Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
TrueCrypt
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Legal cases == === Operation Satyagraha === In July 2008, several TrueCrypt-secured hard drives were seized from Brazilian banker [[Daniel Dantas (entrepreneur)|Daniel Dantas]], who was suspected of financial crimes. The Brazilian National Institute of Criminology (INC) tried unsuccessfully for five months to obtain access to his files on the TrueCrypt-protected disks. They enlisted the help of the [[FBI]], who used [[dictionary attack]]s against Dantas' disks for over 12 months, but were still unable to decrypt them.<ref name="Dantas">{{cite web |last=Leyden |first=John | title=Brazilian banker's crypto baffles FBI | url=https://www.theregister.co.uk/2010/06/28/brazil_banker_crypto_lock_out/ | publisher=The Register | date =28 June 2010 | access-date=13 August 2010}}</ref><ref>{{Citation | last =Dunn | first =John E. | title =FBI hackers fail to crack TrueCrypt | publisher =[[TechWorld]] | date =30 June 2010 | url =http://news.techworld.com/security/3228701/ | access-date = 30 May 2014}}</ref> === ''United States v. John Doe'' === In 2012 the [[11th Circuit Court of Appeals|United States 11th Circuit Court of Appeals]] ruled that a ''[[John Doe]]'' TrueCrypt user could not be compelled to decrypt several of his hard drives.<ref>{{Citation | last =Palazzolo | first =Joe | title =Court: Fifth Amendment Protects Suspects from Having to Decrypt Hard Drives | publisher =The Wall Street Journal | date =23 February 2012 | url =https://blogs.wsj.com/law/2012/02/23/court-fifth-amendment-protects-suspects-from-decrypting-computers/ | access-date = 24 May 2014}}</ref><ref>{{Citation | last =Kravets | first =David | title =Forcing Defendant to Decrypt Hard Drive Is Unconstitutional, Appeals Court Rules | publisher =[[Wired (magazine)|Wired]] | date =24 February 2012 | url =https://www.wired.com/2012/02/laptop-decryption-unconstitutional/ | access-date = 24 May 2014}}</ref> The court's ruling noted that FBI forensic examiners were unable to get past TrueCrypt's encryption (and therefore were unable to access the data) unless Doe either decrypted the drives or gave the FBI the password, and the court then ruled that Doe's Fifth Amendment right to remain silent legally prevented the Government from making them do so.<ref>{{cite court |litigants =United States v. John Doe |opinion =11โ12268 & 11โ15421 |court =[[United States Court of Appeals for the Eleventh Circuit|11th Cir.]] |date =23 February 2012 |url= https://caselaw.findlaw.com/us-11th-circuit/1595245.html}}</ref><ref>''[http://www.ca11.uscourts.gov/opinions/ops/201112268.pdf United States v. John Doe] {{webarchive|url=https://web.archive.org/web/20130115144156/http://www.ca11.uscourts.gov/opinions/ops/201112268.pdf |date=15 January 2013 }}''</ref> === David Miranda === {{further|David Miranda (politician)#Global surveillance activism}} On 18 August 2013 [[David Miranda (politician)|David Miranda]], partner of journalist [[Glenn Greenwald]], was detained at London's [[Heathrow Airport]] by [[Metropolitan Police]] while en route to [[Rio de Janeiro]] from [[Berlin]]. He was carrying with him an [[external hard drive]] said to be containing sensitive documents pertaining to the [[Global surveillance disclosures (2013โpresent)|2013 global surveillance disclosures]] sparked by [[Edward Snowden]]. Contents of the drive were encrypted by TrueCrypt, which authorities said "renders the material extremely difficult to access".<ref name="mirandaReuters">{{Citation |last=Hosenball |first=Mark |author-link=Mark Hosenball |title=UK asked N.Y. Times to destroy Snowden material |publisher=Reuters |date=30 August 2013 |url=https://www.reuters.com/article/us-usa-security-snowden-nytimes-idUSBRE97T0RC20130830 |access-date=30 May 2014 |archive-url=https://web.archive.org/web/20140706234052/http://www.reuters.com/article/2013/08/30/us-usa-security-snowden-nytimes-idUSBRE97T0RC20130830 |archive-date=6 July 2014 |url-status=live |df=dmy }}</ref> Detective Superintendent Caroline Goode stated the hard drive contained around 60 gigabytes of data, "of which only 20 have been accessed to date." She further stated the process to decode the material was complex and "so far only 75 documents have been reconstructed since the property was initially received."<ref name="mirandaReuters" /> ''[[The Guardian|Guardian]]'' contributor Naomi Colvin concluded the statements were misleading, stating that it was possible Goode was not even referring to any actual encrypted material, but rather deleted files [[Data recovery|reconstructed]] from unencrypted, unallocated space on the hard drive, or even [[plaintext]] documents from Miranda's [[Personal property|personal effects]].<ref>{{cite web |last=Colvin |first=Naomi |title=#Miranda: Where is the UK Government getting its numbers from? |work=Extraordinary Popular Delusions |publisher=Auerfeld.com |date=31 August 2013 |url=http://auerfeld.wordpress.com/2013/08/31/miranda-where-is-the-uk-government-getting-its-numbers-from/ |access-date=30 May 2014 |archive-url=https://web.archive.org/web/20140531090315/http://auerfeld.wordpress.com/2013/08/31/miranda-where-is-the-uk-government-getting-its-numbers-from/ |archive-date=31 May 2014 |url-status=dead |df=dmy }}</ref> Greenwald supported this assessment in an interview with ''[[Democracy Now!]]'', mentioning that the [[United Kingdom|UK]] government filed an [[affidavit]] asking the court to allow them to retain possession of Miranda's belongings. The grounds for the request were that they could not break the encryption, and were only able to access 75 of the documents that he was carrying, which Greenwald said "most of which were probably ones related to his school work and personal use".<ref>{{cite AV media |last=Greenwald |first=Glenn| author-link =Glenn Greenwald | date =6 September 2013 | title =Greenwald: UK's Detention of My Partner Was Incredibly Menacing Bid to Stop NSA Reports | medium =News broadcast | url =https://www.youtube.com/watch?v=wZxAoY_t7MY#t=5m13s | access-date =30 May 2014 | format =Video | time =5:12 | location =New York | publisher =[[Democracy Now!]]}}</ref> === Lauri Love === In October 2013, BritishโFinnish activist [[Lauri Love]] was arrested by the [[National Crime Agency]] (NCA) on charges of [[Hacker (computer security)|hacking]] into a US department or agency computer and one count of conspiring to do the same.<ref>{{cite web |last=Halliday|first=Josh|title=Briton Lauri Love faces hacking charges in US|url=https://www.theguardian.com/world/2013/oct/28/us-briton-hacking-charges-nasa-lauri-love|access-date=13 May 2016|work=[[The Guardian]]|date=29 October 2013}}</ref><ref>{{cite web |url=https://www.bbc.co.uk/news/world-us-canada-26376865|title=Briton Lauri Love faces new US hacking charges|date=27 February 2014|work=[[BBC News Online]]|publisher=[[BBC]]|access-date=13 May 2016}}</ref><ref>{{cite web|title=Hacker Charged with Breaching Multiple Government Computers and Stealing Thousands of Employee and Financial Records|url=https://www.fbi.gov/washingtondc/press-releases/2014/hacker-charged-with-breaching-multiple-government-computers-and-stealing-thousands-of-employee-and-financial-records|website=fbi.gov|publisher=[[U.S. Department of Justice]]|access-date=15 May 2016|location=[[Alexandria, VA]]|date=24 July 2014}}</ref> The government confiscated all of his electronics and demanded he provide them with the necessary keys to decrypt the devices. Love refused. On 10 May 2016 a District Judge ([[Magistrates' court (England and Wales)|Magistrate's Court]]) rejected a request by the NCA that Love be forced to turn over his encryption keys or passwords to TrueCrypt files on an SD card and hard drives that were among the confiscated property.<ref>{{cite web | last =Masnick | first =Mike | title =Judge Rejects Attempt To Force Lauri Love To Decrypt His Computers, Despite Never Charging Him With A Crime | website=[[Techdirt]] | publisher=[[Floor64]] | date =10 May 2016 | url =https://www.techdirt.com/articles/20160510/08042734397/judge-rejects-attempt-to-force-lauri-love-to-decrypt-his-computers-despite-never-charging-him-with-crime.shtml | access-date = 13 May 2016}}</ref> === James DeSilva === In February 2014, an Arizona Department of Real Estate [[Information technology|IT]] department employee, James DeSilva, was arrested on [[Indictment|charges]] of [[Child pornography|sexual exploitation of a minor]] through the sharing of explicit images over the [[Internet]]. His computer, encrypted with TrueCrypt, was seized, and DeSilva refused to reveal the password. [[Computer forensics|Forensics]] detectives from the [[Maricopa County Sheriff's Office]] were unable to gain access to his stored files.<ref>{{Citation |last=Stern |first=Ray |title='True Crypt' Encryption Software Stumps MCSO Detectives in Child-Porn Case |publisher=[[Phoenix New Times]] |date=4 February 2014 |url=http://blogs.phoenixnewtimes.com/valleyfever/2014/02/true_crypt_software_that_hides.php |access-date=30 May 2014 |archive-url=https://web.archive.org/web/20140531090337/http://blogs.phoenixnewtimes.com/valleyfever/2014/02/true_crypt_software_that_hides.php |archive-date=31 May 2014 |url-status=dead |df=dmy }}</ref> === Druking === In the special prosecutor investigation for [[Druking]] in South Korea, the special prosecutor decrypted some of the files encrypted by TrueCrypt by guessing the [[passphrase]].<ref>[์ผ๋ฌธ์ผ๋ต] '๋๋ฃจํน ํน๊ฒ' ์ข ๋ฃ..."์์ฌ ์ข ๋ฃ ์์ฒด ํ๋จ...์ธ์ ์์๋ค", [[NewsPim]], 2018.08.27., http://newspim.com/news/view/20180827000369</ref><ref>ํน๊ฒ "๊น๊ฒฝ์, ํนํฌ๋ฉ ๊ฐ๋ฐยท์ด์ ํ๋ฝ...๋๊ธ 8800๋ง๊ฑด ์กฐ์ ๊ด์ฌ", [[Maeil Business Newspaper]], 2018.08.27., http://news.mk.co.kr/newsRead.php?year=2018&no=538301</ref> The special prosecutor said the hidden volumes were especially difficult to deal with. He decrypted some of encrypted files by trying words and phrases the druking group had used elsewhere as parts of the passphrase in order to make [[educated guess]]es.<ref>"๋๋ฃจํน ์ผ๋น์ด ๊ฑธ์ด๋ ์ํธ ํ์ด๋ผ"...ํน๊ฒ, ์ ๋ฌธ๊ฐ ์ด๋์, [[Yonhap]], 2018/07/18, http://www.yonhapnews.co.kr/bulletin/2018/07/18/0200000000AKR20180718142500004.HTML</ref><ref>"๋๋ฃจํน ๋๊ธ์กฐ์ 1/3 ์ํธ...FBI๋ ๋ชป ํธ๋ ํธ๋ฃจํฌ๋ฆฝํธ ์ฌ์ฉ", [[OBS Gyeongin TV]], 2018.07.19, http://voda.donga.com/3/all/39/1394189/1</ref><ref>"Top ten password cracking techniques, http://www.alphr.com/features/371158/top-ten-password-cracking-techniques</ref><ref>'FBI๋ ๋ชป ํผ๋ค'๋ ์ํธ ํ์ ๋๋ฃจํน ์ธก๊ทผ๋ค ํ๋๊ฐ ๋ณํ๋ค, [[Chosun Broadcasting Company]], 2018.07.18, http://news.tvchosun.com/site/data/html_dir/2018/07/18/2018071890102.html</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)