Petraeus affair reveals risks of email
Computerworld - The scandal that caused the resignation of Gen. David Petraeus, one of the country's most decorated military professionals, has a lot of observers wondering: If the head of the CIA can't figure out how to keep his emails private, do the rest of us even stand a chance?
In a word, no -- or at least not without some real planning. "If you're just a normal person sending email, then it's pretty easy to trace," said Keith Jones, a computer forensic investigator. Every server an email hits en route to its destination "puts a little identifying line in there," Jones explains. "It's like a chain of custody, showing who had the email."
Petraeus had reportedly used a pseudonym to set up multiple email accounts that he used to send his mistress messages, including some on Gmail. One was a shared account that the two used to communicate via messages that they left in a drafts folder but never actually sent.
The idea was that if they left emails in the drafts folder -- known as an electronic drop box -- the messages wouldn't leave a trail and would be difficult for anyone to find.
There are ways to hide the e-bread-crumb trail, Jones said. For example, an anonymizer, also known as an anonymous proxy, can hide the sender's identifying information by accessing the Internet on the sender's behalf. It's akin to enlisting someone to deliver an envelope for you, Jones explained.
But most people -- whether they're sending memos about corporate marketing plans or messages to mistresses -- don't think about using such techniques.
"Most individuals and businesses don't think twice about sending private or confidential information over email," said Patrick Moorhead, an analyst at Moor Insights & Strategy. "For work email, assume someone is reading your email, as someone or something probably is."
This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.
Read more about Internet in Computerworld's Internet Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Data on the Move = Business on the Move; How Strategic Secure Managed File Transfer Adds Value and Drives Business This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small...
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Supercharge Your Web and Mobile App Development with High-Productivity Hybrid Cloud Webinar: Hear from industry experts about the amazing power at the intersection of next-generation web and mobile application development and cloud platforms.
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to... All Internet White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!