Months since he had even seen his computer and he may not be remembering correctly. In court, the suspect stated that he believed that that was the correct passphrase, but it was However, the passphrase he provided did not work. The suspect was asked in interview for the full passphrase but he refused until an order was obtained from the High Court requiring him toĭisclose the passphrase. The screen contents and partial passphrase were noted by the police before the laptop was Part of the passphraseįor a 1 GB TrueCrypt volume had been typed into the TrueCrypt Mount window. In March 2010, a federal judge in Michigan ruled that Thomas Kirschner, facing charges of receiving child pornography, would not have to give up his password.Ī suspected terrorist was apprehended with his laptop open and turned on with the TrueCrypt Mount window displayed on screen. In 2009 a British citizen was convicted and jailed for nine months for refusing to provide the police with keys to PGP-encrypted files.Ĭase status: JFL was convicted to nine months imprisonment The fact that the file was encrypted didn’t help him–the mere title of the file was enough to bypass his fifth amendment argument against handing over the password.Ĭase status: Boucher was convicted to three years imprisonment Vermont where a child pornography suspect, Sebastien Boucher, had a file on his computer clearly labelled as graphic child pornography. Obviously, the encryption could not be broken. In December 2006 US customs agents seized a laptop PC that allegedly contained PGP-encrypted child pornography. In 2003 the Italian police could not decrypt PGP-encrypted data stored on seized Psion PDAs belonging to members of the Red Brigade.Ĭase status: PDAs could not be connected to a particular crime The police were unable to gain access to his stored files.Ĭase status: DeSilva was convicted to five years imprisonment His computer, encrypted with TrueCrypt, was seized. In 2014, IT department employee James DeSilva was arrested on charges of sexual exploitation of a minor through the sharing of explicit images over the Internet. Forcing him to to so, the judge argued, would violate Doe’s fifth amendment rights to not offer testimony that incriminates himself.Ĭase status: Nixon was convicted to 17.5 years imprisonment The court ruled that Doe wasn’t required to reveal the password to an encrypted hard drive that might contain incriminating information. John Doe is the name used for an anonymous person in the US suspected of trading child pornography. However, she is saying she can’t remember her password.Įncryption product used: Symantec PGP DesktopĪfter the FBI arrested Ross Ulbricht, the alleged person behind the online drug marketplace Silk Road, it could not decrypt Ulbricht’s personal Bitcoin stash.Ĭase status: Ulbricht was convicted to life in prisonĪ federal magistrate ordered a Wisconsin man suspected of possessing child pornography to decrypt hard drives the authorities seized from his residence.Įncryption product used: Maxtor BlackArmor / MyBook Ramona Ficosu, a Colorado woman, was ordered to unlock her computer for investigators. Suspected childporn dealer Oliver Drage from UK was convicted to a prison sentence because he did not reveal the password he had used to encrypt his hard drive.Ĭase status: Drage from UK was convicted to a prison sentence because he did not reveal his password The police found several encrypted storage media in his possession but could not decrypt them.Ĭodeknacker auf Verbrecherjagd, Folge 4: Der MaskenmannĬase status: Ney was convicted to life in prison Martin Ney (aka the Mask Man) is a children murderer. The police can’t decrypt his files.Ĭase status: Nussbaumer was convicted to 12 years imprisonment Nussbaumer was arrested in Germany in 2012. The FBI used dictionary attacks against Dantas’ disks for over 12 months, but were still unable to decrypt them.”Ĭase status: Dantas was convicted to ten years imprisonment The Brazilian National Institute of Criminology (INC) tried for five months (without success) to obtain access to TrueCrypt-protected disks owned by the banker, after which they enlisted the help of the FBI. Wikipedia writes: “In July 2008, several TrueCrypt-Encrypted hard drives were seized from Daniel Dantas, who was suspected of financial crimes. Here’s my RSA Conference Talk about this topic.įor German speaking readers: Wenn die Polizei gegenüber der Verschlüsselungstechnik kapitulieren mussĭaniel Dantas is a Brazilian banker and suspected financial criminal). In most (but not all) cases the authorities were not successful. This is a collection of cases where the police tried to decrypt encrypted computer data used by criminal suspects. When Encryption Baffles the Police: A Collection of Cases
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |