Skip to content or view screen version

Hidden Article

This posting has been hidden because it breaches the Indymedia UK (IMC UK) Editorial Guidelines.

IMC UK is an interactive site offering inclusive participation. All postings to the open publishing newswire are the responsibility of the individual authors and not of IMC UK. Although IMC UK volunteers attempt to ensure accuracy of the newswire, they take no responsibility legal or otherwise for the contents of the open publishing site. Mention of external web sites or services is for information purposes only and constitutes neither an endorsement nor a recommendation.

Activist Security

Activist Security | 15.06.2015 12:56

[removed]

www.activistsecurity.org/Infiltrators0.3.pdf

It is never pleasant to think that one of the people you are working with, possibly
very closely, who you go drinking with, who is sleeping with one of your friends,
who seems so full of life and passion is actually trying to undermine everything
you are doing.
Unfortunately, if your group is challenging often very powerful industries or
people with vested interests it is inevitable you will make enemies along the way.
And in a number of cases they will retaliate or seek to counter your campaign,
regardless of how small or large it is. Anyone who has been campaigning for some
time will have those moments when someone or something just does not chime
right, when suspicions are raised that all is not going well. This booklet is a guide
for turning suspicion into certainty.

Activist Security
- e-mail: info@activistsecurity.org
- Homepage: www.activistsecurity.org