[Dataloss] [follow-up] Boeing fires employee whose laptop wasstolen (fwd)

Sean Steele SSteele at infolocktech.com
Sun Dec 17 14:12:09 EST 2006


Great point, George. It's also a great procedure for
recovering/mirroring data from a Windoze disk you need to reformat, but
which is Acting Badly. Make sure you have a BIOS that allows you to
"Boot from USB". If you don't, and you're really serious, you can have a
custom upgrade/replacement BIOS created for you. Email me offline if
interested.

--
Sean Steele, CISSP
infoLock Technologies
703.310.6478  direct
202.270.8672  mobile
ssteele at infolocktech.com

-----Original Message-----
From: dataloss-bounces at attrition.org
[mailto:dataloss-bounces at attrition.org] On Behalf Of George Toft
Sent: Saturday, December 16, 2006 12:24 PM
To: dataloss at attrition.org
Subject: Re: [Dataloss] [follow-up] Boeing fires employee whose laptop
wasstolen (fwd)

As we all (on this list) know, this is a trivial exercise, provided the 
laptop does not use hard drive encryption.  For those who don't know, 
here are the tools you need:
1.  Knoppix CD.
2.  USB hard drive.

I'm in the process of recovering data from a hard drive even as I write 
this.  Since I'm not using Windows, the file access markers are not 
getting updated.  The exact same technique would be used to copy a 
laptop hard drive.

For more information, the see "Knoppix Hacks" ISBN 0-596-00787-6.  It 
has a ton of hints for this type of work, including step-by-step 
instructions and the CD.

George Toft, CISSP, MSIS
My IT Department
www.myITaz.com
623-203-1760

Confidential data protection experts for the financial industry.


ziplock wrote:
> I'd like to see someone publicly volunteer, in a highly visible
manner, to
> demonstrate that s/he can access data on an unknown, standard-issue
> laptop, without leaving traces.  No actual cracking would be
necessary;
> once the data is copied a statement could be made that it can now be
> attacked and explored at leisure.  Perhaps if a known expert made this
> general challenge, technically aware activists could follow up with
> letters to the editor when these ridiculous claims are made by those
CYA
> companies.  The activists could directly challenge the company, via
the
> press (for what good would it do, if not in the public eye?), to put
up or
> shut up by providing a laptop for the demo.  If the successful
experiment
> itself gets any publicity, it could be used as proof of concept
against
> all future similar reports.
> 
> These companies and these reporters will stick to the script until
they're
> publicly challenged and proven wrong.
> 
> /z
> 
[snip]

_______________________________________________
Dataloss Mailing List (dataloss at attrition.org)
http://attrition.org/dataloss
Tracking more than 143 million compromised records in 507 incidents over
6 years.




More information about the Dataloss mailing list