I had someone from NSA tell me how they removed secret classified data
(data classified higher than that was degaused) and I had a forensics guy
tell me the most secure way to delete data from a drive, while still being
able to use it. He said, using the method I used in my program, that some
data bits would be recoverable, however, no full bytes, and he is
currently testing it now. Please feel free to test my program, use it
however you want, and please give me feedback on whether it worked at all
for you, what you did with it, etc... I would be very interested to get
the opinion from as many people as possible
Post by j***@hcpnet.orgI had the very same problem, and if you would like to reuse the hard
drive, or sell it, and not destroy it, you can try out this program I
wrote, that will COMPLETELY erase the data on the drive. It polarizes the
disk which causes all the bits to be zero'd then one'd (0x00 then 0xff)
then writes a random character to the disk (in the case of my program,
0xf6) and this will erase all data securely. In fact, this is how the
United States government removes Secret classified data from hard drives,
I just wrote a free program, licensed under BSD, to do it.
With all due respect, that is most certainly not how the US government
removes secret classified data from magnetic media. First, let me forward
you to a link from this mailing list we had last year discussing the
topic:
http://www.sigmasoft.com/cgi-bin/wilma_hiliter/openbsd-misc/200211/msg01399.html
I'll reiterate from my previous posting that modern hard drive write
heads are unable to put the magnetic media back in a median state,
therefore software methods of removing data are less than foolproof. An
audit of the DoD by the Inspector General found that it was indeed
possible to recover sensitive data from drives that had been certified as
being wiped. That's why in all cases the current operating procedure of
the DoD is to destroy all hard drives from all systems, regardless of the
classification of the data on them.
And to reinforce that, take a look at this letter sent out in 2001 by
Deputy Secretary of Defense Rudy de Leon about the ability to recover
sensitive data off of magnetic media believed to be "sanitized."
http://www.c3i.osd.mil/org/cio/doc/computerdisposal.doc
Granted, as it has already been mentioned by others, it begs the question
of how important the information is you're trying to get rid of, who might
want the information, and how far they are willing to go to get it?
Have you tried your program against any of the available free and
commercial forensics programs out there to verify your claims? The
software that was previously considered acceptable by DoD standards used
the same scheme as you claim.
Regards,
--
Joseph