Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

How did the DEA read my E-mail?

Status
Not open for further replies.
I discovered long ago that harddrives configured in a RAID 0 are virtually unrecoverable when 1 of 2 harddrives are missing or damaged. If you are savy enough to set up a RAID 0 and use multiple proxy options for internet activity you should be fine. You smell a trap just format 1 hardrive. They had better really want your ass bad because it should cost a lab anywhere between 5 to $20,000 to recover data and they will be lucky to recover 40%.
 
I run raid in one of my computers. I have 2 raptors in an array but I thought the only thing it does it just sees the 2 drives as 1. How can this stop them? Also shit hits the fan who has time to format? GAS still the best option IMO.

oldetom said:
I discovered long ago that harddrives configured in a RAID 0 are virtually unrecoverable when 1 of 2 harddrives are missing or damaged. If you are savy enough to set up a RAID 0 and use multiple proxy options for internet activity you should be fine. You smell a trap just format 1 hardrive. They had better really want your ass bad because it should cost a lab anywhere between 5 to $20,000 to recover data and they will be lucky to recover 40%.
 
A Raid drive is set up by a chip on your mother board where the 2 drives are stripped at the block level so your actually reading and writing data between 2 drives in parallel, so its like if you had a report and someone took away every other letter, then you wouldn’t have much of a report. So one drive missing from a 2 drive array is basically the same thing but your dealing with data 0 and 1 so if half the code is missing then no worries. The point of a Stripping drive array is for performance it doubles your read write time.

I run an old ABIT KT7A RAID MOBO i love my raid system! :p
 
ULTER is right - the DEA is using the typical scam they use when they illegally get evidence - the info was probably obtained obtained using a hacker program that accessed your computer and allowed them to view your e-mails (without a warrant) while you were sending or receiving them - then after sizeure (with a warrant) they play it up as obtaining the info from your hard drive - now defragging and disc clean won't scrub your hard drive so you left yourself wide open but a good 7 pass scrubbing program would force them to spend major money to get any info off your hard drive - remember that the bullshit you see about how these police departments can get major evidence is just that - bullshit! - don't believe that CSI crap (even fingerprint evidence is mostly fabricated) - so don't admit to anything!
 
Well this is along one but this is the best thing going for wipeing your hard drive spotless i have this and works great! Evidence Eliminator 5.0 i am sure there a newer update on it.But this will let you wipe anything you want on your hard drive in just one click! and the cops cant trace shit off of it! Do a search.....safety first is my priority!
 
degaussing magnets are awesome too for $20 at radioshack.
or a .223 through the platters will help too, hard for them to balance them again and get data off should other methods fail lol. or while running, take a quarter and bridge chips by scratching it across the back of the disk.
 
OR JUST BURN THE MOTHERFUCKER. ITs simple.

1. Make sure your network is secure with up to date everything with some nice firewalls, virus protection and spyware removal programs.

2. Use drivecrypt and a good file wipe program for your free space. Wipe it daily. At least 7 pass. You can use EE, or a ton of other utilites to clean shit up.

3. Have a burn barrel with some good soft wood and some gas outside in your back yard. Practice takeing your hard drive out as fast as you can a few times. (takes me about 7 seconds for my important computer) lol

4. When you are not on the net disconnect the motherfucker.
 
They can read anything they want. They can pull bits and pieces of data off that hard-drive even if you take it apart and dump it in water. They can just use special equipment to read the disc platters (they look like a bunch of cd's all stacked on top of one another) in that drive. A little late now but for "next time" get a flash drive or something similar. Everything you surf, i.e. ALL your internet activity can go right to the flash drive and never "see" the internal hard-drive. Other wise the only type of program that will erase it completely is a program like "kill-disk" that actually erases each data "sector" on the drive. It literally "kills" everything on there. It takes hours or days depending on the level of security you want. This is what the government uses if they have to "clean" or eliminate highly sensitive or secret info on secured governmental computers before destroying the hard-drives(they can't just throw them away, for obvious reasons). Bottom line: Safety is NOT convenient. Get a cheap throw-away machine that you use only for sensitive email that doesn't need to be real high-tech and make sure you can get rid of it or hide it in a hurry. Remember, in the 1980's they used payphones and pagers!
 
The part that worries me the most is how the emails were printed and given to the lawyer as if he had just sent or received one. THAT is scary.
 
They cant read shit if its torched. I think they illegally take info somehow from a virus.



VO2Max said:
They can read anything they want. They can pull bits and pieces of data off that hard-drive even if you take it apart and dump it in water. They can just use special equipment to read the disc platters (they look like a bunch of cd's all stacked on top of one another) in that drive. A little late now but for "next time" get a flash drive or something similar. Everything you surf, i.e. ALL your internet activity can go right to the flash drive and never "see" the internal hard-drive. Other wise the only type of program that will erase it completely is a program like "kill-disk" that actually erases each data "sector" on the drive. It literally "kills" everything on there. It takes hours or days depending on the level of security you want. This is what the government uses if they have to "clean" or eliminate highly sensitive or secret info on secured governmental computers before destroying the hard-drives(they can't just throw them away, for obvious reasons). Bottom line: Safety is NOT convenient. Get a cheap throw-away machine that you use only for sensitive email that doesn't need to be real high-tech and make sure you can get rid of it or hide it in a hurry. Remember, in the 1980's they used payphones and pagers!
 
I cant remember where I read it, but Windows also keeps a log of what you did online (not internet files). you can only access it in safe mode threw command prompt and its a pain in the ass to delete, but its there and it is recording.

Another reason I hate Windows, but these days you really cant get by without it.
 
incredible_hulk said:
get yourselves a degausser. Data is destroyed. Period!
Wish I had more K to give ya. Been trying to figure out the spelling of that since I first heard about it. Wasn't even sure if it was real.
 
Quick little bit of knowledge

I know somebody that works @ Microsoft and he basically said that each time you press down one of those letters on your keyboard, there are ways to track exactly what letter you're pressing, when you're pressing it, and from where (your location) you're pressing it. If your must use your computer to communicate in an illegal fashion then simply read the above messages. There seems to be a bunch of very smart people posting to this thread, but unless you're Bill Gates you haven't a clue of what kind of surveillance the DEA has. Be safe.
 
neeves187 said:
Quick little bit of knowledge

I know somebody that works @ Microsoft and he basically said that each time you press down one of those letters on your keyboard, there are ways to track exactly what letter you're pressing, when you're pressing it, and from where (your location) you're pressing it. If your must use your computer to communicate in an illegal fashion then simply read the above messages. There seems to be a bunch of very smart people posting to this thread, but unless you're Bill Gates you haven't a clue of what kind of surveillance the DEA has. Be safe.
So basically if you use your computer for ANY illegal activites you can be very well fucked any time. ;)
 
gymratforlife said:
So basically if you use your computer for ANY illegal activites you can be very well fucked any time. ;)
Ding Ding Ding We have winner. The Patriot Act, Carnivore, NSA, etc allows the gov the right to treat anyone like a terrorist, communist, whatever (especially anything to do with drugs including steriods) and use any of their newly given powers to sniff thru your records at their whim. So basically if you say it over the phone or type it on the internet then it can be seen or listened to by them and your screwed. Bush has been on TV trying to get some of these provisions renewed or made permanet parts in the Patriot Act. We are slowly moving towards a police state. :worried:
 
Yes that is my favorite program. I have the Plus pack. It Encrypts parts or 100% of your HardDisk including the operating System. Then all you have to do is make sure your network is secure and it will be very hard for them to get any info. But I guess you never know.
 
KA-Bar....i dont like that plus pack...it slows down the whole system i think...since everything is encrypted. Or does it just slow down on start up? Now virtual discs and hidden OS i agree with. Best not to know its there.
 
Ulter said:
Let me make this clearer. NOTHING will keep the technicians at IBM Labs from removing your disk in a clean room from the drive, removing the layers one at a time, and retreiving any information that was ever put on the drive. NOTHING.
The last time I talked to them it was approx $10,000 an hour with a two hour minimum. But that was two years ago so the price may have changed.
Your local prosecutor probably won't spend that much time and money to do this. But it CAN be done.

Exactly, i have worked at IBM in Charlotte, NC and i can tell you i have seen them do it!!
 
You are not goign to unencrypt DCPP for any 10,000$. Also you are not going to read what was written on a drive wiped with DOD or peter gutman schemes.

Do you have any tests/info to show about wiping that strong being removed.?
 
Ulter said:
Let me make this clearer. NOTHING will keep the technicians at IBM Labs from removing your disk in a clean room from the drive, removing the layers one at a time, and retreiving any information that was ever put on the drive. NOTHING.
The last time I talked to them it was approx $10,000 an hour with a two hour minimum. But that was two years ago so the price may have changed.
Your local prosecutor probably won't spend that much time and money to do this. But it CAN be done.

Like everyone has said. Rip out the HD and destroy it, or if you happen to have a electromagnetic degausser just collecting dust somewhere you may want to put it to use here.

If you got the cash you could give this site a try.

http://www.datadev.com/easycdduplication/govdes.html
 
I just got out of the Feds on a drug charge and you really have to smash your HD...otherwise use PGP...each person has to use it and they couldn't get into it.I believe the actual version I had back then was a hot copy from Japan not for import to the US.

J
 
what u wanna do if u want to be safe is throw the pc out the window like in zoolander "THE FILES ARE IN THE COMPUTER" SMASH!... "were are all the files"
sorry.
what u want to do as disk clean up wont do a thing- (like someone else posted )what u want to be doing is reformatting the computer- put all the stuff u want to keep on the computer on a disk and reformat the hard drive its easy enough if u know what ur doing- some ppl instead of giving you the windows disk etc will give u a start up disk which makes it even easier to do all you gotta do then is put it in the disk drive and press restart and follow the instructions
 
The only way to be sure is never to allow the data onto your Hard Drive. If you're paranoid, and who shouldn't be, then use a 'Live CD'. You can download one from Knoppix or Mandrake and a few other places and everything you do during the session stays only in memory unless you decide otherwise. When you switch off, everything not saved is utterly gone.
 
swoldier said:
The DEA can do what every they want because they are the law. Just next time use a public computer like the library or a school's computer. How will they track that?


most librarys in my area require you to swipe your card before using the pc. easy to see who was doing what at what time....
 
I only read the first page but I do IT security stuff and if they have your drive they will find anything they want on it that has been saved. They can do this with your RAM I think also. The RAM might contain the emails that you just read in the webpage form. That shouldn't get written to your hard drive's Temp Internet files but you never know.

you definitely have to destroy your drive. bury it in cement and throw it in the river if you need to get rid of evidence. There are programs that say they work but any DEA office will have the tools to go back and find things. I've used some of these tools before to go back over drives and you'd be amazed at what can be found.

if you use anything that runs while your pc is still operational it won't work. you would have to get a program that writes each bite alternating 010101 and then reverse it and then do that like 100 times.



edit: FORMATTING YOUR DRIVE WILL NOT REMOVE THE DATA!!!! I want to make sure that if you just reinstall your OS and reformat the drive things can STILL be taken off of it with advanced recovery tools. It is not a hard thing for law enforcement to do. This happens to child porn sickos all of the time.

the Bootable CD recommendation is a really good one. If you get a bootable Knoppix disc and boot from that to access Hushmail for anything illegal the only place the info might end up on is your RAM.
 
You don't want information about your traffic available. The first step is to minimize the amount of information kept on your computer.

1) Sign up for a secure webmail account (hushmail for example).
- This will eliminate any email from being on your PC
- Your email is irretreivable without a proper passphrase
(with hushmail at least)
2) Stop using Internet Explorer. Use Portable Firefox.
- PF is et to not cache your browsing
- No temp files to worry about
- More secure that IE. IE writes your browsing habits everywhere
3) Any personal and confidential files should be stored in secure Truecrypt containers
- Unreadable without the passkey
- Allows creation of "Hidden" encrypted volumes (for plausible deniability)
- Tryecrypt is well tested and respected in cryptographic circles.
4) Tell windows to clear the pagefile everytime you shut down
- Open regedit and browse to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management
- Create the key Value Name:
ClearPageFileAtShutdown
Value Type: REG_DWORD
Value: 1
- This should remove information cached from memory on your hdd

5) Use a secure connection for your internet access (VPN) so your ISP records clean
- I use Relakks.com and recommend them www.relakks.com
- Make certain their privacy policy is sound
 
Ulter said:
Let me make this clearer. NOTHING will keep the technicians at IBM Labs from removing your disk in a clean room from the drive, removing the layers one at a time, and retreiving any information that was ever put on the drive. NOTHING.
The last time I talked to them it was approx $10,000 an hour with a two hour minimum. But that was two years ago so the price may have changed.
Your local prosecutor probably won't spend that much time and money to do this. But it CAN be done.

Ulter is correct - you need to physically destroy the drive. Even fragmented data can be parsed back together using advanced algorithms. This is the extreme but yes, it CAN be done.
 
need to run something that removes the magnetic trace of the info on your hard drive, theres plenty of software on the net you can use, just make sure u blow the drive away with a disk cleaner that does better than a one pass zero wipe
 
You don't even have to use third-party software to do a wipe of the hard drive.

I have a logoff script setup for windows XP
Del /q /s "c:\Documents and Settings\MyProfile\Local Settings\Temp"
Del /q /s "c:\Documents and Settings\MyProfile\Local Settings\Temporary Internet Files"
Del /q /s "c:\temp"
Del /q /s "c:\WindowsTemp"

This deletes most temporary files from the computer. Then you can run

Cipher /w:c:\

This will do a three pass wipe of the drive. Unless someone REALLY wants to get you, this will make your data irretrievable.

These commands have only been tested under Windows XP Professional :-)
 
What I do is to use encrypted email to do biz on a computer at the public library, nothing traces back to me. Oh, and use a fake name on the sign in sheet and on packages to a P.O. Box at a mail service. Bottom line, if they want you they will get you no matter what.
 
Encrypted email is very good - just make sure it is a reputable encrypted email provider (ie hushmail , which is what elitefitness uses). As far as a computer on a public library, their are better ways.

If you are truly paranoid, and everyone should be, you can use a bootable CD with a complete OS. Use this to connect to a Relakks (https://www.relakks.com/ ) account (VPN through Switzerland).

After a reboot, their is no trace on your home computer. All transmissions go through an extremely secure encrypted tunnel to switzerland where privacy laws make it virtually impossible for any goverment to get your information... For that matter, since it is prepaid, you don't have to verify any information.

If you use a public terminal, you are still at risk. Sadly, libraries sometimes use proxies and logging. Further, it is easy for L.E. to "intercept" traffic from a public terminal, without a warrant.

If you truly want a completely secure untraceable browsing and email session, do the following.

1) Download and burn Knoppix, or another CD or DVD based linux ditro.
2) Create a Relakks account (5 Euros a month)
3) Connect to Relakks through VPN.
4) Connect through Relakks.
5) Create a hushmail account WHILE CONNECTED THROUGH RELAKKS. This is important. By doing this through Relakks, and only accessing it through Relakks, the IP logs will always lead to nothing. NEVER ACCESS IT ANY OTHER WAY.
6) Reboot. Now their is no record, and no way to trace your internet access.
 
bearfx said:
Encrypted email is very good - just make sure it is a reputable encrypted email provider (ie hushmail , which is what elitefitness uses). As far as a computer on a public library, their are better ways.

If you are truly paranoid, and everyone should be, you can use a bootable CD with a complete OS. Use this to connect to a Relakks (https://www.relakks.com/ ) account (VPN through Switzerland).

After a reboot, their is no trace on your home computer. All transmissions go through an extremely secure encrypted tunnel to switzerland where privacy laws make it virtually impossible for any goverment to get your information... For that matter, since it is prepaid, you don't have to verify any information.

If you use a public terminal, you are still at risk. Sadly, libraries sometimes use proxies and logging. Further, it is easy for L.E. to "intercept" traffic from a public terminal, without a warrant.

If you truly want a completely secure untraceable browsing and email session, do the following.

1) Download and burn Knoppix, or another CD or DVD based linux ditro.
2) Create a Relakks account (5 Euros a month)
3) Connect to Relakks through VPN.
4) Connect through Relakks.
5) Create a hushmail account WHILE CONNECTED THROUGH RELAKKS. This is important. By doing this through Relakks, and only accessing it through Relakks, the IP logs will always lead to nothing. NEVER ACCESS IT ANY OTHER WAY.
6) Reboot. Now their is no record, and no way to trace your internet access.

EXACTLY :artist:

You can also use something called VMWare. you can create a virtual image of windows that you only use for anon web surfing. this image is stored just as regular files on your physical machine, so all you have to worry about deleting is the vmware files and not other random shit that is on your physical machine....you'll need to have a somewhat beefy machine to host the vmware images though...
 
I HIGHLY doubt the feds are gonna go through all this if you are only ordering personal amounts of gear. If you are ordering bulk quanities for resale, then you should worry and follow the advice above.
 
goheavygo said:
I got arrested. The DEA seized my computers.
I did a 'disk cleanup' and 'defrag' before they took my computers.
They found incriminating E-mails and internet forms. They claim it was in the Temporary Internet Files on my PC.
How can I be sure shit is off my computer.. like this post?
(I'm using hushmail).

Were you charged and with what? They need a search warrant for what they did and for a search warrant they need RPG's (reasonable probable grounds) of criminal activity.

If you were charged you will find out in the disclosure how got to you...
 
palehorse - Yes, everything above is for the practical paranoid, but their are some things I believe everyone should do. Namely
- Encrypted email for anything and everything you don't want uncle sam reading
- VPN through Relakks (or similar) for all web surfing you don't want uncle sam snooping through
- Use portable firefox so no temporary files are written to the computer
- routinely wipe free space and swap file on your computer.

A little paranoia is a good thing.
 
bearfx said:
palehorse - Yes, everything above is for the practical paranoid, but their are some things I believe everyone should do. Namely
- Encrypted email for anything and everything you don't want uncle sam reading
- VPN through Relakks (or similar) for all web surfing you don't want uncle sam snooping through
- Use portable firefox so no temporary files are written to the computer
- routinely wipe free space and swap file on your computer.

A little paranoia is a good thing.
Thank you! good advice!!
 
bearfx said:
palehorse - Yes, everything above is for the practical paranoid, but their are some things I believe everyone should do. Namely
- Encrypted email for anything and everything you don't want uncle sam reading
- VPN through Relakks (or similar) for all web surfing you don't want uncle sam snooping through
- Use portable firefox so no temporary files are written to the computer
- routinely wipe free space and swap file on your computer.

A little paranoia is a good thing.



Thank you for telling me something practical that I can do!

Momof5
 
Ulter said:
goliath.jr Is exactly right. Even removing the partition and beating it with a hammer will not protect you. If you need to get rid of the information then you need to remove the drive and get dispose of it.

toss it in the river!
 
Most of the methods listed in this thread to destroy a drive, and its contents, are not sufficient if someone wants your data... Magnets, rivers, hammers - all these things leave your data easily retreivable.

Far better is to prevent anything from being written, unencrypted, that you don't want made public. High quality encryption has been available for a decade+ now. Use it.

If you want a hard drive truly destroyed, use a reputable shredding service (one is semshred.com )

shredded_disk.jpg


Protecting yourself is not difficult, and once it is set up, very little additional effort is required. If you are serious about keeping prying eyes from your data, use the steps I outlined in my posts above.
 
Deleting your temp Internet files is rarely sufficient, escpecially with Internet Explorer.

Internet Explorer created a file called index.dat and stored your browsing history there, it is not deleted when you clear the temporary internet files. Further, deleting doesn't really delete.

If you delete files, run cipher.exe /W:<Drive Letter> so that the files are really overwritten.

msam76 said:
Always delete your temp internet files. I do mine daily and run windows washer.
 
It seems that every1 (consciously) runs the risk of getting caught when ordering online after having read alot of this thread. From what I've seen throughout the posts there's just NO way around it. Getting away with it I think comes down to the fact that law enforcement doesn't have the numbers and time to pursue every single last person.
 
Their is definitely risk in ordering online, but as with anything else, their are steps to reduce the risk.

A few simple steps, which I have outlined in other posts, can reduce your risk from electronic sources.

In most cases, it is not the electronic trail that leads them to you, however. Before they make a grab for your email, they will already be watching you for other reasons.
 
bearfx said:
palehorse - Yes, everything above is for the practical paranoid, but their are some things I believe everyone should do. Namely
- Encrypted email for anything and everything you don't want uncle sam reading
- VPN through Relakks (or similar) for all web surfing you don't want uncle sam snooping through
- Use portable firefox so no temporary files are written to the computer
- routinely wipe free space and swap file on your computer.

A little paranoia is a good thing.

explanation of portable firefox plz...
n what is VPN short for?
 
yeah bros you have to physically destroy the drive to prevent it from being read, nature of the digital beast. those tech geeks are good at what they do
 
goheavygo said:
I got arrested. The DEA seized my computers.
I did a 'disk cleanup' and 'defrag' before they took my computers.
They found incriminating E-mails and internet forms. They claim it was in the Temporary Internet Files on my PC.
How can I be sure shit is off my computer.. like this post?
(I'm using hushmail).

Your defrag made their access to your computer faster....dude you have NO idea how stupid you sound right now....
 
enacer420nj said:
Your defrag made their access to your computer faster....dude you have NO idea how stupid you sound right now....
Dude,he says sarcastically, that thread is from Dec. 2002. You have no idea..I guess
 
Never do your incriminating browsing from your normal OS. Always boot from a Live CD and keep everything in RAM or encrypted, ideally in some innocuous fashion. There is nothing to recover lost ram contents if you have the chance to switch off. Of course, technology does exist to read your monitor through walls.

http://www.ubuntu.com/getubuntu
 
goheavygo said:
I got arrested. The DEA seized my computers.
I did a 'disk cleanup' and 'defrag' before they took my computers.
They found incriminating E-mails and internet forms. They claim it was in the Temporary Internet Files on my PC.
How can I be sure shit is off my computer.. like this post?
(I'm using hushmail).


I'll look into this for you cause i have buddy that can wipe a comp clean.

Long story short, everything on the comp disappears with no trace (Viruses, data, info, storage, ect, ect.) i'll see how he does it.
 
There is only one guaranteed way and that is to remove and destroy the hard drive. Hard drives arent that expensive anymore, so if your worried I would destroy it and go get a new one.
 
bak4more said:
There is only one guaranteed way and that is to remove and destroy the hard drive. Hard drives arent that expensive anymore, so if your worried I would destroy it and go get a new one.
no you dont have to do that !!!use this program "evidence eliminator" it works like no other .you couldnt find a damn thing on my pc and you also should use this if your really parinod http://www.securstar.com/products_drivecryptpp.php it will encrypt your hard drive and they will never crack it . 124 bitcode encryption it would take them years .............................................
 
1968Charger said:
124 bitcode encryption it would take them years .............................................

hahahaha being in the security industry I can't help but tell you how bullshit that statement is bro... no encryption is completely safe.. including hushmail/cyber-rights etc.. they all run on PGP technology and the NSA has a backdoor into that also. So nothing is safe , just don't commit crimes.

*cough* Eraser *cough* (free also, overrites existing data including individual files upto I believe 18 times with binary = 1010's)
 
Last edited:
Liquid2006 said:
hahahaha being in the security industry I can't help but tell you how bullshit that statement is bro... no encryption is completely safe.. including hushmail/cyber-rights etc.. they all run on PGP technology and the NSA has a backdoor into that also. So nothing is safe , just don't commit crimes.

*cough* Eraser *cough* (free also, overrites existing data including individual files upto I believe 18 times with binary = 1010's)
if thats the case every one would be busted
 
thats why you dont buy this stuff online ... the DEP or some other place will find you or once u get it get rid of ur comp for a while keep it at a friends or another familys house but just do the removeable drives and you should be ok but its too late for u
 
1968Charger said:
if thats the case every one would be busted


lol, you just don't know friend.. They have lots of bigger fish to fry there not out to get the small time buyer , but if they wanted to for WHATEVER reason they have the ability to do so is all im saying and I know the PGP backdoor to be a fact not some made up rumor.

Not trying to cause any beef bro just I know what the truth is and I speak it. This is part of my career field... Security.
 
Yeah there are encryption laws which limit the power of the encryption to be used by a software, mainly I assume so that if the FBI or whatever can still crack it to get info, I would say terr0rist activity would be the main reason, there is always brute force with only takes time In the end, just delete your temporary internet files and cookies regularly and you should be ok. There in IE tools/options ....etc.

If you ever have the worry of your PC being seized, then put in the windows disk and re-install, in the select a partition section, just create and delete it a few times if your really paranoid (may have to restart the install process) then format in NTFS (2k/xp only) a few times too, probably only take a hour or so to get it good.

Data can be retrieve from formated drives, but it is not easy, and you don't get it all and the more you format the less you will find.

As for the whole hushmail thing, it definitley safer to use it, and if they want to use it against you they have to also get a warrent to seize info from the email company you use too and if they wont give it up or there out of country there out of luck on getting emails on you.
 
Liquid2006 said:
hahahaha being in the security industry I can't help but tell you how bullshit that statement is bro... no encryption is completely safe.. including hushmail/cyber-rights etc.. they all run on PGP technology and the NSA has a backdoor into that also. So nothing is safe , just don't commit crimes.

*cough* Eraser *cough* (free also, overrites existing data including individual files upto I believe 18 times with binary = 1010's)
http://www.securstar.com/products_drivecryptpp.php well i use this and the cops couldnt get dick from my hard drive !!
 
Just checked that out, 256bit AES encryption that is pretty damn close to uncrackable, unless there is a program flaw the bruteforce time on that would be months.
 
goliath.jr said:
Harddrives are made up of several layers. When you delete or format something it does not completely erase all layers. So even if you were to format your drive, then lay it on top of a magnet they would still be able to recover some if not most of the data.

If they can get into your account (they can)
And if they can read your encrypted emails (they can)
They can decrypt your emails
They can read your emails

No privacy

Patriot Act + Global Bullying + $$$ = You are Fizzucked my Frizzend.

Best bet is to set up a routine to wipe your drives 2ce a day. Once around 2AM, once around 2PM. They like to come to get you on a Friday when you wont have time to call a lawyer or make bail, will have to sit in jail over the weekend at least.

And as far as email goes, youre only as secure as the dude on the other end. That means, you are totally insecure.

If youre gonna be a bad guy, accept these things. Make each move count and stick and move, stick and move. Have other people do your dirty work and if they get hot or caught, throw them off a bridge or bury them with (bodyweight x 2) in lyme.

There are no small fish. If you are a small fish, you know bigger fish. They would love to lean on a small fish and the fishy family to try to turn them into rats and get the bigger fish. The small fish can do a lot of good for the G-MEN, and Id not consider myself safe if I knew anyone associated with larger fish. Where there are fish, there are rats.

There is a song like that... "Everybody rats... sometime...."

Love always, for everyone...

Tt
 
You gotta rememeber they have HUGE funds, and teams of computer analysts and even past hackers employed by them. They hire the bad guys to do their dirty work.. They are VERY advanced when it comes to computer ghacking, decryption, and recovering lost data. The only TRUE way to prevent data from being recoevred is complete destruction of the HD, but if you do not want to do that, then wipe it, wipe it again, wipe it again, defrag defrag defrag, i'd do it 10 times. DEEP formats, etc

Then copy large volums of software etc back on the drive, because untill you actually WRITE over the space where the data was, there's a good chance it's still there
 
One thing that helps is alternating wipes on the disk. DOD standard is (if I recall correctly, it's been a while) 7 wipes. Each wipe alternates... so the first wipe is writing all 0's, the second is all 1's, the third is 010101.... the fourth is 101010..., the fifth is random 0's and 1's, etc.

The idea is that you write so much random bullshit that it makes is extremely difficult -- if not impossible -- for the other guy to sort through it all and extract the information they want.

Pro: Extremely effective method at destroying data.
Con: Blows away the entire disk and depending on CPU speed, drive speed, and drive size, it can take 8 hours or more.

Not really an effective method in the heat of the moment. As others have said, the best thing you can do is combine data wiping methods with physical destruction of the drive. You might not succeed in destroying all the data, but you can sure as hell make it a nightmare for anyone to work on.

This is a topic I'm familiar with because I used to work for a computer consulting firm where one of our tasks was to take old government computers with sensitive information (SSNs, banking information, etc) and thoroughly annihilate the data before disposing of the computers.


(This isn't intended to help anyone thwart legal efforts and investigations, but to ensure personal privacy and security in a very insecure environment)
 
This is retarded, they don't spend this kind of money on finding people buying juice, they will have a guy to search through your history and maybe do a deleted data recover with a 3rd party program and thats about tops.
Everyone is talking like its a national security issue or something, there not gonna send your pc to a top level data recovery center and hook it up to super encryption crackers they really don't care that much. There is a back log of more important things to take care of I am sure.
 
PGP isn’t secure since they were sold. The windows based version that worked on Windows 2000 (doesn’t work with XP) is hackable. The first time my systems were seized they broke into a few PGP files. They at least said they did and told me what they were about anyway. I am not sure 100% if they were just reading off the temp directory.

I use evidence eliminator and set the swap file to be deleted every time. If the big boys are looking at you and they have your system you are fucked either way. The PC info just gives them more to hold over your head.

I beat the assault with firearm bullshit, but got clipped on some computer misdemeanor charge. Thank God the warrant got thrown out.

Now I just keep a loaded 45 next to the machine. The wife has instructions too. Someone crashes in, point right here, pull trigger 10X. Also, they better yell POLICE real loud or they’ll be a real party!

Your wife must be a big woman to handle a .45 and if the police come in im sure they are gonna be finger on the trigger if they here 10 rounds of .45 go off...this might be the stupidest thing ive ever heard of.
 
The folder Temporary Internet Files, generally located in C:/Documents and Settings/"User Name"/Local Settings/Temporary Internet Files does contain most of what you see in your internet browser. This files are collectively known as the internet cache. There is also a list of sites visited/activities that windows saves, as part o your "Internet History". Both of these, as well as Internet cookies, which consists of personal or machine related information that a website can use to identify users can be found and deleted in Internet Explorer 7 by clicking Tools in the File menu at the top, then selecting Delete Browsing History. Select all applicable options and delete them. Also, when you delete anything, basically, you are deleting only the record in windows that the file is still present, which allocates the space on the hard disk that was occupied by the file or files as free space, meaning it is available to write information over those physical locations where the files used to be. It is very simple to go in and do a physical search for any and all files that have been on the hard drive, and recover them, even after they have been deleted. For this reason, you should occasionally do a "secure wipe" of the hard drive. This ca be performed with any number of third party application, from Symantec or Norton System Works, to Iolo Technologies, Drive Scrubber(which is the one I use). With these applications you may securely delete any and all traces of a file, including records that the file or files ever existed on the system, by deleting the information and overwriting it with random data a number of times. Once this action has bben performed, you may also use the application to overwrite the free space on the hard drive, which is an equally important step. Remember, the more times you overwrite the information, the less likely it will be that the data can be recovered. Therefore, set your application to overwrite at least three times, preferrably 7, as this method is US government standard and virtually ensures that data cannot be recovered by either software, nor most hardware means. Hope this helps.
 
goheavygo said:
I got arrested. The DEA seized my computers.
I did a 'disk cleanup' and 'defrag' before they took my computers.
They found incriminating E-mails and internet forms. They claim it was in the Temporary Internet Files on my PC.
How can I be sure shit is off my computer.. like this post?
(I'm using hushmail).

I am almost sure they really do have your information but for other people that might think they need to clean information off there harddrive
you can use a WIPE utility and select any of this methods:

WIPE with ZEROES
WIPE with PSEUDO random Algorithms
WIPE with Standard of DOD 5220.22
WIPW with Standard of DOD 5200.28

Standard 5220.22 wipe the data 3 times!
Standard 5200.28 wipe the data 7 times!

And you can even use more HARDER and PRO methods like the Peter Gutman option! This deletes the data with special algorithms with 35passes!

This puts the data in a so hard state its mostly impossible to recover!!! (i believe even Agencies, Goverment countries, Special firms, etc) will require too much money, technology, high-tec expererienced people and too much time to TRY recovering data from hard disk deleted with this options

You can get this software from http://www.cs.auckland.ac.nz/~pgut001/
I believe it is free. I recommend this to anyone that has something to hide!!
 
Status
Not open for further replies.
Top Bottom