Again, it's a government laptop... It's not your old win98.... If it was locked at the tine it was taken, it's very probable it can't be opened. If secured properly by encryption and usb ports are disabled
at the least it would be TPM based Bitlocker.... if the laptop is locked down (USB ports disabled, no external boot allowed <--- which should be standard) then it is very difficult to break in. at least for "private" entities...
Again, it's a government laptop... It's not your old win98.... If it was locked at the tine it was taken, it's very probable it can't be opened. If secured properly by encryption and usb ports are disabled
Even if it was locked and encrypted you can pull the drive, image it and then proceed to crack the encryption.
If it was not encrypted then they can already see everything on it.
Also not 100% but if they do use a whole disk encryption chances are it's going to be transparent (where you can read file names just not contents)
at the least it would be TPM based Bitlocker.... if the laptop is locked down (USB ports disabled, no external boot allowed <--- which should be standard) then it is very difficult to break in. at least for "private" entities...
Tpm wouldn't be an issue since they have the laptop. Would be pretty easy for them to export it from the chip if they have the tools
Good point and very true.