Outcasts

Outcasts

Forum for outcast sleuths.


    Digital Forensics

    Share
    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Digital Forensics

    Post by dangrsmind on Mon Mar 08, 2010 11:54 pm

    The art and science of forensic examination of digital computing systems including but not limited to personal computers, web servers, portable devices and automotive computers.
    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 12:01 am

    Commercial disk wiping programs don't work in many cases. See: http://igneous.scis.ecu.edu.au/proceedings/2005/forensics/woodward.pdf

    This is good news for the forensic examiner, not so good for privacy advocates.
    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 12:02 am

    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 12:27 am

    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 12:32 am

    Digital image forensics and image tamper detetion: http://www.cs.dartmouth.edu/farid/research/tampering.html
    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 12:34 am

    Scanner identification: http://www.ecn.purdue.edu/~prints/public/papers/ei07-nitin2.pdf

    I've built some software in this area and my algorithm was much faster and simpler than everything I have found in the literature.
    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 12:35 am

    Printer tracking: http://w2.eff.org/Privacy/printers/docucolor/

    Bet you didn't know these dots are very likely on your driver's license and almost every color print you've ever made.
    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 12:41 pm

    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 12:55 pm

    How to REALLY Erase a Hard Drive: http://blogs.zdnet.com/storage/?p=129
    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 1:02 pm

    Overwriting doesn't work. Can Intelligence Agencies Read Overwritten Data: http://www.nber.org/sys-admin/overwritten-data-guttman.html
    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 1:08 pm

    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Tue Mar 09, 2010 2:48 pm

    As of November 2007, the United States Department of Defense considers overwriting acceptable for clearing magnetic media within the same security area/zone, but not as a sanitization method. Only degaussing or physical destruction is acceptable for the latter.[4]

    On the other hand, according to the 2006 NIST Special Publication 800-88 (p. 7): "Studies have shown that most of today’s media can be effectively cleared by one overwrite" and "for ATA disk drives manufactured after 2001 (over 15 GB) the terms clearing and purging have converged."[1] An analysis by Wright et al. of recovery techniques, including magnetic force microscopy, also concludes that a single wipe is all that is required for modern drives. They point out that the long time required for multiple wipes "has created a situation where many organisations ignore the issue all together – resulting in data leaks and loss. "[5]

    http://en.wikipedia.org/wiki/Data_remanence
    avatar
    Percy
    Moderator
    Moderator

    Posts : 1274
    Join date : 2010-02-16

    Re: Digital Forensics

    Post by Percy on Tue Mar 09, 2010 9:01 pm

    This is fantastic stuff, thanks very much for all these links, we really have a nice reference link library here now about many different things. I like how its coming along.


    _________________
    Ask me about $cientology, E-Meters, Xenu, The R-6 Implant, Body Thetans, Engrams and the State of Clear.

    DoctorZ

    Posts : 90
    Join date : 2010-02-26
    Location : Northern VA, aka Hell

    Re: Digital Forensics

    Post by DoctorZ on Thu Mar 18, 2010 1:44 pm

    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Thu Mar 18, 2010 2:37 pm

    Yes, thanks for posting that. Here's the link to the master site: http://www.eff.org/foia/social-network-monitoring

    Stay tuned, there will be some interesting revelations I expect.
    avatar
    claudicici

    Posts : 1259
    Join date : 2010-02-16

    Re: Digital Forensics

    Post by claudicici on Fri Mar 19, 2010 1:32 am

    haha ,c'mon us x-websleuthers knew for a long time that's how you get the good stuff
    avatar
    dangrsmind

    Posts : 676
    Join date : 2010-02-16
    Location : San Francisco

    Re: Digital Forensics

    Post by dangrsmind on Fri Mar 19, 2010 10:06 am

    The way you get the good stuff is to capture everything and throw out most of it. See http://www.blackhat.com/presentations/bh-usa-09/TOPLETZ/BHUSA09-Topletz-GlobalSpying-PAPER.pdf

    Sponsored content

    Re: Digital Forensics

    Post by Sponsored content


      Current date/time is Sun Dec 10, 2017 8:07 pm