Progressive extremists have made clear their intention to silence any and all dissent, up to and including physical violence against those who openly disagree with them. Deplatforming and verbal attacks against conservatives are the norm these days. In some cases, that's extended to mobs threatening their homes, keeping them awake, targeting their families. There have been arson attacks against political offices, and allegedly even against homes.
I expect this to get worse now that the extremists have taken over the United States government. Just as under President Obama the organs of state were weaponized against his opponents - the IRS auditing them, the ATF running guns to drug cartels in Mexico to (allegedly) provide a convenient excuse to target Second Amendment rights, and so on - we can expect that to redouble in effort under President Biden and/or those manipulating him in the background. The scope and complexity of information gathering mechanisms available to the powers that be are extraordinary, and getting more so every day.
Back in 2013, blogger "The Lizard Farmer" put up an article describing how criminals and terrorists could be (and are being) tracked down. It remains an excellent description of how political extremists can use law enforcement tools and agencies, as well as the intelligence and other resources of the state, to do the same to those whom they see as a threat. Here's an excerpt.
We just happened to get lucky (from our perspective anyway) and kill one of the insurgents and have possession of his body. He had no identification, the serial number on his rifle had been removed, and he had even gone to the trouble to remove his own fingerprints (talk about dedication). Those are some significant hurdles to overcome figuring out who this guy is right? Yeah, but not something we can’t work around. A quick phone call to the field gets us a good high resolution frontal image of the DIs (dead insurgent’s) face. The case officer uploads that image into a work file and sends it off to multiple agencies, say the DoJ (FBI specifically), DHS, and the State Fusion Center (there are more but let’s keep it simple). The Fusion center comes back a few hours later and identifies the individual as Bob Jones of Llano TX. How did they do that? By loading the pic of the DI into a biometric facial recognition program and running a comparison to Texas’s drivers license photo database. If they hadn’t gotten a hit it could have been compared to other states databases as well. It would have taken more time but eventually would have given us the identity. Now we have a starting point.
First thing we do is get a quickie warrant and pull all of Bob’s home and cell phone records for the last 90 days. Then we’ll identify every call he made or received in a certain radius say 200 miles. These calls automatically get categorized into business numbers and residential numbers. All calls will be looked at however we’re going to jump into the residential numbers first. In that pool we’ll separate the numbers into known and assumed family (by last name, tax returns, public records databases, etc.) and unknown reason contacts. In the last 90 days there have been roughly 300 calls to personal numbers which belong to a pool of 125 individuals. These 125 are now our short list for the time being.
Now we have an identification and an address it’s time to generate physical warrants. So the local boys go and raid Bob's home and take any and everything electronic, anything that remotely looks like correspondence, and any credit/debit cards or checkbooks. They even go so far as to search vehicles ... Note at this point we’re not trying to build a case against Bob – hell he’s dead. We’re looking for cross referencing information to identify other remembers of his group. Once those items are collected they are handed over to a team of forensic technicians which begin to dissect the information and cross check other databases. Within 24 hours we have a comprehensive list of who he sent and received emails from, the IPs and cookies of the websites he’s visited, any purchases he’s made online and quite a few of the offline ones as well. Remember this isn’t all encompassing but intended to give you an idea of how it works.
All of this information gets laid out into what we’ll call a virtual “starfish” with each bit of info representing a point. We’ve got systems running the phone records down to individual names associated with those accounts referenced by physical location and date, systems referencing any known purchases referenced by location and date, and any and everything else we can dump into the system to expand the starfish. Once this part is done it’s time to start looking at known associations. We do this by take the folks we’ve already identified and trying to determine their association with good old Bob. For the sake of simplicity we’ll start on phone records – those 125 individuals. Those individuals names now generate their own starfish. As the multitude of systems begin to return information on each individual those starfish grow as well. at 36 hours to keep things simple we’ll reject all information on those other starfish if they do not correspond to any of the kegs on the starfish that represents Bob. That narrows down things considerably.
. . .
A couple of days later the analysts come back with a narrowed list of 16 people that could still be considered suspect however Bob had no contact with those people within 14-21 days of the attack in which he was killed. How did they arrive at the 16 people? Remember when the forensic team tore apart Bobs computer? They took his known data (his IP) and ran it across the stored multiple metadata databases to identify which websites he had been visiting. Of those websites a dozen were considered radical or fringe (at least under TPTBs definition of such). they then ran a cross check against those 125 folks from the phone records and 16 other people on our list had visited some of those websites.
. . .
One thing that is puzzling is the fact that Bob didn’t have any phone or email contact with our new 16 person short list in the period immediately preceding the attack. Attacks are typically coordinated so there had to be some form of communication. By scrutinizing Bob’s debit purchase records we find that he had bought a “disposable phone” at the local big box store one day before his last contact with any of the 16 individuals we’re looking at. Getting the number to that phone isn’t hard at all with a quick warrant for the metadata for that carriers phones that were activated within a 36 hour period in Bob’s area. But for timeliness we’re also going to scrutinize those other 16 individuals transactions for the same type of purchase – disposable phones and we come up with nada for them.
The carrier returns the information from the warrant we wanted and two numbers show up as having been activated in the big box store parking lot within that time frame. A quick cross check shows one of the numbers has no association with any of our existing data however one has a call to his personal cell phone. Bingo we now have his number. And we can go back and get all of the metadata for that number including numbers called/received, location, time, and length of call. The phone data itself is built into a starfish of its own and cross referenced against any known contacts Bob had.
There's much more at the link. It's an eye-opening description of how just one piece of information can be built into a vast network of facts and educated assumptions that, over time, will uncover almost anything one wants to hide.
Sophisticated criminal organizations are well aware of this investigative capability, of course, and have developed some pretty amazing work-arounds. I know of one drug cartel that routinely had its operatives purchase prepaid mobile phones (also known as "burner phones") by the dozen in every town where they operated. They would activate them in that area, using false names and addresses, then send them in ones and twos to other towns, or to a central point from where they were redistributed. In this way, each major geographic branch of the cartel received a big selection of prepaid phones that were not associated with it, or with the area in which it operated. They would use each of them no more than once or twice, then discard and destroy it so it could never be traced back to them. It was expensive in money and time, but they regarded this as a normal cost of doing business.
They also used central message repositories, both e-mail and voice messages. An e-mail could be written, but left in draft form and not actually sent to anyone. Cartel members who had the password to that e-mail account could log into it from a burner phone, read the message, and act on its instructions, or compose another draft message with their response. The same thing could be done using Google Voice and similar services, where verbal messages could be left and picked up by all concerned. Such methods are open to interception as soon as the authorities learn of them, of course, but by using cryptic language and indirect discussion, useful information can still be conveyed. The accounts set up for that purpose would be used for only a limited time before being abandoned and replaced by others.
All those techniques are well known by now, and have lost much of their usefulness as a result. Of course, new techniques have been developed to replace them, but it's probably not a good idea to go into them here. Suffice it to say that law enforcement agencies are well aware of them. It's a constant struggle between the good guys and the bad guys. Sometimes one side is ahead, sometimes the other - but it's very, very hard to know which one is on top at any given time.
Sadly, those suffering under political repression may also have to learn to use such techniques in order to continue their activities. If one is supporting sensitive causes, it's often best to be very discreet about it; so adopting clandestine means of communication might be safest for all concerned. I've long since done that in trying to help former convicts and others whom I encountered during my years of prison chaplaincy. There's a network of people who try to help former inmates, getting them out of their crime-haunted neighborhoods and gang associations, and arranging a fresh start for them. Some of those gangs are "blood in, blood out" organizations. If they learned that one of their members wanted to leave them and/or their neighborhood, murder would be done. Extreme caution must be observed in making such arrangements. We've learned the hard way to take that very seriously indeed.
It's also worth noting that any overt communication seeking to whip up support for open opposition to the authorities, or the current majority in Congress, or anything like that, is unlikely to be what it looks like. Law enforcement agencies (as well as political extremists) are old hands at "false flag" approaches. Recent posters have called for armed demonstrations in all 50 State capitals and Washington, D.C. against the inauguration of our next President are a good example of such activities. Do you really think that serious politicians or conservative activists would be dumb enough to openly call for such activities, and ask supporters to come armed? It would be an invitation to their opponents - and the authorities - to crack down on the spot. Those posters were almost certainly the acts of agents provocateurs, not the real thing.
Distrust almost everyone who tries to join you, or entice you to join their group, in efforts to oppose government policies and actions. Most will probably be untrustworthy. It was said some years ago that "the US is crawling with informers and agents provocateurs". It's only gotten worse since that article was published. Trust only those you've known for a long time and vetted as thoroughly as possible, and even then be very, very careful. All sorts of pressures can be brought to bear to "turn" a trusted friend and colleague into an informant. East Germany was an extreme example, but that sort of all-encompassing state monitoring of its citizens is much easier in a high-tech era like ours. Much is already known about past efforts to do so in the USA. I've no doubt that many more such efforts are currently under way.
With so much of our lives laid bare in the electronic spectrum, who knows just how much Big Brother already knows about us? It's likely a whole lot more than we think - or that we'd like.