what companies ask employees to destroy laptops that have been touched by TSA or CBP?
#1
Original Poster
Join Date: Dec 2015
Posts: 370
what companies ask employees to destroy laptops that have been touched by TSA or CBP?
what companies ask employees to destroy laptops that have been touched by
TSA or CBP? (out of sight of the employee, even if there's no evidence of the
laptop having been turned on at all)
the employees just have to take a couple of pictures of the destroyed laptops
and the company will issue new laptops....
TSA or CBP? (out of sight of the employee, even if there's no evidence of the
laptop having been turned on at all)
the employees just have to take a couple of pictures of the destroyed laptops
and the company will issue new laptops....
#2
Join Date: Feb 2005
Location: DEN, or so it says...
Programs: UA1K/RCC, Avis CHM, NWA Plat, SPG Plat
Posts: 2,885
what companies ask employees to destroy laptops that have been touched by
TSA or CBP? (out of sight of the employee, even if there's no evidence of the
laptop having been turned on at all)
the employees just have to take a couple of pictures of the destroyed laptops
and the company will issue new laptops....
TSA or CBP? (out of sight of the employee, even if there's no evidence of the
laptop having been turned on at all)
the employees just have to take a couple of pictures of the destroyed laptops
and the company will issue new laptops....
#3
Original Poster
Join Date: Dec 2015
Posts: 370
that was on a TV show I saw on Tuesday... two of the tech writers talked about it, but I missed the beginning where they mentioned the names of the companies. I think one of them writes for the LA Times(may have been the San Francisco Chronicle) technology section, but can't remember his name.
#4
Suspended
Join Date: Aug 2010
Location: DCA
Programs: UA US CO AA DL FL
Posts: 50,262
Seems a bit silly. Even if one wished to "destroy" the laptop, why leave that to the employee rather than an IT professional following a set protocol and using an approved disposal method.
Would also think that if one has the sort of data which one seriously believes isn't accessible to the government by means other than at CBP & TSA stations, one would have taken other precautions not to have stored the data on the laptop in the first place.
Would also think that if one has the sort of data which one seriously believes isn't accessible to the government by means other than at CBP & TSA stations, one would have taken other precautions not to have stored the data on the laptop in the first place.
#6
FlyerTalk Evangelist
Join Date: Jan 2008
Location: HEL
Programs: lots of shiny metal cards
Posts: 14,104
Why destroy the laptop? Replace the hard drive, demagnetize/shred/whatnot the old one
("Destroying" as in smashing it would probably leave the hard drive intact anyway...)
Once the agencies got the info off the device, why destroy it? Barn door, horses, etc...
I'd think the worries would primarily be what the said agencies might have installed on the devices, not what they have read from there.
("Destroying" as in smashing it would probably leave the hard drive intact anyway...)
I'd think the worries would primarily be what the said agencies might have installed on the devices, not what they have read from there.
#7
FlyerTalk Evangelist
Join Date: Jun 2005
Posts: 38,410
Why destroy the laptop? Replace the hard drive, demagnetize/shred/whatnot the old one
("Destroying" as in smashing it would probably leave the hard drive intact anyway...)
Once the agencies got the info off the device, why destroy it? Barn door, horses, etc...
I'd think the worries would primarily be what the said agencies might have installed on the devices, not what they have read from there.
("Destroying" as in smashing it would probably leave the hard drive intact anyway...)
Once the agencies got the info off the device, why destroy it? Barn door, horses, etc...
I'd think the worries would primarily be what the said agencies might have installed on the devices, not what they have read from there.
#8
Join Date: Jul 2007
Location: San Francisco/Sydney
Programs: UA 1K/MM, Hilton Diamond, Marriott Something, IHG Gold, Hertz PC, Avis PC
Posts: 8,147
Any company that cared enough about security to destroy a laptop in such a situation would not be stupid enough to let the employee handle the destruction, nor consider photos to be sufficient proof that it had been suitably destroyed.
Well, yes. There is that.
Well, yes. There is that.
#9
Join Date: Jan 2007
Programs: No single airline or hotel chain is of much use to me anymore.
Posts: 3,278
UEFI sort of changes that, the BIOS can now be compromised in ways that just weren't possible before. Among UEFI's features is OS independent network connectivity and file system access.
#10
 
Join Date: Nov 2000
Location: Upcountry Maui, HI
Posts: 13,303
#11
FlyerTalk Evangelist
Join Date: May 2002
Location: Pittsburgh
Programs: MR/SPG LT Titanium, AA LT PLT, UA SLV, Avis PreferredPlus
Posts: 30,986
Doesn't your sentence # 2 answer your question in sentence #1?
#13
was thetravelingRedhead
Join Date: Aug 2012
Location: Western Michigan
Programs: Delta Silver Medallion, United Silver Premier
Posts: 642
#14
Join Date: Feb 2013
Location: Somewhere In The Five Eyes
Posts: 228
Even if the computer has no data of value on it, the computer is a possible exploitation vector. The blackhat would simply need to re-flash UEFI/BIOS or any other embedded micro-controller and hope that the laptop is carried into the target site ... and then connected to a network.
I have witnessed computers being destroyed. The typical process is to toss the laptop into a hammer mill and convert it to dust. Example:
I have witnessed computers being destroyed. The typical process is to toss the laptop into a hammer mill and convert it to dust. Example:
#15
Join Date: Nov 2006
Location: Detroit; Formerly Dubai
Posts: 3,652
Ok. Let's play with this one. You've just flown into China to close a fifty million dollar deal. Chinese customs has insisted on taking your computer into another room for half an hour.
Do you: (a) abort the meeting and fly home; (b) chance going forward very carefully with your computer; (c) have a fresh machine fedexed to you which risks the same Chinese customs; or, (d) go to the Shanghai Apple store and buy a fresh machine as off the shelf as you can with as little time for Government involvement as possible.
Incidentally, I would never destroy the old machine. I would have IT inspect it, wipe it, and then send it to US authorities. for examination in their ongoing trade fight with China.
Question 2. Do you ever lock your company laptop in your hotel room safe in China? Isn't it every bit as vulnerable to tampering.
Dubai Stu
PS: The only reason I am singling out China is their technical proficiency. There are half a dozen countries I could easily substitute for China.
Do you: (a) abort the meeting and fly home; (b) chance going forward very carefully with your computer; (c) have a fresh machine fedexed to you which risks the same Chinese customs; or, (d) go to the Shanghai Apple store and buy a fresh machine as off the shelf as you can with as little time for Government involvement as possible.
Incidentally, I would never destroy the old machine. I would have IT inspect it, wipe it, and then send it to US authorities. for examination in their ongoing trade fight with China.
Question 2. Do you ever lock your company laptop in your hotel room safe in China? Isn't it every bit as vulnerable to tampering.
Dubai Stu
PS: The only reason I am singling out China is their technical proficiency. There are half a dozen countries I could easily substitute for China.