Compare cert salaries and plan your next career move
tpatt100 wrote: » I'm not seeing what the controversy is??
WafflesAndRootbeer wrote: » It involves the concept of self-incrimination if you are forced to give up personal knowledge that would otherwise be completely inaccessible because it resides only in your mind.
tpatt100 wrote: » But how is that different than a search and siezure with a warrant of your property? If you have a key code on your house locks and the police have a search warrant, are you not forced to unlock your home to let the police in?
Bl8ckr0uter wrote: » But if the information leads to "evidence" then what's the difference? I just hope she used a truecrypt hidden volume:TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux - Hidden Volume
RobertKaucher wrote: » A lot. They should already have evidence that a crime has been committed and enough evidence to get a warrant. If an officer serves a warrant asking to search your car, you are expected to open it. Same for your home and any rooms with in. Could that not lead to evidence? The 5th amendment is designed to keep you from bearing witness against yourself, not allowing you to prevent law enforcement from doing their jobs.
Bl8ckr0uter wrote: » I think this opens up a whole new can of worms considering how flakey some warrants have been in the past (especially in this area). Of course in the next NDAA I wouldn't be shocked if the military will be allowed to force someone to decrypt their information if they suspect they are a terrorist.
coty24 wrote: » Many people see it as a violation of the Fifth amendment, but the workaround is persons of interest really don't have to "say" anything. So that technically wouldn't be covered by the "right to remain silent". It's seems a little in the grey area to provoke someone to decrypt their hdd; I think the problem is how it isn't an "illegal search and/or seizure". I think it is infringing on someone rights to do so, guilty or not. This kind of thing could open the floodgates for other types or crap to happen as well. Here's a possible scenario,"We believe you stole $1000 and put it in your bank. We order you to log in to your bank and let us check." How do they know the evidence is on that PC? I don't know the background on all of it, but it seems like they didn't have enough evidence to do anything to her so they made something. Maybe it's just me, but I don't like it.
ptilsen wrote: » As even the article mentions, the defendant can and should claim to be unable to decrypt the drive. It would be nearly impossible to prove that the defendant can decrypt the drive. If the defendant "forgets" the password or the password "doesn't work", the court has no recourse against the defendant.
Personally, I believe SCOTUS would likely consider a defendant providing the password to an encrypted hard drive containing incriminating evidence as being a "witness against [oneself]" and as such not something the court can compel under the Fifth Amendment. Just because AG "authorized" this doesn't mean it's going to hold water with SCOTUS.
Regardless of the law itself, I believe the intent of the Fifth Amendment is to provide Americans with the right to not incriminate themselves, directly or indirectly. I believe in this principle, and do not think the court made the right decision.
powerfool wrote: » The point that the justices made is that it isn't self-incriminating and therefore the Fifth Amendment doesn't apply. For instance, if they issue a subpoena for your firearms to perform ballistics test, you must comply, but you don't have to say anything about it... and they are applying the same logic here. I understand their perspective, but I disagree. For instance, if they ask you if the gun was you in the act of a crime, you can plead the Fifth... which is the same logic I apply to revealing a key. On Slashdot, they suggested making the key or keyphrase into an incriminating statement, therefore you could legitimately plead the Fifth because the key itself would be incriminating. There are plenty of things that can be done in these cases, as well. For instance, you can have a separate key that decrypts a different part of the hard drive that has different contents.
Bl8ckr0uter wrote: » Judge: Americans can be forced to decrypt their laptops | Privacy Inc. - CNET News Wow did anyone talk about this?
II. CONCLUSIONS OF LAWThe Fifth Amendment provides that “[n]o person . . . shall be compelled in anycriminal case to be a witness against himself.” U.S. CONST. Amend. V. Nevertheless, “the Fifth Amendment does not independently proscribe the compelled production of every sort of incriminating evidence.” Fisher v. United States, 425 U.S. 391, 408, 96 S.Ct. 1569, 1579, 48 L.Ed.2d 39 (1976). Instead, “the privilege protects a person onlyagainst being incriminated by his own compelled testimonial communications.” Id., 96 S.Ct. at 1580.
vinbuck wrote: » Apples and Oranges...other than providing the weapon for examination, nothing else needs to be done to be able to access it for ballistics tests. Questions about an alleged crime with the weapon have nothing to do with being able to have access to it. Providing a password in no way is any admission of guilt or confession to a crime, it's merely providing access.
RobertKaucher wrote: » I have to agree. I do find the strategy of making the key incriminating kind of funny. I would like to see how that would be treated in court.
Bl8ckr0uter wrote: » What are your thoughts ERP?
Compare salaries for top cybersecurity certifications. Free download for TechExams community.