Difference between pages "Radio Frequency (RF) Jammers" and "Hard Drive Passwords"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(How It's Done)
 
m
 
Line 1: Line 1:
== The Basics of Cell Phone Jamming ==
+
Some hard drives support passwords. These passwords can be implemented in computer's operating system, its BIOS, or even in the hard drive's firmware.  Passwords implemented in the OS are the easiest to remove, those in the firmware are the hardest.  
Cell phones work by communicating with a service network through the utilization of cellular towers or base stations. Individual towers partition cities into small sections called cells. As a cell phone user traverses the cells in an area, the signal is passed from tower to tower.
+
  
Jamming devices take advantage of this fact by transmitting on the spectrum of radio frequencies used by cellular devices. Through its concurrent transmission, the jamming device is able to disrupt the two-way communication between the phone and the base station. This form of a denial-of-service attack inhibits all cellular communication within range of the device.
+
Sometimes people use the term "password" but the hard drive is really [[Full Disk Encryption|encrypted]], and the password is used to unlock a decryption key. These passwords cannot be removed — the encryption key must be cracked or discovered through another means.
  
== How It's Done ==
+
=Vendors=
Through the transmission of a high power signal on the same frequency of a cell phone, the jamming device creates a competing signal that collides with, and, in effect, cancels out the cellular signal. Cell phones, which are designed to increase power in the case of low levels of interference, react to this interference. Consequently, jamming devices must be aware of any increases in power by the cellular device and match that power level accordingly.
+
* Disklabs (www.disklabs.com) is able to remove some forms of hard drive passwords.
  
As cellular telephones are full-duplex devices utilizing two separate frequencies (one for talking, one for listening where all parties to a call can talk at the same time as opposed to half-duplex walkie-talkies and CBs), any removal of one of these frequencies tricks the phone into thinking there is no cellular service. Consequently, the jammer need only block one of the frequencies.
+
* Dell will assist law enforcement in removing the passwords from password-protected hard drives. You need to provide Dell with a copy of the search warrant and the computer's service tag #. Reportedly this can be done over the phone, once you have a good relationship with Dell.
  
The less complex jammers can only block a specific frequency group while the more complex jammers can block several different networks thus preventing dual- or tri-mode phones from switching to a different network with an open signal. Jammers are able to broadcast on any frequency and can interrupt AMPS, CDMA, TDMA, GSM, PCS, DCS, iDEN and Nextel systems. The effective range of a jammer is dependent upon the strength of its power source and the immediate pysical environment (hills or walls which may block the jamming signal). Lower powered jammers have a call-block range of about 30 feet while higher power units can create a cellular signal-free zone about the size of a football field. In addition, certain units applied by law enforcement have been known to shut down cellular service approximately 1 mile from the jamming device.
+
* [http://www.hdd.profesjonalnie.pl/to.php Seagate HDD Service Device for 2,5" drives BASIC Kit]: The tool works with 2,5" drives of Seagate. Main functionality - ATA PASSWORD removal from 2,5" drives.
  
 +
* [http://www.acelaboratory.com/pc3000.htm PC-3000 for Windows] has "An opportunity to unlock USER and MASTER passwords used in a HDD".
  
 +
* [http://www.hdd-tools.com/products/rrs/ With Repair Station you can remove an unknown ATA-password; both security levels are supported: High and Maximum]
  
 +
* [http://www.vogon-investigation.com/password-cracker-solution.htm Using the Vogon Password Cracker POD, the protection from the drive can be removed]
  
WORK IN PROGRESS -- PLEASE CHECK BACK WEEKLY
+
* [http://www.salvationdata.com SalvationData] sells a system for "Stage 2 physical data damage" recovery from HDDs. The company sells tools for swapping out platters from one drive into another drive, changing the firmware on drives, and other kinds of operations. You can buy it from http://www.computersciencelabs.com.
 
+
== What's Inside a Cell Phone Jammer ==
+

Revision as of 02:38, 31 March 2009

Some hard drives support passwords. These passwords can be implemented in computer's operating system, its BIOS, or even in the hard drive's firmware. Passwords implemented in the OS are the easiest to remove, those in the firmware are the hardest.

Sometimes people use the term "password" but the hard drive is really encrypted, and the password is used to unlock a decryption key. These passwords cannot be removed — the encryption key must be cracked or discovered through another means.

Vendors

  • Disklabs (www.disklabs.com) is able to remove some forms of hard drive passwords.
  • Dell will assist law enforcement in removing the passwords from password-protected hard drives. You need to provide Dell with a copy of the search warrant and the computer's service tag #. Reportedly this can be done over the phone, once you have a good relationship with Dell.
  • SalvationData sells a system for "Stage 2 physical data damage" recovery from HDDs. The company sells tools for swapping out platters from one drive into another drive, changing the firmware on drives, and other kinds of operations. You can buy it from http://www.computersciencelabs.com.