Skip to comments.
Why Darrell Issa just asked the IRS to hand over a hard drive
Washington Examiner ^
| Jun 17, 2014
| Susan Ferrechio
Posted on 06/17/2014 3:53:06 PM PDT by Ray76
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-72 last
To: Ray76
To: Ray76
To: hal ogen
I don’t see Issa doing anything, but at some point, even the most ignorant public may demand some answers.
This is beyond belief, and the IRS is an equal opportunity bogey man. Only government officials and their cronies like them and, while they are powerful, they are outnumbered.
To: MadMax, the Grinning Reaper
It’s even better. The IRS’ interpretation of the record-keeping rules also required Lerner to make and retain hardcopy printouts, including all address/routing info, of any email used to conduct government business.
64
posted on
06/18/2014 6:45:28 AM PDT
by
kevkrom
(I'm not an unreasonable man... well, actually, I am. But hear me out anyway.)
To: coon2000
If every single sector on the drive gets forcibly written over, then data will be gone from that disk. Negative. It still leaves a magnetic resonance than can be detected. Military standard (at leafs from 20 years ago, when I knew the current standards) require every sector of the disk to be overwritten three times, using three different data patterns. Even then I bet it's not a complete wipe but just "good enough" for operational purposes. The only true way to make a drive unrecoverable is to physically destroy it.
65
posted on
06/18/2014 6:48:25 AM PDT
by
kevkrom
(I'm not an unreasonable man... well, actually, I am. But hear me out anyway.)
To: Ray76
The IRS uses Outlook from what I understand. If so they are probably using an Exchange server to process emails. If that is the case the Exchange server also needs to be seized, along with ALL backups.
To go even further I would go after everyone in her contact list. Subpoena EVERYBODY she has ever sent or received an email from. Then seize those computers as well.
Make these friggin assholes life as miserable as possible.
66
posted on
06/18/2014 7:30:29 AM PDT
by
unixfox
(Abolish Slavery, Repeal the 16th Amendment)
To: Ray76
This is the cover of Newsweek October 13th 1997 NOTHING HAS CHANGED!
67
posted on
06/18/2014 7:34:17 AM PDT
by
unixfox
(Abolish Slavery, Repeal the 16th Amendment)
To: kevkrom
Negative. It still leaves a magnetic resonance than can be detected. Military standard (at leafs from 20 years ago, when I knew the current standards) require every sector of the disk to be overwritten three times, using three different data patterns. Even then I bet it's not a complete wipe but just "good enough" for operational purposes. The only true way to make a drive unrecoverable is to physically destroy it.
Peter Gutmann theorized that using scanning tunneling microscopy you might be able to pull some data from a hdd, like a letter out of the entire encyclopedia. On top of that, that was from 20 years ago when drives stored far lass data, stored the data horizontally and the heads were far less precise. Todays far denser drives with vertical storage, extremely precise heads is a different matter. A single pass of writing over every sector, as long as it is truly random, is more than enough to delete all data on the drive.
Gutmann's old method for data deletion was 35 passes of random sector writes, which is 28 eight more than US govt top secret wipes. Today, he states that one pass of his method is all that is required.
Produce one instance where anyone has recovered data from a disk that has random 0's and 1's written to every sector, you will not find one.
68
posted on
06/18/2014 8:09:24 AM PDT
by
coon2000
(Give me Liberty or give me death!)
To: kevkrom
Follow up discussion on Gutmann's paper with comments from Gutmann concerning data deletion here:
http://seclists.org/bugtraq/2005/Jul/464
69
posted on
06/18/2014 8:17:06 AM PDT
by
coon2000
(Give me Liberty or give me death!)
To: coon2000
Here is an interesting blog post on the subject. While Wright is attempting to make the case that, for all practical purposes, overwriting data once is sufficient to obfuscate older data on magnetic media, it all begins with an analog signal of variations in magnetic flux strength from which "bits" are extracted. This is very different from truly discrete "bits" as found in solid state memory.
Old "signals" (writes) remain on the magnetic media. This has nothing to do with logical organizations of binary data such as sectors. It's at a lower level. It's all about residual magnetic flux.
Many of the comments at the bottom of the post are informative. I believe the last comment to be correct: given a strong enough reason, forensics can be effective.
The company I mentioned has many levels of recovery services, including the very low level analog stuff.
I hope this helps explain where I was coming from. ;-)
70
posted on
06/18/2014 2:26:36 PM PDT
by
MV=PY
(The Magic Question: Who's paying for it?)
To: MV=PY
Your link agrees with my position, even the last comment. I briefly touched this in the two posts above yours.
71
posted on
06/18/2014 6:58:58 PM PDT
by
coon2000
(Give me Liberty or give me death!)
To: coon2000
You’ve made your opinion clear. Thanks.
72
posted on
06/18/2014 9:40:15 PM PDT
by
MV=PY
(The Magic Question: Who's paying for it?)
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-72 last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson