Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
FBI FOIA Anarchist Extremist Assessments - Part 2 of 3 Pittsburgh G-20 Summit Documents

FBI FOIA Anarchist Extremist Assessments - Part 2 of 3 Pittsburgh G-20 Summit Documents

Ratings: (0)|Views: 17 |Likes:
Published by Smiley Hill
Part 2 of 3 of the Anarchist Extremist Assessment FBI File released under the Freedom of Information Act
Part 2 of 3 of the Anarchist Extremist Assessment FBI File released under the Freedom of Information Act

More info:

Published by: Smiley Hill on May 30, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/30/2012

pdf

text

original

 
cmr
:-*~.'~:,....
':
,.:
..
.
.'
 
r--------
>:
-=--------
:b7E
UNCLASSlFIED/lFoAlFFICIALUSEONLYILAWENF.EMENTSENSITIVE_.;..;;:;....__--,
.'-.-I:
I
-1
:06
U.S.Department
of
justice
1-'-;:1
=====y
FederalBureauofInvestigation
InReply.PleaseRefertoFileNo.
HEREI1iIISmrCLA.S5IFIED
pJ\
DATE07-14-2011BY60324UC~AW/5BJCMW
July28,2009
i
Thc
GNURadical
is
II.
guidethatprovideshow-toinstructiononprivacyandencryptiontechnologyaswell
asessaysconcerningthe
free
softwaremovem.entandanonYlliityasanorganizingtactic,accordingtoan
open
sourceavailableat
http://zinelibrary,info/gnu·radical·vol-i-O.
UNCLASSlFIED/IFOROFFICIALUSEONLYILAWENFOR~NTSENSITIVE~
.,>(..
300A--PG-78(J°8-'1
G~
I
O_II,~
L-J-kt,f
.0
L
vv
pcl~
2
IJ.
-'P-
-'l-~
i....-_
IdentificationofthePotentialforAnarchistExtr.emists
tdL.'T"""
....I
I
linPittsburgh,Pennsylvama
(U)
Accordingto
an
opensource.
a
series_ofcomputersecurityworkshops
were
conducted
by
the"Gnukadicals'"duringthe
CRIMEthINC
Convegence2009,whichwasheldinPittsburghfrom20-26July2009.Thetrainingagendaincludedanintroduction
to
freesoftware,adigitalsecurityworkshop,evadingelectronicsurveillance,communicatinganonymously,softwareinstallationguidance,aswellasa"WirelessGames'workshopconcerningexploitingencrypted
wireless
networ.
'e.
ossible.
n
I
Blcomment
CUIIFOUO)
Numeroussuspiciousincidentsinvolving
I
((J/IFOUO)AccordinztoanFBIallentinAuzust20061
h7E
ME
b7Eb7E
b7E
b6
b7C
bTE
 
CUI/FOUP}
AccQr9mg
to
00.
establisbedsoytcel
bTD
Jo7E
;z:.
r
':j.J7D
,b'7E
(OIIFOUO)Lawenforcement
should
becognizant
of]
b7E
2

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->