Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Dead Disks Yield Live Information
Future Intelligence ^ | August 10, 2006 | Peter Warren

Posted on 09/03/2006 9:05:31 PM PDT by canuck_conservative

Identity thieves are gleaning personal information from scrapped computers. Peter Warren reports on just how insecure our sensitive data really is.

Bill Kerridge is a North Shields publican who runs an award-winning pub in the Tyneside Town and whose daughter is a talented gymnast. Normally, Kerridge would be happy for the readers of a national newspaper to know those details, only he is not because along with a wealth of other information relating to his family, it was recovered from a computer hard drive bought off the internet via eBay that the Kerridges knew nothing about.

The news that such personal information about his family holidays, his eldest daughter's training regime, details of his business and of other members of his family - which was recovered as part of an investigation by BT and data destruction specialists Life Cycle Services, carried out by researchers at Glamorgan University - has profoundly shocked Kerridge.

Richard Martin, 53, was another individual who felt the same way. A hard drive from a personal computer that he had thought he had disposed of properly yielded highly personal letters relating to his financial affairs including details of bank accounts and insurance claims.

All of which is potential gold dust for the UK's fastest growing crime trend, identity theft.

"I think that this is shocking, that there is information like this going around about my family," Kerridge says. "Basically I think that there should be a lot more information made available to people on how to destroy the data on their computers. I wouldn't know the first thing about how you would go about destroying this data."

Valuable Information

Martin had given his computer to the IT department of Man Trucks, the company he was working for, and asked them to destroy it. Both Kerridge and Martin are fairly typical of the bulk of the UK population who see the value of new technology in the computer rather than the data it is able to process, obtain and retain.

A potentially fatal error given the close relationship that now exists between ourselves and computers, as the Kerridge's case has proved.

As the university's forensic team conducted the research, it peeled back the layers on the disk. Web searches, phone numbers of employees, email conversations with family friends and details of their daughter's boyfriends - all spilled onto the university computers.

There was enough data for a would-be identity thief to garner more information by ringing up those people identified and "socially engineer" more relevant details.

In the case of Rob Morris, a 38-year-old IT worker from Swindon, it could have been even more damaging. Details of his mobile phone account were found on a disk that had been disposed of by Vodafone - which bought the company he worked for, Cellular Operations, in 2003.

According to Morris, Cellular Operations also held crucial personal details such as his date of birth and credit card records on the diskarded disk.

"When Cellular Operations was taken over by Vodafone they were only interested in the subscriber base - they got rid of the buildings, the computers and the people," he says. "It's a bit worrying that a company like Vodafone has not disposed of it properly."

It is also potentially illegal and could lay Vodafone open to prosecution by anyone who finds that poor safeguards on their personal data have led to any loss from ID thieves or hackers - a risk highlighted by the Information Commissioner, Richard Thomas, in his annual report last May.

"My office has exposed an alarming trade in illegally obtained personal information," he said. "Impersonation and bribery are used to get inside information ranging from car registration details to bank records."

Being careless with personal information also breaks the Data Protection Act, a point forcibly made by a spokeswoman for the Information Commissioner.

She says: "With the widespread use of technology and the constant updating of systems, it is imperative that information about individuals is kept secure at all times, which is why we have the DPA."

Despite this, the BT and Lifecycle Services research uncovered huge amounts of company information from Man Trucks, a German transport manufacturer with its UK headquarters in Swindon.

Network Hacked

The company, which has a worldwide workforce of 58,000 and sales of €14.7bn, had again disposed of hard drives from computers that contained highly detailed company information including personal details on staff payroll, internal contact details, internal planning and strategy documents, written warnings to staff plus copies of invoices and orders.

Sufficient information had also been recovered on the company's computer network to allow the multinational to be effectively hacked, and indeed one disk appeared to show that a Trojan had been installed on the computer of one manager. "A Trojan program is one that lets a hacker siphon information out of a computer and the Man Truck disk that we looked at showed that the computer had been turned into a server that was using port 8182, which is very unusual," said Dr Andrew Blyth, who oversaw the Glamorgan research.

Which is just the sort of insight Blyth was hoping that the cast-off computer hard drives would turn up.

"This fits in with ongoing research that is being carried out here by out specialist forensics team into the business and personal impact of people not disposing of their data properly," he said.

"People have got the message with personal information and how they should use it online, but they have not got the idea with the electronic information that is stored on their computers. They think that when they hit delete that the data fairy comes along and the information is wiped off forever."

The research - which was based on 317 computer hard drives obtained from the UK, North America, Germany and Australia - showed just how many people believe in the data fairy: though 41% of the disks were unreadable, 20% contained sufficient information to identify individuals, 5% of the disks held commercial information on organisations ranging in the UK from Man Trucks to Easington Council, and included records of a Children's Day Care centre.

There was also illegal information with 5% of the disks holding "illicit data" and 1% of the disks bearing paedophile information. As a result, a criminal investigation has been launched in South Wales and another one in Australia.

"This is the second time we've done this research and it shows that businesses are neither taking adequate precautions nor meeting their obligations," said Dr Andrew Jones, BT Exact's head of technology research. "Given the rise in ID theft we need to do better, and finding out things like that is the point of the research."

Just how compromising and thorough the information stored on computers can be was demonstrated by data obtained from disks belonging to Port Weller Dry Dock, a Canadian ship building company.

On the drives was information that showed the company had details on a bid for the US Navy's top secret DD21 destroyer programme, part of a US defence programme intended to equip the US navy for the 21st century.

There were also details that compromised one company employee, showing him to be a closet transvestite and potentially leaving him open to blackmail - once again showing just how intimate the relationship with our computers has become. Other drives from Port Weller also contained even more compromising sexual information.

Jon Godfrey, managing director of Life Cycle Services, which recycles computers and destroys any data left on them, says: "The thing about computers is that they hold a complete personal profile on you and they compile it over a number of years and then people just throw them away with that slice of their lives on them.

"People get worried about losing data on computers but they don't realise that erasure is as important as retention. The survey shows that the commercial sector is still chronically ignorant of the destruction and retention of data, and our experience is that the problem is actually worse than the study suggests."


TOPICS: Crime/Corruption; Culture/Society; Extended News; Miscellaneous; Technical
KEYWORDS: computercrime; computersecurity; identitytheft
See also the follow-up article below.
1 posted on 09/03/2006 9:05:33 PM PDT by canuck_conservative
[ Post Reply | Private Reply | View Replies]

To: canuck_conservative
Here's what I do with old computers:

Step 1.) Defrag drive.

Step 2.) Run PGP Wipe at DOD Spec 4 times.

Step 3.) Remove hard drive and expose to a large magnetic field from a 5 pound horseshoe type magnet.

Step 4.) While hard drive is out of the computer, strike it repeatedly with a claw hammer until it is rendered into tiny pieces.

Step 5.) Sweep up tiny pieces of hard drive and toss into either fireplace (winter) or back yard fire pit (summer).

Step 6.) Build large roaring fire in either fireplace or fire pit depending on season.

Step 7.) Take carcass of computer to gun range and invite friends to 'have at it' with rifles, pistols, and shot guns.

Following these seven simple and fun steps will assure that your personal data doesn't fall into the wrong hands.

L

2 posted on 09/03/2006 9:11:12 PM PDT by Lurker (If you want peace, prepare for war.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lurker

Re Step#3:

Take the HDD apart prior to smashing it.
The disks make good targets after demagnetizing/scoring with a wire brush. At least the old metal ones. The newer drives are glass substrate.


3 posted on 09/03/2006 9:20:18 PM PDT by axes_of_weezles
[ Post Reply | Private Reply | To 2 | View Replies]

To: axes_of_weezles
But then there would be 8 steps....

L

4 posted on 09/03/2006 9:21:34 PM PDT by Lurker (If you want peace, prepare for war.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: canuck_conservative

Hard disks make good target practice. Otherwise, remove them and be sure to destroy them. They simply are too cheap today to take any chances. Office Depot has a special on 100 gb hard drives for only $20 this week.

I have a couple hundred floppies that I need to dispose of. No way am I going to allow them to reach anyone else. I would shred them if they would fit in the shredder but I'll probably burn them.


5 posted on 09/03/2006 9:25:34 PM PDT by RichardW
[ Post Reply | Private Reply | To 1 | View Replies]

To: canuck_conservative

for later reference


6 posted on 09/03/2006 9:57:29 PM PDT by Luke Skyfreeper
[ Post Reply | Private Reply | To 1 | View Replies]

To: Lurker

My hard disk fragmenter of choice.

7 posted on 09/03/2006 10:21:12 PM PDT by Covenantor (Dirka Dirka Muhamed Jihad.....Ghurka Ghurka Muhamed....it always comes down to cold steel in the end)
[ Post Reply | Private Reply | To 2 | View Replies]

To: canuck_conservative

BUMP FOR LATER


8 posted on 09/03/2006 10:26:25 PM PDT by jamaly (I evacuate early and often!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: canuck_conservative
Anybody serious about this topic should read this: Secure Deletion of Data from Magnetic and Solid-State Memory.
9 posted on 09/04/2006 12:32:45 AM PDT by Northern Alliance
[ Post Reply | Private Reply | To 1 | View Replies]

To: canuck_conservative

Some excellent FReeper advice here on disposing of old hard drives. It's surprising how many people fail to do anything to clean old hard drives when getting rid of old computers.


10 posted on 09/04/2006 1:02:05 AM PDT by George W. Bush
[ Post Reply | Private Reply | To 1 | View Replies]

To: canuck_conservative

wow. to think that I've sent 2 hard drives back to Dell on warrantee swaps in the past 2 years.


11 posted on 09/04/2006 5:23:05 AM PDT by the invisib1e hand (live until you die. then live some more.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: canuck_conservative

1) Insert Knoppix CD
2) Go to command prompt
3) #dd if=/dev/urandom of=/dev/hda bs=1M
4) #sync
5) repeat 4 times


12 posted on 09/04/2006 5:29:10 AM PDT by Knitebane (Happily Microsoft free since 1999.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson