This is Google's cache of http://test.789chan.org/psy/res/45.html. It is a snapshot of the page as it appeared on Jun 15, 2012 21:12:33 GMT. The current page could have changed in the meantime. Learn more

Text-only version
 
-  [WT]  [Home] [Manage]

HEY EVERYONE YOU SHOULD CHECK OUT THIS THREAD, AND THIS ONE, AND THIS ONE!


[Return]
Posting mode: Reply
Name
Email
Subject   (reply to 45)
Message
File
Password  (for post and file deletion)
  • Supported file types are: GIF, JPG, PNG
  • Maximum file size allowed is 5883 KB.
  • Images greater than 200x200 pixels will be thumbnailed.
  • Currently 76 unique user posts. View catalog

  • Blotter updated: 2012-03-22 Show/Hide Show All

File 12857304031.jpg - (28.10KB , 760x362 , Aqua.jpg ) Thumbnail displayed, click image for full size.
45 No. 45
So do /psy/operatives ever have to worry about "friendly fire"? Basically, you're gathering intel on a target for /i/, say a forum. /i/ decides to fire the cannons, but because you're working undercover, no one realizes that you're one of the users that's going to get hammered.

I suppose the fake identity that has to be created to do undercover work doesn't need to be protected in that sense, but I was curious if anyone was accidentally "hit" because no one knew you were a /i/-friendly.
>> No. 46
I have run into people trying to instigate flame wars while I am gathering info, and occasionally other people who I thought may be friendly but I could not confirm. Usually when you do this kinnda stuff you are so distant from the role it doesn't matter if you get hit with anything
>> No. 47
It has happened to me once before, and I had to give up my identity... also for project Skynet, someone got ddos'd who was on the anon side he had to talk to and admin for people to stop.
>> No. 58
Considering the fact that we're in /psy/ and not a broad "troll" board, friendly fire is impossible, in my opinion.
If either person knows upon what side of the flame war the other resides, then they can negate what would be considered "friendly fire" by saying "dude, I'm on your side, i'm psyopsing."
>> No. 71
When you are performing undercover actions, it is my opinion that you should keep that OL identity completely distinct from all others, and as disposable as possible (never ever let your other identities, especially you IRL one, be connected with the one you maintain while doing psyops. You will appear to be a genuine part of the enemy to all, even us). However, in the event that you are working to uncovering useful information about a target, I strongly recommend that you try to set up an alternative "in case of ddos" means of communicating with target (it can be billed as providing a better platform for collaboration on some project, for example). If even a small level of trust has been established, do this, so that if a raid is launched before you can get the info or other desired result, you can still reach the goal. In fact, if you are cleaver about doing this, you may gain importance in the eyes of the target, because you had the foresight to provide an alternate means of communicating, and they may turn trust you more, and even start relying of you for advice in resisting the attack. This, of course, all depends on the specific circumstances and variables. It is indeed a complex art. Do not fail to use your imagination.
>> No. 72
>>71

I don't know man; I’m a fan of keeping it simple, just look out for juicy bits of info for confirming dox, SE, ect, without getting in too deep (that is, establishing all kinds of complex schemes and stuff). And for that you don't really need to worry about "friendly fire" because you don't have to put anything on the line.


Delete post []
Password  
Report post
Reason  




Inter*Chan Imageboard Top List