Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Judge: Americans can be forced to decrypt their laptops
CNET ^ | January 23, 2012 | Declan McCullagh

Posted on 01/24/2012 12:06:01 AM PST by LibWhacker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-111 next last
To: LibWhacker
Maybe I am missing something here...but I do not see where this is a 5th amendment issue.

If a person has done something illegal...and the evidence for it is on a laptop...is that no different than a person doing something illegal and the evidence being in their house? The 5th does not protect an individual from the authorities getting a warrant and searching a house, car or business...and as far as I know...this person isn't a cylon.

So am I understanding from this thread that it is the advice of Freepers that child pornographers should just hide their evidence in an encrypted laptop with a wipe password? and that the government has no right to get the password of the laptop involved in a crime because of the FIFTH amendment?

Someone help me out here. Am I missing a point in this case?

81 posted on 01/24/2012 6:59:20 AM PST by NELSON111
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

More of the police state’s growth. I hope this ruling ends up in the dust bin along with the police GPS stunt from yesterday’s SCOTUS opinion. This is clearly a case of self-incrimination. Take the contempt hit. It has to be better than turning over something that may put you away for many, many years.
It’s disappointing that the policing authority can’t find someone in government or out who can crack the code. With enough Red Bull and candy bars you can get some college students to do the job.


82 posted on 01/24/2012 7:04:23 AM PST by em2vn
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

This isn’t a Fifth Amendment issue. It has to do with the Fourth and the right to be secure in her papers; a hard drive is just the media they’re stored in. There’s a valid court order and it’s not unreasonable. She needs to produce the password or go to jail.


83 posted on 01/24/2012 7:22:51 AM PST by Styria
[ Post Reply | Private Reply | To 1 | View Replies]

To: DCBurgess58
******It strikes me that this is a clear 5th amendmment issue... If YOU are forced to decrypt the drive, then YOU are being forced to self incriminate. Isn't that exactly what the 5th amendment is about? The actual relevent wording of the Fifth Amendmant "nor shall be compelled in any criminal case to be a witness against himself"****

Right. If you can be forced to self incriminate by decrypting the drive thereby revealing incriminating evidence, can you be forced to self incriminate by taking law enforcement officials to the location where you buried the cougar or wolf or other protected species you may or may not have killed, or by walking them through the scene of the crime you may or may not have committed, or by taking them to the location of the unregistered fully automatic Uzi you may or may not have hidden?

All of the above could be done without actually speaking, but could still be incriminating.

It won't stop with this.

84 posted on 01/24/2012 7:24:18 AM PST by KrisKrinkle (Blessed be those who know the depth and breadth of their ignorance. Cursed be those who don't.)
[ Post Reply | Private Reply | To 61 | View Replies]

To: HiTech RedNeck
I could see the creation of “chameleon” PGP systems that when brought up with one passphrase have all the naughty bits, but when brought up with another one have naughty bits permanently erased.

That already exists.

The government really wants to be able to compel you to give up your keys.  Personally, I think we ought to tell them to bugger off.

85 posted on 01/24/2012 7:25:13 AM PST by zeugma (Those of us who work for a living are outnumbered by those who vote for a living.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: NELSON111
Someone help me out here. Am I missing a point in this case?

Yes. The person in question has not been convicted of doing anything illegal but at this point has only been accused of committing a crime.

The police and prosecutor can obtain a search warrant from a judge and any incriminating evidence found in such a search can be entered into trial but the accused cannot be compelled to self incriminate, i.e. say giving them the keys to their house, telling them all their bank account numbers and in this case decrypting their own computer or telling them the password for the convenience of the police and prosecutor looking for evidence. If the police can figure them out and under a search warrant, it’s fair game. But you can’t compel someone one divulge information contained in their own head or thoughts that might incriminate or further incriminate themselves.

86 posted on 01/24/2012 7:26:14 AM PST by MD Expat in PA
[ Post Reply | Private Reply | To 81 | View Replies]

To: LibWhacker

I’m not a fan of criminals, but I am a fan of the “Supreme Law of the Land”. The court got this wrong. The government should turn the laptop over to NSA and see if they can get in (they can), but the accused should not be compelled to produce incriminating evidence.


87 posted on 01/24/2012 7:27:38 AM PST by Pollster1 (Natural born citizen of the USA, with the birth certificate to prove it)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

Exactly...i forgot my password your honor...I tried to remember...gave it my all...really I did...

Oh, and I used to own guns...but they all got lost in a tragic boating accident...


88 posted on 01/24/2012 7:31:24 AM PST by Magnum44 (Terrorism is a disease, precise application of superior firepower is the cure)
[ Post Reply | Private Reply | To 1 | View Replies]

To: kevkrom

>>More along the idea you mentioned, I’ve seen programs for iOS devices (and I’m sure they exist elsewhere) where it uses a pair of passwords: a “dummy” password that unlocks a “safe” set of files and a “real” password that unlocks the real hidden content.

Truecrypt is one.


89 posted on 01/24/2012 7:33:02 AM PST by expat1000
[ Post Reply | Private Reply | To 74 | View Replies]

To: MD Expat in PA
OK...that makes more sense. Thanks for the explanation. Knew I was missing something and the "house" explanation clears it up. It's easy for the po-po to break into a house without you telling them where the key is. Not so easy for a laptop.

Thanks again.

90 posted on 01/24/2012 7:40:30 AM PST by NELSON111
[ Post Reply | Private Reply | To 86 | View Replies]

To: databoss
Just a portion of the pass phrase awould enable most cracking algorithms a 98% chance to succeed....

 

It won't help you at all with PGP providing you have a robust enough passphrase. I could give you 10 characters of my PGP passphrase, and you'd still need millenia to decrypt my stuff. That is, if what you're talking about is gaining bits of the passphrase to reduce the size of the brute force attack you'd need to make on it. If you're saying that providing part of the passphrase gains you anything in actual cryptanalysis of the cyphertext, you're way off.

PGP is industrial strength encryption provided you take care with your secret key and passphrase.

91 posted on 01/24/2012 7:43:34 AM PST by zeugma (Those of us who work for a living are outnumbered by those who vote for a living.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: PapaBear3625; HiTech RedNeck; LibWhacker; SlargTarg; Irishguy
The very first thing the feds always do is make a bit-level copy of the hard drive

With operating systems becoming more complex, it is increasingly important to protect fragile computer evidence. Be confident about maintaining the integrity of your data during examination with hardware write protection devices from Digital Intelligence. Digital Intelligence designs and offers parallel IDE, serial ATA and SCSI hardware write blockers, as well as other custom solutions, to effectively address specific write blocking requirements. Learn how our UltraKit, UltraBlock, FireFly, FireBlock, SCSIBlock and FireChief devices can maintain the integrity of your evidence.

92 posted on 01/24/2012 7:44:11 AM PST by expat1000
[ Post Reply | Private Reply | To 72 | View Replies]

To: MD Expat in PA

Agreed, and this persons attorney should be pointing this out. While the judge should know better, many think they are the law in their own court (which is partly true) and will make demands that go beyond the protections in the constitution. But even such a lazy judge will usually concede if the attorney makes good arguments in law as to why such an order can be problematic.


93 posted on 01/24/2012 7:54:11 AM PST by Magnum44 (Terrorism is a disease, precise application of superior firepower is the cure)
[ Post Reply | Private Reply | To 86 | View Replies]

To: LibWhacker

thats easy...two pass phrases...a “throw-down” and the real one...the first opens files anybody can look at ...


94 posted on 01/24/2012 7:59:02 AM PST by mo
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jack Hydrazine

I am unable to locate the original article on CNET. Hmmmmmmm.

Nothing in the Constitution says that I can be forced to incriminate myself.


95 posted on 01/24/2012 7:59:29 AM PST by Thomas Truxtun
[ Post Reply | Private Reply | To 2 | View Replies]

To: Magnum44
Exactly...i forgot my password your honor...I tried to remember...gave it my all...really I did...

Better yet: stand mute. Say nothing at all, and let your lawyer do all the talking. Never say a false statement in court yourself. Let your lawyer do it for you, that's what you're paying him for.

96 posted on 01/24/2012 8:00:19 AM PST by PapaBear3625 (During times of universal deceit, telling the truth becomes a revolutionary act.)
[ Post Reply | Private Reply | To 88 | View Replies]

To: HiTech RedNeck

Already exists (dunno about PGP, but...)

TrueCrypt can be set up with “plausible deniability” http://www.truecrypt.org/docs/?s=plausible-deniability where an encrypted volume may have another encrypted volume hidden therein, and write operations on the former can encroach on and destroy the latter.

Convincing the adversary that you’ve handed over the key and revealed everything, however, may be a different problem. Beware “rubber hose cryptology”.


97 posted on 01/24/2012 8:07:55 AM PST by ctdonath2 ($1 meals: http://abuckaplate.blogspot.com/)
[ Post Reply | Private Reply | To 4 | View Replies]

To: monkeyshine
Anyone who wants to avoid turning their data over just needs to sign a license to FES that will exclusively and completely and irrevocably sell all of the content of their hard drives, clouds, phones, personal computers etc etc to FES. For $20 a month, FES will lease access to that content and the drives/cloud/phone etc back to you, encrypted.

Then every time you install something or save something you have to fill out export licensing paperwork.
98 posted on 01/24/2012 8:20:08 AM PST by TalonDJ
[ Post Reply | Private Reply | To 20 | View Replies]

To: Thomas Truxtun

It’s an interesting case, and I don’t think it’s necessarily obvious. A judge can compel someone to provide the contents of a locked safe. What’s the difference? Just because in some cases the state might be able to open a safe themselves without help from the defendant, it seems that the operative portion of the event is the valid court order. If (hypothetically) someone had an unbreakable safe such that the only way in was the use of a combination I think that same court could compel the defendant to open it or provide the combination. Is that self-incrimination? Or is it contempt of court to refuse?

It’s a good question. It seems clear too that if somebody just “forgets” the encryption key it’s impossible to prove otherwise. I can’t see how someone could be held in contempt for a failure to recall something. The court can’t compel someone to do the impossible.


99 posted on 01/24/2012 8:21:50 AM PST by Ramius (Personally, I'd give us one chance in three. More tea anyone?)
[ Post Reply | Private Reply | To 95 | View Replies]

To: LibWhacker

Unfortunately, IMHO, the judge here needs a “We the People” moment...and a reminder from his employers what the Fifth Amendment is all about....


100 posted on 01/24/2012 8:30:36 AM PST by mo
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-111 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson