Guidance, in its response to ISEC report, stated on more than one occasion:-
"Also, by corrupting the NTFS partitions, the perpetrator would likely render his file system dysfunctional, which calls into question both the likelihood and feasibility of such a tactic. Thus, the chances of this specific scenario occurring in the field are extremely remote;"
A perpetrator, suspecting intervention by lawful authorities, and with time to spare, may use just this tactic to specifically avoid detection.
"Also, by corrupting the NTFS partitions, the perpetrator would likely render his file system dysfunctional, which calls into question both the likelihood and feasibility of such a tactic. Thus, the chances of this specific scenario occurring in the field are extremely remote;"
A perpetrator, suspecting intervention by lawful authorities, and with time to spare, may use just this tactic to specifically avoid detection.
[ reply ]