2/2 strike relays remained under Truth's control! No one used -attach on a strike relay trust key!
The target was the exposed GRANITE HUNTER LTO [Scotty]!
GRANITE HUNTER systems were already compromised by the recent failed strike. Truth has tracked our connection with our LTO, infiltrated sensitive network components, and installed covert monitoring software.
This outcome is extremely disruptive to operations tempo. We are assuming a hardened posture effective immediately, invoking higher authorities, and falling back for tactical regeneration.
We believe that Truth has extracted data we prepared as a performance incentive. This is an acceptable collateral outcome. We will maintain a social presence for the near future until we can retempo our counterintelligence operations.
Also, what kind of help do you expect from us? Unless we're working with you or against you we don't have any trust keys, so what can we do?
Every operative on both sides of this struggle got involved simply by contacting one of the parties involved — or reaching out to each other to pool information via forums and IRC. LTOs and cell handlers change. Trust keys circulate unpredictably.
Performing analysis of fabricated and declassified material is one vital contribution. Translating IRC chatter and speculation into durable forum posts that contribute to the community knowledge footprint is another. Surveillance and behavioral monitoring has provided operatives on both sides with key insights. But the most important resource for GRANITE HUNTER, and for Truth, are trustworthy persons who step up as reliable relays, or work to infiltrate the enemy and -attach their relays.
Truth's success so far can be reduced to a single, damning fact: community members stepped up to provide secure relays to Truth's handler, while GRANITE HUNTER's strike operations were disrupted by untrustworthy relays.
In fact, according to our analysis, the decisive element in our recent setbacks was a Truth operative or affiliate who was able to work into GRANITE HUNTER's own pool of trusted agents, receive a trust key vital to GRANITE HUNTER operations, and then sabotage it with an -attach command.