Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Minnesota court takes dim view of encryption
CNET ^ | May 24, 2005 | Declan McCullagh

Posted on 05/24/2005 9:56:37 PM PDT by atomic_dog

A Minnesota appeals court has ruled that the presence of encryption software on a computer may be viewed as evidence of criminal intent.

Ari David Levie, who was convicted of photographing a nude 9-year-old girl, argued on appeal that the PGP encryption utility on his computer was irrelevant and should not have been admitted as evidence during his trial. PGP stands for Pretty Good Privacy and is sold by PGP Inc. of Palo Alto, Calif.

But the Minnesota appeals court ruled 3-0 that the trial judge was correct to let that information be used when handing down a guilty verdict.

"We find that evidence of appellant's Internet use and the existence of an encryption program on his computer was at least somewhat relevant to the state's case against him," Judge R.A. Randall wrote in an opinion dated May 3.

Randall favorably cited testimony given by retired police officer Brooke Schaub, who prepared a computer forensics report--called an EnCase Report--for the prosecution. Schaub testified that PGP "can basically encrypt any file" and "other than the National Security Agency," nobody could break it.

The court didn't say that police had unearthed any encrypted files or how it would view the use of standard software like OS X's FileVault. Rather, Levie's conviction was based on the in-person testimony of the girl who said she was paid to pose nude, coupled with the history of searches for "Lolitas" in Levie's Web browser.

Judge Thomas Bibus had convicted Levie of two counts of attempted use of a minor in a sexual performance and two counts of solicitation of a child to engage in sexual conduct. The appeals court reversed the two convictions for attempted use of a minor, upheld the two solicitation convictions, and sent the case back to Bibus for a new sentence.


TOPICS: Constitution/Conservatism; Crime/Corruption; Culture/Society; Government; News/Current Events; US: Minnesota
KEYWORDS: computersecurity; crime; encryption; govwatch; pgp; privacy; security; technology
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-90 last
To: ThinkDifferent

Not correct, unless "a little longer" means "trillions of times longer than the age of the universe".

LOL - well, that's just slightly longer than what we Texans mean when we say we're "fixin' to" do something, heheh.

You may be right about the math (I'm no mathematician).  I was under the impression that the NSA has access to the fastest supercomputers which could crack 256 bit encryption, given a few months to do so. 

Here's a link to an interesting commentary on the subject:

Code breaking by police and intelligence services

This sentence is from that article:

"A Swedish team managed to crack 256 bit encryption in around two weeks..."

Maybe that's all just hype - I don't know.  But the following links show info that in 1997, a non-government computer was built to crack DES (56 bit) and proved that it could be done when almost everyone was saying that it couldn't.

http://www.tropsoft.com/strongenc/des.htm

http://www.totse.com/en/privacy/encryption/161785.html

The best defenses (war or computer) will always eventually be overcome by new improved offenses, and the best offenses, likewise, will always be defeated by new and improved defenses - (IMHO) - at least, this has historically been true.

Thus, I agree with the end of your post where you said:

"... although it's entirely possible the NSA knows things that we don't."

LOL

FReegards,

RT

81 posted on 05/31/2005 3:19:02 PM PDT by RebelTex (Freedom is everyone's right - and everyone's responsibility!)
[ Post Reply | Private Reply | To 76 | View Replies]

To: RebelTex
"A Swedish team managed to crack 256 bit encryption in around two weeks..."

Unfortunately there's not much detail beyond that, so I don't know exactly what it means. It certainly wasn't a brute-force attack.

But the following links show info that in 1997, a non-government computer was built to crack DES (56 bit) and proved that it could be done when almost everyone was saying that it couldn't.

Sure, but 56 bits isn't that much. 2^56 = 72 quadrillion keys. Sounds like a lot, but it's easily within reach of today's computers, either by clustering a lot of them together or by building special-purpose hardware like the EFF did. But every bit you add *doubles* the number of possible keys, so a 64-bit key is 256 times harder to break than a 56-bit key (again, assuming brute force is the only possible way). Once you get up to 128 bits, it's effectively impossible, see the above post for more detailed math.

The best defenses (war or computer) will always eventually be overcome by new improved offenses, and the best offenses, likewise, will always be defeated by new and improved defenses - (IMHO) - at least, this has historically been true.

In cryptography, the defense has a huge advantage. If you have the key, it's almost as easy to decrypt a message that used a 128-bit key as a 64-bit key, but as I've mentioned, it's tremendously more difficult to extract that key if you don't have it. Which just means that snoops will have to resort to other tactics. The best encryption in the world won't help if the CIA is looking at your computer screen via a hidden camera.

82 posted on 05/31/2005 4:05:21 PM PDT by ThinkDifferent (These pretzels are making me thirsty)
[ Post Reply | Private Reply | To 81 | View Replies]

To: ThinkDifferent

"Once you get up to 128 bits, it's effectively impossible ..."

The math does indicate the difficulty in breaking, cracking, or decrypting it.

"In cryptography, the defense has a huge advantage."

True, but for some, that's the motivation to keep trying to break the code - it's the challenge.   Eventually, we will probably find a way to do so.  Who can say for sure?  (The only absolutes, I am sure about are God and Taxes, lol.)

"The best encryption in the world won't help if the CIA is looking at your computer screen via a hidden camera."

LOL - being paranoid doesn't mean that they're not out to get us, heheh.  

"Who knows what evil lurks in the hearts of men?  The Shadow knows!"  

And so do the NSA, CIA, IRS, FBI, DHS, etc., heheh.

83 posted on 05/31/2005 10:02:18 PM PDT by RebelTex (Freedom is everyone's right - and everyone's responsibility!)
[ Post Reply | Private Reply | To 82 | View Replies]

To: RebelTex

Puzzle Palace is a good book...


84 posted on 05/31/2005 10:03:30 PM PDT by TheOtherOne
[ Post Reply | Private Reply | To 83 | View Replies]

To: TheOtherOne

"Puzzle Palace is a good book..."

Thanks for the referral.  I just read the blurb on it and it sounds terrific - just the kind of stuff that fascinates me.

Thanks, again.

85 posted on 05/31/2005 10:12:17 PM PDT by RebelTex (Freedom is everyone's right - and everyone's responsibility!)
[ Post Reply | Private Reply | To 84 | View Replies]

To: RebelTex

honestly, I admit, it was so good (complicated) I could not read it straight through. It was however, one of the most informative books I have ever read.


86 posted on 05/31/2005 10:19:10 PM PDT by TheOtherOne
[ Post Reply | Private Reply | To 85 | View Replies]

To: TheOtherOne

a.k.a. it ain't an easy-read novel, but if you want to know how they laid the taps on trans-atlantic telephone cables (and the divers had directives to kill themselves before being caught) then you might like this book.


87 posted on 05/31/2005 10:20:56 PM PDT by TheOtherOne
[ Post Reply | Private Reply | To 86 | View Replies]

To: jimt
Hi jimt

"The judge making an idiotic ruling on possession of perfectly legal software is NOT a good thing. Possession of it is not indication whatsoever of criminal intent. "

I completely agree with your statement (I am a proud handgun owner for example).

However where I think we are not in agreement is that I believe IN CONJUNCTION with other more compelling evidence the possession of the software is compelling.

To give you a practical example if a man is arrested for possession of drugs and he claims the drugs are for his personal use, should further investigation reveal paraphernalia used for making deals or weighing equipment etc, then there is also now probable cause to assume that he is a commercial supplier and a dealer not a personal abuser. In this way the encryption software is not illegally owned that is not what the judge is saying, he is ruling that the software shows in conjunctions with other strong evidence that the person is guilty of not just a passing interest in child porn but has sophisticated strategy implemented to avoid detection.

There is a distinction here do you agree?

88 posted on 06/22/2005 3:37:46 AM PDT by Kelly_2000
[ Post Reply | Private Reply | To 65 | View Replies]

To: RebelTex
Hi RebelTex

"I disagree. Possessing a legal program or item does not show criminal intent. If it did, then we're all in trouble. For example: having a pack of cigarettes in your pocket while entering a 'smoke-free' building would be a crime (the criminal intent of smoking in a prohibited place being evident by the mere possession of a pack of cigarettes). "

I again disagree sorry ;-) The judge is not ruling that possession of the software is illegal, he is ruling it is significant indicator of guilt when other hard evidence exists in CONJUNCTION with the ownership of the software.

To demonstrate with your own example If you have a pack of cigarettes in your pocket and a bag of marijuana in your bag, chances are you are using them to mix together and make a "joint", this would indicate that you are a personal user not a dealer, this does not make the cigarettes illegal to own. If you had a bag of in marijuana in your pocket an NO cigarettes but individual bags for customers (which of course are also not illegal) then these two sets on evidence found in conjunction with each other demonstrate reasonable doubt to indicate that you are dealing.

Hope this clears up the points being made here :-)

89 posted on 06/22/2005 4:05:11 AM PDT by Kelly_2000
[ Post Reply | Private Reply | To 54 | View Replies]

To: SamFromLivingston

Bump for later.


90 posted on 06/26/2005 1:10:45 PM PDT by SamFromLivingston
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-90 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson