>>106257394
Is it possible to create a hard copy?
If yes:
> Build or access a TEMPEST secure location
> Assign operators you trust to protect the perimeter, size of which depends on the level of protection you need. Generally, 100M is secure, on that 100 m radius, there should be nil ENY presence. Nil means fire on everything that moves, and remove their bodies away from your perimeter
> Buy a rpi or other disposable computer (if you have a TEMPEST capable
> copy the data over to it
> on tge original computer/s remove all hdds/nvme and physically destroy them (4-5 holes in the drive is enough, if you risk prosecution, try to melt the drives in an induction furnace or make aqua regia, open and dissolve the drives over... a week would be enough)
> Air gap tge rpi, connect it to your data source
> Print the data in 3 copies
> Verify data integrity
> Burn the pi (as above)
> Mix the sheets of the three copies
> Put them in an envelope,
> Print 4 pages of double sided full black each
> Pad the envelope with it
> seal and sign across the seal
> Vacuum pack the envelope
> Give it to two trusted operatives in your team (separately), who works for different agencies you are working for
> Tell them to guard {secret} with their lives.
> The third envelope you hide yourself
If the data can't be printed but can be put on CD/DVD (Write once, Read many),
> buy an M-disk writer and M-disks
> Procedure as above, replace printer with disk writer, paper with disk
> As a precaution, tar + encrypt the file (using veracrypt on the pi), and if you split it to three, write every %3=0 byte to disk 1, %3=1 byte to disk 2 ... (optional step, ensures hostile agency needs to find all three disks)
> As an alternative, keep the payload in one piece, and split only the encryption keys.
Your absolute best bet however is to stop at physically shredding the data that fucks you, unless you expect to gain a strategic/operational advantage by using the data (AND not using it immediately)