FlyerTalk Forums

FlyerTalk Forums (https://www.flyertalk.com/forum/index.php)
-   Practical Travel Safety and Security Issues (https://www.flyertalk.com/forum/practical-travel-safety-security-issues-686/)
-   -   CBP officer gave me a stern warning that my laptop shouldn't have ripped DVD/Blu-ray (https://www.flyertalk.com/forum/practical-travel-safety-security-issues/1084567-cbp-officer-gave-me-stern-warning-my-laptop-shouldnt-have-ripped-dvd-blu-ray.html)

avsfan733 May 19, 2010 6:53 am


Originally Posted by AisleSitter (Post 13982277)
They don't break the 256-bit encryption key. They break the password, in a brute force manner. For most passwords, using a supercomputer this can be done in a matter of weeks at most.

AES permits the use of 256-bit keys (but does not yet require it). Breaking a symmetric 256-bit key by brute force requires 2^128 times more computational power than a 128-bit key. A device that could check a billion billion (10^18) AES keys per second would require about 3×10^51 years to exhaust the 256-bit key space.

BTW, zfone is great and I would reccomend it to anyone traveling, especially overseas. The implementation is quite simple and assuming both ends of the call use some (non-skype) form of voip, which you probably do for cost anyways, is simple as pie. I have it tied in for my home PBX and the PBX I setup for my lab at school

@QUERY, there is that speculation anytime the NSA gets involved in any security. I have always felt their key escrow movement years ago was kind of an admission that they were really expecting to lose the ability to effectively decrypt in the long term. They were involved in the design of DES, but as far as I know their involvement in AES is kind of a myth. The problem is, they are in a contradictory roll of being the encryption experts, and also one of the groups most likely to benefit from the holes...they have been involved in the HSA-3 competition helping evaluate proposals for NIST. Then again, so is Zimmerman so that's quite an interesting set of bedfellows.

armandov9 May 19, 2010 11:54 am


Originally Posted by QUERY (Post 13983185)
You didn't state what OS you had on the laptop but, assuming it was Windows XP or Vista, you probably don't have an administrator account on the laptop. Someone at your office does, however, and that person has access to ALL files of ALL accounts(either by default or by configuration). They also have access to the Computer Management snap-in(Local Users and Groups) for Administrative Tools. That person can also see all accounts by using the command line. Click Start, then Run, type in lusrmgr.msc in the Open field and click OK. The administrator of that laptop, if he/she has configured it for restrictive access, will have these features locked out so a user cannot access them or modify any settings already made.

Yes, I know all of this (This is Vista Business FYI). However, if I am NOT THAT PERSON that has administrator access, how can I be forced to give access? Does this essentially mean that if you carry a laptop that you are NOT an administrator on that you share with other users (I am sure many small businesses do this), that has OTHER user accounts besides yours, you can have it seized based on failure to provide access to the USER folders of those other users?

QUERY May 20, 2010 12:50 am


Originally Posted by armandov9 (Post 13986291)
"Yes, I know all of this (This is Vista Business FYI). However, if I am NOT THAT PERSON that has administrator access, how can I be forced to give access? Does this essentially mean that if you carry a laptop that you are NOT an administrator on that you share with other users (I am sure many small businesses do this), that has OTHER user accounts besides yours, you can have it seized based on failure to provide access to the USER folders of those other users?"

I see your point. I doubt the CBP officer would. They are not in the trusting business. You only need to look at prior threads on this forum and you will see that they can confiscate laptops. What I would do in that situation would be to give the CBP officer the name and telephone number of a point of contact at your company who is able to provide that info. Many businessmen who travel with laptops have the company name and telephone info on them(business card taped to back-usually) in case they are lost or to differentiate them from another identical laptop. This would also work for a point of contact in a scenario such as this. I don't know what kind of info is on your laptop but if it contains intellectual property or info not meant for public dissemination, then you should NOT give out any usernames or passwords, period. Let the point of contact handle that. Your company should have an information security policy and procedures to follow regarding laptop use and information disclosures.

armandov9 May 20, 2010 10:43 am


Originally Posted by QUERY (Post 13990298)
I see your point. I doubt the CBP officer would. They are not in the trusting business. You only need to look at prior threads on this forum and you will see that they can confiscate laptops. What I would do in that situation would be to give the CBP officer the name and telephone number of a point of contact at your company who is able to provide that info. Many businessmen who travel with laptops have the company name and telephone info on them(business card taped to back-usually) in case they are lost or to differentiate them from another identical laptop. This would also work for a point of contact in a scenario such as this. I don't know what kind of info is on your laptop but if it contains intellectual property or info not meant for public dissemination, then you should NOT give out any usernames or passwords, period. Let the point of contact handle that. Your company should have an information security policy and procedures to follow regarding laptop use and information disclosures.

Yeah, that all sounds reasonable. Problem is we are very small with NO IT management of any kind. We just outsource the IT and really have no internal policy of any kind whatsoever.

It's just a scary thought, but I suppose since it's not my laptop, and I have no personal interest in it, I wouldn't care if it was just taken. It's more silly and annoying and ridiculous than anything.

gfunkdave May 20, 2010 11:20 am


Originally Posted by QUERY (Post 13961295)
Also, while TrueCrypt is a good encryption program, don't underestimate the decryption capabilities of the Federal Government. If warranted, they need only get the NSA involved.

And the NSA would admit to the world that it can break AES why exactly?

nkedel May 20, 2010 8:15 pm

First, let me say it's this kind of crud that has led me to have a second "clean" hard drive for outside-the-US travel.


Originally Posted by ESpen36 (Post 13946803)
So, I guess the moral of the story is not to travel with ripped DVD content unless you can prove that you own the discs from which you ripped the content. A receipt should suffice, I would suspect, if you didn't want to carry around the discs.

Or just delete them before returning through customs. Not great if you've got a long domestic connection, but it avoids the hassle.


Originally Posted by erictank (Post 13947771)
Whether you own it or not is almost irrelevant - since DMCA makes it illegal to break copy protection to make a backup copy of a movie you own the disc for (and that's any commercial release).

No, just any major-studio one, and most others. I've bought unencrypted original DVDs - producers have to pay licensing fees to use the copy protection, and minor productions (and some large adult producers) will sometimes skip it to save cash[**}

[** while the older CSS optional on DVD, the formal standard for Blu-ray now requires the newer (AACS) encryption system, although I've seen some adult titles that are "out of compliance" and unencrypted. They won't play on some players. I don't remember if HD-DVD required AACS or it it was optional.]


Originally Posted by Sam5 (Post 13947984)
1. Download and install Truecrypt (works on netbooks)
2. Set up your encrypted container
3. Move everything to the encrypted container

An empty disk looks suspicious. That there's encrypted volume is obvious if you go looking for it. Customs is allowed to ask you for the key, and for random fishing the most likely thing they'll do if you refuse is to pass you through but refuse entry for your computer. Encryption is not a panacea, and how best to use encryption and at the same time avoid suspicion in the case of random fishing is left as an exercise for the reader.


Originally Posted by avsfan733 (Post 13950644)
this is good advice whether or not you have any media on your drive. This is actually a better solution then whole disk encryption because it raises less eyebrows. CBP will definitely notice if they can't get your computer to boot because its wholly encrypted. However, these ladies and gents aren't Bill Gates and an encrypted container will most likely pass without notice. I would suggest not moving *everything* so that the CBP can make a show of searching through whats left.

There are better ways still, but this is a good start.


Originally Posted by Sam5 (Post 13957671)
Truecrypt - ^ hidden container ^

...is even better. Probably the best way that's reasonably convenient.


Originally Posted by whitearrow (Post 13951448)
As I understand it the DMCA doesn't apply to CD's. They don't have digital copy protection.

Normal, in-spec CDs don't have any copy protection; there were attempts (some of which led to some nasty public backlash, including the Sony rootkit) to add it later on. Since these were done by exploiting design defects and not part of the standard, I don't know if that makes any difference for the DMCA or not.


Originally Posted by N1120A (Post 13953832)
Aren't there some of those combo VHS/DVD players still floating out there?

All of the name brand ones will either stop recording, or replace the video with a solid or warning screen, if they detect a protected (ie Macrovision) source.


Originally Posted by Gargoyle (Post 13954205)
I had Truecrypt on my old laptop- it really slowed it to a crawl. Is that normal?

It's normal for there to be some performance hit. How big a hit that will be depends on a lot of factors; with due respect to ArizonaGuy, the speed of the underlying drive is a relatively small one (the speed of your CPU, the choice of encryption algorithms used, how much memory you have, and what programs you run all matter more.)

Using swap on a truecrypt boot volume is usually particularly painful - having enough memory and minimizing swapping (or better still, disabling swap) would in general be the first thing I'd suggest.


Originally Posted by N965VJ (Post 13957576)
With regard to encryption, it's my understanding that if CBP wants to view your files, and you refuse to provide a key, they will send your laptop to a facility that has the capability to do it without you. Is that correct?

With effective encryption, good luck to them - although a lot of encryption is badly done. Getting around a logon password for Windows by removing the drive and searching it directly, sure (indeed, I've been told they have facilities for that in-airport at some ports of entry)


Originally Posted by QUERY (Post 13961295)
Very interesting idea except that OS accounts can be enumerated from the Registry and the GUI(Windows OS).

They're very unlikely to do this (or look at the partitions) while doing a quick fishing search on-site.


Also, while TrueCrypt is a good encryption program, don't underestimate the decryption capabilities of the Federal Government. If warranted, they need only get the NSA involved.
They could. On the other hand, no matter what capabilities the NSA actually has to break strong encryption, I strongly doubt they'd be willing to risk leaking out information about what those capabilities are for non-national-security matters.


Originally Posted by mre5765 (Post 13962739)
Besides which most of the products being discussed in this thread are Open Source, so secret backdoors would be impossible.

Not impossible - just unlikely to remain secret unless very, very carefully done.


Originally Posted by QUERY (Post 13965350)
I would not make that assumption. CBP is a large organization. It would be safe to say that they have a unit of their own to deal with these situations. If they retain possession of the laptop because the pax was noncompliant,

As long as you appear compliant, the frontline CBP guys are unlikely to keep the laptop for further search or to escalate it to someone with the technical skills to find well-hidden material.

QUERY May 20, 2010 11:28 pm


Originally Posted by armandov9 (Post 13992649)
"Yeah, that all sounds reasonable. Problem is we are very small with NO IT management of any kind. We just outsource the IT and really have no internal policy of any kind whatsoever.

It's just a scary thought, but I suppose since it's not my laptop, and I have no personal interest in it, I wouldn't care if it was just taken. It's more silly and annoying and ridiculous than anything."

What's scary to me is a company without an information security policy. That's a lawsuit waiting to happen, one that can bankrupt an organization or ruin its reputation, or both.


Originally Posted by gfunkdave (Post 13992853)
"And the NSA would admit to the world that it can break AES why exactly?"

You didn't look at number 90 post I made. I stated the NSA would not publish such info if, in fact, they had broken AES. You quoted 1 paragraph of a larger post I made, out of context. Even the quoted paragraph does not state that. Next time you quote what someone has stated, include ALL of it so the viewers can decide for themselves in what context the statement was made.@:-)


Originally Posted by nkedel (Post 13995625)
"First, let me say it's this kind of crud that has led me to have a second "clean" hard drive for outside-the-US travel."

They're very unlikely to do this (or look at the partitions) while doing a quick fishing search on-site.

They could. On the other hand, no matter what capabilities the NSA actually has to break strong encryption, I strongly doubt they'd be willing to risk leaking out information about what those capabilities are for non-national-security matters.

As long as you appear compliant, the frontline CBP guys are unlikely to keep the laptop for further search or to escalate it to someone with the technical skills to find well-hidden material."

Note I'm only responding to the opening paragraph and the ones where you quoted me.

Regarding your 1st paragraph, that's a good idea.

Regarding your 2nd paragraph, what if CBP sends it off to their cyber unit, a DHS cyber unit, or, like I stated before, to the NSA, for further inspection? Viable options, yes?

Regarding your 3rd paragraph, if you look at the paragraph you quoted, I stated, "If warranted...". There is no requirement for NSA to state any info regarding the confiscated laptop to the public. As I've already stated in post #90, the NSA would not broadcast that they had broken a code like AES.

Regarding your 4th paragraph, the presumption on this forum seems to be that CBP officers are not very bright. You can roll the dice with them at your own peril. Myself, I would never underestimate someone holding such a position, even if it's an Agricultural Specialist. What you need to realize is that they have contact with the public on a regular basis, both good and bad people. Attempting to employ subterfuge against a trained, experienced officer is not a wise course of action.@:-)

Silver Fox May 21, 2010 1:04 am

I suspect the CBP officer was jealous as he has not figured out how to do it. If they even think about touching my Amazing Race torrents they are in big trouble, guns or not !

nkedel May 21, 2010 3:46 am


Originally Posted by QUERY (Post 13996563)
Regarding your 2nd paragraph, what if CBP sends it off to their cyber unit, a DHS cyber unit, or, like I stated before, to the NSA, for further inspection? Viable options, yes?

First two are certainly viable options; the last doesn't seem very viable option unless you're suspected on something of a national-security rather than merely uncooperative or banally criminal nature - any assets


Regarding your 3rd paragraph, if you look at the paragraph you quoted, I stated, "If warranted...". There is no requirement for NSA to state any info regarding the confiscated laptop to the public. As I've already stated in post #90, the NSA would not broadcast that they had broken a code like AES.
Going ahead with a conventional criminal prosecution on the basis of that kind of evidence would, I think, have the same net effect as broadcasting it. Clearly, if it's a case involving al-Qaeda or something, I'd imagine things work a bit differently. Joe Blow the drug mule, or John Smith the pedophile... not so much.


Regarding your 4th paragraph, the presumption on this forum seems to be that CBP officers are not very bright.
Not very bright? I wouldn't say that; the ones I've dealt with have tend to be a lot smarter - and frankly, a lot more courteous - than your typical TSA agent. But bright does not imply technical skillful, and even if technically skilled, people in that position have limited bandwidth and time for any given person.

Having had my laptop searched twice (both times in my presence, albeit with a relatively half-assed job of trying to keep me from looking) I've got a fair sense of what they do on a quick "fishing" job.


You can roll the dice with them at your own peril. Myself, I would never underestimate someone holding such a position, even if it's an Agricultural Specialist. What you need to realize is that they have contact with the public on a regular basis, both good and bad people. Attempting to employ subterfuge against a trained, experienced officer is not a wise course of action.@:-)
You miss my point, and indeed, what I hope would be the point of anyone in this thread. The goal is not to "roll the dice" or to get away with something - I certainly HOPE nobody in this thread is trying to get away with anything that customs should be looking for - but to avoid hassles and invasion of privacy when you are in fact doing nothing wrong, or at worst engaged in a gray area like the movies the original poster mentioned.

FliesWay2Much May 21, 2010 10:17 am


Originally Posted by QUERY (Post 13996563)
Regarding your 2nd paragraph, what if CBP sends it off to their cyber unit, a DHS cyber unit, or, like I stated before, to the NSA, for further inspection? Viable options, yes?

Regarding your 3rd paragraph, if you look at the paragraph you quoted, I stated, "If warranted...". There is no requirement for NSA to state any info regarding the confiscated laptop to the public. As I've already stated in post #90, the NSA would not broadcast that they had broken a code like AES.

There is also the practical aspect to all of this. I very much doubt that NSA would go through the non-trival expense of getting into a traveler's laptop unless there was a darn good national security reason to do so. If I were the DIRNSA, I wouldn't touch this job unless I was 100% reimbursed by Nappy.

There are law enforcement agencies with decent encryption-breaking capability, but, this, too, is expensive. It's a lot easier and cheaper for a customs guy to manipulate or intimidate someone into spilling their guts than it is to confiscate the laptop and send it off somewhere.

TravelerMSY May 21, 2010 1:37 pm

If you use a Mac it is easy to make an encrypted DMG to store files, without using the system-wide file vault.

I'd try to play nice with CBP. While you may ultimately prevail on the privacy issues, they have pretty much unlimited authority to seize property entering the US.

QUERY May 23, 2010 1:06 am


Originally Posted by FliesWay2Much (Post 13998614)
"There is also the practical aspect to all of this. I very much doubt that NSA would go through the non-trival expense of getting into a traveler's laptop unless there was a darn good national security reason to do so. If I were the DIRNSA, I wouldn't touch this job unless I was 100% reimbursed by Nappy.

There are law enforcement agencies with decent encryption-breaking capability, but, this, too, is expensive. It's a lot easier and cheaper for a customs guy to manipulate or intimidate someone into spilling their guts than it is to confiscate the laptop and send it off somewhere."

Regarding your 1st paragraph, that is why I stated, "If warranted...".

Regarding your 2nd paragraph, point taken. Add to that they can ask the right questions to trip a pax up in his/her own lies.

mre5765 May 23, 2010 6:32 am


Originally Posted by AisleSitter (Post 13982277)
They don't break the 256-bit encryption key. They break the password, in a brute force manner. For most passwords, using a supercomputer this can be done in a matter of weeks at most.

So use a pass phrase.

As I noted before to break a 256 AES key now requires 2^110 brute force attempts. Thus one merely needs a pass phrase that is resistant to 2^110 attempts. Assuming a dictionary of 65,000 words, i.e. 2^16, one just needs to construct a pass phrase consisting of 110/16 = 7 random words.


Originally Posted by AisleSitter (Post 13982277)

So the way to defeat that is to use not only a password, but also a keyfile. A keyfile is a file that gets combined with the password-generated key to create the decryption key. So now the brute force attacker needs to iterate not only over all possible passwords, but all possible keyfiles.
Good luck breaking that.

I'm sorry I don't follow. If the password is all the end user uses to cause his data to be decrypted, how does a "keyfile" help here?


Originally Posted by QUERY (Post 13975851)
You are implying that Schneier is somehow the only expert in cryptology and that the methods he used were the only ones that could be used(which he doesn't elaborate on).

Actually, if you'd bothered to read the link, Schneier is quoting from the result of someone else.


Originally Posted by QUERY (Post 13975851)
The NSA probably have some of the best cryptographers working for them.

You think?


Originally Posted by QUERY (Post 13975851)
Also, if they have access to the laptop and if a hard drive encryption utility was not used, they will have access to many plaintext files as well.

So?


Originally Posted by QUERY (Post 13975851)
In addition, they have the owner's identity and personal info on him as well.

So?

reamworks May 23, 2010 5:52 pm


Originally Posted by gatorray (Post 13950143)
Another lazy law, if you ask me. I agree that P2P sharing of files that are ripped from personal inventory is a problem. But to try to make a federal case against a person that buys/rents a DVD, decides to watch it on a device that doesn't have a DVD player, rips it to a compatible format, watches the movie and deletes the file when done.

Its easier to ban copying in all forms with a few exceptions than try to figure out a fair way to allow media transfers. Lazy regulations.

Some BluRay disks come with a digital file that's expressly intended for viewing on your computer.

In any event, the law is complicated, and (most likely) the TSA agent is not an attorney. Since he was giving you legal advice, you should file a complaint against whoever licenses attorneys in that state, and consult an attorney to determine if you have the right to sue under state law.

Firebug4 May 23, 2010 6:06 pm


Originally Posted by reamworks (Post 14010232)
Some BluRay disks come with a digital file that's expressly intended for viewing on your computer.

In any event, the law is complicated, and (most likely) the TSA agent is not an attorney. Since he was giving you legal advice, you should file a complaint against whoever licenses attorneys in that state, and consult an attorney to determine if you have the right to sue under state law.

For what it is worth, it is CBP officers that are being discussed. Good luck with that. Is that legal advice you are giving or is it your opinion?

FB


All times are GMT -6. The time now is 4:03 am.


This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.