Stora NAS data recovery RAID

The following two RAID data recovery requests regard a Stora NAS and QNAP NAS, one running a RAID 1 mirror and the other a RAID 5. In all cases where data recovery is required make sure you do your own research and be sure to choose a good data recovery company. Note that in the second example, a forensic data recovery service is required – this is the recovery of data that is to be used for legal processes and as such the processes involved in forensic data recovery need to handled differently to those of conventional data recovery.

forensic data recovery

I have a 2TB WD Red disk that was in a Stora NAS that was set to RAID disk mirroring. The Stora failed and one of the disks is in a new Synology NAS but the other I have retained to recover the files. I believe the file system is XFS. I need the data recovering and I have tried with a disk caddy that I have used to read an ext3 disk before (failed Lacie NAS) but I’m struggling to read the XFS drive from Windows or get a virtual Linux image with XFS going (I only have perfunctory Unix skills). I’m wondering what the cost would be to recover the files on thr disk please? Not sure the size but not anywhere near the capacity of the disk, I believe more between 500Gb and 1Tb. I ould be happy for the files to be provided on the same disk as an NTFS or other Windows readable disk.if that’s possible rather than buying new media / disks. Please if you would let me know if you are able to recover the files and what the estimated cost is that would be great. BTW I’m Sheffield based.

I have a 4-disk QNAP NAS that’s no longer recognising the disks (4 x 2TB drives) configured as a RAID-5 array. How much would it cost for an evaluation to have the data recovered? I need this doing in a forensically sensitive way as the files on the hard drive are part of a legal court case. Is forensic data recovery something you can help with?

Types of System Investigation

The range of computerised devices encountered during a normal day that may be potential sources of information and evidence and be considered for forensic investigation is vast. In the home, there is the personal computer and the hub or router that connects it to the outside world, probably a computer games console, a satellite TV box that may have internet and email capability, the alarm system and control systems for the washing machine and environmental controls, and increasingly other “white goods”. In the car, there is the engine management system and the satellite navigation system, which may include a wireless or Bluetooth communications facility. In the office there will be networked computer systems, access control systems and alarm systems.

For the individual user, there is the laptop computer and the handheld mobile communications device. The last may seem a strange choice of words to describe what, to date, has been referred to as the “mobile phone”, but that term now no longer really describes the devices we regularly carry around with us. Today’s device is more and more and mini computer. In addition to making calls it contains an address book and a diary, can download and play music, can browse the internet, send email, and act as an SMS capable device. This is device is best described as a “smartphone“.

The types of information that may contain evidence lie in one of three groups. Active, Archival and Latent Data. Active data is the information that can be seen on the device, such as data files, programs and the operating system files. This is the easiest type of data to collect. Archival data is data that has been backed up. This may be stored, for example, on DVD’s, CDs, floppies, backup tapes, and hard drives. Latent data is the sort of information that may require specialised tools to recover and includes information that has been deleted or may have been partially overwritten.

Data Security: McAfee vs Android Apps

Android logo John McAfee has apparently decided on his next project, an Android app security interrogator called “Cognizant”.

The Android app is a safety tool of types, inasmuch as it apparently conducts a census of all of the apps in your Android device and reports about what they have been permitted to do on it.

McAfee believes this functionality is an excellent idea because many apps ask for authorization to command just about all of a Android device’s functions, like the capability to study place data, make calls and shoot pictures. McAfee’s logic supposedly runs, if consumers know about this behavior, they’re going to either delete piquing apps or think twice before installing them.

Cognizant will seemingly appear on March 1st, with McAfee taking part in a web-based chat on February 14th to provide more depth on his new enterprise.

Computer Misuse At Work

In the UK, the Computer Misuse Act is a law that makes certain activities prohibited, including hacking into other people’s computers, installing malware, or helping a person to access protected files of somebody else’s computer. The act is made after the 1984-1985 R v. Gold case, ┬áin 1988. The appeal was productive, inspiring parliament to build a law that will make punishable the conduct committed by Robert Schifreen and Stephen Gold. It obviously wasn’t able to be implemented retroactively, but it is aim was going to deter behaviour like theirs in the near future. In the UK, I recommend you all to the Computer Science Labs website, their specialist page on computer misuse is here.

What happened to prompt true and ultimately lead to the law was the following: Gold observed an employee of Prestel at a trade-show input his user name and password into a pc. Gold and Schifreen subsequently used this information from a home computer to get into the machine of British Telecom Prestel, and specially to enter the personal message box of Prince Philip. Prestel became aware of the access, trapped them both males, and charged them using fraud and forgery. The men were convicted and fined, yet they appealed their situation.

Some of the crucial aspects of the allure was that the two men weren’t using the data in anyway for personal or illegal gain. Since no materials obtain was associated with spying on someone else’s setup, they claimed that the charges below the special laws can’t apply to them. The Home of Lords acquitted the males, but became determined to forbid such behavior in future. This resulted in the Pc Misuse Act be-ing developed and handed into legislation in 1990, a couple of years after the effective charm.

The action is divide into three sections and makes these acts prohibited:

–Unauthorized access to computer material

–Unauthorized access to computer systems with purpose to commit another offence

Individuals also cannot change, copy, delete, or move a software. The Pc Misuse Act also outlaws any efforts to get someone else’s password. Obviously, if someone gives another man his identification and he can legally utilize the computer, these laws under entry don’t apply.

The next provision within the law is gaining access to your computer system as a way to commit or facilitate a crime. Someone can’t use somebody else’s program to deliver material that might be offensive or possibly to begin worms or viruses. He additionally can’t give someone his identification so that he is able to make use of a system for this intent. This second part ensures the individual will be easing someone else’s aim or offence.

Again, if someone puts a virus into some one else’s setup, he’d be violating the act. Generally, perpetrating unauthorized access simply is thought a crime punishable by great. Access with purpose and unauthorized modification are considered more acute and could be punished by significant fines and/or prison sentence.

1984

Data PrivacyHere’s an up to date web site that takes a look at the erosion of personal privacy:

http://dom-i-nate.com/

With all the fall out from the Edward Snowden affair it seems that our personal data is far from personal. Infact, I’d be willing to bet that the internet airwaves are being monitored for appearances of the name “Edward Snowden” by security forces around the world…. So if you’re a security service employee and you’re reading this now – Hello There !

In today’s world of e-crime I suggest that we no longer know who the bad guys are. Be careful what you put out on the net… And as for cloud based services, why would you ever use them?

Here’s an interesting article from the same site discussing what Snowden did and his motives for doing them:

http://dom-i-nate.com/edward-snowden-and-the-rise-of-big-brother/