Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Encryption The Courts Your Rights Online

Federal Magistrate Rules That Fifth Amendment Applies To Encryption Keys 322

Virtucon writes "U.S. Magistrate William Callahan Jr. of Wisconsin has ruled in favor of the accused in that he should not have to decrypt his storage device. The U.S. Government had sought to compel Feldman to provide his password to obtain access to the data. Presumably the FBI has had no success in getting the data and had sought to have the judge compel Feldman to provide the decrypted contents of what they had seized. The Judge ruled (PDF): 'This is a close call, but I conclude that Feldman's act of production, which would necessarily require his using a password of some type to decrypt the storage device, would be tantamount to telling the government something it does not already know with "reasonably particularity" — namely, that Feldman has personal access to and control over the encrypted storage devices. Accordingly, in my opinion, Fifth Amendment protection is available to Feldman. Stated another way, ordering Feldman to decrypt the storage devices would be in violation of his Fifth Amendment right against compelled self-incrimination.'" If the government has reasonable suspicion that you have illicit data, they can still compel you to decrypt it.
This discussion has been archived. No new comments can be posted.

Federal Magistrate Rules That Fifth Amendment Applies To Encryption Keys

Comments Filter:
  • Nurz (Score:4, Funny)

    by Anonymous Coward on Wednesday April 24, 2013 @11:07AM (#43537429)

    V qba'g xabj, guvf ybbxf yvxr n ernfbanoyl fhfcvpvbhf cbfg gb zr...

  • Last Sentence (Score:5, Insightful)

    by steevven1 ( 1045978 ) on Wednesday April 24, 2013 @11:08AM (#43537445) Homepage
    Where did the last sentence in this summary come from? It seems to be completely contradictory to the main content. Elaborate?
    • Re:Last Sentence (Score:5, Informative)

      by TyIzaeL ( 1203354 ) on Wednesday April 24, 2013 @11:13AM (#43537511)

      This is a close call, but I conclude that Feldman's act of production, which would necessarily require his using a password of some type to decrypt the storage device, would be tantamount to telling the government something it does not already know with "reasonably particularity"

      I'm guessing this is the trick. The government doesn't know there is evidence on the storage device. It sounds like they are making the argument that compelling a password for discovery purposes is a violation, but providing one to give them what they know you have is not. At least, that's what it seems like they are saying to me.

      • Re:Last Sentence (Score:5, Informative)

        by Anonymous Coward on Wednesday April 24, 2013 @11:24AM (#43537667)

        It's a wink-wink that they have to add "possession of child pornography" to the charges also in order to compel the keys.

      • Re:Last Sentence (Score:5, Interesting)

        by Yebyen ( 59663 ) on Wednesday April 24, 2013 @11:29AM (#43537739) Homepage

        It reads differently to me. They do not know that he can decrypt the data (he could have destroyed the passphrase, or it was destroyed when left in the hands of an automated system and he was incarcerated), and compelling him to do so would be a) demanding that he prove that he could decrypt them, a "fact" about him that is not already known to be true (and could be incriminating.)

        The last sentence in the summary reads like nonsense to me and does not seem to contribute anything.

        They cannot compel you to do something they don't already know that you have the ability to do, and if it turns out later that they can decrypt the drive without your help, the fact that you were able to decrypt it would be the incriminating part (apparently) as much as whatever they had actually found on the drive. Even if they know there is illicit stuff on the drive (somehow) without having decrypted it, they do not know you have control over it (unless this was proven some other way.)

        It's like those cops that ask, "do you have any illegal drugs on you" -- if you show them, you waived your right to be protected from unreasonable search and seizure. They did not violate it. You did. Has your fifth amendment right been violated? They could have asked the dog, and he would tell them, but putting dogs on you without probable cause is almost certainly illegal search violation. If you are threatened with contempt if you do not decrypt the drive, even when they haven't proven that you even can, it's much the same situation.

        • Just curious since I seem to have missed this.

          When did being compelled to decrypt a drive, even if there is known evidence there, skip around the fifth amendment ie avoiding self-incrimination.

          • Re:Last Sentence (Score:5, Informative)

            by Yebyen ( 59663 ) on Wednesday April 24, 2013 @12:17PM (#43538327) Homepage

            We have to pass the bill to know what's in it...

            The argument I've heard is that, when information is at rest, it's not considered testimony for the information to be read (but some other form of discovery). Therefore if it can be shown that you're in a position to decrypt the drive, and the drive is admitted in discovery and you refuse to facilitate discovery, you are standing in the way of the discovery and can be held in contempt of court.

            If it has not been shown that the drive can be decrypted with information you have, or could reasonably be expected to have (say, it can be shown by inductive reasoning that the drive contains the log of your activities), or if for example the ownership of the keys or the drive and the encrypted data is in question, it's not reasonable to compel you to decrypt it under penalty of contempt. It hasn't even been shown that it's in your power to facilitate the discovery.

            You can be similarly compelled to provide paper documentation, even if it was sent through the mail. It's not testimony. It's facilitating (or obstructing) discovery.

            • Re:Last Sentence (Score:4, Interesting)

              by NatasRevol ( 731260 ) on Wednesday April 24, 2013 @12:21PM (#43538355) Journal

              Interesting, and good to know.

              From a non lawyer point of view, discovery that you provide, about yourself, sounds an awful lot like testimony against yourself.

              • Re:Last Sentence (Score:5, Informative)

                by gorzek ( 647352 ) <`moc.liamg' `ta' `kezrog'> on Wednesday April 24, 2013 @12:27PM (#43538413) Homepage Journal

                Basically, it is a crime to withhold evidence that the government knows you have. But you can't be compelled to provide evidence against yourself that the government doesn't know you have.

                • Now, define "know".

                  Is it the kind of "know" that torturers use when they say "we know you did it, just admit it and we'll stop waterboarding you"? Not very helpful.

                • Re:Last Sentence (Score:5, Interesting)

                  by tattood ( 855883 ) on Wednesday April 24, 2013 @02:01PM (#43539221)

                  But you can't be compelled to provide evidence against yourself that the government doesn't know you have.

                  What if the drive contains the evidence that they know you have, but it also contains other evidence that they do NOT know you have, which one would have precedence? If decrypting the drive will give them access to other evidence that would incriminate you in another crime.

                • by Hatta ( 162192 )

                  If the government already knows about the evidence, they don't need me to provide it.

              • by Yebyen ( 59663 )

                I agree and I am not a lawyer, however, I can see the argument that discovery is not testimony and I think I have it laid out approximately right. I am the IRS. I am investigating you for tax fraud. It's not illegal search for me to compel your bank statements (and not just because I'm asking the bank, rather than simply asking you to incriminate yourself. If it's known that you keep a ledger of your business dealings that could contain incriminating information, that can be compelled as well. Destroyi

                • Re:Last Sentence (Score:5, Insightful)

                  by Defenestrar ( 1773808 ) on Wednesday April 24, 2013 @12:56PM (#43538707)

                  Likewise, if there's good reason to believe that you have a different set of books in a safe, or perhaps a murder weapon - you can be compelled to give the combination. By providing the combination you are not confessing to fraud or murder - you already left that evidence; by not providing the combination you are standing in the way of the court to evaluate the evidence.

                  The fuzzy line is regarding whether there's reason to search in the first place (which is more of a question regarding the Fourth). Should the simple fact that a computer may have aided the crime be probable cause? Does there have to be evidence showing which computer was utilized (like only allowing the search of one computer behind a router's firewall instead of fishing in all of the computers - and what if there's multiple owners?...).

                  I think a really interesting test case would be if a criminal used a confession or otherwise key incriminating evidence as the pass phrase for an encrypted device. If they plead the Fifth, and then were compelled anyway - how much would be ruled inadmissible?

                  • Re:Last Sentence (Score:5, Interesting)

                    by Jane Q. Public ( 1010737 ) on Wednesday April 24, 2013 @02:48PM (#43539673)

                    "Likewise, if there's good reason to believe that you have a different set of books in a safe, or perhaps a murder weapon - you can be compelled to give the combination."

                    Not even.

                    In 5th Amendment cases, "reason to believe" is not good enough. Even probable cause is not good enough. They have to KNOW, already, that there is something illegal in there (and exactly what it is) before they can compel a password or a combination. See my explanation elsewhere in this thread.

                    If they don't already know it's there, beyond reasonable doubt, they can't compel you. Because then you would be incriminating yourself.

                    However, what they CAN do, if they have probable cause and it's something like a safe, is force it open. (If we assume they physically can. There are few things that can't be forced open given time and money.) If they force it open, there is no 5th Amendment question.

                    "I think a really interesting test case would be if a criminal used a confession or otherwise key incriminating evidence as the pass phrase for an encrypted device. If they plead the Fifth, and then were compelled anyway - how much would be ruled inadmissible?"

                    Because of what I just explained, that could never happen. If they already know that there is something illegal there, then they can compel you to divulge the password or combination. But if they DON'T already know, they can't compel you to divulge because the act of doing that would be incriminating yourself.

            • Re:Last Sentence (Score:5, Informative)

              by Jane Q. Public ( 1010737 ) on Wednesday April 24, 2013 @02:35PM (#43539539)

              "The argument I've heard is that, when information is at rest, it's not considered testimony for the information to be read (but some other form of discovery). Therefore if it can be shown that you're in a position to decrypt the drive, and the drive is admitted in discovery and you refuse to facilitate discovery, you are standing in the way of the discovery and can be held in contempt of court."

              If it has not been shown that the drive can be decrypted with information you have, or could reasonably be expected to have (say, it can be shown by inductive reasoning that the drive contains the log of your activities), or if for example the ownership of the keys or the drive and the encrypted data is in question, it's not reasonable to compel you to decrypt it under penalty of contempt. It hasn't even been shown that it's in your power to facilitate the discovery.

              You can be similarly compelled to provide paper documentation, even if it was sent through the mail. It's not testimony. It's facilitating (or obstructing) discovery.

              This is COMPLETELY off the mark. Here's how it actually works. (I should add that there have been several other cases about this point recently, and none of them ruled that it was "a close call", as this judge seems to think.)

              If the government does not know that there is illegal material, or evidence of illegality, in the encrypted material, it cannot compel you to give up the password because that would be testifying against yourself.

              There are a couple of essential points here: first, it has to be "a product of your mind". Something you know. Not some kind of item that they know exists. For example, in many circumstances you can be compelled to turn over a key to a locked door, because a key is not testimony. (Other matters surrounding a search of a locked room are beyond the scope of this post.)

              The second essential point is that the government has to KNOW there is something illegal in the encrypted data in order to compel you to give them the password. Not "reasonable suspicion" as OP states. It has to be known beyond reasonable doubt. Because -- and this is the big point -- if they already know it's there, then you aren't incriminating yourself... you have already been "incriminated". You aren't admitting to anything because the illegal material is already known to exist. So, since you can't be said to be incriminating yourself, they can compel you to give up the password.

              So let me give you some examples from other recent court cases like this one:

              Someone was suspected of fraud but the evidence was all encrypted. The government could not prove the fraud without that evidence, which they had good reason to believe ("reasonable suspicion" as OP described it) that the evidence was in that encrypted data. But because of that, the government could not compel the defendant to give them the password, because there was a real danger he would be incriminating himself, which the 5th Amendment says you can't compel.

              In another case, a man was crossing the border with a laptop. At the time, customs was allowed to search at will. (A Federal court recently ruled that government needs probable cause to search even at borders. But at the time, it was considered kosher.)

              The man's laptop was turned on but asleep. His encryption software was running, so an encrypted volume on his hard drive could be accessed. 2 customs agents saw child pornography in the encrypted part of the drive, before the man somehow managed to turn the computer off. When it was turned back on, of course the encrypted data was no longer accessible.

              In this case, it was ruled that the government could compel him to produce the password, because the government already knew there was illegal material there. He could not be said to be incriminating himself, because they already knew it was illegal. The testimony of 2 customs agent was acceptable "k

              • Re:Last Sentence (Score:4, Interesting)

                by femtobyte ( 710429 ) on Wednesday April 24, 2013 @02:57PM (#43539773)

                Your analysis is off-the-mark for this particular case. According to the judge's writeup linked in the summary, the prosecution in this case actually did have evidence that child porn files were being downloaded to the servers and saved to the encrypted disks. The reason that the defendant was granted 5th Amendment immunity is that the prosecution lacked evidence that he was the only person in control of the computers. Maybe someone else had broken in and set up the encryption without the defendant's knowledge? By turning over the encryption keys, the defendant would prove that he knew the encryption keys, and thus incriminate himself of being responsible for the porn-filled encrypted disks (instead of an unwitting victim of hacking).

        • Re:Last Sentence (Score:5, Insightful)

          by TheCarp ( 96830 ) <sjc AT carpanet DOT net> on Wednesday April 24, 2013 @12:52PM (#43538663) Homepage

          > They could have asked the dog, and he would tell them, but putting dogs on you without probable
          > cause is almost certainly illegal search violation.

          I would argue the dog itself doesn't even constitute a search since they are so unrelaiable IN THIS CASE. There have been some great studies which have shown that dogs are only really useful in cases where their handler has no notion of what he might find or where. So border checkpoints, or random bomb searches, they are great....

          The problem is, that when the handler suspects there may be something to find, the animal almost always "detects" something. A great study recently setup a course to test dogs and handlers. The handlers were told that there were drug and bomb scent samples throughout a church, some of which were marked, some which were not.

          The trick: There were no drug scent samples. ALL of the marked spots were fakes, even some which included some meat for the dog to get him interested in it.

          The result? Lots of "hits". Only a very small minority of search trials found no hits at all, and the highest percentage of hits were not in the places where there was meat for the dog, but where there was a flag for the handler to see:

          https://www.erowid.org/freedom/police/police_article1.shtml [erowid.org]

          Its really pretty striking that these are allowed at all. Its not even clear why a judge would issue a warrant for something this unreliable.

          • That's nice, but in February the Supreme Court explicitly ruled about dog searches, "tough shit, the searches are legally admissible, we believe cops more than we believe you".

            http://reason.com/blog/2013/02/19/scotus-approves-search-warrants-issued-b

        • No, I think some of the other people got it right. What all this means is that the 5th amendment applies if law enforcement does not know a priori that some important piece of evidence is encrypted.

          If they have a priori knowledge, they can ask for the keys and it has to be provided. But if they're only asking for the keys to find out if there's evidence, then the 5th amendment applies and it doesn't have to be provided.

          Either way, it's a good idea to not cave during the initial questioning and let the court

      • Re:Last Sentence (Score:5, Interesting)

        by janeuner ( 815461 ) on Wednesday April 24, 2013 @11:44AM (#43537967)

        Incorrect. The government knows that the specified files are (or were) on the storage device at some point. What it lacks is evidence that the defendant is capable of accessing that storage.

      • Re:Last Sentence (Score:5, Interesting)

        by Spazmania ( 174582 ) on Wednesday April 24, 2013 @12:05PM (#43538217) Homepage

        No, the trick is this:

        The government hasn't proven that Feldman *has* the encryption key. Compelling him to turn over the encryption key would be compelling him to admit that he has the key. The compelled admission that he has the encryption key is the fifth amendment violation.

        Had Feldman admitted that he had the key or if there was prima facie evidence that he possessed the key, the government could still compel him to provide it.

        • by gorzek ( 647352 )

          In other words, the key itself is considered evidence, rather than simply a means to an end. In order for the government to demand it, they would have to know you have it, and in this case, they couldn't demonstrate such knowledge.

        • by uncqual ( 836337 ) on Wednesday April 24, 2013 @12:54PM (#43538691)

          So, it's rather like if the police found a special car with very strong windows and combination locks. They have strong evidence that it's got a lot of heroin in it and want to get inside it to search it and have a warrant to do so but can't get it open.

          They think, but don't have much evidence to support that belief, that you had unrestricted access to the car interior and therefore have the combination and can open the door for them.

          What this ruling says is that they can't compel you to product the combination because then you would be being forced to reveal that you did, in fact, have the combination and, hence, access to the inside of the vehicle which would be incriminating given the contents of the car.

          If, however, they found a surveillance video that showed you opening the door of the car using the combination you could then be compelled to provide the combination as that would not reveal, for the first time, that you actually had access to the interior of the car.

          Is that correct?

          • by Hatta ( 162192 )

            That's some pretty involved mental gymnastics they came up with to work around the fifth amendment. In reality, it's much simpler. Any information a suspect provides is testimony. If that information increases the chance of the suspect being found guilty, then it is incriminating testimony. No one can justly be forced to provide incriminating testimony.

        • Had Feldman admitted that he had the key or if there was prima facie evidence that he possessed the key, the government could still compel him to provide it.

          So, the best thing to do, if any police or govt agency starts to ask you questions, you should immediately NOT talk to them, and lawyer up. Don't give them any information (such as this).

          From what I've been reading and watching, this is especially true if you are indeed, innocent.

          Shut up. Lawyer up.

    • Re:Last Sentence (Score:5, Informative)

      by MDMurphy ( 208495 ) on Wednesday April 24, 2013 @11:13AM (#43537515)

      It came from the linked article that references a rejected appeal in a bank fraud case concerning turning over an encryption key.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      I believe the distinction is that in Feldman's case, the act of decryption shows that he had access to and control over the storage devices. This, by itself, would apparently be incriminating.

    • By ordering to decrypt, the accused is compelled to tell the government what they are not already known, that is, the content of the encrypted drive that could be evidence against accused . Hence the 5th Amendment Violation

      • By ordering to decrypt, the accused is compelled to tell the government what they are not already known, that is, the content of the encrypted drive that could be evidence against accused . Hence the 5th Amendment Violation

        Wrong. They have the right to the information on the encrypted drive. What the government doesn't know is whether or not the accused is the one putting the encrypted data there. If he has the key, he is guilty - no need to decrypt the drive! If he doesn't have the key, he is innocent (all slightly exaggerated).

        • Wrong, the government has the right to break into the data, but not to force somebody to interpret the data for them.

          This would be a bit like if you had a secret crime lair where you kept all the evidence of your misdeeds. The government would have a right to search for it, but if they couldn't find it or couldn't figure out how to open it, they couldn't force you to open it for them or tell them where it is or acknowledge its existence.

          What's more, they couldn't force you to incriminate yourself against ot

          • This would be a bit like if you had a secret crime lair where you kept all the evidence of your misdeeds. The government would have a right to search for it, but if they couldn't find it or couldn't figure out how to open it, they couldn't force you to open it for them or tell them where it is or acknowledge its existence.

            A better analogy: There are guns hidden in a locked cupboard. It is locked, but can be opened with brute force. The police ask you to unlock it.

            The fact that you have the keys to unlock the cupboard is evidence against you. The police will get the guns with or without your help, but without your help, they find it much harder to prove that you owned the guns or knew about them. In this case, the fact that you can decrypt the drive can itself be evidence against you. Imagine the police lost the hard drive

    • by Spectre ( 1685 )

      In other words, if the law enforcement had a reasonable suspicion you have incriminating data of a particular kind (perhaps a list of the prostitutes you pimp for, whatever) and a reasonable person would assume that data is on the encrypted media, they could go through channels (subpoena, search warrant, some form of judicial writ) that would require you to decrypt the media for a search for that specific data.

      If law enforcement merely thinks you are a criminal (because you are living "above your means") an

    • I have the same question, but I think they meant that if they feel that you have data about something important going to happen. Like the Boston bomber if they had suspicion that his data contains information on more stuff to happen they can compel him to decrypt it. But I could be wrong.
    • Where did the last sentence in this summary come from? It seems to be completely contradictory to the main content. Elaborate?

      In this particular case, whether the defendant knew the password or not was in itself something that could be used as evidence against the defendant. Even if the hard drive had been destroyed or lost, supplying the password could be used against him. In a different case, if it is known that there is encrypted data and it is known that you have the password, and there is no evidence in the password itself, then they can compel you to decrypt.

    • by Okian Warrior ( 537106 ) on Wednesday April 24, 2013 @11:30AM (#43537747) Homepage Journal

      It's a subtle point described in the judges decision.

      If the government has knowledge of particular documents, they can force you to present them. This includes forcing you to open your safe or decrypting your hard drive.

      If the government has no knowledge of the contents of the hard drive, no information from other sources that indicate that you have specific documents it wants, then it can't force you to decrypt your hard drive.

      The judge's position was that since the government had no indication of whatever documents are on the hard drive, producing them tied the defendant to the documents - providing evidence of control and ownership. Since that evidence (control and ownership) was not available to the government beforehand, it would be compelled testimony.

      I think this is also reasonable in light of the fourth amendment. If the government doesn't have knowledge of specific documents, it can't go "rummaging around" on your disk looking for things.

      • by Hatta ( 162192 )

        If the government has knowledge of particular documents, they can force you to present them. This includes forcing you to open your safe or decrypting your hard drive.

        If the government already knows something, it doesn't need me to do anything. It can use the information that it already knows. If the government doesn't know something, and that something is incriminating, then forcing me to reveal that something violates my 5th amendment protection against being forced to bear witness against myself.

    • It brings encryption keys to pretty much the same status as locked safes. The government can't just order you to open it on a whim, but they can if they have reasonable prior evidence that there is illegal material contained within. To illustrate:

      Scenario 1: As a citizen, I step off the plane after getting back from a foreign country. Not knowing who I am, ICE goons randomly pull me aside and order me to give up the encryption key to my laptop. They have NO reasonable suspicion that doing so will yield i
    • It is explained in the ruling, explicitly.

      Page 8: "But the following question remains: Is it reasonably clear, in the absence of compelled decryption, that Feldman actually has access to and control over the encrypted storage devices and, therefore, the files contained therein?"

      Page 9: "I conclude that Feldman’s act of production, which would necessarily require his using a password of some type to decrypt the storage device, would be tantamount to telling the government something it does not already

      • Bleh, the second paraphrase should read:
        > If the government has reasonable suspicion that illicit media exists, but can not verify you have access to that illicit media, it can not compel you to retrieve that media.

    • Not from me.. ;-)

    • In TFA, they state that, in the latter case, the accused was compelled to reveal his encryption key because he was recorded in a discussion where he talked about the encrypted [device] containing incriminating information.

      In the former, the prosector's request was just a fishing expedition, so it was denied.

      It is an unsettling distinction. Computers hold so much information about nearly every aspect of our lives, it really doesn't seem right that one piece of evidence allow that to be pried wide open.

      Would

      • Would a warrant be issued to tear apart your home if it was overheard that you had a doobie in your sock drawer or would they limit the search to your sock drawer?

        If the evidence was what you presented, and they searched your kitchen cupboards, a lawyer would probably get any cupboard evidence suppressed. If they found heroin in the sock drawer, they could use that evidence.

    • Where did the last sentence in this summary come from? It seems to be completely contradictory to the main content. Elaborate?

      From summary: If the government has reasonable suspicion that you have illicit data, they can still compel you to decrypt it.

      IANAL - however.... ;)

      At least one possibility is that you can be granted immunity and compelled to testify or produce.

      Kastigar v. United States [ohio.gov]

      (1972), 406 U.S. 441 -- Use and derivative use immunity is coextensive with the protection of the Fifth Amendment. If a person who has been compelled to testify under a grant of immunity is later prosecuted, it is the burden of the government to prove incriminating evidence is derived from a wholly independent source.

      I believe there may be other possibilities as well.

  • by emddudley ( 1328951 ) on Wednesday April 24, 2013 @11:14AM (#43537535) Journal
    • by Anonymous Coward

      Bzzt. In this real life example, when the guys with the $5 wrench came along, the victim called his lawyer who brought in a judge who wields a $100 wrench.

      And it all happened (he beat the $5 wrench guys) because he encrypted. If he hadn't encrypted, he might not have ever known he was under attack (well, ok, in this particular example he actually did; most of the time you don't), wouldn't have been confronted with the $5 wrench, and wouldn't have have had the recourse of getting the judge to come in with

      • Examples of what's important are: your shopping list, where you're having dinner tonight, mundane thoughts such as "yes, I'll have another beer" and nearly anything else. Anything you say can be used against you, and I'm not quoting Miranda; I'm quoting reality itself.

        This is so very true. See Here [youtube.com] for details.

  • by fuzzyfuzzyfungus ( 1223518 ) on Wednesday April 24, 2013 @11:16AM (#43537561) Journal

    Does the 5th amendment right to avoid self-incrimination apply only to the particular charges being brough in a given case, or does it cover any statement that could be incriminating, even if it were in a different proceeding, or if the record from Case A were to be used as evidence in Case B?

    Say, in the case of an encrypted HDD, it's reasonably plausible that a broad spectrum of the suspect's electronic activities will be there. Common software tends to be a bit 'leaky' in terms of recording what it does(temp files, caches, search indexes, etc.) and most people don't have entirely separate computers for each flavor of crime they are engaged in.

    If somebody were being charged for one crime that probably left evidence on the HDD(kiddie porn, say); would the fact that they know that there is evidence of CC-skimming(but, unlike the kiddie porn, the feds have no circumstantial evidence or other grounds for belief) justify a 5th-amendment refusal to decrypt the volume? Would the other potentially-incriminating stuff be irrelevant because it isn't among the charges(even if the court record could be used as evidence to bring future charges)? Would the suspect be compelled to divulge the key; but the prosecution only have access to material relevant to the charges being filed, with some 3rd party forensics person 'firewalling' to exclude all irrelevant material?

    • by kscguru ( 551278 )

      Does the 5th amendment right to avoid self-incrimination apply only to the particular charges being brough in a given case, or does it cover any statement that could be incriminating, even if it were in a different proceeding, or if the record from Case A were to be used as evidence in Case B?

      No, it applies to all cases ... if you state something in case A, it can be used in case B. Which is the point of the protection: if you are on trial for jaywalking, and can "prove" that you were not jaywalking because

    • by Kjella ( 173770 )

      If somebody were being charged for one crime that probably left evidence on the HDD(kiddie porn, say); would the fact that they know that there is evidence of CC-skimming(but, unlike the kiddie porn, the feds have no circumstantial evidence or other grounds for belief) justify a 5th-amendment refusal to decrypt the volume?

      Well first of all if the police only knows that the material possibly or probably exists but not how you're implicated then the 5th should apply, since this whole case revolves around the testimonial value of decrypting the information. But if they find it proven through other evidence that you have the decryption key, then decrypting it doesn't give any additional testimonial evidence. It does cause the involuntary production of evidence, but you can not refuse to give say a DNA sample that would prove you

  • by DNS-and-BIND ( 461968 ) on Wednesday April 24, 2013 @11:18AM (#43537591) Homepage
    This is all a big brouhaha over nothing. The Fifth Amendment has a remaining lifespan measured in years, not decades. There was already a call to give up on the Constitution [nytimes.com], naming the document "downright evil". Now we have Bloomberg saying that the Boston bombing will have to change the way we 'interpret' the Constitution. No, I'm not kidding, the Mayor of New York City really said these words:

    "The people who are worried about privacy have a legitimate worry," Mr. Bloomberg said during a press conference in Midtown. "But we live in a complex world where you're going to have to have a level of security greater than you did back in the olden days, if you will. And our laws and our interpretation of the Constitution, I think, have to change. Look, we live in a very dangerous world. We know there are people who want to take away our freedoms. What we cant do is let the protection get in the way of us enjoying our freedoms. You still want to let people practice their religion, no matter what that religion is. And I think one of the great dangers here is going and categorizing anybody from one religion as a terrorist. That's not true ... That would let the terrorists win. That's what they want us to do."

    Encryption keys? It's arguing about the wrong topic. These silly arguments about the Fifth Amendment will soon be about as relevant to our lives as the Austro-Hungarian Empire.

    • by Umuri ( 897961 )

      Did you even read the quote you posted?

      "The people who are worried about privacy have a legitimate worry," Mr. Bloomberg said during a press conference in Midtown. "But we live in a complex world where you're going to have to have a level of security greater than you did back in the olden days, if you will. And our laws and our interpretation of the Constitution, I think, have to change. Look, we live in a very dangerous world. We know there are people who want to take away our freedoms. What we cant do i

      • by CanHasDIY ( 1672858 ) on Wednesday April 24, 2013 @11:41AM (#43537909) Homepage Journal

        Hard to believe those are the words of mayor "You can't have a big soda, or smoke until you're 21, because I'm the government agent and I say so" Bloomberg...

      • by Nidi62 ( 1525137 ) on Wednesday April 24, 2013 @11:46AM (#43538005)
        I love how the person who said the part you highlighted is the same person who banned the sale of sugary drinks over a certain size in restaurants as well as enacted the greatest restrictions on the 2nd Amendment, and wants to hide cigarettes in convenience stores among other things. Someone needs to teach him what the word "hypocrite" means.
      • by moeinvt ( 851793 ) on Wednesday April 24, 2013 @12:27PM (#43538417)

        Yes, we live in a dangerous world where people like Michael Bloomberg want to take away our freedoms.

        No "terrorist" can ever take away our freedoms. Only governments are capable of using enough force against us to accomplish that.

      • by Sloppy ( 14984 )

        Now we have Bloomberg saying that the Boston bombing will have to change the way we 'interpret' the Constitution. No, I'm not kidding, the Mayor of New York City really said these words

        You introduce that as though it's some kind of extreme example, but don't you think it makes sense that people in government, SHOULD always be the main opposition to constitutional limits on government's power? If you ever find yourself looking to mayors, presidents, senators, councilors, etc to somehow use as inspiration or

        • by Sloppy ( 14984 )

          Sorry, Umuri, my thread-fu is weak. Would delete and repost in the right place if I could.

    • by Archangel Michael ( 180766 ) on Wednesday April 24, 2013 @11:38AM (#43537861) Journal

      We just had a demonstration that most people are willing to live under Marshal Law, have their houses searched, in a violation of the 4th Amendment. We have the federal government actively campaigning for the abolition of the 2nd. People being sued for speaking their mind (1st Amendment), and so on. So what is to protect us from government taking the 5th away? Not to mention that the Federal Government has consistently violated the 9th and 10th.

      IF we the people had any balls, we would be dragging President, most (if not all) of Congress into court and charged with treason. Problem is, who is able to arrest the President of the USA for Treason? Who is willing? Obama, GWB, Clinton ..... all are guilty. But stick a (D) or (R) after their name, and all of a sudden 1/2 the people will "like" what they are doing, say "It isn't that bad".

      No, it isn't "That bad". It is worse.

    • The article calling for giving up the constitution isn't calling for the establishment of a police state, as you seem to be implying. It's pointing out that arguing over interpretation of an ancient document that doesn't evolve with the needs of the time is unnecessary for freedom (as evidenced by other countries and America's presidents own frequent disregard for it), and causes unnecessary problems. Example: people who justify gun ownership not on any kind of reasoned argument about the needs of the time,

    • I can't get real worked up about that. You sound like a guy I know at work. You did forget the obligatory quote from Jefferson or another founding father containing dire warnings about giving up liberty.

      I've just heard too many people rant and rave for years about how the Constitution is being ignored, destroyed, etc. to get worked up about this. When George W. Bush was president, we heard that he was going to declare martial law and suspend the elections. Yet the man obeyed every Supreme Court dec
  • And requires the police and DA to do some detective work before a conviction is possible.

    As for leaders who are dissatisfied with the protections given in the constitution, use the democrat process that we have to amend the constitution. It's quite possible to change it. Don't like the 5th amendment, then propose something else. Ignoring the laws we have on the books isn't acceptable as then they will be inconsistently applied. Inconsistent justice is not justice at all.

  • by hawguy ( 1600213 ) on Wednesday April 24, 2013 @11:32AM (#43537787)

    What encryption algorithm did he use that's FBI-proof?

    • by PhxBlue ( 562201 )
      ROT-13.
    • Well, AES-256 is readily available but I guess only the Feds and the accused know what was used.

      Anything that is worth it's salt (pun intended) will cause grief for any person trying to decrypt the data. There's lots of tools out there, just go look at a few.

      I would recommend looking at TrueCrypt http://www.truecrypt.org/ [truecrypt.org] and OpenPGP http://www.openpgp.org/ [openpgp.org] first.

      • by hawguy ( 1600213 )

        Well, AES-256 is readily available but I guess only the Feds and the accused know what was used.

        Anything that is worth it's salt (pun intended) will cause grief for any person trying to decrypt the data. There's lots of tools out there, just go look at a few.

        I would recommend looking at TrueCrypt http://www.truecrypt.org/ [truecrypt.org] and OpenPGP http://www.openpgp.org/ [openpgp.org] first.

        Yes, I know there's lots of tools out there, that's why I asked the question. I've looked at a few, but I don't know which ones are so difficult to crack that the FBI was willing to try to get the judge to compel the defendant to reveal the key and risk having the judge rule that the defendant is within his rights to not reveal the decryption key. It seems like if the FBI secretly had the ability to break the encryption, they would have done that instead of risking that the judge would rule in the favor of

        • Well as of a year ago, here's a few tidbits on AES and the NSA.. [schneier.com] But that was a year ago and I don't think the NSA would be sharing
          their resources with the FBI on something like a potential kiddie pr0n case.

        • Another possibility, as the summary implies, they might be trying to get the defendant to provide the key just to prove that the defendant knew how to decrypt the hard drive and had access to the contents. That is a classic 5th amendment protection.
  • There is a baseline to all of this and that's: does the government know what's on the encrypted drive?

    If it does, such as in the case of the guy moving child porn across the border from Canada, the agents SAW the kiddie porn, so when ordered to decrypt the harddrive the government already knew what was on there.

    If the government doesn't know what's on there and only suspects it thats when the 5th kicks in.

    Make sense?

    • by moeinvt ( 851793 )

      "Make sense?"

      Not to me. If the government agents want to swear under oath that they saw the material, their testimony could be used as evidence. I don't see why their supposed "knowledge" should make any difference in the matter of whether or not the accused needs to turn over their encryption keys.

  • by Okian Warrior ( 537106 ) on Wednesday April 24, 2013 @11:50AM (#43538055) Homepage Journal

    I sometimes wonder at all the victimless crimes we seem to have.

    In this case federal prosecutors not only don't have a victim, they don't have evidence of a crime. The only way to convict the defendant is to get the evidence from him.

    I think the constitution was made specifically to protect us from these sorts of "investigations of suspicion"; specifically, the founding fathers recognized that many activities may seem suspicious from the outside and in certain contexts, but that the government can't simply come in and rummage around for reasons to arrest someone.

    This is especially salient in today's world, where innumerable crimes go unaddressed even though there are real victims, and investigating and prosecuting would be trivial. Spam, phishing fraud, identity theft, stolen laptops where the laptop tells the owner where it is, robocalling - all crimes where an average citizen has to beg the government to intercede... to no avail.

    Having "suspicious activity" but no evidence should be a clear signal to the authorities. Drop the case, or do something to get real evidence. This general "he's done something wrong, we only need the tools to do our job" thing has to stop.

    Do your job by protecting real victims.

  • I can't remember... (Score:2, Interesting)

    by Anonymous Coward

    Politicians, police, and heads of major bodies are trained to answer "I can't remember" to questions where a refusal to answer is not permitted.

    By Law, in the USA, the statement "I cannot remember" can NEVER be categorised as lying (without a freely offered self-confession of this fact). Understand that the USA is one of the obscene nations where lying to law enforcement goons is a serious criminal offence in itself, whereas the same law enforcement goons have full State authority to use lies as a tool of i

  • They are following the constitution. Now the neo-cons will be upset about that and insist that their buddies at SCOTUS to overrule the 5th.
  • Lessons (Score:4, Interesting)

    by Anonymous Coward on Wednesday April 24, 2013 @01:00PM (#43538751)

    Things I learned from reading the ruling:

    1. As usual, keep your mouth shut. The guy merely admitted that he lived alone in his current residence for 15 years before he got smart and lawyer-ed up, and that fact makes an appearance in the ruling. It doesn't hurt much and they would have figured it out anyway, but it definitely didn't help.

    2. Use whole-disk encryption and encrypt everything. All evidence against him mentioned in the ruling was obtained from unencrypted drives and were what should have been private bits and metadata that leaked or never making it to the encrypted drive, especially log files. They have highly incriminating file-names, drive letters, peer-to-peer download logs, basically a ton of metadata. While this ruling almost certainly doesn't cover all the evidence against him, it's not clear the FBI would have anything at all if it weren't for the two drives that they found unencrypted. Although they must have had something else to go after him in the first place.

    3. IMO he really dodged a bullet at least in this narrow instance. Crudely speaking, Judge says it isn't reasonable to conclude that both the files in question necessarily exist and that the defendant had access to them (it sounds like the real problem is the latter). This when they have file-names, log files, and the disks in question were taken from his residence where he has lived alone for 15 years, and while he certainly hasn't admitted the disks were his, I don't see an active claim to the contrary either (which I'd likely support but he needs to say it). I'm very pro-encryption and am generally not happy with the court compelling encryption keys, but this is one of the weakest cases for not doing so that I could think of, and is probably why the FBI decided to go for it and now potentially lost big if this it the burden or proof they are stuck with to prove ownership or control of data on a disk.

  • by Opportunist ( 166417 ) on Wednesday April 24, 2013 @01:14PM (#43538853)

    I have files on my Hard Drive that are encrypted, with the key being stored on a USB dongle. Unfortunately, that dongle went missing.

    So I now sit on a lot of files that I can't access and couldn't turn the key over (but hey, if you find the dongle in your search, be my guest), but I know the moment I delete them I find that darn dongle...

The most difficult thing in the world is to know how to do a thing and to watch someone else doing it wrong, without commenting. -- T.H. White

Working...