- Feb 23, 2005
- 22,902
- 2,359
- 126
I always get a chuckle when people think certain 3 lettered agencies have special decryption tools....they dont. Remember, the NIST asked the private sector to come up with an AES standard. Although this case applies to them trying to brute force a passcode (unsuccesfully), the encryption remained intact as well. Not that Im one to cheer the bad guys (Im not), but its yet another testiment to Truecrypt (and encryption in general).
http://g1.globo.com/English/noticia/2010/06/not-even-fbi-can-de-crypt-files-daniel-dantas.html
http://g1.globo.com/English/noticia/2010/06/not-even-fbi-can-de-crypt-files-daniel-dantas.html
Not even FBI was able to decrypt
files of Daniel Dantas
Hard drives were seized by the feds during Operation Satyagraha, in 2008.
Information is protected by sophisticated encryption system.
The FBI failed to break the encryption code of hard drives seized by federal police at the apartment of banker Daniel Dantas, in Rio de Janeiro, during Operation Satyagraha. The operation began in July 2008. According to a report published on Friday (25) by the newspaper Folha de S. Paulo, after a year of unsuccessful attempts, the U.S. federal police returned the equipment to Brazil in April.
According to the report, the fed only requested help from USA in early 2009, after experts from the National Institute of Criminology (INC) failed to decode the passwords on the hard drives. The government has no legal instrument to compel the manufacturer of the American encryption system or Dantas to give the access codes.
The equipment will remain under the protection of the feds. INC expect that new research data or technology could help them break the security codes. Opportunity Group reported that the two programs used in the equipment are available online. One is called Truecrypt and is free. The programs were used due to suspected espionage.
According to the report, the FBI and the INC used the same technology to try to break the password. It is a mechanism called a "dictionary" - a computer system that tests password combinations from known data and police information. Experts from the INC used this technique for five months, until December 2008, when the discs were sent to the United States.