(Credit: Photo illustration by James Martin/CNET)

The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.

If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.

"I've certainly seen them ask for passwords," said one Internet industry source who spoke on condition of anonymity. "We push back."

A second person who has worked at a large Silicon Valley company confirmed that it received legal requests from the federal government for stored passwords. Companies "really heavily scrutinize" these requests, the person said. "There's a lot of 'over my dead body.'"

Some of the government orders demand not only a user's password but also the encryption algorithm and the so-called salt, according to a person familiar with the requests. A salt is a random string of letters or numbers used to make it more difficult to reverse the encryption process and determine the original password. Other orders demand the secret question codes often associated with user accounts.

"This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?"
--Jennifer Granick, Stanford University

A Microsoft spokesperson would not say whether the company has received such requests from the government. But when asked whether Microsoft would divulge passwords, salts, or algorithms, the spokesperson replied: "No, we don't, and we can't see a circumstance in which we would provide it."

Google also declined to disclose whether it had received requests for those types of data. But a spokesperson said the company has "never" turned over a user's encrypted password, and that it has a legal team that frequently pushes back against requests that are fishing expeditions or are otherwise problematic. "We take the privacy and security of our users very seriously," the spokesperson said.

A Yahoo spokeswoman would not say whether the company had received such requests. The spokeswoman said: "If we receive a request from law enforcement for a user's password, we deny such requests on the grounds that they would allow overly broad access to our users' private information. If we are required to provide information, we do so only in the strictest interpretation of what is required by law."

Apple, Facebook, AOL, Verizon, AT&T, Time Warner Cable, and Comcast did not respond to queries about whether they have received requests for users' passwords and how they would respond to them.

Richard Lovejoy, a director of the Opera Software subsidiary that operates FastMail, said he doesn't recall receiving any such requests but that the company still has a relatively small number of users compared with its larger rivals. Because of that, he said, "we don't get a high volume" of U.S. government demands.

The FBI declined to comment.

Some details remain unclear, including when the requests began and whether the government demands are always targeted at individuals or seek entire password database dumps. The Patriot Act has been used to demand entire database dumps of phone call logs, and critics have suggested its use is broader. "The authority of the government is essentially limitless" under that law, Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence committee, said at a Washington event this week.

Large Internet companies have resisted the government's requests by arguing that "you don't have the right to operate the account as a person," according to a person familiar with the issue. "I don't know what happens when the government goes to smaller providers and demands user passwords," the person said.

An attorney who represents Internet companies said he has not fielded government password requests, but "we've certainly had reset requests -- if you have the device in your possession, than a password reset is the easier way."

Source code to a C implementation of bcrypt, a popular algorithm used for password hashing.

Source code to a C implementation of bcrypt, a popular algorithm used for password hashing.

(Credit: Photo by Declan McCullagh)

Cracking the codes
Even if the National Security Agency or the FBI successfully obtains an encrypted password, salt, and details about the algorithm used, unearthing a user's original password is hardly guaranteed. The odds of success depend in large part on two factors: the type of algorithm and the complexity of the password.

Algorithms, known as hash functions, that are viewed as suitable for scrambling stored passwords are designed to be difficult to reverse. One popular hash function called MD5, for instance, transforms the phrase "National Security Agency" into this string of seemingly random characters: 84bd1c27b26f7be85b2742817bb8d43b. Computer scientists believe that, if a hash function is well-designed, the original phrase cannot be derived from the output.

But modern computers, especially ones equipped with high-performance video cards, can test passwords scrambled with MD5 and other well-known hash algorithms at the rate of billions a second. One system using 25 Radeon-powered GPUs that was demonstrated at a conference last December tested 348 billion hashes per second, meaning it would crack a 14-character Windows XP password in six minutes.

SOURCE HERE

Views: 49

Reply to This

Replies to This Discussion

best thing to do in this situation is change it.....on a regular basis, I'd say @ least once a week

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

cheeki kea posted a photo
Wednesday
Burbia posted a video

Strange Videos That Expose Something Massive

#disturbing #video #strange #scary #scaryvideos #strangevideos This is a compilation of the most disturbing videos on the internet, not only...
Wednesday
Doc Vega posted blog posts
Tuesday
Burbia commented on Burbia's video
Tuesday
Burbia posted a video

SUPEROLA & THE LOST BURGERS

This Game is RUBBISH !
Tuesday
Doc Vega posted a blog post
Saturday
pohonemas33 team commented on tjdavis's photo
Thumbnail

DejaVu

"nice very goodjob, i wish you can visit official situs pohonemas33"
Jul 26
Sandy posted a photo
Jul 26
Doc Vega posted a blog post
Jul 25
Saint Quinn favorited Burbia's video
Jul 24
Doc Vega posted blog posts
Jul 24
Burbia commented on tjdavis's blog post The Jewish Couple That Taught Bob Dylan Hebrew and Introduced Him to Zionism
"Haaretz put this story behind a pay wall. Sali Ariel and Terry Noble were the names of the couple…"
Jul 23
William Heckman is now a member of 12160 Social Network
Jul 23
cheeki kea commented on tjdavis's photo
Jul 23
cheeki kea commented on cheeki kea's video
Thumbnail

This Woman DESTROYED Harley-Davidson's Future Forever

"It's a sad day on the highway. But I guess the show must go on. Watch out for the ruination of…"
Jul 23
cheeki kea posted a video

This Woman DESTROYED Harley-Davidson's Future Forever

This Woman DESTROYED Harley-Davidson's Future ForeverWelcome to Ride Radar – Your Frontline Source for Motorcycle Deals, Trends & Market Mayhem.Looking for t...
Jul 23
tjdavis posted a photo
Jul 23
Burbia posted a status
"Who knew releasing the MLK files and literally deflecting, it ends up implicating himself with the Epstein Files."
Jul 21
Burbia posted a video

Dan Bilzerian DEMOLISHES MAGA Nutjob Patrick Bet-David on His Own Show

Watch as two powerhouse personalities collide in this no-holds-barred debate on one of the world’s most contentious issues. Patrick Bet-David, known for his ...
Jul 21
Doc Vega's 7 blog posts were featured
Jul 20

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted