• Rooty@lemmy.world
    link
    fedilink
    arrow-up
    15
    ·
    9 days ago

    Generic antiestablishmentarism isn’t going to put you on a watchlist, this isn’t the 1950s. Glowies have better tech nowadays.

    • starman2112@sh.itjust.works
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      9 days ago

      If you wanna be on a list, start collecting old army field manuals. It’s one thing to say “we should start fire bombing McDonald’s,” it’s another thing to say “we should start fire bombing mcdonald’s, and here’s instructions on how to do it”

      Not that we should be firebombong McDonald’s lol I would never recommend that

      But I would recommend reading TM 31-201-1, especially pages 78-82

      • WoodScientist@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        8 days ago

        Want to know how Luigi found what hotel Brian Thompson stayed at? It’s right in his “manifesto.” He used social engineering.

        Social engineering is when you just take advantage of people’s natural predilictions to give you info or access that you shouldn’t have. For example, if he were to just call up UHC and ask them where the CEO was staying, they would likely just have called the police. Instead, he had to think of some plausible reason that someone might need that info through unofficial channels. I have no idea how he actually did it, but for example, Thompson was a famous womanizer who cheated on his wife. He was your standard sleazy executive scumbag. That can be exploited.

        *Hi, CEO’s office? I’m John Doe, an underling over at the CFO’s office. My boss wants to give Brian a special surprise at this year’s company meeting. We’re thinking of hiring a few girls to come over and keep him company one evening. I need to know where to have them sent. I would send an email or look up the info in our records system, but, as you can understand, it’s best if there’s no paper trail. Can you let me know what hotel he’s staying at?"

        These social engineering methods are the same tools scammers use, but they work just as well for assassins.