PDA

View Full Version : Indefinite prison for suspect who won’t decrypt hard drives, feds say




jct74
05-18-2016, 02:46 PM
Indefinite prison for suspect who won’t decrypt hard drives, feds say
"This is not a fishing expedition on the part of the government," feds say.

by David Kravets
May 16, 2016 6:53pm EDT

US federal prosecutors urged a federal appeals court late Monday to keep a child-porn suspect behind bars—where he already has been for seven months—until he unlocks two hard drives that the government claims contain kid smut.

The suspect, a Philadelphia police sergeant relieved of his duties, has refused to unlock two hard drives and has been in jail ever since a judge's order seven months ago—and after being found in contempt of court. The defendant can remain locked up until a judge lifts the contempt order.

The government said Monday he should remain jailed indefinitely until he complies. The authorities also said that it's not a violation of the man's Fifth Amendment right against compelled self-incrimination because it's a "foregone conclusion" that illegal porn is on the drives and that he is only being asked to unlock the drives, not divulge their passcodes.

"This is not a fishing expedition on the part of the government," federal prosecutors told the 3rd US Circuit Court of Appeals of Philadelphia.

The suspect has not been charged with any child-porn related crimes, yet he is imprisoned in Philadelphia's Federal Detention Center for refusing to decrypt two drives encrypted with Apple's FileVault software in a case that highlights the federal government's war on encryption. A federal magistrate has ordered him imprisoned "until such time that he fully complies" with the decryption order. The man's attorney, Federal Public Defender Keith Donoghue, is demanding that the appeals court immediately release his client from prison because he is being "held without charges." (PDF)

...

read more:
http://arstechnica.com/tech-policy/2016/05/feds-say-suspect-should-rot-in-prison-for-refusing-to-decrypt-drives/

DamianTV
05-18-2016, 03:12 PM
Typical. This is exactly why we have a constitutionally protected right to not self incriminate. Guilty until proven innocent. Well, more like guilty until proven guilty, thus, no courts required. The ability to defend ones data against all who desire it is in absolutely no way a crime, which reveals those who have true criminal intent. Now if the FBI had half a collective brain, instead of going after this guy, they should be trying to find out who they are not allowed to investigate, and hint, its not the people, but their own damn bosses and the ones that sign their paychecks.

acptulsa
05-18-2016, 05:00 PM
The authorities also said that it's not a violation of the man's Fifth Amendment right against compelled self-incrimination because it's a "foregone conclusion" that illegal porn is on the drives and that he is only being asked to unlock the drives, not divulge their passcodes.

If it's a foregone conclusion that's what's on the drives, then why haven't they introduced those drives in evidence and shown them to a jury? If what they say is true, then surely they'll convince a jury of this guy's guilt just as they are.