Hard Drive

Was the DNC Breach the Work of Russian Hackers?

The recent breach of sensitive data stored on the DNC server has been making waves since the stolen information was published on WikiLeaks just a few days ago. As the information is sifted through (exposing problematic behavior on the part of handfuls of DNC higher-ups), questions have gone unanswered regarding the expertly-planned cyber espionage attack that was so successfully carried out against the national committee.

dnc leak2Cyber experts have noted that the scale, timeliness, and sensitivity of the data released imply a level of sophistication that would be difficult to find outside of state-sponsored activity. WikiLeaks’ decision to publish the documents into a search engine has indexed that data, making it that much easier for those looking for damning data to locate it. Email conversations between democratic party leaders revealing a collusion to give the nomination to Hillary Clinton, remarks regarding Bernie Sanders’ lack of religious emphasis, and many other sensitive topics have been sentenced to the public eye, with largely embarrassing results.

It’s worth mentioning that the documents were well-timed; all confidential information was exposed strategically; their surfacing just before the Democratic National Convention allowed for the highest possible level of chaos upon the convention’s onset.

As for who actually carried out the hacking? American authorities seem to be unanimously pinning the blame on Russian hackers, an allegation that gains evidence daily. For example, in mid-June when the DNC called in the the cyber threat analysis firm Crowdstrike to examine the committee’s servers, the company found “two separate Russian intelligence-affiliated adversaries present in the DNC network.” Crowdstrike then released a comprehensive report of its findings, which were released on June 14. Among its many discoveries, Crowdstrike found that one of the hacking groups had been snooping in the DNC’s servers for almost a year. The next week, two different cybersecurity firms independently confirmed Crowdstrike’s reports. The additional firms also found that the two hackers used malware and methods identical to those used in other attacks attributed to the suspected Russian hacking groups.

dnc leakThe day after Crowdstrike’s report was published, a hacker calling themselves “Guccifer 2.0” took credit for the hack and claimed that he or she was not affiliated with the Russian government and was instead a stand-alone hacker. Guccifer 2.o went on to claim that he had handed off much of what he had found to Wikileaks.

More compelling evidence linking the DNC breach to Russian state-sponsored hacking was found by King’s College in London professor Thomas Rid. Rid found that there was an identical command-and-control address hardcoded into the DNC malware that was also on the malware that was used to hack the German Parliament back in 2015. German officials had stated that the malware originated from Russian military intelligence.

Additional evidence includes that documents were translated into Cyrillic and that Guccifer, who claimed to be Romanian, did not speak coherent Romanian.

“It doesn’t strain credulitiy to look at the Russians,” said malware expert with CitizenLab Morgan Marquis-Boire. “This is not the first time that Russian hackers have been behind intrusions in US government, and it seems unlikely that it will be the last.”

The Kremlin has denied any Russian involvement in the leak.

 

Electromagnetism- the Secret of Your Storage Drive

Whether you prefer classic hard disk drives or solid-state drives (also called flash drives), you rely on some form of electromagnetism to store your precious data. Your data has to be able to be converted into digital form to be stored in a computer, and as you likely know, digital data is stored in binary code, or a sequence of 0’s and 1’s.

But it’s not as if there’s just a bunch of 0’s and 1’s in your physical hard drive that your computer then configures into the data you recognize when you see it on your monitor. No, the physical way of storing binary code is through either the presence or absence of magnetism or electrical current.

b.opIn the case of a hard disc drive, if there’s no magnetism, that means 0. If there is magnetism, that means 1. A piece of magnetized metal reads the presence or absence of magnetism on tiny (microscopic) units of space on a spinning disk and from that understands what binary code to send to the computer, which then uses software to translate that code into more digestible information for you to read from your monitor.

In the case of a solid state drive, the absence of an electric current means 0, and the presence of an electric current means 1. Because electric currents can be created by transistors and transistors are able to be made smaller and smaller as time goes on (while hard disk drives can only be so  small and still be functional due to their reliance on a spinning disk mechanism), solid-state drives are capable of being much smaller and storing the same amount of information as hard disk drives. However, if your SSD fails, it’s going to be way less likely that you’re able to recover the information.

But this give and take between electricity and magnetism goes much deeper than a choice between storage drives. Magnetism actually begets electricity, and the other way around. Here’s how:

It comes down to subatomic particles, as things so often do. Each electron is surrounded by a force called an electric field. When an electron moves, it creates a second field called a magnetic field. When electrons are made to move together, or flow in an electric current through a conductor (i.e. a metal or other substance with a structure that enables electrons to weave through the place comfortably), the conductor becomes a temporary magnet.

hmBut that’s electricity begetting magnetism. How would that current even be forced to be created? If you get a coil of wire and place it near a magnet with an unchanging magnetic filed, nothing happens. However, if that magnetic field is changed by moving the magnet back and forth or spinning the wire, the changing magnetic field can produce an electric current in the wire.

Electricity and magnetism have always been extremely closely related, in an interactive relationship known as electromagnetism. Flowing electrons produce a magnetic field and spinning magnets cause an electric current to flow. Simple as that.

Role Of Hard Drive And Its Size

The main responsibility of hard drive is storage of data’s. On your computer, everything you are saving is getting stored in hard drive. Not just pictures, documents, videos and music. Your preferences, your program files and your OS are storing on the hard drive of your computer. The sad truth is you will lose all the stored files if hard disk gets damaged.

drive hard1That’s why many people are maintaining backup system for storing their important files in that. In hard drive, everything which we have saved is measured in expressions of its size. Very smallest file is text, picture is little bit bigger, music is bigger than picture file and video is the biggest file. It acts just like a scale. Hard drive can’t know the difference between the files; it knows only the size of the files. Like things are measuring in kilograms, the files stored in hard disk are measuring as megabyte, gigabyte and terabyte. If you want to store or take a backup of minimum files, then smaller hard drive (such as 500GB) is enough. Rather, if you want to store or take a backup of more files such as lot of audio and video files, then you need to use larger hard drive (such as 1TB).

Connections and speed of hard drive

Connecting hard drive to your computer is having 4 basic ways: USB – it is the common connection type and no need to do any set-up; the computer automatically recognizes the drive once you plug-in and immediately you can able to save and read files. FireWire – it is like plug and play USB and most popular in transferring video files. SATA – it is the internal hard disk common connection which provides more speed in any format of highest file transfer. eSATA – it is less common and found in PCs with high-performance connection, connection of eSATA executes at speed that intimately looks like an internal drive.

When and how to recovery data from hard drive?

Necessary to recover data from hard disk is for many reasons such as: Read/write heads of hard drive’s damaging, due to mishandled or unprotected power surge hard drive becomes fail, if hard disk exposing to coffee, water, condensation, battery leakage, flood and so on, file allocation table missing or damaging, hard drive formatted inadvertent, accidental or incorrectly, Master file table is corrupted or missing, burnt away chips hard drive, corrupted or missing of files or folders, not recognizing of hard drive by BIOS, hard drive head gets crash and Boot sector not get recognized.

drive hard2Hard drive data recovery is of two types: one is logical and the other is physical. Logical failures are due to virus, malware programs, errors in programs or software, inadvertent deletion of data and lost partitions. Whatever be the cast, the lost data can be recovered resources and tools by a data recovery specialist. Physical failures are through accumulated or direct trauma, botched repairs, through tampering, accidental cause and so on. In this case, the data is safeguarded on the drive but due to physical damage of hard drive it difficult to get access to the device. For successful extract of your valuable data best equipment and technical skills required.