Are there any real life cases where software such as DBAN (to securely erase disks) has beaten government/law enforcement agencies?
I found this online which lists each time encryption has beaten investigators, but nothing for secure deletion.
Are there any real life cases where software such as DBAN (to securely erase disks) has beaten government/law enforcement agencies?
I found this online which lists each time encryption has beaten investigators, but nothing for secure deletion.
The reason DBAN or such erasure software, wont beat the investigators, is that when they find out a drive is erased (zero:ed), this will count as destruction of evidence, which is punishable.
Thus, its enough that the investigators prove that the drive has been intentionally erased. It depends on country, but in most countries that employ the "forbidden fruit" scheme, do also make it illegal to destroy evidence, even "own" evidence. In countries that employ a "free evidence usage" policy in court, does normally make it legal for the suspect to erase his own evidence (its up to the police to catch the evidence before it gets erased), to balance everything out, but in those countries, erased disk is same as someone putting a letter in the fireplace, eg something that usually don't make it out to the headlines.
And they can find out if a device is used after it has been taken out of fresh packaging, as there is a log in the disk, normally called SMART, that will log different charactericts of the disk, as power on hours and other similiar metadata, thus a investigator can see roughtly how much a disk has been used, which means a investigator can see if a disk is just zeroes because its unpacked but not yet used, and a disk that is zeroes because it has been intentionally erased.
And even if that log is erased via firmware commands (may not always be possible), its possible for a investigator to look at the wear of the flash chip where SMART data is stored, and see that the content of the flash chip is altered, as a unused disk will have a zero SMART table with a zero wear.
Thus, a encryption means that the investigator is stuck, as its the same as hiding evidence, which isn't illegal. In the real life world, hiding evidence could be taking that murder knife and putting under the floor planks. Even if the investigators wont find it, they cant convict you. However, if you put that knife in the fireplace, the investigators can use the burnt out knife as evidence that you did destroy evidence, and thus you will get punishment anyways.
Forgetting a password don't count as destroying evidence.
So actually, erasing the disk by encrypting it with a random password, is safer, than erasing it with DBAN, when it comes to legal issues. Same with DBANing a disk, and NOT do a final zeroization. But a completely random disk can also be taken as destroyed evidence, why it can be a good idea to put a real truecrypt boot loader or boot loader from some other encryption software, to give a plausible reason to why data is random, when you have erased it.