It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by truthinfact
Hey I am siding with the courts, the judge did the right thing, HE GOT A WARRANT.
Nothing wrong with gettin' a warrant. She shouldn't'a' (should not have) done the crime!
Originally posted by DarthMuerte
Originally posted by truthinfact
Hey I am siding with the courts, the judge did the right thing, HE GOT A WARRANT.
Nothing wrong with gettin' a warrant. She shouldn't'a' (should not have) done the crime!
You can't get a warrant that forces a person to give up their 5th amendment rights. Just because she may be a slug does not mean that we want the precedent set allowing them to strip our right against self incrimination away from the rest of us.
Originally posted by AnIntellectualRedneck
I think she'd actually have to knowingly invoke the 5th amendment before it would actually be valid.
Originally posted by phishyblankwaters
reply to post by THE_PROFESSIONAL
Thoughts.
Simple enough, this is a joke and is an indication of the sickening levels we are allowing our governments to go do to restrict our freedoms.
As i stated in another thread on this subject, my solution would be a custom linux boot loader with a drive wipe software set to run the instant an "encryption password" is entered into a phony screen. Using a similar method to a rootkit, i'd ensure that program resumes when the laptop is booted, before being able to access any operating systems.
Since the data is encrypted, a single wipe pass would be ok, but for pure safety I'd suggest a 7 pass zeroing out of the drive with any software. The RCMP in canada use D.S.X. but anyone can easily get any number of disk wiping apps for free, legally, usually in the form of linux boot disks or flash key bootable programs.
If I were going to travel around with a laptop with "private" data, I would ensure the following:
"fastgate" or similar "preboot" mini os ability
a bios that is easily flashable, and customizable
A BIOS that allows you to set a boot password, and drive password, and a setup ( bios ) password
Preferably one with "stringent security" so removing the cmos battery does NOT wipe the password
Best case is a security chip (most HP business class notebooks) that has no back door password
encryption software that locks itself out after a set amount of failed attempts.
Aforementioned linux boot selection with fake encryption password prompt, that starts a drive wipe when the password is supplied (or isn't)
some of this sounds complicated, but thanks to the linux community, most of this is already done for you, creating a linux boot loader for your machine is literally a 4 minute process that anyone who can use notepad.exe can handle.
I'd suggest doing this BEFORE it becomes illegal, which would be the next logical step.
Originally posted by YouAreLiedTo
Originally posted by caladonea
If she has nothing to hide and didn't do anything wrong...why not just comply...then when it is all over...make a new password.
That is the same thinking they used during the witch hunts...
"Only a witch wouldn't take the test!"
-Victim, "Fine, I'll do it, I have nothing to hide..."
"Oops, the test killed them... But at least we know she wasn't a witch!..."
Or the nazis...
"Only someone hiding Jews wouldn't let us search their house..."
Victim, "Fine you can search my house for Jews... I have nothing to hide..."
"Oops, we accidentally burned your house down while investigating... But at least you weren't hiding Jews!..."
Originally posted by TrueBrit
Ok , heres a straight up FACT for everyones enjoyment. This whole scenario is bogus, and is being designed in order to make it appear as if anyone who has data on thier computer, has any defense against having thier information accessed by the government at any time.
The data could already have been in the hands of prosecutors, and her passwords, security systems, interesting homebrewed hacks and drive kills would have been circumvented utterly in under a day, by government employed hackers and forensic computer specialists, IF they really wanted into her data. Regular folks , and even highly skilled hackers are all fooling themselves if they think that electronic data, on any device, cannot be accessed by the tyrants at the drop of a hat.
Originally posted by THE_PROFESSIONAL
reply to post by TheExopolitician
My computer is fully 100% TrueCrypt encrypted with a 40 char password I only wish megaupload servers had used truecrypt on their servers as to keep their data confidential since they were confiscated.
Originally posted by truthinfact
Hey I am siding with the courts, the judge did the right thing, HE GOT A WARRANT.
Nothing wrong with gettin' a warrant. She shouldn't'a' (should not have) done the crime!
Originally posted by sweetnlow
I would have told the judge that the computer didn't belong to me and that i didn't have the password.
End of story