Author Topic: What happened to the 5th? (encryption)  (Read 13700 times)

KD5NRH

  • friends
  • Senior Member
  • ***
  • Posts: 10,926
  • I'm too sexy for you people.
Re: What happened to the 5th? (encryption)
« Reply #25 on: July 15, 2011, 01:09:17 AM »
One more thing....what if you forgot the passcode?

Or, like me, you occasionally like to produce broken encrypted stuff just to waste the time of anyone trying to crack something they found?

CDRs are cheap in bulk, so creating a CD image of encrypted data, then having a random number generator go through and flip some bits in that image before burning it to disk is also cheap.  Labeling it something suspicious but not inherently incriminating and putting it among all my other backups is downright amusing.

They can have my 600MB of assorted open source software when they pry it out of my cold, corrupted CDR.

(I also keep some similar files on many of the assorted 256MB-1GB flash drives I just can't bring myself to throw away.)

seeker_two

  • friend
  • Senior Member
  • ***
  • Posts: 12,922
  • In short, most intelligence is false.
Re: What happened to the 5th? (encryption)
« Reply #26 on: July 15, 2011, 08:10:07 AM »
I wonder if you can create an encryption that will open with one certain password and wipe the entire disc with another certain password.....and I wonder what the prosecution would do if you only "remembered" the second password......
Impressed yet befogged, they grasped at his vivid leading phrases, seeing only their surface meaning, and missing the deeper current of his thought.

birdman

  • friend
  • Senior Member
  • ***
  • Posts: 3,831
Re: What happened to the 5th? (encryption)
« Reply #27 on: July 15, 2011, 08:21:44 AM »
I wonder if you can create an encryption that will open with one certain password and wipe the entire disc with another certain password.....and I wonder what the prosecution would do if you only "remembered" the second password......

Wipe the entire disk?  They would probably charge you with destruction of govt property since it's more than likely they would transfer the encrypted file to a different system.  Even though it would be probably contained in a VM, I'm sure they would love the excuse to charge you with something even though it's an easily recreated VM with little to no intrinsic value...the install is still their property.

I'm with revdisk on this, while I hate this idea, it's hard to fight it.  I would think the best bet is some sort of encrypted embedding into other files...where your protected payload is embedded inside a group of other files, and that whole group encrypted.  The more layers of discovery, the better chance of it not being noticed...provide the initial key, they decrypt a bunch of normal stuff...they then have to discover/determine there is the embedded data, then attempt to get that data. 

Now, let's say there isn't a passcode or key, but rather a method (eg a steganographic method)...since now it's not a "key" but rather, you would have to disclose a series of actions you manually (ie entering a series of command line inputs one at a time that yield the steganographic embedding) performed, which is much closer to the normal things the 5th has been upheld to protect...is the legal situation different?

Ben

  • Administrator
  • Senior Member
  • *****
  • Posts: 46,169
  • I'm an Extremist!
Re: What happened to the 5th? (encryption)
« Reply #28 on: July 15, 2011, 09:55:12 AM »
Now, let's say there isn't a passcode or key, but rather a method (eg a steganographic method)...since now it's not a "key" but rather, you would have to disclose a series of actions you manually (ie entering a series of command line inputs one at a time that yield the steganographic embedding) performed, which is much closer to the normal things the 5th has been upheld to protect...is the legal situation different?

I always thought steganography was a cool way to hide data. Then I took a a SANS 401 class for work that included a lecture by an FBI agent on encryption, et al. He said that steganography was the number one method used by child pornographers to hide data. After that I always worried that if I were ever to hide something innocuous but private, like my master password list, inside say, a picture of Zardoz, then for whatever reason have my computer searched, when they found the size anomaly in  the Zardoz image, I'd automatically be suspected of child pornography.

I would hate to go from the generic, "What are you hiding?" to, "You dirty filth, you must be a pornographer and we're going to ruin your life!". At that point I'd probably decrypt the file, even though from the freedom perspective I shouldn't have to.

In that same class, they mentioned that the Chinese use the same flags for steganography, and other forms of encryption are also immediately suspect of anything from "cultural pollution" to spying, and that their methods for "requesting" access are somewhat less pleasant than ours. They cited a few cases where fed.gov workers went to China with encryption on their laptops and required Embassy intervention. Of course I would never suggest anyone travel to China or elsewhere without using a sterile laptop with a VM and a tunnel to files that are stored somewhere else.
"I'm a foolish old man that has been drawn into a wild goose chase by a harpy in trousers and a nincompoop."

RevDisk

  • friend
  • Senior Member
  • ***
  • Posts: 12,633
    • RevDisk.net
Re: What happened to the 5th? (encryption)
« Reply #29 on: July 15, 2011, 04:36:06 PM »
I always thought steganography was a cool way to hide data. Then I took a a SANS 401 class for work that included a lecture by an FBI agent on encryption, et al. He said that steganography was the number one method used by child pornographers to hide data. After that I always worried that if I were ever to hide something innocuous but private, like my master password list, inside say, a picture of Zardoz, then for whatever reason have my computer searched, when they found the size anomaly in  the Zardoz image, I'd automatically be suspected of child pornography.

I would hate to go from the generic, "What are you hiding?" to, "You dirty filth, you must be a pornographer and we're going to ruin your life!". At that point I'd probably decrypt the file, even though from the freedom perspective I shouldn't have to.

In that same class, they mentioned that the Chinese use the same flags for steganography, and other forms of encryption are also immediately suspect of anything from "cultural pollution" to spying, and that their methods for "requesting" access are somewhat less pleasant than ours. They cited a few cases where fed.gov workers went to China with encryption on their laptops and required Embassy intervention. Of course I would never suggest anyone travel to China or elsewhere without using a sterile laptop with a VM and a tunnel to files that are stored somewhere else.

THAT, plus eleventy billion.   I beat that into corporate brass' skulls with a lead pipe.  Sterile laptop, bare minimum files necessary (individually selected), VPN back, only do work on the remote system back in the States.  US Customs can and does seize laptops for noncompliance with US export regs, which are quite large.  Add espionage, theft, government shenanigans, etc and you'd be a fool to bring a live production laptop loaded with not required files with you.

Done right, steg does not leave traces.  Few folks do it right.  You want to generate the base files yourself, and not leave the original files laying around.  This means good data organization, routine random number overwriting of your empty space on disks or whole disk encryption, and careful concealment of your steg software.   
 
Honestly, I would not even attempt doing it right if I was going to China or through US Customs.  Just because you're innocent doesn't mean you won't be found guilty.  I go completely sterile, minimal work via VPN, and wipe the laptop prior to bringing it back. 

At home, I don't keep data I don't need and I bloody well make sure it's wiped.  Old computers?  Rip out the HDs and destroy them.  Don't keep stuff you won't need.  Use TrueCrypt containers with plausible deniability, wipe and reload your computers on a regular basis (every year or so), prune your data as needed, and be careful how you dispose of information.  Crosscut shredders are cheap these days.  So is a blowtorch for old hard drives or thumb drives. 

Remember, just because you have nothing to hide doesn't mean you can't be hung anyways.  Having worked in compliance, I learned the hard way.  It is NOT possible to be in compliance with all the laws on the books.  No human on the planet knows all of them.  Heck, no human on the planet knows a FRACTION of them.  But you are still bound to follow all laws and regulations. 
"Rev, your picture is in my King James Bible, where Paul talks about "inventors of evil."  Yes, I know you'll take that as a compliment."  - Fistful, possibly highest compliment I've ever received.

GigaBuist

  • friends
  • Senior Member
  • ***
  • Posts: 4,345
    • http://www.justinbuist.org/blog/
Re: What happened to the 5th? (encryption)
« Reply #30 on: July 17, 2011, 10:44:42 PM »
Another fun tip from a guy that used to travel to China on business:

Photocopy the base of your laptop before you leave.  You know, where all the screw heads are.

See if they're still in the same place when you get back.

KD5NRH

  • friends
  • Senior Member
  • ***
  • Posts: 10,926
  • I'm too sexy for you people.
Re: What happened to the 5th? (encryption)
« Reply #31 on: July 18, 2011, 03:52:30 AM »
Rip out the HDs and destroy them.

After going through five laptop HDDs in the last two and a half years, I want to know where I can get some drives that don't destroy themselves in 6-8 months.

(SMART failure for bad sectors on all of them, 3 WD Caviars, two Hitachi Travelstars, four different laptops.)

EDIT TO ADD: how hard would it be to include something in BIOS or added to the HDD's firmware that would thrash the snot out of it after x number of failed password attempts?  Inducing bad sectors can't be all that hard, and a fully encrypted drive losing enough data that way to be unrecoverable is quite plausible.
« Last Edit: July 18, 2011, 03:55:57 AM by KD5NRH »

birdman

  • friend
  • Senior Member
  • ***
  • Posts: 3,831
Re: What happened to the 5th? (encryption)
« Reply #32 on: July 18, 2011, 08:27:15 AM »
After going through five laptop HDDs in the last two and a half years, I want to know where I can get some drives that don't destroy themselves in 6-8 months.

(SMART failure for bad sectors on all of them, 3 WD Caviars, two Hitachi Travelstars, four different laptops.)

EDIT TO ADD: how hard would it be to include something in BIOS or added to the HDD's firmware that would thrash the snot out of it after x number of failed password attempts?  Inducing bad sectors can't be all that hard, and a fully encrypted drive losing enough data that way to be unrecoverable is quite plausible.

Depends on the encryption and how the file is written...if it's block based and written sequentially, bad sectors would only trash the data in those blocks.  What you would want to do is compress, byte/block distribute (ie spread a given block across as many new blocks as possible), then compress.  With the proper distribution (basically a backwards error correct--you want the data to be as vulnerable as possible to "errors"), a single bad block would contaminate the entire data set.  With properly chosen encryption, distribution, and compression, you coud make it very sensitive to even small changes, however, that introduces substantial risk as well of data loss. 

Overall, I think it is becoming the case that you should write down or store on a computer anything you don't want read...if you want it secure, keep it in your head, our thoughts are still protected...I think

CNYCacher

  • friend
  • Senior Member
  • ***
  • Posts: 4,438
Re: What happened to the 5th? (encryption)
« Reply #33 on: July 18, 2011, 09:15:25 AM »
our thoughts are still protected...I think

Actually, this case is trying hard to prove the opposite.

As soon as the court rules (IF they do) that a password stored in your head is fair game to be revealed by compulsion, indefinite imprisonment, etc. then we have a precedent that your thoughts are not protected.  The entire 5th will come down brick by brick.
On two occasions, I have been asked [by members of Parliament], "Pray, Mr. Babbage, if you put into the machine wrong figures, will the right answers come out?" I am not able to rightly apprehend the kind of confusion of ideas that could provoke such a question.
Charles Babbage

T.O.M.

  • friend
  • Senior Member
  • ***
  • Posts: 6,413
Re: What happened to the 5th? (encryption)
« Reply #34 on: July 18, 2011, 10:32:43 AM »
Sorry I'm late to the party.  And, I'm sure that some of you may be surprised by what I'm about to say, given that my ex-prosecutor side tends to come out ni many arguments around here, but I have to say that this is exactly the type of situation that the 5th Amendment should apply to.  The request would compel a person to give up incriminating information.  In my mind, this case is a simple loser for the prosecution.  I would be very interested to read the final opinion on this issue, as I just can't see how you can legally argue this one in favor of the State.

No, I'm not mtnbkr.  ;)

a.k.a. "our resident Legal Smeagol."...thanks BryanP
"Anybody can give legal advice - but only licensed attorneys can sell it."...vaskidmark

birdman

  • friend
  • Senior Member
  • ***
  • Posts: 3,831
Re: What happened to the 5th? (encryption)
« Reply #35 on: July 18, 2011, 11:37:42 AM »
Sorry I'm late to the party.  And, I'm sure that some of you may be surprised by what I'm about to say, given that my ex-prosecutor side tends to come out ni many arguments around here, but I have to say that this is exactly the type of situation that the 5th Amendment should apply to.  The request would compel a person to give up incriminating information.  In my mind, this case is a simple loser for the prosecution.  I would be very interested to read the final opinion on this issue, as I just can't see how you can legally argue this one in favor of the State.



What is your opinion on forcing someone to give up the key to a physical enclosure (building, safe, etc) or deliver records, etc. and it's comparison to this case?

230RN

  • saw it coming.
  • friend
  • Senior Member
  • ***
  • Posts: 18,926
  • ...shall not be allowed.
Re: What happened to the 5th? (encryption)
« Reply #36 on: July 18, 2011, 11:45:22 AM »
I wonder if this isn't a gamble to set precedent.  Suppose there's a 50-50 (25-75?  10-90?) chance of the prosecution's winning in this case.  Would it be worth it to the prosecution/government to try to get it through SCOTUS to "bring down" any and all encryption techniques?

After all, if the government can compel an accused to provide a key, then there's no point in doing any encryption. Thus a lot of e-stuff related to terrorism, etc, would become an open book.

Perhaps a naive thought, but I can't help wondering about it.

After all, running things past the Supreme Court nowadays is a dicey, chancy thing, and if "they" lose the case, they really haven't "lost" anything, and if they win, they win big.  Might be worth only a 10% chance of winning to try it.

Terry, 230RN
« Last Edit: July 18, 2011, 11:51:54 AM by 230RN »
WHATEVER YOUR DEFINITION OF "INFRINGE " IS, YOU SHOULDN'T BE DOING IT.

RevDisk

  • friend
  • Senior Member
  • ***
  • Posts: 12,633
    • RevDisk.net
Re: What happened to the 5th? (encryption)
« Reply #37 on: July 18, 2011, 12:05:22 PM »

After going through five laptop HDDs in the last two and a half years, I want to know where I can get some drives that don't destroy themselves in 6-8 months.

(SMART failure for bad sectors on all of them, 3 WD Caviars, two Hitachi Travelstars, four different laptops.)

EDIT TO ADD: how hard would it be to include something in BIOS or added to the HDD's firmware that would thrash the snot out of it after x number of failed password attempts?  Inducing bad sectors can't be all that hard, and a fully encrypted drive losing enough data that way to be unrecoverable is quite plausible.

That is why forensics folks do a hard drive replication and always work off the copy.


Sorry I'm late to the party.  And, I'm sure that some of you may be surprised by what I'm about to say, given that my ex-prosecutor side tends to come out ni many arguments around here, but I have to say that this is exactly the type of situation that the 5th Amendment should apply to.  The request would compel a person to give up incriminating information.  In my mind, this case is a simple loser for the prosecution.  I would be very interested to read the final opinion on this issue, as I just can't see how you can legally argue this one in favor of the State.


First off, I'd like to say thank you.   Usually cases are only mentioned if they border on insanity.   We forget that thousands of judges are decent folks.

Unfortunately, as far as I know, the above is also a minority opinion.   Our laws often have trouble keeping up with technology.
"Rev, your picture is in my King James Bible, where Paul talks about "inventors of evil."  Yes, I know you'll take that as a compliment."  - Fistful, possibly highest compliment I've ever received.

T.O.M.

  • friend
  • Senior Member
  • ***
  • Posts: 6,413
Re: What happened to the 5th? (encryption)
« Reply #38 on: July 18, 2011, 02:04:21 PM »
What is your opinion on forcing someone to give up the key to a physical enclosure (building, safe, etc) or deliver records, etc. and it's comparison to this case?

Well, when I was prosecuting, and had the key situation come up, we usually gave the person a choice.  Give up the key or the lock is getting cut off.  In one case I remember well, it was give up the combination to the gun safe or they are going to force entry.  He gave up the combination because he had a couple of nice shotguns inside he didn't want damaged (along with his homemade kiddie p0rn).   You aren't forcing the defendant to do anything here but minimize damage to his/her property.  With the password, it's clearly a situation where you are forcing a person to give a statement.  If nothing else, it's a statement of ownership, because by giving the password, you are acknowledging everything protected by that password, as well as knowledge of the contants.

And RevDisc, you're right on several points.  They do always replicate teh hard drive and work on the copy.  It's the only way to properly preserve the evidence on the machine.  And, you're also right in that the law and technology aren't on the same page.  Not by a long shot.  A lot of courts in Ohio don't recognize filing by fax, much less by other electronic means.
No, I'm not mtnbkr.  ;)

a.k.a. "our resident Legal Smeagol."...thanks BryanP
"Anybody can give legal advice - but only licensed attorneys can sell it."...vaskidmark

KD5NRH

  • friends
  • Senior Member
  • ***
  • Posts: 10,926
  • I'm too sexy for you people.
Re: What happened to the 5th? (encryption)
« Reply #39 on: July 18, 2011, 03:56:54 PM »
That is why forensics folks do a hard drive replication and always work off the copy.

And how do they do that?  Assuming they disconnect it from the machine it's in, there are a few ways that a small circuit on (or inside) the drive could detect a disconnect without falsing on a simple power shutdown.  (continuity between the various ground pins on an SATA or PATA connector, or ground pin and shell on USB for example - even if this isn't maintained at the controller, it would be trivial to short those pins together in the cable or at the controller-side connector)  It doesn't take a lot of power to scramble a fair swath of data, and most of the desktop drives I've disassembled had room for a button cell battery, microcontroller to handle the processing, and the wiring to just start sending random bits to the write heads.  Anyone determined to do Really Bad Things could set up a clean room to install the circuit in drives for their operatives, and now that I think about it, it sounds like a half decent product for various black markets.  (Not working too closely together, so that any potential weakness isn't necessarily consistent among all designs.)

HankB

  • friend
  • Senior Member
  • ***
  • Posts: 16,668
Re: What happened to the 5th? (encryption)
« Reply #40 on: July 18, 2011, 04:53:05 PM »
Well, when I was prosecuting, and had the key situation come up, we usually gave the person a choice.  Give up the key or the lock is getting cut off.  In one case I remember well, it was give up the combination to the gun safe or they are going to force entry.
Hmmm . . . if the individual was storing primers or black powder in the safe, some types of forced entry could be hazardous.
Trump won in 2016. Democrats haven't been so offended since Republicans came along and freed their slaves.
Sometimes I wonder if the world is being run by smart people who are putting us on, or by imbeciles who really mean it. - Mark Twain
Government is a broker in pillage, and every election is a sort of advance auction in stolen goods. - H.L. Mencken
Patriotism is supporting your country all the time, and your government when it deserves it. - Mark Twain

AZRedhawk44

  • friends
  • Senior Member
  • ***
  • Posts: 13,981
Re: What happened to the 5th? (encryption)
« Reply #41 on: July 18, 2011, 05:44:19 PM »
Hmmm . . . if the individual was storing primers or black powder in the safe, some types of forced entry could be hazardous.

Which has nothing to do with encryption.

Well, when I was prosecuting, and had the key situation come up, we usually gave the person a choice.  Give up the key or the lock is getting cut off.  In one case I remember well, it was give up the combination to the gun safe or they are going to force entry.  He gave up the combination because he had a couple of nice shotguns inside he didn't want damaged (along with his homemade kiddie p0rn).   You aren't forcing the defendant to do anything here but minimize damage to his/her property.  With the password, it's clearly a situation where you are forcing a person to give a statement.  If nothing else, it's a statement of ownership, because by giving the password, you are acknowledging everything protected by that password, as well as knowledge of the contants.

And RevDisc, you're right on several points.  They do always replicate teh hard drive and work on the copy.  It's the only way to properly preserve the evidence on the machine.  And, you're also right in that the law and technology aren't on the same page.  Not by a long shot.  A lot of courts in Ohio don't recognize filing by fax, much less by other electronic means.

Which invalidates the concern over "damage" to contents of the drive.

If adjudicated "not guilty" the suspect party is getting all his original computer equipment back intact.  No acetylene torches used to "brute force" and destroy contents of the drive, since the technicians will be working against copies of the data rather than original data.


I'm thinking that a doubled password is just the ticket... but give them NOTHING.  If they happen to get lucky and find the "bad" password (if you had anything "bad"), you say "You're manufacturing information" and provide the "good" password in your defense that shows embarassing, but not illegal, data.  Then they have to prove that their forensic trail isn't suspect, and that the technique they used is even legitimate.  90% of the time I bet the whole debate then goes right over the top of the jury and they acquit out of frustration.
"But whether the Constitution really be one thing, or another, this much is certain - that it has either authorized such a government as we have had, or has been powerless to prevent it. In either case, it is unfit to exist."
--Lysander Spooner

I reject your authoritah!

birdman

  • friend
  • Senior Member
  • ***
  • Posts: 3,831
Re: What happened to the 5th? (encryption)
« Reply #42 on: July 18, 2011, 05:48:38 PM »
Well, when I was prosecuting, and had the key situation come up, we usually gave the person a choice.  Give up the key or the lock is getting cut off.  In one case I remember well, it was give up the combination to the gun safe or they are going to force entry.  He gave up the combination because he had a couple of nice shotguns inside he didn't want damaged (along with his homemade kiddie p0rn).   You aren't forcing the defendant to do anything here but minimize damage to his/her property.  With the password, it's clearly a situation where you are forcing a person to give a statement.  If nothing else, it's a statement of ownership, because by giving the password, you are acknowledging everything protected by that password, as well as knowledge of the contants..

Okay, in the key/combo situation, is there a contempt charge precedent in there if they don't choose to provide the key or combo?

Thanks for your inputs, I'm even more wary now...again, my worst fear is:
What if you manually scramble the data (specific, manually entered, bit-wise shuffles (or manually doing a block cypher, but each step executed on the system)--now the "key" is the order and specifics of a series of actions.  Could they then force you to reveal your actions, as they constitute the encryption key?  Seems like that's the same as holding someone until they tell you exactly what other actions they performed.  Overall, this is a horrible precedent if it goes through.

KD5NRH

  • friends
  • Senior Member
  • ***
  • Posts: 10,926
  • I'm too sexy for you people.
Re: What happened to the 5th? (encryption)
« Reply #43 on: July 18, 2011, 06:09:09 PM »
Which has nothing to do with encryption.

It's not a whole lot different from keeping your virus collection on an encrypted drive.

RevDisk

  • friend
  • Senior Member
  • ***
  • Posts: 12,633
    • RevDisk.net
Re: What happened to the 5th? (encryption)
« Reply #44 on: July 20, 2011, 12:20:46 AM »
Well, when I was prosecuting, and had the key situation come up, we usually gave the person a choice.  Give up the key or the lock is getting cut off.  In one case I remember well, it was give up the combination to the gun safe or they are going to force entry.  He gave up the combination because he had a couple of nice shotguns inside he didn't want damaged (along with his homemade kiddie p0rn).   You aren't forcing the defendant to do anything here but minimize damage to his/her property.  With the password, it's clearly a situation where you are forcing a person to give a statement.  If nothing else, it's a statement of ownership, because by giving the password, you are acknowledging everything protected by that password, as well as knowledge of the contants.

And RevDisc, you're right on several points.  They do always replicate teh hard drive and work on the copy.  It's the only way to properly preserve the evidence on the machine.  And, you're also right in that the law and technology aren't on the same page.  Not by a long shot.  A lot of courts in Ohio don't recognize filing by fax, much less by other electronic means.

Having established an ounce of credibility regarding IT forensics, let me make this statement.  IT forensics is even more of a joke than normal forensics.  Many kinds of normal forensics has a very long way to go before they can or should be considered science.  DNA forensics is solid, if done correctly.  Even bedrock solid "forensics" such as fingerprints is...  less than optimal.  By less than optimal, I mean any scientist trying to make such claims would be burned at the stake, deservingly so.  Collaborative Testing Service ran a test (the FIRST test, in 1995!) of 156 professionals asked to identify four suspect cards with prints of all ten fingers against seven latents.  44% did so correctly.  

k, so normal forensics is bad, but not horrifically bad.  IT forensics...  trust me, I could easily, trivially and casually frame a person on "IT evidence".  With automated tools, that I could teach a 12 year old to operate.  Leaving no marks that any IT forensics geek could possibly disprove.  I know this, because I was bloody trained to do so by IT forensic geeks.

Only useful purpose for IT forensics is to hang morons, or for superficially convincing reason to hang someone you really want to hang on but can't otherwise nail.  Forensics is more alchemy than science.  I don't know the proper analogy for IT forensics.  Using a witch doctor analogy is providing way too much credibility.  

I am not some "truth'er" or other nut job that thinks rainbows in a sprinkler is an NSA conspiracy.  I've been a geek since I could walk.  I know and have gotten drunk with the best computer forensics folks in the world (in Vegas, heh, some GREAT stories there).  Heck, I could be one of the best computer forensics folks in the world if I had less integrity or ability to feel shame.  I can provide proof and working examples of everything I mentioned.  



And how do they do that?  Assuming they disconnect it from the machine it's in, there are a few ways that a small circuit on (or inside) the drive could detect a disconnect without falsing on a simple power shutdown.  (continuity between the various ground pins on an SATA or PATA connector, or ground pin and shell on USB for example - even if this isn't maintained at the controller, it would be trivial to short those pins together in the cable or at the controller-side connector)  It doesn't take a lot of power to scramble a fair swath of data, and most of the desktop drives I've disassembled had room for a button cell battery, microcontroller to handle the processing, and the wiring to just start sending random bits to the write heads.  Anyone determined to do Really Bad Things could set up a clean room to install the circuit in drives for their operatives, and now that I think about it, it sounds like a half decent product for various black markets.  (Not working too closely together, so that any potential weakness isn't necessarily consistent among all designs.)

Block transfers.  There are plenty of overpriced devices that you slap the original HD and a blank HD into, hit a button, and it will give you a bit accuracy copy of the original HD.  It's standard practice.  It doesn't load the OS, it goes straight to the lowest level.  Oversimplified?  HD reads a 0, it copies a 0.  HD reads a 1, it copies a 1.  

And yes, folks have tried to implement ways of detecting this and other forms of hardware hacking.  Photovoltic cells inside of chips, pressurized sections, etc.  All of which can and have been bypassed.  For PV cells, you simply don't allow any light.  For pressurized sections, you do your work in a pressurized baggie with nitrogen to the right PSI.  etc etc.  For hard drives, it's even easier.  You can take out the platters, and slap them into another enclosure.  It's done on a regular basis for data recovery.


Which has nothing to do with encryption.

Which invalidates the concern over "damage" to contents of the drive.

If adjudicated "not guilty" the suspect party is getting all his original computer equipment back intact.  No acetylene torches used to "brute force" and destroy contents of the drive, since the technicians will be working against copies of the data rather than original data.


I'm thinking that a doubled password is just the ticket... but give them NOTHING.  If they happen to get lucky and find the "bad" password (if you had anything "bad"), you say "You're manufacturing information" and provide the "good" password in your defense that shows embarassing, but not illegal, data.  Then they have to prove that their forensic trail isn't suspect, and that the technique they used is even legitimate.  90% of the time I bet the whole debate then goes right over the top of the jury and they acquit out of frustration.

Ayep.  Hence why folks go with the plausible deniability encryption.  It works against "lead pipe cryptoanalysis", the joking term for physical coercion.  Trust me, crypto geeks have thought of every friggin possibility and developed countermeasures for the overwhelming majority.  The overwhelming majority of folks don't care enough to do it right, and doing it even slightly wrong invalidates a lot of security.



Okay, in the key/combo situation, is there a contempt charge precedent in there if they don't choose to provide the key or combo?

Thanks for your inputs, I'm even more wary now...again, my worst fear is:
What if you manually scramble the data (specific, manually entered, bit-wise shuffles (or manually doing a block cypher, but each step executed on the system)--now the "key" is the order and specifics of a series of actions.  Could they then force you to reveal your actions, as they constitute the encryption key?  Seems like that's the same as holding someone until they tell you exactly what other actions they performed.  Overall, this is a horrible precedent if it goes through.

Re key or combo, I'm not a judge, but for the most part, no.  They call a locksmith, who usually just drills or torches the thing open.  (Another rant, locksmiths, blah!)

Second part, ayep.  They'd hit you with contempt charges until you fold like origami.  Respectfully speaking, 99.999% of lawyers, judges and prosecutors know barely more than Microsoft Office.  (Trust me, I worked for lawyers, they thanked the Gods for being given a geek.)  TrueCrypt or homebrew crypto (always a bad idea) is a black box to them that they don't really understand, and don't really care to understand.  

And yes, it is.  
"Rev, your picture is in my King James Bible, where Paul talks about "inventors of evil."  Yes, I know you'll take that as a compliment."  - Fistful, possibly highest compliment I've ever received.

T.O.M.

  • friend
  • Senior Member
  • ***
  • Posts: 6,413
Re: What happened to the 5th? (encryption)
« Reply #45 on: July 20, 2011, 10:23:57 AM »
Okay, in the key/combo situation, is there a contempt charge precedent in there if they don't choose to provide the key or combo?


No.  It was just a situation where we had a warrant for the contents of the safe, and you gave the subject the option...tell us how to open the safe or you won't have a safe when all is said and done.  In pure theory, a search warrant is a court order, and failure to comply with the order could be contempt.  Never researched that issue before.
No, I'm not mtnbkr.  ;)

a.k.a. "our resident Legal Smeagol."...thanks BryanP
"Anybody can give legal advice - but only licensed attorneys can sell it."...vaskidmark

T.O.M.

  • friend
  • Senior Member
  • ***
  • Posts: 6,413
Re: What happened to the 5th? (encryption)
« Reply #46 on: July 20, 2011, 10:39:45 AM »
Rev,
You have just hit on some of the biggest fears of people within the justice system, be it criminal or civil, which is the ability of anyone to manufacture evidence that cannot be discerned from real evidence.  It's a real concern among judges and lawyers that in many situations, the advance of digital technology is putting the entire world of evidence in jeopardy.  No one uses film anymore, and digital photos are so easily manipulated that the value of photo evidence is starting to come into question.  Same for digital video.  You mention fingerprints.  Digital images of fingerprints are all the rage, and just as much a concern.  And don't get me started on all of the digital record keeping.

I know that teh trend around here is to fear the .gov using technology in this way, but it goes way beyond that.  Alter digital x-rays in a malpractice suit to get money from a doctor.  insurance company creates a set of digital photos or a digital video to use to deny your claim.  A candidate for office uses alterred digital photos or records to destroy the image of an opponent.  Piss off a neighbor, and suddenly he's got photos of you growing weed in your backyard, which he turns over to the PD, resulting in a search warrant that finds the weed he planted there.

It is truly endless, and frightening.  How does a court ensure that the evidence being offered is authentic, given the level of technology we have no, much less that which is just around the corner? 

No, I'm not mtnbkr.  ;)

a.k.a. "our resident Legal Smeagol."...thanks BryanP
"Anybody can give legal advice - but only licensed attorneys can sell it."...vaskidmark

birdman

  • friend
  • Senior Member
  • ***
  • Posts: 3,831
Re: What happened to the 5th? (encryption)
« Reply #47 on: July 20, 2011, 11:34:39 AM »
Ironically, the best methods for authentication come along with the best methods for encryption.  If a camera generates an appropriately constructed hash digest of the image, then encrypts that digest and imbeds it steganographically into the LSB of the image, there would be no way to remove it (if done appropriately), and it would provide a cryptographically secure way of ensuring the image is unaltered, as any modification would render the original hash unrecoverable.

CNYCacher

  • friend
  • Senior Member
  • ***
  • Posts: 4,438
Re: What happened to the 5th? (encryption)
« Reply #48 on: July 20, 2011, 11:52:22 AM »
Ironically, the best methods for authentication come along with the best methods for encryption.  If a camera generates an appropriately constructed hash digest of the image, then encrypts that digest and imbeds it steganographically into the LSB of the image, there would be no way to remove it (if done appropriately), and it would provide a cryptographically secure way of ensuring the image is unaltered, as any modification would render the original hash unrecoverable.

And how do you stop someone faking the hash after they modify the image.

Even assuming that there is a secret key in the camera, physical access to the camera is all you would need to be able to fake this.    Access to the secret key would be needed to validate the authenticity of the image anyway, so how do you protect the secret key from attackers while making it available to prosecutors?
On two occasions, I have been asked [by members of Parliament], "Pray, Mr. Babbage, if you put into the machine wrong figures, will the right answers come out?" I am not able to rightly apprehend the kind of confusion of ideas that could provoke such a question.
Charles Babbage

KD5NRH

  • friends
  • Senior Member
  • ***
  • Posts: 10,926
  • I'm too sexy for you people.
Re: What happened to the 5th? (encryption)
« Reply #49 on: July 20, 2011, 12:02:32 PM »
And yes, folks have tried to implement ways of detecting this and other forms of hardware hacking.  Photovoltic cells inside of chips, pressurized sections, etc.  All of which can and have been bypassed.  For PV cells, you simply don't allow any light.  For pressurized sections, you do your work in a pressurized baggie with nitrogen to the right PSI.  etc etc.

All this assumes they know what's being used.  (And, for that matter, that the small-town cops who did the original raid didn't just yank out the drive and stand there wondering why it was making whirring noises with nothing plugged in.)