Skip to main content
HomeFull Spectrum Resistance - Chapter 6

"Full Spectrum Resistance" Volumes 1 & 2 by Aric McBay
CHAPTER 6 -SECURITY & SAFETY

Please buy the books as your own reference at

https://fullspectrumresistance.org/get-the-book/

FSR-6-I.png
10-point summary
 
1. The Necessity of "Firewalls" Between Aboveground and Underground Groups Effective resistance movements often separate into two distinct spheres: aboveground organizations that mobilize the public and work openly, and underground groups that operate clandestinely to carry out high-risk actions,. The sources emphasize that maintaining a strict "firewall" between these two is essential; members should not be active in both simultaneously. Mixing these roles—as the Black Panther Party did—allows the state to use the pretext of searching for weapons or fugitives to raid public offices and destroy community programs.
2. The Fundamentals of Security Culture Security culture is defined as a set of customs shared by a community to ensure safety and minimize paranoia. Its core principle is "need to know": activists should never discuss involvement in illegal activities, plans for future actions, or the underground status of others with anyone outside their immediate affinity group,. A critical rule of security culture is never talking to police, federal agents, or intelligence officers, as they are legally permitted to lie to extract information,.
3. Structural Defense through Compartmentalization Underground organizations must use internal firewalls, known as compartmentalization, to survive infiltration. In this structure, small cells (sometimes as small as two or three people) operate independently and are unaware of the identities or plans of other cells. This ensures that if one activist is captured or turned into an informant, they can only compromise their specific cell, preventing the entire network from toppling like dominoes,.
4. Maintaining a Low Profile and Digital Security Resisters engaging in illicit activity must avoid leaving a "paper trail," both literally and digitally. This involves avoiding social media for sensitive communications, using encryption, and blending in to look like ordinary citizens,. However, the sources note that digital data mining creates a high risk of "false positives," leading authorities to harass innocent aboveground activists, such as in the case of Josh Connole, who was arrested simply for being an environmentalist with an electric car,.
5. Case Study: The African National Congress (ANC) The ANC evolved from an aboveground group to a formidable underground movement using Nelson Mandela’s "M-Plan," which organized members into a street-by-street cellular network,. While early efforts were plagued by a lack of experience and loose security—leading to the devastating Rivonia raid—the ANC later adapted by implementing rigorous screening and harsh deterrents against informers, eventually making the country ungovernable for the apartheid regime,,.
6. Case Study: The Black Panther Party (BPP) The BPP achieved massive recruitment but suffered from critical security failures, primarily the lack of a firewall between their public service programs and their armed defense tactics. Furthermore, their internal security relied on "goon squads" that used violence and intimidation against their own members. This created an environment of terror rather than safety, allowing the FBI’s COINTELPRO to easily exploit internal schisms and destroy the party.
7. Case Study: The Weather Underground In contrast to the BPP, the Weather Underground organization maintained excellent operational security, utilizing strict compartmentalization and purging unreliable members before going underground,. While they were highly successful at evading the FBI for years, their extreme isolation and secrecy hindered their ability to build a broader movement and fostered abusive internal dynamics, such as "criticism-self-criticism" sessions designed to break down individual egos,,.
8. Case Study: The Green Scare Investigating environmental and animal rights groups (ELF/ALF), the FBI utilized "keystone informers"—single individuals who cooperated with police—to bring down large networks. The sources argue that these groups failed because they lacked internal compartmentalization; the networks were topologically similar to aboveground groups, meaning one informant (like Jake Ferguson) could identify and implicate almost everyone involved,.
9. The Danger of Toxic Personalities and "Inadvertent Informants" The text argues that misogynists, egomaniacs, and abusive individuals can be as destructive to a movement as police infiltrators,. The story of Brandon Darby, who became an FBI informant after alienating his peers with aggressive, macho behavior, illustrates this risk,. Destructive behaviors—such as domination, bigotry, and abuse—drive away committed activists and create fractures that the state can exploit,.
10. Safety Through Community Care, Not Just Secrecy Ultimately, the most important security tool is building a movement culture based on care and safety rather than paranoia. Misapplied security culture can become an "autoimmune disorder" that attacks the community it is meant to protect. Effective movements must screen out or remove consistently abusive or corrosive individuals to ensure that the organization remains a welcoming and safe place for members to organize.

Insert a link here

Insert a link here

Insert a link here

Insert a link here

Insert a link here

Insert a link here

Insert a link here

Insert a link here