What's new

Stashing the 'puter

Campfire

Member
If I stash my laptop under the floorboards when not in use, everything shut down, is it possible for LEO to still detect its presence somehow by some electronics-sensing device (in the event they ever get into the house)? Anyone?
 

growshopfrank

Well-known member
Veteran
If there is any sort of residue that a dog would hit on or an experienced searcher you may have a problem
 
It depends how big you are. If they know you are big, and they aren't finding what they want, then they may do an extreme search. When I was busted, they left all my computers, but took my cameras memory cards
 

supermanlives

Active member
Veteran
we both know your keyboard reeks of mj . a dog will hit on it thinking its weed. with all the time i spend on ic smoking weed i bet a dog could find my keyboard quick
 

seeyouaunty

Active member
If i was a cop and i found a laptop hidden under floorboards you can bet that computer forensics would be all over it like a bad rash. Sooo dodgy.

Far better to use encryption like pgp to encrypt the entire hard drive.
 

Campfire

Member
No residue on these keys. Small grow, far from here, everything else here clean as a shrink-wrapped whistle. My question (really just some passing midnight paranoia, probably from reading too much scary shit on this forum before bedtime) was whether or not the sneaky bastard's s.o.p. was to utilize something to 'sniff out' possible hidden computers or other potentially incriminating electronic goodies.

The REAL issue is that I need to just trash this nasty sativa I've been smoking lately (powerful, but paranoia-inducing if I overdo it, even a tad), and get some calm clear HAPPY stuff. Oh how I'm lookin forward to this Oct!
 
A

ak-51

Really encryption is the best answer to how to deal with digital evidence.

I recently fully encrypted my laptop. Laziness has thus far prevented me from using it and it only to access IC, but I intend to do that eventually.
 

oldone

Member
Whole drive encryption does work but what if LEO wants the password? We must think "plausible deniability" here. See this XKCD link that explains my point exactly.

In my experience there is only one way that *might* work:

Use TrueCrypt to encrypt an entire partition on your hard drive. Then this partition is used to hold a virtual machine (see VMWare or VirtualBox). TrueCrypt itself is used from a small USB drive to keep it off the host machine.

The virtual machine is only used for our hobby. It has a complete operating system, browser, your pics and notes. The beauty part is when it gets shut down, the partition itself cannot be proven to hold anything. Its just all random data to an investigator. They cant prove anything is there. Thats why its important not to install TrueCrypt on the host box.

Just my .02c,
OO
 

seeyouaunty

Active member
Whole drive encryption does work but what if LEO wants the password? We must think "plausible deniability" here. See this XKCD link that explains my point exactly.
Is this a serious post? Are you really suggesting that a US citizen will get tortured by the police to get around the encryption? Wow.

Forget encryption, time to move.
 
Like I said, unless you are a big-time seller, they don't have the money to waste on this. Having a lawyer on retainer, and not having lots of cash are key aspects. I'm a huge fan of encyclopedia sets...
 

oldone

Member
Is this a serious post? Are you really suggesting that a US citizen will get tortured by the police to get around the encryption?
Yes its a serious post but perhaps a poorly made point.

I should have said that LEO will attack the weakest point which is the password. If they cant prove there is an encrypted volume in the first place they dont have a case.

I have no idea what lengths LEO in the US or Canada will go to. But I do know that "shit happens".

OO
 
B

BrnCow

Why not get an netbook - internet only terminal with no hard disk to surf with? No records are left after you shut it off...use the home computer for normal record keeping and games or whatever...
 
G

guest4098

Old one has posted some very valuable info. Truecrypt is a great and free program. Everything saved on your computer is encoded on the fly and if you shut down you are safe, but they will be able to see you have encrypted data when they look. Not a biggie if you don't believe they can get the password out of you, but 'they' have many means and not all include torture. If you do as old one states then it can not be proven that you have any encryption.

If data security is your goal then I believe this is the better path, not hiding the computer.
 
P

putoneout

I was recently raided, They confiscated my computers, camera's, memory cards, flash drives and any loose laying hdd around the house, I do pc repairs from time to time and upgrades and kept quite a few hdd's laying around cause of that.

I had my flash drives encrypted with truecrypt 128bit with a 24 digit password with multiple letters numbers and symbols used in the password. I also created an encrypted container file as well, in which I used to boot a virtual OS (operating system) I had windows installed to this encrypted container and I used the virtual os to load windows and browse icmag.

I also used software to wipe the drives randomly to keep all deleted files clean so it appears as random data to forensic.

I must say they broke that encryption quickly. I found out within a week they had accessed my encrypted flash drive as well as my encrypted container file. I do not know how they done it but I know they did. I know they hacked the encryption simply because they found stuff that was only located on the encrypted flash drive.

Stuff that was never located or copied to the master or slave hdd on the pc. I would never copy from lets say my camera to the master drive then to the encrypted drive. I always copied stuff directly from the memory card of the camera directly to the encrypted flash drive. Then I would just delete all the files from the camera's memory card turn the camera to video mode and record until the drive ran out of space. This prevents them from being able to see any evidence on the memory card. Because everything I deleted from the cards were overwritten with new video data.

If you wanna rely on encryption better have 256bit encryption. 128bit is not gonna cut it. Perhaps they didn't break the encryption though, Maybe they were able to pull up the password because I typed it into truecrypt to mount the encrypted flash drives. Either way they were able to get into my encrypted drives and access the data on them.I know for sure I kept the (never save history) box checked in the truecrypt tab. So if they did find the password I am not sure how they found it. Which is why I think they were able to crack the encryption.

I know one thing, I would never give them my password I don't care what threats they make, Funny though they never contacted me about the encryption. Never asked me to give them any password. Probably because they didn't need me to the forensic team was able to somehow crack the encryption, or pull up my password from me mounting the drives through truecrypt.
 
Top