Difference between pages "Jim Christy" and "Residual Data"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
 
m (See Also)
 
Line 1: Line 1:
[[Image:Jim Christy.jpg|thumb|Jim Christy working]]
+
Residual Data is data that is unintentionally left behind on computer media. In forensic usage, remnant data is typically left behind after attempts have been made to delete the data, after the data has been forgotten, or after the media on which the data resides has been decomissioned.
  
Jim Christy is the head of the Futures Exploration Division of the [[Defense Cyber Crime Center]] in Linthicum, Maryland. He has previously served as a computer crime investigator for the [[Air Force Office of Special Investigations]]. He was one of the original founders of the [[Defense Computer Forensics Lab]].
+
Residual data appears at all levels of modern computer systems:
 +
* Computer systems that are discarded.
 +
* Partitions in hard drives that are deleted.
 +
* Files on hard drives that are deleted but not overwritten.
 +
* Snippets of text in Microsoft Word files.
 +
* Heap variables that are freed with '''free()'''
 +
* Automatic variables left on the stack of languages like C or garbage collected in languages like Java.
  
== See Also ==  
+
=Papers=
* [[Defense Cybercrime Center]]
+
Byers, Simon. [[Media:Scalable Exploitation.pdf|Scalable Exploitation of, and Responses to Information Leakage Through Hidden Data in Published Documents]], AT&T Research, April 2003
  
== External Links ==
+
Chow, J., B. Pfaff, T. Garfinkel, K. Christopher, M. Rosenblum, 
* [http://en.wikipedia.org/wiki/Jim_Christy Wikipedia entry for Jim Christy]
+
[[Media:Tainbochs.pdf|Understanding Data Lifetime via Whole System Simulation]], Proceedings of the 13th USENIX Security Symposium, 2004.
* [http://www.wired.com/wired/archive/15.01/cybercop.html Wired magazine article on Jim Christy]
+
  
[[Category:People]]
+
Garfinkel, S. and Shelat, A., "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security and Privacy, January/February 2003.
 +
 
 +
=See Also=
 +
* [[Residual Data on Used Equipment]]
 +
* [[Sanitizing Tools]]
 +
* [[Remnant Data]]
 +
* [http://www.iphoneatlas.com/2008/05/19/refurbished-iphones-may-contain-other-users-personal-data/ Residual data on iPhones]

Revision as of 14:40, 29 September 2008

Residual Data is data that is unintentionally left behind on computer media. In forensic usage, remnant data is typically left behind after attempts have been made to delete the data, after the data has been forgotten, or after the media on which the data resides has been decomissioned.

Residual data appears at all levels of modern computer systems:

  • Computer systems that are discarded.
  • Partitions in hard drives that are deleted.
  • Files on hard drives that are deleted but not overwritten.
  • Snippets of text in Microsoft Word files.
  • Heap variables that are freed with free()
  • Automatic variables left on the stack of languages like C or garbage collected in languages like Java.

Papers

Byers, Simon. Scalable Exploitation of, and Responses to Information Leakage Through Hidden Data in Published Documents, AT&T Research, April 2003

Chow, J., B. Pfaff, T. Garfinkel, K. Christopher, M. Rosenblum, Understanding Data Lifetime via Whole System Simulation, Proceedings of the 13th USENIX Security Symposium, 2004.

Garfinkel, S. and Shelat, A., "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security and Privacy, January/February 2003.

See Also