It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Vasteel
Non-American here, but I don't see how anyone who reads ATS could possibly consider voting for Hillary. That's would be like saying "why yes, I am happy with the corrupt TPTB political ruling class and I'd like some more please". OK, Trump isn't perfect but at least he's not a one of those TPTB people.
Are people just voting along party loyalty - "I always vote Democrat, so I always will do no matter what"?
originally posted by: ssenerawa
originally posted by: Vasteel
Non-American here, but I don't see how anyone who reads ATS could possibly consider voting for Hillary. That's would be like saying "why yes, I am happy with the corrupt TPTB political ruling class and I'd like some more please". OK, Trump isn't perfect but at least he's not a one of those TPTB people.
Are people just voting along party loyalty - "I always vote Democrat, so I always will do no matter what"?
Trump is a racist straight white heterosexual male alternative right-wing conspiracy-theorist.
originally posted by: ssenerawa
originally posted by: Vasteel
Non-American here, but I don't see how anyone who reads ATS could possibly consider voting for Hillary. That's would be like saying "why yes, I am happy with the corrupt TPTB political ruling class and I'd like some more please". OK, Trump isn't perfect but at least he's not a one of those TPTB people.
Are people just voting along party loyalty - "I always vote Democrat, so I always will do no matter what"?
Trump is a racist straight white heterosexual male alternative right-wing conspiracy-theorist.
originally posted by: RickinVa
If a Blackberry was destroyed that contain classified data, whether that data was captured by the Blackberry Enertprise server doesn't matter.
If a Blackberry was destroyed using a hammer and that Blackberry held a local copy of classified emails, that would be improper destruction of classified data.
A moot point...just having classified data on a unclassified Blackberry is by itself, negligence in the handling of classified data.
originally posted by: UnBreakable
originally posted by: RickinVa
If a Blackberry was destroyed that contain classified data, whether that data was captured by the Blackberry Enertprise server doesn't matter.
If a Blackberry was destroyed using a hammer and that Blackberry held a local copy of classified emails, that would be improper destruction of classified data.
A moot point...just having classified data on a unclassified Blackberry is by itself, negligence in the handling of classified data.
But....but.....it was only emails about yoga and Chelsea's wedding. So important Hill had to use Bleachbit and destroy Blackberries.
originally posted by: ssenerawa
originally posted by: Vasteel
Non-American here, but I don't see how anyone who reads ATS could possibly consider voting for Hillary. That's would be like saying "why yes, I am happy with the corrupt TPTB political ruling class and I'd like some more please". OK, Trump isn't perfect but at least he's not a one of those TPTB people.
Are people just voting along party loyalty - "I always vote Democrat, so I always will do no matter what"?
Trump is a racist straight white heterosexual male alternative right-wing conspiracy-theorist.
originally posted by: WeAreAWAKE
Why isn't this destruction of government property? I believe that is a crime.
All other mobile devices
This includes cell phones, smart phones, PDAs, tablets, and other devices not covered in the preceding mobile categories.
Clear:
Manually delete all information, then perform a full manufacturer’s reset to reset the mobile device to factory state. Sanitization performed via a remote wipe should be treated as a Clear operation, and it is not possible to verify the sanitization results.
Purge:
See Destroy. Many mobile devices only offer capabilities to Clear (and not Purge) the data contents. A mobile device may offer Purge capabilities, but these capabilities are specific to the hardware and software of the device and should be applied with caution. The device manufacturer should be referred to in order to identify whether the device has a Purge capability that applies media-dependent techniques (such as rewriting or block erasing) or Cryptographic Erase to ensure that data recovery is infeasible, and that the device does not simply remove the file pointers.
Destroy:
Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator.
Notes:
Following the Clear or (if applicable) Purge operation, manually navigate to multiple areas of the device (such as call history, browser history, files, photos, etc.) to verify that no personal information has been retained on the device.
For both Clear and (if applicable) Purge, refer to the manufacturer for proper sanitization procedure.
This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law 107-347. NIST is responsible for developing information security standards and guidelines, including
minimum requirements for Federal information systems, but such standards and guidelines shall not apply
to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems