Knowledge

Redaction

Source đź“ť

167:. Word processing formats may save a revision history of the edited text that still contains the redacted text. In some file formats, unused portions of memory are saved that may still contain fragments of previous versions of the text. Where text is redacted, in Portable Document (PDF) or word processor formats, by overlaying graphical elements (usually black rectangles) over text, the original text remains in the file and can be uncovered by simply deleting the overlaying graphics. Effective redaction of electronic documents requires the removal of all relevant text and image data from the document file. This process, internally complex, can be carried out very easily by a user with the aid of "redaction" functions in software for editing PDF or other files. 357:
underneath the visible appearance and is subject to searching and even simple copy and paste extraction. Proper redaction tools and procedures must be used to permanently remove the sensitive information. This is often accomplished in a multi-user workflow where one group of people mark sections of the document as proposals to be redacted, another group verifies the redaction proposals are correct, and a final group operates the redaction tool to permanently remove the proposed items.
187: 1164: 105: 216:, which was declassified and released to the public in July 2003. Classified information has been blocked out so that only the unclassified information is visible. Notations with leader lines at top and bottom cite statutory authority for not declassifying certain sections. Click on the image to enlarge. 324:, an Italian secret agent, at a US military checkpoint in Iraq. The published version of the report was in PDF format, and had been incorrectly redacted by covering sensitive parts with opaque blocks in software. Shortly thereafter, readers discovered that the blocked-out portions could be retrieved by 356:
The two most common mistakes for incorrectly redacting a document are adding an image layer over the sensitive text to obscure it, without removing the underlying text, and setting the background color to match the text color. In both of these cases, the redacted material still exists in the document
148:
This is a simple process with only minor security risks. For example, if the black pen or tape is not wide enough, careful examination of the resulting photocopy may still reveal partial information about the text, such as the difference between short and tall letters. The exact length of the removed
312:
will sometimes be used to edit out the sensitive information. These products do not always show the user all of the information stored in a file, so it is possible that a file may still contain sensitive information. In other cases, inexperienced users use ineffective methods which fail to sanitize
149:
text also remains recognizable, which may help in guessing plausible wordings for shorter redacted sections. Where computer-generated proportional fonts were used, even more information can leak out of the redacted section in the form of the exact position of nearby visible characters.
170:
Redaction may administratively require marking of the redacted area with the reason that the content is being restricted. US government documents released under the Freedom of Information Act are marked with exemption codes that denote the reason why the content has been withheld.
225:
personnel. The printed document will consequently be sanitized to obscure or remove the sensitive information. Maps have also been redacted for the same reason, with highly sensitive areas covered with a slip of white paper.
91:
In the context of government documents, redaction (also called sanitization) generally refers more specifically to the process of removing sensitive or classified information from a document prior to its publication, during
1063: 220:
Printed documents which contain classified or sensitive information frequently contain a great deal of information which is less sensitive. There may be a need to release the less sensitive portions to
237:, that is removed before the reports are distributed outside the intelligence agency: the initial report may be classified as Top Secret while the sanitized report may be classified as Secret. 48:
from a document so that it may be distributed to a broader audience. It is intended to allow the selective disclosure of information. Typically, the result is a document that is suitable for
273:
Computer (electronic or digital) documents are more difficult to sanitize. In many cases, when information in an information system is modified or erased, some or all of the data remains in
125: 339:
regarding their cooperation with domestic wiretapping by the NSA. Text on pages 12 to 14 of the PDF document were incorrectly redacted, and the covered text could be retrieved.
229:
In some cases, sanitizing a classified document removes enough information to reduce the classification from a higher level to a lower one. For example, raw
507: 137:
Redacting confidential material from a paper document before its public release involves overwriting portions of text with a wide black pen, followed by
1183: 130: 1058: 898: 456: 141:
the result—the obscured text may be recoverable from the original. Alternatively opaque "cover up tape" or "redaction tape", opaque, removable
1146: 492: 63:, redaction attempts to reduce the document's classification level, possibly yielding an unclassified document. When the intent is 255:
report, paper documents are usually sanitized by covering the classified and sensitive portions before photocopying the document.
575: 1096: 381: 716: 1046: 883: 733: 248:(right), the report may be sanitized to remove all sensitive data, so that the report may be released to the general public. 405: 622: 342:
At the end of 2005, the NSA released a report giving recommendations on how to safely sanitize a Microsoft Word document.
650: 290: 786: 511: 201: 353:
gives an example of a sanitization failure caused by unexpected behavior in Microsoft Word's change tracking feature.
908: 674: 533: 1208: 285:, etc.) still allows information to be read, despite its nominal erasure. The general term for this problem is 1218: 1167: 1151: 195: 1053: 1116: 706: 293:, and related organizations), "sanitization" typically refers to countering the data remanence problem. 1089: 31: 985: 920: 781: 297: 560: 467: 1193: 791: 615: 406:
Redaction Toolkit, Guidelines for the Editing of Exempt Information from Documents Prior to Release
175: 158:
Redaction Toolkit, Guidelines for the Editing of Exempt Information from Documents Prior to Release
17: 160:, "to provide guidance on the editing of exempt material from information held by public bodies." 142: 45: 1213: 980: 956: 878: 527:"Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word to PDF" 191: 153: 60: 317:
are designed to effectively sanitize documents by removing potentially sensitive information.
1082: 1041: 776: 728: 711: 547: 314: 230: 1015: 1005: 1000: 961: 946: 818: 691: 662: 532:. Report# I333-015R-2005. Information Assurance Directorate, National Security Agency, via 386: 325: 282: 241: 209: 52:
or for dissemination to others rather than the intended audience of the original document.
417: 8: 951: 669: 608: 584: 346: 178:(NSA) published a guidance document which provides instructions for redacting PDF files. 995: 973: 723: 349:
systems, in which computer users of differing security clearances may share documents.
222: 68: 588: 442: 913: 848: 833: 796: 701: 686: 526: 486: 1010: 681: 274: 93: 941: 888: 863: 853: 838: 771: 761: 657: 645: 321: 205: 113: 1141: 1126: 376: 309: 286: 264: 80: 1202: 1136: 1131: 1121: 1025: 696: 277:. This may be an accident of design, where the underlying storage mechanism ( 164: 109: 76: 199: 1105: 903: 858: 756: 751: 371: 278: 268: 124: 968: 893: 843: 813: 806: 766: 336: 138: 75:
was applied to printed documents; it has since been extended to apply to
49: 990: 925: 868: 631: 366: 186: 823: 801: 234: 233:
may contain highly classified information such as the identities of
27:
Removing sensitive information from a document to allow distribution
104: 1020: 828: 332: 331:
On May 24, 2006, lawyers for the communications service provider
194:
that has been sanitized for public release. This is page 13 of a
64: 56: 128:
A heavily redacted page from a 2004 lawsuit filed by the ACLU —
1074: 320:
In May 2005 the US military published a report on the death of
305: 873: 600: 427:. National Security Agency Information Assurance Directorate. 345:
Issues such as these make it difficult to reliably implement
418:"Redaction of PDF Files Using Adobe Acrobat Professional X" 301: 308:, or the like. For example, word processing programs like 438: 145:
in various widths, may be applied before photocopying.
99: 1188:from Vol. 58 No. 2, May 2019, Technology column of 1200: 505: 240:In other cases, such as the NSA report on the 1090: 616: 508:"AT&T leaks sensitive info in NSA suit" 296:However, the retention may be a deliberate 258: 1163: 1097: 1083: 623: 609: 573: 437: 163:Secure redacting is more complicated with 131:American Civil Liberties Union v. Ashcroft 524: 289:. In some contexts (notably the US NSA, 185: 123: 103: 304:buffer, revision history, "trash can", 14: 1201: 491:: CS1 maint: archived copy as title ( 382:Freedom of information laws by country 1078: 604: 86: 577:The Challenge of Multilevel Security 351:The Challenge of Multilevel Security 100:Secure document redaction techniques 24: 587:Federal Conference. Archived from 443:"Readers 'declassify' US document" 25: 1230: 1177: 534:Federation of American Scientists 506:Declan McCullagh (May 26, 2006). 181: 1162: 1104: 1185:Embarrassing Redaction Failures 630: 567: 525:NSA SNAC (December 13, 2005). 518: 499: 449: 431: 410: 398: 13: 1: 1168:List of data-erasing software 1152:Physical information security 392: 196:U.S. National Security Agency 425:Security Configuration Guide 328:them into a word processor. 7: 510:. CNet News. Archived from 360: 44:is the process of removing 10: 1235: 262: 59:, such as in dealing with 32:Redaction (disambiguation) 29: 1160: 1112: 1034: 934: 744: 638: 1194:American Bar Association 792:Content-control software 259:Computer media and files 176:National Security Agency 1117:Anti–computer forensics 1047:Chinese issues overseas 71:. Originally, the term 1209:Classified information 1021:Suppression of dissent 555:Cite journal requires 441:Report (May 2, 2005). 315:Metadata removal tools 251:As is seen in the USS 217: 156:published a document, 134: 121: 61:classified information 787:Conspiracy of silence 777:Collateral censorship 702:Speech and expression 189: 127: 107: 67:, it is often called 46:sensitive information 1219:Classified documents 1064:Muhammad controversy 1001:Naturalistic fallacy 909:computer and network 300:, in the form of an 231:intelligence reports 154:UK National Archives 30:For other uses, see 1190:The Judges' Journal 1059:Internet censorship 574:Rick Smith (2003). 464:www.politechbot.com 347:multilevel security 326:copying and pasting 192:classified document 79:and the problem of 55:When the intent is 996:Moralistic fallacy 734:banned video games 717:banned televisions 218: 204:2004-03-13 at the 135: 122: 87:Government secrecy 69:data anonymization 65:privacy protection 57:secrecy protection 1192:published by the 1174: 1173: 1072: 1071: 1054:Freedom of speech 899:Strategic lawsuit 849:National intranet 797:Damnatio memoriae 514:on July 17, 2012. 120:prior to release. 16:(Redirected from 1226: 1166: 1165: 1099: 1092: 1085: 1076: 1075: 1011:Propaganda model 639:Media regulation 625: 618: 611: 602: 601: 596: 595: 593: 582: 571: 565: 564: 558: 553: 551: 543: 541: 540: 531: 522: 516: 515: 503: 497: 496: 490: 482: 480: 478: 472: 466:. Archived from 461: 453: 447: 446: 435: 429: 428: 422: 414: 408: 402: 94:declassification 21: 1234: 1233: 1229: 1228: 1227: 1225: 1224: 1223: 1199: 1198: 1180: 1175: 1170: 1156: 1108: 1103: 1073: 1068: 1030: 930: 889:Self-censorship 864:Prior restraint 854:Newspaper theft 839:Internet police 772:Chilling effect 762:Broadcast delay 740: 634: 629: 599: 591: 580: 572: 568: 556: 554: 545: 544: 538: 536: 529: 523: 519: 504: 500: 484: 483: 476: 474: 470: 459: 457:"Archived copy" 455: 454: 450: 436: 432: 420: 416: 415: 411: 403: 399: 395: 363: 322:Nicola Calipari 271: 261: 206:Wayback Machine 184: 114:Project MKUltra 102: 89: 35: 28: 23: 22: 15: 12: 11: 5: 1232: 1222: 1221: 1216: 1211: 1197: 1196: 1179: 1178:External links 1176: 1172: 1171: 1161: 1158: 1157: 1155: 1154: 1149: 1144: 1142:Gutmann method 1139: 1134: 1129: 1127:Data remanence 1124: 1119: 1113: 1110: 1109: 1102: 1101: 1094: 1087: 1079: 1070: 1069: 1067: 1066: 1061: 1056: 1051: 1050: 1049: 1038: 1036: 1032: 1031: 1029: 1028: 1023: 1018: 1013: 1008: 1003: 998: 993: 988: 983: 978: 977: 976: 966: 965: 964: 959: 954: 944: 938: 936: 932: 931: 929: 928: 926:Word filtering 923: 918: 917: 916: 911: 901: 896: 891: 886: 881: 876: 871: 866: 861: 856: 851: 846: 841: 836: 834:Heckler's veto 831: 826: 821: 816: 811: 810: 809: 799: 794: 789: 784: 779: 774: 769: 764: 759: 754: 748: 746: 742: 741: 739: 738: 737: 736: 726: 721: 720: 719: 709: 704: 699: 694: 689: 684: 679: 678: 677: 667: 666: 665: 655: 654: 653: 642: 640: 636: 635: 628: 627: 620: 613: 605: 598: 597: 594:on 2009-01-06. 566: 557:|journal= 517: 498: 473:on 2 July 2006 448: 430: 409: 396: 394: 391: 390: 389: 384: 379: 377:Data remanence 374: 369: 362: 359: 313:the document. 310:Microsoft Word 287:data remanence 265:Data remanence 260: 257: 183: 182:Printed matter 180: 165:computer files 116:that has been 101: 98: 88: 85: 81:data remanence 77:computer files 26: 9: 6: 4: 3: 2: 1231: 1220: 1217: 1215: 1214:Data security 1212: 1210: 1207: 1206: 1204: 1195: 1191: 1187: 1186: 1182: 1181: 1169: 1159: 1153: 1150: 1148: 1147:DoD 5220.22-M 1145: 1143: 1140: 1138: 1137:File deletion 1135: 1133: 1132:Factory reset 1130: 1128: 1125: 1123: 1122:Data recovery 1120: 1118: 1115: 1114: 1111: 1107: 1100: 1095: 1093: 1088: 1086: 1081: 1080: 1077: 1065: 1062: 1060: 1057: 1055: 1052: 1048: 1045: 1044: 1043: 1040: 1039: 1037: 1033: 1027: 1026:Systemic bias 1024: 1022: 1019: 1017: 1014: 1012: 1009: 1007: 1004: 1002: 999: 997: 994: 992: 989: 987: 984: 982: 979: 975: 972: 971: 970: 967: 963: 960: 958: 955: 953: 950: 949: 948: 945: 943: 940: 939: 937: 933: 927: 924: 922: 919: 915: 912: 910: 907: 906: 905: 902: 900: 897: 895: 892: 890: 887: 885: 882: 880: 877: 875: 872: 870: 867: 865: 862: 860: 857: 855: 852: 850: 847: 845: 842: 840: 837: 835: 832: 830: 827: 825: 822: 820: 817: 815: 812: 808: 805: 804: 803: 800: 798: 795: 793: 790: 788: 785: 783: 780: 778: 775: 773: 770: 768: 765: 763: 760: 758: 755: 753: 750: 749: 747: 743: 735: 732: 731: 730: 727: 725: 722: 718: 715: 714: 713: 710: 708: 707:Student media 705: 703: 700: 698: 695: 693: 690: 688: 685: 683: 680: 676: 675:circumvention 673: 672: 671: 668: 664: 661: 660: 659: 656: 652: 649: 648: 647: 644: 643: 641: 637: 633: 626: 621: 619: 614: 612: 607: 606: 603: 590: 586: 579: 578: 570: 562: 549: 535: 528: 521: 513: 509: 502: 494: 488: 469: 465: 458: 452: 444: 440: 434: 426: 419: 413: 407: 401: 397: 388: 385: 383: 380: 378: 375: 373: 370: 368: 365: 364: 358: 354: 352: 348: 343: 340: 338: 334: 329: 327: 323: 318: 316: 311: 307: 303: 299: 294: 292: 288: 284: 280: 276: 270: 266: 256: 254: 249: 247: 245: 238: 236: 232: 227: 224: 215: 213: 207: 203: 200: 197: 193: 188: 179: 177: 172: 168: 166: 161: 159: 155: 150: 146: 144: 143:adhesive tape 140: 133: 132: 126: 119: 115: 111: 110:US government 106: 97: 95: 84: 82: 78: 74: 70: 66: 62: 58: 53: 51: 47: 43: 39: 33: 19: 1189: 1184: 1106:Data erasure 921:Whitewashing 904:Surveillance 884:Sanitization 859:Pixelization 757:Book burning 663:banned films 651:books banned 589:the original 576: 569: 548:cite journal 537:. Retrieved 520: 512:the original 501: 475:. Retrieved 468:the original 463: 451: 433: 424: 412: 400: 372:Data erasure 355: 350: 344: 341: 330: 319: 295: 272: 269:Data erasure 252: 250: 243: 239: 228: 219: 211: 190:A page of a 173: 169: 162: 157: 151: 147: 139:photocopying 136: 129: 117: 112:document on 90: 73:sanitization 72: 54: 42:sanitization 41: 37: 36: 986:LGBT issues 981:Ideological 969:Hate speech 894:Speech code 879:Revisionism 844:Memory hole 814:Expurgation 807:Minced oath 767:Censor bars 729:Video games 712:Televisions 337:legal brief 50:publication 1203:Categories 1042:Censorship 1035:By country 991:Media bias 869:Propaganda 632:Censorship 539:2006-05-29 477:14 January 393:References 367:Censorship 263:See also: 1016:Religious 947:Corporate 824:Gag order 802:Euphemism 782:Concision 585:Black Hat 223:uncleared 38:Redaction 1006:Politics 957:Facebook 942:Criminal 935:Contexts 829:Heckling 752:Bleeping 670:Internet 487:cite web 361:See also 335:filed a 333:AT&T 246:incident 214:incident 202:Archived 118:redacted 18:Redacted 819:Fogging 745:Methods 724:Thought 306:backups 298:feature 275:storage 253:Liberty 244:Liberty 212:Liberty 208:on the 198:report 174:The US 108:A 1953 974:Online 962:Google 687:Postal 445:. BBC. 387:Lacuna 952:Apple 874:Purge 697:Radio 692:Press 682:Music 658:Films 646:Books 592:(PDF) 581:(PDF) 530:(PDF) 471:(PDF) 460:(PDF) 421:(PDF) 235:spies 914:mass 561:help 493:link 479:2022 302:undo 279:disk 267:and 242:USS 210:USS 152:The 439:BBC 291:DoD 283:RAM 40:or 1205:: 583:. 552:: 550:}} 546:{{ 489:}} 485:{{ 462:. 423:. 281:, 96:. 83:. 1098:e 1091:t 1084:v 624:e 617:t 610:v 563:) 559:( 542:. 495:) 481:. 404:' 34:. 20:)

Index

Redacted
Redaction (disambiguation)
sensitive information
publication
secrecy protection
classified information
privacy protection
data anonymization
computer files
data remanence
declassification

US government
Project MKUltra

American Civil Liberties Union v. Ashcroft
photocopying
adhesive tape
UK National Archives
computer files
National Security Agency

classified document
U.S. National Security Agency

Archived
Wayback Machine
USS Liberty incident
uncleared
intelligence reports

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑