This stolen laptop will self-destruct in five seconds

For many fans of the classic Mission: Impossible television series of the late sixties and early seventies, the best part came in the first five minutes, when the tape giving the assignment dissolved into a cloud of gray smoke. It’s an attractive concept for anyone who deals with sensitive information: If your data is in danger of being stolen, have it self-destruct.

A growing number of products make the idea a reality for lost or stolen laptops, PDAs, and cell phones. Some software will wipe clean a hard drive or memory card that falls into the wrong hands. Some hard drives have a so-called poison pill to physically destroy the drive if it has been tampered with.

These technologies can certainly help big businesses that lose devices containing important corporate data. But you don’t need to work at a large company to see the benefit: Just imagine a thief prowling through the account information and passwords you store on a portable device.


Until recently only large corporations could get such products. Now, however, versions for individuals and small businesses are starting to appear. Absolute Software , which makes Lojack for Laptops, will add a remote-kill feature to the next version of the program, so if a portable is stolen, the firm will be able to send a command to wipe out specific files — or even the entire contents of the hard drive.

Two companies make software for PDA smart phones that wipe the device’s memory upon receipt of a special SMS text message. Bluefish Wireless sells a $15 program called Central that does this for Palm Treo devices. Windows Smartphone users should check out the $10 PDAKill software from . [Editor’s note: After the June PC World went to press, the vendor updated this product and changed its name; go to the link for more information.]

I haven’t yet seen a USB flash memory drive that can wipe itself clean, but Ensconce Data Technology sells external and internal hard drives for laptops and desktops that contain “Dead on Demand” technology. In a pinch, these drives can commit suicide: They contain a small canister filled with a corrosive chemical that can render the platters useless. Software on the computer will trigger release of the chemical if tampering is detected, or the user can press a predetermined set of keys to put their data six feet under.

Destroying your own data is certainly a drastic solution, but for some people the kill-pill option is well worth considering. If hardware carrying precious data is stolen, your privacy, or your company’s bottom line, could depend on it.

Related Download
Real-time visibility Sponsor: Interactive Intelligence
Real-time visibility
Get real-time visibility in the contact centre. See immediate benefits. Real-time visibility in the contact centre is crucial. When you do not have the info you need to make decisions, you lose out on the single best way to create a competitive advantage. Solving this issue is simple, though.
Register Now