Published Papers

What Happens When You Overwrite Data?

Drive technology is set to change in the near future with patterned media (which uses a single pre-patterned large grain per bit)1. It is this type of technology, which will soon allow us to...

Published on: 2009-02-04

Topic: Information Security

Spin-Stand Microscopy of Hard Disk Data

I shall be posting a series detailing the additional data not included in the paper [1] on recovering overwritten data in the following weeks.

Published on: 2009-01-28

Topic: Digital Forensics

Data Recovery: ECC Data and Recovery

One of the misconceptions that is held concerning the recovery of data following its being overwritten is that the modern ECC (error-correction codes) used in hard drives will enable the data...

Published on: 2009-01-26

Topic: Information Security

Overwriting Hard Drive Data

This post is based on a paper I published in December last year; "Overwriting Hard Drive Data: The Great Wiping Controversy" by Craig Wright, Dave Kleiman and Shyaam Sundhar R.S. as presented at...

Published on: 2009-01-15

Topic: Hardware

Searches and the US 4th Amendment

In much of the common law world (including the USA, UK, Canada, NZ and Australia), law enforcement needs to obtain a legal authorization in order to search and seize evidence. Generally, this...

Published on: 2008-12-22

Topic: Constitution

Overwriting Hard Drive Data: The Great Wiping Controversy

Often we hear controversial opinions in digital forensics on the required or desired number of passes to utilize for properly overwriting, sometimes referred to as wiping or erasing, a modern hard drive.

Published on: 2008-12-16

Topic: Digital Forensics

Current Issues in DNS

There are many ways to attack DNS. Attacks range from denials of service (DOS) to man in the middle (MiTM) to spoofing. The recent inclusion of Unicode entries into DNS may mean a site that looks...

Published on: 2008-12-05

Topic: Developer

Download Paper

Sisyphus Impenitent

A reflection. A trilogy of competing stresses in a realm that calls for control and submission of its own absurdity and yet forbids at the same time. It seems to be an endless diorama of plays...

Published on: 2008-10-30

Topic: Literature

Download Paper

Hex Dumping Flash From a Mobile

Most mobile phone manufacturers sell or provide tools allowing for the management of data. There are some exceptions with the very low cost devices. The problem that arises is that few of these...

Published on: 2008-09-03

Topic: Digital Forensics

Bitcoin: A Peer-to-Peer Electronic Cash System

A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without the burdens of going through a financial institution. Digital...

Published on: 2008-08-21

Topic: Bitcoin

Download Paper