If yes, here's how to respond:
- Make their names as publicly available as you can
- You know they'll use them on some occasion or another (preferably they'll try to frame you before doing so, in order to disorient the public; they will also attempt to use them at a timing as far removed from the incident as possible in order to attenuate the relationship between the data point of the data theft and the moment of their appropriation)
- Have your satellites constantly on hold and constantly monitor the 'recipients' ' writings, commercial moves, correspondence
- If they appeal to a wider audience, try to infiltrate their audience and see what they say, how they respond
- Gotchya!!!! (sooner or later)
No comments:
Post a Comment