Subject: Re: one thing |
From: Barrett Brown <barriticus@gmail.com> |
Date: 1/4/11, 13:43 |
To: Barry Eisler <barryeisler@mac.com> |
On Mon, Jan 3, 2011 at 10:19 PM, Barry Eisler
<barryeisler@mac.com> wrote:
Man, that's a tough one, and I'm sure it's case by case. All I can think of is: alibis. But that's hard to set up for electronic attacks.
On Jan 3, 2011, at 6:32 PM, Barrett Brown wrote:
> What would you advise in terms of preparing for or contending with any false flag operations that may be deployed in such a way as to incriminate Anonymous? I'll be providing the leadership with PM software in order to better keep records (securely) as a defense against incriminating them, at least, but one obvious flaw of the model is that anyone could frame it for anything. Obviously there's no magic bullet, but just wanted to see if perhaps you had any suggestions.
>
> --
> Regards,
>
> Barrett Brown
> 512-560-2302