Securing data on Flash media is harder than most people believe, Peter Jamieson of UL subsidiary Witham Laboratories, told AusCERT delegates.“The only way to be absolutely certain that data can’t be recovered from a USB key is to hit it with a hammer… and to get medieval about it,” he said. Even encrypted keys, he said, have vulnerabilities that might expose data the user believes is safe.Jamieson highlighted a combination of how Flash controllers manage the storage device for the longest possible life, the physical behavior of the Flash cells, and how encryption is managed.“Flash media is portable, robust, ubiquitous – and therefore losable”, he said. One problem lies in how the Flash controller behaves, with two particular characteristics of the Flash Transfer Layer (FTL) that are designed to cope with some of the shortcomings of Flash.Flash controllers, Jamieson explained, have a particular lifecycle consideration in mind: each block on the drive can only be physically deleted between 10,000 and 100,000 times before it begins to degrade. Moreover, the block – which is the smallest unit that Flash controllers delete – will have data other than what you’re trying to alter or delete. An alteration to a small file (say, an e-mail signature) will, he explained, result in the drive’s controller creating a new copy of the block containing that file – but to avoid an unnecessary erasure, the FTL will mark the block as unusable, but only erase it when it’s necessary.“When you ‘delete’ a file on a USB flash drive,” he said, “you don’t overwrite the file, you just delete the filesystem’s representation of the file.”The electrical properties of Flash cells are also problematic: “deleting” the contents of the cell only requires that its charge falls below the arbitrary value that represents “zero”. Various experiments, he noted, suggest that operating a Flash drive at lower than its nominal voltage will cause residual charge remaining in the cells to be readable.He recommends that all data stored on USBs is encrypted (with a preference for software encryption or a combination of hardware and software), and strongly suggests multiple-pass overwrites as a data deletion strategy.#auscert2012Follow @CSO_Australia and sign up to the CSO Australia newsletter. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Regulation Regulation news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe