Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

DOJ: We can force you to decrypt that laptop
CNET News ^ | JULY 11, 2011 12:07 AM PDT | Declan McCullagh

Posted on 07/11/2011 10:39:22 AM PDT by Smogger

The Colorado prosecution of a woman accused of a mortgage scam will test whether the government can punish you for refusing to disclose your encryption passphrase. The Obama administration has asked a federal judge to order the defendant, Ramona Fricosu, to decrypt an encrypted laptop that police found in her bedroom during a raid of her home.

Because Fricosu has opposed the proposal, this could turn into a precedent-setting case. No U.S. appeals court appears to have ruled on whether such an order would be legal or not under the U.S. Constitution's Fifth Amendment, which broadly protects Americans' right to remain silent.

In a brief filed last Friday, Fricosu's Colorado Springs-based attorney, Philip Dubois, said defendants can't be constitutionally obligated to help the government interpret their files. "If agents execute a search warrant and find, say, a diary handwritten in code, could the target be compelled to decode, i.e., decrypt, the diary?"

...

"Decrypting the data on the laptop can be, in and of itself, a testimonial act--revealing control over a computer and the files on it," said EFF Senior staff attorney Marcia Hofmann. "Ordering the defendant to enter an encryption password puts her in the situation the Fifth Amendment was designed to prevent: having to choose between incriminating herself, lying under oath, or risking contempt of court."

(Excerpt) Read more at news.cnet.com ...


TOPICS: Crime/Corruption; Front Page News; News/Current Events; Technical
KEYWORDS: 5thamendment; constitution; doj; encryption; fifthamendment; patriotact; policestate
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140141-144 next last
To: DaisyCutter
Yes, dd

dd (disk destroyer) will cause anyone a big headache if you have no idea what you are doing ...

101 posted on 07/11/2011 1:08:09 PM PDT by 08bil98z24 (Say NO to the WOD ------ NObama ---- Equal Opportunity Politician Basher)
[ Post Reply | Private Reply | To 80 | View Replies]

To: Publius6961

Yes, you can get copies of several imaging programs, especially on Linux. DD will do the job nicely, as will dcfldd.


102 posted on 07/11/2011 1:21:15 PM PDT by CA Conservative
[ Post Reply | Private Reply | To 78 | View Replies]

To: relictele

‘I forget the password. I guess we’re both screwed.’

Waterboarding will help you to memorize :-)


103 posted on 07/11/2011 1:28:11 PM PDT by buzzer
[ Post Reply | Private Reply | To 13 | View Replies]

To: Smogger

Excellent points!!! BTW here is the “password” that erases the flash memory.


104 posted on 07/11/2011 1:30:03 PM PDT by mad_as_he$$
[ Post Reply | Private Reply | To 1 | View Replies]

To: 08bil98z24

dd = diskdump

$ sync && sync && sync && dd if=/dev/urandom of=/dev/sda bs=4096 && sync;


105 posted on 07/11/2011 1:31:05 PM PDT by buzzer
[ Post Reply | Private Reply | To 101 | View Replies]

To: for-q-clinton
True, BUT you still need to decrypt it and the only key you get from me deletes the data you think is there while giving you the phony stuff.

So how could you even tell if you got everything or not?

My comment was limited to the point about making the encryption dependant upon the hardware and the feasibility of having the encryption software wipe the data if the wrong password is entered. There are ways around that restriction. I made no comment as to the difficulty of cracking the encryption without a password - that is still difficult without a dumb criminal or a lot of high-powered computing resources.

106 posted on 07/11/2011 1:36:14 PM PDT by CA Conservative
[ Post Reply | Private Reply | To 77 | View Replies]

To: Steely Tom

“Hey stupids at the DOJ: thanks for letting the world know the limitations of the NSA’s decryption capabilities.”

Actually, the NSA doesn’t like or cooperate with the DOJ very much. What the NSA does is not the domain of the DOJ. Just because the DOJ wants to prosecute someone for a crime doesn’t mean the NSA will risk exposure of a very sensitive military capability.


107 posted on 07/11/2011 1:40:28 PM PDT by CodeToad (Islam needs to be banned in the US and treated as a criminal enterprise.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Michael Barnes
For what? They have my physical property (all the one's and zero's on the drive). Besides, won't matter; they won't be able to discover hidden volumes if set up correctly.

Password for what?

While I may not be able to decrypt the files, I can usually tell pretty quickly if someone has been using encryption software, even if the software is on a thumb drive and not on the computer itself. The software will leave traces in the registry, in the page file, in the master file table, etc. If you can find when the encryption software was invoked and then find the names of files accesses shortly afterward, you can often find the encrypted containers (especially true for TrueCrypt). That doesn't mean you can decrypt them - just that you can locate them and show that encryption software was used to protect them.

108 posted on 07/11/2011 1:44:12 PM PDT by CA Conservative
[ Post Reply | Private Reply | To 93 | View Replies]

To: Michael Barnes
For what? They have my physical property (all the one's and zero's on the drive). Besides, won't matter; they won't be able to discover hidden volumes if set up correctly.

Password for what?

While I may not be able to decrypt the files, I can usually tell pretty quickly if someone has been using encryption software, even if the software is on a thumb drive and not on the computer itself. The software will leave traces in the registry, in the page file, in the master file table, etc. If you can find when the encryption software was invoked and then find the names of files accesses shortly afterward, you can often find the encrypted containers (especially true for TrueCrypt). That doesn't mean you can decrypt them - just that you can locate them and show that encryption software was used to protect them.

109 posted on 07/11/2011 1:44:12 PM PDT by CA Conservative
[ Post Reply | Private Reply | To 93 | View Replies]

To: 08bil98z24
dd (disk destroyer) will cause anyone a big headache if you have no idea what you are doing ...

Absolutely true. The question was whether there was software available to the public to make a bit-for-bit image of a hard drive, and those were some applications that immediately came to mind because I use them quite often. But if you don't know what you are doing, you can hose things up quite spectacularly.

110 posted on 07/11/2011 1:47:52 PM PDT by CA Conservative
[ Post Reply | Private Reply | To 101 | View Replies]

To: woollyone; Drumbo

>>> “I use memory verses. These usually contain all the elements required for most pw’s... Works great for me, they are tough to crack, easy use and build my Bible memory skills.”

Gotta say that is one cool idea for a pswrd.


111 posted on 07/11/2011 1:54:14 PM PDT by Titan Magroyne (What one person receives without working for, another person must work for without receiving.)
[ Post Reply | Private Reply | To 72 | View Replies]

To: Smogger

I want someone to come up with an O/S where everything is encrypted to the point it would be impossible to decrypt ANYTHING on the HD without the code.


112 posted on 07/11/2011 2:05:04 PM PDT by GeronL (The Right to Life came before the Right to Happiness)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gondring
“Oh, no problem...we have a backup of it. Try again. “

You are correct

The first process performed when a PC or laptop is brought in for inspection is the drive is removed from the laptop and a Bit level copy is made along with checksums TWICE. So now you have three copies. The original, the master copy with checksums so you can verify its contents should the need arise in a court case and the one that you actually do the decryption work on.

Unfortunately this bypasses all all of the programs that would normally run as a self destruct that would have been loaded on the laptop or PC. You run the drive on a clean forensics system.

113 posted on 07/11/2011 2:36:12 PM PDT by Syntyr (Happiness is two at low eight!)
[ Post Reply | Private Reply | To 39 | View Replies]

To: Publius6961; Uncle Ike

>>You gonna bring back the rack?
The Iron maiden?
Drawing and quartering?
Water boarding that is prohibited from being used on mortal enemies?<<

http://files.sharenator.com/general_black_jack_pershing_1924_General_quotBlack_Jackquot_Pershing-s600x578-108481-580.jpg


114 posted on 07/11/2011 2:39:20 PM PDT by B4Ranch (Allowing Islam into America is akin to injecting yourself with AIDS to prove how tolerant you are...)
[ Post Reply | Private Reply | To 17 | View Replies]

To: hiredhand

Phat chance Uncle Sam.... Never gonna happen.

.......:o)


115 posted on 07/11/2011 2:52:31 PM PDT by Squantos (Be polite. Be professional. But have a plan to kill everyone you meet)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Smogger

There is a slow move away from the government being perceived as “us” and instead towards the government being perceived as “them”. That isn’t a healthy trendline in a democracy. This isn’t a left or right thing either. It’s the tendency of uncontrolled and unaccountable government officials wanting more power for themselves and less for the people. The right to avoid self incrimination is something that our legal system had always supported, but it is now being eroded.

Another example are the black boxes in new cars that we may own. We paid for them and they belong to us but they are often used by the legal system to convict the car owner.

http://www.popsci.com/cars/article/2011-05/new-federal-rules-could-require-cars-black-boxes-record-driver-activity

I support EFF.


116 posted on 07/11/2011 2:58:12 PM PDT by apoliticalone (Honest govt. that operates in the interest of US sovereignty and the people, not global $$$)
[ Post Reply | Private Reply | To 1 | View Replies]


Click the Biker

"Which way to Rolling Thunder?"

He's looking for monthly donors
Sign up, and a sponsoring FReeper will contribute $10
Or give what you can

117 posted on 07/11/2011 3:01:52 PM PDT by TheOldLady (FReepmail me to get ON or OFF the ZOT LIGHTNING ping list.)
[ Post Reply | Private Reply | View Replies]

To: CA Conservative
only the copy would be wiped, not the original.

Not if the data on the two drives are quantum bit entangled.

118 posted on 07/11/2011 3:09:11 PM PDT by steve86 (Acerbic by nature, not nurture (Could be worst in 40 years))
[ Post Reply | Private Reply | To 61 | View Replies]

To: Smogger

Honestly I think this whole article is moot. If the DOJ had any balls at all (presently they do not), they would try and install a hardware keylogger in your keyboard and grab any passphrase they needed (previous DOJ I suspect would only be able to do this with a high profile target), rendering the whole encryption pointless. They could even do it remotely.


119 posted on 07/11/2011 3:16:55 PM PDT by Soothesayer9
[ Post Reply | Private Reply | To 6 | View Replies]

To: steve86

quantum bit entangled? WTF


120 posted on 07/11/2011 3:20:04 PM PDT by KC Burke
[ Post Reply | Private Reply | To 118 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140141-144 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson