82
posted ago by Retaining_H2O ago by Retaining_H2O +84 / -2

How do you compromise an investigation? You access a computer and tamper with the evidence.

How do you ensure that an investigation or audit has additional complications? You infiltrate the computer system... and then fool everyone into spreading that information you gleaned NATIONALLY on every outlet. Is that info now admissible at trial? Is there any proof that the computer server or machine evidence hasn't been corrupted?

Be very careful with this. The White Hats know... but they don't spread their information nationally in this manner. They keep the information close and use it as part of a strategy. Only a fool trumpets information to alert his enemies.