Settings

Theme

"Forensics for Prosecutors" mentions backdoor in TrueCrypt (page 15) [pdf]

cryptome.org

134 points by jhickner 12 years ago · 61 comments

Reader

EvanAnderson 12 years ago

The reference to the names "Detective Stu Pitt" and "Detective Laughlin Foo" on the last page has me wondering about this. They both really, really sound like joke names. The similarity to the presenter's name (first slide) from the real North Dakota State Attorney's Association (NDSAA) presentation (http://www.ndsaa.org/Computer_Forensics_for_Prosecutors.pdf) also seems suspicious.

It has the look that somebody took the real NDSAA presentation, tweaked it up, and released it as a hoax.

Edit:

Here's a site that seems to be hosting the same PDF as part of an article dated 1 April 2013: http://www.techarp.com/showarticle.aspx?artno=770

  • emhs 12 years ago

    I dug a little further. Not only is there "Detective Stu Pitt", there's also "Laughlin Foo" for the next day's presentation, and the link at the bottom is for the North Dakota State Attorney's Association, though the only state mentioned (and whose seal is used) is Oregon. This is phony.

  • thejosh 12 years ago

    took less than an hour for the hoax to be revealed.. :)

WestCoastJustin 12 years ago

A few gems in here besides the TrueCrypt statement, mainly that Apple iCloud and Dropbox are named, and the legal framework is touched upon.

  All cloud stored content are automatically hash-scanned
  and image-analyzed by their service providers and
  infringing content reported to NCMEC (p16)

  Mobile content are automatically scanned when they are
  synced with cloud storage like Apple iCloud or Dropbox.
  Mobile devices that are not cloud-synced can be accessed
  by their respective vendors (p16)
If I am reading this correctly, when you upload something to Apple iCloud or Dropbox, there is a background process which generates a hash of your content, then compares that hash with infringing content? What defense do companies have? What about proof that these claims are true (sources, etc)? Can anyone just leak a document that claims XYZ tech company spies on its users and everyone takes this as fact?

  Vendors are legally and commercially prevented from
  acknowledging their backdoors. Defense will not be
  able to prove their existence (p16)
Great, blanket denial either way! I hope this is a hoax!
  • nwh 12 years ago

    You missed a big one there.

        Mobile devices that are not cloud-synced can be accessed 
        by their respective vendors 
    
    Essentially; iOS and Android have a remote backdoor available to the US government.
    • fluidcruft 12 years ago

      I think they're speaking about system dumps at the manufacturer level.

      For example, I'm fairly confident that the data on Motorola devices can be read completely using USB from bootloader mode without any data modification (using tools like RSD Lite or sbf_flash). By itself that wouldn't get past OS-level encryption, though. That bootloader is entirely Motorola's with functionality and communication protocols dating back to before the pre-Android razr flip phones (from what I could tell back when I was doing battle with the XT720).

      On the other hand, passphrases for boot security on mobile devices are often extremely weak (pin or what-have-you) and easy to brute force (assuming there is a backdoor to access the TPM contents or whatever it's called on ARM/OMAP/etc if it uses that sort of thing)

    • bilbo0s 12 years ago

      Yep...

      I was thinking... "Wow... why is this guy worried about Dropbox?"

      The Dropbox problem is solvable... just don't use Dropbox.

      But how are you going to use a phone without using iOS or Android. (All of the other mobile OSes are probably backdoored as well)

    • philwebster 12 years ago

      With regards to FileVault for Mac, some friends who used to work as Geniuses at the Apple Store have mentioned having to request special software from corporate that would fix or recover FileVault in some way - they weren't clear and said it was not something they were supposed to talk about. Obviously I'd take the info with a grain of salt, but based on the news lately...

      • nwh 12 years ago

        I had an conversation regarding FileVault with the geniuses recently too.

            > Oh we see [your MacBook] has a password, would you be able to write it down here?
            Haha, nope!
            > Any, uh, reason not to?  
            Nope. 
        
        From a conversation later on, apparently not many people opt not to give up their keys. I'm not sure why they pushed me to give it up either, the geniuses know full well that they can just boot their diagnostics disk without the password anyway.

        Bear in mind that the default setup for Apple's FileVault also sends a copy of the encryption key to Apple too (associated with your AppleID), where presumably there is access granted to the US government also (willing or unwilling).

        • 46Bit 12 years ago

          > Bear in mind that the default setup for Apple's FileVault also sends a copy of the encryption key to Apple too (associated with your AppleID), where presumably there is access granted to the US government also (willing or unwilling).

          If anyone else is curious about this see the recovery key sections on http://support.apple.com/kb/HT4790

  • fnordfnordfnord 12 years ago

    Well, here is the one for last year. How many times do they have to tell us?

    http://www.ndsaa.org/Computer_Forensics_for_Prosecutors.pdf

necubi 12 years ago

Are we all just going to take this seriously? It's pretty obviously a fake. Just look at the names at the end. Detective Laughlin Foo? Stu Pitt? Neither of which, incidentally, return anything in google aside from this presentation. There's also a clear divergence in style on the backdoor slides, and it reads like a parody.

But the most obvious problem: if the NSA or whoever had a backdoor to truecrypt and Android and iOS, they would not send that information to a local DA office to be leaked.

Please don't set aside critical thinking just because something confirms your biases.

  • tylerkahn 12 years ago

    Incessantly cynical distrust of the government is the new blind patriotism.

    • BetterLateThan 12 years ago

      It is impossible to overmistrust the State. If you could imagine the lows they will go to, you'd be working for them by now.

      • Houshalter 12 years ago

        Is it really impossible? Do you think there is literally really no limit to what they can do or what they will do?

        • glimmung 12 years ago

          No, but they operate at a scale beyond our comprehension, and use reasoning beyond our comprehension (or mine, anyway!), so it's not too clever to imagine that we can anticipate their limits...

nitrogen 12 years ago

Page 16 has some wonderful lines:

  • “Fruit of the poisonous tree” can be circumvented
    • The use of backdoors cannot be detected or proven
    • Vendors are legally and commercially prevented from
      acknowledging their backdoors. Defense will not be
      able to prove their existence
    • The files can be described as “forensically obtained”
  • fluidcruft 12 years ago

    ...but how is the prosecution able to prove the files exist on someone's device if they don't have to disclose how they determined that the files were present? If all they have to do is assert that the files exist and were "forensically obtained" then why bother with the backdoor in the first place?

    • DannyBee 12 years ago

      They are required to disclose everything. This slide reads like it was written by someone whose knowledge of criminal procedure comes from TV.

      • nitrogen 12 years ago

        The title page credits the document to a presentation by a detective in Oregon. Have any journalists tried to verify the source and accuracy of this document? It's unclear from the article submission why it was submitted or how the submitter found it.

        Edit: I just read the current top comment listing the names of the supposed presenters.

  • dmourati 12 years ago
  • DannyBee 12 years ago

    This is of course, completely false in every way. No prosecutor would ever be dumb enough to say any of this.

    • nitrogen 12 years ago

      Could it happen in some off-the-beaten-path courtroom that isn't being watched as closely, and whose defendants are less likely to know that? The title page of the document shows a county in Oregon, and the link at the end to the previous year's presentation points to North Dakota.

c0achmcguirk 12 years ago

This article is pretty interesting:

http://www.privacylover.com/encryption/analysis-is-there-a-b...

It claims TrueCrypt is a CIA honeypot.

tylerkahn 12 years ago

http://en.wikipedia.org/wiki/Cold_boot_attack

There's your backdoor.

DannyBee 12 years ago

If you use the link to the last year's presentation on the last page, and download it, you can see last year's presentation was made by "micah smith" (who apparently has become "michael smith" this year).

The entire presentation is clearly a copy of the previous year presentation, with some words changed by some moron with an agenda whose understanding of criminal procedure came from watching too many law and order episodes.

Karunamon 12 years ago

So there's a few possible ways to interpret this..

    * There is an actual hereto-unknown flaw in TrueCrypt's algorithms or implementations of algorithms that can be exploited.

    * They are referring to the only known attack, wherein keys can be recovered from RAM if the volume isn't unmounted correctly.

    * This is FUD designed to push people away from less-breakable encryption and onto software which actually /does/ have backdoors.

    * This is a hoax (pay special attention to the detective's names on the slide)
I'm not sure what to make of it.
frenger 12 years ago

Truecrypt is open source. Can anyone find the backdoor?

noname999_666 12 years ago

Anybody ever heard of the "zSearch" software mentioned in the pdf?

After some more digging, found this document: http://www.ndsaa.org/Computer_Forensics_for_Prosecutors.pdf

Which states:

Free product by SA Eric Zimmerman

Random Access Memory Analysis:

* FBI - Salt Lake City, UT

* Distribution - eric[at]feeble-industries.com

* Plug-in live triage via USB

* Virtualization, encryption, mass storage, P2P, Gigatribe, picture & video preview, password gathering, and MORE!

Looks LE agents can request a copy by registering for the guy's phpbb form here (judging by the registration terms, it's not open to the public):

https://feeble-industries.com/forums/ucp.php?mode=register

peter_l_downs 12 years ago

Worth mentioning that truecrypt volumes can be hidden inside playable video files. Yes, it's security through obscurity, but hey, it makes me feel a little safer.

http://keyj.emphy.de/real-steganography-with-truecrypt/

  • unimpressive 12 years ago

    Mentioning a steganographic technique implies that you use it, negating the point.

    • scott_karana 12 years ago

      Not completely. How many video files does he have? Where is it stored?

      I'm curious now though, do Truecrypt volumes have a magic number, in which case it's still easy to find, or are they fully crypographically random in appearance, making this a known-needle in a large haystack problem?

      • Houshalter 12 years ago

        Truecrypt claims an encrypted volume is indistinguishable from random data. I do not know if this is the case though. Obviously don't give it the file a stupid name or extension like "encryptedfiles.tc" or leave it open in your file history, etc.

        It's also pretty suspicious if someone has a file of megabytes of random data.

    • peter_l_downs 12 years ago

      *speaking hypothetically of course.

  • coin 12 years ago

    The file size will far exceed the normal size of the video - easily detectable.

xarball 12 years ago

This really doesn't sound legit. I suspect they might be thinking of backdooring the truecrypt client, which, really wouldn't make it much of a feat.

The container format itself is really just a giant mathematical mess -- there really isn't anything to backdoor there.

And then the client doesn't exactly dial-out to anything when you mount an encrypted volume. Therefore I would suggest that this is probably a matter of using alternative means of access to the machine in order to patch the client itself.

That wouldn't exactly be worthy of the attention of the NSA, given that truecrypt is open-source.

  • Ergomane 12 years ago

    > The container format itself is really just a giant mathematical mess -- there really isn't anything to backdoor there.

    The container itself can actually be 'backdoored' by a malicious client by eg saving a duplicate of the master key, or generating a master key using a deliberately weak RNG.

  • unimpressive 12 years ago

    user: xarball created: 2 minutes ago

    Any reason you're using a throwaway?

    • detcader 12 years ago

      Israel hires pro-government internet commenters, it'll come out that the US does as well soon, just like everything Israel does "first"

      • unimpressive 12 years ago

        The current downvotes on your comment are why I didn't say "This really doesn't sound legit." instead of what I did (that and there is a genuine possibility for the commenter to have a real reason for using a throwaway).

NDizzle 12 years ago

I was going to add that you can link directly to the page like this: http://cryptome.org/2013/09/computer-forensics-2013.pdf#page...

Works in FF and Chrome in-browser readers.

Then I realized you should really skim every single page, rather than going straight to 15.

andrewpi 12 years ago

Wouldn't any backdoor used in a criminal prosecution have to be disclosed to the defense?

  • D9u 12 years ago
  • fnordfnordfnord 12 years ago

    Nope, this is what Ginsburg would call an instruction manual for how to defeat the 4th amendment.

      The use of backdoors cannot be detected or proven
    
      Vendors are legally and commercially prevented from acknowledging their backdoors. Defense will not be able to prove their existence
  • na85 12 years ago

    Scroll down a bit; all they have to disclose is that the files "were forensically obtained."

    • andrewpi 12 years ago

      I saw that, but I still don't see how that works in a trial. Said evidence will need to be introduced in court. When the witness tries to be cute by giving a vague answer, can't the defense just ask the witness to explain further?

    • DannyBee 12 years ago

      This is entirely false. For gods sake, you have to put lab technicians on the stand for cross examination when they test your blood.

      For something like this, a report gets written, and the person who wrote it gets cross examined.

azelfrath 12 years ago

EDIT: Ignore that. I figured a slide show would not skip slides when you use arrow keys for navigation.

Can I get a direct quote? I'm not seeing any mention of TC on p15 or any other page.

  • threepointone 12 years ago

    I'll quote it here anyway, for the benefit of other readers -

    What’s A Backdoor? • A method to bypass data encryption or security • Does not require the password or passphrase to be known • Saves time, cost and effort to access encrypted or secured data • Allows data to be accessed, copied and even modified without tipping off the owner • Currently available for major encryption software – Microsoft Bitlocker, FileVault, BestCrypt, TrueCrypt, etc • Currently implemented by major cloud storage provider to comply with NCMEC requirements

pekk 12 years ago

Not everything that looks like it comes from the government really does.

throwaeayq 12 years ago

https://github.com/bwalex/tc-play this guy probably knows a thing or two about if it's safe

eruditely 12 years ago

I laugh at 'white hat' prosecution based culture, there is a serious lack of ethics in the computer security profession.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection