This function is available in our F-series, the military-grade solution. This is to ensure that the data in NAND flash is permanently destroyed and unrecoverable within 2 seconds by transmitting high voltage to trigger the physical destruction of each NAND flash IC.
For military applications, data security is critical to safeguarding military secrets and even the outcome of wars, especially in modern warfare. On one hand, countries are striving to develop more advanced, sophisticated, and secure electronic systems, while on the other hand, they are making every effort to decipher the electronic systems of their adversaries. As for hard drives, they serve as data carriers and are crucial for preventing decryption through various encryption methods. Data destruction and the rapid deletion or destruction of data in various emergency scenarios have also become focal points of application.
There is news that the U.S. Defense Advanced Research Projects Agency (DARPA) has signed a $3.5 million contract with IBM, requesting IBM to develop a set of “computers, sensors, and other devices network that can automatically disappear according to instructions.” When a commander sits comfortably in a command post and presses a button, all devices, including phones and computers, within this controllable network turn into ashes.
From a technical perspective, this is clearly not science fiction, as various unusual demands and functions that have already been realized make this seem far from outdated.
Types of Data Destruction Methods #
In general, data destruction can be categorized into two main types:
- Logical Destruction: This type of destruction focuses on erasing data without physically damaging the storage chip. After logical data destruction on an SSD, the drive can still be used, and data can be written on it again, either manually or through mass production tools.
- Logical destruction can be further divided into several categories:
- Quick Deletion: This method involves rapidly deleting data with the press of a physical button, typically within a few seconds.
- Data Overwriting and Padding: This approach involves overwriting data with new information or filling the storage space with random data. Depending on the capacity, this process can take several hours. These data destruction methods can be implemented using software, but hardware solutions are also available.
- It’s important to note that quick deletion usually doesn’t completely remove data, so there is some inherent risk. However, in urgent or time-sensitive situations, quick deletion serves a vital purpose.
- Logical destruction can be further divided into several categories:
- Physical Destruction: This method involves directly damaging the storage chip, rendering it physically irreparable.
- Physical destruction methods commonly include:
- Hammering or Crushing: The chip is physically crushed or smashed with heavy tools.
- Strong Acid Dissolution: Submerging the chip in a strong acid solution to dissolve it.
- Explosive Destruction: Using explosives to destroy the chip.
- High Voltage Breakdown: Applying high voltage to the chip to cause it to break down.
- Physical destruction methods commonly include:
Each of these methods ensures that the data cannot be recovered and eliminates any possibility of repairing the storage medium.
The Means of Data Destruction #
Generally, whether it’s logical or physical destruction, both can be executed using a specified pin, with the definition of this pin being standardized between the host and the SSD device. This pin can be activated via a button press.
Activating destruction through a button press requires implementing safeguards against accidental triggering. Typically, there is a delay of a few seconds before the destruction function is initiated.
Physical destruction through high-voltage means is significantly more challenging compared to logical destruction. Ensuring that every flash memory chip is completely destroyed poses difficulties. In theory, it’s possible to destroy each chip one by one through various methods, but in practice, it often takes a long time to destroy a single chip. Additionally, once a chip is destroyed, it doesn’t automatically move on to the next chip for destruction, and there can be issues such as a chip being resistant to destruction.
Data Destruction Standards #
Data destruction standards vary from one country to another, and each nation may have its own specific requirements and approaches. These standards are often influenced by the level of sensitivity and security concerns associated with the data being handled. Here are some examples of variations in data destruction standards:
- Number of Overwrites: Some countries may require data to be overwritten a specific number of times before it is considered securely destroyed. For instance, one country might mandate seven overwrites, while another might require only four.
- Encryption Key Deletion: In some cases, securely deleting encryption keys may be considered sufficient for data destruction. This approach is based on the idea that without the encryption key, the data is effectively inaccessible.
- Specific Methods: Different countries may specify particular methods for data destruction, such as degaussing for magnetic media or physical destruction for certain types of sensitive data.
- Handling of Classified Data: Nations with classified or sensitive information may have stringent requirements for the destruction of classified data, often involving specialized procedures and protocols.
In essence, the data destruction requirements and methods can vary significantly depending on the country’s regulations and security standards. When conducting business in a particular country, it is essential to adhere to the data destruction standards and practices outlined by that country to ensure compliance and data security.
Application Scenarios for Data Destruction Solutions #
Here are some application scenarios for data destruction solutions:
- Acceleration-Sensing Physical Self-Destruct SSD:
- Scenario: This is used in fighter jets of a particular country. The objective is to safeguard military data in the event the jet is hit and crashes during combat. In such situations, the pilot may lose their life or be occupied with escaping, leaving little time to manually destroy data. Therefore, when the aircraft begins to crash, an accelerometer sensor inside the SSD detects acceleration and triggers a preset destruction program when a threshold is reached. This program physically destroys the SSD, requiring no human intervention. Even if the enemy finds the crashed fighter jet, the military data inside is irretrievable.
- Remote Destruction:
- Scenario: Remote data destruction is already commonplace, with features like remote wipes available in smartphones, including iPhones. Many SSD solutions also incorporate SIM cards for remote data destruction. However, for military applications, especially in outdoor settings, GPS (or China’s BeiDou) can be employed for more reliable remote destruction and tracking. GPS requires authorization, and with proper military clearance, SSDs can be remotely destroyed via methods like WeChat.
- Auto-Destruction upon Leaving a Designated Area:
- Scenario: Computers or hard drives can be restricted to specific locations, such as command centers. When these devices are detected moving beyond a predefined boundary, an auto-destruction program is activated.
- Continued Physical Destruction after External Power Loss:
- Scenario: If the external power source is disconnected during the data destruction process, the SSD can continue the destruction task using its internal power source, like a built-in battery.
- Resume Unfinished Destruction After Power Reconnection:
- Scenario: If the SSD’s external power source is disconnected during a destruction task, and then power is restored, the SSD can resume and complete the unfinished destruction task. However, this approach may have risks if the SSD is disassembled to recover data.
- Redefined PIN and Device Binding for Destruction:
- Scenario: The SSD is bound to specific customer hardware and does not have universal compatibility. If inserted into a different device without knowledge of the PIN definition, it triggers a self-destruct sequence, ensuring data is destroyed. This approach prevents unauthorized attempts to access the data by physically destroying the SSD.
Each of these scenarios demonstrates the diverse applications of data destruction solutions in different contexts, from military to civilian use cases.
Related: