Analysis: TSA document release show pitfalls of electronic redaction
TSA woes serve as reminder to companies that still make basic mistakes, analysts say
Computerworld - The inadvertent exposure of a sensitive Transportation Security Administration (TSA) security manual earlier this week serves as a sobering reminder to enterprises that often overlook pitfalls of electronic document redaction security, analysts said.
The lapse occurred when a contract employee posted an improperly redacted TSA Standard Operations Procedure manual on the publicly accessible Federal Business Opportunities Web site. The document was posted as part of a TSA contract solicitation bid and contained detailed information on the screening procedures and protocols used by a TSA officials at 450 U.S. airports.
The manual was discovered on Sunday by people at The Wandering Aramean blog, which recovered the redacted portions and sent the document to anti-secrecy site Cryptome.org. Though the TSA has insisted that the document was outdated, the incident has stirred widespread concern among lawmakers, with some calling the gaffe "shocking" and "reckless."
In a letter sent to DHS Secretary Janet Napolitano, several members of the House Committee on Homeland Security demanded details on the DHS' procedures and guidelines for redacting sensitive documents. The lawmakers also wanted the DHS to verify the security of any other redacted documents containing sensitive information that might be available online.
The TSA incident is the second time this week that an organization found itself in trouble over problems stemming from improper redaction. The other incident involved HSBC Bank, which blamed a bug in its imaging software for the inadvertent exposure of sensitive data on some of its customers going through bankruptcy proceedings. The bank claimed that information it had redacted from electronically filed Chapter 13 bankruptcy proof-of-claim forms had become viewable as as result of the undisclosed bug.
Such incidents highlight the havoc that can result from improper electronic redaction, analysts said. Earlier this year, Facebook found itself in the middle of an embarrassing situation after an Associated Press reporter reversed redacted court testimony showing Facebook's estimates of its market value to be substantially lower than what it was claiming publicly.
In May 2005, the Pentagon posted a report on its Web site containing information that it believed had been blacked out about the name of a U.S. soldier who shot and killed an Italian secret service agent in Iraq.
The lapses often result from a very simple misunderstanding of how electronic redaction works, said Barry Murphy, an analyst with Murphy Insights, a Boston-based consultancy specializing in e-discovery, records management, and content archiving. "If I put a lot of black magic marker on paper I am actually covering the data so that it is redacted," Murphy said. "In the digital world that is not true."
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts