Skip to content

Don’t Film, Act
A Call for Confrontation

Your footage will not save anyone, you are not exposing some unknown side of the American cop. We know what the police are, and we know what they do. It’s what they’ve always done. The footage of the murder of Eric Garner didn’t prevent the murder of George Floyd. The footage of the murder of George Floyd didn’t prevent the murder of Tyre Nichols. And the footage of the murder of Tyre Nichols won’t prevent the next cop from killing the next person whose name will be added to a list that has grown so long that its growth is assumed to be inevitable.

In the most unambiguous terms I can muster, whether captured on a body cam or a cell phone, whether amassing retweets on Twitter or opening the hour on the nightly news,
footage will never be able to prevent the violence captured within its frame. Once it has been filmed, you are too late. We are all too late. The moment of potential intervention is gone.

But we don’t have to film.
We don’t have to be passive observers when the violence of
policing breaks out in our proximity.
We can act.

Why Misogynists Make Great Informants
How Gender Violence on the Left Enables State Violence in Radical Movements

The state has already understood a fact that the Left has struggled to accept: misogynists make great informants.

This zine looks at how unchecked misogyny in political movements/groups/whatever you want to call it creates an environment that is ripe for the recruitment and deployment of informants. Misogynist behavior is disruptive and pushes women and queer folks out of spaces, while constantly dominating the agenda.

Confidence. Courage. Connection. Trust.
A proposal for security culture

I want to have the kinds of security practices that allow me to be open while knowing that Ive assessed the risk I face and am taking smart steps to minimize it. Security culture should make openness more possible, not less.

This proposal for security culture is based on reframing: on shifting our focus from fear to confidence, from risk aversion to courage, from isolation to connection, and from suspicion to trust.

Turn Off Your Phone
and other basic digital security strategies

This is designed to be a beginner level introduction to digital security. While a phone isn’t likely to be the thing that gets you in trouble, once a crime is committed digital data is one of the first places authorities will look for evidence. If your data can be accessed retroactively, it may be used in a legal case against you. It offers a basic steps to minimize the risk that comes with using digital devices and offers helpful tips to make their use safer.

Why Do Warriors Wear Masks?
 

In this powerful reflection, an Indigenous warrior explains why masks have become a necessary part of resistance. Drawing on the lessons of the 1973 Wounded Knee uprising and the violence that followed, the speaker details how state surveillance and repression made anonymity a matter of survival. After Wounded Knee, those who stood up were systematically targeted—by the FBI and hired goons. The mask is not a gimmick or a symbol—it’s armor.

This clip delves into the security culture developed by Indigenous movements to protect communities, maintain operational safety, and safeguard the individuals behind the struggle. It underscores the strategic use of pseudonyms and collective identities as tools to ensure that resistance can continue without repression destroying it from within.

Ultimately, “Why Do Warriors Wear Masks?” is not just about hiding faces—it’s about preserving the movement and honoring those who came before.