I looked further at this DOD standard which was showing different
numbers from various people (including myself)  Here is an interesting
article that discusses the DOD standard in the context of disk wiping
software.  Worth being aware of.

http://www.darkstonedata.com/business/security8.html



Trevor Cushen
Sysnet Ltd

www.sysnet.ie
Tel: +353 1 2983000
Fax: +353 1 2960499



-----Original Message-----
From: maillist [mailto:maillist@;avoiderman.com] 
Sent: 30 October 2002 06:45
To: [EMAIL PROTECTED]
Subject: RE: Interesting One


I disagree with you both - the NSA standard for a drive that will be
recycled is a nine-pass wipe ... involving pseudo-random data, 0s and 1s
... preferably in a non-predictable order ...

Reading after thirty overwrites is just scare mongering.  Depending on
the media it might just be possible on some drives (where the heads have
moved over time) ... but the kit to read from drives after just a couple
of wipes is expensive, and usually just the provision of government
types ...

Avoiderman

> -----Original Message-----
> From: Nero, Nick [mailto:Nick.Nero@;disney.com]
> Sent: 29 October 2002 17:30
> To: Dave Adams; [EMAIL PROTECTED]
> Subject: RE: Interesting One
>
>
> Well, the NSA standard I believe is that zero-filling a drive (writing

> all 0's to the platter) will make the data impossible to recover, but 
> I am sure there are some instances when this isn't the cause depending

> on how retentive the media is and all that.  If is electromagnetically

> degaussed for an extended period of time, I can't imagine anything 
> could recover the data.
>
> Nick Nero, CISSP
>
> -----Original Message-----
> From: Dave Adams [mailto:dadams@;johncrowley.co.uk]
> Sent: Monday, October 28, 2002 5:06 PM
> To: [EMAIL PROTECTED]
> Subject: Interesting One
>
>
> Greetings Folks,
>
> I had an interesting conversation today with someone from FAST 
> (Federation Against Software Theft) They pretend not to be a snitch 
> wing of the BSA. Anyway, to get to the point, the guy that came to see

> me said that their forensics guys could read data off a hard drive 
> that had been written over up to thirty times. I find this very hard 
> to believe and told him I thought he was mistaken but the guy was 
> adamant that it could be done. My question is, does anyone have any 
> views on this, or, can anyone point me to a source of information 
> where I can get the facts on exactly how much data can be retrieved 
> off a hard drive and under what conditions etc etc.
>
> Thanks
>
> Dave Adams



**************************************************************************************

This email and any files transmitted with it are confidential and intended 
solely for the use of the individual or entity to whom they are addressed. 

If you have received this message in error please notify SYSNET Ltd., at
telephone no: +353-1-2983000 or [EMAIL PROTECTED]

**************************************************************************************

Reply via email to