Difference between pages "Category:Secure deletion" and "Residual Data on Used Equipment"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
m (Cell Phones)
 
Line 1: Line 1:
Secure Deletion tools are tools that completely delete the item that the user requests to be deleted.
+
Used hard drives are frequently a good source of images for testing forensic tools. That's because many individuals, companies and organizations neglect to properly sanitize their hard drives before they are sold on the secondary market.
  
Why don't operating systems do this by default?
+
You can find used hard drives on eBay, at swap meets, yard sales, and even on the street.
  
= Programs of Special Note =
 
  
; [[BangDisk]]
+
=Media Accounts=
: Offers several patterns for wiping data, wipe multiple types of media at one time USB, ATA, SCSI, CF and more.
+
==Used Hard Drives==
: http://www.bangdisk.com
+
  
; [[BCWipe]]
+
There have been several incidents in which individual have purchased a large number of hard drives and written about what they have found. This web page is an attempt to catalog all of those stories in chronological order.
: Secure data deletion tools for [[Windows]] and [[Unix]]-like [[operating systems]].
+
  
; [[CyberScrub cyberCide]]
+
* '''2003-01''': [[Simson Garfinkel]] and Abhi Shelat at MIT publish a study in ''IEEE Security and Privacy Magazine''  which documents large amount of personal and business-sensitive information found on 150 drives purchased on the secondary market.
: This program securely erases all data from drives or partitions.
+
: http://www.cyberscrub.com/products/cybercide/index.php
+
  
; [[CyberScrub Privacy Suite]]
+
* '''2006-06''': A man buys a family's hard drive at a fleamarket in Chicago after the family's hard drive is upgraded by Best Buy. Apparently somebody at Best Buy violated company policy and instead of destroying the hard drive, they sold it. [http://www.youtube.com/watch?v=pcyemfJ5H3o&NR Target 5 Investigation]
: This program securely erases selected data, wipes free space, powerful scheduling capabilities.
+
: http://www.cyberscrub.com/products/privacysuite/index.php
+
  
; [[CyberScrub Compliance Suite]]
+
* '''2006-08-10''': The University of Glamorgan in Wales purchased 317 used hard drives from the UK, Australia, Germany, and the US. 25% of the 200 drives purchased from the UK market had been completely wiped. 40% of the purchased drives didn't work.  40% came from businesses, of which 23% contained enough information to identify the company. 5% had business sensitive information. 25% came from individuals, of which many had pornography, and 2 had to be referred to the police for suspected child pornography.
: Network-based program securely erases selected data, wipes free space, powerful scheduling and log file reporting capabilities. Ideal for enforcing document life-cycle and data retention policies. Ensures compliance with HIPAA, Sarbanes Oxley, FACTA, Gramm Leach Bliley and more
+
: http://www.cyberscrub.com/products/compliancesuite/index.php
+
  
; [[Darik's Boot and Nuke]] ([[DBAN]])
+
* '''2006-08-14''': [http://news.bbc.co.uk/2/hi/business/4790293.stm BBC News] reports on bank account information recovered from used PC hard drives and being sold in Nigeria for £20 each. The PCs had apparently come from recycling points run by UK town councils that are then "recycled" by being sent to Africa.
: This is a bootable disk that securely wipes any hard disk it can detect. 
+
: http://dban.sourceforge.net/
+
  
; [[Eraser]]
+
* '''2006-08-15''': Simson Garfinkel presents results of a study of 1000 hard drives (750 working) at the 2006 Workshop on Digital Forensics. Results of the study show that information can be correlated across hard drives using Garfinkel's [[Cross Drive Analysis]] approach.
: Offers several patterns for wiping data including [[Peter Gutmann]]'s and the [[US DoD 5200.28-STD]] standard.
+
: http://www.heidi.ie/eraser
+
  
; [[Ontrack Data Eraser]]
+
* '''2007-02-06''': [http://www.fulcruminquiry.com Fulcrum Inquiry], a Los Angeles litigation support firm, purchased 70 used hard drives from 14 firms and discovered confidential information on 2/3rds of the drives.
: ...
+
  
; [[shred]]
+
* '''2007-08-30''': Bill Ries-Kinght, an IT consultant, purchases a 120GB Seagate hard drive on eBay for $69. Although the drive was advertised as being new, it apparently was previously used by the campaign of Mike Beebe, who won the Arkansas state governorship in November 2006. "Among the files were documents listing the private cell phone numbers of political allies, including US Senators Blanch Lincoln and Mark Pryor and US Representatives Marion Berry, Mike Ross and Vic Snyder. It also included talking points to guide the candidate as he called influential people whose support he sought," states an article published in [http://www.theregister.co.uk/2007/08/30/governors_data_sold_on_ebay/ The Register].
: http://www.gnu.org/software/coreutils/ linux version of GNU shred
+
: http://gnuwin32.sourceforge.net/packages/coreutils.htm Win32 version of GNU shred
+
: Part of GNU coreutils.
+
  
; [[wipe]]
+
* '''2008-01-28''': Gregory Evans, a security consultant in Marina Del Ray, Calif., bought a $500 computer at a swap meet from a former mortgage company. It contained credit reports on 300 people in a deleted file, according to an article published in [http://www.nydailynews.com/money/2008/01/28/2008-01-28_sensitive_info_lives_on_in_old_computers.html The New York Daily NEws]. The security consultant was also able to recover the usernames and passwords of the mortgage company's former employees.
: http://abaababa.ouvaton.org/wipe/
+
==Cell Phones==
 +
* [http://www.wired.com/techbiz/media/news/2003/08/60052 BlackBerry Reveals Bank's Secrets], Wired, August 8, 2005.
 +
* [http://www.taipeitimes.com/News/feat/archives/2008/09/28/2003424400 Who has your old phone's data], Pete Warren, The Guardian, London, Sept. 28, 2008, page 13.
 +
* [http://www.myfoxdc.com/myfox/pages/News/Detail?contentId=8055902&version=1&locale=EN-US&layoutCode=TSTY&pageId=3.2.1 McCain Campaign Sells Info-Loaded Blackberry to FOX 5 Reporter], by Tisha Thompson and Rick Yarborough, FOX 5 Investigative Unit, 11 December 2008.  (See also [http://www.theregister.co.uk/2008/12/12/mccain_blackberry/])
  
; [[Atomsmasher]]
+
==Cameras==
: http://www.secureatom.com
+
* [http://www.telegraph.co.uk/news/uknews/3107003/Camera-sold-on-eBay-contained-MI6-files.html Camera sold on eBay contained MI6 files], Jessica Salter, Telegraph, September 30, 2008.
  
; [[Lenovo SDD]]
+
==Network Equipment==
: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-56394
+
* [http://www.pcpro.co.uk/news/227190/council-sells-security-hole-on-ebay.html Council sells security hole on Ebay], Matthew Sparkes, PC Pro, September 29, 2008 - Kirkless Council (UK) sells a Cisco [[VPN]] 3002 Concentrator on Ebay for 99 pence. The device is purchased by Andrew Mason, a security consultant, who discovers that the Cisco [[VPN]] device still has the full configuration for the Kirkless Council and the device hasn't been deactivated.
  
== See also ==
+
=See Also=
 
+
[[Residual Data]]
* [[Anti-forensic techniques]]
+
* [[Database Encryption]].
+
 
+
[[Category:Tools]]
+
[[Category:Top-Level]]
+

Revision as of 12:56, 15 December 2008

Used hard drives are frequently a good source of images for testing forensic tools. That's because many individuals, companies and organizations neglect to properly sanitize their hard drives before they are sold on the secondary market.

You can find used hard drives on eBay, at swap meets, yard sales, and even on the street.


Media Accounts

Used Hard Drives

There have been several incidents in which individual have purchased a large number of hard drives and written about what they have found. This web page is an attempt to catalog all of those stories in chronological order.

  • 2003-01: Simson Garfinkel and Abhi Shelat at MIT publish a study in IEEE Security and Privacy Magazine which documents large amount of personal and business-sensitive information found on 150 drives purchased on the secondary market.
  • 2006-06: A man buys a family's hard drive at a fleamarket in Chicago after the family's hard drive is upgraded by Best Buy. Apparently somebody at Best Buy violated company policy and instead of destroying the hard drive, they sold it. Target 5 Investigation
  • 2006-08-10: The University of Glamorgan in Wales purchased 317 used hard drives from the UK, Australia, Germany, and the US. 25% of the 200 drives purchased from the UK market had been completely wiped. 40% of the purchased drives didn't work. 40% came from businesses, of which 23% contained enough information to identify the company. 5% had business sensitive information. 25% came from individuals, of which many had pornography, and 2 had to be referred to the police for suspected child pornography.
  • 2006-08-14: BBC News reports on bank account information recovered from used PC hard drives and being sold in Nigeria for £20 each. The PCs had apparently come from recycling points run by UK town councils that are then "recycled" by being sent to Africa.
  • 2006-08-15: Simson Garfinkel presents results of a study of 1000 hard drives (750 working) at the 2006 Workshop on Digital Forensics. Results of the study show that information can be correlated across hard drives using Garfinkel's Cross Drive Analysis approach.
  • 2007-02-06: Fulcrum Inquiry, a Los Angeles litigation support firm, purchased 70 used hard drives from 14 firms and discovered confidential information on 2/3rds of the drives.
  • 2007-08-30: Bill Ries-Kinght, an IT consultant, purchases a 120GB Seagate hard drive on eBay for $69. Although the drive was advertised as being new, it apparently was previously used by the campaign of Mike Beebe, who won the Arkansas state governorship in November 2006. "Among the files were documents listing the private cell phone numbers of political allies, including US Senators Blanch Lincoln and Mark Pryor and US Representatives Marion Berry, Mike Ross and Vic Snyder. It also included talking points to guide the candidate as he called influential people whose support he sought," states an article published in The Register.
  • 2008-01-28: Gregory Evans, a security consultant in Marina Del Ray, Calif., bought a $500 computer at a swap meet from a former mortgage company. It contained credit reports on 300 people in a deleted file, according to an article published in The New York Daily NEws. The security consultant was also able to recover the usernames and passwords of the mortgage company's former employees.

Cell Phones

Cameras

Network Equipment

  • Council sells security hole on Ebay, Matthew Sparkes, PC Pro, September 29, 2008 - Kirkless Council (UK) sells a Cisco VPN 3002 Concentrator on Ebay for 99 pence. The device is purchased by Andrew Mason, a security consultant, who discovers that the Cisco VPN device still has the full configuration for the Kirkless Council and the device hasn't been deactivated.

See Also

Residual Data

Pages in category "Secure deletion"

The following 6 pages are in this category, out of 6 total.