Skip to comments.
Computer with e-mail evidence may have been damaged (NJ corruption)
injersey.com ^
| 5-4-2003
| SANDY MCCLURE
Posted on 05/04/2003 4:22:25 PM PDT by Cagey
Edited on 05/07/2004 7:41:15 PM PDT by Jim Robinson.
[history]
TRENTON -- Employees at the state Parole Board and the Attorney General's Office are talking about how state investigators, who are looking into whether the governor's office was involved in the parole of reputed mobster Angelo Prisco, damaged a computer believed to contain evidence in the case, sources have told the Gannett State Bureau.
(Excerpt) Read more at c-n.com ...
TOPICS: Crime/Corruption; Government; News/Current Events; US: New Jersey
KEYWORDS: corrections; corruption; gangs; lacosanostra; mafia; mcgreevey; mob; mobster; newjersey; nj; organizedcrime; statepolice
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-49 next last
To: Glenn
How do you do it properly?
21
posted on
05/04/2003 5:17:18 PM PDT
by
Coleus
(RU-486 Kills Babies)
To: CHICAGOFARMER
So does the FBI.
And when you send it to the FBI you get the bonus plan where you ask them what you want to find on the hard drive and it will magically appear.
22
posted on
05/04/2003 5:17:40 PM PDT
by
lelio
To: Cagey
Slime is a compliment.
23
posted on
05/04/2003 5:17:49 PM PDT
by
Coleus
(RU-486 Kills Babies)
To: Cagey
NJ...corruption??
IM shocked...
SHOCKED!
24
posted on
05/04/2003 5:19:38 PM PDT
by
jaz.357
(The END of the BEGINNING... is the BEGINNING of the END!)
To: Cagey
I can't
imagine such an "unfortunate" thing happening in New Jersey!
Isn't this the State that threw out their own Constitution so they could elect Loutenberg?
25
posted on
05/04/2003 5:21:39 PM PDT
by
Gritty
To: yevgenie
Yes, Yev, but if you follow the DOD standard (7 x overwrite) usually some bits are unrecoverable. This leaves you with te t wi h let rs miss ng, so what was there has to be reconstructed. It's absolutely hopeless for binary files, such as most databases, spreadsheet, and word processing programs produce.
To: Cagey
Amazing. They can fix an election but they can't fix a hard drive.
27
posted on
05/04/2003 5:24:54 PM PDT
by
ohmage
To: Glenn
With the density and sophistication of controllers, the odds of what you describe are pretty long in this day and age. Don't you think? Not really. Drives are designed to be cheap. This means they are designed so that data will be written as accurately as necessary to ensure sufficient read margins. There's no benefit to being more precise than that, so drives generally aren't.
That being said, writing random data repeatedly makes it difficult to distinguish which bits of magnatism were the random overwrites and which bits were there before.
28
posted on
05/04/2003 5:25:13 PM PDT
by
supercat
(TAG--you're it!)
To: Glenn
Send me the damn thing. I'll get their data for them. And I prefer a temperate climate for my relocation in the witness protection program. And I want my name to be really cool and end in a vowel. How do you recover from someone taking a hammer to the hard drive?
29
posted on
05/04/2003 5:28:14 PM PDT
by
supercat
(TAG--you're it!)
To: ohmage
Ha! Ha! Good one!
What's with these conservatives who continue to live in NJ? ;-)
To: Cagey
Yes, that is low level formatting. But, that takes hours to do. Well, with a server anyway.
31
posted on
05/04/2003 7:13:56 PM PDT
by
Calpernia
(www.HelpFeedaChild.com)
To: AppyPappy
Ah! I think you are RIGHT! Didn't think of that.
32
posted on
05/04/2003 7:14:27 PM PDT
by
Calpernia
(www.HelpFeedaChild.com)
To: meatloaf
Does that include low level formatting?
33
posted on
05/04/2003 7:15:37 PM PDT
by
Calpernia
(www.HelpFeedaChild.com)
To: meatloaf; All
Even after erased and written over, data can be retrieved. The only sure way of ensuring data cannot be retrieved is to place the hard drive in a furnace and reduce it to molten metal.The NSA reports that a commercial data recovery outfit has retrieved files overwritten 8 times.
The NSA can retrieve perhaps twice that, or 16 times.
However, ERASER, available as FREEWARE on the Web, can be configured to use the 35 pass Gutman wipe, or, in the alternate, 99 pass random overwrites for compressed drives.
I'm surprised they didn't have a "file destruction" policy in place!!
34
posted on
05/04/2003 7:47:15 PM PDT
by
Lael
(Well, I Guess he DIDN'T go wobbly in the legs!! Now, "W", lets do the REST of the AXIS of EVIL!!)
To: AppyPappy
Yup. I bet they overwrote the data with 0's. That would be suboptimal. It would be better to make several passes, with alternating 1s and 0s, alternating 0s and 1s, and then one or more random bit passes.
35
posted on
05/04/2003 7:57:34 PM PDT
by
cynwoody
To: cryptical
End-to-end encryption works. It's a little extreme for most people, and there are all sorts of gotchas in implementation to worry about, but if you have the need you can afford the solution. This is true. You just have to make sure the wrong people don't find out the pass phrase.
36
posted on
05/04/2003 8:04:16 PM PDT
by
cynwoody
To: proxy_user
Yes, Yev, but if you follow the DOD standard (7 x overwrite) usually some bits are unrecoverable. This leaves you with te t wi h let rs miss ng, so what was there has to be reconstructed. It's absolutely hopeless for binary files, such as most databases, spreadsheet, and word processing programs produce.
I am aware of the process and its limitations. A former employer and dataset were more sensitive than even DOD standards. I was just making a point for the less "sophisticated" among us.
37
posted on
05/04/2003 8:05:34 PM PDT
by
yevgenie
To: Glenn
The problem is that many HDD's are not quite so precise ...odds of what you describe are pretty long in this day and age. Don't you think?
Then again, maybe the good guys might get lucky. E.g., the incriminating data is written when the drive is at its normal operating temperature. Then, when the political temperature starts to rise, panicky crooks sneak in in the wee hours of the morning and power on a cold computer and immediately run the wipe utility.
In that case, the erasure bits might not fully cover up the original data. Then, if you took the drive out of the computer, you might be able to manipulate its control electronics to ease the read head directly over what's left of the original data and possibly recover it.
Similar results might be possible if the evidence was written on a new drive, but the erasure was done after the drive had aged while in service.
38
posted on
05/04/2003 8:16:03 PM PDT
by
cynwoody
To: Incorrigible
What's with these conservatives who continue to live in NJ? ;-)
I don't know. They're incorrigible?
39
posted on
05/04/2003 8:31:07 PM PDT
by
ohmage
To: cynwoody
All part of the implementation :)
Key management, tokens for authentication, hardening systems and auditing hardware and software regularly, etc.
There was that mob boss that was using encryption out on the east coast. Got busted when the FBI did a black bag job on his home PC, pursuant to a wiretap warrant and got his passphrase.
The problem for the perp in that scenario is that when they get the passphrase for the key, all the traffic sent using that key is compromised. It costs next to nothing to store a bunch of encrypted traffic forever if required, hoping that a key turns up in the future.
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-49 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson