And another one…

 

http://www.franklinmiller.com/electronics-shredding.htm

 

In 1994 I worked at an IBM facility that hosted the data center for Equifax.  Once a month they had a truck that would pull into the loading dock and they would bring out carts of old tape cartridges.  They would fire up what was essentially a giant wood chipper in the back of the truck and throw the tape cartridges in it one at a time.  It would grind them up and spit them into the of the truck.  When they closed the back door, it simply looked like any other 18-wheeler on the road.  Very cool to watch.

 

From: kclug-bounces@kclug.org [mailto:kclug-bounces@kclug.org] On Behalf Of Kelsay, Brian - Kansas City, MO
Sent: Tuesday, September 30, 2008 12:27 PM
To: KCLUG
Subject: RE: Shredder?

 

There are industrial shredders that WILL shred anything.  There is a company, that frequently shows up on Discovery channel, that makes all sizes of industrial shredders.   They go as big as one that shreds cars down to shredding trash which includes 2x4s and cans.

 

http://www.ssiworld.com/watch/watch-en.htm

http://www.ssiworld.com/watch/hard_drives.htm

 

Brian Kelsay


From: kclug-bounces@kclug.org [mailto:kclug-bounces@kclug.org] On Behalf Of Sean Crago
Sent: Tuesday, September 30, 2008 12:18 PM
To: KCLUG
Subject: Shredder?

>I can't figure out why the government just doesn't remove the hard drives
>and send them to a shredder.  Even a private individual can achieve roughly
>the same level of security with a drill and a 1/2" drill bit. With the price
>of drives being what they are now it can't impact very much the resale value
>of the computer to sell it without a drive installed.

Shredders don't like metal, but there are things that'll make quick work of a drive:
http://www.networkworld.com/news/2006/062706-guard-dog.html

The Air Force seemed to think a 1-2 punch was in order, according to Cryptome: "2.5. Destruction. It is a good practice to sanitize media before submitting it for destruction. Media may generally be destroyed by one of the following methods (see Table 2.1). (NOTE: Although approved methods, options d and e use acid, which is dangerous and excessive, to remove recording surfaces. Options a, b, and c are recommended over d and e.) "
http://cryptome.quintessenz.at/mirror/afssi5020.htm

-Sean