Photograph via snooOG

A resource for the purpose of creating, critiquing, and spreading information regarding the usage of strategies, tactics, and resources in order to minimize arrests, injuries, and police obstruction of actions; ranging from communications, organization, transportation, defensive and offensive tactics, as well as escape from or confrontation of violence and arrest.

This is a place for the discussion of Security Culture and as such, the ethics of content may be debatable. There are plenty of examples of good and bad security culture from groups you may rightfully disagree with completely, that doesn't mean they're necessarily wrong to post. The extremist right and extremist left are responsible for the majority of examples extreme actions, it's fine to debate the ethics of the actions involved but try to keep in mind that we are discussing security as it pertains to all activists.

This sub is not intended to necessarily be exclusive, but the words Security Culture are most used in the context of leftist organizing and actions.

If you have stories of informants, failures or successes that you would like to submit to this sub but would prefer to do so without associating it to your reddit username, please email them to me at rsecurityculture@riseup.net. There will be more information provided shortly on how methods of anonymous communication.



396 Subscribers


Disabling google app on cell phones

Will disabling the google app have a negative effect on using my phone? I have a Motorola Edge 2021.

I don't want google easily gleaning data about me just cuz I need a phone in this world, but I also wonder if disabling this app is even worth the effort...

12:07 UTC


Are you a Security Culture SME?

There's barely any actual discussion here, so I'll kick it off with this: are you a Security Culture Subject Matter Expert?

I want to hear from you all.

  • What are you doing to build, improve, and/or maintain your Security Culture?

  • What research and development into human-centric security and business psychology are you doing?

  • What does your security awareness training curriculum look like?

Let's see who the actual players are in this field. I can't be alone.

13:24 UTC


How to choose the right outdoor security camera system

How to choose the right outdoor security camera system

(Here are a few tips that will help you to pick the best security cameras)

Most of our time we spend outside the home, but in all the scenarios and situations, what we need most when we are outside is the security of our homes to protect from various threats. Hence, most of us spend money on security systems like security cameras.

In a couple of years, security cameras are one of the best investment anyone can make to secure their homes and protects them from threats. Outside security cameras allow you to keep an eye on what's happening in your home while protecting it from burglary and detecting unusual activity.

Security of assets and valuable property is one main concern for businesses. Business Security cameras have advanced with new edge technology, motion sensors, remote control, and instant notifications. These advanced functions are beneficial and make services more flexible and friendly.

The market for security cameras evolved in a few years, and a few new technological advancements and features were incorporated. But unfortunately, keeping on with these technologies and changes is often tedious; even if you hire a consultant, it will not be beneficial. But here we are providing a few tips that will surely be helpful for you if you want to buy a good CCTV camera for your home security.

Controlling home security has never been so flexible without CCTV cameras but thanks to these systems, now we can easily monitor and watch out for every activity in the home. These cameras are also straightforward to operate and just connected to a simple device and do their work.

Every buyer should set some essential points when buying an outdoor camera system.

Light composition

Ensuring the light level of your camera is an essential factor for security cameras. Because light makes a different impact on your overall recording environment. In the areas of proper lighting, there seems to be no problem. However, if you buy a camera for the dim light area, you need to pick one with a better recording quality in that low light. So that you can get a better recording view and a clear focus on objects. Additionally, picking a better quality camera in both day and night mode is the best option.

Wired or non-wired

This is another essential factor you should consider while buying a security camera. Comparatively, wired cameras have better transmission ability than wireless cameras because they transmit the signal via cable instead of air. However, these cameras need a budget and extra effort due to wiring and cable, but once installed, they are perfect for ensuring better safety and quality.

Fixed vs. PTZ

Security camera requirements vary on what type of view you need for your security setup. For example, a fixed position camera is fine if you want to concentrate on any specific location, such as a parking lot. But if you are looking for a camera that rotates and covers all the regions, a Pan-Tilt-Zoom (PTZ) is a good choice.

Storage checkup

Different surveillance have different storage plans; although some systems come with more storage, it’s essential to ensure how much free additional storage is available for your video since video files are long in size and consume a lot of storage. You can also check the storage plans so that you don’t need to bother later for storage.

On-Premise view or remote view

Once your camera setup is done, the one thing which matters is how you want to view it, but it is possibly prime action that you should consider when buying a camera course. For many people, watching places is suitable if they have time. But sometimes, if you have no time and want to view it on smartphones remotely. In that case, remote access cameras are the best choice.

CCTV camera choice is an important thing to consider, top-quality security. However, it takes a lot of prices to install these camera devices. Suppose you want to install security services and are looking for a service installer that fits your budget range. Contact us.

11:05 UTC


Clean Desk Policy by Habitu8, The Security Awareness Video Company

19:11 UTC


SpiderOak removes its warrant canary

11:26 UTC


Como elegir una alarma para casa

Si ya decidiste colocar un sistema de seguridad, debes ser mas astuto a la hora de escoger y saber como elegir una alarma para casa, que tenga los mejores equipos, los profesionales capacitados y obviamente los mejores precios. Hay una serie de variables que tomar en cuenta antes de llegar a la decisión final, es de tener en consideración que hablamos de la seguridad de nuestros bienes, la de nuestra familia y la tranquilidad de tener la certeza de que no perderemos nuestro dinero.

11:17 UTC


Visitor Access management System Application |Hyderabad| Topnotch

ABOUT EVAMS Over the last several years, thousands of organizations, both larger and small, public and private, have discovered the many benefits of replacing the outdated paper log with secure, electronic visitor management system.

E-VAMS is designed considering basic need of proper record Management of Visitor, Material & Property. The Basic Idea is to replace the paper and non productive Visitor, Material & Property Management, with ready to scrutiny' Database created by E-VAMS, which can be further used by Management or HR for Audit.

10:22 UTC


Networking for Information Security/Penetration Testing

Hello Reddit's amazing community, this is my first post ever on the internet, so kindly excuse my faults. And I apologize for the long post in advance, but I really need your help, as my whole future depends on your help, and this important post.

I am interested in Information Security, in fact, I have a strong passion in it, and that's why I chose IT Security over Medicine, Passion over Money/Prestigious. So I decided to make it my job field.

I am enrolled in a Computer science program in a university, 1 month and 12 days left for it to start. I plan to have a master degree in CyberSecurity/IT Security if it's worth it. I have prior experience in hacking some machines, but nothing major, I was just a script kiddie unfortunately.

And as I want to be a professional hacker/penetration tester, I am building the right strong skillset, including programming, networking, operation systems...before I start hacking any machine, or studying any security related degree/certification.

I reached the part of my plan where I learn networking, my plan was like this: Network+ > CCENT > CCNA R&S. I was planning to study them now, and take the exams in my last university year. The main reason I wanted to have those certification (or the CCNA R&S) in my resume is to approve that I understand networking.

So, I got the "CompTIA Network+ All-In-One Exam Guide, Sixth Edition(Exam N10-006)" Mike Meyer's book, and got shocked by how much information is need to be memorized in order to pass the exam, and understanding that information (which is the only needed in the real world field) isn't enough to. And, this is just the basic network+ cert., so the CCNA R&S has much more to memorize (probably 1000+ pages). Also, all that memorization is not needed in the security/hacking field, I just need to understand TCP/IP, know how to pivot, understand wireshark, understand how firewalls work..I don't need to know how to configure 100+ switches with 30+ firewalls, and some load balancers, that is the networking man job. I understand that to hack a network protected using a firewall, and an IPS for example, i need to understand both of them in order to hack it, and that's what I am gonna do, I want to understand and memorize what's needed for hacking, but not 4000+ pages of networking at least. And i am gonna deploy that practically in labs. I am gonna configure switches, routers, firewalls, IPS & IDS.., but I am not gonna memorize tons of things, just to pass a certification, that I am not gonna use, neither in the job, nor in my own hacking journey.

Then, I kept thinking, is studying them using "books maybe + cybrary + labs -packet tracer, virtual networks using vmware workstation-" enough to fill this gap ? I checked indeed.com to see some job posts, and what they require, and no one required having those certifications, just a few required understanding TCP/IP.

This same thing applies to Microsoft, and Red Hat, I planned to get some of their certifications, to approve that I understand Windows and Linux, but i think there is no need anymore. I can self-study them without getting a certification, for my knowledge base only, and focus on the security certifications, so I can now achieve the CEH (just to pass the HR), OSCP, maybe elearnsecurity (their courses are good, but their certifications are not well known unfortunately, so I don't know if it will help me getting a good job), and much more.

And I thought, doesn't achieving OSCP approve that I understand the needed knowledge to do a penetration test ? Such as TCP/IP understanding, wireshark, linux, windows, scripting...as this knowledge is required to pass it! So, I can approve it to the employer this way.

So now, I can achieve some important security certifications within my bachelor years, then I can join a master security degree if it's worth it (in USA or EUROPE) OR I will get a good security-related job immediately after graduation (I don't study in USA or Europe currently, but I would like to work there, as the people there appreciate Information Security much more than here), and then, I will start harvesting SANS certifications -i wish i can afford them on my own now-, and after some years, I will get the CISSP, and maybe then I can work as a CISO! Which is my goal, to be a CISO (As I know, it's the most paying and prestigious job in this field).

In the same time, I will study security books as much as I can, I will build my own lab, I will use vulnerable machines such as the vulnhub's ones, i will use ctf365.com, I will stay up to date with security news and vulnerabilities, I will donate to penetration test local companies, i will attend CTFs, conferences, and bug bounty programs, I MAY make a blog, and I will do my best to fill up my resume (I will make a seperate post to gather as much as possible on what things can help my resume).

You may ask, why did I post this if I already made my decision ? I didn't. I am still worried what is the right thing to do, that's why I need your help. I don't know what is better. I don't know if my path will work or not.

I apologize for the long post. I hope you answer my following questions, and I appreciate any additional advice and suggestions. I hope you correct and direct me to the right path. My whole future depends on your help.

  1. Can I get a security-related job immediately after graduation (I mean my first job is security-related one) with a CS BA degree, CEH cert., OSCP cert., and the self-study stuff that can be put on the resume (such as: books, online courses, achievements, donations, a blog, CTFs, conferences, bug bountry programs...) ?
  2. Is my plan/path realistic ?
  3. Can the CISO level be achieved this path ? (I think I need a management/Business certification to be a CISO)
  4. Additional notes, advice, and suggestions are appreciated.

Thanks in advance.

-LonVenu | Reddit

10:43 UTC


An NSA Whistleblower's Guide to Encryption

17:39 UTC


Earth First! Roadshow Puppets Teach Security Culture

17:15 UTC


How might somebody find your real name through pseudonymous internet accounts?

1 Comment
20:13 UTC


Let's list arrests due to informants

I'm looking to develop summaries of various stories of people being arrested because they provided too much information or went along with informants, there are surely stories with which I'm unfamiliar, let's list them!

I'm under the impression that there are two clearly defined categories of arrests in this topic; active penetration and retroactive informing. Everybody can flip under pressure, plenty of people change their minds about the rightfulness of past action, people get mad at comrades and people get scared. There are also plenty of examples of active penetration with the intention of either collecting information on known groups or pushing people to actions they might not otherwise take part in. Is there something outside of this category?

1 Comment
19:45 UTC

Back To Top