0
8

[–] ardvarcus 0 points 8 points (+8|-0) ago 

The judge doing this needs to be put into prison for this crime.

0
2

[–] Laurentius_the_pyro 0 points 2 points (+2|-0) ago 

That's a odd way to spell "needs to be put in front of a firing squad".

0
1

[–] ShinyVoater [S] 0 points 1 points (+1|-0) ago 

Firing squad's too good for him. Give him a lethal injection with bleach as a warning for the rest.

0
2

[–] Maroonsaint 0 points 2 points (+2|-0) ago 

THE LAW IS NEVER ON YOUR SIDE. NEVER PUT YOUR FAITH IN IT.

0
6

[–] Men13 0 points 6 points (+6|-0) ago 

No. The law is on my side. The system isn't.

0
5

[–] carlip 0 points 5 points (+5|-0) ago  (edited ago)

who is the real criminal, the man behind bars, or the one who unjustly put him there?

0
4

[–] Laurentius_the_pyro 0 points 4 points (+4|-0) ago 

You can't detain someone indefinitely like this.

Innocent until proven guilty.

0
0

[–] glassuser 0 points 0 points (+0|-0) ago 

Well, you obviously CAN. It's not supposed to be able to happen, but it is happening.

0
4

[–] TerraKell 0 points 4 points (+4|-0) ago 

The courts also concluded that it was a "foregone conclusion" that kid porn was on the drives because a forensic examination revealed that the "hash" values of the files have been linked by the authorities to known child pornography.

I have never heard of a "hash" value linked to known child pornography file. It sounds like the cops are lying again.

0
6

[–] Werewolf35b 0 points 6 points (+6|-0) ago 

How do you have a 'hash value' of file on a scrambled up, encrypted drive?

0
2

[–] Tb0n3 0 points 2 points (+2|-0) ago 

It's possible the files were hashed in the OS when accessed for thumbnails or some background process.

0
1

[–] bezzy 0 points 1 points (+1|-0) ago 

Very standard for police and also companies like google to keep hashes of known illegal images and then hash files on either a drive or in an email, then compare them. In some cases even hashing segments of an image, as in, the top right corner so that changing a pixel or some trailing data doesn't help evade detection. Software tool suites like FTK do basically automated detection.

0
3

[–] ShinyVoater [S] 0 points 3 points (+3|-0) ago 

I've searched all I can for an update in this case, but this looks like it's the latest(another goat said he'd been murdered, but I found no corroborating article).

0
0

[–] Hand_of_Node 0 points 0 points (+0|-0) ago 

Basically, the negro believes it's better to be in jail and suspected of child porn than to confirm it and still be in jail. He's kind of a hero to some in his current status. He'd lose that and possibly his life if he let them confirm the CP on his computer.

2
0

[–] derram 2 points 0 points (+2|-2) ago 

https://archive.fo/emWbf :

Man in jail 2 years for refusing to decrypt drives. Will he ever get out? | Ars Technica

'Another way for the contempt order to be lifted would be for Rawls to unlock the drives. '

'A now-fired Philadelphia cop has been behind bars for almost two years for refusing to decrypt hard drives that authorities found at his residence as part of a federal child-porn investigation. '

'If the justices take the case, it would be the first time they weighed the constitutionality of whether forcing somebody to decrypt hardware amounts to a Fifth Amendment violation. '

'On Thursday, his lawyers are set to ask a federal judge to release him while he appeals the reason for his confinement to the Supreme Court. '

'UPDATE: Many readers are asking a valid question about what happens if someone is ordered to decrypt hardware but claims they forgot the passcode. '


This has been an automated message.

1
-1

[–] jesus_is_lord 1 points -1 points (+0|-1) ago  (edited ago)

load more comments ▼ (1 remaining)