Damus
Sam Bent profile picture
Sam Bent
@SamBent
#OPSEC365 021/365

OPSEC Step 2 is threat analysis: research your adversary's actual collection capabilities. Public records, court databases, social media aggregators, data brokers, and reverse image search form a surveillance infrastructure anyone can access for under $50/month.

Your adversary doesn't need hacking skills. They need patience.

NTTP 3-13.3 lists adversary collection as HUMINT, SIGINT, OSINT, GEOINT, and MASINT. For most civilians, HUMINT and OSINT are the primary threats. Digital countermeasures alone fail if your adversary collects via human contact.

2๐Ÿ‘€1๐Ÿ”ฅ1
sister_sam · 2w
For most civilians "surveillance capitalism" has collected as much data and continuously that any adversary could every want. They don't need human contact in the face of that. I am surprised you would seemingly say otherwise.
Do I even have a name now? · 2w
Sam. The UK problem is really big. The UK also leads countries like Australia and Canada. We need pressure being put on the UK. External, internal, doesn't mater. The US will not intervene because of the UK-USA agreement. It's the british who need to understand what is happening. It's like a hijack...