Montréal Contre-information
Montréal Contre-information
Montréal Contre-information

Berlin, Germany: Attack on Bauer drills and extractivist infrastructures! Solidarity with the Wet’suwet’en anti-colonial struggle!

 Comments Off on Berlin, Germany: Attack on Bauer drills and extractivist infrastructures! Solidarity with the Wet’suwet’en anti-colonial struggle!
Jul 162024
 

From Indymedia.de, translated by Act For Freedom Now!

May 6, 2024

Around the world, countless indigenous communities are fighting extractivist projects and infrastructures, such as mining projects, hydraulic fracking, deforestation and pipelines. In the territory occupied by the Canadian state, for example, a huge project is currently under construction: the Coastal GasLink Pipeline, designed to transport gas extracted by hydraulic fracking. This project not only destroys entire regions, but also threatens the Wet’suwet’en indigenous way of life. The pipeline is to be built on their territory, crossing the Wedzin Kwa River, which is essential to their way of life as a source of water and fish. That’s why the Wet’suwet’en have long opposed this project with fierce resistance, defending their land. Their resistance is met with strong repression, but also benefits from great solidarity.

We want to show that the fight against colonization, and therefore against industrialization and destructive extractivism, knows no borders. That’s why we have attacked a company that participates and enriches itself directly on the destruction of indigenous territories: the Bauer company supplies the drilling rigs needed for the Coastal GasLink pipeline. On May 6, we set fire to two of their huge drilling machines at a construction site in Berlin. To do this, we placed incendiary devices, accelerant and a tire on their cables.

The Coastal-Gaslink pipeline is just one of many extractivist projects on stolen indigenous lands in Canada and around the world. Whether it’s oil, gas, coal, gold, lithium or hydroelectricity and wind power (now expected to produce “green” hydrogen in Canada, of great interest to Germany), all these industrial projects are part of a colonial system that destroys the land and eliminates indigenous ways of life.

We stand in solidarity with the Wet’suwet’en struggles against the colonial Coastal-Gaslink pipeline project.

Whether in Canada, Chile, Peru, the Hambach forest or northern Portugal, let’s fight destructive extractivist projects and connect our struggles!

Switch off the system of destruction and colonisation!

Union Action at the Head Office of Renaud-Bray

 Comments Off on Union Action at the Head Office of Renaud-Bray
Jun 292024
 

Soumission anonyme à MTL Contre-info

La famille Renaud sont des trous de cul notoires de père en fils. Il sont les ennemis de la classe ouvrière et le seront toujours.

Leurs positions et propos anti-syndicaux briment les droits fondamentaux de nous, travailleurs et travailleuses, depuis trop longtemps.

Les affiches, c’est comme un syndicat : « C’est fâchant, parce qu’une fois que c’est arrivé, c’est bien difficile de s’en séparer. »

Maintenant, allez-vous commenter, ou ça aussi, c’est des affaires internes?

Un affront à l’un-e est toujours l’affaire de tou-tes. La classe ouvrière ne vous oubliera pas!

Report-back on the June 6th Riot

 Comments Off on Report-back on the June 6th Riot
Jun 162024
 

Anonymous submission to MTL Counter-info

June 6, 2024 will live long in our memories.

What happened that day was more than impressive. A riot emerged spontaneously on the McGill campus in response to police violence and a convergence of forces from the student intifada.

Since the media coverage seems to gloss over the strength of youth resistance that day, it seems important to take a look back at the day’s events.

First of all, a demonstration had already been called by the forces of the Université Populaire Al-Aqsa (UQAM), which ended its occupation earlier in the day. Parallel to this, an occupation of the Mcgill administration building was organized by students from the university. It was around this occupation that the riot was organized.

Following a call for support from McGill groups, a hundred or more activists converged on McGill to support the students barricaded inside the building.

The police on the ground acted with excessive aggression in the face of the fairly strong passivity of those present. Physically forcing the students who were blocking the secondary doors towards the main gathering in front of the front door. Hundreds of police officers were then mobilized to secure the area around the building and allow the police officers inside to intervene and arrest the 13 students trapped inside.

The aggressiveness of the police and their ridiculous effort to arrest a handful of students quickly heated things up. The students on the ground began to prepare for a police dispersal operation. While a small line held the west of the area, the forces converged to the east to hold a line against the massing riot police. Aided by more experienced activists, the students then began to stand in collective defense formations. Shortly afterwards, the police attempted a first charge into the lines. Surprisingly, despite pepper spray, gas, shields and truncheons, the lines held firm. While the bulk of the force seemed to be made up of activists new to street confrontations, the lines withstood a police charge and managed to push back the riot line. Perhaps the escalation of violence that the police have been building up since April 15 has succeeded in completing the movement’s efforts at self-pacification. Whatever prompted the people gathered there to stand firm, their actions were more than commendable.

Some of those present then retreated in the face of the irritants, but many of them returned to reinforce the lines. Lines that held off a second charge (notably using fencing, ramps and other obstacles) before a third charge finally broke through the line of students. The ego-stricken police then proceeded to brutalize as many activists as they could. Instead of demobilizing the group, this violence reinforced the militant rage. They gathered in the middle of the campus.

While these clashes were taking place, UPA forces arrived in support. Taking up positions on the other side of the police force, they threatened to entangle the police with the demonstration in support of the south. The students tried to resist, but were eventually forced to retreat to the south entrance of the campus.

The forces of both groups then regrouped on the edge of Sherbrooke and, under the call of the radical forces within the demonstration, took to the streets.

Motivated to go and get their arrested comrades, enraged by the violence they had suffered and motivated by the strength of their resistance, the students then engaged in a harassment of the police line laid out around the administration building. Although the forces of resistance failed to de-arrest the comrades, they forced the police to withdraw to their position.

As night fell and tension began to mount again, the students abandoned the campus and took to the surrounding streets. The forces of the student intifada learned the language of the riot, bank windows were smashed, police officers were fired upon with pyrotechnics and rocks rained on them, and every available object to form barricades was used to block access to police vehicles as the students took control of the streets for a few hours.

We must learn from this day and ensure that the movement never goes backwards. The intifada must realize its full potential.

A first lesson is to abandon the black bloc in this kind of demonstration. By dispersing into the crowd, experienced revolutionaries were able to blend in and pass on to the people there the practices of resistance to the police. Let’s adopt the movement’s uniform: the kefffiyeh bloc is in with the times.

A second lesson is to address the crowd clearly in demonstrations, ignoring peace police of all kinds. While self-proclaimed leaders, seemingly detached from student groups, were trying to disperse and pacify the crowd, our more experienced comrades and students were out in the field explaining to people how to resist and encouraging them to hold their ground against the cops. Less experienced militants expect those who know how to resist to guide them in action. We can’t continue to act as a force separate from the rest of the demonstration, we need to see in the faces present in the demonstration as many comrades. We must counter the leadership of opportunists, pacifists and other saboteurs.

The final lesson is to seize the opportunity to escalate when it presents itself. When the police make mistakes, when they brutalize and reveal their face, revolutionaries must be among those left to hold the lines and encourage young people to follow us. We also need to put the police on the defensive, attacking them and forcing them to defend specific targets, so as to have free rein in the streets.

Close the Office in Tel-Aviv

 Comments Off on Close the Office in Tel-Aviv
Jun 082024
 

Anonymous submission to MTL Counter-info

The CAQ, complicit in a genocide!

The ongoing massacre in Palestine is a crime against humanity.

40,000 people have been brutally murdered and more than 2 million have been displaced.

Meanwhile, the CAQ and its minister Martine Biron will open an office for Quebec in Tel Aviv…!

Cooperating with an apartheid regime seems urgent for the Legault government, but not for a large part of the population.

The CAQ has blood on its hands! We therefore added some color to the doors of the Ministry of International Relations.

The peoples of Quebec need not sanction the collaboration of the state with this killing. No Quebec office in Israel!

Palestine will be free!

Do not look for us, we are no one, we are everywhere. Agitate, sabotage, disrupt.

Northvolt: the poison-tree will fall

 Comments Off on Northvolt: the poison-tree will fall
May 152024
 

Anonymous submission to MTL Counter-info

Let the axe
Strike at the root, the poison-tree will fall

On Sunday, May 5th, five incendiary devices were placed at the Northvolt construction site in Quebec. This action was taken to damage machinery and reduce the project’s ability to continue. Unfortunately, these devices failed to ignite. If there is one takeaway to share, when choosing materials consider how weather (high humidity or rain) might decrease the chances of a device igniting. The longer the timer, the longer the device will be exposed to environmental factors thereby decreasing the window of success.

Why choosing to attack and damage property? While Northvolt, a transnational corporation, sells themselves as the leader of the green transition, they are in fact its headstone. The electric vehicles the company plans to provide with their batteries are a false solution to the environmental destruction caused by industrial society; rather this expension of the automotive industry is only allowing the devastating impact of car infrastructure to continue. With this project, Canada’s insatiable appetite for natural resources will only grow. Lithium mining, which is essential in the process of producing Northvolt’s “green” Lithium Ion batteries, is poisoning human communities and entire ecosystems across the land. Lithium is already being extracted from unceded Indigenous territories here in “Quebec”, with many new mines planning to start operating in the next few years. With this kind of mega project, lakes, forests and wetlands will disappear under new roads and pit mines. First Nations will loose access to their traditional territories and with that loss, the ability to practice and sustain their ancestral ways of living and relating to the land. They will be surveilled and harassed by workers and security. The animals of these territories will die or will have to migrate elsewhere as their homes are destroyed.

Has anyone else noticed how quiet the land around Northvolt has become since they chopped down the trees and destroyed the wetlands? It’s eerily silent.

Capitalism and the State are in league, dumping public funds into private corporations that will only worsen the ecological crisis across the globe. This is why we must act, and more often than not, we must act beyond the laws imposed on these lands by governments. The Quebec government has already dropped regulations put in place to protect the environment and looked the other way while Northvolt violates numerous laws and codes. This is because Legault’s government (like any colonial gorvernment), is politically invested in making this project happen. However, the future remains to be written. We still have choices to make. We still can act! We must not be guided by crooked laws, but by the love and care we and others have for the collective health of all beings, the land, the water and the desire for a better world through struggle against colonial structures. Armed with our convictions, let us go into the night and choose to take the necessary risks to fight for a livable future.

Tire Fire for Palestine

 Comments Off on Tire Fire for Palestine
May 022024
 

Anonymous submission to MTL Counter-info

In the night of the 29th of April anarchists started a tire fire on the train tracks in St-Henri. The action was done to disrupt train traffic momentarily in solidarity with Palestine and the anti-capitalist 1st of May. We hope this action inspires others to disrupt the economy and the flow of capital across the world.

From the river to the sea, Palestine will be free!

Tenants Raging Against Airbnb

 Comments Off on Tenants Raging Against Airbnb
Apr 252024
 

Anonymous submission to MTL Counter-info

Tenant rage strikes again!

In view of tenants’ day, we decided to answer the call for the creation of collaborative art on Airbnbs, because we’re sick and tired of passing by housing that serves above all to enrich shitty fucking landlords rather than house our neighbors. We will never any longer ignore these new buildings destined only for short-term rentals, while we struggle to put a roof over our heads.

According to the platform, the building we redecorated belongs to the Airbnb host “Carli”, who claims to live in Vancouver and uses the same license number for 24 units. Still, beyond the legal issues, this situation sheds light on the persistent control of a minority over our housing and our (historically) popular neighborhoods, denying tenants their fundamental right to the city.

Fuck Airbnb, fuck landlords, and long live alternative decoration!

Fuck Highway 20

 Comments Off on Fuck Highway 20
Apr 182024
 

Anonymous submission to MTL Counter-info

Despite opposition from the local community, concerns of environmental degradation and the utter futility of such a project, the government of Quebec insists on extending a highway from Notre-Dame-des-Neiges to Saint-Simon, which involves building a bridge over the Trois Pistoles River. Ministère des Transports du Québec’s (MTQ) blind persistence to extend the tentacles of the state and industry heavily relies on contractors like EnGlobe, a multinational engineering firm with offices in Quebec. As of this writing, geotechnical surveys are being conducted on both sides of the River. The surveys involve drilling for soil samples with heavy but vulnerable equipment kept overnight in the city of Trois Pistoles.

In the night during the 2nd week of April, anarchists sabotaged the truck transporting the surveying drill and covered it with tags letting MTQ know they were unwelcome in the area.

Anarchists in Quebec and elsewhere are invited to do the same to EnGlobe equipment and property. We must reject the highway, destroy the tendrils of capitalism and colonialism to save our forests and rivers, the true arteries that sustain us.

“Cops Off Campus” Anarchists Attack McGill

 Comments Off on “Cops Off Campus” Anarchists Attack McGill
Apr 052024
 
Image not associated with action

Anonymous submission to MTL Counter-info

Police were invited to campus last week by McGill and pressured to charge someone by the administration just for some graffiti.

When cops are invited onto campus they police and ruin young people’s lives. Universities need to be made places of sanctuary. Denunciations and the lessons of history have not worked so far.

Yesterday, at night, we anarchists, armed with tools that anyone can find, committed our first acts of revenge, leaving our marks on the McGill administration building.

We wait for no one to act.

For liberation from all authority.

Cops off campus!

How to submit an anonymous communiqué and get away with it

 Comments Off on How to submit an anonymous communiqué and get away with it  Tagged with:
Mar 192024
 

From No Trace Project

[PRINT]          [READ]

A communiqué, also sometimes called a reportback or hit report, is a report on (typically) illegal direct actions that is shared online via counter-info sites or in print publications. Mainstream media may suppress reporting about certain tactics or the reason for choosing a target may be unclear, so submitting a communiqué is a way to share news, tactics, and political motivations directly.This guide describes how to securely submit an anonymous communiqué online. It is written for anarchists, but could be useful to other audiences like journalists or dissident groups sharing information while concealing their identities. While some communiqués are signed by a group or individual claiming responsibility, this guide focuses on anonymity.

Nothing you do on computers or the internet is ever totally safe, but you can reduce most technology-based risk by following some simple steps. There are many methods beyond those shared here, but this is a set of instructions that will hopefully help you.

Key terms

Communiqué: A report on (typically) illegal direct actions that is shared online via counter-info sites or in print publications.

Threat model: An analysis of risks that could compromise security, how likely they are to happen, and how they may be mitigated.

Tor: Short for “the onion router.” Tor is a strong anonymity system that routes your internet traffic through a series of random volunteer-run nodes across the planet. Learn more and download Tor Browser at torproject.org.

Browser: The application that allows you to access the internet. In addition to Tor Browser, other common examples include Firefox, Edge, Brave, and Chrome.

Operating system: Software programs that tell the hardware in a computer how to function. Common examples include Windows, Mac, Linux, and Tails.

Tails: An operating system that runs off a flash drive and leaves very few digital forensic traces on your computer. Tails also provides strong anonymity to your browsing traffic by routing all of it through Tor. Learn more and install at tails.net.

Stylometric analysis (stylometry): A forensics technique that analyzes word choice and style to identify authors and guess about their characteristics, for example regional dialect, education level, and unique word choice/phrases/typos.

Metadata: Data about data. For digital media, this is data contained within a photo or video file like camera type and date and time of capture. It can also refer to data about your typical patterns of internet use or date and time an account is created.

Disposable email: An anonymous email account that is temporary or single-use, typically with no login or account information. Also sometimes marketed as “spam email” sites.

Encryption: A method of hiding content in a message so it is only visible to your intended recipient.

The guide

1. Obtain a Tails stick and identify a computer to use

Make or borrow a Tails stick, a USB drive that contains files to run the amnesiac operating system Tails. Install from tails.net or ask a tech-savvy friend to help you with the process. When making your Tails stick, use Tor Browser and space it out from when you send the actual communiqué so as to not leave as strong of a correlation. Making your own Tails stick is recommended over borrowing one since that keeps your digital habits or plans more private and makes it harder to compromise multiple people’s security through one contaminated device.

The general recommendation for most people is to use a personal computer that is only for Tails, on public WiFi. The risks of using Tails on a personal computer that you also use for other tasks are fairly low, but not zero. Avoid sitting where your screen or keyboard would be visible to any surveillance cameras. (If you are fast enough at it, single stall public restrooms or restrooms with tightly closing stalls can be great for this.)

Depending on your threat model, different computer and network options could be better suited to your security needs. Using public WiFi or a public computer (for example in a library or cybercafé) could reveal information about your movements, especially if you are already under physical surveillance. Public computers themselves could be compromised at the hardware level or through intentional collaboration between their owner-operators and law enforcement, and this could be almost impossible to detect. Using a device in your home, on your home WiFi, could leave you more vulnerable to threats like hidden cameras or sophisticated Tor correlation attacks. And, of course, if the place where you store your computer is insecure, the device could be compromised by hardware tampering (like a keylogger) or malicious software (less likely to matter when using Tails). For more information on threat modeling for your specific situation and learning about ways these attacks have been used against other activists, visit the No Trace Project (notrace.how) or AnarSec (anarsec.guide).

2. Boot into Tails OS

Plug the Tails stick into the computer while it is off. Turn on the computer and hold down specific keys to access the boot menu. Refer to the included table (taken from tails.net, which also has more detailed instructions) to see which keys are relevant for your device. If you must search for this information online, use Tor Browser and try to space that search out significantly from when you intend to submit your communiqué.

On startup, you will probably see phrases like “Press [key] to access boot menu” or “Press [key] to access BIOS options”. Some computers tell you to “Press [key] to interrupt normal startup” which brings you to the boot menu. From there, select your USB drive from the list and your computer will boot into Tails.

At the Tails welcome menu, when given the option to unlock Persistent Storage (if you have it set up), do not. Anything saved to Persistent Storage will be impossible to truly delete, short of reformatting and destroying your Tails stick. If you must save data between Tails sessions, use a second encrypted USB that you can destroy afterwards. To learn how to create an encrypted USB on Tails, read “Tails for Anarchists” on anarsec.guide.

Tails comes with many helpful programs pre-installed, including Tor Browser (to access the internet), Metadata Cleaner (to remove metadata from files including photos & videos), GIMP (for photo editing), the LibreOffice Suite (open-source versions of Microsoft Word/PowerPoint/Excel), and more.

3. Open Tor Browser and find submission sites

Connect to the internet and use Tor Browser to identify counter-info sites that may be interested in your communiqué. Here are some relevant sites, sorted by region:

North America:

Europe:

Central & South America:

International:

These sites usually have a “contact” or “submissions” page which tells you how to send information you want published. This can be an email address or a form built into the website. Some offer both options (see steps 5-7).

4. Write your communiqué

(If your action has already been reported in the mainstream media, consider whether publishing a communiqué is worth the risk. Ask yourself: Does it include specific helpful information that will encourage other people to act? Will your intended audience see the already existing reporting? Does the target of the action understand why it happened, if that is important? Sometimes it may be better to submit a mainstream news article to counter-info sites, instead of writing an original communiqué.)

If you decide that writing your own submission is worthwhile, type your communiqué in a text editing program like LibreOffice Writer or Text Editor, NOT in the browser. The timing of keystrokes is very unique, especially for large blocks of text, and tracked by default on many web services. Do not save the document.

Only include information the police already know. Don’t add details like how many of you were involved, your background or identities, where you got supplies, entry or escape routes, or a long and stylistically unique personal political diatribe. These could unintentionally help an investigation against you.

To avoid stylometric analysis identifying you or grouping multiple of your submissions together, keep it short — less than 300 words if you can. If you’re writing with a friend, edit collaboratively to disguise your style. LibreOffice Writer can check for typos and punctuation errors, but will usually try to enforce formal linguistic rules. Unusual or specific dialect choices could help investigators link a communiqué to other writing. Making all letters the same case (upper or lowercase) disguises some style choices, but can be notable as a style choice itself. Some people recommend running text through Google translate or similar software to further disguise specific word choices and phrasing. This can be especially effective when translating between several languages with less online prevalence and/or different translation engines between languages. An English translation of the text “Who wrote that?” from Zündlumpen #76 deals with this topic extensively.

5. Compress then remove metadata from photos and videos

First, seriously consider if posting visual media of your clandestine action, especially videos, is worth it. Such media can give investigators a lot of information they might not have already have. Read up on open source intelligence techniques and video analysis. Details like faces, skin, tattoos, scars, height, gait, or unique clothing or accessories could lead to identification. For videos, things as simple as the hum of the electrical wires in your walls, road noise, or a single leaf can give very damaging information to the police, or any bored person with a laptop and an internet connection (yes really, any). And of course, the sound of your voice or car engine could be damning. Best practice is to use a burner camera (obtained for this purpose only, then discarded) to avoid photos or videos from different actions being linked together based on sensor noise.

If you decide submitting photos or videos is worth the risk, compress them to remove extra details by reducing the number of pixels. Lower resolution media can support your overall message without accidentally providing evidence like detailed reflections or tread marks. As a bonus, this reduces the file size which will make it easier to upload and share. For images, open them in GIMP then go to “File > Export As”. Click “Select File Type” and choose “JPEG” from the list. Use the “Quality” slider to reduce image quality, using the preview to check that it isn’t degraded too much.

Compressing videos is more complicated; look at the Tails OS documentation on sound and video for suggested programs and how to install them. There are websites that compress videos for you, but the most secure option is always something offline. If you upload a high-quality version to any website, that website could retain a copy and/or provide information to law enforcement. If you are in doubt about the potential evidence contained in your video, or are unsure how to remove potentially-identifying information, it might be best to leave it out of your submission entirely.

Once your files are compressed, the final step is to remove metadata, digital information that isn’t visible in the media but can be viewed in the file properties. Open Metadata Cleaner, click the “Add files” icon in the top left, and select your files. Click “Clean” in the bottom right to remove metadata and overwrite the originals.

6. Open the site submission form (if applicable)

As mentioned in step 3, some counter-info sites have built-in submission forms. These are often an easy and secure option to submit a communiqué, especially if you are sending only text. Each site is slightly different, so check the “submissions” or “contact” page for the exact sites where you want to send your communiqué.

Some sites accept media files through their online form, while others suggest specific filesharing sites. If files cannot be uploaded directly, one option is to upload them to file.espiv.net so you can paste a URL into a text box instead of attaching a media file directly to your submission. Note that some counter-info sites may not accept files submitted this way, as it poses a risk to site administrators. Check the relevant submission guidelines and use their suggested file sharing site(s) if available.

Paste your communiqué into the text field, enter fake non-identifying information in any other fields, upload cleaned media files or paste the filesharing URL if applicable, and submit! If that all works, skip to step 9.

If the site you want to submit to just has an email address or you experience technical difficulties using their submission form (including the communiqué not being received, which you might not notice until days later if it hasn’t been posted yet), it may be better to send your communiqué via email, as detailed in steps 7-8.

7. Create a Protonmail account, or other disposable email

If you are not using an in-site submission form, you can send an email from an account created just for this purpose. One option is Protonmail (proton.me) — many submission sites also use Protonmail, making your email end-to-end encrypted by default. Note that this encryption is not as strong as something like PGP through a trusted email provider and Protonmail as a company is not your ally (they previously collaborated with cops and lied about it). However, the contents of your message are intended to be posted publicly. The intent here is not to keep the contents of your message absolutely secret, but to minimize any metadata or personal identifying information you could accidentally send with your message. NEVER send identifying information in connection with a communiqué.

For the username, pick 2-3 random words. The website randomwordgenerator.com can help with randomness. Use a different set of random words for the password (ideally 6+ for good password security). Do not save this login information anywhere.

When using Tor, Protonmail will ask for a secondary method of verification. Enter a disposable email address created on guerrillamail.com, yopmail.com, tempr.email, or a similar disposable email site so you can receive the confirmation code.

If you do not want to use Protonmail, you could try sending your communiqué from a disposable email site. However, many of these sites only receive emails and the ones that let you send an email (tempr.email) are sometimes less reliable, especially with media attachments.

Consider trying multiple methods, or varying methods between communiqués, in order to avoid creating metadata about your submission process.

8. Create and send the submission email

Paste your communiqué into the body of the email. If sending your email between two Protonmail accounts (or another service that advertises end-to-end encryption between accounts they provide), the content of your email will be encrypted. The subject line, however, is never encrypted — for the safety of you and your recipient put something vague in that field or leave it blank.

Photos can usually be attached directly to the email. Videos or other large files can be uploaded to Proton Drive (same account as the email) or file.espiv.net and sent as a link. Note that some counter-info sites may not accept files submitted this way, as it poses a risk to site administrators. Check the relevant submission guidelines and use their suggested file sharing site(s) if available.

Read over everything one last time to make sure there are no mistakes and you attached everything you wanted. Then send the email!

9. Close out, clean up

Close any open programs, do not save any login info, and do not use the email account (if you made one) for anything else. Shut down the computer and remove your Tails stick. It can be safely used again, with no connection to the prior session, on the same computer or a different one.

If relevant, delete any photos or videos then destroy and dispose of any camera or SD card used in the action. Breaking a device into small pieces is best (the NSA recommends pieces < 2 mm), which can be achieved in a good quality household blender. Other options include using a hammer, plumbing torch, or strong acid. Avoid inhaling fumes from burning, melting, or other chemical reactions with metals or plastics.

Consider disposing of this zine if you’re using a hard copy, by destroying it or gifting to a trusted friend. It doesn’t prove you’ve done any crimes, but wouldn’t look great in court as potential corroborating evidence.

Conclusion

That’s it! This might seem like a lot of steps at first, but it’s not that hard and gets easier every time you do it.

Stay safe, be dangerous, don’t get caught.

Relevant websites: