navigation spacer Services provided by Applied Magnetics Laboratory Inc. Products provided by Applied Magnetics Laboratory Inc. Contact Applied Magnetics Laboratory Inc. navigation spacer
Welcome to Applied Magnetics
Recently Approved by NSA for Blu-Ray


Cutting Edge Data Destruction NSA approved for all optical media types - CD, DVD, & Blu-Ray, per NSA/CSS Evaluated Products List for Optical Destruction Devices - Dec 2019

Also approved for small SSD materials-SIM Card, CAC ID, EMV Credit Card, Magnetic Strip Card, per NSA/CSS Evaluated Products List for Solid State Disintegrators - Dec 2019
Link to NSA/CSS Evaluated Products List for Solid State Disintegrators

View 151-HP Spec Sheet

View 151-HP-C Spec Sheet

Disk Erasing Paddle

NSA Approved for TOTAL Data Removal (L & P)
. All manufacturers
. All types of magnetic storage technology regardless of the year of manufacture

"See Details"


Infostroyer® 201
NSA Approved
Multi Media Destruction
"See Details"



Infostroyer® 151 DC
"See Details"

Included: Rugged transit case, InfoStroyer 151 EXTVAC, vacuum, 12 waste bags and manual

Infostroyer™ 275
"See Details"

AML InfoStroyer 275
Solid State Destruction
(Exceeds NSA and NIST Requirements)

GSA AdvantageGSA Advantage

You can read the Federal Supply Service(FSS) Terms by Clicking Here
See our interview with Baltimore Fox TV station (WBFF)
November 11th 2008 on the morning show.

Click Here

A brief history...

We've been in business since 1973. For many years our primary business was the design of special magnetic,
mechanical, and electronic devices and instruments. We've worked on everything from driving artificial hearts
to separating dirt from potatoes, to finding unexploded ordnance underwater and on land, to refining plutonium.

We've always done things that nobody else could do, or perhaps was willing to do.

An important segment of our business has ALWAYS been devoted to specialty security equipment. Since the late
1990's, our focus has gradually shifted entirely to the development, design and manufacture of high-security equipment.

We generally concentrate on the security of stored information. Usually this involves making sure that our customers
have a way to destroy information in such a way that even the most determined adversary cannot possibly recover it.

Our relationships with the Security Community go back thirty years, and indirectly, back to the days of OSS and WWII.
This is the most important work we've ever done, and we are honored and pleased that it is now our primary business.