Novels2Search
A Girl and Her Food
Update: Coming Back Soon(ish)

Update: Coming Back Soon(ish)

Hi everyone!!

Sorry for going off the radar and the unexpected hiatus, some health stuff and major life events got in the way and its been hard to get back in the flow... I'm working on getting some chapters stocked up, and will be posting again once I get enough that I can keep it going for a while even if more stuff comes up :)

Hope everyone has been hanging in there, and if it's been rough for anyone else I'm sending all my love ya way🥰

Anyway chapters need to be at least 500 characters so uhhhhhh idk here's part of a weird text document i found on the deepweb once i guess

- You cannot avoid it.

- Jamming it will be noticed immediately and acted upon.

- Wrecking surveillance capabilities, while admirable, will eventually result

in the powers that be replacing them and passing laws that make it more and

more hazardous to do so until even acknowledging their presence will put you

up on charges.

- Strategies to evade notice involve losing yourself in the noise, i.e., not

standing out from everyone else.

- Case in point, the Mossad's assassination of Mahmoud al-Mabhouh in early 2010.

- Their hit squad knew that they'd be under surveillance almost constantly, not

because they were well known but because that is the default setting of first

Stolen content warning: this content belongs on Royal Road. Report any occurrences.

world (and first world-like) societies in the twenty-first century.

- They changed their appearances multiple times throughout the op.

- Multiple sets of clothing (some undoubtedly stolen).

- Multiple sets of ID (with lines of credit) were used as well as cash

transactions.

- Learn the profile of where you live or where you will be going and blend in

rather than stand out.

- Travel with groups of people.

- Be amiable, polite, and boring.

- Most security cameras are not equipped with microphones.

- More and more security cameras are IP-enabled, meaning that they must be

connected to a network to function. They stream captured footage to a file

server for archival.

- Wireless IP cameras exist but are rare right now.

- Observers view the footage from standard workstations.

- IP cameras can be hacked. Specifically, they can be logged into, usually with

a web interface, and reconfigured, hijacked, or used for unauthorized

surveillance.

- The video feeds from IP cameras can be spoofed in near-realtime.

- Default user IDs and passwords are easy to find online.

- Compromise of default user IDs is trivial to automate.

- Operation can be disabled, but when detected the owners of the IP cameras will

audit and tighten their security posture. Don't waste a good resource.

- They can work for or against you, depending upon how proactive you are.

- Software exists to feed a static image to at least some IP cameras out there.

- It may be advisable to gain and maintain access to data networks near your

places of operation, on the off chance that they will need to be exploited to

further your plans.

- There are thousands of networks that have been compromised for years, and

still are.

Previous Chapter
Next Chapter