Traditional 'Monkeywrenching': Tools and Techniques
The institute maintains a (deactivated and legal) physical archive of tools and methods used in historical acts of environmental sabotage, used for forensic education. This includes the infamous practice of 'tree-spiking'—driving metal or ceramic spikes into trees to deter logging by risking damage to saws and mill equipment. While no fatalities have been attributed to tree-spiking, it remains a potent symbol and a highly controversial tactic due to the potential, however unintended, for worker injury. Other traditional methods studied include dismantling heavy machinery (removing essential parts), pouring sand or sugar into fuel tanks, pulling up survey stakes, and disabling electrical infrastructure at remote work sites. IETS engineering fellows analyze these methods not for replication but to understand their technical simplicity, economic impact, and the risk calculus involved. The emphasis is on how these are 'poor man's' tactics, accessible to individuals with minimal training but a high degree of commitment.
The Digital Frontier: Cyber-Ecotage and Hacktivism
The 21st century has seen a migration of tactics into the digital realm. The institute's cyber-studies unit investigates incidents labeled as 'cyber-ecotage.' This includes distributed denial-of-service (DDoS) attacks against corporate websites of oil companies or biotech firms, defacement of sites with environmental messages, and the hacking of databases to expose internal documents (a la the 'hacktivist' tradition associated with groups like Anonymous when focused on environmental issues). A more sophisticated frontier involves rumors and a few documented attempts at accessing industrial control systems (SCADA) for pipelines or power plants, though no successful, environmentally-motivated cyber-attack causing major physical damage has been verified. The institute studies these as emerging threats, analyzing the blurred line between activism, espionage, and terrorism in cyberspace, and the immense technical and legal challenges they present.
Drone Jamming and Counter-Surveillance
A modern tactical arena is the use of and defense against drones. Radical groups have reportedly used consumer drones for surveillance of potential targets. Conversely, there are documented cases of activists using signal jammers or even physical nets to disable drones used by logging companies or police for surveillance of protest camps. The institute's technology assessment group tracks the commercialization of counter-drone technology and its adoption by both activists and corporations. This creates a high-tech cat-and-mouse game. The legal status of jamming is clear (it's illegal), but the practice highlights how technological innovation constantly reshapes the battlefield of environmental conflict. IETS research in this area is heavily focused on forecasting future trends and potential points of dangerous escalation.
Weaponizing Information: Doxxing and Corporate Campaigns
Beyond physical or digital sabotage, the institute studies the weaponization of information. 'Doxxing'—publishing the private personal information of corporate executives, researchers, or lobbyists—has been used as a tactic to harass and intimidate. While condemned by the institute as a violation of privacy that often spills into misdirected vigilantism, it is studied as a form of psychological warfare. More broadly, the institute analyzes how radical elements attempt to orchestrate sophisticated corporate campaigns, combining illegal actions with legal pressure (like encouraging shareholder revolts or secondary boycotts). This 'hybrid' approach suggests a strategic evolution beyond pure sabotage. Understanding this full spectrum, from wrenches to wikis, is essential to the institute's mission of comprehensive analysis.