Berkeley Lecturer gets medieval on Laptop Thief...

Message boards : Cafe SETI : Berkeley Lecturer gets medieval on Laptop Thief...
Message board moderation

To post messages, you must log in.

Previous · 1 · 2 · 3

AuthorMessage
Profile Darth Dogbytes™
Volunteer tester

Send message
Joined: 30 Jul 03
Posts: 7512
Credit: 2,021,148
RAC: 0
United States
Message 102869 - Posted: 23 Apr 2005, 3:06:23 UTC


Account frozen...
ID: 102869 · Report as offensive
AC
Avatar

Send message
Joined: 22 Jan 05
Posts: 3413
Credit: 119,579
RAC: 0
United States
Message 102872 - Posted: 23 Apr 2005, 3:09:56 UTC - in response to Message 102859.  

> > Trust me, degaussing will work. Then, just steam clean the rest of it.
> >
> Degaussing would send so many transient voltages through
> every circuit all you'd end up with is toast.
>

Okay, then just use a reliable wipe util to do the job on the disk. Here is the FULL crazy DoD method:

US Department of Defense 5220.22-M Clearing and Sanitization Matrix

a. Degauss with a Type I degausser

b. Degauss with a Type II degausser.

c. Overwrite all addressable locations with a single character.

d. Overwrite all addressable locations with a character, its complement, then a random character and verify. THIS METHOD IS NOT APPROVED FOR SANITIZING MEDIA THAT CONTAINS TOP SECRET INFORMATION.

e. Overwrite all addressable locations with a character, its complement, then a random character.

f. Each overwrite must reside in memory for a period longer than the classified data resided.

g. Remove all power to include battery power.

h. Overwrite all locations with a random pattern, all locations with binary zeros, all locations with binary ones.

i. Perform a full chip erase as per manufacturer's data sheets.

j. Perform i above, then c above, a total of three times.

k. Perform an ultraviolet erase according to manufacturer's recommendation.

l. Perform k above, but increase time by a factor of three.

m. Destroy - Disintegrate, incinerate, pulverize, shred, or melt.

n. Destruction required only if classified information is contained.

o. Run five pages of unclassified text (font test acceptable).

p. Ribbons must be destroyed. Platens must be cleaned.

q. Inspect and/or test screen surface for evidence of burned-in information. If present, the cathode ray tube must be destroyed.

ID: 102872 · Report as offensive
Profile Jord
Volunteer tester
Avatar

Send message
Joined: 9 Jun 99
Posts: 15184
Credit: 4,362,181
RAC: 3
Netherlands
Message 102875 - Posted: 23 Apr 2005, 3:10:50 UTC - in response to Message 102865.  

> Dog tag?
> Mwahahaha...
>
See? You can't do anything else than do what Fuzzyball tells you to do. :)

Straight Jackets ?!
Straight Jackets !?
We don't need no stinkin' Straight Jackets!!!

Dog bite 'im.
ID: 102875 · Report as offensive
N/A
Volunteer tester

Send message
Joined: 18 May 01
Posts: 3718
Credit: 93,649
RAC: 0
Message 102881 - Posted: 23 Apr 2005, 3:16:45 UTC - in response to Message 102875.  

Don't make me pull the plug on you... or prong, for that matter...
ID: 102881 · Report as offensive
AC
Avatar

Send message
Joined: 22 Jan 05
Posts: 3413
Credit: 119,579
RAC: 0
United States
Message 102885 - Posted: 23 Apr 2005, 3:21:59 UTC - in response to Message 102858.  

> > Trust me, degaussing will work.
>
> F steam clean. A good rubbing with 99% isopropyl will do the trick.
>

Hmm I wonder if the thief is listening to all of this?
ID: 102885 · Report as offensive
Profile Murasaki
Avatar

Send message
Joined: 22 Jul 03
Posts: 702
Credit: 62,902
RAC: 0
United States
Message 102886 - Posted: 23 Apr 2005, 3:22:44 UTC
Last modified: 23 Apr 2005, 3:24:49 UTC

Considering the hard drive is in an iron case for the specific purpose of conducting away any external magnetism, combined with the reluctance of the magnetic particles on a hard drive being very high, you're gonna need a lot stronger field than just a coil and an AC outlet (I used to work in an area with real "magnetic device declassifiers"). If you're that worried about getting caught with the physical device, best just to disassemble the thing, with a hatchet or hammer if nothing else, and sandpaper off the platters. No proof at that point unless the factory can track the serial number of the drive, assuming you fail to destroy that.

I can't imagine why anyone would want to send the data alone back, but the whole thing about doing a "purchase search" is overhyped. At another place I used to work (very large retail chain), it isn't like they insisted on seeing your ID when buying disks and paying cash. The cops could have subpoenaed our closed circuit television system recordings (and did on occasion, but only for perps known to have been in at a specific time), but then they get to search through days to weeks of video images matching up everyone who bought this brand of DVD, and that's just ONE store out of dozens to hundreds. Unless the professor REALLY was into some heavy stuff, that just wouldn't be seen as cost-effective to chase after one stolen computer.

Best catch, besides the thief accidentally going to a fence already under surveillance, is simply finding the MAC address, CPU ident, or whatever hitting the Internet. That stuff is beyond my experience, however.
ID: 102886 · Report as offensive
N/A
Volunteer tester

Send message
Joined: 18 May 01
Posts: 3718
Credit: 93,649
RAC: 0
Message 102890 - Posted: 23 Apr 2005, 3:30:22 UTC - in response to Message 102886.  
Last modified: 23 Apr 2005, 3:30:57 UTC

That's where my experience comes in, and it's not likely to be successful. Recall that WiFi is not a stationary design - It is intended to roam. So unless you've got someone in the area, can ping down the machine, check the traceroutes and geographically locate its use, and keep moving in order to follow the suspect, it ain't gonna be found let alone recovered.

Once again, the Prof. was the weak link in securing the data, and it took a thief to prove it.

Let's hope that it wasn't industrial sabotage.
ID: 102890 · Report as offensive
AC
Avatar

Send message
Joined: 22 Jan 05
Posts: 3413
Credit: 119,579
RAC: 0
United States
Message 102891 - Posted: 23 Apr 2005, 3:31:14 UTC

Hnn, enough talk about this there has been.

ID: 102891 · Report as offensive
Previous · 1 · 2 · 3

Message boards : Cafe SETI : Berkeley Lecturer gets medieval on Laptop Thief...


 
©2024 University of California
 
SETI@home and Astropulse are funded by grants from the National Science Foundation, NASA, and donations from SETI@home volunteers. AstroPulse is funded in part by the NSF through grant AST-0307956.