FBI is investigating Minnesota Signal chats tracking ICE
Legality, First Amendment, and “Interference”
- Many argue the chats and on-the-ground actions (filming, tracking vehicles, supporting families, “legal observing”) are core protected speech and assembly; they see the FBI probe as intimidation and a chilling effect.
- Others counter that if chats coordinate blocking vehicles, “de-arrests,” mobbing agents, or warning targets in real time, that can cross into obstruction, conspiracy, or seditious conspiracy.
- There is extended debate over 18 U.S.C. § 372, § 111, § 118, § 1505; one side says they require force/intimidation and don’t fit observers, the other says coordinated crowd actions and targeted “go there now” messages could qualify.
- Some frame nonviolent “interference” as civil disobedience that, by design, accepts arrest; others say this breaks the line between protest and unlawful conduct.
Signal, Phone Security, and OpSec
- Consensus that Signal’s crypto is intact; the real risks are:
- Phones seized and unlocked (forensic tools, zero-days, or coercion).
- Undercover agents, informants, and journalists in large, loosely vetted groups.
- Screenshots leaked from inside chats, not protocol compromise.
- Disagreement over how dangerous Signal’s phone-number requirement is; critics see it as a key identifier, defenders note usernames, contact-discovery protections, and minimal server-side metadata.
- Alternatives (Briar, Session, Threema, SimpleX) are discussed, but each has tradeoffs (forward secrecy, DoS, platform support).
Surveillance Tech, Palantir, and State Power
- Several see Palantir and similar tools as overhyped but still dangerous: they aggregate many data sources, enabling targeting and “parallel construction,” even if the analysis is clumsy.
- Others emphasize incompetence: ICE’s apparent misidentifications and chaotic raids suggest crude use of data, but that doesn’t lessen harm.
Violence, 2nd Amendment, and Escalation
- A small minority explicitly suggests armed resistance against ICE; most strongly reject this as both morally wrong and exactly what authorities might want to justify a harsher crackdown.
- Long back-and-forth about whether the 2nd Amendment ever realistically enabled resisting tyranny, with references to asymmetric warfare, modern state firepower, and partisan hypocrisy.
Politics, Fascism Analogies, and International Views
- Many participants describe the administration’s behavior—extrajudicial killings, selective enforcement, labeling opponents “terrorists”—as overtly authoritarian or fascist.
- Comparison is made to historical COINTELPRO and foreign secret-police tactics; some note that earlier abuses didn’t include public, uninvestigated shootings of citizens.
- A commenter from Europe says the events, and official lying despite video evidence, resemble early-stage fascism and have damaged US credibility abroad.
Tactics, Strategy, and Movement Security
- Practical advice recurs: small, vetted groups; rotating group chats; disappearing messages; no phones (or hardened phones) at actions; assume any large open chat is compromised.
- Others stress that over-focusing on tech and “perfect opsec” can induce paralysis; they argue mass, visible, lawful protest and electoral work remain the most scalable levers for change.