On Thu, Jan 03, 2008 at 04:08:08PM -0800, Marco S Hyman wrote:
 
> As for disk destruction... I don't know nor pretend to know what can
> and can not be recovered.  Take a look at 
> 
> https://www.dss.mil/portal/ShowBinary/BEA%20Repository/new_dss_internet/isp/odaa/documents/clear_n_san_matrix_06282007_rev_11122007.pdf
> 
> The DSS (Defense Security Service, part of the DoD) calls what you have
> done "clearing" the disk.   It does not "sanitize" the disk.  To sanitize
> you need to either degauss or destroy the disk.
> 

The NIST article that (I think) started this thread says that it (the
document) applies to commercial-grade privacy but not to
government-grade classified material.  In other words, there's an
implied difference between the ability of a commercial data recovery
company and a major government.  

So, you have to look at who your adversary is and the value of the data.
If the value is less than the drive, then clear the disk and sell it.
If you are keeping the disk in-house but just re-allocating it, then
clear the disk and re-use it.  However, if the agency you wish to not be
able to read the disk has the backing of a major government:

1:      distroy the disk
2:      distroy the computer (the document actually says this re RAM
                chips)
3:      re-evaluate the whole concept of using a computer at all,
        expecially if the hardware is at risk of being "stolen" (seized,
        confiscated, etc).

If the data on the drive has always been in encrypted form, then you
have to evaluate the strength of the encryption vs. the strength of the
adversary.  

JM2c

Doug.

Reply via email to