Monday, August 2, 2010

Researcher detained at U.S. border, questioned about Wikileaks

Jacob Appelbaum at Next HOPE conferenceLAS VEGAS -- A security researcher involved with the Wikileaks Web site was detained by U.S. agents at the border for three hours and questioned about the controversial whistleblower project as he entered the country on Thursday to attend a hacker conference, sources said on Saturday.

He was also approached by two FBI agents at the Defcon conference after his presentation on Saturday afternoon about the Tor Project.

Jacob Appelbaum, a Seattle-based programmer for the online privacy protection project called Tor, arrived at the Newark, New Jersey, airport from Holland flight Thursday morning when he was pulled aside by customs and border protection agents who told him he was randomly selected for a security search, according to the sources familiar with the matter who asked to remain anonymous.

Appelbaum, a U.S. citizen, was taken into a room, frisked and his bag was searched. Receipts from his bag were photocopied and his laptop was inspected but it's not clear in what manner, the sources said. Officials from the Immigration and Customs Enforcement and the U.S. Army then told him he was not under arrest but was being detained, the sources said. They asked questions about Wikileaks, asked for his opinions about the wars in Iraq and Afghanistan and asked where Wikileaks founder Julian Assange is, but he declined to comment without a lawyer present, according to the sources. He was not permitted to make a phone call, they said.

After about three hours, Appelbaum was given his laptop back but the agents kept his three mobile phones, sources said.

Asked for comment, Appelbaum declined to talk to CNET. However, he made reference to his phone getting seized to Defcon attendees. Following a question-and-answer session after his talk on the Tor Project Appelbaum was asked by an attendee for his phone number. He replied "that phone was seized."

Shortly thereafter two casually dressed men identified themselves as FBI agents and asked to talk to him.

"We'd like to chat for a few minutes," one of the men said, adding "we thought you might not want to." Appelbaum asked them if they were aware of "what happened to me?" and one of them replied "Yes, that's why we're here."

"I don't have anything to say," Appelbaum told them. One of the agents said they were interested in hearing if "human rights" being "trampled" and said "sometimes it's nice to have a conversation to flesh things out."

Marcia Hofmann, an attorney at the Electronic Frontier Foundation, was in the room and asked if the agents were at the event in an official capacity or for personal reasons. "A little of both," one of the said.

Appelbaum asked when his equipment would be returned and one of them said "We aren't involved in that; we have no idea," and walked away when Appelbaum declined to talk further.

The agents declined to identify themselves to CNET. They said they were attending the conference and declined to talk further.

Appelbaum is a hacker and security researcher who co-founded the Noisebridge hacker space in San Francisco's Mission district. He's also worked to bypass the security of "smart" parking meters, unearth flaws in Web security certificates, and discover a novel way to bypass hard drive encryption. ...

via Researcher detained at U.S. border, questioned about Wikileaks | InSecurity Complex - CNET News.

Solution: be as boring as possible. If you are too interesting your stuff will be taken. This is not cool.

Here's how to protest: Generate a whole bunch of random files with the this Dummy File Creator tool. Replace the Sample Batch List.txt text with something like this:

C:\Test\hacking.avi    1565421    0
C:\Test\passwor.wmv    7156422    0
C:\Test\hacktrick.flv  1108454    0
C:\Test\2393.flv     4223018    1
C:\Test\4govt.flv     1079571    1
C:\Test\stolendocs.avi    1564424    0
C:\Test\6wikikeaks.pdf    2166422    0
C:\Test\tricksDefon.pdf   1108454    0
C:\Test\realXfiles.flv    8243011    1
C:\Test\6759.flv     1088576    1


Results:



Next encrypt several duplicate multi-GB hard drives and store the random junk files you created using something like http://www.truecrypt.org/, so if they are ever seized at your home or at an airport you will have the last laugh. Great use for failing hard drives. Video tape yourself doing this step by step so you have evidence that rather than being a mad genius, you just have a very weird sense of humor.

No comments: