Colorado Woman Ordered to Decrypt Laptop in Bank Fraud Case
January 24, 2012 9:40 AM
comment(s) - last by
Colorado U.S. District Judge Robert Blackburn said the Fifth Amendment does not protect her from the order
A Colorado woman was told to decrypt her laptop in court on Monday in order to aid prosecutors in her bank fraud case.
Ramona Fricosu, the defendant who was accused of bank fraud in 2010, had her laptop seized by authorities during the investigation. However, authorities stumbled upon a big problem while attempting to search her hard drive --
it was encrypted
Full disk encryption, which prevents unauthorized access to data storage, is an option found in operating systems like Mac OS and Windows. The encryption can take decades to break, and if authorities tried to crack it, it could damage the computer.
That's why Colorado U.S. District Judge Robert Blackburn ordered that Fricosu decrypt her hard drive and return it to the court so prosecutors can use her files against her in the bank fraud case.
Fricosu used the Fifth Amendment to protect herself. She argued that the Fifth Amendment protects her from compelled self-incrimination, and that the judge's order violates this. However, Blackburn didn't agree.
"I conclude that the Fifth Amendment is not implicated by requiring production of unencrypted contents of the
Toshiba Satellite M305 laptop
computer," said Blackburn.
Assistant U.S. Attorney Patricia Davies backed Blackburn's order, saying that allowing encrypted content to defeat authorities would send the wrong message to other criminals. In her words exactly, it would be a "concession to her [Fricosu] and potential criminals (be it in child exploitation, national security, terrorism, financial crimes or drug trafficking cases) that encrypting all inculpatory digital evidence will serve to defeat the efforts of law enforcement officers to obtain such evidence through judicially authorized search warrants, and thus make their prosecution impossible."
Blackburn has ordered Fricosu to return the
unencrypted hard drive
by February 21. Civil rights groups are keeping a close eye on the case.
This article is over a month old, voting and posting comments is disabled
RE: I'm sorry...
1/24/2012 12:27:35 PM
I was wondering if some of the encryption software had a feature similar to what you suggest - wipe the hd starting with the encryption area if X number of incorrect password attempts or given. Or even have a special wipe password. Doesn't seem like it would be that difficult of feature to implement.
RE: I'm sorry...
1/24/2012 12:32:40 PM
If it isn't a feature now maybe it should be in light of some of the MPAA/RIAA lawsuits. Although don't hear too much about them now that they are on to the much bigger "shutdown the internet" SOPA.
RE: I'm sorry...
1/24/2012 5:25:44 PM
I do not know if it is a feature of any off the shelf apps currently available. However, it is a simple enough task to implement with some simple scripts and dedicated user account just for wiping that sensitive data when the judge demands it.
Since none of this applies to me I will offer a scenario. I would suggest making a secondary account on the device. Call it JIC (just in case) for example and create start-up scripts to silently run secure wipes of all the data you want destroyed. Then have it delete the JIC user and re-authenticate to your regular user. Run it on a SSD drive to help mask drive activity and speed up the process.
This method would not be immune from discovery, but if you deploy it properly you can give the impression that you have nothing to hide and avoid detailed inspection and likely avoid detection.
More social engineering then technical design.
"Death Is Very Likely The Single Best Invention Of Life" -- Steve Jobs
Study: SSDs Are Resistant to Current Data Erasing Techniques
February 22, 2011, 10:15 AM
Toshiba Self-Encryption Hard Drive Technology Debuts
April 16, 2009, 9:30 AM
Hard Drive Makers Settle on Single Encryption Standard
January 29, 2009, 10:10 AM
Apple Completes Purchase of Beats Music, Beats Electronics
August 1, 2014, 11:26 AM
HP to Launch Smartwatch Designed by Michael Bastian
August 1, 2014, 9:59 AM
New Qi Version 1.2 Allows Wireless Charging From 2 Inches Away
July 31, 2014, 3:53 PM
HTC J Butterfly Announced by Japan's KDDI, Packs LTE-A Carrier Aggregation
July 31, 2014, 2:34 PM
T-Mobile Subscriber Numbers Surpass 50 Million, Sees Q2 Profit of $391M
July 31, 2014, 12:24 PM
Verizon Wireless Launches 5.7", 960x540 LG G Vista Smartphone for $400 Off Contract
July 31, 2014, 11:02 AM
Most Popular Articles
Facebook Will Force Android, iOS Users to Use Messenger App This Week
July 29, 2014, 11:26 AM
Ford's Extensive Use of Aluminum in '15 F-150 Results in $395 Increase for Base Models
July 28, 2014, 3:02 PM
Sony's Xperia Z3 Gets Detailed in Leaked Photos
July 25, 2014, 2:30 PM
T-Mobile CEO John Legere is on the Warpath Again; Introduces $100, 10GB Family Plan
July 28, 2014, 10:12 AM
UK Drivers Must Now Give Their Cell Phones to Police After a Crash
July 29, 2014, 4:37 PM
Latest Blog Posts
Space Terrorism is a Looming Threat For the United States
Apr 23, 2014, 7:47 PM
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information