Correcting To: field...
---------- Forwarded message ----------
From: Maxim Kammerer <
m...@dee.su>
Date: Thu, Dec 20, 2012 at 2:26 AM
Subject: Re: [OPSEC] Cherry popping OPSEC discuss.
To: the grugq <
theg...@gmail.com>
On Wed, Dec 19, 2012 at 6:35 AM, the grugq <
theg...@gmail.com> wrote:
> I believe the OPSEC strengths of the PIRAs independent units can be applied
> well to hacker teams. I think that the problems and failures they faced
> can be overcome by a centralized resource providing strong OPSEC training
> and information for everyone. It is my hope that this mailing list will help
> to create a such a resource.
A couple of good sources:
1. Swiss Army, “Total Resistance”, Part II, Sec. III: Operations of
the Resistance Movement — some professional OPSEC that PIRA probably
didn't follow.
2. Доронин А.И., <Long textbook title>, Chap. 4 covers performing and
detecting foot and vehicle surveillance,
http://www.agentura.ru/library/doronin/glava4/ (Russian)
--
Maxim Kammerer
Liberté Linux:
http://dee.su/liberte
--
Maxim Kammerer
Liberté Linux:
http://dee.su/liberte