Data Recovery & Solid State 249
theoverlay writes "With all of the recent hype about solid-state drives in both consumer applications and enterprise environments I have a real concern about data recovery on these devices. I know there are services for flash memory restoration but has anyone been involved in data restoration projects on ssd drives? What are the limits and circumstances that have surfaced so far? What tools will law enforcement and government use to retrieve data for investigations and the like?"
Such tools as... (Score:5, Funny)
Waterboarding, tasers, sleep deprivation, bright lights and loud obnoxious music.
Re:Such tools as... (Score:5, Funny)
Re:Such tools as... (Score:5, Funny)
Re:Such tools as... (Score:5, Funny)
Re:Such tools as... (Score:4, Funny)
Re: (Score:2)
can you erase your disk? not really, not fast enough.
you can grind cd/dvd roms - they make paper shredders that take opto discs.
much better though: a hammer smashing a usb key drive! no amount of 'forensics' can recover broken silicon chips.
there you go - anti-spook protection should you need it. afterall, its a dangerous world out there. many 'people' mean you harm.
Re: (Score:2)
i would never agree that "no amount of 'forensics' can recover broken silicon chips"
sure it might be hard.. but it is still more than possiable - the trick is how much is it worth to the person/people trying to get the data back.
i was trying to find a better artical where they went over how ontrack recovered 90+% (don't remember exactly) from the drives on the 2003 shuttle that turned into a fireball and shreaded..
i se
Tools Depend on Who's Attacking You (Score:3, Insightful)
Law enforcement organizations aren't going to waterboard you, which would be against the law, though they might have fun tasing you. And courts have simpler methods - they issue you a subpoena that says to turn over any information you've got, and can make you sit in jail or pay heavy fines for not handing it over, or if it's a civil la
Honk! Honk! (Score:3, Funny)
Re:Honk! Honk! (Score:4, Informative)
Re:Honk! Honk! (Score:5, Informative)
Re:Honk! Honk! (Score:5, Funny)
Re: (Score:3, Interesting)
Re:Honk! Honk! (Score:4, Insightful)
Re: (Score:3, Insightful)
Re: (Score:2, Informative)
Re: (Score:2)
Re:Honk! Honk! (Score:4, Interesting)
Is it overkill? Certainly. But apparently 3 passes isn't considered enough.
Now, a simple overwrite is considered sufficient for flash, so we do have some standards.
Re: (Score:2)
Re: (Score:2)
Re:Honk! Honk! (Score:5, Informative)
Here's the relevant part of new epilogue:
Re: (Score:3)
I _guess_
Re: (Score:2)
because while i can clearly see that being possible with zeroes, overwriting with random source doesn't look such a likely candidate for recovery.
now, if i had some information i would like to be really gone, i'd probably use
Re: (Score:3, Informative)
not impossible (Score:2)
Re:not impossible (Score:4, Interesting)
WHAT?!!!! I'm hoping I'm parsing your sentence incorrectly because any hard drive subjected to thermite becomes nothing but a puddle of molten then solidified metal.
What I'm hoping you meant to say was that even though the hard drives in our surveillance plane had been subjected to thermite, parts of the drives remained intact enough so the data on the unmelted parts could be retrieved despite the data also having been overwritten.
Allow/Deny?
Re: (Score:2)
[Citation Needed] (Score:3, Informative)
Any ferrous material brought above the Curie Point [wikipedia.org] is no longer magnetic, and looses any magnetism it had prior to heating. You can test this yourself with a magnet, a butter knife and a blowtorch. No matter what combination of iron and impurities your drive surface has, its Curie Point is easily below the temperature of molten iron - the product of your thermite reaction.
So even if the discs were heated by thermite, rather than just plain destr
Re: (Score:2)
I would love to experiment with that one... =-)
Re:Honk! Honk! (Score:4, Insightful)
I recover deleted data WITHOUT a clean room or disk disassembly process on a nigh-daily basis. There are plenty of software tools that will recover data post-format, deletion, or crash; some even after multiple passes. Just yesterday I recovered about 3.4GB of data from a hard drive (that I didn't know at the time was failing with bad read-heads that were pinging the disk surface and creating physically-bad sectors) that had been reformatted (full format, not quick) and re-installed. The particular sequence of apps and methods I used enabled me to recover almost all the important docs on the machine minus a handful of unrecoverable files in the physically failed sectors. The disk later crashed again after the recovery, which was when I discovered the drive was failing. The MFT and MBR were completely shot and most bootable diagnostic applications listed the disk as unreadable. Others would attempt to read the disk but showed no data, even some tools that are supposed to seek data outside the MBR by examining individual clusters. Once again by using the right tools in the right sequence, I am, as I write this, recovering data from the disk yet again (this time as a slave drive in another machine, backing up to a known good archive drive)... Looks like I'm once again going to get all the data but another handful of files that were stored on physically damaged sectors.
So, no one is pandering - please to know what you're talking about first... Yes, my ability to recover data via software tools extends even to many (but not all) software applications that are supposed to securely and irrevocably destroy data. Also, if you're insistent about staying off-topic in regards to data-destruction in the face of law enforcement, not only are all the software methods you might use to destroy data far too slow, but chances are they just won't do the trick. This was a giant concern for the U.S. Air Force after the collision of a P-3 Orion with a Chinese fighter jet, where it was forced to land in China, and NONE of the data destruction techniques available to the crew were remotely sufficient to destroy enough data in the time available to them, but even if they had been, chances are a devoted enough analyst with the proper equipment and time still would have been able to recover more data than desirable (which, since it was all highly classified, means any data at all) outside of explosives, which they had, but are not generally a good idea to detonate on the inside of a flying aircraft. Since then the U.S.A.F. has developed a method of data destruction that utilizes what is essentially a modified medical defibrillator with a somewhat greater total output and replacement of the standard shock paddles with high-strength electromagnets that are placed on both sides on the drive and then discharged, functionally flipping the polarity of the entire disk and destroying all lingering magnetically resonant harmonics.
A dedicated and determined analyst with the right tools and time can recover vast quantities of data on disk subject even to a "military format"... Modern drives and recording techniques have nothing to do with anything in this regard. The only fool-proof way is massive electromagnetic discharge, incineration or to sand or otherwise physically damage the platters themselves... To quote 'Zerth' from above, "Fe2O3+2Al is your friend." Nothing will do the job quite as readily as Thermite, however it obviously presents it's own issues... especially since setting it off to erase your hard-drives before the authorities arrive is almost certain to earn you a large number of other very serious criminal charges, and liable to burn your home or office down; it's also hard to get the stuff to ignite reliably sometimes.
I'd STILL like to hear an answer to the actual question put forth in the article... We all know that hard disks can be disassembled and forensically recovered in the case of serious failure or attempted data destruction... But a
We liked Sandblasting our RM05s (Score:3, Informative)
Our disk drives were RM-05s, whi
Re: (Score:3, Funny)
Why isn't this method on the market yet ?
Re:Honk! Honk! (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
The drive used every other cylinder with the idea of one day doubling density of the drive with the addition of a jumper wire on the track counting circuit. Well the zero track sensor was defective and so the disk was formatted twice with each interleaving the other as the first f
Re:Honk! Honk! (Score:4, Informative)
You my anonymous friend, are a no good, stinking liar. There is no software method for reading the magnetic flux levels of the bits of a hard drive as obviously the drive firmware interprets that data itself and present the 1 or 0 to you, and you do not have an ETM that can be anything like precise enough for the density of modern hard drives, and even if you did how quickly could you read the data and what could you do with it? The bits are essentially stored as analogue data so apart from what the current setting is supposed to represent (1 or 0) how do you propose to get any useful information about the history of that bit?
I can believe you recover data from drives people think they have "wiped", but if I overwrite every bit on my hard drive with garbage you are not going to get anything but garbage from it.
Re: (Score:2)
Yes, that is the common myth. And some say it is theoretically possibly. But nobody has ever published anything that I am aware of showing it actually being done. Can you point to reports of anyone actually do it? Anyone sell these "special readers?"
That said, i think i
Re: (Score:3, Insightful)
Re:Honk! Honk! (Score:5, Insightful)
Re: (Score:3, Interesting)
Re: (Score:2)
Re:Honk! Honk! (Score:4, Informative)
Re: (Score:2)
Re:Honk! Honk! (Score:5, Funny)
There is a good proof-of-concept available (but it currently works only for wives) that could probably be easily enhanced to implement the mother-in-law eraser function (actually, perhaps it's already there, I've not used Reiser4 much).
Re:Honk! Honk! (Score:5, Interesting)
Think hanging chads, but on a much larger scale.
You get to pull the disks, and start walking them with an electron microsocope looking for the 'residual' images. Then you get to make a guess as to the 'bit' being a 1 or a 0. Then you get to start assembling a filesystem on top of all of that.
Yes, it is possible, but it would take a very, very long time.
Generally speaking, overwriting the data _once_ is enough to tormet your local law enforcement agency. The level of effort required is just too much for them to deal with the issue given the other things that they need to do. (rumor has it that in the old days they could just modify the firmware to shift the drive heads over a touch, but that trick does not appear to work as much with newer drives since there is not much space between tracks anymore)
The reason that the Military/NSA/FBI/CIA want to actually destroy the disks is because even though it is _difficult_, it is still _possible_ to recover the data.
Please note that for this to work, you must overwrite the actual sectors on the disk (aka "wipe"), not just blow away the metadata (aka "delete")
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:2)
Which is easier:
Run this application, selecting the entire drive, following these procedures, bla, bla, bla
_or_
Smash drive into little bits
Now, you also have to take the 'fun' factor into it while you are at it. Smashing the drive is a lot more fun
Re: (Score:2)
Re: (Score:3, Interesting)
That's the tricky bit. Any hard drive built in the last ten years or so won't actually write ones and zeros to the disk, but uses something like QAM to pack even more bits per symbol on. Think in terms of one nybble being represented as an analogue value from 0 to 15 - was that 6 really a 6, or is it a faint 7? Or was it a 5 that wasn't particularly strongly erased?
Overwrite each track once, and the data is gone.
Re:Honk! Honk! (Score:4, Informative)
0->0 = 0
1->1 = 1
1->0 = 0.1
0->1 = 0.9
0.9->1 = 0.99
0.9->0 = 0.09
0.09->1 = 0.909
so you can guess the sequence of transitions from the value.
I know battery-backed RAM can't be recovered that way - it's like it was constantly writing to itself, you'll have a thousand write cycles in matter of miliseconds. I don't know how data is stored in flash though.
Makes you wonder if you could quadruple the capacity of the harddrives that way too.
References please... (Score:2)
I think you just proved to us why your statement is false.
If old data is recoverable, the disk would hold more data.
Re: (Score:2)
Which 'recovery services' are these? Can you reference any authoritative reports of ANYONE recovering a meaningful amount of data even 1 pass deep?
Re:Honk! Honk! (Score:5, Interesting)
For monitors if you wanted to process classified info it was a whole lot of paperwork because with the old CRT's you can read what is on the screen from like 3 blocks away just by the radiation they put out. ditto with Cat5. if you had a classified laptop you would have a short cat5 to a special encryption device, then cat5 out to the datacenter downstairs which had the same encryption device and then it would run out to the servers. NSA said you could read cat5 traffic from like 3 blocks away as well
Re:Honk! Honk! (Score:5, Informative)
Quick and Most Secure Drive Erasing (Score:5, Informative)
Re:Honk! Honk! (Score:5, Insightful)
Except that unlike normal HDDs, SSDs intentionally fragment the data across the drive to avoid writing to a specific section of the drive repeatedly (an attempt to avoid over-writing to the flash). Assuming you don't fill up the ENTIRE DRIVE, your data might very well still be there.
I'd love to ask Ontrack or Drivesavers about it, to be honest.
Re: (Score:2)
But if you delete the file, then for example cat
Lather, rinse, repeat...
So all I have to do is every time I want to delete a file, wait for a 15-319 gig file to write to the drive?
Woo, Thank god I get extra performance out of Solid State Drives.
In all seriousness, working in tech support, I am much less concerned about data security per say and somewhat more about "whoops, my SSD drive died, wonder if I can re
Er, what's the actual question? (Score:3, Insightful)
I'm not sure of the answer to either question, directly, but I'd suggest multiple backups for the first one, and encryption for the second one (full/near-full disk encryption is quite fast on a multi-core system).
Pointless (Score:5, Interesting)
Re:Pointless (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
Re:Pointless (Score:5, Informative)
AFAIK, the only way you get data corruption in a SSD is from power fluctuations causing a bad write.
Re: (Score:2)
What is the Data recovery % for non SSD drives? (Score:2, Insightful)
Re: (Score:2, Informative)
Backup, backup, backup. Those that don't will pay the price. Literally.
Re: (Score:2)
Some people never learn.
Simple (Score:5, Insightful)
Secure erase (Score:5, Interesting)
If your hard drive dies and you don't have a backup, I have very little sympathy for you. You should know better. Especially anyone reading slashdot. Let's get back to our NSA fearing roots and talk about how to protect ourselves with the latest in encryption technology.
Re: (Score:2)
Re:Secure erase (Score:4, Funny)
Re: (Score:2)
Step 2: Verify that the circuits are on seperate phases
Step 3: Rig a cable going from hot 1 to hot 2*
Step 4: Fry circuits using etherkiller type cable@240V
Alternatively, use a dryer socket or something.
*Make sure both circuits aren't GFI, otherwise they'll pop pretty much instantly.
Re: (Score:2)
I use this to zero out drive space on virtual machines, which allows for their virtual drive to be shrunk.
sdelete -p 2 -z -c -s c:\
It's batch scriptable to run in %tasks% nightly.
"Delete implements the Department of Defense clearing and sanitizing standard DOD 5220.22-M, to give you confidence that once deleted with SDelete, your file data is gone forever. Note that SDelete securely deletes file data, but not file names locat
Re: (Score:2)
If someone wanted to (already has?) invent a drive reader for a smashed up Solid State or Disk Platter drive, I'd bet that they could given enough time/money.
From what I understand, this is standard (but not cheap) service at IBAS and such, at least for hard disks. Damaged platters and such would be insane to spin up, they could fly apart and some might be already be so damaged they can't be spun around the axis. Instead they'll open the drive in a cleanroom and bring the reading head to the platter rather than the other way around. A wipe is probably more effective, at least I think IBAS will tell you to forget it if you bring them a wiped drive. What the NSA
Use the gForce (Score:5, Funny)
Google results, which seem rather informative [google.com]
Re:Use the gForce (Score:5, Informative)
Ask Slashdot: When a slashvertisement just won't do, since you've only got yourself to sell.
Its a good thing (Score:2)
If you are concerned about protecting against data loss there are other more effective ways like implementing RAID and maintaining off-site backups.
Datarecovery of SSD drives. (Score:5, Interesting)
We will gladly reverse engineer the data-distribution algorithms that the SSD device uses on a case-by-case basis. We have done so in the past for several different USB sticks. We will desolder and read the individual data-holding chips and then reverse engineer their scrambling algorithms. We will then recover your data from whatever chips still work sufficiently to provide us with some data.
The first time this will take us a few days extra. Expect about a week turnaround time the first time anyone sends us a failed SSD disk.....
Re: (Score:2)
What does this cost, compared to recovery from conventional hard drives??
Destroying sensitive data (Score:4, Insightful)
The damage microwave radiation causes to the data on the DVD extends beyond visible damage to the metal layer. That is to say that, even though it may seem like there are undamaged areas left on the DVD's surface, they are still unreadable. And it only takes 2-3 seconds to completely destroy a whole stack of DVDs, if they are arranged in a microwave with some space between them. Rewriting a hard drive with multiple passes may take hours and still leaves a possibility that some data may be recovered.
It seems to me that with SSD data recovery should work better than with conventional hard drives. You may need to overwrite the entire disk multiple times, as opposed to overwriting just the selected data, as you would with a conventional hard drive.
Re: (Score:3, Funny)
Telling the gov't why your HDD was in the microwave might be a little trickier...
Re: (Score:2)
Yes, but what does a microwave do to a HDD? Of course, the HDD does have the reverse damage feedback spell enabled, so it will probably kill the microwave too, but if you were in a hurry to kill sensitive data, that's a risk I'd take...
Little to none, I'd wager. Oh, you might manage to melt the circuit board a little but the platters will probably do just fine, at the very least you'd need to open the HDD and expose the platters to the microwaves directly. I don't think that either would work, but in any case that certainly rules out any kind of fast erasure.
The real danger is a loss of recovery companies... (Score:2)
I've encountered a nearly a dozen hard drive and micro-drive failures in recent years. Meanwhile, I have experienced only one partial failure of a flash device - it had a bad sector. I could extract all the rest of the data except for the file written in that sector of a 512mb Compact Flash card. So it was merely a partial loss and very small percentage. While this was enough to lead me to cease using this card,
Re:The real danger is a loss of recovery companies (Score:3, Informative)
I have a few thoughts on this matter and will post them in point form:
1. The elimination of the clean room?
- For obvious reasons, the necessity of a clean room for solid state devices will be drastically reduced. However, due to the price and size constraints, I don't foresee the elimination of th
the effect of wear-levelling on recoverability? (Score:3, Interesting)
Let's say you have had your SSD for awhile, and some data is in areas that subsequently get marked as 'bad'. You 'format' your SSD clean, but does the format change those marked-bad bits? If not, just because they cannot be written to, doesn't necessarily mean they couldn't be READ from by some utility that ignores the marked-bad flags, in theory. So, is it possible for an SSD to have data recoverable from 'marked bad' areas, that might even pass a format/multi-write randomizing utility? Something to think about. Hopefully someone knows the answer...
Re: (Score:2)
You are correct. Hard disks have the same kind of feature I believe.
The manpage for shred (*nix utility that erases files "securely" by writing random data several times) warns about this problem if I remember correctly.
You may also find Truecrypt's documentation interesting, they list features (such as disk paging) that may cause data in RAM to be written to hard disks. They could then fall in the spare sectors and survive your efforts to shred the hard disk (computing the probability of such an event s
Re:SSDs have one infallible data recovery option (Score:5, Informative)
Re:SSDs have one infallible data recovery option (Score:5, Funny)
You can completely and unretrievable wipe data from both paper and disk drives. With paper, shredding is no good but a single match or Bic will do the trick. Cheaper than a shredder, too. With a disk drive, just disassemble it and sand off all the oxide. Or alternatively, if you have a smelter or other really really hot mass of molten metal, you can just drop the thing in there. The smelter option works for CDs and tape as well.
Or you can bury it in the bridge abutment your construction company is building with tax dollars, right next to Jimmy Hoffa.
Oh oh, am I on my way to Gitmo now?
-mcgrew
(still no journal although the last one was updated Friday. Mod me down for this?)
fire insufficient in and of itself... (Score:3, Interesting)
I've actually held bits of ash with legible writing still on it. I was burning old checks for my parents.
I wouldn't count it destroyed until the ashes are stirred well.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The issue isn't just 'how do I recover data' it's also 'how do I erase it permanently'
In my experience, you can recover anything that hasn't been overwritten on a flash drive with most recovery programs.
Keep in mind, that even if you've "erased" your files, not all wipe/erase programs will delete the file & folder names from your drive. Programs like DirSnoop can recov
Re:SSDs have one infallible data recovery option (Score:5, Informative)
Re: (Score:2)
SSDs have one infallible data erasure option (Score:4, Insightful)
Trusting data loss to just one delete command is being broken in the head.
Re: (Score:2, Informative)
Re:well that makes it easy (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
Grr, why does everyone reference that paper and just assume it has actually been proven in teh field? That whole paper is just THEORY which has never been show to be practical, as far as I know