How poor chain of custody, false certificates of destruction, and lack of onsite data erasure led to a major security breach — and what ITADs can learn from it.
In early 2025, a driver at an international ITAD company pleaded guilty to theft and sale of hundreds of government-issued IT devices, highlighting critical security lapses in the IT asset disposition process.
The employee, working at a Maryland facility from 2019 to 2023, was responsible for providing onsite shredding services and transporting assets from client locations to offsite destruction facilities. Between 2022 and 2023, he and an accomplice stole several hundred IT assets during transit — primarily from federal government agencies.
Most devices belonged to federal agencies that contracted the ITAD to securely destroy assets according to NIST standards. The employees sold the equipment to second-hand shops for monetary gain, also providing fraudulent Certificates of Destruction (COD) stating devices were properly wiped and destroyed.
This incident highlights critical failures on the part of both the ITAD organization and its clients:
Devices sent from client premises were not properly matched at the facility. Record reconciliation was not performed for devices marked for destruction, and inventory verification was absent.
Government agencies often follow NSA guidelines for destroying confidential information and request device destruction from ITAD providers. However, they failed to implement secure data disposal practices before handing devices over for destruction.
Sensitive government data was compromised. While the full quantum is unclear, the risk of critical information falling into wrong hands is significant and ongoing.
The employees provided fraudulent certificates claiming devices were properly disposed of. This demonstrates clear lack of verification processes and oversight by the ITAD company.
IT asset disposition companies must recognize the high stakes involved in such incidents. Unwiped devices can expose sensitive information, leading to severe consequences:
Legal action from affected organizations
Fines from compliance authorities
Loss of client trust and market standing
Direct and indirect monetary impact
To prevent such breaches, organizations must implement secure data erasure solutions for both onsite and offsite wiping. D-Secure offers comprehensive protection:
Permanently erase data from laptops, desktops, Mac devices, Chromebooks, servers, and mobile devices before resale or disposal.
Generate automated erasure reports and logs to maintain records of every erasure without manual interference.
Access all reports on the cloud console to ensure complete traceability and compliance at all times.
Wipe Windows endpoint devices remotely from a centralized ITAD facility before transportation for destruction.
Maintain detailed documentation and verification at every stage — from pickup to destruction. Reconcile records at receiving facilities.
Wipe devices onsite at client locations or remotely before physical transportation to eliminate risks during transit.
Deploy NIST-tested and certified software solutions that provide tamper-proof documentation and automated compliance reporting.
Conduct thorough background checks and implement monitoring systems for personnel handling sensitive assets.
An ITAD employee and accomplice stole hundreds of government-issued IT devices during transit between 2022-2023. The devices were sold to second-hand shops, and fraudulent Certificates of Destruction were provided to clients, falsely claiming the devices had been properly disposed of.
The breach resulted from multiple failures: improper chain of custody documentation, lack of record reconciliation at facilities, absence of onsite data erasure before transit, and inadequate verification of destruction certificates.
Stolen assets included laptops, desktops, iPads, tablets, Chromebooks, hard drives, and mobile phones — primarily from federal government agencies that had contracted the ITAD for secure destruction according to NIST standards.
Secure data erasure before physical transportation eliminates data breach risks during transit. Even if devices are stolen, erased devices contain no recoverable sensitive information, protecting both clients and the ITAD's reputation.
ITADs should implement verifiable chain of custody systems, erase data before transportation, use certified erasure software with automated reporting, conduct employee background verification, and deploy centralized cloud-based documentation that cannot be falsified.
The theft of government devices by an ITAD employee serves as a stark example of vulnerabilities in the IT asset disposition industry. ITADs must ensure secure handling of data-bearing assets, maintain verifiable chain of custody documentation, and implement certified data erasure solutions to mitigate risks.
By ensuring devices are erased before transportation, ITADs can safeguard client data, maintain regulatory compliance, and protect their business reputation. In an industry where trust is paramount, proactive security measures are absolutely non-negotiable.
Your email address will not be published. Providing an email is optional.
Send us an enquiry regarding: Government Device Theft
Prevent data breaches with certified erasure solutions that protect both government and enterprise IT assets before disposal or transit.
No comments yet. Be the first to comment.