Re: Query on adding a USB hdd
-----BEGIN PGP SIGNED MESSAGE-----
On 05/24/07 03:09, Dan H wrote:
> On Thu, 24 May 2007 02:48:35 -0500
> Ron Johnson <email@example.com> wrote:
>> On 05/24/07 02:30, Dan H wrote:
>>> In fact, to those that really want to get at the data, a properly
>>> encrypted (as in: unguessable passphrase, long enough key) laptop
>>> will make any other approach than directly attacking the laptop more
>> Maybe it's just too late and I'm too tired, but I don't understand
>> what you mean.
> Physically breaking into the building of whoever is being spied on for
> written notes or printouts. Getting a mole into the target organization.
> Analyzing EM emissions from target. Intercepting IP traffic. Obtaining
> passwords from target by bribe, extortion or torture. Any of those
> promise more (and faster) success than attacking a well-encrypted disk,
> and all of them are employed by truly interested parties.
Black bag ops, TEMPEST, CARNIVORE, social engineering & rubber hose
Ron Johnson, Jr.
Jefferson LA USA
Give a man a fish, and he eats for a day.
Hit him with a fish, and he goes away for good!
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
-----END PGP SIGNATURE-----