Re: I found actual evidence that
It does depend on where from. A friend once worked at a secure data destruction company, they had a contract to regularly visit a facility to destroy their equipment at the end of life cycles, dismantle the drives, crush the chips and the disk platters were smashed into sand sized particles. This was all whilst being watched in a facility they weren't allowed to leave before they were searched.
However it's also a facility where the staff used flashdrives to move some data around and their loss rate, talking to one of the military techies was several flashdrives a month. The systems were rock solid when used as intended, but lazy meat in the system bypassed the systems for ease of use and created massive holes in data security.