Skip to content or view mobile version

Home | Mobile | Editorial | Mission | Privacy | About | Contact | Help | Security | Support

A network of individuals, independent and alternative media activists and organisations, offering grassroots, non-corporate, non-commercial coverage of important social and political issues.

"Security Culture"

CrimethInc. | 25.12.2005 21:09 | Culture | Social Struggles

Ingredients:

a small horde of friends
a mission
a set of risks
a strong since of communication

Procedure:

SECURITY CULTURE

Loose lips sink ships

What is security culture?

A security culture is a set of customs shared by a community whose members may engage in illegal activities, the practice of which minimizes the risks of such activities. Having a security culture in place saves everyone the trouble of having to work out safety measures over and over from scratch, and can help offset paranoia and panic in stressful situations—hell, it might keep you out of prison, too. The difference between protocol and culture is that culture becomes unconscious, instinctive, and thus effortless; once the safest possible behavior has become habitual for everyone in the circles in which you travel, you can spend less time and energy emphasizing the need for it, or suffering the consequences of not having it, or worrying about how much danger you’re in, as you’ll know you’re already doing everything you can to be careful. If you’re in the habit of not giving away anything sensitive about yourself, you can collaborate with strangers without having to agonize about whether or not they are informers; if everyone knows what not to talk about over the telephone, your enemies can tap the line all they want and it won’t get them anywhere*.

* “But what about infiltrators and informers?” A CrimethInc. agent asked long ago at his first major mobilization. “We’ll have them peel potatoes,” was the casual reply from an experienced organizer.

The central principle of all security culture, the point that cannot be emphasized enough, is that people should never be privy to any sensitive information they do not need to know. The greater the number of people who know something that can put individuals or projects at risk—whether that something be the identity of a person who committed an illegal act, the location of a private meeting, or a plan for future activity—the more chance there is of the knowledge getting into the wrong hands. Sharing such information with people who do not need it does them a disservice as well as the ones it puts at risk: it places them in the uncomfortable situation of being able to mess up other people’s lives with a single misstep. If they are interrogated, for example, they will have something to hide, rather than being able to honestly claim ignorance.

Don’t ask, don’t tell. Don’t ask others to share any confidential information you don’t need to know. Don’t brag about illegal things you or others have done, or mention things that are going to happen or might happen, or even refer to another person’s interest in being involved in such activities. Stay aware whenever you speak, don’t let chance allusions drop out thoughtlessly.

If you find an affinity group you trust in another locale, your affinity group and theirs can set up an exchange program: with their assistance, you can carry out risky activities in their area without the authorities’ knowing who it is, and vice versa.

You can say no at any time to anyone about anything. Don’t answer any questions you don’t want to—not just with police officers, but also with other activists and even close friends: if there’s something you don’t feel safe sharing, don’t. This also means being comfortable with others doing the same with you: if there’s a conversation they want to keep to themselves, or they ask you not to be part of a meeting or project, you shouldn’t take this personally—it’s for everyone’s good that they’re free to do so. For that matter, don’t participate in any projects you don’t feel good about, or collaborate with anyone you feel ill at ease with, or ignore your gut feeling in any situation; if something goes wrong and you get into trouble, you don’t want to have any regrets. You’re responsible for not letting anyone (not even yourself!) talk you into taking risks you’re not ready for.

Don’t ever turn your friends over to your enemies. If captured, never, ever give up any information that could endanger anyone else. Some recommend an explicit oath be sworn by all participants in a direct action group: that way, in a worst-case scenario, when pressure might make it hard to distinguish between giving up a few harmless details and totally selling out, everyone will know exactly what commitments they made to each other.

Don’t make it too easy for your enemies to figure out what you’re up to. Don’t be too predictable in the methods you employ, or the targets you choose, or the times and places you meet to discuss things. Don’t be too visible in the public aspects of the struggle in which you do your most serious direct action: keep your name off mailing lists and out of the media, perhaps avoid association with aboveground organizations and campaigns entirely. If you’re involved in really serious clandestine activities with a few comrades, you may want to limit your interactions in public, if not avoid each other altogether. Federal agents can easily get access to the phone numbers dialed from your phone, and will use such lists to establish connections between individuals; the same goes for your email, and for that matter the books you check out from libraries. Don’t leave a trail: credit card use, gas cards, cell phone calls all leave a record of your motions, purchases, contacts. Have a cover story, supported by verifiable facts. Be careful about what your trash could reveal about you—dropouts aren’t the only ones who go dumpstering! Keep track of every written document and incriminating photocopy—keep them all in one place, so you can’t accidentally forget one—and destroy them as soon as possible. The fewer there are in the first place, the better—get used to using your memory. Make sure there aren’t any ghosts of such writing left behind in impressions on the surfaces you were writing on, whether these be wooden desks or pads of paper. Assume that every use of computers leaves a track, too.

You can send communiqués regarding clandestine actions from one-use-only email accounts on public computers, bearing in mind that most libraries have camera surveillance that monitors who comes in and out, or to a trusted but unconnected representative who will circulate them for you..

Don’t throw any direct action ideas around in public that you think you might want to try at some point. Wait to propose an idea until you can gather a group of individuals that you expect will all be interested in trying it; the exception is the bosom companion with whom you brainstorm and hash out details in advance—safely outside your home and away from mixed company, of course. Don’t propose your idea until you think the time is right for it to be tried, to minimize the length of the vulnerable period during which the idea is out there without being put into action. Invite only those you are pretty certain will want to join in—everyone you invite who doesn’t end up participating is a needless security risk, and this can be doubly problematic if it turns out they feel your proposed activity is laughably dumb or morally wrong. Only invite people who can keep secrets—this is critical whether or not they decide to participate.

Develop a private shorthand for communicating with your comrades in public. It’s important to work out a way to communicate surreptitiously with your trusted friends about security issues and comfort levels while in public situations, such as at a meeting called to discuss possible direct action. Knowing how to gauge each other’s feelings without others being able to tell that you are sending messages back and forth will save you the headache of trying to guess each other’s thoughts about a situation or individual, and help you avoid acting strangely when you can’t take your friend aside in the middle of things to compare notes. By the time you have convened a larger group to propose an action plan, you and your friends should be clear on what each other’s intentions, willingness to run risks, levels of commitment, and opinions of others are, to save time and avoid unnecessary ambiguity. If you haven’t been part of a direct action planning circle before, you’ll be surprised how complicated and convoluted they can get even when everyone does arrive prepared.

When anonymously submitting a hard-copy press release to the media, print out your announcement at a library or cyber-cafe, and handle it and the envelope with latex gloves; if you must disguise the use of latex gloves, you can wear one of those sweaters with long sleeves that hang down past your hands—you’ll look more cute than dangerous.

Develop methods to establish the security level of a group or situation. One quick procedure you can run at the beginning of a larger meeting at which not everyone is acquainted is the “vouched for” game: as each person introduces himself, all who can vouch for him raise their hands. Hopefully, each person is connected to the others by some link in the chain; either way, at least everybody knows how things stand. An activist who understands the importance of good security will not feel insulted in such a situation if there is no one present who can vouch for him and the others ask him to leave.

Meeting location is an important factor in security. You don’t want a place that can be monitored (no private residences), you don’t want a place where you can be observed all together (not the park across from the site of the next day’s actions), you don’t want a place where you can be seen entering and leaving or that someone could enter unexpectedly—post scouts, lock the door once things get started, watch out for anything suspicious. I’ll never forget exiting an ultra-high security meeting in a university basement only to discover that while we’d been locked in, a crowd of liberal student protesters had flooded the adjoining room to watch a slideshow—which all the organizers of the next day’s militant black bloc had to wade through in embarrassment! Oops! Small groups can take walks and chat; larger groups can meet in quiet outdoor settings—go hiking or camping, if there’s time—or in private rooms in public buildings, such as library study rooms or empty classrooms. Best-case scenario: though he has no idea you’re involved in direct action, you’re close with the old guy who runs the café across town, and he doesn’t mind letting you have the back room one afternoon for a private party, no questions asked.

You can use a Polaroid camera to take photos that are too sensitive to be developed in a lab.

Be aware of the reliability of those around you, especially those with whom you might collaborate in underground activities. Be conscious of how long you’ve known people, how far back their involvement in your community and their lives outside of it can be traced, and what others’ experiences with them have been. The friends you grew up with, if you still have any of them in your life, are the best possible companions for direct action, as you are familiar with their strengths and weaknesses and the ways they handle pressure—and you know for a fact they are who they say they are. Make sure only to trust your safety and the safety of your projects to level-headed folks who share the same priorities and commitments and have nothing to prove. In the long term, strive to build up a community of people with long-standing friendships and experience acting together, with national and international ties to other such communities.

Don’t get too distracted worrying about whether people are infiltrators or not; if your security measures are effective, it shouldn’t even matter. Don’t waste your energy and make yourself paranoid and unsociable suspecting everybody you meet. If you keep all sensitive information inside the circle of people it concerns, only collaborate with reliable and experienced friends whose history you can verify, and never give away anything about your private activities, agents and police informers will be powerless to gather evidence to use against you. A good security culture should make it practically irrelevant whether these vermin are active in your community or not. The important thing is not whether or not a person is involved with the cops, but whether or not he constitutes a security risk; if he is deemed insecure (double meaning intended here), he should never be permitted to end up in a situation where anyone’s safety depends on him.

You can make colorful artwork with Polaroids by scratching and pressing on the photos as they develop: they’ll come out with crazy colors and designs in the picture.

Learn and abide by the security expectations of each person you interact with, and respect differences in style. To collaborate with others, you have to make sure they feel at home with you; even if you’re not collaborating with them, you don’t want to make them uncomfortable or disregard a danger they understand better than you. When it comes to planning direct action, not abiding by the security culture accepted in a given community can blow not only your chances to cooperate with others on a project, but the possibility of the project happening at all—for example, if you bring up an idea others were planning to try in a setting they deem insecure, they may be forced to abandon the plan as it may now be associated with them. Ask people to outline for you their specific security needs before you even broach the subject of direct action.

You can make a hand-warmer out of a used Polaroid film canister once you’re done with it: break the cartridge open, take out the battery to use for something else, and connect the wires—it’ll be quite hot for a few minutes.

Let others know exactly what your needs are when it comes to security. The corollary of abiding by others’ expectations is that you must make it easy for others to abide by yours. At the beginning of any relationship in which your private political life may become an issue, emphasize that there are details of your activities that you need to keep to yourself. This can save you a lot of drama in situations that are already stressful enough; the last thing you need on returning from a secret mission gone awry is to end up in a fight with your lover: “But if you trusted me, you would tell me about this! How do I know you’re not out there sleeping with…!” It’s not a matter of trust—sensitive information isn’t a reward to be earned or deserved.

In suburban settings not conducive to setting fire to your paperwork, you can boil all of it, then knead it into a lump which you flush down the toilet in little pieces.

Look out for other people. Make explicit to those around you what risks you may pose to them with your presence** or with actions you have planned, at least as much as you’re able to without violating other precepts of security culture. Let them know to the extent you’re able what risks you run yourself: for example, whether you can afford to be arrested (if there are outstanding warrants for you, if you are an illegal alien, etc.), what responsibilities you have to be free to keep up with, whether you have any allergies. Don’t imperil others with your decisions, especially if you’re not able to provide concrete support should they somehow get arrested and charged on account of your behavior. If someone else drops a banner in an area immediately adjacent to a fire you set, the police might charge them with arson; even if the charges can’t stick, you don’t want to risk their ill will, or accidentally block their planned escape route. If you help initiate a breakaway march that leaves the permitted zone, try to make sure you keep your body between the police and others who have come along but aren’t necessarily clear on the risks involved; if you escalate a spontaneous parade by engaging in property destruction, make sure others who were unprepared for this are not still standing around in confusion when the police show up. Whatever risky projects you undertake, make sure you’re prepared to go about them intelligently, so no one else will have to run unexpected risks to help you out when you make mistakes.

**A hilarious example of why this is important occurred when CrimethInc. agents Paul F. Maul and Nick F. Adams attempted to return to the continental United States after a period spent hiding out in Alaska. They were worried about how the Canadian customs agents would feel about the massive quantities of assault rifle bullets they had with them, so they removed the panels on the doors of their car and secreted the bullets within. On the way to the border they picked up a hitchhiker, a non-descript, clean-cut fellow who seemed harmless. At the border check, both CrimethInc. workers held their breath as the customs agent ran their I.D.s, but were relieved receive them back without incident. They thought they were going to pass through without a hitch (pun intended) until the customs agent ran the hitchhiker’s I.D.; suddenly armed officers surrounded their car and ordered them out at gunpoint. The hitchhiker, it turned out, was a long time Greenpeace activist who had arrests in thirty countries! The officers strip-searched their car, at last removing the door panels, and they bullets clattered out onto the pavement. Our heros spent the following four hours locked in interrogation rooms, Canadaian policemen screaming, “Where are the guns? We know you have them—tell us where they are,” and paying little heed to their protestations: “This is all a big misunderstanding—we don’t have any guns. We’re graphic designers—we have the bullets for a design project. Honest, officer!”

Security culture is a form of etiquette, a way to avoid needless misunderstandings and potentially disastrous conflicts. Security concerns should never be an excuse for making others feel left out or inferior—though it can take some finesse to avoid that!—just as no one should feel they have a “right” to be in on anything others prefer to keep to themselves. Those who violate the security culture of their communities should not be rebuked too harshly the first time—this isn’t a question of being hip enough to activist decorum to join the in-group, but of establishing group expectations and gently helping people understand their importance; besides, people are least able to absorb constructive criticism when they’re put on the defensive. Nevertheless, such people should always be told immediately how they’re putting others at risk, and what the consequences will be should they continue to. Those who can’t grasp this must be tactfully but effectively shut out of all sensitive situations.

You can keep phone numbers in code, so they won’t be any use to authorities who confiscate your phone list or find a scrap of paper in your pocket: simply switch two or more of the digits.

Security culture is not paranoia institutionalized, but a way to avoid unhealthy paranoia by minimizing risks ahead of time. It is counterproductive to spend more energy worrying about how much surveillance you are under than is useful for decreasing the danger it poses, just as it is debilitating to be constantly second-guessing your precautions and doubting the authenticity of potential comrades. A good security culture should make everyone feel more relaxed and confident, not less. At the same time, it’s equally unproductive to accuse those who adhere to security measures stricter than yours of being paranoid—remember, our enemies are out to get us.

You can use BB guns or slingshots to shoot out lights that are otherwise difficult to reach, if you need to act under cover of darkness.

Don’t let suspicion be used against you. If your foes can’t learn your secrets, they will settle for turning you against each other. Undercover agents can spread rumors or throw around accusations to create dissension, mistrust, and resentment inside of or between groups. In extreme cases, they will falsify letters or take similar steps to frame activists. The mainstream media may participate in this, too, by reporting that there is an informant in a group when there is not one, by misrepresenting the politics or history of an individual or group in order to alienate potential allies, or by emphasizing over and over that there is a conflict between two branches of a movement until they really do mistrust one another. Again, a shrewd security culture that fosters an appropriately high level of trust and confidence should make such provocations nearly impossible on the personal level; when it comes to relations between proponents of different tactics and organizations of different stripes, remember the importance of solidarity and diversity of tactics, and trust that others do, too, even if media accounts suggest otherwise. Don’t accept rumors or reports as fact: go to the source for confirmation every time, and be diplomatic about it.

Don’t be intimidated by bluffing. Police attention and surveillance is not necessarily an indication that they know anything specific about your plans or activities: often it indicates that they do not and are trying to frighten you out of continuing with them. Develop an instinct with which to sense when your cover has actually been blown and when your enemies are just trying to distress you into doing their work for them.

You can report innocent liberals to the secret police for un-American activities, to keep the latter busy and the former outraged about their invasions of privacy—which are otherwise usually reserved for us.

Always be prepared for the possibility that you are under observation, but don’t mistake attracting surveillance for being effective. Even if everything you are doing is perfectly legal, you may still receive attention and harassment from intelligence organizations if they feel you pose an inconvenience to their masters. In some regards, this can be for the best; the more they have to monitor, the more thinly spread their energies are, and the harder it is for them to pinpoint and neutralize subversives. At the same time, don’t get caught up in the excitement of being under surveillance and begin to assume that the more the authorities pay attention to you, the more dangerous to them you must be—they’re not that smart. They tend to be preoccupied with the resistance organizations whose approaches most resemble their own; take advantage of this. The best tactics are the ones that reach people, make points, and exert leverage while not showing up on the radar of the powers that be, at least not until it is too late. In the best-case scenario, your activities will be well known to everyone except the authorities.

You can use lemon juice or urine as invisible ink—heat up the paper, and it appears.

Security culture involves a code of silence, but it is not a code of voicelessness. The stories of our daring exploits in the struggle against capitalism must be told somehow, so everyone will know resistance is a real possibility put into action by real people; open incitements to insurrection must be made, so would-be revolutionaries can find each other and the revolutionary sentiments buried in the hearts of the masses find their way to the surface. A good security culture should preserve as much secrecy as is necessary for individuals to be safe in their underground activities, while still providing as much visibility for radical perspectives as possible. Most of the security tradition in the activist milieu today is derived from the past twenty years of animal rights and earth liberation activities; as such, it’s perfectly suited for the needs of small groups carrying out isolated illegal acts, but isn’t always appropriate for more aboveground campaigns aimed at encouraging generalized insubordination/insurrection. In some cases it can make sense to break the law openly, in order to provoke the participation of a large mass that can then provide safety in numbers.

You should always balance the need to escape detection by your enemies against the need to be accessible to potential friends. In the long run, secrecy alone cannot protect us—sooner or later they are going to find all of us, and if no one else understands what we’re doing and what we want, they’ll be able to liquidate us with impunity. Only the power of an informed and sympathetic (and hopefully similarly equipped) public can help us then. There should always be entryways into communities in which direct action is practiced, so more and more people can join in. Those doing really serious stuff should keep it to themselves, of course, but every community should also have a person or two who vocally advocates and educates about direct action, and who can discreetly help trustworthy novices link up with others getting started.

You can create a seam sealing two sheets of plastic together by cutting them with a hot razor blade—try this for do-it-yourself lamination.

When you’re planning an action, you should begin by establishing the security level appropriate to it, and act accordingly from there on. Learning to gauge the risks posed by an activity or situation and how to deal with them appropriately is not just a crucial part of staying out of jail; it also helps to know what you’re not worried about, so you don’t waste energy on unwarranted, cumbersome security measures. Keep in mind that a given action may have different aspects that demand different degrees of security; make sure to keep these distinct. Here’s an example of a possible rating system for security levels:

1. Only those who are directly involved in the action know of its existence.

2. Trusted support persons also know about the action, but everyone in the group decides together who these will be.

3. It is acceptable for the group to invite people to participate who might choose not to—that is, some outside the group may know about the action, but are still expected to keep it a secret.

4. The group does not set a strict list of who is invited; participants are free to invite others and encourage them to do the same, while emphasizing that knowledge of the action is to be kept within the circles of those who can be trusted with secrets.

5. “Rumors” of the action can be spread far and wide through the community, but the identities of those at the center of the organizing are to be kept a secret.

6. The action is announced openly, but with at least some degree of discretion, so as not to tip off the sleepier of the authorities.

7. The action is totally announced and aboveground in all ways.

To give examples, security level #1 would be appropriate for a group planning to firebomb an SUV dealership, while level #2 would be acceptable for those planning more minor acts of property destruction, such as spraypainting. Level #3 or #4 would be appropriate for calling a spokescouncil preceding a black bloc at a large demonstration or for a group planning to do a newspaper wrap, depending on the ratio of risk versus need for numbers. Level #5 would be perfect for a project such as hijacking a rock show: everyone hears in advance that the Ani DiFranco performance is going to end in a “spontaneous” antiwar march so people can prepare accordingly, but no one knows whose idea it is, so no one can be targeted as an organizer. Level #6 would be appropriate for announcing a Critical Mass bicycle ride: fliers are wrapped around the handlebars of every civilian bicycle, but no announcements are sent to the papers, so the cops won’t be there at the beginning while the mass is still vulnerable. Level #7 is appropriate for a permitted antiwar march or independent media video screening, unless you’re so dysfunctionally paranoid you even want to keep community outreach projects a secret.
It also makes sense to choose the means of communication you will use according to the level of security demanded. Here’s an example of different levels of communications security, corresponding to the system just outlined above:

1. No communication about the action except in person, outside the homes of those involved, in surveillance-free environments (e.g. the group goes camping to discuss plans); no discussion of the action except when it is absolutely necessary.

2. Outside group meetings, involved individuals are free to discuss the action in surveillance-free spaces.

3. Discussions are permitted in homes not definitely under surveillance.

4. Communication by encrypted email or on neutral telephone lines is acceptable.

5. People can speak about the action over telephones, email, etc. provided they’re careful not to give away certain details—who, what, when, where.

6. Telephones, email, etc. are all fair game; email listservs, fliering in public spaces, announcements to newspapers, etc. may or may not be acceptable, on a case-by-case basis.

7. Communication and proclamation by every possible medium are encouraged.

If you keep hazardous information out of circulation and you follow suitable security measures in every project you undertake, you’ll be well on your way to fulfilling what early CrimethInc. agent Abbie Hoffman described as the first duty of the revolutionary: not getting caught. All the best in your adventures and misadventures, and remember—you didn’t hear it from us!

Testimonial:

post your testimonials as comments!

CrimethInc.

Upcoming Coverage
View and post events
Upcoming Events UK
24th October, London: 2015 London Anarchist Bookfair
2nd - 8th November: Wrexham, Wales, UK & Everywhere: Week of Action Against the North Wales Prison & the Prison Industrial Complex. Cymraeg: Wythnos o Weithredu yn Erbyn Carchar Gogledd Cymru

Ongoing UK
Every Tuesday 6pm-8pm, Yorkshire: Demo/vigil at NSA/NRO Menwith Hill US Spy Base More info: CAAB.

Every Tuesday, UK & worldwide: Counter Terror Tuesdays. Call the US Embassy nearest to you to protest Obama's Terror Tuesdays. More info here

Every day, London: Vigil for Julian Assange outside Ecuadorian Embassy

Parliament Sq Protest: see topic page
Ongoing Global
Rossport, Ireland: see topic page
Israel-Palestine: Israel Indymedia | Palestine Indymedia
Oaxaca: Chiapas Indymedia
Regions
All Regions
Birmingham
Cambridge
Liverpool
London
Oxford
Sheffield
South Coast
Wales
World
Other Local IMCs
Bristol/South West
Nottingham
Scotland
Social Media
You can follow @ukindymedia on indy.im and Twitter. We are working on a Twitter policy. We do not use Facebook, and advise you not to either.
Support Us
We need help paying the bills for hosting this site, please consider supporting us financially.
Other Media Projects
Schnews
Dissident Island Radio
Corporate Watch
Media Lens
VisionOnTV
Earth First! Action Update
Earth First! Action Reports
Topics
All Topics
Afghanistan
Analysis
Animal Liberation
Anti-Nuclear
Anti-militarism
Anti-racism
Bio-technology
Climate Chaos
Culture
Ecology
Education
Energy Crisis
Fracking
Free Spaces
Gender
Globalisation
Health
History
Indymedia
Iraq
Migration
Ocean Defence
Other Press
Palestine
Policing
Public sector cuts
Repression
Social Struggles
Technology
Terror War
Workers' Movements
Zapatista
Major Reports
NATO 2014
G8 2013
Workfare
2011 Census Resistance
Occupy Everywhere
August Riots
Dale Farm
J30 Strike
Flotilla to Gaza
Mayday 2010
Tar Sands
G20 London Summit
University Occupations for Gaza
Guantanamo
Indymedia Server Seizure
COP15 Climate Summit 2009
Carmel Agrexco
G8 Japan 2008
SHAC
Stop Sequani
Stop RWB
Climate Camp 2008
Oaxaca Uprising
Rossport Solidarity
Smash EDO
SOCPA
Past Major Reports
Encrypted Page
You are viewing this page using an encrypted connection. If you bookmark this page or send its address in an email you might want to use the un-encrypted address of this page.
If you recieved a warning about an untrusted root certificate please install the CAcert root certificate, for more information see the security page.

Global IMC Network


www.indymedia.org

Projects
print
radio
satellite tv
video

Africa

Europe
antwerpen
armenia
athens
austria
barcelona
belarus
belgium
belgrade
brussels
bulgaria
calabria
croatia
cyprus
emilia-romagna
estrecho / madiaq
galiza
germany
grenoble
hungary
ireland
istanbul
italy
la plana
liege
liguria
lille
linksunten
lombardia
madrid
malta
marseille
nantes
napoli
netherlands
northern england
nottingham imc
paris/île-de-france
patras
piemonte
poland
portugal
roma
romania
russia
sardegna
scotland
sverige
switzerland
torun
toscana
ukraine
united kingdom
valencia

Latin America
argentina
bolivia
chiapas
chile
chile sur
cmi brasil
cmi sucre
colombia
ecuador
mexico
peru
puerto rico
qollasuyu
rosario
santiago
tijuana
uruguay
valparaiso
venezuela

Oceania
aotearoa
brisbane
burma
darwin
jakarta
manila
melbourne
perth
qc
sydney

South Asia
india


United States
arizona
arkansas
asheville
atlanta
Austin
binghamton
boston
buffalo
chicago
cleveland
colorado
columbus
dc
hawaii
houston
hudson mohawk
kansas city
la
madison
maine
miami
michigan
milwaukee
minneapolis/st. paul
new hampshire
new jersey
new mexico
new orleans
north carolina
north texas
nyc
oklahoma
philadelphia
pittsburgh
portland
richmond
rochester
rogue valley
saint louis
san diego
san francisco
san francisco bay area
santa barbara
santa cruz, ca
sarasota
seattle
tampa bay
united states
urbana-champaign
vermont
western mass
worcester

West Asia
Armenia
Beirut
Israel
Palestine

Topics
biotech

Process
fbi/legal updates
mailing lists
process & imc docs
tech