Describes a process for finding keys in memory for several common algorithms, which is then applied to breaking encrypted disks after the machine has been physically stolen and its memory frozen to prevent state decay when the power is cut and transplanted to another machine for sifting.