* via http://theMezz.com/lists

* subscribe at http://techPolice.com


Computer sleuths seek deleted e-mail

Andersen auditors killed some Enron-related correspondence

By D. Ian Hopper
ASSOCIATED PRESS

WASHINGTON, Jan. 16 — The job of recovering the missing Enron Corp.
accounting documents is falling to computer sleuths whose work can foil
the casual use of the delete button.

Legal counsel at Ontrack Data International THEY’VE BEEN called on
before in high-profile cases, looking for suspected spy transmissions
and missing Clinton White House e-mails.

And now they’ll be asked to recover documents from the computers of
Arthur Andersen LLP, which acknowledges its employees destroyed
thousands of e-mails and paper documents about Enron.

Investigators want to know who knew about the problems at Enron, which
shocked the financial world and its own employees with its fall from
Wall Street grace to bankruptcy.

Computer sleuths move quickly to preserve hard drives and backup tapes
before the bits of deleted data are overwritten forever.

“If the data was there, rarely can you not find a sign of it,” said
=Jeff
Bedser of Internet Crimes Group in Princeton, N.J. “The closer to the
time frame it happened, the better the chance of recovering the data.”
=


Andersen has said its Houston auditors started deleting Enron e-mails on
Oct. 23 and stopped Nov. 9. Bedser said his firm has been able to
recover Lotus Notes e-mail messages that were deleted up to eight months
earlier. Andersen used Lotus Notes.
Most computer users think a simple stroke of the delete key is enough to
make a message disappear forever.

“The general practitioner doesn’t know that once you hit delete and
=get
it out of your inbox that it’s not gone,” said David Schultz, legal
counsel at Ontrack Data International. “That is why this is a very
fertile area for key evidence in litigation.”

In most cases, hitting the delete button simply erases the file from
general view. But the underlying data remains until the computer fills
that free space with new data.


Government agencies with sensitive information — like the National
Security Agency, the CIA and the FBI — use software that repeatedly
overwrites free space on hard drives to foil recovery of deleted data.
E-mails are even harder to permanently erase, because they often reside
in many locations along a computer network. Lotus Notes stores e-mail
messages on a central server and gives most users only limited access,
so a person who deletes an e-mail has no way to ensure it is permanently
erased and overwritten.

Investigators also use backup tapes. Major companies tend to back up
their files nightly or more often. The backups are eventually
overwritten, so preserving them early is critical.

 Recovering e-mails from backup tapes is far from a sure thing. Millions
of e-mails from the Clinton White House were never recovered, even after
contractor Vistronix tried to extract them from tapes. Andersen said it
has retrieved some of the deleted Enron files from backups.
Andersen may also need to check personal computers used by the Houston
auditors, looking for bits of e-mail messages or original copies of
documents that have since been shredded.

While the e-mails might not have been intentionally stored, some
portions may be lodged on individual computers just because someone read
the messages. Joan Feldman of Computer Forensics called the phenomenon
“data debris” and said it’s hard to work with.

“The e-mail may or may not be stuck on the hard drive,” Feldman
=said.
“The ‘may or may not’ part is really big enough to drive a car
=through.”

Shredded paper is also extremely difficult, but not impossible, to
re-create. Jason Paroff, a forensics expert at Kroll Worldwide, said his
company has put shredded documents back together before, but success is
dependent on the efficiency of the shredder.

While the results of straight-cut shredders are relatively easy to work
with, Paroff said, “there are some shredding machines that almost
produce a dust on the other end. Good luck piecing that together.”
With all the uncertainties in forensic work, the experts said Andersen
would benefit if it gets another company to monitor its work. That would
protect Andersen against some routine pitfalls, like a technician
throwing out an obsolete but evidence-rich computer.
“It would probably be a good alibi for whatever their status is,”
=said
Stan Wilson of Kroll. “You don’t want to go into something like
=Enron
with yourself as the lone gun.”

============================================================
CUT YOUR BILLS BY 50% INSTANTLY-Free Non-Profit Help!
You can be debt free in 12-30 months! This reputable non-
profit can help you accomplish this goal without bankruptcy
or a loan! Click here now: 
http://click.topica.com/caaafkvb1dhr0b2EDp2f/consumercreditcounseling
============================================================

--via http://techPolice.com
archive: http://theMezz.com/cybercrime/archive
subscribe: [EMAIL PROTECTED]
--via http://theMezz.com

==^================================================================
This email was sent to: archive@jab.org

EASY UNSUBSCRIBE click here: http://topica.com/u/?b1dhr0.b2EDp2
Or send an email to: [EMAIL PROTECTED]

T O P I C A -- Register now to manage your mail!
http://www.topica.com/partner/tag02/register
==^================================================================

Reply via email to