- You want us to examine the devices that will fall into our hands, right? And, naturally, this workshop should not be connected in any way with the Homeland Security Department. In that case, you will take care of all the organizational issues - it would be better if it were under the roof of a well-known company - and I will take care of all the technical part.
- Agreed!
— How are things in the workshop, Bob?
— Very good. Users are careless, as I thought. The vast majority of devices studied had at least some data remnants. Mostly it was personal information, but there was also corporate information. On more than 16% of devices we were able to immediately access the previous owner’s data. And we were able to restore erased information on 74% of used media and computers. Only 11% were properly cleared.
- And what kind of data is this?
— A wide variety, from the potentially harmless to the poland mobile database and highly sensitive: calendar entries, meeting minutes, credentials for accessing corporate resources and internal organization documents, personal photos, medical information, tax documents, and much more. But there is something very interesting.
- What's there?
— We found the routes of movement of strange groups. Regular ones, too. Twice a month. From Island O. to us. The ships stopped a mile from the shore, apparently, there is a transfer of cargo and passengers to boats that moor in an abandoned fishing village. From there, people and cargo are taken further to the island. The route ends at the warehouse area. As far as I understand, the arrival of the next group is tomorrow.
- Excellent! Urgently transmit this data to the department. We will meet them tonight. Both on the shore and at sea.
The next day came.
- Bob, you're a great guy! Thanks to your tip, we were able to stop another drug shipment to the island. And also, we detained a group of smugglers!
Thus began Operation Workshop.
Do you always clean your devices before selling or repairing them? Do you have any reason to trust the repair shop?