Skip to comments.
DOJ: We can force you to decrypt that laptop
CNET News ^
| JULY 11, 2011 12:07 AM PDT
| Declan McCullagh
Posted on 07/11/2011 10:39:22 AM PDT by Smogger
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100, 101-120, 121-140, 141-144 next last
To: Smogger
121
posted on
07/11/2011 3:34:23 PM PDT
by
JOAT
To: Smogger
If I was gonna be running a scam or other criminal enterprise - I would invest in an NSA-approved degausser for about $6K [1 minute cycle time].
I would only use external USB-powered hard drives for my laptop [for ease of getting it into the degausser FAST].
When the feds come knocking on the door, I would pop it into the degausser, turn it on, and take a minute or 2 to answer the door. They could then serve the warrant - but hard drive already degauused, no violation ... AND NO DATA for the feds!
122
posted on
07/11/2011 3:50:57 PM PDT
by
Lmo56
(If ya wanna run with the big dawgs - ya gotta learn to piss in the tall grass ...)
To: Squantos
...sort of what I was thinking. :-)
To: babygene; Smogger
The Feds or police can not only break the door down, but they can also charge you with obstructing the search warrant. Similarly, when someone has unique information and refuses to divulge it to a proper authority like a judge or grand jury, they can be jailed for obstruction or contempt.
The potency of these sanctions ought not to be scoffed at. For example, NY Times reporter Judith Miller was sentenced to 18 months in federal prison for contempt refusing to disclose that Scooter Libby was the source for her identification of Valerie Plame as a CIA agent. Miller eventually complied and was released after serving about two and a half months.
Similarly, a disgruntled tech employee changed administrative passwords and locked out the City of San Francisco from full control of its computer system. He was jailed and soon gave up the passwords -- but was still convicted and sentenced to fours years.
To: moehoward
The police often ask witnesses to appear at the police station and bring evidence along. When they are in a more forceful or less trusting mood, they show up with a search warrant and look for themselves.
To: Rockingham
In those cases neither was the target of the investigation. So it’s really apples and oranges.
126
posted on
07/11/2011 4:07:42 PM PDT
by
Smogger
To: GeronL
Already done. But you'll have to ditch MS-Windows like the bad habit that it is in order to have what you're asking for. Take any mainstream Linux system (Debian and CentOS work well) and read up on LUKS (Linux Unified Key System). There is a lot of available information about how to create a totally encrypted system. The HOWTOs are even available for doing this in a way where the encryption keys are NOT stored on the system, but rather on removable media (for example, a USB stick). An encrypted system using ANY asymetric encryption technique is just a non-recoverable bunch of junk if the keys aren't available, and a USB stick is a whole lot easier to destroy, or "lose" than an entire system, or even a single hard disk.
Encryption isn't the only issue though. Encryption doesn't solve the entire problem. You could fully encrypt your system and somebody like me merely needs to access it when you aren't around and they'll get your passphrases anyway just by knowing the boot process well. This in itself is a good reason to keep the keys on separate media because having the passphrase at that point is only half the equation. The other areas to pay special attention to are physical access and integrity. Physical access is a little easier to contend with IF it's a laptop, or you remove the hard disk and keep it with you all the time. Integrity "can" be solved by tuning SELinux (Security Enhanced Linux).
Microsoft has made the above out of reach via any of their products. Debian and Ubuntu Linux actually give you the option of building a "mostly" encrypted system when you install them. But there's still a lot to it and it's beyond most "normal" computer users. :-)
...and there's the issue of secure communications... lets not even go there. :-)
To: hiredhand
cool.
If I have a reason I will definitely look into that.
128
posted on
07/11/2011 4:17:32 PM PDT
by
GeronL
(The Right to Life came before the Right to Happiness)
To: CA Conservative
But who is to say if it is the PC’s owner doing the encrypting or a trojan virus?
129
posted on
07/11/2011 4:19:35 PM PDT
by
B4Ranch
(Allowing Islam into America is akin to injecting yourself with AIDS to prove how tolerant you are...)
To: Rockingham
>>The police often ask witnesses to appear at the police station and bring evidence along.<<
That’s a visit my attorney can make by himself.
130
posted on
07/11/2011 4:26:14 PM PDT
by
B4Ranch
(Allowing Islam into America is akin to injecting yourself with AIDS to prove how tolerant you are...)
To: Smogger
I don't know if any actual Nazi had ever said it, but it sounds an awful lot like the old movie line, "Ve haff vays to make you TALK!!!"
131
posted on
07/11/2011 4:28:40 PM PDT
by
jmcenanly
( "We pay a person the compliment of acknowledging his superiority whenever we lie to him." -Samuel)
To: B4Ranch
But who is to say if it is the PCs owner doing the encrypting or a trojan virus? Depending upon the operating system, it is not that hard to determine what user account was logged in at the time, and to determine if the application was lauched by a process (trojan) or by a user (interactive).
To: Smogger
Not so. The computer tech was the target and did time because he disabled control by the system’s administrators and caused the city to incur substantial expenses.
To: Smogger
Not so. The computer tech was the target and did time because he disabled control by the system’s administrators and caused the city to incur substantial expenses.
To: Rockingham
Presumably he could have NOT given up the passwords and still be convicted of tampering with system.
135
posted on
07/11/2011 4:45:47 PM PDT
by
Smogger
To: B4Ranch
That can move one from the category of witness to target.
To: Doe Eyes
--
In addition to a password that decrypts the computer, there should be one that zeroizes it. --
Won't do any good. The government has copied the contents to separate media.
This is a simple battle of wills, government against the defendant. And, the government has the power of forced incarceration, etc.
137
posted on
07/11/2011 5:12:09 PM PDT
by
Cboldt
To: Smogger
Yes. Eventually giving up the passwords was probably raised as mitigation at sentencing.
To: Rockingham
Always assume that you are the true target when dealing with today’s police forces.
139
posted on
07/11/2011 6:26:14 PM PDT
by
B4Ranch
(Allowing Islam into America is akin to injecting yourself with AIDS to prove how tolerant you are...)
To: Syntyr
Thus, the false-data ideas.
140
posted on
07/11/2011 7:26:14 PM PDT
by
Gondring
(Paul Revere would have been flamed as a naysayer troll and told to go back to Boston.)
Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100, 101-120, 121-140, 141-144 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson