Bin Laden's encrpyted data may be unreadable

SEALS were prepared but 'treasure trove' of information could be tough to crack

As investigators examine what U.S. official have called a treasure trove of data retrieved from Osama bin Laden’s hideout in Pakistan, security experts are speculating about whether some of the data will be unreadable.

During the May 1 raid in which bin Laden was killed, Navy SEALs carried off five computers, 10 hard drives and more than 100 portable storage devices, such as DVDs and flash drives, along with paper documents, according to a number of reports.

The devices likely contain a lot of information, since bin Laden’s compound was not connected to the Internet and those USB thumb drives and DVDs contained his communications. But officials haven’t said whether, or how well, the electronics devices were encrypted.


Related coverage:

What was on Osama bin Laden’s hard drive?

Psst, want to see photos of bin Laden’s body?


Investigators quickly found evidence that al Qaeda had considered — but apparently not followed up on — a rail attack on the 10th anniversary of the Sept. 11 attacks, according to a report by Reuters, although they didn’t specify where that information was stored. If could have been on paper or on an unencrypted device.

If the information on some of the hard drives and storage devices was encrypted well, it might never be retrieved, reported Security News Daily.

"Correctly implemented encryption is very difficult to break," Steve Santorelli of security research group Team Cymru, told SecurityNewsDaily. He described breaking it as a “huge, huge challenge.”

But retrieving data was likely a key part of the operation, which could increase the likelihood that data could be read, Greg Hoglund, CEO of HBGary, told InformationWeek.

Hogland said the military uses a technique called battlefield exploitation to extract data in the field. A part of the process is to try to extract data while a computer or drive is running, which makes it easier, according to the InformationWeek article. Even an encrypted drive can be accessed if it’s running, he said.

A CBS News TechTalk article called the process media extraction, and said the military uses the acronym DOMEX for it. The Army has said it provides DOMEX teams to troops in Afghanistan, the article said.

Despite the potential challenges, Denis McDonough, the deputy national security advisor, has said the electronic haul is "probably going to be impressive," CBS News reported. 

Since the raid on bin Laden’s compound, the U.S. has stepped up drone attacks in Pakistan and Yemen and has rounded up 40 people in Abbottabad, Pakistan, with suspected ties to bin Laden, leading to speculation that those actions were based on the recovered data, although officials haven’t said where their information came from.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
SEARCH
 Top 100 Slideshow
contracts DB

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts