I used to work for a company that required us to remove any proprietary data from our laptop hard drive prior to traveling to some countries overseas. I didn’t know if it was because they could secretly access my hard drive as soon as I passed through immigration, or maybe a government-run internet meant any foreign user access would be monitored, recorded, and analyzed! I didn’t understand the multitude of threats to data security, which also includes backdoors designed into untrusted hardware that can lie dormant until triggered by an outside force. At the time, I did not have access to classified or top secret data, as I was working for a commercial company, but imagine if I did have high value data. What if a backdoor was triggered once I logged onto an unsecure foreign network? What if that backdoor initiated a complete download of my hard drive without my knowledge? All because my employer trusted a commercial SSD without strict supply chain management of foreign-made components.
In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result is the same, the implementation of self-destruct in the real world can be a bit different than in Hollywood. In military-grade solid state drives, self-destruction of data or a data storage device happens through sophisticated non-thermal events. Advanced algorithms are used to erase encryption keys, non-volatile NAND flash memory, and controller firmware. Other mechanisms can be employed to wipe the drive by high powered magnetic exposure. In these scenarios the data and device will be rendered useless with no chance of reverse engineering, but no flames or bodily harm will ensue. Read More
This message will self-destruct in five seconds…
Who knew that concept was anything but Hollywood imagination? It is very real, particularly in today’s modern threat environment. Protection including destruction of mission critical data has never been more relevant to the success of our military and government forces.
As our adversaries become more skilled in hacking and reverse-engineering, the impact of stolen or captured mission, classified, secret or top secret data can be catastrophic. Military systems and networks must continually incorporate innovative security protocols to combat the bombardment of attacks. Whether in forward-deployed unmanned systems or laptops used in office environments, data security must be in the forefront of design all the way down to the microelectronics. Military grade microelectronics, including solid state drives, must embed security at the lowest level with sophisticated algorithms and design techniques. Security cannot be bolted on. When these capabilities are coupled with trusted design and manufacturing disciplines, military grade SSDs provide an unparalleled approach to data security.
In this blog I’ll address how Mercury is uniquely positioned as the trailblazer of secure military grade SSDs through our leading edge technologies and business practices. In my upcoming posts Encryption Decoded and Diamonds are Forever. Encryption Keys Last Longer, I’ll explore the security advancements in military-grade secure SSDs.