Public briefing index
Research Archive
Browse 2IA research by topic: surveillance architecture, OSINT, Anonymous and hacktivism, psychological warfare, metadata and identity, AI analysis, keyword monitoring, false positives, ethics, and lawful public contact.
Archive Use
Posts and pages should stay educational, high-level, source-aware, and privacy-first. Operational misuse guidance belongs nowhere in the public archive.
Dossier Map
The archive is organized around surveillance architecture, OSINT, Anonymous and hacktivism, psychological warfare, metadata, AI analysis, keyword monitoring, false positives, civil liberties, and lawful contact.
Source Review Standard
Every source should be sorted into safe public value, internal context, duplicate context, defer, or blocked misuse guidance. The goal is to use more evidence while publishing less recklessness.
Regression Tested Routes
The theme includes an automated route-content test manifest so core public pages can be checked for expected phrases, warnings, and HTTP success before packaging or release.
Report Disposition Ledger
The archive model sorts incoming reports into public-safe value, internal context, duplicate context, deferred work, or blocked misuse guidance. That lets the site use more of the supplied material without publishing dangerous instructions.
Long Memory Goes To Wiki.FFTAC.org
Bulky source history and reviewed evidence belong in the FFTAC wiki memory layer. 2IA keeps public pages readable while preserving provenance, disposition, and future research trails for accountable review.
Latest briefings
Published research
Hello world!
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
Open fileProudly Civil-Libertarian
Lawful public intelligence for human freedom. Speech, press, petition, assembly, privacy, due process, anonymity, public records, correction, and oversight are the operating standard for every 2IA public page.
Editorial boundary
This page is educational and non-operational. It is not legal advice and it does not provide instructions for unauthorized access, evasion, sensor triggering, mass contact, harassment, deception, or interference with any system.