#110. Activities or conversations on or near a cell phone or laptop can nearly always be identified or extracted unless the device is physically destroyed.
National Security Secret
#110. Activities or conversations on or near a cell phone or laptop can nearly always be identified or extracted unless the device is physically destroyed.Related secrets: [#100]
You don't understand what that means? Let's be as clear as possible on this:
- What is the cell phone or laptop being used for?
- Surfing the internet:
- Can the names of websites be extracted to identify them? YES
- Can the pages themselves be extracted recognizably? YES
- Can images or video be extracted intact enough to identify or note those in them? YES
- Phone calls, texting, web meetings:
- Can the conversations themselves be extracted or transcripts? YES
- Can texts be recovered or reconstructed as timelines? YES
- Can audio or video from web meetings be seen or heard? YES
All of the above are possible unless a device is physically destroyed. Not just broken - every component it contains must be shattered.
What?! Now you're supposed to say:
- There's no way conceivable way to recover those things. What if the hard drive was wiped or erased 3 times using software approved by "an approver"?
- What if the SSD was trimmed or every bit was written over X number of times?
- What if the device was dropped in a lake for a few years before being found?
Those things may or may not matter.
Still, all can be recovered from "noise".
More information will be provided.
Originally posted on 03-03-2023 @ 10:42 AM
Comments
Post a Comment