Skip to main content

How to quickly destroy a computer/pc.Emergency PC destruction

Problem


You have probably seen more than once videos of arrests and searches of hackers or other cybercriminals, when law enforcement officials break into a residential building, turn on a computer and demonstrate irrefutable evidence of criminal activity under Recording. Brought to you by Hackfreaks official.


From the point of view of modern forensics, this is the wrong approach . According to scientific canons, all devices must be disconnected from the power supply, sealed and examined by specialists in the laboratory. Although this is an ambiguous recommendation, since the same electromagnetic disk destruction systems are able to automatically activate and destroy data when the position of the system unit is changed from vertical to horizontal.


But all these recommendations are ignored, since the temptation to obtain confessions and access to devices while the suspect has not yet recovered from shock, has not received advice from a lawyer or inmates is too great.


And this is paying off: most cybercriminals caught by surprise give out access to devices and point to evidence, doing so in the framework of cooperation, for which they are promised the laxest possible sentence (they, however, are not told that the verdict is passed by the court, and not by the police or investigator).


Usually, a person from the outside who is not interested in investigating hacker's crimes may have a logical question: after all, there is encryption of the operating system and crypto-containers, why do not hackers use it?


They do, but a hacker can just hold his finger over the door and get a password, because encryption is an excellent solution in theory, but in practice it is better to give out a password simply to nothing.


Sometimes the detainee is threatened with the threat of being sent to a pretrial detention center before the trial in case of refusal to release the data and they are offered a recognizance not to leave or house arrest if they agree to cooperate.



Solution to the problem

A USB killer can solve the hacker's problem: if such a device disguised as a USB flash drive is inserted into a USB port, it will irreversibly damage the motherboard and the computer will "die". But most importantly, on the spot it will be almost impossible to establish the cause of the "death" of the computer, and the hacker will always be able to breathe and say: "Eh, he has been breathing for a long time."


The USB killer will not destroy the hard drive, and the laboratory will remove it, but by that time the hacker will already have a lawyer and the case will be at the stage of investigation, no one will stick a finger in the door or change the measure of restraint.

USB killers can be found in online stores and on AliExpress. A similar flash drive is placed near the computer, an inscription is applied to it, for example, "data" or "materials for work" (the purpose of this inscription is to attract attention). A hacker can voluntarily give out a flash drive or wait for curious ill-wishers to insert it into the device themselves.

Of course, there is a small chance that they will insert it into their device, and then problems cannot be avoided. But the detained hacker already has big problems, and the task of the trap is to disable the computer with the data at the moment when the detained himself can no longer do it.

If you have a recent MacBook that has isolated USB ports from the motherboard, this will not work.

When using a USB killer, the data on your computer's hard drive will most likely not be damaged.


This article is presented for informational purposes only and does not constitute a call to action. we are adminstration of Hackfreaks not responsible for anything.All information is aimed at protecting readers from illegal actions

Comments

Popular posts from this blog

How to disable encryption ? FBE ROM 1st time flashing guide with FBE encryption through Orange Fox Recovery.

 It is now mandatory to format your data for the first time when you flash this FBE ROM. ***Backup everything from phone Internal storege to PC/Laptop/OTG/SD card.

What is BLACK WINDOWS 10 V2 windows based penetration testing os,and what are its features.Download link inside

                         Black Windows 10 V2