UK Tried to Stop Snowden Stories by Smashing Hard Drives

Status
Not open for further replies.

fixxxer113

Distinguished
Aug 26, 2011
297
2
18,815
Destroying HDDs is not pointless if you want to completely destroy files, it depends on how you handle the process. There are ways to check if certain files have been previously copied to other devices. If forensic experts checked for that prior to smashing the drives, then it was a smart move. It's the only way to make sure the data is actually gone. If they didn't check, it was stupid because they have no idea how many copies might exist.

Of course there may be a way to make copies undetected, but I suppose that would take an expert also...

I remember reading a digital video camera manual, that actually said something similar. If you want to delete videos and be sure that the data is destroyed, no method of deleting/formatting etc. is 100% safe. The manufacturer said that if you really want to be sure, you should take the HDD out of the camera and physically destroy it with something like a hammer. No joke, they actually proposed a hammer.
 

joneb

Distinguished
Jan 15, 2007
79
0
18,630
fixxxer113 even a hammer isnt an asured way of destroying a hard drive unless it is opened up and the actual disk inside is destroyed. There are infact professional machines with extremely powerful magnets that are the best chance of destroying them.
 

fixxxer113

Distinguished
Aug 26, 2011
297
2
18,815


That's the point, smashing the platters to bits. Strong magnets work also, although they are harder to find. Large mechanical shredders are also a very satisfying way :p
 
Not at all surprising that the involved governments are going to great lengths to keep the extent of their domestic spying programs out of public view.
It would be nice if there was some legal recourse that could be taken against these nanny states; changing politicians alone never seems to help >.<
 

fixxxer113

Distinguished
Aug 26, 2011
297
2
18,815


Be careful, if you never see an end to the conspiracy layers, if you think the rabbit-hole has no bottom, you might go nuts. We might never find out who pulls the strings. But we can use the information we get to decide how we're going to live. The fact is that there are a lot of people that are absolutely clueless about these things. Even if Wikileaks and Snowden are not selfish idealists, at least through them, some people learn and are a bit more informed on issues like the existance of actual privacy in information.
 

Chetou

Distinguished
Feb 17, 2007
61
0
18,630
@fixxxer

How would you check if a certain file on the HDD has been copied? Or if it itself is a billionth copy?
 

fixxxer113

Distinguished
Aug 26, 2011
297
2
18,815


If you find out that certain files on the HDD have been copied to another location or device even once, then it's safe to assume that there are many copies already on the Internet. There are methods a forensics expert can use to find out what happened. There are logs that he has access to and tools that normal users don't have. You'd be suprised how much info there is about what happened in the past, on a storage device or even in a file itself.
 

fixxxer113

Distinguished
Aug 26, 2011
297
2
18,815


That's what I said. Read the whole post. In any case, you will want to destroy the files on that device too, so smashing it to bits is the only certain way.
 
There are ways to check if certain files have been previously copied to other devices.
Umm, not really. You check if I've booted off a live USB, mounted the drive in read only mode, and cloned it?

The point was that when there are other copies you have no hope of removing, removing one is pointless.

When you actually read the Guardian's article, they chose to destroy it themselves instead of handing it over. Not a case of being told to destroy it; it was 'give it to us', then 'we can't give it to you if it's non-existent'.
 

IndignantSkeptic

Distinguished
Apr 19, 2011
507
0
18,980
Did they really destroy whole computers? All they had to do was destroy the disks, memory cards, and memory sticks. If they think they need to destroy the whole computer then they are dangerously stupid. That can work in our favour if they are trying to do something bad to us, but can work against us if they try to do something good to us. It's worrying how stupid the people, who take care of us, are. Also what about all the other indisputably legitimate work that was destroyed in the process?
 

Branden

Distinguished
Jan 22, 2009
598
0
19,060
firstly - what good does destroying those harddrives do? was anyone dumb enough to think those drives contained the only copy? the second something hits the web (especially stuff like nude photos and leaks like this) there are thousands of copies spread across the globe in seconds.
second - "the truth will set you free". show me a government that doesn't want you to know the truth and i'll show you a government that doesn't want you to know freedom.
 

Ddram Bo

Honorable
Aug 21, 2013
5
0
10,510
fixxxer113 has a vacuous knowledge of this subject.
"Destroying HDD's" is pointless since the files on most networked computer systems are 'backed up' regularly, usually to a different computer or the 'cloud'.
There is no "way to check if certain files have been previously copied" unless you know they were copied, or find them in a temp cache where copied files reside since the head of the drive leaves no change in the file itself. As those cache files are deleted and overwritten by new temp files, the history of this activity is removed. In either case, destroying the hardware would have no effect on the copies.
I doubt that fixxxer113 knows what a 'forensic expert' may or may not know.
fixxxer113 appears to be no smarter than a digital camera manual that he sort of remembers reading. (Something "actually said" is not "something similar" except with regards to your interpretation, which, in the case of fixxxer113, would appear to encompass quite a lot of misunderstanding and ignorance.)
"deleting/formatting" in this case are not methods of destroying data, but merely reusing previously unavailable disk space. To destroy data, it must be overwritten with new data, and the more times it is overwritten, the less magnetic 'residue' remains from which any subsequent analysis may be made to reveal what was there before. This is similar to what you could expect when you reused the same ink cartridge in old typewriters - the ink would be strongest where the tape had only been used once, and become weaker as each new character reused the tape where a previous character had been typed. The difference is that the magnetic 'imprint' where a character appears doesn't reveal the previous character if overwritten enough times. The level of sophistication of the forensic equipment, and the trained technicians to use it, needed to attempt to retrieve overwritten information is well beyond the budget of anyone other than a large corporation or government agency. A typical hard drive head can't 'read' what was stored in a given location before it was overwritten, so a single overpass is sufficient.
Ultimately, smashing equipment, microwaving CD/DVD's, burning documents, and killing witnesses are the caveman's approach to information removal, and in this case, the UK's lauded British Intelligence Agency displayed a pathetic level of understanding regarding digital information storage. It was more likely meant as a demonstration of the threatened financial cost in equipment to anyone attempting to thwart their authority.
 

smokeybravo

Honorable
Feb 5, 2013
124
0
10,680
Reporters are now considered terrorists under British Law? What a dangerous time we live in. At any rate, the documents will never be snuffed out at this point. But it's scary to think about the lengths these criminal governments will go to to censor information.

The information Snowden leaked exposed not only lies from the world's most powerful intelligence agency, but also the fact that they are breaking the US constitution.

If it is a crime to expose the illegal actions of governments, there is no hope for us. This must be addressed now, in the heat of the moment. We won't get another chance after this.
 

IndignantSkeptic

Distinguished
Apr 19, 2011
507
0
18,980
As long as there are still so many people in these governments that are stupid enough to think that gayness should still be persecuted or even prosecuted, then certainly we should not allow them to invade privacy. Furthermore we should not allow governments or anyone to commit industrial espionage to steal trade secrets which will then put science companies into debt and cause the retardation of scientific progress. Hopefully the spying hasn't gone that far yet. However I believe Chinese organisations have been doing this to USA and European organisations for ages now, and it is possibly a major reason why the Chinese economy is superior right now while the others are failing, and is also possibly a major reason that many Republicans seem to be trying to halt R&D spending.
 

back_by_demand

Splendid
BANNED
Jul 16, 2009
4,821
0
22,780
Assuming you don't want to use a hammer, maybe even reuse the HDD afterwards but really want to ensure the data is dead, I have 4 letters for you - DBAN - read that and stop getting all your tech knowledge from the user manual of a cheap camcorder
 

lordjakian

Distinguished
Feb 19, 2010
40
0
18,530
This might sound a little nerdy, but isn't going around breaking hard drives like a digital 21st century version of burning books?

 

fixxxer113

Distinguished
Aug 26, 2011
297
2
18,815


The following is taken from Windows Event viewer on my PC. A tool available to any user, not even remotely comparable to forensic tools. I've removed the computer name and filename:

- System
- Provider
[ Name] Microsoft Office 14 Alerts
- EventID 300
[ Qualifiers] 0
Level 4
Task 0
Keywords 0x80000000000000
- TimeCreated
[ SystemTime] 2013-03-14T15:43:03.000000000Z
EventRecordID 6432
Channel OAlerts
Computer ##########
Security
- EventData
Microsoft Excel
Do you want to save the changes you made to '#######.xlsm'?
100216
14.0.6029.1000

Also, you can check Windows Registry entries, to see if any external storage devices where connected to the PC and if you export these entries to .txt files, you even get the date and time they were created, giving you the actual time the USB drive was plugged in.

Key Name: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\USBSTOR\Disk&Ven_HTC&Prod_Android_Phone&Rev_0100\7&1d1638a1&0&HT09EPY03591&0\Device Parameters
Class Name: <NO CLASS>
Last Write Time: 26/5/2013 - 11:21 pm"

This is also from my PC, showing the connection of a smartphone as a USB disk some months ago. Inside the registry key, is even more info on the device.

So, if I was investigating for this specific filename and saw this log (and cross-reference it with registry entries at the same date and time), I woud assume that if there was an attempt to alter or save the file, it would very likely be on another device. Get it? The file seems like it was COPIED. I'm certain that there are other more sofisticated methods of coming to the same conclusion. You'd be surprised how much info you can get just from system event logs. Even if nothing is explicitly mentioned, just by studying the user's behaviour you can see a lot of things. I found these entries manually and copied them but there is software that can scan the registry and other system logs, parsing information depending on specific criteria.

About the whole "HDD smashing" thing... English is not my native language but really, I don't think my post was that hard to understand. I know what formatting actually does, so do the manufacturers (hence the hammer suggestion in the camera manual). It IS a caveman approach but it's the easiest and chepest. Don't forget, apart from the actual files, you also destroy all that other "incriminating data" from your system logs... I've also done my share of data recovery, so i'm not talking completely out of my ass here :)

I know that in this day and age, files copies (especially if they go online) almost never go away. What I said was that it is not always pointless to destroy a drive. It depends on how each case is handled and how much info you get about what happened, before you destroy the drives. As I said, destroying the drive before a thourough investigation is almost certainly a stupid move.
 
LiveUSB leaves no traces. You're taking info from Windows, and if I wanted to get files without anyone noticing, windows wouldn't even be running.

It's trivial to clone a disk with absolutely no change in the original. I've done it many times before.

EDIT: There is actually a minor change - the read counters on the HDD's SMART info would go up by however much you read. Unless you cloned the whole disk though, you'd have to read it right before and right after to tell that it's changed. Plus that's simply a measure of how much has been read, not what.

EDIT 2:
you also destroy all that other "incriminating data" from your system logs
If you wipe the drive fully, windows no longer exists. The logs are part of windows - where did you think they were stored?

Therefore, if you wipe the drive, you wipe the logs.
 
Status
Not open for further replies.