Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-27 Thread Declan McCullagh
On Fri, Apr 23, 2004 at 05:06:44PM +0200, Eugen Leitl wrote: Pulling the power is the exact wrong thing to do if it's a CFS requiring a passphrase at startup. Does anyone know what the default procedure is when hardware is being seized (threat model=knuckle-dragger/gumshoe)? This might have

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-24 Thread A.Melon
Major Variola writes... If you physically destroy the keys or the data, there is little to gain by torturing you or your family. That is superior to gambling that your deeper duress levels are convincing to the man with the electrodes. Are there any publicly available documents that detail

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-24 Thread Morlock Elloi
underground railroad would have worked better, but your still black. Obviously you don't know about whitening properties of moder ciphers! Seriously, today the distingushing marks among classes, tribes and castes are far more informational than physical. So today crypto *can* make you white, or

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-24 Thread Thomas Shaddack
On Fri, 23 Apr 2004, A.Melon wrote: Are there any publicly available documents that detail interrogation protocols and what brainwave patterns and bloodflow look like during truth telling and lying? Preferably something that gets into how to consciously alter brainwave patterns and

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Thoenen, Peter Mr CN Sprint SFOR
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Tyler Durden wrote: | However, I'd bet there are short-term applications for crypto that | really matter and yet have no real relationship to $$$ (for instance, | what if there was widespread communications and crypto in Nazi | Germany...would the

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Tyler Durden
to detect that data is being destroyed, but statistically speaking that will be much rarer. -TD From: Major Variola (ret) [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Subject: Re: [IP] One Internet provider's view of FBI's CALEA wiretap push Date: Thu, 22 Apr 2004 11:53:07 -0700 At 05

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Eugen Leitl
On Fri, Apr 23, 2004 at 10:43:14AM -0400, Trei, Peter wrote: Step zero is to pull the power, so any shutdown code does not run. Pulling the power is the exact wrong thing to do if it's a CFS requiring a passphrase at startup. Does anyone know what the default procedure is when hardware is

RE: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Trei, Peter
Tyler Durden wrote: I wonder how quickly one could incinerate a memory card in the field with high success rate? Destroy the data and the passphrases don't help. Well, what if there were 3 passwords: 1) One for Fake data, for amatuers (very few of the MwG will actually be smart

RE: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Steve Schear
At 07:43 AM 4/23/2004, Trei, Peter wrote: If you're dealing with a state-level attacker, any scheme involving explosives or incendiaries would get the attackee in as much or more trouble than the original data would. This is a hard problem. I suspect any solution will involve tamper-resistant

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Marcel Popescu
From: Tyler Durden [EMAIL PROTECTED] 3) One for plausible real data, BUT when this one's used, it also destroys the real data as it opens the plausible real data. For Windows, look up Strong Disk Pro, they're quite paranoid - it can be used like this. Mark

RE: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Thomas Shaddack
Right, there are at least two workable solutions- Hard drives with user alterable firmware. I surprised that none of the major drive manufacturers seems to have thought about offering a version of their controllers, for substantially more money, that offers this. A retrofit device that

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread John Kelsey
From: Tyler Durden [EMAIL PROTECTED] Sent: Apr 23, 2004 10:09 AM To: [EMAIL PROTECTED] Subject: Re: [IP] One Internet provider's view of FBI's CALEA wiretap push .. Well, what if there were 3 passwords: 1) One for Fake data, for amatuers (very few of the MwG will actually be smart enough to look

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Major Variola (ret)
At 11:33 PM 4/22/04 +0200, Eugen Leitl wrote: This will produce a loud bang, obviously. Thermite is a good choice to turn your fileserver into lava, but that thing better be outside, or mounted in chamotte- or asbestos-lined metal closet. Will produce smoke, and take some time, too. Thanks, I

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Major Variola (ret)
At 08:51 PM 4/23/04 +0200, Thomas Shaddack wrote: On Fri, 23 Apr 2004, John Kelsey wrote: The obvious problem with multiple levels of passwords and data is: When does the guy with the rubber hose stop beating passwords out of you? This serves a purpose as well. Why would you ever cooperate if

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Major Variola (ret)
t 10:09 AM 4/23/04 -0400, Tyler Durden wrote: I wonder how quickly one could incinerate a memory card in the field with high success rate? Destroy the data and the passphrases don't help. Well, what if there were 3 passwords: 1) One for Fake data, for amatuers (very few of the MwG will

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Major Variola (ret)
At 09:23 PM 4/22/04 +0200, Thomas Shaddack wrote: Innocents could be a good cannon fodder that can bring a lot of backslash and alienation aganst the goons, stripping them from public support. Yes, this has been discussed before, in addition to using it retributionally --finger some deserving

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Thomas Shaddack
On Fri, 23 Apr 2004, John Kelsey wrote: The obvious problem with multiple levels of passwords and data is: When does the guy with the rubber hose stop beating passwords out of you? After he gets one? Yeah, that's plausible, if he's convinced there's only one. But once he's seen a second

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-23 Thread Thomas Shaddack
On Fri, 23 Apr 2004, Major Variola (ret) wrote: filesystems (etc) with layers of deniable stego. Are there any decent implementations for Linux/BSD/NT? I haven't looked recently. One property that such a FS or app should have is that it is useful for something *else* besides stego duress

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Eugen Leitl
On Thu, Apr 22, 2004 at 01:13:48AM +0100, Dave Howe wrote: No, it is a terrible situation. It establishes a legal requirement that communications *not* be private from the feds. from there, it is just a small step to defining encryption as a deliberate attempt to circumvent that law, and so a

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Dave Howe
Morlock Elloi wrote: The extreme ease of use of internet wiretapping and lack of accountability is not a good situation to create. False. It is the best possible situation cpunk-wise I can imagine. No, it is a terrible situation. It establishes a legal requirement that communications *not* be

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Morlock Elloi
The extreme ease of use of internet wiretapping and lack of accountability is not a good situation to create. False. It is the best possible situation cpunk-wise I can imagine. It effectively deals away with bs artists (those who *argue* against this or that) and empowers mathematics. If one

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread R. A. Hettinga
At 12:09 PM +0200 4/22/04, Eugen Leitl wrote: Are you truly expecting a worldwide ban on encryption? Amen. It's like expecting a worldwide ban on finance. Been tried. Doesn't work. :-) Cheers, RAH -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Major Variola (ret)
At 12:09 PM 4/22/04 +0200, Eugen Leitl wrote: Are you truly expecting a worldwide ban on encryption? How do you prove somebody is using encryption on a steganographic channel? Torture, of the sender, receiver, or their families, has worked pretty well. If you're good you don't even leave marks.

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Dave Howe
Eugen Leitl wrote: On Thu, Apr 22, 2004 at 01:13:48AM +0100, Dave Howe wrote: No, it is a terrible situation. It establishes a legal requirement that communications *not* be private from the feds. from there, it is just a small step to defining encryption as a deliberate attempt to circumvent

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Dave Howe
R. A. Hettinga wrote: At 12:09 PM +0200 4/22/04, Eugen Leitl wrote: Are you truly expecting a worldwide ban on encryption? It's like expecting a worldwide ban on finance. Been tried. Doesn't work. There isn't a worldwide ban on breaking CSS - doesn't stop the film industry trying to enforce it

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread R. A. Hettinga
At 4:32 PM +0100 4/22/04, Dave Howe wrote: There isn't a worldwide ban on breaking CSS - doesn't stop the film industry trying to enforce it in the US courts. Carl Ellison tells the story about how, with the advent of the longbow, all these peasants had to get absolution from their local priests

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Thomas Shaddack
On Thu, 22 Apr 2004, Major Variola (ret) wrote: At 12:09 PM 4/22/04 +0200, Eugen Leitl wrote: Are you truly expecting a worldwide ban on encryption? How do you prove somebody is using encryption on a steganographic channel? Torture, of the sender, receiver, or their families, has worked

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Major Variola (ret)
At 05:56 PM 4/22/04 +0200, Thomas Shaddack wrote: On Thu, 22 Apr 2004, Major Variola (ret) wrote: At 12:09 PM 4/22/04 +0200, Eugen Leitl wrote: Are you truly expecting a worldwide ban on encryption? How do you prove somebody is using encryption on a steganographic channel? Torture, of the

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Pete Capelli
At 12:09 PM +0200 4/22/04, Eugen Leitl wrote: Are you truly expecting a worldwide ban on encryption? Amen. It's like expecting a worldwide ban on finance. Been tried. Doesn't work. But the goal isn't to ban it; just marginalize it enough to be able to tar it as a terrorist action. True,

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Tyler Durden
communications and crypto in Nazi Germany...would the holocaust have happened?) -TD From: R. A. Hettinga [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Re: [IP] One Internet provider's view of FBI's CALEA wiretap push Date: Thu, 22 Apr 2004 12:43:51 -0400 At 4:32 PM +0100 4/22/04, Dave Howe

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Roy M. Silvernail
On Thu, 2004-04-22 at 14:53, Major Variola (ret) wrote: I wonder how quickly one could incinerate a memory card in the field with high success rate? Destroy the data and the passphrases don't help. The first thing that popped into my mind is a USB key with a small cake of potassium

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread R. A. Hettinga
At 4:00 PM -0400 4/22/04, Pete Capelli wrote: But the goal isn't to ban it; just marginalize it enough to be able to tar it as a terrorist action. True, there is no worldwide ban on finance. But there is the delightful 'know your customer' law. That's just a monster in the closet. Fact is, the

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Eugen Leitl
On Thu, Apr 22, 2004 at 11:53:07AM -0700, Major Variola (ret) wrote: I wonder how quickly one could incinerate a memory card in the field with high success rate? Destroy the data and the passphrases don't help. Smallish lithium battery has enough oomph to heat a NiCr filament (or charge an

Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-22 Thread Thomas Shaddack
On Thu, 22 Apr 2004, Major Variola (ret) wrote: However, it's not entirely reliable. At some point, the suspect tells you what you want to hear, whether or not it is the truth, just so you leave him alone. It can even happen that the suspect convinces himself that what he really did what he