back to article Two convicted for refusal to decrypt data

Two people have been successfully prosecuted for refusing to provide authorities with their encryption keys, resulting in landmark convictions that may have carried jail sentences of up to five years. The government said today it does not know their fate. The power to force people to unscramble their data was granted to …

COMMENTS

This topic is closed for new posts.
  1. Anonymous Coward
    Anonymous Coward

    Which is why...

    It's good to use an encryption which has an optional multiple key system like Truecrypt, you give them a key which lets them read the volume, and see all your "secret" stuff like bank account details etc... You don't give them the other key which would decrypt your bank account details and your plans for world domination.

    As the secondary key is an optional (and undetectable) step, they have no idea if you are using the feature, or if you have given them the full key or not.

  2. ohnoesohnoes

    Nice work, Big Brother

    Good to see that the Magna Carta is still going strong in the UK.

    Oh, wait, no. 1984 is the new bill of rights!

  3. Columbus

    smug mac users

    whilst I am a smug mac user, and accept filevault is not perfect, I am aware of maclockpick which is quite a useful bit of kit to get into most macs and any decent mac sysadmin could get into an ordinary mac in seconds. Luckily there is a dearth of mac people in the british police

    The point for most people is that the police don't need to get into them anyway. The evidence is presented in such a way that "we have the computer, and therefore the evidence that you are a bad person so plead guilty." Remember Operation ORE...

    @NIC3 - Some warrants are properly considered, others are sheer fishing trips requests in front of a magistrate, and others are simply arrests on spurious reason then searches conducted under PACE

  4. Anonymous Coward
    Pint

    What can you do? May as well have a beer while you still can..

    Given that it's only a matter of time before you can go to jail for not giving up the existence of (and password for) hidden encrypted volumes too (once the idiot scum who make these laws hear about this potential dodge), almost anyone with a computer and access to encryption technology will be potential criminals. So that's everyone then!

    Two steps in establishing a strong police state:

    Step 1: ensure all citizens can be held guilty until proved innocent of a crime which it is impossible to disprove having taken place.

    Step 2: bask in the glory of your unbridled power as dissenters are thrown into jail for haplessly transgressing on step #1.

    Mines a swift half before they come to take me away to room 101...

  5. Shadowfirebird
    Black Helicopters

    A quick primer on RIPA pt III

    * No, forgetting your password is not an excuse -- you go to jail.

    * Ditto claiming it's not encrypted. You have to prove it's not encrypted (I know, I know...)

    * Not only is the point about not incriminating yourself not going to work, I think there was even a case that went against the idea in the US (it was about a TSA search of a laptop, if I recall correctly).

    Since the onus is on you to prove your innocence, technically you could still be done for even with plausable deniability. "Prove that you don't have a hidden second tier!" "I can't!" "Then it's jail for you, sonny boy!"

    Believe it or not, if it weren't for the campaign against it, RIPA would actually be *worse* than it is; check the Reg's archives for details...

  6. Anonymous Coward
    Anonymous Coward

    @What if it isn't my file?

    Exactly. Hypothetically, what is the position if say you buy lots of hard drives off ebay. One or more happen to still contain encrypted data (the system is also encrypted so wont even boot) , What then ?.

  7. Anonymous Coward
    Thumb Down

    @Karim Bourouba

    >the average intelligence of the plod is almost equal to a garden fence.

    And it appears that the level of intelligence of the average commentard is even lower. If I think you mean what you didn't write then the basic flaw in your comment is that it is not your average plod who would be attempting to forensically examine a hard disc, in much the same way that your average plod does not perform an autopsy.

    You might like to gain brownie points by making such asinine comments to a bunch of budgies with new mirrors but reality is somewhat different.

    All this law has done is provide a possible short cut to prevent the forensics experts from wasting their time but if they believe you really have something to hide and it is important enough to them then they will take the time and they will find it. However, if you're sat in prison for two years at a time then they really have little incentive to look very hard.

    And as for all those comments about double partitions in TrueCrypt. It might satisfy the curiosity of your wives when she sees that you have an encrypted file but if you think for one minute it will fool a trained forensics expert then at best you've wasted a minute of your life.

  8. Steven Jones

    @nic 3

    I think the real danger with this is that somebody will get caught up in some Kafkesque saga where they are required to provide a password for some encrupted file and have genuinely forgotten it. I suspect many of us have old password protected/encrypted files that we have forgotten about or have lost their purpose. Certainly I have.

    It may be considered unlikely that people will get drawn into "serious" investigations and end up in this position, but that's far from the case. It's only necessary to look at Operation Ore where very many people had PCs seized following the discovery of credit card numbers on a web site carrying child porn. Of course it is far from the case that all of them were innocent, but there were certainly a very substantial number who were being the victims of things like stolen credit cards or frankly erroneous statements about what they must have seen.

    All it requires is a mixup on log records for somebody to be dragged into an investigation. There have been mixups over such stupid things as differences in timezones (BST vs GMT) on ISP records, not to mention the possibility of Trojans, wireless networks being hijacked and any number of other things which could end up with an innocent individual being dragged into investigations of some very serious crimes.

  9. Jockox3

    Apologies...epic fail

    I missed Anonymous Coward's post about the same case @ 15:32 and misheard the report last night and thought he had been convicted not merely remanded.

  10. Anonymous Coward
    Anonymous Coward

    The big question

    The big question is what counts as sufficient evidence that the accused is refusing to decrypt the data rather than being genuinely unable to do so.

    It's perfectly normal, I think, to have encrypted data that one can't decrypt. I frequently encrypt something in order to move it from one place to another, on a CD, an SD card, or by e-mail. I encrypt the data either with a simple passphrase that I can remember or with a randomly generated passphrase that I write down on a scrap of paper, and I decrypt the data a few hours or days later at the destination. A few weeks or months later I genuinely can't remember the passphrase, and I've lost the scrap of paper if there was one, but the encrypted data is probably still hanging around somewhere in my custody. Can they lock me up for that?

    If yes, then it's a dangerous law. If no, then it's a useless law.

    In any case, if the justification for the stupid law is child porn, then that's a stupid justification because perverts looking at pictures, however disgusting you or I might find them, is a victimless activity and shouldn't be a crime.

  11. Nomen Publicus
    Black Helicopters

    Lesson the first

    Always keep your illegal porn and plans to assassinate [insert name here] on somebody else's computer .

  12. Anonymous Coward
    Anonymous Coward

    Well, don't control data access in the UK then.

    UK laws apply to UK companies and UK located information.

    I wonder what would happen if you host your data or even just one half of a master key in a country where privacy still means something, Switzerland? They too can demand access if there is enough evidence of criminal activity (little known fact about Swiss bank secrecy - it's the bit the US tends to gloss over when they accuse Switzerland of "hiding" data), but (a) the Swiss require a proper warrant issue process instead of the weasely "I wanna" in the US/UK (especially since you're crossing borders) and (b) have demands in place to treat such disclosed information with the extra care it requires. The privilege of legally enforced access is limited to those investigating the case, and the data is destroyed if the claim proves to be without merit.

    I'm not quite sure what your position is if you CAN provide access but it would have to go through the Swiss - you're then not violating the law, just making it hard to do so improperly (IANAL, of course).

    In the UK, it appears that as soon as you have handed off your precious information (about, say, High Net Worth individuals or some celebrity) there is NO requirement imposed on police or government to treat that data as it should. Translated; if someone high up wants to ruin your business (or get a copy of your confidential information), all he needs is (a) a high friend in government, (b) a manufactured section 49 disclosure and (c) an "accident" involving "lost" CDs or memory sticks, leaving you to clean up the mess, and there will be almost no audit trail to follow back. Alternatively, the so obtained data gets handed to a fresh school leaver who can be socially engineered to hand it over for a bar of chocolate (I may be putting the "bar" too high here, har har).

    Just to clarify: I have no problem with the concept of disclosure for proper purposes - I understand the need (I was in London during the IRA years). However, there is NO excuse for the absence of proper audit, accountability and independent checks preventing abuse. If there was even a glimmer of transparency in the system it would be OK, yet that has been scrupulously avoided - thus prompting the mistrust it deserves.

    It's not the citizen who may or may not have something to hide, it's the government which must remain accountable. BTW, you have to prove your innocence here (in case you missed it). First the banks managed it (CHIP & PIN swaps liability), now the government. Wonderful.

    Well, I have TBs of storage available, and at a pinch I can also vault hard disks externally - all you need is split key encryption and you're on your way. You disclose the UK part, they'll have to work on the Swiss part (as soon as they cross the Swiss border it becomes a Swiss judicial matter, you can't just wander into another country with some plods).

    Happy to help (where it remains legal) - I saw this coming when RIPA was just in discussion..

  13. Anonymous Coward
    Big Brother

    Worrying

    About six months ago I downloaded Truecrypt and bogged about with it for a bit. Probably in response to a previous article on Reg. I created a small volume and mucked about putting a few mp3s in. For a while I had different versions of the volume on my drive with slightly different content and yes I know that's a security no no, I was experimenting see. All but one got cyberscrubbed, I got bored and never got around to putting truecrypt to use. I should as I have banking related stuff on here.

    I can't open the volume any more. I know what the pass phrase was but not the caPITalisatiON and symbol sub$titut!on I used. I really out to just scrub the lot but it's like a challenge now trying to recall the correct combination.

    Just having that on my drive could get me sent down for 2 years if someone I annoyed made a malicious accusation? Get me outta this Liebour fucked over hell hole.

  14. Anonymous Coward
    Anonymous Coward

    Been coming a LONG time....

    I first started warning colleagues in the IT/Defence Industry about RIPA way way back in 1995/96. People at the time thought I was over-reacting. It was a long time before it actually hit the statute books (in full) but what a bunch of control freaks were at the levers of power then. The same people are horrified now and can't quite understand how this happened. We live and learn...

    Plausible deniability. If you have something to hide in the UK then first of all don't - offshore it. If it HAS to be here then you need a multi-layer crypto/obsfuscation scheme. There's various Windows based apps available, there used to be Phonebook for Linux machines (think that's long dead but was a bloody good idea) and of course there's h/w tokens but not on their own eh?

    In short if you have data in the UK that is stored offline then assume that plod will be able to "persuade" you to part with the key. If the data is online then plod should already have it. You should be planning on that basis.

    With the nastier clauses in RIPA (can't disclose you've been asked for the key, etc) I see no reason why anyone with the slightest clue would choose to store ANY sort of confidential data within UK borders.

    Protect yourselves for the UK govt is only interested in protecting itself. Really. The next (Tory) govt will be the same - watch them NOT repeal the "bad" laws, but extend them in the guise of "reform".

    If you have nothing to hide then why do you have curtains?

  15. This post has been deleted by its author

  16. Anonymous Coward
    Linux

    Use a non-mainstream OS?

    No, Linux is too mainstream - and EVERYONE knows if you use that you are a criminal Haxor. Try CP/M or DOS 3.3 or some academic experiment. They probably won't realise the computer is running if they don't see "Welcome to Windows". And having the key won't help much if they don't know how to enter it!

  17. Anonymous Coward
    Stop

    Rights of the Innocent

    Whatever happened to the rights of innocent people? (Oh, I know, it's more a rhetorical question these days. That's how far we've gone down the pan.)

    When the State wants you, an innocent person, to hand over an encryption key, is it so that you will help them prove your guilt (but your innocent), or is it so that you can prove your innocence?

    Innocent people shouldn't have to help the State prove them guilty. After all, they're innocent. There is no guilt to prove. It would be truly perverse for innocent people to have to help the State prove them guilty of crimes they didn't even commit.

    Innocent people shouldn't have to prove their innocence, either. You're innocent, whether you prove it or not. As an innocent person, you have the natural, human right to be respected and treated as the innocent person that you are. And isn't all this criminal justice stuff supposed to be about protecting the innocent in the first place?

    Innocent people shouldn't have to help the State prove their nonexistent guilt, nor should they have to prove their innocence. Innocent people shouldn't have to hand over their encryption keys.

    But what about the guilty? Well, until and unless they're proved to be guilty, the State has to allow for the possibility that they're innocent. Otherwise, genuinely innocent people end up having their rights, as innocent people, taken away in the process. This is what the right to the presumption of innocence is essentially about. Until and unless proved guilty beyond all reasonable doubt, we must limit what we require of suspects and defendants to only that which can reasonably be required of entirely innocent people. Otherwise, we're failing to protect the innocent in our pursuit of the guilty. And since it's all ultimately about protecting the innocent, that would be a truly perverse outcome.

    There is a real and growing need to enshrine the rights of the innocent right at the heart of our State. It must form a fundamental part of the very foundations of the State. Without the rights of the innocent, the State ultimately has no legitimacy.

  18. Anonymous Coward
    Thumb Up

    What a load of paranoid crap.....

    >Innocent people shouldn't have to hand over their encryption keys.

    If there is reasonable suspicion of crime and its gone through the legal process, of course they should, same as they would their house keys, safe keys or shed keys......

    Bottom line is its only a problem if you've got something incriminating encrypted.

  19. Sitaram Chamarty
    Big Brother

    @Michael C Posted Tuesday 11th August 2009 13:45 GMT

    doesn't explain why you can't tell people you've been asked for the key, which apparently is also part of RIPA, per John Naismith Posted Tuesday 11th August 2009 16:35 GMT

  20. Anonymous Coward
    Big Brother

    @WTC

    >On the one hand I want anyone planning the next WTC atrocity caught before...

    Problem there of course is that the terrorists in this case, and probably most, used code and open channels rather than cryptography which (historically) has only ever provided the illusion of security from state intelligence services.

    From where I sit, a reassuring angle on this story is that tax payers cash isn't being wasted in spades on consultants and high power cryptoanalysts cracking the hard drives of wannabee child molesters and monkey fans...

  21. Anonymous Coward
    Paris Hilton

    I made the mistake of complying with the police

    to try and prove my innocence when falsely accused of assault by my ex wife and then had to sit back and watch whilst the police force involved tried to manipulate every single item of evidence.

    My 1 hour fully compliant interview was reduced to a ROTI of 2 lines and despite an order from the court during one of the 37 pre trial reviews to produce a full one they still refused.

    My clothing, worn at the time of the alleged assault which if the allegation was true would have been liberally sprayed with blood was not forensically tested as I had "admitted to being at the scene"! even though it would have come back negative for blood.

    A full medical carried out in custody showing that I didnt have a mark on my hands on body despite an allegation of a full blown fight was marked as "clearly not disclosable" even though it clearly helped my defence, had to fight to get that one out as well despite the court telling the plod they had to release it.

    Custody notes where edited, statements where changed, witness's where coached at court etc etc.

    Anyone who does anything else except say "no comment" is opening themselves up to the police positioning you for the fall. After all, we are expected to believe that DNA should be kept on people arrested as the innocent will commit further crimes!

    My advice is to say "no comment" to all questions and store your dodgy stuff on a server overseas so you dont go through 2 + years of crap until there forced to drop it as I was.

    Anyone who thinks we have nothing to fear is living in cloud cuckoo land.

    Paris - brighter than plod

  22. Henry Wertz 1 Gold badge

    self-incrimination and keys

    "If a court demands you produce financial records, and you hide that information or destroy it, when the court is aware already of it's existence, you're typically imprisoned"

    But if they got the documents and just couldn't read them, you would have been in the clear.

    "when it comes to a warrent issued to colelct specific evidence, your actions to prevent that collection are in fact criminal, and allways have been"

    Except this doesn't prevent collection, it prevents reading the evidence. I don't think there was a requirement to provide keys until this law was passed.

    Anyway, I'm just not sure that Britain has any protection against self-incrimination (the US does in the form of the 5th ammendment.) If you do have this right, then this law violates it. It's NOT like destroying or failing to provide data -- they have your data, they just can't read it. If the right against self-incrimination was just common law or tradition or whatever, well, there you go... that's why the founding fathers here in the States passed these ammendments, they figured power-hungry despots could get in power eventually and having these rights enumerated would slow them way down compared to just having it be vague case law or what have you that they could ignore.

  23. ed2020

    Title.

    "And as for all those comments about double partitions in TrueCrypt. It might satisfy the curiosity of your wives when she sees that you have an encrypted file but if you think for one minute it will fool a trained forensics expert then at best you've wasted a minute of your life."

    Oh really? Do you have any evidence to back up this assertion?

  24. Charles 9

    Re: Rights of the Innocent

    And then, as some would say, "There IS no innocence." The state is hopelessly lost. Either the freedoms it is supposed to protect end up letting the fox in the hen house (because nefarious agents are able to destroy the country with a totally innocuous phrase like, "Let's party.") or, in the process of protecting the people they're charged with defending, they end up become their very pariahs. If the state is damned if they do and damned if they don't...then they'll damned well do as they please.

  25. Omer Ozen
    Happy

    Re:Remember this is plod not CSI

    @Martin 6

    Thank you Martin, you really made me laugh out loud.

  26. Anonymous Coward
    Anonymous Coward

    Re: You don't have....

    ".....the right to remain silent it seems"

    Look back to the Criminal Justice and Public Order Act 1994: http://www.opsi.gov.uk/acts/acts1994/ukpga_19940033_en_1

    More specifically, Sections 34 to 39, "Inferences from accused’s silence": http://www.opsi.gov.uk/acts/acts1994/ukpga_19940033_en_5#pt3-pb3

    It was the Conservatives who put that piece of legislation through. The loss of our rights is not all New Labour's fault.

  27. Nic 3
    WTF?

    @Anonymous Coward -16:23 GMT

    "In any case, if the justification for the stupid law is child porn, then that's a stupid justification because perverts looking at pictures, however disgusting you or I might find them, is a victimless activity and shouldn't be a crime."

    I truly hope you are joking.

    If you are not (and I really really hope you are just trolling). Consider the basics of supply and demand

  28. Richard Smith 1

    "Domestic extremism"

    WTF is "domestic extremism"? Is it like extreme ironing?

  29. ZenCoder

    They make it illegal to forget passwords ...

    A large number of products employ encryption ... people are disorganized ... the average person is bound to have some old password protected file somewhere that they honestly can no longer decrypt.

    Laws like this are really great. You see a lot of times they want to believe someone is guilty but they have no evidence. And in a society that respects the rule of law you can't lock those people up. So you just make so many stupid laws that anyone can be found guilty of something.

    Since everyone is now a criminal you can take it a step further and collect everyone's DNA, fingerprints and put up spy camera's everywhere.

    http://www.theregister.co.uk/Design/graphics/icons/comment/big_brother_32.png

  30. Anonymous Coward
    Anonymous Coward

    Tin foil hats out in force

    You lot are so fucking paranoid. Nobody is interested in your porn nor your bank details. What makes you think you're so special that a squat team is going to come knocking down your door in the middle of the night demanding passwords to encrypted files? Sod all, that's what. In a full year 15 people were served with notice to give up their keys and that is 15 people who were already being prosecuted for a tad more than a minor offence.

    Just from the title of some articles it's easy to know what the comments are going to be, it's like winding up a bunch of clockwork sheep then watching them all head off in the same direction.

    What is wrong with people suspected of committing, and possibly planning further, heinous crimes being asked to provide a key? If you're prepared to spend a rolling two years until the end of your days in prison rather than hand over a key then you're either so pigheaded that it's better you are locked away or you have got evidence of a crime in which case fess up and accept you've been caught.

  31. Simon Langley

    Hidden partitions are proof against forensics

    @AC

    "And as for all those comments about double partitions in TrueCrypt. It might satisfy the curiosity of your wives when she sees that you have an encrypted file but if you think for one minute it will fool a trained forensics expert then at best you've wasted a minute of your life."

    That shows all you know, ask a proper cryptographer.

    The plausible deniability of Truecrypt's hidden partitions is exactly that. No matter how well trained the forensics expert is, it is not possible to prove that a Truecrypt volume contains a hidden partition unless you can decrypt the data. No-one, and I don't care who they are, how much they know or how well they are trained can prove this - it just isn't possible.

    Most steganography techniques can be overcome, but the plausible deniability of Truecrypt (and RubberHose to give another example) is exactly that. Without an encryption key or a computer powerful enough to crack strong encryption algorithms (and I don't believe even the NSA is capable of this) encrypted data can be made indistinguishable from random bits.

    Truecrypt FTW.

  32. Anonymous Coward
    Anonymous Coward

    ACPO only following orders

    ACPO's up to it's usual tricks. It is telling Chief Constables not to apply the ECHR ruling and to wait for guidance from the Home Office... sometime next year at the soonest.

    http://www.guardian.co.uk/politics/2009/aug/07/dna-database-police-advice

    As though Home Office guidance can trump ECHR final rulings, and as though Chief Constables can be outside the European Court of Human Rights ruling, just as long as they're 'only following orders' no doubt.

    They can't, ECHR rulings are binding, they're not just binding only after the country has agreed they are binding.

    And interesting those 'secret letters' have been sent 235 times. These are the times when secret claims are made against the person in a letter, and that letter is not seen or can be challenged by the individual. A secret blacklist run by the police.

    http://www.bbc.co.uk/blogs/ipm/2009/07/crb_checks_and_secret_letters.shtml

    Seems to be used far far more often than I would ever expect. I bet none of those 235 will ever be told they can't get a job because of a secret letter.

  33. Anonymous Coward
    FAIL

    re Tin Foil hats

    Nic 3 said "On the subject of Warrents, I can tell you that they are not given out without serious consideration based largely on individuals right to liberty."

    so that's all right then. nothing to see here, move along... actually no.

    the big problem with ripa and imp is there is no independent judicial scrutiny or oversight. or proper safeguards like those in the us consitution. if the cops want to search your house, they need to get a warrant first. which means convincing a beak the search is reasonable and justified. it's not much of a safeguard, but it is there. the cops just can't search whenever the mood takes them. and in the us, evidence obtained from an unsanctioned search is inadmissible in court. however with ripa and imp, the cops and council and spooks -- hi there cheltenham! -- can go on fishing trips without judicial oversight. in fact there's no way of knowing if a ripa search has been done or if it was justified. we have to take their word on that.

    a proper system of checks and balances is needed. the ones looking for information must not be the ones to decide if they can go looking for it. that decision must be made by a judge. not a cop or a politician or civil servant.

  34. bigphil9009
    FAIL

    @ John 186

    Oh do sod off mate, have you ever heard of the Parlimentary System? We don't actually have a President, you know.

  35. Anonymous Coward
    Coat

    blah Liberties blah Jackboots blah blah

    UK is buggered, get out now instead of whining on El Reg. I'm off in about 6 weeks.

    The army surplus jacket with the Ferry ticket and Ford Transit keys.

  36. Anonymous Coward
    Anonymous Coward

    chaffing

    Several years ago Ron Rivest came up with a way of circumventing this type of law: chaffing and winnowing. It only uses authentication keys, not encryption keys, so you cannot be forced to reveal them - the privacy of authentication keys is guaranteed by the law in the UK.

    It also supports deniable encryption, since you can "voluntarily" reveal one of the several keys you use to create the chaffed message, giving the authorities access to an innocuous plaintext.

  37. Pete "oranges" B.
    Grenade

    Kickin' It Old Skool

    O/S loaded from ROM into RAM with only selective writes to storage.

    Remind anyone of the Seinfeld episode in which Cramer attempts to move the arcade machine without losing his high score?

    (Grenade as metaphor of the transience of memory.)

  38. Fraggle
    FAIL

    What about self-encryption?

    ie codewords? Can you be imprisoned if you refuse to interpret? If not, how is it different?

    HMG still does not get it. They're doing all the wrong things, because they're fighting the wrong enemy.

    @AC

    "It might satisfy the curiosity of your wives"

    Surely you'd be in trouble for bigamy! ;)

  39. Anonymous Coward
    FAIL

    right to silence - self incrimination unlawful under EU law

    if you are arrested you are told you have a right to remain silent under questioning. The Human Rights Act, which is based on the European Convention on Human Rights, gives you a right to a fair trial, and European courts have read this as meaning that you can't be forced to incriminate yourself.

    further to this:

    UK law gives you your right not to incriminate yourself and a right to silence. EU law stipulates that you do have a right not to incriminate yourself and a right to silence.

    however, various laws passed since the early nineties seem to have done their damned best to undermine these basic principles....obviously because of things like serious grade encryption being available to the common criminal^H^H^H^H^H^H^H man ;-)

  40. Bounty

    Which carries a longer sentence?

    What's worse destruction of evidence or not turning over they keys? Which carries a longer sentence? "Yeah, sorry I gave you the self destruct key, now I would prefer the 2 year destruction of evidence sentence instead of holding me for 14 years for contempt. Thanks."

    What if it's a two person passcode? "My mistress, the neighbors wife, knows the rest of the password. This is where we store our favorite home movies."

    What if the key is stored in RAM? "Yeah, just open truecrypt and press ctrl+v. What you turned it off...?" Would that be destruction of evidence? What if all data was in RAM, say you use a boot CD?

    What about biometrics?

    Anyways, contempt of court = eternal damnation is a violation of double jeopardy laws in my mind. I've almost forgotten pin numbers to seldom used ATMS. I don't remember any combinations to any combination lock I've ever used.

    How about this. If Bob made an encrypted volume 5 years ago, it's totally possible he forgot the password, or that he even made it. Bob plays with all kinds of software all the time. Hell, lets say Bob is a criminal. Bob hacks consoles or something, and he has experimented with HDD encryption, and at some point makes a volume and put some mp3's in there to test but he forgot the password. He tried to get all secure and fancy, and made the password too hard to remember. Instead of a 2 year total sentence for console modding, he gets 14 years for withholding keys he can't remember?

  41. I didn't do IT.
    Alert

    RE: Tin foil hats out in force

    Ah, well then. Now that you have written that, the IMP has it in its database, and will now show up on your CRB. Why?

    When "Those that have nothing to fear have nothing to hide" fails, then its, "Methinks you do protest too much", because that's just the next step in rounding you up. Worked for McCarthy over here, after all...

    And (this time) it is not even malicious. You are just in the National Lottery of Blame(tm). Operation ORE was an educational exercise; make enough noise about the crime, and no one will care who gets swept up, even if they are innocent, as long as you don't let them talk. "We have your credit card details from that card you "reported stolen" last year - you are a fiddler! We don't need to find pictures, we have that card number!" and you are done.

    Too bad, he didn't seem like that kind, but we are safer, aren't we?

  42. Anonymous Coward
    Anonymous Coward

    Right to Remain Silent - U.K.

    http://en.wikipedia.org/wiki/Right_to_silence_in_England_and_Wales

    You've got the right to remain silent, but your silent will only incriminate you further.

  43. Fraggle
    Boffin

    And then....

    I came across this

    http://vanish.cs.washington.edu/

    which claims to be able to set data to digitally self-destruct. Is that usable as a defense ("Sorry, the data has already expired, no-one can see it now, not even me")?

  44. Havin_it
    Coat

    @Chris W

    I don't know what the hell a "squat team" is, but if they come knocking down my door I hope it's not the back one O.o

    Sorry to deflect the thrust of your argument...

  45. asdf
    Unhappy

    the irony

    Considering the whole future dystopia genre was largely invented by English writers, not recently but about the time my grand parents were born (see Huxley, Orwell, etc) it is sad even with generations of warning it is happening anyway in the West. How ironic it is that it would be the UK leading the charge.

  46. Steve Roper
    Stop

    @AC 16:23 Aug 11

    "...perverts looking at pictures, however disgusting you or I might find them, is a victimless activity..."

    Er... not quite. You see, if a pervert has PHOTOS of kids having sex with each other, then to take those photos somebody had to, you know, actually force some real kids to have sex with each other. Not exactly victimless, eh?

    What IS a victimless activity is people creating / looking at 3D rendered CG images, or cartoon drawings, of children doing "inappropriate" things. Having such pictures is still a crime both in the UK and Australia - now THAT is wrong. Since such pictures are not photos and don't harm real children in their making, banning them is political fear gone mad. Granted, if someone has a propensity to want to look at such images for sexual arousal they should be asking themselves if they have a problem. OTOH I've also seen examples where such pictures are used as black comedy or sick humour, such as the picture of Lisa Simpson blowing Bart (and I'm not talking about the London Olympics logo!), for which a guy in Sydney was convicted of possessing CP. If that isn't oppression, I don't know what is.

  47. Anonymous Coward
    Linux

    My encrypted data self-destructs...

    AC, just in case.

    If you try to decrypt my data in the usual way (but wrong info), it goes away. I use typical Linux encryption (no, I won't be specific), but hacked in a custom way that you won't notice unless you compare my binaries with all the other versions out there. Good luck with that.

    If you clone it to another drive or run it from another system, you might have a chance. There is one hole I couldn't close, but of course I won't say specifically what that is.

    Simply having the keys to my outer encryption layer won't help you with what's inside. Even if you run it from another computer, you are going to need the binaries within the outer encryption layer to get what's inside the inner layers (of which there are several inner siblings within the outer). There isn't an encryption library in the world that can decrypt my inner layers without the customized binaries inside the outer layer. There are a few interesting tweaks, but otherwise standard.

    The encryption binaries to decrypt the inner layers pay very close attention to the environment they're in. If something's strange (example: I changed a device that is being monitored), I have to do a few special things to keep it from suicide. Otherwise a valid key will cause it to self-destruct. An invalid key will always cause this, on the first try. There is no room for failure.

    It's not 100% failsafe, of course. I know of at least two ways to get around it. I don't know how to plug those two holes. There might be even more that I don't know (which is quite likely).

    In any case, random idiots that try to get at the data won't get it no matter what. They'll likely have killed it all on the first shot. If they're true idiots, they wouldn't know enough to make the backup before they tried to use it.

    I keep my data encrypted for specific reasons. None of those reasons involve anything illegal. But if someone pointed a gun at my head, I'd rather get shot than give it up. At least I could help them destroy the data before they fired. Good thing I'm not a target. :-)

    I'd like to work it in that if they used a valid key that they get valid data, but not the same data. I don't mean an alternate key like TrueCrypt does, I mean a *valid* key. I'm not there yet. I don't have time to mess with it, so I might never get there. (I do admit, I admire the way TrueCrypt does the hidden encryption area; pretty smooth.)

  48. Dusty Wilson
    Black Helicopters

    @Simon Langley

    "The plausible deniability of Truecrypt's hidden partitions is exactly that. No matter how well trained the forensics expert is, it is not possible to prove that a Truecrypt volume contains a hidden partition unless you can decrypt the data. No-one, and I don't care who they are, how much they know or how well they are trained can prove this - it just isn't possible."

    Mostly true. If they get a copy of your encrypted device/file at one point in time and then get it again in the future, they can compare the differences to see where the writes have been occurring. If there weren't any changes at all in the front, it's probably got a hidden partition within. No promises that it's always true.

    If you know that your encrypted device/file has been observed (eg: cops came to your house and grabbed your computer, but returned it later), you should wipe, reinstall, create encryption anew, and do it over again. That way they have nothing to compare it to. (and don't trust that they didn't modify your binaries! but then again, I'm paranoid)

  49. Anonymous Coward
    Paris Hilton

    encrypt then change file type

    How about taking an encrypted file and then changing its extension (like a .doc or something equally familiar). Authorities would probably overlook such a file and if the didn't they would simply try to open it with Word or some such program. File won't open, program and computer crashes, assume file corruption, continue in your nefarious ways.

    Paris, 'cause all my Paris porn hides in plain sight.

  50. Anonymous Coward
    Thumb Up

    @P Saunders

    You know, I think that would work. Personally I'd change the extension to a system file like a .dll and hide it with others like it in an installation directory.

This topic is closed for new posts.

Other stories you might like