Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

A question to computer experts

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
 
Toots Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-21-05 05:11 PM
Original message
A question to computer experts
Is it possible to know if your computer has been gone through? I believe that when the Democratic Senators were sent Anthrax and had to vacate their offices for a few months that GOP operatives went through all the computers and was just wondering if there was anyway to tell if that had happened..I know that there is a way to find stuff even after it has supposedly been erased but do they leave a trail when searching?
Printer Friendly | Permalink |  | Top
Brundle_Fly Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-21-05 05:13 PM
Response to Original message
1. for a home system not really
Edited on Wed Dec-21-05 05:15 PM by Brundle_Fly
you can get bots to record every keystroke but you have to have access to them, I imagine the senate has tracking for all the systems.

but people who would be spying might erase their trakcs....


on edit.

when Rockefeller contacted Cheney and wanted to keep it secret, he wrote it by hand, So I think we can assume they have tracking
Printer Friendly | Permalink |  | Top
 
sabra Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-21-05 05:14 PM
Response to Original message
2. you mean besides leaving Cheetos colored finger prints on keyboards?
There are various ways to monitor activity, especially if it was on a network.
Printer Friendly | Permalink |  | Top
 
TechBear_Seattle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-21-05 05:16 PM
Response to Original message
3. Not really
If you are very paranoid, you can obtain (or write, if you are the programmer type) a daemon service that will monitor file accesses and the like, but they are pretty easy to bypass if someone is serious about snooping. You can also look for physical changes, like your mouse or keyboard having been moved, but proving that it was a snoop as opposed to a janitor would be very difficult.
Printer Friendly | Permalink |  | Top
 
DS1 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-21-05 05:18 PM
Response to Original message
4. with physical access to your machine
and if it was left 'off' someone could open the case, ghost your drives in minutes, close it back up, and walk off with an identical copy of your data
Printer Friendly | Permalink |  | Top
 
deadmessengers Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-21-05 05:20 PM
Response to Reply #4
6. Bingo
Beat me by one minute.
Printer Friendly | Permalink |  | Top
 
Tandalayo_Scheisskopf Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-21-05 05:23 PM
Response to Reply #4
7. It gets even better:
There is a company out there that makes a small, handheld-type device for law enforcement that plugs into your computer and drags off an image down to the physical level of the platters in your HDD. From what I understand, it does this rather quickly as well.

Just the thing for a black bag op.
Printer Friendly | Permalink |  | Top
 
GCP Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-21-05 05:32 PM
Response to Reply #7
8. and if they're wanting to catch you in the act
and you have some sort of heavy network encryption - and they can get close enough - they can pick up the interference from your CRT and recreate what you're seeing on your screen :-)
Printer Friendly | Permalink |  | Top
 
deadmessengers Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Dec-21-05 05:19 PM
Response to Original message
5. Not if the person doing it was smart
If you start with physical access to a powered-off unattended computer, it's basically untraceable. It works something like this:

1) Open the case of the PC
2) Remove the hard drive
3) Place the hard drive into another machine
4) Using the second computer, make a an "image" of that hard drive - basically, a forensically-sound copy containing everything on the drive.
5) Replace the hard drive into the original machine.
6) Examine the copied image at your leisure.

Most mass-market desktop PCs do not have case-intrusion sensors, and nothing would ever be logged.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 16th 2024, 03:12 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC