SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Non-Tech : The ENRON Scandal

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Mephisto who wrote (398)1/14/2002 8:13:56 PM
From: Mephisto  Read Replies (1) of 5185
 
Hiding Sensitive Data Can Be Tough in a Digital Age

"Not only can computer forensic techniques recover documents, but they can
inform investigators when and how they were deleted," he said. "It is often possible
to determine if a deletion is an innocent act pursuant to a corporate policy or if
there is an ulterior motive." Even more remarkable, technical means exist to
retrieve data that has been erased."

January 14, 2002

The New York Times

By JOHN MARKOFF

SAN FRANCISCO, Jan. 13 - The
modern task of successfully
destroying electronic documents has
become daunting enough to give Oliver
North
nightmares.

Mr. North is the Marine officer who
became notorious during the
Reagan-era Iran-contra scandal after it
was discovered he had tried to delete
thousands of e-mail messages, only to discover that they had been retained on
backup tapes and made available to Congressional investigators.


The issue of the destruction and possible retrieval of electronic data burst into the
news last week after Arthur Andersen & Company, the auditors for the Enron
Corporation, said that the accounting firm had destroyed a
"significant but undetermined" number of documents relating to Enron and its
finances.

The embarrassing acknowledgment set off new demands from Congress that
Andersen produce a wide range of documents, including e-mail and other
computer files for investigators.

Today, Mr. North's efforts would be vastly more complicated because of changing
computer technologies and the emergence of the Internet, which has ensured that
there will be multiple copies of almost any electronic document.

"Today documents aren't just stored. They're sent," said Mark Rasch, a former
federal prosecutor who is vice president for cyberlaw at Predictive Systems
(news/quote), a network security consulting firm based in Herndon, Va. Even
though many companies have general procedural rules that require the periodic
deletion of e- mail, he noted, messages can usually be recovered.

"The sender and the recipient may have the message on their machine, in addition
to the server where it was stored," he said. "Unless there is a tool used to remove it
using military-grade technology, it can be recovered."


Most computer-literate office workers now realize that
simply deleting an e-mail message or moving a document
onto the trash icon on their computer's desktop screen
does not eliminate the data.

That is because modern computers organize information
by using file-system directories that point to physical
areas on a disk drive where the data resides. "Deleting"
the information usually only breaks the link between the
directory and the data so that the original storage space
can be reused in the future.

To eliminate important data, some companies and
individuals use software tools that try to "wipe" files from
storage disks by writing random strings of 1's and 0's over
the space where the files were stored. Others will use
programs that "defragment" disks by moving information
around on the surface of the disk so that data can be
retrieved more efficiently, which can also write over old
data. Or they can reformat the drives entirely.

What most computer users do not realize, however, is that
the world of computer forensics has made huge strides in
recent years, and it is now remarkably difficult to hide
data from a determined investigator.

"Computer forensics is going to play an important role in recovering documents in
the Enron case," said John Patzakis, president and general counsel of Guidance
software, a company in Pasadena, Calif., that makes hardware and software used
by law enforcement authorities as well as the Big Five accounting firms.

Every action taken by a computer user leaves a telltale trail, he said, so the act of
deleting documents can itself be revealing.

"Not only can computer forensic techniques recover documents, but they can
inform investigators when and how they were deleted," he said. "It is often possible
to determine if a deletion is an innocent act pursuant to a corporate policy or if
there is an ulterior motive." Even more remarkable, technical means exist to
retrieve data that has been erased.

It is possible to take a disk apart and use an electron microscope to read
information from the individual magnetic spots on the surface of a disk that may
have been intentionally erased, Mr. Patzakis said.

Originally a tool of the intelligence world, this technique - which is costly - has
been used successfully in big legal cases.

nytimes.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext