{"id":326,"date":"2015-02-17T13:13:11","date_gmt":"2015-02-17T12:13:11","guid":{"rendered":"http:\/\/test.radical-openness.org\/2015\/?p=326"},"modified":"2015-02-17T13:13:11","modified_gmt":"2015-02-17T12:13:11","slug":"digital-photocopiers-loaded-with-secrets","status":"publish","type":"post","link":"https:\/\/research.radical-openness.org\/2015\/digital-photocopiers-loaded-with-secrets\/","title":{"rendered":"Digital Photocopiers Loaded With Secrets"},"content":{"rendered":"<p>At a warehouse in New Jersey, 6,000 used copy machines sit ready to be sold. <b>CBS News chief investigative correspondent Armen Keteyian<\/b> reports almost every one of them holds a secret.<\/p>\n<p>Nearly every digital copier built since 2002 contains a hard drive &#8211; like the one on your personal computer &#8211; storing an image of every document copied, scanned, or emailed by the machine.<\/p>\n<p>In the process, it&#8217;s turned an office staple into a digital time-bomb packed with highly-personal or sensitive data.<\/p>\n<p>If you&#8217;re in the identity theft business it seems this would be a pot of gold.<\/p>\n<p>&#8220;The type of information we see on these machines with the social security numbers, birth certificates, bank records, income tax forms,&#8221; John Juntunen said, &#8220;that information would be very valuable.&#8221;<\/p>\n<p><a href=\"http:\/\/www.cbsnews.com\/news\/digital-photocopiers-loaded-with-secrets\/\" target=\"_blank\">http:\/\/www.cbsnews.com\/news\/digital-photocopiers-loaded-with-secrets\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At a warehouse in New Jersey, 6,000 used copy machines sit ready to be sold. CBS News chief investigative correspondent Armen Keteyian reports almost every one of them holds a secret. Nearly every digital copier built since 2002 contains a hard drive &#8211; like the one on your personal computer &#8211; storing an image of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[3],"tags":[7,36,35],"class_list":["post-326","post","type-post","status-publish","format-standard","hentry","category-behind-the-smart-world","tag-article","tag-data-leak","tag-photocopier"],"_links":{"self":[{"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/posts\/326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/comments?post=326"}],"version-history":[{"count":2,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/posts\/326\/revisions"}],"predecessor-version":[{"id":328,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/posts\/326\/revisions\/328"}],"wp:attachment":[{"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/media?parent=326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/categories?post=326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/research.radical-openness.org\/2015\/wp-json\/wp\/v2\/tags?post=326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}