backtop


Print 125 comment(s) - last by Iketh.. on Jan 27 at 12:41 AM

Colorado U.S. District Judge Robert Blackburn said the Fifth Amendment does not protect her from the order

A Colorado woman was told to decrypt her laptop in court on Monday in order to aid prosecutors in her bank fraud case.

Ramona Fricosu, the defendant who was accused of bank fraud in 2010, had her laptop seized by authorities during the investigation. However, authorities stumbled upon a big problem while attempting to search her hard drive -- it was encrypted.

Full disk encryption, which prevents unauthorized access to data storage, is an option found in operating systems like Mac OS and Windows. The encryption can take decades to break, and if authorities tried to crack it, it could damage the computer.

That's why Colorado U.S. District Judge Robert Blackburn ordered that Fricosu decrypt her hard drive and return it to the court so prosecutors can use her files against her in the bank fraud case.

Fricosu used the Fifth Amendment to protect herself. She argued that the Fifth Amendment protects her from compelled self-incrimination, and that the judge's order violates this. However, Blackburn didn't agree.

"I conclude that the Fifth Amendment is not implicated by requiring production of unencrypted contents of the Toshiba Satellite M305 laptop computer," said Blackburn.

Assistant U.S. Attorney Patricia Davies backed Blackburn's order, saying that allowing encrypted content to defeat authorities would send the wrong message to other criminals. In her words exactly, it would be a "concession to her [Fricosu] and potential criminals (be it in child exploitation, national security, terrorism, financial crimes or drug trafficking cases) that encrypting all inculpatory digital evidence will serve to defeat the efforts of law enforcement officers to obtain such evidence through judicially authorized search warrants, and thus make their prosecution impossible."

Blackburn has ordered Fricosu to return the unencrypted hard drive by February 21. Civil rights groups are keeping a close eye on the case.

Sources: Wired, Fox News



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: Brute-force the PW?
By reddog007 on 1/25/2012 10:48:11 AM , Rating: 2
It depends on the password and encryption program used. If it is AES based like TrueCrypt, the feds can't even crack it. It can take billions of years to crack a password even using a supercomputer if you are using AES encryption. Even AES 128-bit.

Though if older, lower and/or weaker levels are used, and depending on the hardware it can take hours, days, weeks, months, years.

You'd figure they have already sent this laptop off to be decrypted, and the guys at computer forensics went, "you're sh/t out of luck."


"This is about the Internet.  Everything on the Internet is encrypted. This is not a BlackBerry-only issue. If they can't deal with the Internet, they should shut it off." -- RIM co-CEO Michael Lazaridis














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki