• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

US Appeals court upholds Fifth Amendment right to not decrypt hard drives

Hayabusa Rider

Admin Emeritus & Elite Member
This is good news!

People should not be required to incriminate themselves.

The 11th Circuit Appeals Court has issued an important ruling on the question of whether or not a defendant can be forced to decrypt a hard drive when its contents could provide additional incriminating evidence. The case in question refers to the actions of a John Doe who was compelled to testify before a grand jury in exchange for immunity from prosecution. Doe was ordered to decrypt the contents of his laptop as part of that testimony, but was told that his immunity would not extend to the derivative use of such material as evidence against him. Doe refused to decrypt the TrueCrypt-locked drives, claiming that to do so would violate his Fifth Amendment right against self-incrimination.

The 11th Circuit’s ruling reverses the lower court’s decision to hold Doe in contempt and affirms that forcing him to decrypt the drives would be unlawful. It also states that the district court erred in limiting the immunity it granted Doe to only apply to grand jury testimony and not the derivative use of the evidence in question. The ruling on misapplied immunity means that the 11th Circuit could’ve punted on the Fifth Amendment issue, but the court opted not to do so.

The applicability of the Fifth Amendment rests on the question of what the government knew and how it knew it. Federal prosecutors admitted at trial that while the amount of storage encrypted exceeded 5TB, there was no way to determine what data was on the hard drive — indeed, if there was any data whatsoever. Plaintiffs were reduced to holding up numerical printouts of encryption code that they said “represented” the data they wanted, but were forced to admit that there was no way to differentiate what might be illegal material vs. legal.

The question at hand is whether or not decrypting the contents of a laptop drive is testimony or simply the transfer of existent information. The court acknowledges that the drive’s files are not testimony of themselves, but writes “What is at issue is whether the act of production may have some testimonial quality sufficient to trigger Fifth Amendment protection when the production explicitly or implicitly conveys some statement of fact.” (emphasis original)

Previous court cases have established that merely compelling a physical act, such as requiring a defendant to provide the key to a safe, is not testimonial. Actions are also non-testimonial if the government can invoke the “foregone conclusion” doctrine by showing with “reasonable particularity” that it already knew that certain materials or content existed.

By decrypting the drives, Doe is admitting “his knowledge of the existence and location of potentially incriminating files; of his possession, control, and access to the encrypted portions of the drives; and of his capability to decrypt the files.” The court dismisses the argument that the contents of Doe’s hard drives are a foregone conclusion, noting that “Nothing… reveals that the Government knew whether any files exist or the location of those files on the hard drives; what’s more, nothing in the record illustrates that the Government knew with reasonable particularity that Doe was even capable of accessing the encrypted portions of the drives.”



“The Government has not shown, however, that the drives actually contain any files, nor has it shown which of the estimated twenty million files the drives are capable of holding may prove useful… we are not persuaded by the suggestion that simply because the devices were encrypted necessarily means that Doe was trying to hide something. Just as a vault is capable of storing mountains of incriminating documents, that alone does not mean that it contains incriminating documents, or anything at all.”

Not exactly carte blanche

The strength of this decision is the balance it strikes between the rights of the government and the individual. Rather than focusing on the nature of the pass phrase defendants are ordered to provide, it emphasizes the issue of what the prosecution knows and how it learned it. If the prosecutors had had sufficient data to indicate that illegal materials were stored on Doe’s hard drives, forcing him to testify would’ve been valid under the foregone conclusion principle.

The decision is noteworthy for the nature of Doe’s alleged infraction. Doe was called before the grand jury to testify because an IP address corresponding to multiple hotel rooms where he stayed was found to have accessed child pornography via YouTube. Child pornography is a despicable crime, but deriving legal precedents from a desire to punish someone makes for lousy jurisprudence. The 11th Circuit decision heaps no small amount of scorn on the district court’s attempt to immunize Doe’s testimony without immunizing the defendant, deriding it as akin to asking for “manna from heaven,” in which squeaky-clean testimony mysteriously appears on the courthouse steps without any troublesome questions into how it was obtained.

This decision doesn’t make it impossible for the government to use the contents of an encrypted drive, but it requires that the prosecution demonstrate a knowledge of the contents and data contained therein before being allowed to issue a blanket demand. It’s a fair call, and given the increasing number of similar cases, an important one.

This strikes a balance between legitimate needs of the prosecution without forcing people to surrender their rights for a fishing expedition.

A good ruling.
 
To get an order to decrypt a hard drive, the government should have some evidence of wrongdoing. If this is what is required to search a house the same should apply to a hard drive. They could just pass a law that is illegal to encrypt a hard drive. But until then too bad.

So it is a common practice to spy on people that stay at a hotel? Isnt that like wire tapping? Maybe the government just finds a child pronography site and then spys on that node to see where the IP is being accessed from using a packet sniffer or something like that.

So I would ask the question how did you know I accesses said supposed child pornography site? Did you have a warrant to intercept that packet?

I am guessing what happens is that they catch some person with child pornography and he rats some people out to keep from going to jail. They the investigator goes to the person distributing, and they tell him either you go to jail or you allow us to keep track of your server for a while and they then track down all the clients.

The real goal in this should be to arrest the people actually abusing the children. This can get so convoluted that it is like chasing people down that are smoking pot. You have to ask if it is really worth it. It is also illegal to sell cigarrettes to minors, but it is not illegal for a minor to smoke on the street outside a school. If Pot was legal it could be regulated and taxed. That would be a lot safer.
 
Last edited:
What if it was a terrorist or kidnapper that might have possible information that could prevent the eminent attack or lead to saving the kidnapped victim?
 
To get an order to decrypt a hard drive, the government should have some evidence of wrongdoing. If this is what is required to search a house the same should apply to a hard drive. They could just pass a law that is illegal to encrypt a hard drive. But until then too bad.

So it is a common practice to spy on people that stay at a hotel? Isnt that like wire tapping? Maybe the government just finds a child pronography site and then spys on that node to see where the IP is being accessed from using a packet sniffer or something like that.

So I would ask the question how did you know I accesses said supposed child pornography site? Did you have a warrant to intercept that packet?

It's public airwaves. Even if the hotel encrypted with a key, the government just has to obtain that key (legally) from the hotel which would be more than willing to provide it I'm sure (if it's not just posted in plain sight already as many hotels do). If you are connected to a public WiFi network, any data you send is fair game. Period.

If you want to protect yourself, you need to encrypt it through a tunnel to a secure destination. For example the TOR network or a private VPN to a home system.
 
What if it was a terrorist or kidnapper that might have possible information that could prevent the eminent attack or lead to saving the kidnapped victim?

Because I'm sure such a person would immediately decrypt the drive if ordered by a court.
 
What if it was a terrorist or kidnapper that might have possible information that could prevent the eminent attack or lead to saving the kidnapped victim?

First, I assume the CIA/FBI would be handling, not the courts.

As to the legal issue, the "forgone conclusion" issue would still be at play.

---------------

Seems a good ruling to me.

Fern
 
What if it was a terrorist or kidnapper that might have possible information that could prevent the eminent attack or lead to saving the kidnapped victim?
always looking for the exception..your response has nothing to do with the article.,..
what if`s are a dime a dozen
 
Seems like a reasonable ruling on a modern interface with the 5th Amendment.


imminent: wrong, but we understood his meaning
 
Doe was called before the grand jury to testify because an IP address corresponding to multiple hotel rooms where he stayed was found to have accessed child pornography via YouTube.

!@#$ them, and TY US appeals court.
 
Seems like a reasonable ruling, balancing the interests of investigators with civil rights issues. The 5th amendment should prevent fishing expeditions, but decryption can still be required under the "foregone conclusion" principle. However, if it can really be proven that incriminating information is already on the hard drive, requiring decryption at all seems unnecessary for prosecution.
 
"sorry, I forgot my darn password again".

Honestly the ruling makes sense, I would feign forgetfulness if it were incriminating as I am sure many would.
 
If you're really that worried about gov't getting access to your encrypted hard drive, just say you forget the password. Or am I missing something.
 
This is good news!

People should not be required to incriminate themselves.



This strikes a balance between legitimate needs of the prosecution without forcing people to surrender their rights for a fishing expedition.

A good ruling.
Agreed. I hope they can crack it (after obtaining a court order) since he appears to be a pedophile, but they have no right to order him to decrypt it.

And I have to agree with Throckmorton - child porn on Youtube? That just seems incredibly blatant for something so heinous.
 
Maybe the government just finds a child pronography site and then spys on that node to see where the IP is being accessed from using a packet sniffer or something like that.

So I would ask the question how did you know I accesses said supposed child pornography site? Did you have a warrant to intercept that packet?

10 years ago it was rumor'd that most internet kiddie porn was acutally being held by the DoD.

I was big into FTP then and there were known IP ranges to stay away from as they were all DoD/Fed honeypots of movies warez and kiddieporn
 
Back
Top