PRISMA
Web PDF • Imposed PDF• Raw TXT (OCR)






![the thoughts on goals are very general. One of the reasons for this is that the content of our actions s geared to the social conflicts at hand, which are constantly changing. Each context scts its own priorities and needs 0 be discussed anew. We felt that this booklet should contain ideas that can be applicd or transferred to different situations at different times. The cmphasis is on practice because we wanted to be precise and show as many tactics as possibl. We haven’t tested everything ourselves. However, we know some things from experience, and we hav tried to verify and rescarch everything cse to the best of our abilites. For the more complicated content in the chapter, it is always necessary to do tests yourself before putting anything into practice. But you know that. We wanted to avoid creating a hicrarchy of different forms of action. Admittedly some topics take more space here than others. Thisis probably because the more complicated the preparation and the higher the health sisks or the intensity of repression, the longer the descriptions will need o be in order to be accurate. [..] You may have some fundamental objections to publishing such a collection, such as that we shouldn’t unnecessarily give cops or Nazis recipes for the forms of action used by the radical left, because that might make our practices more transparent. But we consider it more important to spread forms and ideas among ourselves. As we said, most of it has already been published and will already be familiar to the cops. We figured that it can be an advantage if many people in many places know and use many forms of action, because then specific practices would not be so casy to attribute, Another diffculty is that such a collection could appear to be the “ultimate collection”. But it isn’t intended to be, and it isn’t; many things arc stll missing, For example,the use of the Internet s given fr too little attention in this booklet, It would be intercsting to think more about sceure Internet access and claiming actions by email or about hacking. In our opinion, ncither Internet cafes nor anonymization software are sufficient. It would also be interesting to have morc information about copicrs and to what extent or how copies can be traced back to specific devices, what is stored and for how long, ctc](prisma-no-trace-project 7.png)


![city or attentive reading of the newspaper ills an imaginary list. Once you have decided what you want the action to accomplish, the next step is to sclect a specific target where the desired impacts can best be achicved. By narrowing down the goal, the tactic, and the specific location, you now have an initial rough plan for your action! After answering the three famous questions “what, how, and where?”, the concrete planning can begin... [In any case, when selecting a target, care must be taken to ensure that no bystanders arc endangered.] Initial Reconnaissance The first step should always be to familiarize yourself with the target location. Ideally, several people should take a look at the chosen location, They should use photos, drawings, and maps to describe the arca to cach other. [We need to point out problems with this approach: you shouldn’t have photos, drawings,etc.lying around at home. If photos and drawings cannot be avoided, they shouldn’t be kept at home and should disappear as soon as possible. If photos are stored digitally, you should carcfully consider where you store them, and how to completely destroy them; more on this in the lst chapter. The very latest that you should destroy everything is right before the action.] More things will be noticed with more pais of eyes, and some things are only really noticed through the process of collective discussion. A small gate, a hidden camera, a tree adjacent to a wall... I€’s often these little things that later become central to the plan. At this carly planning phase, i’s important to develop an eye for what type of movement is typical in the surrounding arca, the ways into and out of the target location, and. possible escape routes. The area to take into account grows if you will be driving to the action by car’ because then you’ll also need to find a good. parking space and well-chosen car routes. It would be really annoying SNLTLR ot Later i the zine, secton on vhicle races concludes that “the use of carshould [..] be avoided whenever posible” 9](prisma-no-trace-project 10.png)


![[The individual escape routes should also be discussed together. Keep in mind that your homes may be under surveillance.] Every step in between must be clarified and recorded in a schedule. At every stage of the action, everyone must know what needs to be done and who is communicating with whom. What tools are needed when? How will they get to where they are needed? And how will the tools be disposed of? Al roles must be clearly described (driver, lookouts, people who will be directly at or in the target....) An important decision at this stage is also whether there should be some form of back-up. By this we mean a trusted person who, in the case of failure or danger, can be contacted far away from the action by phonc or other suitable means to organize external support. This is not uscful or necessary for all actions. [In our opinion, telephone communication during or shortly after an action is a major security risk. We have no way of knowing if the contact’s phonc is being tapped. It may be possible to usc a burner phone with an unused card, but even this should be carefully considered. It’s probably better to arrange a mecting place beforchand. ] PlanB I¢’s often a good idea to think of solutions to problems that may arisc. A door that cannot be opened docs not necessarily mean the end of an action. If you run through several alternatives in advance, you will be able to deal with a “deviation from the plan” more quickly and casily 1It’s even possible to decide on a completely different goal in case there are insurmountable problems with the planned action. However, you should also decide which situations should cause the action to be aborted altogether—discuss beforchand the conditions under which it should not be continued. Immediate Preparation In the lead up to the action, the detailed plan should be rehearsed until everyone can confidently carry out their *role.” It’s usually useful for all pasticipants to be aware of cach other’s tasks so that at any given moment 12](prisma-no-trace-project 13.png)
![they can assess what stage the action is at. It is also important to set aside cnough time in an carlicr preparation phase to talk about fears and feclings, not only to find a *solution,”but also to make cach participant’s actions more predictable for everyone. It’s not helpful if somcone acts super cool during the whole preparation and then is panicked and erratie during the action itself. The more we can collcctively open up about our supposed weaknesses, the stronger the group can be when it gocs into action. There is often a lot to coordinate and arrange during the preparation phase. It is ofien a good test of how reliable and focused the individuals in the group are. Set a clear and realistic timeline for getting everything you need. Especially when it comes to tools that leave traces, it is always a good idea not to get them from the storc around the corner, but to think carcfully about how this or that can be obtained without being surveilled. It’s also important to pay attention to the combinations of things you buy—it may be tempting to get cverything you need in one go at a hardware store, but putting a crowbar, a jerryan and gloves in the same shopping cart can ‘backfire. Prepare a plausible cover story for your shopping, cven though 10 one will ask you most of the time. This will regulate the contents of your “shopping cart”and give you a sense of sceuity: [Keep in mind, however, that even with a good cover story, the cashier ‘may remember you after a conspicuous purchase.] At this stage, it also important to consider the possibility of failure. What could happen if things go wrong? Are we taking a health risk with this action? What if the cops catch us? Who will give notice at work or pick up the kids from school? The better prepared we are for bad situations, the better we can deal with them. Depending on the tactic, there should always be agreements about who can take care of whom if something goes wrong. I¢s often necessary to involve friends who aren’t dircetly involved in the action. They don’t need to be privy to all the details, but there should be clear agreements about what should happen if they can’t manage to get in touch with you by an agreed time. 13](prisma-no-trace-project 14.png)

























![A Few Research Tips When you prepare for an action, you leave behind not only material traces, ‘but digital ones as well. Here arc a few basic procedures for doing rescarch in preparation for an action.” “The books you order or borrow from a library can be traced back to you, and the cops check the library accounts of suspects. Avoid libraries at all costs. Some libraries are also under video surveillance. [..] Leave your mobile phone at home when doing reseasch. Remember that Internet cafes often have surveillance cameras, so try to avoid them.[...] You should be aware that even in cafes without cameras, staff may still be able to remember you. Try to wear disguises and be as inconspicuous as possible. Remember that your fingerprints can also be found on cash you handled, at least for a short time. Technical Surveillance Originally published in Repression und Widerstand (Repression and Resistance). With small additions from the editors of the original PRISMA zine. What technical capacities are used for surveillance? And how can we counter them? TP note: Tn the original PRISMA zine, this section assumed that you would do reseasch for an action using a public computer at an Internet cafe or a similsr location. We advise against this, and therefore omitted most of the original section i this ranslation. From “How to submit an anonymous communiqué and get away with i€ “The geners recommendation for most people is o use s pessonsl computer thati only for Tail,on public WAFi. ...] Public computers themselves could be compromised at the hardhware level or through intention collsboration betuween their owner-operatorsand aw enforcement,and this could be almost mpossible to detect.” *hitps//motrace.how/resousces/fhow-submit 39](prisma-no-trace-project 40.png)


![If you really want to be on the safe side, you should generally refrain from mentioning important dates, places and actions and instcad use pen and paper and then destroy what you’ve written. 8] Stethoscapes Rooms can be listened to from the outside using electronic stethoscopes.* These devices can amplify the smallest sound waves that pass through ‘walls, doors, and water pipes up to 40,000 times to make them audible. “This can be prevented by audio jammers cquipped with special contact resonators. Window Panes Vibrations ‘The noise generated in a room causes the window panes to vibrate slighly. Using an invisible infrarcd laser, these vibrations can be measured at a distance of up to 200 meters and converted back into sound waves, Complete systems (ransmitters and receivers disguised as cameras, amplifiers, and noise filtrs) are available for less than 10,000 euros and are therefore likely to be used relatively frequently The drawbacks of this technology are that there must be a line of sight 103 window in the room being monitorcd, and that the results are rather poor for double-panc windows. Video Surveillance Cameras with built-in radio transmitters can be as small as a matchbox, And the lenses of such cameras are barely larger than pinheads and can be camouflaged very effectively. For example, they can be hidden behind sickers or disguised as Phillips-head screws. Completely camouflaged systems are also available in the form of smoke detectors, desk lumps, and other everyday objects These special cameras can capture footage of very high quality. Their operating time and radio range are comparable to those of acoustic bugs. SN.TR not: Contact microphones* can also be used for the same purpose *hitps:/fen.vwikipedia.org/iki/Contact_microphone. 42](prisma-no-trace-project 43.png)













![[This text is a bit old, but still quite relevant. It will be clear to anyone who has walked down a busy street that mobile phone technology has evolved...] Eyes starc out of windows everywhere you go... A car rolls slowly past you, two young guys sitting in it, watching you out of the corner of their eyes.... Another car has been parked in front of your door for days.... The phone suddenly crackles in a way it didn’t before... A satellite antenna has recently been installed on the house across the street, pointing dircctly at you... A helicopter has been fiying over your strect a lot latcly.. Someone has asked for you.... Beyond the blue summer sky; a spy satellite orbits and photographs you fifty times per second as you walk through deserted strects.... “The scason is called PARANOIA. All of us who are close to anti-authoritarian ideas (nd hopefully actions) are familiar with this time of year. Many of us have experienced various forms of repression in our years of political activity: the police baton at demonstrations,investigations, rial,raids,prison. Although these dircetly experienced patterns and forms of repression can be somewhat demystified over the years itis abways frightening how little we collectively learn from these experiences. New campaigns for refusing to testify in police stations and during trial continue to be necessary,and people stillfeel helpless when caught in the thorns of the court and prison apparatus, often repeating the same old mistakes. There are piles of texts on all kinds of repression, but it makes a big difference whether you experience something yoursclf or just read about it. What is truc of dircct, overt experiences of repression is all the more true of the more covert forms. The radical left knows a lot about the apparatuses of s enemics, or at least has theorctical knowledge, but in practice takes them into account rather sloppily. The subjective fecling of being threatencd often determines one’s actions: “Nothing will happen’—“What could they possibly want’—“T’l be carcful’—*Afier all they don’t have my fingerprints yet’—*Why would they be interested in me?” But also: “I’m surrounded”—*Nothing works anymore’—*I¢’s better if I stop being active—*Everything is surveilled anyway"—*Orwell’s ’1984’ has been surpassed long ago.” 56](prisma-no-trace-project 57.png)






















![In our experience, we have found that it is often difficult to find an overview of different forms of action, especially militant ones, as well as practical and contextual thoughts on different aspects of security and action planning. [...] That’s why we have collected information about taking action. NoTrace Project / No trace, no case. A collection of tools to help anarchists and other rebels understand the capabilities of their cnemics, undermine survcillance eforts, and ultimately act without getting caught, Depending on your contest, possession of cestain documents may be criminalized or atract umvanted attention. Be carcful about what zines you print and where you stor thern](prisma-no-trace-project 80.png)

PRISMA
Primer
on Radical Information
for Secure Militant Actions
PRISMA: Primer on Radical Information for Secure Militant Actions
Original textin German
PRISMA: Prima Radikales Info Sammelsurium Militanter Aktionen
2010
web archive.org/web/20250611231250/https:/militanz blackblogs org/vp-
content/uploads/sites/481/2017/11/Prisma.pdf
Translation and layout
No Trace Project
noteace how/cesources/#prisma
Note from the No Trace Project:
Compared to the original PRISMA zine, this translation includes chapters
one, three, four and five, except for paragraphs and sections related to
computer or phone sccurity that we deemed outdated. It does not include
chapters two (“The Goals and Motives of Militant Politics) and six
(“Action Tactics”) because they are outside the scope of our project.
Contents
1.Let's Go...
3. Action Preparation and Exceution .
The Steps to Success .
Beforchand
Initial Reconnaissance 9
A General Plan
Sccond Reconnaissance
‘The Action Plan ..
Plan B
Immediate Preparation
..and Action! ...
After the Action
A Final Note on Security
Anti-Repression and Emergency Plans .
Communication Structurcs
Getting to Know Each Other ...
Discuss Emergency Situations Together!
4.Our Security
Traces ..
Fingerprints
DNA Traces . .
Options for Creating a Clean Room
Aificial DNA
Scent Traces
Shocprints .
Vehicle Traces
Tool Traces
Fire Traces
Witing Traces .
Material Traces
Purchases
A Few Research Tips
Technical Surveillance ..
Monitoring Enclosed Spaces
Phone Surveillance
Postal Service
Vehicles
Public Space
Databases
Biometrics
E-passport .
Surveillance Cameras ...
Where Can You Find Therm?
What Can They Do and How Can Thc) Be Recognine
What Can We Do About Them? ..
Physical Surveillance
First,a Few Basic Rules When It Comes to Physical
Surveillance ........ .
Not Everything That Can Be Done Wil Be Done ..
You Can Detect a Lot of What Is Being Done
You Are Not the Only One Who Could Be Targeted .
Your Enemies Don't Necessarily Know Everything You
Know
Paranoia Feeds on ltsclf .
What You Can Do Specifically
Who and What Is at Risk?
What Could Be the Reason for the Physical Surveillance? . 71
What Could Be a Threat in the Future? .
What You Can Do
When You're Under Physical Surveillance.
5. Documentation .
Photos of Actions .
1. Let's Go...
Hello! I¢'s nice that you're holding this booklet in your hands! We don't
want to keep you from reading for too long, but we'd ke to start by saying
what motivated us to put this booklet together (and what didn's).
We are quite a motley crew, active in struggles ranging from opposition
o the nuclear industry to opposition to racism against the Roma. In our
experience, we have found that it is often difficl to find an overview of
different forms of action, especially militant ones, as well as practical and
contextual thoughts on different aspects of security and action planning,
Sometimes it's the little things that cause headaches, ike how to il the fire
extinguisher with paint. A lot of clever writing has alrcady been published,
but where? Not everyone has an archive of radikal’ in their closet, and
rummaging through old issucs, as nice as it is, takes a lot of time and is
not possible everywhere. That's why we have collected information about
taking action.
Collected in the sense that we hope that while browsing through these
pages, you'll come across an idea that you hadn't thought of yet, or that
hasn't been concretely described anywhere yet, Collected also means that
most of the content has alrcady been published somewhere, and we have
copied or summarized it. Some of the texts were written specially for this
booklet because we couldn'tfind anything alrcady witten on the subject.
In the “Action Tactics” chapter,? we deliberately included many very
different options. We also received new and imaginative suggestions as
we were putting it together. We believe that it can only be a good thing to
constantly and creatively reflect on one's own forms of action. This includes
the question of which form best conveys what we want to communicate.
That is why this booklct also aims to look at actions in their context
There are thoughts about goals, communication, and sceurity. However,
\No Trace Projct (N.T2R) mote radikal ws 3 German magazine, frst published in
1976, which included practical information on how to carry out actons. It i banned
in Germany:
“N.TP e This chaper is ot inchuded in
H
translation
the thoughts on goals are very general. One of the reasons for this is that
the content of our actions s geared to the social conflicts at hand, which
are constantly changing. Each context scts its own priorities and needs
0 be discussed anew. We felt that this booklet should contain ideas that
can be applicd or transferred to different situations at different times. The
cmphasis is on practice because we wanted to be precise and show as many
tactics as possibl.
We haven't tested everything ourselves. However, we know some things
from experience, and we hav tried to verify and rescarch everything cse to
the best of our abilites. For the more complicated content in the chapter,
it is always necessary to do tests yourself before putting anything into
practice. But you know that.
We wanted to avoid creating a hicrarchy of different forms of action.
Admittedly some topics take more space here than others. Thisis probably
because the more complicated the preparation and the higher the health
sisks or the intensity of repression, the longer the descriptions will need
o be in order to be accurate. [..]
You may have some fundamental objections to publishing such a collection,
such as that we shouldn't unnecessarily give cops or Nazis recipes for
the forms of action used by the radical left, because that might make our
practices more transparent. But we consider it more important to spread
forms and ideas among ourselves. As we said, most of it has already been
published and will already be familiar to the cops. We figured that it can
be an advantage if many people in many places know and use many forms
of action, because then specific practices would not be so casy to attribute,
Another diffculty is that such a collection could appear to be the “ultimate
collection”. But it isn't intended to be, and it isn't; many things arc stll
missing, For example,the use of the Internet s given fr too little attention
in this booklet, It would be intercsting to think more about sceure Internet
access and claiming actions by email or about hacking. In our opinion,
ncither Internet cafes nor anonymization software are sufficient. It would
also be interesting to have morc information about copicrs and to what
extent or how copies can be traced back to specific devices, what is stored
and for how long, ctc
And this brings us to the next problem—as much as we would have liked
to continue to expand and collectively develop this booklet, this is not
immediately possible. However, we would like to sce additions, criticisms,
continuations,experiences with individual actions,responses, and anything
clse you can think of that would contribute to a discussion on these topics
within the radical left. In our opinion, the most suitable medium for
this (due to its relatively widespread distribution) is the Berlin-based
publication “Interiny”. Unil then, we wish you a lot of fun reading, all the
best,great impacts in your projects, and a completely different lie for all
of us.
lunaties for system change
3. Action Preparation and Execution
The Steps to Success
Originally published in issue 158 of the German magazine
radikal. The comments in square brackets are from the
editors of the original PRISMA zine.
This text summarizes some things to consider when planning actions. Itis
aimed at smaller groups rather than mass mobilizations. However, some
of the considerations can be applied to such larger actions. The text is
not meant to be a step-by-step guide to action, but rather a collection of
things that should be kept in mind if an action s to be successful. The
points themsclves arc based on concrete experiences, but are kept general
enough to be generally applicable...
Beforehand
A question precedes any action: what do we want to achieve, what is
the goal of the action? It makes a difference whether we want to c
propaganda, cause as much economic damage as possible, phy
something, or show solidarity with other struggles. Oft
achieve a mixture of these different goals
In any case, it makes sense to discuss goals as concretely as possible
beforchand. Then it's easier to think about what we want to do and what
we need in order to do it. No matter the action (whether you drop a banner
or vandalize an office...), for these initial discussions you should choose
secure places where you can be confident that you won't be overheard.
Depending on the composition of your group, it may also be important to
arrange to meet in a way that isn't visible to other friends, comrades and
ou may not otherwise spend time with this particular
group of people very often. We usually have a serics of concrete targets
in mind for direct action: every trip to the store, every drive through the
roommates, since
8
city or attentive reading of the newspaper ills an imaginary list. Once you
have decided what you want the action to accomplish, the next step is to
sclect a specific target where the desired impacts can best be achicved.
By narrowing down the goal, the tactic, and the specific location, you
now have an initial rough plan for your action! After answering the three
famous questions “what, how, and where?”, the concrete planning can
begin...
[In any case, when selecting a target, care must be taken to ensure that no
bystanders arc endangered.]
Initial Reconnaissance
The first step should always be to familiarize yourself with the target
location. Ideally, several people should take a look at the chosen location,
They should use photos, drawings, and maps to describe the arca to
cach other.
[We need to point out problems with this approach: you shouldn't have
photos, drawings,etc.lying around at home. If photos and drawings cannot
be avoided, they shouldn't be kept at home and should disappear as soon
as possible. If photos are stored digitally, you should carcfully consider
where you store them, and how to completely destroy them; more on this
in the lst chapter. The very latest that you should destroy everything is
right before the action.]
More things will be noticed with more pais of eyes, and some things are
only really noticed through the process of collective discussion. A small
gate, a hidden camera, a tree adjacent to a wall... I€'s often these little
things that later become central to the plan. At this carly planning phase,
i's important to develop an eye for what type of movement is typical in
the surrounding arca, the ways into and out of the target location, and.
possible escape routes. The area to take into account grows if you will be
driving to the action by car’ because then you'll also need to find a good.
parking space and well-chosen car routes. It would be really annoying
SNLTLR ot Later i the zine, secton on vhicle races concludes that “the use of
carshould [..] be avoided whenever posible”
9
to get caught when leaving because of traffic checkpoint or something
similar which could have been forescen.
AGeneral Plan
Based on the initial recon
ance, photos, maps, ctc., you can create a
general plan, This should include the routes you willtake to arrive and leave
which are free of sccurity cameras, the parking options, the location of
entrances on the target building, and multiple escape options. Part of this
general plan s also to decide whether the action should take place during
the day or at night, and how long cach part of the action will take (the
arrival route to the meeting point, the route from the mecting point to the
target, the duration of the action, the escape routes, including alternative
eseape routes). You should also determine the number of people needed
during this planning phase, which depends heavily on the tactics chosen
and the specific conditions on the ground. How many people are needed
for this specific action? How many lookouts? Is it necessary to cavesdrop
on the police radio or something similar? How many cars and drivers?
Second Reconnaissance
The second reconnaissance of the target location takes place with the
general plan in mind. Therefore, it should take place ata time of day similar
to the time you expect the action to take place. Especially if the action is
‘going to take place at night,it's important to know the lighting conditions
and typical traffc patterns. All participants should have seen the location
beforchand to get their own idea of the situation. During this second
reconnaissance, the main focus should be on possible sceurity systems and
details of the terrain. For example,if you are going to seale a fence, it's
important to know how it's constructed. Is it topped with barbed wire? Is
it made of a material that can be easily cut? How thick is it? Is it made
of individual panels that are only bolted together? Where are the screw
heads located, what size arc they?
After this sccond reconnaissance, everyone should know cnough about
the target to be able to decide together what tools and tactics will be
needed. It s also essential to test the planned escape routes. Are there
10
seally no surveillance cameras along the routes? Is our car really the only
one that parks there, or is the spot also used by others? Is the parking
location visible from a distance, or is it hidden from view? Is there enough
ro0m to turn the car around? Are any tie tracks left behind? It's often the
litle things that make the difference between success and falure. Another
important step is to preciscly measure the time it takes to get from the
target to where you can get into the car. If this escape time is not fast
enough, the car must cither be moved closer or driven towards the people
escaping so that everyone disappears quickly cnough. It can be uscful to
agrec on 2 meeting point after an action so that you can drive back from
this meeting point together, but these routes and locations also need to
be checked for suitability.
Part of this second reconnaissance should also involve thinking about
where the clothes and tools should disappear to after the action s carried
out. Its clear that we should at least get rid of our “outer layer” (shoes,
pants, jackets, gloves and hats) as well as any tools which leave behind
traces useful to the police. Otherwise, we can never know how likely it is
that these items will be found and linked to us at some point.
At this stage, the most sensible means of communication must also be
diseussed. Can everyone always have a line of sight to cach other and thus
communicate with signs? Do we need walkie-talkics or other forms of
All forms of communication need to be tested
femote communicatio
on the ground to make sure it isn't too dark to sc each other, or that a
previously unnoticed building docsn't block radio communication.
The Action Plan
To ereate a detailed plan, everyone involved in the reconnaissance first
gocs over all the new information together. In practice, it usually makes
sense to ask very specific questions about each report. Most of us aren't
trained to describe a situation in detail ke police officers and journalists.
Soit's important to ask cach other questions in order to collectively acquire
accurate descriptions of things. A detailed action plan begins with the
mecting point of the active participants and does not end until everyone
has dispersed.
1
[The individual escape routes should also be discussed together. Keep in
mind that your homes may be under surveillance.]
Every step in between must be clarified and recorded in a schedule. At
every stage of the action, everyone must know what needs to be done and
who is communicating with whom. What tools are needed when? How
will they get to where they are needed? And how will the tools be disposed
of? Al roles must be clearly described (driver, lookouts, people who will
be directly at or in the target....) An important decision at this stage is also
whether there should be some form of back-up. By this we mean a trusted
person who, in the case of failure or danger, can be contacted far away
from the action by phonc or other suitable means to organize external
support. This is not uscful or necessary for all actions.
[In our opinion, telephone communication during or shortly after an
action is a major security risk. We have no way of knowing if the contact's
phonc is being tapped. It may be possible to usc a burner phone with an
unused card, but even this should be carefully considered. It's probably
better to arrange a mecting place beforchand. ]
PlanB
I¢'s often a good idea to think of solutions to problems that may arisc.
A door that cannot be opened docs not necessarily mean the end of an
action. If you run through several alternatives in advance, you will be
able to deal with a “deviation from the plan” more quickly and casily
1It's even possible to decide on a completely different goal in case there
are insurmountable problems with the planned action. However, you
should also decide which situations should cause the action to be aborted
altogether—discuss beforchand the conditions under which it should not
be continued.
Immediate Preparation
In the lead up to the action, the detailed plan should be rehearsed until
everyone can confidently carry out their *role.” It's usually useful for all
pasticipants to be aware of cach other's tasks so that at any given moment
12
they can assess what stage the action is at. It is also important to set aside
cnough time in an carlicr preparation phase to talk about fears and feclings,
not only to find a *solution,”but also to make cach participant's actions
more predictable for everyone. It's not helpful if somcone acts super cool
during the whole preparation and then is panicked and erratie during the
action itself. The more we can collcctively open up about our supposed
weaknesses, the stronger the group can be when it gocs into action. There
is often a lot to coordinate and arrange during the preparation phase. It is
ofien a good test of how reliable and focused the individuals in the group
are. Set a clear and realistic timeline for getting everything you need.
Especially when it comes to tools that leave traces, it is always a good idea
not to get them from the storc around the corner, but to think carcfully
about how this or that can be obtained without being surveilled. It's also
important to pay attention to the combinations of things you buy—it may
be tempting to get cverything you need in one go at a hardware store, but
putting a crowbar, a jerryan and gloves in the same shopping cart can
‘backfire. Prepare a plausible cover story for your shopping, cven though
10 one will ask you most of the time. This will regulate the contents of
your “shopping cart”and give you a sense of sceuity:
[Keep in mind, however, that even with a good cover story, the cashier
‘may remember you after a conspicuous purchase.]
At this stage, it also important to consider the possibility of failure. What
could happen if things go wrong? Are we taking a health risk with this
action? What if the cops catch us? Who will give notice at work or pick
up the kids from school? The better prepared we are for bad situations,
the better we can deal with them. Depending on the tactic, there should
always be agreements about who can take care of whom if something goes
wrong. I¢s often necessary to involve friends who aren't dircetly involved
in the action. They don't need to be privy to all the details, but there should
be clear agreements about what should happen if they can't manage to
get in touch with you by an agreed time.
13
...and Action!
On the day of the action, give yourself plenty of time to go over the plan in
‘your mind beforchand and to prepare and assemble the necessary clothes,
tools, etc. in peace and quict. You should also give yoursclf more time
to get to the mecting point than you anticipate actually needing. Your
security depends on whether or not someone is following you and thus
surveilling the action. So choose paths and routes that give you as many
opportunities as possible to detect whether you are really alone. It goes
without saying that mobile phones or devices with GPS functionality
should not be taken along on the day of the action.
If you want to be even more sceure when you head out, get help from
friends and comrades. With help from two or three others, one can usually
make a fuly reliable judgment about whether someone i really traveling
alone. You need to prepare a route in advance that can be obscrved by the
helpers at specific points. You need to plan in advance how to communicate
the “results” whether the person is under surveillance, Take an hour or two
o think about these questions and you will certainly be able to develop a
suitable plan.*
It's important to pay attention to surveillance cameras and the like on the
way to the meeting point—you don't want the route you've put cffort into
securing to be reconstructed later. When it comes to clothing, you always
have to find a compromise between practicality and inconspicuousness.
For example, it is of little use if you are geared-out with quasi-military
cquipment, but are thus very suspicious in the cyes of surveillance systems.
On the other hand, a fine suit or high-hecled shoes are quite hindrance
for some actions. So, you'll have to find a compromise.
At the meeting place, try to get a quick sense of the mood. Is everyone
still committed to the action? Does everyone have a good fecling? When
you're ready to go, compare your watches again and synchronize the time.
For night-time activitics, give your eycs time to adjust to the darkness.
“NTP note The practice of detecting physical suveillance with the help ofa trusted
third party, called counter-surceillane, s described in more details in Surveillance
Countermeasues.*
*hitps:/fmotsace.howcesources/fsurveillance-countermeasures.
14
A normal human eye takes about 20 minutes to reach maximum visual
acuity in the dark. When the action begins, focus with all your senses. Try
t0 keep reminding yourself of the plan and act accordingly. Check your
communication system right at the beginning. Can everyone be scen or
reached? The most important rule during the action and later on, on the
way back—don't panic. Calm is a relisble companion, especially in difficult
situations. If you've planned the action well, not much can happen which
you're not prepared for. No matter what happens, you should always try
o be deliberate and thoughtful about cach of your actions. This i often
diffcult, especially in stressful situations
During the action itself—and this should defiitcly be a significant part of
your preparations—you must be extremely careful not to leave any traces
behind. This includes not only fingerprints, shocprints and car traces, but
also clothing fibers, wear-marks or identifiable features on the tools you
use, and any amount of genetic material that can be analyzed (from saliva
on a cigarette butt to hair that has fallen out). Dispose of the tools and your
“outer layer” (shoes, pants,jackets, gloves, and headgear) the same night
as the action, once you are a significant distance away from the target. It's
a good idea to spread out this disposal across different places, all of which
can'tbe traced back to you (so don't use your home trash can!). Ifyou can't
do without a car, then you'll need to find a solution for its tires or even
the entire car. The guiding principle is to rule out any connection between
apossible trace and yourself. Even a rental car won't provide any sccurity
if the rental process can be traced back. Whether a car has to be stolen
for every action or alltires have to be changed is ultimately your decision,
Last but not least, it also depends on how much cffort an investigation
can be expected to put into tracing the car.
After the Action
It makes sense, but is not always feasible, to have collective debrict,
prefrablyin the days following the action. This is when memories are fresh
and details can be discussed. Such a debrief should take into account the
preparation phase so you can draw conclusions for next time. What worked,
where did problems come up, what could have been better prepared? Were
15
there moments of anxiety for the participants, and how can such situations
be handled? Sharing individual coping strategics can also be helpful,
An important part of the post-action period is recovery. Since almost all
direct actions necessarily involve a period of intense concentration and
time pressure, it i important to allow yourself and your social environment
o recover. A mentality of “the fight is my life” docsn't help anyone, Apart
from the cffccts of this mentality on group dynamics, lack of breaks and
recovery phases also limits performance and concentration,
Some time after the action, you can evaluate its political and strategic
aspeets. This evaluation can include the initial public reactions and, on
this basis, you can assess whether the method and goal of the action
matched your political intentions. Was the impact as you imagined it?
‘Were there any shortcomings, and how can they be addressed next time?
In some cases, it makes sense to somehow publicly communicate about
the action at a later date. Although publishing an action claim may be part
of the initial plan, you can always publish an additional explanation later
Public communication should distinguish between at least three intended
audiences: the “gencral public,” the “dircct public” (.5. through fiyers in
the neighborhood), and the “scene public.” I important to think carcfully
about who you want to address, with what information, how, and why.
A Final Note on Security
Achieving complete sccurity simply isn't possible. Every action has a
risk. That means dealing with potential consequences and determining
the implications of a worst case scenario, if someone gets caught. Police
investigations often thrive on chance, but n almost all cases, it’s avoidable
mistakes that ultimately lead investigators on the right track. But mistakes
can be avoided. The key is to have as detailed a plan as possible that
specifies what o do and what not to do at each step of the action. This
way, you can think about what traces you might leave behind at cach
step. And, during the action, you can take appropriate countermeasures.
If you have to climb over pointy fence, be prepared for clothing fibers
to get caught. If you walk over sand or soil, be prepared for shocprints.
1 you make a phone call, the call can be traced. If you send a leteer, the
16
mailbox or post office can be traced. If you pay with a bank card, the data
is stored.... So there are always traces and they cannot be avoided. The
crucial question is whether they can be traced back to you. There are no
“one size fits all” solutions—we must thoroughly think through cach step
(even the preparatory steps) and, if possible, collectively discuss them.
Have fun and good luck!
Anti-Repression and Emergency Plans
In small autonomous groups—be prepared for emergencies together!
We believe it is important for militant groups to prepare for what needs to
happen if something goes wrong. In addition to conerete preparations for
the action, we should discuss the participants ife situations, possible fears,
communication channels, and what to do in emergencics such as an injury
or repression. Here are some thoughts, based ither on our experience or
our expectations.
The better we know each other and the more we prepare for emergencics
in suffcient detail,the better we can act or react at the crucial moment. In
difficult situations (e.g. particularly committed citizens acting as auxiliary
police, arrests, etc.), panic sets in quickly. Already having a clear plan of
how to react is very helpful, because at this point there's usually no time
to think. OF course, detailed preparation is not a cure-all. There are always
situations in which fear causes us to ignore all previous agreements. So it's
especially important for contingency plans to be part of the preparation.
Each individual, their fears, insecurities, and life situation should be taken
into account. Everyonc should feel safe and be able to rely on the others.
On the basis of such trust, we can overcome our fears together. Our limits
are certainly different, but there are usually solutions (c.g. by discussing
task distribution openly and honestly). For example, someone may not
like being the lookout because they know that they vill panic if they have
nothing to do and may give a stop signal befor
Someone else, on the other hand, may already have trouble throwing and
aiming even before taking fear into account, so when the excitement of
the action is added to the mix, nothing works. So think carefully about
who is best suited for cach role. Think also about preparation tasks, such
t s actually necessary.
17
as producing the action materials, shopping, writing an action claim,
publishing it the next day, cte. For example, it can be very helpful if the
people whoare building an incendiary device during the day (and thus may
come into contact with gasoline) are not present at the action that night
—this takes pressurc off everyone involved and, if someone is arrested, it
reduces the risk of traces being found on their body.
Communication Structures
Communication in small autonomous groups is not casy. Phone calls,
texts, emails... al of these modern communication channels can be easily
monitored and are therefore unsuitable for clandestine organizing. So
we continue to rely on face-to-face mectings, which of course are not
without risk. I¥'s not always easy to find a suitable place to meet and talk.
“The criteria should be that the place is unlikely to be bugged (i.c. not
‘your apartment or a bar you regularly frequent), there are no other people
within earshot, and ideally it isn't obvious from a distance that you're
having a clandestine meeting. For added security, during the meeting you
can avoid mentioning locations, names, and dates (and also avoid showing
them with hand gestures), writing them down instead. Be careful because
this can be very conspicuous.
It's also important to think about how to communicate in an cmergency
situation. After house raids and the like, the cops sometimes pay very
close attention to who is talking to whom or who is meeting up. It can
be helpful to arrange an emergency meeting point for this scenario, To
share information or arrange meeting detail, i's also a good idea to think
about who is already sceing cach other in everyday life (at home, work,
school or university) so that arrangements can be made inconspicuously.
“This can also be a way to create information rclays.
Getting to Know Each Other
If repression happens, what should we know about cach other in order to
feel safe and trust that the others will take care of everything? Although
this will certainly vary from person to person, here are some suggestions
of what information might be important:
18
* Names, legal and actual addresses, dates of birth,
+ Personal situation and responsibilities (c.g. job, children, carc for
parents, pets.)
* Living situation (c.g living with parents, alone, with roommates.)
* Who should be contacted in an cmergency?
* How do they relate to things ike stress, health, fears?
+ Distribution of tasks and preferences for actions.
* Wishes for lawyers (possibly powers of attorney.)
« History of repression (cascs, convictions, probation, surveillance...)
+ Sharing experiences of repression to be better preparcd.
+ Dealing with repression and the refusal to testify.
* What kind of support is desired in case of arrests (c.g. solidarity
actions)?
* How do they evaluate risks and successes?
* What to do in different emergency situations (cops, “good citizens”,
direct confrontation, prosceution.)
Discuss Emergency Situations Together!
Everyone should prepare for repression and emergency situations, prefer-
ably together. The book “Wege durch die Wiiste™ (Paths Thraugh the Desert)
can serve as a basis for discussion. A wide range of information is also
available from Rote Hilfe® and Ermittlungsausschuss.” Important topics
include arrests, house raids, pre-trial detention, prison, refusal to testify;
lawyers, and how trials work.
You should also discuss how to react if an injury happens. What to do
if someone is injured (lightly, moderately,or seriously)? Can people find
trustworthy doctors? One thing is clear: in an emergency, health comes
first! Remember that injuries can happen not only during actions, but also
during preparation.
tps/farchive.org/detils Weg durch.die Waeste
TP nte: Rote Hilf i a German prisoner support group.
INTE note: Esmitungsausschuss (Incesigation Commites)is 2 German legal
support group
19
4. Our Security
Traces
Let'sstart with something important—we don'twant this chapter to cause
panic! When dealing with the topic of traces, i’ casy to get the impression
that it's impossible not to leave trace. However, militant actions from the
last few years show that a lot i possible, and that successful investigations
are actually quite rare. So don't be put off and be carcfil! Knowing the
other side's capabilities and acting with caution are the most important
factors to avoid prosceution by the cops and courts.
A trace can be anything, no matter how small o inconspicuous. Every
change in the cnvironment leaves traces, so it's impossible to leave
absolutely no trace. What's important is to leave as few traces as possible,
and to make sure that they can't be linked back to you. To this end, no
expense or effort should be spared. Gloves and other action materials and
tools should always be bought new, for single use.
“The police will look for traces dircctly at the action site, on any suspects
and in the places they frequent (home, workplace, etc.) So it not enough
0 only pay attention to traces at the action site—you may also bring traces
from the action site home with you. An example is sand or soil
composition can be analyzed and identified quite precisely by forensic
laboratories. So if you bring home mud from a dirt road on the soles of
your shocs, this can prove that you walked on that dirt road. Such subtle
traces quickly become difficult to analyze. If unlucky, however,there may
be cnough of a trace left to reconstruct a connection to you, which can
then be interpreted as evidence of your involvement in an action. This is
even casicr with traces of glass or DNA, .. anything that doesn't degrade
quickly. If you deliberately leave something at the action site, you can be
sure that it will attract special attention. The same goes for action claims
sent in the mail, or if any remnants of the materials you used fall into the
hands of the police.
their
2
Securing and analyzing evidence is time-consuming and expensive. The
full repertoire of forensic gadgets is not always used. Most of the time,
the bigger the damage or the attention, the more they will invest in the
investigation.
It's also important to keep in mind that forensic methods are constantly
cvolving, and methods that were introduced recently are becoming
standardized and widely used. Precautions that we consider excessive today
may not be sufficient in the future. A good cxample of this cvolution is
DNA analysis. Thirty years ago, hardly anyone foresaw this relatively new
investigative method, which naturally meant that minimal precautions were
taken to avoid leaving DNA traces. As the example of federal prosecutor
Buback (who was shot dead by the RAF commando Ulrike Meinhof in
1977) demonstrates, with the right political pressure, traces found decades
carlicr can be re-cxamined. In this way, the State shows that it docsn't
forget, and perhaps also trics to deter today's militants
In addition to the problem that old traces can eventually be analyzed using.
new methods,these new methods can become increasingly widespread and
less expensive through their further development and standardization. The
threshold is lowering for sing DNA samples as evidence in increasingly
petty crimes on the basis of vague suspicion. The amount of genetic
material required for analysis has also been reduced.
Specific laws could also be overturncd, such as the ban on storing infor-
mation about certain physical characteristis or discases in the databascs
of the BKA” and LKA, since they alrcady allow storing information
about genctic sex.
OF course, we can only present the topic of traces in the context of today's
forensic methods. But we think it's important to take into account the
constant development of these methods, even if we can't foresce it. New
methods are often considered, discussed, and tested before they are actually
NP note: Red Asmy Faction, a West German far-left militant group founded
in 1970.
"N note: The Bundeskeiminalamt (BKA, Federal Criminal Poice Offc) s the
federa investigative police agency of Germany:
VN TP ot The Landesksiminalamt (LKA, State Criminal Police Ofc) i the State-
level police agency of Germany.
21
used. (The fact that they are then used before they are legalized is another
matter...) So we think if's important to keep an eye on these developments
and keep cach other informed by discussing them in our publications.
Phones and the Internet arc not discussed in this chapter. But just bricfly,
we think it goes without saying that phones should not be involved in
actions or their preparation. They can be used to ereate movement profiles
as well as turned into bugs. They arc full of information about you and
your contacts. Every click on the Internet leaves several traces on the
computer you are using, on the server you are accessing, and on all the
servers in between. Some of these traces can be avoided or controlled, but
that would be a whole other chapter.
‘We cannot provide a complete list of possible traces here. So it's important
that you think through all the steps yourself and consider where you may
leave traces.
“The fact that there is no such thing as 100% sccurity is used by the police
0 portray themselves as omnipotent. The evidence gathering process and
forensic investigations also have a psychological function. The point is to
use the gathered evidence to convince you that you're already found guilty.
“This is how they extort confessions. Even if the evidence is elear, it is
ofien only circumstantial and not proof of your involvement in the crime,
A convietion usually requires more than just cireumstantial evidence. So
even if the cops charge you and claim they have enough cvidence against
you, stay silent during all interrogations!
Fingerprints
Fingerprints arc a criminology classic. They come from the thin layer
of acid, grease, and dirt from our fingertips which is left on objects we
touch. Police also record the prints of the entire hand, including the palm,
Fingerprints are considered unique to an individual. When you are charged
with a erime, i's standard procedure to have your fingerprints taken for
comparison. They are still often taken with ink and paper, but seanners that
digitize them dircctly for storage in the relevant databases are becoming
increasingly popular. Meanwhile, the State has already turned its attention
to the new passport production process which makes it mandatory to
2
provide fingerprints in order to obtain a passport. It remains to be seen
how this will affect police practice. Fingerprints are stored in databascs
called AFIS (Automated Fingerprint Identification Systems) in order to
compare prints from current and past cases.
The best remedy for fingerprints is to consistently avoid leaving them.
“This means not touching any objects that could fall into the hands of the
police with your bare hands to begin with,rather than relying on cleaning
them off. Fingerprints are on of the most durable traccs. They are often
left carelessly and can persist for years. Even on objects that have been
submerged in water for years, fingerprints can still be recovered under
certain conditions. Almost any material can bear fingerprints.
Other countermeasures cxist. To remove fingerprints, thorough cleaning.
with a degreasing agent (such as an alcohol-based cleaning agent) is
secommended. Glass and smooth plastic surfaces arc the casicst to clean;
it's cnough to thoroughly and intensively clean and wipe them with an
alcohol-based cleaning agent or,if used thoroughly, dishwashing soap.
When removing fingerprints from metal surfaces, it s imperative to use a
surface-altering agent such as steel wool. Fingerprints are slightly acidic,
s0 they etch into metal. Cops can make them visible again with the help
of a laser, depending on their motivation. Scratching the surfice with
steel wool or sandpaper is one of the best options. Unpainted wood can
be trcated like metal. Painted o coated wood can be treated like plastic
surfaces. Although fabrics are poor carriers of fingerprints, they can be
identified by their unique composition, and they also carry DNA. Be
carcfil what you leave behind at the action site!
If you have touched a piece of paper with your fingers, you should make
aclean copy then destroy the original, as it’s impossible to clean it. When
photocopying, you should make sure that you never dircetly touch the
copies with your hands. Since it can atract unnecessary attention to wear
gloves in a copy shop, you should simply make a few blank copies before
and after the pages you want to keep clean. Then touch the stack of paper
only from the outside and place it in something like a new folder Don't use
acopy shop where you are known. Use disguises because it may be possible
for the cops to trace which specific copier was used (the same applies to
laser printers, sec Writing Traces, p. 34). Copiers can store information on
23
what they've copicd, and this information is not overwritten by making a
few additional copes
Gloves are the simplest and safest way to avoid fingerprints. But there stll
are a few things to keep in mind—rubber gloves tear casily and fingerprints
remain on the inside and on the cuff, Thin latex gloves can cven allow
fingerprints to pass through them. One option is to wear two pairs on
top of cach other or to usc dishwashing gloves. In contrast, fabric gloves
have the advantage of being difficult to leave fingerprints on. But coarsely
woven fabric gloves can get holes, especially with repeated use, and thus
should be avoided. Fabric gloves also absorb much mor dust and DNA
traces than rubber gloves, and are virtually impossible to clean. Leather
gloves are relatively expensive and, as with all gloves, must be disposed
of after use. This is a significant disadvantage in our opinion. In general,
keep in mind that traces remain on the inside of gloves. In our opinion,
gloves that have been used during an action should always be disposed of.
“This is because traces that remain on the gloves which can be linked to 2
specific action. Gloves also leave traces of their individual profile or minor
irregularities at the action site (sce Material Traces, p. 36). During house
raids, cops are often particularly cager to find such equipment.
There are other ways to avoid leaving fingerprints, especially when wearing
gloves is not an option. One is to apply a thick layer of liquid bandage to
the fingers and let them dry. Another is to place regular band-aids around
or on the fingertips. We do not consider cither of these methods to be
particularly sceure, they are just a way to reduce the amount of traces.
A new method currently being tested in the U.S. makes it possible to
analyze the chemical composition of fingerprints. This analysis makes it
possible to identify and detect drugs, explosives and certain metabolic
products, and draw conclusions about possible “perpetrators.” The analysis
process s fast and can be done dircctly on site. Although it has not yet
been used as evidence, i’ only a matter of time.
24
DNA Traces
In recent years, DNA traces have become an increasingly important part
of dealing with repression. The repressive apparatus has a strong interest
in emphasizing both their inevitability and their lack of ambiguity.
1It'strue that DNA traces can often only be avoided with significant effort
and that they are almost impossible for us to detcet due to their near
invisibility. And they are often considered irrefutable evidence if found
at a erime scenc. How these traces got there is often hardly taken into
account. For example, a blanket used to cover a tool can carry the DNA
traces of someone who slept under it years ago.
DNA traces cannot be avoided, and under certain storage conditions they
simply do not degrade. Decades after the fact, cases arc being reopened
based on DNA evidence colleeted carlier. DNA traces are left behind by
blood, hair, saliva, urine, and skin cells. In other words, everything that
comes out of your body or falls off it. But not every trace is sufficient for
DNA comparison. Laboratory testing still requires a certain quantity of
DNA material, preferably one or more intact cells. But the technology is
becoming increasingly sophisticated.
DDNA analysis is expensive. This means that it's not ordered in every case.
Generally, the greater the political or cconomic damage, the greater the
technical effort. Though this may change in the near future. Cheaper tests
are being researched and DNA analysis may become the standard. DNA
databases have been flled for years.
1I¢'s relatively casy to determine genetic sex using DNA. To be able to
analyze the trace beyond that, the police need a comparison sample from
you.Such a sample i cither obtained during an 1D check or from personal
items such as a comb found at your workplace, during house raids, etc
There have also been instances of police forcing relatives of defendants to
give samples because their DNA is similar. You should never give samples
voluntarily. Protest and object, don't sign anything! In some cases,it has
been possible to prevent or at least delay the submission of DNA samples
with the help of lawyers.
25
Since it difficult to avoid leaving DNA traces, it's important to minimize
them, This starts with not taking a piss near your target or leaving
cigarette with spit on i, It's best not to smoke at all during an action.
Avoid hair traces by wearing caps and balaclavas. Long sleeves, even in
summer, reduce the amount of skin particles and small hairs that fall of:
A face mask helps aguinst saliva and nasal mucus.
1f you bring tools and bags with you that you have previously stored at
home, make sure they are free of not only fingerprints but also hair and
skin cclls. They can very much carry DNA. The same gocs for your clothes
and shoes. It's best to keep everything you bring to the action separated in
clean containers, such as unused garbage bags. You should avoid storing
important action materials at home. Hair from your pets can also be
traced back.
Action claims sent through the mail are often cxamined for DNA traces
on the paper, the envelope and the postage stamp. Saliva on the adhesive
surfuce of envelopes is particularly easy to analyze because it docsn't
degrade. When producing anything that could fall into the hands of the
policc, such as letters and the remains of your action materias, you should
always minimize the sk of leaving DNA traces.
Options for Creating a Clean Room
For cartain tasks, it makes sense to set up a “clean room?” that is more or
less free of DNA. This soom's fnction is both to minimize the traces you
‘might leave on an item and—to the greatest extent possible—to minimize
leaving traces in the room tself. This is certainly time consuming and not
inexpensive, but ultimately you have to make your own decisions about
how sceure you want to be. When weighing sccurity precautions, consider
not only the intensity of the action, the motivation of future investigators,
and your own security needs, but also the likelihood of an action item
flling into the hands of the authoritics. For example, you can be sure that
letters sent to the press will end up with the police sooner or later
‘The following description may scem extreme to many, and certainly not
all of the following precautions are necessary for every action. However,
in light of the rapidly developing ficld of DNA analysis, we think it's
26
important to be aware of the issues and risks involved. Choose the
precautions you feel are necessary for your action and don't be deterred!
To set up a clean room, you'll need to put on protective clothing before
entering the room for the first time to avoid leaving DNA traces in the
room. You can use coveralls (still in their unopened packaging!) from
the hardware store, which are relatively inexpensive. Put them on and
also put on an unworn balaclava—pull the hood of the coverall over it
Bathing caps arc also good for covering your hair, as they arc cven more
impermeable and your hair won't be able to poke through. Next, place
cach foot in a garbage bag and tape the bags to the legs of the coveralls
Then put on rubber dishwashing gloves and tape them to the sleeves. 1f
possible, put a mask over your mouth to block droplets of saliva, and put
on protective goggles that also cover your cycbrows. Always work in pairs
and make sure no skin is exposed.
Choose a place to work where your hair and skin cells are not already
fying around. It should also be frce of hair from a dog, cat, o other
animal companion that could be classified as your pet. For example, use
the basement or garage of friends (who are not politically active), or rent
a hotel room. Set up a clean work surface, preferably with tarp, or if you
want to be on the safe side, st up an unused tent in the room. This tent
will at least keep most traces of your work inside, and you can dispose of
it securely afterwards.
When you work, you should have different garbage bags ready and
scparate the waste according to how risky it is for you (e.g. waste from a
device component in a bag, the Ziploc packaging in another, ctc.) When
scparating waste, you should also consider which packaging has your
fingerprints on it and which docsn't. Obviously, none of these garbage
bags should be put in your houschold trash.
Be aware that working in these clothes is both sweaty and tiring, and
consider relicving cach other or sharing the work if necessary, as interrup-
tions will require you to change clothes again. Remember not to seratch
your head or face while wearing gloves. For cxample, a good division of
laboris to have one group prcpare the clean room and another group enter
it to work. Store finished components or items in new freezer bags or
Tupperware containcrs.
27
When you put on protective clothing, and at every step of the process,
think about what items your DNA traces may adhere to. For example,
if you bought something in packaging, you probably handled it without
gloves so it may have skin cells on it If you touch the packaging with clean
gloves, you can transfer DNA from the packaging to the gloves and from
there to the items you're working on. To avoid this, you must work with
alot of discipline and change your gloves several times, which is casier to
do i you wear a second pair of gloves over the taped gloves."
Artificial DNA
Artificial DNA is a new method of deterring and prosceuting theft. It
may be less relevant for the radical left at the moment, but who knows
what the future holds? Like human DNA, artifcial DNA is unique and
uniquely identifiable. It is placed in an adhesive carrier liquid that glows
purple under UV light, along with equally unique micro-platclets. The
substance can be applied to valuable objects with a brush, or buildings
can be cquipped with so-called DNA showers, The marking on objects is
permanent and resistant to normal cleaning. If you come into contact with
the substance, it willstick to you for about six weeks. This relatively new
process was introduced as a pilot project at the end of 2009 at schools in
Bremen, Germany in two residential arcas and in some petrol stations. It
has been used in the United Kingdom and the Netherlands for some time.
Scent Traces
A more recent development s the collection of scent samples, as was done
during the raids on militants suspected of opposing the Heiligendamm
G8 summit in 2007. Although thesc are rather dubious, even according.
to the BAW," they could contribute to an “overall assessment”. Most
importantly,they are casier to obtain than DNA samples.
YN TP note: For more information on creating @ lean room, see “DNA You Say?
Bum Everything to Burn Longer: A Guide to Leaving No Traces”*
hetpse//notrace how/resources/fdna-you-say
NI note: Bundesanwalischaft (BAW) is a name given to Germany’s federal
prosecutor office.
2
According to scientific findings, every person has a unique and unmis-
takable scent. Even the most meticulous cleanliness and hygiene cannot
prevent this scent trace, known in technical jargon as a “human scent
signature.”
It is made up of various components, but mainly of decomposed skin
cells. People shed these every second, whether they are sitting, walking
or standing. The decomposition of skin cells by bacteria produces gascs
that can be detected by sniffer dogs with their highly sensitive noses. The
goal is to match body scents with scent traces that have been left at a
Shoeprints
Shocprints are an often underestimated potential danger. They are as
individual as fingerprints and can be used to draw conclusions about the
height, weight, gait, ctc. of the person who left them. If the shoe that
left the shocprints is found during a house raid, it can be identified with
relative certainty, depending on the quality of the prints. Traces of soil or
plant residuc left on the shoe will do the rest. It i therefore advisable to
dispose of your shoes after an action, especially if you have walked over
snow,soil .
However, shocprints don't depend only on the shoe's model, but also on
the way it's worn. All shoes worn by the same person will show the same
type of wear. If shoceprints are left in soil or snow, the police can make a
plaster cast from it. Using this cast, they can often not only identify the
shoc that left the print, but also match other shoes worn by the suspect to
the cast based on the specific wear patterns found on the cast. So don't use
old, worn shoes of yours, especially i you have to walk on soft surfaces.
If you really want to be sure, buy cheap shoes just before an action and
throw them away afterwards. However, there are bound to be DNA traces
on shoes you used, so never dispose of them near the action site.
Another way to make the cops' job more difficult is to wear socks over
your shocs. This disguises the model and profile of the shoc and can also
protect against video surveillance. But before doing this, try walking and
running with the socks on.
29
Vehicle Traces
You should think carefully about the type of vehicle used during an action.
Think about whether a car is really necessary, because it brings many risks
Cars leave behind tire tracks and, in the event of an accident, traces from
the car's paint. Traces (especially paint) from an accident can be found
both on the car and at the scene of the accident. Tire tracks and paint
chips can be used to determine the car's model, and if the car is found, to
determine whether the traces were left by this car specifically. Changing.
the tires,if possible both before and after the action, can make it more
difficult to identify the tire tracks. Simply changing the tires after the
action is not cnough, as the police may be able to compare the tire tracks
found at the action site with tire tracks outside your home or in your
garage. Also, when using a car, watch for leaking oil or fluids.
But by far the most important identifying feature of a car is its license
plate. In order to pass at least one license plate check without being pulled.
over, the car's license plate can be swapped with another. Since most of
us aren't able to manufacture license plates, you can steal them just before
the action. It's important that the car from which you steal the plate is the
same model and color as the one used in the action, because, s a standard
procedure, cops check the license plates of cars and know whether they
have been reported stolen, their color and model. If the car hasn't been
reported stolen and has the correct model and color, the ikelihood of being
pulled over is somewhat reduced. Stolen license plates will however not
pass a proper vehicle inspection.
To prepare for the risk of a vehicle inspection, you should hide your action
materials well and, if possible, not in the obvious location of the trunk.
Make sure the vehicle meets all legal standards. In Germany, don't forget
your legally required warning triangle and first aid kit
To remove a license plate, a serewdriver will usually do the trick. Try
this for the first time in a quict place where you can work without stress.
After unserewing it, you can use double-sided tape to attach the license
VN TP e I you steal a license plate from a cas, you can replace it with another,
randorm lcense plate (¢hat cannot be traced back to you). This wa, it might take longer
for the ear owner to notce the theft and report the lcense plat as solen.
30
plate to your car (watch out for rain) so it's casy to remove after the
action.* Alternatively, you can smudge or mask license plates, especially
on motorcycles, but this is conspicuous. Dealing with the license plate is
also important for countering the increasing surveillance by toll and traffic
management systems. Toll systems are sometimes used for Automatic
License Plate Recognition.
Be aware of the risk of leaving traces in the car and try to avoid this, e.g. by
packing the action materials well. In our opinion, it is almost impossible
t0 avoid leaving DNA traces in the car. Not only is a car a good carrier
of traces, but it is also casy to track if a covert location tracker has been
installed on it. The use of a car should therefore be avoided whenever
possible.
Bikes can be a good alternative. They also leav tirc tracks behind, which is
often overlooked. We therefore recommend that you do not park the bike
in the immediate vicinity of the action site. Depending on the surfices,
it may be a good idea to change the tires before and after the action,
Individual features such as brand stickers can be casily covered with tape.®
A brightly colored bike can easily be an eye-catcher. As with cars, it is
important to meet the legal requirements for bikes, cspecially when you
are out and about at night.
Tool Traces
There are many ways that tools can leave traces, and each tool i different.
Thercfore, we can only write a few basic things about the topic here. By
ool traces, we mean identifying traces on both the tool and the object the
ool i used on.
Each tool s unique and can be identified through both smallirregulasities
from its production process, and normal wear and tear. Each tool leaves
N TR note:Rather than tape, e reco
o attach the license plate to the car.
BN.T not: Covering features with tape s not ideal, a a taped up bike can look
conspicuous. In addition, many bike features (c.g.the model and shape) cannot be
concealed with tape. One solution is to steal s new bike for each setion and dispose of
it afterwards.
nd using a “magneticlicense plate holder”
31
unique traces on the object itis used on. For example, a cut sheet of paper
can be matched to a specific pair of scissors (only if the cops have the
scissors, of course). If the cops do not have the tool in their possession,
typically only the type of tool can be determined, at least for mechanical
tools which come into direct contact with the object the tool is used on.
Therefore, you should dispose of bolt cutters,screwdrivers, or whatever clse
is used in an action—get rid of any tool that came in dircet contact with
an object it was used on. Unfortunately, getting rid of the tool afterwards
s not cnough by itself. To stay with the scissors and paper example, the
cops can not only match the cut paper to a particular pair of scissors, but
also determine if separate picces of paper were cut by the same scissors. So
if you open a fence with the same bolt cutters you used to build your loft
bed, the cops will be able to determine this, cven if the tool is long gone.
“This is why it's necessary to acquire new tools for an action in order to
worlk sccurely. They don't always have to be the best and most expensive.
Consumables such as tape, ope, cable (and their remnants) can be matched
0 cach other. A small picce of cable in your home that matches a cable
in the cops' possession can be a strong piece of evidence.
‘When working with cither tape o glue, you need to be especially careful
about cleanlincss, as both collect dust and DNA traces.
Identifying traces can also be found on tools you make yourself, such as an
incendiary device, Such traces are not imited to DNA or fingerprints. For
example to determine whether the same person made separate incendiary
devices, it's often sufficient to cxamine identifying characteristics of the
way the devices were constructed. Everyone interprets and implements
a general, simple st of instructions differently. For cxample, everyone
ties knots in a particular way, tapes something differently, uses a different
construction method, and so on. The lst does not end there and identifying
characteristics cannot be completely avoided, but they can be reduced
if you are aware of them. Even taking turns within the group to build
materials for the action makes it harder for cops to attribute them to
a specific group o person—this is cven more relevant if an incendiary
VNP note: And i therefore secovered intact by the police.
32
device fils to ignite.'* Additionally, sharing the task of building materials
prevents unnceessary specialization within your group.
In the self-critical dissolution statement of the K.OM.LTEE." published
in 1995, they wrote that the cops were only able to easily attribute some
actions to them because they always used the same type of igniter for
their incendiary devices. So the decision for or against variation in device
construction has to be made consciously and contextually. This also applies
to possible variations in the chemicals used for an action and, as far as
possible, their mixing ratios. Similarly, you should not always use the
same brands or component types. In general, the simpler the igniter, the
less evidence it will leave behind. A Molotov s the casiest to keep clean,
and a chemical delay mechanism leaves fewer traces than a mechanical
or cleetrical one. Serial numbers on components can also be a problem,
especially with clectrical delays. In the mid-19805,an alarm clock used ina
RZ* action was attributed to Ingrid Strobl due to a large-scale operation
by the BKA in hardware stores. Since, according to the BKA, the RZ
always used the same model of alarm clock, the stock of this model was
given a unique serial number and everyone who bought it was filmed.
This operation resulted in two people being jailed for a long time, and the
radical left movement was thoroughly investigated in a “§1292” case."”
W therefore recommend varying the selection of means and materials,
such as alarm clocks. It is difficult to remove serial numbers from alarm
clocks because they are often located underneath fixed components.
Embossing marks in metal can be milled out, but can nonetheless be
restored by the cops because an embossing dic also deforms the metal
underneath. Embossing marks can only be permancntly removed by
embossing o chiseling over them, as this changes the structure of the
entire pice, just like the initial embossing process
VNTE note: The K.OMITE . was a German far-left m
1994 and 1995,
"N.T:P note The Revolutionie Zellen (RZ, Revolutionary Cell) were a German
far-left militant group acive from 1973 to 1995,
NT note: The term *§1294”refers o & pasagraph in the German penal code that
deals with the formation 4 terrorst association.
at group active in
33
Fire Traces
Even though you must always be prepared for the risk of an incendiary
device fling toignite and thus leaving traces, it should be noted that even
after a successful fire some traces can be analyzed. A fire leaves precise
clues about what materials were used, the type of igniter and the place
where the fire started. The police can reconstruct a lot from traces of soot,
the gases in the air at the scene of a irc,as well s how and to what extent
something was burned. Again, it is important to vary and use the simplest
possible means. Always using the same mixture of accelerant or the same
type of igniter is like leaving an autograph.
Writing Traces
Handswriting is very individual and casy to attribute on the basis of the
lincs, the dots when the pen is picked up or put down, and the amount
of pressurc applicd to the pen. Calendars, diaries, handwritten letters and
even shopping lists can be used as comparison samples. The color and ink
of the writing instrument or the composition of the pencil lcad can also
provide clucs.
Block letters are usually less identifying than cursive because many
lin characteristics are missing. Felt-tip and fiber-tip pens leave behind
identifying writing characteristics (c.g. depending on the position of the
hand o the pressure exerted when writing), but less so than, for example,
‘ballpoint or fountain pens.
Remember to always write on a firm surface, Witing presscs through the
‘material underneath. If you write on a pad of paper, you will leave leave
marks not only on the next sheet, but also on the following sheets. The
best writing surfaces are glass or metal. Of course, nothing handwritten
should be Ieft behind or published—these handwriting tips are meant to
be helpful for writing messages to cach other.
Grammar,spelling, vocabulary, regional diosyncrasies and dialect can now
be compared using computer progeams. This analysis is not as conclusive
as handwriting analysis, but it's becoming increasingly sophisticated. The
BKA has a database of extortion letters and action claims that the police
34
use for comparison. In one blackmail case, the perpetrators tried to disguise
the fact that they were native German speakers by making grammatical
mistakes, but the cops were able to detect this because the authors correctly
spelled difficult words.
‘Wiite simple sentences, avoiding unnecessary use of foreign words or jargon
from your professional feld. Vary the spelling of dates, abbreviations, and
similarly distinctive references. An investigation into the alleged members
of the “militante gruppe”™ demonstrated that the police substantially cross-
compare the content of action claims. Keywords and even slogans that
appearin other texts—even publicly signed ones—are used by investigators
to sniff in certain directions.
Proofiead your texts collectively and take turns writing them. This not only
prevents specialization, but also protects you because everyone has their
own individual writing style. In the best case scenario, the texts cannot
be directly attributed to one person. Write only the bare minimum. The
shorter the text, the less material you give the cops.
L
It's becoming more popular to use a Linux computer with a “live system”
that runs in memory. But we should briefly discuss problems with printing.
Printers leave traces, so your home printer is not suitable for anything
sensitive. At least color laser printers are known to hide their serial number
in the printed sheet. We do not know if this problem also applies to
copiers, but it should be assumed. Keep this in mind when printing
anything! The same problem exists with CD and DVD burners. They burn
the unique serial number of the device onto the CD.
SNTP noe: The militante gruppe (g, militant graup) was 3 Gers et
militant group active from 2001 to 2009
NP ote: The original PRISMA ine included several paragraphs about sendingg
action claim through the Internet is almost always a better approach. On his topic,
see the zine “How to submit an anonymous communiqué and get away with it"
*hitps:/fmotsace.how/zesousces/fhow-submit
N2 note: For more information on how printers hide information in printed
sheets, sce “Printer Tracking: Is Your Printer Spying On You?">
*hitps://notrace.howzesources/Fprinter-tracking
35
Material Traces
By material traces (also known as “trace evidence”), we mean all traces
that are unintentionally left behind on you, on your clothes or in places
you have used. Again, there is no such thing as 100% security, but we can
at least make the cops’ job more difficult.
Let's start with traces on your clothes. Though invisible to the naked cye,
there are many traces on your clothes that can't necessarily be removed by
washing them. Depending on the type of action, these traces can be used
by the cops in different ways. If you use spray paint, you can be sure that
even though you can't see it ine particles of paint will be on your clothes,
especially on your pants and shoes. The police can make these particles
glow with a special lamp which is available in every police station. These
traces of paint cannot be removed.
It'salso impossible to remove the fine glass particles that are created when
a pane of glass is broken. Unfortunately, these particles can be attributed
10 a specific pane based on the type of breakage. Again, washing clothes
is of litele help. Blood stains are also impossible to remove,
Disposing of your action clothing is often the only way to be as free of
traces as possible. A simple, inexpensive coverall from the hardware store
can help. You can take it off soon after the action and wear inconspicuous
clothing underncath. However,be sure to practice taking it off beforchand
and, if necessary, cut the bottom of the pant legs a lttle so you can get it
over your shocs. Under no circumstances should you dispose of it near the
action site,as it is sure to contain at least some traces of your DNA. We
have already covered the topic of shoes and shocprints.
Any clothing you wear will leave traces on your body. This is especially
important if you are wearing gloves, as the cops will be able to tell that
you were wearing gloves, and which ones, by looking for traces of fibers
under your ingernail, for example. Disguises such as beards and wigs also
leave traces. Although it's almost impossible to prevent this, you should be
avare that even after changing clothes and putting some distance between
yourself and the action site, you will not be completely free of traces, and
You may have left traces of fabric behind.
36
Itis important to not wear anything with buttons that could get lost, and
to avoid long scarves or clothing with fringes. Not only will they hinder
your escape, but fabric can easily be left behind at the action site.
If you come into contact with gasoline during the action or while building
adevice, you should be aware that the scent is almost impossible to remove,
which may be a problem if you are stopped by the police. Be careful not
to spill accelerant on your skin or clothing when throwing a Molotov: The
problem here is your own sense of smell—your nose develops a certain
tolerance to a smell after being exposed to i for a long time, and you will
1o longer be able to tell if you smell like a small gas station.
1 this is the case, and for example if they are investigating an arson, the
police may put your hands in plastic bags so that they can later analyze
whatever traces were on them. This i especially true for traces of gunshot
residue that are eftafter firing a gun. Smoke residue tests are now also used
to determine if an arrested demonstrator shot a fircwork or if someone
set fire to a car with firlighter cubes. Traces of smoke often remain even
after washing, which is another reason to dispose of your gloves.
Making action materials can also leave traces. I you work with powdered
substances, you must assume that both your workspace and your clothes
will be full of them. As far as we know, it's impossible to completely clean
aworkspace such that nothing is found by chemical forensic methods. So
if you want to be on the safe side, your home should not be used for this
type of work. Instead, use places which scem safe and cannot be traced
back to you (i.c. not places linked to the radical left), such as abandoned
buildings. Wherever you end up working, you should be careful to avoid
leaving behind any fingerprints, DNA traces, or picces of wire, no matter
how small
Purchases
You should be especially carefil when shopping. Buy only one item at a
time in a store. Pay with cash, not a eredit o debit card. Destroy your
seceipts. Think carcfully beforchand about what you are going to buy and
where, and perhaps test the store with something inconspicuous to fecl
it out.
37
Large stores with lots of customers allow for some anonymity; but usually
have surveillance cameras. Sometimes the footage is deleted after 48
hours. Take advantage of this and plan ahead, but don't rely on it. Its
always better to shop a reasonable amount of time before an action. This
way, you won't be in a hurry and get carcless if something isn't available.
Small stores have the advantage that they often don't have surveillance
cameras, but cashiers can be very good at remembering who they sold
what and when,
Small disguises can go a long way to make you unrecognizable. From non-
prescription glasses to fake beards, wigs, colored contact lenses and hair
dyes, from suits to jogging outits, there are no limits to the imagination,
Even theatrical makeup or latex masks can be uscful. However, you should
feel comfortable in your disguise and appear normal and inconspicuous
If possible, always buy everything in packaging. Ask for a bag, the cashier
will often pack your purchases for you. In winter, it can be inconspicuous to
shop with (unused!) gloves. If gloves are too conspicuous you can use liquid
bandage to somewhat reduce fingerprints (sce Fingerprints, p. 22), but
this docsn't completely prevent them, and you will still leave DNA traces.
Do not go shopping with your car o motoreyele. Of course, you should
also leave your mobile phone at home. The same precautions apply when
shopping as when doing reconnaissance at the action site. I you do actions
frequently,vary which storcs and brands you usc,as wellas the time periods
and days of the wek you buy certain items. Sometimes it's worth traveling
a bt further away or even to the next town. Make sure it isn't possible to
determine where you live based on your purchases.
For specialty parts, come up with a story that explains why you need them
for legal reasons. Do your rescarch beforchand. Also prepare a story for
small talk with other shoppers,just in casc. Some chemicals require your
signature. Practice fake signature and use block letters for forms. Bring
a felt-tip pen (sce Witing Traces, p. 34).
38
A Few Research Tips
When you prepare for an action, you leave behind not only material traces,
‘but digital ones as well. Here arc a few basic procedures for doing rescarch
in preparation for an action.”
“The books you order or borrow from a library can be traced back to you,
and the cops check the library accounts of suspects. Avoid libraries at all
costs. Some libraries are also under video surveillance. [..] Leave your
mobile phone at home when doing reseasch.
Remember that Internet cafes often have surveillance cameras, so try to
avoid them.[...] You should be aware that even in cafes without cameras,
staff may still be able to remember you. Try to wear disguises and be as
inconspicuous as possible. Remember that your fingerprints can also be
found on cash you handled, at least for a short time.
Technical Surveillance
Originally published in Repression und Widerstand
(Repression and Resistance). With small additions from
the editors of the original PRISMA zine.
What technical capacities are used for surveillance? And how can we counter
them?
TP note: Tn the original PRISMA zine, this section assumed that you would
do reseasch for an action using a public computer at an Internet cafe or a similsr
location. We advise against this, and therefore omitted most of the original section
i this ranslation. From “How to submit an anonymous communiqué and get away
with i€
“The geners recommendation for most people is o use s pessonsl computer
thati only for Tail,on public WAFi. ...] Public computers themselves could
be compromised at the hardhware level or through intention collsboration
betuween their owner-operatorsand aw enforcement,and this could be almost
mpossible to detect.”
*hitps//motrace.how/resousces/fhow-submit
39
‘We've all seen it in spy movies: bugs in lamps and cameras behind one-
way mirrors in 1960s thrillers. Or the modern operations centers in more
recent movies that can lsten in on every phone call within seconds and
track everyone via satellte surveillance.
“The reality is somewhere between these two portrayals. Not every police
force has access to the same technical equipment (and trained personnl),
and will only request it if the associated costs can be justificd with
an appropriate threat scenario or scrious “crime” that has already been
committed.
Nevertheless,the State’s intercst in prosecution and eriminalization should
not be underestimated. Police and intelligence agencies will ry to justify
the purchase and maintenance of expensive cquipment by using it as
frequently as possible.
This text explains the current technical capacities of police and intelligence
agencies (as of 2006). The most effective countermeasures are very simple
and can be implemented without detailed technical knowledge: meet
in places where surveillance is highly unlikely and do not use risky
communication channels (phone, mail) for political purposes.
Monitoring Enclosed Spaces
All of the instruments available for monitoring enclosed spaces have
two major disadvantages: they require advance preparation and they are
relatvely expensive.
Bugs
Of all the lstening methods described here, bugs provide the best sound
quality. Depending on what they are used for, they can be very small
(2-3 millimeters thick), but can also be the size of a sugar cube or even
a matchbox. They are almost indistinguishable from other clectronic
components and are sometimes camouflaged, i.c. permanently installed
in other objects, rooms or vehicls.
Preferred places to install bugs are electrical outlets, light switches, indline
phones and other clectrical devices that are continuously supplied with
40
power. If necessary, holes are drilled in furniture to place microphones as
close as possible to the people speaking.
Bugs can eavesdrop on conversations within a radius of about 10 meters.
One bug is enough to monitor a room of about 100 square meters
Depending on it battery, bug can operate between several weeks (button
cell) and several months (9 volt battery). Of course, bugs thatare connected
to an electrical source or a phone cable will “live” longer.
Bugs with built-in radio transmitters arc among the larger variants and.
can reach radio ranges of several hundred meters or up to two kilometers,
depending on the building.2* Electrical and phone lines can also be used
to transmit the intercepted conversations.
Special microphones hidden in landline phones or their jacks can be
remotely activated and listencd to,
Countermeasures against bugs:
Of course, anyone can search for bugs themselves. Special bug detectors
are available for purchase at different price ranges, and services can also be
hired. Professional bug hunters charge lot of money. And they usually
have a history as intelligence agents, military personnel, or police officers,
and will therefore be wary of fouling their nests.
If you find bugs it's proof that a bugging operation took place, but there's
no guarantce that there aren't more hidden microphones which haven't
been found.
Playing music, tapes of other conversations, or the radio docs not help
prevent bugging. Modern technology can casily ilter out individual voices.
Special audio jammers can help. The noise they produce is barely audible
to the human car, but prevents the recording of conversations. They also
help against the other cavesdropping capabilities described below and are
available from around 500 euros.
NP moter As of 2025, it appeass that the majority of bugs used by police
and intellgence agencics that remotely transmit theie recordings do so throvugh the
mobile phone netveork. Those bugs can transmit theie recordings as long as they can
communicate with cell towes.
a1
If you really want to be on the safe side, you should generally refrain from
mentioning important dates, places and actions and instcad use pen and
paper and then destroy what you've written.
8]
Stethoscapes
Rooms can be listened to from the outside using electronic stethoscopes.*
These devices can amplify the smallest sound waves that pass through
‘walls, doors, and water pipes up to 40,000 times to make them audible.
“This can be prevented by audio jammers cquipped with special contact
resonators.
Window Panes Vibrations
‘The noise generated in a room causes the window panes to vibrate slighly.
Using an invisible infrarcd laser, these vibrations can be measured at
a distance of up to 200 meters and converted back into sound waves,
Complete systems (ransmitters and receivers disguised as cameras,
amplifiers, and noise filtrs) are available for less than 10,000 euros and
are therefore likely to be used relatively frequently
The drawbacks of this technology are that there must be a line of sight
103 window in the room being monitorcd, and that the results are rather
poor for double-panc windows.
Video Surveillance
Cameras with built-in radio transmitters can be as small as a matchbox,
And the lenses of such cameras are barely larger than pinheads and can
be camouflaged very effectively. For example, they can be hidden behind
sickers or disguised as Phillips-head screws. Completely camouflaged
systems are also available in the form of smoke detectors, desk lumps, and
other everyday objects
These special cameras can capture footage of very high quality. Their
operating time and radio range are comparable to those of acoustic bugs.
SN.TR not: Contact microphones* can also be used for the same purpose
*hitps:/fen.vwikipedia.org/iki/Contact_microphone.
42
Cameras can be found with bug detectors i they are equipped with radio
transmitters.
Phane Surveillance
In 2004, more than 30,000 phone surveillance orders were issued in
Germany to investigate criminal offenscs. In more than 60 percent of
the cases, the conversations of uninvolved people were tapped, while
the conversations of suspects accounted for just under 40 percent. These
figures do not include wiretaps by intelligence agencics or preventive police
Internationally, Germany is considered the world champion in wirctapping,
and the numbers are increasing every year. In December 2005, the new
federal government announced that it would revise the related legal
regulations by mid-2007 (under pressure from the Federal Constitutional
Court).
According to the law, anyone whose phone has been tapped must be
informed after the investigation is completed, but this rarcly happens.
“The high rate of cases of phone surveillance comes from the fact that it is
one of the easicst surveillance measures to carry out—they simply obtain
a court order and notify the relevant phone company. All calls to the
targeted phones are then redirccted to another number or voicemail for
‘monitoring. Because all the equipment used is digital, there s no telltale
crackling or hissing.
‘The phone companies do not record calls without a court order. However,
all call metadata is recorded—the exact details of when and for how long
the call was made and to which number This metadata can be crucial to
police investigating crimes that have alrcady been committed. For example,
it can provide a basis for identifying social connections in a scenc, or help
prove the existence of an alleged criminal association.
The BEV* and forcign intelligence agencies are constantly listening to
as many phone lines as possible for tellale keywords. This surveillance is
T note: The Bundesamt fir Verfassungsschutz (BEV, Federal Ofice fr the
Protection o the Consitution)is Germany's federal domestic inteligence agency.
3
fully automated with the help of sophisticated voice recognition software.
“This software is capable of linking information together to create patterns
of meaning. Conspicuous conversations are stored and then manually
analyzed. Itis highly likely that voice recognition will also make it possible
to identify somebody with a recording of their voice.
All international calls are intercepted. Intelligence agencies will almost
certainly intercept all satellite calls
The most advanced interception system of this kind is operated by the
English-speaking intelligence agencies under the name *Echelon”. The US
National Sccurity Agency (NSA) alone employs about 28,000 people for
this purpose and is able to record and analyze a large portion of Internet
communications.
There is relatively close cooperation between intelligence agencics, cspe-
cially when laws make it difficult to surveil onc’s own country.
Landline Phones and Fax Machines
Landline phones can also be tapped dircctly without the help of phone
companies. Bugs in the phone, in the wall socket, in the house switch box
or in the distribution box on the street are relatively easy to install.
Fax connections are intercepted in the same way. “Dumb” phones make
their job even casier—their signals can be intercepted and decoded from
just outside the home.
Publc Payphones and Phone Cards
It also possible to monitor all phone calls made with a phone card from
public payphones. To do this, the cops make the operator transmit all
connection data for this specific phone card number.
Mobile phones
Mobile phones can be tapped with the help of phone companics. And
they offer additional attack vectors for investigators: they can be used to
determine the user's location, their communications can be intercepted
by IMSI-catchers, and they can be infected with malware.
44
L7
Countermeasures
“There is not much that can be done to prevent landline and mobile phone
calls from being tapped.2* At best, it would be possible to use coded
language when making calls But s safer o avoid phone communications
altogether when dealing with sensitive content, .. to avoid scheduling
mectings and demonstrations by phone.
It's best not to bring a mobile phone to demonstrations and other political
events. If you still need a phone, it's best to get a second device with an
empty contact list, call log, and SIM card, used only in such “insecure”
situations.
Mobile phones should be left at home before anyone leaves for a mecting
or event. Especially if it takes place in a location you don't normally
frequent
By the way,caller ID suppression i ineffective when the police are involved.
Postal Service
Letters can be scanned with X-rays, which makes it casier for the snoopers
to decide whether the mail is worth opening. Wrapping the mail contents
in aluminum foil prevents cffective scanning, which probably makes the
package really eyc-catching. Letters can also be opened with steam.
7N TR o The original PRISMA zine ncluded a longer section on mobile phones,
For more information sbout mobile phones, see AnarSec’s guide *Kill the cop in
your pocket”*
“hetpse//anarsec guide/posts/nophones
T note: To prevent phone communications from being tapped, you can use
smaephones with end-to-end encrypted messaging applications. For more information,
see AnarSec's guide *Encryped Messaging for Anarchists”»
*hitps:/fanassec guide/posts/edee
45
Vehicles
The Global Positioning System (GPS) makes it possible to determine
position with a precision of a few meters. The system has been operated.
by the U.S. military since the carly 1990s and currently consists of 28
satelltes, 4 of which are accessible at any given time. In 2000, the artificial
inaccuracy introduced for civilian GPS devices was removed. Since then,
GPS has been used in applications like car navigation systems, and by
police and intelligence agencies for monitoring vehicles.
GPS trackers can be smaller than a matchbox and determine their position
about every 10 seconds. Depending on the model, this data is stored
ocally or sent by radio (usually through the mobile phone network) to
the monitoring agency where it can be displayed over city maps.
GPS trackers can be easily attached to the underside of cars using magnets
or glue. In rare cases, they can be noticed by a buzzing or humming sound
when the car radio i tumed on.
In addition to GPS trackers, smaller radio trackers (15 x 35 mm with 2 15
cm antenna) are also used, and require significantly less power, Thanks to
their small size, these transmitters can be installed in bicycles and smaller
portable objects. However, they do not transmit position data. A recciver
can only determine the dircction the signal is coming from. This makes it
casicr to tail someonc, for example.
OF course, all bugs that can be used in buildings can also be used in
vehicles. Preferred locations for the installation of such devices are the
interior side panels and the roof of the car. The lights built into the roof
can provide a power supply.
In Germany, there are growing calls for the mandatory installation of
so-called accident data recorders (ADR). These “black boxes” store all
important data, especially speeds and distances, which are intended to
be used to reconstruct accidents, but are of particular value to the police
during investigations. They are standard in U, cars. In Europe they are
used in rental cars and in some car modcls.
46
Public Space
With the help of modern surveillance technology, police and intelligence
agencics arc often closer to what is happening in public than their targets
would like them to be. Binoculars, night vision devices, and dircetional
microphones can be used to listen to, photograph and film conversations
from a significant distance. Therefore, outdoor meetings should be planned
and conducted with at least as much care as indoor meetings
Directional Microphones
Small and handy, they can pick up conversations from 50 to 200 meters
away, depending on the model and the line of sight. They amplify only
the frequency range of the human voice and can therefore also be used in
noisy environments such as pubs.
It's not possible to listen into closed rooms (through windows or walls)
with directional microphones (although this is possible with other tools
such as stethoscopes),
Binoculars
Portable binoculars can elearly identify faces up to a distance of about
one kilometer, Cameras attached to these binoeulars can be used to take
photos and videos.
Night Vision Devices
Residual light amplifiers make it possible to sce in partial darkness by
amplifying the existing weak light.
“True” night vision devices work in total darkness by illuminating the
surrounding environment with infrared radiation. This light s invisible to
ye. The night vision device displays it in black and white. Since
infrared radiation penctrates fog better than light, these devices can be
used in poor weather conditions. More advanced night vision devices use
millimeter wave radiation instead of infrarcd radiation and can therefore
also sce through thin walls.
Thermal imaging devices operate without the need for residual light or
an astificial source of infrarcd radiation. They graphically display the heat
a7
given off by the objects they observe and are used, for example, to check
the insulation of houses. During the Castor rail blockades, these camerss
were used from the air to locate people hidden in open arcas and forests.
They can also be used to detect recent changes to the ground. However,
heavy rain, fog, or blowing snow can limit their effectiveness.
Fixed Surveillance Cameras
An increasingly dense network of fixed surveillance cameras is being
installed in Germany, with the aim of increasing security in strcets, squares,
and public transport. In train stations and airports in particular, almost
every square meter is covered by video surveillance. The number of cameras
installed in subways and buses is also growing.
The footage from surveillance cameras i usually displayed live on monitors
(eg-in control centers) and also stored for later review. Both color and
black-and-white cameras are used, but black-and-white cameras are more
sensitive to light and can be easily combined with infrared systems.
“There are two trends in video surveillance:
+ Automatic License Plate Recognition works virtually fawlessly and
is already used in truck tolling systems. These systems also record the
Ticense plates of cars that arc not subject to tolls. Both the license
plate and the driver arc photographed. So i it's not possible to avoid
toll cameras, you should make sure that at least the passengers are
not recognizable in the photos. For example, you can fold down the
sun visors and tilt them to obstruct the view from the cameras.
+ Several major German cities plan to go much further. They want
to sctup systems that specifically scarch for wanted license plates.
Hamburg has already adapted is police law to use mobile surveillance
cameras for this purposc.
RFID Chips.
Radio Frequency IDentification (RFID) chips are used in applications
like car keys,ibrary books,tickets for the World Cup,and to track animals,
N TP nte: From the mid-1990s onwasds, many anti-nucleas protests in Germany,
luding rail blockades, were dirccted against transports of radioactive waste called
“Castor”
48
‘The integration of these chips into credit cards and new passports is
concerning. Another application being discussed is car license plates with
RFID chips.
In supermarkets, RFID chips are intended to eventually replace today's
barcode price tags. At the checkout,all items will be automatically identified
by radio. The RFID chips arc then marked as *paid” but can stillbe read.
To read RFID chips, a “reader” interacts with them wirclessly via radio
waves, and the chips send back the requested data. RFID chips can be
rewritten several times with different data,
The commonly used “passive” RFID chips do not require their own power
supply: They draw their power from the radio waves they reccive and are
connected to long, usually helical antennas. The range of most of these
chips is from a few centimeters to several meters.
“The main problem with RFID chips s that the owner has no control over
what information s requested and retricved via these chips, when, and by
which “reader.”
Depending on the design of the chips, the police could determine a
person's identity by radio at any time without them noticing or being able
to prevent it. It would be possible to sce which debit card they have and
that they have just purchased certain products (or are carrying products
that are not marked as “paid for”). Horror scenarios such as “scanning”
entire demonstrations or “sensitive” locations arc also conceivable
Fortunately, there are simple and effective countermeasurcs against this
type of spying: RFID chips wrapped in aluminum foil completely stop
working. Separating the millimeter-sized chips from their larger antennas
also renders them uscless.
Databases
Virtually all companies want to collect as much data as possible about
their customers. Customers have only limited control over this collection,
and even when very strict legal regulations exist, in practice they are not
enforced. And the data protection regulations can be overridden by a
customer signature.
49
These databases don't just store data on all transactions (purchascs,
orders), complaints, information requests, etc. With the help of appro-
priate software, reasonably aceurate customer profiles are also ereated, by
“residential area’, “number of phone conncctions per house” and similar
publicly available data. The next time someone calls a company, this can
determine whether they arc put through immediately or put on hold.
In addition, various “data brokers” offer data for sale that they could not
have obained legally.
Even if very few of these corporate data collections are direetly “tapped”
by surveillance authorities, they can be stolen by hackers,for example, and
possibly end up with the police as part of an investigation.
Typically, police and intelligence agencies have a much greater interest in
the following types of customer data:
* Bank and credit card accounts: They provide information about moncy
movements. Using debit and eredit cards also generates information
about transactions, including their cxact time and place.
+ Libraries and mail-order bookstores: This can reveal the political
interests of individuals and is therefore highly relevant to mass
surveillance. Amazon has already been forced by ULS. authorities to
hand over its user data.
- Of similar importance arc the semi-legal file-sharing networks that
allow downloading movies and music. The only difference here s that
users of those networks usually do not leave any personal information
other than their IP address.
* Membership lsts of political and religious commaunities, and martial
arts schools and clubs,
+ Air and rail travel: The names of all passengers on flights to the US.
are submitted to ULS. authoritics. Depending on the potential threat
posed by such passengers, several airplanes have been forced to turn
back or land in Canada. Depending on the “threat situation’ and the
government, such surveillance can also be implemented in Germany
and other European countrics
Security countermeasures are not straightforward when it comes to data
collection. OF course, we all have bank accounts and need to withdraw
50
money from ATMs from time to time. But if you don't want to leave
too much of a trail, you should be extremely carcful about giving out
personal information and as much as possible avoid ordering things online
or paying by card. Cash payments leave the fewest traces.
Biometrics
Biometricsis a branch of science concerned with the collection and analysis
of physical and behavioral characteristics of living beings. When applicd
to humans, the focus is on computer-aided identification (“Who is this
person?”) and authentication (“Is this person who they say they arc?”). In
practice, this is intended to prevent unauthorized persons from gaining
access to rooms or systems to which they shouldn't have access, even if they
have stolen or otherwise acquired PIN or passwords. The characteristics
used include an individual's body size, iris and retina, fingerprints, facial
geometry, handwriting, DNA, voice, git, o even typing behavior on
keyboards
Most o these methods are tilin the testing phase; heir results are cither
100 inaccurate or too complicated to use in practice. Currentlyiris, retina,
fingerprint, and facial recognition systems are the most common. There
are currently very few such systems in the public sector. Examples include
the Hannover 200, where visitors with an annul pass are admitted using
a facial recognition system, or the Frankfurt airport, where travelers can
pass through border control with an irs scan (in conjunction with their
passport).
Facial recognition systems measure the relative distances between the cyes,
nose and mouth, usually stasting from the eyes. To be correctly identified,
a person must be facing forward, still, and very close to a camera (and
their face must have been previously filmed or photographed from the
front, measured, and then storcd in the relevant system). There are already
attempts at 3D recognition, i.c. the ability to recognize faces from any
angle,but these are not yet ready for practical use.”
N TR te: As of 2025, fcil rcogition systemscan recognize fces from diffrent
angles.
51
In addition to access control, the automatic identification of wanted
persons with the help of publicly installed surveillance cameras is an
aspirational and advertised goal.
Allattempts to do so have failed due to the high frequency of alse positives.
It's not possible to cstimate how long it will take before these systems can
automatically identify wanted suspects in real time. I¢'s also possible, for
cxample, to manually “eut out” faces from photos of demonstrations and
have them identificd automatically.
A relatively simple trick to prevent this (or unwanted facial recognition
in general) is to wear sunglasses or a low-cut baseball cap.”*
E-passport
Following an EU decision, since November 2007 German passports
contain biometric data. As of November 2007, this involves two finger-
prints. This data (as well as most other passport data) is stored enerypted.
on a newly introduced RFID chip. You can find out what data is stored.
from the passport authorities.
The new passport is touted as being extremely forgery-proof. As with
all RFID chips, there i a risk of unnoticed reading. To prevent this, the
chip only transmits after the “standard” passport data have been read. The
seader tels the chip that it knows this data, and the chip then makes itsclf
readable.
Docsn't sound bad at first, at least if you trust the technology created
by the State and its compliance with the law. If this trust is lacking, you
can shield the chip (with aluminum foil or a protective cover that can be
purchased). In principle, the chip can also be destroyed, e.g.in a microwave:
Put the passport in, sct the microwave at its lowest level, and switch it on
very briefly (shorter than briefly). The passport remains valid even if the
chip is not working (but only the chip—burned holes in the cover are bad,
of course).
TP note: As of 2025, weasing sunglasses or & low-cat bascball ap does not
nccessrlly prevent fcial ecogaition. On this topc, sce the text “How To Prevent
Facial Recognition Technology From Identifying You'.*
*hitps://notsace.how/cesources/ Fprevent-fucial-recogition
52
Surveillance Cameras
Imagine: the cops end up arresting Anna™ near a smashed police station,
Anna is found not guilty because she was wearing a mask (of coursel),
For our own security, when we do reconnaissance, carry out a clandestine
action, and leave the action site, we must make sure that no surveillance
cameras are recording us. Sometimes they are very small and hidden,
sometimes they are large and obvious or installed as a deterrent. The
latter is unfortunately not always the case, especially when police and
intelligence agencies have installed them for surveillance purposes. Their
number has increased in recent years and will continue to do so. However,
we shouldn't let this deter us from doing what needs to be done, but
rather we should increase our knowledge—about their proliferation, their
technical capabilities, and how we can render them harmless.
Where Can You Find Them?
(Almost) always in places considered sensitive to the State, such as banks,
cmbassies, ministrics, warchouses, the homes of high-ranking individuals,
and corporate headquarters. Often and increasingly at train stations, on
trains and buses, in front of garages, driveways, parking lots, and st
entrances, where they sometimes also record the sidewalks. Internet cafe
and sometimes even copy shops are often monitored by cameras. Targeted
camera surveillance of public places is still very controversial and therefore
exists only in isolated cases and with media attention. Entrances to well-
known places of the radical left, autonomous social centers or squats are
monitored as inconspicuously as possible and usually not continuously, if
they are monitored at all. However, individual cases of continuous camera
surveillance over many years have been revealed during political trial. Its
certainly worth obscrving the windows opposite the entrances of such
places (even at a very oblique angle). The BfV sometimes rents apartments
for this purpose. Normal tenants have also been asked to make their
“N.TB nte: The name “Anna”is 3 eference to a slogan of the German radical lef
encouraging people to not give statements to the police, “Anna und Arthu haltens
Maul® Gna and Arthu keep their mouths shut)
53
windows available for a surveillance camera. A secondary entrance and
exit, via courtyards or rooftops, may therefore be useful. Of course, cumeras
can be installed there as well
Recordings made with mobile phones arc increasingly becoming another
source of danger. They can be used to ilm or photograph people in locations
that are far away from any buildings. We also shouldn't forget the police
who are constantly recording at demonstrations. Journalist footage or
private recordings can also be scized by the police.
What Can They Do and How Can They Be Recagnized?
Several books could be filled with information on camera types and
applications, but a rough overview will suffice here. Surveillance cameras
record in different ways depending on the application. As a deterrent,
sometimes only fake cameras or “You are being recorded”signs arc installed
without a device actually being present. If the recordings arc meant to be
used toinvestigate possible crimes,they are not only displayed on monitors
but also saved. Saved recordings can later be viewed remotely or accessed
via the Internet. All of these variants can be wireless or wired.
Interms of camera types, there are large, highly visible cameras that are
prefrrcd for deterrence. These are the traditional box cameras, box-shaped
long-range infrared cameras or the large versions of dome cameras. Small
to medium-sized pen cameras (round, pen-shaped), small dome cameras
or mini cameras are used as recognizable but more inconspicuous, discreet
cameras. And, of course, there arc hidden cameras: very small mini cameras
(e.g-integrated almost unnoticeably in doorbells, on front doors or gates),
and cameras that arc completely disguised in clocks, behind one-way
windows, in motion detectors or smoke detectors.
All camera types can be cquipped with various functions: zoom, pan and
rotate, extra wide radius, night vision. They vary in their sensitivity to ight,
type of focus (variable or fixed), and image resolution. With high resolu-
tions, people or license plates can be recognized and identified. So-called
“intelligent cameras,” which recognize previously stored characteristics
of people, such as eye-mouth-nose distance,iris or gait, and then sound
an alarm, are not yet in use in Germany. In general, the latest technology
54
is not used everywhere, but it tends to get better and cheaper. The type
of camera and its capabilities cannot be identified at strcet level, o only
roughly So your asscssment of a camera type can be based on the location
and the level of surveillance you think is likely there.
What Can We Do About Them?
We can choose our routes and targets so that no surveillance cameras
record us. But we can also try to outwit them: hold something in front of
the camera if it isn't mounted too high (e.g. an umbrella, cardboard, or
even just a bag placed over the lens). Spray paint the lens or apply paint
with paint sprayers or eggs flled with paint, apply stickers o cut the cables
(be carefl, always use insulated tools!). Stones or hammer blows will also
help if you are well masked or not positioned in the camera's field of view.
Though it's easy to make mistakes in this regard as some cameras have a
wider range than is appaent from the outside. Sometimes i’s enough to
wear clothing that conceals your body shape, such as a garbage bag, or to
puta rain cover over your bike to obscure it (when the camera is far away).
Afterwards, you should dispose of your clothes and, of course, not use your
everyday clothes in which you may have already been photographed. We
recommend reversible jackets, masks, umbrellas, or placing cushions and
pillows under your clothes that change the shape of your body. Beards,
wigs, paint on your face, or picces of apple in your checks can also change
your face. However, aways consider whether the circumstances allow you
to be a little sloppy with the (possible) cameras! If in doubt, don't do it,
rather than put yourself at unnecessary risk!
Physical Surveillance
Originally published as Tausend Augen (d Thousand Eyes)
in part 2 of issuc 153 of the German magazine radikal.
‘The comment in square brackets is from the editors of
the original PRISMA zine.
55
[This text is a bit old, but still quite relevant. It will be clear to anyone
who has walked down a busy street that mobile phone technology has
evolved...]
Eyes starc out of windows everywhere you go... A car rolls slowly past
you, two young guys sitting in it, watching you out of the corner of their
eyes.... Another car has been parked in front of your door for days.... The
phone suddenly crackles in a way it didn't before... A satellite antenna
has recently been installed on the house across the street, pointing dircctly
at you... A helicopter has been fiying over your strect a lot latcly..
Someone has asked for you.... Beyond the blue summer sky; a spy satellite
orbits and photographs you fifty times per second as you walk through
deserted strects....
“The scason is called PARANOIA.
All of us who are close to anti-authoritarian ideas (nd hopefully actions)
are familiar with this time of year. Many of us have experienced various
forms of repression in our years of political activity: the police baton at
demonstrations,investigations, rial,raids,prison. Although these dircetly
experienced patterns and forms of repression can be somewhat demystified
over the years itis abways frightening how little we collectively learn from
these experiences. New campaigns for refusing to testify in police stations
and during trial continue to be necessary,and people stillfeel helpless when
caught in the thorns of the court and prison apparatus, often repeating
the same old mistakes. There are piles of texts on all kinds of repression,
but it makes a big difference whether you experience something yoursclf
or just read about it.
What is truc of dircct, overt experiences of repression is all the more true
of the more covert forms. The radical left knows a lot about the apparatuses
of s enemics, or at least has theorctical knowledge, but in practice takes
them into account rather sloppily.
The subjective fecling of being threatencd often determines one's actions:
“Nothing will happen’—“What could they possibly want’—“T'l be
carcful’—*Afier all they don't have my fingerprints yet’—*Why would
they be interested in me?” But also: “I'm surrounded”—*Nothing works
anymore’—*I¢'s better if I stop being active—*Everything is surveilled
anyway"—*Orwell's '1984' has been surpassed long ago.”
56
On the other hand, some people apply general principles to avoid needing
to precisely evaluate a particular situation: never talk in your own home,
especially not over the phone, keep no written documents,etc.
“This text s intended to shed some light on the shadows of surveillance. It
has two main objectives. Firstly, learning and knowing the methods of the
enemy means being able to fight them! Sccondly, down with paranoia!
We are aware that dealing with this topic in detail may stir up
of paranoia. Those reading this text should keep in mind that e
thing
described here is an exceptional situation, perhaps comparable to airplanc
travel: before takeoff, instructions are given on the use of life jackets, and.
everyone should be familiar with how to use them, but they are only used
in very few exceptional cases. And hardly anyone will think about life
jackets throughout the entire flight.
When we talk about surveillance in this text, we mean the targeted
surveillance of specific individuals. We will not go into detail about the
everyday snooping that affects a scenc in general, such as collecting scene
publications and posters or hanging around in the relevant bars and public
mectings.
First, a Few Basic Rules When It Comes to Physical
Surveillance
A surveillance operation s planned and organized. It requircs some
effort if it is to be useful: preparation, personnel, vehicles, technical aids,
coordination. Most surveillance has no political motivation and is carried
out against threats such as organized crime, burglasies, ctc
There are various forms of surveillance. They can be categorized as follows
(the terms are chosen by us): surveillance of a specific place, object, person,
In the case of surveillance of a place, the surveillance operators it ina static
location (in a house, car, etc.) and do not move from there. For example,
they may be exclusively interested in who enters a certain building, or
whether something is hidden in the bushes somewhere. Such surveillance
s very difficult or even impossible to detect.
57
Surveillance of an object is a variation of the frst form. It involves kecping
an eye on a specific object, such as a car or a parcel of money. To do this,
the surveillance operators have to be mobile.
In the case of surveillance of a person, the firs two forms can be combincd.
For example, by monitoring the target's home with cameras (static
surveillance), and otherwise tailing the target (mobile surveillance). In
some cases, tracking devices may be used, or the operators may set up at
fixed locations that a target must pass. Surveillance may end in an arrest,
or it may have no noticeable conscquences at all, except that the sceurity
authorities hold onto everything they have recorded.
The reason for the first three forms of surveillance is usually a police
investigation or something similar by the intelligence agencies and the
BEV. The tightening of sccurity laws cnables the cops to surveil you even
outside of an ongoing investigation.
Surveillance of an arca is aimed at gaining information about the move-
‘ments of various people. Against political targets, this type of surveillance
operation attempts to create movement profiles for the scene. This is
usually done in the run-up to important political events and may or may
not be based on a specific investigation.
All forms of surveillance can also be carried out overtly. The purpose of
overt surveillance is cither to make the target nervous to sce how they
seact,or to find someone to target in the first place by sceing how different
people react. Overt surveillance is clearly recognizable as such. They'll
show up at your doorstep or even call you to say they're there. But take
note: if you detect a surveillance operation, it doesn't necessarily mean
that itis overt surveillance! The operators are not always as skilled as we
might assume.
I¢'s very asy to surveil someone who is oblivious. It's very difficult to
surveil somcone who expects to be surveilled.
The amount of effortinvested in a surveillance operation depends on many
different factors. Priorities must be set: what is more or less promising at
the moment? What is politically desirable, whether for the government,
the local authorities, or the different factions within the sccurity apparatus?
Whatis even feasible?
58
on among agencies as to who should or can do what. If
one agency fecls it is being interfered with in some way by another, this
can lead to a reduction in the willingness to work. Although budget cuts
and staff shortages impact police and intelligence agencies much less than
other domains, it still does to some extent. It also a matter of what other
important cases are in progress which should not or cannot be put on the
back burner.
“The surveillance apparatus is a sluggish public service system with a lot
of peaple who don't really care about their job. Success i often achieved
not by brilliant ideas or particularly dedicated working methods, but by
routine, i.c. by always following the same procedures.
Another important factor is how dangerous and “surveillance aware” the
target(s) is/ase believed to be.
A thorough surveillance operation requires a certain amount of preparation
time, sometimes several wecks. So if you've been arrested for something
and you're now worried that you might be under surveillance, don't be
surprised if the surveillance doesn't start until quite some time later when
your vigilance has alrcady started to wane.
Not Everything That Can Be Done Will Be Done
There are numerous zines and books about what is technically possible in
surveillance today. They describe bugs the si
of a grain of dust stuck in
cracks that can be accessed remotely,or camera lenses the size of a pinhead
lurking somewhere. There are even cameras that no longer require lenses,
using camouflaged light-sensitive micro-components instead. Tracking
devices ean be purchased that can be located via satellte, allowing the
surveillance units to locate their target without having to leave the offic,
Phones can be called without ringing or otherwise alerting their owner.
Rooms can be bugged from a great distance using laser beams. Computer
screens can also be tapped. Thousands of phone conversations can be
intercepted using computers listening for keywords.
Aweakness of these texts is that they usually don'ttell the reader anything
about which capabilities arc used when, or by whom. Many of the above
techniques are very expensive. Some arc technically feasible, but their
59
development is not et sufficiently mature and they are sill in the testing
phase. Others arc used, but “only” by the intelligence agencics. And what
the intelligence agencics have, the cops do not have—if only because the
intelligence agencics value being better than the cops.
There are also priorities. Today, there are still some things that are more
threatening to the State and capital than the radical left and/or that
are more difficult to control with conventional methods of surveillance.
These primarily include State espionage, counter-espionage and industrial
espionage. The elaborate, nasty technical capacities are mainly used in
these domains and, of course, in the military domain.
Of course, all technically possible forms of surveillance are a potential
threat to us. Anything that has been used once somewhere will be used
again. The cheaper it becomes and the more familiar the authorities become
with it, the more widespread its use wil be.
I¢'s also important to consider the relationship between the use of a
technical capability and its success. Bugs are a good example of this: using
a bug makes sense if the surveillance operators have a relatively clear
idea of what is being discussed where, or at least assume that they know
where interesting conversations are taking place. After al, they first have
to install the thing properly and then continue to take care of it: power
supply, transcription, analysis, and subscquent removal. If they assume
that the target docsn't talk much or at all at home,or lives in a house with
20 rooms far apart from cach other, they will think twice about doing the
work that a bug requircs.
When placing a camera somewhere, there are a few questions that need
1o be answered beforchand. Is a clear linc of sight guaranteed? How good
is the footage quality? If the goal is to clearly identify people, a telephoto
lens must be used. This rules out the tiny camouflaged lenses, so a real
camera has to be hidden nearby somchow. And a camera lens that can
identify a face is also more vulnerable to being deteeted. If it installed so
far away that it cannot be casily detected, there's a risk that other things
such as trees, cars, ctc. will obscure its line of sight.
Therefore, it sealistic to assume two likely possibilities. On the onc hand,
there will be a handful of surveillance operations using sophisticated
technical capabilities. In recent years, this has probably mainly been
60
directed against the RAF, the RZ and Rote Zora ™ On the other hand,
the vast majority of political surveillance will use *conventional” methods,
i.c. tailing the target, tapping the phonc, monitoring the mail, possibly
monitoring the front door with a camera.
You Can Detect a Lot of What Is Being Done
An essential part of “conventional” surveillance is finding out who goes
where, when, and to mect whom. But anything to do with movement is a
weak point in surveillance. The surveillance operators have to move with
their target while staying in contact with cach other. Even if the target
docs not detect the surveillance themselves, there's a high probability that
other people who aren't being targeted will notice it. They will see cars
suddenly speeding off for no apparent reason, or peopl sitting in parked
cars pushing themselves decp into their scats,or they will notice someone
suddenly mumbling into the lapel of their jacket, or lingering in a doorway
for a long time. These are all unavoidable behaviors in mobile surveillance.
So if you have reason to expect surveillance, you have a good chance of
detecting it—some of it yoursclf if you walk around with your eyes open,
some of it with the help of others.
You Are Not the Only One Who Could Be Targeted
At least in larger cities, especially in certain neighborhoods, there are
hundreds of people, maybe thousands, living around the corner from
you who could potentially be the target of surveillance. People are under
surveillance for all kinds of erimes: receiving stolen goods, fraud, theft,
robbery, murder, drugs, ctc. In the political sphere, cverything is possible:
“terrorism”, antifuscists, small autonomous groups, PKK,* DevSol,* maybe
even Nazis. Then there's cspionage, Islamic fundamentalists, auiliary
SNTE note: The Rote Zora e Geeman far-left feminist miltant group active
from 1974 10 1995,
TR ot The Kudistan Workers' Party (PKK) s Kuedish political organization
TP not: Dewvimei Sol (DeSol) s the former name of the Revolutonary
People’s Liberation Pasty/Front, Tarkish communist poliial parey:
61
services for foreign authorities, immigration police, searches for wanted
people.
If there is surveillance in your area and you are worried that it might be
targeting you, then keep in mind that there are many other people around
you who might also be the target of surveillance.
Your Enemies Don't Necessarily Know Everything You Know
You may wonder why you've never been put under surveillance. Or you're
being tailed and wonder why they are staking out one place and not
another. For example, you notice that the cops have been lingering outside
your legal address for days, even though you thought they should have
known by now where you actually live. But maybe only the intelligence
agencies know this, and they haven't told the cops.
You have to be prepared for the fact that if you are a arget in a surveillance
operation, you won't be surveilled in the same way that you would do it
yourself. They don't know a lot of things that you know. But they also
know things you don't. Or they can be wrong and start from a completely
false premisc, like associating you with someone you have nothing to do
with. Another possibility is that they are working on a construct that
is politically desirable, but has litle to do with reality: So you shouldn't
assume that the surveillance is based on what you know, or even based
on reality Your adversarics are working on the basis of what they have in
their files, and these can be quite inaccurate.
I you automatically assume that they know what you know, you may then
deliver this knowledge to them through your behavior. Ifyou suddenly start
moving boxes out of your apartment because you've become nervous after
detecting surveillance, you may be letting them know that you actually
have something to hide.
Of course, the first question during a surveillance operation is always what
they are actually interested in. Don't expect to find out! If you know that
2 “good” reason exists to target you, then assume that is the reason. But
‘you must also expect that there could be reasons you would never think of.
For example, you may have unwittingly sold your car to someone who is
under surveillance for organized car smuggling. Or when a person accused
62
of being a member of the RAF was arrested, they
with a number on it that the BKA mistook for your phone number. Or a
snitch falsely accused you of having contacts with a clandestine militant
group. These are all things that no onc will probably ever tell you, so you
‘won't be able to evaluate them.
found a picce of paper
Of course, there are also clues that you can use to determine how much the
cops know, You can for example determine which of your friends are also
being surveilled, or at what times they surveil you. If they always come in
the evening, they probably aren't watching you for organized shoplifting
at the grocery store.
Paranoia Feeds on ltself
Once you've detected signs of surveillance around you, you may start trying
to deduce meaning from the smallest things. Suddenly you suspect cops
around every corner, everything s suspicious. This is completely normal, it
comes and goes in phases, and also depends on your mood at the time. Try
not to let it drive you crazy. Until you become quite “familiar” with this
situation, you have to cxpect that you will not even notice the majority of
the surveillance operation, simply because they are carcful to keep their
distance from you. So if you arc absolutely certain that there arc cops
‘buzzing around you, it may be a sign that you aren't the target.
What You Can Do Specifically
Now to the practical part, which has three sections:
1. General caution
2. How to detect physical surveillance
3. What to do if you detect physical surveillance
1. General Caution
If you are part of the radical left and politically active, or if you associate
with people who are, it can't hurt to be a little vigilant in lfe. You have to
establish your own limits: where does recklessness begin, and where does
paranoia? Some people have a nose for cops, others don't even notice when
63
a police radio beeps right next to them. You have to figure these things out
for yourself, Your vigilance has to be integrated into your daily lfe, into
the way you perceive your surroundings. I you can't deal with repression
at all, if you just want to keep it away from you, then you should first ask
yourself how this fecling relates to your political activity and whether you
can afford such an approach to this activity. I you can, great, if not, you
need to think about how you can find a tolerable way to deal with it and
10 what extent others can help you.
‘The police and intelligence agencies are always present in one form or
another, without this necessarily resulting in anything concrete, There's
a good reason that it's common knowledge that informants should be
assumed to be present at every public mecting, that phones are tapped,
cte.In fact, this has never successfully prevented radical left action.
Despite its rules and laws, the security apparatus is not completely
predictable and certainly often a bit chaotic. They may not even know
themselves what is going on at the various levels.
General caution means being aware of the cops' presence and not being.
deterred by it. After al, an cssential clement of “preventive repression” is
to create paralysis through a general awareness of the constant presence of
the cops. This is intensified by police games designed to keep us occupied
—scemingly pointless or untargeted blows of the repressive apparatus are
sometimes simply meant to keep peaple busy so that they don't have time
for anything clse. When this is the dynamic, the cops have the initiativ,
They're on the offensive, and we're chasing after cvents. This political
aspect of repression has been extensively discussed in other texts.
General caution means paying attention to how cops behave, Sometimes
it can be uscful to imagine how and what they think: the patrol cop, the
surveillance operators, the State sccurity cops,the chiefs. Surely they're not
only thinking about us and our “misdeeds,” but also about the end of the
day, their mortgage payments, their boss, the political repercussions, their
carcer, the union, getting something to drink later, the arrogant external
authoritis. It's important to consider that what they imagine of your daily
life s shaped by the mass media, biased informant reports, difficult-to-
comprehend texts from the scene, and lectures by “scene experts.What are
their moral values and self-justification for their work? If you go beyond
64
the slogancering notions of cops as recipicnts of orders without agency,
or as fanatical law-and-order fighters, you will no longer be surpriscd
by some things that you might not otherwise be able to explain without
cnormous conspiracy theories (“They didn't intervene, so we think they
don'tknow anything. .. "or “They struck now because they knew everything
beforchand...”). This happens sometimes, but the reasons are usually far
more mundane.
So, try to get to know your adversaries. Describe not only their logic (or
lack thercof), but also what they look like, how they act. The days when
95% of surveillance operators were men with short hair and mustaches
are long gone. Today, there are many women among them. Both women
and men wear clothes typical of the scenc, and the men often have long.
hair and carrings
How do they sit in the car? Why docs a surveillance operator look out the
car window differently than other people? He or she is looking out for
something. However, it's casy to mistake people who are unfamiliar with
the area for surveillance operators, because they are often very alert, Most
people who drive tend to focus their attention inside the car, especially
when they're not alone. Surveillance operators, on the other hand, usually
pay close attention to their surroundings outside the car and often hardly
talk to the other passengers.
In any case,it makes sense for anyone who is politically active to consider
the extent to which they should prepare for repression, to become more
familiar with the possible threats posed by surveillance, ete. Do not rely
on the fact that from time to time, some license plates of surveillance
cars are published somewhere. The lists can contain errors, the license
plates are changed. The best protection is to develop a “nose”for cops and
informants, and you will develop this through attention and expericnce.
2. How To Detect Physical Surveillance
Let's assume you're up to something so you want to go scope out an arca.
Or you have nothing to do at the moment and are taking an attentive walk.
How can you detect whether there is a surveillance operation going on?
Cars are the most noticeable element. For once we can be happy about the
car society we live in. Cars are casy to identify and can be clearly deseribed
65
by their model, color, and license plate number. Almost all stakcouts
involve cars, and the operators on foot arc sually passengers who have
gotten out of a car, Cars have several advantages for the cops: they can
hide their radios and other equipment (a camera, a change of clothes) in
the car. They can speak loudly and listen to radio messages without being
noticed by outsiders. They can maove between locations quickly: They can
sit comfortably and maybe even take a nap if the surveillance drags on
‘without much happening. Of course, there are also operators on foot, bike,
and motorcycle, who arc usually harder to spot.
Surveillance vehicles are generally clean and well maintained. There are all
kinds of car models in all kinds of colors, mostly high horscpower models,
but no souped-up or otherwise flashy models. Don't expect to sce any
technical features ike radios, radio antenna or anything like that. Gone are
the days where surveillance cars gave that away. Nowadays, the cars have
“hands-free” systems where messages are picked up by a hidden interior
microphone and the radio can be hidden in the glove compartment.
So if you're out for a walk, you might pass a car that catches your cyc.
You take a closer look out of the corner of your eye and sec that the car
is clean, it has an antenna, someone is sitting in it reading a book. Other
than that, the car looks normal. Or there are two people in it with their
scats partially reclined, maybe dozing off. Or someone s just sitting there
looking intently in a particular direction. Or maybe you just sce a man or
woman with headphones standing idly on a corner. Shortly thereafter, a
car slowly rolls past you with two young men in i, looking out the window
with interest. Then, two corners further on, two cars are parked next to
cach other with two couples standing next to them, smoking and chating,
They are probably wearing normal, sporty, casual clothes and shoes. They
don't have “cop faces,” nor do they look particularly strong. But maybe
you heard a beeping sound coming from one of the cars as you passed by.
You may have just noticed the two cssential elements of surveillance: firse,
the “trigges” position for the target, and second, the surveillance operators
that stand-by ready to tail the target.
The trigger position is of central importance, which is why it must be
particularly inconspicuous. If this position is occupied by people in a car,
the surveillance operators may recline the seats to make themselves more
66
comfortable and less visible from a distance. Or they may do something
0 give themselves a reason to be there, such as reading the newspaper.
“The trigger position can also be done on foot. In this case, someonc may
sitin a cafe with a view of the target's front door and only bricfly signal
10 the rest of the team that the target has left the house.
If you see a car with one or two people sitting in it, looking intently in
one dicction, you can be relatively certain that you have found the trigger
position. Unless it s well camouflaged, this position will normally be at
a distance that gives a good view of the target, but is out of the target's
immediate field of vision. This is usually about 40 to 80 meters.
The rest of the surveillance operators are at some distance, However,they
still need to be close enough to be able to start tailing quickly when
necessary: So they will make sure that they are well positioned in terms
of the strect layout and that they can quickly reach the target's possible
routes. They are probably around a comer or two, about 200 to 400 meters
away.If they take a more relaxed approach, they may gather in several cars,
perhaps even getting out to chat. However, they may also line up separately
and form a box around the target. They also need to find places where they
can meet and discuss undisturbed, such as dead ends or parking lots.
The cars will change positions occasionally. The car that was in the trigger
position joins the stand-by cars, and another car assumes the trigger
position. If finding a parking space is difficult,the firs car waits until the
car replacing it arrives and then leaves the parking space to its eplacement,
“The following are signs that surveillance may be taking place:
* Have you seen people staring at fixed location?
* Have you seen people wearing earbuds?
* Have you scen occupied cars parked for several minutes?
* Have you scen cars (moving or parked) that you suspect are surveil-
lance cars?
* Have you heard radio transmissions from cars?
If you think you've detected surveillance, the second step s to determine
the surveillance target. To find out the location that is under surveillance,
you can either look for it dircetly,i.c. look for an operator watching a
specific location, or you can think about what s likely to be surveilled in
67
the arca and then try to deteet an operator around those locations. If you
don't find the object of your desire, therc's not much you can do other than
walk around attentively for a while. Without identifying the target, it's
not possible to draw conelusions. Accordingly, you should limit yoursclf
to making sure they are not targeting you or people or locations you know.
If you can detect the trigger position, the next step is to determine what
the trigger is watching. Although you know the target must be a certain
distance away, you don't know if it's a house, a car, or something clse.
For example, the target could be a car that is parked 100 meters away,
but which can nonetheless be seen from this distance if it drives off. You
can first try to rule out possible targets. Rule out all propertics in the
immediate vicinity of the trigger position, i.c. the two to three adjacent
house entrances, pubs or shops. Keep in mind that it's also possible for a
trigger in a car to usc the rear-view and side mirrors. Despite these clucs,
it's very unlikely that you'll be able to determine the exact target location.
At least you can narrow it down to a certain area and, above all, you can
assess whether your own front door, car or bike, o those of your comrades
could be affected.
If you come to the conelusion that your own front door s in the line of
sight, your adrenaline level will probably skyrocket, but stay calm. So far,
nothing is confirmed, and many other possibilties exist. However, if you
cannot rule outsurveillance of your front door, it makes sense to take certain
precautions. For example, arc there people you don't want scen entering.
your home? Do you keep things at home that you feel uncomfortable with
in such a situation? Would you prefer not to be identified as someone who
lives there? So you need to start thinking about what to do: ignore the
danger, warn people, take countermeasurcs? That's what the third scction
is about.
3. What To Do if You Detect Physical Surveillance
If you are certain that you have deteeted surveillance, you will naturally
want to know whether it's targeting you. If there is no cvidence to the
contrary, you can try to find out more by conducting “counter-surveillance.”
“To do this, you need a few trusted people who can be abservant, Decide on
a route that you will take at a certain time. This route should be designed
68
to fitin with your daily routine so that surveillance operators don't become
suspicious. It should have a few turns to rule out coincidences, such as a
car that happens to be driving the same route as you. It docsn't have to
be particularly long, It should not follow the main traffic routes all the
time, but it also shouldn't circle around itsclf too much, otherwisc the
surveillance team may simply form a box around it. Short stops can be
incorporated to make sudden changes of dircction plausible. For example,
first you go to a copy shop and copy something, then you tum in the
opposite dircction and go to a mailbox where you drop something off. Then
you can change dircction again and buy a newspaper at a store. It's best
o do the route in a car, because then you will e followed by vehicles and
not on foot.* It's casicr to deseribe vehicles more precisely than people.
Since you want to determine whether someone i taling you, it makes no
sense to try to lose potential tails. You should also avoid checking yourself,
as others will do that for you. Your pursuers should fecl as safe as possible.
You must communicate your chosen route to your comrades in advance. If
it sccms too risky to meet them in person, you'll have to find another way
to communicate the details. However, the casiest way is to tell the route
to people you can meet without issuc or raising suspicions, and who are
very unlikely to be under surveillance themselves. Your friends will then
position themselves as inconspicuously as possible along the route you will
take at the specified time. They record exactly when you pass by and what
follows behind you: the car’s license plate, color, model. The obscrvations
are then compiled. If you are really being surveilled, the fact that the same
people or cars were scen in different places will serve as confirmation,
Howeverit's more likely that your friends will immediately recognize the
surveillance operators, because to keep up with you they often have to
race through the streets at high specd and disregard traffic laws. The most
NP notes I you do the route in car and you are under physical surveillince, there
s arik that the car contains a GPS tracker installed by the surveillance team to track
itsLocation. This i s problem, because the surveillnce team might rly on the tracker
and follow you from far away or even notat all, making it harder or imposible for you
o detect them, It can be better to do the route on a bike, because compared to s car,
itis casier to ensure that a bike does not contain 8 GPS tracker.For more information
sbout using bikes, sce our Threat Library's “Transportation by bike™ mitigation.
*hetps://notrace how/threat-libraey/mitigations/transportations-by-bike html
69
important thing for the operators is to keep up with you without being.
seen by you. This leaves litele room for consideration of other road users.
OF course, there's always an element of uncertainty. It could be that you
have a tracking device on your car, and that's why the surveillance operators
kept their distance (but they're sill taling you!). Or they were following
you, but then lost you. O they finished work or took a lunch break a few
minutes before you started your route. That's why counter-surveillance
can only ever reveal if they were tailing you at that particular point in
time. Nevertheless,if you choose the time and place well,you have a good
chance of getting enough certainty for your immediate plans.”
You can also try to detect surveillance by yourself Take a carefully planned
soute by car or bike that gives you the following options: you can make
surprising turns—preferably with a plausible explanation. Or you follow
a long, straight stretch of road with no turning options, where you can
suddenly stop on the side of the road. In both cases, your pursucrs will
be forced to pass you if they don't want to attract your attention, You
can then try to memorize cars, license plates, and faces, and repeat the
whole process elsewhere to sce if there are any matches. In order to carry
out surveillance deteetion measures, however, you must be able to behave
in such a way that the cops don't notice what you're doing. Above all,
this requires you to remain calm even in a tense situation. You must also
develop a“nose” for cop cars,since it's usually impossible to remember the
license plates of all passing vehicles.
Once you have confirmed that the surveillance is indeed targeting you,
you need to calmly consider your next steps. You shouldn't do this alone,
but with a few people you trust.
N.TP note: For more information on conducting counter-surveillance (..
detecting physical surveillince with the help ofa trusted third pasty), sce Surveillance
Countermeasures.”
*hitps:/fmotsace.howcesources/fsurveillance-countermeasures.
70
Who and What Is at Risk?
Regardless of why they are tailing you, consider whether there are any
other comrades who might be affected. They need to be told, but it may
be better if this isn't done by you personally
If there are things that could be a problem in your home, car, or other
places where you spend a lot of time, they should be discreetly moved
el
First of all,don't tell more people than absolutcly necessary. Once rumors
of surveillance begin to spread, the most likely outcome is panic, ansicty,
and conspicuous behavior, as well as speculation about the possible reasons
for the surveillance. All o this can do more harm than good.
What Could Be the Reason for the Physical Surveillance?
To get as close as possible to answering this question, collect as many
observations as possible: dates, times, vehicles. Distinguish assumptions
from reliable obscrvations. Then try to come to an assessment of what the
surveillance operators (could) have already noticed. Think about all the
possible reasons for their actvities. Don'tjust think about your real activities
and struggles, but also about what is conccivable due to coinci
unintended connections. For example, if you have been identified by the
police when you were with someone, such as in a previous arest. What
type of vehicle were you using when you detected the surveillance? When
and where did you do things that could be understood as conspiratorial
activity?
What Could Be a Threat in the Future?
Based on your working hypothesis of what the surveillance is about, you
can consider how the authorities will proceed. One unknown factor, of
course,is whether it's the cops or an intelligence agency that have you in
their sights. I it’s the cops, its very likely that you are the subject of an
investigation, which will usually be reated to “§129” or“§1294" It should
e briefly mentioned that these two articles are primarily investigative in
nature and are used to keep the repressive apparatus running smoothly. Very
few §129a investigations lead to trials and convictions. They arc mostly
used to legitimize surveillance in the first place. So a §129 surveillance
operation will not necessarily be followed by a raid and/or arrcst. And
if it is, this docs not necessarily mean that you'll be charged. You should
familiarize yoursclf with this possibility, but it's also possible that the
surveillance will end at some point and nothing conerete will result from
it, except that your file with the security or intelligence agency will be a
lietle thicker.
“Theintelligence agencies arc not formally subject to the principle of legality,
.. they can surveil you “if necessary”as they wish. Whether anything else
follows from this depends on whether the intelligence agency activates
the police.
If the surveillance lasts for months (which can happen), you can'tlive with
your bags packed the whole time, whether it's to run away or to go to
jail. You have to find a soutine for yoursclf at some point in this situation,
otherwise you'lllose it. This means that you cither have to give up certain
things during this time, or you have to arrange them in such a way that
you can carry them out despite the ongoing surveillance
Some people have lived for years under the constant threat of surveillance
and have continued their political activities. But they are unlikely to
publicly discuss many of their expericnces during that time, so as not to
give the cops any clues as to how they managed to make the surveillance go
nowhere, Thercfore, if you are affccted you will have to do a lot of escarch
yourself or seck dircet contact with comrades who have experience with
these matters. Most importantly, you need to work with your own people
o figure out what works for you and what docsn't.
NI pote: The terms “§129” and "§ 1292 refer to pasagraphs in the German penal
code that deal with the formation 2 criminal and tertorst association,respectivly.
72
What You Can Do
There are various ways you can behave: you can continue to live as before
and, if necessary, temporarily refrain from doing risky things. In doing so,
however, you accept that the other side will learn a lot about you, your social
contacts and your political connections. The advantage of this approach
is that you can largely ignore the surveillance. But to protect others, you
must consider where you could be taking the surveillance operators with
you and who they might become aware of because of it.
Another approach is to put your political ife on the back burner, so to
speak by lying low and waiting until the other side gets bored or finds the
surveillance pointless because they simply don't have anything interesting.
10 sce. But keep in mind that they may have been watching you for longer
than you know,and could therefore notice if your lfe suddenly changes
Alternatively, you can go on the offensive and “burn” the operators who
follow you by openly addressing them, taking photos, or the like. Perhaps
you could turn this against them with an appropriate political campaign
and publicity, but you also run the isk that this will draw real attention
to you. Maybe they'll wait a while and then send a better team against
you that you won't notice so casily.In this regard, you should consult with
others before deciding to take this approach. Its tempting to show the
operators that you've detected them and to tellthem to go fuck themselves,
but you'll probably be trading a short-term sense of accomplishment for
the long-term ability to have control over the surveillance operation.
Inany case, it may make sense to get a lawyer involved. Here too,you need
o think about what you should and shouldn't tell them. Of course, lowyers
can't work miracles, and they usually know a lot about legal matters, but
not necessarily about cops or intelligence agencics.
As a general rule, you should avoid conspicuous behavior. Don't keep
turning around on the street or pecking out the window. Don't engage
in any “conspiratorial” activitics in an arca visible through your windows,
And don't make any half-hearted attempts to shake off your pursuers. You
should only do the latter if it's absolutely necessary and you're reasonably
sure you'll suceeed, with the support of other people. Because anything
73
the surveillance operators might find “conspiratorial” will only make you
more interesting.
If you politically organize in non-clandestine projects, you and your
trusted people need to consider the extent to which you should inform
the group. Depending on the structure of the group, not everyone may
need to know. Especiallyif there are inexperienced or les resilient people
in your group, you should develop a very precise approach to the situation.
Unfortunately,sometimes warnings can do more harm than good, in which
case a responsible and considerate response to the situation may be better
than verbal warnings. You might prefer to take a “vacation” for a while, or
at least withdraw from parts of the group work.
If you participate in clandestine projects, the situation is completely
different. You then have to discuss very carcfully to what extent these
activitics could already be endangered by the surveillance that is targeting.
you, and whether you should pause your involvement, cither partially
or completely. Conversely, a sudden termination of certain contacts may
also appear suspicious. Obviously, the others with whom you organize in
this way must be informed of the situation. But clandestine organization
does not automatically mean that everyone wil be able to cope with the
situation. Recklessness, overconfidence (especially among men) insecurity,
paranoia, gossip, inaccuracy—all of this is also present in clandestine
organizing.
1f you have determined that the surveillance you have detected is NOT
targeted at you, it's unnecessary to go around telling everyone what's going
on. Doing so should only be a lat resort when you have no idea who is
being surveilled and who you could tell. Otherwise, panic is often created
by mixing half-knowledge or assumptions with obscrvations, and people
who want to make themselves important run around spreading rumors.
It's always better to inform individual people who you can trust will stay
calm and pass on the necessary information to the right people. You may
be able to find out who the surveillance is targeting, If so, that should be
the end of it for you. It might be interesting to stay up to date on who is
being surveilled and where, but this isn't vry nice for the people directly
concerned. That's why you should follow the same guideline that applics to
74
militant actions: only those who have something to do with the situation
should be in the know.
When You're Under Physical Surveillance...
Tt makes sense to follow these basic guidelines. Surveillance does not mean
the end of all possibilit
* Surveillance does not normally run around the clock for
tended
period of time because it wouldn't be sustainable in terms of personnel.
Along phase of intensive surveillance may be followed by a long
pause. This means, on the one hand, that a surveillance operation
doesn't last forever, but on the other hand, that it can be resumed at
some point. Such a pause may last for weeks or even months.
* Or the surveillance may end with a raid, a subpocna, or even an arrest.
* Stay calm. Panicking only benefis the surveillance operators.
* Try to make arrangements with reliable friends who have your back
and take on tasks you can't do for the time being. Talk to them, but
only to them, and not only about logistics, but also about your fears
and insecurities.
* Consider speaking with a lawyer so you already know who to turn to,
at least in the event of a sudden arrest.
+ Tobe on the safe side, expect the worst. This means expecting technical
surveillance of your home and car, including both camera surveillance
and bugs (though this is les likely), as well as tracking devices. You
can be sure that your phone and mail are being monitored! Assume
that it's not just targeting you, but other people as well. Expect to be
detained or even arrested at some point.
* Clean up the places that could be scarched: apartment, attic, basement,
car, garage, etc.
« Think about places in your home where you cannot be observed,
whether it's possible to leave the house unobscrved, or how you can.
otherwise inconspicuously evade surveillance if doing so becomes
necessary.
+ Avoid any behavior that appears “conspiratorial.”
75
* Try to develop a daily routine for yourselfin this threatening situation.
* Write down your observations and evaluate them with your friends.
« Develop a hypothesis about the reason for the surveillance that you
can deal with. Think about perspectives for your future actions
The worst-case scenario for the surveillance operators is that the target
has turned the tables and is in control of the operators!
“The worst-case scenario for you is being reckless and burying your head
in the sand! But the second worst-case scenario is panic and paralysis!
To all those who are wanted or under surveillance, we wish you all the
strength you need. Let's use knowledge against paranoia!
76
5. Documentation
L
Photos of Actions
Just a few little tips:
‘We strongly discourage you from taking photos of actions in which people
can be seen! Even if they are masked, they may be identified later. Even if
you piclate, people can also be identificd by their body shape and clothing,
and notall methods of pixclation are effcctive, Some image distortions,for
example, can be easily reversed by police technicians. Some photo software
also store a copy of the image before pixclation in its metadata, though
there are programs that remove this additional information. If you post
digital photos onlinc, remember that the image file may contain metadata
about your camera. There are also programs that delete this information,
but we don't know how cffective they are. It s also possible for a camera
10 be scized before the photos it taok arc anonymized!
T note: The majority of this chapter has not been included in this transation
because we deemed it outdated. For more information sbout digita security see our
Threat Library's “Digital best practices”™ mitigation.
*hecps://notrace how/threat-libraey/mitigations/digital-best-practices.html
77
In our experience, we have found that
it is often difficult to find an overview
of different forms of action, especially
militant ones, as well as practical and
contextual thoughts on different aspects of
security and action planning. [...] That's
why we have collected information about
taking action.
NoTrace Project / No trace, no case. A collection of tools to help
anarchists and other rebels understand the capabilities of their
cnemics, undermine survcillance eforts, and ultimately act without
getting caught,
Depending on your contest, possession of cestain documents may be criminalized or atract
umvanted attention. Be carcful about what zines you print and where you stor thern