- Want to securely encrypt your data? Do this!!!
Username or Email Address
Do you already have an account?
Forgot your password?
  • Log in or Sign up

    Results 1 to 2 of 2
    1. Member
      Join Date
      Mar 17th, 2003
      Lehi, UT
      01-30-2019 02:57 AM #1
      Say, are you wanting to encrypt your computer's hard drive? Not sure which style or method of encryption you ought to use? Have I got a suggestion for you! Do what Josh Powell did.

      Way back in 2009, police confiscated a 1TB Western Digital “My Book World Edition” external hard drive from Josh Powell's home because they thought it might contain evidence to help find his missing wife Susan. The entire drive was locked with encryption. All the police needed to do was crack its password. On television, this process only takes a few minutes--how hard could it be?

      The first attempt was made by the Intermountain West Regional Computer Forensics Laboratory in Salt Lake City. There, FBI agents and West Valley Police detectives worked together and successfully mirrored the drive, but all of their forensic software tools failed to crack it. They also tried numerous "brute force" attacks, but these also failed to crack the password-protected drive.

      Next, the lab sent a mirror of the drive to FBI headquarters in Quantico, Virginia. After more than a year, FBI headquarters gave up and returned the drive to Utah, still uncracked.

      After that, West Valley police requested help from AccessData, the company that produced the forensic tool kits used by the federal government. The city then submitted a mirror of the drive to the Secret Service, but in May 2011, the Secret Service reported that it was also unable to crack the encryption.

      In October of 2013, after the case had gone "cold" and a judge had lifted its secrecy order, Susan’s father suggested that police enlist a Utah company called Decipher Forensics. The police submitted a mirror to them in December of 2013. Four years later, Decipher had still not succeeded in cracking the drive.

      So if you want your data to be secure from the local police, the FBI, the Secret Service, and the companies which write the very software used to crack encryption, I suggest you follow Josh Powell's example by using long, very strong passwords.
      Dempsey Bowling
      Sales Consultant at Doug Smith Dodge/Chrysler/Jeep/Ram/Subaru/Kia/used
      My fleet: 91 Miata (5.0L swap project), 98 Wrangler Sport, 01 Suburban 2500 8.1L, 80 Grand Prix LJ 454, 86 GLHS #75, 13 Leaf SV

    2. Remove Advertisements


    3. Learning New Things Every Day. GreenandChrome's Avatar
      Join Date
      May 24th, 2002
      COVID-19 Ground 0 - USA
      '12 Earth F****r Limited EL; '12 A4q; '18 UBM Q3q
      03-25-2019 03:29 PM #2
      That's not how anything works.

      He had a strong password. A password does not exactly encrypt data, as this article suggests.

      If he did use a 56-key password, it was probably something easy to remember, like supercalifragilisticexpealidocius or qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq qqqq56. Put either of those in a "how strong is my password" tool and be amazed.

      "Excluding the possibility that a female Scandinavian Olympian was running around outside our house last night, what else might be a possibility?"
      If someone you know is afflicted with Dunning-Kruger, please help. #knowthecure
      @mbull | instagram #imhardlyeverserious
      __________________________________________ #srtallthethings

    Similar Threads

    1. Replies: 11
      Last Post: 05-24-2007, 10:20 AM
    2. Replies: 1
      Last Post: 06-03-2006, 06:44 PM
    3. Replies: 4
      Last Post: 02-15-2002, 12:12 AM

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts