It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by smyleegrl
If they had a search warrant for pictures, say, and came across a locked file cabinet...could they open the file cabinet under the assumption that the pics might be there?
Seems to me this would fall under the same category. If the police are looking for child porn, and if this person downloaded said porn...chances are high he encrypted it. I don't think this should give him protection, nor do I think the fifth amendment should apply. I also think, if he refuses to decrypt, that the police have the right (under the search warrant) to decrypt it for him.
I'll admit, Wrabbitt, I'm not well versed in constitutional law or police procedures. Maybe the police need a new search warrant that includes the encrypted files, to be safe.
Originally posted by SaturnFX
The porn stuff isn't imminent danger..its pics or whatnot of a crime that happened long ago..but some anti-government person learning how to make bombs and the like..now that is an imminent threat.
Originally posted by grey580
Originally posted by terriblyvexed
They should just crack them themselves.
I don't understand the law well enough to say if it's an infringement on his rights,I guess computers weren't considered at the time..lol
Indefinite detention with no trial that is just wrong (scum bag should be strung up) and violates his rights.
Depending on the encryption a brute force attack could take years.
If he rar'd his files with encryption and the password is longer than 10 characters it could be impossible to crack.
Even with the latest techniques and hardware cracking encrypted files is not an easy thing to do.
Originally posted by Morningglory
Originally posted by SaturnFX
The porn stuff isn't imminent danger..its pics or whatnot of a crime that happened long ago..but some anti-government person learning how to make bombs and the like..now that is an imminent threat.
I would agree except for the recent case I heard about where a pedo was directing the abuse of children live on a web cam. Those children are in imminent danger.
I'm not in favor of going against the constitution for any reason but we are doing just that anytime it suits an agenda. If it's not ok to do it with pedos it shouldn't happen in the war on drugs/terror or when attempting to reinterpret the right to bear arms.
Originally posted by stormcell
Originally posted by grey580
Originally posted by terriblyvexed
They should just crack them themselves.
I don't understand the law well enough to say if it's an infringement on his rights,I guess computers weren't considered at the time..lol
Indefinite detention with no trial that is just wrong (scum bag should be strung up) and violates his rights.
Depending on the encryption a brute force attack could take years.
If he rar'd his files with encryption and the password is longer than 10 characters it could be impossible to crack.
Even with the latest techniques and hardware cracking encrypted files is not an easy thing to do.
Any password can be cracked in a week. This baby cracks passwords at a rate of 348 billion per second:
securityledger.com...
Originally posted by Morningglory
Originally posted by littled16
reply to post by kerazeesicko
The Constitution is in place to protect ALL American citizens, and if we start making exceptions for particular cases eventually it would lead to no protection for anyone as more and more exceptions would be made until the Constitution is eroded completely.
I agree but in the name of protecting all American citizens exceptions are already in place concerning drugs/terrorism.
What could be gleaned from his hidden files? Could it save the lives of children who, by the very nature of the industry, are in imminent danger?
If the constitution is the last word then it should be across the board, no picking choosing who loses rights. If imminent danger is all that's required to forgo rights in the war on drugs/terror, then imo it should apply here as well or not at all.
Originally posted by Wrabbit2000
A portion of his drives are encrypted and the police can't or won't crack the encryption.
Source
But last month, prosecutors convinced Callahan to change his mind. Among other reasons, the authorities were able, on their own, to decrypt one drive from Feldman’s “storage system” and discovered more than 700,000 files, some of “which constitute child pornography,” the magistrate said.
Why oh why is it the most critical cases of Constitutional Law seem to involve the absolute least sympathetic defendants and cases? It's hard to even suggest something which may benefit a kiddie porn user.
Originally posted by smyleegrl
If they had a search warrant for pictures, say, and came across a locked file cabinet...could they open the file cabinet under the assumption that the pics might be there?
Originally posted by smyleegrl
Originally posted by InTheFlesh1980
Saw this in the news... tough call. I hate the child porn pervert but I love the freedoms defined by our laws (the implementation of which is debatable),
I'd have to side with the 5th Amendment. If he's guilty, prosecutors please find something else (anything) other than forcing him to decrypt his drives and self-incriminate.
What a screwed-up world we live in.
Indeed.
What if the only evidence lies in these encrypted files? Maybe I'm missing something, but why can't a search warrant include encrypted files?
Algorithms
MD5
md5($pass.$salt)
md5($salt.$pass)
md5(unicode($pass).$salt)
md5($salt.unicode($pass))
SHA1
sha1($pass.$salt)
sha1($salt.$pass)
sha1(unicode($pass).$salt)
sha1($salt.unicode($pass))
MySQL
phpass, MD5(Wordpress), MD5(phpBB3)
md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5
MD4
NTLM
Domain Cached Credentials, mscash
SHA256
sha256($pass.$salt)
sha256($salt.$pass)
descrypt, DES(Unix), Traditional DES
md5apr1, MD5(APR), Apache MD5
SHA512
sha512($pass.$salt)
sha512($salt.$pass)
sha512crypt, SHA512(Unix)
Domain Cached Credentials2, mscash2
Cisco-PIX MD5
WPA/WPA2
Double MD5
LM
Oracle 7-10g, DES(Oracle)
bcrypt, Blowfish(OpenBSD)
SHA-3(Keccak)
Half MD5
Password Safe SHA-256
IKE-PSK MD5
IKE-PSK SHA1
NetNTLMv1-VANILLA / NetNTLMv1+ESS
NetNTLMv2
Cisco-IOS SHA256
Joomla
osCommerce, xt:Commerce
nsldap, SHA-1(Base64), Netscape LDAP SHA
nsldaps, SSHA-1(Base64), Netscape LDAP SSHA
Oracle 11g
SMF > v1.1
OSX v10.4, v10.5, v10.6
MSSQL(2000)
MSSQL(2005)
EPiServer 6.x
OSX v10.7
vBulletin < v3.8.5
vBulletin > v3.8.5
IPB2+, MyBB1.2+
Originally posted by LeLeu
I think that if the guy has nothing to hide then he should comply with the courts request, especially if it could prove his innocents to the charges he is facing. His failure to do so kind of makes him look guilty, just sayin'.
Originally posted by shadow watcher
This is a very slippery slope, and I feel it is closely tied to those idiots in the tsa who need to access your laptop to board a plane. Like there is a threat to life and limb if you board a plane and play with your computer. If the thing can boot up, it's not a bomb. The files cannot crash the plane.