Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Encryption Security Your Rights Online

First Use of RIPA to Demand Encryption Keys 645

kylehase writes "The Regulation of Investigatory Powers Act (RIPA) is being used for the first time to force an animal activist to reveal encryption keys for encrypted files she claims to have no knowledge of. According to the article, she could face up to two years if she doesn't comply."
This discussion has been archived. No new comments can be posted.

First Use of RIPA to Demand Encryption Keys

Comments Filter:
  • solution (Score:5, Informative)

    by User 956 ( 568564 ) on Thursday November 15, 2007 @01:27AM (#21359889) Homepage
    The Regulation of Investigatory Powers Act (RIPA) is being used for the first time to force an animal activist to reveal encryption keys for encrypted files she claims to have no knowledge of.

    That's why you use an encrypted file system with a duress key. In the event of coercion, you give them a key that *oops* results in the destruction of the data.
  • by Anonymous Coward on Thursday November 15, 2007 @01:35AM (#21359949)
    That's what TrueCrypt is great for - plausible deniability.

    http://www.truecrypt.org/docs/?s=plausible-deniability [truecrypt.org]
  • Re:solution (Score:5, Informative)

    by PhrostyMcByte ( 589271 ) <phrosty@gmail.com> on Thursday November 15, 2007 @01:36AM (#21359953) Homepage
    any forensic team with an ounce of competence will copy the original HDD and work off the copy, so that just won't work.
  • Re:solution (Score:5, Informative)

    by mlts ( 1038732 ) * on Thursday November 15, 2007 @01:47AM (#21360023)
    Having a known self destruct switch may cause a person to end up even worse trouble. This is a discussion that occurs periodically on a number of cryptography forums.

    Almost all police departments will image the drive, then present the person with the image to decrypt. If the image gets stung by a self destruct Trojan, then the police will know that its not a forgotten password, and then proceed to use rubber hose decryption to obtain the contents of the drive.
  • Re:solution (Score:3, Informative)

    by Anonymous Coward on Thursday November 15, 2007 @01:50AM (#21360051)
    Yep, I'm pretty sure TrueCrypt (the only program I'm familiar with) does this.

    Just dump some plausibly-incriminating stuff on it (e.g. kinky porn, ABBA songs) and they'll never realise there was anything else there to look for.
  • by ucblockhead ( 63650 ) on Thursday November 15, 2007 @02:15AM (#21360265) Homepage Journal
    It doesn't. The courts have decided that an encryption key is analogous to a physical key. That's why the fifth amendment doesn't apply to encryption keys.
  • Re:solution (Score:3, Informative)

    by ucblockhead ( 63650 ) on Thursday November 15, 2007 @02:18AM (#21360283) Homepage Journal
    That's a great way of getting charged with obstruction of justice.
  • Re:solution (Score:4, Informative)

    by Bonker ( 243350 ) on Thursday November 15, 2007 @02:19AM (#21360293)
    Yeah. Truecrypt does this.

    http://www.truecrypt.org/hiddenvolume.php [truecrypt.org]

    Truecrypt is pretty nifty all around.
  • by BradMajors ( 995624 ) on Thursday November 15, 2007 @02:22AM (#21360337)
    Another difference in this case is that the cops do not have a warrant.
  • Re:Better solution (Score:5, Informative)

    by LurkerXXX ( 667952 ) on Thursday November 15, 2007 @02:23AM (#21360347)
    Filesize arithmetic?

    You never used Truecrypt eh? It's not a zip file. It acts as a virtual hard drive partition that can be mounted as a drive.

    When you create the volume it generates random bits throughout the virtual partition. You can copy whatever files you want onto the virtual partition, the rest of it is random noise. You may or may not choose to have additional hidden encrypted partitions within that noise. Adding up the size of know files tells you nothing about what may or may not lurk in the rest of the space on the virtual partition.
  • don't be so quick (Score:4, Informative)

    by m2943 ( 1140797 ) on Thursday November 15, 2007 @02:26AM (#21360371)
    In the United States, you could never be compelled to turn over an encryption key as that is a violation of the 5th amendment

    I wouldn't be so sure. The 5th amendment only protects against self-incrimination, but the search may be for evidence against a third party, in which case you may be compelled to comply.

    It's also not clear that giving up your encryption keys would be considered "testimonial", so it might not be protected under the 5th amendment according to US courts. See here (somewhat outdated in other aspects, but an accurate reflection of US policy on the legal hair splitting):

    http://www.cybercrime.gov/cryptfaq.htm [cybercrime.gov]
  • by Futurepower(R) ( 558542 ) on Thursday November 15, 2007 @02:30AM (#21360389) Homepage
    TrueCrypt [truecrypt.org] allows hidden volumes [truecrypt.org], indistinguishable from one volume. The file size is constant.

    TrueCrypt works very, very well. I use it with just one volume to protect passwords and other files.

    When you don't want to encrypt a volume, but just a file, Gnu Privacy Guard [gnupg.org] is best.
  • by hedwards ( 940851 ) on Thursday November 15, 2007 @02:32AM (#21360409)
    I believe that depends whether or not they have a court order for it. In the US the 5th amendment only applies to interrogation and testimony. Basically self incrimination, but there is no protection against lawfully granted warrants. A refusal to hand over evidence when presented with an appropriate order or the destruction of evidence in anticipation of a lawful order is obstruction of justice.

    I would assume that the British have a similar set up at this point. Otherwise, criminals would just say no, I'm not going to allow you to use your valid search warrant to gain entry and so that they could find that massive stash of child porn and Vicodin that I keep around for special occasions.

    But, IANAL so I may be a bit off on this.
  • Two things (Score:1, Informative)

    by Anonymous Coward on Thursday November 15, 2007 @04:36AM (#21361033)
    First, the request comes from the Crown Prosecution Service, which is full of lawyers who were unable to get jobs in independent chambers. That's right, a lot of them are jobsworths with chips on their shoulders.

    Second, the Brazilian was shot by the Metropolitan Police. Thank God, most of the police forces in England are nothing like the Met. Very few police officers in the Met would qualify to join, say, the NYPD.

    Finally, animal rights activists in the UK are not warm and fuzzy people. They bomb babies, desecrate graves, issue death threats, and one of their members has been locked up for a bombing campaign. There are plenty of legit animal rights bodies they could join which have real political influence - but they don't.

  • by StarkRG ( 888216 ) <starkrgNO@SPAMgmail.com> on Thursday November 15, 2007 @04:39AM (#21361053)

    The only problem is explaining that if (ok, when) they lose the password, you won't be able to crack it. Ever.
    Not really. It's quite easy: "That's the whole point!"

    And besides, not entirely true:

    Q: We use TrueCrypt in a corporate environment. Is there a way for an administrator to reset a password when a user forgets it?

    A: There is no "back door" implemented in TrueCrypt. However, there is a way to "reset" a TrueCrypt volume password/keyfile. After you create a volume, backup its header (select Tools -> Backup Volume Header) before you allow a non-admin user to use the volume. Note that the volume header (which is encrypted with a header key derived from a password/keyfile) contains the master key with which the volume is encrypted. Then ask the user to choose a password, and set it for him/her (Volumes -> Change Volume Password); or generate a user keyfile for him/her. Then you can allow the user to use the volume and to change the password/keyfiles without your assistance/permission. In case he/she forgets his/her password or loses his/her keyfile, you can "reset" the volume password/keyfiles to your original admin password/keyfiles by restoring the volume header (Tools -> Restore Volume Header).
    I actually had someone ask me for something like this at work. Now I have something to tell them. (And something to suggest to our security department, we're currently using various encryptions for the various OSs we support, ugly).
  • Re:Go To Prison Act (Score:5, Informative)

    by Cederic ( 9623 ) on Thursday November 15, 2007 @05:47AM (#21361457) Journal

    Several animal rights groups in the UK are officially designated terrorist organisations, because frankly they engage in acts of terror.

  • by aproposofwhat ( 1019098 ) on Thursday November 15, 2007 @05:54AM (#21361493)
    In the UK, this particular bunch of 'animal rights' activists have been implicated in activities that fit the definition of terrorism - car bombings, arson attacks, physical attacks against Huntingdon Life Sciences personnel, the digging up and removal of the body of the mother of a guinea pig breeder, letter bomb campaigns, etc. etc.

    While I strongly disagree with this law (and would refuse point blank to hand over my passwords), the group that this woman belongs to has passed far beyond the bounds of legitimate protest, and needs to be investigated and disrupted by all legal means.

    Access to financial data, call records etc. is already a key tool in criminal investigations, and is covered by RIPA in it's less draconian sections.

    So long as the provisions of RIPA are adhered to, I see nothing wrong in police officers using such powers proportionately (i.e. only in cases where the seriousness of the offence merits such intrusion into my privacy) - most policemen that I have come across are professional, intelligent men and women who do a good job trying to keep the peace.

  • Re:solution (Score:2, Informative)

    by rmccann ( 792082 ) on Thursday November 15, 2007 @05:55AM (#21361495) Homepage Journal
    There was something similar in the novel Cryptonomicon by Neal Stephenson. There were large electro magnets in the door frames. When the cops came to carry the disks out of the office, they were wiped passing through the doors.
  • by CmdrGravy ( 645153 ) on Thursday November 15, 2007 @06:36AM (#21361725) Homepage
    I guess you need to leave it up to a jury to decide whether it's likely that there is information there which the suspect is refusing to un-encrypt. Ideally you'd have sufficiently convincing evidence that the jury would easily be able to agree with you.

    In this case the suspect is a Animal Rights activist who has obviously been involved with the Huntingdon Life Sciences protests, according to her "facist thugs" stole her PC from her a few months ago and are now demanding encryption keys for all the encrypted files she has on her PC. She claims she's too stupid to be able to uncencrypt all this encrypted stuff people send her and hasn't a clue about anything complicated like passwords or anything.

    For those not aware of the situation these sort of Animal Rights activists are basically terrorists, they undertake bombing campaigns, engage in unreasonable stalking, verbal and physical violence against anyone they don't like, dig up the dead bodies of their targets relatives and hold them for ransom. They are basically really really nasty ignorant people and I think it's highly likely this woman is involved in all sorts of horrible things and that her claims of ignorance about whats in the encrypted files is nonsense.

    In this case I can see a use for this sort of law if it will help lock more of these evil people away in jail.
  • Reductio ad absurdam (Score:2, Informative)

    by maroberts ( 15852 ) on Thursday November 15, 2007 @07:19AM (#21361915) Homepage Journal
    By the same principle, all you have to do to avoid being a terrorist target as a US citizen is leave the country, renounce your belief in a free democratic non-religious government (whatever the truth of the matter may be under GWB), and become a devout Muslim. Easy isn't it ? (/sarcasm)

    "Choice" is an interesting word. People are trained to do jobs and sometimes take years to learn the skills to do that specific job. Choosing to leave that job for another one probably would involve severe loss of income.

    In short, HLS is performing a legitimate activity and therefore should be protected. It is also legitimate to campaign for banning of experiments on animals; but such campaigning should not involve violence and intimidation.
  • by tamnir ( 230394 ) on Thursday November 15, 2007 @08:51AM (#21362389)
    Linux-based imaging is good only if you are interested in recovery. On the legal side of things, it will not do:

    - Please explain to the court how you made a copy of this piece of evidence...
    - I connected the drive to our forensic machine and...
    - You mean, you connected this hard disk... to your machine?
    - Yes of course, then I...
    - Did you use a hardware write block?
    - Er... I used Linux and mounted the...
    - Please, just answer the question. Did you or did you not use a hardware write blocker device to connect the disk to your machine?
    - I did not, but...
    - Thank you, no further question. I now call for the evidence to be declared tainted and inadmissible in court, since the forensic team failed to use the proper hardware to ensure that no changes would be made to the disk.

    There is a whole range of forensic-specific hardware available: write blockers, hardware disk imagers... Use them, or loose your case.
  • Re:As a Brit... (Score:5, Informative)

    by hairykrishna ( 740240 ) on Thursday November 15, 2007 @08:55AM (#21362417)
    I have to disagree with one of your points. Some of the most prolific terrorist groups are animal rights activists - they participate in letter bombing campaigns, arson and direct indimitation/attack of life science workers.
  • by KitsuneSoftware ( 999119 ) on Thursday November 15, 2007 @09:15AM (#21362629) Homepage Journal
    I happen to have a (former) inside source to Huntingdon Life Sciences. All the good scientists either have left or are in the process of leaving because the managers are penny-pinching bastards. The rules we have in the UK should prevent mistreatment of animals, but they don't because there isn't enough enforcement, and when things are enforced, the managers just transfer blame to the employees that they had ordered to commit the offenses.
  • Im Confused... (Score:3, Informative)

    by l4m3z0r ( 799504 ) <kevinNO@SPAMuberstyle.net> on Thursday November 15, 2007 @12:25PM (#21365405)
    How can this result in any problem for anyone since you could easily say: I can't give you the encryption key as that information would incriminate me. This is in fact why we have the 5th amendment(in the US anyway).
  • Re:solution (Score:3, Informative)

    by CastrTroy ( 595695 ) on Thursday November 15, 2007 @01:21PM (#21366349)
    For Linux you can just encrypt your swap partition on start up. It creates a random key each time it boots up, so there's no way to recover the data, because the key is lost when you powerdown the machine. I'm not sure if you can create an encrypted swap file on windows. I don't think you can, but you can run without a swap file. Get 4 gigs of RAM, and you should be fine.
  • Re:solution (Score:4, Informative)

    by Carnildo ( 712617 ) on Thursday November 15, 2007 @03:23PM (#21368577) Homepage Journal
    If you provide the passwords for both containers when mounting the outer container, TrueCrypt will prevent writes to the outer container from over-writing the inner container. Otherwise, it will quite happily over-write the inner container if too much data is written to the outer container.
  • Re:solution (Score:2, Informative)

    by Bill Hayden ( 649193 ) on Thursday November 15, 2007 @04:32PM (#21369601) Homepage
    Even my local city police force, while investigating a client of mine for a relatively minor infraction, used correct imaging techniques and procedures. To say that the FBI would probably screw this up when small town police districts know what to do is a little far fetched.
  • Re:solution (Score:5, Informative)

    by gweihir ( 88907 ) on Friday November 16, 2007 @12:57AM (#21374809)
    Very easy: Assume your swap is on /dev/sda2:

        cryptsetup --key-file=/dev/random create c1 /dev/sda2
        mkswap /dev/mapper/c1
        swapon /dev/mapper/c1

    This reads a cryptogtaphically very good key from /dev/random, that has a lot of true randomness in it in addition.

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...