http://www.cnn.com/2012/01/24/tech/web/judge-defendant-decrypt-laptop/index.html?hpt=hp_bn6 A judge on Monday ordered a Colorado woman to decrypt her laptop computer so prosecutors can use the files against her in a criminal case. The defendant, accused of bank fraud, had unsuccessfully argued that being forced to do so violates the Fifth Amendment's protection against compelled self-incrimination. "I conclude that the Fifth Amendment is not implicated by requiring production of the unencrypted contents of the Toshiba Satellite M305 laptop computer," Colorado U.S. District Judge Robert Blackburn ruled Monday (.pdf). The authorities seized the laptop from defendant Ramona Fricosu in 2010 with a court warrant while investigating financial fraud. The case is being closely watched (.pdf) by civil rights groups, as the issue has never been squarely weighed in on by the Supreme Court. Full disk encryption is an option built into the latest flavors of Windows, Mac OS and Linux, and well-designed encryption protocols used with a long passphrase can take decades to break, even with massive computing power. The government had argued that there was no Fifth Amendment breach, and that it might "require significant resources and may harm the subject computer" if the authorities tried to crack the encryption.
So if someone filmed themselves killing someone, and then encrypted the video on a laptop they own, it'd be against the law to get them to decrypt it, or have someone do it?
I'm not sure how personal property applies to the 5th Amendment. Sooner or later, somebody will be able to crack her encryption, anyhow. Although, I'm also not sure why the woman should be forced to open up her code, either, because that's basically using her to investigate herself. An interesting legal case.
That's really the issue here, isn't it? I can see the judge's reasoning, but I also can see MARIS' concern with that reasoning, too.
If a suspect locked a closet and that closet would take a LONG time to open but the suspect could easily unlock it, it doesn't seem like it's bad policy to be able to compel him to unlock it. I don't think that this "closet unlocking" would violate the fifth amendment, either, although I'm not certain. Data encryption is similar. There are algorithms that could take years of computer processing to decrypt, and the court being able to force someone to unlock it doesn't seem to be a bad thing. Ed O.
It's certainly illegal and un-Constitutional. I don't even see room for debate. Under our legal system a suspect is an innocent person. An innocent person cannot be forced to to aid his prosecutors. In fact, neither can someone who has already been convicted. This would be the same as forcing a bank robber/murderer to lead you to where he buried the money/body.
Maris is wrong as usual. It sure seems that a warrant that names the thing and time and place is fully constitutional. And unencrypted incriminating documents are subpoenaed all the time, legitimately. You can be compelled to testify against yourself - cannot plead the 5th - if you are granted immunity. In fact, it is unlawful to tamper with evidence.
If the prosecutors can easily read her financial records, the law says they can seize them and use them as evidence. But if they can't read them unless she self-incriminates and helps them, she does not have to. As for her immediate situation, fighting the illegal imprisonment, which will last for months preceding the trial-- If she's kept in jail for refusing to self-incriminate, well, she would have been in jail anyway, had she given the password, ensuring a guilty verdict. So there's nothing to lose--I'd advise her to not give the password, while of course appealing her illegal imprisonment while it lasts, which is what she's doing.
If she put documents that incriminate her in a safe, she'd have to open the safe. It's the law. This is a no-brainer.
None of that is relevant to this issue which is the government trying to physically force a person to provide evidence against herself. No search warrant can compel the accused to join the search party. If they can't find the evidence on their own, too bad. I suppose if it wasn't encrypted but it was too confusing for their analysts to understand you'd be okay with waterboarding her until she explained it?
No, she wouldn't. You're making shit up, AGAIN. In this case, they don't even know what is on her computer. They assume/suspect it may hold evidence, but have no knowledge that it has anything more than S2 posts. They're fishing and want the fish to bait their hook for them. They are inept at their job and are embarassing themselves.
I don't understand why the safe owner would comply, if the case depends upon evidence in the safe. It would be stupid to tell them the combination. It would be better to take a couple months in jail for not complying, until the prosecutor dropped the case, or until the person was found not guilty at trial. I have the same reasoning in this encryption case, so I would advise her not to disclose the password. She can't lose by not complying, other than a short illegal imprisonment. If she's found guilty without the encrypted evidence, she would have been found guilty with it too. It's a no-brainer.
This is unquestionably the best analogy for this situation. Is there a legal precedent for the state compelling someone to open their safe to provide evidence against them?
LOL. What law school did you attend? The finding is here: http://www.wired.com/images_blogs/threatlevel/2012/01/decrypt.pdf