Security Basics mailing list archives

RE: Interesting One


From: Tom Matthews <c-Tom.Matthews () wcom com>
Date: Wed, 30 Oct 2002 08:46:03 -0500

I have heard a rumor that they and the FBI use an electron microscope for
this, seems like this would take a huge amount of time though.
Tom

-----Original Message-----
From: Dozal, Tim [mailto:tdozal () cisco com]
Sent: Tuesday, October 29, 2002 1:44 PM
To: Dave Adams
Cc: security-basics () security-focus com
Subject: RE: Interesting One


The NSA are the masters of these techniques, and what your hearing can
absolutely be done by the right tools and the right people.  There are
however ways to prevent the data from being recovered.  Some tools can
be used to sequentially set every sector on the HD to a binary 1 there
by erasing any of the patterns that these groups tools use to
re-construct previous data.  Aside from a sector by sector wipe of the
drive I don't think there is much you can do to stop somebody from
accessing even files you think were erased.

Basically in a nut shell when you erase a file from your drive all you
do is erase the pointer to the location where the file was kept, you
don't actually erase the files until new data is added to the drive and
the space allocated over writes the space where the previous file was.
So you could go onto your machine and delete every file on the system
but their not gone, the OS just can no longer see or reference their
locations.  The most basic of tools that these groups have will
sequentially walk through a drive and re-create the pointers to the
files, making them accessible again.

I'm sure a google search can come up with more information or actual
articles with names of the various tools available.  Hope that helps.

-Tim

-----Original Message-----
From: Dave Adams [mailto:dadams () johncrowley co uk] 
Sent: Monday, October 28, 2002 2:06 PM
To: security-basics () security-focus com
Subject: Interesting One


Greetings Folks,

I had an interesting conversation today with someone from FAST
(Federation Against Software Theft) They pretend not to be a snitch wing
of the BSA. Anyway, to get to the point, the guy that came to see me
said that their forensics guys could read data off a hard drive that had
been written over up to thirty times. I find this very hard to believe
and told him I thought he was mistaken but the guy was adamant that it
could be done. My question is, does anyone have any views on this, or,
can anyone point me to a source of information where I can get the facts
on exactly how much data can be retrieved off a hard drive and under
what conditions etc etc.

Thanks

Dave Adams
 
 
 
This message (and any associated files) is intended only for the 
use of the individual or entity to which it is addressed and may 
contain information that is confidential, subject to copyright or
constitutes a trade secret. If you are not the intended recipient 
you are hereby notified that any dissemination, copying or 
distribution of this message, or files associated with this message, 
is strictly prohibited. If you have received this message in error, 
please notify us immediately by replying to the message and deleting 
it from your computer. Messages sent to and from 
John Crowley (Maidstone) Ltd may be monitored. 

Internet communications cannot be guaranteed to be secure or error-free 
as information could be intercepted, corrupted, lost, destroyed, arrive 
late or incomplete, or contain viruses. Therefore, we do not accept 
responsibility for any errors or omissions that are present in this 
message, or any attachment, that have arisen as a result of e-mail 
transmission. If verification is required, please request a hard-copy 
version. Any views or opinions presented are solely those of the author 
and do not necessarily represent those of John Crowley (Maidstone) Ltd.

Current thread: