References
- Sudan K, Badam A, Nellans D. NAND flash: fast storageor slow memory? Non Volatile Memory Workshop(NVMW2012); Mar 2012. San Diego.
- Hope H, Almutairi H, Alnazawi F, et al. An investigation into the efficiency of forensics data erasure tools for removable USB flash memory storage devices; 2013. Available from: http://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1126&context=adf/
- ACMA. Trends in communications and media technologies, applications and use; 2015. Available from: http://www.acma.gov.au/webwr/_assets/main/lib310658/trends_comms_media_technology_applications_and_use.doc/
- ENISA. ENISA’s ten security awareness good practices; 2009. Available from: https://www.enisa.europa.eu/publications/archive/ar-security-practices-en/at_download/fullReport
- Gemalto. Year of mega breaches & identity theft. Findings from the 2014 breach level index; 2014. Available from: http://breachlevelindex.com/pdf/Breach-Level-Index-Annual-Report-2014.pdf/
- Jones A, Valli C, Dabibi G. The 2009 analysis of information remaining on USB flash memory storage devices offered for sale on the second hand market. 7th Australian Digital Forensics Conference; 2009; Perth: Edith Cowan University.
- Kingston Technology. Data traveler for enterprise; 2014. Available from: http://www.kingston.com/flash/DataTravelers_enterprise.asp/
- Silowash GJ, Lewellen TB. Insider threat control: using universal serial bus (USB) device auditing to detect possible data exfiltration by malicious insiders; 2013. Available from: http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=35427
- Ponemon Institute. The 2015 cost of data breach: global analysis; 2015. Available from: http://www.ponemon.org/blog/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis/
- SanDisk. Unsecured USB flash drives; usage is more than double corporate IT expectations; 2008. Available from: http://www.sandisk.com/about-sandisk/press-room/press-releases/2008/2008-04-09-sandisksurvey-shows-organizations-at-risk-from-unsecured-usb-flash-drivesusage-is-more-than-double-corporate-itexpectations
- SanDisk. Unsecured USB flash drives; usage is more than double corporate IT expectations; 2010. Available from: http://www.sandisk.com/aboutsandisk/pressroom/pressreleases/2008/20080409sandisksurveyshowsorganizationsatriskfromunsecuredusbflashdrivesusageismorethandoublecorporateitexpectations
- Office of the Australian Information Commissioner. Australian privacy principles: Australian government; 2012. Available from: https://www.oaic.gov.au/privacy-law/privacy-act/australian-privacy-principles
- Szewczyk P, Sansurooah K. The 2012 investigation into remnant data on second hand memory cards sold in Australia. 10th Australian Digital Forensics Conference; 2012 Dec 3–5; Perth: Novotel Langley Hotel, SRI Security Research Institute, Edith Cowan University.
- Robins N, Sansurooah K, Williams PAH. I know what you did last summer... an investigation into remnant data on USB storage devices sold in Australia in 2015. Proceedings of the Australasian Computer Science Week Multiconference on – ACSW ’16; 2016; Canberra.
- Bennett DW. The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations; 2011. Available from: http://articles.forensicfocus.com/2011/08/22/the-challenges-facing-computer-forensics-investigators-in-obtaining-information-from-mobile-devices-for-use-in-criminal-investigations/
- Neal D. Barclays to compensate customers for losing USB stick containing personal data; 2015. Available from: http://www.theinquirer.net/inquirer/news/2417610/barclays-to-compensate-customers-for-losing-usb-stick-containing-personal-data/
- Goldman J. Lost USB drive exposes Hong Kong hospital patients’ data; 2014. Available from: http://www.esecurityplanet.com/network-security/lost-usb-drive-exposes-hong-kong-hospital-patients-data.html/
- Out-Law.com. Lost unencrypted USB stick costs council £80,000 data breach fine; 2013. Available from: http://www.out-law.com/en/articles/2012/october/ico-reiterates-warning-over-encryption-as-it-fines-council-120k-over-second-data-protection-breach/
- Raywood D. Lost USB stick contained details of more than 1,000 school children. SC Magazine UK [Internet]; 2012. Available from: http://www.scmagazineuk.com/lost-usb-stick-contained-details-of-more-than-1000-school-children/article/226867/
- Narisi S. Lost USB drive leads to breach of 6,000 patient records; 2013. Available from: http://www.healthcarebusinesstech.com/data-breach-lost-usb-drive/
- Binker M. Medicaid contractor loses provider’s personal information; 2013. Available from: http://www.wral.com/medicaid-contractor-loses-provider-s-personal-information/12201020/#1cJcqJdmGPo2JwS2.99/
- Raywood D. Care provider rapped by UK and Isle of Man data commissioners over lost memory stick; 2012. Available from: http://www.scmagazineuk.com/care-provider-rapped-by-uk-and-isle-of-man-data-commissioners-over-lost-memory-stick/article/223769/
- BBC News. Greater Manchester Police fined over stolen data stick; 2012. Available from: http://www.bbc.com/news/uk-england-manchester-19960966/
- Leyden J. ‘Spend police USB stick data loss mega-fine on IT lessons for cops’: tough on data leaks, tough on the causes of data leaks; 2012. Available from: http://www.theregister.co.uk/2012/11/15/invest_data_breach_fine_gmp_security_training/
- Daily Star Sunday. Manchester Police dump terror secrets in the street; 2010 Sep 5. Available from: http://www.dailystar.co.uk/news/latest-news/152395/Manchester-Police-dump-terror-secrets-in-the-street/
- Sansurooah K. A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011. In: 10th Australian Information Security Management Conference. Perth: Edith Cowan University; 2012. p. 83–91.
- AccessData. FTK imager; 2014.
- Fleischmann Software Technology. WinHex 18.4; 2015.
- Richard GG. Scalpel; 2014.
- SleuthKit. Autopsy; 2015.
- Szewczyk P, Robins N, Sansurooah K. Sellers continue to give away confidential information on second hand memory cards sold in Australia. 11th Australian Digital Forensics Conference; 2013 Dec 2–4; Perth: Edith Cowan University, Security Research Institute.
- Bruer W. FBI sees Chinese involvement amid sharp rise in economic espionage cases; 2015. Available from: http://edition.cnn.com/2015/07/24/politics/fbi-economic-espionage/
- Gutmann P. Secure deletion of data from magnetic and solid-state memory. 6th USENIX Security Symposium Proceedings; 1996 Jul 22–25; San Jose (CA). p. 77–89.
- Wei M, Grupp M, Spada F, et al. Reliably erasing data from flash-based solid state drives; 2011. Available from: https://www.usenix.org/legacy/events/fast11/tech/full_papers/Wei.pdf
- Speedie A. How to choose a secure data destruction method; 2009. Available from: www.secure-data-destruction.eu/publications/How-to-Choose-a-Secure-Data-Destruction-Method.pdf
- NAVSO P-5239-26. Navy remanence regulation, U1993. Available from: http://fas.org/irp/doddir/navy/5239_26.htm
- Air Force System Security Instruction 5020. Remanence security; 1996. Available from: http://cryptome.org/afssi5020.htm
- DOD 5220.22-M. U.S. National Industrial Security Program Operating Manual (DoD 5220.22-M). United States Department of Defense National Industrial Security Program; 2006. Available from: http://www.dss.mil/documents/odaa/nispom2006-5220.pdf
- Communication Establishment Canada. Clearing and declassifying electronic data storage devices ITSG-062006. Available from: https://www.cse-cst.gc.ca/en/publication/itsg-06
- NSA. NSA/CSS storage device declassification manual; 2000. Available from: https://www.nsa.gov/ia/_files/government/MDG/NSA_CSS_Storage_Device_Declassification_Manual.pdf
- Kissel R, Regenscheid A, Scholl M, et al. SP800-88 guidelines for media sanitization; 2006. Available from: http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_with-errata.pdf
- Government Communications Security Bureau. New Zealand information security manual (NZISM); 2008. Available from: http://www.gcsb.govt.nz/publications/the-nz-information-security-manual
- Sansurooah K. A forensics framework and method in the acquisition and extraction of data from NAND Flash memory storage chip. Joondalup, WA: Edith Cowan University; 2015.
- Ernest & Young. Data loss prevention. Keeping your sensitive information out of the public domain; 2011. Available from: http://www.ey.com/Publication/vwLUAssets/EY_Data_Loss_Prevention/$FILE/EY_Data_Loss_Prevention.pdf
- Valli C, Woodward A. The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues. 6th Australian Digital Forensics Conference; 2008; Perth: Edith Cowan University.