- Joined
- Nov 26, 2020
- Messages
- 716
According to scientific canons, all devices must be disconnected from the power supply, sealed and examined by specialists in the laboratory. Although this is an ambiguous recommendation, since the same electromagnetic disk destruction systems are able to automatically activate and destroy data when the position of the system unit changes from vertical to horizontal.
But all these recommendations are ignored, since the temptation to obtain confessions and access to devices while the suspect has not yet recovered from the shock, has not received the advice of a lawyer or inmates is too great.
And this is bearing fruit: most cybercriminals caught by surprise give out access to devices and point to evidence, doing so in the framework of cooperation, for which they are promised the laxest possible sentence (they, however, are not told that the verdict is passed by the court, and not by the police or investigator).
Usually a person from the outside who is not interested in investigating hacker crimes may have a logical question: "After all, there is encryption of the operating system and crypto-containers, why do cybercriminals not use it?"
They do, but a
cybercriminal can just hold his finger in the door and get a password, because encryption is an excellent solution in theory, but in practice it is better to give out a password simply is not necessary.
Sometimes a detainee is threatened with a threat to be sent to a pre-trial detention center in case of refusal to give out the data and are offered a recognizance not to leave or house arrest if they agree to cooperate.
A USB killer can solve the hacker's problem: if such a device disguised as a USB flash drive is inserted into a USB port, it will irreversibly damage the motherboard and the computer will "die". But most importantly, on the spot it will be almost impossible to establish the cause of the "death" of the computer, and the hacker will always be able to breathe and say: "Eh, he was breathing badly for a long time."
The USB killer will not destroy the hard drive, and the laboratory will remove it, but by that time the hacker will already have a lawyer and the case will be at the stage of investigation, no one will stick a finger in the door or change the measure of restraint.
USB killers can be found in online stores and on AliExpress. A similar flash drive is placed near the computer, an inscription is applied to it, for example, "data" or "materials for work" (the purpose of this inscription is to attract attention). A hacker can voluntarily give out a flash drive or wait for curious ill-wishers to insert it into the device themselves.
Of course, there is a small chance that they will insert it into their device, and then problems cannot be avoided. But the detained hacker already has big problems, and the task of the trap is to disable the computer with the data at the moment when the detainee himself can no longer do it.
If you have a recent MacBook that has isolated USB ports from the motherboard, this will not work.
When using a USB killer, the data on your computer's hard drive will most likely not be damaged.
Good luck and good luck, friend!
But all these recommendations are ignored, since the temptation to obtain confessions and access to devices while the suspect has not yet recovered from the shock, has not received the advice of a lawyer or inmates is too great.
And this is bearing fruit: most cybercriminals caught by surprise give out access to devices and point to evidence, doing so in the framework of cooperation, for which they are promised the laxest possible sentence (they, however, are not told that the verdict is passed by the court, and not by the police or investigator).
Usually a person from the outside who is not interested in investigating hacker crimes may have a logical question: "After all, there is encryption of the operating system and crypto-containers, why do cybercriminals not use it?"
They do, but a
cybercriminal can just hold his finger in the door and get a password, because encryption is an excellent solution in theory, but in practice it is better to give out a password simply is not necessary.
Sometimes a detainee is threatened with a threat to be sent to a pre-trial detention center in case of refusal to give out the data and are offered a recognizance not to leave or house arrest if they agree to cooperate.
A USB killer can solve the hacker's problem: if such a device disguised as a USB flash drive is inserted into a USB port, it will irreversibly damage the motherboard and the computer will "die". But most importantly, on the spot it will be almost impossible to establish the cause of the "death" of the computer, and the hacker will always be able to breathe and say: "Eh, he was breathing badly for a long time."
The USB killer will not destroy the hard drive, and the laboratory will remove it, but by that time the hacker will already have a lawyer and the case will be at the stage of investigation, no one will stick a finger in the door or change the measure of restraint.
USB killers can be found in online stores and on AliExpress. A similar flash drive is placed near the computer, an inscription is applied to it, for example, "data" or "materials for work" (the purpose of this inscription is to attract attention). A hacker can voluntarily give out a flash drive or wait for curious ill-wishers to insert it into the device themselves.
Of course, there is a small chance that they will insert it into their device, and then problems cannot be avoided. But the detained hacker already has big problems, and the task of the trap is to disable the computer with the data at the moment when the detainee himself can no longer do it.
If you have a recent MacBook that has isolated USB ports from the motherboard, this will not work.
When using a USB killer, the data on your computer's hard drive will most likely not be damaged.
Good luck and good luck, friend!