Feeds

Binned PCs were stuffed with MoD and Sun staffers' privates

Resold without wiping Rebekah Wade's naughty bits

7 Elements of Radically Simple OS Migration

Updated Security researchers have found personal records of Sun newspaper and MoD staff on the hard drives of discarded or resold computers.

The studyThe ghosts from the machines: A history of 10 years of carelessly discarded data, found that both businesses and consumers are getting rid of old PCs without wiping them clean.

Carelessly discarded data on such machines might be used for ID theft. It may also lead to the release of potentially sensitive customer data.

The study was carried out by the Cyber Security Research Institute (CSRI) on behalf of the Asset Disposal and Information Security Association.

In a revelation likely to bring fresh embarrassment to News International, which was embroiled in the phone hacking scandal this year, researchers found that an unwiped hard drive belonging to the media giant was later sold on to a third party. "The hard drive names contained the home addresses and mobile phone numbers of the entire staff of The Sun, plus other high-profile individuals," according to CSRI.

The details included those of then Sun editor Rebekah Wade, later chief executive of News International, Andy Coulson, who worked as David Cameron’s communications supremo before resigning over the hacking affair, and Top Gear presenter and News International columnist Jeremy Clarkson. Disappointingly the researchers did not find the phone numbers for private eyes in the Sun machine.

The Sun's PC came into the hands of CSRI via a third-party disposal firm that had failed to wipe the data.

"Fortunately for News International – and by sheer chance – the data from the hard drive came to the Cyber Security Research Institute," says CSRI chairman and report author Peter Warren. "But it highlights once again the huge volume and value of data that is literally being thrown away by UK businesses and individuals each year.

"In the case of News International, this information on staff could have been used by competitors or criminals to glean vital and commercially confidential information. It could even have been used to hack their staff members’ phones," he added.

The research found 30 per cent of drives making their way onto the second-hand market came with data from previous owners. Over a 10-year period the figure is 40 per cent.

Unwiped data on discarded mobile storage devices and, increasingly, mobile phones poses much the same problem as carelessly discarded data on PCs.

"Whilst the problem has shown some signs of improvement over the last few years we are entering a new technology phase with solid state media being particularly difficult to handle," said Steve Mellings, director of trade group Adisa (the Asset Disposal and Information Security Alliance).

"With mobile phones, USB sticks, tablets and many new laptops utilising SSD, it is critical that people address this issue by implementing effective asset disposal policies."

The report authors estimate around 90 million gigabytes of unprotected data is annually discarded from mobile phones. Though the bulk of this will be music and pictures, around 4.5 million gigabytes will be personal data such as emails and contact details. The report authors reckon 15.1 million gigabytes of data a year is left on discarded old computers.

Carelessness in disposal of data exposes firms to fines by the Information Commissioner as well as reputation-damaging publicity if lax discarded kit disposal policies are exposed.

Apart from more and better education of the public and businesses about securing their data, the report suggests the long-standing problem of carelessly discarded data might be addressed by creating a rigorous set of standards for data destruction and audits of data destruction firms.

"One of the more worrying trends to emerge from our surveys over the last decade concerns the fact that, in a number of cases, the drives we have examined had been given to a third party for disposal but instead of destroying the data those third parties had simply sold on the drives," Warren said.

The CSRI worked with academic partner organisations including the University of Glamorgan, Australia’s Edith Cowan University and Longwood University in the US on the study. ®

Updated to Add

A News International spokesperson said:

“All our drives are encrypted and we have a policy to only dispose of end-of-life hardware in a secure way through a 3rd party supplier. We are contacting the CSRI to find out more about the drive that has been passed to them.”

Build a business case: developing custom apps

More from The Register

next story
Nice computers don’t need to go to the toilet, says Barclays
Bad computers might ask if you are Sarah Connor
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Microsoft stands on shore as tablet-laden boat sails away
Brit buyers still not falling for Windows' charms
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?