Skip to main content

Rescuing Digital Data from Submerged HDD

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2011)

Abstract

As the increasing number of personal computers is involved in various criminal cases, the importance of the capability of extracting crucial digital data from these electromagnetic devices is getting emphasized. There are criminal cases where digital devices happen to be found in mud, water, and fire. Because digital devices have the possibility of storing essential key information that might contribute to the solution of particular criminal cases, it is usually required to retrieve data contained in the electromagnetic storage installed in personal computers by any means however damaged they may appear to be. This study reports one of the best practices of our successful experimental result on the extraction of digital data from damaged hard disk drive. This result is expected to help digital forensic practitioners deal effectively with similar cases in difficult situations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. dataclinic, http://www.dataclinic.co.uk/data-recovery-spinstand.html

  2. Mayergoyz, I.D., Tse, C.: Spin-stand Microscopy of Hard Disk Data. Elsevier Series in Electromagnetism (2007)

    Google Scholar 

  3. Tseng, C.Y.: The study and development of automatic data acquisition system for spin-stand imaging and drive independent recovery of hard disk data. Dissertation Submitted to the Faculty of the Graduate School of the University of Maryland (2007)

    Google Scholar 

  4. ASONE, http://www.as-1.co.jp

  5. Monthly Journal of Tribology (192), 49–51 (2003)

    Google Scholar 

  6. Speedfam Clean System Co., Ltd., http://www.speedfam-clean.jp/pdf/05onjunsuikansou.pdf

  7. Zhang, H., Mitsuya, Y., Fujikawa, Y., Fuwa, A., Fukuzawa, K.: IEEE Transaction on Magnetics 45(10), 3632–3635 (2009)

    Article  Google Scholar 

  8. Gao, C., Lee, Y.C., Chao, J., Russak, M.: IEEE Transaction on Magnetics 31(6), 2982–2984 (1995)

    Article  Google Scholar 

  9. Lee, H., Bhusan, B.: Journal of Colloid and Interface Science 353, 574–581 (2011)

    Article  Google Scholar 

  10. Solvey Solex, http://www.solvaynorthamerica.com

  11. 3M, http://solutions.3m.com/wps/portal/3M/en_US/Novec

  12. Advantec, http://www.advantec.co.jp/english/index.html

  13. Monthly Journal of Tribology (187), 12–14 (2003)

    Google Scholar 

  14. Fujitsu, MHT-AH Series, http://www2.fcpa.fujitsu.com/sp_support/ext/mobile/datasheets/mht5400rpm-datasheet.pdf

  15. Fujitsu, MH2080AH, MHT2060AH, MHT2040AH Disk Drives Product Manual, http://www.fujitsu.com/downloads/COMP/fcpa/hdd/discontinued/mht20xxah_prod-manual.pdf

  16. ACE Laboratory, http://www.acelaboratory.com/index.php

  17. ACE Laboratory, http://www.acelaboratory.com/dataextractor.php

  18. Private discussion with a data recovery vendor

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Yasuhira, T., Nishimura, K., Koida, T. (2012). Rescuing Digital Data from Submerged HDD. In: Gladyshev, P., Rogers, M.K. (eds) Digital Forensics and Cyber Crime. ICDF2C 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35515-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35515-8_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35514-1

  • Online ISBN: 978-3-642-35515-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics