Laptop search insanity spreading world-wide

September 12th, 2006

The government of Sudan started seizing and quarantining laptop computers for inspection last week, ostensibly to stem the import of pornography and seditious material. Official assurances that the inspection of each laptop will take no more than 24 hours have done little to assuage fears of foreign visitors. Many are understandably reluctant to hand over collections of business and personal information for Sudanese officials to pore over in search of hostile or titillating tidbits.

Like many government policies across the globe, this directive was apparently drafted with a clear social goal in mind, but with little understanding of the use and pace of technology. Surely anyone serious about transporting intelligence information or treasonous material will use methods of encryption and obfuscation that would take more than a few hours of inspection to discover. Likewise, pornography has a way of finding its way to interested consumers no matter how it’s hampered. In any case, one would think the low-wattage beacons of leadership in Khartoum would have more pressing business in Darfur.

While the Sudanese government has been on spin cycle for half a century, the country’s leaders have been able to stabilize certain technology and energy-related aspects of the economy over the past few years. Recent ventures away from an otherwise solidly agrarian market have brought an increase in the number of affluent nationals and foreign businesspeople traveling in and out of the country — each carrying little devices with lots of data. Apparently it occurred to government officials that they didn’t understand what was in the devices and that the devices might be the conveyance for objectionable material. […] Computer World

Its clear that people are going to have to use tunneling and disposable laptops for travel. The scenario is this; you don’t want anyone to look at your private stuff. You need to be in another country on business, and you need to access your email / docs when you are there. You cannot bring your laptop with you, because some fascist will confiscate it, mirror the drive and then return it to you with a hardware keystroke logger installed. You need have a cheap terminal that you take with you, that runs a cut down version of hardened linux, the image for which you can download from a server at your HQ. When it unpacks and you install it, it sets up an SSH tunnel to your server, through which all your communication takes place. This laptop needs to be tamper evident, i.e., it uses anti tampering technology to let you know if the swines have opened up your box to put a keylogger in. If there are signs of tampering, then you simply discard it, and you have no email for this trip. If the box is intact, you go ahead and download your image and then start work once its up and running. You can even keep this image on a USB key. Anyone can have a copy of this image it is the credentials that you provide to your server at HQ that makes this image yours and allows you to access your stuff through the secure tunnel….

The immediate effect of the quarantines and data inspections is sure to be a dampening of business interest in an already risk-fraught environment. Over the long term, however, silly rules regarding technology tend to be corrected by individuals’ use of even more advanced technology. Governments rarely win this sort of oneupsmanship. In a bit of mild hysteria that peaked in the 1990s, the U.S. government clamped down on the export of both powerful computers and encryption software, to somewhat different and unexpected ends. Both situations are worth considering in the context of Sudan.

The U.S. Department of Commerce’s Bureau of Export Administration (BXA) maintains a formal definition of what our government considers a supercomputer, along with a few other thresholds for computing power that can be exported to hostile or politically bewildered foreign states. Relevant regulations at the time included 15 CFR Parts 770, 772, 773, 776, and 799. When Apple introduced the PowerMac G4 in the late 1990’s, its capacity to process over 1 billion instructions per second (1GFLOPS) qualified it as a supercomputer. Because powerful computers can be used to do things like compute missile trajectories and simulate conflict outcomes, such machines were considered munitions under U.S. export law.

While the starched shirts of the Defense Department were deadly serious about preventing export of “munitions” technology to hostile states, Apple astutely turned this into a marketing bonanza, appealing to power-hungry computer users across the country. Other PC makers followed suit, and new versions of the Intel Pentium processor were similarly promoted as personal supercomputers. Market pressures convinced the BXA and the Defense Department to adjust the standard much more quickly in light of advancing technology and to ease export restrictions so the G4 and similarly powerful systems could be marketed overseas.

I’m sure that back in the ’60s, agents of the then-young National Security Agency would have had a collective aneurysm at the thought of commonplace digital watches with 16-bit processors and 32K of memory — about the same computing power as the NASA guidance computer systems that managed Apollo missions to the Moon. But today’s critical computing infrastructure and top-secret technology is tomorrow’s disposable tchotchke, and it took a long time for the policy-makers to realize that they needed a comparative standard rather than an absolute one.

A similar situation arose in the U.S. around encryption technology, but with different effect. The U.S. Department of State’s Directorate of Defense Trade Controls (DDTC) is responsible for defining munitions, and for publishing the official United States Munitions List of weapons and information that we wouldn’t want to end up in the hands of naughty people. The munitions list enumerates such specific cases as “Technical Data and Defense Services Not Otherwise Enumerated” and “Miscellaneous Articles.” This leaves plenty of room for computer hardware and software that make governmental people nervous. The DDTC is also given the authority to regulate the export of anything defined as a munition under the Arms Export Control Act. AECA is in turn implemented as the International Trafficking in Arms Regulations or ITAR.

It’s this ITAR that caused Phil Zimmerman, the author of Pretty Good Privacy, so much trouble. ITAR prohibited the export of any encryption using more than 40 bits for its key until 1996. When Zimmerman and RSA couldn’t settle a dispute in 1993 regarding an early agreement, RSA complained to U.S. Customs that Zimmerman was exporting munitions-grade encryption. But a funny thing happened: Zimmerman was harassed and investigated about the export of 128-bit encryption but never prosecuted. By the time a thorough investigation had taken place in Zimmerman’s case and others, it was pretty clear the effect of the law was to wash a lot of encryption research and product development away from U.S. shores.

The prohibition on the export of strong encryption technology led several commercial research organizations to relocate or outsource their encryption groups and projects to more friendly locales. Over the course of a half-dozen years, a significant chunk of state-of-the-art encryption research and development left the United States for Finland, Russia, Ireland, Australia, India and the like. Of course, not everyone left in the U.S. was hung out to dry. Major academic institutions and commercial powerhouses such as RSA still cranked out encryption tools, but the availability of top-notch commercial products from outside the U.S. (such as the Finnish-developed BestCrypt) made many portions of the U.S. export restrictions meaningless.

Subsequent relaxing of export controls over encryption didn’t undo the spread of technology to other nations. For example, in late 1997, a year after the first major easing of encryption export controls, RSA acquired a Japanese company to form Nihon-RSA, a subsidiary not subject to U.S. encryption export rules. At the same time, Sun Microsystems announced it would begin selling a 128-bit VPN product developed by a Moscow firm called ElvisPlus Co. as part of its own SunScreen product line.

Clearly it’s easy to write a policy that drives encryption research and development away. How would one pull these technologies into a country? Easy — ban pornography and start randomly searching people’s personal data storage. However unintentionally, the Sudanese government is creating a strong internal demand for technical privacy controls. The people subject to these new quarantine and search laws are rather affluent by Sudanese standards and clearly have access to foreign sources of data and software. It would be foolish to assume they would not take steps to protect their data. If Sudanese people with resources are forced to commission or create their own security tools, those tools will likely be made available in both English and Arabic-language versions — another step forward for the spread of security and privacy tools.

As Sudanese nationals and visitors become more comfortable with the security of their own data — and count on others protecting their data — the expectation of secure data storage and communications will surely insinuate itself in financial transactions and other areas of business. Perhaps the level of invasiveness into portable data storage will even have a positive effect on the deployment and improvement of GSM and third-generation data services. I doubt it’s what the policy-makers had in mind, but I’ll bet the effect over the next few years is the best thing ever to happen to computer security in Sudan.

3 Responses to “Laptop search insanity spreading world-wide”

  1. irdial Says:

    And Uncle Sham, that immoral world-wide violator, gets in on this shameful act:

    Following in the wake of February’s news that customs agents were seizing electronics and making copies of all the files on cell phones and laptop hard drives, a federal appeals court has ruled on the legality of such searches. The result: Yeah, customs can do whatever it wants to your computer when you come across the border, without a warrant, and without cause.

    The ruling extends to all electronics: In addition to laptops, feds can seize phone records and even digital pictures on your camera as they hunt for evidence. The ruling was unanimous among the three appellate judges.

    Be assured that the ruling has little to do with thwarting terrorism. The appeal was actually part of an ongoing trial of a man named Michael Arnold, who returned from the Philippines and had his laptop scoured by the feds. They found purported images of child pornography on the laptop and later arrested him. In his trial, the evidence was suppressed for probable cause issues, as the court said that customs had no reasonable suspicion to search his laptop in the first place. That ruling has now been overturned.

    As Wired notes, the court did not rule on whether you have to help agents access your hard drive. If you use a password or encryption, the court was mum on whether you can be compelled to provide information on bypassing that security in order to access materials on the drive. If you find yourself in such a situation and have anything on your computer that might be considered at all suspicious, you are probably wise to keep mum on providing login information.

    This is an issue that will undoubtedly keep developing (and will probably be submitted, in the end, to the Supreme Court), but anyone traveling overseas with sensitive information (even confidential, legal stuff) should for now consider storing it elsewhere (online, perhaps) or simply leaving it at home.

    […]

    Yahoo Tech

    Appalling.

    Reading my rather convoluted ‘work around’ today, whilst it would work, it would be a PITA.

    Google Office can take care of all your office needs, but people needing access to a closed system need to be able to get access without taking their laptop with them. The same goes for your iPhone; do you REALLY want it to be imaged by the feds?

    Truecrypt or Filevault for iPhone must be in development; certainly, remote wipe is available for corporate users, but can you get to the phone to tell admin to wipe your phone in time?

    Why should anyone even have to think like this? Why should anyone put up with Fascism in the first place?

    Those are the real questions that should be asked, not, “how can we devise a technical response to this”.

    HONESTLY!!

  2. This is a war they cannot win | BLOGDIAL Says:

    […] of course, have written about this before, September 12th 2006 to be exact, and the solution we give is more or less the […]

  3. BLOGDIAL » Blog Archive » Travellers warned over US laptop seizures Says:

    […] other countries do this sort of thing? Sudan for one. So, the american government has as much common sense as the Sudanese government. […]

Leave a Reply

You must be logged in to post a comment.