Analysis: TSA document release show pitfalls of electronic redaction
TSA woes serve as reminder to companies that still make basic mistakes, analysts say
Computerworld - The inadvertent exposure of a sensitive Transportation Security Administration (TSA) security manual earlier this week serves as a sobering reminder to enterprises that often overlook pitfalls of electronic document redaction security, analysts said.
The lapse occurred when a contract employee posted an improperly redacted TSA Standard Operations Procedure manual on the publicly accessible Federal Business Opportunities Web site. The document was posted as part of a TSA contract solicitation bid and contained detailed information on the screening procedures and protocols used by a TSA officials at 450 U.S. airports.
The manual was discovered on Sunday by people at The Wandering Aramean blog, which recovered the redacted portions and sent the document to anti-secrecy site Cryptome.org. Though the TSA has insisted that the document was outdated, the incident has stirred widespread concern among lawmakers, with some calling the gaffe "shocking" and "reckless."
In a letter sent to DHS Secretary Janet Napolitano, several members of the House Committee on Homeland Security demanded details on the DHS' procedures and guidelines for redacting sensitive documents. The lawmakers also wanted the DHS to verify the security of any other redacted documents containing sensitive information that might be available online.
The TSA incident is the second time this week that an organization found itself in trouble over problems stemming from improper redaction. The other incident involved HSBC Bank, which blamed a bug in its imaging software for the inadvertent exposure of sensitive data on some of its customers going through bankruptcy proceedings. The bank claimed that information it had redacted from electronically filed Chapter 13 bankruptcy proof-of-claim forms had become viewable as as result of the undisclosed bug.
Such incidents highlight the havoc that can result from improper electronic redaction, analysts said. Earlier this year, Facebook found itself in the middle of an embarrassing situation after an Associated Press reporter reversed redacted court testimony showing Facebook's estimates of its market value to be substantially lower than what it was claiming publicly.
In May 2005, the Pentagon posted a report on its Web site containing information that it believed had been blacked out about the name of a U.S. soldier who shot and killed an Italian secret service agent in Iraq.
The lapses often result from a very simple misunderstanding of how electronic redaction works, said Barry Murphy, an analyst with Murphy Insights, a Boston-based consultancy specializing in e-discovery, records management, and content archiving. "If I put a lot of black magic marker on paper I am actually covering the data so that it is redacted," Murphy said. "In the digital world that is not true."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts