Minggu, 10 Juni 2018

Sponsored Links

paper shredder from washers - YouTube
src: i.ytimg.com

Paper shredder is a mechanical device used to cut paper into strips or fine particles. Government organizations, businesses, and individuals use shredders to destroy personal, confidential, or other sensitive documents.


Video Paper shredder



Discovery

The first paper shredder was credited to the prolific inventor Abbot Augustus Low, whose patent was filed on February 2, 1909. But his invention was never made.

Paper shredder Adolf Ehinger, based on hand crank paste maker, was produced in 1935 in Germany. He should have tarnished anti-Nazi propaganda to avoid investigations by the authorities. Ehinger then markets its shredder to government agencies and financial institutions that turn from hand crank into electric motors. The Ehinger Company, EBA Maschinenfabrik, produced the first cut-cut paper shredders in 1959 and continues to do so today as EBA Krug & Priester GmbH & amp; Co. in Balingen.

Maps Paper shredder



History of use

Until the mid-1980s, rare paper shredders were used by non-government entities.

A high example of its use was when the US Embassy in Iran used a shredder to reduce paper pages into strips before the embassy was taken in 1979, but some documents were reconstructed from the strip, as described below.

After Colonel Oliver North told Congress that he used Schleicher's cross model to enumerate Iran-Contra documents, sales for the company increased by almost 20 percent in 1987.

Paper shredders became more popular among US citizens with privacy concerns after the 1988 Supreme Court ruling at California v. Greenwood ; in which the United States Supreme Court declares that the Fourth Amendment does not prohibit unsecured searches and foreclosures of waste left to collect outside the home. The anti-burning law also resulted in increased demand for paper cuts.

Recently, concerns about identity theft have encouraged increased personal use, with the US Federal Trade Commission recommending that individuals undermine financial documents before disposal.

Information privacy laws such as FACTA, HIPAA, and the Gramm-Leach-Bliley Act encourage the use of shredders, as businesses and individuals take steps to safely dispose of confidential information.

Classy Inspiration Paper Shredder Magnificent Ideas Best Reviews ...
src: thefashionalchemist.com


Type

Shredders range in size and price from small and inexpensive units designed for a limited number of pages, to large units used by commercial destruction services worth hundreds of thousands of dollars and can damage millions of documents per hour. While the smallest shredder may be hand-driven, most of the shredder is electrically powered.

Shredder over time has added features to enhance the shredder user experience. Many now refuse paper feeding beyond capacity to avoid jams; others have security features to reduce risk. Some shredders designed for use in shared workspace or departmental copy rooms have noise reduction.

Mobile destruction truck

Larger organizational or shredding services sometimes use "mobile shredder trucks", usually built as box trucks with industrial-sized indoor shredders and storage space for shredded materials. Such units can also offer the destruction of CDs, DVDs, hard drives, credit cards, and uniforms, among other things.

Newsstand

A kiosk shredding is an automated retail machine (or kiosk) that allows public access to commercial or industrial shredders. This is an alternative solution for the use of a personal or business shredder, where people can use faster and stronger shredders, pay for any destructive event rather than purchase cutting tools.

Services

Some companies outsource their shaving to a shaving service . These companies are destroying the site, with mobile shredder trucks or having an off-the-shelf facility. Documents that need to be destroyed are often placed in locked bins that are emptied periodically.

Household Paper Shredders - cumberlanddems.us
src: cumberlanddems.us


Shredding, and output

As well as size and capacity, shredders are classified according to the method they use; and the size and shape of the shreds they produce.

  • Strip-cut shredder uses a spinning knife to cut a narrow strip over a piece of original paper.
  • Cutting or cut into pieces shredder using two rotating drums to cut rectangles, parallelogram, or candy (diamond shaped) flakes.
  • The particle cutter creates a square or small loop.
  • Carton shredder is specially designed to break the corrugated material into one of the strip or mesh pallets.
  • Disintegrators and granulators repeatedly cut paper randomly until the particles are small enough to pass through the mesh.
  • Hammermills pound paper over the screen.
  • The damaged and spinning shredder has a rotating knife that pierces the paper and then tears it off.
  • Grinder has a rotating axle with a cutter blade that grinds the paper until it is small enough to fall through the screen.

Security level

There are a number of standards that include security level paper shredders, Including:

DIN - German Institute for Standardization

The previous DIN 32757 standard has now been replaced by DIN 66399. This is complicated, but can be summarized as follows:

  • Level P-1 = <= 12 mm width of any strip (To trim common internal documents)
  • Level P-2 = <= 6 mm width strip of any length
  • Level P-3 = <= 2 mm wide strip of any length or <= 320Ã, mmÃ,² particles of any width. (For highly sensitive documents and personal data subject to high protection requirements)
  • Level P-4 = <= 160Ã, mmÃ,² particles with width <= 6 mm
  • Level P-5 = <= 30Ã, mmÃ,² particles with width <= 2 mm
  • Level P-6 = <= 10 mm² particles with width <= 1 mm (espionage-safe, for very high security demands such as military or government departments)
  • Level P-7 = <= 5 mmÃ,² particles with width <= 1 mm

NSA/CSS

  • The United States National Security Agency/CSS produces "NSA/CSS 02-01 Specification for High Security Paper Crossroads".
  • They provide a list of the evaluated shredder.

Amazon.com: AmazonBasics 6-Sheet Cross-Cut Paper Shredder and ...
src: images-na.ssl-images-amazon.com


Destruction of evidence

There are many instances where there are allegations that documents have been improperly or illegally tampered with by tearing up, including: Oliver North tore off documents relating to the Iran-Contra affair between November 21 and November 25, 1986. During the trial, the North testified that on 21 November 22, or 24, he witnessed John Poindexter destroying what might happen. became the only signed copy of the secret presidential discovery that seeks to authorize CIA participation in the November 1985 Hawk missile shipments to Iran.

  • According to Paul Volcker's Committee report, between April and December 2004, Kofi Annan Chef de Cabinet Iqbal Riza allowed thousands of documents of the United Nations to be shredded, including all files chronology of the Oil-for-Food Program during 1997 to 1999.
  • Union Bank of Switzerland uses paper shredders to destroy evidence that their company's property was stolen from Jews during the Holocaust by the Nazi government. The shredding was disclosed to the public through the work of Christoph Meili, a security officer working in a bank who happens to be wandering in a room where the cuts took place. Also in the shredding room are the books of the German Reichsbank. They registered stock accounts for companies involved in the holocaust, including BASF, Degussa, and Degesch. They also recorded real-estate records for Berlin properties that had been forcibly taken by the Nazis, placed in a Swiss account, and subsequently claimed to be owned by UBS. The destruction of these documents is a violation of Swiss law.

Swingline Paper Shredder - Leo Computers Nig. Ltd
src: leocomputersltd.com


Unshredding and forensics

In theory the shredded document can not be reassembled and read. In practice its feasibility depends on, (a) how well the destruction has been done, and (b) the resources put into reconstruction. Cost benefit analysis will depend on whether it's a simple personal matter, corporate espionage, criminal matters - or if national security is at stake.

Factors that make reconstruction more likely include not only cutting methods, but also the orientation of the material when fed, and whether the shredded material is subsequently randomized afterwards. Even without a full reconstruction, in some cases useful information can be obtained by forensic analysis of paper, ink, and cutting methods.

Reconstruction examples

  • After the Iranian Revolution and the takeover of the US embassy in Tehran in 1979, the Iranians enlisted local carpet weavers who reconstructed the pieces by hand. The restored documents will then be released by the Iranian government in a series of books called "Documents of the US espionage den". The US government then improved its destruction techniques by adding crushing, pulping, and chemical decomposition.
  • Modern computer technology greatly accelerates the process of rearranging shredded documents. Strips are scanned on both sides, and then the computer determines how the strips should be put together. Robert Johnson of the National Association for Information Destruction stated that there is a great demand for document reconstruction. Some companies offer commercial document reconstruction services. For maximum security, documents should be shredded so that document words pass through the shredder horizontally (ie perpendicular to the propeller). Many documents in the Enron Accounting scandal are fed through the shredder in the wrong way, making them easier to reassemble.
  • In 2003, there was an ongoing effort to restore the damaged Stasi archives, the East German secret police. There are "millions of paper remnants that panicked Stasi officials dumped into garbage bags during the last days of the regime in the fall of 1989". Because it took three dozen people six years to reconstruct 300 of the 16,000 bags, the Fraunhofer-IPK Institute has developed a "Stasi-Schnipselmaschine" ( Stasi excerpt machine ) for computerized reconstruction and tested it in a pilot project.
  • DARPA Shredder Challenge 2011 calls computer scientists, puzzle enthusiasts, and anyone interested in solving complicated problems, to compete up to $ 50,000 by collecting a series of shredded documents. The Shredder Challenge consists of five separate puzzles in which the number of documents, document materials and cutting methods varies to present the challenges of increasing difficulty. To solve each problem, participants are asked to provide answers to the puzzles embedded in the contents of the reconstructed document. The main prize and prize are given depending on the number and difficulty of the problem being solved. DARPA declared the winner on December 2, 2011 (winner's entry filed 33 days after the challenge started) - the winner is "All Your Damage Is US-owned" using a combination system that uses automated sorting to choose the best fragment combinations for human review.

Forensic identification

Individual shredders used to destroy a given document may occasionally be of forensic interest. Shredder displays specific device specific characteristics, "fingerprints", such as precise spacing, level and pattern of wear. By carefully examining the shredded material, minute variations of the size of the piece of paper and microscopic marks on the edges can be connected to a particular machine. (c.f. identification of forensic typewriters.)

Excellent Design Paper Shredder Interesting Ideas Best In December ...
src: thefashionalchemist.com


Recycling waste

The resulting torn paper can be recycled in several ways, including:

  • Animal bed - To produce a warm and comfortable bed for animals..
  • Hollow and packaged - Empty the filling for the carriage of goods.
  • Briquettes - an alternative to non-renewable fuels.
  • Isolation - Torn paper mixed with refractory chemicals and glue to create insulating materials that can be sprayed for interior walls and under the roof.



See also

  • Industrial destroyer
  • The cardboard crusher
  • Circulation of money
  • Recycle paper
  • Baler



References

Source of the article : Wikipedia

Comments
0 Comments