Forensic Computer Targets Digital Crime 212
coondoggie writes "A European consortium has come up with a high-speed digital forensic computer dedicated to the task of quickly offloading and analyzing computer records. The TreCorder is a rugged forensic PC able to copy or clone up to three hard disks simultaneously, at a speed of up to 2 Gb/min., far faster than alternative equipment. The PC not only provides a complete mirror image of the hard disk and system memory — including deleted and reformatted data — but also eliminates any possibility of falsification in the process, meaning that the evidence it collects will stand up in court."
how good is it? (Score:2, Interesting)
Re: (Score:2)
The FBI publishes this information?
Re: (Score:2, Insightful)
Re: (Score:2, Informative)
Re:how good is it? (Score:5, Funny)
Re:how good is it? (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
I just find it odd that some storage device company hasn't integrated an electron microscope to create infinite storage plate yet
Honestly though, if you have so sensitive info just don't put it on your HDD. You can keep it on external Flash storage, which is easily removed, disposed of, or destroyed.
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
But the magnetic landscabe is noisy and there is a smalles stable magnetic intensity. After one overwrite it is very likely that the residual magnetisation from the eralier data vanishes in the noise and is too small to be stable, at least fo current disks. Remember that the HDD manufacturers have benn storing very close to the material limits for some time now.
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
I'm more comfortable using this though: http://en.wikipedia.org/wiki/Gutmann_method [wikipedia.org]
Re: (Score:3, Informative)
Really, try to find an official source, you won't.
Re: (Score:2)
Re: (Score:2)
Seems like Gutmann himself says his method is only relevant for old encoding technologies like RLL and MFM... and he also says
Re: (Score:2, Insightful)
That said, the DoD standard for "wiping" a drive is also excessive in what it requires to declare the media clean. (All 0s, then all 1s, then 010101..., then all 0s again...blah blah blah)
My somewhat expert opinion is that a program that writes the drive to all 0s or all 1s is all you need.
-R
An unreliable source might have said.. (Score:3)
I guess the theory was that if you do this a few times with random sources, the magnetic characteristics (shadows) have not all been changed by the same amount, so you can't apply a logarithmic algorithm to figure out the possible states that the disk could have been in and see if they make any sense.
Re: (Score:2)
The good old 00, FF, AA, 55, 5A, A5, 00. This is what memory tests used to do in the days where the memory tech implied possible interference between adjacent bits. I am not sure if this is of any particular relevance to modern hard disk tech though...
Re: (Score:2)
-R
Re: (Score:2)
I don't believe there's any conclusive evidence that data can be recovered from a drive that has been written entirely to 0s or 1s once. In other words, the DoD/NSA standard is over-kill.
I'm less (but still pretty) certain that repeated Windows formats will not make data any less accessible. The only way to make sure data can't be recovered from unallocated space or carved out of file slack is to overwrite tho
Re: (Score:3, Insightful)
Re:how good is it? (Score:5, Interesting)
I don't know how accurate that is, but I know a few others in the LUG started looking into it and nobody posted any links they felt were valid to back up the surviving data myth.
Re: (Score:2)
Because of the method data is written there will be always some speculation about whether it's possible or not to retrieve overwritten bits. Since HDD manufacturers keep finding magical ways
Reformat != Overwrite (Score:3, Insightful)
I'm thinking zero overwrites. From the article it appears that the system is a portable solution that only plugs into hard drives, and not a reader of the platters themselves. Software alone can analyze deleted files and a reformated file table, but it cannot use the orignal drive to read information that was overwritten.
Last you checked you were wrong (Score:3, Informative)
As for the feasibility of that, well, there isn't. Sorry. Even if you have a setup to do that, the chances of getting anything useful are extremely lo
Re: (Score:2)
Aside from anything, Windows and Linux both have memory protection which prevents programs reading any memory except their own, which is cleared before it is given to them. Sure, on Windows if they happened to catch the PC booted up and logged in as an administrator they could install a driver to copy the contents of the PCs RAM, but then they would have tampered with the evidence and it would be worthless anyway.
I wonder
Re: (Score:2)
Sure, on Windows if they happened to catch the PC booted up and logged in as an administrator they could install a driver to copy the contents of the PCs RAM, but then they would have tampered with the evidence and it would be worthless anyway.
Reality check for you (Score:3, Informative)
Re: (Score:2)
Re: (Score:3, Insightful)
Not to say you are wrong; I think you are overall right, in fact. But in an ideal world, a competent attorney can't have more than justice gives him (after all, if you can hope for a "competent defense attorney" you should expe
Re: (Score:3)
As the OP pointed out, some intelligence agency might do it to find Osama bin Laden, but I really doubt the FBI is going to try this on some
Re: (Score:2, Interesting)
Sure, a scanning tunneling EM might be able to read the sides of sectors and get an idea of the charge state of the material, but you have to do it bit by bit
Yeah, if I can remember correctly from a forensic computing presentation we gave to a bunch of high school kids (I obviously didn't give the physical media recovery part), the way it theoretically works is that when the charge of a magnetic domains on a hard disk platter is changed, it's not changed uniformly throughout the entire domain. If you were able to identify a domain that was consistently left unchanged by the drive head (in our example, we used the outermost portion of the domain - say the dr
Re: (Score:2)
There are data recovery firms that routinely suck data off of mangled hard drives. Recovering overwritten data would not be much more work.
According to a poster several posts up, no data recovery company advertises overwritten data recovery.
A mangled drive can still be analysed, as long as its magnetic properties are still present. Overwritten data, however, is way too much trouble: it has to be done bit by bit, and there's quite a lot of work involved for each bit. And current drives measure in hundreds of gigabytes.
And, if you didn't know, even if the process was fully automated up to the level it only took 1 second to analyse each bit,
Re: (Score:3, Interesting)
Read this, including the epilogue:
Secure Deletion of Data from Magnetic and Solid-State Memory [auckland.ac.nz]
Re: (Score:2, Insightful)
Re: (Score:2)
Recovering overwritten information isn't the big deal in forensics, anyway. Organizing, managing and documenting the mountain of evidence is. If you're dealing with well written malware, worry that it's not on the disk at all and is strictly RAM-resident.
Drive density (Score:4, Interesting)
The two best arguments I've seen among the speculation are
AGAINST: if it were possible to read under 12 layers of overwriting, wouldn't the drive manufacturers boost density by writing the same spot 12 times?
FOR: a read head in a lab doesn't have to be light, may not need to be fast, and definitely doesn't have to cost less than a good dinner. In other words, it's not subject to the limitations of the drive's read head.
Re: (Score:3, Insightful)
what makes you think they would want to do that? it'd be dog slow, and it'd also be error prone. none of which helps to sell drives.
Re: (Score:2)
Re: (Score:2)
Re:how good is it? (Score:5, Interesting)
You'd be surprised, however, how resistant drives can be do physical damage.
For those who know anything about hard drives (referring to regular platter drives, not solid state), you'd know that inside the rectangular case (made out of crappy soft aluminum) lie several plates connected to each other through a spinner in the middle, and they are made out of pretty strong steel.
When I took my data security course, we practiced destroying data physically. So I opened the hard drive, removed the platters and disconnected them. Then came the fun part, trying to destroy them.
First I tried several grades of sandpaper. All the lighter ones didn't leave a JACK SQUAT mark, no matter how hard I tried. The most heavy ones left _very_ small marks which were only visible in the direction of the strongest applied force. Sanding a whole drive this way would take days, and I wasn't sure it was strong enough to actually fully remove the magnetic cover. If anything, I damaged the sandpaper more than the drive.
Then I tried a metal file. The results were considerably better, with deep strong marks, but again, they only covered the path of the sharpest edge of the file, not the whole contact surface area. I filed away for 5 minutes straight, and I only managed to produce about 30% area of a single side of a single platter which I could say was destroyed with high probability of not being recoverable.
Finally, I tried a heavy hammer on another platter, having locked the platter in a vise. I wasn't impressed. The hammer, at best, produced bends across the drive. After another 5 minutes of hammering away, the drive was certainly not round anymore, but the total surface area actually destroyed by these bends was fairly minimal. Sure, it may prevent an easy automatic way of recovering data using regular means (spinning it against a magnetic reader the same way drives usually work), but I'd say at least 80% of that platter still had data on it. The manual work requiring to read the data piece by piece may indeed take weeks, but it would probably be possible, and having the mentality of "it'll take them too much work to read it" is akin to having the mentality of "nobody will hack me because I'm not a target of interest and they won't bother". From the point of view of a security specialist, it's wrong in principle.
The moral of the story is that hard drives are a pretty tough nut and not as easily physically destroyed as you may think. To all those rambling away about how unreliable hard drives are and how easy they break down, I'd say that in the vast, vast majority of cases what breaks down is the engine, the magnetic mechanism, or something else that would prevent the drive from being readable by tools built in the drive box, but not the platters with the data itself.
Another common myth is that you can easily and securely permanently wipe the data with a magnet. The forces required to near-instantly and irrecoverably overwrite the magnetic stripe of the disk are ENORMOUS. During regular usage, a relatively weak magnet is used to read and write on the disk, but it only operates on a minuscule area of the disk (trivially, by writing a bit on an 4 (double sided)-platter 500GB drive, the magnetic edge only operates on 1/500,000,000,000th area of the platter. Now use the denominator to figure out the magnetic intensity required to fully overwrite the whole disk at once. It ain't pretty. Industrial-grade degaussers may do the trick, but not your average home magnet (which, of course, doesn't mean the magnet is not good enough to randomly corrupt a small part of the data which will screw your partition table and make your OS refuse the read the drive anyways). But I somehow doubt the folks in the NSA use Windows XP Home Edition to investigate hard drives.
The "true" way to destroy hard drives is to completely melt them in an incinerator, and t
Re: (Score:2, Interesting)
Or perhaps how about holding the platters up to a propane torch? you wouldn't need to melt them, just get them hot enough that they lose their magnetic field.
Modern magnetic media is tough (Score:2, Informative)
Re: (Score:3, Informative)
Harddrives platters are commonly coated with DLC (diamond like coating). The Drano is not going to get through that to the metal. The DLC is also why the parent poster had no luck with sandpaper, as the DLC is likely harder than the grit. (the purpose of the DLC is to protect the platters from accidental contact with the heads - it's tough stuff)
However, your idea could work if the chemical was particular
Re: (Score:3, Informative)
That, my friend, should be enough electromagnetic energy to wipe the entire drive at once.
Re: (Score:3, Interesting)
Re: (Score:2)
Old backup tapes get torched
Hammers are overrated
Arc welders and acetylene torches are where it's at
Re: (Score:2)
Re: (Score:2)
The moral of the story is that hard drives are a pretty tough nut and not as easily physically destroyed as you may think. To all those rambling away about how unreliable hard drives are and how easy they break down, I'd say that in the vast, vast majority of cases what breaks down is the engine, the magnetic mechanism, or something else that would prevent the drive from being readable by tools built in the drive box, but not the platters with the data itself.
What's funny is older drives which have had some bad sectors on them, I opened them up and discovered pitting. Whatever managed to get in the drive managed to eat a away at a few small holes.
Anyhow, rather than using brute force to destroy platters, or heat, why not try electrolysis. Sodium carbonate solution, attach to a strong 12V supply, + to platter - to an electrode, and the ferrite layer erode.
Re: (Score:2)
Re: (Score:3)
I think a disk drive tossed into our hot wood stove the moment an unknown knock came to the door, would be useless to the FBI/KGB/CIA/NSA or anyone else of equal expertise. The stove works well on old papers and credit cards also. Everybody with deep dark secrets needs a good wood stove. As a side benefit, it'll keep the house nice and warm for cheap.
Re: (Score:2)
That will get really annoying the first time you have a false alarm.
Re: (Score:2)
Bull. Shit.
If the data has been overwritten (actually overwritten, not just "deleted" or disk format) there's not a company/organisation/indivitual in the world that can read the data that used to be stored there.
Granted, an on-track overwrite will in most cases leave residual off-track magnetic trace that could be recovered using exotic forensic techniques, but this can be extremely difficult and highly unreliable - especially for newer HDD's using d
Not using todays 500gig+ HDs (Score:2)
micro leaks to look for. Besides you would need a damn $100m machine to do it.
Re: (Score:2)
None.
The drives connect via normal SCSI, SATA or IDE connections. There is no way to read the raw data from the heads. Even if you could, it wouldn't help on any disk made in the past 10 years or so, because modern drives don't use simple on/off transitions to record data. The idea is that with very very old disks, it's possible to see minute fluctuations in the levels of the recorded bits and see what they once were. It's sort-of
Re:how good is it? (Score:4, Informative)
Here's the story: Back in 1996, Peter Gutmann published a paper where he described the theoretical possibility of reading small sections of overwritten data, in a largely unreliable fashion. Having gone back through the source he cites, I came to be of the opinion that his assertion was irresponsible, since he makes a very bold claim without pointing out how many qualifications and 'but's are attached to it:
1) The specific techniques he discusses address older hard drive platter recording technologies that were completely supplanted, throughout the industry, in 1996-1997. Newer hard drives changed recording techniques to cram more data onto the same platter area, which eliminated the specific properties that would have allowed Gutmann's proposed recovery method to work.
2) None of Gutmann's citations ever claimed to have made the recovery methods work in a practical fashion (as in, actually recovering a sector of data, let alone a whole file) on a real hard drive. There were a few lab experiments that were NOT performed on hard drives, and nobody was cited as actually implementing a real-world method.
3) Since the 1996 paper (in '99, I believe), Gutmann published a revised draft that really only changed the section talking about this issue, and he significantly backpedaled his claims. Supposedly, some of his colleagues pointed out that his assertion was scientifically unsupported and extremely inflammatory. Net result: In the newest version of that paper, he basically admits that recovery of overwritten data, on modern hard drives, is snake oil.
There's more, though. Having worked in forensics and specifically dealt with federal law enforcement agencies, I get a chuckle when people (usually, the same tinfoil-hat guys who believe in aliens at Roswell) talk like the FBI has secret recovery technology that the private sector doesn't. This is provable bullshit, for several reasons:
1) The FBI has no real engineering capacity, and they're not as good at stuff like this as you think. In data forensics, especially, their equipment, techniques, and training have never been as good as what the private sector has. The private sector has more money, which means it can buy the newest toys and do real R&D, and it can afford to pay the big-ass salaries that cutting edge engineers require. For comparison, go ask somebody at Hitachi or Segate who does hard drive research how much money they make. Then, ask the FBI how much their highest-paid experts make. It's going to be at least a 2:1 difference, maybe more.
2) Secret methodologies are useless to the FBI, because they would never hold up in court. Data forensics depends on its credibility under the standards of scientific evidence, otherwise it gets tossed out of court and the defense wins. The basic test of scientific evidence is "Does the scientific community have a consensus that this method is correct?" If it's a secret method, there can be no consensus in the community, and it can't be used in court.
3) There's a simple thought experiment that verifies this: If it were possible to read data that has been overwritten even once, doesn't that mean that your hard drive has an actual storage capacity is twice what the manufacturer is actually giving you. How much sense does that make? Those guys jump on every technology possible to cram more data into a smaller space, so even if it's space-alien-magic stuff, they'll have an enormous incentive to make it practical to mass-produce. And they usually do just that. There only a tiny bit more usable capacity on your drive (Let alone 12x worth!) than the manufacturer's label says, and that's replacement sectors for areas that develop problems--we know about that, and it's not useful in data forensics for other reasons.
Re: (Score:2)
Re: (Score:2)
Not so fast... (Score:4, Informative)
Standalone devices like the Logicube [logicube.com] Talon copy twice as fast. They also hash the drives and store audit trails to a CF card.
I can see the potential benefit to creating 3 mirrored drives at once, but it is extremely limited.
-R
Re: (Score:2)
Re: (Score:2)
I love reporters (Score:2)
And, don't forget this gem:"...eliminates any possibility of falsification in the process."
Although, I must be honest... A pre-configured dual-boot XP/Linux forensics box, 4GB RAM, 2TB internal HD, and a 3TB external backup system, seems lik
Re: (Score:2)
They make it seem like a huge problem that EnCase isn't entirely secure against potential attacks from the target machine. Well...the only time I'd use a software acquisition method is when a hardware acquisition is strictly out of the equation (i.e. live & critical servers that cannot under any circumstances be shut down). How likely are the servers for an airline's ticketing system to be booby-trapped?
They're creating problems an
Re: (Score:2)
FireWire hardware can be set up to allow or disallow DMA requests depending on the device on the other end of the wire. Most OSes now only allow it if the device on the other end looks like a hard drive for security reasons. You can lock them down further if you want:
http://matt.ucc.asn.au/apple/ [ucc.asn.au]
http://rentzsch.com/macosx/securingFirewire [rentzsch.com]
Linux also has security features [linux1394.org] in recent versions of its kernel to protect against arbitrary DMA attacks. (Search for firewire-ohci.) Windows does the same th
Re: (Score:3, Interesting)
The key isn't so much the software as it is the hardware. The TreCorder uses hardware write blockers [tableau.com] to provide a rather strong guarantee that the original data will not be corrupted even if the OS and the acquisition software happen to be written by idiots.
Re: (Score:2)
I just love it when people automatically consider a system impenetrable the second you seal it up with so much as a strip of duct tape.
Who does he work for? Diebold?
Security is never absolute.
doubtful (Score:3, Insightful)
Probably a bogus writeup abt being tamper evident (Score:2)
Re:Probably a bogus writeup abt being tamper evide (Score:2)
Re: (Score:2)
Re: (Score:2)
I'm Sure... (Score:2)
But how can it read reformatted data? I was always of the impression that to read more than the most recent data required removing the platters and using special equipment on the naked disc surface. If the original disc heads were reading all these previous layers, they'd never be able to accurately read the current data on the hard drive.
Re: (Score:2)
Usually:
Deleting only updates the FAT. The data is all still there.
Formatting only deletes the FAT. The data is all still there.
What you're referring to with "reading all the previous layers" is quasi-theoretical ways of getting at data that has been completely overwritten.
Unless your deleting/formatting process actually overwrites the data, it is all still there.
-R
Re: (Score:3, Interesting)
Re: (Score:2)
Depends on the kind of format (Score:2)
It's actually not for security, but for reliability. During the full format, if there's a sector that's problematic to writ
This makes the argument for... (Score:2)
Backup Device (Score:2)
Maybe there's a dead-simple Linux app that will do this across a Gb-ethernet. Not just "network tar", but which reloads a new drive that's got only a new install of the OS (eg. Ubuntu) with only the non-OS data, plus OS configs (eg.
Re: (Score:3, Insightful)
Re: (Score:2)
I hear there's a way to get APT to generate a graph of all the installed apps, with dependencies. I wish I could use that graph as a UI to prune and add
Anyone make a self distruct system for a PC? (Score:3, Interesting)
Re: (Score:3, Insightful)
Re: (Score:3, Interesting)
That will show them not to touch your data
Or in your case put that drive on top of the other and light it yourself when they come knocking on your door.
Re: (Score:2)
Re: (Score:2)
Not to mention, if you are doing this to protect yourself from the police, then "wired his pc with a bomb" will not sound good in front of a jury.
Secure drives and erasure (Score:5, Interesting)
As for the people talking about "safe methods for wiping drives", the only place I (personally) know of that has such requirements is DIGO http://www.defence.gov.au/digo/ [defence.gov.au] they use a furnace, works damn well. The moral of the story is, new drives are cheap, why fuck around with "maybe".
Re: (Score:2)
Re: (Score:2)
And if it became publicly known that Seagate did such a thing they would lose their corporate clients how fast?
240 volts to usb/firewire ports (Score:5, Funny)
lets see their nifty device copy shit then.
Soviet Russia (Score:2)
From post-Soviet Russia, digital crime targets you !
Re: (Score:2)
I read the article, and it sounds like its "marketing" - we all know that system memory can't be read the way they claim - by plugging into the hard drives. Sure, you'll pick up what was in swap, but if a person is smart and worried about security, they don't have swap - turn it off, and all memory goes bye-bye.
Re:System memory? Torrentspy could use one (Score:5, Interesting)
That is a standard forensic operation nowadays.
However, some people have already postulated, if not actually implemented, protections against that sort of attack. The idea is that the host can reprogram the PCI bus controller to route all DMA requests from the firewire controller off into some user-specified range of memory. In theory the forensic tool could detect that the PCI controller has been programmed to do that, but it could not do anything about it.
Re: (Score:2)
http://i.i.com.com/cnwk.1d/i/z/200701/bh-dc-07-Ru
Google "Rutkowska DMA" for more discussion (one of my blogs is the third hit).
Re: (Score:2)
But I wonder if it would be possible over a Firewire connection, given that Firewire allows direct memory access [security-assessment.com].
Re: (Score:2)
Of course they are assuming the data coming out of the firewire port can be trusted... If a machine was already compromised it
Re: (Score:2)
I prefer encrypted external storage which uses a non-standard filesystem.
My NAS uses an encrypted reiser FS. The filesystem is non-standard. Users have removed the internal HD and attempted to mount it in a Linux PC, but the PC could not find the partition table.
Even if they can mount the drive, without the encryption key, it will take them quite a while to crack the key to the encrypted volume. This is not a connect and copy drive.
It does not matter! (Score:2)
Discovery of the FW exploit [23.nu] from several years ago.
Recent commentary: [matasano.com]
More alarming reading... (Score:2)
http://searchsecurity.techtarget.com/columnItem/0, [techtarget.com]
Re: (Score:2)
I guess I needed to be more specific than this statememt.
I prefer encrypted external storage which uses a non-standard filesystem.
To be more specific, hardware based encrypted NAS appliance, not a general purpose PC.
Not only is it lacking a firewire port, but has no place to install one.
http://www.simpletech.com/commercial/ [simpletech.com]
Re: (Score:2)