Saturday, January 31, 2009

Domestic Spying at the Republican National Convention 2008

author: Fantum e-mail:
A pointer and link to an official analysis of pre-convention activist activty and plans for the 2008 convention.

A very good ref 2008 RNC demonstrations can be found here

Notice the use of social networking charts and associative analysis used to determine nodes and persons of interest.

Also note, the extensive monitoring and exploitation of open-source web-pages, email lists and affinity group relationships.
This is a very important document for the defense in the trial of the RNC-8 and should be examined by activist groups to develop effective counters and defenses.

Social networking analysis is a powerful but flawed technique if used in isolation.

The creation by a core activist group of multiple "front" or false affinity groups can be very effective in adding linkages which do not exist. Then the other groups can then be blamed for actions, used as mis-information platforms, and provide other avenues for maskirovka Russian for "The Deception") operations.