14 Mar
2014
14 Mar
'14
4:34 p.m.
On Fri, 2014-03-14 at 14:45 +0100, Eugen Leitl wrote:
However, intelligence people do not operate in a vacuum. They use the same public infrastructure as you. They don't teleport in and out of their facilities. Collecting and crosscorrelating publicly available data is powerful while invidual risk is low to zero. Leaking large batches is safe if you follow standard security procedures.
Animal liberation activists have been using similar tactics (infiltration and outing) for a long while; anyone interested should look into the SHAC campaign for strategic/tactical inspiration. This is the best retrospective I think exists, but I'd love to be wrong: http://www.crimethinc.com/texts/rollingthunder/shac.php -- Sent from Ubuntu