Image Map Image Map
Page 2 of 2 FirstFirst 12
Results 11 to 16 of 16

Thread: Real spies still use floppies!

  1. #11
    Join Date
    Sep 2008
    Location
    Walled Lake, MI
    Posts
    3,546
    Blog Entries
    6

    Default

    I onced worked in an area where "Tempest" secure devices were dealt with. Hard drive failures required complete disassembly and then the disk (platen) was then held to a belt sander. Once the surface was obliterated, the disk was put in a vice and folded into quarters. A small vehicle with a flashing light would arrive every once in a while and collect the scruntched disks. The next step was out of the area but they were eventually smelted. Not being a security expert, I would say there would litlle or no chance of any data recovery.

  2. #12

    Default

    The Looney Tunes method of data security. Bet it worked, though.
    Computers: Amiga 1200, DEC VAXStation 4000/60, DEC MicroPDP-11/73
    Synthesizers: Roland JX-10/SH-09/MT-32/D-50, Yamaha DX7-II/V50/TX7/TG33/FB-01, Korg MS-20 Mini/ARP Odyssey/DW-8000/X5DR, Ensoniq SQ-80, E-mu Proteus/2, Moog Satellite, Oberheim SEM
    "'Legacy code' often differs from its suggested alternative by actually working and scaling." - Bjarne Stroustrup

  3. #13
    Join Date
    Oct 2011
    Location
    Cwmbran, Wales, United Kingdom
    Posts
    483

    Default

    Quote Originally Posted by Ole Juul View Post
    Oh good. I'm not very smart so I've got nothing to loose, but I was afraid somebody would try to steal 192.168.1.1 from me.
    All your 192.168.1.1 are belong to us!

  4. #14
    Join Date
    Jan 2007
    Location
    Pacific Northwest, USA
    Posts
    28,499
    Blog Entries
    20

    Default

    Quote Originally Posted by Ole Juul View Post
    Oh good. I'm not very smart so I've got nothing to loose, but I was afraid somebody would try to steal 192.168.1.1 from me.
    I find occasionally that a "new" acronym is the same as one that I'm familiar with, which makes things very confusing for a time. "IP" doesn't even make me blink any more. It's what I call the "Cole Porter" problem (look about 2:00 in).

  5. #15
    Join Date
    Sep 2008
    Location
    Walled Lake, MI
    Posts
    3,546
    Blog Entries
    6

    Default

    Quote Originally Posted by commodorejohn View Post
    The Looney Tunes method of data security. Bet it worked, though.
    This place did have its quirks. When you arrived for the first time during the day, you stood in front of a small portal and were then visually recognized and your ID would then be put next to you picture. The only people wearing ID's were visitors. You took nothing in that wasn't inspected and likewise, nothing went out. You didn't get paid any extra for all of this either.
    Last edited by Agent Orange; October 11th, 2012 at 05:11 PM.

  6. #16
    Join Date
    Aug 2009
    Location
    Oslo, Norway
    Posts
    1,196
    Blog Entries
    3

    Default

    Quote Originally Posted by Agent Orange View Post
    I onced worked in an area where "Tempest" secure devices were dealt with. Hard drive failures required complete disassembly and then the disk (platen) was then held to a belt sander. Once the surface was obliterated, the disk was put in a vice and folded into quarters. A small vehicle with a flashing light would arrive every once in a while and collect the scruntched disks. The next step was out of the area but they were eventually smelted. Not being a security expert, I would say there would litlle or no chance of any data recovery.
    When I worked in the Army, we just had the munitions people burn the remains of classified computer media together with the lots of ammunition they were destroying. At 1500 degrees centigrade, everything is gone.
    Torfinn

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •