New Events

National

no events posted in last week

Blog Feeds

Anti-Empire

Anti-Empire

offsite link The Wholesome Photo of the Month Thu May 09, 2024 11:01 | Anti-Empire

offsite link In 3 War Years Russia Will Have Spent $3... Thu May 09, 2024 02:17 | Anti-Empire

offsite link UK Sending Missiles to Be Fired Into Rus... Tue May 07, 2024 14:17 | Marko Marjanović

offsite link US Gives Weapons to Taiwan for Free, The... Fri May 03, 2024 03:55 | Anti-Empire

offsite link Russia Has 17 Percent More Defense Jobs ... Tue Apr 30, 2024 11:56 | Marko Marjanović

Anti-Empire >>

The Saker
A bird's eye view of the vineyard

offsite link Alternative Copy of thesaker.is site is available Thu May 25, 2023 14:38 | Ice-Saker-V6bKu3nz
Alternative site: https://thesaker.si/saker-a... Site was created using the downloads provided Regards Herb

offsite link The Saker blog is now frozen Tue Feb 28, 2023 23:55 | The Saker
Dear friends As I have previously announced, we are now “freezing” the blog.  We are also making archives of the blog available for free download in various formats (see below). 

offsite link What do you make of the Russia and China Partnership? Tue Feb 28, 2023 16:26 | The Saker
by Mr. Allen for the Saker blog Over the last few years, we hear leaders from both Russia and China pronouncing that they have formed a relationship where there are

offsite link Moveable Feast Cafe 2023/02/27 ? Open Thread Mon Feb 27, 2023 19:00 | cafe-uploader
2023/02/27 19:00:02Welcome to the ‘Moveable Feast Cafe’. The ‘Moveable Feast’ is an open thread where readers can post wide ranging observations, articles, rants, off topic and have animate discussions of

offsite link The stage is set for Hybrid World War III Mon Feb 27, 2023 15:50 | The Saker
Pepe Escobar for the Saker blog A powerful feeling rhythms your skin and drums up your soul as you?re immersed in a long walk under persistent snow flurries, pinpointed by

The Saker >>

Public Inquiry
Interested in maladministration. Estd. 2005

offsite link RTEs Sarah McInerney ? Fianna Fail supporter? Anthony

offsite link Joe Duffy is dishonest and untrustworthy Anthony

offsite link Robert Watt complaint: Time for decision by SIPO Anthony

offsite link RTE in breach of its own editorial principles Anthony

offsite link Waiting for SIPO Anthony

Public Inquiry >>

Human Rights in Ireland
Indymedia Ireland is a volunteer-run non-commercial open publishing website for local and international news, opinion & analysis, press releases and events. Its main objective is to enable the public to participate in reporting and analysis of the news and other important events and aspects of our daily lives and thereby give a voice to people.

offsite link Julian Assange is finally free ! Tue Jun 25, 2024 21:11 | indy

offsite link Stand With Palestine: Workplace Day of Action on Naksa Day Thu May 30, 2024 21:55 | indy

offsite link It is Chemtrails Month and Time to Visit this Topic Thu May 30, 2024 00:01 | indy

offsite link Hamburg 14.05. "Rote" Flora Reoccupied By Internationalists Wed May 15, 2024 15:49 | Internationalist left

offsite link Eddie Hobbs Breaks the Silence Exposing the Hidden Agenda Behind the WHO Treaty Sat May 11, 2024 22:41 | indy

Human Rights in Ireland >>

Advocating 'domestic extremism' - Cops on Indymedia - an expose

category national | rights, freedoms and repression | news report author Saturday December 04, 2010 14:42author by Indyleaks - June 2010 Report this post to the editors

On April 27th, 2010, a comment appeared on the Indymedia UK newswire entitled Don't use SPEAK as a model. The comment, on an article entitled New animal lab at Leicester; New nationwide campaign to start urged readers to respond to the campaign by "Model{ling} the campaign on a successful AR campaign such as Hillgrove cats or Darnley(sic) Oaks etc". Readers familiar with those campaigns will be aware that the campaigns are alleged to have included violent actions against individuals, including a letter bomb in the Hillgrove Cats campaign, and the removal of Gladys Hammond from her grave.

Posts which incite others to commit violent acts are a risky business for Indymedia Collectives. In early 2009 Indymedia UK had one of it's servers seized after a comment was posted to the newswire, with the home address of the judge from the Stop Huntingdon Animal Cruelty (SHAC) trial. An Indymedia activist was arrested, and to this day the police continue to hold the server, along with personal belongings of the arrested activist. In 2005, a local collective, Bristol Indymedia had their server seized from the home of an activist, after a site user complained to the police, about an anonymous post to the Bristol Indymedia newswire, which reported an 'action' in which objects were dropped onto a freight train carrying new cars somewhere near Avonmouth.

In both those cases, Indymedia because of stringent rules designed to protect user anonymity was absolutely unable to provide IP addresses to anyone, as the system does not log IP addresses. Today however, we are able to state categorically that yesterday's incitement, was one of a long list of posts which have come from a Government Secure Intranet known as Gateway 303, a state network which provides a secure proxy network behind which state agents can maintain their anonymity. Other posts from the same government secure intranet have targeted individual activists, put out information about activists that is not in the public domain, attacked campaigns, and urged the disruption of peaceful protests with Direct Action. The main targets of these many articles and comments have been Environmental Campaigns and Animal Rights campaigns and activists. Whilst we do not have any way of identifying from which computer behind the Government Sercure Intranet these posts came, we are certain that they came from someone who has links to The National Extremism Tactical Coordination Unit known as NETCU, a shady body which has so far evaded accountability because it has been set up as a private limited company despite the fact it is staffed by serving police officers, and funded by the Home Office.

We have decided to publish a list of all posts that we know were made from Gateway 303 so that activists can see for themselves some of the tactics that agents of the State have used to disrupt, and provide disinformation on Indymedia, and which campaigns and activists they have targeted. With this information, we believe that the state should be able to identify their own agent-provocateurs, and furthermore that this exposure of the posts by State Agents undermines the state itself in a number of ways. It shows once again that the so-called "forces of Law and Order" are infiltrated with
unprofessional individuals who are prepared to go to great lengths to set-up individuals and protest campaigns, and that despite all their many claims, parliamentarians are unable to take effective action to weed out the 'bad apples' they say are the problem. It undermines attempts by the Crown Prosecution Service to attempt to smear defendants by pointing to anonymous postings on Indymedia. Judges will now have to take into account that there is clear evidence that Indymedia UK is abused by State Agents to harass campaigns and individuals, and to incite the very kind of 'Domestic Extremism' that outfits such as NETCU were set-up to specifically stop. We wonder if some of their own posts have been used by NETCU to bolster their own importance and to justify higher levels of funding than they might otherwise receive. We cannot know for certain, but can strongly suspect, that there have been other state posts which have come non-filtered IPs, and that by going public on these posts, we have made public the propensity of the State to harass campaigns and activists through abuse of open publishing sites.

How does Indymedia UK know where these posts came from, when it always said it doesn't log IPs?

It is absolutely true that Indymedia does not log IPs - by which we mean the IP addresses of those who use the website are not recorded for the purposes of protecting their privacy. However, what has never been openly stated before is that the CMS system we use has a number of anti-abuse measures which include the ability to monitor for particular IP addresses and log their behaviour. The key here is that IP addresses are never written to the hard disk - they are briefly held in the RAM (i.e. temporary) memory only. Only when particular IP addresses are identified as persistent abusers are they applied to filters. There remains no general practice of logging each and every user. Once the anti-abuse measures are turned off, any IP addresses identified are automatically wiped from the virtual memory and, as they were never written to the hard disk, no amount of forensics would ever be able to find them.

In this particular instance however, the filter for the Gateway 303 IP was manually added after site admins became aware of a post on Animal Rights Copwatch which revealed that someone posting from Gateway 303 had posted to their site, posing as an Animal rights activist. This allowed all posts from Gateway 303 to be identified and each post was flagged with an internal comment that identified it as a post from Gateway 303.

In the early days of Indymedia UK, which will shortly celebrate it's 10th Birthday, site admins believed that they would never be able to gain the trust of posters, if the range of anti-abuse measures were made public. As is often the case, once a body has failed to be completely open about something, it becomes 'the elephant in the room' and so a situation was created where the new and current admins were actively blocked from bringing these measures into the open. The stalemate continued right up until now, with site admins proposing a new approach of coming clean about the measures that are in place, and others in the collective blocking this.

The dilemma was brought to a head when it became clear that the state was exploiting the stalemate to attack campaigns and activists, and the most recent posts meant that the calls to expose these attacks became louder. We sought to convince people within the collectives that activists are now much more aware of how the internet works, and many have direct experience of working on sites which have a range of anti-abuse measures. We also argued that continuing to gloss over the reality in a misleading way was detrimental to Indymedia UK, and that there was no small likelihood that at some stage we could be outed. Furthermore, we argued that as a group we have a duty to defend campaigns and activists that are being targeted by the state, in exactly the same way that people have supported us when we have experienced state repression, and that we could no longer justify allowing state agents to abuse Indymedia UK, by glossing over what we knew was happening.

However the state chooses to respond to this revelation, the truth remains that there is no written log of IP addresses, and that no amount of duress will enable any IMC admin to reveal information that quite simply is not available to them. We will endeavour to produce an article detailing how our anti-abuse measures operate, as quickly as possible.

Be Cleverer than NETCU - mask your identity.

Posts on Indymedia have often urged people to protect themselves from the cameras and Police Intelligence Units by masking up at public demonstrations. Those activists who have taken steps to avoid detection of covert actions before, during and after they take place, are well advised to take other steps to avoid detection when posting about those actions. This is because we know that we cannot guarantee that there are not other ways for the state to trace your computer activity.

In our post-server seizure article in February 2009 we suggested the following steps to to improve your security when using the IMC-UK website:

* Only post stuff to Indymedia that won't get you in trouble.

* Use Tor - an application that allows you to anonymise your IP address. Bear in mind that it is not 100% safe - see these Tor caveats. The safest way to use Tor is probably via a live CD or USB stick, see the The (Amnesic) Incognito Live System, which is designed so that "all outgoing connections to the Internet are forced to go through the Tor network" and "no trace is left on local storage devices unless explicitly asked".

* Don't post it on Indymedia, post it on wikipedia or blogspot or... well those two aren't that good, but Wikileaks is pretty secure and has better security than Indymedia in a number of ways.

* Set up your own open publishing platform: the more the merrier.

* Don't post anywhere on the internet.

We take this opportunity to urge you to look out for workshops on internet security, and to read up on proxies, anonymisers and SSL.

We issued this statement when the server was seized last year:

Indymedia takes your privacy seriously and works hard to ensure that the strictest security measures are in place. However, while we hope that everybody trusts our commitment to protect our users - and thus our technical and security procedures - we also understand that the measures we take may not be easily understandable by non-techs. In this article we have therefore tried to explain some of the measures we take and why we take them. We end with a reiteration of our commitment to the global Indymedia Principles of Unity - and particularly want to highlight Principle 4:

4. All IMC's, based upon the trust of their contributors and readers, shall utilize open web based publishing, allowing individuals, groups and organizations to express their views, anonymously if desired.

We re-affirm that commitment to your security now, and we apologise for allowing a situation to develop where we did not inform you of the full picture. This article marks our commitment to take steps to avoid allowing a similar situation to arise.

© 2001-2024 Independent Media Centre Ireland. Unless otherwise stated by the author, all content is free for non-commercial reuse, reprint, and rebroadcast, on the net and elsewhere. Opinions are those of the contributors and are not necessarily endorsed by Independent Media Centre Ireland. Disclaimer | Privacy