U.S. Court Extends Fifth Amendment to Encrypted Data

Recommended Videos

oktalist

New member
Feb 16, 2009
1,603
0
0
Bertinan said:
You can clear out bank accounts, steal credit card information, hire a hitman, whatever you want now.
So should we go back to the old days when hitmen kept a written record of their activities which they kept under their beds so it would be easy for the police to find?

Realitycrash said:
can someone PLEASE explain to me what the 5:th Ammendment is all about? Because after reading this, I imagined a scenario.
Imagine that there is a man that the feds [del]know of[/del] suspect, that have a trigger locked in a small box. If the trigger is not pressed within 24 hours, a bomb goes off somewhere, and a lot of people get killed. The feds [del]know[/del] suspect this, they have the man, he knows how to open the box, but he denies that there is a trigger in the box (though he confirms that there is something illegal in there, and that he can open the box, but he won't, because it would "incriminate himself"). The feds can not open the box without the bomb going off, nor can they find the bomb within 24 hours.
So, even though the man admits that he is hiding something illegal, and the feds have very strong evidence for thinking that this might be the trigger, they really can't force the man to open the box?
I fixed it for you.

Most countries have something similar. It's the right to remain silent.

The court can compel your man to open the box, as he has already admitted that he can, but it cannot compel him to reveal any information which resides in his brain.

Suppose you are suspected of an assault that occurred on a particular street. You are innocent, but you were walking down that particular street at the time the assault took place. If you told the police this fact, that would "incriminate yourself", even though you are innocent. It would be a piece of evidence they could use against you in a trial. You would be foolish to reveal this information to the police, and it would be wrong for a government to have the power to compel someone to reveal such information. By "pleading the fifth" you might seem to admit that there is some information that incriminates you (makes you appear guilty), but that does not imply any actual guilt. The Fifth Amendment is intended to protect the innocent from being compelled to incriminate themselves (make themselves appear guilty).

To apply a similar logic to the encryption argument, if I have an encrypted document on my computer all about how I really, really hate a particular person, and then one day this person turns up floating in the river with a bullet in his head, I'm sure as hell not going to want the police to be able to read that document.

Or if I keep a traditional, pen and paper diary, and in the entry for April 19th, I have written "JC" (using initials is a form of encryption), and on April 19th John Connor turns up in a similar river/bullet-based predicament, I am not going to want to tell the police that "JC" stands for John Connor. Of course if "JC" actually stood for Jackie Chan I would be happy to tell the police that.

Thyunda said:
Privacy is overrated when it starts interfering with the justice system.
This isn't about privacy at all.

Thyunda said:
People need to respect the police.
In the same way that we need to respect tigers.

'Never trust a copper' is 70s talk. I like to think we've come past that. If the officer asks 'what's in the box', you open the box. The law enforcement has a job to do. An important job.
And if law enforcement is investigating me, it's going to have to do that job without my help.

"Always trust a copper" is just as stupid as "never trust a copper".

The police are (mostly) honest people. The problem is they are honestly following a procedure that says: 1. Gather evidence. 2. Is there enough evidence to press charges? 3. If yes, press charges. There is no room for an officer to say, well, yesss... but I think we've got the wrong guy. If there's enough evidence, the charges get pressed, whether the police think he's guilty or not.

That procedure will and does lead to charges being pressed against innocent people every day.

If you disagree, then perhaps you'd like to explain to the class, in your own words, why, if at all, you think we need a criminal court system with juries of our peers.

Thyunda said:
Now let's not bring in the faults of the legal system here
The faults of the legal system are the only reason this thread exists. If the legal system was faultless, there would be nothing to discuss here.
 

Wintermoot

New member
Aug 20, 2009
6,563
0
0
what,s there to prevent you from making a kill switch?
somebody with childporn can easily delete all the data or destroy the storage medium.
or maybe a master key that unencrypts all forms of data.
 

Thyunda

New member
May 4, 2009
2,955
0
0
oktalist said:
Bertinan said:
You can clear out bank accounts, steal credit card information, hire a hitman, whatever you want now.
So should we go back to the old days when hitmen kept a written record of their activities which they kept under their beds so it would be easy for the police to find?

Realitycrash said:
can someone PLEASE explain to me what the 5:th Ammendment is all about? Because after reading this, I imagined a scenario.
Imagine that there is a man that the feds [del]know of[/del] suspect, that have a trigger locked in a small box. If the trigger is not pressed within 24 hours, a bomb goes off somewhere, and a lot of people get killed. The feds [del]know[/del] suspect this, they have the man, he knows how to open the box, but he denies that there is a trigger in the box (though he confirms that there is something illegal in there, and that he can open the box, but he won't, because it would "incriminate himself"). The feds can not open the box without the bomb going off, nor can they find the bomb within 24 hours.
So, even though the man admits that he is hiding something illegal, and the feds have very strong evidence for thinking that this might be the trigger, they really can't force the man to open the box?
I fixed it for you.

Most countries have something similar. It's the right to remain silent.

The court can compel your man to open the box, as he has already admitted that he can, but it cannot compel him to reveal any information which resides in his brain.

Suppose you are suspected of an assault that occurred on a particular street. You are innocent, but you were walking down that particular street at the time the assault took place. If you told the police this fact, that would "incriminate yourself", even though you are innocent. It would be a piece of evidence they could use against you in a trial. You would be foolish to reveal this information to the police, and it would be wrong for a government to have the power to compel someone to reveal such information. By "pleading the fifth" you might seem to admit that there is some information that incriminates you (makes you appear guilty), but that does not imply any actual guilt. The Fifth Amendment is intended to protect the innocent from being compelled to incriminate themselves (make themselves appear guilty).

To apply a similar logic to the encryption argument, if I have an encrypted document on my computer all about how I really, really hate a particular person, and then one day this person turns up floating in the river with a bullet in his head, I'm sure as hell not going to want the police to be able to read that document.

Or if I keep a traditional, pen and paper diary, and in the entry for April 19th, I have written "JC" (using initials is a form of encryption), and on April 19th John Connor turns up in a similar river/bullet-based predicament, I am not going to want to tell the police that "JC" stands for John Connor. Of course if "JC" actually stood for Jackie Chan I would be happy to tell the police that.

Thyunda said:
Privacy is overrated when it starts interfering with the justice system.
This isn't about privacy at all.

Thyunda said:
People need to respect the police.
In the same way that we need to respect tigers.

'Never trust a copper' is 70s talk. I like to think we've come past that. If the officer asks 'what's in the box', you open the box. The law enforcement has a job to do. An important job.
And if law enforcement is investigating me, it's going to have to do that job without my help.

"Always trust a copper" is just as stupid as "never trust a copper".

The police are (mostly) honest people. The problem is they are honestly following a procedure that says: 1. Gather evidence. 2. Is there enough evidence to press charges? 3. If yes, press charges. There is no room for an officer to say, well, yesss... but I think we've got the wrong guy. If there's enough evidence, the charges get pressed, whether the police think he's guilty or not.

That procedure will and does lead to charges being pressed against innocent people every day.

If you disagree, then perhaps you'd like to explain to the class, in your own words, why, if at all, you think we need a criminal court system with juries of our peers.

Thyunda said:
Now let's not bring in the faults of the legal system here
The faults of the legal system are the only reason this thread exists. If the legal system was faultless, there would be nothing to discuss here.
If you had nothing to hide, the investigation could write you off and go elsewhere. But if you insist on hiding it, you're only delaying it. But, then, I guess you can get away with anything as long as you encrypt the evidence.
 

rapidoud

New member
Feb 1, 2008
547
0
0
Athinira said:
Thyunda said:
Well this is just plain silly. What's he got on his hard drive that he doesn't want the FBI to see? He should have been put away for deliberate obstruction of justice. If you're threatened with a jail sentence, and all you have on your hard drive is a couple of embarrassing files, then surely you'd just let the FBI in?
Jesus, more people who doesn't understand how encryption works, nor the law.

First of all, there is a difference between "obstruction of justice" and "refusing to help". Refusing to help police build a case against yourself is not the same as obstruction of justice. You have NO obligation to help them, and giving that helping them is counter-intuitive to your case, why would you?

Second of all, as mentioned in my earlier posts, you cannot beat encryption. Ever. Hidden volumes means that encryption can cheat investigators, and they have no way to prove otherwise.

Thyunda said:
Privacy is overrated when it starts interfering with the justice system.
The man is innocent until proven guilty. To jail someone for "Obstruction of justice" (even though, as i explained, refusing to decrypt something isn't obstruction of justice), you first have to prove that there are justice to be dispersed in the first place. If the man is innocent (which is the governments job to prove that he isn't, and he isn't obliged to help them), then there is no justice to be dispersed.

Also i almost don't even want to touch terrible your logic is. By that argument, the government should install cameras in EVERY home in the United States so they could spy on us. Then they would be able to solve almost every case of domestic violence, robbery etc. Sounds like a good idea to you? :eek:)
Notice how you keep mentioning hidden volumes. Which I mentioned in my post.

Then the rest was just ranting, providing no discernible arguments yet providing analogies for it.
 

MrTub

New member
Mar 12, 2009
1,742
0
0
reonhato said:
Athinira said:
reonhato said:
i know the password to my mums computer because i have to fix it all the time, does not mean i know what the contents are.
...and similarly, being in possession of a computer with encrypted contents doesn't mean you know what the password for that content are :eek:)

reonhato said:
this is a simply case of a deliberate attempt at hiding evidence and refusing to hand it over. it should not be protected any more then shredding papers.
No, no and no.

First of all, nothing is hidden. The police have access to the data, they just don't have the knowledge of how to read it. Shredding papers is DESTRUCTION of data. An entirely different thing. Destructed things can't necessarily be reconstructed, and those papers can therefore be irrecoverably lost. Decrypted data can ALWAYS be recovered if someone knows how to do it.

Second of all, you assume beforehand it's evidence. Until the content is actually decrypted, you don't know if it was just random data, of if there was actually something of interest to the case.

Thirdly, you don't know if anyone is "refusing" anything. Until the data actually gets decrypted, you cannot conclusively prove that the defendant is actually capable of decrypting the data to begin with. The law states that you cannot be held in contempt of court for not doing something you are incapable of doing.

.

Since you decided to bring in the example with you knowing your moms password, allow me to extend your example:
Imagine that your mom gives you her computer since she has gotten a new one. A few months later, the feds knock on your door with a search warrant because they believe to have evidence that there are illegal content on your computer (or maybe they believe you are tax frauding and wants to seize any documents that could be relevant, including digital ones). On your computer they find a file of random data (from back when your mom had the computer), which they suspect is an encrypted file.

Now first, they demand you decrypt it. You deny being able to decrypt it, stating that it's a leftover file from when your mom was the proprietor. The feds talk to your mom, but she says she forgot the password (or maybe she isn't sure what file they mean or can't remember) since it's some months since she used the computer.

Now, by your logic, the feds can now charge both you and your mom for withholding evidence, even though they cannot conclusively prove that the file is actually an encrypted file, or that either of you actually know (remembers) a valid password for the file.

And once again, i will remind you that real criminals CAN and WILL cheat the feds with a hidden volume, one which you cannot prove the existence of.
but he did not refuse to do it based on not knowing how, he refused based on the 5th amendment. it is perfectly reasonable to assume that he knows how.

the idea that i am assuming it is evidence is wrong. i am assuming the investigators have reason to believe it is evidence. just like when they have reason to believe you are in possession of drugs they can get a warrant and search your house, they should be allowed to get a warrant to get access to the encrypted information.

they have reason to believe the encrypted info is evidence, they have reason to believe the man knows how to decrypt it. the man refusing to give them that information is breaking the law, the same way the druggie is breaking the law if he refuses to let the police search his house.

as for your example. simply dating the file would be enough evidence to see whos it is and who should be charged.
It's not the same way.

A more similar analogy would be that the feds has a warrant to search your house and the person allows them to search for it but refuses to help them find the item.
 

Maclennan

New member
Jul 11, 2010
104
0
0
Redlin5 said:
I wonder what it is like up here in Canada...
Well they dont currently even need a warrant to monitor our internet usage, only to force a ip to provide them access if the ip does not volunteer it. Based on that I would wager we would be forced to decrypt anything they asked us too.
 

MrTub

New member
Mar 12, 2009
1,742
0
0
reonhato said:
Tubez said:
reonhato said:
Athinira said:
reonhato said:
i know the password to my mums computer because i have to fix it all the time, does not mean i know what the contents are.
...and similarly, being in possession of a computer with encrypted contents doesn't mean you know what the password for that content are :eek:)

reonhato said:
this is a simply case of a deliberate attempt at hiding evidence and refusing to hand it over. it should not be protected any more then shredding papers.
No, no and no.

First of all, nothing is hidden. The police have access to the data, they just don't have the knowledge of how to read it. Shredding papers is DESTRUCTION of data. An entirely different thing. Destructed things can't necessarily be reconstructed, and those papers can therefore be irrecoverably lost. Decrypted data can ALWAYS be recovered if someone knows how to do it.

Second of all, you assume beforehand it's evidence. Until the content is actually decrypted, you don't know if it was just random data, of if there was actually something of interest to the case.

Thirdly, you don't know if anyone is "refusing" anything. Until the data actually gets decrypted, you cannot conclusively prove that the defendant is actually capable of decrypting the data to begin with. The law states that you cannot be held in contempt of court for not doing something you are incapable of doing.

.

Since you decided to bring in the example with you knowing your moms password, allow me to extend your example:
Imagine that your mom gives you her computer since she has gotten a new one. A few months later, the feds knock on your door with a search warrant because they believe to have evidence that there are illegal content on your computer (or maybe they believe you are tax frauding and wants to seize any documents that could be relevant, including digital ones). On your computer they find a file of random data (from back when your mom had the computer), which they suspect is an encrypted file.

Now first, they demand you decrypt it. You deny being able to decrypt it, stating that it's a leftover file from when your mom was the proprietor. The feds talk to your mom, but she says she forgot the password (or maybe she isn't sure what file they mean or can't remember) since it's some months since she used the computer.

Now, by your logic, the feds can now charge both you and your mom for withholding evidence, even though they cannot conclusively prove that the file is actually an encrypted file, or that either of you actually know (remembers) a valid password for the file.

And once again, i will remind you that real criminals CAN and WILL cheat the feds with a hidden volume, one which you cannot prove the existence of.
but he did not refuse to do it based on not knowing how, he refused based on the 5th amendment. it is perfectly reasonable to assume that he knows how.

the idea that i am assuming it is evidence is wrong. i am assuming the investigators have reason to believe it is evidence. just like when they have reason to believe you are in possession of drugs they can get a warrant and search your house, they should be allowed to get a warrant to get access to the encrypted information.

they have reason to believe the encrypted info is evidence, they have reason to believe the man knows how to decrypt it. the man refusing to give them that information is breaking the law, the same way the druggie is breaking the law if he refuses to let the police search his house.

as for your example. simply dating the file would be enough evidence to see whos it is and who should be charged.
It's not the same way.

A more similar analogy would be that the feds has a warrant to search your house and the person allows them to search for it but refuses to help them find the item.
no a more similar analogy would be that the feds have a warrant to search your house, they find a suspicious box but it is locked, around your neck is a key the same size as the lock for the box, they ask for it and you wave it in their face and say no.
No its not the same, since the feds have access to the information. You shouldn't be required to translate for them.

And honestly I do not see why anyone should be required to hand over the key (Of course then you would have to accept that feds would try to open it with other means and you should expect the safe to be broken into and you shouldn't be able to whine that they broke something).
 

Something Amyss

Aswyng and Amyss
Dec 3, 2008
24,759
0
0
DVS BSTrD said:
I find the FBI's decryption abilities far more contemptible than this guy's refusal to surrender the information.
I'm going to have to ask you to restrain yourself.

albino boo said:
And great day for fraudsters, drug dealers, corrupt politicians, the various mobs, hit men, the Ku Klux clan, the Aryan nation and the other terrorist groups out there. So if Enron had just encrypted all their data they could have walked away scot free after defrauding ten of thousands of poeple. Rod Blagojevich should have sent an encrypted email instead of selling Obama's senate seat on the phone and he wouldn't be doing 14 years and the democratic process would have been for sale. But hey data privacy is way more important than protecting the democratic process.
And think about all the criminals already protected by the fifth amendment! I mean, all a criminal has to do is take the stand and not incriminate himself!

And due process? Man, that shit puts millions of criminal on the streets again! Think about all the criminals we could catch if we stopped requiring things like probable cause and enforcing Miranda rights.
 

ThunderCavalier

New member
Nov 21, 2009
1,475
0
0
Yeah, I can see a bit of a problem here with the FBI wanting to force people to decrypt data.

Yet at the same time, encrypting your data obviously means that you have something to hide and some damn good reason to put a good enough encryption that the FBI can't solve it. Either that, or you have way too much time on your hands. I can understand avoiding self-incrimination, but is there really so much sensitive data that you're willing to hide from the FBI that you're going to call the Constitution out on them? I know that's what it's there for, but is it really worth the trouble?
 

Jodah

New member
Aug 2, 2008
2,280
0
0
I support this. It is no different than physical property. If the police have a search warrant for your property you don't have to give them the key. They can, however, kick the door down to get in. This is the same thing. You don't have to decrypt the data for them but they can break it themselves.
 

Athinira

New member
Jan 25, 2010
804
0
0
reonhato said:
no a more similar analogy would be that the feds have a warrant to search your house, they find a suspicious box but it is locked, around your neck is a key the same size as the lock for the box, they ask for it and you wave it in their face and say no.
Funny that you should touch this aspect. You see, The Supreme Court has already ruled on this issue several times in regards to opening Safe deposit boxes during a search and seizure. Their ruling is that the police can only compel you to give them physical keys to a safe (if you are in possession of those keys), but that they cannot compel you to reveal the combination to a safe.

A password to encrypted content is a hundred times closer to a combination than a physical key, and barring the Foregone Conclusion, that information is therefore testimonial and protected by the 5th Amendment.

reonhato said:
but he did not refuse to do it based on not knowing how, he refused based on the 5th amendment. it is perfectly reasonable to assume that he knows how.
No it's not. It's not "perfectly reasonable" to assume such things when you gambling with peoples freedom (or possibly lives) in the justice system.

Also, refusing based on not knowing how and refusing based on the 5th Amendment aren't mutually exclusive. Someone can take the 5th first, and then if a court rules that the 5th doesn't apply, they can still claim afterwards that they don't know how to open it (taking the 5th doesn't imply that you have to acknowledge to be able to open it, so it's perfectly possible to take up that position afterwards).

The 5th Amendment wasn't invented so that the courts could just go "Oh he isn't talking, so he probably knows something". That's not how it works, and choosing to take the 5th Amendment and not talking is not a freeride for either the police nor the courts to just go fabricate facts they can't find themself.

reonhato said:
the idea that i am assuming it is evidence is wrong. i am assuming the investigators have reason to believe it is evidence. just like when they have reason to believe you are in possession of drugs they can get a warrant and search your house, they should be allowed to get a warrant to get access to the encrypted information.
Physical items can often be linked to a person during the seizure. Digital information on the other hand can only be linked by analyzing it's nature. Since there is no way to analyze the nature of something that's encrypted, you can't link it to the defendant. For all you know, the encrypted information might as well be a file created by a piece of software that the defendant knows nothing about, in which case they can't decrypt it. It could also be a file from a massive file transaction that occured between the defendant and someone else at some point. It could be that the computer was bought used and the defendant hasn't formatted it, and the file isn't his. It could be that the file isn't encrypted but is just a chunk of random data (no way to tell the difference without decrypting it). The possibilities are endless.

And that's the core of the problem: You cannot prove that a defendant can actually decrypt something you want them to decrypt. And you cannot by law force them to reveal information regarding the encryption because the 5th Amendment protects their right to remain silent. So all you have left is guesswork, and guesswork doesn't hold up in court.

reonhato said:
they have reason to believe the encrypted info is evidence, they have reason to believe the man knows how to decrypt it.
No and no.

They have no reason to believe the encrypted info (if it's encrypted content in the first place) is evidence and that the guy can decrypt it. They have a suspicion. That's it. Suspicion and "Reason to Believe" are two entirely different things, and suspicion alone is not enough. You need to have SOMETHING.

In the Sebastian Boucher case, for example, the court put weight on the fact that Boucher had made the mistake of already showing ICE Agents some of the child pornography that was on his encrypted drive. That was enough for the court to invoke the Foregone Conclusion, and compel Boucher to show his decrypted drive. But if all you have is a bunch of random data you suspect MIGHT be encrypted and you suspect the defendant MIGHT be able to decrypt (emphasis on "suspect" and "might" in both cases), that's not enough. And even if you know if someone is able to decrypt it, the foregone conclusion is only invoked if the information you are looking for is well-known and not of vital importance to making the case (meaning that the could would likely be a successful prosecution without the information=. Otherwise the 5th shuts out all attempts of compelling someone to decrypt it.

reonhato said:
the man refusing to give them that information is breaking the law, the same way the druggie is breaking the law if he refuses to let the police search his house.
That's funny, because the court disagrees. But i guess you are the supreme authority on this kind of stuff?

/irony

You can prove that a house belongs to someone, and therefore that they have the capability of letting the police in if the police have a warrant (especially easy to prove if they are at home when the police arrives). You can't, however, necessarily prove that something is encrypted information in the first place, and that someone has the ability to decrypt it (even if it resides on their equipment). In addition, you cannot by the 5th Amendment force someone to give up information. Someone earlier made the good comparison of helping the police translate some text they found in your home during a seizure. You're not obliged to do that, just as you aren't obliged to help them read the contents of an encrypted drive.

So no, the man refusing to decrypt something is not breaking the law.

reonhato said:
as for your example. simply dating the file would be enough evidence to see whos it is and who should be charged.
No.

It's standard for encryption software to not modify the timestamp of encrypted files, so therefore the only thing a timestamp will tell you is when the file was last copied (possibly created, but that depends on the operating system and software used to handle files), and it's impossible to tell when the file was last used. Also, this only works for files, not encrypted partitions.

You go to court and call that "evidence" and they will laugh in your face, plain and simple.
 

dobahci

New member
Jan 25, 2012
148
0
0
ThunderCavalier said:
Yet at the same time, encrypting your data obviously means that you have something to hide and some damn good reason to put a good enough encryption that the FBI can't solve it. Either that, or you have way too much time on your hands.
The notion that "if you're not doing nothing wrong, then you have nothing to hide" is screwy logic which could be used to justify pretty much any kind of privacy-invading measure taken by the government. Privacy isn't just meant to protect people who "have something to hide", it's meant to protect everyone.

As for having too much time on your hands, it doesn't take much time at all to encrypt something, especially if the encryption software is already in place. If you already had set up whole-drive encryption to begin with, then the work is basically done for you. The average person can easily access encryption strong enough to defeat the FBI (or pretty much any other government agency) thanks to the work of the EFF and certain key individuals back in the 90s.
 

Daemonate

New member
Jun 7, 2010
118
0
0
albino boo said:
dobahci said:
This is a great day for all who value the right to data privacy.
And great day for fraudsters, drug dealers, corrupt politicians, the various mobs, hit men, the Ku Klux clan, the Aryan nation and the other terrorist groups out there. So if Enron had just encrypted all their data they could have walked away scot free after defrauding ten of thousands of poeple. Rod Blagojevich should have sent an encrypted email instead of selling Obama's senate seat on the phone and he wouldn't be doing 14 years and the democratic process would have been for sale. But hey data privacy is way more important than protecting the democratic process.
You fail completely to see the more subtle and frightening implications in this.

By requiring him to decode a drive, the prosecution are presuming without having proven that
1) The hard drive contains real data
2) The data that may exist is incriminating and / or at least subject to the subpoena
3) That he was the one who placed the data on the disk, and not someone else
4) And that therefore, he would know the password and also
5) He hasn't forgotten or lost the password

Essentially, if he decodes the drive he has proven the entire case the prosecution would otherwise have to prove to a jury. It's like the court ordering him to prove himself guilty and then jailing him for failing to do so.

This violates far more then the fifth amendment. This violates the presumption of innocence.

The above is analogous to accusing a man of murder and then jailing him for contempt of court for 'failing to show where he buried the body' without having yet proved a murder case.

Or, for that matter, accusing someone of witchcraft and drowning them to prove they are not a witch.
 

Daemonate

New member
Jun 7, 2010
118
0
0
ThunderCavalier said:
Yeah, I can see a bit of a problem here with the FBI wanting to force people to decrypt data.

Yet at the same time, encrypting your data obviously means that you have something to hide and some damn good reason to put a good enough encryption that the FBI can't solve it. Either that, or you have way too much time on your hands. I can understand avoiding self-incrimination, but is there really so much sensitive data that you're willing to hide from the FBI that you're going to call the Constitution out on them? I know that's what it's there for, but is it really worth the trouble?
Don't you see? The guy didn't admit "Oh yeah, all the proof of my crimes is on that drive there, lol BUT IM NOT GONNA DECRYPT IT! U MAD BROS"

He remained silent.

Who knows what's on those drives? Who knows if there's any data at all, and if there is who knows if it's actually his data and who knows if he actually remembers the password?

It is exactly the same as if the feds suspected you hid all your child porn in a basement somewhere, but they can't prove it. All they have is a photo of you going into an unmarked basement in your career as a removalist. And then the court ordered you to 'produce the porn you hid in the basement', even though you actually never had any child porn, you were just moving an old suitcase at one of your jobs.

And then by your argument, you said "wow man, you must have something to hide if you're hiding shit in basements".

Unless you admitted you hid child porn, the burden of proof lies with the prosecution to prove their case, not you!
 

Athinira

New member
Jan 25, 2010
804
0
0
reonhato said:
and they are just as wrong on that one as they are on this one. if they have enough evidence to believe you know the combination or the password it should be illegal to deny them entry.
You disagreeing with how the system works does not mean they are "wrong".

Also, you still fail to see that it's very hard to actually FIND evidence that someone knows the password. It's a very hard thing to prove, and if you loosen the rules for how much "evidence" (read: guesswork) is required to conclude that the defendant is capable of decrypting the information, then all you're going to do is send innocent people to jail when you hit upon cases where the people DON'T know how to decrypt the data.

Not to mention one more time that criminals can still cheat the system by using hidden volumes. It's literally IMPOSSIBLE to prove that a hidden volume exists without a confession. Criminals can keep data in hidden volumes and law enforcement would NEVER find it (or even any indication that it exists). So once again it will be a case of criminals just getting smarter, while the rights of regular people take another hit.

reonhato said:
peoples freedoms need a limit. when you are under investigation for criminal activity your freedoms need to take a hit for the good of society.
Yes, but peoples rights also need to be protected to prevent wrongful prosecution. The 5th Amendment is one of the core rights in that regard. The amount of people who have been wrongfully convicted because they didn't take the 5th Amendment are staggeringly high.

Imprisoning innocent people is not for the good of society. That is why people have these rights to begin with.

reonhato said:
if you are innocent then you have nothing to fear, and helping will only get your "freedom" back faster.
Wrong. When you are under criminal investigation, especially in the US, you always have something to fear. Go ask any defense attorney how this works (or watch the video i linked a hundred times in this thread by now).

Even if you are innocent of what they are charging you with, they might find something else that is either illegal or in a greyzone area and nail you for it (courtesy of the stupid juror system), as well as the ridiculous amount of confusing laws the US have which often works by point of reference to other regulations (that sometimes even involves people being able to be prosecuted for breaking foreign countries laws inside of the US).

Like mentioned in the video, it's very simple: Everything you say can be used against you, not for you.

reonhato said:
how do you know why the 5th amendment was included. your constitution interpretations have changed over time and is hardly concrete.
Because it's common knowledge for anyone who has actually bothered reading the history of the Amendment and how courts (especially the Supreme Court) have interpreted the Amendment through time, setting precedence for later court cases.

reonhato said:
the 1st and 2nd amendments are perfect examples of how certain things that are unconstitutional can be still done by the government and how big money and idiots can influence decisions.
You're confusing "interpretation" with "corruption" now. They are unrelated.

reonhato said:
like i have already said, i am assuming they have enough evidence to warrant what they wanted to do, after all they did get a court order to do it before it was overturned.
And it was overturned for good reason.

Having enough evidence to believe someone may be involved in criminal activity, and having evidence that someone might be able to decrypt something (if it's even encrypted data to begin with) are entirely unrelated.

reonhato said:
only some courts, and its not as if your country has a great track record in making good court decisions.
By "my country", I'm assuming you mean the United States. I hate to disappoint you, but I'm actually from Denmark. I study US Law as a hobby because the United States is a country with great influence that stretches far beyond their own borders.

And yes, the US Justice System has been known through times to make some bad decisions. That's why we have appeals, and the United States Supreme Court are known for taking many factors into account and making some very qualified decisions (although even they have made mistakes through time). One of the great things about appeals is that the court can take into account how the case went in the lower courts, which makes it possible to spot obvious mistakes or oversights, and allows them to get a clearer picture of the case. The United States Supreme Court are known to be especially rigorous about enforcing civil rights and ensure that no rights were broken during a trial.

reonhato said:
so they can only tell that the file was created before or after my mother stopped using the computer and gave it to me, o geez i wonder how that could possible be evidence on the owner of the file.
...because they can't tell if you also used the computer BEFORE your mom gave it to you (like you said, you know her password). They also can't tell if anyone else used the computer, which can include other users or even hackers/botnets. In fact, encrypted files on a hard drive might even be caused by Ransomware [http://en.wikipedia.org/wiki/Ransomware_(malware)].

There was a case here in Denmark once were a man was arrested for having child pornography on his computer. Fortunately for him, the police were able to determine that the computer was infected with a computer virus designed to download and distribute child pornography. The mans life was still partially ruined (his wife had to ask their children if he had ever touched them while he was imprisoned. The entire neighborhood mistrusted him even after he was proven innocent, meaning that had to move to another part of the country). Imagine that police hadn't been able to find that virus and just jumped to the conclusion that he was the distributor.

And this is why the courts would laugh at you. Your definition of what constitutes "evidence" are nothing but hunches and wild guesswork based on ignorance and lack of knowledge. If you ran the court system in the United States, half the population would be imprisoned by now :eek:)

You pull people into a court room for criminal prosecution, you need REAL evidence (as in "really really convincing" evidence). Even with the higher standards of what constitutes evidence that the courts hold over your (lackluster) standards, innocent people still get jailed.
 

Athinira

New member
Jan 25, 2010
804
0
0
Thyunda said:
If you had nothing to hide, the investigation could write you off and go elsewhere. But if you insist on hiding it, you're only delaying it. But, then, I guess you can get away with anything as long as you encrypt the evidence.
Except that this is not how it works. If you are suspected of a crime that you didn't commit and tell the police the truth:
- They're neither inclined nor obliged to believe you, even if you tell the truth
- There may still be evidence that points to you (maybe not enough to prosecute you, but enough to still make you a person of interest). The investigation isn't simply going to "move on" just because you come clean.

Also, even telling the truth can get you into trouble.

Let me give you an example:
Let's say a man was stabbed to death on the street outside of your house one night. You tell the police the truth: that you were home that night, but you were sleeping and didn't hear or see anything.

Everything you say to the police can only be used against you but not for you. Therefore, if the police suspects you might have done it, the prosecution in this case isn't going to care one bit about you telling them that you were sleeping and didn't see or hear anything. What they ARE going to care about, however, is the fact that you admitted to being home, and therefore in proximity of the murder (meaning you had opportunity). Now, this fact alone isn't enough to convict you, but if the police have some other evidence or material that points towards you (perhaps the victim was your neighbor, and you had recently had a dispute or something which would provide motive), then by telling them the truth you have given them the second half of the puzzle, enough to get a conviction.

By taking the 5th and remaining silent, it might not be possible for the police to prove you were in proximity of the murder, and therefore they can't prove you had opportunity. Remaining silent is ALWAYS your best bet in the states.

I'll just link this one more time. It explains ALL the problems you can run into by telling the police the truth instead of remaining silent, even if you're innocent (start at 13:30 if you are only interested in knowing how innocent people can get in trouble).
 

Eveonline100

New member
Feb 20, 2011
178
0
0
Realitycrash said:
Okey, I'm not from the US, so can someone PLEASE explain to me what the 5:th Ammendment is all about? Because after reading this, I imagined a scenario.
Imagine that there is a man that the feds know of, that have a trigger locked in a small box. If the trigger is not pressed within 24 hours, a bomb goes off somewhere, and a lot of people get killed. The feds know this, they have the man, he knows how to open the box, but he denies that there is a trigger in the box (though he confirms that there is something illegal in there, and that he can open the box, but he won't, because it would "incriminate himself"). The feds can not open the box without the bomb going off, nor can they find the bomb within 24 hours.
So, even though the man admits that he is hiding something illegal, and the feds have very strong evidence for thinking that this might be the trigger, they really can't force the man to open the box?
Really...?
I mean, really?
the 5th ammendment basically means a person can be force to incrimante themselves(the legal wording is much longer but thats the condenssed version).
For instance guy A is being interrgatoed by the cops and is forced by the cops to to turn over say a key to a lock box assuming he doesn't say anything illegal(if he did i'm pretty sure the cops could just go ahead and get a warrent) he could claim the 5th ammendment and cops wouldn't be able to force him to open it. (they could presuade him to open it but not force him to open it). Also in your situation the feds(FBI i assume) would either A get a warrent and force it open with some sort of power tool (drill, cutting torch or so on) or b claim "proabale cause" after all he did say something illegal was in the lock box which(to my understanding) is proable cause to get it open they may not be able to physically force to open it(i.e. put a gun to his head and tell to open) but they'll just mostly like grab a power drill to get the box open.