i mean they might be able to trace the path of the leak. seed the email to certain individuals you feel might be compromised. when anonymous makes a big deal about gaining access you have your proof that one of your seeds worked. that gives places to direct their investigation. once they find where the leak started they can then work up the ladder like they do with drug busts.
they would also , i assume, have access to phone records to show which phone numbers accessed the call. they might have even set up multiple access codes- one for "players" in the sting and another for people accessing through the leak. if the sent "brown" to the folks in on it but "green" to the person not in on it and "green" gets used then you know that guy is the source, etc.
|