Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Computer with e-mail evidence may have been damaged (NJ corruption)
injersey.com ^ | 5-4-2003 | SANDY MCCLURE

Posted on 05/04/2003 4:22:25 PM PDT by Cagey

Edited on 05/07/2004 7:41:15 PM PDT by Jim Robinson. [history]

TRENTON -- Employees at the state Parole Board and the Attorney General's Office are talking about how state investigators, who are looking into whether the governor's office was involved in the parole of reputed mobster Angelo Prisco, damaged a computer believed to contain evidence in the case, sources have told the Gannett State Bureau.


(Excerpt) Read more at c-n.com ...


TOPICS: Crime/Corruption; Government; News/Current Events; US: New Jersey
KEYWORDS: corrections; corruption; gangs; lacosanostra; mafia; mcgreevey; mob; mobster; newjersey; nj; organizedcrime; statepolice
Navigation: use the links below to view more comments.
first previous 1-2021-4041-49 next last
To: Glenn
How do you do it properly?
21 posted on 05/04/2003 5:17:18 PM PDT by Coleus (RU-486 Kills Babies)
[ Post Reply | Private Reply | To 10 | View Replies]

To: CHICAGOFARMER
So does the FBI.
And when you send it to the FBI you get the bonus plan where you ask them what you want to find on the hard drive and it will magically appear.
22 posted on 05/04/2003 5:17:40 PM PDT by lelio
[ Post Reply | Private Reply | To 3 | View Replies]

To: Cagey
Slime is a compliment.
23 posted on 05/04/2003 5:17:49 PM PDT by Coleus (RU-486 Kills Babies)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Cagey
NJ...corruption??

IM shocked...

SHOCKED!

24 posted on 05/04/2003 5:19:38 PM PDT by jaz.357 (The END of the BEGINNING... is the BEGINNING of the END!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cagey
I can't imagine such an "unfortunate" thing happening in New Jersey!

Isn't this the State that threw out their own Constitution so they could elect Loutenberg?

25 posted on 05/04/2003 5:21:39 PM PDT by Gritty
[ Post Reply | Private Reply | To 1 | View Replies]

To: yevgenie
Yes, Yev, but if you follow the DOD standard (7 x overwrite) usually some bits are unrecoverable. This leaves you with te t wi h let rs miss ng, so what was there has to be reconstructed. It's absolutely hopeless for binary files, such as most databases, spreadsheet, and word processing programs produce.
26 posted on 05/04/2003 5:24:39 PM PDT by proxy_user
[ Post Reply | Private Reply | To 16 | View Replies]

To: Cagey
Amazing. They can fix an election but they can't fix a hard drive.
27 posted on 05/04/2003 5:24:54 PM PDT by ohmage
[ Post Reply | Private Reply | To 1 | View Replies]

To: Glenn
With the density and sophistication of controllers, the odds of what you describe are pretty long in this day and age. Don't you think?

Not really. Drives are designed to be cheap. This means they are designed so that data will be written as accurately as necessary to ensure sufficient read margins. There's no benefit to being more precise than that, so drives generally aren't.

That being said, writing random data repeatedly makes it difficult to distinguish which bits of magnatism were the random overwrites and which bits were there before.

28 posted on 05/04/2003 5:25:13 PM PDT by supercat (TAG--you're it!)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Glenn
Send me the damn thing. I'll get their data for them. And I prefer a temperate climate for my relocation in the witness protection program. And I want my name to be really cool and end in a vowel.

How do you recover from someone taking a hammer to the hard drive?

29 posted on 05/04/2003 5:28:14 PM PDT by supercat (TAG--you're it!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: ohmage
Ha! Ha! Good one!

What's with these conservatives who continue to live in NJ? ;-)
30 posted on 05/04/2003 5:32:37 PM PDT by Incorrigible
[ Post Reply | Private Reply | To 27 | View Replies]

To: Cagey
Yes, that is low level formatting. But, that takes hours to do. Well, with a server anyway.
31 posted on 05/04/2003 7:13:56 PM PDT by Calpernia (www.HelpFeedaChild.com)
[ Post Reply | Private Reply | To 11 | View Replies]

To: AppyPappy
Ah! I think you are RIGHT! Didn't think of that.
32 posted on 05/04/2003 7:14:27 PM PDT by Calpernia (www.HelpFeedaChild.com)
[ Post Reply | Private Reply | To 12 | View Replies]

To: meatloaf
Does that include low level formatting?
33 posted on 05/04/2003 7:15:37 PM PDT by Calpernia (www.HelpFeedaChild.com)
[ Post Reply | Private Reply | To 15 | View Replies]

To: meatloaf; All
Even after erased and written over, data can be retrieved. The only sure way of ensuring data cannot be retrieved is to place the hard drive in a furnace and reduce it to molten metal.

The NSA reports that a commercial data recovery outfit has retrieved files overwritten 8 times.

The NSA can retrieve perhaps twice that, or 16 times.

However, ERASER, available as FREEWARE on the Web, can be configured to use the 35 pass Gutman wipe, or, in the alternate, 99 pass random overwrites for compressed drives.

I'm surprised they didn't have a "file destruction" policy in place!!

34 posted on 05/04/2003 7:47:15 PM PDT by Lael (Well, I Guess he DIDN'T go wobbly in the legs!! Now, "W", lets do the REST of the AXIS of EVIL!!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: AppyPappy
Yup. I bet they overwrote the data with 0's.

That would be suboptimal. It would be better to make several passes, with alternating 1s and 0s, alternating 0s and 1s, and then one or more random bit passes.

35 posted on 05/04/2003 7:57:34 PM PDT by cynwoody
[ Post Reply | Private Reply | To 13 | View Replies]

To: cryptical
End-to-end encryption works. It's a little extreme for most people, and there are all sorts of gotchas in implementation to worry about, but if you have the need you can afford the solution.

This is true. You just have to make sure the wrong people don't find out the pass phrase.

36 posted on 05/04/2003 8:04:16 PM PDT by cynwoody
[ Post Reply | Private Reply | To 18 | View Replies]

To: proxy_user
Yes, Yev, but if you follow the DOD standard (7 x overwrite) usually some bits are unrecoverable. This leaves you with te t wi h let rs miss ng, so what was there has to be reconstructed. It's absolutely hopeless for binary files, such as most databases, spreadsheet, and word processing programs produce.
I am aware of the process and its limitations. A former employer and dataset were more sensitive than even DOD standards. I was just making a point for the less "sophisticated" among us.
37 posted on 05/04/2003 8:05:34 PM PDT by yevgenie
[ Post Reply | Private Reply | To 26 | View Replies]

To: Glenn
The problem is that many HDD's are not quite so precise
...odds of what you describe are pretty long in this day and age. Don't you think?

Then again, maybe the good guys might get lucky. E.g., the incriminating data is written when the drive is at its normal operating temperature. Then, when the political temperature starts to rise, panicky crooks sneak in in the wee hours of the morning and power on a cold computer and immediately run the wipe utility.

In that case, the erasure bits might not fully cover up the original data. Then, if you took the drive out of the computer, you might be able to manipulate its control electronics to ease the read head directly over what's left of the original data and possibly recover it.

Similar results might be possible if the evidence was written on a new drive, but the erasure was done after the drive had aged while in service.

38 posted on 05/04/2003 8:16:03 PM PDT by cynwoody
[ Post Reply | Private Reply | To 19 | View Replies]

To: Incorrigible

What's with these conservatives who continue to live in NJ? ;-)


I don't know. They're incorrigible?
39 posted on 05/04/2003 8:31:07 PM PDT by ohmage
[ Post Reply | Private Reply | To 30 | View Replies]

To: cynwoody
All part of the implementation :)

Key management, tokens for authentication, hardening systems and auditing hardware and software regularly, etc.

There was that mob boss that was using encryption out on the east coast. Got busted when the FBI did a black bag job on his home PC, pursuant to a wiretap warrant and got his passphrase.

The problem for the perp in that scenario is that when they get the passphrase for the key, all the traffic sent using that key is compromised. It costs next to nothing to store a bunch of encrypted traffic forever if required, hoping that a key turns up in the future.
40 posted on 05/04/2003 8:40:37 PM PDT by cryptical
[ Post Reply | Private Reply | To 36 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-49 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson