Stolen VA Laptop Recovered 202
lancejjj writes "Remember how the VA was pinning the theft of 26.5 million veterans' personal records on a hard working-but-renegade employee whose laptop was stolen? Surprise! It turns out that the employee had written permission to bring the sensitive data home. Fortunately, the laptop has been recovered. It is still unclear how the laptop was recovered, or if any of the veterans' personal data was leaked."
Nothing taken (Score:4, Interesting)
I'm sure it's safe (Score:4, Interesting)
New requirements for protection of Personal Data. (Score:3, Interesting)
Re:Data Wasn't Accessed (Score:4, Interesting)
The data probably wasn't accessed. If the thief knew what they had, and was at all clever, they could have pulled the drive, performed a raw sector copy, and put it back. Poof! No date changes. I'm sure the FBI forensics team will be checking for this possibility.
Schwab
Load of crap (Score:3, Interesting)
Re:Nothing taken (Score:1, Interesting)
I believe it said on the FBI's report that it looked like the data had not been looked at.
Remove drive, copy contents, re-insert drive not leaving fingerprints and how could they tell? It never booted, so what is in the returned or recovered computer must be considered compromized. There is no way to know if this did in fact, or did not in fact occur. So at best, it is a guess unless they analysed the screws with a scope for scraches and the like, unless it is a model that just pops out.
Re:Nothing taken (Score:2, Interesting)
There is no reliable forensic technique to determine beyond doubt that data has not been read. Imagine if you had left a page with notes in a public, high traffic area. When you found that page a day later, how would you go about determining if anyone had looked at it?
I smell a fish... (Score:3, Interesting)
So which is it? He was or he wasn't allowed to? It is a bit too convenient for my taste that the laptop was recovered so magically and with the data intact.
This kind of back-and-forth "truth" on these kinds of issues gets very old very fast.
Smells fishy...
TrueCrypt needs admin privileges; now what? (Score:3, Interesting)
Unfortunately, this does not work on our laptops at work; I am being coerced to use WinXP at work (damn you!) without admin privileges, and TrueCrypt refuses to install without admin privileges.
Does anyone know a workaround for this? I recognize that it's probably unlikely; if it works without admin privileges, it's probably not that secure.
Before anyone suggests that I ask the IT department of our firm: I already asked if it was okay to install certain programs. "Like what?" they asked. "Firefox," I said. "What's Firefox?" they asked. So that pretty much nixes that idea.
I did notice that GPG and WinPT install okay without needing admin privileges, so I am able to have *some* form of encryption, but it is non-ideal for various reasons.
Btw, for those of you using Ubuntu Dapper, here's a web page on how to install it easily. I ended up compiling (pretty much my first time compiling anything), and it was easier than I thought.
http://www.ubuntuforums.org/showthread.php?t=1993
Re:Nothing taken (Score:2, Interesting)
In actuality, they probably ran some sort of forsenics tool against the drive and preliminary investigation says it probably was not accessed. But my question is, is there a way to track cloaing of a drive. What's to say that whoever had it didn't make a bit-by-bit clone that can't be traced. Granted, I get the feeling that the dumba$$ who stole the computer may not have had the knowledge to do that, but as a vetern and a network administrator, I wouldn't bet my identy on it. I will still take advantage of the credit monitoring when it comes out.