"Dave Korn" <[EMAIL PROTECTED]> writes: >http://www.theregister.co.uk/2008/09/17/cyber_crime_fighting/ >" After getting a search warrant and confiscating his hard drive, >investigators were forced to scour through its remains using an electron >microscope, and the price of $100,000 per pass. " > >The claim comes from "Robert Schperberg, forensics lead for Chevron, [ ... ] >at the MIS Training Institute's IT Security World conference in San >Francisco", and is otherwise unverified. I haven't been able to get hold of >any kind of transcript, so thus far it only has the status of "Something >someone said when giving a talk at a conference".
Whatever it is it seems to have been garbled beyond recognition, if they were just looking for straight evidence they'd be using Encase, if they were looking for data in erase bands (assuming the drive was old enough to still feature them, they'd be hard to find in any modern drive) they'd be using something like a magnetic force microscope which is a scanning probe microscope, or a magnetic force scanning tunneling microscope, and in either case I doubt you could read perpendicularly-recorded EPRML data just by staring at it. So I don't think it's possible to draw any conclusions from this data. Peter. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]