From 43375b9eb3d77fd5dc289a9b2aa2f77536be7366 Mon Sep 17 00:00:00 2001 From: urist Date: Wed, 8 Jan 2025 20:15:51 +0100 Subject: [PATCH] replace person names and event name --- opsec/phonenumbers/index.html | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/opsec/phonenumbers/index.html b/opsec/phonenumbers/index.html index e0791b6..a3c9afd 100644 --- a/opsec/phonenumbers/index.html +++ b/opsec/phonenumbers/index.html @@ -121,21 +121,21 @@ If you keep your phone on, then an adversary with your phone number and the requ You might think that having stringent SOPS (standard operating procedures) around the use of burner phones in your organization could solve this problem. It does help as this map shows, but it's not enough. An adversary investigating your activities will have access to a lot of data and they will be able to use tools such as PostGIS to query their datasets in order to infer relible position information from scattered datapoints.

-

The Z incident

+

The Protest

-On the last day of december 2024, something happened in Los Angeles. This event will be referred to as the Z incident. +On the last day of december 2024, protest happened in Los Angeles. This event will be referred to as the the Protest.

From your point of view

-Using burner phones and cash payments, you rented a car under a false identity with several members of your organizations. You have strong OPSEC, you don't know each other's names or faces and keep your burner phones off and in faraday bags when not in use. You took this car to a specific place at a specific time in order to acomplish a goal that goes contrary to the policies and aims of a strong adversary. Your adversary has access to phone data and no meaningful budget limitations, they aim to identify you, physically locate you and then follow their policies. +Using burner phones and cash payments, you rented a car under a false identity with Alice and Bob, both members of your organizations. You have strong OPSEC, you don't know each other's names or faces and keep your burner phones off and in faraday bags when not in use. You took this car to a specific place at a specific time in order to acomplish a goal that goes contrary to the policies and aims of a strong adversary. Your adversary has access to phone data and no meaningful budget limitations, they aim to identify you, physically locate you and then follow their policies.

From the adversary's point of view

Starting information: @@ -146,12 +146,12 @@ You did use your burner phone only when required.

What will the adversary do? -They can quickly reduce their suspect pool from hundreds of thousands of people to a dozen using this method. If you were to make the mistake of reusing the same SIM card for another operation after incident Z you will have dramatically increased your chances of being identified by the adversary. +They can quickly reduce their suspect pool from hundreds of thousands of people to a dozen using this method. If you were to make the mistake of reusing the same SIM card for another operation after the protest you will have dramatically increased your chances of being identified by the adversary.