Incident Response: Computer Forensics Toolkit A526367 FM.Qxd 3/21/03 3:37 PM Page Ii A526367 FM.Qxd 3/21/03 3:37 PM Page Iii

Total Page:16

File Type:pdf, Size:1020Kb

Incident Response: Computer Forensics Toolkit A526367 FM.Qxd 3/21/03 3:37 PM Page Ii A526367 FM.Qxd 3/21/03 3:37 PM Page Iii 526367 Cover_rb2.qxp 3/19/03 3:53 PM Page 1 Networking/Security $45.00 USA/$67.99 CAN/£31.50 UK TIMELY. PRACTICAL. RELIABLE. INCLUDES CD-ROM Your in-depth guide to detecting network breaches, uncovering evidence, Incident Response and preventing future attacks Whether it’s from malicious code sent You’ll learn how to: DOUGLAS SCHWEITZER is an through an e-mail or an unauthorized Internet security specialist and • Recognize the telltale signs of an user accessing company files, your authority on malicious code and incident and take specific response network is vulnerable to attack. Your computer forensics. He is a Cisco measures response to such incidents is critical. Certified Network Associate and Incident With this comprehensive guide, • Search for evidence by preparing Certified Internet Webmaster Douglas Schweitzer arms you with the operating systems, identifying Associate, and holds A+, tools to reveal a security breach, gather network devices, and collecting Network+, and i-Net+ certifica- evidence to report the crime, and con- data from memory tions. Schweitzer is also the duct audits to prevent future attacks. author of Internet Security Made • Analyze and detect when malicious He also provides you with a firm Easy and Securing the Network code enters the system and quickly understanding of the methodologies from Malicious Code. locate hidden files for incident response and computer Response forensics, Federal Computer Crime law • Perform keyword searches, review information and evidence require- browser history, and examine Web ments, legal issues, and how to work caches to retrieve and analyze clues CD-ROM includes: with law enforcement. • Create a forensics toolkit to prop- • Helpful tools to capture and erly collect and preserve evidence protect forensic data; search volumes, drives, and servers for • Contain an incident by severing evidence; and rebuild systems network and Internet connections, quickly after evidence has been and then eradicate any vulnerabili- Computer obtained ties you uncover • Valuable checklists developed • Anticipate future attacks and by the author for all aspects of Forensics monitor your system accordingly incident response and handling • Prevent espionage, insider attacks, and inappropriate use of Toolkit the network • Develop policies and procedures to carefully audit the system Wiley Technology Publishing Timely. Practical. Reliable. Visit our Web site at www.wiley.com/compbooks/ Schweitzer ISBN: 0-7645-2636-7 *85555-IGFADh ,!7IA7G4-fcgdgh!:p;o;p;K;K Douglas Schweitzer a526367 FM.qxd 3/21/03 3:37 PM Page i Incident Response: Computer Forensics Toolkit a526367 FM.qxd 3/21/03 3:37 PM Page ii a526367 FM.qxd 3/21/03 3:37 PM Page iii Incident Response: Computer Forensics Toolkit Douglas Schweitzer a526367 FM.qxd 3/21/03 3:37 PM Page iv Incident Response: Computer Forensics Toolkit Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2003 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 0-7645-2636-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1O/RR/QU/QT/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8700. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-Mail: [email protected]. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data on file with the publisher. Trademarks: Wiley, the Wiley Publishing logo, and related trade dress are trademarks or registered trademarks of Wiley Publishing, Inc., in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book. a526367 FM.qxd 3/21/03 3:37 PM Page v About the Author Douglas Schweitzer is an Internet security specialist with Brainbench certifications in Internet security and ITAA Information Security Awareness. Douglas is a Certified Internet Webmaster Associate, and he holds A+, Network+, and i-Net+ certifications from the Computing Technology Industry Association. He has appeared as an Internet security guest speaker on several radio shows, including KYW Philadelphia, as well as on Something You Should Know and Computer Talk America, two nationally syndicated radio shows. He is also the author of Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans and Internet Security Made Easy: A Plain-English Guide to Protecting Yourself and Your Company Online. a526367 FM.qxd 3/21/03 3:37 PM Page vi Credits ACQUISITIONS EDITOR PROJECT COORDINATORS Katie Feltman Cindy Phipps, Bill Ramsey PROJECT EDITOR GRAPHICS AND PRODUCTION SPECIALISTS Mark Enochs Beth Brooks, Sean Decker, LeAndra Johnson, Stephanie Jumper, TECHNICAL EDITOR Kristin McMullan, Heather Pope, Russell Shumway Julia Trippetti COPY EDITOR QUALITY CONTROL TECHNICIANS Maarten Reilingh Carl W. Pierce, Robert Springer EDITORIAL MANAGER PERMISSIONS EDITOR Mary Beth Wakefield Laura Moss VICE PRESIDENT & EXECUTIVE MEDIA DEVELOPMENT SPECIALIST GROUP PUBLISHER Travis Silvers Richard Swadley PROOFREADING VICE PRESIDENT AND EXECUTIVE PUBLISHER Kim Cofer Bob Ipsen INDEXING EXECUTIVE EDITOR Virginia Bess Carol Long EXECUTIVE EDITORIAL DIRECTOR Mary Bednarek a526367 FM.qxd 3/21/03 3:37 PM Page vii This book is dedicated in loving memory of Mirhan “Mike” Arian, whose insight and camaraderie are forever missed. a526367 FM.qxd 3/21/03 3:37 PM Page viii a526367 FM.qxd 3/21/03 3:37 PM Page ix Acknowledgments This book would not have been possible without the combined efforts of some very talented peo- ple. I would first like to thank my agent, Carole McClendon of Waterside Productions for her assis- tance in again finding me a superb publisher. I would also like to thank the hard-working individuals at Wiley Publishing who helped to make this book a reality. Their enthusiasm and sup- port were a continued shot in the arm. In particular, I would like to thank Acquisitions Editor, Katie Feltman for her confidence in me and for helping me to shape and hone the initial outline for the book. I am also grateful to Project Editor, Mark Enochs for all his suggestions. I would like to say thank you to my wife and best friend, Monique, for without her help, this book would not have been possible. I tip my hat to Russ Shumway who, as my technical editor, did a superb job ensuring that all my facts were correct and who suggested a number of additions that kept this book technically sound. Thanks, as well, to my sons Deran and Alex for their enduring patience with me while I spent many long hours writing. ix a526367 FM.qxd 3/21/03 3:37 PM Page x a526367 FM.qxd 3/21/03 3:37 PM Page xi Contents at a Glance Acknowledgments . ix Introduction . xix Chapter 1 Computer Forensics and Incident Response Essentials . 1 Chapter 2 Addressing Law Enforcement Considerations . 27 Chapter 3 Forensic Preparation and Preliminary Response . 45 Chapter 4 Windows Registry, Recycle Bin, and Data Storage . 69 Chapter 5 Analyzing and Detecting Malicious Code and Intruders . 91 Chapter 6 Retrieving and Analyzing Clues. 115 Chapter 7 Procedures for Collecting and Preserving Evidence. 135 Chapter 8 Incident Containment and Eradication of Vulnerabilities . 155 Chapter 9 Disaster Recovery and Follow-Up . 177 Chapter 10 Responding to Different Types of Incidents . 195 Chapter 11 Assessing System Security to Prevent Further Attacks . 215 Chapter 12 Pulling It All Together. 235 Appendix A What’s on the CD-ROM . 247 Appendix B Commonly Attacked Ports . 257 Appendix C Field Guidance on USA Patriot Act 2001 . 269 Appendix D Computer Records and the Federal Rules of Evidence . 281 Appendix E Glossary . 289 Index . 297 a526367 FM.qxd 3/21/03 3:37 PM Page xii a526367 FM.qxd 3/21/03 3:37 PM Page xiii Contents Acknowledgments . ix Introduction . xix Chapter 1 Computer Forensics and Incident Response Essentials . 1 Catching the Criminal: The Basics of Computer Forensics . 2 Recognizing the Signs of an Incident . 5 Preparing for Incidents . 14 Developing a Computer Security Incident Response Capability. 16 The Computer Security Incident Response Team. 17 The Incident Reporting Process .
Recommended publications
  • The Watergate Story (Washingtonpost.Com)
    The Watergate Story (washingtonpost.com) Hello corderoric | Change Preferences | Sign Out TODAY'S NEWSPAPER Subscribe | PostPoints NEWS POLITICS OPINIONS BUSINESS LOCAL SPORTS ARTS & GOING OUT JOBS CARS REAL RENTALS CLASSIFIEDS LIVING GUIDE ESTATE SEARCH: washingtonpost.com Web | Search Archives washingtonpost.com > Politics> Special Reports 'Deep Throat' Mark Felt Dies at 95 The most famous anonymous source in American history died Dec. 18 at his home in Santa Rosa, Calif. "Whether ours shall continue to be a government of laws and not of men is now before Congress and ultimately the American people." A curious crime, two young The courts, the Congress and President Nixon refuses to After 30 years, one of reporters, and a secret source a special prosecutor probe release the tapes and fires the Washington's best-kept known as "Deep Throat" ... the burglars' connections to special prosecutor. A secrets is exposed. —Special Prosecutor Archibald Cox after his Washington would be the White House and decisive Supreme Court firing, Oct. 20, 1973 changed forever. discover a secret taping ruling is a victory for system. investigators. • Q&A Transcript: John Dean's new book "Pure Goldwater" (May 6, 2008) • Obituary: Nixon Aide DeVan L. Shumway, 77 (April 26, 2008) Wg:1 http://www.washingtonpost.com/wp-srv/politics/special/watergate/index.html#chapters[6/14/2009 6:06:08 PM] The Watergate Story (washingtonpost.com) • Does the News Matter To Anyone Anymore? (Jan. 20, 2008) • Why I Believe Bush Must Go (Jan. 6, 2008) Key Players | Timeline | Herblock
    [Show full text]
  • A New View of the Watergate Investigations
    A New View of the Watergate Investigations Author Ed Gray discusses his father�s experiences of the controversy from the top of the FBI Nixon Library April 9 at 7:00 p.m. March 18, Yorba Linda, CA—When President Nixon appointed L. Patrick Gray III as head of the FBI, Gray knew that following the footsteps of J. Edgar Hoover—his immediate (and only) predecessor—would be a challenge. But Gray quickly found himself in a deep mess, the result of the FBI’s investigation into the June 1972 break-in at the Democratic National Committee headquarters in the Watergate office complex in Washington, D.C. Gray lays out his story in his posthumously published memoirs, co-written with his son, Ed Gray. Ed Gray will discuss his father’s view of the Watergate controversy and its aftermath at a free public lecture on April 9 at 7:00 p.m. at the Richard Nixon Presidential Library and Museum. “Part of the Nixon Library’s mission is to encourage a free spirit of inquiry into all aspects of the Nixon administration, including the Watergate abuses of government power,” Library director Tim Naftali said. According to publisher Times Books: This book is Gray’s firsthand account of what really happened during his crucial year as acting director of the FBI, based on a never-before-published first-person account and previously secret documents. He reveals the witches’ brew of intrigue and perfidy that permeated Washington, and he tells the unknown story of his complex relationship with his top deputy, Mark Felt, raising disturbing questions about the methods and motives of the man purported to be Deep Throat.
    [Show full text]
  • Watergate and the Two Lives of Mark Felt
    Watergate and the Two Lives of Mark Felt Page 1 of 7 washingtonpost.com Advertisement Watergate and the Two Lives of Mark Felt Roles as FBI Official, 'Deep Throat' Clashed THE VALUE By Michael Dobbs Washington Post Staff Writer STARTS Monday, June 20, 2005; A01 WITH THE The Watergate scandal had reached a peak, and President Richard M. Nixon was furious about press leaks. His suspicions focused on the number two man at the FBI, W. Mark Felt, a 31-year bureau veteran. He ordered his aides to "confront" the presumed traitor. Another man may have panicked. Over the previous six months, Felt had been meeting secretly with Bob Woodward of The Washington Post, helping him and fellow Post reporter Carl Bernstein with a series of sensational scoops about the abuse of presidential power. But the former World War II spymaster had an exquisite sense of how to play the bureaucratic game. In a Feb. 21, 1973, FBI memo, Felt denounced the Post stories as an amalgam of "fiction and half truths," combined with some genuine information from "sources either in the FBI or the Department of Justice." To deflect attention from himself, he ordered an investigation into the latest leak. "Expedite," he instructed. Recently identified as the secret Watergate source known as "Deep Throat," Felt is the last and most mysterious of a colorful cast of characters who have captured the national imagination. Now 91, and in shaky health, the former FBI man joins a pantheon of Watergate figures ranging from H.R. "Bob" Haldeman and G. Gordon Liddy to John J.
    [Show full text]
  • FBI's Lead Watergate Investigators Speak Together Publicly
    FBI’s Lead Watergate Investigators Speak Together Publicly — For The First Time ! This panel will bring together publicly for the first time the FBI's lead The panel includes: investigators of the Watergate Scandal. • Angelo Lano—Agent assigned the Through memories and anecdotes, these Watergate case, considered the Bureau’s panelists will create a narrative of the most thorough source of Watergate information. To a person, every person Bureau's work that weaves the initial committed to this panel says Watergate burglary to the halls of the Nixon White would not have been successful without House and ultimately the Oval Office. Lano’s leadership. Popular culture and the media have • John Mindermann—Agent who long focused on the role of the Washington developed sources in CREEP, including Post's Bob Woodward and Carl Bernstein in Judy Hoback, a key informant who breaking Watergate leads to the public. If helped shift the Bureau’s investigation the media looks at the FBI's involvement from the burglars to Nixon’s into Watergate, they often center upon administration. In 1973, he occupied former FBI Assistant Director Mark Felt, the Nixon White House to secure popularly known as "Deep Throat." This Watergate evidence under orders of the Attorney General. panel will illuminate the Bureau's role in the • Paul Magallanes—Agent who Watergate investigation and attribute the interviewed Watergate burglars in success of the Watergate investigation to a Spanish in the DC jail mere hours after handful of special agents who worked, the Watergate break-in. He developed against incredible odds and amidst sources in CREEP, including Hoback.
    [Show full text]
  • Dangerous Liaisons: Seduction and Betrayal in Confidential Press-Source Relations Lili Levi University of Miami School of Law, [email protected]
    University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 1991 Dangerous Liaisons: Seduction and Betrayal in Confidential Press-Source Relations Lili Levi University of Miami School of Law, [email protected] Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Communications Law Commons, and the Social Influence and Political Communication Commons Recommended Citation Lili Levi, Dangerous Liaisons: Seduction and Betrayal in Confidential Press-Source Relations, 43 Rutgers L. Rev. 609 (1991). This Article is brought to you for free and open access by the Faculty and Deans at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. ARTICLE DANGEROUS LIAISONS: SEDUCTION AND BETRAYAL IN CONFIDENTIAL PRESS-SOURCE RELATIONS Lili Levi* INTRODUCTION .................................. 611 I. MEDIA ETHICS, VOLUNTARY DISCLOSURE, AND SOURCE RETALIATION .......................... 620 A. A Typology of Confidential Sources ....... 623 1. Source Identity ...................... 623 2. Motivations for Leaking ............... 624 3. Leaks versus Plants .................. 628 4. Reasons for Anonymity ............... 631 B. The Ethic of Non-Disclosure ............. .632 C. The Occasions of Voluntary Disclosure .... 636 D. The New Trend of Source Retaliation ..... 639 II. CURRENT APPROACHES TO BREACH OF CONTRACT CLAIMS BY NEWS SOURCES ..................... 644 A. Freedom of Contract Model .............. 645 B. First Amendment Model ................. 656 1. First Amendment Immunity ........... 656 * Associate Professor of Law, University of Miami School of Law. A.B. 1977, Bryn Mawr College; J.D. 1981, Harvard Law School.
    [Show full text]
  • Nixon's Wars: Secrecy, Watergate, and the CIA
    Eastern Kentucky University Encompass Online Theses and Dissertations Student Scholarship January 2016 Nixon's Wars: Secrecy, Watergate, and the CIA Chris Collins Eastern Kentucky University Follow this and additional works at: https://encompass.eku.edu/etd Part of the Defense and Security Studies Commons, and the United States History Commons Recommended Citation Collins, Chris, "Nixon's Wars: Secrecy, Watergate, and the CIA" (2016). Online Theses and Dissertations. 352. https://encompass.eku.edu/etd/352 This Open Access Thesis is brought to you for free and open access by the Student Scholarship at Encompass. It has been accepted for inclusion in Online Theses and Dissertations by an authorized administrator of Encompass. For more information, please contact [email protected]. Nixon’s Wars: Secrecy, Watergate, and the CIA By Christopher M. Collins Bachelor of Arts Eastern Kentucky University Richmond, Kentucky 2011 Submitted to the Faculty of the Graduate School of Eastern Kentucky University In partial fulfillment of the requirements for the degree of MASTER OF ARTS December, 2016 Copyright © Christopher M. Collins, 2016 All rights reserved ii Acknowledgments I could not have completed this thesis without the support and generosity of many remarkable people. First, I am grateful to the entire EKU history department for creating such a wonderful environment in which to work. It has truly been a great experience. I am thankful to the members of my advisory committee, Dr. Robert Weise, Dr. Carolyn Dupont, and especially Dr. Thomas Appleton, who has been a true friend and mentor to me, and whose kind words and confidence in my work has been a tremendous source of encouragement, without which I would not have made it this far.
    [Show full text]
  • CYBERSECURITY When Will You Be Hacked?
    SUFFOLK ACADEMY OF LAW The Educational Arm of the Suffolk County Bar Association 560 Wheeler Road, Hauppauge, NY 11788 (631) 234-5588 CYBERSECURITY When Will You Be Hacked? FACULTY Victor John Yannacone, Jr., Esq. April 26, 2017 Suffolk County Bar Center, NY Cybersecurity Part I 12 May 2017 COURSE MATERIALS 1. A cybersecurity primer 3 – 1.1. Cybersecurity practices for law firms 5 – 1.2. Cybersecurity and the future of law firms 11 – 2. Information Security 14 – 2.1. An information security policy 33 – 2.2. Data Privacy & Cloud Computing 39 – 2.3. Encryption 47 – 3. Computer security 51 – 3.1. NIST Cybersecurity Framework 77 – 4. Cybersecurity chain of trust; third party vendors 113 – 5. Ransomware 117 – 5.1. Exploit kits 132 – 6. Botnets 137 – 7. BIOS 139 – 7.1. Universal Extensible Firmware Interface (UEFI) 154– 8. Operating Systems 172 – 8.1. Microsoft Windows 197 – 8.2. macOS 236– 8.3. Open source operating system comparison 263 – 9. Firmware 273 – 10. Endpoint Security Buyers Guide 278 – 11. Glossaries & Acronym Dictionaries 11.1. Common Computer Abbreviations 282 – 11.2. BABEL 285 – 11.3. Information Technology Acronymns 291 – 11.4. Glossary of Operating System Terms 372 – 2 Cyber Security Primer Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
    [Show full text]
  • Embodying Deep Throat: Mark Felt and the Collective Memory of Watergate
    Critical Studies in Media Communication ISSN: 1529-5036 (Print) 1479-5809 (Online) Journal homepage: http://www.tandfonline.com/loi/rcsm20 Embodying Deep Throat: Mark Felt and the Collective Memory of Watergate Matt Carlson To cite this article: Matt Carlson (2010) Embodying Deep Throat: Mark Felt and the Collective Memory of Watergate, Critical Studies in Media Communication, 27:3, 235-250, DOI: 10.1080/15295030903583564 To link to this article: http://dx.doi.org/10.1080/15295030903583564 Published online: 23 Jul 2010. Submit your article to this journal Article views: 349 View related articles Citing articles: 3 View citing articles Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=rcsm20 Download by: [Cankaya Universitesi] Date: 07 November 2016, At: 07:16 Critical Studies in Media Communication Vol. 27, No. 3, August 2010, pp. 235Á250 Embodying Deep Throat: Mark Felt and the Collective Memory of Watergate Matt Carlson On May 31, 2005, a long-running journalistic secret came to an end when Vanity Fair revealed Deep Throat, Bob Woodward and Carl Bernstein’s famous Watergate unnamed source, to be W. Mark Felt, the associate director of the FBI under President Nixon. While the announcement bought to a close 30 years of speculation and accusations concerning Deep Throat’s identity, it created new complications in promoting Watergate as a marker of journalistic success. With stroke-afflicted Felt unable to speak on his own behalf, other speakers came forward to question Felt’s character and his motives for surreptitiously working with journalists. In struggling to interpret the past, journalists and critics competed publicly to define acceptable news practices in the present.
    [Show full text]
  • 20 WMMBRJ 1115 Page 1 20 Wm. & Mary Bill Rts. J. 1115 © 2012
    20 WMMBRJ 1115 Page 1 20 Wm. & Mary Bill Rts. J. 1115 William & Mary Bill of Rights Journal May, 2012 Articles *1115 THE INTERNET AT 20: EVOLUTION OF A CONSTITUTION FOR CYBERSPACE Henry H. Perritt, Jr. [FNa1] Copyright (c) 2012 Publications Council of the College of William & Mary; Henry H. Perritt, Jr. Introduction In 1995, this Journal published my [FN1] article arguing for broader public access to government-generated information, explaining that the Internet provided the potential for a new window into government operations and decisions. [FN2] That article, summarized more thoroughly in Part I.C below, focused on only one aspect of the then-neophyte Internet's capacity to revolutionize how people interact with each other, participate in democratic political systems, conduct commerce, and create and communicate art. [FN3] The Internet is now about twenty years old-measured from the time that the federal government decided to release it from its governmental sponsorship and control in the research and national security communities and launch it into the private sector as a global information infrastructure. Some of the earliest battles over the Internet were fought over access to government information. Gradually, the battlefield broadened, encompassing a wide range of federal and state constitutional issues, federal common law, and private international law. The same core issues and principles explored in my 1995 article, however-deferring to competitive markets and encouraging them to produce a diversity of products and services, ensuring access to the marketplace by all consumers and producers, and providing a mechanism to compensate for injury [FN4]-now frame the full range of legal and policy questions arising from the Internet's ubiquity.
    [Show full text]
  • `Deep Throat' Unmasks Himself: Ex-No. 2 at F.B.I
    `Deep Throat' Unmasks Himself: Ex-No. 2 at F.B.I. By TODD S. PURDIJM WASHINGTON, May 31 — Deep Throat, the mystery man who reigned as Washington's best-kept secret source for more than 30 years, was not just any shadowy, cigarette- smoking tipster in a raincoat. He was the No. 2 official of the F.B.I., W. Mark Felt, who helped The Washing- ton Post unravel the Watergate scan- dal and the presidency of Richatd M. Nixon, a feat that he lived to see dis- closed on Tuesday, frail but smiling at 91. In a final plot twist worthy of the saga that Mr. Felt helped to spawn, Vanity Fair magazine released an article from its July issue reporting that Mr. Felt, long a prime suspect to Nixon himself, had in recent years confided to his family and friends, "I'm the guy they used to call 'Deep Throat.' " Within hours — after Mr. Felt him- self, in failing health since suffering a stroke in 2001, appeared in the doorway of his daughter's home in Santa Rosa, Calif. — The Post con- firmed his role in encouraging its re- Asaaclated Press porters Bob Woodward and Carl W. Mark Felt, above, as he appeared in 1976, on the CBS News pro- Bernstein to follow the trail from the gram "Face the Nation," and yesterday at his home in California. break-in at Democratic National. Committee headquarters in the Wa- tergate complex in Washington to THE SECRET THAT GOT AWAY Indeed, some old Nixon hands like the highest levels of the Nixon ad- After keeping Deep Throat's secret Patrick J.
    [Show full text]
  • Where-Have-All-The-Emails-Gone-By-David-Gewirtz.Pdf
    Where Have All the Emails Gone? Gifted to the public from the Make a difference at by David Gewirtz U.S. Strategic Perspective Institute HowToSaveJobs.org Other resources from ZATZ Publishing OutlookPower Magazine (at OutlookPower.com) is our general email publication covering Outlook (the email client) and Exchange (the server). Because it covers both sides, we get readers ranging from basic mail users up through enterprise IT staff. There are a few key common denominators among all our readers, the most measurable being that these folks are intense email users. DominoPower Magazine (at DominoPower.com) is our Lotus publication and is all about Lotus messaging and collaboration. It’s read by virtually all the Lotus network managers, systems engineers, developers, business partners, and key Lotus and IBM personnel. Computing Unplugged (at ComputingUnplugged.com) covers, quite literally, unplugged computing. It covers handheld computers, WiFi, GPS devices, laptops, wireless and cell phone issues, and even robotics. Like OutlookPower, coverage and readership range from general consumer coverage through enterprise solutions. Connected Photographer (at ConnectedPhotographer.com) is all about doing cool things with your photographs. We cover everything from studio technique to Photoshop plug-ins, to taking eBay and personals pictures, to cameras, gadgets, sharing, and even cameras in phones, PDAs, and more. This definitely ain’t your Daddy’s gearhead camera reviews mag! WebSpherePower Magazine (at WebSpherePower.com) provides news and information about IBM’s WebSphere initiatives, the open-source Eclipse system, and enterprise Java development. Resources for this book can be found online at EmailsGone.com. Questions and comments on Where Have All The Emails Gone? may be sent to: David Gewirtz ZATZ Publishing Email: [email protected] Web: ZATZ.com Phone: 321-722-4620 Where Have All the Emails Gone? Gifted to the public from the Make a difference at by David Gewirtz U.S.
    [Show full text]
  • Face the Nation
    © 2005 CBS Broadcasting Inc. All Rights Reserved PLEASE CREDIT ANY QUOTES OR EXCERPTS FROM THIS CBS TELEVISION PROGRAM TO "CBS NEWS' FACE THE NATION. " CBS News FACE THE NATION Sunday, June 5, 2005 GUESTS: BEN BRADLEE The Washington Post JOHN DEAN Former Nixon White House Counsel JAMES MANN Author, "Rise of the Vulcans: The History of Bush's War Cabinet" MODERATOR: BOB SCHIEFFER - CBS News This is a rush transcript provided for the information and convenience of the press. Accuracy is not guaranteed. In case of doubt, please check with FACE THE NATION - CBS NEWS 202-457-4481 BURRELLE'S INFORMATION SERVICES / 202-419-1859 / 800-456-2877 Face the Nation (CBS News) - Sunday, June 5, 2005 1 BOB SCHIEFFER, host: Today on FACE THE NATION, the mystery and the meaning of Deep Throat. A 30-year mystery was solved last week when it was revealed that Deep Throat, the anonymous source who leaked to Washington Post reporters Woodward and Bernstein and helped bring down President Nixon was Mark Felt, the number-two at the FBI. Why did he do it? If not for him, could President Nixon have stayed in office? And what does it mean to the debate over anonymous sources? We'll talk to Ben Bradlee, who was the editor of The Washington Post during Watergate, John Dean, former White House counsel under Nixon, and author James Mann who fingered Mark Felt over a decade ago. Finally, some of my own thoughts on Deep Throat. But first, the editor who broke the Watergate story on FACE THE NATION.
    [Show full text]