The Washington Post reported yesterday that US border agents are routinely searching laptop, cell phone, and other electronic-media data and making copies. At least one person who is part of a class-action lawsuit against this has had laptops taken and never returned. And no, US citizens are not in any way exempt.
The US government is trying to claim that this is the same as searching briefcases, except, of course, that the point of that traditionally was to look for contraband items such as firearms, bombs, and smuggled goods; reading and making photocopies of your business documents have not, for example, been part of that deal. But now, apparently, it is.
In response, several companies have now set up "blank laptop" travel programmes, so that people are carrying dataless laptops around, accessing the data they need later via the internet, preferring the risk of hacking to the risk of the border crossing. Some companies have created policies that cell phones, similarly, must be blanked before entering or leaving the United States.
The damage this does to the ability of companies operating in the US to do business should, of course, be taken as read.
The US government is trying to claim that this is the same as searching briefcases, except, of course, that the point of that traditionally was to look for contraband items such as firearms, bombs, and smuggled goods; reading and making photocopies of your business documents have not, for example, been part of that deal. But now, apparently, it is.
In response, several companies have now set up "blank laptop" travel programmes, so that people are carrying dataless laptops around, accessing the data they need later via the internet, preferring the risk of hacking to the risk of the border crossing. Some companies have created policies that cell phones, similarly, must be blanked before entering or leaving the United States.
The damage this does to the ability of companies operating in the US to do business should, of course, be taken as read.
no subject
Date: 2008-02-08 06:03 pm (UTC)Create a stripe of high-quality noise. Encrypt the second stripe mentioned above, using the stripe of noise as the key, choosing a random length and offset inside the block. Now encrypt the whole key block with a strong passphrase.
Run them all together: public filesystem, first encrypted filesystem, encrypted keyblock, second encrypted filesystem. Burn that to the DVD.
It is obvious to any observer that there's an encrypted filesystem on the block. They get a court order and you cough up the password, which looks like it was generated by a bog-standard corporate "make a secure password" program. They find your porn collection, which you plausibly encrypted to keep the kids out of it. Or your financials from 1999. Or something else you would want to keep away from casual examination. Every good cryptography program creates a DVD-filling block of noise, so it's plausibly deniable that the rest of the random-seeming garbage on the disk is random garbage.
Even if anyone should guess that the rest of the DVD contains something incriminating, the filesystem block is protected from a known-content attack by a decent algorithm and the fact that the encryption key is, itself, high-quality noise. And the encryption key is protected from a brute-force attack because even if they wanted to try every possible passphrase (and you picked a good, long, complex one, right?), the output of the decrypting this block of noise is-- high quality noise! They will not be able to detect algorithmically when they've hit the right passphrase: they'll have to try every passphrase, with a length and offset, against the filesystem block. It is computationally impossible to attack this with today's technology before the stars go out. But there is no way, using today's technology, that they could prove that the noise is anything but noise.
You've satisfied the curiosity of the investigators-- yes, there's crypto'd data, but you gave them the password. The rest of the DVD? That's just random junk generated by the crypto software to prevent attacks.
Just something you might want to have on hand, someday.
Eep, oh arrgh!
Date: 2008-02-08 06:06 pm (UTC)Dawns on me that a 'blank laptop' business policy will only really work where one can be reasonably assured of being able to utterly scrub sensitive corporate or personal data off a machine before making those crossings. Also, there's the problem of widespread snooping into any data sent over the Net. I have never doubted that for any given corporate cryptosystem, there's already an established backdoor to it.
Good thing, in personal case, that neither I nor any of my clients have any business interests at all whatsoever Stateside; after the abandonment of the Appalachian properties I decided to not have anything more to do with American projects -- it just makes the tax matters ever so much simpler. (And truth be told, anything that cuts down on the number of long-distance air journeys within North America is just fine by me -- travel by air on this continent is no fun at all.)
no subject
Date: 2008-02-08 06:11 pm (UTC)no subject
Date: 2008-02-08 06:21 pm (UTC)no subject
Date: 2008-02-08 06:26 pm (UTC)no subject
Date: 2008-02-08 06:38 pm (UTC)no subject
Date: 2008-02-08 06:45 pm (UTC)Doesn't help matters that we have an avowedly-Dominionist Prime Minister who believes in the principle of the Unitary Executive, and now wants to force an election over whether or not Canada should "abandon our allies in the fight against terror".
Sigh.
Actually, with global warming and all, Nunavut's pretty nice. //^_^\\
Anyway, am glad that D. posted the link to that story; it's a good wake-up call, and I do have a little Linbox that I can take travelling (and sacrifice if some official goon wants to steal it from me) -- about all I would lose would be a draft of the second novel, and that doesn't even have any steamy sex scenes in it.
no subject
Date: 2008-02-08 08:08 pm (UTC)Remote storage is cheap and plentiful; there are programs that will let a person edit documents, spreadsheets, etc, over a web interface; barring that, one could certainly install OpenOffice and just grab a doc, edit it, then reupload it.
In that way, even if a laptop is grabbed, the data are safe because you're using a client-server model.
Would it be a pain in the ass? Of course. But it's just for traveling purposes (and when traveling around the world with a laptop, who knows what could happen to a laptop and whatever data it contains...)
no subject
Date: 2008-02-08 09:20 pm (UTC)no subject
Date: 2008-02-09 12:07 am (UTC)no subject
Date: 2008-02-09 12:55 am (UTC)Muah ha ha! <rubs hands together menacingly>
no subject
Date: 2008-02-09 05:46 am (UTC)Plausible? It'd be trivial. Perhaps I don't understand the question.
no subject
Date: 2008-02-09 05:47 am (UTC)no subject
Date: 2008-02-09 06:06 am (UTC)no subject
Date: 2008-02-09 09:10 am (UTC)no subject
Date: 2008-02-09 09:18 am (UTC)> They find your porn collection, which you plausibly encrypted to keep the kids out of it.
A lot of countries will seize porn at the border, so this isn't so good in this particular situation if your goal is to get the data across. (Financials from 1999 is a good idea. :D Especially fake financials.)
no subject
Date: 2008-02-09 01:57 pm (UTC)no subject
Date: 2008-02-09 09:59 pm (UTC)no subject
Date: 2008-02-09 11:04 pm (UTC)no subject
Date: 2008-02-10 12:53 am (UTC)Sort of a "travelling office". Just as one packs only the clothing necessary for a trip and not one's entire wardrobe, I would think it makes sense to store what is needed for computer usage on an out-of-country trip on a server (or series of servers), and work remotely. In my mind this would defeat the copying program since there is nothing to copy, and should the laptop be lost, the data will remain safe.
The usual caveats (encrypt your HD where feasible, never store passwords on the computer or in a program, make sure your Firefox or Opera clears the cache and does not store a history) apply.
The gist of my question is, is this an unreal expectation? Can people who normally keep their passwords written down on a sticky note affixed to their monitor be taught to think this way? :)
no subject
Date: 2008-02-10 01:46 am (UTC)