Everyone is talking about sensitive info being retrieved off of the hard drive of a machine that has been recycled or just thrown away. Does anyone know the actual likelyhood of something like this happening? Should I really be concerned about a machine that has been recycled having info removed fron the HDD?
HDD hacking
Collapse
X
-
Tags: accessed, accessing, accross, act, actual, business, camera, cases, chose, comptia, customers, data, drive, elements, forgot, free, google, hard drive, hdd, info, jpg, latent, lightning, mfg, mfm, norton, off, one, open, option, options, overnight, plates, programs, random, recycled, reformat, render, report, retrieved, sensitive, source, talking, technology, torch, tun, write
-
Most of the machines come with an option called Data "Over Write" which is NOT Free.... There are other options.. customers can ask for the HDD and buy a new or put a new hdd on the machine that is going away... another option is to have your IT dept reformat the HDD or use one of those open source programs that will write a bunch of random 1s and 0s.... -
OMD-227
Most of the HDD's are standard computer hard drives, easily accessable and can be quickly installed into a PC.
Our return machines have a software program run over the HDD which scrambles everything, as well as a full format done. The option is also there to give the client back their HDD if they are concerned at all. A certificate of data destruction is used and has been widely accepted here. You just never know what might happen in the future... better to be safe than sorry.
I did see the American 60 minutes report on this subject, and it has been discussed here as well.Comment
-
I think if I had a business I might look for a cheaper alternative, like scanning 100+ pages of garbage text to every Mailbox/Doc Server to fill it up and then deleting it over and over. That might not be DOD compliant but I would think that would scramble the data enough to defeat any undelete utility. There are ways to get data off HDD that have been in fires, damaged, or formatted, but if you run into someone willing to go to that much trouble to hack your info your screwed anyway.Comment
-
We do a lot of refurb on lease returned machines and re-sell. I have seen and printed many not password protected files that included mortgage lease documents, tax returns, and medical records. All these documents included sensitive information that a more devious person might use for identity theft, or blackmail. These documents are removed and the HDD reformatted (image area) of course before we send the machine out.Last edited by ZOOTECH; 05-25-2010, 09:54 PM."You can't trust your eyes, if your mind is out of focus" --Comment
-
So, in light of recent security concerns, my question is has anyone tried to recover anything off an MFP's hard disk? Even just for interest sake? We as technicians often have access to the HDD's. I've personally not attempted it. Maybe the next time one comes my way I'll give it a try...Comment
-
Nondestructive Department of Defense requirements (meaning you don't destroy the drive) require the entire volume to be rewritten with alternating patterns of 0s and 1s several times (I believe 5).
The reason for this dates back to the 1960s and the emergence of the Winchester disk drive when it was discovered that even a disk that has been completely reformatted can be "read" by a controller with sufficient sensitivity to pick up the latent coercivity in the magnetic elements of the disk drive. That's why IBM used to ball-peen their sensitive disk packs upon disposal, and some companies still advise complete destruction of a drive that has ever contained sensitive data. This used to cost a lot of money but the price is coming down because more people are doing it.
For most people, 99.99998% of the time, unless you have someone at the NSA that is going to try to forensically read the disk, using a good program that wipes the disk several times by writing alternating patterns a couple of times will prevent anyone from reading anything that used to be on it. If you're a terrorist and your laptop is seized and you only had the chance to format the drive, expect a visit from the Special Forces.Last edited by AKSturb01; 06-04-2010, 08:10 PM.Comment
-
If you plug a Ricoh HDD into a computer, there is no format or image files recognizable to the PC. Image data stored is raw on the drive, so unless you had some manufacturer program which could read and decipher the data based on their proprietary format, it's gonna be pretty tough to get something from it. Now if there is stuff stored in the document server that has not been deleted, then yes, you could print it out right from the machine.
If your customer is concerned, leave the drive with them for destruction, or return it to the leasing company (if possible) for them to destroy it. As far as new machines going into sensitive environments, I would recommend the data overwrite security for the HDD.Don't take that toner with me!Comment
-
So, in light of recent security concerns, my question is has anyone tried to recover anything off an MFP's hard disk? Even just for interest sake? We as technicians often have access to the HDD's. I've personally not attempted it. Maybe the next time one comes my way I'll give it a try...
Without encryption, even data overwritten a couple times, can be extracted off of a drive. It requires some pretty serious hardware and a lot of time to extract the data. Forensics labs in the CIA/NSA have the tools...average hacker, not bloody likely.
Some quick methods I have seen to erase a drive from even rudimentary hacking involve simply destroying the hard disk platters. Sledge hammer, heavy duty metal shredder, oxyacetylene torch, industrial electromagnet to name a few."Many years ago I chased a woman for almost two years, only to discover that her tastes were exactly like mine: we both were crazy about girls."
---Groucho Marx
Please do not PM me for questions related to Konica Minolta hardware.
I will not answer requests or questions there.
Please ask in the KM forum for the benefit of others to see the question and give their input.
Comment
-
If required, I use a wipe program accross HDD's that will do 6 passes. This is available free of charge on the Ultimate Bott CD's. The Department of Defence here request the HDD out of all copiers and they do their own wiping on the HDD. If any data can be recovered once the wipe program is finished, then the HDD is used as target practice out on the range. lol
Stirton, I came accross any interesting fact the other day with on a security camera training course. In the US, it is illegal to have encryption with anything greater than 128 bit. The reason being that anything greater than 128 bit requires more processing power and time for the CIA to decrypt. So I would presume that NSA and CIA would use something like 256 or 512 bit encryption. Just a useless fact that I learnt.Please don't ask me for firmware or service manuals as refusal often offends.Comment
-
I'll concede you are most likely right about the level of encryption for the NSA and CIA, or for that matter, any government inteligence and security operation around the globe. I don't see anyone outside of the espionage of government secrets really going after commercial secrets....unless its that Caramilk bar secret.
For most of our customers, I have explained to them that if they do not make use of the system or user boxes, then anything they copy or print or fax on the machine will more than likely be overwritten by the next use of the machine. The encryption kits being optional, not everyone has them or needs them, the exception being law enforcement or really paranoid real estate lawyers (in one case)."Many years ago I chased a woman for almost two years, only to discover that her tastes were exactly like mine: we both were crazy about girls."
---Groucho Marx
Please do not PM me for questions related to Konica Minolta hardware.
I will not answer requests or questions there.
Please ask in the KM forum for the benefit of others to see the question and give their input.
Comment
-
I have had a Toshiba HDD out and played with it. Lots of partitions, very little readable data except for the web ui and the e-file thumbnails. File Share was readily available but all of this easily obtained information is just as easily obtained without even removing the drive from the machine and simply accessing it over the network. Because, that's how it's meant to be accessed.
I tried a file recovery program to find deleted files. I found quite a few, some of them were of some size so they could of been image data. I was unable to open any of the recovered files successfully.
I have downloaded several image recovery programs meant to be used on SD cards and the like. Some of them will rebuild TIFFS, JPG etc from deleted data on a drive so I will see what happens there...
Toshiba's run on VX Works so it would be interesting to find some kind of VX Works emulator and see if you could get any further there but that's a little more than I want to get into.
IMO it is not as easy as they make it look on TV. Most customers don't realize the drive has to be physically removed. They should be more worried about the fact that when I ask them if I can use their computer to "look at the copiers web interface" I am allowed to do so without a second thought. And most places are the same way with their servers, passwords, etc.I will not give you service manuals or firmware.Comment
-
Having talked with one of our in house technical gurus (who apparently has more time on his hands than he is willing to admit), some of what I though regarding KM drives was innacurate. Data is not necessarily written over right away in all cases. He had been mucking with this for a while and discovered that some files were partially overwritten, while others were fully intact, and some completely overwritten, with the exception of the stub in the allocation table of the drive. He is currently doing experiments on how files are written to, written over. It is a lengthy process apparently. If I hear more, I'll post what he found."Many years ago I chased a woman for almost two years, only to discover that her tastes were exactly like mine: we both were crazy about girls."
---Groucho Marx
Please do not PM me for questions related to Konica Minolta hardware.
I will not answer requests or questions there.
Please ask in the KM forum for the benefit of others to see the question and give their input.
Comment
Comment