The old hard disk drive is disintegrating in space. Conception of passage of time and obsolete technology
Over the past few years, there have been numerous reports, and studies about how second-hand devices that have been put up for sale still contained information from previous owners, exposing those individuals to scams, blackmailing, or identity theft.
This week, the United States Computer Emergency Readiness Team (US-CERT), a division part of the Department of Homeland Security (DHS), has published an official advisory with instructions and recommendations for properly deleting data from electronic devices that a user wishes to dispose of in one form or another.
These instructions are universal and can be applied to computers, smartphones, tablets, cameras, media players, external storage devices, and even gaming consoles.
Many of these recommendations are also common knowledge for IT industry veterans, but the guide was also written with non-technical users in mind. So let's take a deep dive into the proper device sanitization procedures.
The first --and pretty obvious-- step before attempting any device sanitization operation is to back up your data. We won't go too deep into this one. There are various methods and software that can help you with that. Any cursory Google search will unearth hundreds of tutorials for backing up data from almost any type of device, from PCs to gaming consoles.
This second step might sound simple, but it's not. Deleting data might not be as trivial as it sounds, and sometimes deleted data still hangs around, depending on your device and its OS quirks, and data may reside in memory cards you forget to pull out of the devices you sell.
It is advised that users don't sell or give away devices that still contain their old memory cards. Memory cards should be pulled from any device. But if you have to, it's advised to delete any data from those cards as well. Attaching the memory card to a card reader or through the device itself, and then connecting it to a PC will let users securely wipe the card.
But just deleting your data isn't usually enough. Leftover information can still reside in unallocated storage space. Forensics software can help buyers or new owners investigate old devices for any data that was left over on a device's storage.
To prevent attackers from recovering any old files, it is recommended that users overwrite storage devices with random binary data.
Windows has a built-in utility that can do this, named cipher.exe, but users can also use the "format" command with special parameters.
Macs also have a built-in feature to securely wipe and overwrite any attached storage, while on Linux there a tool named shred that can help users delete and overwrite data with one command.
Don't forget. Don't just overwrite hard drives. This operation can also be performed on USB thumb drives, memory cards, network attached storage (NAS) devices, and other storage systems.
If you're selling or handing down your device, this step is obviously optional. But if you're working for a company or performing a Mr. Robot-like wipe down, here's what US-CERT recommends in the case you need to physically destroy your old equipment, for legal or compliancy reasons.
"Physical destruction of a device is the ultimate way to prevent others from retrieving your information. Specialized services are available that will disintegrate, burn, melt, or pulverize your computer drive and other devices. These sanitization methods are designed to completely destroy the media and are typically carried out at an outsourced metal destruction or licensed incineration facility. If you choose not to use a service, you can destroy your hard drive by driving nails or drilling holes into the device yourself. The remaining physical pieces of the drive must be small enough (at least 1/125 inches) that your information cannot be reconstructed from them. There are also hardware devices available that erase CDs and DVDs by destroying their surface.
A NIST guideline from 2014 also provides additional instructions, if you have the time to go through 64 pages of more technical information.
If not, the instructions put forward by US-CERT should be more than enough. The advice is sorely needed, as several studies and surveys from past years have proven that many users tend to forget to wipe data from their devices: