USAFRet :
Wiping the drives via any of the above mentioned applications will work.
But!
We are talking about 1,000+ drives here. The potential for missing a few, and releasing them out into the wild, is high.
Let's split that 1,000 drives into two stacks of 500. Pile A and Pile B.
Pile A, we will wipe and then sell or donate
Pile B we will shred into metal dust.
Given that many of these drives will have PII (Personally Identifiable Information) on them, we need to be sure of the data destruction.
OK, go. Two teams, one on pile A, and one team on Pile B.
Process a hundred or so in each pile...shift change!
Which ones have or have not been processed?
In Pile A (wipe with software) we do not really know. Unless we plug tham back into a system to check.
In Pile B, the ones that still look like hard drives have not been done.
Since we are dealing with citizen data, and we do not know which specific drives have this data on them....I know which solution I would suggest.
The potential for missing one (or 10) is simply too high.
If you have the right equipment, you can erase 20 drives at a time in each RAID rack. Operate 5 racks at once, and you can clean 100 drives at a time. Each drive serial number is recorded, and logged as a wipe is completed. Exercise diligence and there is little room for "error" or missed targets. BOOT-test the drives before and after wipe, if you're worried that they're really blank. The "No Operating System" message on the screen is a sign the drive was wiped. If you're unsure, wipe it again, this is not something which should be left to chance.
The PROPER way to use software like this is by wiping all drives before they move from the secure location where they were originally in service. Only after wiping: should machines be moved around, or retired from use. Wipe machines in departmental-sized blocks, and the work is accomplished by your existing IT team.
Destruction is NOT the best method, it's actually the worst. It's very unfriendly to the environment, greatly devalues each computer, and wastes precious global resources. You don't have to put yourselves into a position where you are forced to trust a third-party to handle this. Do the work yourselves, and audit it carefully, for the best results.
United States Air Force purchases WipeDrive regularly in many many locations around the world, and they trust it to accomplish secure data destruction without damaging the hardware itself.
It is easy to tell if the data was deleted after our program was used, simply try to boot up the computer afterward to see the results. Some companies use their security footage to form an electronic trail which indicates when the wipe software was finished, and the results of attempted reboots by the IT staff. After it fails to boot up, the machine can be pulled from that desk, and refreshed with a new machine.
It boils down to a couple different scenarios. Our software would produce a secure log of all the wiped drives. Whereas a shredder will produce a pile of metallic bits which may or may not be the drives you stuffed through the metal door on the shredding truck. Shredding is typically up to $8 per drive, whereas our software costs only a fraction of that price. They provide a pile of metal bits for proof, which bare no resemblance to the original drives and really could be from destructing anything. Software solutions let you keep the drives, and put them back into machines for continued use, or resale.