2/20/2026 at 2:19:26 PM
> The couple also allegedly photographed hundreds of computer screens containing confidential information from Google and Company 2, in what appeared to be an attempt at circumventing digital monitoring tools.I guess all the MDM and document restrictions in the world can't help you against photos of screens. Is it even possible to protect against this, short of only allowing access to confidential files in secure no-cell-phone zones?
by parliament32
2/20/2026 at 2:53:52 PM
There's not much you can do about it, as sibling comment mentions it's a known gap. There is some work [0] in this space on the investigative side to trace the leak's source, but again the only way it would work is if you can obtain a leaked copy post hoc (leaked to press, discovered through some other means, etc.).0: https://www.echomark.com/post/goodbye-to-analog-how-to-use-a...
by jihadjihad
2/20/2026 at 3:08:27 PM
> There's not much you can do about it, as sibling comment mentions it's a known gap. There is some work [0] in this space on the investigative side to trace the leak's source, but again the only way it would work is if you can obtain a leaked copy post hoc (leaked to press, discovered through some other means, etc.).Those kinds of watermarks seem like they'd fail to a sophisticated actor. For instance, if that echomark-type of watermark becomes widespread. I supposed groups like the New York Times would update their procedures to not publish leaked documents verbatim or develop technology to scramble the watermark (e.g. reposition things subtly (again) and fix kerning issues).
With generative AI, the value of a photograph or document as proof is probably going to go down, so it probably won't be that big of an issue.
by palmotea
2/20/2026 at 9:43:30 PM
> I supposed groups like the New York Times would update their procedures to not publish leaked documents verbatim or develop technology to scramble the watermarkLike knuckleheads, The Intercept provided the Pentagon a copy of a scanned document they received from a whistleblower, which directly led to Reality Winner's identity being discovered.
by overfeed
2/20/2026 at 3:12:19 PM
You could do really sneaky things like alter the space between words or other formatting tricks.by gosub100
2/20/2026 at 3:28:07 PM
Print it out, scan it back in, and OCR that.Then have an AI or intern paraphrase it.
by ceejayoz
2/20/2026 at 4:25:48 PM
I think that's exactly what will happen.When a competent journalist gets a leaked document, they'll learn to only summarize it, but won't quote it verbatim or duplicate it. That'll circumvent and kind of passive leak-detection system that could reveal their source.
Then the only thing that would reveal the source is if the authority starts telling suspected leakers entirely different things, to see what gets out.
by palmotea
2/20/2026 at 4:42:55 PM
> Then the only thing that would reveal the source is if the authority starts telling suspected leakers entirely different things, to see what gets out.This is called a canary trap [0], a well-trodden technique in the real world and fiction alike.
by jihadjihad
2/20/2026 at 4:40:14 PM
Then you fix that loophole by subtlety altering the phrasing or formatting that you send everyoneby kube-system
2/20/2026 at 4:54:27 PM
That's why I said you paraphrase, rather than using the exact phrasing and formatting of the original doc.by ceejayoz
2/20/2026 at 4:59:39 PM
Include slightly different details in each version. Then if the paraphrase mentions one of them, you've identified the source.by SoftTalker
2/20/2026 at 5:46:29 PM
Yes, I'm aware of that approach.It's likely tougher than it seems; the big important bits that the news will care about have to match up when checked, and anyone with high-level access to this stuff likely has a significantly sized staff who also has access to it. Paraphrasing reduces the chance of some minute detail tweak being included in the reporting at all.
You also have to actively expect and plan to do it in advance, which takes a lot of labor, time, and chances of people comparing notes and saying "what the fuck, we're being tested". You can't canary trap after the leak.
by ceejayoz
2/20/2026 at 3:49:46 PM
Keep in mind that many secure no-cell-phone zones, even those that host classified data are still relatively physically open. The personnel allowed inside them are strictly vetted and trained to be self-policing, but it's only the threat of discovery and harsh punishment stopping someone with the right badge/code from physically bringing in a phone. There generally aren't TSA-style checkpoints or patdowns. Happens accidentally all the time, especially in the winter with jackets.by scottLobster
2/20/2026 at 4:23:13 PM
This is misunderstanding the purpose of the restriction.The main reason not to bring a phone into the room is that the phone could be compromised. If the person is compromised then a device isn't your problem, because they could view the documents and copy them on paper or just remember the contents to write down later.
by AnthonyMouse
2/20/2026 at 4:52:43 PM
In a corporate environment no-camera/no-phone policies are sometimes also used for DLP reasons, out of expediency. Oftentimes it is more profitable to hire less trustworthy people (read: cheap labor) and simply make it inconvenient to steal data. This usually works good enough when you're trying to protect widget designs and not human lives.by kube-system
2/20/2026 at 4:17:54 PM
Can't you have one or more x-ray tunnels or other scanners? They don't even need to be actively monitored, just treated like CCTV.by pphysch
2/20/2026 at 7:15:40 PM
Receving a full body x-ray every day just for a week would exceed the yearly federal occupational dose for radiation workers. You would add an additional 26% lifetime chance of getting cancer doing this for a year.The yearly limit for rad workers is 5000 mrem with most receiving none. Receiving any dose is usually a cause for concern at most facilities that handle radioactive materials. A full body x-ray would dose you with about 1000 mrem. For about every 10000 mrem you receive, you gain an additional 1% chance of lifetime cancer risk. There's a reason why you wear a lead apron when getting X-rays at the doctor's office and why the technician leaves the room.
Metal detectors would be a much more reasonable method. People that work at airports, courts, jails, some schools, and even some manufacturing facilities walk through metal detectors daily.
by wildzzz
2/20/2026 at 9:43:08 PM
Great points. Do metal detectors provide imaging capabilities? Would want to confidently move beyond belt buckle false positives...by pphysch
2/20/2026 at 2:33:31 PM
No you can’t. It’s formally called “the analog hole” when security folks yap about it. Usually it’s used to end DLP discussions after too many what-ifsby matthewaveryusa
2/20/2026 at 2:50:04 PM
Unless your employer is Google and all those photos are uploaded to its serversby breppp
2/20/2026 at 5:21:31 PM
Does Google force all their employees to use and Android phone provided by them?You could use an Apple or an alternative to Android like Fairphone or even load GrapheneOS on that Google Pixel phone. Even better would be a Linux phone that uses an Android VM so it looks like a bare metal installation.
Could go old school and just get a digital only camera that is not even part of a smartphone. An hidden camera in a pen or shirt button would work too.
Has anyone hacked the Meta glasses so they don't communicate with Meta and allow for communication to your own designated servers?
by yndoendo
2/20/2026 at 4:30:27 PM
What if you use a film camera?by 1024core
2/20/2026 at 2:52:56 PM
Especially when you consider that a phone can record hd video, so you can make a player that scrolls through pages and pages of pdfs very fast for example, you record the screen in hd video on a phone and then write a decoder that takes video back to a pdf of the images. Literally the only thing you lose is the ability to cut and paste the text of the pdf and you can even get that back if you trouble yourself to put the images through ocr.Similarly you could hypothetically exfil binary data by visually encoding it (think like a qr code) and video recording it in the same way.
by seanhunter
2/20/2026 at 4:03:18 PM
Even better, there are a bunch of these:https://github.com/CiscoCXSecurity/QRCode-Video-Data-Exfiltr...
by lokar
2/20/2026 at 2:50:55 PM
Just remember that it's significantly more time consuming to photograph a screen than steal large group of files. Thus, even though it's not preventable, it adds enough friction to be effective.by gwbas1c
2/20/2026 at 2:57:50 PM
As sibling comment mentions, with OCR and video tooling these days I'd imagine you could whip up something pretty easily that can comb through several minutes of video footage and convert it to text/PDF/etc.A leaker with a smartphone on a tripod capturing video while they scroll through files etc. could probably deal significant damage without much effort.
by jihadjihad
2/20/2026 at 4:47:45 PM
Yeah, this is why any high security information facility has physical security controls. Give someone infinite time and physical access and they could copy it off with clay tablets and chisels.by kube-system
2/20/2026 at 3:58:55 PM
> Is it even possible to protect against this, short of only allowing access to confidential files in secure no-cell-phone zones?Isn't that how congressmen and senators view them in the US? At least, that's how I've understood it to be. If so, what's good for the goose...
by stronglikedan
2/20/2026 at 4:06:51 PM
"Google said it had detected the alleged theft through routine security monitoring", so it seems it is possible.by BurningFrog
2/20/2026 at 4:12:05 PM
Note the "also" in the first sentence. I'm understanding the timeline as them trying normal exfiltration, getting caught by DLP, then moving on to the cell phone method. But the first catch was enough to trigger an investigation.by parliament32
2/20/2026 at 3:08:38 PM
[flagged]by PKop
2/20/2026 at 3:13:53 PM
So, non-immigrants can't take pics of screens? I think you answered the wrong question (on purpose).by Ylpertnodi
2/20/2026 at 3:24:25 PM
[flagged]by PKop
2/20/2026 at 4:17:14 PM
> the loyalty an American will have for this or that foreign adversary will trend to 0Yeah. National loyalty is not the only motivating force why someone would leak something. The common reasons why someone becomes an insider treat is MICE: Money, Ideology, Compromise, and Ego. It is not specific to immigrants.
by krisoft
2/20/2026 at 3:34:49 PM
It doesn't have to be loyalty even, it could just be authoritarian leverage.by franktankbank
2/20/2026 at 3:48:06 PM
I would argue the word loyalty can encompass external pressures like that or internal affinity, ethnic tribalism and everything in between but yes, agreed.by PKop