What's new
  • ICMag with help from Landrace Warden and The Vault is running a NEW contest in November! You can check it here. Prizes are seeds & forum premium access. Come join in!

Research team finds disk encryption foils law enforcement efforts

Headbandf1

Bent Member
Veteran
http://www.physorg.com/news/2011-11-team-disk-encryption-foils-law.html (PhysOrg.com) -- A joint U.S./UK research team has found that common encryption techniques are so good that law enforcement, from local to highly resourceful federal agencies, are unable to get at data on a computer hard disk that could be used to prove the guilt of people using the computer to perpetuate crimes. In looking at the current technology, the team, as they describe in their paper published in Digital Investigation, find that if criminals use commonly available hard drive encryption software, law enforcement very often is unable find anything that can be used against them. Contrary to what we all see in the movies and on television, cracking an encrypted drive is not a simple thing; in fact, it’s so difficult that if someone has encrypted their hard drive, there is apparently little law enforcement (or anyone else) can do read the data on the drive. Adding to the frustration, at least on the part of law enforcement, is the fact that they can’t force people to give up their passwords. The authors of the report suggest there are some things law enforcement can do, but they all must happen prior to a drive being buttoned up by encryption. Specifically, they say that law enforcement should stop turning computers off to bring them to another location for study, doing so only causes the need for a password to be entered to read the encrypted data. Also, in some cases, doing so causes the data to be automatically destroyed. Fortunately, there are some tools forensics experts can use to gather data if it sits untouched, such as copying everything in memory to a separate disk. The team also suggests that law enforcement look first to see if the drive has been encrypted before scanning it with their own software, as doing so will likely result in a lot of wasted time. The unfortunate bottom line though, is that the authors openly admit that once the drive is encrypted, there is little to nothing to be done, which a lot of criminals are surely going to be really pleased to hear. The team suggests that the government embark on a research mission of its own to figure out a way to subvert encrypted drives or it will find itself with little reason to bother confiscating computers used by criminals to commit crimes in the future. More information: The growing impact of full disk encryption on digital forensics, Digital Investigation, In Press. doi:10.1016/j.diin.2011.09.005 Abstract The increasing use of full disk encryption (FDE) can significantly hamper digital investigations, potentially preventing access to all digital evidence in a case. The practice of shutting down an evidential computer is not an acceptable technique when dealing with FDE or even volume encryption because it may result in all data on the device being rendered inaccessible for forensic examination. To address this challenge, there is a pressing need for more effective on-scene capabilities to detect and preserve encryption prior to pulling the plug. In addition, to give digital investigators the best chance of obtaining decrypted data in the field, prosecutors need to prepare search warrants with FDE in mind. This paper describes how FDE has hampered past investigations, and how circumventing FDE has benefited certain cases. This paper goes on to provide guidance for gathering items at the crime scene that may be useful for accessing encrypted data, and for performing on-scene forensic acquisitions of live computer systems. These measures increase the chances of acquiring digital evidence in an unencrypted state or capturing an encryption key or passphrase. Some implications for drafting and executing search warrants to dealing with FDE are discussed.
 
security.png
 

mushhead

Member
@Whatsupdoc in a lawless society, a society which the police follow no rules, that would be so true. We are close to that now, but still not quite there.
 

Tony Aroma

Let's Go - Two Smokes!
Veteran
If you are running Mac OS, you have built-in encryption for your hard drive. It's called File Vault. You can also encrypt and password protect any individual files or folders by making them into disk images. Either one of those options makes access without a password virtually impossible.
 

Phillthy

Seven-Thirty
ICMag Donor
Veteran
there have been cases where the hacker was forced to give up his encryption keys.
 

Harry Gypsna

Dirty hippy Bastard
Veteran
Here in the UK, by law you have to give it up.
There was a 17 yr old over here, got locked up for refusing to give the passwords when coming through the airport. There was a paedo element to it I think, so not exactly a hero if that's the case, although I do remember reading that the sex allegations only came up, after he had told them no, so who knows.
Anyway, that's what forced means, they'll lock you up, until you give it up.
 

Voidling

Member
How much time would you serve for refusing to give up a password as to if they were to find incriminating evidence on the hard drive?

I've been suggesting truecrypt for a bit now, go with full hard drive encryption including the os. I wouldn't trust encryption coming from apple. Pretty sure a couple of companies already pressured RIM to give up the encryption on their blackberries to the government.
 

bugler

Member
true crypt folks, seriously!
It works like the movie inception, you know a dream within a dream? But this is encryption inside encryption. Basically you create an encrypted file, then another encrypted file inside it. You have 2 passwords, the first opens the first, the real password opens both. If forced to give up the password, you just give up the first and there is NO way to tell there is more.

Sounds complicated, but it wizards you right through it, encryps/decrypts on the fly and doesn't bog your computer down. You can even run a fully hidden and encrypted operating system INSIDE a visible but encrypted operating system. Whoa! I need Dicaprio to explain that one to me!

You want my password, beat me with a hammer, ok, stop twisting my arm, here it is. You'll find 1 picture of me jerking off, 1 taking a poop, stuff like that. Stuff they DON'T WANT to see, and can't unsee! No way to force me to give up the second password because there is no proof there is more encrypted data!

Truecrypt really is the win, just don't forget your passwords, you will not get back in!
 

northstate

Member
ICMag Donor
+ 1,000 for TrueCrypt running two files like Bugler's post. Also you must place some nasty pics of whatever so it burns in their mind...NS
 
couple of questions for the tech. challenged people like me, if sending emails cant the company like yahoo or gmail be subpoenaed to produce your potentially crimminall conspiracies? if so how would truecrypt help with communicating with others (not a rhetorical question)?
 
Thanks, from another threaD:
Originally Posted by icred
My 2cents.....

Do not talk on the phone as it's your voice and no deniability will exist.
Do not text on the phone as it's also on your callers phone, twice the risk.

Try this:
- Get a good PGP program (i.e. http://www.gnupg.org/).
- Share a secret key with them. Individually or as a group as you see fit.
- Share a GMail account(s) between you and your friend(s).
- Write your messages in say notepad and save the encrypted text into a GMail message.
- DO NOT "SEND" THE MESSAGE ANYWHERE. You just save it as a draft.
- Your friend(s) can log into the shared GMail account and download/decrypt and read the message(s).
- No mail ever gets sent. No message ever gets stored or goes out in the clear.
- Change secrets frequently and/or if you suspect a "problem" with a friend.
- Delete old messages ; Clear the trash ;-)

ICred.

Sounds about right huh? is pgp the same as encryption talked about here?
 
Thanks, from another threaD:
Originally Posted by icred
My 2cents.....

Do not talk on the phone as it's your voice and no deniability will exist.
Do not text on the phone as it's also on your callers phone, twice the risk.

Try this:
- Get a good PGP program (i.e. http://www.gnupg.org/).
- Share a secret key with them. Individually or as a group as you see fit.
- Share a GMail account(s) between you and your friend(s).
- Write your messages in say notepad and save the encrypted text into a GMail message.
- DO NOT "SEND" THE MESSAGE ANYWHERE. You just save it as a draft.
- Your friend(s) can log into the shared GMail account and download/decrypt and read the message(s).
- No mail ever gets sent. No message ever gets stored or goes out in the clear.
- Change secrets frequently and/or if you suspect a "problem" with a friend.
- Delete old messages ; Clear the trash ;-)

ICred.

Sounds about right huh? is pgp the same as encryption talked about here?

NICE!:tiphat:
 

NedFlanders

Member
Thanks, from another threaD:
Originally Posted by icred
My 2cents.....

Do not talk on the phone as it's your voice and no deniability will exist.
Do not text on the phone as it's also on your callers phone, twice the risk.

Try this:
- Get a good PGP program (i.e. http://www.gnupg.org/).
- Share a secret key with them. Individually or as a group as you see fit.
- Share a GMail account(s) between you and your friend(s).
- Write your messages in say notepad and save the encrypted text into a GMail message.
- DO NOT "SEND" THE MESSAGE ANYWHERE. You just save it as a draft.
- Your friend(s) can log into the shared GMail account and download/decrypt and read the message(s).
- No mail ever gets sent. No message ever gets stored or goes out in the clear.
- Change secrets frequently and/or if you suspect a "problem" with a friend.
- Delete old messages ; Clear the trash ;-)

ICred.

Sounds about right huh? is pgp the same as encryption talked about here?


They key here is to use an encryption program weather it be PGP or TrueCrypt. If you save your message as a draft it is still saved on the mail server and their backups.
 
G

growcodile

about the original article .. its true that well done disk encryption cannot be broken by LEO, but only when you use a cryptographically strong pass phrase !!

If you are running Mac OS, you have built-in encryption for your hard drive. It's called File Vault. You can also encrypt and password protect any individual files or folders by making them into disk images. Either one of those options makes access without a password virtually impossible.

i dont like filevault very much ...

* FileVault 1 only encrypted the user's directory
* it has a 24-character alphanumeric "recovery key"
* FileVault employs the user's login password as the encryption pass phrase. This discourages use of cryptographically strong pass phrases.

i really recommend http://www.truecrypt.org/


also TRUECRYPT has a concept called Plausible Deniability that works around this problem:

there have been cases where the hacker was forced to give up his encryption keys.

in short its a kind of hidden 2nd volume which CANNOT be found by LEO and if you have to give up the keys its only for the "fake" 1st volume containing only legal stuff ... bugler explained it very well :D


- Get a good PGP program (i.e. http://www.gnupg.org/).
- Share a secret key with them. Individually or as a group as you see fit.
- Share a GMail account(s) between you and your friend(s).

...

Sounds about right huh? is pgp the same as encryption talked about here?

PGP/GNUPG contain strong encryption but its most important to again say only when you use a cryptographically strong pass phrase !!
 

Yes4Prop215

Active member
Veteran
man i DLed truecrypt but have no idea how to install this read the FAQ and instructions but its like reading chinese.....

do i click and drag my "secret" files into true crypt and leave the basic files in the accessible harddrive....im kind of baffled how this process works...i like how the cops could "hack" into truecrypt but only get the first layer and not realize there is more encrypted files underneath the first crypt...
 

Latest posts

Latest posts

Top