US Appeals Court Upholds Suspect's Right To Refuse Decryption 358
An anonymous reader writes "The U.S. 11th Circuit Court of Appeals has found that forcing a suspect to decrypt his hard drive when the government did not already know what it contained would violate his 5th Amendment rights. According to Orin Kerr of the Volohk Conspiracy, 'the court's analysis (PDF) isn't inconsistent with Boucher and Fricosu, the two district court cases on 5th Amendment limits on decryption. In both of those prior cases, the district courts merely held on the facts of the case that the testimony was a foregone conclusion.'"
Only when they don't already know? (Score:3, Interesting)
Why only if the government doesn't already know what it contains? Does that mean that they can force you when they already know what it contains?
That doesn't make sense to me.
Re:Only when they don't already know? (Score:5, Informative)
Yes. If the government knows your have child porn on your computer, then they can get a warrant to force decryption.
It's EXACTLY the same thing if they know you have a dead body in your garage they can get a warrant to force you to unlock the garage.
Re:Only when they don't already know? (Score:5, Insightful)
Yes. If the government knows your have child porn on your computer, then they can get a warrant to force decryption.
If they know, that implies they can prove it, and if they can prove it they don't need to decrypt it!
Re: (Score:3, Insightful)
To use the GP's analogy, if your garage smells like rotting corpse, a judge will issue a warrant forcing you to unlock your garage door. That does not imply the police (or judge) knows you've been summoning Cthulhu.
Similarly, if your name/handle/URLID comes up in a money laundering probe*, that might be probable cause to force decryption even if it hasn't been proven that you've been using that particular drive. In any sane jurisdiction, any evidence uncovered during such a probe can not be used to file unr
Re:Only when they don't already know? (Score:5, Insightful)
To use the GP's analogy, if your garage smells like rotting corpse, a judge will issue a warrant forcing you to unlock your garage door.
No, the judge will issue a warrant allowing the police to break in if you don't unlock the door - an important distinction. Despite the warrant, If you can't find the key to the garage door, no judge would throw you in jail for that.
Re:Only when they don't already know? (Score:5, Insightful)
Imagine that instead of a garage is a 10,000 lb, ultra high security safe. The kind where opening it by force is more than likely to destroy the contents. They will absolutely subpoena you for the combination to that safe and will absolutely hold you in contempt if you refuse to give it or if you claim that you can't remember it. Especially if they have evidence that you opened the safe on a regular basis (which is the kind of thing a good computer forensics team might be able to show).
Re: (Score:3)
Re:Only when they don't already know? (Score:5, Funny)
Re:Only when they don't already know? (Score:4, Insightful)
What is reasonable? If it's locked in my mind, you can't force it out of me. The decryption key is locked in my mind. My thoughts are my thoughts. If the hard disk doesn't work without "plugging it in" to my mind, you're shit out of luck.
You KNOW that I have top secret state secrets on my hard drive? You better prove it with real police work. I'm not incriminating myself.
You KNOW that I have industrial espionage documents? Again - you better prove it, 'cause I'm not GIVING you the evidence.
You KNOW that I have child porn on my machine? Well - you're fucked, because there isn't. You're on a fishing expedition, and I'm not biting.
You KNOW that I've visited chat sites that promote (terrorism, rebellion, insurrection, whatever)? Well, it's up to you to prove it, because it's your JOB to investigate. It's not my job to incriminate myself.
Bottom line is, if the only place you can get evidence against me, is from my own mind, then you are pissing into the wind.
Re: (Score:3)
But is your encryption key really protecting the testimonial contents of your mind? Or the physical evidence on your computer? One can definitely argue this issue either way, legitimately.
Comment removed (Score:5, Informative)
Re:Only when they don't already know? (Score:5, Insightful)
Re:Only when they don't already know? (Score:5, Insightful)
Oaths are also religious acts, and there would be 1st amendment concerns with forcing people to take an oath if they were, for example, an atheist. Just a fun fact.
Its 2012 - it's common enough to not be a "fun fact" anymore, just reality. ...". I put my hand on my chest and said "I affirm", and this didn't raise any eyebrows. It's common enough, and hopefully soon, the religious oath will be separated from government and no longer be given preferential/default treatment.
The last time I was in a court a few years ago, I was signaled to put my hand on a bible, raise the other and answer "do you swear to
If it were up to me, any testimony given by someone who professes to believe in supernatural beings by taking a religious oath should be treated as suspect; they've already demonstrated their willingness to put hearsay first.
Re:Only when they don't already know? (Score:4, Interesting)
I've been a court reporter for a few years now. I'm in court pretty much all day, every day.
Our judge is better than most. We certainly don't have a bible in the courtroom and every witness is asked "Do you swear or affirm under penalties for perjury that the testimony you are about to give..." before testifying. I'd say one in twenty people specify that they specifically affirm even though the question is deliberately phrased so that they don't have to specify. I like those people.
If it were up to me, any testimony given by someone who professes to believe in supernatural beings by taking a religious oath should be treated as suspect; they've already demonstrated their willingness to put hearsay first.
No argument there.
Re: (Score:3, Insightful)
That depends on how specific you need to be.
We "know" you have money hidden in that off shore account. We know you have your pgp private key on your hard disk. We need you decrypt the hard disk so we can decrypt the message from the bank we intercepted using the pgp key.
They know the key is there, they don't know what the key is; so yes they need you to decrypt it. I think this is actually a pretty reasonable ruling. It treats an encrypted hard disk just like we treat a safe in the physical world.
The go
Re:Only when they don't already know? (Score:5, Insightful)
Except that an encrypted hard disk is not just like a safe in the physical world.
Re:Only when they don't already know? (Score:5, Insightful)
How is different? Really explain that one to me!
*Its a storage unit for information; lots of people use safe's for that
*Its designed to keep others not its owner out, exactly what the encryption is doing
*It needs a key or combination to open it; you need a key to decrypt
They seem pretty damn similar to me. The Constitutions spells out my rights to "personal papers and effects". I am normally a pretty strict constructionist but I think its reasonable to character as a persons electronic documents as "papers" or if you don't want to do that than as "effects" and I really do think the same rules for how an when the government may take possession of them should be applied!
Simple: the data no longer exists (Score:5, Interesting)
Posting AC, but there's one simple difference:
With a safe, if it's locked, the contents still exist.
If I encrypt a disk, the original data quite literally no longer exists. The encrypted disk is not a "container" for my data -- it is a completely different set of data.
The original data can only be recreated on cue if I supply my encryption passphrase. Therefore, by supplying the passphrase I am creating or assisting in the creation of evidence against me. I'm pretty sure the Fifth Amendment has something to say about being forced to do that.
Re:Simple: the data no longer exists (Score:4, Insightful)
That's splitting a technical (or technological) hair. Encryption cannot be a perfect safety net with which to break the law with impunity, so I accept this court's compromise. Remember what the lower courts wanted: Your encrypted data is theirs and they will use it all to prosecute you for everything.
Re: (Score:3)
That is what lawyers are for - splitting hairs. If it weren't for hair splitting, we wouldn't have any more than ten or fifteen percent of the lawyers who are milking us today.
Re:Simple: the data no longer exists (Score:5, Funny)
With a safe, if it's locked, the contents still exist.
And that is why I always place my important documents in a locked safe with a tiny radiation source and a Geiger counter. If the Geiger counter detects radiation, then a thermite charge is activated. Due to my poor understanding of a 77 year old reductio ad absurdum of the Copenhagen interpretation, my documents neither exist nor don't exist! And I surely cannot be compelled to collapse the waveform by a court of law, the constitution gives them no power over quantum physics.
Re:Only when they don't already know? (Score:4, Interesting)
Re: (Score:3, Insightful)
There are two problems with this analogy: Doors can be picked and destroyed. Picking a lock or destroying a door would not destroy the evidence/property that the door was protecting.
A better -- but still not perfect -- analogy is a safe (as another user pointed out earlier). Assume a perfectly unbreakable safe, the government would need you to provide the combination to the safe in order to gain access to the documents. IANAL, but telling the government a combination is generally not something that they c
Re:Only when they don't already know? (Score:5, Insightful)
You and others are dancing around trying to poke holes in the 5th amendment. The spirit of the 5th amendment is to prevent the government from compelling you to help them prosecute you. The founders talked extensively about how it was immoral to require someone to help the government put them in jail. Providing encryption keys is helping the government prosecute you. In fact I'd argue the combination or key to a safe does exactly the same thing and the court rulings that allow the government to compel cooperation in opening safes also violates the spirit of the 5th.
This is only an issue because Judges go out of their way to violate the constitution when they think it should. As a result there is a case history in the US that providing the key or combination to a safe doesn't violate the 5th. Those rulings completely violate the spirit of the 5th even though they found weasel logic to get around a fixed interpretation of the words of the 5th. Just because this stupidity exists in case law isn't justification to piss on the 5th some more with a similar ruling on encryption.
Re:Only when they don't already know? (Score:4, Insightful)
The spirit of the 5th amendment is to prevent the government from compelling you to help them prosecute you.
This is where you and many Constitutional scholars disagree. The spirit of the 5th Amendment is to prevent you from having to give actual testimony against yourself. Prior to this, people were often forced to confess and to bear witness against themselves in court.
There are well-established legal situations in which you do, in fact, have to help the government prosecute you, in the broad sense. If they subpoena information, you are legally required to provide it, even if it's damning evidence.
The founders talked extensively about how it was immoral to require someone to help the government put them in jail.
Out of curiosity, where?
Re:Only when they don't already know? (Score:5, Interesting)
All cynicism aside, we as a People need to find a way to allow the government to prosecute real criminals but also protect John Q. Citizen.
In all seriousness, as soon as the government starts making a distinction between real criminals and John Q. Citizen we can start letting our guards down on this but until then we should always err on the side of less power and intrusion.
Re:Only when they don't already know? (Score:5, Insightful)
The one major difference I can think of is that decryption requires a transformation of the data. By decrypting the data you've demonstrated the knowledge of how to perform that transformation. Opening a safe does not require transforming data, simply allowing physical access to it. If you had hard copy encrypted, obfuscated, or ciphered data within your safe, would the court be able to compel you to decrypt that?
Re:Only when they don't already know? (Score:5, Insightful)
It's different because you can also think of encryption like a secret language that only you can decipher. If you wrote down all of your incriminating information in this secret language, there is no way the government could compel you to translate it for them since doing so would incriminate you. Sure, we can make analogies all day, but when we come right down to it, an encrypted document is a lot more like a secret language than a safe.
Re:Only when they don't already know? (Score:5, Insightful)
The reason is that any safe can be physically forced. This makes access inevitable. The combination only prevents property damage.
That is not the case with electronic encryption.
Re: (Score:3)
Actually, breaking into a strong safe exactly like breaking strong encryption. Both will require greater-than-average expenditures of time and money to crack, but given enough resources, both are possible.
If the state chooses not to expend the resources, that doesn't change the role of the defendant. It only makes it more likely that the prosecutors will whine to the judge about the unfairness of it all, and the judge will then throw the defendant's ass in jail until s/he capitulates and opens up the safe
Re:Only when they don't already know? (Score:5, Insightful)
What if your safe contains a piece of paper with what appear to be random markings. Does the government have the right to assert that you "decode" the paper? What if it really *is* random markings?
A safe either contains something, or it does not, and that can be rather easily verified by looking at the contents. The same cannot be said for either the paper described above, or for a hard drive filled with noise and/or encrypted data.
Re: (Score:3)
Unlike a real physical safe, though, you can't crack it with brute force.
If you lose the key to a real safe, you can always get a locksmith to pick the lock, and as a last resort, good old oxy acetylene cutting torches can open it.
Which is exactly what happens when the owner "loses" the key.
No such analog exists with encryption.
Re:Only when they don't already know? (Score:5, Interesting)
The key is in your mind, and you have to make words to give it to others. It's not entirely the same.
But let's assume you can be compelled, whether they know what's in the container or not. I have been trying to think about ways to get around this. From an academic point of view of course :P
What if the pass key itself was incriminating (i.e. "I killed a guy in 1994 and his body is under the bridge.")? Could you plead the 5th? Might be a bit of a risk. (I mean...killing is bad.)
Truecrypt allows the plausible deniability with the drive in a drive. Give them the wrong code and it opens a second container with something more innocuous in it. For those who are actually afraid of giving in (to torture? desperation?) the under duress password could have the function of changing the real password to 500 random characters, thereby making it permanently inaccessible to anyone.
Another idea is to have a daily or weekly maintenance password. That is, you are required to type in a password once a day or once a week, and if you don't, the passkey changes to some random 500 characters and is permanently inaccessible. If your stuff is seized or you are arrested, all you have to do is sit back and relax. While I am sure it would be a problem for you to go around actively destroying evidence, I'm curious to see if you get in trouble for this. First of all, you aren't destroying evidence per se, rather it is being rendered inaccessible (automatically I might add). Second, while you can't actively destroy evidence, can you get in trouble for not actively preserving it for the authorities?
Re: (Score:3)
Very similar. Very very similar. But, even very, very, very, VERY similar is not "exactly the same".
The cops can get a plasma torch to get into my safe if all other methods of gaining entry fail. I don't HAVE to open it for them.
Let the cops use a plasma torch on my hard drive then. As you say, it's "exactly the same".
Alright, I'll clue you in here. The encrypted hard drive is an extension of my mind. Only my mind can unlock it. My mind is not subject to search. The cops can question me, but I don't
Re:Only when they don't already know? (Score:5, Insightful)
I don't agree, first because we can no longer reasonably assume the government is always truthful in its allegations and statements.
I know that legally the government enjoys the presumption of trust, but this is as close to self-incrimination as it can get.
It also doesn't answer the question of what happens if, during their examination of the decrypted drive, they 'discover' other information that could lead to other charges. At least in the example of the rotting smell from the garage, if it turns out to be your dog, do they have the right to dig up the foundation to try and find a human body also? Or would the goverment then have to ask for a new warrant? In the cse of data, would they be compelled to ask for a new warrant it they 'happen' to notice evidence of unrelated crimes.
Actually the real question for me is still a Fifth Amendment one. If they drag you into court and ask you about the rotting corpose in the garage, you can still sit there mute and refuse to answer, and there may be penalties for that, but you cannot so easily be compelled to incriminate yourself.
Decrypting your data is a different thing, and it is virtually impossible for the government to claim they can look ONLY for the data they seek, and ignore all else. It's another thing to say they are looking in the garage for a corpse, and be able to avoid looking in the trunk of car parked on the street, despite walking by it repeatedly as they swarm over the garage.
Sorry, but I think we need much more protections. My phone has enough information on it to give law enforcement access to things they should need more than one warrant for, and discovery they should not be able to make while searching for something else.
Re:Only when they don't already know? (Score:5, Insightful)
I don't agree, first because we can no longer reasonably assume the government is always truthful in its allegations and statements.
The constitution was written because the founders assumed government could not be trusted with power. This is why government must *prove* a case against a free citizen beyond reasonable doubt. You assume the government is wrong until they prove otherwise. If you ever assume government is right, you're in trouble.
Re: (Score:3)
They may be able to prove you viewed child porn, by having used a honey pot, and tracking your IP address/etc.. That is enough to get a warrant to search your computer for evidence of wrongdoing, where they will find the proof that it was actually you. If all they have is logs from a honey pot, then you can still argue that you have an open wifi and it was a drive-by hacker who committed the crime.
In other words, they may not know the exact content of your hard drive, but they may know enough to get a warra
Re:Only when they don't already know? (Score:5, Insightful)
The only thing a honey pot would prove is that your computer accessed child porn. Proving you viewed it is different.
There was a case (specifics escape me) where some guy hacked a wi-fi network and made it look like his neighbor was viewing child porn and making threats to political officials. The police originally had the same mentality: your computer, and therefore you, view child porn. Only after his company conducted their own investigation did they prove that he didn't. Note that I said company, not the police.
With Trojans, worms, and other malware, I would think this is an area that needs legal work: proving that an actual person accessed something illegal and not just a computer attached to an IP address.
Re: (Score:3)
The case you cited [arstechnica.com].
Re: (Score:3)
Of course, this does very little in the way of actually forcing you to do anything. If you don't open your door for a warrant, the police can break it down. If you "forget" your password, I have no idea what will happen.
Re: (Score:2)
They have to know it specifically enough to get a warrant. Just "he has child porn on the drive" is insufficient.
Re: (Score:2)
Re:Only when they don't already know? (Score:4, Insightful)
It's EXACTLY the same thing if they know you have a dead body in your garage they can get a warrant to force you to unlock the garage.
No it isn't. To continue your analogy of a dead body, they can get a warrant that allows them to search your garage. If you don't open it for them, they then can break in and conduct their search. To apply this to the laptop scenario, the government indeed had a search warrant for the laptop and it was turned over by the defendant. She, in no way, can be compelled to unlock it or do anything else to it but in retrospect, the government would have the right to break into it. In trying to force the defendant to open it, the government has stated that they can't or won't break into it for fear of damaging possible evidence. That's their problem, not the defendant's problem.
[IANAL] I agree w/ the appeals court's decision here. Forcing the defendant to unlock and/or decrypt her laptop would be forcing her to provide evidence against herself thus violating her 5th amendment rights.
Re:Only when they don't already know? (Score:4, Informative)
The EFF Covers things pretty well.
http://www.youtube.com/watch?v=gohLZVAJAiI
Watch that.
Re:Only when they don't already know? (Score:4, Insightful)
So the government just have to say: we know that you harddrive contains X, and they force you to decrypt it.
Of course, when it is decrypted and it turns out that it didn't contain X, they will just say... sorry!
Re:Only when they don't already know? (Score:5, Funny)
So the government just have to say: we know that you harddrive contains X, and they force you to decrypt it.
Of course, when it is decrypted and it turns out that it didn't contain X, they will just say... sorry!
Hogwash. No way they're going to say sorry.
Re:Only when they don't already know? (Score:5, Informative)
They can't just "say it". The other case was quite exceptional, the suspect did voluntarily show the decrypted disc to the customs officer, the customs officer found kiddie porn but as the laptop was powered down it wouldn't open again without a password. So they had proof he could access it, testimony that they'd actually observed it and a chain of evidence that the contents had not changed since then. That's a whole different level of knowing than just "knowing" they're involved in something illegal.
Re: (Score:2)
Also, you have a much lower (nonexistent?) expectation of privacy when crossing the border than you do otherwise.
Re: (Score:3)
Re: (Score:2)
However, given how the whole civil rights thing has been going these days, the warrants may just turn into a rubber-stamp process, and
Re:Only when they don't already know? (Score:5, Interesting)
Sounds great, I'll support that as soon as they put a penalty for the law enforcement being wrong.
This is the problem, they CAN go on fishing expeditions without any recourse. They can smash down a door and kill the family dog on accident and the family does not get all damages covered, they get told "sucks to be you"
As soon as I get to sue the Cops that did the deed and the city department for all damages and legal costs I'll support that warrants are legitimate.
Re: (Score:3)
"HOWEVER, a cop who kicks in the door without a warrant and finds nothing becomes personally (and his agency, collectively) responsible for damages, including punitive damages."
Nope. Cops are indemnified all the time. They can KILL someone during a high speed chase and can not be sued by the victims relatives. IT's a bullshit law that the feds and most states put in place to protect police from being responsible for their actions. This is outside their "good ol boy" network of the cops covering things u
That has unintended side-effects (Score:3)
There is a school of thought that holds that warrants should be much rarer than they actually are. This school of thought holds that if the cops know you have stolen goods or whatever, they can enter the premises, find the stolen goods, and off to jail you go. ...
HOWEVER, a cop who kicks in the door without a warrant and finds nothing becomes personally (and his agency, collectively) responsible for damages, including punitive damages.
The problem with this is that warrants serve another important purpose of documenting and limiting the scope of the search. In the system you describe, if cops bust into your house and didn't find what they were looking for, they would have a strong incentive to proceed on a fishing expedition to find (or even plant) evidence of some crime, any crime they can nail you with, so they won't be held responsible for their mistake. It is good to have a judge sign off on all warrants, and give limited personal ind
Re: (Score:2)
I think it's that whether or not that they know there is or is not incriminating evidence on the drive. Not that they know the exact contents.
Perhaps something like "I have incriminating evidence on this drive, therefore I will not decrypt it" vs. "I don't know what may or may not incriminate me on this drive, thus I will not decrypt it".
Re: (Score:3)
Why only if the government doesn't already know what it contains? Does that mean that they can force you when they already know what it contains?
That doesn't make sense to me.
I think the point of the ruling is to avoid fishing expeditions. If the authorities have probable cause or a reason to believe there is information relevant to an investigation on your hard drive, then a warrant would allow them to compel you to decrypt it. But they can't just force you to decrypt a hard drive without any evidence of a crime having been committed.
Re:Only when they don't already know? (Score:5, Informative)
Actually this is a double smackdown. They hold that
1) The act of decrypting would be testimonial in proving your control over the encrypted container.
2) Even if the decryption wasn't testimonial, compelling you to produce a part of the chain of evidence is also prohibited by the 5th amendment.
This is pretty much a full victory that your encrypted contents are immune from warrants, expect new keylogger laws shortly though... And it still needs to stand in the US Supreme Court before it applies to the whole US, but the ruling seems sound.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
If the government has a copy of a letter you sent, and it is destroyed in a fire, do
Foregone conclusion? (Score:2)
If you're absolutely certain what's in the encrypted archive, you don't need the encryption key at all.
Re: (Score:2)
Re: (Score:3)
Re:Foregone conclusion? (Score:4, Insightful)
I'm aware of that. It's a really bad decision. If the officer's testimony that the documents existed was sufficient to prove that the documents existed, the jury should be satisfied without seeing the documents. If the testimony of the officers was insufficient to convince the jury that the documents existed, then there is no foregone conclusion at all.
The decision is facially nonsensical. The judge fails not just at applying the constitution, but basic logic.
Re: (Score:3)
The judge does not fail at either constitutional law or logic. You, however, most definitely do.
The judge is issuing a warrant based on the officers testimony that there is good reason to believe evidence will be found. Said evidence (not the officers belief), if found, will then be used at trial.
The jury is looking at the actual evidence, not the officers belief.
Your idiotic 'logic' would imply that either a) actual evidence is not required at a trial, just officers testimony, or b) that the judge wo
How can they force you to remember something? (Score:5, Funny)
Seriously, cause my own memory really sucks, it would be nice if i could make myself remember things. How do i waterboard myself?
Did the submitter not read the article...? (Score:4, Informative)
Re:Did the submitter not read the article...? (Score:5, Informative)
I think they just linked the articles confusingly.
The first link is the 2nd Circuit Court of Appeals on Fricosu, which is a different case still ongoing.
The second link is the 11th Circuit Court of Appeals for another case where they now decided that forcing him to decrypt his hard drive would violate his 5th Amendment rights.
But how do you know if you know? (Score:4, Insightful)
Now, they could say that they know for certain that he's a lying sack of crap and force him to decrypt it anyway. No child porn evidence, but he's be embezzling from his company, according to what they find. Now what?
Re: (Score:3, Informative)
Let's say, hypothetically, John Doe gets brought up on child pornography possession charges. He has one computer in his home, and the cops are reasonably sure that said porn was accessed and stored at that physical location only. They order him to decrypt his hard drive, because they know it has evidence of his illegal porn habits. He replies, "No it doesn't. It has other stuff. Stuff you don't know about. You can't see it." Now, they could say that they know for certain that he's a lying sack of crap and force him to decrypt it anyway. No child porn evidence, but he's be embezzling from his company, according to what they find. Now what?
Fruit of the poisonous tree, that evidence would be inadmissible.
This is first year law school stuff...
Re: (Score:2)
Re:But how do you know if you know? (Score:5, Insightful)
Re: (Score:3)
We can't tell the difference between the cops "knowing" and the cops "believing". All we really know is that the cops asserted something. If they want us to believe it, it's their burden to produce proof. Forcing someone to provide incriminating testimony on the word of the police is blatantly unconstitutional.
Re: (Score:2)
That's the kind of scenario the 4th Amendment was intended to address. Unfortunately, the Constitution has become toilet paper when it comes to digital possessions and effects. And the Supreme Court, being a bunch of ancient farts (and a *conservative* bunch of ancient farts at that), has had its thumb implanted up its ass on the whole issue of anything related to "one of them new-fangled computing boxes" for a long time now.
Theoretically, in the non-digital world, the cops would have to have a warrant to s
Re:But how do you know if you know? (Score:5, Informative)
In the perfect world, that means that anything they find outside of that scope is inadmissible in a court of law, and, that if they investigate further solely based on the information found there, anything they find is inadmissible. Colloquially, it's called "Fruit of the poisonous tree"
Of course, we don't live in a perfect world, and that's not what "fruit of the poisonous tree" means at all. "Fruit of the poisonous tree" only applies to evidence that was obtained illegally. If the search was performed legally, anything a cop sees incident to that search, even if it's outside the scope of the warrant, is admissible.
If a cop illegally searches your house for weapons, and finds drugs, that's not admissible. If he gets a warrant to search your house for weapons, and finds drugs, that's admissible. If he searches your house on exigent circumstances(e.g. he claims he saw a suspect flee towards your property), and he finds drugs, that's also admissible.
Headline contradicts atricle (Score:2)
Two words: thumb drive.
Really? I mean really? (Score:5, Informative)
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
Correct. The 1st link she has to decrypt it because the trial judge ordered her to do so, and the appellate judge ruled against her because she hadn't actually been convicted of anything. Which I agree with. I'm sure in light of the 2nd link, she might win the appeal though, which is what I think should have happened in the 1st place.
New Miranda Warning (Score:5, Insightful)
What if you honestly forgot? (Score:2)
Would that mean an unappealable life sentence?
Re:What if you honestly forgot? (Score:4, Informative)
No... You can get a Writ of Habeas Corpus at some threshold. People keep claiming that they can hold you indefinitely under contempt- which isn't wholly true as this violates the Fifth Amendment.
Re:What if you honestly forgot? (Score:5, Informative)
https://en.wikipedia.org/wiki/H._Beatty_Chadwick [wikipedia.org]
14 years in prison because his wife claimed he was hiding money which the judge demanded that he produce for the court. In a child pornography case, you might spend more time in prison for refusing to decrypt your hard drive than you would have spent if you had been convicted.
Re:What if you honestly forgot? (Score:5, Informative)
Wrong. "civil" or "criminal" refers to the type of contempt, not the type of court case during which the contempt occured. Civil contempt is coercive (forward looking), criminal contempt is punative (for something that already occured). Coercing someone to produce evidence is exactly the kind of thing civil contempt is used for.
Under civil contempt the victim is said to "hold the keys to his own cage", which is used as an excuse to deprive him of any sort of due process whatsoever. It's barbaric and should be abolished.
Unenforceable laws (Score:3)
It seems to me that the courts generally frown on "unenforceable laws". In this case, if the government can't decrypt your hard drive without your cooperation, they can't really "force" you to reveal it. They could try to torture you for it, but that's, at least presently, illegal. They could throw you in jail, but if you know that the penalty for refusing to cooperate is less than the penalty for whatever crime your data might provide proof of, then the rational thing is just to take the penalty for refusing to cooperate.
So, fundamentally, unenforceable.
Re:Unenforceable laws (Score:4, Informative)
They could throw you in jail, but if you know that the penalty for refusing to cooperate is less than the penalty for whatever crime your data might provide proof of
You might not know that. The current record for longest time served for contempt of court is H. Beatty Chadwick, who spent 14 years in prison for failing to surrender money his wife claimed he was hiding during a divorce case. He could not have been imprisoned at all had he "cooperated," which in this case meant producing money that he did not have. Now, suppose you are accused of possession of child pornography, and you refuse to decrypt; if convicted, you might spend 5 years in prison, but you might be held indefinitely for failing to decrypt -- it is up to a judge to decide whether or not you have been held long enough. How do you even make a decision in that situation?
Now, deniable encryption systems might help somewhat in these cases, because in the United States the prosecution would have to prove that there is a second secret key that you failed to produce, which in a good system should be a hard thing to prove. Unfortunately, this could also mean being held in contempt if the police claim that they saw incriminating evidence on your computer, so clearly the passphrase you provided is not the one they are looking for.
Re: (Score:3)
I was quite curious about the Beatty Chadwick case, so I looked it up. Actually, while the headlines say he had to produce the money, that isn't quite true : he also would refuse to sign documents needed to actually investigate where the money was. Had he cooperated with the effort to find the money, and no funds could be found, he would have been released much sooner or not jailed at all. Most likely, he does have access to the money somehow, and he felt that giving up his life's fortune of severald mil
Re: (Score:3)
Now, suppose you are accused of possession of child pornography, and you refuse to decrypt; if convicted, you might spend 5 years in prison, but you might be held indefinitely for failing to decrypt -- it is up to a judge to decide whether or not you have been held long enough.
Actually that's exactly what happened in this case. He tried to invoke the 5th, was denied, continued to refuse and was held in contempt of court. The last lines of the PDF:
The refusal was justified, and the district court erred in adjudging him in civil contempt. The district court's judgment is accordingly REVERSED.
File as the Key (Score:2)
Go Truecrypt!!!!! (Score:5, Informative)
From the Opinion:
"But random characters are not files; because the TrueCrypt program displays random characters if there are files and if there is empty space, we simply do not know what, if anything, was hidden based on the facts before us. It is not enough for the Government to argue that the encrypted drives are capable of storing vast amounts of data, some of which may be incriminating. In short, the Government physically possesses the media devices, but it does not know what, if anything, is held on the encrypted drives."
Re: (Score:3, Funny)
You realize that TrueCrypt is a honeypot, right?
What I want to know (Score:5, Interesting)
11th Circuit Court of Appeals (Score:5, Interesting)
What I find heartening is that this is the 11th Circuit Court (Alabama, Georgia, Florida) -- i.e., not a court known for "wacky" decisions. If it were the 9th Circuit I would be more worried that this fight isn't over.
I particularly liked how the court used the government's own analogy of a combination to a safe to make their ruling. The ruling explained that the Truecrypt software shows random characters even if nothing exists on the hard drive, so if the hard drive is like a safe -- as the government contends -- then it can be full of incriminating evidence, or completely empty. There is no way for the government to know without opening the safe. Therefore the government cannot use the argument that the evidence was a foregone conclusion. Additionally, the court (thankfully) acknowledged that just because the defendant owns a safe, is not an indication that any criminal activity is going on. The ruling both turned the government's analogy on its head, and revealed that the court has a fairly good understanding of the technology.
Bomb password? (Score:4, Insightful)
Is there an encryption system available where if you put in a specifically bad password it damages the data forever?
I have no interest in kiddie porn but I sure as shit don't agree with people forcing me to decrypt.
Re:Bomb password? (Score:5, Informative)
Re:Bomb password? (Score:5, Informative)
Is there an encryption system available where if you put in a specifically bad password it damages the data forever?
It doesn't matter, for two reasons.
First, you can't do it, because standard procedure in cases like this is to duplicate the drive contents and do all analysis on the duplicate. If your system destroyed the data when a "duress" password is entered, it would only be destroying a copy.
Second, if you could do it you still probably wouldn't want to, because then you'd be prosecuted for destruction of evidence. I suppose if the penalty for destroying evidence is much lower than the penalty for the crime the contents of the drive would prove, that might be a good idea. But it still seems like you'd be better off just not saying anything.
Re:oh noes, a scumbag is going to jail (Score:5, Insightful)
No self-respecting tyrant would try to attack your rights without an excellent strawman. In your example, the scumbag is the strawman.
Re:oh noes, a scumbag is going to jail (Score:4, Insightful)
Her rights don't depend on you being more or less annoyed at what she's alleged to have done.
That what governments have always done - relied on the ignorance of the populace to usurp the rights of the unpopular to establish a precedent that's eventually used against others.
Re: (Score:2)
Did you just imply that you have evidence of wrongdoing on that phone?
Re: (Score:3)
Of course you can remain silent. You just have to write the password down in that case.