Plugging a leak

by Howard Oakley on September 29, 2010

Howard Oakley

Companies no longer need to worry about spies with miniature cameras. These days, anyone with an iPod can make off with valuable data.

As every good James Bond fan knows, the essential tool of the trade used to be a subminiature Minox camera. The spy’s daily drudge would involve sneaking into an office in the dead of night, drawing the blinds, turning on the mandatory desk light, dipping into a pocket to retrieve the Minox and making copious copies of secret documents.

By the Thatcher era, the ubiquity of photocopiers had not entirely replaced the Minox, but made spying and leaking very different trades. Key documents could now be duplicated near-perfectly in the course of a few minutes seized during a lunch hour. Predictably, the Iron Lady was incensed at the series of damaging leaks, to the point where administrative processes required to make a copy consumed more time and effort than the copying itself – a desperate but ever-futile bid to stem the outflow of secrets.

Now the spy or leaker has only to bring in a blank DVD or their usual iPod in order to make off with gigabytes of governmental embarrassment. As Wikileaks has shown for both corporations and governments alike, those rich pickings don’t even have to be passed to an enemy, merely placed in the public domain. Whether it’s a modest collection of emails between climatologists or a massive database of US military intelligence from Afghanistan, it can be internationally influential.

The problem isn’t one of security – many secrets that end up in the hands of spies, or on Wikileaks, have been stolen by those working inside their organisations, who would have had legitimate access to them in the first place – it’s of traceability. While many printers and copiers, particularly those that support colour, leave hidden signatures on their output, hardly any digital documents contain any information as to their provenance, except in easily stripped or forged metadata.

Most of us have documents or data that we would rather were not seen by others, such as commercial competitors. Even if you use a high-end document management system, there’ll probably be no indelible fingerprint applied to each copy of a document, or export from a database, that establishes by whom and when that material was checked out of the system’s control. Outside specific sectors such as healthcare, uncontrolled content is easily passed around authorised users. When sensitive documents appear in the hands of competitors or on a publicly accessible website, it’s beyond the abilities of even the sharpest Miss Marple to prove who released them.

The answer may lie with steganography, the ability to hide data inside a file without the concealment being apparent. All it needs is a document management system that fingerprints each released copy of sensitive content so that the transaction can be identified against its access logs. When a sensitive PDF or Word document surfaces on Wikileaks, with it would then come the stigmata that could trace the leak back to those responsible. There are some specialist developers who appear to offer such features, but few of us use document management systems, and even fewer of them offer traceability as standard.

You might, of course, think Wikileaks a good thing, as long as it doesn’t damage you. Given the furore that resulted from its release of US military intelligence reports, it’s surprising that little effort seems to have gone into making sensitive documents more traceable. Meanwhile, the largely anonymous, unrepresentative and unaccountable group behind Wikileaks can continue to ride roughshod through world politics.

For more breaking news and reviews, subscribe to MacUser magazine. We'll give you three issues for £1
  • smr__

    Whistleblowing is so important it’s been given legal protection in a large number of jurisdictions. If your company is pumping toxic waste into your local school someone should tell someone about that. Whistleblowing is fundamentally a voluntary service society relies on if regulation fails.

    Tracking who’s leaking stuff from your organisation is also important and that’s why you need to be able to work out who gave the plans of your next product to your competitor.

    What you do now (and you have done for quite some years) is you’d seek to rely on the whistleblowing protections if you leak something serious and your organisation would seek to rely on confidentiality if you leak something important. Traceability lets you work out who’s doing it. No reason the two can’t live together.

Previous post:

Next post:

>