

I have no proof, this is anecdotal, but I suspect they used a forensic analysis tool like Cellebrite, GreyKey, or Magnet Axiom to extract all the device data and search it, which makes it a cakewalk to filter for keywords, images, files, and the like. cops use this shit all the time, as do their terrorist friends all around the world.
this is modern poetry tbh, stealing this for my local groups