Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
 

seabeyond

(110,159 posts)
Tue Jan 24, 2012, 08:55 AM Jan 2012

Judge orders woman to give up password to hard drive

In the future, your hard drive may not be your hard drive: A federal judge has ruled that a Colorado woman, charged in a mortgage scam case, must turn over the password needed to decrypt her hard drive so that police can view the files on it.

Ramona Fricosu was given until Feb. 21 to comply with the order by U.S. District Court Judge Robert Blackburn. The judge said Fricosu's defense — the Fifth Amendment's right against self-incrimination — did not apply in the case, in which she is charged with bank fraud, wire fraud and money laundering. "I find and conclude that the Fifth Amendment is not implicated by requiring production of the unencrypted contents of the Toshiba Satellite M305 laptop computer," the judge said in his ruling Tuesday, as reported by CNET.

The Electronic Frontier Foundation, a digital civil liberties organization that filed an amicus brief on Fricosu's behalf, had argued that Fricosu should not be compelled to give up her password because it would violate her Fifth Amendment right, and there was no immunity "offered for loss of this protection."

*

But the U.S. Attorney's Office said in court documents that if Fricosuwasn't ordered to unlock her computer, it would result in a "concession to her and potential criminals (be it in child exploitation, national security, terrorism, financial crimes or drug trafficking cases) that encrypting all inculpatory digital evidence will serve to defeat the efforts of law enforcement officers to obtain such evidence through judicially authorized search warrants, and thus make their prosecution impossible.”

http://technolog.msnbc.msn.com/_news/2012/01/23/10219384-judge-orders-woman-to-give-up-password-to-hard-drive
___________________________

i read r heard something recently where you can be expected to give this shit up and turn it over in a divorce.

17 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Judge orders woman to give up password to hard drive (Original Post) seabeyond Jan 2012 OP
"I forgot my password. Sorry. Oops." n/t Ian David Jan 2012 #1
I think the idea is that she'll be held until she gives up the password. Tunkamerica Jan 2012 #3
Forgetting passwords is considered contempt of court. Kablooie Jan 2012 #4
Actually, in today's climate, it's probably a greater term Fawke Em Jan 2012 #12
That's bullshit. Self incrimination is self incrimination. Tunkamerica Jan 2012 #2
This isn't testimony, this is evidence. redqueen Jan 2012 #10
Actually, she *is* being forced... ljm2002 Jan 2012 #13
lol ok... redqueen Jan 2012 #14
If I was going to encrypt my hard drive madokie Jan 2012 #5
The other thread on this was only half an hour ago... TreasonousBastard Jan 2012 #6
Exactly. redqueen Jan 2012 #11
5th Amendment anyone? nt LaydeeBug Jan 2012 #7
Pro tip: If you're committing fraud you should really do that on a N7Shepard Jan 2012 #8
Yes, USB removable, and if need be, bootable external hard drive. nt ladjf Jan 2012 #15
Why would you do that MattBaggins Jan 2012 #16
Forget hard drives. RC Jan 2012 #9
If you really want privacy FreeJoe Jan 2012 #17

Kablooie

(18,608 posts)
4. Forgetting passwords is considered contempt of court.
Tue Jan 24, 2012, 09:07 AM
Jan 2012

The judge has the ability to decree that and throw you in jail without any real evidence.
It will probably be a lesser term than if you provide evidence of financial fraud though.

Fawke Em

(11,366 posts)
12. Actually, in today's climate, it's probably a greater term
Tue Jan 24, 2012, 11:20 AM
Jan 2012

than financial fraud.

Financial fraud doesn't seem to garner much jail time at all - especially if you're a 1 percenter.

redqueen

(115,103 posts)
10. This isn't testimony, this is evidence.
Tue Jan 24, 2012, 11:17 AM
Jan 2012

She isn't being forced to answer questions which might incriminate her.

ljm2002

(10,751 posts)
13. Actually, she *is* being forced...
Tue Jan 24, 2012, 11:26 AM
Jan 2012

...to answer a question which might incriminate her, i.e., "What's the hard drive password?"

I think the Fifth Amendment applies here.

redqueen

(115,103 posts)
14. lol ok...
Tue Jan 24, 2012, 11:38 AM
Jan 2012

I think that's one of those things which may fit the letter of the law, but not the spirit.

We'll see how it works out in the courts, not that I have any doubts.

madokie

(51,076 posts)
5. If I was going to encrypt my hard drive
Tue Jan 24, 2012, 09:23 AM
Jan 2012

I'm not sure I'd not use a key sequence that I had no idea as to what I used so I could say, Hey I don't know it, figure it out on your own because I honestly didn't keep track of what keys I used or where in the sequence I used it.
I may be typing out my asss as I've never encrypted anything, to my knowledge that is.
SB

TreasonousBastard

(43,049 posts)
6. The other thread on this was only half an hour ago...
Tue Jan 24, 2012, 09:58 AM
Jan 2012

and the story linked to said clearly that this may be no different than offering the keys to your safe when there's a warrant for the contents.

N7Shepard

(220 posts)
8. Pro tip: If you're committing fraud you should really do that on a
Tue Jan 24, 2012, 10:39 AM
Jan 2012

"separate hard drive" and have it removed most of the time.

Or buy new hard drives every month or so and destroy the old ones.

MattBaggins

(7,897 posts)
16. Why would you do that
Tue Jan 24, 2012, 01:38 PM
Jan 2012

when you can use a wiping program on your data?

Use an encryption system that requires a USB stick as a boondongle and then accidentally lose it.

 

RC

(25,592 posts)
9. Forget hard drives.
Tue Jan 24, 2012, 11:10 AM
Jan 2012

Use appropriately sized USB flash drives to store the data. They make them up to 256GB capacity.

FreeJoe

(1,039 posts)
17. If you really want privacy
Tue Jan 24, 2012, 01:50 PM
Jan 2012

Use a program called TrueCrypt. It is free and open source. It creates a large file that you can use as an encrypted drive. The best part is that you can have it set aside a portion that is hidden and looks like unused space. So you put the stuff you don't mind them finding in the main area and the stuff you want private in the hidden area. There is no way for them to know whether you have a hidden area or not, so they can't force you to reveal the password (unless you leave other evidence that points to the existance of the hidden area).

Latest Discussions»General Discussion»Judge orders woman to giv...