skip to main content
research-article

Remembrance of Data Passed: A Study of Disk Sanitization Practices

Published: 01 January 2003 Publication History

Abstract

Many discarded hard drives contain information that is both confidential and recoverable, as the authors' own experiment shows. The availability of this information is little publicized, but awareness of it will surely spread.

References

[1]
Network Associates, PGP Windows 95, 98 and NT User's Guide, Version 6.0. 1998; version 6.02 includes the pgpdisk encrypted file system and is available for download at www.pgpi.org/products/pgpdisk.
[2]
M. Blaze, "A Cryptographic File System for Unix," 1st ACM Conf. Comm. and Computing Security, ACM Press, New York, 1993, pp. 9-16.
[3]
Microsoft, "Encrypting File System for Windows 2000," www.microsoft.com/windows2000/techinfo/howitworks/security/encrypt.asp.
[4]
J. Hasson, "V.A. Toughens Security after PC Disposal Blunders," Federal Computer Week, 26 Aug. 2002; www.fcw.com/fcw/articles/2002/0826/news-va-08-26-02.asp.
[5]
M. Villano, "Hard-Drive Magic: Making Data Disappear Forever," New York Times, 2 May 2002.
[6]
J. Lyman, "Troubled Dot-Coms May Expose Confidential Client Data," NewsFactor Network, 8 Aug. 2001; www.newsfactor.com/perl/story/12612.html.
[7]
J. Markoff, "Patient Files Turn Up in Used Computer," New York Times, 4 Apr. 1997.
[8]
S. Berinato, "Good Stuff Cheap," CIO, 15 Oct. 2002, pp. 53-59.
[9]
National Computer Security Center, "A Guide to Understanding Dataremanence in Automated Information Systems," Library No. 5-236,082, 1991, NCSC-TG-025; www.radium.ncsc.mil/tpep/library/rainbow/NCSC-TG- 028.ps.
[10]
California v. Greenwood, 486 US 35, 16 May 1988.
[11]
Microsoft, "Microsoft Extensible Firmware Initiative FAT32 File System Specification," 6 Dec. 2000; www.microsoft.com/hwdev/download/hardware/fatgen103.pdf.
[12]
US Department of Defense, "Cleaning and Sanitization Matrix," DOS 5220.22-M, Washington, D.C., 1995; www.dss.mil/isec/nispom_0195.htm.
[13]
P. Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," Proc. Sixth Usenix Security Symp., Usenix Assoc., 1996; www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
[14]
T. Vier, "Wipe 2.1.0," 14 Aug. 2002; http://sourceforge.net/projects/wipe.
[15]
D. Millar, "Clean Out Old Computers Before Selling/Donating," June 1997; www.upenn.edu/computing/security/advisories/old computers.html.
[16]
National Institute of Standards and Technology, "National Software Reference Library Reference Data Set"; www.nsrl.nist.gov.
[17]
D.K. Gifford, et al., "Semantic File Systems," Proc. 13th ACM Symp. on Operating Systems Principles, ACM Press, 1991, pp. 16-25.
[18]
G. Di Crescenzo, et al., "How to Forget a Secret," Symposium Theoretical Aspects in Computer Science (STACS 99), Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1999, pp. 500-509.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 1, Issue 1
January 2003
91 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 January 2003

Author Tag

  1. Data Forensics

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media