[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Query on adding a USB hdd

Hash: SHA1

On 05/24/07 03:09, Dan H wrote:
> On Thu, 24 May 2007 02:48:35 -0500
> Ron Johnson <ron.l.johnson@cox.net> wrote:
>> On 05/24/07 02:30, Dan H wrote:
>>> In fact, to those that really want to get at the data, a properly
>>> encrypted (as in: unguessable passphrase, long enough key) laptop
>>> will make any other approach than directly attacking the laptop more
>>> feasible.
>> Maybe it's just too late and I'm too tired, but I don't understand
>> what you mean.
> Physically breaking into the building of whoever is being spied on for
> written notes or printouts. Getting a mole into the target organization.
> Analyzing EM emissions from target. Intercepting IP traffic. Obtaining
> passwords from target by bribe, extortion or torture. Any of those
> promise more (and faster) success than attacking a well-encrypted disk,
> and all of them are employed by truly interested parties.

Ah, gotcha.

Black bag ops, TEMPEST, CARNIVORE, social engineering & rubber hose

- --
Ron Johnson, Jr.
Jefferson LA  USA

Give a man a fish, and he eats for a day.
Hit him with a fish, and he goes away for good!

Version: GnuPG v1.4.6 (GNU/Linux)


Reply to: