#110. Activities or conversations on or near a cell phone or laptop can nearly always be identified or extracted unless the device is physically destroyed.

  National Security Secret  

#110. Activities or conversations on or near a cell phone or laptop can nearly always be identified or extracted unless the device is physically destroyed.

Related secrets: [#100]

You don't understand what that means?  Let's be as clear as possible on this:

  • What is the cell phone or laptop being used for?
    • Surfing the internet:
      • Can the names of websites be extracted to identify them?   YES
      • Can the pages themselves be extracted recognizably?   YES
      • Can images or video be extracted intact enough to identify or note those in them?  YES
    • Phone calls, texting, web meetings:
      • Can the conversations themselves be extracted or transcripts?  YES
      • Can texts be recovered or reconstructed as timelines?  YES
      • Can audio or video from web meetings be seen or heard?  YES
All of the above are possible unless a device is physically destroyed.  Not just broken - every component it contains must be shattered.

What?!  Now you're supposed to say:
  1. There's no way conceivable way to recover those things.  What if the hard drive was wiped or erased 3 times using software approved by "an approver"?
  2. What if the SSD was trimmed or every bit was written over X number of times?
  3. What if the device was dropped in a lake for a few years before being found?
Those things may or may not matter.

Still, all can be recovered from "noise".

More information will be provided.



Originally posted on 03-03-2023 @ 10:42 AM

Comments