Share to: share facebook share twitter share wa share telegram print page

 

Security culture

Security culture is a set of practices used by activists, notably contemporary anarchists, to avoid, or mitigate the effects of, police surveillance and harassment and state control.[1][2]

Overview

Security culture recognizes the possibility that anarchist spaces and movements are surveilled and/or infiltrated by informants or undercover operatives.[3] Security culture has three components: determining when and how surveillance is occurring, protecting anarchist communities if infiltration occurs, and responding to security breaches.[4] Its origins are uncertain, though some anarchists identify its genesis in the new social movements of the 1960s, which were targeted by the Federal Bureau of Investigation's COINTELPRO projects.[5] The sociologist Christine M. Robinson has identified security culture as a response to the labelling of anarchists as terrorists in the aftermath of the September 11 attacks.[6]

The geographer Nathan L. Clough describes security culture as "a technique for cultivating a new affective structure".[3] The political scientist Sean Parson offers the following definition: "'security culture' ... includes such rules as not disclosing full names, one's activist history, or anything else that could be used to identify oneself or others to authorities. The goal of security culture is to weaken the influence of infiltrators and 'snitches,' which allows groups to more readily engage in illegal acts with less concern for arrest."[7] The media scholar Laura Portwood-Stacer defines security culture as "the norms of privacy and information control developed by anarchists in response to regular infiltration of their groups and surveillance by law enforcement personnel."[8]

Security culture does not involve abandoning confrontational political tactics, but rather eschews boasting about such deeds on the basis that doing so facilitates the targeting and conviction of anarchist activists.[3] Advocates of security culture aim to make its practices instinctive, automatic or unconscious.[3] Participants in anarchist movements see security culture as vital to their ability to function, especially in the context of the War on Terror.[5]

Portwood-Stacer observes that security culture impacts upon research on anarchist subcultures and that, while subcultures are often resistant to observation, "the stakes are often much higher for anarchist activists, because they are a frequent target of state surveillance and repression."[8]

Features

Christine Robinson identifies the black bloc tactic as a component of security culture.

Security culture regulates what topics can be discussed, in what context, and among whom.[9] It prohibits speaking to law enforcement, and certain media and locations are identified as security risks; the Internet, telephone and mail, individuals' homes and vehicles, and community meeting places are assumed to contain covert listening devices.[9] Security culture prohibits or discourages discussing involvement in illegal or covert activities.[9] Three exceptions, however, are drawn: discussing plans with others involved, discussing criminal activities for which one has been convicted, and discussing past actions anonymously in zines or with trusted media are permitted.[9] Robinson identifies the black bloc tactic, in which anarchists cover their faces and wear black clothing, as a component of security culture.[10] Other practices include the use of pseudonyms and "[i]nverting the gaze to inspect others' corporeality".[11] Breaches of security culture may be met by avoiding, isolating or shunning those responsible.[12]

2008 Republican National Convention

In his discussion of security culture during the protests around the 2008 Republican National Convention (RNC), Clough notes that "fear of surveillance and infiltration" impeded trust among activists and led to energy being directed toward counter-measures.[3] He also suggests that security culture practices may cause newer participants in movements to feel less welcome or less trusted, and therefore less likely to commit to causes,[3] and, in the context of the 2008 RNC, prevented those who did not conform to anarchist norms from assuming prominent positions within the RNC Welcoming Committee.[13] Assessing the role of security culture in the anti-RNC mobilisation, which was infiltrated by four police operatives, Clough finds that had "a mixed record", succeeding in frustrating shorter-term infiltrators operating at the movement's peripheries, but failing to prevent longer-term infiltrators from gaining others' trust.[14]

See also

Notes

  1. ^ Clough 2012, p. 1680.
  2. ^ Robinson 2008, p. 226.
  3. ^ a b c d e f Clough 2012, p. 1681.
  4. ^ Robinson 2008, p. 235.
  5. ^ a b Robinson 2008, p. 238.
  6. ^ Robinson 2008, p. 225.
  7. ^ Parson 2008, p. 66.
  8. ^ a b Portwood-Stacer 2013, p. 12.
  9. ^ a b c d Robinson 2008, p. 240.
  10. ^ Robinson 2008, pp. 241–2.
  11. ^ Robinson 2008, p. 242.
  12. ^ Robinson 2008, p. 245.
  13. ^ Clough 2012, p. 1682.
  14. ^ Clough 2012, p. 1683.

References

  • Clough, Nathan L. (2012). "Emotion at the Center of Radical Politics: On the Affective Structures of Rebellion and Control". Antipode. 44 (5): 1667–1686. doi:10.1111/j.1467-8330.2012.01035.x.
  • Parson, Sean (2008). "Understanding the Ideology of the Earth Liberation Front". Green Theory & Praxis. 4 (2): 50–66.
  • Portwood-Stacer, Laura (2013). Lifestyle Politics and Radical Activism. Bloomsbury.
  • Robinson, Christine M. (2008). "Order in Chaos: Security Culture as Anarchist Resistance to the Terrorist Label". Deviant Behavior. 29 (3): 225–252. doi:10.1080/01639620701498927. S2CID 144762570.
Kembali kehalaman sebelumnya


Index: pl ar de en es fr it arz nl ja pt ceb sv uk vi war zh ru af ast az bg zh-min-nan bn be ca cs cy da et el eo eu fa gl ko hi hr id he ka la lv lt hu mk ms min no nn ce uz kk ro simple sk sl sr sh fi ta tt th tg azb tr ur zh-yue hy my ace als am an hyw ban bjn map-bms ba be-tarask bcl bpy bar bs br cv nv eml hif fo fy ga gd gu hak ha hsb io ig ilo ia ie os is jv kn ht ku ckb ky mrj lb lij li lmo mai mg ml zh-classical mr xmf mzn cdo mn nap new ne frr oc mhr or as pa pnb ps pms nds crh qu sa sah sco sq scn si sd szl su sw tl shn te bug vec vo wa wuu yi yo diq bat-smg zu lad kbd ang smn ab roa-rup frp arc gn av ay bh bi bo bxr cbk-zam co za dag ary se pdc dv dsb myv ext fur gv gag inh ki glk gan guw xal haw rw kbp pam csb kw km kv koi kg gom ks gcr lo lbe ltg lez nia ln jbo lg mt mi tw mwl mdf mnw nqo fj nah na nds-nl nrm nov om pi pag pap pfl pcd krc kaa ksh rm rue sm sat sc trv stq nso sn cu so srn kab roa-tara tet tpi to chr tum tk tyv udm ug vep fiu-vro vls wo xh zea ty ak bm ch ny ee ff got iu ik kl mad cr pih ami pwn pnt dz rmy rn sg st tn ss ti din chy ts kcg ve 
Prefix: a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9