Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Cracking Bin Laden's Hard Drives

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » General Discussion Donate to DU
 
dkf Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 06:24 PM
Original message
Cracking Bin Laden's Hard Drives
http://mobile.informationweek.com/10996/show/8efc97f666be9a1bcc5a74ce853c5ff1/

According to the New York Times, "the team found a trove of information and had the time to remove much of it: about 100 thumb drives, DVDs and computer disks, along with 10 computer hard drives and five computers. There were also piles of paper documents in the house."
....

According to Hoglund, the effort to recover Osama bin Laden's data likely started with--and was part of--the raid, in a process that's known as battlefield exploitation, which seeks to extract as much data as possible while in the field. That's because it's much easier to extract information from a computer that's still running. Even if a hard drive employs encryption, if the drive is still mounted, then it's vulnerable. Furthermore, if the team can take physical memory RAM snapshots of a live device, this can help crack any encryption.
...

Interestingly, both the data on the recovered devices as well as the devices themselves may provide valuable clues. That's because every USB storage device has its own serial number, which can be retrieved from any computer to which it's been connected. "You're able to track that USB device in every system it's touched," said Lee. That may help analysts better understand how the courier network operated, especially if the storage devices match up with previous PCs that they've encountered.

The raid on Osama bin Laden's compound reportedly lasted 38 minutes, and recent accounts suggest that the facility may have been secured relatively quickly. That would have left time for computer specialists to go to work.

"To process a computer that's in a running state, you're probably talking about 15 to 30 minutes," said HBGary's Hoglund. "A guy has a toolkit--a hardened briefcase, he sits down, plugs it in," and it provides him with a full view of what's on the RAM chips, and also allows him to image the hard drive. In addition, a subset of the information can be transmitted via VSAT--a very small, two-way satellite communications system--to intelligence analysts in for immediate study.
Printer Friendly | Permalink |  | Top
Liberal Veteran Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 06:29 PM
Response to Original message
1. Fascinating.
Printer Friendly | Permalink |  | Top
 
Old and In the Way Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 06:38 PM
Response to Original message
2. I'll bet there are some very influential people sweating big time.
I'm kind of surprised that OBL would locate operational computers in his residence.

I'd sure like to know what kind of intel we're getting from those drives...and I'm sure there are many others with a vested interest who are even more interested, as well.
Printer Friendly | Permalink |  | Top
 
Bake Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 06:45 PM
Response to Reply #2
4. He really hated that daily commute to the office!
:hi:

Bake
Printer Friendly | Permalink |  | Top
 
Pigheaded Donating Member (150 posts) Send PM | Profile | Ignore Thu May-05-11 07:14 PM
Response to Reply #2
10. I hope so
There will be some murderers IDd with this info.

Pigheaded
Printer Friendly | Permalink |  | Top
 
customerserviceguy Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 08:40 PM
Response to Reply #2
20. It was brilliant of the military to release this information
OBL's 'friends' are most likely thinking about saving their own asses rather than executing some revenge for what his sorry ass got. It's the best explanation I can think of for why there have not been any terrorist actions since the kill.
Printer Friendly | Permalink |  | Top
 
alcibiades_mystery Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 08:35 AM
Response to Reply #20
32. Very good point
The military and intel guys are also trying to get the associates running and moving, even if that means going to ground. You tell them "We have shitloads of intel to sift through." The nervous ones immediately assume they're on the list, so to speak, while the others go low-key.

We already saw one guy turn himself in.

I think you're right.
Printer Friendly | Permalink |  | Top
 
greyl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 12:48 AM
Response to Reply #2
23. You'd expect bin laden to be on the cloud computing bandwagon, eh?
Edited on Fri May-06-11 12:56 AM by greyl
You're really surprised he "would locate operational computers in his residence"?

edit: spling
Printer Friendly | Permalink |  | Top
 
steve2470 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 06:40 PM
Response to Original message
3. I heard a report that said some of the data was encrypted.
I can't remember the source now. I'm sure the NSA will crack that encryption tout de suite.
Printer Friendly | Permalink |  | Top
 
MineralMan Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 07:13 PM
Response to Reply #3
9. Indeed they will. Indeed they will.
Printer Friendly | Permalink |  | Top
 
eleny Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 06:47 PM
Response to Original message
5. I'm reminded of the analysts in the AMC program, Rubicon
The guys who get the data and make sense of it all.
Printer Friendly | Permalink |  | Top
 
alcibiades_mystery Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 08:36 AM
Response to Reply #5
33. Love that show...I've thought of it a lot over the last few days
How are they gonna do next season?

:shrug:
Printer Friendly | Permalink |  | Top
 
MineralMan Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 07:02 PM
Response to Original message
6. Oh, they'll get the data.
Seriously. The NSA can break whatever encryption that was used. Yes, they can...
Printer Friendly | Permalink |  | Top
 
BadgerKid Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 07:09 PM
Response to Reply #6
7. Probably they'll commandeer some supercomputers. n/t
Printer Friendly | Permalink |  | Top
 
MineralMan Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 07:12 PM
Response to Reply #7
8. Oh, NSA has supercomputers.
No need to commandeer anything. Just send the stuff over there and they'll break it down for you. Probably, it's already there.

Nobody has any idea of their capabilities. I worked there in the late 1960s, and they could already do the most amazing things. I can't imagine what they're capable of 40 years later.

No secrets.
Printer Friendly | Permalink |  | Top
 
oneshooter Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 07:31 PM
Response to Reply #8
11.  No problem if they used a commercial encryption program.
Take 1-2 hours tops, I would bet that they already have the key code. If it is a personal encryption, 1-3 days.

Oneshooter
Armed and Livin in Texas
Printer Friendly | Permalink |  | Top
 
Azathoth Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 08:04 PM
Response to Reply #11
14. Not necessarily true. Most modern encryption techniques cannot be feasibly broken
Edited on Thu May-05-11 08:05 PM by Azathoth
by a head-on attack unless there is a built-in backdoor. The NSA is good, but they can't sidestep mathematics.

I don't think people realize just how powerful modern encryption has become.
Printer Friendly | Permalink |  | Top
 
Vehl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 12:51 AM
Response to Reply #14
24. I totally agree


most of the top end encryption algorithms cannot be broken (unless there is some quantum supercomputer..even then it might take years).
Even though they are "mathematically" impervious to decryption using brute force, often the clients/users make some silly mistake (use a stupid/guessable key) or have other faulty practices which enable the hacker/cracker to crack the code.

Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 08:10 PM
Response to Reply #11
16. No Need For De-Cryption. Just use the following password....
"GWBIsMyBFF" and you're in.
Printer Friendly | Permalink |  | Top
 
Azathoth Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 07:57 PM
Response to Reply #8
12. No offense, but the NSA was able to get away with a lot in the 1960s
Edited on Thu May-05-11 07:59 PM by Azathoth
because they were the only ones who really knew what they were doing back then. Things have changed significantly. Digital encryption is now an extensively studied field and as a result, the government is now using encryption techniques that were developed publicly.

The only way the NSA could reliably break modern encryption schemes would be to (a) employ computing techniques that are radically different (like quantum computing); (b) use computing hardware that is *profoundly* more powerful than anything publicly available; or (c) exploit some fundamental mathematical weakness that no mathematician or cryptographer outside of the NSA has discovered. A and C are both theoretically possible but highly unlikely, and B is almost certainly impossible.

Bottom line is I think people tend to overestimate/mythologize the NSA's capabilities. They are undoubtedly good, but I would guess they rely more on exploiting human error than on raw codebreaking.
Printer Friendly | Permalink |  | Top
 
cliffordu Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 08:12 PM
Response to Reply #12
17. I worked at a Large Computer Corporation 10 years ago.....
And the computer security research dudes said that you are naked, no matter what kind of encryption.....

We are PWNED.....
Printer Friendly | Permalink |  | Top
 
FreeJoe Donating Member (331 posts) Send PM | Profile | Ignore Thu May-05-11 08:28 PM
Response to Reply #17
18. They were wrong.
Strong encryption algorithms are available in the public domain in lots of places. Anyone can download a program like TrueCrypt. If you use it properly with a long password, it simply can't be cracked. No computer has the horsepower to brute force it.

It sucks in this case, but overall I like the idea of being able to encrypt things so that no one can read them. It's one of those classic trade-offs. It makes life easier for criminals and terrorists, but it makes life hard for police states.

Printer Friendly | Permalink |  | Top
 
Azathoth Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 08:32 PM
Response to Reply #17
19. lol, If that were true then cryptology would be a dead field
Edited on Thu May-05-11 08:33 PM by Azathoth
There are lots of "alternative" methods of breaking encryption: side-channel attacks, backdoors, flaws in the cryptosystem implementation, human error, etc. But if we assume none of that is available to us, then most modern digital encryption techniques are *very* difficult to break, even for the NSA.

Computer security dudes get paid to be paranoid, but if computer encryption really didn't work, they would be out of a job...
Printer Friendly | Permalink |  | Top
 
Vehl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 12:59 AM
Response to Reply #12
25. +1
Edited on Fri May-06-11 01:03 AM by Vehl
C is hardly a possibility nowadays cos most encryption algorithms are public and have been tested to death by mathematicians & cryptographers. They have poured over the algorithms for years in order to find backdoor or faults and are yet to find any.
Contrary to popular belief, public encryption algorithms are more secure than the so called "secret" algorithms..as the secret ones have not been as rigorously tested as the public ones.

Serpent-Twofish-AES sequential encryption would probably defeat any supercomputer in this world(as you rightly pointed out...even with Quantum computers it would take months)



Bottom line is I think people tend to overestimate/mythologize the NSA's capabilities. They are undoubtedly good, but I would guess they rely more on exploiting human error than on raw code-breaking.


^^this!
Took computer security as elective in college and the professor was an ex-NSA guy. He had more than 10 years experience in the NSA and he pretty much said the same thing.More than 90% of the code-breaking is due to finding back-doors or exploiting other weaknesses(human and mechanical)

Printer Friendly | Permalink |  | Top
 
seabeyond Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 08:03 PM
Response to Original message
13. 38 min? OMG, they said 40. i smell a rat. ok....
good stuff. excellent. thanks
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu May-05-11 08:08 PM
Response to Original message
15. They'll Probably Find E-Christmas Cards from the Cheney Family
on that hard drive.
Printer Friendly | Permalink |  | Top
 
nilram Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 12:43 AM
Response to Reply #15
22. And a Happy Hanukkah from Bush!
Printer Friendly | Permalink |  | Top
 
lonestarnot Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 01:12 AM
Response to Reply #22
29. And Red Rummy prollee sent the pet goats 2x weekly.
Printer Friendly | Permalink |  | Top
 
Yavin4 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 08:28 AM
Response to Reply #29
31. AHA!! The "My Pet Goat" Connection!!!!
Now, it all makes sense!
Printer Friendly | Permalink |  | Top
 
mrbscott19 Donating Member (104 posts) Send PM | Profile | Ignore Thu May-05-11 09:39 PM
Response to Original message
21. Encryption is a big thing nowadays
They couldn't even crack Assange's insurance file.
Printer Friendly | Permalink |  | Top
 
Vehl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 01:02 AM
Response to Reply #21
27. yep
Properly used public encryption algorithms (like AES) are virtually unbreakable (can be proven mathematically to be so!) unless the one who encrypts makes some(of the many possible) mistakes he can make, which would give the decryptor an easy way in.

it would have taken the Fastest supercomputer in the world more than a a million years to even have a few% chance of decrypting Assange's file.



Printer Friendly | Permalink |  | Top
 
girl gone mad Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 01:00 AM
Response to Original message
26. HBGary?
Not a valid source.
Printer Friendly | Permalink |  | Top
 
Vehl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 01:11 AM
Response to Original message
28. Anatomy of a Subway hack, a DEFCON presentation by MIT students
Edited on Fri May-06-11 01:22 AM by Vehl
This presentation by MIT students is a very good example of how systems can be hacked.

Today's encryption algorithms are mathematically impervious to decryption(even using the world's fastest supercomputer will take millions of years). The only way to hack/decrypt such stuff is to hope
1 The encoder made some(of the many possible) mistakes that could be made...which negate the effectiveness of the algorithm
2 There is some backdoor(either hardware/software) which allows the hacker/decryptor to bypass the algorithm
3 Attack the hardware instead of the software and try to see if some hardware faults/bugs/bad practices can be used to short-circuit the decryption process

The following presentation gives a Very good step-by step example of how MIT students were able to hack the subway pay-card systems.
They mostly exploit the 3 ways given above to succeed.


PS: on second thoughts, I have edited the link out. Google it, the MIT university hosts it
Printer Friendly | Permalink |  | Top
 
greyl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri May-06-11 01:51 AM
Response to Reply #28
30. That WarCart is crazy! Fun read.
Edited on Fri May-06-11 01:53 AM by greyl
edit to add: (I see you've since deleted the link to Defcon_Presentation.pdf)
Printer Friendly | Permalink |  | Top
 
Vehl Donating Member (1000+ posts) Send PM | Profile | Ignore Sat May-07-11 04:56 PM
Response to Reply #30
34. Yep, its an amazing presentation!
Edited on Sat May-07-11 04:59 PM by Vehl
I took the link out cos I didn't want to share it openly on forums...after all its supposed to be only used for 'educational' purposes :P

Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sat May 11th 2024, 02:13 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » General Discussion Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC