Re: [TSCM-L] {1409} Re: {1406} Harddisk destroy in les then 30 sec ?

From: James Greenwold <b..._at_charter.net>
Date: Thu, 22 Mar 2007 08:27:34 -0600

>From - Sat Mar 02 00:57:18 2024
Received: by 10.36.33.8 with SMTP id g8mr231479nzg.1174535128924;
        Wed, 21 Mar 2007 20:45:28 -0700 (PDT)
Return-Path: <reginal..._at_hotmail.com>
Received: from bay0-omc2-s26.bay0.hotmail.com (bay0-omc2-s26.bay0.hotmail.com [65.54.246.162])
        by mx.google.com with ESMTP id y6si1092529nzg.2007.03.21.20.45.28;
        Wed, 21 Mar 2007 20:45:28 -0700 (PDT)
Received-SPF: pass (google.com: domain of reginal..._at_hotmail.com designates 65.54.246.162 as permitted sender)
Received: from hotmail.com ([207.46.9.216]) by bay0-omc2-s26.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.2668);
         Wed, 21 Mar 2007 20:45:28 -0700
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
         Wed, 21 Mar 2007 20:45:28 -0700
Message-ID: <BAY120-F8FFC888C3B93643F98CC6846B0_at_phx.gbl>
Received: from 207.46.9.251 by by120fd.bay120.hotmail.msn.com with HTTP;
        Thu, 22 Mar 2007 03:45:24 GMT
X-Originating-IP: [74.106.212.207]
X-Originating-Email: [reginal..._at_hotmail.com]
X-Sender: reginal..._at_hotmail.com
In-Reply-To: <0703212251240.30508_at_somehost.domainz.com>
From: "Reginald Curtis" <reginal..._at_hotmail.com>
To: TSCM-L2006_at_googlegroups.com
Cc: garya_..._at_hotmail.com
Bcc:
Subject: RE: [TSCM-L] {1410} Re: Harddisk destroy in les then 30 sec ?
Date: Thu, 22 Mar 2007 03:45:24 +0000
Mime-Version: 1.0
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-OriginalArrivalTime: 22 Mar 2007 03:45:28.0125 (UTC) FILETIME=[88200ED0:01C76C34]
Return-Path: reginal..._at_hotmail.com

<html><div style='background-color:'><P>&nbsp;</P>
<P>.............................</P>
<P>Just a comment on the explosive route. I believe something could be cons=
tructed fairly easily using the explosive bolt sytem which is built into&nb=
sp;many walls, doors and windows when/where rapid egress may be required. T=
hese&nbsp;are similar to the system that is/was used on aircraft ejection s=
eats. These are electically fired and the last I heard, extremely safe.&nbs=
p; I don't think that acquiring them would be a problem, provided someone o=
n the project was suitably certified.</P>
<DIV>
<DIV><FONT color=#ff0033><STRONG>Reg Curtis/VE9RWC</STRONG></FONT></DIV><=
/DIV>
<BLOCKQUOTE style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #a0c=
6e5 2px solid; MARGIN-RIGHT: 0px"><FONT style="FONT-SIZE: 11px; FONT-FAMI=
LY: tahoma,sans-serif">
<HR color=#a0c6e5 SIZE=1>
From: <I>Thomas Shaddack &lt;t..._at_shaddack.mauriceward.com&gt;</I><BR>Reply=
-To: <I>TSCM-..._at_googlegroups.com</I><BR>To: <I>TSCM-L Professionals List &=
lt;TSC..._at_googlegroups.com&gt;</I><BR>Subject: <I>[TSCM-L] {1410} Re: Hardd=
isk destroy in les then 30 sec ?</I><BR>Date: <I>Thu, 22 Mar 2007 03:16:12 =
+0100 (CET)</I><BR>&gt;<BR>&gt;<BR>&gt;The JMA's solutions are potentially =
unreliable. There has to be a<BR>&gt;considerably fine mechanics involved, =
and the hard drive has to be opened,<BR>&gt;potentially contaminating the p=
latters with dust and gravely impairing<BR>&gt;reliability.<BR>&gt;<BR>&gt;=
<BR>&gt;<BR>&gt;First some flashy bangy testosterony ideas.<BR>&gt;<BR>&gt;=
<BR>&gt;<BR>&gt;If I remember correctly, a standard procedure for disk dest=
roying in the<BR>&gt;field when a unit is about to be captured by the enemy=
 is shooting through<BR>&gt;the disks with tactically important
information from a handgun.<BR>&gt;<BR>&gt;A way to quite thoroughly destro=
y the disk plates and render them<BR>&gt;unreadable against any sane budget=
 level could be therefore multiple<BR>&gt;perforations inflicted by eg. a p=
oint-blank shotgun blast.<BR>&gt;<BR>&gt;I hereby propose an arrangement of=
 several (4 to 8?) shotgun shells,<BR>&gt;electrically triggered (independe=
ntly, for higher reliability), located in<BR>&gt;a circle over the disk pla=
tes in steel pipes of a suitable length<BR>&gt;(calculate or test for the b=
est spread pattern) acting as short barrels.<BR>&gt;Once triggered, a storm=
 of metal pieces goes through the plates, shredding<BR>&gt;the magnetic lay=
er and deforming the plates.<BR>&gt;<BR>&gt;The enclosure has to be specifi=
ed from sufficiently bullet-resistant<BR>&gt;material (armor? concrete?) so=
 there is no chance of the projectiles to<BR>&gt;escape. There also has to=
 
be a set of reliable interlocks blocking the<BR>&gt;firing circuits if the =
enclosure is opened, to ensure safety of the<BR>&gt;operator and eventual c=
ontractors. This is also why I would caution<BR>&gt;against using mechanica=
l firing system with springs.<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;A variant of t=
he construction may use a shaped charge that cuts the disk<BR>&gt;plates to=
 pieces in under a microsecond. Again, we do not have to open the<BR>&gt;di=
sk itself (as the charge will cut through the housing), therefore we do<BR>=
&gt;not impair its reliability nor warranty. Interlocks are again strongly<=
BR>&gt;advised for. A suitable explosive with required long-term stability =
and<BR>&gt;guaranteed reliability is however unlikely to be found on open m=
arket.<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;A speculative possibility is flooding=
 the disk with an acid or other<BR>&gt;corrosive chemical that dissolves
the magnetic layer. The catch here is<BR>&gt;that it has to be tested with =
the same brand/type of the disk, as while<BR>&gt;the layers are usually bas=
ed on acid-soluble metal oxide, they are<BR>&gt;frequently coated with a po=
lymer or glass for protection and increased<BR>&gt;lifetime; this layer may=
 be too resistant to the acid. A suitable mixture<BR>&gt;of the chemicals t=
hen has to be used which attacks the protective layer<BR>&gt;(hydrogen fluo=
ride for glass, organic solvents for polymers?). I am also<BR>&gt;not certa=
in how long the acid eating would take; 30 seconds is quite short<BR>&gt;ti=
me. More time can be gained by putting the disk into an enclosure with<BR>&=
gt;some minimal guaranteed disassembly time, which buys longer time for<BR>=
&gt;eating the plates. The disadvantage here is that we have to dehermetize=
<BR>&gt;the disk; they however typically have protective stickers over some=
 
holes,<BR>&gt;which may serve for convenient entry point for the acid. Ther=
e is also the<BR>&gt;problem of finding a suitable valve - most acids and s=
olvents are volatile<BR>&gt;and their vapors are highly corrosive, with the=
 corresponding impact on<BR>&gt;disk reliability. A rupture disc made of gl=
ass or a suitable polymer<BR>&gt;(teflon?) that gets pierced or shattered w=
ith a small explosive charge (a<BR>&gt;blank round?), or melted through wit=
h a small heating element, or pierced<BR>&gt;mechanically, may find an empl=
oyment here. Storing the acid/solvent in an<BR>&gt;elastic bag pressurized =
with a spring to make sure the content will flow<BR>&gt;out in a desired ti=
me may be an advantage.<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;Now somethin=
g less noisy and more practical.<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;Another pos=
sibility is avoiding hazardous materials entirely and encrypt<BR>&gt;the
disk with a 256-bit AES, making bruteforcing highly impractical and<BR>&gt;=
converting the problem of destroying an entire disk into destroying just<BR=
>&gt;some 32 bytes. Then store the key in a SRAM that can get electronicall=
y<BR>&gt;erased. It would be needed to occassionally swap the bits in the S=
RAM to<BR>&gt;prevent their "burn-in" (eg. each second or ten invert all by=
tes of the<BR>&gt;key, and remember if the key is stored plain or inverted)=
. Make the device<BR>&gt;tamper-sensitive so an attempt to open the dongle =
or enter a wrong<BR>&gt;key-unlocking PIN too many times will lead to zeroi=
ng of the key. Realize<BR>&gt;the disk encryption either in hardware (eg. w=
ww.opencores.org contains<BR>&gt;open-source implementation of AES for an F=
PGA, allowing design of a<BR>&gt;pass-through IDE module), or in software (=
eg. using Linux with a suitably<BR>&gt;hacked bootloader, or booting from=
 
ROM with code that asks the key storage<BR>&gt;module for the disk key and =
then loads the OS).<BR>&gt;<BR>&gt;This method also allows a wider security=
 margin, as the key may be stored<BR>&gt;off-site in a suitable backup (per=
haps concealed, perhaps in an escrow in<BR>&gt;a suitable jurisdiction, per=
haps split between several people in a m-of-n<BR>&gt;scheme). This also all=
ows repeated testing of the assembly, the OS, and a<BR>&gt;key-destruction =
trigger (which may be also linked to a burglar alarm<BR>&gt;system, denying=
 disk access if a forced entry attempt to the room with the<BR>&gt;secured =
machine is detected) under conditions of a simulated attack.<BR>&gt;<BR>&gt=
;The key has to be truly randomly generated (a hash of couple seconds of<BR=
>&gt;noisy audio?). To generate a 256-bit hex key of a decent strength we c=
an<BR>&gt;use eg. this line of code (assumptions: Linux, noisy audio of
suitable<BR>&gt;level at /dev/dsp):<BR>&gt;for x in 1 2; do dd if=/dev/ds=
p bs=512 count=1 2&gt;/dev/null | md5sum |tr -d '\n -'; done<BR>&gt;<BR=
>&gt;(explanation: dd reads one block of 512 bytes from /dev/dsp (the sound=
card<BR>&gt;input - has to be selected and set to suitable signal strength,=
 so it<BR>&gt;gives nonrepeating analog data; the noisier the sound is, the=
 better). The<BR>&gt;md5sum then turns the not-entirely-random data into a =
hash of 16 bytes<BR>&gt;(128 bits) length, increasing the per-bit entropy b=
y so called whitening.<BR>&gt;MD5 is a broken hash function, however this d=
oes not really matter in this<BR>&gt;application. The md5sum output is then=
 stripped from spaces and separators<BR>&gt;and end-of-lines. The operation=
 is repeated twice, to get 256 bits of key.<BR>&gt;You can substitute any o=
ther hash functions or entropy sources, as your<BR>&gt;conditions, applicat=
ion,
and level of paranoia requires.)<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;Here we can=
 also build the disk as a network-attached storage, and access<BR>&gt;the d=
ata from a remotely booted diskless station. This way no data are<BR>&gt;pe=
rmanently stored in plaintext form. The RAM is cheap, so no swap should<BR>=
&gt;be needed for common operations.<BR>&gt;<BR>&gt;<BR>&gt;Some common pit=
falls:<BR>&gt;* Unencrypted swapfile. Don't use it or place it on the encry=
pted disk.<BR>&gt;* Intercepted plaintext data. Encrypt data transfers, or =
do not do them.<BR>&gt;* Compromised key storage. Correctly handle physical=
 security and erase<BR>&gt; trigger device reliability.<BR>&gt;* Compromise=
d hardware. Solve by good physical security of the place where<BR>&gt; the =
hardware is located. Do not forget uncommon entry points, eg.<BR>&gt; throu=
gh walls, floor, or ceiling.<BR>&gt;* Electromagnetic emissions of
plaintext data. Use TEMPEST shielding of<BR>&gt; the hardware or a shielded=
 room. Uncommon unless dealing with top-budget<BR>&gt; adversaries.<BR>&gt;=
* HUMINT and PSYOPS. Targetting the operators. Tough to solve, a most<BR>&g=
t; likely attack vector.<BR>&gt;* Murphy. The one underestimated attack vec=
tor that you forgot and that<BR>&gt; gets you.<BR>&gt;<BR>&gt;<BR>&gt;<BR>&=
gt;<BR>&gt;The later mentioned solid-state Flash-based disk has advantages =
(fast<BR>&gt;erase) and disadvantages (relatively small space in comparison=
 with 750 GB<BR>&gt;hard drives currently available, necessity of having el=
ectrical power<BR>&gt;available in order to erase the data - the destructiv=
e devices can be<BR>&gt;battery-backed to activate, the SRAM memory for cry=
pto key requires power<BR>&gt;to operate). Both disadvantages can be worked=
 around by having a dedicated<BR>&gt;battery-operated erase unit (IDE
commands can be implemented on a<BR>&gt;microcontroller) and by waiting for=
 new higher capacities (the development<BR>&gt;here goes *FAST*). Also, if =
it gets stolen or lost, the data stay in<BR>&gt;plaintext.<BR>&gt;<BR>&gt;<=
BR>&gt;Opinions, comments?<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt;<=
BR>&gt;On Wed, 21 Mar 2007 cont..._at_yahoo.co.uk wrote:<BR>&gt;<BR>&gt; &gt;<=
BR>&gt; &gt; .<BR>&gt; &gt;<BR>&gt; &gt; Someone asked me...if i know a way=
 to destroy<BR>&gt; &gt; a harddisk (contents) in under 30 seconds.<BR>&gt;=
 &gt;<BR>&gt; &gt; I suppose...he wants a harddisk in some housing/box,<BR>=
&gt; &gt; ofcourse itīs connected to his computer,<BR>&gt; &gt; when the =
moment arrives he pushes a button or activates<BR>&gt; &gt; some lever...an=
d in under 30 seconds all contents become<BR>&gt; &gt; unreadable forever (=
guaranteed)<BR>&gt; &gt;<BR>&gt; &gt; Anyone know if something like that is=
 
available ?<BR>&gt; &gt;<BR>&gt; &gt; If not...could i built something like=
 that myself ?<BR>&gt; &gt; the client wants to buy a few of such units.<BR=
>&gt; &gt;<BR>&gt; &gt; Overwriting/formatting takes to long...and does not=
 erase 100%.<BR>&gt; &gt;<BR>&gt; &gt; Wich other technics would work ? Mag=
nets ? Acid ? E.M.P.?<BR>&gt; &gt; how to implement that in a sellable unit=
 ?<BR>&gt; &gt;<BR>&gt; &gt; Thanks !<BR>&gt; &gt;<BR>&gt; &gt; Radiotechsc=
an<BR>&gt; &gt;<BR>&gt; &gt;<BR>&gt; &gt; &gt;<BR>&gt;<P></FONT></P></BLOCK=
QUOTE></div><br clear=all><hr>One Care: <a href="http://g.msn.com/8HMB=
ENCA/2734??PS=47575" target="_top"> free Trial Version Today!</a> </htm=
l>

Received on Sat Mar 02 2024 - 00:57:18 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:44 CST