Infiltrators

Contents

An infiltrator is someone who infiltrates a group or network by posing as someone they are not in order to gain information or destabilize the group or network. They may come from police, intelligence or military forces, from a private company or contractor, or they may act for ideological reasons or under duress (e.g., they are told they will be imprisoned if they don't work as an infiltrator).

Stop Hunting Sheep describes five basic types of infiltrators:

  1. Hang Around: Less active, attends meetings, events, collects documents, observes and listens.
  2. Sleeper: Low-key at first, more active later.
  3. Novice: Low political analysis, “helper”, builds trust and credibility over longer term.
  4. Super Activist: Out of nowhere, now everywhere. Joins multiple groups or committees, organizer.
  5. Ultra-Militant: Advocates militant actions and conflict.

Infiltration can be “shallow” or “deep”. A shallow infiltrator may have a fake ID, but is more likely to return to their normal life over the weekend. Shallow infiltration generally occurs earlier in the intelligence gathering lifecycle than deep infiltration, when targets are still being identified. In contrast, a deep undercover lives the role 24 hours a day, for extended periods of time (with periodic breaks). They may have a job, an apartment, a partner, or even a family as part of their undercover role. They will have a fake government-issued ID, employment and rental history, etc.

See the “Infiltrators and informants” topic.

Used in tactics: Incrimination

Mitigations

NameDescription
Attack

You can attack infiltrators when uncovered or years later[1] to discourage the practice — police infiltrators are likely to be less enthusiastic if there is a local precedent of violence against them.

Background checks

You can perform background checks to help ensure that someone in your network is not an infiltrator.

Need-to-know principle

You can apply the need-to-know principle to limit the information a potential infiltrator can obtain about your involvement in actions (if an infiltrator isn't involved in an action, they shouldn't know who is involved even if it's their own roommate).

Network map exercise

You can conduct a network map exercise to make your network more resilient to infiltration attempts.

Used in repressive operations

NameDescription
Fenix

Two police officers infiltrated the network of the defendants for several months[2]. During their infiltration, the two officers:

  • Tried to convince people to carry out more “radical” actions, presumably to push people into committing crimes for which they could later be charged.
  • Actively provided material support to the network (e.g., printing posters, providing transportation and paying for gasoline), presumably to be seen in a good light by people.