The Myth of Going Dark: How 'Invisible' and 'Inactive' Devices Still Talk
The book Erik Prince probably wont want you reading.

You can rebrand it. You can reset it. You can even call it "Unplugged."
But a ghost phone by any name is still a ghost phone...and ghost phones leave footprints.

The Myth of Going Dark is the field guide for tracking what everyone else insists has vanished. Seasoned investigator and Intelligence Analyst, Joey Ortega takes you deep into the tradecraft of device attribution after resets, SIM swaps, burner rotations, and cloud obfuscation. If you've ever faced a phone that claims to be new but behaves like the old one, this book explains why.

Inside, you'll learn how to:
- Detect network collisions across towers, Wi-Fi, and BLE ecosystems
- Deconstruct shadow identities formed by sloppy resets and reused tokens
- Extract forensic continuity from IP reuse, MAC echoes, push tokens, and app UUIDs
- Attribute control...even when the user thinks they've compartmentalized
- Legally reconstruct timelines, connect disavowed devices, and expose continuity loops

Whether you're investigating stalkers, insider threats, espionage targets, or so-called "privacy" phones, this book gives you the forensic advantage others miss.

Not just for law enforcement and investigative professionals, it's essential reading for anyone who's ever heard:

"That's not my phone."
Or worse:
"Sorry, that phone's inactive. It won't help us find the suspect."
"The phone that disappeared with them, has no active SIM. We can't use it to locate your daughter."
1147947338
The Myth of Going Dark: How 'Invisible' and 'Inactive' Devices Still Talk
The book Erik Prince probably wont want you reading.

You can rebrand it. You can reset it. You can even call it "Unplugged."
But a ghost phone by any name is still a ghost phone...and ghost phones leave footprints.

The Myth of Going Dark is the field guide for tracking what everyone else insists has vanished. Seasoned investigator and Intelligence Analyst, Joey Ortega takes you deep into the tradecraft of device attribution after resets, SIM swaps, burner rotations, and cloud obfuscation. If you've ever faced a phone that claims to be new but behaves like the old one, this book explains why.

Inside, you'll learn how to:
- Detect network collisions across towers, Wi-Fi, and BLE ecosystems
- Deconstruct shadow identities formed by sloppy resets and reused tokens
- Extract forensic continuity from IP reuse, MAC echoes, push tokens, and app UUIDs
- Attribute control...even when the user thinks they've compartmentalized
- Legally reconstruct timelines, connect disavowed devices, and expose continuity loops

Whether you're investigating stalkers, insider threats, espionage targets, or so-called "privacy" phones, this book gives you the forensic advantage others miss.

Not just for law enforcement and investigative professionals, it's essential reading for anyone who's ever heard:

"That's not my phone."
Or worse:
"Sorry, that phone's inactive. It won't help us find the suspect."
"The phone that disappeared with them, has no active SIM. We can't use it to locate your daughter."
9.99 In Stock
The Myth of Going Dark: How 'Invisible' and 'Inactive' Devices Still Talk

The Myth of Going Dark: How 'Invisible' and 'Inactive' Devices Still Talk

by Joey Ortega
The Myth of Going Dark: How 'Invisible' and 'Inactive' Devices Still Talk

The Myth of Going Dark: How 'Invisible' and 'Inactive' Devices Still Talk

by Joey Ortega

eBook

$9.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

The book Erik Prince probably wont want you reading.

You can rebrand it. You can reset it. You can even call it "Unplugged."
But a ghost phone by any name is still a ghost phone...and ghost phones leave footprints.

The Myth of Going Dark is the field guide for tracking what everyone else insists has vanished. Seasoned investigator and Intelligence Analyst, Joey Ortega takes you deep into the tradecraft of device attribution after resets, SIM swaps, burner rotations, and cloud obfuscation. If you've ever faced a phone that claims to be new but behaves like the old one, this book explains why.

Inside, you'll learn how to:
- Detect network collisions across towers, Wi-Fi, and BLE ecosystems
- Deconstruct shadow identities formed by sloppy resets and reused tokens
- Extract forensic continuity from IP reuse, MAC echoes, push tokens, and app UUIDs
- Attribute control...even when the user thinks they've compartmentalized
- Legally reconstruct timelines, connect disavowed devices, and expose continuity loops

Whether you're investigating stalkers, insider threats, espionage targets, or so-called "privacy" phones, this book gives you the forensic advantage others miss.

Not just for law enforcement and investigative professionals, it's essential reading for anyone who's ever heard:

"That's not my phone."
Or worse:
"Sorry, that phone's inactive. It won't help us find the suspect."
"The phone that disappeared with them, has no active SIM. We can't use it to locate your daughter."

Product Details

BN ID: 2940184699073
Publisher: Joey Ortega
Publication date: 08/01/2025
Sold by: Barnes & Noble
Format: eBook
File size: 2 MB

About the Author

Joey Ortega is a veteran investigator, educator, and intelligence analyst with over 20 years of frontline experience in cybercrime, corporate fraud, and digital threat analysis. His work has expanded to include defense investigations, stalking cases, and cyber-harassment, earning national recognition in PI Magazine and establishing him as a trusted resource for victims and professionals worldwide.

He has trained attorneys, investigators, and security practitioners through hands-on instruction and mentorship. As a respected voice in true crime media, he hosted in-depth interviews with FBI profilers, forensic experts, and international specialists, using the platform to challenge myths and elevate credible investigative work.

Today, Joey leads Joey Ortega Intel, LLC, a globally recognized consultancy serving corporations, VIPs, and investigative teams. Whether dismantling fraud rings, tracking SIM-less devices, or training the next generation of digital investigators, he remains focused on truth, clarity, and operational excellence.
From the B&N Reads Blog

Customer Reviews