Skip to main content
Case Study6 min read

When "Hiding" Classified Text Means Changing the Font Color to White

British government document with classified text hidden by changing font color to white instead of proper redaction
Hiding Classified Text by Changing Font Color to White

In the early 2000s, a national government released classified documents related to a major military intervention. The method used to protect sensitive passages: changing the font color to white. The text was not encrypted, not removed from the file, and not redacted in any technical sense. It remained in the document as white characters on a white background — invisible on screen, but fully intact in the underlying data.

Ctrl+A: The Two-Keystroke Intelligence Operation

When the government released documents related to the overseas conflict, certain passages were "redacted" by setting the text color to match the page background. On screen, these sections appeared blank — white space where sensitive content had once been. To a reader scrolling through the PDF, the redactions looked complete.

Then someone pressed Ctrl+A — Select All. Every character on the page was highlighted, including the white text that had been intended as invisible. Pasted into a text editor, the "redacted" content appeared in full: names of intelligence officers, sensitive diplomatic communications, and details of intelligence assessments that the government had determined should remain classified.

The technique required to bypass this measure is a standard keyboard shortcut that ships with every operating system. Select All is not an exploit or a hack. It is one of the first things most computer users learn. The classified information was protected by a method that any basic computer user could defeat.

The Intelligence Dossier: When Metadata Told a Different Story

The white-font incident was not the only PDF failure associated with this government's handling of the conflict. A separate, equally consequential failure involved document metadata — and it undermined the credibility of a key intelligence dossier.

The government published a dossier describing the foreign state's alleged concealment infrastructure. The document was presented to parliament and the public as an authoritative intelligence assessment. The head of government cited it in official statements. A senior foreign official praised it at an international body, calling it a "fine paper."

Then a university lecturer examined the file's properties. The metadata contradicted the government's presentation. The document's revision history and author fields showed that it had been assembled not by intelligence analysts but by political staffers at the prime minister's office. The "Last Modified By" fields contained the names of junior officials in the communications directorate — not members of any intelligence agency.

Further examination revealed that large sections of the dossier had been copied directly from a graduate student's thesis — including, in several places, the student's original typographical errors. A document presented as the product of professional intelligence work was partly reproduced from an academic paper, and the file's own metadata confirmed it.

Two Failures, One Root Cause

The white-font redaction and the dossier metadata exposure are different failures, but they share a common origin: the people handling these documents did not understand what a PDF actually contains. They treated digital documents like printed pages. If text is invisible on a printed page, it is gone. If a printed report credits an intelligence agency on the cover, that is who wrote it. Digital documents do not work this way.

A PDF is a structured data file. It has a visible layer — what you see on screen — and an invisible layer that contains text data, metadata, revision history, author information, software details, timestamps, and internal file paths. Changing the visual appearance (font color, black rectangles, image overlays) affects only the visible layer. The data layer remains untouched. And the data layer is what Ctrl+A selects, what search indexes, what copy-paste extracts, and what metadata tools read.

The government was managing two layers of a document while only accounting for one. The published files looked correct on screen but were fully exposed at the data layer.

What Proper Redaction and Metadata Scrubbing Actually Require

These two failures map directly to two distinct document hygiene operations that should be performed before any sensitive PDF is shared publicly:

True Redaction

Removes the actual text data from the PDF content stream. Not a visual overlay. The character data is destroyed and replaced with an opaque fill. After proper redaction, there is nothing to select, copy, or search because the text no longer exists in the file.

Defeats: white font, black boxes, image overlays, highlight annotations.

Metadata Removal

Strips author names, revision history, software details, timestamps, internal file paths, and all other embedded metadata from the document. After scrubbing, the file's properties contain nothing that reveals who created it, how it was edited, or where it was stored.

Defeats: author attribution, revision tracking, software fingerprinting, origin analysis.

The government needed both operations. The white-font documents needed real redaction. The intelligence dossier needed its metadata stripped. Neither was done. Two different categories of failure, both present in the same document format, both discoverable with tools that ship with every computer sold.

The Tools Exist. The Knowledge Gap Persists.

PDFb2's redaction tool performs true content removal — it strips text from the PDF content stream, not just the visual layer. The metadata tool lets you inspect and remove every hidden field in a PDF: author, creator, timestamps, revision history, and all XMP data. Both operate entirely in your browser. No upload. No server. The sensitive document never leaves your device.

These government PDF failures occurred in 2003. Similar redaction failures have surfaced in federal court filings and in transport security documents, years apart, at organizations with substantial security budgets. The tools to prevent these failures have existed for longer than the failures themselves. What has consistently been missing is institutional awareness that a document's visible surface is not the same thing as its underlying data.

Redact and Scrub PDFs Properly — No Upload Required

PDFb2 permanently removes text from the content stream and strips all hidden metadata — entirely in your browser. Your documents never leave your device.