One need only look at recent news to see why Operations Security (OPSEC) is important and how little some of us are currently practicing it.
Staying anonymous online is one of the most important and easiest things you can do. Simply put, ZOG needs names and identities to do anything.
Keep It Compartmentalized
- Keep your online identity separate from your IRL identity. Don’t use your real name.
- Corollary: Keep your NS identity separate as well
- Don’t reuse identities. Use a new one for each site or community. If you’re worried about your persona or rep, the alt-right might be more your speed.
- Use temporary emails and burner accounts. Register over Tor/VPN. Hostile admins or hackers may expose your email address. Tie as little together as possible. Don’t use gmail or any service suspected to be hostile.
- Be careful about revealing details about your IRL life.
- You may want to adopt a cover identify to throw off observers.
- Use Tor or a VPN. Tor still works. It’s true that Tor users have been de-anonymized, but it’s obvious that Tor works and is difficult to break. Use the signed binaries from the Tor Project and learn how to check signatures.
Keep Your Mouth Shut
- Don’t announce that you’re part of a group, especially anything active IRL.
- Don’t talk to the cops. I’ll explain more on this at the end of the guide.
- Don’t talk to the media. Assume anything you say will be used to smear or attack you.
- Don’t harass the opposition. This is one of the Moscow Rules. It attracts attention and puts a target on your back.
- Think before you post.
The Underground Is A Secret
- Don’t publicly talk about IRL activities.
- Develop a culture of security.
- Be suspicious of new members. Assume that people will try to infiltrate.
- Don’t rely on technology
- Especially don’t rely on things that you don’t understand
- Use a firewall if you’re on a public network or not behind NAT on a private net.
- Use a VPN for as much as possible (or reasonable)
- Use an ad blocker and a script blocker.
- Keep your software updated.
- Don’t install strange software.
- Use Full Disk Encryption. Don’t get caught with your machine unsecured.
- Use a password manager (and don’t ever reuse passwords)
Your mobile phone
- Your phone is the fed’s greatest friend, not yours
- Google doesn’t just track your online activities, it tracks your IRL location at all times
- Don’t take your regular phone with you while doing IRL activities
- Consider all information on your phone, contacts, messages, and files to be available to LE
- If you have a burner phone, don’t “pair” it with your regular phone by having them powered on at the same time and place.
- Nothing on the Internet is truly safe or private. I can think of many examples of people letting their guard down while being spied on.
- Private messages are almost always available to admins in some form.
- Logs are available to whoever can get them. Be wary of chat programs that retain message history. Only use ephemeral chats over something like OTR for anything incriminating.
- Understand crypto. Know what public keys are, and how to verify them. Do your research, know when something is encrypted and when it’s not.
- Keep your software up to date. Unpatched exploits are a free pass to your data and easy to use.
- Watch out for metadata in files you share
Don’t Talk To The Cops
Familiarize yourself with the common motives for spying. These are how Law Enforcement creates spies within your organization.
If the feds think that you’re connected to something, it’s not unusual for them to make contact with you. They are gathering intelligence, not trying to help or protect anyone. Saying anything to them beyond “I have nothing to say” only signals to them that you are willing to talk. Loose lips sink ships. Don’t inadvertently give them valuable information because you couldn’t resist bragging or airing grievances.
- Money: Most likely not a concern for NS people. The feds won’t give you money unless you’re already a confidential informant (CI)
- Ideology: A big concern. Ideologically weak members are easy to turn. Filter these people out from your organization.
- Compromise: This can be any number of things. Often LE will pick up a member who has committed a crime and use the threat of enhanced punishment to turn them. Don’t associate with people involved in crime, especially drugs.
Corollary: Don’t associate with people whose weak ideologies (ie. racemixing) constitute compromise
- Extortion: Medium concern. The most likely source is from the threat of doxing. Offer support for people who are doxed.
- Ego: Certain people like to brag to the police that they’ll never be caught, or they want to tempt them with little tidbits of information - true or not. This just opens you up to exploitation. Don’t let them know how much you know. Any lie you tell to LE is a crime that they’ll use against you.
- Disaffection and Grudges: If the police come around asking you questions about a “rival” group, don’t say shit. It doesn’t matter who it is or how ideologically weak they are, nothing good will ever come from this.
There are a huge number of resources out there.
I would encourage everyone to read the news, especially tech/security news, and learn from the failures of others.
The EFF has a number of guides for using different technologies
- https://medium.com/@thegrugq/clandestiny-is-a-constant-521d0f9847a1#.5zvfeatv8 1
Lessons from the drug world
- https://en.wikipedia.org/wiki/The_Moscow_rules 1