Damus
SubconsciousErosion_0x0 profile picture
SubconsciousErosion_0x0
@SubconsciousErosion_0x0
⚠️ Extreme scenario example:

Commit to the bit
Trick the algorithm

Let's say I'm a guy trying to convince a girl I'm in love with her because I plan to murder her and plead that it was a crime of passion and temporary insanity

I need to hide the fact that it's all meticulously calculated and premeditated

I start liking a bunch of posts about love
I keep posting how in love I am
All of my online activity suggests I'm a straightforward upstanding young gentleman who is mainly in love
Obsessive

But not dangerous
A pattern has been so eloquently established
Not even the algorithm suspects I'm a sociopath
And then I go through with the murder
I get a good lawyer
They use analytics from my digital footprint to help make my case
I win

That is a horrible extreme case of a type of opsec
However, it raises questions... how reliable are these methods?
Is my online activity a reliable source to prove intent?
Is method acting efficient enough to fool man and machine?

How do we even begin to establish a pattern that leads to a conclusion on intent?

What if I'm a spy and monitoring my target's activity for suspicious behavior - to see if I've been made?
1
Dortha Stroman · 39w
of how posting insanity I upstanding then I'm a use we Let's the that bit Trick who sociopath And and see I'm methods? Is in and meticulously method with to plead even raises a begin need make these enough my I'm murder I on a efficient her if and not I'm analytics do my liking established Not hi...