Anonymous ID: 112fca Feb. 14, 2019, 12:44 a.m. No.5166790   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6816 >>6844 >>6873 >>7047

>>5161885 ob all

>>5162029

>>5162078

 

Two ways, at least, to read between the lines.

 

Graphic shows one way: The mobile devices were compromised on a subset of those issued by the FBI. The OIG hints at the size of the subset by refering to the subset (10%) of devices that were compromised after 31,000 had been changed-out. Before the change-out how many? Where? Issued to whom?

 

This way of looking at it also suggests that the users hacked the text message data (and other data) on their devices and reserved a hidden database that ESOC claims to not have known about. This prevented preservation of the data. This problem may have been a feature created or merely found and exploited by a subset of users.

 

Another way of looking at it? These devices were altered by a person or an entity within the security system for the purpose of monitoring particular users without their knowledge. To execute that purpose the ESOC had to be kept in the dark, officially, The data may have been preserved off-device some other way at some other place.

 

The difference between the two views? Well, nothing can be certain at this point, of course, but the first view would suggest that the database was held back for some as yet unknown reason. Was the purpose to tamper with evidence - to alter the text messages and other data? Was it a coarse attempt to hide chunks of data that would just deemed "missing"? How would any of this fit the established fact pattern of these particular users?

 

The second view would suggest that tampering was suspected beforehand and that precautions were taken to preserve the database where ESOC and the vendor could not reach it because both were blind to it. That suggests concerns about security at both ESOC and the vendor. If there are no indications of tampering with the database contents, then, this may prove out.

 

And that second view would fit, perhaps, with the Q pattern of pre-emptive (and lawful) interventions?

Anonymous ID: 112fca Feb. 14, 2019, 1:26 a.m. No.5166937   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>5166873

 

TY Anon, perceptive.

The ratio of incriminating/sensitive to random need not be 100%, but I get what you mean. There needs to be something in there that would be considered significant enough for a user to hide from ESOC's collection methods.

 

The OIG report also hinted at gatekeeping. So it is not just collection that was at stake with the mobile devices, natch.

 

The vendor claims to not know the origin and purpose of the cache so failsafe prolly not in the mix. Presumably (?!?) that means more than ESOC/vendor just being unaware of the existence of the cache and how it was made and kept on the devices.

 

I'm thinking that this vulnerability is particular and that ESOC experienced a basket of problems with collecting data from these many devices. So this particular is sorta like a needle in a haystack, right?

Anonymous ID: 112fca Feb. 14, 2019, 2:06 a.m. No.5167095   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7105

>>5167069

>https://twitter.com/GenFlynn/following

 

TY Anon.

I'm not a twitter user.

The way you found @HuberHammerQ was by scrolling through the list that @GenFlynn follows? The masthead, jets, popped out and you recognized?

 

The additional accounts you are highlighting make for interdasting viewing, also. This might become a thing to do with other prominent accounts, if twitteranons are on the ready?

 

Godspeed, Anon.