"Dave Korn" <[EMAIL PROTECTED]> writes:

>http://www.theregister.co.uk/2008/09/17/cyber_crime_fighting/
>"  After getting a search warrant and confiscating his hard drive,
>investigators were forced to scour through its remains using an electron
>microscope, and the price of $100,000 per pass.  "
>
>The claim comes from "Robert Schperberg, forensics lead for Chevron, [ ... ]
>at the MIS Training Institute's IT Security World conference in San
>Francisco", and is otherwise unverified.  I haven't been able to get hold of
>any kind of transcript, so thus far it only has the status of "Something
>someone said when giving a talk at a conference".

Whatever it is it seems to have been garbled beyond recognition, if they were
just looking for straight evidence they'd be using Encase, if they were
looking for data in erase bands (assuming the drive was old enough to still
feature them, they'd be hard to find in any modern drive) they'd be using
something like a magnetic force microscope which is a scanning probe
microscope, or a magnetic force scanning tunneling microscope, and in either
case I doubt you could read perpendicularly-recorded EPRML data just by
staring at it.  So I don't think it's possible to draw any conclusions from
this data.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to