Home TechnologyDead but not buried

Dead but not buried

by Carl Gebeily

I n computers, being safe can sometimes

lead to being sorry, as Oliver L. North

discovered in the Iran-contra

investigation during the Reagan

administration, when incriminating

files he thought had been deleted

were later resurrected from network

backup tapes. One of the ways investigators

can peer into the private lives of

their subjects is to peer into their computers.

What they are able to find, and the ease with

which they can find it, may prompt computer

users to re-evaluate their practices.

Word processing software, Web browsing

software and email have become integral to

communication, both professional and personal.

As a result, many people have files on

their hard disks that they wish to keep private,

like love letters, confidential business

documents or financial data.

Moreover, many have sensitive, confidential

and potentially embarrassing files in

their computers that they don’t even know

are there, either because they think the files

have been erased or are unaware that certain

common programs automatically keep a

log of what the user does.

“Recovering files that were deleted from

a computer directory is almost a trivial

process,” says Mihran Boudromian, computer

analyst with Expervision. A related

issue is the computer’s creation of sensitive

files that

the user often didn’t

know were there in the first place, according

to Boudromian. “The user’s Web

browser will create files, without the

knowledge of the user, that record all their

interactions,” he says. “Many people today

know about cookie files, but the browser

creates a history file as well that keeps a

record of the websites the user visits. And

then there’s a cache file that sometimes

keeps copies of the pictures that have been

downloaded.”

More obscure are the temporary files created

by word processors, for example, and

the so-called swap files that an operating

system creates as a way to manage computer

memory. These files often remain readable

even if the original files are erased.

Computer users in Lebanon have little

reason to believe that their computer files will

be scrutinized by law-enforcement agents,

corporate and government spies or even

special investigators.

But what about unscrupulous

co-workers? And what confidential

information resides on the hard disk of the

computer that was donated to a neighbor, or

sold to make way for an upgrade?

The rise in the number of computer thefts

and the increased sharing of computers in

the home are confronting consumers with

security issues that in the past were issues

only for big corporations, banks, the military

and government agencies. So how

does one keep confidential information

private? And when the information is no

longer needed, how does one make sure that

it is completely erased? “Both questions

involve a combination of good computer

security policies and good security software,”

advises Boudromian.

The software is the easy part. Creating and

sticking with good security habits is the

hard part. “Technology exists today to protect

individual privacy for as long as the

individual chooses to keep the information

private,” says Georges Hajj, of

Compudata. Computer users today have

access to inexpensive software tools that can

encrypt the contents of a fife, an email

message or even the entire contents of a

computer so that it can’t be read by someone

else. Other programs can shred

unwanted files so completely that no one

can recover them. But very few people use

such security tools. y

Computers are good at keeping· secrets.

Too good, in fact. The secrets can reside on

a computer, and on a computer network,

long after the user deletes them. The files are

forgotten, but not gone. Deleting a file

does not really delete the file. It merely

hides it from view so it no longer shows up

in a directory of files. “It’s like getting an

unlisted telephone number,” says

Boudromian. ‘The listing may not appear in

the phone directory, but the phone can still

ring if someone knows the right number.”

When a user deletes a file, the computer

stops listing it in the file directory and

marks the disk space as available for

reuse. Another file may eventually be

written atop the same space, obliterating

any traces of the original. But as hard

disk capacities swell into the gigabytes,

the space may not be

overwritten for a very long

time.

In that limbo period

when the deleted

file is undead,

any moderately

skilled

computer

user can

locate, restore and read the deleted file by

using such commands as “undelete” or

“unerase,” which are common features of

many software utilities.

The computer’s ability to remember

deleted files is most often a good thing,

especially when important files have been

deleted by accident. Every day, computer

technicians get frantic calls from people

who have inadvertently erased the big presentation

due the next morning, or whose

children have erased those boring ETRADE

folders to make room on the disk

for games. At times like these, being able to

resurrect the files from the dead is a lifesaver.

There are a number of utility programs

available that have an “unerase” capability,

 to be used both in emergencies and as a

precaution against accidents. An example is

Norton Utilities which, for $75, performs a

variety of password-protected security

functions. It can be set to blank the screen

and lock the computer if the user steps

away for a minute or to prevent unauthorized

users from booting the machine. But as

with most tools, “unerase” programs can be

dangerous in the wrong hands. To truly

erase a file and prevent it from being recovered,

one must write over it, or wipe it.

There are several utility programs available

that enable the user to overwrite a single

file or the entire disk, or anything in

between. Such programs typically have

apocalyptic names, such as Shredder,

Flame File and Burn. Similar disk-wiping

tools are often included in PC utility programs

and encryption programs, but others

are available for downloading without

charge from the Internet. These programs

typically hash over the designated disk

space with meaningless patterns of ones and

zeroes, instead of the meaningful patterns of

ones and zeroes that represent the original

information. That process renders the

deleted file unreadable in most cases.

The key phrase is “in most cases.” Just as

with encryption and writers of virus programs,

there are people working just as

hard to recover wiped files as there are

people working to wipe them. (These days,

spies have developed ways to reverse a

simple, one-pass wipe with ones and

zeroes and retrieve the original file.) It is

therefore, smart practice to wipe sensitive

files many times with random characters,

which, in theory, obliterates the original

file and makes it unrecoverable. Unless, of

course, the file has already been copied

onto backup tapes. In the digital world, the

original file may be shredded, while one or

more perfect copies can exist elsewhere.

An even more bulletproof way to render

files unreadable is to encrypt them.

Encryption scrambles a disk or file, including

pictures (or a telephone conversation, or

a credit card sent over the Internet), so it can

be opened and read only by the person

holding the proper key, or password. The

strength of the encryption is often measured

by the length of the key, which is in

tum measured in bits. In general, each

additional bit of key length doubles the

amount of effort needed for unauthorized

users to break the key.

Even weak encryption (with a 40-bit key

length, for example) is sufficient to deter

most casual snoops. Breaking a 56-bit key

requires computing resources that are beyond

the reach of all but the most determined code

breakers, and even then it can require days of

sustained attacks by a supercomputer just to

crack one email message. Some encryption

programs use 128-bit keys, which, according

to Jacques Hakimian, IT consultant at

Dialog, are “infinitely unbreakable, at least in

our lifetimes, even taking into consideration

the predictable advances in computing

power.” In other words, it is more secure than

the strongest physical vault ever built.

And then there is email. People type all

sorts of embarrassing, confidential or

intemperate words in email in the mistaken

belief that such messages are private. In reality,

messages sent by email are less secure

than messages scribbled on a postcard. The

way the Internet mail system works, an

email message passes through several

exchange points, or nodes, on its way to the

recipient’s computer. The system administrator

at each hand-off point can in theory

read the message, copy it, reroute it or tamper

with il. If the message originates or

terminates in a corporate computer system,

chances are high that a copy will persist

in the company’s backup tapes or disk

for days, at least.

In the end, there are only two ways to

keep information confidential in the digital

age. One is to use strong encryption.

You may also like