Dog sniffed out Jared Fogle's thumb drive that police missed

I know someone that does data retrieval in the police. Mostly for stuff I’d rather not discuss, let’s just say it relates to one of the cases mentioned in the post.

It’s a remarkably straightforward procedure, there’s a few bits of software they use and that’s kind of it. If you’re actually going to real effort to mask your data and you know what you’re doing then theres probably not much they can find, most of the stuff they’re looking at is from people that don’t bother with that kind of thing. Or stuff they wouldn’t think to mask that’s in plain sight (sat nav data to connect a perp to a location etc)

He’s not a technical person in the slightest.

Now this is the police though, not a 3 letter agency of some kind. I’m sure it can get quite advanced at the top.

Computer forensics is very similar problematics to data recovery. Been there done that, back in the age of DOS and FAT16 and manageable sizes of disks even wrote some rudimentary software for custom jobs. Block device imaging (a good idea before trying to recover data is to image the device and work on the image afterwards, same as with forensics) is involved in most cases, which is sequential reading start to end, hence the controller idea. (“If next block requested is the next one in sequence, increment counter by one, otherwise zero the counter. If counter is over x, fail.” Would require to be a bit more complex to account for things like large files but could work. We need an opensource software dev kit for at least one popular USB disk controller chip, with demo software…)

Some of such stuff is pretty arcane. I am tempted to write something about it…

2 Likes

Time to bury all my thumb drives in coffee then‽

3 Likes

Keep them in your dog’s arse.

5 Likes

No! That’s the first place another dog is going to look!

7 Likes

But also most likely to be dismissed as a false positive.

4 Likes

What the hell is a CRUSADER’S CROSS doing on a police dog harness?


Especially when being used to desecrate the American Flag?

Something is very, very wrong here.

2 Likes

I was binging on defcon videos a couple of weeks ago and came across this one.

3 Likes

Give 'em time… Once hard crypto is made illegal, these dogs will be priceless.

2 Likes

beats the hell out of me.
But I’ve traced it to here.

http://www.vikingtactics.com/product-p/1006.htm

http://www.vikingtactics.com/product-p/vtac-patch-crusader.htm

Technically, it’s also known as the cross of jerusalem, in case you want a more neutral connotation-- through I think “Viking Tactics” is just fine with jingoism.

3 Likes

You do use read-only forensic devices to mount the media, it’s not 100% software.

Some parts of the investigation would be fun, analysis of corporate espionage… but cases like Jared’s would just kill my desire for humanity to continue.

1 Like

I agree. “Jersualem Cross” is the more general name. But to get across pithily on BoingBoing why this might be an issue, the more provocative – and widely used-- name seems appropriate.

Thanks for helping track down sources.

1 Like

And that’s why we have to know the methods and have countermeasures ready.

1 Like

1 Like

That’s great, but my cats can sprunge data in stored electronic and in paperback form too. They’ll sprunge your stuff when you’re writing, reading or just leaving it laying about. They soak data through their tummies or something.

3 Likes

Sounds creepily like the “Shunting” scene from Society.

Don’t own a dog. Even if I did, the damn dog would just bury in the yard where I couldn’t find it. Much like what my cats would do. Keeping it in something inanimate is a plus, in my book.

3 Likes

I wasn’t being literal, my point was merely that it’s not like in the movies, and is quite a prescribed, straight forward operation.

1 Like

This topic was automatically closed after 5 days. New replies are no longer allowed.