Hi everyone!!
Sorry for going off the radar and the unexpected hiatus, some health stuff and major life events got in the way and its been hard to get back in the flow... I'm working on getting some chapters stocked up, and will be posting again once I get enough that I can keep it going for a while even if more stuff comes up :)
Hope everyone has been hanging in there, and if it's been rough for anyone else I'm sending all my love ya way🥰
Anyway chapters need to be at least 500 characters so uhhhhhh idk here's part of a weird text document i found on the deepweb once i guess
- You cannot avoid it.
- Jamming it will be noticed immediately and acted upon.
- Wrecking surveillance capabilities, while admirable, will eventually result
in the powers that be replacing them and passing laws that make it more and
more hazardous to do so until even acknowledging their presence will put you
up on charges.
- Strategies to evade notice involve losing yourself in the noise, i.e., not
standing out from everyone else.
- Case in point, the Mossad's assassination of Mahmoud al-Mabhouh in early 2010.
- Their hit squad knew that they'd be under surveillance almost constantly, not
because they were well known but because that is the default setting of first
Stolen content warning: this content belongs on Royal Road. Report any occurrences.
world (and first world-like) societies in the twenty-first century.
- They changed their appearances multiple times throughout the op.
- Multiple sets of clothing (some undoubtedly stolen).
- Multiple sets of ID (with lines of credit) were used as well as cash
transactions.
- Learn the profile of where you live or where you will be going and blend in
rather than stand out.
- Travel with groups of people.
- Be amiable, polite, and boring.
- Most security cameras are not equipped with microphones.
- More and more security cameras are IP-enabled, meaning that they must be
connected to a network to function. They stream captured footage to a file
server for archival.
- Wireless IP cameras exist but are rare right now.
- Observers view the footage from standard workstations.
- IP cameras can be hacked. Specifically, they can be logged into, usually with
a web interface, and reconfigured, hijacked, or used for unauthorized
surveillance.
- The video feeds from IP cameras can be spoofed in near-realtime.
- Default user IDs and passwords are easy to find online.
- Compromise of default user IDs is trivial to automate.
- Operation can be disabled, but when detected the owners of the IP cameras will
audit and tighten their security posture. Don't waste a good resource.
- They can work for or against you, depending upon how proactive you are.
- Software exists to feed a static image to at least some IP cameras out there.
- It may be advisable to gain and maintain access to data networks near your
places of operation, on the off chance that they will need to be exploited to
further your plans.
- There are thousands of networks that have been compromised for years, and
still are.