April 2003 CSO Magazine









ROI is King
So many products, so little budget. That's the common refrain in today's tight economic conditions—in security and every other area of corporate spending.

Read Toolbox
















































































CSO: The Resource for Security Executives

CSO Newsletters
CSO's free newsletter keeps you informed about the latest articles, analysis, news, reports and other developments at CSOonline.com. Sign up today.


Subscribe to CSO
CSO is free to qualified readers in the U.S. and Canada.


Read CSO Online
All the issues of CSO are available online.




 
Hard-Disk Risk

Are all those old hard drives you're getting rid of free of important company data? Don't be so sure.     BY SIMSON GARFINKEL


A FEW YEARS AGO, when I was in Silicon Valley with nothing to do, I stopped by one of the valley's famed stores that sell used and "recycled" computers. In the store's front were used minicomputers, workstations, terminals and lots of old PCs that had all seen better days. Then I noticed that the store was selling used hard drives as well. A 10GB drive could be had for just $30—quite a bargain at the time.

"You clear the information off these drives before you sell them?" I asked innocently.

"Absolutely," said the man behind the counter. "I do it myself. We run FDisk on every drive. There's no way to get back the information after you do that."

Really? Turns out he was wrong. Running Windows FDisk on a 10GB drive overwrites only 0.01 percent of the drive's sectors. Although Windows doesn't give you any tools for recovering the data afterward, many such tools are currently on the market (for descriptions of those tools, see "Tools of Evidence," Machine Shop, March 2003).

But the real treasure trove that day wasn't on the store's display shelves; it was in the warehouse. The cavernous space out back had several shelves stacked high with old hard drives, each $5, "as is and untested," according to the sign. In other words, nobody had even run FDisk on those drives. Pop one into a computer, and you could recover the previous owner's files simply by running XCopy.

I bought 20 of them.

I took the drives home and started my own forensic analysis. Several of the drives had source code from high-tech companies. One drive had a confidential memorandum describing a biotech project; another had internal spreadsheets belonging to an international shipping company.

Since then, I have repeatedly indulged my habit for procuring and then analyzing secondhand hard drives. I bought recycled drives in Bellevue, Wash., that had internal Microsoft e-mail (somebody who was working from home, apparently). Drives that I found at an MIT swap meet had financial information on them from a Boston-area investment firm. Last summer, I started buying drives en masse on eBay.

In all, I bought and analyzed the content of more than 150 drives with the help of Abhi Shelat, another graduate student at MIT's Laboratory for Computer Science. We found that between one-third and one-half of the drives still had significant amounts of confidential data, even though many had been through a Format or FDisk operation. On another third, someone had deleted the document files but left the applications behind. It was a simple matter to undelete the data files and retrieve their secrets as well.

In fact, only 10 percent of the drives I purchased had been properly sanitized.

Much of the data we found was truly shocking. One of the drives once lived in an ATM. It contained a year's worth of financial transactions—including account numbers and withdrawal amounts—from a organization that had a legal requirement to not divulge such information. Two other drives contained more than 5,000 credit card numbers—it looked as if one had been inside a cash register. Another had e-mail and personal financial records of a 45-year-old fellow in Georgia. The man is divorced, paying child support and dating a woman he met in Savannah. And, oh yeah, he's really into pornography.

Abhi and I published our findings earlier this year in IEEE Security and Privacy journal. The story got a lot of media attention. It seems that many people have heard that some used computers still have confidential information on their hard drives, but few suspected the scale of the problem.


Suds for Your Hard Drive
So what's to be done?

Perhaps the saddest observation in our story is that erasing information from hard drives is not difficult—with a little bit of Web searching, we found more than 50 programs that purport to clean your hard drive so that the information on it cannot be recovered using even the most advanced technical means. One program costs more than $1,000, but some cost only $20 or $30, while still others are free. All of the programs do more or less the same thing: They repeatedly overwrite the blocks on your computer's hard drive with random bit patterns, completely obscuring the information that was previously there.

These so-called disk sanitizers actually come in two varieties. The first is programs that promote themselves as file shredders, secure erasers or slack-space sanitizers, designed to be used on a running computer system. They overwrite blocks on your disk that aren't actively being used to store files but might have been used in the past for file storage. These programs, such as SecureClean from AccessData, assure that deleted files are no longer recoverable. The best will sanitize other kinds of telltale privacy leaks, including browser caches, temporary files and certain kinds of cookies.

The second kind of program will completely erase the contents of a disk—just the thing when you want to upgrade the PCs in the accounting department and redeploy them on reception desks throughout your enterprise. The programs, properly called disk sanitizers but sometimes called disk shredders, repeatedly overwrite every block of a disk drive, then fill the drive with zeros.

The best disk sanitizers come on a bootable floppy or CD-ROM. You insert the removable media into the computer to be wiped clean, boot the computer and verify your intentions to the program. It does the rest. Clearly, these programs can be dangerous in the hands of a disgruntled employee—one reason it's always a good idea to restrict physical access to your most important systems. One disk sanitizer I'm particularly fond of is called Autoclave. You can download it from staff.washington.edu/jdlarios/autoclave, write it to a floppy and go to town.

But the study that Abhi and I did shows that many organizations are simply not taking the problem seriously.

One key reason for today's poor disk sanitization practices is that it's very difficult to tell the difference between a disk that has been properly sanitized and one that's simply been reformatted. Both look blank to the untrained technician—you need forensic tools to tell the difference. You also need to put the drive in a working computer. So simply checking to see if a disk is sanitized can be prohibitively expensive in many cases.

The used-computer market is literally awash with personal information from businesses and individuals, yet there are relatively few cases of that information being used for nefarious purposes.
Another reason, we suspect, is that most people don't appreciate the risk—the used-computer market is literally awash with personal information from businesses and individuals, yet there are relatively few cases of that information being used for nefarious purposes.

Is data left on salvaged hard drives a problem for the typical CSO? I think it is. We spend so much time and money trying to protect the information on our computers, it's utterly irresponsible for us to then just throw it out. Why should the confidentiality of data in your organization depend on the good intentions of a person who buys one of your used drives?


Search and Recovery
This whole world of disk sanitization can be very off-putting to the average CSO. Many people maintain that shadowy organizations such as the National Security Agency can retrieve data from a hard drive even after that data has been overwritten with a random pattern. Some say that you need to overwrite a hard drive not once, but seven or even 22 times.

Such lore has even made its way into the disk sanitization programs. SuperScrubber from Jiiva, one of the few Macintosh data sanitization products, offers five so-called security levels: Simple (not secure), Simple + Verify (not secure), Strong, Military and Paranoid. Why in heaven's name would a security professional use a security program in a manner that the program itself claims is not secure? Such attitudes and programs make the task of erasing hard drives seem so daunting that many people are apparently scared away. Why try to solve a problem that's basically unsolvable?

In fact, there is no unclassified evidence that data on a modern hard drive can be recovered after it has been overwritten with just a single pass of random information. Some have made such claims, but no such recovery has ever been demonstrated in public. Today's hard drives are specifically designed not to work that way. When you save a new version of a Microsoft Word file on your hard drive, for instance, you want to get the new—not the old—version.

A growing number of businesses offer to properly sanitize, refurbish and reload your computers with "clean" software before the machines are repurposed within your organization or sold. Although outsourcing sounds attractive, I'm concerned that it is exceptionally difficult to audit those companies and make sure they are actually deleting your data.

In the end, preventive technology is a better solution to the sanitization problem. If you use an encrypted file system, you can sanitize a disk simply by erasing the key. I'd like to see that sort of technology built in to hard drives. Or better, perhaps someday soon, all disk drives will come with a self-destruct feature—just like Star Trek's Enterprise did!end


Simson Garfinkel, CISSP, is a technology writer based in the Boston area. He is also CTO of Sandstorm Enterprises, an information warfare software company. He can be reached at machineshop@cxo.com.


ILLUSTRATION BY ANASTASIA VASILAKIS




Most Recent Responses:

Your article is interesting, amusing and most of all informative. Because I am returning a computer to Gateway that contains all my data, I have to know that my disk is perfectly sanitized. I have been told that I can rub a powerful magnet all over the drive, but don't have the technology to test the drive to see if it worked. Thanks, Anne

anne doerge
Email
Print

I am a student carrying out a research on reconstructing files from incomplete information contained in the slack spaces. I would like to know where is the best place to start looking for information on the structure of files and how they're overwritten.

Kgaugelo Selepe
Mr.
CSIR
Email
Print

Basically there is no way a harddisk can recover data that was overwritten. That however does not mean it is not possible.

How would this recovery work? Data is magnetically stored on a harddisk. In a simple approach each bit is stored as a direction of magnetism. The strength of the magnetic field can be measured as a real. What hard disks do is see everything smaller than 0 as a 0 bit and everything bigger as a 1 bit.

What happens when some data is stored on a location with a neutral field the values are set to either -1 or 1. The premise here is that when such information is overwritten (say a -1 field overwritten by a 1 bit, this 1 bit would be stored as 0.98 instead of 1) Similarly if a 1 gets overwritten with a 1 this gets stored as 1.02 instead of 1.

In reality probably these differences are smaller but with sensitive equipment (harddisks are not, and have no logic for it anyway) it should be possible to measure these differences and retrieve with a quite high probability the data that was overwritten. In theory this would be doable even for many levels of overwriting. However at some point the normal noise tends to be bigger so further overwriting is not interesting.

About chipping disks: This makes things harder, but not impossible to retrieve data. If you want to really destroy a disk a magnet and the blowtorch probably

Paul de Vrieze
Email
Print

The key to recovering overwritten data lies in the analogue aspects of the medium.

Have you ever listened to an audio recording from tape, and heard a faint echo of a loud part in adjacent silence? This is called print-through. It happens because the magnetic field from one layer of tape slowly magnetises the next layer. This same thing happens in the guard-bands (margins between tracks) on a hard disk (or a floppy). When you overwrite a track, latent impressions of previous long-term magnetic states are lurking in the guard bands. By fudging the head alignment, the guard bands can be examined and analysed.

Another effect that hard disks share with audio tape is that old recordings are often not completely erased. With analogue audio, an incompletely erased recording can be heard under the new recording. (My answering machine is rather bad about this.) With digital media, the faint latent signal is ignored in favour of the strong new signal. But it CAN be fished out, with the right tools.

These tricks, natually, require getting into the drive, and manipulating things.

Brian Patrie
Print

There's a company in my country which does hard-core data-recovery: Supposedly, using custom HD readers (taking out the physical magnetic discs inside), and complex algorithms they can read data some overwrites back. They also had an example of a disc they had gotten in with a nail through it, and which had been saturated with glue and then burnt, out of which they had been able to subtract significant amounts of data. The highest level of military security in my country also demands that after being overwritten wome 30 times, each pysical magnetic plate must be pulverized and, the powder spread to different locations, mixed with the powder of other discs. A bit of an overkill maybe, but you get the idea.. Also the reason for sanitizers to have a "Simple (not secure)" option is because wiping the disks in some cases can take a long time, so this can be used on non/low-sensitvity data disks.

Anonymous
Print

Index of all responses to this column to date.


Add a Comment: Your comment will be displayed at the bottom of this page, at the discretion of CSOonline.

Name:
Title:
Corp:
Email:
Subject *
Your Comment: *

* Required fields.
We do not post comments promoting products or services.
Comments are owned by whomever posted them. CSO is not responsible for what they say.
Selected comments may be published in CSO magazine.
We will neither sell nor display your personal information.







All content copyright CXO Media Inc., 1994-2002. All rights are reserved. No material may be reproduced electronically or in print without written permission from CXO Media, 492 Old Connecticut Path, Framingham, MA 01701.

Dated: April 2003


http://www.csoonline.com/read/040103/machine.html