> Who's to say the recycling company doesn't read'em first? Or a
> corporate spy assigned to work at a recycling center?

Well.. yah obviously!! Which is why if one is so concerned one should
accompany their equipment to the destruction site and oversee the process.

Sounds a bit silly to be worried about spies armed with
MFM/STM/*[F|T|I|P]M equipment while completely ignoring common sense!

> And I'd think formatted drives sent to the NSA for meltdown would prolly
> make a pretty good training media for those at NSA learning to read data
> from erased/over-written disks.

Perhaps..  can you even take a guess at how long it would take to recover
even 1Mbs of meaningful data that had been overwritten?

Not that there aren't organizations that should be worried about this
threat, however, it is important to be somewhat realistic as to who your
potential adversaries are.

> Sanding the platters is a POSITIVE way to forever destroy the data and it's
> one that most folks can do.

Perhaps.. ;-)

> Third party forges/furnaces are like accepting candy and rides from
> strangers.

As I said before -- sounds a bit silly to be worried about spies armed
with MFM/STM/*[F|T|I|P]M equipment while completely ignoring common sense!

I agree ten fold!

> Army Regulation (AR) 380-19 Appendix E  4.5.2 Destruction of Removable Hard
> Disks and Disk Packs states that sanding the platters is one of the
> recommended ways to declassify a Top Secret hard drive.

I'm not arguing against sanding down platters, but simply denting it with
a sledgehammer is hardly proper procedure. Occasionally platters from
drives located within aircraft 'black boxes' are dented..  that doesn't
*always* prevent investigation of the data.

> D. Weiss
> CCNA/MCSE/SSP2

john.

Reply via email to