2022, UK.

Over the past few weeks we have received second hand reports about unreported actions against the laboratory puppy mill MBR Acres. Here are the words of anonymous people who passed on information. Unfortunately as the reports do not come from the activists there is no solid way of knowing the exact details of the actions or of the intentions behind those actions.


“I have heard that one of the MBR workers’ house got spray painted. Surely he is not very happy with the company who don’t really care about his security. The press has been writing a lot of lies about it and the police is investigating”


“Someone has sent a 2 sec video of Russell’s house being spray painted, maybe because people have worked out that they are still operating in Thrapston. I can’t work out what it said on the wall but when I went to visit it had already been cleaned”.


“We have received information from a very trusted source that a heavy police presence was at MBR Beagle tonight due to ‘Animal Rights Militia’ contacting Cambridgeshire Police and informing them of a viable device left on site.

Police still in attendance doing fingertips search and a helicopter had been deployed to scene but has since gone according to a few activists in the local area.”

PHOTO: Beagle liberation by the ALF in Harlan Interfauna, now known as MBR Acres.


2nd June, Indianapolis, USA.

received anonymously via email:

“3 toilets sabotaged at Jack in the Box restaurants by flushing rocks and then paper towels down the toilets.

This easily reproducible act of sabotage should be carried at every animal abusing establishment.

Hide the rocks in a shopping bag purse or backpack and enter the restroom.

Plumbers costs hundreds or even thousands of dollars.”


26th May, Santiago Chile.

originally published by Contrainfo, translated by Dark Nights.

In the early morning of May 26, 2022, anonymous hands set fire to the Gil Letelier Huasos and Rodeo Club in the commune of Pedro Aguirre Cerda, Santiago, in addition to leaving pamphlets and bullets as a threat.

A few days later the action is attributed by the Animal Response Group to different counterinformation pages as a coordinated action and in conjunction with the attack on the gendarmerie building by the “Célula Insurreccional 2 de Noviembre” (November 2nd Insurrectional Cell).

Claiming responsibility for the arson attack against the Gil Letelier Huasos and Rodeo Club.

“I decided to get involved in serious criminal activities, after a serious reflection that I took as an individual.” Rod Coronado, Animal Liberation Front warrior.

Under cover of the moon and previously organized, in unison with the actions of the “Célula Insurreccional 2 de Noviembre” that attacked with an explosive device the building of the ” Circle of Retired Gendarmerie Officials”, we: attacked, set fire to and disabled one of the torture centers for animals, called medialuna. Where the rodeo is practiced, national sport of this disgusting country, which consists of two riders on horseback, whipping a bull against the wall, until it causes bruises, fractures, internal spills and even death.

This medialuna of the “Club de Huasos y Rodeo Gil Letelier”, was (hahaha) located in Carlos Valdovinos street #2951, commune of Pedro Aguirre Cerda, Santiago.

We used a large amount of fuel for our task. Vulnerating the security of the premises and the bastard police, but prepared in case we had to face as equals with vigilantes, citizen heroes or cops. Which, fortunately for them, did not happen.

We prioritized action; of sabotage, threat and execution. Fed up with a scene of supposed animal liberation fighters, who settle for an alternative diet, harmless words and belligerent network posts.

While they live in their peace, warring with their cell phones, animals die, suffer and regret having been born.

Rodeos, butcheries, vivisection centers, bioteries, laboratories, animal exploitation clubs for sport. All are our targets, and without hesitation all the humans who carry them out: financiers, workers, watchers, spectators, consumers, owners and competitors. Everyone is at risk.

We left a threatening 380 caliber bullet with a pamphlet attached, hanging on the failed structure, warning that blood and tears await them.

We frame this action, particularly this week, as a response to another anniversary of the death in combat of warrior Mauricio Morales.

As an operative group, our focus is primarily revenge, liberation and sabotage, in the name of Animal Liberation.

And in view of the fact that over the years, this aspect has been forgotten by a large part of the Cells that have vindicated him. We wanted to recall his anti-speciesist character, which he sustained with the same conviction with which he charged that last bomb against domination.

An incendiary wink to the informal groups that fight against the crude domesticating normality: “Células Revolucionarias Mauricio Morales”, “Animales Refractarixs”, “Algunas sombras en la noche”, “Núcleo Lobxs” and “Célula Insurreccional 2 de Noviembre”.

Animal Liberation, whatever it costs, and whoever it costs.
Mauricio Morales, Sebastián Oversluij and Barry Horne always present.
Fire to the prisons for humans and non-humans.
Back your ideas with action, and not let them die in the peace of inaction.
We want blood to give back the pain.



«Decidí implicarme en serias actividades delictivas, tras una seria reflexión que tomé como individuo.» Rod Coronado, guerrero del Frente de Liberación Animal.

Al amparo de la luna y previamente organizadxs, al unísono con el actuar de la «Célula Insurreccional 2 de Noviembre» que atacó con un artefacto explosivo el edificio del «Círculo de Funcionarios de Gendarmería en retiro», nosotros: atacamos, incendiamos e inutilizamos uno de los centros de tortura para animales, llamado medialuna. Donde se practica el rodeo, deporte nacional de este repugnante país, que consiste en dos jinetes montados a caballo, azotando un novillo contra una pared, hasta causarle hematomas, fracturas, derrames internos e incluso la muerte.

Esta medialuna del «Club de Huasos y Rodeo Gil Letelier», estaba (jajaja) ubicada en calle Carlos Valdovinos #2951, comuna de Pedro Aguirre Cerda, Santiago.

Utilizamos gran cantidad de combustible para nuestro cometido. Vulnerando la seguridad del recinto y a la policía bastarda, pero preparadxs en caso de tener que enfrentarnos de igual a igual con vigilantes, ciudadanos héroes o pacos. Lo cual no sucedió por suerte para ellos.

Tomamos como prioridad la acción; de sabotaje, amenaza y ajusticiamiento. Hastiadxs de una escena de supuestxs luchadorxs por la liberación animal, que se conforman con una dieta alternativa, con inofensivas palabras y publicaciones beligerantes de redes.

Mientras viven en su paz guerriando con su celular, los animales mueren, sufren y lamentan haber nacido.

Rodeos, carnicerías, centros de vivisección, bioterios, laboratorios, clubes de explotación animal por deporte. Todos son nuestros objetivos, y sin dudar todxs lxs humanxs que los llevan a cabo: financistas, trabajadorxs, vigilantes, expectadorxs, consumidorxs, dueñxs y competidorxs. Todxs corren riesgo.

Dejamos adosada una amenazante bala calibre 380 con un panfleto, colgando en la malograda estructura, en aviso de que les espera sangre y lágrimas.

Enmarcamos esta acción, particularmente en esta semana, para responder a un nuevo aniversario de la muerte en combate del guerrero Mauricio Morales.

Como grupo operativo, nuestro enfoque es principalmente la venganza, la liberación y el sabotaje, en nombre de la Liberación Animal.

Y en vista de que en el pasar de los años, esa arista se ha olvidado por gran parte de las Células que lo han reivindicado. Nosotrxs quisimos rememorar su carácter antiespecista, el cual sostuvo con la misma convicción con la cual cargó esa última bomba contra la dominación.

Un guiño incendiario a los grupúsculos informales que combaten la cruda normalidad domesticadora: «Células Revolucionarias Mauricio Morales«, «Animales Refractarixs«, «Algunas sombras en la noche«, «Núcleo Lobxs» y «Célula Insurreccional 2 de Noviembre«.

Liberación Animal, cueste lo que cueste, y a quién le cueste.
Mauricio Morales, Sebastián Oversluij, Barry Horne, presentes.
Fuego a las cárceles para humanxs y no humanxs.
A practicar las ideas, y no dejar que mueran en la paz de la inacción.
Hacia la sangre, a devolver el dolor.



May, Sweden.

received anonymously via email:


Some anarchists invaded the hometown of the Swedish Minister of Defence, the Social Democrat Peter Hultqvist. We vandalized several of the Social Democrats’ premises. Locks were glued and messages were painted: FUCK NATO!

Neither the U.S. Club for Imperialism, nor the petty politicians, own us. You are trying to force decisions on us. Instead, we force ourselves on you. No defense alliance can protect you.

A new time prevails. Anarchy reigns.

Against your wars, your nationalism… FUCK OFF”


By now you should’ve learnt about the key points to analyse before choosing an instant messaging app and those apps we advise against as well as three apps we like a little more, but there are a lot of nuances to add at the end of this series. In this last chapter, we will discuss how to use the applications and how you should analyse what you communicate online.

To start with, let’s quickly talk about threat modelling. Threat modelling is an easy way to understand what level of security you need. Someone who simply uses their phone for trivial things does not have the same threat model as a journalist reporting on human rights or as an activist targeted by the government. Because an increase in privacy and security comes with the tradeoff of less usability, one should understand their threat model and act accordingly.

When we have talked about applications that respect your privacy, they are very good at avoiding big corporations to steal your data, and moderately good at stopping governments from targeting a big majority of people. What we mean with this is that anyone talking to their friends about how good last night’s party was should avoid using Instagram direct or WhatsApp not because they are concerned about their security being compromised, but because those companies make a profit from selling our data, and the more technology self-defence we practice as a community, the less powerful those mega-corporations are.

That does not mean that you should discuss illegal activities on signal. When thinking about what you should or shouldn’t say on a messaging app, ask yourself “do I ever want this message to be read in court?” If the answer is no, DO NOT send it.

No application is safe if there is spyware installed on your devices, which means that if your threat modelling puts you as a vulnerable target to spearfishing attacks by industry or governments, you should take extra steps, like only communicating about specific things face to face in a public space and not messaging anything online, regardless of how encrypted the messaging app is.

If you need to use technology to discuss things that you believe are a concern, you should take a few extra steps. Using a burner device that will be disposed of after the action, or after all the information has been gathered to write an article might be a good solution. Throwaway accounts that are not connected to any identifying information like emails or telephone numbers (using Session could be a great idea for that) is also a useful suggestion.

Within those communication apps, you can also toggle on-screen security, which would stop the application from allowing screenshots. This would help if there is spyware installed on your device that is trying to record your screen.

A quick note on “code” communication. There was a whole ass Cold War going the last century, with many intelligence agencies spying on each other. Your code words to describe situations “There is a lot of lemonade in my shopping trolley” will be easy to decipher by a judge, let alone an intelligence officer. Just don’t.

Ultimately, it is up to you to decide how much information you are putting on your device. Encryption means nothing if someone is directly spying on your phone, and if you wouldn’t say in front of a cop what you’re about to type to your mate, just don’t type it. Meet with them, have a chat whilst you walk around in the woods WITHOUT your phone and agree on your next meet up date face to face.

For everybody else who does not feel the government is a direct threat to their privacy, data companies ARE a direct threat to your privacy. This is a major problem that involves us all, and you should practice community self-defence. Ditch those spying apps from your phone and move over to stuff that respects you and your friends a little more. It only takes about a week to get used to a new application!


UA Tech&Sec support.

PS: We spend a great amount of time and energy learning to teach the public about this kind of stuff. If you appreciate our work, please consider donating to our project. UA is everybody, and within all of us, we can make a platform that will hopefully help in the revolution. Monero and Bitcoin donations are recommended (find our wallet addresses on the website), but if you can’t we also have PayPal and Patreon.

Paypal: unoffensive_animal(aatttt)tutanota(cddddot)com


31st May, Middlands UK.

received anonymously over email:

“As the bird flu crisis lessens in the UK, we felt safe saving and transporting birds from an industrial farm using biosecurity.

As we approached the gigantic shed, the stench of faeces was overwhelming and we knew that the shed would be full of thousands of helpless birds. Sneaking in under the conveyor belt, one human opened the building from the inside, allowing for 31 lives to be saves from a certain death.

Why did we do this? Firstly, to save the hens libes and secondly, to inspire others to get out there and cause some shit! Don’t sit back and watch others take action, go fuck with these scumbads yourselves!



This post continues from the one before, which you can find HERE.

By now you would’ve understood key components that make or break a messaging app and should’ve read the list of common applications we would advise against. Today, we would like to mention three applications we feel are much better in terms of respecting your privacy and security.

SIGNAL: Signal has, unsurprisingly, become the gold standard for encrypted messaging applications. Its Sealed Sender capabilities have managed to reduce a lot of the metadata sent out to their servers, it has a very simple and easy to use interface, allows for group chats, group phone calls and group video chats and it is of course open-sourced and end to end encrypted by default. There are two drawbacks to signal that are still important and should be considered depending on your own threat model. The first one is that Signal is centralised, which means if a government decided to block Signal servers, Signal would not work in that specific country (Belgium has just said they are thinking about doing exactly that!). It means there is a single point of failure, and although it would be very difficult to decrypt any information, all that data is being funnelled through a single point. The second big problem with Signal is that it requires user data in order to set up an account. That user data is also not some silly, throwaway email, they need your telephone number. In many countries around the world, obtaining a SIM card without an ID is a problem in itself, but even when that SIM is anonymous, leaking a phone number that is continuously attached to your device could mean being targeted via connectivity networks and being geolocated by telephone towers. Telephone numbers tend to be something personal, and sometimes you do not wish to give someone you just met your number. Those are the two main drawbacks in an otherwise very powerful application.


SESSION: Session App is the youngest app on our list, but it has made incredible progress and we would go as far as saying that we prefer it over Signal. It is a decentralised, open-source app backed by about 1800 nodes around the globe that routes all your traffic through onion routing, which means there is no IP leak and other identifying metadata is stripped off. The biggest and most important feature that makes Session stand out is that you do not require ANY personal information to sign up. No email address. No telephone number. No name. NOTHING. How fucking cool is that?! The fact that they’ve now implemented voice and video calls, onion routed and in a very user-friendly way, has won all the points needed for us to push it to n1! Let’s not forget about drawbacks tho. Because it is decentralised, it takes a little longer for the message to be received by your friend. This is barely noticeable on text and even photos, but it might take a few extra seconds for a video to send or to download! The second, more important drawback is that Session does not enforce Perfect Forward Secrecy. This is a complicated system where encryption keys get substituted regularly so if someone was to steal the key somehow they would only be able to decrypt some messages and not entire conversations. Session does not implement PFS, but as the encryption key is saved in your device, if your device was compromised the text would already be in plain text. Whilst we understand Session’s mitigation against that attack, they should implement PFS for extra security. Session is the app we would advise for all of you to talk to each other on a regular basis.

Read more here:

BRIAR: Briar is an incredibly interesting application. End to end encryption by default and an open-source application that will only run on Android devices (sorry iPhone users). It runs through P2P connectivity, which means no server or nodes to depend on. When you message someone on Briar, the message travels through the TOR network directly to your friend’s device without depending on any specific centralised systems. Briar is also a very useful tool when the network is down. Police will, during intense riot situations, jam the network in order to stop any form of connectivity. Briar circumvents those problems by allowing users to connect through a Bluetooth mesh or a wifi mesh, without depending on the telephone network. This, of course, has a distance limitation. The drawbacks should be obvious. A P2P connection is not anonymous. The message is encrypted and if someone was sniffing the connection they would not be able to read your texts or see the photos, but the recipient of your text is able to work out the network you connect to and some device identifiers which could be used to de-anonymise you. As mentioned before, it only runs on Android, so compatibility might be a problem. Finally, briar has a usability problem. Because it is P2P and your messages are not stored in a server, they cannot be sent to your friend unless your friend is also connected. Briar is an incredible app and we highly recommend it, but we would advise you to use this app for specific situations and only with people you trust. Briar is without a doubt, the app we would use when the armed revolution starts!

Find Briar here:

Keep an eye for our next instalment of this miniseries, which will be a more practical use and advice on how to talk to each other.

Remember that apps only know what you tell them. We will talk about what to say and what not to say in our last instalment about messaging apps! 


UA Tech&Sec 101 support.

PS: We volunteer our time, but we cannot volunteer all our funds too in order to keep this project alive. If you have the means and like what we do, please consider donating a few coins. Monero is our favourite way, you can find the wallet address on our website, but if you don’t use cryptocurrencies you can donate over Paypal and Patreon too!
PayPal: unoffensive_animal(aaattt)tutanota(ddddot)com


alf cuts a vent to a chicken farm with boltcutters

This post is a continuation of a series, the previous post can be found HERE

We have talked about the different key points that make a good instant messaging app, and it is time to name and shame applications you should never use for any communications (from organising a demo to organising a coffee date, fuck using the apps below!)

SMS (Text) Messages. We’ve already talked about this but your SMS are sent in plain text and literally, everybody can read them. Don’t use text unless necessary.

FACEBOOK, INSTAGRAM AND SOCIAL MEDIA MESSAGING: Facebook Messenger, Instagram Direct and other social media private messaging apps are NEVER safe to use. They work in a centralised network, they are (for the most part) not encrypted and they only serve one purpose: to collect your data. All the big social media names also have no problem complying with governments when requested, so your metadata, text and media will be shared on request. WhatsApp is an incredibly common instant messaging application you should delete from your phone immediately. Since it was acquired by Meta (Facebook) this has become an even more important thing.

WHATSAPP: WhatsApp is a closed source application (which means no one can read the code to tell if what WhatsApp says is true) and although they say it has End to End Encryption, Facebook can read any texts that have been marked as abusive, which brings into question the truth about their encryption. They collect heaps of metadata (location, time, date, users involved in the conversation and so on) which is not encrypted and they have an extensive track record of collaborating with the government. Move your family away from WhatsApp and delete the app. Seriously.

iMESSAGE: iMessage is also heavily advised against. For iPhone users only, iMessage was a very useful app when it was first introduced, making texts free for a lot of people! There are many problems with iMessage but here are a few important ones. The app’s code is closed. Their encryption protocol is trash. They collaborate with the NSA and will give information to governments on request. It is not a safe app.

TELEGRAM: Telegram needs to be completely trashed and put in the bin. This will divide many people and might make you feel uncomfy inside, but telegram is NOT a safe app. They have managed to sell themselves as a privacy and security messaging application, but the amount of problems with the application is staggering. To start with, Telegrams encryption is not enabled by default. This is such a massive problem that should make you uninstall the app immediately just because of it, but there are a few other bits to talk about. Telegram collects user information, does not hash it and permanently shares that information with the parent company. They DO NOT encrypt metadata (so the conversation logs are available) and thanks to a not-so-open-sourced code dealing with their bespoke cryptography, the company CAN READ YOUR MESSAGES even when encrypted! Telegram is so not an application to use, not for group chats, not for private chats, not for anything. There are much better alternatives to explore. In the next article, we will give you a few options for better messaging apps to use. Keep an eye out!


UA Tech&Sec Support

PS: If you appreciate the work we do, please send a few coins. We could do with some support.

Crypto addresses are on our website but PayPal and Patreon you can find just below!
PayPal: unoffensive_animal(aattt)tutanota(doottt)com


26th May, USA.

received anonymously via email:

“51 lobsters shoplifted and returned to their natural habitat

We shoplifted 51 lobsters over a two day period from supermarkets (causing $600 in economic losses), and returned them to their natural habitat in the Atlantic ocean on the northeastern coast of the so called United States.

We acclimated them to the water so they wouldn’t go into shock by placing them along the edge and allowing them to get used to the water themselves. When they were ready they would crawl back into the ocean, returning home.

This is an easily reproducible action. With a tote bag and a willingness to commit a few misdemeanors we were able to give these sentient beings an escape from an awful death, being boiled alive by thoughtless, speciesist consumers.

The culture we live in does not value life. Right now, billions of non-human animals are on death row. Do something.”