Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-27 Thread James A. Donald

James A. Donaldjam...@echeque.com  writes:

Hidden compartment? What hidden compartment? If I have one, you are welcome
to search it. Go knock yourselves out.


On 2012-02-27 1:30 PM, Peter Gutmann wrote:

James, meet Bertha.  Sorry about her cold hands, just give her a minute to get
the gloves on.  In the meantime if you'll drop your trousers...


Yes, they can make me miss my flight, vandalize my luggage, and all 
that, but they cannot make me reveal that my truecrypt drive has a 
hidden inner volume.


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-27 Thread Joshua Engelman
James A. Donaldjam...@echeque.com  writes:

 Hidden compartment? What hidden compartment? If I have one, you are welcome
 to search it. Go knock yourselves out.

On 2012-02-27 1:30 PM, Peter Gutmann wrote:
 James, meet Bertha.  Sorry about her cold hands, just give her a minute to get
 the gloves on.  In the meantime if you'll drop your trousers...

James A. Donald wrote:
Yes, they can make me miss my flight, vandalize my luggage, and all that, but 
they cannot make me reveal that my truecrypt drive has a hidden inner 
volume.

There's a fundamental legal difference.  It's called the administrative search 
exemption.  Basically, the way the TSA can do such things is that they do it to 
everyone, and you are told beforehand that you will be subjected to 
such procedures.  If such a search is applied only to some, it would be a 
violation of the fourth amendment.  Similarly, secondary screening such as the 
unpleasantness you described is still illegal unless we get into Clear and 
Present territory.

Josh E
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread ianG

On 25/02/12 18:50 PM, Jon Callas wrote:


...We're not *stupid*.


Once upon a time ...ok skip the annoying anecdote and get to the question:

What would be the smallest steganography program that someone could type 
in and use to hide ones secret archive in plain site?


iang



...a long long time ago, I used to port network code on demand.  This 
was before the net.  So I had a bootstrapping problem.  This was before 
the time of compatible magnetic media too, I guess, but, every machine 
had a serial port.


I wrote a little network slave program in C, and a larger master one. 
The master one stayed on the primary source machine.  The slave one I 
typed in.  I got it down to around a page of C in time, and it would 
generally take under an hour to get it up and humming.  Oh, and I had a 
little home-made rs232 patch kit.  End of distracting anecdote.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread Jon Callas

On Feb 25, 2012, at 3:18 PM, Kevin W. Wall wrote:

 On Sat, Feb 25, 2012 at 2:50 AM, Jon Callas j...@callas.org wrote:
 
 [snip]
 
 But to get to the specifics here, I've spoken to law enforcement and
 border control people in a country that is not the US, who told me
 that yeah, they know all about TrueCrypt and their assumption is
 that *everyone* who has TrueCrypt has a hidden volume and if they
 find TrueCrypt they just get straight to getting the second password.
 They said, We know about that trick, and we're not stupid.
 
 Well, they'd be wrong with that assumption then.

Only from your point of view. From their point of view, the user is the one 
with wrong assumptions.

Remember what I said -- they're law enforcement and border control. In their 
world, Truecrypt is the same thing as a suitcase with a hidden compartment. 
When someone crosses a border (or they get to perform a search), hidden 
compartments aren't exempt. They get to search them. 

Also to them, Truecrypt is a suitcase that advertises a hidden compartment, and 
that's pretty useless, in their world.

 
 I asked them about the case where someone has TrueCrypt but doesn't
 have a hidden volume, what would happen to someone doesn't have one?
 Their response was, Why would you do a dumb thing like that? The whole
 point of TrueCrypt is to have a hidden volume, and I suppose if you
 don't have one, you'll be sitting in a room by yourself for a long
 time. We're not *stupid*.
 
 That's good to know then. I never had anything *that* secret to protect,
 so never bothered to create a hidden volume. I just wanted a good, cheap
 encrypted volume solution where I could keep my tax records and other
 sensitive personal info. And if law enforcement ever requested the password
 for that, I wouldn't hesitate to hand it over if they had the proper
 subpoena / court order. But I'd be SOL when then went looking for a second
 hidden volume simply because one doesn't exist. Guess if I ever go out of
 the country with my laptop, I'd just better securely wipe that partion.

Or just put something in it that you can show. 

Jon

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread Harald Hanche-Olsen
[Jon Callas j...@callas.org (2012-02-26 17:35:55 UTC)]

 On Feb 25, 2012, at 3:18 PM, Kevin W. Wall wrote:
  But I'd be SOL when then went looking for a second
  hidden volume simply because one doesn't exist. Guess if I ever go out of
  the country with my laptop, I'd just better securely wipe that partion.
 
 Or just put something in it that you can show. 

I know nothing about TrueCrypt, but I imagine a technical solution to
this kind of problem exists: Just give TrueCrypt the ability to have a
virtually unlimited number of hidden volumes. Now you can reveal them,
one after the other, in increasing order of embarrasment value and
perhaps a modest level of illegality, after which you say, that's it,
there are no more secrets here.

- Harald
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread Jon Callas

On Feb 25, 2012, at 6:35 PM, James A. Donald wrote:

 Jon Callasj...@callas.org  writes:
   I've spoken to law enforcement and border control people
   in a country that is not the US, who told me that yeah,
   they know all about TrueCrypt and their assumption is that
   *everyone* who has TrueCrypt has a hidden volume and if
   they find TrueCrypt they just get straight to getting the
   second password. They said, We know about that trick, and
   we're not stupid.
 
 They may assume that - but they cannot prove it.

You're assuming that they operate with the same security model that you do.

Your security model presupposes US law, to start with. I can see that in the 
glib comment asking if I'd ever heard of innocent until proven guilty -- 
which is a US principle. It is one that I not only have heard of, but think is 
is pretty darn good idea, too!

Nonetheless, it does not exist everywhere in the world, and I said this was not 
the US. In fact the very reason I said it wasn't the US was because I wanted to 
point out that objections to the story based upon US law are irrelevant. 
Moreover, innocent until proven guilty is interpreted differently depending on 
what sort of case there is. The term *proven* is context-dependent. There are 
different ways they prove, different burdens of proof. Beyond reasonable 
doubt and clear and convincing evidence are two used in criminal cases in 
the US. Preponderance of evidence is usually used in civil cases.

None of these are plausible deniability. As I said before, this is a term of 
spycraft and statecraft. Usually it's used to describe how a powerful entity 
like a nation state can defend itself against attacks by less-powerful 
entities. There are forms of torture that are popular because they leave no 
marks on the victim and therefore give the state plausible deniability. 
Bureaucracies also use this technique to spread blame or leave the blame with 
some other person. 

In a number of cases involving spectacularly failed companies, the CEO has 
tried to stick someone else with the blame through plausible denial. Or perhaps 
the family and associates of a fraudster use a form of plausible denial to 
avoid conviction or trial. (I am not saying that using plausible means you're 
guilty -- it only means you don't have a better defense.) It works sometimes 
and doesn't work others. It didn't work for Bernie Ebbers, for example. 
Plausible denial combined with a lack of evidence works really well, but it's 
not a legal principle at all.

Most people who use the term plausible denial, particularly us crypto people, 
would be better served to say reasonable doubt. It's a better marketing term 
at the very least.

But anyway, back to deniable encryption and what is a language-theoretic issue.

If your security model includes technical issues and policy issues, but your 
attacker has different policies, then your security might fail for 
language-theoretic reasons.

To a border control person (and that's who I was talking about), Truecrypt is 
the same thing as a suitcase with a false bottom. Technically, we'd say that it 
is a container that (assuming it works correctly) *might* have a secret 
compartment and that one that does have secret compartment is 
information-theoretcially indistinguishable from one that has a secret 
compartment. But if you read the previous sentence to a border control person, 
they might hear, ...it is a container ... that ... has a secret compartment. 

The difference is policy, not technical. If their security model includes the 
policy that there's no reason to have a suitcase with a false bottom except to 
put something in it, then how you make a denial becomes everything.

If your denial is don't be ridiculous, I *know* you guys can spot hidden 
volumes and that's why I'd never use one -- I use it because I'm cheap then 
you're doing well. If your denial is, you can't prove there's a hidden volume 
there then you're not doing so well.

My point is that there are security models out there that know about hidden 
volumes and have their own defenses against them. I used the word defenses 
intentionally. They are border control people. Their model considers a hidden 
volume to be an attack, not a defense. They have developed their own defenses 
against smuggling that take hidden volumes into account.

 Evidently in the case of
 http://www.ca11.uscourts.gov/opinions/ops/201112268.pdf They
 were totally unable to get information out of John Doe
 
 For the entire case turned on the fact that John Doe never
 admitted the existence of the hidden drive, and forensics were
 entirely unable to prove the existence of the hidden drive.
 
 Customs may have the authority to search through your stuff,
 but if they cannot find what they are looking for, they have
 no authority to make you tell them that it exists and where
 it is.
 
 But if you *do* tell them that it exists, then they can make
 you tell them where it is.

Absolutely. This is a 

Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread James A. Donald

On 2012-02-27 3:35 AM, Jon Callas wrote:
 Remember what I said -- they're law enforcement and border
 control. In their world, Truecrypt is the same thing as a
 suitcase with a hidden compartment. When someone crosses a
 border (or they get to perform a search), hidden
 compartments aren't exempt. They get to search them.

Hidden compartment?  What hidden compartment?  If I have one,
you are welcome to search it.  Go knock yourselves out.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread James A. Donald

On 2012-02-27 4:29 AM, Harald Hanche-Olsen wrote:

I know nothing about TrueCrypt, but I imagine a technical solution to
this kind of problem exists: Just give TrueCrypt the ability to have a
virtually unlimited number of hidden volumes. Now you can reveal them,
one after the other, in increasing order of embarrasment value and
perhaps a modest level of illegality, after which you say, that's it,
there are no more secrets here.


In the case on which the ruling was issued, John Doe had five terabytes 
of TrueCrypt drive, and absolutely nothing on the outermost TrueCrypt drive.


I am pretty sure that if he had something moderately embarrassing or a 
little bit illegal on the outer drive with the easily broken password, 
he would not have had to appeal all the way up.


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread James A. Donald

On 2012-02-27 5:09 AM, Marsh Ray wrote:

So everyone who now has a hidden 2nd Truecrypt partition with
incriminating things in it needs to make it their hidden 3rd partition
and in the hidden 2nd partition instead store things which are merely
embarrassing.

Except that as it is stipulated that the captors are not stupid, we
must assume they are perfectly rational actors who will have worked out
this strategy too.


If everyone goes for a third partition - but in practice, some people 
will have only one, some people two with the good stuff on the second, 
some people three with the good stuff on the third, some four, some five ..


Rationality can easily be defeated by deliberate randomness and 
intentional irrationality


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread Kevin W. Wall
On Sun, Feb 26, 2012 at 8:36 PM, James A. Donald jam...@echeque.com wrote:
 On 2012-02-27 3:35 AM, Jon Callas wrote:
 Remember what I said -- they're law enforcement and border
 control. In their world, Truecrypt is the same thing as a
 suitcase with a hidden compartment. When someone crosses a
 border (or they get to perform a search), hidden
 compartments aren't exempt. They get to search them.

 Hidden compartment?  What hidden compartment?  If I have one,
 you are welcome to search it.  Go knock yourselves out.

Well, we're already considerably OT, but since the moderator seems to
be letting this thread play itself out, I use that to segue to a related topic
on a new proposed Ohio law and hidden compartments.

[I just literally finished posting this to my G+ account moments ago, but
will repost here rather than making all you you go to GooglePlus.]

Ohio Gov. John Kasich is advocating a law that would make it a 4th-degree
felony to own any vehicle equipped with hidden compartments. Conviction
under this proposed law could mean up to 18 months in jail and a
potential $5,000 fine.

So someone please tell me why the ACLU is not jumping all over this? I
just don't see how this law is a good thing. It seems to me that this
could trap a lot of innocent people. Imagine the following scenario:

A drug dealer whose car has a secret compartment decides to
get some new wheels so he trades in is old car for a hot new
one to some legitimate auto dealer. The auto dealer does not
know this person is a drug dealer so they have no reason to
suspect anything. Sometime later, the car dealer sells the
car to someone. That someone then happens to get in an accident
where they get rear ended. The ensuing damage reveals a hidden
compartment such as that described in the Columbus Dispatch
article (see below). The officer on the scene of the accident
notices the secret compartment, and even though there are no
drugs present, decides to arrest the driver of the damaged car
solely because she or he can observe the secret compartment.
Thereby some innocent person is charged with a fourth degree
felony and at least has to go through a bunch of legal hoops
to clear his or her name.

Now how is this a _good_ thing? So much for the presumed innocent until
proven guilty.

The original Columbus Dispatch article is here in case anyone wishes
to read it:
http://www.dispatch.com/content/stories/local/2012/02/25/secret-compartments-could-get-drivers-busted.html

-kevin
-- 
Blog: http://off-the-wall-security.blogspot.com/
The most likely way for the world to be destroyed, most experts agree,
is by accident. That's where we come in; we're computer professionals.
We *cause* accidents.        -- Nathaniel Borenstein
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread Peter Gutmann
Marsh Ray ma...@extendedsubset.com writes:

Except that as it is stipulated that the captors are not stupid, we must 
assume they are perfectly rational actors who will have worked out this 
strategy too.

It's not an exercise in game theory, it's standard police work. If they've 
watched you downloading child porn for six months, with enough evidence to get 
a warrant, and all they find is an encrypted partition and no trace of the 
pr0n anywhere else, then it doesn't take Sherlock Holmes to figure out where 
it most likely went.

(Talking to e-crime investigators is always illuminating. When they say 
they're not stupid they don't mean they have PhDs in game theory, they mean 
that they're (usually) going to come in with enough evidence and expertise to 
have a good chance of a successful prosecution. Being able to hide something 
with FDE is a very, very rare exception, generally one where evidence was very 
flimsy anyway).

Peter.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread Marsh Ray

On 02/26/2012 09:08 PM, Peter Gutmann wrote:

Marsh Rayma...@extendedsubset.com  writes:


Except that as it is stipulated that the captors are not stupid, we must
assume they are perfectly rational actors who will have worked out this
strategy too.


It's not an exercise in game theory, it's standard police work.


My post had about as much to do with standard police work as the 
traveling salesman problem has to do with actual salesmen, or the 
prisoner's dilemma has to do with actual prisoners.


I thought the situation might be amenable to a simple model, and it 
seemed like an interesting way to try to nudge the conversation back to 
discussing crypto, or comp sci at least.



If they've watched you downloading child porn for six months,


I know that this is a terribly common scenario that todays computer 
crime investigators have to deal with on a daily basis, but isn't there 
some variant of Godwin's law I can invoke here?


- Marsh
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-26 Thread Peter Gutmann
James A. Donald jam...@echeque.com writes:

Hidden compartment? What hidden compartment? If I have one, you are welcome 
to search it. Go knock yourselves out.

James, meet Bertha.  Sorry about her cold hands, just give her a minute to get
the gloves on.  In the meantime if you'll drop your trousers...

Peter.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-25 Thread Peter Gutmann
Jon Callas j...@callas.org writes:

I've spoken to law enforcement and border control people in a country that is
not the US, who told me that yeah, they know all about TrueCrypt and their
assumption is that *everyone* who has TrueCrypt has a hidden volume and if
they find TrueCrypt they just get straight to getting the second password.
They said, We know about that trick, and we're not stupid.

Ditto.  One other thing that you need to add, the police are very, very good
at getting information out of people.  They've been doing it with hardened
criminals for decades, so your average random geek is no problem.

Peter.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-25 Thread Peter Gutmann
Bill St. Clair billstcl...@gmail.com writes:

Which is why the average random geek needs to be reminded, over and over
again, that you NEVER talk to the police. Not a word. Ever. If you're feeling
kind, write them a note, I don't talk to police. They should leave wondering
whether you're mute.

Uh, you know the bit where I said that the police are very good at getting
information out of people?  That also applies to people who initially decide
that they don't want to talk to the police.

Peter.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-25 Thread Randall Webmail
Which is why the average random geek needs to be reminded, over and over
again, that you NEVER talk to the police. Not a word. Ever. If you're feeling
kind, write them a note, I don't talk to police. They should leave wondering
whether you're mute.

Uh, you know the bit where I said that the police are very good at getting
information out of people?  That also applies to people who initially decide
that they don't want to talk to the police.

In the US, you should tell them you're not going to talk to them without your 
attorney present.   That should shut them up.   Assuming they follow the law, 
they must stop all questioning at that point.  Assuming they make a written 
record of your request, anything they get from you (other than information you 
volunteer) after that point should be inadmissible.  Note that there are two 
assumptions in this paragraph.  
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-25 Thread Kevin W. Wall
On Sat, Feb 25, 2012 at 2:50 AM, Jon Callas j...@callas.org wrote:

[snip]

 But to get to the specifics here, I've spoken to law enforcement and
 border control people in a country that is not the US, who told me
 that yeah, they know all about TrueCrypt and their assumption is
 that *everyone* who has TrueCrypt has a hidden volume and if they
 find TrueCrypt they just get straight to getting the second password.
 They said, We know about that trick, and we're not stupid.

Well, they'd be wrong with that assumption then.

 I asked them about the case where someone has TrueCrypt but doesn't
 have a hidden volume, what would happen to someone doesn't have one?
 Their response was, Why would you do a dumb thing like that? The whole
 point of TrueCrypt is to have a hidden volume, and I suppose if you
 don't have one, you'll be sitting in a room by yourself for a long
 time. We're not *stupid*.

That's good to know then. I never had anything *that* secret to protect,
so never bothered to create a hidden volume. I just wanted a good, cheap
encrypted volume solution where I could keep my tax records and other
sensitive personal info. And if law enforcement ever requested the password
for that, I wouldn't hesitate to hand it over if they had the proper
subpoena / court order. But I'd be SOL when then went looking for a second
hidden volume simply because one doesn't exist. Guess if I ever go out of
the country with my laptop, I'd just better securely wipe that partion.

-kevin
--
Blog: http://off-the-wall-security.blogspot.com/
The most likely way for the world to be destroyed, most experts agree,
is by accident. That's where we come in; we're computer professionals.
We *cause* accidents.-- Nathaniel Borenstein
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-25 Thread James A. Donald

On 2012-02-25 5:50 PM, Jon Callas wrote:
 There is no such thing as plausible deniability in a legal
 context.

 Plausible deniability is a term that comes from conspiracy
 theorists (and like many things contains a kernel of truth)
 to describe a political technique where everyone knows what
 happened but the people who did it just assert that it
 can't be proven, along with a wink and a nudge.

Does the phrase innocent until proven guilty ring any bells?

Similarly, there is no inner volume on a truecrypt drive until it
is proven that there is, and so you cannot be compelled to produce
a key that has not been proven to exist.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-25 Thread James A. Donald

Jon Callasj...@callas.org  writes:
  I've spoken to law enforcement and border control people
  in a country that is not the US, who told me that yeah,
  they know all about TrueCrypt and their assumption is that
  *everyone* who has TrueCrypt has a hidden volume and if
  they find TrueCrypt they just get straight to getting the
  second password. They said, We know about that trick, and
  we're not stupid.

They may assume that - but they cannot prove it.

On 2012-02-25 9:36 PM, Peter Gutmann wrote:
 Ditto.  One other thing that you need to add, the police
 are very, very good at getting information out of people.
 They've been doing it with hardened criminals for decades,
 so your average random geek is no problem.

Evidently in the case of
http://www.ca11.uscourts.gov/opinions/ops/201112268.pdf They
were totally unable to get information out of John Doe

For the entire case turned on the fact that John Doe never
admitted the existence of the hidden drive, and forensics were
entirely unable to prove the existence of the hidden drive.

Customs may have the authority to search through your stuff,
but if they cannot find what they are looking for, they have
no authority to make you tell them that it exists and where
it is.

But if you *do* tell them that it exists, then they can make
you tell them where it is.
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-24 Thread Ali, Saqib
wow deja vu:
http://www.mail-archive.com/fde@www.xml-dev.com/msg00623.html
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-24 Thread Benjamin Kreuter
On Sat, 25 Feb 2012 05:30:57 +1000
James A. Donald jam...@echeque.com wrote:

 So:  Don't talk to police about the contents of your drive, or indeed 
 anything of which they might potentially disapprove.

I believe that you meant to say, Don't talk to the police at all,
which should be standard policy for anyone who finds themselves under
arrest.  There is no advantage in talking to the police once you have
been arrested, nothing you say will help in your defense and you are
not going to talk your way out of an arrest.  The odds are stacked
against you during a police interview -- you are talking to people who
have been trained to extract confessions, who are being paid to sit
there interrogating you, and who will pick through what you say to
find incriminating statements.  Stay quiet, speak only to your
attorney, and let your attorney speak on your behalf; you cannot be
penalized for exercising your rights, nor can the fact that you refused
to speak be introduced as evidence against you (at least in the United
States).

-- Ben



-- 
Benjamin R Kreuter
UVA Computer Science
brk...@virginia.edu
KK4FJZ

--

If large numbers of people are interested in freedom of speech, there
will be freedom of speech, even if the law forbids it; if public
opinion is sluggish, inconvenient minorities will be persecuted, even
if laws exist to protect them. - George Orwell


signature.asc
Description: PGP signature
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-24 Thread Steven Bellovin

On Feb 24, 2012, at 2:30 57PM, James A. Donald wrote:

 Bottom line is that the suspect was OK because kept his mouth zippered, 
 neither admitting nor denying any knowledge of the encrypted partition.
 
 Had he admitted control of the partition, *then* they would have been able to 
 compel production of the key.
 
 The court did not concede any right to refuse to decrypt a drive if you admit 
 possession of the contents.
 
 So:  Don't talk to police about the contents of your drive, or indeed 
 anything of which they might potentially disapprove.

No, I don't think that that's quite what the ruling said.  It's a long, complex 
opinion; what you said is close to one aspect of it, but not (in my non-lawyer 
opinion) precisely what the court said.

The first point, not addressed in your note but quite important to the ruling, 
is that the key has to be something you know, not something you have.  If the 
keying material is on a smart card, you have to turn that over and you're not 
protected.  If a PIN plus smart card is needed, you still have to turn over the 
smart card but not disclose the PIN.

Second, and going to the heart of your point, what's essential is whether or 
not they already know in reasonable detail what's on the encrypted drive; 
depending on the circumstances, they may already have that knowledge regardless 
of what you've said.  The issue of admitting possession is not what this case 
focused on; in fact, the prosecution tried to finesse that point by granting 
limited immunity on that point.  Quoting from the opinion:

'The U.S. Attorney requested that the court grant Doe immunity limited 
to “the use [of Doe’s] act of production of the unencrypted contents” of the 
hard drives. That is, Doe’s immunity would not extend to the Government’s 
derivative use of contents of the drives as evidence against him in a criminal 
prosecution. The court accepted the U.S. Attorney’s position regarding the 
scope of the immunity to give Doe and granted the requested order. The order 
“convey[ed] immunity for the act of production of the unencrypted drives, but 
[did] not convey immunity regarding the United States’ [derivative] use” of the 
decrypted contents of the drives.'

In other words, the fact of control of the encrypted data -- aka knowledge of 
the key -- was not at issue; the prosecution had agreed not to use that.  What 
was important was the files on the drive.  This is what distinguishes this case 
from Boucher (a case discussed in the opinion).  

The other current case is Fricosu, where a trial judge has ordered her to 
decrypt her laptop.  The Court of Appeals for that circuit -- the 10th; the 
opinion I cited is from the 11th, and hence not binding on this court -- 
declined to hear her appeal, not on the merits but because as a matter of 
procedure they won't intervene at this point in a trial.  If she's convicted, 
she can appeal on the grounds that her Fifth Amendment rights were violated, 
but not until then.  It's worth noting that the trial judge made his ruling on 
the same basis as the 11th Circuit Court of Appeals: did the government have 
enough prior knowledge of the contents that her rights were not infringed?  An 
appellate court may find that he didn't rule correctly on that point, or it may 
decline to adopt the 11th Circuit's reasoning -- but the fundamental legal 
reasoning is the same; what's different is the facts of the case.  (Btw, 
Fricosu did not talk to the police; however, she made injudicious statements to 
her husband in a monitored jailhouse call...)


--Steve Bellovin, https://www.cs.columbia.edu/~smb





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-24 Thread James A. Donald
Truecrypt supports an inner and outer encrypted volume, encryption 
hidden inside encryption, the intended usage being that you reveal the 
outer encrypted volume, and refuse to admit the existence of the inner 
hidden volume.


To summarize the judgment:  Plausibile deniability, or even not very 
plausible deniability, means you don't have to produce the key for the 
inner volume.  The government first has to *prove* that the inner volume 
exists, and contains something hot.  Only then can it demand the key for 
the inner volume.


Defendant revealed, or forensics discovered, the outer volume, which was 
completely empty.  (Bad idea - you should have something there for 
plausible deniability, such as legal but mildly embarrassing 
pornography, and a complete operating system for managing your private 
business documents, protected by a password that forensics can crack 
with a dictionary attack)


Forensics felt that with FIVE TERABYTES of seemingly empty truecrypt 
drives, there had to be an inner volume, but a strong odor of rat is no 
substitute for proof.


(Does there exist FIVE TERABYTES of child pornography in the entire world?)

Despite forensics suspicions, no one, except the defendant, knows 
whether there is an inner volume or not, and so the Judge invoked the 
following precedent.


http://www.ca11.uscourts.gov/opinions/ops/201112268.pdf

That producing the key is protected if conceding the existence, 
possession, and control of the documents tended to incriminate the 
defendant.


The Judge concluded that in order to compel production of the key, the 
government has to first prove that specific identified documents exist, 
and are in the possession and control of the defendant, for example the 
government would have to prove that the encrypted inner volume existed, 
was controlled by the defendant, and that he had stored on it a movie 
called Lolita does LA, which the police department wanted to watch.





___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-24 Thread James A. Donald

On 2012-02-25 7:28 AM, Steven Bellovin wrote:

The first point, not addressed in your note but quite important to the ruling, 
is that the key has to be something you know, not something you have.  If the 
keying material is on a smart card, you have to turn that over and you're not 
protected.  If a PIN plus smart card is needed, you still have to turn over the 
smart card but not disclose the PIN.


Surely the core of the ruling is that no one except the defendant knows 
for sure whether the key exists, knows whether there is an inner 
truecrypt volume or not.  The cross examination of the forensics witness 
focused on that point.

___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-24 Thread James A. Donald

Surely the core of the ruling is that no one except the
defendant knows for sure whether the key exists, knows
whether there is an inner truecrypt volume or not.  The cross
examination of the forensics witness focused on that point.


On 2012-02-25 1:25 PM, d...@geer.org wrote:

One must assume that this nicety does not apply to
border crossings (Customs inspection) where access
to anything and everything is stare decisis.


If they knew the inner drive existed, they could insist on access to it. 
 But they can only suspect.


They can have access to the drive.  They can have access to the 
encrypted drive on the unencrypted drive.  They may *speculate* that 
there is an inner encrypted drive, but the only way they can find out 
that it exists is to ask me to incriminate myself.


That the customs can have access to everything physical that crosses the 
border is stare decisis - but it is a big jump that they have access to 
your state of mind.


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] US Appeals Court upholds right not to decrypt a drive

2012-02-24 Thread Jon Callas

On Feb 24, 2012, at 5:43 PM, James A. Donald wrote:

 Truecrypt supports an inner and outer encrypted volume, encryption hidden 
 inside encryption, the intended usage being that you reveal the outer 
 encrypted volume, and refuse to admit the existence of the inner hidden 
 volume.
 
 To summarize the judgment:  Plausibile deniability, or even not very 
 plausible deniability, means you don't have to produce the key for the inner 
 volume.  The government first has to *prove* that the inner volume exists, 
 and contains something hot.  Only then can it demand the key for the inner 
 volume.
 
 Defendant revealed, or forensics discovered, the outer volume, which was 
 completely empty.  (Bad idea - you should have something there for plausible 
 deniability, such as legal but mildly embarrassing pornography, and a 
 complete operating system for managing your private business documents, 
 protected by a password that forensics can crack with a dictionary attack)
 
 Forensics felt that with FIVE TERABYTES of seemingly empty truecrypt drives, 
 there had to be an inner volume, but a strong odor of rat is no substitute 
 for proof.
 
 (Does there exist FIVE TERABYTES of child pornography in the entire world?)
 
 Despite forensics suspicions, no one, except the defendant, knows whether 
 there is an inner volume or not, and so the Judge invoked the following 
 precedent.
 
 http://www.ca11.uscourts.gov/opinions/ops/201112268.pdf
 
 That producing the key is protected if conceding the existence, possession, 
 and control of the documents tended to incriminate the defendant.
 
 The Judge concluded that in order to compel production of the key, the 
 government has to first prove that specific identified documents exist, and 
 are in the possession and control of the defendant, for example the 
 government would have to prove that the encrypted inner volume existed, was 
 controlled by the defendant, and that he had stored on it a movie called 
 Lolita does LA, which the police department wanted to watch.

There is no such thing as plausible deniability in a legal context.

Plausible deniability is a term that comes from conspiracy theorists (and like 
many things contains a kernel of truth) to describe a political technique where 
everyone knows what happened but the people who did it just assert that it 
can't be proven, along with a wink and a nudge.

But to get to the specifics here, I've spoken to law enforcement and border 
control people in a country that is not the US, who told me that yeah, they 
know all about TrueCrypt and their assumption is that *everyone* who has 
TrueCrypt has a hidden volume and if they find TrueCrypt they just get straight 
to getting the second password. They said, We know about that trick, and we're 
not stupid.

I asked them about the case where someone has TrueCrypt but doesn't have a 
hidden volume, what would happen to someone doesn't have one? Their response 
was, Why would you do a dumb thing like that? The whole point of TrueCrypt is 
to have a hidden volume, and I suppose if you don't have one, you'll be sitting 
in a room by yourself for a long time. We're not *stupid*.

Jon


___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography