<Problematic development with regard to drive encryption. luks and (less suprisingly) bitlocker.
I am writing to give some news about my detention and investigation.
The “attentions” that the prison administration (and/or the preliminary investigation judge?) show me continue. More reprisals for my hunger strikes? Who knows.
In any case, on February 14 there was the third search of my cell (after those of December 6 and January 9). Around 7:30 p.m. the ERIS (anti-terror cops) arrived, with helmets, balaclavas and shields. There were a dozen of them, one officer was holding papers, on the first one I could see my photograph. Ours was the only cell searched in this section (but they let a dog through the corridors), two other cells in another section, I don’t know in the other buildings. The prison warden, Michael Merci, and the assistant warden were also there, watching, from behind the glass doors.
As soon as we were out of the cell, they handcuffed us, me and my concellino (who had been here in the section for just a week) and took us to the shower room, on the ground floor, for the traditional body search. We were locked in the showers during the two-hour cell search.
They found a cell phone with a charger. On Tuesday, March 21, I then went to the disciplinary board. As punishment, I am deprived of the spesina for 30 days.
On March 30, same thing. The ELAC (the prison security “squad”) arrived and the story started again.
As for the investigation, in recent months new elements have been incorporated into the dossier. The most significant is that the police were able to gain access to my computers, even though they were encrypted.
The one at work, on which Windows is installed, is encrypted with BitLocker. A report incorporated with the file earlier says that they had already tried to access it during my police detention, but had not succeeded. But in September, the Brigade d’appui en téléphonie, cyber-investigation et analyse criminelle (Brigade of support in telephony, cyber-investigation and criminal analysis) sent SDAT a copy of the hard drive. In the report, they explain only that they booted the computer with a USB stick and then used the AccesData FTK imager 3.3.05 program to copy the hard disk. But they do not mention the decryption operation itself.Post too long. Click here to view the full text.