It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by shadow watcher
reply to post by ownbestenemy
I disagree to an extent because if you set the presidence (sp?) for decrypt on demand, it can be used as ammo for other instances. Self incrimination is not the answer.
Originally posted by namehere
seems to me that this guy is a porn addict who probably downloads anything without looking at the contents, the fact that only some is child porno yet still not enough to incriminate makes me think that it was stuff that was mislabeled, misleading or planted online to trick people into downloading child porn unaware.
decrypting the rest could land him in prison for things on his computer that he's unaware of, maybe thats why he refuses to do it, not because he's guilty but because he is afraid what else got on it without his knowing.
Originally posted by beezzer
reply to post by ownbestenemy
I was hesitant to look too closely at first because the supposed crime is disgusting. I know that should colour my opinion, but it does.
Perhaps that is the true test to the Constitutional aspects of any case.
To overcome ones personal bias and look at the case without personal judgment.
Originally posted by davespanners
reply to post by smyleegrl
I think the issue isn't that the police need permission to unencrypt the file but rather that i would take an inordinate amount of time and resources for them to be able to decrypt it at all.
So rather than a filing cabinet imagine an impenetrable safe with a 3000000000 number combination lock and you will be sent to jail if you refuse to tell the police the combination
A similar thing has already happened in the UK linky
A teenage takeaway worker has been jailed for four months for refusing to give child protection police the password to his computer.
Oliver Drage was originally arrested in May last year by a team of officers from Blackpool tackling child sexual exploitation.
The 19-year-old's computer was seized but officers could not access material stored on it as it was protected by a sophisticated 50-character encryption password.
Originally posted by DAVID64
They could get around this by cracking the files themselves. This can and would be used as a landmark, to side step the 5th Amendment, when it comes to computer files.
However, I don't see why the police just can't hire a techie to do it for them. It should be possible for someone that knows what they are doing to decrypt the files and see what turns up. Why is that so complicated?
Originally posted by roadgravel
The whole point of good encryption is that despite the knowledge of how it is done, it is very difficult, based on the number of operations required, to fabricate enough keys randomly to find the correct one. It is a time issue. If not the encryption would be worthless.
Originally posted by roadgravel
reply to post by Junkheap
With quantum based encryption, I would imagine.