Re: flash/thumb drives security

From: <pauls..._at_faberbrent.com>
Date: Fri, 27 Feb 2009 04:30:48 -0800 (PST)

>From - Sat Mar 02 00:57:25 2024
Received: by 10.90.70.6 with SMTP id s6mr341281aga.8.1235582183734;
        Wed, 25 Feb 2009 09:16:23 -0800 (PST)
Return-Path: <areda..._at_msn.com>
Received: from blu0-omc3-s17.blu0.hotmail.com (blu0-omc3-s17.blu0.hotmail.com [65.55.116.92])
        by mx.google.com with ESMTP id 16si899077gxk.1.2009.02.25.09.16.23;
        Wed, 25 Feb 2009 09:16:23 -0800 (PST)
Received-SPF: pass (google.com: domain of areda..._at_msn.com designates 65.55.116.92 as permitted sender) client-ipe.55.116.92;
Authentication-Results: mx.google.com; spf=pass (google.com: domain of areda..._at_msn.com designates 65.55.116.92 as permitted sender) smtp.mail eda..._at_msn.com
Received: from BLU149-DS6 ([65.55.116.73]) by blu0-omc3-s17.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959);
         Wed, 25 Feb 2009 09:16:24 -0800
X-Originating-IP: [68.113.113.179]
X-Originating-Email: [areda..._at_msn.com]
Message-ID: <BLU149-DS6DD76F2CF00AF028ECFDDBCAC0_at_phx.gbl>
Return-Path: areda..._at_msn.com
From: "Its from Onion" <areda..._at_msn.com>
Subject: flash/thumb drives security
Date: Wed, 25 Feb 2009 11:16:22 -0600
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="----=_NextPart_000_027D_01C9973A.7DB2D8A0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: MSN 9
X-MimeOLE: Produced By MSN MimeOLE V9.60.0053.2200
Seal-Send-Time: Wed, 25 Feb 2009 11:16:22 -0600
Bcc:
X-OriginalArrivalTime: 25 Feb 2009 17:16:24.0358 (UTC) FILETIME=[C9238460:01C9976C]

------=_NextPart_000_027D_01C9973A.7DB2D8A0
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable



I thought this interesting; you may want to consider what data (like bankin=
g information) you keep on a thumb drive. The information is via the US Nav=
y's Chief Information Officer (CIO):

The reason that hard drives and USB thumb drives must be treated differentl=
y deals with the physics that allows the two devices to work and the inner =
workings of the operating systems on which they are used. Hard drives are c=
omprised of one or more magnetic platters that store information by magneti=
cally aligning particles. This process is fully reversible and the theoreti=
cal number of writes to magnetic media is infinite. Locations on magnetic m=
edia are usually referred to by platter, track, and sector. Operating syste=
ms and file system tools allow for the precise targeting of write operation=
s down to the sector without interference.

USB thumb drives and other flash media (i.e. digital camera media) are comp=
rised of NAND media that store information by writing to "cells." Every tim=
e one of these cells is written to, a small amount of non-reversible damage=
 occurs to the cell. This physical destruction limits the number of writes =
to a particular cell to a few million. In order to extend the life of USB t=
humb drives, manufacturers include a chip on the drives that randomizes whi=
ch cells are written to. This makes it impossible to control exactly which =
cell is written to. The reason this is important has to do with the operati=
ng system's interaction with the file system.

In the NTFS, FAT, and FAT32 file systems used by Microsoft operating system=
s (and most thumb drives), data from files that have been "deleted" is stil=
l present in the media on which it was written. In these file systems the f=
irst "block" of data contains information about the file including the size=
 of the file and the locations (sectors or cells) on the media where the re=
st of the file can be found. When a file is "deleted," the file system only=
 notifies the operating system that locations on the media that are occupie=
d by this file are now available for writing. The data itself is not actual=
ly removed. Historically, DoD available disc wiping tools overwrote the old=
 data with an alternating passes of 1's and 0's. Per DoD instruction, the d=
isc was considered wiped clean when seven passes of 1's and 0's were writte=
n to every location that previously contained data. Magnetic media allows f=
or this precision writing; however, the
cell randomization techniques used to prolong the life of thumb drives do n=
ot.

"Wiping" is the most secure method of cleansing unwanted data from media. U=
nwanted data includes not only classified materials, but also malware and v=
iruses. The inability to securely wipe thumb drives, their small size, and =
the difficulty in controlling their use, are why thumb drives are no longer=
 permitted, but USB hard drives are.


------=_NextPart_000_027D_01C9973A.7DB2D8A0
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content=text/html;charset=iso-8859-1>
<STYLE></STYLE>

<META content="MSHTML 6.00.6000.16809" name=GENERATOR></HEAD>
<BODY id=MailContainerBody
style="PADDING-LEFT: 10px; FONT-WEIGHT: normal; FONT-SIZE: 10pt; COLOR: #=
000000; BORDER-TOP-STYLE: none; PADDING-TOP: 15px; FONT-STYLE: normal; FONT=
-FAMILY: Verdana; BORDER-RIGHT-STYLE: none; BORDER-LEFT-STYLE: none; TEXT-D=
ECORATION: none; BORDER-BOTTOM-STYLE: none"
leftMargin=0 topMargin=0 acc_role="text" CanvasTabStop="true"
name="Compose message area"><!--[gte IE 5]><?xml:namespace prefix="v" /=
><?xml:namespace prefix="o" /><![endif]-->
<DIV
style="FONT-WEIGHT: normal; FONT-SIZE: 10pt; COLOR: #000000; FONT-FAMILY:=
 Verdana">
<DIV>&nbsp;</DIV>
<DIV>
<DIV id=ygrp-mlmsg style="WIDTH: 655px; POSITION: relative">
<DIV id=ygrp-msg
style="PADDING-RIGHT: 25px; PADDING-LEFT: 0px; Z-INDEX: 1; FLOAT: left; P=
ADDING-BOTTOM: 0px; MARGIN: 0px; WIDTH: 470px; PADDING-TOP: 0px">
<DIV id=ygrp-text>
<P><BR>I thought this interesting; you may want to consider what data (like=
 
banking information) you keep on a thumb drive. The information is via the =
US
Navy's Chief Information Officer (CIO):<BR><BR>The reason that hard drives =
and
USB thumb drives must be treated differently deals with the physics that al=
lows
the two devices to work and the inner workings of the operating systems on =
which
they are used. Hard drives are comprised of one or more magnetic platters t=
hat
store information by magnetically aligning particles. This process is fully=
 
reversible and the theoretical number of writes to magnetic media is infini=
te.
Locations on magnetic media are usually referred to by platter, track, and=
 
sector. Operating systems and file system tools allow for the precise targe=
ting
of write operations down to the sector without interference.<BR><BR>USB thu=
mb
drives and other flash media (i.e. digital camera media) are comprised of N=
AND
media that store information by writing to “cells.” Every time one of t=
hese
cells is written to, a small amount of non-reversible damage occurs to the =
cell.
This physical destruction limits the number of writes to a particular cell =
to a
few million. In order to extend the life of USB thumb drives, manufacturers=
 
include a chip on the drives that randomizes which cells are written to. Th=
is
makes it impossible to control exactly which cell is written to. The reason=
 this
is important has to do with the operating system’s interaction with the f=
ile
system.<BR><BR>In the NTFS, FAT, and FAT32 file systems used by Microsoft=
 
operating systems (and most thumb drives), data from files that have been=
 
“deleted” is still present in the media on which it was written. In the=
se file
systems the first “block” of data contains information about the file i=
ncluding
the size of the file and the locations (sectors or cells) on the media wher=
e the
rest of the file can be found. When a file is “deleted,” the file syste=
m only
notifies the operating system that locations on the media that are occupied=
 by
this file are now available for writing. The data itself is not actually
removed. Historically, DoD available disc wiping tools overwrote the old da=
ta
with an alternating passes of 1’s and 0’s. Per DoD instruction, the dis=
c was
considered wiped clean when seven passes of 1’s and 0’s were written to=
 every
location that previously contained data. Magnetic media allows for this
precision writing; however, the<BR>cell randomization techniques used to pr=
olong
the life of thumb drives do not. <BR><BR>“Wiping” is the most secure me=
thod of
cleansing unwanted data from media. Unwanted data includes not only classif=
ied
materials, but also malware and viruses. The inability to securely wipe thu=
mb
drives, their small size, and the difficulty in controlling their use, are =
why
thumb drives are no longer permitted, but USB hard drives
are.<BR></P></DIV></DIV></DIV></DIV></DIV></BODY></HTML>

------=_NextPart_000_027D_01C9973A.7DB2D8A0--
Received on Sat Mar 02 2024 - 00:57:25 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:45 CST