Most any safe can be opened given the right combination of power tools, effort, locksmith knowhow, and search warrant paperwork. So an encrypted hard drive vs. a safe is a little different situation.
This made me think of all the cop dramas (everthing you need to know about law comes right from there, of course) where they have the guy and are yelling, “Where’s the body/money/missing person?!” It seems to me that knowing where the stolen jewels are makes you look kind of guilty. Can they only do that if you’ve already been arrested?
Indeed, Truecrypt gives you a “plausible deniability” option.
You can create a second, hidden drive inside your Truecrypt volume, which requires a second password to unlock. Without that password, the system gives no indication the drive is there.
So you could reluctantly “unlock” the Truecrypt drive, and then simply deny that you used that second drive option… and there’ s no way to know otherwise.
Couldn’t that backfire against you in a trial, though ? Obviously not in a direct “this is against the law” way, but I could clearly see a lawyer milking “where there’s smoke there’s fire” for all it’s worth for the benefit of the stupid jury. After all, if you had nothing to hide, you wouldn’t have nuked your drives, hmmm ?
Stick with this option, these days it isn’t hard at all for a curious person to recover deleted files, unless your friend knows what he is doing to prevent it.
I would still like to hear from the lawyers their opinion on whether “forgetting” the password is likely to get you thrown in jail. No need to get specific, but is there a. nothing the cops can do except threaten you, b. you might get locked up for a few weeks for contempt of court, or c. they will throw your ass in jail forever, or until you fess up and hand over the password(or if you are smart pass phrase)?
Couldn’t you tell just by looking at drive capacity, and comparing to the total size of the files on your hard drive? e.g. I have a 500 GB drive, and the police only see 400 GB worth of data?
No, TrueCrypt writes random data to free space on your encrypted volume. The “hidden” drive is in the purported free space of the outer drive, and the hidden data is indistinguishable from random data (short of having the password). At least according to the documentation.
But unless they had a warrant to get into your house in the first place, any evidence found by this keylogger is tainted and would be thrown out in court.
Of course, there are ways cops can do this:
get a warrant
break in carefully, so there is no indication left of a break-in
install the keylogger
leave a copy of the warrant behind, as required (but leave it in a place that is obvious but likely to be overlooked)
Also, if a keylogger had been installed to get the password without the defendant’s knowledge, they might not know to challenge the tainted evidence gained from that. They might think it had been obtained by cracking the encryption after the cops had seized their computer post-arrest.
And to be clear Truecrypt will let you overwrite the hidden volumes’s data if you don’t supply the hidden volume’s passphrase.
If you want to know how it works just go to Truecrypt’s site, they explain it all in pretty easy to understand terms. As long as you follow the practices they lay out no one will(should anyway) be able to prove that the hidden volume exists.
I am not an expert on cryptology but as I understand things, this is
not true. modern encryption algorithms are very difficult to crack. The key is a real password. If you use your dog’s eight letter name, it would be open in a few seconds. But a real password, which very few of us use, makes it very very difficult to crack.
Can’t the police use spy stuff to check out what you’re viewing on your computer monitor remotely, without ever entering your residence? Would evidence collected thereby be admissible?
Heh. They can order you to do anything they like (such as “throw down that gun!”). When I worked in law enforcement, we had a safe that the guys were “sure” had drugs, money, notebooks, or something. Our in-house safecracking “specialist” couldn’t get it open (and it was a very old safe), so we called in outsiders. They got it open after a few days in the garage (the thing weighed about 500 lbs). There wasn’t jack shit in there.
But, to the OP - you can compel someone to give you passwords. You can’t compel them to “remember what it is…”
No. To do it remotely, they are accessing your machine via your internet connection. Legally, that is a variety of wiretapping. So unless they got a warrant for that, any evidence they got that way is tainted and can’t be used in court.
They could use Van Eck Phreaking to watch from the outside what is on your monitor. Although AFAIK it is much harder with the new TFTs than with the older CRTs.
In Germany there is also some discussion about the “Bundestrojaner” (“Federal Trojan”), which is meant to be installed by Police/Intelligence agencies onto the computers of terror suspects and should log the passwords, so that the police later can break the encryption.
I don’t know what is legal, but I would guess that anything without a warrant is probably inadmissable.
Not to mention the fact that unless they are only interested in your internet traffic they would need to compromise your system with some kind of trojan. Depending on your computer’s configuration and your personal security practices they may or may not be able to do get a trojan on your computer remotely, although the sort of person who is using strong encryption properly is far more likely to be better protected IMO.
No, that’s not what I’m talking about – this is what I’m talking about, apparently something called “Van Eck phreaking.” (I’m not sure if this is something that’s actually used by the FBI or police or if it could only potentially be another tool for them.)
Can a keylogger pick up what is typed using one of those onscreen mouse keyboard clicky things? [Runes of Magic has you put your PW in by clicking a virtual keyboard onscreen]