Contact Us




Change Locale

PDF Gone Wrong (and How to Make it Right)

Uncategorized | Posted on August 28, 2018 by schap

News broke recently that federal prosecutors brought a new indictment against former Trump campaign manager Paul Manafort and his associate Richard Gates. This indictment contains new evidence that Manafort and Gates allegedly hid millions of dollars in overseas income from U.S. authorities and committed numerous counts of tax and bank fraud.

What is interesting is that Manafort’s downfall is connected to PDF technology, and specifically, his inability to convert a PDF file to Wordedit it, and then re-create it as a PDF document.

According to specific details from the indictment, “Manafort emailed Gates a PDF version of a real profit and loss statement, one that showed a loss of more than $600,000. Gates converted that PDF file into a Word document, which Manafort then edited by adding more than $3.5 million in income.” The indictment also alleges that Manafort then asked Gates to convert this new Word document back into PDF format, which he did.

This back-and-forth communication created an electronic trail and made it easy for prosecutors to see exactly who changed which documents and when.

The technology edge in preventing bad behavior

This case is another example of how technology helped thwart criminal behavior or make the case against individuals after the fact. Yet it really should be a cautionary tale for companies today, one that highlights the need to have the right technological safeguards in place to prevent these types of scenarios from happening in the first place.

We’ve written about other high-profile examples before and attempted to describe how the right solutions could have stopped them. For example, we took a closer look at the potential HIPAA violation related to an NFL player’s injury and how printers identified the culprit in a classified information leak. We even examined the Snowden case and used it to highlight many security vulnerabilities most companies have today, and what can be done to overcome them.

One solution: PDF controls

This case is really no different, especially when you consider the fact that PDF software offers many powerful tools to secure every part of a document. When used correctly, these PDF tools can ensure that:

  • Recipients of a PDF file can trust that it is authentic – and has not been doctored or tampered with
  • Recipients are given the appropriate permission levels to change the PDF file
  • Recipients can also be restricted from changing or editing the file
  • The history of edits, and who made them, can be seen via an audit trail
  • Confidential information within a PDF file is protected

Today, powerful PDF software can increase security in the following ways:

  • Remove confidential information with redaction tools
  • Encrypt documents using password, certificate and server-based rights management)
  • Provide editing restrictions
  • Offer powerful encryption to control access to content, markup and even metadata
  • Make use of digital signatures for audit trails as well as eliminating the need for paper documents

Unfortunately, the world will probably always have those types of people willing to bend the rules to turn a profit or (attempt to) stay a step ahead of the authorities. Yet if their companies do all they can to prevent illicit activities – for example, with powerful PDF software – they can make it a little more challenging for them to succeed.

This article was originally published here.


Related Articles

“A people without knowledge of their past history, origin and culture is like a tree without roots.” – Marcus Garvey

Culture | April 9, 2019 by Kelly Breedon

Softchoice is very proud to have been named to the Great Place to Work Institute’s first ever list of Best Workplaces for Giving Back. This list recognizes organizations with a strong employee commitment to giving back, and a robust range of programs that support positive change in their communities. Taking care and giving back are […]

When we talk about Digital Transformation, three key topics always come to the fore: optimizing IT investments, enabling end users, and IT agility. On a granular level, these three factors form an axis of issues companies must deal with when making the digital leap. At our recent roundtable dinner in Boston, we sat down with […]