For example, take cellphones.
By themselves, given a phone number, it's easy to listen to someone through their phone. Like, real easy.
Guys that follow basic opsec though, don't realize that not taking a self-phone deprives them of a valuable avenue for counter-information and disinformation.
Likewise with any action or communications that can be monitored.
Always be asking, "what does this cause opponents who may be listening to believe is true?"
This is exploitable. You can have security services going to false caches, or have them go to places you want to, or counter-entrap them, or have them believing you can be leveraged. And of course if you're the falls-on-sword type, this gives you immediate access to harm their operations.
Also keep in mind that while utilizing avenues like this, you should have hand signals or other methods of silent communication.
You don't want to tell someone to be quite, because that gives the game away immediately.
A simple sign or motion, or codeword, lets who you are communicating with know that phones should be put away, turned off, moved to a secure location. Likewise it lets them know to move to a room without windows, or sweep for bugs, or any number of other actions based on the mode of communication, location, and nature thereof.
Having communications signals on lock and thoroughly drilled before you're on radar is absolutely essential.
The object of every civil liberties group, militia, or civil defense group should be limited hangouts, reverse entrapment, and baiting intelligence operatives into exposing their methods, their lawlessness, and their agents.
OPSEC should never be defensive.
It should be aggressive in its goals.
(post is archived)