FBI Files Brief on Scarfo Keylogger 249
Firewort writes: "In an affidavit (warning, it's a PDF) filed with a federal court in New Jersey, the FBI has disclosed some of the details of a controversial "key logger system" used to obtain the encryption password of a criminal suspect. They go into great detail describing PGP and the different methods they might have used to keystroke-log Scarfo to get his encryption key." Interesting, and more technically sophisticated than the basic keyloggers which grab keystrokes indiscriminately.
keystroke blackbox (Score:2, Interesting)
Re:keystroke blackbox (Score:2)
Re:keystroke blackbox (Score:1)
Damn! That means I have to establish a session key between me and my computer in the future to talk to it privately! Time to practice long number arithmetric using only my head...
Re:keystroke blackbox (Score:1, Offtopic)
Re:keystroke blackbox (Score:1)
RSA/ElGamal needs exact long number arithmetric. A slide rule is no help for this. As it is no help for the modulo reduction needed.
Re:keystroke blackbox (Score:1)
file, it does not record passphrases you have entered. This is
because the programmers of bash were smart, after all, you
woulnd't wish your passphrases recorded in
would you?
Re:keystroke blackbox (Score:1)
Re:keystroke blackbox (Score:2, Informative)
Re:keystroke blackbox (Score:2)
More keyboard logging (Score:2, Interesting)
Re:More keyboard logging (Score:4, Informative)
I doubt very much that they can break 2048 bit at the moment and I think 4096 bit is secure until some serious mathematical breakthroughs (which cannot be predicted).
The NSA could have such a device for emergency purposes.
Cheaper would be an attack on the passphrase. Most people don't have so much entrophy in their passphrase. E.g. I have only about 65 bits. Of course for this you need the secret keyring, a ciphertext sample will not be enough.
Re:More keyboard logging (Score:5, Insightful)
Would not be the first diversion with that purpose: If you cannot defeat it, undermine its credibility.
Re:More keyboard logging (Score:2)
I'd still love to see an anonymous mail network that implements the methods Brenda Timmerman described in her paper on Secure dynamic adaptive traffic masking. Something like that, combined with a large number of users would make even traffic analysis impossible.
Of course, I must be a terrorist to think such things are good.
they wouldn't reveal it for this case (Score:2)
Why not? Simple. If word got out that the US government could break PGP, everyone who cared about securing their communications from the US government would switch to something else. Governments take extraordinary measures to protect outside knowledge of their cypher-breaking capabilities. Go read some books about Enigma (or, if you want the story with a bowlful of Claire Danes, wait for the upcoming movie :) ).
Bypassing the keylogger (Score:4, Funny)
FBI recruiters who are reading this: you know where you can contact me about that job offer.
Re:Bypassing the keylogger (Score:3, Interesting)
Option #1
Some have suggested saving that phrase in a text file and then copy/paste from there would work, except that your passphrase is now in clear text on your hard disk. Any search warrant against your machine would find that file, and your private key becomes compromised.
Solution there is to open a text editor before going online, entering the passphrase there. go online. Get the mail and then copy/paste the passphrase, close text editor w/o saving.
Option #2
download the email off the mail server (ie, POP it off the server). Go offline. Enter passphrase and read message.
Likewise, dont write emails while online. Write and encrpyt first, then go online to send. The keylogger appears to be able to pick up your typing of the message if you're online as you write it. (this also saves you $$$ if your ISP is cheap enough to still be charging per hour rates!)
Option 3 (Score:2)
Linux+SSH client+GnuPG handheld (Score:2)
It used to be great, 95% of my email to my friends stayed within the same BOX for years. We would all SSH in and use GnuPG only when we wanted lasting security. Now my friends are losers and pop their email into Outlook. Now *they're* whining to me that I can't keep up with *them* and get OpenSSL to sign/encrypt email to them in Outlook. Now I feel like I can't talk to them about *anything*!
AAARRRGGHHH!!
A simple keystroke logger can be elegant, too (Score:5, Insightful)
It's important to note the fact that it doesn't log all keystrokes for 2 reasons:
1) It's impressive. Less keystrokes logged that could be potential passwords, the less manpower required to examine the logs.
2) It leaves potential exploits open for crypto software writers and users in order to trick keystroke loggers into passing them over without recording the activity.
On another note, Bruce Schneier has always reminded people that a secure system always includes at least 2 out of three things: Something you know (password), something you have (ATM card), or something you are (biometrics, fingerprint).
My point is that
Keystroke loggers could be rendered ineffectual if the crypto software used was also hooked to a fingerprint scanner or a swipe card reader in addition to a password. Or, the person could just always keep the password key on a CD-ROM that they physically take with them and can destroy at a moment's notice.
Re:A simple keystroke logger can be elegant, too (Score:4, Informative)
Re:A simple keystroke logger can be elegant, too (Score:1)
Re:A simple keystroke logger can be elegant, too (Score:1)
Just grab the edges and bend til it breaks, I do it with failed CDRs all the time. Good stress reliever.
Re:A simple keystroke logger can be elegant, too (Score:2)
Yeah, but does that really destroy the CD beyond hope of recovery? I'm not up on CD Recovery technology.
Perhaps what's needed is a USB dongle, with an external switch that fries the flash RAM inside, rendering it unusable, and unreadable even to people trained in data recovery. Then again, if you have one, you obviously have something to hide, so expect the government to make them illegal soon.
Re:A simple keystroke logger can be elegant, too (Score:1)
Re:A simple keystroke logger can be elegant, too (Score:4, Informative)
Well, there's the Dallas Semiconductor iButton [ibutton.com]. It includes tamper-resistant features that will zero its RAM under certain conditions (e.g. over-temperature), although it doesn't have an actual "erase" switch.
Re:A simple keystroke logger can be elegant, too (Score:2)
From the java ibutton web page [ibutton.com]:
Specific intrusions that result in zeroization include:
Combine that with a firewall they say is running on it, the fact that it has an unalterable clock, and that it has a unique serial number, both engraved on the outside and burned into ROM, this comes about as close to Fort Knox for data as you're going to find this side of classified.
Of course, it does run java, and it would be possible, if you didn't properly secure it, to load arbitrary java code on it and use that to do whatever you (or those whom you want to protect your data from) wanted to do.
Re:A simple keystroke logger can be elegant, too (Score:2)
http://www.ealaddin.com/etoken/pro/ [ealaddin.com]
although it doesn't have the self-destruct switch =) but the point of having strong encryption is that even if the dongle was stolen, it wouldn't be worth the computational effort to extract the info, right?
Re:A simple keystroke logger can be elegant, too (Score:1)
:)
Re:A simple keystroke logger can be elegant, too (Score:1)
To blank a disk reliably you have to have a changing magnetic field strong enough that the battery needed for this would probably be hard to carry. On the other hand, burning it is far more secure and can be done with a portable blowtorch the size of a lighter.
Re:A simple keystroke logger can be elegant, too (Score:2, Funny)
I certainly wouldn't want to retrieve it after that disposal method.
Re:A simple keystroke logger can be elegant, too (Score:2, Interesting)
Re:A simple keystroke logger can be elegant, too (Score:1)
It'd be a pain in the ass to destroy a CD-ROM "at a moment's notice"
Not if you carry a microwave oven everywhere you go. Try putting a CD in the microwave for 2 seconds. It gives it a nice faux antique look.
Re:A simple keystroke logger can be elegant, too (Score:1)
Re:A simple keystroke logger can be elegant, too (Score:3, Insightful)
Keystroke loggers could be rendered ineffectual if the crypto software used was also hooked to a fingerprint scanner or a swipe card reader in addition to a password.
This wouldn't stop the FBI. They could obviously take his fingerprint and probably make some kind of cast based on that to replicate it. A swipe card could be subpoenaed in court too.
Re:A simple keystroke logger can be elegant, too (Score:1)
Keystroke loggers could be rendered ineffectual if the crypto software used was also hooked to a fingerprint scanner or a swipe card reader in addition to a password.
That does not work, if the fingerprint reader/card reader is in the keyboard (or the logger logs it also). Same with biometrics.
But what about giving visual feedback in a very complicated, hard for software to analyze way that adds some blinding layer to the key, e.g. by XOR? Like giving the user a number to add to the current password position in a video? Then the password would never go unprotected through the input chain, and only the combination of input and output would yield the password. No complete protection, but a $200 Keylogger would not have a chance against this.
Re:A simple keystroke logger can be elegant, too (Score:3, Insightful)
Attack: Insert a logger in between the computer and the device that reads cards/fingerprint etc.
Interface between computer and something thought to be personally secure (the person, or a smart key he carries, etc) must be resistant to MITM and logging attacks.
Re:A simple keystroke logger can be elegant, too (Score:2, Insightful)
If you want to be really paranoid, check your computer every few days. Look for dongles or adapters you don't remember putting on. Use keyboard cables without ferrites, they could be replaced with a keylogger. Epoxy over the heads of your keyboard screws. Look inside the computer case, see if anything has been added or moved. Then, if you find a key logger, fill up it's entire memory with "h4h4! j00 5ux0r!!" ^_^
Actually... (Score:2)
Build a large steel cabinet, using
Create a wireless IR keyboard interface, with one of those mini keyboards - plus possibly custom software drivers and/or hardware interfaces for it. Provide a hole so that the IR x/r unit can "see" out of the box to the keyboard.
Lock the box up in some manner - tack welding might be preferable. Add a power switch to the outside of the box, maybe a few status LEDs.
Take the keyboard with you whenever you are not with the machine. Perhaps sleep with it under your pillow, or put it in a safe under your bed or something. Follow the rule about using epoxy on the screws. Maybe put seals over the welds, or take pictures of the welds to compare with every now and then (say once a week). You might even want to place the monitor in a copper wire mesh bag or Faraday cage, propely sealed and grounded for stray RF emmisions. Maybe not even provide a modem, only a floppy drive of some sort - and do all decryption of that secured machine. Won't stop "them" from tracking who/when you comm with other parties (ie, traffic analysis), but will keep them from logging you.
If you are truely needing this, you will see that what I suggest is actually worthwhile...
Re:Actually... (Score:2)
I am thinking fiber link of some type - not sure if that would be the best answer, though...
New FBI surveilance technology (Score:1)
Doesn't it seem strange (Score:3, Informative)
I would seriously doubt that if this 'device' was capable to record every keystroke as they claim, that if they had the opportunity to sift through Scarfo's (outgoing) email/online banking/Adult-Check/etc. they wouldn't.
Re:Doesn't it seem strange (Score:5, Insightful)
A law enforcement agency, creating a tool that is designed to operate within a limited court order - shouldn't we be at least somewhat positive of this?
Re:Doesn't it seem strange (Score:1)
True, but that does not mean that they are not going to break the rules. The knowledge that they couldn't use the evidence would in no way deter them from collecting it. It just means that if they find evidence of a crime that is outside of their current scope, they will have to go the extra step of using the illegally obtained evidence to find further evidence legally. Then, it is just a matter of presenting only the untainted evidence in court.
Re:Doesn't it seem strange (Score:3, Interesting)
True, but that does not mean that they are not going to break the rules. The knowledge that they couldn't use the evidence would in no way deter them from collecting it.
Unlike your local PD, the FBI risks a lot more harm than possible benefit from such a strategy. All it would take is one whistleblower to make the whole thing blow up in their faces. I suspect that if the FBI says they are using those communication restraints it is because they are. Even the political damage, much less the criminal liability of lying to the courts, would be overwhelmingly more costly than losing this relatively unimportant case.Re:Doesn't it seem strange (Score:2)
found some new evidence from that illegally acquired information, it would probably get tossed out of court, along with the case (fruit of a poisoned tree).
Absolutely. If not, you can see the court proceedings...
Prosecutor:"Your honor, if it pleases the bench, we would like to show the jury Exhibit A, to wit, the computer keystroke log of the defendent, "Scarfo".(aside)"Please start the on-screen display."
"As you can see here, he is entering a secret pass phrase for a highly sophisticated encryption algorithm called P-G-P."
"You can make out the individual letters of this secret key..."
"And now you can see Scarfo entering the accounts information for his highly illicit operation."
"I think any reasonable person would have to conclude that Scarfo was running an illegal operation and was taking great pains to hide this fact through his use of sophisticated high technology."
(aside)"Please halt the projector."
(Projector continues as Scarfo keystrokes exit from his business operations and he enters a chat room.)
(with urgent pleading)"Halt the projector, please!"
(The jury and much of the courtroom are breaking into barely concealed sniggering as they view Scarfo's conversation in the chat room.)
Defense Attny: (suddenly jumping to his feet)"Objection, your honor!"
"As you can plainly see from this chat room conversation, the investigators were clearly out to embarrass my client in front of his wife by presenting evidence that he was involved in impressing high school age girls with his youthful machismo while, as you can plainly see, he is actually an overweight, balding middle-aged man."
"This evidence was not pertinent to the case, could unduly sway the jury's opinion of my client, and was used to blackmail my client into fabricating incriminating evidence of some supposed crime. I request the case be dismissed."
Judge:"Objection sustained. Case dismissed.
Scarfo's Password (Score:3, Interesting)
Re:Scarfo's Password (Score:4, Interesting)
Re:Scarfo's Password (Score:2, Insightful)
Still, if the FBI really went to that much trouble to do keylogging software that doesn't capture when the com ports are active, I have to admire their dedication to the letter of the law.
Ctrl-V ? (Score:3, Interesting)
Re:Ctrl-V ? (Score:5, Funny)
Wouldn't have to be plain text somewhere.... (Score:1)
Re:Ctrl-V ? (Score:2, Interesting)
Solution: Chargen (Score:5, Insightful)
Of course, then you're vulnerable to those things which remotely view monitors (Van-eckman scanners?). But I suppose if you're really paranoid about something like this, you would actually search for a keyboard logger first and put 3 other monitors nearby to create interference. So I guess it's all academic.
-Ted
Re:Solution: Chargen (Score:2)
Just use the windows character generator. When you need to enter a password, click it into the windows character generator and copy the resulting string and paste it later. No keyboard interface is ever required.
Well if the FBI figured out that's what he was doing, they could then just log his mouse movements and button clicks, since the layout of keys on the screen in that program would always be the same.
Re:Ctrl-V ? (Score:1)
Re:Ctrl-V ? (Score:3, Interesting)
Yeah, but how many millions of phrases are on your computer? The one that is your passphrase doesn't have to be obvious. (ie, brute force attack with the entire contents of the drive should slow someone down.)
But, even better, you don't even have to leave the phrase laying about for longer than a few seconds. Just open up a web page, select the a few char of the password, and paste it to a temp file. Open up another page and copy another block of char and paste that to the file. Keep doing this until you have a complete password, copy it and close the file w/o saving.
Anything that is recording your input stream from the keyboard is just going to see you just web surfing a doing a lot of copy and paste.
Re:Ctrl-V ? (Score:2, Interesting)
Linuxrunner
Re:Ctrl-V ? (Score:2)
Re:Ctrl-V ? (Score:1)
Wouldn't it be fairly easy to obscure? You could hide it within a much larger string of random characters, compile it in an executable, etc.
Re:Ctrl-V ? (Score:2)
Security is inversely proportionate to convienience. The most secure method of key management is to have your crypto key on removable media (preferably somthing that is tamper-resistant and can be easily destroyed if needed). Of course it's a lot more convienient to keep your key on the same media that contains the encrypted data, but you pay for that convienience at the cost of security. Putting the passphrase there as well costs you even more security, regardless of how obfuscated it is.
As others have already pointed out, good security comes from combining 2 of 3 essential elements: somthing you know, somthing you have, and somthing you are. In this case, "somthing you know" is the passphrase, and "somthing you have" is the crypto key -- if one is compromised, the other is still secure. Even rubber hose cryptanalysis will fail if you've destroyed the media which contains the only copy of the key.
Re:Ctrl-V ? (Score:2)
For example.
no control (Score:2)
What, me worry? Nahhh!
Re:Ctrl-V ? (Score:1)
Scarfo Used Windows (Score:5, Informative)
The affidavit says that Scarfo used a Windows OS.
Coupled with the DOJ ruling [usdoj.gov], it just goes to prove that M$ Windows is an operating system written for criminals by criminals.
Re:Scarfo Used Windows (Score:3, Funny)
The new company, tentatively called GovernSoft, will be sold to the lowest bidder to pay for the costs of prosecuting the case, which could reach into untold billions of dollars.
Not while connected (Score:2)
scarfo keylogger (Score:5, Funny)
Fake "real" keyboard, then USB??? bwahahahar! (Score:3, Funny)
when you go to use your pc, go to another room, take out your
nice USB keyboard, then plug that in and use that instead?
Wouldn't it be funny seeing the feds puzzled faces - you've been
sending all sorts of PGP'd email in the last month, and all thier logger has registered is "haha MOFO's!!!!" - LOL!!!!
Re:Fake "real" keyboard, then USB??? bwahahahar! (Score:2, Insightful)
Re:Fake "real" keyboard, then USB??? bwahahahar! (Score:1)
Another fine ripost brought to you by NeoTron
Re:Fake "real" keyboard, then USB??? bwahahahar! (Score:2, Funny)
Journl Entry - Oct.12, 2000
Met with 'Dubbya' today. Promised to have all fake ballots filled out and filed within the next couple weeks. Also, sold him an 8-ball.
Re:Fake "real" keyboard, then USB??? bwahahahar! (Score:2)
Just my $2e-02.
OK,
- B
Interesting. (Score:3, Insightful)
THIS is an interesting little statement. It says nothing about what they DID use, merely what they COULD have used. And since it's probably not an exhaustive list, the actual method(s) used may or may not be contained within it.
It's important to not assume that the FBI are being malicious in what they've put in this brief, but it's equally important to verify what is being said. The FBI are not the most open organization in the world, and it would be erronious to assume that a court filing will be any more open than anything else they publish.
Re:Interesting. (Score:2, Insightful)
Re:Interesting. (Score:2)
IIRC, the judge did get an accurate description, so that he could rule on whether it stayed within the bounds of the warrant. This doc is what opposing counsel got.
Re:Interesting. (Score:2)
Presumably the Judge will have made them release all of the relevant data that could be used for defense. If the executive and judicial branches are both corrupt, there is little point in waiting on the legislators (soul keepers of righteousness that they are) to clean things up. The best you can hope for if that were the case is that the press will somehow get hold of the truth and expose the fraud for what it is.
Honestly though, I don't think it is very likely that either the FBI or the Judge are corrupt in this case, much less both.
A peril of open source (Score:3, Insightful)
Re:A peril of open source (Score:2, Insightful)
Re:A peril of open source (Score:2)
I thought you were going to say that you had this really nifty highly obscure homebrew checksumming program. Unless you make it a habit to memorize checksums, then how will it help having tripwire running if someone has front-panel access to your box?
They might fall for the first person they were investigating who used that to protect his system, but probably not the second.
DMCA (Score:1)
Re:DMCA (Score:2)
No.
DMCA doesn't prohibit circumventing encryption, in general. It prohibits it under very specific cases. Short things like passwords are not copyrightable, so decrypting them isn't covered by DMCA.
Furthermore, even if the conditions of DMCA applied to this act of circumvention (which they don't), it doesn't matter anyway. Because DMCA specifically exempts Law Enforcement.
okay let me get this straight (Score:3, Interesting)
Did anyone read that whole thing? It seems that the FBI had a keystroke logger that only came on when the modem was off, with the belief, I assume, that the computer isn't a communication device unless the modem is on.
So then the wiretap laws wouldn't apply when the modem is off? Is my interpretation correct?
Strange loophole..
Re:okay let me get this straight (Score:2)
Hmmm...
Of course it isn't hard. This is why you should have no fear of handing over your keys to the escrow agent. They have one of those easily obtained trusted systems in a trusted location, ready to go!
Must... not... ARGH! (Score:2)
OK,
- B
Backdoor in Windows? (Score:2)
Also, the obivous question: how did they install the keylogger in the firsrt place?
Any conspiracy theorists wanna bet that Microsoft has had such backdoors (eg, blank areas in KERNEL32.EXE or the like where the FBI, etc could covertly upload arbitrary code, if triggered by say, inserting a floppy with the right code in the bootsector, etc?
modem??? NETWORK!!! (Score:2, Insightful)
sim-ple.
Countertactics (Score:2)
warrant (Score:3, Insightful)
Re:warrant (Score:1)
So they can shut down a hacker remotely in an emergency?
I think I will wait some time before taking an implantable computer!
Re:warrant (Score:2)
Bio-interfaces to external systems would probably use wireless, which is highly tappable on a physical level at least. In addition, if a bio-interface were possible, it would be possible to develop a bio-tap using the same technology, making us more vulnerable to intrusion, not less.
Tim
Re:Why? (Score:1)
Re:For a second there... (Score:5, Insightful)
Five or six thousand people died in the attacks on the World Trade Center and the Pentagon. It is a horrid tragedy and I would never try to minimize it, but it pales to the number of people who have died [lsu.edu] defending democracy. In three of these defining wars, as tabulated below, there were over 350,000 deaths.
This only includes those killed in action or dead from wounds and doesn't include prisoners of war. It seems tremendously disrespectful to those who died creating or defending this country to relenquish our rights, rights earned through their deaths, so easily.
There are also 40,000 deaths per year in the US [cdc.gov], not through terrorism, but through automobile accidents. Would you also suggest that for safeties sake we ban the automobile?
Re:For a second there... (Score:1)
That many? I have been using this argument in the last days to stress that it is not really about the number of deaths but the manner they occured in. But I had no idea that it is that many.
Re:For a second there... (Score:2)
About 2.4-million Americans die each year of other various causes. Aging should be banned as well.
Re:Two words (Score:1)
Re:Two words (Score:1)
Re:Two words (Score:1)
However, a keylogger in the PC would happily log the data, thinking it was typed on the keyboard.
Re:Just because you're offline... (Score:2)
Does this make sense?
Not especially. They're just exploiting a legal technicality. They aren't allowed to intercept private communications, so they argue that a deactivated modem means no communicating is going on.
Re:Why they do not log while online ? (Score:2)
Re:Uh... (Score:2)