TURBINE

Ted Smith tedks at riseup.net
Fri Mar 14 09:34:57 PDT 2014


On Fri, 2014-03-14 at 14:45 +0100, Eugen Leitl wrote:

> However, intelligence people do not operate in a vacuum. They use
> the same public infrastructure as you. They don't teleport in and
> out of their facilities. Collecting and crosscorrelating publicly
> available data is powerful while invidual risk is low to zero.
> Leaking large batches is safe if you follow standard security
> procedures.

Animal liberation activists have been using similar tactics
(infiltration and outing) for a long while; anyone interested should
look into the SHAC campaign for strategic/tactical inspiration. This is
the best retrospective I think exists, but I'd love to be wrong:

http://www.crimethinc.com/texts/rollingthunder/shac.php


-- 
Sent from Ubuntu
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20140314/1fa53b96/attachment-0001.sig>


More information about the cypherpunks mailing list