I Agree with OP, as it is, for the masses may even seem hardcore, but from a legal / forensic perspective it has 0 value, let me explain, (i'll give you a point of view from an IT specialist, NOT doubting fraud or anything, but just telling you how it could be 'debooooonked' easily if that's not prepared in the right way);
That's a list of IP and name looked up reversely with a little of map data show to animate it, some macs, and some numbers, good, but, coming from where exactly? who made it? who tells me that's legit? where are the original logs and their hashes?
In short words, I can make an even longer list and a much cooler map via Kibana
Also, tech talk, was really 0, that worried me fair enough, but I'm sure they did it on purpose to keep it simple for everyone and not just techs, cause 'file being uploaded', then 'packets going', 'they hacked sometimes and sometimes had the user account' and so on,
That's monitoring a mass of data, so be sure that if they really did it (could have been only NSA/MIL), there's a movie behind that's at least 50 times bigger than this
???
If you were going to present evidence for the masses in two hours how would you put together? Speaking as a preacher, you cant get tangled in the weeds. This doc. dares law suites, dont you think? It says go ahead make my day.
The part that got me was them saying the Mac address was an unique ID. No, mac addresses are not unique and can be faked. I tracked 680k devices at one job, macs are not unique!
Also, if they had the Mac address, they had to have captured data at the edge router which makes you wonder how much access does the spies have.
I can say, that big cellular networks have dedicated connections for government agencies that allows them to access any part of the cellular switch.
Looked more like hard core evidence. But I see where you're going with this...
I Agree with OP, as it is, for the masses may even seem hardcore, but from a legal / forensic perspective it has 0 value, let me explain, (i'll give you a point of view from an IT specialist, NOT doubting fraud or anything, but just telling you how it could be 'debooooonked' easily if that's not prepared in the right way);
That's a list of IP and name looked up reversely with a little of map data show to animate it, some macs, and some numbers, good, but, coming from where exactly? who made it? who tells me that's legit? where are the original logs and their hashes?
In short words, I can make an even longer list and a much cooler map via Kibana
Also, tech talk, was really 0, that worried me fair enough, but I'm sure they did it on purpose to keep it simple for everyone and not just techs, cause 'file being uploaded', then 'packets going', 'they hacked sometimes and sometimes had the user account' and so on,
That's monitoring a mass of data, so be sure that if they really did it (could have been only NSA/MIL), there's a movie behind that's at least 50 times bigger than this ???
If you were going to present evidence for the masses in two hours how would you put together? Speaking as a preacher, you cant get tangled in the weeds. This doc. dares law suites, dont you think? It says go ahead make my day.
The part that got me was them saying the Mac address was an unique ID. No, mac addresses are not unique and can be faked. I tracked 680k devices at one job, macs are not unique!
Also, if they had the Mac address, they had to have captured data at the edge router which makes you wonder how much access does the spies have.
I can say, that big cellular networks have dedicated connections for government agencies that allows them to access any part of the cellular switch.
This guy does all the things in DevOps.
Yes, I believe this was just the preview. Remember he said it was a 3 hour doc, and it was actually less than two. There's much more coming.