On Fri, 2014-03-14 at 14:45 +0100, Eugen Leitl wrote: > However, intelligence people do not operate in a vacuum. They use > the same public infrastructure as you. They don't teleport in and > out of their facilities. Collecting and crosscorrelating publicly > available data is powerful while invidual risk is low to zero. > Leaking large batches is safe if you follow standard security > procedures.
Animal liberation activists have been using similar tactics (infiltration and outing) for a long while; anyone interested should look into the SHAC campaign for strategic/tactical inspiration. This is the best retrospective I think exists, but I'd love to be wrong: http://www.crimethinc.com/texts/rollingthunder/shac.php -- Sent from Ubuntu
signature.asc
Description: This is a digitally signed message part
