Security Basics mailing list archives

Re: Judge orders defendant to decrypt PGP-protected laptop - CNET News


From: "Deano" <deanosaur () iprimus com au>
Date: Sat, 21 Mar 2009 23:07:32 +1100

can someone please advise how to change the email address for this mailing list? please advse


----- Original Message ----- From: "Jeffrey Walton" <noloader () gmail com>
To: "Aarón Mizrachi" <unmanarc () gmail com>
Cc: <security-basics () securityfocus com>
Sent: Friday, March 20, 2009 1:04 PM
Subject: Re: Judge orders defendant to decrypt PGP-protected laptop - CNET News


Seems like the case is bound to set a precedent in the interpretation
of this law. Any which ways it would be worthwhile to observe whether
the US courts follow a similar course of action as their UK
counterparts.
I recall a similar instance in the US about two years ago (damn if I
can find a citation at the moment). The legal issue was slightly
different than above, where the above claims he does not have to
surrender due to [possible] self incrimination.

In the previous the issue raised was whether a computer, obtained
through a warrant, also included the password to decrypt the data on
the computer. In the later, the judge ruled that the password to
decrypt the data was included since the warrant included the computer.

Standard disclaimer: I'm not a lawyer, but I am interested in the
legal interpretations of these security related matters as most others
on the list.

Jeff

On 3/18/09, Aarón Mizrachi <unmanarc () gmail com> wrote:
On Sábado 07 Marzo 2009 18:14:51 Shailesh Rangari escribió:
Seems like the case is bound to set a precedent in the interpretation
of this law. Any which ways it would be worthwhile to observe whether
the US courts follow a similar course of action as their UK
counterparts.

[SNIP]

------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Find the source of cybercrime! Almost every crime today involves a computer or mobile device. Learn how to become a Computer Forensics Examiner in InfoSec Institute's hands-on Computer Forensics Course. Up to three industry recognized certs available, online computer forensics training available.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
------------------------------------------------------------------------




------------------------------------------------------------------------
This list is sponsored by: InfoSec Institute

Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------


Current thread: