Molon Labe! (17 page)

Read Molon Labe! Online

Authors: Boston T. Party,Kenneth W. Royce

BOOK: Molon Labe!
7.6Mb size Format: txt, pdf, ePub

Good question!
thinks Bleth.
There may be hope for the man.
"If there is no reiteration of key usage and message length is kept short, then brute force cryptanalysis will be unavailing. Especially if the passphrases were unusually robust."

"Explain."

"Let's say the recipient sees 'David' in the subject line, and thus knows to use the passphrase called 'David' from his list. If he cuts-and-pastes the passphrase instead of typing it in, then he bypasses the keyboard altogether, thus defeating keysniffing programs. We are quite concerned about that possibility. Use of the RAM buffer can sometimes defeat Magic Lantern
3
.

"The NSA also pointed out that if the cut-and-paste method of passphrase entry were used, then the passphrases could be
very
long strings of typographical gibberish, including the metacharacters. Such passphrases could not possibly be remembered, or even typed in perfectly. They would
have
to be cut-and-pasted. So, if metacharacters such as $ and % and * were used, that's a possible total of 95 characters including the numerals and upper and lower case letters. Even early versions of PGP support 79 character passphrases, which is a keyspace of 95
79
, or 1.7 times 10
156
. That's many times larger than the number of atoms in the entire universe."

"My God!" gasps the Director.

"And it could be even worse. They could be using more than just 95 characters in their passphrases. The total number of keyboard accessible characters is actually
256
. By holding the Alt button and typing in certain numbers up to 256, characters such as ¢ and © can be used. A 256 ASCII passphrase of 79 characters would contain 256
79
possible permutations, which is 1.78 followed by 190 zeroes. That number is 10
34
times larger than using the 95 character field, which was huge enough by itself."

"Bleth, these numbers are incomprehensible. Who can grasp them?" says the Director, nearly whining.

Consulting his notes, Bleth replies, "I completely understand, sir. Think of it this way. Imagine the keyspace of 95
79
to be a square inch, roughly the area of a postage stamp."

"OK. I can see where you're going with this. The keyspace of 256
79
is the size of Texas or something, right?"

"Much larger, Director."

"North America?"

"Larger."

Taking a wild stab the Director ventures, "The surface area of the entire planet Earth?"

"Yes, sir. Times 3
trillion
planet Earths."

The Director is speechless.

"Let's
really
put this in perspective. There are about 8.69 × 10
69
atoms in the Earth. If the visible universe, which is a cube roughly 1.5 billion light years per side, were 100% filled with matter instead of its far less than a billionth of 1%, there
still
would be fewer atoms than 1.78 × 10
190
.
That's
how big a PGP keyspace can be if the user goes 256 ASCII and uses the PGP maximum length passphrase of 79 characters."

"Good God, I had no idea," says the Director wearily.

"The NSA analyst told me,
'If they're using long passphrases with 256 field ASCII characters, forget it; not in a trillion lifetimes.'
Quite frankly, the NSA has very little optimism in a successful decryption effort. They feel that much more can be gained from the human element."

"For example?"

"The technical security of PGP and how it has been used through foreign remailers in this case was quite sophisticated. We are advised to probe what is always the weakest link in the chain, human beings. For example, the World War Two Ultra program to crack the Germans' Enigma encoding machine would not have been successful without the sloppy techniques of too many German operators. The Gestapo's
Sicherheitsdienst
in particular were quite helpful to the British as they usually used profanities in choosing their three letter key settings."

"So what do you have in mind?"

"Remember, IDEA passphrases perform both encryption and decryption functions. Conversely, the members could just as easily and securely send messages
up
the chain of command with the same passphrases. Symmetric encryption is a two-way street, and that's what we exploit."

"You're about to lose me here. What does this all mean?"

"It means that their scheme, though clever, has a
flaw.
All we have to do is a bit of DCS1000
4
traffic analysis of these new Wyoming residents. What they are looking for are emails encrypted with a symmetric key, versus with the much more common asymmetric method employed by nearly all PGP users. Asymmetric encryption is the
raison d'etre
of PGP. It is
very
unusual for somebody to send a PGP email that was encrypted merely with the IDEA algorithm a conventional symmetric algorithm, which means that the recipient knows the same passphrase as the sender. Such just isn't done these days; it dismisses the whole point of public key encryption. So, we merely look for IDEA-encrypted emails. Easy."

"Can DCS1000 differentiate between the two different encryptions?"

"Not directly. All encryption software packages append their file names with a unique extension, such as .asc or .two or .enc. After searching for key words in plaintext, these known file extensions are the next search priority. A shrewd user knows this and either renames the files with an innocuous extension, or simply ZIP compresses the files which take on the extension .zip.

"Even if the file extension has been renamed, there is the matter of plaintext software headers. Abi-Coder and Twofish have none, but all PGP files have a plaintext header reading 'BEGIN PGP MESSAGE' with a version designation, and a footer reading 'END PGP MESSAGE.' It's one of the few faults of PGP. A few other encryption software packages also have plaintext labels, such as VGP, Kryptel Lite, and Diamond PC-1. Unless these files have been ZIP compressed which garbles plaintext in the process of compression — DCS1000 easily flags them."

"Then why didn't these people use, what was it, Twofish? Then there would be no plaintext labels telling us that they used PGP."

"Probably because PGP is universal. Even though Twofish is easy to install and use, it's one more step for everyone to do and whoever planned this figured it just wasn't worth the bother. Personally, I doubt those folks in Wyoming bother renaming PGP files or compressing them or removing headers. I'd bet we'll find them sent as is. When they do, DCS1000 will try to open them up in PGP. If the file was encrypted with asymmetric RSA, then the PGP dialogue box will read that we do not have that particular secret key."

"Will the secret key have a name?" asks the Director.

"It must have
some
name; the key pair generation process demands it. This is so the PGP user can differentiate between keys on his secret keyring. But what the user names the pair is up to him. If these people are smart then they will not have given their key pair any identifying name. They could simply use alphabet letters or numbers."

"But you're not expecting this RSA encryption, are you?"

"No, sir. If the file was encrypted with conventional symmetric IDEA, then the PGP dialogue box will say so and ask for the password.

"It'll go down like this: Smith, a new resident in Wyoming, sends one of these unusually encrypted emails. While we won't know the content, we
will
have a brand new piece of information the IP
5
address of the
recipient
. This will prove invaluable because the recipient is almost guaranteed to be
higher
in the chain of command than Smith. Smith is a buck private in the organization; he was induced to move to Wyoming. He won't be using this encrypted channel to chat with his enlisted men buddies. No, he will use it only to ask his sergeant for orders. Once we have the sergeant, we'll wait for him to query his lieutenant, and then the lieutenant his captain, and so on. Over time through traffic analysis, we'll roll up this group all the way to their general staff."

"Excellent. Fine work, Bleth. I suggest that for each area of immigration there are, what, five counties? — we focus on the
first
people to arrive. They likely work in some coordinating capacity for the later people, and so they'll be in more frequent contact with their command."

"That's a great idea, sir. We'll get right on it."

Bleth had already thought of this.

"Let me know the moment you get a break. I don't like the idea of 9,000 people all being part of some scheme directed by God knows who through encrypted email. Even if they haven't yet broken the law. The size and secrecy of this whole thing bothers me. Have you ever seen anything like it, Bleth?"

"No, sir, not outside the service. It resembles a military operation; a wartime invasion, actually."

"It does, doesn't it? We know who the troops are all 8,994 of them. Find their general, Bleth."

"Yes, sir. We will."

Natrona County, Wyoming

Preston Ranch

Spring 2007

"Folks, we have achieved our first legislative goal, a bit of constitutional 'prepositioning.' This will speed the passage of proposed amendments by virtue of a special election instead of waiting up to nearly two years for the next general election."

"Any expected opposition to ratification in 2008?" asks a white-haired jurist-looking fellow.

Preston answers, "No organized opposition, no. Perhaps 20 to 30% may oppose on the general principle of not tampering with their state constitution, but they will be insufficient to block ratification. As you well know, it is critical that such be in place by January 2015 of the 63rd Legislature, else our plan will have been mired in the mud of time, allowing opposition many months to organize. Little does this current government realize that they have been hoisted by their own petard."

The room chuckles heartily at this.

Preston then laid out the project's three sequential goals
6
. . .

1) Acquire political control of 16 of the 23 counties by 11/2014.

This is home turf, where Life is lived. Over half the battle of Freedom is in controlling one's county government by electing the sheriff and county commissioners (who could effectively limit state and federal intrusion, as did Sheriff Mattis of Big Horn in the late 1990's). If you are free in your county, then you are generally free indeed.

The team recognized how vital employment would be to the project's success. As a successful entrepreneur, Preston understood the necessity of revitalizing depressed counties with an influx of new businesses. Such not only brought in hundreds of needed relocators, but gained them instant grace with the community. But they had to be carefully chosen businesses,
i.e.,
noncontroversial industries which did not siphon away indigenous jobs and capital. Industries which made the best use of the counties' features. Niobrara County, for example, was a vast and empty prairie with over 500 acres/person. It was thus ideal for an aviation engineering and design firm, Maxwell Aviation, which produced homebuilt and production composite aircraft. They also made target drones for the US military, which were tested at nearby Camp Guernsey. Employing over 300 people, both the state and county governments did somersaults to lure Maxwell's relocation. Niobrara County also had the oldest median age (41.4) and the smallest average household (2.21). It was literally dying out. The influx of dozens of new families brought a desperately needed vitality to the entire county. Maxwell Aviation threw an Open House, and all of Niobrara showed up. Locals joked that it was the most interesting thing that had happened there since the western
The Lawless Men
was shot near Lusk back in 1923.

Similarly, Preston and his team analyzed what existed and what was needed in the other target counties, and packaged the relocation of people and businesses accordingly. Crook County saw the relocation of a midwest sporting goods factory, Johnson enjoyed two new firearm manufacturers, Sublette an alpine training academy for international athletes, and Hot Springs a national HQ for an insurance company serving retired military.

The calculated synergy was a Win-Win for everyone, which explained why things were working out so well. The success of the 2006 county elections had proven the concept. Wyoming was the contiguous 48's least explored, utilized, and industrialized state, and it was simply a matter of time before others would have figured that out. It had already begun to boom in its own right, but in that typical liberal fashion which had long ago ruined much of Oregon, Colorado, and Arizona. One Aspen or Sedona was enough.

2) Acquire a majority in both the House and Senate by 11/2014.

Such could see through the repeal of oppressive legislation and the introduction of beneficial constitutional amendments.

The Wyoming legislature is made up of 30 Senators and 60 Congressmen. All serve single-member districts which are reshaped every ten years from US Census data. Each Senate district had about 15,000 people and comprised two House districts of about 7,500 each. These districts spilled over county and even city lines. Fremont county, for example, was in five Senate districts and six House districts. Senate District 1 comprised all of Crook, Weston, and Niobrara counties, as well as 20% of Converse and Goshen. The larger cities of Casper, Rock Springs, Laramie, Gillette, and Cheyenne comprised their own Senate districts, as well as multiple House districts. Medium-sized cities such as Evanston, Green River, and Sheridan had their own House districts.

Other books

King Hereafter by Dorothy Dunnett
Love On The Brazos by Carlton, Susan Leigh
100 Unfortunate Days by Crowe, Penelope
Book Bitch by Ashleigh Royce
Caught Off Guard by C.M. Steele
Broken by Kelley Armstrong
The Curve of The Earth by Morden, Simon