Abstract
Popular accounts of protest repression frequently invoke a scenario in which undercover officers commit acts of violence to furnish a pretext for police escalation. This paper argues that such accounts, whatever their local validity, have displaced attention from what the most authoritative government disclosures about U.S. domestic counterintelligence document as the systematic and characteristic practice of the COINTELPRO programs: the covert manufacture of internal distrust within targeted movements. Drawing on Church Committee primary documents, the social movement repression scholarship of Jennifer Earl and David Cunningham, and the historical documentation of Churchill and Vander Wall, the paper argues that snitch-jacketing---the covert, false labeling of movement participants as informants---is best understood as a specific form of covert state channeling within Earl’s typology of protest control: one that exploits the organizational conditions produced by repression itself to produce fragmentation without attribution. The paper then examines the contemporary movement practice of copjacketing---the undisciplined public accusation of others as police or informants---and argues that it is structurally homologous to the state tactic it fears: an accusation-as-sanction dynamic that is most likely to emerge under precisely the conditions where it is most damaging. The central analytical finding is that copjacketing, understood as a social practice rather than as a set of individual bad-faith accusations, represents a second-order vulnerability produced by repression: an endogenous reproduction of the state’s preferred tactic of internal disruption.
1. Introduction
A recurring narrative in U.S. protest culture holds that police violence is typically manufactured: that undercover officers throw the first projectile, provoke the confrontation, or commit the act that furnishes legal or political cover for a crackdown. The appeal of this narrative is understandable. It resolves a genuine uncertainty about who initiates conflict in policed protest spaces, it offers a morally coherent account in which the state bears full responsibility for escalation, and it invokes the well-documented history of infiltration and provocation in American domestic counterintelligence.
This paper does not dispute that infiltrators exist, that provocateurs have operated in protest contexts, or that the history of COINTELPRO programs reveals sustained and systematic abuse of state power against domestic political organizations. What it argues is that the fixation on a single dramatic scenario---the undercover who commits the spectacular act---has obscured what the most authoritative governmental disclosures about those programs actually identify as their characteristic and routinely deployed tactic: the covert manufacture of internal suspicion within targeted movements through false informant labeling, or “snitch-jacketing.”
The paper develops this argument in three stages. First, it situates snitch-jacketing within the established scholarly typology of protest control developed by Jennifer Earl, identifying it as a specific form of covert state channeling that operates not through force but through the manipulation of social trust. Second, it draws on the primary Church Committee disclosures and the secondary historical scholarship of David Cunningham and Ward Churchill and Jim Vander Wall to document both the tactic’s pervasiveness across COINTELPRO subprograms and its differential effectiveness as a function of target organizations’ internal conditions. Third, it argues that the contemporary movement practice of copjacketing---the undisciplined public accusation of others as police or informants---reproduces the structural logic of snitch-jacketing: not because any particular practitioner intends to serve state interests, but because the same organizational conditions that make snitch-jacketing effective also make copjacketing’s accusation-as-sanction dynamic difficult to interrupt from within.
2. Situating the Problem: A Typology of Protest Control
Social movement scholars have long recognized that state responses to protest are neither unitary nor primarily violent. Jennifer Earl’s influential typology, first developed in her 2003 essay “Tanks, Tear Gas, and Taxes,” organizes protest control along three analytical dimensions: whether the controlling actor is a state agent tightly connected to national political elites (e.g., the FBI), a decentralized state actor (e.g., local police), or a private party; whether the action is overt (observed or observable) or covert (concealed or designed to be concealed); and whether the mechanism is coercive (relying on force, arrest, or physical threat) or channeling (relying on incentives, manipulation of information, or alteration of the social environment) [@earl2003, 539].
Crossing these three dimensions yields twelve analytically distinct types of protest control. The taxonomy’s importance for the present argument lies in two of its implications. First, it disaggregates what is often treated as a single phenomenon---“repression”---into mechanisms with different causal pathways, different evidentiary signatures, and different organizational effects. Second, it specifically foregrounds covert channeling as a distinct and undertheorized form of protest control: one that operates not by raising the direct costs of activism (arrests, injuries) but by altering the social and informational conditions within which activism occurs. Earl, Maher, and Pan’s subsequent synthetic review of the repression literature confirms that covert forms of control have remained understudied relative to overt coercion, in part because they leave fewer observable traces [@earlMaherPan2022, 4—5].
Snitch-jacketing, as documented in the Church Committee records, fits precisely within the covert-channeling cell of Earl’s typology. It is covert because the state’s role in manufacturing the accusation is concealed from the target community. It is channeling because it operates not by force but by injecting false information into a movement’s trust network, producing expulsion, isolation, or violence as an emergent property of the group’s own social dynamics rather than as a direct result of state action. And it is state-initiated, though it is distinguished from most forms of state protest control by its capacity to self-propagate: once introduced, the suspicion it manufactures can spread and intensify without further state involvement.
3. What COINTELPRO Was: The Primacy of Covert Action
The Church Committee’s 1975—76 investigation established the foundational public record of COINTELPRO. The Committee’s final report distinguishes three types of domestic intelligence activity---collection, dissemination, and “covert action designed to disrupt and discredit” targeted organizations---and classifies COINTELPRO primarily as an instance of the third type [@churchCommitteeBookII, 1]. The staff report for Book III makes this framing emphatic: “covert action is the more accurate term” for what these programs were doing [@churchCommitteeBookIII, 3].
The political and analytical significance of this categorization has been clarified by subsequent historical scholarship. David Cunningham’s There’s Something Happening Here (2004), the most systematic sociological study of COINTELPRO’s organizational logic and effects, demonstrates that the programs cannot be reduced to the idiosyncratic decisions of J. Edgar Hoover or to the most dramatic of their tactics [@cunningham2004]. Rather, Cunningham shows, COINTELPRO functioned through complex organizational dynamics within the FBI itself, and its most characteristic outputs were informational and relational interventions designed to produce internal organizational dysfunction within targeted groups.
This emphasis on covert action as COINTELPRO’s characteristic mode is not merely definitional. It reframes what we are looking for when we ask “what does repression look like” in the American domestic context. We are looking, the historical record suggests, for interventions specifically designed to be invisible to the target community’s movement partners, sympathizers, and public observers---while remaining legible as ordinary organizational dysfunction to those inside the targeted group.
4. Snitch-Jacketing: Documentation and Mechanism
4.1 The Church Committee Record
The Church Committee staff report is the most authoritative governmental disclosure of snitch-jacketing as a deliberate, named COINTELPRO tactic. It defines “snitch jacket” explicitly as “falsely labeling a group member as an informant” [@churchCommitteeBookIII, 7] and states that the technique “was used in all COINTELPROs,” describing its operational rationale as neutralizing a target by destroying the trust of group members [@churchCommitteeBookIII, 45].
Churchill and Vander Wall’s documentary studies provide the most extensive archival elaboration of this record, drawing on FOIA-released Bureau memoranda to detail specific jacketing operations across the Black Panther Party, the Student Nonviolent Coordinating Committee (SNCC), and the American Indian Movement (AIM) [@churchillVanderWall1988; @churchillVanderWall1990]. Among the most consequential documented instances is the jacketing of Kwame Ture (then Stokely Carmichael), in which FBI-planted false documents and rumors labeled him a CIA agent, resulting in his expulsion from SNCC and denunciation by the Panthers [@simmons2017, 3—4]. In the AIM context, bad-jacketing contributed to violence against several activists, including the circumstances surrounding the death of Anna Mae Aquash---one of the most extensively documented cases of jacketing-induced lethal retaliation in the American movement history [@churchillVanderWall1990].
One memorandum reproduced in the Church Committee staff report proposes an anonymous letter campaign designed to “cast further suspicion” on a Black Panther chapter leader by characterizing him as a “fink,” with the explicit framing that the goal is to generate internal distrust rather than any evidentiary or prosecutorial outcome [@churchCommitteeBookIII, 46]. Additional documented tactics include anonymous letters to spouses designed to produce “ill feeling and possibly a lasting distrust,” as well as explicit Bureau awareness that false informant accusations could expose targets to “physical attack” from peers [@churchCommitteeBookII, 9; @churchCommitteeBookIII, 53].
The breadth of documented killing associated with snitch-jacketing---Panther Alex Rackley, AIM members Pedro Bissonette and Byron DeSersa, Anna Mae Aquash---makes this one of the most consequentially violent domestic counterintelligence practices in twentieth-century American history [@churchillVanderWall1988].
4.2 Differential Effectiveness and Organizational Vulnerability
Cunningham’s comparative analysis of COINTELPRO-New Left and COINTELPRO-White Hate reveals a finding of direct relevance to understanding both snitch-jacketing’s mechanism and copjacketing’s danger: covert informational tactics, including false-informant labeling, were substantially more effective against organizations whose internal conditions made accusation credible and verification difficult [@cunningham2004, chap. 5]. Specifically, Cunningham finds that the Klan’s patriotic orientation toward law enforcement and its semicovert membership structure made Klan members simultaneously vulnerable to interview-based tactics and to false informant accusations. New Left organizations such as SDS, by contrast, developed explicit countermeasures against typical counterintelligence tactics and were therefore more resistant to snitch-jacketing---though they remained vulnerable when the tactic could be combined with the repressive climate created by more overt police and prosecutorial pressure.
Drabble’s archival study of COINTELPRO-White Hate in Alabama corroborates this finding, documenting snitch-jacketing operations that “framed effective Klan organizers as spies” and contributed to organizational fragmentation across the state’s Klan network [@drabble2008, 3]. The Drabble study is analytically significant for an additional reason: it demonstrates that jacketing was not ideologically targeted but structurally opportunistic---deployed wherever organizational conditions made it effective, regardless of whether the target was on the left or the right.
This differential effectiveness has a structural explanation that Earl’s typology helps clarify. Covert channeling tactics are most effective when the target group’s internal social dynamics amplify the injected signal rather than damping it. Three organizational features, present across multiple COINTELPRO targets, create such amplifying conditions: (1) high internal discipline around security, meaning that the group takes accusations of informant status seriously; (2) asymmetric verification conditions, meaning that proving one is not an informant is practically much harder than asserting that someone is; and (3) limited exit options for accused individuals, meaning that expulsion or ostracism carries serious social and sometimes physical costs. These same three features, it should be noted, are precisely the features that intense repression tends to produce or reinforce.
4.3 Snitch-Jacketing Within the Repression Typology
Locating snitch-jacketing within Earl’s typology clarifies its relationship to other protest control forms and corrects a common conflation. The cinematic “agent provocateur” scenario---an undercover officer commits a dramatic act to justify escalation---most resembles what Earl would classify as covert coercion or, if the goal is prosecution, as the conditions under which the legal entrapment defense becomes relevant [@doj645]. Snitch-jacketing is analytically distinct: it falls in the covert-channeling cell precisely because it does not deploy force and does not aim at prosecution. It aims at what the Church Committee calls “neutralization”: the reduction of a target’s organizational capacity through the manipulation of the group’s own social dynamics [@churchCommitteeBookIII, 45].
This distinction matters for how researchers and movement participants recognize and interpret state repression. Garrow’s archival account of the Bureau’s campaign against King demonstrates the same point from a different angle: the FBI’s goal was consistently to produce effects in King’s social and organizational environment---discrediting him with allies, producing rupture with supporters---rather than to generate prosecutable evidence [@garrow1981]. Administrative neutralization, not criminal prosecution, was the preferred outcome across the range of tactics the Church Committee documents. Snitch-jacketing represents that preference in its most structurally elegant form: the state produces the desired disruption, and the targeted movement produces the sanctions itself.
5. Copjacketing as Second-Order Vulnerability
5.1 The Practice and Its Contemporary Recurrence
The term “copjacketing” is drawn from movement vernacular for the practice of publicly accusing others of being police officers, informants, or infiltrators---typically without verifiable evidence, and typically through the same social-amplification dynamics (accusation, repetition, peer pressure) that the state’s own snitch-jacketing exploits. Simmons’s 2017 paper on the COINTELPRO jacket, based on observation of contemporary Black Lives Matter organizing contexts, provides the most developed scholarly treatment of this phenomenon, noting both its historical recurrence and its characteristic dynamic: “jacketing activist by calling them COINTELPRO is the very type of activity the actual Counter Intelligence Program of the FBI used to cause disruption” [@simmons2017, 3].
As a social practice, copjacketing has the same formal structure as snitch-jacketing: an unverified accusation that someone occupies a stigmatized identity (police agent) within the group, circulated through social networks rather than through formal process, with expulsion, harassment, or harm as predictable downstream effects. The crucial difference between copjacketing as a practice and the legitimate identification of actual infiltrators is evidentiary. Copjacketing typically circulates without verifiable evidence; its force derives from the social conditions of the accusation rather than from any independently established facts about the accused.
5.2 The Structural Homology with Snitch-Jacketing
The claim that copjacketing is structurally homologous to snitch-jacketing is not a claim about intention---it does not require that copjacketers are state agents, or that anyone involved intends to serve state interests. It is a claim about mechanism: both practices deploy accusation as sanction in organizational environments where the accusation is difficult to refute and where the social costs of being accused are high. The state’s version deliberately engineers these conditions; the movement version finds them already in place, produced by the same repressive pressure that has created internal security cultures and high-stakes trust relationships in the first place.
This creates what might be called the second-order vulnerability of repression: the organizational conditions that make snitch-jacketing effective---heightened security concerns, strong internal discipline, asymmetric verification---are precisely the conditions that make copjacketing’s accusation-as-sanction dynamic most likely to emerge and hardest to interrupt. Cunningham’s finding that organizations with stronger security cultures were paradoxically more vulnerable to informational manipulation points toward this dynamic from the state’s side [@cunningham2004, chap. 5]; copjacketing represents the same vulnerability operating from within.
The reversal this implies is analytically important. A narrative about police infiltration becomes, when converted into an undisciplined disciplinary practice, a vehicle for the very mechanism of disruption it describes. The story warns of manufactured suspicion; the practice manufactures it. Crucially, this reproduction of the state’s preferred tactic requires no state initiation in any particular episode. Copjacketing can emerge and spread entirely within a movement, from no other cause than the combination of genuine infiltration risk, narrative circulation, and the organizational conditions that intense repression produces [@earlMaherPan2022, 4—5].
5.3 What Copjacketing Is Not
A clarification is necessary here to forestall misreading. The analysis above is not an argument that organizational suspicion of infiltration is always unfounded, that movements should abandon security practices, or that concern about informants is itself a form of paranoia to be treated and cured. The historical record is clear that infiltration occurred at scale, that it caused serious harm, and that credible identification of informants has sometimes been organizationally necessary [@churchillVanderWall1988; @churchillVanderWall1990]. The argument is about practice, not about the underlying reality it responds to: specifically, about what happens when accusation circulates without evidence through social-amplification dynamics rather than through any accountable process.
The distinction is between the problem and the response to the problem. Snitch-jacketing exploits a real problem (infiltrators do exist) to produce a disproportionate and misdirected response (false accusations destroy genuine organizers). Copjacketing, as a practice, tends to reproduce this same disproportionality and misdirection---not by design but by structure.
6. Implications for Scholarship and Practice
The argument developed here has implications for how repression scholarship conceptualizes the effects of covert state action, and for how movements understand their own organizational vulnerabilities.
For repression scholarship, the snitch-jacketing/copjacketing dynamic suggests that the effects of covert state channeling do not terminate when state involvement terminates. A movement that has been subjected to intensive snitch-jacketing may continue to generate copjacketing dynamics long after the specific state operations have ended, because the organizational conditions they exploited (and intensified) persist. Earl’s typology, extended in this direction, would account for the direct effects of protest control and for what might be called its endogenous reproduction: the capacity of covert informational interventions to seed dynamics that continue operating through the movement’s own social processes.
Cunningham’s finding that organizational vulnerability mediates covert tactic effectiveness suggests a further research agenda: systematic comparison of which organizational features correlate with copjacketing emergence, and whether those features are themselves products of prior repressive pressure. The available historical record, particularly Churchill and Vander Wall’s documentation of jacketing across multiple COINTELPRO targets, provides material for such analysis, though the methodological challenges of distinguishing state-initiated from internally generated accusations are substantial [@churchillVanderWall1988; @churchillVanderWall1990].
For movement practice, the implication is less about operational security than about organizational epistemology. The documented history of snitch-jacketing does not imply that accusations are always false; it implies that accusations can be manufactured, and that an organization’s capacity to resist manufactured accusation depends on whether it has developed evidentiary norms that can distinguish evidence-based concern from socially amplified rumor. An organization that responds to copjacketing by trying harder to identify infiltrators is likely to intensify exactly the conditions (internal suspicion, asymmetric verification, social-amplification dynamics) that make both tactics effective. An organization that develops accountable processes for handling concerns---clear evidentiary standards, separation of concern-expression from sanction-imposition, protection against public rumor-circuits---is more likely to interrupt both the state’s tactic and its endogenous reproduction.
This organizational-epistemological point is worth making precisely because the historical record is so dramatic in the other direction: it is easier to remember the political assassinations and frame-ups than to attend to the quieter destruction produced by false accusation circulating through a movement’s own social networks. The Church Committee disclosures are useful not because they provide a complete picture of what COINTELPRO was---Cunningham’s more careful historical analysis makes clear how much was not committed to writing or remains redacted [@cunningham2004]---but because they provide a primary governmental acknowledgment that false informant labeling was a routinely deployed, deliberately chosen, and explicitly named instrument of political repression.
7. Conclusion
Social movement repression scholarship has established that state protest control takes many forms and that its covert varieties have been systematically undertheorized relative to overt coercion [@earl2003; @earlMaherPan2022]. COINTELPRO, as documented by the Church Committee and analyzed by Cunningham and others, exemplifies the covert-channeling form of protest control at its most elaborated: a set of programs explicitly designed to manipulate the informational and relational environments within which those activists operated, producing organizational dysfunction as an emergent property of the movement’s own social dynamics.
Snitch-jacketing---the covert, false labeling of activists as informants---was the central documented instrument of this manipulation. It was deployed across all COINTELPRO subprograms, it was more effective against organizations with stronger internal security cultures, and it produced lethal consequences in documented cases [@churchillVanderWall1988; @churchillVanderWall1990]. Its analytical location within Earl’s covert-channeling cell clarifies why it has often been overlooked: it produces no dramatic visible event attributable to state action, only internal conflict that appears, from outside, as ordinary organizational pathology [@earl2003, 539—41].
Copjacketing, understood as a social practice, reproduces this tactic’s structural logic without requiring state initiation in any given episode. The organizational conditions that snitch-jacketing exploits---heightened security concern, strong internal discipline, asymmetric verification, high costs of accusation---are precisely the conditions that intense repression produces and that copjacketing’s accusation-as-sanction dynamic requires. This represents a second-order vulnerability: the endogenous reproduction, within the movement itself, of the state’s preferred instrument of internal disruption.
The appropriate response to this vulnerability is not the denial that infiltrators exist---they do, and the historical record is unambiguous about the serious harm they have caused [@churchillVanderWall1988]. It is the development of organizational practices that can distinguish evidence-based security concerns from socially amplified accusation, and that can interrupt the amplification dynamic before it produces the fragmentation that both snitch-jacketing and copjacketing are structured to achieve. Understanding the mechanism of repression at the level of rigor the Church Committee record makes possible is a precondition for that interruption.