State Agency to Destroy Unauthorized USB Drives 179
Lucas123 writes "The State of Washington's Division of Child support has forced hundreds of workers to turn in personal USB flash drives and has instead begun issuing corporate-style USB drives. The goal is to centrally monitor, configure and prevent unauthorized access to storage devices. So far about 150 common drives have been issued. The agency eventually plans to destroy all existing thumb drives collected as part of the security policy change."
Misleading summary (Score:5, Informative)
I know... I apologize for reading the article.
Re: (Score:2)
Re:Misleading summary (Score:5, Insightful)
The whole point of the exercise appears to be about safeguarding the data. The
A better title would have been "Washington's Division of Child Support takes important steps needed to safeguard confidental data" or "State agency moves to plug USB flash drive security gap". Oops, never mind, the second one was already used by *TFA*.
Re: (Score:2)
There are a couple of issues the first is can you trust a contractor not to copy any data before they erase the drives? The second is what does it actually
Re: (Score:2)
You could also use a cadre of riot police guarding the container to an industrial mill, an ultra-fine high-powered shredder or a Blendtec blender. Be creative!
Some examples to give you ideas: http://www.stedman-machine.com/vslam-app.htm [stedman-machine.com]. Their slogan is hilarious and I can't explain why: "Your solution to size reduction(tm)". W
Re: (Score:2)
Re:Misleading summary (Score:5, Informative)
Re: (Score:2)
Like secure finger print verification [slashdot.org]?
Re: (Score:2)
If these additional features actually make the drive any more secure is likely to be another matter.
Re: (Score:2)
I suggest reading "A Security Market for Lemons" by Bruce Schneier. (aka the author of Blowfish)
http://www.schneier.com/blog/archives/2007/04/a_security_mark.html [schneier.com]
Re: (Score:2, Informative)
Re: (Score:3, Funny)
How the hell did you get access to my document - I store it on my personal USB drive, its the only copy... when they took it off me and gave me that new one I thought they destroyed my personal one..
Does that mean you have those pictures of my wife too???
Re: (Score:1)
Re: (Score:1)
Re:Misleading summary (Score:4, Funny)
Misleading Summary leads to Misleading Tags (Score:2, Insightful)
But then again what does the content of the article have to do with analysis on Slashdot... yeah I know.. flamebait..
Re: (Score:3, Insightful)
The replacement drives might support encryption, which is a normal 'corporate' feature.
Re:Misleading Summary leads to Misleading Tags (Score:5, Insightful)
The replacement drives might support encryption, which is a normal 'corporate' feature.
when it comes to commenting or responding... comprehension is not necessary.
The use of the word "personal" was obviously targetted at getting a rise out of the non-RTFA crowd, as the article itself never terms the drives - "personal drives". They called them "nonapproved thumb drives". We recently discussed "secure" thumb drives [slashdot.org] and I hope they arent wasting their (taxpayers') money on the version of the Cruzer reviewed in the article.
Re: (Score:2)
Re:Misleading Summary leads to Misleading Tags (Score:5, Informative)
RTFA. The reason the state is issuing these new fancy-schmancy thumb drives is that the new ones (claim to) have 256-bit AES encryption and (claim to) self-destruct after 10 consecutive wrong passwords. They're doing this whole switch because of privacy, because the thumb drives contain the private, personal case files of hundreds/thousands of citizens.
If you had read my response to the other post... (Score:3, Insightful)
Re: (Score:2)
In which case they really should verify that this actually is the case before buying more than a sample. This is a business which sells quite a bit of "snake oil". It's also important to remember that any security system is only as secure as it's weakest component.
Re: (Score:2)
Good (Score:3, Funny)
Re: (Score:1)
Hell no...At least they used to be in their seat to listen music. Now I have to run around pantries, coffee shops and pubs. :P
Re: (Score:3, Insightful)
Re: (Score:2)
Accuracy of Story? (Score:3, Informative)
Although, it does say in the quote from the manager that they will "manage and back up the new drives using SanDisk's Central Management & Control server software...which relies on a Web connection to directly communicate with agents on the tiny flash drives [and can] remotely monitor and flush any lost drives" so they could read and delete files on the disks remotely.
It also says that they chose the disks for their MSW Vista compatibility which suggests that the "agents" really are (as previously quoted) on the disk rather than the PCs (one assumes so they can track what their employees do with the disks while not using their PCs, which really doesn't seem necessary to me). Hopefully they do have software on the PCs too to ensure that non-authorised disks are not used and to monitor activity if the "agents" are removed from the disk by intrepid employees.
Although, I suppose, in principal, the right to privacy of their clients (which could be breached by data being transferred out of the building) overrides the right to privacy the government employees have while in the office.
Re:Accuracy of Story? (Score:5, Insightful)
My bad. It says "after recalling the thumb drives used by workers. Most of those had been purchased independently by the employees, causing myriad problems for security personnel, Main said. The new policy requires workers to use the drives supplied by the agency. Main said he eventually plans to destroy all existing thumb drives collected as part of the security policy change." Although, I think from this and following comments like "The general perception is no one will report a lost USB memory stick because they're so cheap" there is an implication (although it isn't explicit at all) that the drives were bought with public money and used for public work.
Once again, I don't think there is too much to complain about here. It shocks me how many employers (even in sensitive areas like government departments and law firms) have PCs that will even, by default, run software or an operating system from a USB drive. According to TFA, in this case "sensitive data transported by off-site workers include[d client's] tax documents, employer records, criminal histories and federal passport data" and commonly "the names, dates of birth and Social Security numbers of children".
Of course, in opposition to what the article says, I think education about data protection legislation and issues is more important than attempting to physically constrain employees (which is ultimately impossible), although both may have their place.
Sensible policy (Score:5, Informative)
This isn't a personal privacy issue for the users (after all its just a USB key) its a personal privacy issue for the people on whom the department stores information.
Re: (Score:3, Interesting)
Re: (Score:3, Interesting)
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:3, Interesting)
Re: (Score:2)
The supplier of the devices claims that this will happen. There have been similar devices where any protection could be trivially defeated. There's also the issue of how long it would take for the device to "self-wipe" since it would need to carry an onboard power source which would last at least that long.
Re: (Score:2)
To some degree, yes. To lawyer's offices to discuss a case or cases. To doctor's offices or the hospital to discuss a case or cases. To civil or criminal court... To other state agencies... Etc... Etc...
It's either carry a thumb drive or equally vulnerable heaps o' paper.
Re:Sensible policy (Score:5, Insightful)
1. What maybe started along the lines that you described, then has to go through controlling or purchasing or such, which in a lot of places have their job judged and measured by how much they saved. If they saved 10,000$ at the cost of making everyone else spend 1,000,000$ in workarounds and lost productivity, they're doing their job right. So someone will go "auugh, why should we pay a few bucks more on very secure drives, when we could get ordinary ones at a bulk discount? Look, there are these drives with fingerprint scanner for half the price. That's secure, right?" (See the vulnerability linked even on Slashdot recently.)
2. Someone else (or in some organizations the same) will have to make sure it's one of the approved suppliers. Ideally this would mean those who have a good track record of reliability, quality, etc. In practice, it'll mean one of (A) whoever pays more bribe, or (B) the boss's wife's or cousin's supplies company, created just to siphon some money off such purchases. If it's a state agency, stuff like pork barrel, political favours and lobbies have something to do with it too.
Since this _should_ be in conflict with #1 and is exactly the kind of thing that #1 is supposed to catch, sometimes they split the bribe, sometimes they trade favours, and sometimes inventive discounts are used. Like we'll price the USB sticks at $1000 each, give you a 50% discount, and let you show that you've done your job right by negotiating a whole $500 discount per drive.
3. Some IT department has been given thoroughly counter-productive goals, like only keeping the computers or the network running, but no mention of actually providing a service to the rest of the organization. So suddenly the users are their sworn enemies, the filthy pests that keep using and screwing their preciouss computers and network. They'll do their best to contain, thwart and plain old inconvenience those users at every step. So the "secure" setup for those drives will be just an exercise in making it as inconvenient to use as possible, to teach those pesky lusers a lesson.
And indeed the users do learn a lesson: that if you want to get your job done at all, you have to do your own unauthorized workarounds. There goes most of security out the window right there.
Alternately, the IT department has also been on the shit end of #1, and is underfunded and staffed with the cheapest monkeys who can sorta bang on a keyboard, and don't fling too much feces at the screen. So they'll configure something which they think is right, but is not.
Yet another alternative is that a lax PHB can't be bothered to actually organize IT, and some BOFH personality types feel free to override everything and do what _they_ please. I've seen it happen. Stuff like production servers configured without XA support for _years_, just because the relevant BOFH thought that's a buzzword and it runs just as well without it anyway, plus it saves him the bother of installing the relevant libraries on all servers. So he _lied_ to the team for years that they have a feature that they didn't actually have.
And not only I can see all three happening with security too, I've _seen_ it happen with security features too.
4. Some PHB will figure out that it's not really an "enterprise" drive unless it has the organization's logo on it. In fact, that that's what makes anything properly enterprise.
Some frustrated users that have been on the shit end of #3 too often, will begin just printing and gluing makeshift logos to their own USB sticks, rather than put up with Mordac The Preventer Of IT Services again. Noone will be any wiser.
Etc.
Re: (Score:2)
Re: (Score:1)
Same thing happens in the UK - your car can be seized under certain circumstances and crushed. Why? Why not just sell them to someone else? It doesn't make any sense.
Re: (Score:2)
I also came across this rather simple, yet elegant solution for Windows us
What a waste (Score:1)
Re:What a waste (Score:5, Insightful)
Two things to consider:
Re:What a waste (Score:4, Informative)
Re: (Score:2)
Getting old data off my flash drive is just as reliable as looking at my bathroom light switch to see if it was on last night at 3 AM. You may be able to detect that the switch at one time or another was in the on position simply from wear patterns and the currently parked position, but as a high
Re: (Score:2)
Loading them full of whatever you want a couple of times is surely better than loading them with it once. But how many is enough? 2, 3, 4 times?
This process is time-consuming considering you need to fill the drive to the brim, sync the buffers and then erase everything and sync again. A drive may be $20, gross cost of a hour of a government employee erasing the drives, putting them on public sale, filling all the paperwork in, supplyi
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
# possibly use
dd=if=/dev/zero of=freespace bs=512; rm freespace
on filesystems periodically. This erases all data (although some information may still be recovered from the inodes, and unused parts of existing file blocks). On both hard drives and flash media.
It may take a long time (on either media).
"Unerasing" old drives can be very fruitful -- normally the machines are dumped and resold as bottom-end used co
Re: (Score:2)
The question is, do the government employees know?
Do their bosses know? (I mean, they are the ones who decide which procedure is deemed safe enough.)
And does it pay to do so and sell the drives? (I'm not sure what manpower would have to be employed but knowing the way govt institutions do this kind of stuff, the that wouldn't be one unpaid intern but a team of security firm contractors at $80/hour)
Re: (Score:3, Insightful)
Depends on the price. If they were 1p I'd buy 100 of 'em. 256 Mb is still a useful amount of storage (plain text, html, mp3 etc. etc.).
There is still some demand for small flash drives (Score:2)
This is industrial strength hardware that that would take serious $$$ to replace, a lot of time to migrate the software and debug the interface for, and it is perfectly functional. The only problem is that the mass-market ap
Re: (Score:2)
The time to wipe and process them for sale is easily worth more than the drive. That's like erasing a floppy disk to save it, not to mention that destroying them ensures no files will be recovered.
Waste (Score:3, Insightful)
Re: (Score:2)
Re: (Score:3, Informative)
/dev/zero is a virtual device that whenever you read a character from it, comes out with a stream of zeros; it is always ready to read and never shows end-of-file.
Re: (Score:2)
dd if=/dev/sda1
before and after to be sure.
If you're really paranoid, there's also shred: /dev/sda1 /dev/sda1 300 times, then writes 0's. Spends a couple cycles with I/O to screen to let you know it still cares, [-n 0 -z -v] for a verbose version of dd if=/dev/zero)
shred -n 300 -z -v
(writes random data to
Re: (Score:2)
A good starting point to learn more is Wikipedia: http://en.wikipedia.org/wiki/Data_remanence [wikipedia.org]
Re: (Score:2)
All the techniques I've thus far seen have required a certain amount of laboratory equipment
Re: (Score:2)
Re: (Score:2)
In Soviet Russia... (Score:1)
Won't work, even with all the good faith... (Score:3, Interesting)
Even employees that mean to comply will forget, will be at work and need one, reach in their pocket, and find they've got one of their own instead of the corporate-issued one.
I don't know what the answer is, but banning ubiquitous technology is like Canute holding back the waves.
The most dramatic case of the utter failure of this sort of thing I've seen occurred at a company in the 1990s which didn't quite understand that personal computers were personal. This was in the days before antivirus software was standard on any business machine. The company became seriously infected with a boot-sector virus. They had the entire IT department, SQA department, and tech support departments literally stop all their work for about a week while they went throughout the company collecting diskettes and disinfecting them, then pronounced the company clean. Apparently it never occurred to anyone that there were diskettes that weren't in the building.
Even then there were laptops, and, without pointing fingers--OK, pointing fingers--laptops were expensive at the time, and it was mostly the high-income and high-ranking employees, and, of course, people with good reason to have them--salespeople typically--that had them.
The company was reinfected by the same boot virus within less than a month.
Re: (Score:2)
Re: (Score:2)
I work for the government (so i'm getting a kick out of these replies)
my boss is great, but she would have my head on a platter if i took a disk or flash drive full of confidential information, after i retrieved my head from said platter i would face criminal charges as well. you just don't do that sort of thing.
it doesn't happen accidentally unless there are HUGE (Like Xbox) flaws in policy and procedures, why would any employee be bringing personal storage in and hooking it up, it's not like the i
Re: (Score:2)
2) Diasble all USB ports on all computers
3) All users to run as "Users" and not local administrator
4) Use GPO to diasble auto install of USB devices
5) Use GPO to deny all programs unless authorised (Not often used, but in windows you can stop a logged on domain user from running any programs whatsoever, including explorer)
6) Install Proxy that "denies" all webistes except approved one
7) Pissed off users, but more secure network. Senior management support you, so flack direct
Re: (Score:3, Insightful)
Re: (Score:2)
If you've got the correct security in place, the CFO won't be fired for using his thumb drive because he won't be able to. If the CFO then nee
Re: (Score:2)
Re: (Score:2)
Some apps need local administrator to run.
5. That may end up getting in the way of people doing there job and lead to long wait times to get a apps that they need added to the list.
6. That will likely just get in the way as well a block list is better.
7) That much lock down will Pissed off users and management to point that they will find a way to get around it just to get there job done on time.
Re: (Score:3, Funny)
Re: (Score:2)
Oi - get real (Score:3)
Government and private sector agencies destroy used disks every single day using methods from as simple as patterning 1's and 0's to smelting the platters. This happens so often that their are dedicated machines available to do it for you right up to dedicated companies that specialize in the destruction.
Misleading Comments... (Score:3, Informative)
Hah (Score:1)
Somebody has woken up to to personal privacy (Score:5, Insightful)
As to destroying them... Put this in proportion: 150 devices, at perhaps $30 apiece if they wern't bought yesterday: about $4500. On the otyher side, when the UK government lost 2 CDs with large amounts of personal information, the mailshot warning the people whose personal and banking information had been misplaced cost $6,000,000. With cost ratios of this magnitude, the precautionary principle applies. Yes, you could wipe them, and they probably wouldn't leak info. But the cost if they did is so high that the tiny loss involved in destruction is irrelevant.
So I applaud a government department for finally taking privacy seriously. The cost arises becasue they didn't do so before, and is small. The cost for all the other departments who have not yet got it is increasing every day.
Why not disable the USB ports? (Score:3, Insightful)
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
I'm not sure I understand your point. (Score:2)
So they're sticking these thumb drives in computers owned by the people they are investigating?
Or they have no way to securely store information on their own lap
Re: (Score:2)
Re: (Score:2)
How do you physically attach a keyboard and mouse to a computer via an Ethernet port?
Could the agency insist on only purchasing PCs with PS/2-style ports? Maybe. What happens when the only manufacturer still supplying them charges thrice as much as a commodity PC for the privilege of using 20-year-old technology?
Could the agency lock down the OS so that only USB devices with approved IDs will be reco
Re: (Score:2)
What if they need to transfer the data outside of the organization -- say a social worker took digital photos to document abuse and needs to bring them to court as evidence.
Re: (Score:2)
There are security concerns (Score:3, Informative)
So he took a bunch of thumb drives, put a Windows autorun backdoor installer on them, and scattered them around the entrances and outdoor smoking areas.
Hey, presto, instant access.
easily cracked? (Score:2)
I have to wonder if they will be compensated? (Score:2)
I can understand the need to destroy the dive for security purposes, but who is going to pay for them? not the employees I hope.
by now, the IT guys probably sorted through them and kept the hi-cap ones for themselves.
How Convenient!! (Score:2)
Now if only all the other agencies would.... (Score:3, Interesting)
The auditor was furious, and demanded we give him the file, rather than just printouts. I said no, and he left, only to return the next day with his supervisor, who also demanded the same and said they'd get the file "legally" if needed.
I told them to give me the USB key, and we'll see. I plugged the key in and turned the monitor around so they could see 9 QuickBooks files from other companies. I asked them if they intended to share my data with the next 9 companies, like they just shared those files with me?
After much haranguing, and threat of legal action, we finally agreed on a full Excel file database dump, but with the critical fields (customer names, CC numbers, etc) wiped.
Is it just me, (Score:3, Interesting)
Not destroyed - sold as surplus, likely (Score:2)
I will keep an eye out for USB sticks at the Auburn office near the Supermall. They'd be a welcome change from the elementary school scissors and grubby pocketk
They are not alone (Score:2, Informative)
RTFA (Score:5, Insightful)
Re: (Score:2)
It's the same in any military situation - hook a device up to a Restricted or higher machine and the only way to 'declassify' it is with a hammer.
Or, as some people have pointed out from TFA, it could be that these were purchases that they've been
Re: (Score:2)
Apparently they had a Sargent take the drive to another room and inspect it, then returned it. I don't know what violations took
Re:You can have my USB key (Score:5, Insightful)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Suck it up. AC's have posted at -1 as long as I've had an account, thanks to setting them to -6 (and I am not the only one).
If you want anyone to care what you have to say, work it out.
Re: (Score:2)
that's the cool part. Plug in two drives, dump contents from one to the other, format the old one, give it away. Really simple.