Example: A legal investigator reading filenames can often reconstruct chain-of-custody by combining case IDs, operator initials, and timestamps. Mara tracked Javier to a bus route that morning. She confronted him beneath the same mural. He admitted to filming a whistleblower meeting on April 22, 2022, intending to hand the footage to a reporter. The envelope held not cash but a USB drive; the drive’s label matched the file name.
Mara sensed a transaction: an exchange timed precisely, an object recorded and encoded into a filename to mask identity. roe059javhdtoday04222022021722 min
Javier’s fear: releasing the footage could expose a corporation’s falsified emissions data. His caution explained the obfuscated filename—just descriptive enough for allies, opaque to outsiders. Example: A legal investigator reading filenames can often