Re: Info Age Crime Terror and War

John, The 1st - encrypted communications are speech. The 4th - plaintext that has been encrypted cannot be "found." The 5th - If your password is memorized then the only way to produce it is as a witness against yourself. So much for the layman's view. What is the current legal thinking and, more importantly, the relevant legal precedents? Aren't they ( LE ) making a bit of a leap when they say that the Constitution defines access to information not just items? It looks like the only way to achieve the information access they want is through modification of the Constitution. There is often a right-leaning political flavor to the CP list but isn't it such right-wingers as Rhenquist and Starr who invented the various forms of immunity that already can be used to subvert the 5th? Now they are trying to establish the legal equivalence of the physical and the virtual. I wish Kyle et al well in their fight against legions of terrorists but I hope that they have an impossible battle ahead of them when it comes to downgrading the Bill of Rights. Besides, more than wanting to protect us little lambs from terrorists, I think they recognize the degree to which technology is changing the world and are trying to resist the power shifts that are likely. The other reasons they give are mostly chaff. Regards, Mike John Young wrote:
participants (1)
-
Michael Motyka