Prev: printers disappearing
Next: Flash Player
From: HeyBub on 21 Jun 2010 10:51 Ivan I. Deer wrote: > On Thu, 17 Jun 2010 23:24:35 -0400, "shank" <shank(a)tampabay.rr.com> > wrote: > >> Is there a way to delete files and/or select emails without being >> recovered by forensics? >> >> Assuming yes, is there a way to prevent forensics from detecting if >> you performed a delete action? >> >> thanks >> > Reformat the drive, then copy some non-sensitive files onto it, > filling it completely. Then repeat the reformat process and copy the > files again. Do this about 5 times and there should be no remaining > "evidence" on this drive. That won't COMPLETELY work. Formatting doesn't erase the drive of course. And copying junk files leaves some amount of slack bytes at the end of each file's final sector. Super forensics may decode the random remaining bits as: "Your!!!!!!!!!!!!!!! year mission is to!!!!!!!!!!!!!!!!!!!!,!!!!!!!!!!!!!!!!!!!!, land!!!!!!!!!!!!!!! a safe distance!!!!!!!!!!..................., land............... monitor it.!!!!!!!!!!!!!!!..." Which may result in being bitten on the thigh by a Nowhatian Bog Hog. It's tough.
From: Billns on 21 Jun 2010 12:46 On 6/17/2010 8:24 PM, shank wrote: > Is there a way to delete files and/or select emails without being recovered > by forensics? > > Assuming yes, is there a way to prevent forensics from detecting if you > performed a delete action? > > thanks > > If the information is really that sensitive it probably shouldn't have been placed on the computer in the first place. That said, there are erase programs that scrub the entire disk, not just the files, a number of times times that will result in completely unrecoverable data. Complete destruction of the hard disk certainly will work too, but I wouldn't recommend the microwave approach. Of course even if you destroy the hard disk those "select emails" were sent or came from someplace, weren't they? If they are incoming you don't even know who else got the email -- the "bcc" method hides recipients. Bill
From: Antares 531 on 21 Jun 2010 13:07 On Mon, 21 Jun 2010 09:51:32 -0500, "HeyBub" <heybub(a)gmail.com> wrote: > >Ivan I. Deer wrote: >> On Thu, 17 Jun 2010 23:24:35 -0400, "shank" <shank(a)tampabay.rr.com> >> wrote: >> >>> Is there a way to delete files and/or select emails without being >>> recovered by forensics? >>> >>> Assuming yes, is there a way to prevent forensics from detecting if >>> you performed a delete action? >>> >>> thanks >>> >> Reformat the drive, then copy some non-sensitive files onto it, >> filling it completely. Then repeat the reformat process and copy the >> files again. Do this about 5 times and there should be no remaining >> "evidence" on this drive. > >That won't COMPLETELY work. Formatting doesn't erase the drive of course. >And copying junk files leaves some amount of slack bytes at the end of each >file's final sector. Super forensics may decode the random remaining bits >as: > But, repeating the (reformat - copy new files) at least five times, will shift these slack bytes around and will write over them. Granted, the files being copied should not be copied in the same order, but the ordering sequence need be broken only once, near the beginning of the copy process. > >"Your!!!!!!!!!!!!!!! year mission is >to!!!!!!!!!!!!!!!!!!!!,!!!!!!!!!!!!!!!!!!!!, land!!!!!!!!!!!!!!! a safe >distance!!!!!!!!!!..................., land............... monitor >it.!!!!!!!!!!!!!!!..." > >Which may result in being bitten on the thigh by a Nowhatian Bog Hog. > >It's tough. >
From: Paul on 22 Jun 2010 00:40 shank wrote: > Is there a way to delete files and/or select emails without being recovered > by forensics? > > Assuming yes, is there a way to prevent forensics from detecting if you > performed a delete action? > > thanks > You're using the wrong OS, if you're hoping to remain "secret". Try the following. Remove all hard disks from the computer. Boot a Linux LiveCD. It stores intermediate files in RAM. With the proper distro, you can have an email program, fetch the "secret" messages from the email server (which of course, the forensic person can't gain access to). Or, alternately, plug in the USB flash stick that holds your "secret" files, read them with the tools in the Linux Live environment etc. When you're finished, shut down the OS and turn off the power. Now, all intermediate files that were in RAM, are gone. The original OS is stored on a CD, so that doesn't store any new info. On the next BIOS POST, the RAM testing and initialization process, will overwrite any remnant pattern in RAM (I mention that for the "what if the fuzz kick in the door" crowd). If you want to relatively quickly flush RAM, just do a restart and let the BIOS clean the RAM. Even pushing the computer reset button, will trigger BIOS POST within the next 30 seconds. The BIOS may do some amount of writing to RAM, as part of the POST sequence. ******* Also remember, that physical evidence is not needed for a "legal shakedown". Ask the 5000 people receiving letters for torrenting "Hurt Locker" how much evidence the lawyers have. They can still squeeze $1500 out of you, without too much trouble. For those people receiving the legal letter, it's still going to cost them money, whether they go to court or not. ******* If you want the convenience of Windows, with all of its forms of information leakage, it's going to be pretty hard to plug all the leaks with adhoc methods. You'll likely slip up and forget something. That's why I get a bit of a chuckle, when someone mentions their latest CCleaner tactic. There really are too many leakages, to go about it that way. You need a method where you can demonstrate there is no hard disk with "scraps" on it. If there is no hard drive, there is nothing for the forensic guy to do. Your email server has archives of all your emails, which can be held for long periods of time. Even if the official retention time for an archive or backup at the email provider is one year, if the tapes or media haven't been rotated, they might still have copies of your sensitive email years from now. So the forensic guy doesn't have to work too hard, if he has a good lawyer helping him. http://en.wikipedia.org/wiki/Subpoena Paul
From: Alias on 22 Jun 2010 09:36
On 06/18/2010 12:45 PM, Jose wrote: > On Jun 17, 11:24 pm, "shank"<sh...(a)tampabay.rr.com> wrote: >> Is there a way to delete files and/or select emails without being recovered >> by forensics? >> >> Assuming yes, is there a way to prevent forensics from detecting if you >> performed a delete action? >> >> thanks > > You must remember that no matter what tool you choose to use, the > forensic recovery person has that tool too (and better ones). > > If I see some "completely remove" tool like Eraser come along, I am > going to get it too and use Eraser on my system and then I am going to > figure out how to recover at least some information from a system that > has been Erased. I will know what an Erased system looks like and > what to do. > > If I suspect you have used Eraser to delete your files, I am going to > already know how it works, what it does, what it doesn't do, what it > leaves behind and where it leaves it. > > I am always going to try to be one step (or maybe leaps and bounds) > ahead of any free Internet tool. > > If you are worried at all about your stuff, then you need to turn the > tables in such a way that you are a step ahead. You would have to > know what I have available (software and/or humans) and do something > that exceeds the capabilities of my resources and remove your data in > such a way that the resources I have will not be able to recover it or > the methods to recover it have not been invented yet. > > Trouble is, you will never know the resources I have, but I probably > already know the resources you have and what they look like and have > already practiced recovering (at least something) from them many, > many times before you even heard of them. If I run a Mack truck over the hard drive, you won't be able to recover anything. If I take a powerful magnet to it, you'll be SOL too. And if I pour hydrochloric acid on the drive, you're also SOL. There are many other permanent ways to delete everything on a hard drive. -- Alias |