The data erasure process used by the US Army (AR 380-19) is typically implemented by means of the data erasure software in the following manner:
Pass 1: Overwriting the data with a random character;
Pass 2: Overwriting the data with a defined character (e.g., zero);
Pass 3: Overwriting the data with the opposite of the random character (e.g., one), and verifying the writing of that character.
After a data erasure has been carried out using this method, a soft- or hardware-based restoration of the data should be ruled out. This procedure for data erasure was originally published in the document "Army Regulation 380-19" by the US Army. It is unclear whether the United States Army is still using the software-based data destruction method AR 380-19. However, it is at least still part of most programs that may be used to perform a secure data erasure.