| Friday May 27th 2016

Real world results: FBI cannot crack Truecrypt

iPhone 4 girlThe FBI failed to break the encryption code of hard drives seized by federal police at the apartment of banker Daniel Dantas, in Rio de Janeiro, during Operation Satyagraha. The operation began in July 2008. According to a report published on Friday (6.25.2010) by the newspaper Folha de S. Paulo, after a year of unsuccessful attempts, the U.S. federal police returned the equipment to Brazil in April.

According to the report, the fed only requested help from USA in early 2009, after experts from the National Institute of Criminology (INC) failed to decode the passwords on the hard drives. The government has no legal instrument to compel the manufacturer of the American encryption system or Dantas to give the access codes.

The equipment will remain under the protection of the feds. INC expect that new research data or technology could help them break the security codes. Laura Michelle PrestinOpportunity Group reported that the two programs used in the equipment are available online. One is called Truecrypt and is free. The programs were used due to suspected espionage.

According to the report, the FBI and the INC used the same technology to try to break the password. It is a mechanism called a “dictionary” – a computer system that tests password combinations from known data and police information. Experts from the INC used this technique for five months, until December 2008, when the discs were sent to the United States.


Related Posts: On this day...

Reader Feedback

One Response to “Real world results: FBI cannot crack Truecrypt”

  1. Nicky Moquin says:

    Helpful information. Fortunate me I found your web site accidentally, and I am stunned why this coincidence did not took place earlier! I bookmarked it.

Leave a Reply

You must be logged in to post a comment.