3404
Comments (274)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
4
shockfactor 4 points ago +4 / -0

Maybe torturing random idiots isn't an effective strategy?

If you were running a terrorist organization, you wouldn't be telling the dipshits dumb enough to commit crimes on your behalf the details of your operation.

2
Wearyman 2 points ago +2 / -0

Well, yes and no. Yes, some random dipshit isn't going to get you instantly into the C&C of any organization. However, random dipshits often have access to messaging boards and and other first level points of access that allow you to find out basic information and can lead to further organizational penetration.

If you want to penetrate an organization, you don't start by aiming at the leadership. They KNOW to practice security. Their information and they themselves will be well protected. You start by either turning or social engineering or even forcing basic level access information from the random low level dipshits, and using that information to move to the next level.

If you have this person in your custody, you can often get enough information to impersonate them in the organization, leading to the ability to set up meetings with higher level people by dropping false and misleading data. If you can set up a meet with a higher up, then you have a chance to nab them, and start the cycle over again.

Sometimes you will get lucky and grab someone's information that just happens to have more access than normal and was being careless. Keep in mind that many of these people are fanatical. Fanatics do tend towards carelessness. However, one should NEVER assume that will be the case, and always operate using maximum security and maximum safety. Impersonate from afar and on electronic systems, and avoid having to meet in person except then you can dictate the location and terms of the meet in such a way that it allows you to either social engineer or even grab someone of high value who will have high level access.

Once you have wormed your way in, you use that access to gather information and spread your break in to multiple systems, until as much of the organization is exposed and vulnerable as possible. Then you use that information to destroy them from within either electronically, or physically by performing arrests (if you are a police organization) or by turning the information over to the appropriate authorities for action.