User Panel
Quoted:
In this case, it's more like knowing the guy has the body inside a locked safe, and you obtained a search warrant to obtain entry. He's obstructing justice/ ignoring a warrant by refusing to unlock the door. Fifth Amendment covers TESTIMONY, not what is effectively destruction of evidence subject to a lawful search warrant. View Quote View All Quotes View All Quotes Quoted:
Quoted:
You're using indefinite detention to compel the accused to aid in their own prosecution. You're a cop aren't you, or maybe a prosecutor? How's this, a guy is accused of murder, but you don't know where the body is. Can you lock him up until he tells you where it is? Is that a violation of his rights, why or why not? The act of producing the electronic key is by nature testimonial. It proves he has access to the material on the drive. If they want the data, then they can break into the drive. Or not. But they can't force one to produce the contents of their own mind in order to produce more evidence. They've got plenty of evidence as it is, it's up to a jury to decide if it's enough to convict him. They don't want to take it to a jury because they want to create precedent for forcing people to turn over encryption keys just like the europeans have done. |
|
|
Quoted:
Can you block cops from coming into your house to collect evidence if they have a search warrant? If you do, can you be jailed and charged with a crime? View Quote |
|
|
Quoted:
4th Amendment actually has some say in that. View Quote View All Quotes View All Quotes |
|
Quoted:
Nah. plenty of 4th Amendment case law out there to support the State's position. View Quote View All Quotes View All Quotes |
|
This is like saying, "We know you killed the victim, but we cannot find the body. Tell us where you hid the body or we will lock you up for life for contempt of court." It can be applied to anything, from murder to a lost library book. Either provide evidence to aid the government or face prison until you do. It is obscene.
|
|
Quoted:
He's not doing shit, he's sitting in a cell. The authorities have the evidence, they just can't read it. It's no different than if he wrote in some language he invented and only he could read, can you lock him up and make him translate it? The clear intent of the 5th Amendment is to prevent the government from coercing people to aid in their own prosecutions because that is too readily abused. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
You're using indefinite detention to compel the accused to aid in their own prosecution. You're a cop aren't you, or maybe a prosecutor? The authorities have the evidence, they just can't read it. It's no different than if he wrote in some language he invented and only he could read, can you lock him up and make him translate it? The clear intent of the 5th Amendment is to prevent the government from coercing people to aid in their own prosecutions because that is too readily abused. |
|
|
Equally important to the self-incrimination issue is the basic due process issue, and the Courts have been ducking this for decades. Generally, the Courts have held that the defendant has the keys to their own imprisonment, but the legal profession has known for some time that indefinite imprisonment without a jury trial is not compatible with the Constitution. Usually they duck the issue by releasing the defendant after a year or so. But if they press this issue the courts may finally have to address it. They don't want to, because they want the threat of indefinite prison to scare compliance, but they may have to.
|
|
TLDR
File encryption protects you from everyone but the police and the government. Am I right? |
|
Quoted:
I know you're pissed that people can no longer hide their kiddy porn behind encryption but I'm not sure what translation of some imaginary language has to do with any of this. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
You're using indefinite detention to compel the accused to aid in their own prosecution. You're a cop aren't you, or maybe a prosecutor? The authorities have the evidence, they just can't read it. It's no different than if he wrote in some language he invented and only he could read, can you lock him up and make him translate it? The clear intent of the 5th Amendment is to prevent the government from coercing people to aid in their own prosecutions because that is too readily abused. |
|
Quoted:
I know you're pissed that people can no longer hide their kiddy porn behind encryption but I'm not sure what translation of some imaginary language has to do with any of this. View Quote We know that you don't like us plebeians using our rights, but calls if child porn aren't going to move me. |
|
Quoted:
No they won't. The encrypted drive could be mounted at any letter or path. The well designed software leaves no trace. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Forensics could show the drive being mounted and if you're lucky you'll see drive paths / file system references on the host machine. OSX doesn't use drive letters for one. There is no "well designed software." It is almost certain that there are plenty of references to the files on the encrypted drive in the main OS (in fact it's in one of the articles on this, I don't recall whether it's the one in the OP or another one I read). That information is enough to infer that there are files that are illegal on the encrypted drive. Still doesn't mean the state can force someone to decrypt the drive. Take it to a jury with the evidence they have, not the evidence they wish they had. |
|
Quoted:
Ok so you've got a warrant, that means you can access the drive. It doesn't mean that the accused has to help you access the drive. This is such a cut and dry 5th amendment violation that it's a wonder anyone can be so willfully ignorant as to not understand it. View Quote |
|
Quoted:
You clearly aren't familiar with how modern operating systems work. OSX doesn't use drive letters for one. There is no "well designed software." It is almost certain that there are plenty of references to the files on the encrypted drive in the main OS (in fact it's in one of the articles on this, I don't recall whether it's the one in the OP or another one I read). That information is enough to infer that there are files that are illegal on the encrypted drive. Still doesn't mean the state can force someone to decrypt the drive. Take it to a jury with the evidence they have, not the evidence they wish they had. View Quote The only thing that MIGHT be left behind is file names. There will be no hashes. There will be nothing that can prove beyond a reasonable doubt the nature of the files. |
|
Fun fact: The longest time a person has served for contempt was 14 years. Some lawyer from Pennsylvania really didn't want to turn over some funds to his ex-wife
|
|
Quoted:
Nope. I don't know a thing about mordern operating systems. That's why I said letter or path. The only thing that MIGHT be left behind is file names. There will be no hashes. There will be nothing that can prove beyond a reasonable doubt the nature of the files. View Quote View All Quotes View All Quotes Quoted:
Quoted:
You clearly aren't familiar with how modern operating systems work. OSX doesn't use drive letters for one. There is no "well designed software." It is almost certain that there are plenty of references to the files on the encrypted drive in the main OS (in fact it's in one of the articles on this, I don't recall whether it's the one in the OP or another one I read). That information is enough to infer that there are files that are illegal on the encrypted drive. Still doesn't mean the state can force someone to decrypt the drive. Take it to a jury with the evidence they have, not the evidence they wish they had. The only thing that MIGHT be left behind is file names. There will be no hashes. There will be nothing that can prove beyond a reasonable doubt the nature of the files. |
|
Quoted:
Can you block cops from coming into your house to collect evidence if they have a search warrant? If you do, can you be jailed and charged with a crime? View Quote Of course, if you don't, they are free to rip the door off the hinges. Same thing here. He's not blocking them; the police have possession of the thing they want to search. If they don't have the technological ability to 'rip that door of the hinges' that shouldn't be the problem of the accused. |
|
|
|
No, I'm not. But then again I know how computers work and I have extensive experience with a variety of file encryption software, including filevault.
|
|
Quoted:
No, I'm not. But then again I know how computers work and I have extensive experience with a variety of file encryption software, including filevault. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
You are making statements of absolutes when you don't have any of the details necessary to make those statements. Show me some documentation that shows that file hashes will be left behind when using filevault encryption. |
|
If what the court document said is true he needs to be shot.
Now OTOH If you don't have enough evidence to convict him or send him to court pedo boy goes free. Sounds like they have enough evidence to take him to trial, why do they need the pics? As much as I want to believe he is a pedo that needs shooting, there are other things that make me question the entire thing. I wonder how long you can be held in prison without being charged? I think he is just waiting it out. |
|
Quoted:
Great. I love to learn. Show me some documentation that shows that file hashes will be left behind when using filevault encryption. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
You are making statements of absolutes when you don't have any of the details necessary to make those statements. Show me some documentation that shows that file hashes will be left behind when using filevault encryption. |
|
Quoted:
It is quite interesting: https://cdn.arstechnica.net/wp-content/uploads/2017/02/fedsrawls.pdf View Quote |
|
Quoted:
Right, cause impeding an investigation and hiding evidence is no longer a crime. View Quote He has no obligation to help the investigation either, so it's a bit of a toss up. Otherwise we would charge everyone who plead not guilty with obstruction too, right? |
|
|
Quoted:
Josh is correct. You can start with the affidavit posted on page 1, for starters. Here's a hint: Lots of peer-to-peer software uses SHA-1 as part of their protocols / network. Lots of those programs write log files to the OS drive. You can figure the rest out yourself. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
Quoted:
You are making statements of absolutes when you don't have any of the details necessary to make those statements. Show me some documentation that shows that file hashes will be left behind when using filevault encryption. And I have figured the rest out for myself. SAH1 hashes are meaningless. Or perhaps you haven't heard about the SHA1 collision technique. |
|
Quoted:
Quite indeed. Although frankly it looks like they have enough to take it to trial as is. View Quote View All Quotes View All Quotes Quoted:
Quoted:
It is quite interesting: https://cdn.arstechnica.net/wp-content/uploads/2017/02/fedsrawls.pdf |
|
Related: Wasn't there a guy who had degaussing coils installed in the frame of his door, so when the authorities removed his computer, it was wiped clean? The guy was found guilty of destroying evidence, IIRC.
|
|
Quoted:
None of that relates to the encryption or OS leaving those hashes. That is the P2P program leaving hashes. And I have figured the rest out for myself. SAH1 hashes are meaningless. Or perhaps you haven't heard about the SHA1 collision technique. View Quote |
|
|
Quoted:
Can you block cops from coming into your house to collect evidence if they have a search warrant? If you do, can you be jailed and charged with a crime? View Quote View All Quotes View All Quotes Quoted:
Quoted:
You're using indefinite detention to compel the accused to aid in their own prosecution. You're a cop aren't you, or maybe a prosecutor? |
|
Quoted:
It's a birthday attack and irrelevant to the conversation. But please keep pretending you know what you're talking about. It's entertaining. View Quote View All Quotes View All Quotes Quoted:
Quoted:
None of that relates to the encryption or OS leaving those hashes. That is the P2P program leaving hashes. And I have figured the rest out for myself. SAH1 hashes are meaningless. Or perhaps you haven't heard about the SHA1 collision technique. |
|
Quoted:
Can you block cops from coming into your house to collect evidence if they have a search warrant? If you do, can you be jailed and charged with a crime? View Quote Let the jury decide. |
|
Quoted:
The question is really, "is providing the password providing testimony against ones self?" I'd say it is no more so than providing your address when the cops want to search your home. He's not being asked what he put on the drive but rather he's being required to provide access to the drive under a warrant. He has no obligation to help the investigation either, so it's a bit of a toss up. Otherwise we would charge everyone who plead not guilty with obstruction too, right? View Quote View All Quotes View All Quotes Quoted:
Quoted:
Right, cause impeding an investigation and hiding evidence is no longer a crime. He has no obligation to help the investigation either, so it's a bit of a toss up. Otherwise we would charge everyone who plead not guilty with obstruction too, right? |
|
|
Quoted:
It is worse than you know. A properly implemented whole disk encryption system is indistinguishable from random data. That drive could be empty. It might not even be encrypted. There may not be a key to unlock it. View Quote One password opens a empty folder, another opens the folder with all the files on it. Even better if the open folder has irrelevant files that mirror the used space taken up by the other files. |
|
Quoted:
But you don't have to help them search your house. In fact, usually help is not looked upon kindly. View Quote View All Quotes View All Quotes |
|
Quoted:
I know you're pissed that people can no longer hide their kiddy porn behind encryption but I'm not sure what translation of some imaginary language has to do with any of this. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
You're using indefinite detention to compel the accused to aid in their own prosecution. You're a cop aren't you, or maybe a prosecutor? The authorities have the evidence, they just can't read it. It's no different than if he wrote in some language he invented and only he could read, can you lock him up and make him translate it? The clear intent of the 5th Amendment is to prevent the government from coercing people to aid in their own prosecutions because that is too readily abused. They have enough evidence to convict this guy, they just want to be able to force people to do whatever they want good or bad. |
|
Quoted:
This is like saying, "We know you killed the victim, but we cannot find the body. Tell us where you hid the body or we will lock you up for life for contempt of court." It can be applied to anything, from murder to a lost library book. Either provide evidence to aid the government or face prison until you do. It is obscene. View Quote |
|
Quoted:
None of that relates to the encryption or OS leaving those hashes. That is the P2P program leaving hashes. And I have figured the rest out for myself. SAH1 hashes are meaningless. Or perhaps you haven't heard about the SHA1 collision technique. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
Quoted:
Quoted:
You are making statements of absolutes when you don't have any of the details necessary to make those statements. Show me some documentation that shows that file hashes will be left behind when using filevault encryption. And I have figured the rest out for myself. SAH1 hashes are meaningless. Or perhaps you haven't heard about the SHA1 collision technique. |
|
I've searched and can't find anything. Hopefully someone else remembers something.
|
|
Quoted:
Which just indicates that they're using this case as a tool to establish a precedent that they can coerce a defendant to provide encryption keys and aid in their own prosecution. They chose to use this case because it's obvious he has CP, and they want that emotional factor to override people's objectivity. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
It is quite interesting: https://cdn.arstechnica.net/wp-content/uploads/2017/02/fedsrawls.pdf |
|
Quoted:
Josh is correct. You can start with the affidavit posted on page 1, for starters. Here's a hint: Lots of peer-to-peer software uses SHA-1 as part of their protocols / network. Lots of those programs write log files to the OS drive. You can figure the rest out yourself. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Quoted:
Quoted:
You are making statements of absolutes when you don't have any of the details necessary to make those statements. Show me some documentation that shows that file hashes will be left behind when using filevault encryption. If he is a pedo I hope he goes to jail a long time. I however think he needs to go to trial and have his day in court hard drives or no hard drives. If they had enough evidence to deny his appeal why wouldn't they have enough info to take him to court? |
|
Quoted:
Ah, right you are. Just read up on the case under discussion. Seems they have proof of him downloading specific known kiddie files. Sounds like he left enough breadcrumbs on his Mac to eliminate doubt. He was likely caught in one of those FBI stings. Either FileVault is very secure (they can't break it) or they can break it but need to keep that capability in the dark by forcing him to provide the unnecessary keys. So many questions and I am morally torn because, while he no doubt faps to kiddie porn, he also has the same rights anyone accused of a crime should have. View Quote View All Quotes View All Quotes Quoted:
Quoted:
Quoted:
Yeah, it's bullshit. I've been following this case since the beginning and while I have no love for pedos, I do respect their rights as a US citizen and that includes illegal search and seizure and detention. The case hinges around a border agent catching a glimpse of what the THOUGHT was kiddie porn on the screen. The laptop then shutdown and now requires the PGP Whole Disk Encryption password to boot / decrypt the rest of the hard drive. So this guy is in prison because some border agent SAYS he saw what LOOKED LIKE kiddie porn. May have been some of that loli hentai stuff, may have been the real deal, whatever. The guy still has rights. This is also why it is important to NOT use the fingerprint recognition features of your devices. The DOJ can compel you to swipe a finger but cannot compel you to reveal the combination to your safe or the password to your device. I suppose they can lock you up forever without charges now instead. This is also why I want Apple et al to incorporate a fingerprint destruct scan. If you can set a device up to destroy the keys in the Secure Enclave you can effectively destroy all the data. Of course you also have to make the SE resistant to duplication. Gov't: Here, press your registered finger here. You: OK! {press} Phone: "Not recognized, try again" while destroying the SE in the background. Seems they have proof of him downloading specific known kiddie files. Sounds like he left enough breadcrumbs on his Mac to eliminate doubt. He was likely caught in one of those FBI stings. Either FileVault is very secure (they can't break it) or they can break it but need to keep that capability in the dark by forcing him to provide the unnecessary keys. So many questions and I am morally torn because, while he no doubt faps to kiddie porn, he also has the same rights anyone accused of a crime should have. |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.