Removing Hard Drive Password When Locked

I have a 2.5in hard drive that came out of a cartridge for a Dell RD1000. It has a password on it that is disabled whenever the drive is used with its USB component; however, if I try to boot up with it directly connected to my computer, it will ask for a password. I do NOT care about any of the data on it, but I would like to be able to use the drive as a SATA drive. I do not know the user password for it, so using hdparm --user-master u --security-erase PASSWD /dev/sda does not work. I cannot unlock the drive (from my knowledge) because I don't know the user password. I'd really appreciate any thoughts you guys have! It would be simplest for me to implement a solution with a linux program, but if necessary it's I suppose I could use windows.

Below is the output of hdparm -I /dev/sda


ATA device, with non-removable media
	Model Number:       FUJITSU MJA2160BH G2                    
	Serial Number:      K950T9525U6N
	Firmware Revision:  00850019
	Transport:          Serial, ATA8-AST, SATA 1.0a, SATA II Extensions, SATA Rev 2.5, SATA Rev 2.6
	Used: ATA-8-ACS revision 3f 
	Supported: 8 7 6 5 
	Logical		max	current
	cylinders	16383	16383
	heads		16	16
	sectors/track	63	63
	CHS current addressable sectors:   16514064
	LBA    user addressable sectors:  268435455
	LBA48  user addressable sectors:  312581808
	Logical  Sector size:                   512 bytes
	Physical Sector size:                   512 bytes
	device size with M = 1024*1024:      152627 MBytes
	device size with M = 1000*1000:      160041 MBytes (160 GB)
	cache/buffer size  = 8192 KBytes (type=DualPortCache)
	LBA, IORDY(can be disabled)
	Queue depth: 32
	Standby timer values: spec'd by Standard, no device specific minimum
	R/W multiple sector transfer: Max = 16	Current = 16
	Advanced power management level: disabled
	Recommended acoustic management value: 254, current value: 0
	DMA: mdma0 mdma1 mdma2 udma0 udma1 udma2 udma3 udma4 *udma5 
	     Cycle time: min=120ns recommended=120ns
	PIO: pio0 pio1 pio2 pio3 pio4 
	     Cycle time: no flow control=120ns  IORDY flow control=120ns
	Enabled	Supported:
	   *	SMART feature set
	   *	Security Mode feature set
	   *	Power Management feature set
	   *	Write cache
	   *	Look-ahead
	    	Host Protected Area feature set
	   *	WRITE_BUFFER command
	   *	READ_BUFFER command
	    	Advanced Power Management feature set
	    	SET_MAX security extension
	    	Automatic Acoustic Management feature set
	   *	48-bit Address feature set
	   *	Device Configuration Overlay feature set
	   *	Mandatory FLUSH_CACHE
	   *	SMART error logging
	   *	SMART self-test
	   *	General Purpose Logging feature set
	   *	64-bit World wide name
	    	Disable Data Transfer After Error Detection
	   *	{READ,WRITE}_DMA_EXT_GPL commands
	   *	Gen1 signaling speed (1.5Gb/s)
	   *	Gen2 signaling speed (3.0Gb/s)
	   *	Native Command Queueing (NCQ)
	   *	Host-initiated interface power management
	   *	Phy event counters
	   *	NCQ priority information
	    	DMA Setup Auto-Activate optimization
	    	Device-initiated interface power management
	   *	Software settings preservation
	   *	SMART Command Transport (SCT) feature set
	   *	SCT Write Same (AC2)
	   *	SCT Error Recovery Control (AC3)
	   *	SCT Features Control (AC4)
	   *	SCT Data Tables (AC5)
	Master password revision code = 1
	not	frozen
	not	expired: security count
	not	supported: enhanced erase
	Security level high
Logical Unit WWN Device Identifier: 500000e043a28105
	NAA		: 5
	IEEE OUI	: 00000e
	Unique ID	: 043a28105
Checksum: correct

Evidently UBCD has a program on it that is supposed to bypass or disable ATA passwords. Something like ATA lockout tool. So if you have an ultimate boot disk, or can write one, you might be able to do it with that.