What happens if authorities seize your laptop?
51 points by drucken 11 years ago | 81 comments- joshka 11 years ago"Or you can scrub your laptop clean, storing everything on an external hard drive that you leave at home. Then you know you are safe from prying authorities, at least at the border."
That is unless you believe that those prying authorities have the will and the way to leave an undetectable backdoor in your laptop. Breaking the chain of custody in any laptop today is akin to destruction of trust in that device. Who is responsible then for paying for this damage?
- nhaehnle 11 years agoI would second this. We know for a fact that the NSA uses BIOS malware. I don't believe we know for a fact that such malware is routinely installed by border guards, but it's not a very far-fetched worry at this point.
The technical expertise required to do so is very limited as long as you don't password-protect the BIOS: Basically, they only need to be able to plug in a USB stick and reconfigure the BIOS to boot from it.
In other words: If you leave your laptop outside of your physical control for even a few minutes, you may have to assume that it is totally compromised as long as you don't have a BIOS password.
If the laptop is outside of your control for a longer period of time, you probably have to assume that it has passed through the hands of somebody with sufficient technological know-how to work around the BIOS password as well.
- drdaeman 11 years agoIsn't BIOS passwords useless?
For non-soldered but socketed BIOSes I think one can just take chip out and put it into your wallet, possibly, covering some pins with some dissolvable insulating substance. For soldered SPI EEPROM chips with known pinout, I think one can reflash the chip afterwards.
- daxelrod 11 years agoBIOS passwords are not always useless, depending on model.
I had a Thinkpad T42 on which I managed to set a password for editing BIOS settings that I did not remember.
I the laptop into IBM for repairs to the monitor, and as part of their repairs they needed to get into the BIOS settings (I believe to run a diagnostic). Their solution was to replace the entire motherboard.
- daxelrod 11 years ago
- javajosh 11 years agoDo MacBooks have the option to password protect the BIOS?
- ddinh 11 years agoYes, you can set an EFI password on Macbooks: https://support.apple.com/kb/HT1352
- ddinh 11 years ago
- drdaeman 11 years ago
- kijin 11 years ago> Who is responsible then for paying for this damage?
Craigslist.
Or eBay, or Kijiji, or the Classified section of your local newspaper. Whatever lets you get rid of your possibly contaminated device while recouping at least part of the cost.
The difference between the price of the new device and the amount you can recoup by selling it secondhand, multiplied by the probability that your device will indeed be seized, should be considered an integral part of your budget for any international trip. It's just one of the many ways in which tyrannical governments increase friction in their citizens' daily lives.
- logicallee 11 years agoThat's why I never let my laptop out of my sight after I watch it be given live birth to by a laptop in the wild - I just don't trust some factory or government or my apartment.
- entendre 11 years agoDo you have a pamphlet?
- entendre 11 years ago
- shawn-butler 11 years agoI wonder if there isn't a fledgling niche business opportunity here for security-minded but not tech-saavy business travelers?
Rather than leaving it at home, a trusted third-party service could supply a image/reimaging service at popular travel endpoints.
A lot of risk in it I suppose.
- nfoz 11 years ago> a trusted third-party service
That's a big problem.
- nfoz 11 years ago
- jrockway 11 years agoDoesn't secure boot help with this? Unless you believe that the DHS has somehow convinced Intel (etc.) to break the TPM in some way that is quickly exploitable at the border and that nobody has noticed.
- mcdougle 11 years agoreimage it again when you get home?
edit: To those below: True. I thought about hardware after I posted; didn't even think about the BIOS thing but that's a great point.
- 01Michael10 11 years agoRe-imaging your hard drive will not help with BIOS malware. Re-installing the BIOS yourself may help.
Your data should stay at home and a VPN connection to your home PC would be a good first step.
- dhimes 11 years agoIs there a reliable backup utility for your BIOS? I've come across this, but don't know how to judge it's viability.
- dhimes 11 years ago
- pogden 11 years agoHardware keylogger.
- avn2109 11 years agoThat autonomously phones home so they don't even have to borrow your laptop next time you fly in order to dump the data.
- avn2109 11 years ago
- 01Michael10 11 years ago
- nhaehnle 11 years ago
- a3n 11 years agoActivists and other "interesting" people have their own particular security problems.
For most of the rest of us, we really have no data of any interest to the authorities. That doesn't mean we shouldn't care about data security, if that's important to us. But it's not the real problem with border confiscation.
The real problem is not having your hardware or software tools at your destination.
So don't bring any hardware or data that you can't afford to lose. Certainly don't bring anything that you're emotionally attached to, particularly inbound.
Either don't bring anything, and buy it all at the destination, or just bring the cheapest stuff you can use productively, and be prepared to replace it at the destination.
The NSA already has my email. But I'd hate to be without a camera, or phone, or laptop, or data, or whatever other tools I was going to use at the destination. Plan for that, it's the more likely and practical threat.
- zacinbusiness 11 years agoIs it possible to encrypt two files together with two different keys? Say I have my class notes from freshman Latin and I have my plans to take over the world. I encrypt them together into a single file "dont_read_super_secret.encrypted" and if I enter "fuzzykitty98" as the key then I see only the notes. But if I enter "downwithfreedom2000" then I see only the diabolical plans. Is that possible?
If anyone builds this app, I'd like a slice of the pie, please :-)
- kybernetikos 11 years agoTruecrypt supports multiple encrypted partitions, and if you've got the details to decrypt one, you still can't tell if there are any others.
- oskarth 11 years agoI believe this is possible with something like Truecrypt.
- valarauca1 11 years agoIt'd be possible but difficult.
I don't know how to do it without some kind of markup / document system (no morning coffee yet). I figure it wouldn't be that hard.
You could use a TDMS file(v1), which each channel is an item. When ran you give the program a password, which it checks against each channel, calculating the salted hash of your password. When it finds a matching hash it decrypts the document (saved as data within the channel).
This gives you a lot of plausibly defensibility because nobody understands TDMS file structure, not even people who work with them (it is an open standard, just nobody cares). And secondly, you decrypt the document and you get something out, even if that something isn't exactly correct.
I could likely push out a windows version by Saturday I guess if you don't mind it'd be using SHA-256 instead of [b/s]crypt for password checking. Maybe future updates to include some form of internal compression + some type of signing who last modified the document(s).
- zacinbusiness 11 years agoKnock yourself out. People will be buying anything that they think can keep their data safe, so someone may as well come up with a decent solution. We can build it and let the HN community battle test it. Split on profits can be 60/30 as you're doing the work :-)
- valarauca1 11 years agoBattle testing is a horrible way to prove crypto works, from the outside looking even horribly done crypto looks secure.
- IceyEC 11 years agoCan I have the extra 10 percent?
- valarauca1 11 years ago
- valarauca1 11 years agoSo I did get an early version working, but 5 minutes to join to 4MB PDF's encrypt and compress.
Final fize size of 746kb though made me feel a bit happy.
- zacinbusiness 11 years ago
- nmc 11 years agoOf course this is possible.
You can even take it a step further: full disk encryption, one key will give an innocent Windows install, and another key will give the diabolical plans.
However, information is only compressible to the extent of redundancy involved, so this can be spotted: compare the amount of encrypted data with the size of the innocent data.
- kubiiii 11 years agoMake sure to add some shameful evidences on the innocent Windows install to make it more convincing. "Sh.. you found my porn folder! Well done guys".
- mschuster91 11 years agoThere's an even bigger weakness: timestamps in files and the Windows event log. These will show if your "innocent" OS hasn't been booted for $long_time...
- alextingle 11 years agoJust reset the hardware clock back whenever you power off. The pretend your clock is three years out of whack, and that you don't care. Hey presto - your ancient windows install looks "fresh".
- alextingle 11 years ago
- kubiiii 11 years ago
- blueskin_ 11 years ago2c2 by Michal Zalewski ( http://lcamtuf.coredump.cx/ ) is a theoretical exercise in this, but probably not safe for real use.
- kybernetikos 11 years ago
- nmc 11 years agoA frightening thought: if it was practical to search each and every device going through the border, they probably would do so.
Happily enough, statistical sampling techniques can make that possible [1].
[1] S. Garfinkel. Searching A Terabyte of Data in 10 minutes. http://simson.net/ref/2013/2013-01-07%20Forensics%20Innovati...
- thirdsight 11 years agoI don't travel with any hardware other than a DSLR and then I mail the SD cards home. I'll use internet cafes and my phone and that is it.
It gets broken, searched, x-rayed, fucked up and generally treated like shit.
At Zurich airport, they managed to break my old IBM T42. Had to get my company at the time to courier a new one overnight from the UK by road which cost £1150 just for the courier.
- markeganfuller 11 years ago"During their inspection of your laptop, the authorities will disregard files that are not germane to their investigation, says Rosenzweig, explaining that the official policy is to 'flush all non-criminal data'."
How exactly do they tell the difference, what if I use steganography to hide stuff in my family pictures? They won't flush anything, they will keep everything in case it's relevant.
- powertower 11 years ago> Between October 2008-August 2009, for example, more than 220 million people travelled to and from the US, according to Department of Homeland Security officials.
> During that time authorities searched about 1,000 laptops carried by travellers.
We don't live in the police state that most Snowden and Kim Dotcom supporters here tell us that we do.
I get really tired of seeing anecdotes used to represent the average.
- iaskwhy 11 years agoTangential. One of the reason I love "V for Vendetta" is how it shows how normal it is to live under a dictatorship. Thing is, for most people, there's almost no difference, mainly during the most recent dictatorships. But for a very particular minority, life is very very different. I should know, I'm currently in a country where 50 years ago there was a dictator and it's not uncommon for normal people to claim how things were maybe better during those decades. Well, my grandfather, tortured by the state police for being part of an union, wouldn't agree. But for the other 99% of the population, life was, give or take, just as it is.
- powertower 11 years ago> But for a very particular minority, life is very very different.
That's pretty much true for any and every society.
- iaskwhy 11 years agoCan you expand on that?
- iaskwhy 11 years ago
- powertower 11 years ago
- wvenable 11 years agoIf you are a political activist, it seems the odds of getting your laptop searched is many orders of magnitude greater than the general population.
- erichocean 11 years agoWhich is, in effect, a prior restraint on political speech, so you'd think the Supreme Court would be all over that.
- erichocean 11 years ago
- dotBen 11 years agoI had my laptop searched during this time by a CBP officer at the US border in Calgary airport. There was no documentation of the event and the only 'receipt' I got was a pamphlet telling me that it was legal and what my rights were (none really).
My point is I highly doubt the extent is as little as 1,000 as most searches are not logged.
(I'm not a US Citizen, so my rights were further limited given US had no obligation to let me in)
- powertower 11 years agoAre you sure it was searched (indexed or imaged) rather than just checked (powered on and/or checked for hidden contraband)?
- dotBen 11 years agoIt all comes down to semantics, doesn't it?
It wasn't imaged or indexed but the officer sat down and looked through it for quite some time.
I think you asked people what they thought the 1000 searches consisted of, they would include a CBP officer going through the contents of a laptop as a "search".
- dotBen 11 years ago
- powertower 11 years ago
- iaskwhy 11 years ago
- mindslight 11 years agoThis has been the case for some time, and I doubt the unaccountable bureaucracy is going to change. So the only thing we can do is disrespect, mitigate, and undermine.
Here was my ad-hoc procedure from traveling internationally a few months ago (tourism), with a prior of not really expecting to be hassled on the way there, but unknown for the way back:
1. Choose the laptop I'm least likely to miss in the case it gets stolen by JBTs, with respect to the functionality I require.
2. Wipe(1) the first 10MB of disk (has only ever been LUKS), then one /dev/urandom pass into the entire thing. (In retrospect, zeros may have been better than random)
3. Reinstall Debian, with a passphrase I don't mind giving up. Sync over only files that I don't mind giving up.
4. Go through Japanese customs - the only question asked was "Are you with him?" (friend in front of me).
5a. At this point, I possess a still uncompromised machine at the destination, with stored ssh host keys, etc. When (last-minute) prepping, this possibility didn't quite occur to me. Not being prepared to take full advantage of this was regrettable.
5b. (If machine had been molested, I would have not logged into my privileged accounts at all. For the most part I didn't have to anyway, but since I wasn't fully prepared it came in handy once or twice)
6. For return, wipe first 10MB of disk again, then one /dev/zero pass to the entire thing (so there was no argument that I had encrypted data). Then mkdosfs on a whole-disk partition for derp-nothingness. (This was done with a Debian install image written to an old flash drive I had with me for the purpose. My only concern at this point is the hardware getting stolen.
7. Take hard drive out of laptop so that it is a separate device. This would most likely increase suspicion, but make them even less justified in stealing the whole machine (not that this would stop them).
8. Get waved through coming back through USG because laptop "searches" aren't actually that common for people not on the primary watchlist (everyone is on the secondary watchlist). Still, I will do the same thing next time, and think it irresponsible to not.
There are of course improvements that could be made to this, including a small default-booting "nothing to see here" install, with file times etc automatically adjusted. Automatic copying of machine credentials etc when you're at your destination. Using a separate partition instead of the flash drive. And of course automation of the process so it's easy for everyone to do :)
- toomuchtodo 11 years agoWhat tools could be used to boot off a trusted, non-writable USB stick to checksum the BIOS?
Difficulty level: Macbook Air
- mindslight 11 years agoWell, that's a completely different problem. If you travel frequently and your gear gets stolen for a few days at every border crossing? At the very least, I'd look into a laptop that was easily field-strippable, and figure out how to verify non-volatile storage with an external device, at least on return. And never fully trust the machine again either. Note that this problem is what TPMs purport to solve, but that doesn't help you against a major government which will demand a backdoor from the manufacturer.
My laptop was never touched by customs - had it been, my plan was to never trust the machine again.
Most people are in my situation - never actually getting hassled but wanting to protect themselves now that the gloves are coming off. In the future we all may have to deal with device quarantines of a few days at every crossing (what a boon to local sellers!) but that's not now.
- mindslight 11 years ago
- toomuchtodo 11 years ago
- ludoo 11 years agoHardware is cheap in the US, I'd leave my laptop at home and get something cheap (either a Chromebook or a used laptop), then access/transfer data and configuration over the net.
As for my phone, if I were in a position to be worried about customs installing backdoors, I'd prepare a recovery zip beforehand with all my data, then download it from my own server or a secure storage, and flash it after passing customs. Or better yet, travel with a SIM and buy a cheap Moto G, the resale value alone once back at home would make up its US price.
- perlpimp 11 years agoSuch an inconvenience. They should reimburse the cost of the laptop say to standard tune of 3-5k government cheques and allow for you to pick up your laptop in return for the money, if you need it.
Full on encryption, tmp lock and filesystem hashing via tripwire then is mandatory. Fun thing is that you can screw up the malware to send all kinds nasty shit back to them, like trojans and viruses, PIF files and EXE files and whatever might tickle your fancy. Then get your malware do maximum damage on their network.
After all they hacked your laptop, they engaged in illegal activity and it is only fare for you to punish them to the fullest extent of your technical capability.
They cannot acknowledge the fact that they hacked your laptop without a warrant.
etc.etc.
There's tons of fun to have this way. Since people who are doing these things are expecting you to be retarded luser and so you can set a trap and have them fall straight into that.
Make a blog post and example of malware and how to entrap the said trespassers, what does malware do etc.
my 2c.
- oracuk 11 years agoI have seen the corporate response of only providing remote desktops via browser and SSL to foreign (US) deployed personnel. Means the data never physically crosses the border.
No clear players in this market for consumers though. Where is the consumer remote desktop via browser+SSL that doesn't rely on a US hosted cloud service?
- blueskin_ 11 years ago>Where is the consumer remote desktop via browser+SSL that doesn't rely on a US hosted cloud service?
The one you host on your own infrastructure?
- oracuk 11 years agoWhich software? Remote Desktop + SSL.
I don't know of a good self-hosted combination for that.
- oracuk 11 years ago
- a3n 11 years agoSeems like a natural thing to offer for someone like Skype or Google. /s
- blueskin_ 11 years ago
- pcvarmint 11 years agoYou can hide your (encrypted) Micro SD cards inside fake nickels:
http://www.amazon.com/dp/B006BFCOIE
But really, it's safer to not physically carry data across the border, but to access it over VPN or another secure tunnel while abroad.
- etanazir 11 years agooh so, we must upload custom encrypted files somewhere obscure and scrub our electronics before traveling; then download them again after we reach our destination. and then this border seizure non-sense is really a waste of time.
- qwerta 11 years agoThere is vague sentence "Afterwards you get your laptop back ", but not much else. Perhaps it would be worth to create serious article on subject.
Who pays for damages?
If harddrive is separated from laptop, does it get seized as well?
What if I have 100GB of random data on hdd?
Is there obligation to provide technical support to officers? Not everyone knows howto boot FreeBSD without bootloader.
Do I get written certificate of what was seized? There could be some bitcoins on hdd...
- nekgrim 11 years ago1. Backup your documents on Dropbox/GDrive/Whatever (edit: can be you personal server. You can use Truecrypt, and not upload your datas uncrypted. The point is that you must not have the datas on your pc when you pass the border).
2. Wipe your PC.
Optional 2.5. Download a bunch of fake personal files.
3. Pass the border.
4. Access Internet.
5. Download your datas.
- okamiueru 11 years agoIf you are a political activist, don't backup your files to Dropbox og GDrive, unless it's data you are happy to allow the government to look into. Better to host the files yourself, encrypted with a one-time-pad, for which you have the matching pad with you in a microSD card.
Then, upon reaching your destination, and knowing that no one had access to your random bits in the one-time-pad, download your documents from home, and decrypt it.
No amount of processing power by the NSA will be able to help them get your files, and the only way the bits of your documents pass through the internet, is if you can confirm that the key to decrypt the file hasn't been touched.
- grey-area 11 years agoBetter just not to travel with your hardware, or if you have to, travel with something throwaway like a netbook without lots of personal data on it.
Otherwise you risk having all your hardware confiscated by border guards and returned months later. Your plan above won't work if they confiscate your hardware as you'll have nothing to download onto.
- Shivetya 11 years agoWith the recent history of topics here about the NSA having back doors into providers of services how is uploading your data where you suggest actually going to protect you?
If anything, I would go to the point of screwing with border agents by having tens of thousands of pictures of my dogs, kids, flowers, and whatnot, all with naming similar to PICnnnnn or whatever is the current default of most digital cameras. Having them given the wrong doc type would be a nice touch too.
Of course why not store your data on a SD card and just pop it somewhere they are not bound to look?
- logfromblammo 11 years agoMake sure you include a few vanilla porn pics and only slightly embarrassing drunken party photos. If they don't find some evidence of vice, they will suspect it was just staged data, and they might keep digging.
- jasomill 11 years agoWhen border patrol agents are looking for narcotics, do you honestly think they pass over the guy carrying rolling papers in favor of the one carrying nothing remotely suspicious due to lack of evidence of vice looking "staged" in the latter case? What's different about a porn- and photo-free hard drive full of boring business reports and uninteresting browser histories?
- jasomill 11 years ago
- logfromblammo 11 years ago
- logfromblammo 11 years agoOptional 2.75: Install every crapware toolbar available on the Internet, allocate all free disk space to browser cache, and fill it up with obnoxious ads.
Requires a second wipe after step 3, and may get you into trouble, depending on what the crapware does without your input.
- lukasm 11 years agoI don't trust these services.
- nekgrim 11 years ago"Whatever" can include your personal server. And you can store a truecrypt drive, no need to put your datas uncrypted.
- nekgrim 11 years ago
- okamiueru 11 years ago
- plg 11 years agoCan the authorities ever compel you to provide a password?
- andrewcooke 11 years agoin the uk you can be imprisoned (up to 2 years) for not revealing your password. i am surprised the bbc didn't mention that (maybe i missed it?)
http://en.wikipedia.org/wiki/Key_disclosure_law#United_Kingd... (also contains details for other countries)
- andrewcooke 11 years ago
- Mithaldu 11 years agoSo is the only correct answer to package the hdd in a sales package, then send it and the laptop separately with UPS or DHL in and out of the country?
- salient 11 years agoFrom what I hear, SSD's can't be wiped completely, so be careful with such laptops (Macbook Airs, etc).
- kps 11 years agoTheoretically true, but practically misleading.
Each block of flash can be written only a limited number of times, so flash drives (SSDs, cards, USB sticks) all have more blocks than are visible as part of the disk. Drives internally rotate active blocks in and out of the spare pool to try to keep the number of writes to each similar ('wear levelling'). When you write to a flash drive — including trying to overwrite data to destroy it as someone might on a magnetic disk — it will generally pull a block from the spare pool for the new data, and put the old block in the spare pool.
The spare pool is invisible to the OS, but it is reasonable to assume that there are ‘secret’ commands to access it — not because some TLA demands it, but because the hardware/firmware engineers need it for development and debugging.
BUT there is a great big BUT. Writing flash is a two-step process. Programming flash can only change a 1 bit to a 0. Before this, there has to be a slower erase step, that sets the block to all 1s. In order to avoid this performance-killing overhead on every write, flash drives erase as much as possible (whether spare pool blocks or TRIMmed visible blocks) in the background as soon as possible.
- kps 11 years ago