Designed specifically for enterprise, government and military customers that need high performance and reliability in their USB flash storage devices, IronKey Basic S250 and D250 flash drives meet the stringent Security Level 3 requirements of the FIPS 140-2 standard. IronKey Basic S250 and D250 drives meet the extreme performance and security requirements of some of the world's most demanding organizations and are built from the ground up to be the world's most secure flash drives. They're equipped with strong hardware encryption and use the algorithm approved by the DOD for storing Top Secret data. A ruggedized, waterproof metal chassis helps protect S250 and D250 drives from the elements, and active anti-malware prevents USB threats from spreading. IronKey Basic S250 and D250 drives are equipped with a control panel localized into eight languages around the world.

https://www.walmart.com/ip/IronKey-32GB-Basic-D250-USB-2-0-Flash-Drive/26011060?wmlspartner=wlpa&selectedSellerId=0

https://www.srvfast.com/ironkey-32gb-basic-s250-usb-2-0-flash-drive-32-gb-usb-2-0-256-bit-aes-256-bit-sha-2048-bit-rsa-encrypted-usb-2-0-fips-140-2-lvl-3-iks250b-32gb.html

Data Encryption Keys 
» AES keys generated by onboard Random Number Generator 
» AES keys generated by user at initialization time and encrypted

Self-Destruct Data Protection
» Password try-counter implemented in tamper-resistant hardware 
» Once password try-count is exceeded, all data is erased by hardware

Additional Security Features 
» USB command channel encryption to protect device communications 
» Firmware and software securely updateable over the Internet 

Physically Secure 
» Solid, rugged case 
» Encryption keys stored in the tamper-resistant IronKey Cryptochip 
» All chips are protected by epoxy-based potting compound 

The device password is hashed using salted SHA-256 before being transmitted to the IronKey Secure Flash Drive over a secure and unique USB channel. Only after the password is validated is the AES encryption key unlocked. The password try-counter is also implemented in hardware to prevent memory rewind attacks. Typing your password incorrectly too many times initiates a patent-pending "flash-trash" self-destruct sequence, which is run in hardware rather than using software, ensuring the ultimate protection for your data.