It’s a daunting task, but you can reconstruct shredded pages of paper.
After Iranian students seized the US embassy in Tehran in 1979, they spent years painstakingly reassembling the intelligence reports and operational accounts shredded by the CIA officers who were the last workers captured.
The security forces later published the reconstructed documents in book form and sold copies all over Tehran. Agents used the intelligence they gathered to identify and kill CIA collaborators.
Fast forward to 2011 and the Defense Advanced Research Projects Agency (DARPA), the Pentagon’s research arm, offered $50,000 (£31,961) to the first team to reassemble five shredded hand-written documents and answer the puzzles contained in each of them.
A team of computer programmers from California developed software they say shows that computers can, in theory, do most of the hard work.
After many more years of research and development there are now commercial document reconstruction tools and services available. The shredded pieces of paper can be put back together in a fraction of the time it would take to do manually.
The PMT-A7 is the second generation writing slate originally developed in 2017 for Special Operations Forces to provide a safe, secure and sterile device for taking notes, recording information and sketching in adverse weather conditions, low light and hostile environments.
The PMT-A7 ensures you always leave a clean slate. Once the note has been erased it is gone for good…
The primary function depends on your requirements. It is on the covert entry page of www.oscardelta.co.uk as it can be used for lock bypassing ‘carding’ a door; however, there are other technical uses…
The card is frosted allowing for you to place the card over printed text with the cut-out slot over the sensitive or private information. Using a black marker pen you then cover the text in black to redact the information from a document in preparation for publication. Ideally you should then photocopy the document and destroy the first copy to prevent recovery of the redacted text.
The LTX1 can also be used as a privacy screen for video calls on a mobile device. Simply place over the front camera to ‘blur’ your face/location. Light will still enter the sensor so the screen will remain on.
The LTX1 can also be used with Cavity Tray for The Ridge RFID Blocking Wallet, so you can easily load/unload the tray.
Audio jammers are popular tools used during confidential meetings. They produce a unique sound for masking and protecting conversations from external listening devices, such as a smartphone running an audio recording app, hidden in one of your guests’ pocket.
The sound of a jammer should be very difficult to filter out or remove when present in an audio recording. While commercial audio jammers often rely on white noise, this generator, however, uses a more efficient sound with articulation similar to speech. It is also buried under severe distortion, which makes recovery algorithms have a hard time producing exploitable results.
For further privacy, increase the generator’s volume to play louder than your voice. Then, if you are holding a conversation in person, speak quietly, and very close to your partner so they hear you over the sound.