Hidden areas on hard drives - manufacturer access only - IEEE computer forensics

tankman1989

Active Member
Reaction score
5
A little over a year ago I attended an invitation only IEEE criminal forensics sciences lecture that focused about 95% of the time on computer related issues. I have to say that I was astonished at what I heard at this meeting and learned a lot, both in a positive and negative aspect of how things are done.

The most memorable topic of discussion was data recovery from hard drives. The speaker, who currently worked for the state police, said that the forensic lab used manufacturer designed software which allowed access to hidden areas of the hard drives. He said that it is/was possible to recover just about any file that had been on the hard drive even if it had been securely deleted. I questioned this by asking if it was possible to recover if the file had been zero'd out numerous times or over written with other data numerous times. I also asked if the drive was wiped were these files recoverable. He answered yes to all my questions. I pondered... I wanted to ask if over the life of the drive the drive had contained 100x the total capacity of the drive (deleting & overwriting of course), would a file written on the first day and overwritten the next day (let's assume constant continual use for 5 years) be recoverable - but due to the lecture format, I wasn't able.

This topic was brought up when talking about recovering the internet cache of pedophiles. He said that they could recover just about any file that had been written to the hard drive, no matter when it was deleted, as it was stored in a special area of the drive which was ONLY accessible by the manufacturer or this forensics software.

I also asked a couple other questions prior to this that were fairly technical, but questions I felt any computer security professional should know off the top of his head, and he couldn't answer these (I'm not even a security specialist, more a novice). After these questions and then the recovery question, I didn't want to make him look ignorant in front of the crowd..

So, I have a couple theories on this "special area" and how these forensic's "specialists" work. The only way that this special area can work the way they say it does is if HD capacity is incorrectly reported by manufacturer - in which case, there is technology that allows for much greater density of storage than we know about - ie a single platter stores 100TB instead of 1TB & there is a permanent storage section that is sequentially written with a 1% "useable" section. This is very probably when national security & spying (look why & who developed computers & Internet) is taken into consideration. Also, makes "Moores Law" easier to understand as well as the naming of it - coincidence that Moore predicted so much "more" capacity & speed? Was the capacity always there but limited so that they could sell incremental increases over the next 40+ years while they developed/stole the next technology?

OR - The HD has this "secret area" which stores special files such as Internet cache files. Good for national security and such... Perhaps it stores all MS office docs and other data files... This would require much less space but it still involves some kind of conspiracy.

What I also found very interesting and made me understand why some criminal investigations and prosecutions move so slowly is that in a state of over 13 million people, there are only 4 people who work at the state forensics lab. This lab does all the work for local and state police as well as regional FBI work! Knowing how long it takes to do some procedures I now understand why the police push so hard for confessions or plea deals, because if there is a lot of forensics work, it might not even get to trial in time or there could be a lot of possibilities for the defense to say there were incorrect procedures in examining the evidence.

I have the feeling that these people working in the forensics field don't necessarily understand the science behind what they are doing, especially when it comes to the computer forensics. Meaning they might not understand the firmware and operation of a hard drive while they do understand the results they get from the proprietary software that they use. This makes a lot of sense as it would be almost a career in itself to fully understand how the firmware of a HD works. So when they have to know 10-20+ of these software programs, it would be impossible to understand the fundamentals of what they are doing or how the hardware/software truly interfaces.. **edited/added - As Phazed pointed out - this might very well be to instill fear in the public to either deter crime or to help elicit a confession.

So what do you think about the "secret area" on the hard drive? I know that this has to be listed under some kind of conspiracy, even if it is at a very low level, but I think the computer industry is full of these to varying degrees. Don't even get me started on Microsoft!
 
Last edited:
The 'secret' area is where all the bad sectors are kept, and then they're suddenly unleashed at an unsuspecting moment to make you have to buy another hard drive :D


Joking aside, I'm not sure how there could be a 'secret' area of the physical disk surface itself...also because the drive's controller has no idea what types of files are being written (it only knows about the raw data being read/written to the platters, AFAIK)

Maybe they use some sort of special device to scan the disk surface for leftover magnetic data?
 
I have the feeling that these people working in the forensics field don't necessarily understand the science behind what they are doing, especially when it comes to the computer forensics. Meaning they might not understand the firmware and operation of a hard drive while they do understand the results they get from the proprietary software that they use. This makes a lot of sense as it would be almost a career in itself to fully understand how the firmware of a HD works. So when they have to know 10-20+ of these software programs, it would be impossible to understand the fundamentals of what they are doing or how the hardware/software truly interfaces..

I think you have summed it up quite well here. I would add that authorities have been known for spewing BS and exagerating their abilities in order to instill fear, either in an attempt to prevent a crime or use "common knowledge" to extract a confession when that time comes - For instance, if a pedophile truly thinks that everything is stored indefinitely, that can be used easily during an interrogation "We saw your hard drive!"

Definitely not possible.
 
I think you have summed it up quite well here. I would add that authorities have been known for spewing BS and exaggerating their abilities in order to instill fear, either in an attempt to prevent a crime or use "common knowledge" to extract a confession when that time comes - For instance, if a pedophile truly thinks that everything is stored indefinitely, that can be used easily during an interrogation "We saw your hard drive!"

Definitely not possible.

I'm glad you added this, I forgot to put this in my initial post (I'm going to add it if you don't mind).

This is exactly what I was thinking when the guy was saying what he did. Unless there is one of the conspiracies which I explained, which I feel is much much less likely, then this is the only thing that I can logically believe.

I would REALLY like to see a step by step process for how this recovery works and have them pull some old files from my 5 year old hard drive.

My final thought on if this was true, goes along with what Vicenarian said. When this "secret area" fills up, you find out that your hard drives is dieing or is dead - but that would mean that you destroy X years worth of "secret data" so that doesn't even make a lot of sense.

I'll chalk this up with stories of the boogeyman. I just had a tough time believing that he was lying at an IEEE meeting but I guess that is no different than the same guy talking at an MCSE/A meeting I guess.
 
I would say more like not probable instead of not possible.

Do I really think there is indefinite access to the information stored on your hard drive? Absolutely not.

The government has far to much to lose in this instance. This means that every crooked thing they've ever done on the computer is recorded somewhere. One would think that they would never allow such a collection of information to exist.

Although they could simply have access to special drives which don't do this?
 
OK, so according to the expert the "special area" contains copies of everything.

So a 500gb drive actually has a minimum of 1tb (to allow the secret area to hold all those copies).

And, since that "special area" contains copies of everything over the entire life of the drive, it must be INFINITE in capacity, since an average hard drive will have the equivalent of MANY times it's capacity written to it and deleted from it over a working life of a few years.

Can't just blow the BS whistle on this one. It's got to be the BS Foghorn.

So three possibilities:

1. The expert over-simplified / dumbed-down his presentation for what he assumed would be a non-technical audience. Hence "secret area" rather than techno-jargon for any area or feature not typically accessible to an average user.
2. He embellished his presentation as a deterrent to the potential pedophiles in the audience.
3. He's a dumbass.

Now since I hope #3 wouldn't be true, I'll vote for #1.
 
I think it's nonsense myself but I did think of something interesting if it were true. So when I clone a drive the "secret area" is left on the old drive right? Since we (normal people) don't have access to that area. The drive doesn't know it's being cloned all it knows it to return sector 1, 2, 3, 4, 5 blah blah...
 
Thanks to all who responded.

mraikes I agree on the foghorn. That's how I felt when I heard him at the lecture. I was upset I had already asked 3 questions (the only person asking questions too...) and was sitting there squirming in my seat as all these impossibilities arose in my head. It was tough!

As for him dumbing it down, I didn't think he would. The audience was all electrical engineers or computer engineers (and the guests they brought).

AliceKlaar Thanks for the links to those papers. I didn't mean that the scientists didn't understand the science behind what they were doing on all subjects, as I'm sure they have specialities, but they probably don't have a speciality in every area for which they do analysis, at the speakers level. There are probably forensic scientists that do ONLY HD analysis, but don't do the 20 other topics that this guy does. Like the top of the food chain..

Also, what you explained discussed the reservation of bad sectors but it doesn't explain how any of this makes retaining every single internet cache file that ever existed on your computer - let alone every file ever. This is just too large of a claim unless there is undisclosed technology in use. Do you disagree or do you think it is possible?
 
Last edited:
Are we referring to HPA (Host Protected Areas) or the service tracks?

I don't believe so. He did not identify them other than "area only accessibly by the manufacturer or by our forensic software". Call it what you want, that is what he called/explained it.
 
I took a SANS forensics course a few years ago that covered this topic amongst other things. This is the type of course that LEA sends people to, including FBI.

Basically the lecturer that the OP mentioned was so full his eyes must have been brown. Even someone with no forensics training but at least has a great working knowledge of computers knows that there is no way that a hard drive can keep copies of everything that ever landed on it.

The area that is not reachable via an OS is accessed via the onboard controller or a third party card such as the PC3000 card. The only way user data can "get" to the "hidden" area is if the onboard controller marks the block as defective so it is taken out of service.

Many years ago I remember reading that the hidden area can be as much as 10% of the total space. The reason for that is to make sure that there are plenty of available spare blocks to offset failed ones. Not sure about that now a days.
 
Who was the speaker and at which conference?

I do remember that about a year ago some guy was going up as a keynote speaker claiming to be able to recover data from a zero'd drive and the rest of the industry was saying it was BS.

Apparently when the speech happened he actually spoke about far more mundane stuff like recovering data from bad blocks etc. Nobody was surprised that he didn't fulfil the claims but irritated by the pre-speech hype.

Was it that one?
 
A little over a year ago I attended an invitation only IEEE criminal forensics sciences lecture that focused about 95% of the time on computer related issues. I have to say that I was astonished at what I heard at this meeting and learned a lot, both in a positive and negative aspect of how things are done.

The most memorable topic of discussion was data recovery from hard drives. The speaker, who currently worked for the state police, said that the forensic lab used manufacturer designed software which allowed access to hidden areas of the hard drives. He said that it is/was possible to recover just about any file that had been on the hard drive even if it had been securely deleted. I questioned this by asking if it was possible to recover if the file had been zero'd out numerous times or over written with other data numerous times. I also asked if the drive was wiped were these files recoverable. He answered yes to all my questions. I pondered... I wanted to ask if over the life of the drive the drive had contained 100x the total capacity of the drive (deleting & overwriting of course), would a file written on the first day and overwritten the next day (let's assume constant continual use for 5 years) be recoverable - but due to the lecture format, I wasn't able.

This topic was brought up when talking about recovering the internet cache of pedophiles. He said that they could recover just about any file that had been written to the hard drive, no matter when it was deleted, as it was stored in a special area of the drive which was ONLY accessible by the manufacturer or this forensics software.

I also asked a couple other questions prior to this that were fairly technical, but questions I felt any computer security professional should know off the top of his head, and he couldn't answer these (I'm not even a security specialist, more a novice). After these questions and then the recovery question, I didn't want to make him look ignorant in front of the crowd..

So, I have a couple theories on this "special area" and how these forensic's "specialists" work. The only way that this special area can work the way they say it does is if HD capacity is incorrectly reported by manufacturer - in which case, there is technology that allows for much greater density of storage than we know about - ie a single platter stores 100TB instead of 1TB & there is a permanent storage section that is sequentially written with a 1% "useable" section. This is very probably when national security & spying (look why & who developed computers & Internet) is taken into consideration. Also, makes "Moores Law" easier to understand as well as the naming of it - coincidence that Moore predicted so much "more" capacity & speed? Was the capacity always there but limited so that they could sell incremental increases over the next 40+ years while they developed/stole the next technology?

OR - The HD has this "secret area" which stores special files such as Internet cache files. Good for national security and such... Perhaps it stores all MS office docs and other data files... This would require much less space but it still involves some kind of conspiracy.

What I also found very interesting and made me understand why some criminal investigations and prosecutions move so slowly is that in a state of over 13 million people, there are only 4 people who work at the state forensics lab. This lab does all the work for local and state police as well as regional FBI work! Knowing how long it takes to do some procedures I now understand why the police push so hard for confessions or plea deals, because if there is a lot of forensics work, it might not even get to trial in time or there could be a lot of possibilities for the defense to say there were incorrect procedures in examining the evidence.

I have the feeling that these people working in the forensics field don't necessarily understand the science behind what they are doing, especially when it comes to the computer forensics. Meaning they might not understand the firmware and operation of a hard drive while they do understand the results they get from the proprietary software that they use. This makes a lot of sense as it would be almost a career in itself to fully understand how the firmware of a HD works. So when they have to know 10-20+ of these software programs, it would be impossible to understand the fundamentals of what they are doing or how the hardware/software truly interfaces.. **edited/added - As Phazed pointed out - this might very well be to instill fear in the public to either deter crime or to help elicit a confession.

So what do you think about the "secret area" on the hard drive? I know that this has to be listed under some kind of conspiracy, even if it is at a very low level, but I think the computer industry is full of these to varying degrees. Don't even get me started on Microsoft!



All the more reason to physically destroy a hard drive with sensitive data.

Put screw driver through platters, then smash with sledge hammer, then melt the pieces with torch, bury the remains in a remote location.

For drive with less sensitive info.....standard procedures should work.
 
forensic lab used manufacturer designed software which allowed access to hidden areas of the hard drives

He may have been talking about the firmware area of the drive, which is only accessible with special tools. It's also possible to create an HPA ("Host Protected Area) which is kind of like a hidden partition. But, AFAIK no user data can be saved in the firmware ("Service Area") of the drive. And, if there was an HPA, it acts just as a normal partition when it comes to overwritten files with 0000s --> once overwritten, especially if overwritten multiple times, the data is NOT recoverable.

*Now, cache files are generally VERY small and thus could be easily recoverable if the drive's data was not overwritten or if some files were overwritten but not the entire drive. But, if the entire drive was overwritten say, 7 times, (and especially if overwritten using random data rather than 0000s), then I believe the data is impossible to recover.

He said that it is/was possible to recover just about any file that had been on the hard drive even if it had been securely deleted.

BS

He said that they could recover just about any file that had been written to the hard drive, no matter when it was deleted, as it was stored in a special area of the drive which was ONLY accessible by the manufacturer or this forensics software.

BS
 
Well... No matter how "sophisticated" the inner workings of a hard drive are, they are still simply magnetic media like floppy disks and cassette tapes. They work a certain way and that's that (no magic here). If you could recover overwritten data from magnetic media, those guys who accidentally recorded the Super Bowl over their wedding VHS tape would be really happy, or at least their wives would be. (I know, we're talking digital vs. analog, but it still basically works the same).
 
He said that they could recover just about any file that had been written to the hard drive, no matter when it was deleted, as it was stored in a special area of the drive which was ONLY accessible by the manufacturer or this forensics software.

This probably isn't true. If it was true, then he's an idiot because he should quit his job an open an extremely successful data recovery company. He'd make a ton more money doing that and charging $1000+ per drive! :p
 
Back
Top