Cache is on private property with the permission of the owner. This
is a heavily trafficked area, so stealth is vital.
From: Perot.Dee@macrohard.con
To: revenue_protection@macrohard.con
Subject: Weekly surveillance report
Sirs,
I have major news regarding the plans of the rogue programmers
who threaten our business model. As I described last week, I have
identified a pattern in how the programmers communicate prior to
releasing their insidious free software designed to undercut our
revenue streams.
I have now confirmed the existence of several meeting sites or
(repositories) where they "check in" their work with one
another.
I have identified that one of these repositories has recently
been replaced with a commercial venture near my current observation
post, and was able to document several of these check-ins. I have
also discovered the programmers are discussing using Subversion to
further their projects.
I have also noticed that many of the programmers who are
actively using Subversion are no longer present at the check-ins,
and have seen evidence that many coders consider it to be a better
system.
I also have proof that agent "DVORAK" has been compromised, and
have intercepted a message from one of the coders that bears a
resemblance to one of the codes he developed for us.
I have sent a copy of the code to the cryptology department for
confirmation, and this is indeed similar to our own codes. Please
see their comments below.
ATTACHMENT
1w2w5v8v10 [ Brk.n xf Jrp.f Erjyrpr,
14w15w7 [ 3pe lprh.jy ncoy.e rb ,ctcl.eca lai. O.. dcby 1
12e6 [ <<C Paecr cbk.bycrbv axxpkv
4w9vvvvv11 [ Naoy jng.w 2be ,rpew nrbi.oy urpm
3 [ UROO Ncj.bo. & ai.bjfw p.cy.payck.
13 [ Nrjan Ldrb. Jrmlabfw 1995 rp .apnc.p
v cbecjay.o ab gbgo.e n.yy.p
12345 6789 11 1111
01 2345