Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

DOJ: We can force you to decrypt that laptop
CNET News ^ | JULY 11, 2011 12:07 AM PDT | Declan McCullagh

Posted on 07/11/2011 10:39:22 AM PDT by Smogger

The Colorado prosecution of a woman accused of a mortgage scam will test whether the government can punish you for refusing to disclose your encryption passphrase. The Obama administration has asked a federal judge to order the defendant, Ramona Fricosu, to decrypt an encrypted laptop that police found in her bedroom during a raid of her home.

Because Fricosu has opposed the proposal, this could turn into a precedent-setting case. No U.S. appeals court appears to have ruled on whether such an order would be legal or not under the U.S. Constitution's Fifth Amendment, which broadly protects Americans' right to remain silent.

In a brief filed last Friday, Fricosu's Colorado Springs-based attorney, Philip Dubois, said defendants can't be constitutionally obligated to help the government interpret their files. "If agents execute a search warrant and find, say, a diary handwritten in code, could the target be compelled to decode, i.e., decrypt, the diary?"

...

"Decrypting the data on the laptop can be, in and of itself, a testimonial act--revealing control over a computer and the files on it," said EFF Senior staff attorney Marcia Hofmann. "Ordering the defendant to enter an encryption password puts her in the situation the Fifth Amendment was designed to prevent: having to choose between incriminating herself, lying under oath, or risking contempt of court."

(Excerpt) Read more at news.cnet.com ...


TOPICS: Crime/Corruption; Front Page News; News/Current Events; Technical
KEYWORDS: 5thamendment; constitution; doj; encryption; fifthamendment; patriotact; policestate
Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120 ... 141-144 next last
To: for-q-clinton

My point (which I really didn’t make, my bad) was that while the program can show them all the fake stuff you want, no program is going to be able to delete the data you want to hide because they won’t be using the original drive.


81 posted on 07/11/2011 12:08:03 PM PDT by Darth Reardon (No offense to drunken sailors)
[ Post Reply | Private Reply | To 67 | View Replies]

To: Darth Reardon

But it is in essence unretrievable to external sources.

Also not all investigators are that bright. Trust me I know...I’ve seen many cops screw up investigations.


82 posted on 07/11/2011 12:10:21 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 81 | View Replies]

To: Publius6961

Sure.. I use it all the time.


83 posted on 07/11/2011 12:10:24 PM PDT by Smogger
[ Post Reply | Private Reply | To 78 | View Replies]

To: TexasFreeper2009
If the NSA wanted to decrypt it... it would be decrypted, period.

Oh really?
Make it worth my while and I will create a file that they can't decrypt working from today to eternity.

I would call it the trojan file.

84 posted on 07/11/2011 12:10:56 PM PDT by Publius6961 (My world was lovely, until it was taken over by parasites.)
[ Post Reply | Private Reply | To 60 | View Replies]

To: Publius6961

People think the NSA is like a god. If the NSA could do it so could the chicoms and the ruskies and a couple hackers in control of botnets. So the encrypted file that wikileaks dropped out there would be cracked by now and floating around the internet.


85 posted on 07/11/2011 12:13:08 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 84 | View Replies]

To: Tolsti2

T r u e C r y p t

Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux

Main Features:

Creates a virtual encrypted disk within a file and mounts it as a real disk.

Encrypts an entire partition or storage device such as USB flash drive or hard drive.

Encrypts a partition or drive where Windows is installed (pre-boot authentication).

Encryption is automatic, real-time (on-the-fly) and transparent.

Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.

Encryption can be hardware-accelerated on modern processors.

Provides plausible deniability, in case an adversary forces you to reveal the password:

Hidden volume (steganography) and hidden operating system.
More information about the features of TrueCrypt may be found in the documentation.

What is new in TrueCrypt 7.0a


86 posted on 07/11/2011 12:14:43 PM PDT by samtheman
[ Post Reply | Private Reply | To 21 | View Replies]

To: Smogger

Question for the legal types....if the laptop were to contain any correspondence with an attorney, would this not be a violation of attorney-client privilege?


87 posted on 07/11/2011 12:14:49 PM PDT by rottndog (Be Prepared for what's coming AFTER America....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TexasFreeper2009
You work for the NSA and know this?

Do you know how long it takes to crack AES with a 64 character length password?

88 posted on 07/11/2011 12:18:51 PM PDT by Michael Barnes
[ Post Reply | Private Reply | To 60 | View Replies]

To: Michael Barnes
"You work for the NSA and know this? Do you know how long it takes to crack AES with a 64 character length password?"

I would think that depends on how much time you want to spend in jail...

89 posted on 07/11/2011 12:21:42 PM PDT by GourmetDan (Eccl 10:2 - The heart of the wise inclines to the right, but the heart of the fool to the left.)
[ Post Reply | Private Reply | To 88 | View Replies]

To: for-q-clinton
People think the NSA is like a god. If the NSA could do it so could the chicoms and the ruskies and a couple hackers in control of botnets. So the encrypted file that wikileaks dropped out there would be cracked by now and floating around the internet.

It's due to a profound misunderstanding of encryption. Most theoretically successful attacks against proven ciphers like AES or RC5 still would take many many years at todays computing power. An attack against a 256-bit-key AES requiring 2^200 operations (compared to 2^256 possible keys) would be considered a break, even though 2^200 operations would still take far longer than the age of the universe to complete.

90 posted on 07/11/2011 12:21:42 PM PDT by Smogger
[ Post Reply | Private Reply | To 85 | View Replies]

To: apillar; for-q-clinton

I use truecrypt and I do worry that I might someday forget my password (I don’t write it down).

My method, however, is to encrypt smaller “disks” and name them as known file extensions (like .doc, eg) and then just store those files in a folder with hundreds of junk files that I’ve accumulated over the years.

The great thing about the truecrypt is the file date doesn’t change when the file is updated so no one can tell if it’s been added to recently or not.


91 posted on 07/11/2011 12:24:07 PM PDT by samtheman
[ Post Reply | Private Reply | To 22 | View Replies]

To: E. Pluribus Unum

and then they would reimage the drive back from the forensic image the data forensics guy took when he first took the drive into evidence custody and you would be right back where you started + a charge of contempt of court.


92 posted on 07/11/2011 12:25:05 PM PDT by melkor
[ Post Reply | Private Reply | To 50 | View Replies]

To: GourmetDan
For what? They have my physical property (all the one's and zero's on the drive). Besides, won't matter; they won't be able to discover hidden volumes if set up correctly.

Password for what?

93 posted on 07/11/2011 12:26:54 PM PDT by Michael Barnes
[ Post Reply | Private Reply | To 89 | View Replies]

To: melkor
I posted a response to the wrong thread before you responed. Here it is.

Good question. There’s a database somewhere with the answer.

I already realized it wouldn't work.

All they have to do is make a backup image of your hard drive before they enter the password.

Then you are just shredding a copy.

Truecrypt has a decent alternative; a hidden encrypted volume inside of another encrypted volume.

You give them the password to the outer volume. There is no way to know that there is an encrypted inner volume, so your data is safe and they don't even know it is there.

94 posted on 07/11/2011 12:27:46 PM PDT by E. Pluribus Unum ("A society of sheep must in time beget a government of wolves." - Bertrand de Jouvenel des Ursins)
[ Post Reply | Private Reply | To 92 | View Replies]

To: apillar; for-q-clinton

And also: I check the “never save history” checkbox.


95 posted on 07/11/2011 12:30:26 PM PDT by samtheman
[ Post Reply | Private Reply | To 91 | View Replies]

To: Smogger

https://www.grc.com/passwords.htm

Get one, use it and write it down and put it where only you can reveal it (iffin’ you got some revolutionary info to hide!).

Full 4th/5th Amendment protection.


96 posted on 07/11/2011 12:35:08 PM PDT by Cletus.D.Yokel (Islam is a violent and tyrannical political ideology and has nothing to do with "religion".)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Steely Tom

Do you ACTUALLY THINK that No Such Agency would let Justice, a NOTORIOUSLY leaky agency, know its’ full capabilities ??


97 posted on 07/11/2011 12:35:56 PM PDT by Salgak (Acme Lasers presents: The Energizer Border: I dare you to try and cross it. . .)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Smogger

I wonder what encryption is being used... I WANT IT !!!


98 posted on 07/11/2011 12:45:50 PM PDT by ColdSteelTalon (Light is fading to shadow, and casting its shroud over all we have known...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Smogger

Ve have vays to make you talk! Our drugs are very good! Or maybe ve vill put you on the vasser board.


99 posted on 07/11/2011 12:52:53 PM PDT by Bobby_Taxpayer (Don't tread on us...or you'll pay the price in the next election.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Publius6961

I don’t think I missed that particular point. A whole LOT OF PEOPLE should have been in line for prosecution long before Libby.


100 posted on 07/11/2011 1:06:23 PM PDT by Enterprise ("Those who can make you believe absurdities can make you commit atrocities." Voltaire)
[ Post Reply | Private Reply | To 30 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120 ... 141-144 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson