70-640 exam 70-642 exam 70-643 exam 70-647 exam 70-680 exam 70-432 exam 70-450 exam 70-646 exam 70-410 exam 70-411 exam 70-412 exam 70-461 exam 70-462 exam 70-463 exam 70-466 exam 70-467 exam 70-413 exam 70-414 exam 1Z0-051 exam 1Z0-052 exam 1Z0-053 exam 1z0-042 exam 1z0-047 exam 1z0-043 exam 1Z0-144 exam 1Z0-146 exam 642-902 exam 642-832 exam 642-813 exam 642-427 exam 642-437 exam 642-447 exam 642-457 exam 642-467 exam 300-206 exam 300-207 exam 300-208 exam 300-209 exam C4040-108 exam C4040-109 exam C4040-221 exam C4090-451 exam C4040-332 exam 220-701 exam 220-702 exam LX0-101 exam LX0-102 exam HP0-P20 exam HP0-P19 exam HP0-P21 exam 700-505 640-911 M70-301 70-489 700-501 M70-101 70-458 70-341 70-464 70-680 74-335 70-687 70-457 n10-005 1z0-061 220-801 70-465 exam C4090-958 MB2-867J MB2-868 MB2-876 MB3-207 MB3-208 MB3-209 MB3-210 MB3-214 MB3-215 MB3-216 MB3-230 P2060-001 P2060-002 P2060-017 P2070-055 P2070-071 P2070-072 VCAW510 VCP-310 VCP-410 VCP-411 VCP-510 VCP-511 VCP-550 1Z1-821 1Z1-822 1Z1-850 1Z1-851 74-353 74-404 74-409 74-674 74-676 70-410 70-460 70-461 70-462 200-120 70-488 MB2-703 70-411 mb5-705 70-346 70-486 70-347 70-480 70-483 70-412 70-463 mb2-700 3X0-203 3X0-204 400-051 400-101 500-005 500-051 500-201 500-254 500-285 510-014 510-015 810-420 820-421 820-422 83-640 850-001 920-093 A2040-986 A2040-988 A2050-219 A2050-723 BR0-002 BR0-003 C_A1FIN_10 C_BOCR_08 CX-310-019 CX-310-027 CX-310-052 CX-310-053 MB2-498 MB2-631 MB2-632 MB2-633 MB2-634 MB2-700 MB2-701 MB2-702 MB2-703 MB2-866 MB2-867 windows 7 key windows 7 key windows 7 key windows 7 key Windows-8-Enterprise-Key Windows-8-Enterprise-Key-sale cheap-Windows-8-Key Windows-8-1-Key Windows-8-Standard-Key Windows-8-Standard-Key-online buy-Windows-8-Standard-Key windows-7-key buy-windows-7-key windows-7-key-sale cheap-windows-7-key-for-sale windows-7-key-sale-oem windows-7-key-sale-finmde buy-Windows-8-Key windows-7-key-for-sale cheap-windows-7-key-sale windows-7-ultimate-serial-product 18630-product-key-number windows-7-all-number windows-7-product-keys windows-8-professional-product-keys windows-8-product-keys-serial-keys windows-8-professional-product-key windows-8-product-key Office-2013-Professional-Key Office-2010-Professional-Key windows81-product-key Office-2013-Professional-Key Office-2010-Professional-Key windows 7 key windows 7 key windows 8 key windows 7 key windows 7 key windows 7 key windows 7 key windows 8 key windows 8 key windows 8 key windows 8 key windows 8 key windows 8.1 key windows 7 key windows 7 key windows 7 key windows 7 key windows 7 key
Computer Forensic Study By Fulcrum Inquiry Reveals Computer Hardware Sellers Are Selling More Than Expected - EWORLDWIRE

Why EworldwireTM

Get Direct Delivery : Send your press release via the highest regarded and respected PR newswire service. All media targeting services - from writing, to video, podcast and photo - are provided in-house by the ONLY BUSINESS WIRE TO OFFER THESE SERVICES COMPLETELY IN-HOUSE. ARCHIVE YOUR PRESS RELEASE INDEFINITELY - NOT JUST 7 OR 30 DAYS- and benefit from the long-term long tail impact of your news release when the public is searching online, with no hidden costs.

Login

logo

Company Information :
Fulcrum Inquiry
1000 Wilshire Blvd
Suite 1650
Los Angeles, CA 90017
USA
Ph. 213-787-4100

Media Contacts:
Steve Peskaitis
213-787-4100x117

Computer Forensic Study By Fulcrum Inquiry Reveals Computer Hardware Sellers Are Selling More Than Expected

For Immediate Release

LOS ANGELES/EWORLDWIRE/Feb. 6, 2007 --- While the message about the need to destroy electronic data contained on computer disks and other electronic devices when they are disposed of has been out for some time, Fulcrum Inquiry's Steve Peskaitis and Jared Schultz thought they would test how well the public is responding to the message. The sad result of their investigation: most users are at risk of having their personal information read by others. Here is what they discovered, and what the public can do about it.

Fulcrum Inquiry analyzed 70 used hard drives purchased from 14 different sources. Most of the drives purchased were supposedly cleansed of all information. Peskaitis and Schultz also asked for the process that was used to clean the drives and were usually told that the drives had been low-level formatted.

Using computer forensics, Fulcrum Inquiry attempted to recover information from these hard drives. Admittedly, the tools used by the duo are complex and technical but electronic-knowledgeable thieves can - easily - do what they did.

From the disks that actually worked, Fulcrum Inquiry recovered private data from almost two-thirds (62 percent) of the disks. Specifically:

- 37 drives (53 percent) contained recoverable information
- 23 drives (33 percent) had been properly wiped/cleaned
- 10 drives (14 percent) were non-operational

The properly cleaned drives were either (i) low-level formatted or (ii) wiped using special software that overwrites data.

A Goldmine of Personal Information

Of the 37 drives containing recoverable data, all but four were formatted in an attempt to remove data. Despite the formatting, here is the type of information which was obtained:

Example #1 - Bob:

Bob is unemployed and on disability but has experience in the construction industry. His interests include playing his new guitar, body art and weight lifting. He appears to be infatuated with a particular female celebrity. He has credit problems and is thousands of dollars in debt. Bob served time in jail and is currently living in low-income housing.

Because Bob formatted his hard drive prior to selling it, he obviously did not want his information released. To a casual observer, all files were gone. Nevertheless, Fulcrum Inquiry recovered tens of thousands of files that would allow his identity to be stolen easily:

1. An image of Bob's birth certificate
2. An image of Bob's drivers license
3. An image of Bob's social security card
4. Bob's Last Will and Testament
5. Pictures of Bob and his family
6. Personal letter from Bob to his favorite female celebrity
7. An image of Bob's college diploma
8. Adult images and videos
9. Collection agency letters
10. Credit card statements
11. Bob's memoirs
12. Approximately twenty thousand pictures which appeared to come primarily from Web surfing
13. Financial aid documents
14. Business expense receipts
15. Rent receipts
16. Hundreds of other documents

Example #2 - Nurse Betty:

Nurse Betty works in the pediatric ward at a hospital. Along with recovering confidential medical records and history were patient names, conditions, medicines prescribed, and the doctors who prescribed them. The hospital's efforts to remove this private information were not successful.

Betty accesses a central database of medical information. Although the database is not maintained on her computer, her computer stored the information locally. This is similar to Internet files that are stored locally when a user visits a Web site. Simply accessing information often leaves remnants behind.

Example #3 - Ted:

Ted is a project manager for a state government agency. Thousands of government documents and communications related to Ted's job were recovered, many of which were labeled confidential.

Of particular importance to Ted and his job, Ted appears to be moonlighting in a field that potentially represents a conflict of interest with his government position. Ted also has many personal pictures of family and friends on his computer, as well as personal banking information.

As with practically all of the disks purchased, the vendor selling Ted's hard drive claimed it had been cleansed of all information.

Many additional examples

Other personal information available on the purchased disks included:

1. Bank accounts and credit cards
2. Personal pictures of babies, children, weddings, friends and vacations
3. Business e-mail and attachments
4. Web browsing details

Adult content was found on both work and personal computers. Although some of the pornographic images were of the "commercial" variety, also were found personal pictures not intended for distribution.

Drives purchased from eBay had the highest data recovery rate. Every one of the operational drives purchased on eBay contained information that could be recovered.

Size and cost of the drives seemed to matter. Smaller or less expensive drives were more likely to contain recoverable information. Initially Fulcrum Inquiry focused on smaller drives - 80MB to 15GB (ranged from $0.50 to $15 per drive). Mid-way through the study, the recovery rate was 88 percent. Moving to larger drives - 15GB to 80GB (ranging from $15 to $26), the recoverable data dropped, most likely because the businesses involved took data security more seriously, and employed additional resources.

The value of the drive might explain some laxness: Properly cleaning drives is time-consuming. Someone selling an inexpensive disk might be tempted to take shortcuts.

Lessons to be Learned

1. Information can be recovered from a hard drive even if attempts have been made to delete files, or by performing a quick format.
2. Users know they need to remove their old information but lack the technical understanding to accomplish this properly.
3. Properly cleaning drives is time-consuming. Too many vendors took the quick but also incomplete route.
4. The lower the value of the drive, the less likely it was cleaned properly. The data on the "small" drives was still voluminous and worthy of keeping safe.
5. Fourteen percent of the drives were non-operational, indicating a decent chance that the buyer is wasting time when purchasing a used disk drive.

Fulcrum Inquiry's advice applies to every type of electronic media including memory cards, backup tapes, cell phones, digital copiers and most handheld electronic devices.

To properly dispose of data:

1. Low-level format the drive. Do not use the quick format, which may be the default.
2. Use wiping software designed to overwrite information.
3. Physically destroy the media (think big hammer or very strong magnet).
4. Hire a firm to dispose of the drive. Unfortunately, this service may cost more than the value of the drive.

To protect those whose information was obtained, Fulcrum Inquiry changed the names in the above descriptions. After notifying the hospital and government agency of the breached confidential records and giving them the opportunity to collect their information, Fulcrum Inquiry wiped/erased all data properly.

Fulcrum Inquiry ('http://www.fulcruminquiry.com') is a litigation-consulting firm based in Los Angeles, Calif. The company performs computer forensics, economic damage calculations, and expert witness testimony.

HTML:   http://www.eworldwire.com/pressreleases/16402
PDF:   http://www.eworldwire.com/pdf/16402.pdf
MOBILE:    http://www.eworldwire.com/mobile/16402
ONLINE NEWSROOM:   http://www.eworldwire.com/newsroom/311423.htm

NEWSROOM RSS FEED:   http://newsroom.eworldwire.com/xml/newsrooms/311423.xml
LOGO:   http://www.eworldwire.com/newsroom/311423.htm

CONTACT:
Steve Peskaitis
Fulcrum Inquiry
1000 Wilshire Blvd
Suite 1650
Los Angeles, CA 90017
PHONE. 213-787-4117

KEYWORDS: Computer forensics, economic damage calculations, expert witness testimony, Steve Peskaitis and Jared Schultz of Fulcrum Inquiry

SOURCE: Fulcrum Inquiry


(Top)

    • Featured

  • Client Login

    Forgot Password?
  • Newsletter