Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

Computer Expert and FBI/encryption

Computer Expert and FBI/encryption

--------------------------------------------------------------------------------

Hey guys,
Just a tidbit of info here sent to me by a computer geek friend of mine. Apparently a computer security expert attended a seminar earlier this year on computer security and one of the speakers was a FBI agent.

The following is from the security experts web blog detailing Q&A at the seminar as it relates to computer encryption.

Best regards,
MaxRep

PS: anyone interested in keeping up with this computer expert's blog, here is the link:
http://blogs.ittoolbox.com/security/investigator/
__________________________________________________ ______________

A Day in the Life of an Information Security Investigator
Blog Main | Blog Archive | Author Bio | | Connect to this blog
Previous Entry | Next Entry
FBI: Encryption Really Pisses Us Off
Security Monkey (Information Security Investigator) Posted 5/23/2007
Comments (28) | Trackbacks (0)


I spent today dressed up in my monkey incognito suit at the 2007 ISSA Symposium in Phoenix. There were lots of great presentations and interesting security folks to exchange information with.

One presentation was particularly informative and a bit humorous for me.

The information was presented by an FBI Special Agent on the basics of forensics. It was a very good summary - however the best part was the questions asked afterward. This is the part that made me chuckle (those of you that know how I feel about encountering encryption during an investigation know why I'm laughing).

This is a paraphrase of the conversation from my memory and the notes that I made on a drink napkin (that will teach me to not bring my laptop).


Attendee: "How do you deal with encrypted media and information during an investigation?"

Special Agent: *grimaces*

Special Agent: "For the most part encryption is a dead end for us, unless the evidence deals with a matter of National Security / Terrorism."

Attendee: "So what do you do if it involves National Security?"

Special Agent: "We don't work on it. We send it to a sister agency *cough* NSA *cough* that takes care of that for us. They have no problem dealing with such things."

Let me put this into perspective for you all based on the SA's other comments:

1) If an attacker breaks into your systems and encrypts all of your data and the damage is greater than $500k, they'll investigate but they won't recover your data. You are $%@! out of luck.

2) If you're a warez kiddy, KP connoisseur, or gang member and you encrypt your stuff and don't leave the passphrase in an easily recoverable place (and they don't recover the passphrase via social engineering or interviewing techniques), they aren't going to attempt to break your encryption.

3) If you're a terrorist, or threatening the President, or building a dirty bomb... your encrypted data will be put on a special plane and flown to the NSA in a matter of hours. It will be broken. You will be prosecuted/tortured/shot/mysteriously disappear. :-)~

Some other comments that were interesting:

The FBI still has their "mega contract" with Microsoft. They have infinite Microsoft resources to help them figure out how to get to your stuff if you've used a Microsoft encryption solution.

The FBI has particular trouble with Apple's Filevault encryption if the passphrase is of "excellent" quality. That tells me they have thousands of monkeys doing brute-force attempts on filevault sparseimage files. Interesting.

These comments made me feel better.

It would appear that I'm not the only one that gets rather pissed off when I find an encrypted file or filesystem during a forensic investigation - but I drink much better coffee.

Chief

For tales of my battles with encryption, read my Case Files. You may lose a day or two of productivity.
 
you'd be surprised how easy most people's passwords are. I work, as a side job, fixing peoples computers and setting up their networks, almost 50 percent of the time, the password is unset, the other 50 percent it's something easy like "password" or "password1" or something obvious. Most people aren't creative with their passwords. In fact, I have fairly simple passwords on what I call "throw away" web sites, but when it comes to online banking, important sites, my password is changed to something no one would think of.. It's important that you set your password to something that isn't obvious so that a hacker or the govt. can't easily decrypt it. But I'm glad you presented us with this article..I only hope it's true :)
 
Never rely on microsoft or any other closed source for your encryption needs.


For Encryption:

http://www.truecrypt.org/


For Encrypted Password Storage:

http://keepass.info/


Both are open source and uber encryption. They can be trusted.


For information on how to choose an effective passphrase:

http://www.unix-ag.uni-kl.de/~conrad/krypto/passphrase-faq.html

http://en.wikipedia.org/wiki/Passphrase










As I've mentioned in other threads, the Feds don't present a realistic threat to effective encryption if you handle your passphrases with care. Where Law Enforcement is going to get you is if they install a keylogger on your computer and capture you typing your passphrase -or if you're too stupid to use an effective passphrase.

I hae serious doubts about the NSA's ability to crack the encryption in a timely manner with the above programs - some apple or microsoft encryption - sure. Besides as I mentioned - the NSA doesn't give a fuck about law enforcement (steriods).
 
muffinmaker said:
3) If you're a terrorist, or threatening the President, or building a dirty bomb... your encrypted data will be put on a special plane and flown to the NSA in a matter of hours. It will be broken. You will be prosecuted/tortured/shot/mysteriously disappear. :-)~


I don't doubt they will try, but I doubt even the NSA can break the strongest implementations of encryption in hours. In fact, I'd be suprised if the they could break the strongest encryption in any length of time for it to be of any value. Just my speculation, but I think they'd like you to beleive they can. It's part of the cloak and dagger of intelligence - that they can own everything. It's doubtful IMHO.

What they will do is waterboard your ass, you'll give them the passphrase.

If that's cracking the encryption, sure they can do that - for your pussy ass - in about 10 minutes.

LOL
 
I was in Vegas for the AVN Awards.
During that time the Consumer Electronics Expo is going on.
As I walked past the entrance I notice a huge screen that showed peoples secure email and passwords that were used with some of the parts of the passwords blocked out.
If you used any hotel to access you email it was up there with the log in and password.
Nothing is safe.
 
slat1 said:
I was in Vegas for the AVN Awards.
During that time the Consumer Electronics Expo is going on.
As I walked past the entrance I notice a huge screen that showed peoples secure email and passwords that were used with some of the parts of the passwords blocked out.
If you used any hotel to access you email it was up there with the log in and password.
Nothing is safe.



People logging into their webmail via HTTP - free of encryption - so ids / passwords are sniffed right off the network in clear, that's all.... the Black Hat expo is most likely what you ran into, or a similar event.

Word is, it's not safe to use your ATM card when those shows roll through town...
 
slat1 said:
I was in Vegas for the AVN Awards.
During that time the Consumer Electronics Expo is going on.
As I walked past the entrance I notice a huge screen that showed peoples secure email and passwords that were used with some of the parts of the passwords blocked out.
If you used any hotel to access you email it was up there with the log in and password.
Nothing is safe.

did you go to the AVN?? I dream to go there some day...:(
 
jh1 said:
SLAT is being modest. He not only went, he won a few awards.


Gay Porn.

LOL

I told a gay guy the other day if I was going to be gay I would bang the dood that looked like that hottest chick.

He flat out told me I could never be gay!

I don't dress well enough anyway...
 
slat1 said:
LOL

I told a gay guy the other day if I was going to be gay I would bang the dood that looked like that hottest chick.

He flat out told me I could never be gay!

I don't dress well enough anyway...

...no u kinda look gay... :artist: just kidding.
 
I've been using drivecrypt for the past 5 years but have recently switched to truecrypt as i'm worried about backdoors now that drivecrypt is soo mainstream.
 
So if I encrpty all my files on my computer with drivecrpyt and they come to my house and raid for my 150 bucks of juice and take my computer they cant access my files unless i give them my password or they figure it out?
 
errn247 said:
So if I encrpty all my files on my computer with drivecrpyt and they come to my house and raid for my 150 bucks of juice and take my computer they cant access my files unless i give them my password or they figure it out?

You should embed a truecrypt partion inside a truecrypt partition. You are required by law to give up your keyfiles and password. Give up the outer one, put a bunch of personal files on that partition that look like they should be encrypted and then have another passworded, keyed partition hiding inside.
 
redguru said:
You should embed a truecrypt partion inside a truecrypt partition. You are required by law to give up your keyfiles and password. Give up the outer one, put a bunch of personal files on that partition that look like they should be encrypted and then have another passworded, keyed partition hiding inside.


especially effective against the waterboarding technique of cracking encryption..
 
jh1 said:
especially effective against the waterboarding technique of cracking encryption..

Agreed, I am working on trying to encrypt an entire machine with a USB drive and Debian Linux right now. The entire computer including OS will be worthless without the jump drive and my alphanumeric password.
 
so how do I go about doing this. I am as you can tell a computer retard. Can i go on and encrpt all my internet visitations like to EF and other sites? How do I get a copy of this stuff?
 
Top Bottom