>From - Sat Mar 02 00:57:18 2024
Received: by 10.36.33.8 with SMTP id g8mr231479nzg.1174535128924;
Wed, 21 Mar 2007 20:45:28 -0700 (PDT)
Return-Path: <reginal..._at_hotmail.com>
Received: from bay0-omc2-s26.bay0.hotmail.com (bay0-omc2-s26.bay0.hotmail.com [65.54.246.162])
by mx.google.com with ESMTP id y6si1092529nzg.2007.03.21.20.45.28;
Wed, 21 Mar 2007 20:45:28 -0700 (PDT)
Received-SPF: pass (google.com: domain of reginal..._at_hotmail.com designates 65.54.246.162 as permitted sender)
Received: from hotmail.com ([207.46.9.216]) by bay0-omc2-s26.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.2668);
Wed, 21 Mar 2007 20:45:28 -0700
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
Wed, 21 Mar 2007 20:45:28 -0700
Message-ID: <BAY120-F8FFC888C3B93643F98CC6846B0_at_phx.gbl>
Received: from 207.46.9.251 by by120fd.bay120.hotmail.msn.com with HTTP;
Thu, 22 Mar 2007 03:45:24 GMT
X-Originating-IP: [74.106.212.207]
X-Originating-Email: [reginal..._at_hotmail.com]
X-Sender: reginal..._at_hotmail.com
In-Reply-To: <0703212251240.30508_at_somehost.domainz.com>
From: "Reginald Curtis" <reginal..._at_hotmail.com>
To: TSCM-L2006_at_googlegroups.com
Cc: garya_..._at_hotmail.com
Bcc:
Subject: RE: [TSCM-L] {1410} Re: Harddisk destroy in les then 30 sec ?
Date: Thu, 22 Mar 2007 03:45:24 +0000
Mime-Version: 1.0
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-OriginalArrivalTime: 22 Mar 2007 03:45:28.0125 (UTC) FILETIME=[88200ED0:01C76C34]
Return-Path: reginal..._at_hotmail.com
<html><div style='background-color:'><P> </P>
<P>.............................</P>
<P>Just a comment on the explosive route. I believe something could be cons=
tructed fairly easily using the explosive bolt sytem which is built into&nb=
sp;many walls, doors and windows when/where rapid egress may be required. T=
hese are similar to the system that is/was used on aircraft ejection s=
eats. These are electically fired and the last I heard, extremely safe.&nbs=
p; I don't think that acquiring them would be a problem, provided someone o=
n the project was suitably certified.</P>
<DIV>
<DIV><FONT color=#ff0033><STRONG>Reg Curtis/VE9RWC</STRONG></FONT></DIV><=
/DIV>
<BLOCKQUOTE style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #a0c=
6e5 2px solid; MARGIN-RIGHT: 0px"><FONT style="FONT-SIZE: 11px; FONT-FAMI=
LY: tahoma,sans-serif">
<HR color=#a0c6e5 SIZE=1>
From: <I>Thomas Shaddack <t..._at_shaddack.mauriceward.com></I><BR>Reply=
-To: <I>TSCM-..._at_googlegroups.com</I><BR>To: <I>TSCM-L Professionals List &=
lt;TSC..._at_googlegroups.com></I><BR>Subject: <I>[TSCM-L] {1410} Re: Hardd=
isk destroy in les then 30 sec ?</I><BR>Date: <I>Thu, 22 Mar 2007 03:16:12 =
+0100 (CET)</I><BR>><BR>><BR>>The JMA's solutions are potentially =
unreliable. There has to be a<BR>>considerably fine mechanics involved, =
and the hard drive has to be opened,<BR>>potentially contaminating the p=
latters with dust and gravely impairing<BR>>reliability.<BR>><BR>>=
<BR>><BR>>First some flashy bangy testosterony ideas.<BR>><BR>>=
<BR>><BR>>If I remember correctly, a standard procedure for disk dest=
roying in the<BR>>field when a unit is about to be captured by the enemy=
is shooting through<BR>>the disks with tactically important
information from a handgun.<BR>><BR>>A way to quite thoroughly destro=
y the disk plates and render them<BR>>unreadable against any sane budget=
level could be therefore multiple<BR>>perforations inflicted by eg. a p=
oint-blank shotgun blast.<BR>><BR>>I hereby propose an arrangement of=
several (4 to 8?) shotgun shells,<BR>>electrically triggered (independe=
ntly, for higher reliability), located in<BR>>a circle over the disk pla=
tes in steel pipes of a suitable length<BR>>(calculate or test for the b=
est spread pattern) acting as short barrels.<BR>>Once triggered, a storm=
of metal pieces goes through the plates, shredding<BR>>the magnetic lay=
er and deforming the plates.<BR>><BR>>The enclosure has to be specifi=
ed from sufficiently bullet-resistant<BR>>material (armor? concrete?) so=
there is no chance of the projectiles to<BR>>escape. There also has to=
be a set of reliable interlocks blocking the<BR>>firing circuits if the =
enclosure is opened, to ensure safety of the<BR>>operator and eventual c=
ontractors. This is also why I would caution<BR>>against using mechanica=
l firing system with springs.<BR>><BR>><BR>><BR>>A variant of t=
he construction may use a shaped charge that cuts the disk<BR>>plates to=
pieces in under a microsecond. Again, we do not have to open the<BR>>di=
sk itself (as the charge will cut through the housing), therefore we do<BR>=
>not impair its reliability nor warranty. Interlocks are again strongly<=
BR>>advised for. A suitable explosive with required long-term stability =
and<BR>>guaranteed reliability is however unlikely to be found on open m=
arket.<BR>><BR>><BR>><BR>>A speculative possibility is flooding=
the disk with an acid or other<BR>>corrosive chemical that dissolves
the magnetic layer. The catch here is<BR>>that it has to be tested with =
the same brand/type of the disk, as while<BR>>the layers are usually bas=
ed on acid-soluble metal oxide, they are<BR>>frequently coated with a po=
lymer or glass for protection and increased<BR>>lifetime; this layer may=
be too resistant to the acid. A suitable mixture<BR>>of the chemicals t=
hen has to be used which attacks the protective layer<BR>>(hydrogen fluo=
ride for glass, organic solvents for polymers?). I am also<BR>>not certa=
in how long the acid eating would take; 30 seconds is quite short<BR>>ti=
me. More time can be gained by putting the disk into an enclosure with<BR>&=
gt;some minimal guaranteed disassembly time, which buys longer time for<BR>=
>eating the plates. The disadvantage here is that we have to dehermetize=
<BR>>the disk; they however typically have protective stickers over some=
holes,<BR>>which may serve for convenient entry point for the acid. Ther=
e is also the<BR>>problem of finding a suitable valve - most acids and s=
olvents are volatile<BR>>and their vapors are highly corrosive, with the=
corresponding impact on<BR>>disk reliability. A rupture disc made of gl=
ass or a suitable polymer<BR>>(teflon?) that gets pierced or shattered w=
ith a small explosive charge (a<BR>>blank round?), or melted through wit=
h a small heating element, or pierced<BR>>mechanically, may find an empl=
oyment here. Storing the acid/solvent in an<BR>>elastic bag pressurized =
with a spring to make sure the content will flow<BR>>out in a desired ti=
me may be an advantage.<BR>><BR>><BR>><BR>><BR>>Now somethin=
g less noisy and more practical.<BR>><BR>><BR>><BR>>Another pos=
sibility is avoiding hazardous materials entirely and encrypt<BR>>the
disk with a 256-bit AES, making bruteforcing highly impractical and<BR>>=
converting the problem of destroying an entire disk into destroying just<BR=
>>some 32 bytes. Then store the key in a SRAM that can get electronicall=
y<BR>>erased. It would be needed to occassionally swap the bits in the S=
RAM to<BR>>prevent their "burn-in" (eg. each second or ten invert all by=
tes of the<BR>>key, and remember if the key is stored plain or inverted)=
. Make the device<BR>>tamper-sensitive so an attempt to open the dongle =
or enter a wrong<BR>>key-unlocking PIN too many times will lead to zeroi=
ng of the key. Realize<BR>>the disk encryption either in hardware (eg. w=
ww.opencores.org contains<BR>>open-source implementation of AES for an F=
PGA, allowing design of a<BR>>pass-through IDE module), or in software (=
eg. using Linux with a suitably<BR>>hacked bootloader, or booting from=
ROM with code that asks the key storage<BR>>module for the disk key and =
then loads the OS).<BR>><BR>>This method also allows a wider security=
margin, as the key may be stored<BR>>off-site in a suitable backup (per=
haps concealed, perhaps in an escrow in<BR>>a suitable jurisdiction, per=
haps split between several people in a m-of-n<BR>>scheme). This also all=
ows repeated testing of the assembly, the OS, and a<BR>>key-destruction =
trigger (which may be also linked to a burglar alarm<BR>>system, denying=
disk access if a forced entry attempt to the room with the<BR>>secured =
machine is detected) under conditions of a simulated attack.<BR>><BR>>=
;The key has to be truly randomly generated (a hash of couple seconds of<BR=
>>noisy audio?). To generate a 256-bit hex key of a decent strength we c=
an<BR>>use eg. this line of code (assumptions: Linux, noisy audio of
suitable<BR>>level at /dev/dsp):<BR>>for x in 1 2; do dd if=/dev/ds=
p bs=512 count=1 2>/dev/null | md5sum |tr -d '\n -'; done<BR>><BR=
>>(explanation: dd reads one block of 512 bytes from /dev/dsp (the sound=
card<BR>>input - has to be selected and set to suitable signal strength,=
so it<BR>>gives nonrepeating analog data; the noisier the sound is, the=
better). The<BR>>md5sum then turns the not-entirely-random data into a =
hash of 16 bytes<BR>>(128 bits) length, increasing the per-bit entropy b=
y so called whitening.<BR>>MD5 is a broken hash function, however this d=
oes not really matter in this<BR>>application. The md5sum output is then=
stripped from spaces and separators<BR>>and end-of-lines. The operation=
is repeated twice, to get 256 bits of key.<BR>>You can substitute any o=
ther hash functions or entropy sources, as your<BR>>conditions, applicat=
ion,
and level of paranoia requires.)<BR>><BR>><BR>><BR>>Here we can=
also build the disk as a network-attached storage, and access<BR>>the d=
ata from a remotely booted diskless station. This way no data are<BR>>pe=
rmanently stored in plaintext form. The RAM is cheap, so no swap should<BR>=
>be needed for common operations.<BR>><BR>><BR>>Some common pit=
falls:<BR>>* Unencrypted swapfile. Don't use it or place it on the encry=
pted disk.<BR>>* Intercepted plaintext data. Encrypt data transfers, or =
do not do them.<BR>>* Compromised key storage. Correctly handle physical=
security and erase<BR>> trigger device reliability.<BR>>* Compromise=
d hardware. Solve by good physical security of the place where<BR>> the =
hardware is located. Do not forget uncommon entry points, eg.<BR>> throu=
gh walls, floor, or ceiling.<BR>>* Electromagnetic emissions of
plaintext data. Use TEMPEST shielding of<BR>> the hardware or a shielded=
room. Uncommon unless dealing with top-budget<BR>> adversaries.<BR>>=
* HUMINT and PSYOPS. Targetting the operators. Tough to solve, a most<BR>&g=
t; likely attack vector.<BR>>* Murphy. The one underestimated attack vec=
tor that you forgot and that<BR>> gets you.<BR>><BR>><BR>><BR>&=
gt;<BR>>The later mentioned solid-state Flash-based disk has advantages =
(fast<BR>>erase) and disadvantages (relatively small space in comparison=
with 750 GB<BR>>hard drives currently available, necessity of having el=
ectrical power<BR>>available in order to erase the data - the destructiv=
e devices can be<BR>>battery-backed to activate, the SRAM memory for cry=
pto key requires power<BR>>to operate). Both disadvantages can be worked=
around by having a dedicated<BR>>battery-operated erase unit (IDE
commands can be implemented on a<BR>>microcontroller) and by waiting for=
new higher capacities (the development<BR>>here goes *FAST*). Also, if =
it gets stolen or lost, the data stay in<BR>>plaintext.<BR>><BR>><=
BR>>Opinions, comments?<BR>><BR>><BR>><BR>><BR>><BR>><=
BR>>On Wed, 21 Mar 2007 cont..._at_yahoo.co.uk wrote:<BR>><BR>> ><=
BR>> > .<BR>> ><BR>> > Someone asked me...if i know a way=
to destroy<BR>> > a harddisk (contents) in under 30 seconds.<BR>>=
><BR>> > I suppose...he wants a harddisk in some housing/box,<BR>=
> > ofcourse itīs connected to his computer,<BR>> > when the =
moment arrives he pushes a button or activates<BR>> > some lever...an=
d in under 30 seconds all contents become<BR>> > unreadable forever (=
guaranteed)<BR>> ><BR>> > Anyone know if something like that is=
available ?<BR>> ><BR>> > If not...could i built something like=
that myself ?<BR>> > the client wants to buy a few of such units.<BR=
>> ><BR>> > Overwriting/formatting takes to long...and does not=
erase 100%.<BR>> ><BR>> > Wich other technics would work ? Mag=
nets ? Acid ? E.M.P.?<BR>> > how to implement that in a sellable unit=
?<BR>> ><BR>> > Thanks !<BR>> ><BR>> > Radiotechsc=
an<BR>> ><BR>> ><BR>> > ><BR>><P></FONT></P></BLOCK=
QUOTE></div><br clear=all><hr>One Care: <a href="
http://g.msn.com/8HMB=
ENCA/2734??PS=47575" target="_top"> free Trial Version Today!</a> </htm=
l>
Received on Sat Mar 02 2024 - 00:57:18 CST