This is exceptional news and it means that it may become just a tad easier to defend your organization from such attacks.
Here is a short list of SHAC's tactics:
- Posting executive and employee information on the web. This information sometimes went so far as to show what schools the executive's children attended. Not that it makes any difference, this was not just information about HLS employees but also that of other companies that did business with HLS.
- Home protests - that's right they would visit an employee's home and protest outside with graphic signs. They might also canvass the neighborhood to inform their neighbors of the "horrible" things their neighbor was involved in.
- Telephone campaigns - companies were inundated with phone calls that amounted to little more than denial of service attacks.
- Others limited only by creativity...
- Vandalizing employee homes and cars - throwing paint on the houses and using etching acid to write on house and car windows. They would also use paint stripper to write in the paint on cars.
- Booby-trapped letters were mailed to some executives - not explosives but razorblades.
- Threatening phone calls, letters, emails and the like.
- At least one denial of service attack on a bank.
- Vandalizing the Marsh offices.
- And let's not forget the Chiron and Shaklee bombings in California.
- This is just the short list.
So, if your organization has done business with HLS in the past, is involved in any sort of animal testing in particular, or other uses of animals targeted by the Animal Rights movement it would be prudent to be prepared for random retaliatory actions.