. But there was an explosion of this idea of microblogging and Twitter was not the only one to do that. There were a bunch of projects and companies and people who realized that one of the stumbling blocks of blogging, which at the time was one of the biggest parts of the internet was that, it’s so structured that people— there’s this stumbling block in finishing something before you publish it. By removing the assumption that you need to publish articles, as opposed to snippets and thoughts and little blobs, you remove this thing to be scared by, which enables a lot more activity and a lot of different interactions that weren’t intended in the blogging space when people were designing blogging software.

So, the Fediverse, in its current state, is many, many different pieces of software that all use a common protocol which is called ActivityPub. It basically just lays out how messages and data are shared between distinct servers. The Fediverse is made up of about 6,000 servers right now, all run by different individuals around the world, and all with their own codes of conduct, policies, ideologies, and politics. And all of those servers have the ability, through this protocol called ActivityPub to talk to each other. And all of the types of interactions that you would expect in social media can be related in a standard way that any developer can then implement in whatever code and stack that they want to use to be able to share the standard way of communicating packets of data between servers.

Mastodon is the biggest one, or the biggest piece of software that is being used, but there are many, many other different pieces of software that are also part of the Fediverse and are also using the same standard. There’s PeerTube, which is probably the second biggest, for video sharing, as a project specifically to combat YouTube. It’s also anarcho infrastructure-minded in its formulation. All of the Fediverse is open source and there are almost no companies involved in the Fediverse. Now there are a few little ones that people have started to support themselves working on it full-time. But in general, it’s almost all individuals working on it out of passion and care for the future of communication. There’s one called WriteFreely, which is for more long-form blogging. There’s a new one that started pretty recently called BookWyrm for logging and sharing what you’re reading and updates about— Like GoodReads or LibraryThing.

But it’s also federated. I guess I should explain what Federation is. All of the Fediverse and the Fedi part of Fediverse (federated universe) is a federated network. The analogy that most people use and are familiar with is email as a federated network design. Any email address can email any other email address, and the servers don’t need to first know about each other. In an email, anyone can start a new server, like fluffycats@mouse.net. And that can, by default, using the protocol of email, send a message to any other already existing email account in the world. People don’t even really think about that inherent difference between email and modern social media. The mainstream social media today is everyone existing on one server. Twitter is just one gigantic computer that is sharing messages on itself. Whereas email is millions of computers that have pads between them and can share messages using a federated protocol, which in the case of the email is SMTP. The Fediverse is basically that same model but updated for the kinds of interactions that we expect in modern social media. Things like liking and replying and boosting and sharing and following — are all activities that one would expect in the case of social media, but everyone has grown up accustomed to— If you’re on Instagram, you can only follow other people on Instagram, whereas on the Fediverse, you can follow anyone using any different kind of platform and the data gets into your local stream of whatever you’re using.

TFSR: I guess there’s one potential benefit to draw out of that, because of the federated model there and anyone being able to start a server if they have the resources available to them, that leads to the creation of a lot of different potential spaces where it’s allowable to have certain kinds of speech that maybe you would be excluded from Twitter or Instagram or Facebook for. So to continue as we do with the example of anarchists, anarchists can talk about radical alternatives to the state, attacks that occur against infrastructure, or prison breaks without a fear that they’re going to get shut down directly necessarily by the host of their specific platform on the Fediverse. Unless it counters the terms of service that are agreed to or the social contract or whatever that thing is. That can be a positive, right?

L: On the Fediverse, you can host everything yourself. So if you’re running an anarchist instance, and you want to host 100% of your instance, you can get a used server for $100 on Craigslist and plug it into the wall in a basement and run a Fediverse server with 1,000 people on it, with really not that much. It’s definitely working. But it’s not that complicated. And there’s a lot of people who are actually able and willing and currently doing things like that, which hasn’t been possible in previous times for what we expect. It’s been possible in the sense of collectives running email or chat servers in the past, but this is a new leaf in that ability because you could have a very public presence and a very interactive presence through infrastructure that you entirely manage yourself if you do have— There’s definitely technical know-how, but there are enough people around who do have that know-how and the excitement to do that. There’s an anarchist collective in Italy, I can’t think of their name off the top of my head right now.

TFSR: Autistici, who hosts Noblogs?

L: They’re connected, but that’s not who I was thinking of. But they run a bunch of Fediverse stuff out of a squat, using all found and collected infrastructure. They probably have about 1,000 people using their server. It’s not just an analogy, the ability to do that is currently there.

TFSR: That’s definitely a positive— If that is something that you are seeking is to have the ability to have a space that is dedicated to the kind of interactions that you want to have, you can run it yourself, and you can look at the code or have someone you trust, hopefully, running the code and keeping up on it. But then also, there’s another side to a benefit that someone as a user could have of being one of these because it’s open-source, you basically know the information that’s being collected about the users, and there’s a lot more transparency than there would be, and it’s easier to find out, than, for instance, with Twitter or with Instagram or with Facebook. And with that data being collected, it seems easier to release information that people had the presumption of being private or didn’t even know that was being collected about them when those companies get hacked, or if they sell that data to someone else. Is that a fear that people engaging with the Fediverse should have about their data if they’re starting accounts on things like Mastodon, or is it just a thing that they’ll be more aware of because there’s no profit motive there?

L: That’s a whole discussion in itself. The Fediverse is mostly public, with people posting stuff publicly. There are different modes you can post, there are private messages and there are limited visibility messages. But in general, data collection on a large scale— If we’re using advanced encryption, your data is probably getting collected, nonetheless, somewhere down the pipeline, whether or not it’s in a format that’s usable by anyone. A lot of it just gets hoarded. But I think if something is publicly visible on the internet, someone’s collecting it, no matter what. So the Fediverse is very different than something like Signal in the sense that most of the stuff on the Fediverse is people talking to each other publicly. Though it doesn’t intrinsically need to be that, and there’s a bunch of people working on building advanced encryption into the Fediverse right now, but that has been somewhat of an afterthought and something very difficult to tack on later, because the Fediverse was entirely designed around public-facing content, and the security privacy part of it came later. But thinking about what you mean when you say security and privacy, the ability to control that your data is available is a separate issue, and control who can silence you and who can limit your visibility. They’re very connected topics to privacy and security, but they’re not the first things that people think about.

TFSR: Another thing that I could see as being a benefit to something that is parallel or autonomous infrastructure like the Fediverse is that these privately held social media corporations have designed algorithms for the way that people interact with their platforms that are meant to draw people and keep people, not just based on them wanting to read the content or look at the picture in and of itself, but increasing…

L: Making it addictive…

TFSR: Yeah. Refresh rates or populating certain kinds of content at different times. Is that a thing that people could expect to engage with at this point in Fediverse platforms?

L: Right now, on the Fediverse, there is no sorting whatsoever, and no algorithmic decision-making of what you see. Everything is chronological. Every different piece of software on the Fediverse is currently chronological. Mastodon just launched an Explore tab, which uses some ranking of popularity of posts in a specific timeframe. But, I think, each individual server that’s running the software gets to decide how their posts are being ranked, or whether to turn that on locally. And the algorithm, everything is open source, so you can see exactly what those ranking algorithms would be doing. That’s just a way of discovering content because in the Fediverse, when nothing is being pushed at you when you sign up for an account, you basically start fresh and everything is blank. It’s not like “Here, follow Elon Musk”. Fucking Twitter, even today, I get a notification, if I open Twitter on an account, like “Would you like to follow Elon Musk?” I’ve had the same account reminded five times if I want to follow. It’s really bizarre.

TFSR: It’s like Tom from MySpace.

L: Yeah, it’s just a popularity game, if someone’s getting a lot of interaction, then the system just keeps pushing that. That kind of interaction isn’t on the Fediverse at all now, but there are some very valid reasons for some algorithmic sorting of posts that you want to see, in the sense that if you’re following a lot of people, it gets overwhelming very fast. And your ability to look at everything becomes less and less, the more stuff you’re trying to consume. Eventually, there will be the need and the willingness to build in some mechanisms for that in the Fediverse. And the main difference being that it will be entirely open and customizable by the person who’s getting that. Probably in a couple years, we’ll start to see that thing happening in the Fediverse. And the conversations that I’ve seen people have are as long as it’s entirely opt-in, and you get to know exactly what those algorithms are doing and decide which ones you want to use, and you’re able to turn them on and off personally. That changes most of the negative dynamic around it.

TFSR: You had mentioned that these protocols are interoperable between different platforms and instances in the Fediverse, different servers that are running and have their own guidelines. I wonder if you have thoughts about how tools get used in unintended ways. That’s a part of hacking, playing with the thing, trying to break it in different ways or make it do things you didn’t expect it to do. But then open source and free software, for instance, also gets used… After Gab, I might be wrong, but there was some far-right platform that was taken, Cloudflare stopped protecting-

L: You’re talking about the Gab situation? This story got so over-reported that I’m somewhat bored by it, but I can give a quick synopsis. Gab being the first big far-right social media platform, they got a bunch of investment money early on, millions of dollars, they did a very shitty job of building a modern social media website. They built it with a lot of assumptions that turned out to not be true.

When it started getting a lot of attraction, early on, there were rumors that Trump was gonna move there and there was a bunch of prominent far-right figureheads, who were over there going on about some racist bullshit or something. The main thing is first they got kicked off of their main hosting, and they were able to move on to alternative hosting. But their app was kicked off of the Apple App Store and the Google Play Store and that put a new media spotlight on them. They started growing more because they were getting silenced by “big tech” with its “Californian neoliberal stance.” So what they did, which was an interesting move, was they basically scrapped all of the platform that they had built ready and had spent over a million dollars on and took a software that is open-source and free to use… They took Mastodon, forked it and rebranded it, and just launched their own Mastodon instance on their original domain and imported all of the old user accounts from their previous software as new users into their Mastodon instance. But they did a lot of things wrong, and that didn’t work very well.

Mastodon is made entirely by leftist and anarchists and queer and trans people and people on that side of the political spectrum. So the developers working on Gab, who took Mastodon and tried to change it into their own thing, basically just got squirted at every attempt by most of the people working on Mastodon. They didn’t really succeed in utilizing that base very well. The reasons for doing that were quickly squirted because the vast majority of other servers on the Fediverse just instantly blocked and muted and restricted any interaction between Gab and the rest of the Fediverse. Each server gets to decide that and of course, there are some servers on the Fediverse who are also run by other far-right folks and trolls, and people who just like shitty content. There were a couple pools of servers that were continuing to federate with them, but they ended up not that long after changing their mind again, and they’re [the far right] actually still running a strange fork of Mastodon with some of the original Mastodon code, but they turned off all federation and are not part of the Fediverse at all now.

TFSR: A little white ethnostate on the internet.

Even if over overblown in the media, I think it’s interesting though that there are baked into these opportunities for not just having to have whatever come across your way, because of the interoperability of the servers with each other, that there are ways to decide to block content from certain directions. Because if it is free and open-source and anyone can participate in it, there’s also the right to not have to engage with certain types of content. So the fact that it is technically interoperable between that Nazi server and Kolektiva or something that, the fact that they can burn that bridge between them and say, “You go play over there by yourself, you’ve got your own sandbox, you do that,” I think that says a lot about the potentials of the platform. You don’t necessarily have to deal with— If you want to run an instance that specifically follows Juche [ideology] or something that, you can do that. And when enough users on another instance find that obnoxious enough that they talk to the mods there. They can say, “Can you just stop them from being able to interact with us from that instance?”

L: Yep, so for instance, the Fediverse is built in a very modular way, so there are lots of different levels of different types of walls you can put up between different instances and individuals. There’s every different type of wall. So on an individual level, you can block any other account, or you can block a server from interacting with you. And then on a server level, each server gets to decide on… you can exist on the allow-list or deny-list model. So you can say, “by default, I talk to everyone,” or “By default, I only talk to these servers, and then I need to add who I talk to later on.” Or you can say, “I’m open to everyone.” And then if some server has too many bad actors on it, you can silence that server, which is slightly different than blocking, it basically says, “None of the content from that remote server shows up publicly unless explicitly requested or explicitly shared.” There’s a lot more depth and dynamic-ness in the types of interactions possible, and I feel it’s a lot closer to human interaction in physical space than what we’re used to in the “everyone’s in the same mall under the same mall rules” of the Facebooks and Twitters of the world.

TFSR: I wonder if you could speak about how autonomous infrastructure can actually be, like you’ve mentioned squats in Italy that are hosting instances and connected to Noblogs, or I know of a radio station, comrades of ours in Athens that have a squatted radio station that’s been running for two decades and stealing, sorry, re-socializing electricity. (They’re very particular about that) That is so autonomous. When you’re you’re not paying the state regulators for the electricity that you’re using and you don’t own the building that you’re in, you’re taking it from a public institution. And the airwaves, literally it is a pirate station. There’re limitations in different places around the legality of that activity. In Berlin, friends of ours have told stories about how you can’t really operate a pirate radio station for very long without a bunch of police coming in with guns drawn and raiding the space to take the transmitter.

L: Yeah, and there are still lots of pirate radio stations that keep popping up in Berlin even despite that…

TFSR: So I wonder, with the way that web hosting works, when we talked about the moment of Gab being forced to be withdrawn from these different platforms that allowed them to pass their information along, including infrastructure like CloudFlare, for instance, stopping DDoS attacks… How autonomous can these instances actually be? Is that a useful question?

L: I think, in something like what Gab was trying to do, they were trying to build a large platform-size— They were basically trying to use decentralized infrastructure to build a centralized place on top of it. One of the interesting things about the Fediverse is you can build a server. For instance, I run a server that’s just for me, and I’m the only user on that server, I make my own code of conduct every time I write something in my head because it’s just me deciding what I think is appropriate and morally righteous. No other admin is deciding what I can say, though everyone following me gets to decide whether they want to interact with me and my server or not. That ability, someone using the same software can then make one for themselves, and also invite all of their friends and have one that has 10 people on it, or 100 people or 1,000 people. I think the biggest server on the Fediverse has 700,000 people on it, it’s one out of Japan, pawoo.net that’s been around for a really long time. And actually, it’s all in Japanese, so it almost exists like a tiny centralized platform, because its users are all writing in Japanese. And it’s the biggest congregation of Japanese users on the Fediverse. Most of the rest of the Fediverse doesn’t speak Japanese. So they’re mostly just talking with themselves. But every now and then, I’ll make a post that suddenly blows up on Pawoo and has hundreds of Japanese people talking about it. And that post exists over in that world openly. So there are a lot of very interesting dynamics that exist in this space that just have never been really explored before. And there are a lot of things to try and to experiment with.

TFSR: Do you feel like Mastodon or are these alternative parallel— There are lots of reasons that people would choose to come on to these other social media environments, maybe because they don’t like what’s going on in the other ones, maybe because of the open-source arguments, or what kind of data is getting collected, or what kind of stuff’s getting shoved in their face from the platform, like how many times can you be asked if you want to follow Elon Musk. But does shifting over to these platforms create a silo-ing effect or is there a danger there where we just go into an environment where we’re just hearing from people that are similar to ourselves, and not really getting in touch with newer ideas from that. Because I know that we, for instance… I don’t like going on Facebook, I’ll do a post on Facebook every week that we have an episode for the show and hope that someone will find the content and then start engaging with it on their own separately, but it seems like an opportunity for overlap where people are going to first try the things that are most available to them and then maybe explore out from there.

L: I want to say that that silo-ing is happening already, everywhere. If you have an Instagram account, and you’re posting your events to your Instagram account, if you’re posting punk shows to a small Instagram account, Instagram will limit the fuck out of you. And you’re not actually getting this global audience that you think you are unless you pay to promote each post that you make at this point. You have the potential to have your posts go viral randomly if the right person interacts with them. But in general, anyone who’s not trying to be a social media influencer doesn’t actually have that much visibility and is by default silo-ed to just the people who have explicitly gone out of their way to find them on mainstream social media. In this new dynamic, in the Fediverse, people are explicitly finding you, or finding you through a chain of friends posting something, or friends of friends posting something in this natural way, as opposed to the algorithmic boosting of content that you can play with in the Instagrams and Twitters of the world.

TFSR: One instance or one punk show made me think of the conversation that happened on From Embers a couple of months ago, which is another podcast that I listen to, and that are friends in the Channel Zero Network. And the person that was the guest hosts an instance for their small anarchist and punk community in the city that they live in. And the way that they explained what they were expecting to get out of it as in they create this instance, a server, they allow friends that they know to sign up to it, they assume that all the interactions are going to be transparent to the rest of the internet. But as you said, with an Instagram post about a punk show, you may get to some of the people that are on Instagram and that are in your community or whatever. But there’s suddenly this microblog opportunity for anyone on the internet to just say, “I’m in X city, I wonder what punk stuff is going on, I’m going to find this publicly available RSS feed coming off of that instance that says when the upcoming punk shows that they want everyone to know about is.” Approaching it in this way makes a lot of sense in some ways. It’s also kind of weird — we’ve gone back to the time when people just ran websites for their scenes, going through the eye of the needle and back through the other side.

L: Yeah, that’s a great way of looking at the Fediverse. It’s a self-hosted indie website, but with the dynamics that we expect in the modern space of more levels of interaction.

TFSR: It seems that’s the thing that a lot of blogging sites have always had is this element of it’s not just about you as the poster, but there are ways to interact with other posters on that same platform. Like with Noblogs, we can chat with or follow or friend other people, we can send private messages through encrypted email through the servers to another user that uses that same email. But it’s not a thing I ever think to use. But I think because Mastodon is such a flashy and friendly and welcoming platform, it makes me feel like “Oh, yeah, I’ll interact with this, it’s Instagram or it’s Twitter or whatever else. I can message people, I can private message people, whatever else.” It’s pretty cool.

So with this surge of new users to Mastodon that you mentioned and that’s been written about — PC Mag has a big article about it with Musk’s announcement of purchasing Twitter shares — this seems to happen actually, frequently, when major corporate platforms are involved in the news cycle. Like when CrimethInc and ItsGoingDown were kicked off of Facebook a few years back as alongside a lot of other anti-fascist sites, a bunch of people migrated to some degree over to Mastodon or to other social media. But in a lot of these cases, people will be there and then they’ll cycle back. They’ll put their account on hibernate for a little bit, try the other thing, and then when it doesn’t hit the same part of their brain, they may move back. Do you have any ideas about what may be some keys to keeping people wanting to stay with this alternative?

L: Honestly, I think a lot of that is there are no addiction mechanisms built-in to keep you. You log in and maybe everyone’s just talking about what they ate for breakfast, and there’s no exciting drama that is being shoved in your face and you’re like, “Oh, this is boring, everyone’s just talking about eggs right now.” Drama and news and horror are really addictive. There’s an intrinsic reason right there why people go back to this thing that they hate because it has, as these mechanisms built-in, that keep them hooked. The Fediverse doesn’t have that, so unless you’re actively deciding what kind of people you’re interacting with and taking an active role in that gardening, you might just drop off. And I think that’s okay, I think that’s actually fine.. I think that it probably makes the interactions that end up happening on the Fediverse a lot nicer too because the people who are there are there because they want to be there, not because they got a notification that some celebrity just punched some other celebrity on their phone, or whatever.

TFSR: Getting involved in technical projects often takes a sharp learning curve. Can you talk a little bit about troubleshooting in the community and creating instances and how to get assistance, if someone decides that they want to set up a PeerTube where they want to— I’ve been messing with Castapod a little bit and have a lot of difficulties. But partially, that’s my lack of access to French and a lot of the developers are based in France, as far as I can tell.

If someone has a project in mind, where’s a good place for them to look for support and getting started?

L: I would say, technical support wise, if you just start asking questions into the void of the Fediverse, there are a lot of very smart people who are very excited to answer technical questions. You need to have somewhat of a following to get responses. But I would say, as someone new on the Fediverse, it’s a pretty open space. And if you just start talking to people, people want to help, even the main developers. In that sense, you have to be a little bit fearless to just be okay with asking basic questions, not being afraid that you’re looking like a “newb” and just ask. Just go ask the person who wrote the software directly, publicly and say, “Hey, I can’t figure this out? Will you help?” And if they’re like “I’m too busy”, if you ask the void a little bit more, you will get a good amount of response.

There are also a ton of Matrix rooms for all the different projects that are filled with people who want to help each other figure this out. And there’s a ton of different groups that are like “We’re trying to do this, or we’re trying to help with this.” And that’s pretty active.

TFSR: You mentioned Matrix, I was gonna ask about outside of the Fediverse, which is pretty big if you could name some other interesting parallel infrastructure. Matrix, if I understand, is an end-to-end encrypted version of Discord that’s open source. Is that a fair way to describe it?

L: I wouldn’t liken it to Discord that much, but I have heard people say that. Matrix is an interesting project and it still has ways to go before it’s really, honestly, ready for primetime. But it’s usable now. I have a lot of mixed feelings about Matrix right now that I won’t go into, but I am excited for following the development of Matrix. There are a bunch of communities that are using it as their main communication channel right now. And there are a lot of really smart, interesting people working on getting Matrix up to par for being more light. It’s a very similar project to the Fediverse with a few different goals, I think they’re trying to appeal to corporations and corporate backing a bit more than a lot of other open-source-y projects. They’ve gotten some VC money and the German and French and English militaries have all agreed to start using Matrix as their chat platforms into the future, which in some ways, looks good for Matrix because it’s like “Oh, our security is strong enough that we have governments wanting to use it.” But it also makes a lot of people really uncomfortable, when they’re releasing a press release that they just signed a contract with the German military or the French military.

Another very interesting project that I’ve been following for a long time that is of similar nature, is Secure Scuttlebutt, a very similar in goal to the Fediverse, though a bit more utopian. And ways further off in the ability for it being a non-tech thing. Some people are not super technically minded using it, but there’s a hill to climb for several reasons but the project is very awesome and it’s being done by a lot of really great people. Your question was just related to social projects?

TFSR: Not even social. I guess social in terms of the aims and goals of the production of it, but just other alternative parallel infrastructure that you use, you’re interested in, or you think people might find cool to check out on their own?

L: Delta Chat is another one that is mostly being created by anarchists and it’s also a chat protocol built on top of the email standard, or not chat platform, chat protocol / server sort of thing built on email protocols. So you can use your already existing email ability and there’s a layer on top of that that you can chat with using this open standard. It’s also encrypted. So it’s similar in security standards to something like Signal.

And then also, there’s the world of XMPP and Jabber. There’s a good amount of activity in that space. And that’s one of the oldest and original federated chat protocols. And it has somewhat failed many times through many takeover attempts by different corporations. But it’s another standard with a lot of people who are very excited about it, and there’s been some renewed activity in that space in the last two years or so. That’s pretty interesting to follow. And yeah, if you’re a more security-minded person, it’s worth looking into using XMPP.

TFSR: Cool, I didn’t have any more questions, Wakest. Are there any other topics that you want to talk about? I may reach out to some folks that I know that are working and Kolektiva and just see if they have any-

L: Oh, yeah, Kolektiva is an awesome project. I’m really excited to see that continue to grow. Shouting out some instances that are doing really cool stuff-

TFSR: What do they do? They seem to have their hands in a couple of different things, right?

L: Yeah. They’re doing great stuff. Another instance in the Fediverse that’s continually been doing really awesome stuff is Posts.Lurk.Org. They’ve been doing really cool stuff. Social.coop is another really good instance that’s a cooperatively run ?? Merveilles.Town is a very small community of really incredible artists. That’s invite-only and a lot of really inspiring people are working on stuff there. They’ve attracted a lot of interest into the Fediverse just by being a bunch of weirdos doing really awesome stuff.

TFSR: There’s the Mastodon instance that Kolektiva is operating, but I think they’re also doing— Since member projects such as SubMedia have had difficulties in the past with keeping their stuff up on YouTube, I guess the PeerTube instance, right?

So I guess if you’re involved in a media project you could look at either creating— We don’t have any hosting anywhere, we have a Mastodon account on chaos.social where we post our content, and is usually not very much more than that, but I guess if you’re approaching-

L: What is your Mastodon account, if you want to just shout it?

TFSR: @thefinalstrawradio@chaos.social, I’m still not used to vocalizing the address in the way that a Twitter profile gets vocalized.

L: Yeah, that’s just the learning curve of figuring out how to say and talk about these things is interesting.

TFSR: What about yours? What’s the instance if people want to find your work?

L: My account is @liaizon@wake.st. That’s just on my own instance of one.

TFSR: Your little island. Thanks a lot for taking the time to have this conversation. I really appreciate it and all that you had to share. So thanks.

L: Cool. Thank you so much for reaching out. It was great talking to you.

TFSR: You too.

Cora Borradaile on Phone Extraction, Cloning and Keyword Warrants

Cora Borradaile on Phone Extraction, Cloning and Keyword Warrants

image of a cop holding a cellphone
Download This Episode

This week on the The Final Straw you’ll hear me speaking with Cora Borradaile, who sits on the advisory board of the Civil Liberties Defense Center and works around issues of tech security in movements and is an associate professor at OSU.

We discuss the use of phone cloning by US Marshall’s and other law enforcement while engaging protestors in Portland, OR. We talk about UpTurn’s recent report concerning widespread use of cellphone extraction tools to copy and search the contents of cell phones captured during interactions with cops. Finally, we talk about Keyword Searches, where (often without warrants) google hands over information from peoples google searches to law enforcement.

Sean Swain Update

We’ll also be presenting a segment by Sean’s fiance, Lauren, about his current silencing and the injustice of his case. More on president-in-exile Sean Swain can be found at Swain2020.Org and SeanSwain.Org.

. … . ..

Transcription of the conversation with Cora Borradaile

BOG: So I’m speaking with Cora Borradaile who is on the advisory board of the Civil Liberties Defense Center or CLDC and we spoke before about a range of issues in May of this year, and before the George Floyd uprising and the resulting ACAB Spring. During the uprising researchers, journalists, and activists saw that applications of new, or new to us, surveillance methods were being used by security forces against the populace in the so called US, so I was hoping to pick Cora’s brain a bit about this and see, especially since upcoming months in the US also might get a little spicy with the election and all. Thank you Cora very much for taking the time to have this conversation.

Cora Borradaile: Yeah, it’s great to talk to you.

BOG: So just to list off a few things, like this summer we saw the use of military drones surveilling and sharing information with law enforcement in Minneapolis, lots of militarized gear being brought out in the streets across the US, or for late May at least protests against police violence, and collusion with para-state white supremacists have been ongoing in Portland, Oregon. In July we saw the deployment of federal officers from the Department of Homeland Security (DHS) including Customs and Border Patrol (CBP), and the Department of Justice (DOJ) sent out to fight against protesters in the streets of Portland and attack and kidnap people. Including journalists from that and other cities. the US Marshalls also had their own aerial surveillance to track crowds in Portland, it came out this summer. On the tech side of things, the public got wind, apparently from leaks within the department of homeland security, that DHS had been cloning activists’ cell phones. Could you talk a little bit about this and what cell phone cloning is?

CB: Yeah, from that report their were very few details so a lot of it is guesswork as to what could possibly be going on. I could imagine two different ways in which their cloning cellphones- One which is scarier than the other. The more likely I think, is the less scary version which is if they manage to physically get your cell phone, like if you’re arrested and your cell phone is confiscated from you. Even if it’s confiscated temporarily, then they’re copying everything from your cell phone and possibly making a new cell phone that behaves just like your cell phone. So it would allow them to intercept calls possibly receive messages that you were intended to receive.

The scarier version but probably less likely, is the ability for them to be able to do the same thing without having the need to confiscate your phone to do so. That feels unlikely to me that they were doing that. If it was some sort of remote cloning I would gather that they were just cloning the sort of network ID of your phone, and not the contents of your phone. This would still allow them to do things like intercept calls, and intercept data, but in both scenarios I think end-to-end encryption (E2E) apps that you use like Signal or Keybase or Wire, that enable E2E encryption, I think the messages you’re receiving there would still be safe and that the cloned device shouldn’t be able to have the keys enabled to decrypt those messages that were intended for you. And even traffic that is encrypted – if you are visiting a website on your phone that your accessing via HTTPS, where the S stands for Secure – I think that even they wouldn’t be able to see the contents of that web page either because there is a key exchange that happens between you and the web server that they would have to play man in the middle on. Which is more complicated to do in a way that you wouldn’t be able to tell that something was going wrong.

All that’s to say, it’s still scary and I think if you have poor encryption practices like keeping your phone in an unlocked form, they have access to all of your encryption keys for things like Signal and Keybase and whatever other secure messaging apps you might be using. You should do whatever you need to do to alert everyone you contact with to delete your contact from their messages, groups, and so on. And if you have a phone that is confiscated – and certainly in an unlocked form – I would not trust that phone again. If your phone is confiscated but it was locked at the time and presumably you have a good password so they can’t easily unlock your phone, I would still maybe do a factory reset of your phone and start fresh by installing everything over again.

BOG: So, I’m not sure what the basis of this is, but conversations that I was having with friends when we were talking about the latter of the two instances that you were talking about- the hypothetical that remotely the cloning of the network ID or SIM connection could be done. It would be similar to you getting a new phone but having the same number, and that if Signal was installed on that device and it was connecting to the same phone number, by a Man in the Middle attack via a cloned SIM, it would appear that the interception could still be happening but that everyone would see a notation that there had been a change in safety number. Is that maybe what would happen?

CB: Yes. That is perfectly said. Right, so for them to be able to both clone your phone and intercept messages without those “safety number has changed” messages happening would be very, very difficult. So yeah, certainly if there are reports of anybody who’s had a confiscated phone and then all of a sudden all of their contacts are noticing that their safety number has changed with them, that would be super interesting to find out. —

BOG: –Or they stopped getting messages.

CB: Also horrifying.

*Laughter

BOG: Yeah. You know, they noticed that they stopped getting messages, everyone notices that the safety number changed, then that means that hypothetically the cloned phone or whatever would now be in those chats.

CB: So I don’t know if it’s as simple as that, because when you add a new device on Signal all the other devices get a notification of that.

BOG: Oh I see. So if I had a desktop and at least one cell phone that was getting messages… Yeah, but if that device was no longer getting new messages because the traffic was being routed to a different device, you wouldn’t like –

CB: Right so, your contacts should at the very least get the notification saying that the safety number has changed. If it’s a remote clone I think the only way in which the cloned phone would be able to read the messages in preexisting groups, for example, would be if the device was physically confiscated and copied. Because there are encryption keys that are used to start those conversations which are needed.

BOG: Do you mean the messages that were in loops before?

CB: No, to continue to receive messages from conversations that had already been going on. If someone started a new conversation after the cloning then the other people in the conversation might not be able to notice, but if you were continuing a conversation that had started before the cloning I don’t think you would be able to get that information without having physical access to the device and being able to copy over the encryption keys that were used to start those conversations.

BOG: Because they’re being stored on the phone and not on the server.

CB: That’s right, yeah. So for example, when you add a new Signal device part of what happens is copying over the encryption keys needed to continue conversations. And there’s a QR code that, say if you have Signal on your phone and you start using Signal on your desktop, you link those 2 devices so that both devices are able to receive and decrypt messages that go to you as an identifier.

BOG: If you know that if someone in your group or one of your friends has changed their number, whats a good verification?

CB: Don’t message them on Signal, and ask them, right? Because who knows who’s answering. Try to find a different form of communication even if its via friend or via a regular phone call, but ideally via email or some other band that is unrelated to your phone would be perfect to ask them, ‘Hey, I noticed your Signal safety number’s changed, what went on?’ Most of the time, or every time this has happened to me, the answer’s been ‘Oh, I had to reinstall my operating system on my phone’ or ‘I dropped my phone in a pool and had to get a new phone’. That’s usually the reason for a safety number changing, but definitely what you want to do is find a different way to ask that, other than using Signal and ideally other than using the phone. Especially if we are worried about cloned phones. Because if you just use a normal SMS text message to send to your friend and your friends phone has been cloned, then it could be the cops responding saying ‘Oh, yeah I had to get a new phone’.

BOG: I’ve seen some people do a thing where they ask someone in a group, when their safety number changed, ‘Hey could you leave a voice memo with your name and current time that you’re recording the memo and send it into the loop?’ And that way everyone hears this person’s voice, and it’s the time when they specifically get asked to record the memo so it’s outside of Enemy-Of-The-State-level NSA level operation that’s probably not somebody compiling an automated voice message in that person’s voice.

CB: Yeah, that’s a pretty good method for doing that. As you point out, synthesizing peoples’ voices can be done, but taking into account what your threat level is – are you someone who they’re going to be throwing everything at and be able to synthesize your voice in a very short time? For the protest movements we’ve seen, probably not. However if you are the leader of a protest group, hmm… If you are someone that they’re really going to be going after because they think that going after this one person will completely destroy the movement – which I don’t think is the kind of movement time that we are in right now which is good, to avoid those specific people who could really destroy a movement – that’s a pretty good method.

BOG: If you could speak to that prior scenario, is that actually copying the contents of a phone? I think that was the subject of the recent article by Upturn called Mass Extraction —

CB: That’s right.

BOG: If you could talk a little bit about what the findings were there. I was kind of surprised yet kind of not surprised to see the local law enforcement here in Asheville spent at least $49,000, according to their studies, on cell phone extraction tools. But what are mobile device forensic tools, and what do you know about them, how widespread and what kind of stuff do they do?

CB: So these things have existed for a long time. We’ve been talking about them at CLDC for a long time but this Upturn report is really wonderful for just as you say, how widespread they are. Small police departments have them, medium police departments spend hundred of thousands of dollars on access to this over the course of 5 years, and some of the capabilities were actually, I suppose, not really surprising. But reading them all in one place and knowing how low cost access to that technology is was sobering.

So these cell phone extraction devices, they come in different forms but the kind that is most popularly seen is a small stand alone device that you plug a cell phone into and that stand alone device either tries to break into that phone if it’s locked or otherwise just copies all of the content of that phone for later analysis. Some of the things that were surprising to me was how much was available even when the phone was locked and encrypted. There’s a lot of data that is existing in an unencrypted form on your phone.

For example say your phone is locked, you receive a phone call and the name of your contact still shows up, right? It’s not the name that your contact is sending you, its not metadata associated with that contact. if your mother is calling you, it probably shows up “Mom” in your phone, and the reason it says that is because your address book has an entry with that phone number and the name “Mom” attached to it. So your address book entries are existing in an unencrypted state, for example.

Some of the other things that were sort of surprising that were pointed out, that exist in this unencrypted state even though your phone was in a locked condition, were Telegram files and Discord files, and files associated with Google mail. I think a lot of this stuff could just be from bad decisions that the app developer made. Like Telegram is not necessarily focused on security, and so for convenience or speed they may just not be hiding that information behind the device encryption.

There was definitely some reporting in that Upturn report about being able to brute force guess passwords and so there are some things that you can do to protect yourself from that, which is to have a long enough password. Or if you have an Apple device you can enable your phone to self-wipe if you have 10 incorrect guesses, for example. Which if you have a small child at home maybe you don’t want to do because I almost guarantee you will end up with a wiped phone by the end of the week.

BOG: With encrypted files, if there are messages or what-have-you that are saved in an encrypted section on the phone would that just get copied and saved, and tested against decryption later? Is that the idea?

CB: I think what’s happening in most cases is they’re taking a copy of encrypted information, possibly in the hopes that they could decrypt it later or in the hopes that they would be able to get the unlock password from you by other means, like a court order for example. You know, they did point to instances where they were still able to bypass security features like encryption because of security flaws, which is very common. If your phone is badly out of date and you haven’t been keeping up with installing security updates, always install your security updates. That’s a common thing in computer security, that there are flaws that can be taken advantage of that can allow bad actors to break through otherwise strong encryption. But I think if you’re keeping an up-to-date phone, I think that’s the best that any of us can do.

BOG: Another point that was interesting in the article, and I’m glad that they pointed it out, was the sorts of instances when this is being applied to people. You hear about Apple being pressed to give up encrypted information or give a back door when there’s a mass shooting, or a sort of incident that may involve multiple conspirators and the loss of life – something very serious. But in the Upturn article they talk about how through their research and requesting of records it showed that a lot of law enforcement agencies, even local law enforcement agencies, are attempting either to pressure people whose devices they get a hold of or apply for warrants to copy peoples’ contents of their phones for minor things that they’re being accused of.

Like if it’s something like shoplifting or graffiti or public intoxication, petty drug charges, sex work, these are a few of the examples that they give. Considering the way that policing works in the United States, and this shouldn’t surprise anyone in the listening audience, police tend to focus their attention on poor and racialized parts of the population. So if law enforcement gets people’s data, whether by asking for it and pressuring people into it or by using devices, and then saves it for a later investigation and there’s no sort of oversight of this, it seems very likely that the sorts of data that they’re collecting could be used to build future cases or for building profiles on people for things they haven’t actually been accused of so far.

CB: Yup. Phishing for data. Maybe they’re just trying to justify the purchase of this stuff. In Oregon they spend half a million dollars on cellphone extraction technologies, Portland alone spent a quarter of a million in a period of 4-5 years. That’s a lot of money to justify, right? If you’re only using it 3 times a year for homicide cases then maybe you can’t justify actually spending that money and you would just farm out, whenever you do need it for something like that, either to a fusion center or a pay-per-service from one of these companies. So it might just be they’re partially covering their asses and saying ‘Oh yeah, we use it 10 times a week’.

But we’ve also seen examples of law enforcement agencies that just collect so much data, almost for the purpose of just having data. The LAPD famously uses Palantir which is a horrible company, to do all sorts of data analytics for their region collecting data on pizza purchases and parking passes and all sorts of things that don’t seem relevant at all to law enforcement, but it’s almost a compulsion to just collect the data and see what they can do with it.

BOG: Another thing that I had seen was Google was recently in the news when court documents were unsealed in Detroit relating to witness intimidation and arson by an associate of R. Kelly, and this in regards to keyword warrants. Are you familiar with this case and could you talk a little about keyword warrants and what they are?

CB: Yeah, so keyword warrants. I hadn’t heard about them before this news story came out earlier this month, but it’s not surprising. I certainly was familiar with just how many requests for data Google gets and responds to, affecting hundreds of thousands of user accounts every year in the US. So it wouldn’t surprise me if Google, instead of just getting requests saying ‘Hey, I’d like to have all of the emails associated with email address thefinalstraw@gmail.com’, which seems to be the more straight forward type of request related to a specific account that might be included in a law enforcement issue… probably not though. To expand that to ‘Hey, I want to know all of the information you have about people who searched for ‘The Final Straw’ ’. So that’s the keyword warrant or the keyword search request that happened in this case. We’ve seen examples of Geofencing warrants happening for Google Maps asking for anybody who has searched for an address within a given region, that there were a few stories about over the last year. So yeah of course, the data is there why not ask for it? Google is not going to say no, why would they?

BOG: Basically, again by collecting information based on its availability then attempting to apply it. So in this case with the arson, they asked for people who had searched for the address of the house where a car got set on fire within a certain period of time and then cross-referenced that to a Geofence of what phones were in the area within a period of time, and were able to pinpoint and place charges. And not all of the information came out from that, some of the court records are still sealed. It’s kind of a frightening application of technology and as you say, a very happy-to-oblige industry.

CB: Yeah. I think the potential for false arrests and harassment of people, like say you happen to find someone in that area who you don’t like for one reason or another you can arrest them and hold them for a while even if you have no evidence. Harassment arrests are used all the time by law enforcement and have been for decades, centuries probably.

BOG: So I guess… use DuckDuckGo if you’re going to be committing an – – – – ?

*Laughter

CB: I would avoid Google, I definitely use DuckDuckGo. I prefer DuckDuckGo for selfish reasons, I find the personalized search aspect of Google to be somewhat infuriating. When I search for something I don’t want to find what Google thinks I want to find, I want to find the documents related to my search. It’s hard to avoid these tools, but I think DuckDuckGo, anything but g-mail for email please, and there are alternatives to Google Docs as well. Cryptpad seems to be getting better. Every month there are improvements. It offers collaborative online editing to documents, all E2E encrypted.

BOG: I am going to presume with this question that you are not a lawyer, am I correct in that?

CB: I am not a lawyer, no.

BOG: It seems things like intercepting phone calls, peoples text messages, or getting deep into their cellphones and all of the information that’s collected in them for arguably unrelated topics, might overstep into the realm of FISA (Foreign Intelligence Surveillance Act), or might overstep into the realm of one of those amendments that protects our rights against unfair search and seizure. That just doesn’t seem to be the case? Or in these instances is it that these methods haven’t been brought before courts to be challenged?

CB: Everything I know about the law I learned from CLDC, and Law & Order in a previous lifetime. So what I do know about these from reading various news articles and conversations with CLDC is, as pointed out by Upturn, a lot of the extraction of data from cellphones was based on consent and not a warrant. It was about a 50/50 split depending on jurisdiction. So this was probably the case of intimidation by a cop to a person with a cellphone, to say ‘Oh, well let us check your cellphone”. I’m not sure if they give full disclosure of what they mean by ‘let me check your cellphone’, right? (laughs) ‘Let me copy everything there is on your cellphone off your cellphone, if you’re not guilty of this minor misdemeanor’. You know, they’re just asking permission.

That’s one of the things CLDC shoves down the throats of everyone at their trainings, which is don’t consent to searches. Just don’t do it! Even if they’re going to go ahead and do the search, even if you’re not consenting to it, say over and over again ‘I do not consent to this search’. Have a sticker on your phone that says ‘I do not consent to this search’. Because then it can’t be used in the court of law at least. The other thing that we’ve seen over the years is, parallel reconstruction. I don’t know if I’ve seen a well researched example of this but certainly people have hinted that this a common practice, where they’ll find out something via methods that wouldn’t be admissible in the court of law and then they figure out a way to reconstruct what they know using admissible methods.

BOG: Oh like in The Wire.

CB: Yeah, exactly. So that’s something that might be why they’re getting information that they can’t necessarily use. The other part is just general intelligence work. It’s not necessarily going to be used to arrest anyone, it’s not necessarily going to be used in a court of law, but they just want to know what’s going on, and so are going to collect as much data as they can. Unless you find out about it and unless you prove harm in a court of law, then how are you going to stop it from happening? Which is why this report about the Google keyword searches and Google Geofencing searches is so important. If we can find out about that and we can get a case brought forth and have it deemed unconstitutional to do this kind of search then that would stop those kinds of requests from happening. Then you could put pressure on a company – even a company like Google – you could put public pressure on them to say ‘Don’t respond to these requests, they’ve been deemed illegal’.

BOG: There are a couple of other, I guess not insights but points in that Upturn article that I thought were useful. Like if someone deletes information on their phone, are they actually deleting information off of their phone, and are there appropriate or useful, good tools for actually wiping data off of phones or does it just kind of sit there?

BOG: –MAGNETS–

CB: I don’t know of a good tool. I think that if you do a factory reset of your phone that’s most likely to help make that data inaccessible. Even then, is it actually getting completely deleted? It might not be. You have memory on your computer or on your cellphone, and when you delete something it just kind of takes the index away… I’m trying to use an analogy that people would remember. Do people remember libraries and card catalogs? (laughs) All of my analogies are too old.

BOG: I think it’s fair, go ahead.

CB: You think people will remember?

BOG: I think so, or they’ve heard the analogy enough they’ll recognize what a card catalog is.

CB: They’ve seen a movie with an old-timey library and card catalogs?

BOG: Ghostbusters

CB: So. you have a big library with books on all the shelves and the way you know where to find a book is to go to the card catalog. You look up the book that you want and you find its listed location on the shelf and then you go to the shelf and you find the book. Well now, when you delete a file from a computer, really all you’re deleting is the card from the card catalog. So when it comes time to put a new photo in the memory of your computer or cellphone, you go to the shelf and you find out ‘Oh, there’s supposed to be space here because according to the card catalog there’s nothing stored here, so this old data must be something that I don’t need anymore, now I’m going to delete that old stuff.’ Right, ‘I’m going to remove that book from the shelf whose existence was deemed not there anymore by the card catalog, I’ll throw it away now and put my new one in.’ So it’s not until you use the memory again that the old information actually gets deleted.

BOG: At least on computers there’s – for instance I had to reinstall my operating system recently. And when I installed it I went to encrypt the home folder and the file system and it asked ‘Do you want to overwrite everything else on the hard drive?’ Is that what you’re talking about?

CB: Yeah, so that would be the equivalent of actually going to all the shelves of the old library and removing all of the old books. So that’s pretty common when you’re setting up on a computer but I’ve never seen that option on a phone. I’m wondering, does a factory reset actually delete all of that information? I haven’t noticed that myself.

BOG: Microwaves. I mean I saw –

*Laughter

BOG: Yeah, I got nothing.

CB: Drop your phone in the pool, start over.

BOG: They invented this thing called rice though, where if you put your phone into a bag of rice it extracts the water… and the data…

*Laughter

BOG: Well are there any other things you’d like to share with the audience concerning digital tech or any insights?

CB: I did want to share one thing. You asked about them getting this data, and is this illegal search and seizure. There are still strange laws that date back to the 80’s, for example e-mail can be accessed by law enforcement form somewhere like Google with just a subpoena and not a warrant, necessarily. For a law enforcement agency to get information that would otherwise be deemed illegal search and seizure, they need to get a warrant from a judge that proves probable cause for them to get that data or that physical item. But if it’s email on a server held at Google then they don’t need to prove probable cause and they just need a subpoena which is essentially just a ‘Please can I have this information’. I think that’s where these keyword searches are coming in, I’m not sure that they actually need to have a warrant for those. So that’s maybe one extra detail on that front.

BOG: In those instances it’s in one centralized place, although if your doing a keyword search… Yeah I don’t know– I guess I don’t know how Google works on the inside and if it’s just constantly categorizing what people are typing into its different services for later use and then providing that in easily digestible pills to law enforcement. If you’re sending email and it’s unencrypted, it’s probably getting Hoovered up somewhere and fully readable anyway.

CB: Depends on who your adversary is. I don’t think the Portland police department has access to a big Hoover of data on a global scale, but they certainly can ask Google for all of the emails of the activists whose email addresses they’ve extracted from the phones they confiscated during protests.

BOG: Cora, thank you so much. Cora is an associate professor of Computer Science at Oregon State University with a focus on Security State and The Adoption of More Secure Apps, and also is on the board of the CLDC. Thanks again for having this chat.

CB: It was wonderful talking to you, as always.

 

Digital Security Tools for Organizing with the CLDC

Digital Security Tools for Organizing with the CLDC

 

Radio Possum by Beehive Collective
Download This Episode

We’re happy to share the rest of our conversation with Michele Gretes, director of the Digital Security project at the Civil Liberties Defense Center, and Cora Borradaile, who is on the board of the CLDC. For this podcast special, you’ll hear the two discuss different tools for more secure, encrypted communication that is available on various platforms to folks organizing. They publish guides on CLDC.org/Security. We discuss the end-to-end encrypted alternative to Slack (Keybase) **, pgp email encryption (particularly the enigmail tool), Signal Messenger, problems with Whatsapp, Cryptpad, Jitsi, Wire, VPNs and The Onion Router,the TorBrowser, OnionShare, Zoom, Protonmail and some of the challenges of running longstanding movement infrastructure such as the RiseUp collective does (plus their file sharing and pad services). Check our show notes for links to some of these projects.

** Keybase was just purchased by Zoom. See the CLDC article.

(image lifted from the amazing Beehive Collective)

. … . ..

featured tracks:

Bojkez – Snap Your Fingers – Instrumental EP vol. 1

Glutton For Insurrection – V!RU$ 5TR!K3

Tracking Technology and Food Distro in Pandemic

Tracking Technology and Food Distro in Pandemic

Tucson Food Share logo
Download This Episode

This week, we feature two conversations. Cora Borradaile and Michele Gretes, folks involved in the Digital Security Project of the Civil Liberties Defense Center, speak about contact tracing apps and surveillance. Then, Se speaks about Tucson Food Share’s grocery distribution program.

Contact Tracing Apps

First up, we hear Michele Gretes and Cora Borradaile. Michele is the Digital Security Coordinator of the Civil Liberties Defense Center and also does digital security for an environmental non-profit. Cora is a co-founder of the CLDC Digital Security Program and is an Associate Professor of Computer Science at Oregon State University with a focus on the security state and the adoption of more-secure apps. They talk about surveillance and the use of apps for tracing folks contact with people infected with covid-19 to slow the pandemic spread. This is a segment of a larger conversation we’ll be releasing in the middle of this week as a podcast in which Cora and Michele talk about and compare tools for online organizing that engage encryption and offer alternatives to the google and other “free” products that often surveil their users. We speak about Jitsi, Wire, Zoom, RiseUp, Signal, vpns, The Onion Router, TAILS, KeyBase, Riot.IM, pgp and other mentionables. More at CLDC.org/Security/

  • Apple & Google announced this approach toward contact tracing we didn’t really cover in detail / by name in this  conversation. Here’s an article from Wired about it.
  • The White Paper referenced by Cora references from the EU with cryptographers is here.
  • GDPR (General Data Protection Regulation) laws, European restrictions on the collection and longtime storage of data on private individuals has been in place since 2016.
  • An article from VOX speaking about ICE using private phone data to seek out and arrest undocumented people in the US. Another talking about current tracking by phone companies of our movements.

Tucson Food Share

After that, we’ll hear from Se of Tucson Food Share, based in Arizona. We talk about their project, how it scaled up from Tucson Food Not Bombs to deliver groceries and hand out burritos publicly, multi-lingual engagement, resisting burnout and finding joy in feeding people. More at TucsonFoodShare.Org . You should get in touch if you’re thinking of setting up a food distribution project and have any questions.

Announcements

New Station: KODX Seattle

We’d like to mention that we’re now airing on Monday mornings at 2am on KODX in Seattle. You can check out that station’s schedule up at kodxseattle.org or hear them in north eastern Seattle on 96.9 on the FM dial.

Recent Release: Bomani Shakur and Lorenzo Kom’boa Ervin

Just a headsup, if you’re looking for more content for your ears, we released a small segment of Lorenzo Kom’boa Ervin talking about prisoner organizing in the 1970’s and today. This was paired with a longer chat with Lucasville Uprising survivor and death row prisoner Bomani Shakur aka Keith Lamar. For a little over an hour, Bomani talks about his youth, the uprising in 1993, his case and being railroaded. He has an execution date set by the state of Ohio for November 16, 2023.

. … . ..

Naughty By Nature – Hip Hop Hooray (instrumental) – Hip Hop Hooray

Leslie Fish – Bella Ciao – Smoked Fish and Friends

Playlist

Doing For Selves: Open Source Supplies and Tenant Organizing

Doing For Selves: Open Source Supplies and Tenant Organizing

3d printed n95-quality face mask
Download This Episode

Welcome to a podcast special from The Final Straw. While William is was busy producing an episode featuring voices of medical professionals and activists inside and out of prison to talk about the impacts of covid-19 on incarcerated people for broadcast, I had a couple of conversations about work folks are doing on the outside that I’d like to share.

Sean Swain [00:08:06-00:15:12]

Hacking To Fight Covid-19

[00:15:12-00:33:01]

First, I spoke with Bill Slavin of Indie Lab, space in Virginia that is in the process of shifting it’s purpose since the epidemic became apparent from an broader scientific and educational maker space to work on the manufacturing and distribution of covid-19 related items in need such as testing kits, medical grade oxygen, ventilators and 3d printed n95 quality masks for medical professionals to fill public health needs. Bill talks generally about the ways that community and scientists can come together through mutual aid to deal with this crisis left by the inaction of the government on so many levels. They are also crowd-sourcing fundraising for scaling up their production and facilities and there’s a link in our show notes on that. The platform that Bill talks about in the chat is known as Just One Giant Lab, or JOGL. Consider this an invitation for makers to get involved.

Organizing With Your Neighbors For Homes and Dignity

[00:35:08-01:45:44]

Then, I talked to Julian of Tenants United of Hyde Park and Woodlawn in Chicago. What with all of the talk about rent strikes in the face of such huge leaps in unemployment during the spread of covid-19 and accompanying economic collapse, I thought it’d be helpful to have this chat to help spur on these conversations of how we seize power back into our hands while we’re being strangled by quarantine and hopefully afterwards. You can learn more about the group Julian works with at TenantsUnitedHPWL.Org. Philadelphia Tenants Union and Los Angeles Tenants Union were both mentioned and will be linked in the show notes, alongside a reminder that the national Autonomous Tenants Union Network (ATUN) is being organized and folks can reach out to Philly TU or LA TU via email to get onto their organizing zoom calls. Finally, if you’re in the Chicago area and need a lawyer for housing, check out Lawyers Committee For Better Housing online at lcbh.org. Julian also mentioned squatting of homes in southern CA owned by the state, here’s a link to an article.

Announcements

WNC Mutual Aid Projects

Linked in our show notes is also a googledoc that Cindy Milstein and others are helping to keep updated that lists many mutual aid projects that have sprung up all over concerning the exacerbation of capitalism by the covid-19 crisis, as well as a similar page up from ItsGoingDown.Org

If you’re in so-called Western NC and want to get involved, the project Asheville Survival Project has a presence on fedbook and is soliciting donations of food and sanitary goods for distribution to indigent, bipoc, elder and immune compromised folks in the community. We’ll link some social media posts on the subject that list our donation sites around Asheville in the show notes and you can venmo donations to @AVLsurvival.

If you care to contribute to efforts in Boone, NC, you can follow the instagram presence for @boonecommunityrelief or join the fedbook group by the same name, reach them via email at boonecommunityrelief@protonmail.com find donation sites and venmo donations can happen up at via venmo at @Bkeeves.

NC Prisons Covid-19 Phone Zap

Flyer about call-in to NC prisonsAnd check our show notes for an invitation to call the NC Department of Public Safety and Governor’s offices to demand the release of NC prisoners susceptible to infection and possible death of Corona Virus in the NC system due to improper care. Wherever you are listening, consider getting together with others and calling jails, prison agencies and the executive branches to demand similarly the release of AT THE VERY LEAST the aged, infirm, folks in pre-trial detention, upcoming release or who are held because they can’t pay bail.

North Carolina Corrections Department-Prison Division

(919) 838-4000

North Carolina Governors Office

919-814-2000

https://governor.nc.gov/contact/contact-governor-cooper

sample script:

My name is ________, and I am a North Carolina resident  deeply concerned about the safety of the states’s incarcerated people during the COVID-19 pandemic. Incarcerated people have a unique vulnerability to disease due to their crowded, unsanitary living conditions and lack of access to adequate medical care. For humanitarian reasons as well as reasons of public health, we call for the immediate release of all people in the North Carolina prison system. We also urge that you stop the intake of new prisoners during the pandemic. The cost of failing to take these steps will be paid for in human lives, and we refuse to abandon our neighbors and loved ones to die in lockup.

CALL AS MANY TIMES AS YOU CAN

stay tuned to the twitter accounts for @NCResists and @EmptyCagesColl for updates

10th Anniversary

Even while the world burns, our 10th anniversary still approaches and we’re still soliciting messages from you, our listenership. Not sure what to say, likely you have a LOT of time on your hands, so go back through our archives and dive in. If you want a deep dive, visit our website where you can find hundreds of hours of interviews and music. If you want to drop us a line, check out the link in the show notes, or you can leave a voicemail or signal voice memo at +18285710161, you can share an audio file with the google drive associated with the email thefinalstrawradio@riseup.net or send a link to a cloud stored audio filed to that email address. Tell us and listeners what you’ve appreciated and or where you’d like us to go with this project.

Spreading TFS

If you appreciate the work that we do here at TFS, you can also help us out by making a donation if you have extra cash rustling around. The link on our site called Donate/Merch will show you tons of ways. If, like most of us, money is super tight at the moment, no prob, we struggle together. You can share our show with other folks to get these voices out there and more folks in the conversation. And if you REALLY like us and have a community radio station nearby who you’d be excited to have us air on for free, get in touch with us and we’ll help. The page on our site entitled Radio Broadcasting has lots of info for radio stations and how to let them know you want us on the airwaves. Thanks!

. … . ..

Featured music:

  • From Monument To Masses – Sharpshooter – The Impossible Leap In One Hundred Simple Steps
  • Filastine – Quémalo Ya (instrumental) – Quémalo Ya
  • Etta James – I Don’t Stand A Ghost of a Chance (With You) – Mystery Lady: The Songs of Billie Holiday

Digital Security / Tenant Organizing / #MeToo and Updates from Hong Kong

Digital Security / Tenant Organizing / #MeToo Hong Kong

This week, we feature three portions.

Lauren Regan of CLDC

art by Ar To
poster by Ar To
Download This Episode

First up, we share a chat with Lauren Regan of the Civil Liberties Defense Center, or CLDC, to chat about safer practices around technology for activists, as well as the “reverse search” warrant used by the NYPD with Google to capture info on antifascists and the Proud Boy attackers last year. More at https://cldc.org. An article about tech security and phones that Bursts references is called “Never Turn Off The Phone” [starts 10m 08s]

Palm Beach Tenants Union

Following this, Withers (a new collective member at The Final Straw) shares a chat with Adam and Amy, two organizers with the Palm Beach Tenants Union out of Florida about their work and the sorts of mutual aid disaster work they’ve done with Hurricane Irma and advocating for and organizing with renters in their communities for dignity in housing. More on the Union at https://pbctu.org and more on how you can get involved in mutual aid up at https://mutualaiddisasterrelief.org. There are a number of donation sites around the region to prepare for this Hurricane season, as well as distribute support to Bahamas that you can find by searching social media for DRASL (Dorian Response Autonomous Supply Line), as mentioned on itsgoingdown.org. [starts at 54m 06s]

#MeToo and Updates from Hong Kong

Finally, you’ll hear a conversation with Enid and Rebecca, who feminist activists in Hong Kong about the current state of protests there. Content warning, that segment deals in part with organizing around sexualized assault by police and by protestors. To hear our prior interview with Ahkok on protests in HK, check our website and see the great articles up at crimethinc. Also, the guests talk about the term 自由閪, or “Freedom Cunt” as a re-appropriation of a misogynist insult by police from the protests. [starts at 1hr 15m 51s]

*Correction to the HK conversation: The full name of the IPCC mentioned in regards to the establishment of an independent police inquiry is called the Independent Police Complaints Council. Hong Kong Chief Executive Carrie Lam appointed two new committee members to the already existing committee, not independent investigators. However, the IPCC has hired five foreign investigators to participate in examinations, though it must be clarified that the role of the IPCC is observational rather than investigative. The IPCC has no jurisdiction to either call witness nor collect evidence for the independent inquiry called for by citizens.

If you’re listening to the radio version, as usual, we suggest that you check out the podcast version for longer versions of all three chats in this episode as well as Sean Swain’s audio this week. You can hear that at thefinalstrawradio.noblogs.org or via various streaming platforms we publish to, such as youtube, soundcloud, stitcher, pandora and so-on.

. … . ..

playlist ending

There Is No Liberation Until The Borders Are Gone: Bruno from CIMA and Members of IAF Speak

Download Episode Here

This week we are super pleased to share an interview that William did a few weeks ago with two members of the Indigenous Anarchist Federation, Bombshell and insurgent e! We got to talk about a lot of topics in this episode, which was recorded on about the year anniversary of the formation of the Indigenous Anarchist Federation. Bombshell and insurgent e talked about their histories as anarchist people, about the formation of this Federation, what true decolonization of anarchism could look like, and about the upcoming Indigenous Anarchist Convergence which is happening from August 16th-18th in Kinlani, Navajo land, occupied Flagstaff AZ, plus many other topics!

William really appreciated getting to connect with Bombshell and e, hearing their words on the topics at hand, and also really appreciated their patience with me as he stumbled thru my sentences with them.

To learn more about them you can follow them on Twitter, where they post active updates, news, and analysis @IAF_FAI
or go to their website iaf-fai.org where they post more in depth articles about Indigenous struggle all around the world.

If you do the Twitter follows, just note that there is an active fake account that is attempting to badmouth and discredit the work of the IAF, and this account has the handle @fai-mujer; their interventions have been confusing to followers of the IAF in the past. To see a full account of this situation, plus of course many more topics that are like not about internet trolls but are about the work, you can visit them at iaf-fai.org! To learn more about the Convergence, to register, and for tips for outsider participation, you can visit taalahooghan.org.

If in listening to this you are curious about whose land you were born on or live on, a fantastic resource for this is native-land.ca which provides a world wide map, insofar as it’s possible, of indigenous lands and the names of their people spanning thousands of miles.

For more great interviews with members of IAF, including words from Bad Salish Girl and Green City:

Rev Left Radio

Coffee With Comrades

A list of recommendations from B and e:

-Do some digging and research to find a bunch of recent authors who have done the work to center Indigenaity and decolonization,

-read the complete works of Cutcha Risling Baldy on Decolonized and Indigenous Feminism,

-Talk to and listen to Indigenous people, do the necessary research to not ask folks to perform unnecessary emotional labor.

Books:

Open Veins of Latin America by Eduardo Galeano (en Espanol Las Venas Abiertas de América Latina)

Indigenous Peoples History of the United States by Roxane Dunbar-Ortiz

1491: New Revelations of the Americas Before Columbus by Charles C. Mann

Our History Is The Future by Nick Estes

500 Years of Indigenous Resistance by Gord Hill

Some good podcasts, recommended by William of TFS, from Indigenous folks, while not being politically anarchist identified are good to listen to!

All My Relations by Matika Wilbur and Adrienne Keene

While Indigenous by the NDN Collective

Stay tuned next week for an interview with Kanahus Manuel, a Secwepemc woman fighting a pipeline thru her lands in so called BC!

CIMA Speaks about ICE Raids

But first up Bursts spoke with Bruno Hinojosa Ruiz of the local immigrants advocacy group, CIMA, about the threatened raids by ICE and  CPB, ways for folks to get plugged in wherever they are with defending  their communities and helping those most targeted and strengthening our  bonds. More about CIMA can be found online by searching C I M A W N C on  facebook or at their site cimawnc.org. After the conversation,  Bursts learned that there’s a wiki page that’s compiling ICE offices and companies profiting from Immigrations police and Border Patrol. That  wiki can be found and added to at https://trackingice.com/wiki/Main_Page

Rest In Power, Willem

In related news to the ramping up of ICE repression of people around the so-called US, protests, sit-ins and sabotages of profiteers have been on the rise. Much of this can be tracked by visiting https://itsgoingdown.org/closethecamps/. Of note, in Asheville someone claimed responsibility for damaging an atm owned by PNC and claiming it anonymously on IGD. Also, on Saturday, July 13th, a 69 year old, northwest anarchist named Willem Van Spronsen was gunned down by authorities outside of the North West Detention Center in Tacoma, WA while attempting to destroy buses used by GEO group to transport detainees to and from the center. Van Spronsen was allegedly armed with a rifle and  was attempting to arson the buses when pigs opened fire and ended his life. There’s a statement by a local group focused on shutting down the facility, La Resistencia, up on fedbook and linked in our show notes. We’re sorry to lose you,  comrade and mourn your loss, but are inspired by your motivation.

. … . ..

Music for this episode:

Affinity by Shining Soul off of We Got This

Look of Pain by Soul Position

Norman Shamas updates on FOSTA and Digital Harm Reduction

Norman Shamas updates on FOSTA and digital harm reduction

Download This Episode

This week, we continue our look at sex, work and the state with guest, Norman Shamas. Norman Shamas is an activist and educator whose work focuses on human-centered information and digital security and privacy. Now, Norman is not a lawyer but shares their insights about the legal situation around FOSTA, or Fighting Online Sex Trafficking Act that passed into law in the U.S. last year and it’s implications for sex workers, for those trying to fight sex trafficking and for people communicating desire without coercion or monetary exchange, folks looking for a hookup. This interview was conducted for our Error451 podcast, an occasional project focusing on digital security and tech from an anarchist perspective, but because of the prescience of Norman’s words, we wanted to share it as an episode for the airwaves. Later in the interview we talk about Norman’s writing a bit, including issues around queer dating apps and how they’ve been used to persecute folks for their sexualities and genders in various parts of the world and how we can pressure app developers and platforms to take the security of their users more seriously.

For the full conversation including links to articles and subjects we talk about, as well as this week’s Sean Swain segment, check out our podcast version available at thefinalstrawradio.noblogs.org. Subcribing to our show is free and easy if you have a computer or a smart phone. There are some instructions up at our website under the “podcasting” tab at the top of the page.

Red Umbrella Tech Collective: https://redumbrellatech.com/

Safer Nudes from Coding Rights: https://www.codingrights.org/4/

Hacking // Hustling (incl. a recording of the panel): http://melissagiragrant.com/hackinghustling/

Open Privacy: https://openprivacy.ca/

CWTCH platform and protocol: https://cwtch.im/

Guide on Harm Reduction and WhatsApp: https://blog.witness.org/2018/11/harm-reduction-whatsapp

Denver Prisoner Letter Writing Event

On February 13th, 7PM at Hooked on Colfax in Denver, CO, folks’ll be sharing love and solidarity with political prisoners with letter writing.

There’ll be a presentation from the Anarchist Black Cross with tips for writing a letter and the February birthdays.

The event will be excitedly co-hosted by many local groups including the Denver Anarchist Black Cross, Denver Black and Pink, Denver IWW, Femme Left, and the Denver CryptoParty.

Prisoners Left Cold at Brooklyn MDC

If you’re in New York, there are rolling demo’s at the Brooklyn Metropolitan Detention Center where it was discovered that prisoners have been held with limited heat and electricity for days now during this time of record-breaking cold, as reported in the New York Times on February 1st. To keep up on actions around this, one can check out IWOCNYC, the New York City Incarcerated Workers Organizing Committee where demo’s are being announced. If you’re concerned for the health and safety of the over 1,000 prisoners at the MDC Federal jail but can’t make it to a demo, the group Sunset Park for a Liberated Future has called for a phone zap. Those wanting to participate can call Warden Herman Quay & Associate Warden David Ortiz at 718-840-4200. You can also call
Nicole McFarland, US Marshall Assistant Chief at 718-840-4200 ext. 41740.

A sample script from Black and Pink NYC reads:

“I’m a resident of NYC and am very concerned about the situation at MDC. People are living in intolerable conditions without heat or hot meals. This is unacceptable and a violation of human rights. I believe this poses serious harm to the health and safety of people at MDC and fails to meet Eighth Amendment standards prohibiting cruel and unusual punishment. What is your action plan to stop this immediately? What do you commit to in ending this suffering of people in your custody?”

. … . ..

Donate or Get TFSR Swag

. … . ..

Playlist

Error451 #14: Leap Encryption Access Project on VPNs and Psuedonymity

Leap Encryption Access Project

Download This Episode

This week, we’d like to share a conversation had a little bit ago with Kali Kaneko, from LEAP.  Leap Encryption Access Project, like pEp featured in our prior Error451 interview, is an open-source project meant to ease… access to encryption (and it’s a project).  At a point in the past, LEAP had an interest in shifting paradigm of email but is now focusing mainly on distribution, upkeep, and improvement of it’s VPN service, Bitmask.  Bitmask is partnering with Riseup Black and Calyx (and hopefully other trustworthy projects) to expand access to free, psuedonymized web traffic with ease.

Here’re a few links Kali sent my way for sharing and further investigation:

The song for this episode was “Crashing The System” by ¡Tchkung! from the album Post World Handbook.

 

A Jailhouse Lawyer Speaks About #PrisonStrike 2018

A Jailhouse Lawyer Speaks About #PrisonStrike 2018

Download This Episode

This week, we feature three segments. First, we’ll feature a statement about recent doxing of a number of anti-racists in the Asheville area by far-right keyboard warriors.

After that, we feature an interview with Dee, an anonymous incarcerated organizer affiliated with Jailhouse Lawyers Speak. In this conversation we ask about the effectiveness of the #August21 2018 Nationwide Prisoner Strike, the push to move prisoners under storm threat as these increase under climate change, repression and changes in response to the strike, mail limitations in PA prisons, standardization of increased security in Ohio, outside support and organizing, critiques of the methods of NPS2018, and more. Check our show notes for links to more info concerning the strike.

If prisoners want to communicate with and/or join JLS, Dee suggests in some words near the end of the show that they reach out to:

Jailhouse Lawyers Speak
P.O. Box 1076
Knightdale, NC 27545

And you can find JLS on fedbook or twitter to keep up with their organizing

Hambach Forest Updates

In our final section of the show, you’ll hear a report by audio comrades in Germany about the recent resistance to the destruction of the Hambach Forest by authorities. The clearing of the ancient forest is to create the largest open-pit lignite coal mine in Europe on behalf of the corporation RWE, which sells to Netherlands, Germany & the UK. Lignite has a carbon content of around 60-70%, has a low energy yield, and is responsible for 1/3 of CO2 emissions in Germany. This segment shows up in the November 2018 episode of B(A)DNews, Angry Voices from Around The World from the A-Radio Network, of which we’re a proud member. Keep an eye on our podcast stream and website for a link to this episode coming out in the next couple of days.

Local Doxxings

Within the last week, over 15 people were doxxed by white supremacists in our community. Here is most of a collective statement released a day or two after the fact by some of those folks:

They’ve targeted more than twenty people they believe are involved in anti-racist organizing in North Carolina. They’ve posted information such as our home addresses, places of work, family members, license plates, social media profiles–whatever information they could find. They seem to be fixating on trans and nonbinary people in particular, and delight in trying to deadname and misgender us whenever possible. Some of us, and some of our family members, have received harassing messages.

They wrote about us like it’s some big secret that we oppose fascism, that we oppose racism, that we oppose all forms of bigotry and oppression. It’s not a secret. We weren’t hiding. We are not ashamed.

This isn’t a plea for sympathy. Our friends and immediate community have been amazing. Rather, this is a message to let you know that if you ever find yourself targeted by neo-Nazis and the far right, you are not alone. None of us need to face this rising tide of fascist scum alone. We have each other.

Robert Bowers, the Pittsburgh Synagogue shooter, actively and publicly chatted with alt-right trolls who had doxxed anti-racist activists. He even discussed violence against anti-racists in our region. This is probably a good time to think seriously about your online security and that of your family members and friends. But staying safe isn’t just a matter of changing your Facebook settings or making your Instagram private. It’s a matter of us showing up for each other. Of us not letting them intimidate us, not letting them isolate us. Not letting them stop us from our work. Especially when the work is stopping fascism.

To read the full statement, you can visit https://ashevillesolidarity.tumblr.com/ , where you can also see a list of bands and businesses which have been included in the current harassment. And of course, there are ways to donate and send support!

For an article about this (released just as our radio show was airing), including a statement by Firestorm Books contextualizing the specific harassment they’ve received, you can visit The Asheville Blade, which you can donate to here! To support Firestorm Books, our local anarchist community space and bookstore, you can join their Community Sustainer’s Program or leave them a positive review on Facebook, Yelp, wherever you can.

Additionally, for a really excellent walk through of how to help prevent this kind of thing happening to you or your crew, you can visit the Smiling Face Collective guide to preventing doxxing. This site can be easily adapted into an interactive workshop, because let’s face it, wiping your presence off the internet is a tedious, upsetting, and grueling process which is designed to wear you down. It’s always better to do this in groups! You can write to us about your experiences with internet hygiene, good, bad, or whatever, at tfsradioshow@protonmail.com

Rural Organizing Against Racism Benefit

For those in the Western NC area, there will be a Fall Fundraiser to benefit rural organizing and resilience on Friday November 30th at 6pm at the Marshall Container Co. which is located at 10 South Main Street, Marshall, NC. The event will center around a cornbread and chili dinner and will include several surprise musical guests!

Support Anti-Fascist Protestors in Philly

And finally, if you are in the position to donate to those injured yesterday fighting the Proud Boys in Philly and elsewhere, you can go to this rally.org page. Remember that if you donate to do so anonymously!

. … . ..

Playlist here.