{"id":31706,"date":"2017-04-08T16:51:02","date_gmt":"2017-04-08T20:51:02","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/6-workarounds-for-accessing-encrypted-devices-gcn-com.php"},"modified":"2017-04-08T16:51:02","modified_gmt":"2017-04-08T20:51:02","slug":"6-workarounds-for-accessing-encrypted-devices-gcn-com","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/6-workarounds-for-accessing-encrypted-devices-gcn-com.php","title":{"rendered":"6 workarounds for accessing encrypted devices &#8211; GCN.com"},"content":{"rendered":"<p><p>6 workarounds for accessing encrypted devices    <\/p>\n<p>    The story of Syed Farooks iPhone is a perfect illustration of    both the power of encryption on personal devices and the    governments frustration with such security when it hinders an    investigation.  <\/p>\n<p>    In the wake of the 2015 San Bernadino, Calif., shootings,    investigators wanted access to Farooks iPhone. The phone was    encrypted, the FBI asked Apple to write software to give it    access and Apple refused to comply. What ensued was a long    battle that played out in courts and in public. In the end the    government allegedly paid $1 million to third party to have the    phone unlocked.  <\/p>\n<p>    Access to encrypted information need not always be as difficult    or expensive for investigators, however. Two cybersecurity    experts have published an essay that discusses the practical,    technological and legal implications of six encryption    workarounds.  <\/p>\n<p>    Encryption raises a challenge for criminal investigators,    wrote Orin S. Kerr, director of the Cybersecurity Law    Initiative at George Washington University Law School, and    Bruce Schneier, fellow at Harvard Universitys Berkman    Klein Center for Internet & Society and CTO at Resilient.    When law enforcement attempts to access encrypted data, only    ciphertext or scrambled information can be seen, which is    useless unless it can be decrypted. For government    investigators,\" Kerr & Schneider wrote, \"encryption adds an    extra step: They must figure out a way to access the plaintext    form of a suspects encrypted data.  <\/p>\n<p>    The following workarounds have been used by investigators since    messages have been encrypted  back to the time of Elizabeth I    when decoded private letters revealed an assassination plot.    Today, because encryption is so widespread, investigators come    across it in routine cases, making ways to bypass encryption    especially timely and relevant.  <\/p>\n<p>    1. Find the key. The most obvious of the six    ways to get around encryption is finding the passwords,    passcodes or passphrases required to get into a device. The key    might be written down somewhere or stored on an accessible    device.  <\/p>\n<p>    2. Guess the key. Although encryption keys    themselves are long and random, the passwords that protect them    are usually easier to guess. Investigators have used a    suspects date of birth as a password to access personal    devices. Password-cracking software can try millions of    passwords per second, but investigators can be limited by a    devices features that only allow a certain number of password    tries before locking out the would-be user.  <\/p>\n<p>    3. Compel the key. Merely asking, Whats your    password? could get investigators the exact information they    need, and authorities could legally compel device owners or    others who know its password to provide it, the authors said.    Both the Fourth and Fifth Amendments provide the device owners    with some protection, but considerable ambiguity remains about    how much of a burden [these Amendments] impose on    investigators.  <\/p>\n<p>    4. Exploit a flaw in the encryption scheme.    This workaround requires finding a flaw in the encryption and    using that weakness to gain access to the device. This    technique, commonly used by hackers, is analogous to breaking    into a locked car by breaking a window instead of picking the    lock, the researchers said. The FBI likely gained access to    the San Bernardino shooters phone this way, the authors said.    The company helping the FBI may have found a flaw in an    auto-erase function used on the phone to make it harder to    guess passwords. This approach relied on two workarounds in    tandem: First, exploit the flaw; second, guess the key, they    said.  <\/p>\n<p>    5. Access plaintext when the device is in use.    This workaround requires accessing a device while it is in use    and its data has been decrypted, such as when a suspect using a    device is arrested before the phone or computer can be shut    down. Gaining remote access is much more complicated than    physically seizing the machine, the two said. First, hacking    will require the government to have figured out a technical    means to gain remote access to the device. Second, government    hacking can raise complex legal questions under the Fourth    Amendment and other laws. Dozens of federal courts are    currently considering the legality.  <\/p>\n<p>    6. Locate a plaintext copy. Cant get into the    device? Find the information somewhere else. The information    that investigators are looking for likely exists in an    unencrypted version somewhere, Kerr and Schneier suggested;    cloud copies are increasingly common. In the San Bernardino    case, investigators were able to get iCloud backups of the    shooters phone. The information was six weeks out of date     which is why the FBI paid for the workaround -- but it still    provided insight.  <\/p>\n<p>    Read the full paper here.  <\/p>\n<p>      About the Author    <\/p>\n<p>       Matt Leonard is a      reporter\/producer at GCN.    <\/p>\n<p>      Before joining GCN, Leonard worked as a local reporter for      The Smithfield Times in southeastern Virginia. In his time      there he wrote about town council meetings, local crime and      what to do if a beaver dam floods your back yard. Over the      last few years, he has spent time at The Commonwealth Times,      The Denver Post and WTVR-CBS 6. He is a graduate of Virginia      Commonwealth University, where he received the faculty award      for print and online journalism.    <\/p>\n<p>      Leonard can be contacted at <a href=\"mailto:mleonard@gcn.com\">mleonard@gcn.com<\/a> or follow him      on Twitter @Matt_Lnrd.    <\/p>\n<p>      Click      here for previous articles by Leonard.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/gcn.com\/articles\/2017\/04\/05\/encryption-workarounds.aspx\" title=\"6 workarounds for accessing encrypted devices - GCN.com\">6 workarounds for accessing encrypted devices - GCN.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 6 workarounds for accessing encrypted devices The story of Syed Farooks iPhone is a perfect illustration of both the power of encryption on personal devices and the governments frustration with such security when it hinders an investigation. In the wake of the 2015 San Bernadino, Calif., shootings, investigators wanted access to Farooks iPhone. The phone was encrypted, the FBI asked Apple to write software to give it access and Apple refused to comply<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31706","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31706"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31706"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31706\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}