-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hola, assuming some / most of these questions are posed as just open ones to reflect upon... nonetheless, I've tossed out a few "answers" anyway (take with healthy dose of salt) grarpamp:
On Mon, Oct 5, 2015 at 4:51 AM, Georgi Guninski <guninski@guninski.com> wrote:
The ... situation ... is quite grave. Assume very severe ... crisis hits ... relatively soon causing ...
"State Kicks the bucket" (and other use cases) bring about some discussion around cyber guerrilla warfare of sorts...
Assume you're a terrist, warfighter, some flavor of activist / dissident, human rights worker, journalist, hacker, VIP, whatever...
What is the time to a fix and physical intercept on your location?
This is generally happening / in process or has happened; you operate under the assumption that it is happening or has happened and plan time scale accordingly.
Possibly specified to within some radius such that you cannot escape without being captured, or at least being visually identified, etc. Modulo your own movement while on / off air. What are the capabilities of any particular chosen adversaries that are after your realtime fix?
Not always possible to identify in advance. Easier to ascertain assuming your goals / objectives are clear (thus narrowing possible adversaries) and understanding of people's customs, language, etc where you will be functioning (online and off).
What is your loiter time before you must move to avoid capture?
Don't loiter long
Consider some various theatres, densities, infrastructures, and situations in which you might operate... - War ravaged mideast "city" - Paris, New York, Tokyo - You're in soverign territory up against drones and monitoring / locating methods that ignore and cross political boundaries. - You're in soverign territory against local police forces. - On foot or on wheels. - Cameras everywhere, discretion kept how? - Whether you strictly follow "never use the same place twice", or not. - Locating tech deployed directly by adversary vs. adversary utilizing tech deployed by local utilities that serve the population. - How to operate on limited resources against the "haves".
Land lines are out since you'd churn through safe lines, unless you're tapping into them. Also wifi, cellular, satcom, pamphleting.
Some examples could be drawn from the "wars" in the mideast. ie: You're spotted and fixed by undercover CIA agent, then droned 15 min later.
What are your goals as a cyber guerrilla or OPSEC oriented individual or group in various tactical and strategic situations that you have an affinity with? What are the greator goals?
What are the likely interest areas of a cyber guerrilla beyond personal survival of water, food, shelter?
Local surfing conditions The sensation of the air as the wind blows The sound of a laugh A smile
Do wide and local comms channels have trade value? How to maintain them?
Carefully
Any any other things related to cyber war, OPSEC type things that keep you alive / valued when bucket is kicked, even if you're sheeple....
- -- http://abis.io ~ "a protocol concept to enable decentralization and expansion of a giving economy, and a new social good" https://keybase.io/odinn -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJWFhcrAAoJEGxwq/inSG8CeKIH/A8AnU7C2ZsyK1wLOrfFOcO7 8tI8ljOj1B4vFLnj1lLdq0snzRcP0l8bZWC7vSqgP1RVeNs0dP44gxPPnipcqLga aYpwSx0tOR3aRwg8jbQQtw9gv6E4eFEDgFOCZV9uouw65GVp3XohhH5CrZh649pU f6kFx5RndqdtOCs8uMHScLLajTOu09V7XU5JE4gIHEPOOxAZGhGdiHtNiS2AcgtG 3gYxI5L8Nes1xGUj6sW+iDXbcYnswIpB/6mTVk7okuXFWNHHQ4HR27om5hXQ/nPw zRq8GvN5PDvG6As5gC7H2jb3LU74Ov/gLu9MeGPkkA6dJ3Fy8binBIWhNJVOQOU= =glIk -----END PGP SIGNATURE-----