@@seedney It's not that they can't, they don't care. I mean to give law enforcement a bit of credit, it's also a matter of jurisdiction and resources. Though to be honest, I don't think I'd want every local PD given access to the same spooky resources the FBI has at hand, especially given how petty some cops can be and how difficult it is to hold any of them accountable.
Some activists also did this back in 2015 to Ursula von der Leyen who was the German defense minister back then, made a mould of the finger and managed to unlock her phone
Actually I am. This is hillarious. Every professional data and document destruction firm I know offers on side destruction of sensitive drives and documents. You don't even have to trust them, you can watch the process.
Yeah, best most companies do is basic RFID passes. But those can be cloned or you could finesse yourself into the building wearing one of the contractor firm uniforms you bought off Facebook marketplace.
As someone educated in security, yup. You can completely secure a facility, at the cost of making it nearly unusable. It's always a balance between making it accessible enough to function and secure enough for the function of the facility. Here they very obviously went way, way, way too far in the direction of easy of access and making the job as easy and convenient as possible, to the point that it undermined the entire point of the facility.
Why not destroy the storage devices at the source? The transportation itself seems a security nightmare. Like just have a room with equipment and train people. Destroying stuff doesn't require too much expertise.
@@matt_milacksome disc sectors would stay intact, plus more maintenance. Get a shredder, hire out someone to come repair it once no intact drives are there.
There is the 'Rack's Mobile Data Destruction System,' with which anyone can securely destroy data carriers after just one hour of training. The device is about the size of a bathroom cabinet and gets the job done.
It's why they don't tend to rattle me. The problem with governmental conspiracy theories is the assumption that governments are smart enough to do any of this. And if the FBI fails basic physical security, I'm pretty sure they're not controlling the world from behind the scenes. Almost kind of reassuring, that.
Hitman players would be like "okay but the public-facing government being utter morons actually makes it _easier_ for a shadow organization like Providence to exist".
Sad such a powerful tool for trolling is used in the worst possible ways. The prank call potential of something like that is astronomical. Misuse of mischief.
I work at a USG facility and we destroy our hard drives on-site. To spread out the workload, individual equipment managers are responsible for their own inventory. It's easy--I remove the drives, cycle them through a degaussing machine, and then crush them. Every computer I turn in has a sticker on it certifying that the HDD has been removed. I don't even deal with classified data drives--we do this just for CUI/FOUO data on "office drone" computers. Lol my little work center has better data security than the FBI! Perhaps they are too short-staffed to handle this simple chore because they are busy spying on churches and unhappy parents at PTA meetings.
What I take from this is how they make an example of "the little guy" but they just won't touch the companies that destroy the country. I guess one just has to lobby harder
Even if you’re paranoid then there’s always someone around that’s not …or something that you don’t know… and there’s no such thing as 50% of unhackable…
It depends... People who are paranoid, aren't always the people who know what they're doing. If someone buys backdoor-ed security tools, then he's worse off.
Why is the guy hacking the Hawaii database to make it appear he's dead story blowing up now? I swear I heard this months ago but everyone is talking about it now.
Idea for *low-risk* data storage devices, such as disks from public computers in the lobby or machines for other non-confidential tasks: Instead of having it shredded and become e-waste, wipe it clean to OCD level of degrees, write an OS or whatever on it, then reuse the computers decommissioned from those law enforcement agencies. Supply that to schools, churches and other institutions that need a new computer but can't afford to get it new. Of course data storage devices that had the case files and so on and is unsafe for the public should be destroyed as usual.
There is Companies Dedicated to doing Data Destruction. I am former Shred It driver and any of those one things would of caused a 30 day shut down of the plant and a deep investigation. Someone would be terminated. Look up Shred It and how they do there destruction. When I picked up hard drives I scanned them in threw the Drives Serial number and placed them in a locked tote and on my truck at the end of the day I handed them off to a warehouse employee who destroyed them with in 24 hours. The drives never left there locked tote untill they where fed into the machine. what there doing is all wrong and that department head should be fired.
@@Унмеито problem is uk law and uk courts, these gangs tarnish our reputation because people associate these few with our entire religion, we can deal with them very easily, very very easily, but the law still sees pdf files as human, and gives them zero prison. if we fix the problem, we go prison. suggestion?
I contrast this data destruction security with what I observed on a US military base in the 1980s: Paper classified documents were taken to a dedicated small building on the base, and fed via conveyor belt into an industrial shredder so loud you needed ear protection. If you tried to lay the documents on too thick, the conveyor belt would stop for about 20 seconds. The result was a fluffy paper & ink dust which was bagged. I don't know what became of the bagged dust.
I feel bad for Jesse Kipf. Child support prices are never fair and are overpriced up to 3x minimum. If he did all that to avoid it, god knows how much dads have suffered similar stuff.
They have a long history of "destroying" firearms in the same way. That's a deep rabbit hole you should jump into as well, lots of looking the other way and nothing being done about it
I drilled a hole in a failed server nvme before I gave it back to the tech under warranty, they weren't happy but I insisted. My manager said I shouldn't do it again, he was clueless. Dell were cool with it but surprised.
Now imagine how the IT Recycling is handled at the Ramstein Airbase in Europe - I have seen so many drilled through RAM modules, getting logged into some intranet after booting up doesnt even feel special next to that 'confidential' asset tag
The most effective way to destroy the data is to encrypt the drive and throw out the key when it's not needed anymore. I wonder why such agencies don't do that and trust some shady third party to handle their data in plain form.
I'd imagine it's either because any encryption that might be used already has known backdoors, or because of preparation for quantum computing being able to crack encryption standards used currently. I remember there was that one guy who had a drive with a bunch of bitcoin he forgot the password for and a company was able to bypass the encryption after some work, so imagine the options for our defense agencies where losing trillions over years means nothing to them.
@@Crazyboutpeace I doubt there are known backdoors in every encryption method out there. It's probably more-so worries about quantum computing, how easy it is to bypass if you don't do it correctly, and how easy it is to copy cryptographic keys. It's just safer to physically break the drive - if they were actually doing it.
@@Crazyboutpeace I see your point but I would disagree. 1. Symmetric encryption schemes like AES or ChaCha20 are not affected by quantum computers, that applies to something entirely different 2. I don't think they're backdoors in every encryption scheme on earth. Disk encryption software like Luks or Veracrypt support a lot of different encryption algorithms so even if you don't trust AES, you could use Serpent or ChaCha20 3. The bitcoin case was probably just brute-forcing the password. Breaking the disk encryption would make every computer using it would be compromised so all computers with encrypted drives would need to be migrated. If you're using strong key, it wouldn't be bruteforcable.
The most effective way to destroy the data would be to destroy the drive itself. You only encrypt then reformat if you want to have it usable afterwards.
Is this how the infamous Kaspersky ordeal went down? A contractor just strolled in one day, yoinked a drive that had malware on it, and the NSA bitched and moaned?
This FBI fail reminds me of the Caldwell Parish, Louisiana sheriff's department and their less-than-ideal security practices. From 2016 when the current sheriff took over, to November 2021, over half a million dollars was embezzled from the SO's fines and fees account. Investigation revealed the sheriff allowed deputies to cash their personal checks out of the fines&fees drawer (which no cameras were watching), only one employee was responsible for handling all of the dept's finances and nobody (not even the sheriff) ever checked behind or audited her, and financial record-keeping was atrocious at best. They often did not issue receipts when someone paid a fine or civil fee with cash, and pocketed the cash instead of putting it in the department's fines&fees bank account. They also didn't report those cash payments to the prosecutor's office (so the prosecutor would drop the court date and mark the case as closed), resulting in people being arrested for Failure To Appear. On top of all that, the Louisiana Legislative Auditor's office somehow missed all of those discrepancies in their yearly audits from 16 to 21. I also have a police scanner recording of a deputy (who's now a detective/investigator...) admitting over the police radio that he doesn't log fuel purchases charged to the department's credit card. Apparently they're still untrustworthy because they're now barred from accepting cash payments for fines or civil fees.
Meanwhile A HDD shredder the same size as a decent photocopier is 6k…. The company taking and storing the HDD’s, deserves massive fines. They have an obligation to do their job, ESPECIALLY if it’s sensitive data. Why are they effectively storing them not shredding them….
So that is where the Weiner and Hunter laptops went to. Too bad no one knew how lax the security was. We could have had ourselves some TRUTH. As an aside, I guarantee someone there had a profitable side hustle selling parts (and drives) on eBay. I expect they formatted the drives, if only to hide that it is stolen govt property.
Presumably SSD destruction can be done with noise wipes in software? The idea of sending everything sensitive to the same place seems poorly thought out.
how'd the last guy even manage to sell his scheme on the dark web when there's literally a defcon talk on this very site with a slideshow telling you how that exact security snafu works :P
faking your own death my man was leaving the dream. i bet the 195,758.65 is how much he made while selling his services i bet he was found out b.c he was still seeing his children. mother then told the judge he seen him.
Couldn't that guy just argue that, if she didn't spend 116k on the child, he shouldn't have to pay it all. Annnd probably spare himself jail for faking his death....or at least trying to lol
"It's amazing they lasted this long." It's not. The government doesn't care if people get defrauded. In most cases It's actually kind of bonus for them.
The british police taunting people on the telegram is so fucking funny because it just gives everyone on it advanced warning to cover their tracks. Just the stupidest possible thing the police could choose to do.
Today I learned I have better data destruction and warehouse security than the fbi
Same, I just dissasemble HDD's that no longer work, and use the platters as coasters
wow the feds couldn't dd if=/dev/urandom of=/dev/sda
@@random_tnt They probably can. Or just a general format, is it format *.*?. But do you think the person who made this video checked?
Being identified by your fingerprints through a picture is scary as hell.
They can’t find out who ruined your car with a 4K video evidence, but they can distinguish fingerprints from compressed youtube video 😂
@@seedney It's not that they can't, they don't care. I mean to give law enforcement a bit of credit, it's also a matter of jurisdiction and resources. Though to be honest, I don't think I'd want every local PD given access to the same spooky resources the FBI has at hand, especially given how petty some cops can be and how difficult it is to hold any of them accountable.
Some activists also did this back in 2015 to Ursula von der Leyen who was the German defense minister back then, made a mould of the finger and managed to unlock her phone
@@ordenmanvrn7685 do you have a link?
@@_elegans_ YT deletes external links, sorry, you'll have to use CGPT or a search engine
Damn. FBI caught with their pants down again? Why am I not surprised? 😂
At this point, why wear them at all? "Dear FBI, why wear pants? Creepy pants all the time get some. Maybe clown care? Some ants toot! Moscow."
i was caught with my pants down. unfortunately it was at night in my little sisters bedroom.
@@alexpascal5403Alright that's enough internet for today 💀
Actually I am. This is hillarious. Every professional data and document destruction firm I know offers on side destruction of sensitive drives and documents. You don't even have to trust them, you can watch the process.
They glow in the dark
Box of floppies outside FBI office: ""FREE! Take One! (pls reformat, thx!)
🤣🤣🤣
If you keep your garage door closed, congratulations! You have better security than the FBI.
Fingerprinting yourself for the feds via a pic of some cheese is true rat 🐀 behavior
damn even the FBI is sloppy with their CP collections.
You are describing the reality of any workplace. There is no such thing as real security, apart from very specific and limited instances.
Yeah, best most companies do is basic RFID passes. But those can be cloned or you could finesse yourself into the building wearing one of the contractor firm uniforms you bought off Facebook marketplace.
As someone educated in security, yup. You can completely secure a facility, at the cost of making it nearly unusable. It's always a balance between making it accessible enough to function and secure enough for the function of the facility. Here they very obviously went way, way, way too far in the direction of easy of access and making the job as easy and convenient as possible, to the point that it undermined the entire point of the facility.
Why not destroy the storage devices at the source? The transportation itself seems a security nightmare.
Like just have a room with equipment and train people. Destroying stuff doesn't require too much expertise.
Thank you! Literally my first thought was "Why don't you buy 5 drills and employ 5 guys with decent drilling skills".
How can they launder public money coff... coff... erm provide jobs through third party contractors
@@matt_milackI'm sure their boys are fine FBI agents. But they don't know jack about drilling!
@@matt_milacksome disc sectors would stay intact, plus more maintenance.
Get a shredder, hire out someone to come repair it once no intact drives are there.
There is the 'Rack's Mobile Data Destruction System,' with which anyone can securely destroy data carriers after just one hour of training. The device is about the size of a bathroom cabinet and gets the job done.
nothing about telegram today yet huh
prolly recorded a few days ago, all of the news is old
@@HatTrexthat makes them olds
nobodys talking about it, very suspicious
@@king_james_official lul
Well it isn't 100% hacking related, more of a political thing. But yeah I'm sure he will get around to it next vid.
Well, at least the governmental incompetence makes a great counterargument to conspiracy theories
It's why they don't tend to rattle me. The problem with governmental conspiracy theories is the assumption that governments are smart enough to do any of this. And if the FBI fails basic physical security, I'm pretty sure they're not controlling the world from behind the scenes. Almost kind of reassuring, that.
Aye, spying doesnt require having good security yourself yk
Ah but that's what they want you to think. They want you to think they are so incompetent they can't keep the secret of the moon being square! /j
Hitman players would be like "okay but the public-facing government being utter morons actually makes it _easier_ for a shadow organization like Providence to exist".
Whenever something goes to plan, we don't get to hear about it.
Sad such a powerful tool for trolling is used in the worst possible ways. The prank call potential of something like that is astronomical. Misuse of mischief.
You should listen to Mr dobalina Wonderful World of prank calls
I work at a USG facility and we destroy our hard drives on-site. To spread out the workload, individual equipment managers are responsible for their own inventory. It's easy--I remove the drives, cycle them through a degaussing machine, and then crush them. Every computer I turn in has a sticker on it certifying that the HDD has been removed. I don't even deal with classified data drives--we do this just for CUI/FOUO data on "office drone" computers. Lol my little work center has better data security than the FBI! Perhaps they are too short-staffed to handle this simple chore because they are busy spying on churches and unhappy parents at PTA meetings.
wouldn't want Americans know what treasons they all get up to!
What I take from this is how they make an example of "the little guy" but they just won't touch the companies that destroy the country. I guess one just has to lobby harder
You know millions are going into someone's pocket... Millions annually spent on a
1:17 this is literally that triangle factory meme
Being extremely paranoid is 50% of being successful cybersecurity professional, hacker or unhackable civilian.
Even if you’re paranoid then there’s always someone around that’s not …or something that you don’t know… and there’s no such thing as 50% of unhackable…
It depends... People who are paranoid, aren't always the people who know what they're doing.
If someone buys backdoor-ed security tools, then he's worse off.
Why is the guy hacking the Hawaii database to make it appear he's dead story blowing up now? I swear I heard this months ago but everyone is talking about it now.
fr
All those “Face Book Investigators” must he working hard.
Imagine he fakes his own death again because of the debt lol
The amount Child support money mandated often isn’t fair though..
FBI failing at ***insert activity here*** .....
Quelle Surprise!
Peaceful Skies
how double child support payments in 12 easy steps.
Man i wish I'd been in that facility to grab as many drives as I could
1. Who doesn't want sensitive data from the feds?
2. I need storage, man
Excellent videos keep up the great work. Thanks for the information 👍.
Idea for *low-risk* data storage devices, such as disks from public computers in the lobby or machines for other non-confidential tasks: Instead of having it shredded and become e-waste, wipe it clean to OCD level of degrees, write an OS or whatever on it, then reuse the computers decommissioned from those law enforcement agencies. Supply that to schools, churches and other institutions that need a new computer but can't afford to get it new. Of course data storage devices that had the case files and so on and is unsafe for the public should be destroyed as usual.
Alright, who's going to suddenly start feeling suicidal this time?
I can see a class action lawsuit coming. They should be DOD standard erased by IT before disposal anyway!
Yet they know what time you take a dump in the morning.....
No, there should be dedicated facilities for data destruction, not a shared warehouse.
There is Companies Dedicated to doing Data Destruction. I am former Shred It driver and any of those one things would of caused a 30 day shut down of the plant and a deep investigation. Someone would be terminated. Look up Shred It and how they do there destruction. When I picked up hard drives I scanned them in threw the Drives Serial number and placed them in a locked tote and on my truck at the end of the day I handed them off to a warehouse employee who destroyed them with in 24 hours. The drives never left there locked tote untill they where fed into the machine. what there doing is all wrong and that department head should be fired.
UK police dealing with real criminals instead of naughty Facebook posts? Least believable story here.
Spreading HT & missinformations are not criminal? Wow
@@FitraRahim imagine being so utterly cucked as to worry about offending invaders.
May your woes be many.
The UK would rather arrest people for being mean online than to arrest grooming gang operators and those who are a genuine threat to the public
One of those groups would actually fight back, the other one is arrested for saying mean words.
@@Унмеито problem is uk law and uk courts, these gangs tarnish our reputation because people associate these few with our entire religion, we can deal with them very easily, very very easily, but the law still sees pdf files as human, and gives them zero prison. if we fix the problem, we go prison. suggestion?
I contrast this data destruction security with what I observed on a US military base in the 1980s: Paper classified documents were taken to a dedicated small building on the base, and fed via conveyor belt into an industrial shredder so loud you needed ear protection. If you tried to lay the documents on too thick, the conveyor belt would stop for about 20 seconds. The result was a fluffy paper & ink dust which was bagged. I don't know what became of the bagged dust.
I feel bad for Jesse Kipf. Child support prices are never fair and are overpriced up to 3x minimum. If he did all that to avoid it, god knows how much dads have suffered similar stuff.
They have a long history of "destroying" firearms in the same way. That's a deep rabbit hole you should jump into as well, lots of looking the other way and nothing being done about it
I drilled a hole in a failed server nvme before I gave it back to the tech under warranty, they weren't happy but I insisted. My manager said I shouldn't do it again, he was clueless. Dell were cool with it but surprised.
outsourcing is the devil... outsearching even worse
hope u guys had fun chasing ur tail🤣
I dunno what's the problem with low-level formatting, it cleans data pretty well too
DoD != FBI
Lol I wonder how he'll explain the logo tattoo in court
That bloke with the phone is not very bright.
Now imagine how the IT Recycling is handled at the Ramstein Airbase in Europe - I have seen so many drilled through RAM modules, getting logged into some intranet after booting up doesnt even feel special next to that 'confidential' asset tag
1:23 I guess we're doing empty computers now.
I thought they had Assange for that... Inverse outsourcing?
The most effective way to destroy the data is to encrypt the drive and throw out the key when it's not needed anymore. I wonder why such agencies don't do that and trust some shady third party to handle their data in plain form.
I'd imagine it's either because any encryption that might be used already has known backdoors, or because of preparation for quantum computing being able to crack encryption standards used currently. I remember there was that one guy who had a drive with a bunch of bitcoin he forgot the password for and a company was able to bypass the encryption after some work, so imagine the options for our defense agencies where losing trillions over years means nothing to them.
@@Crazyboutpeace I doubt there are known backdoors in every encryption method out there. It's probably more-so worries about quantum computing, how easy it is to bypass if you don't do it correctly, and how easy it is to copy cryptographic keys. It's just safer to physically break the drive - if they were actually doing it.
@@Crazyboutpeace I see your point but I would disagree.
1. Symmetric encryption schemes like AES or ChaCha20 are not affected by quantum computers, that applies to something entirely different
2. I don't think they're backdoors in every encryption scheme on earth. Disk encryption software like Luks or Veracrypt support a lot of different encryption algorithms so even if you don't trust AES, you could use Serpent or ChaCha20
3. The bitcoin case was probably just brute-forcing the password. Breaking the disk encryption would make every computer using it would be compromised so all computers with encrypted drives would need to be migrated. If you're using strong key, it wouldn't be bruteforcable.
The most effective way to destroy the data would be to destroy the drive itself.
You only encrypt then reformat if you want to have it usable afterwards.
i still cannot understand why just plopping down either all 0 or all 1 isn't enought
Big leak soon, yippie!
Bravo America
It amazes me that those hard drives wouldn’t all be encrypted by default. Why is the FBI still using unencrypted drives?
Sounds like an incredible way to "accidentally misplace" evidence.
Is this how the infamous Kaspersky ordeal went down? A contractor just strolled in one day, yoinked a drive that had malware on it, and the NSA bitched and moaned?
But nobody lost their job.
A bunch of DEI hires with CS degrees from puerto rico no doubt
2:40 BRUH
And these guys are supposed be the best of the best...
This FBI fail reminds me of the Caldwell Parish, Louisiana sheriff's department and their less-than-ideal security practices. From 2016 when the current sheriff took over, to November 2021, over half a million dollars was embezzled from the SO's fines and fees account. Investigation revealed the sheriff allowed deputies to cash their personal checks out of the fines&fees drawer (which no cameras were watching), only one employee was responsible for handling all of the dept's finances and nobody (not even the sheriff) ever checked behind or audited her, and financial record-keeping was atrocious at best. They often did not issue receipts when someone paid a fine or civil fee with cash, and pocketed the cash instead of putting it in the department's fines&fees bank account. They also didn't report those cash payments to the prosecutor's office (so the prosecutor would drop the court date and mark the case as closed), resulting in people being arrested for Failure To Appear. On top of all that, the Louisiana Legislative Auditor's office somehow missed all of those discrepancies in their yearly audits from 16 to 21. I also have a police scanner recording of a deputy (who's now a detective/investigator...) admitting over the police radio that he doesn't log fuel purchases charged to the department's credit card. Apparently they're still untrustworthy because they're now barred from accepting cash payments for fines or civil fees.
Those hard drives are surely encrypted, right? ...Right?
This is so embarrassing bro come on lmaoooo
So, no addressing unworking camera, and not closing the door. But the cage is bolted to the floor. 😂😂😂 So all you need is a wrench? 🤣🤣🤣 Oh man.
One would hope all those drives are encrypted, but who knows.
How do you screw up so badly
lack of accountability and minimum bid probably a double-positive for fbi
I feel sorry for the Child Support guy. Although it became worse when he tried to sell his hacks
Meanwhile A HDD shredder the same size as a decent photocopier is 6k….
The company taking and storing the HDD’s, deserves massive fines. They have an obligation to do their job, ESPECIALLY if it’s sensitive data. Why are they effectively storing them not shredding them….
It seems like they could just melt those drives down. Not like they care about environmental stuff
Time to fire the FBI!
Let me guess they outsourced it to a private company
The jail time for taking one of those hdd would be interesting
to this day the easiest program for us to hack is human stoopidity
At least it had an audit planned
So that is where the Weiner and Hunter laptops went to. Too bad no one knew how lax the security was. We could have had ourselves some TRUTH.
As an aside, I guarantee someone there had a profitable side hustle selling parts (and drives) on eBay. I expect they formatted the drives, if only to hide that it is stolen govt property.
Can someone please explain to me how you get a positive fingerprint match from a photo?!
And I thought the courts in the US were ridiculous
I guess we're destroying PCs now
Presumably SSD destruction can be done with noise wipes in software? The idea of sending everything sensitive to the same place seems poorly thought out.
how'd the last guy even manage to sell his scheme on the dark web when there's literally a defcon talk on this very site with a slideshow telling you how that exact security snafu works :P
Why is it always some guy from the UK commenting on US policies and organizations?
Hello world...
your delivery really made me chuckle lol 0:30
faking your own death my man was leaving the dream. i bet the 195,758.65 is how much he made while selling his services i bet he was found out b.c he was still seeing his children. mother then told the judge he seen him.
I mean... I'd hope those drives are already fully encrypted so it doesn't matter.
This timeline is wild
Do you think the Russian phone instructional video was an affiliate marketer??
No way the FBI some how misplaced my laptop it seems 😂😂😂
He’s been better off registering his ex as dead so he didn’t have to pay and then could still use his identity 😂
Wow 🤦♂️
Lmao the dude that faked his death to avoid child support is😂😂
Computer arrives without HDD.
Employ: "Guess we are making circles now"
The video of the guy selling number spoofing phones is just painful to watch. XD
Wauw i wanted to buy the Russian Coms phone about a year ago , happy i didn’t
Purposful
honestly, maybe the hard drives should get tracking labels when they are put in use
Couldn't that guy just argue that, if she didn't spend 116k on the child, he shouldn't have to pay it all. Annnd probably spare himself jail for faking his death....or at least trying to lol
Why would they delete anything ever?
we wonder why cp is so freely available.......
LAW HAS BEEN LOST, FREEDOM IS A PAST TIME..........
FREEDOM IS A MYTH
Not an accident. Not a slip up. Deliberate.
Crazy!!! 😂
Jesse be looking like he a little methed up.
the russian coms thing took so long to bust due to it seeming too unreal based on no real opsec which is rare.
Man I have an olds hood tape eraser that will wipe out drives instantly 😂
Why no news on Telegram's creator arrest in France?
Guess that's how Russians have been getting their intel
"It's amazing they lasted this long." It's not. The government doesn't care if people get defrauded.
In most cases It's actually kind of bonus for them.
The british police taunting people on the telegram is so fucking funny because it just gives everyone on it advanced warning to cover their tracks. Just the stupidest possible thing the police could choose to do.