---

Scientology Crime Syndicate

17 Feb 2000

By CARL S. KAPLAN

Wrinkle in Mitnick Case Hints at Encryption Battles to Come

little-known legal skirmish in the case of the computer hacker Kevin Mitnick was a preview of similar fights to come as more people use encryption software to protect their files, lawyers who were involved in the case say.

Mitnick left federal prison last week after serving nearly five years for a series of crimes involving computer fraud and wire fraud. But his lawyers say they are still troubled by the judge's answer to a legal question raised early in the case: When federal agents seize encrypted files from a defendant, can they refuse to return them unless the defendant turns over the secret "key" to decode the files?

That digital-age puzzle, which the judge regarded as a novel legal question, arose in Mitnick's case in a circuitous manner, as sometimes happens in criminal trials.

In the course of the government's investigation, federal agents in 1994 and 1995 seized two laptop computers owned by Mitnick, according to Gregory L. Vinson, a lawyer who worked on the Mitnick defense team that was headed by Donald C. Randolph, a veteran criminal defense specialist in Los Angeles.

On the computers' hard drives were approximately nine gigabytes of electronic evidence, Vinson said in an interview. He estimated that of that total, perhaps one gigabyte consisted of encrypted files -- documents that were unintelligible to anyone who did not have a key to decrypt them. Mitnick, of course, had the key.

During the pre-trial discovery phase of the case, the government lawyer, Christopher Painter, an assistant United States attorney in Los Angeles, indicated that as required by the rules governing evidence, he would hand all of the seized files over to the defense -- except the encrypted ones.

That set the stage for a hearing on May 20, 1998, before federal judge Mariana R. Pfaelzer in Los Angeles. Speaking for the defense, Randolph argued that Mitnick was entitled to copies of the seized encrypted files under two legal theories, according to a transcript of the hearing.

First, he contended, under Rule 16 of the Federal Rules of Criminal Procedure, which establish the ground rules for the government's disclosure of evidence to the defendant, the government must allow a defendant to inspect or copy documents that "were obtained from or belong to the defendant." Since the encrypted files belonged to Mitnick, he deserved to get a copy of them, Randolph said.

The defense also argued that the encrypted files might include information that could help Mitnick defend himself. Under the Constitution, the prosecution is obligated to hand over such material to the defense.

Painter replied that because the government could not understand what was in the files, it could not use the files as evidence at trial. He also said that Rule 16 did not apply because the encrypted files in a sense were not "really in our possession," because "we don't know what's there."

But the heart of the government lawyer's argument was that it would be wrong to hand over the files because they could contain the spoils of Mitnick's crimes -- secret information that he illegally acquired from the companies whose computers he hacked into -- or something even more dangerous.

"For all we know, it could be plans to take down a computer system," Painter said at the hearing. "We don't know. And we think it's dangerous to release that, and that's why we don't want to release it. We're not going to use it, certainly, but we think that there's reasons not to release that information."

In considering the matter, Judge Pfaelzer said that it was "clever" of Mitnick to have encrypted the files in such a way that the government could not use them in its own case but Mitnick could access them if given a copy. She asked: "Now, you know, what's the court supposed to do with that position?"

Painter said the situation was akin to Mitnick asking for his coat back and the government not knowing if there was a pistol in the pocket. Judge Pfaelzer agreed, ruling that "this court is not going to order the encryptive material to be given" to Mitnick.

The judge added that if Mitnick would "tell the government how to read" the files, then the government would turn over the files in decrypted form.

Mitnick's lawyers immediately objected to this condition on the grounds that it would force him to waive his Fifth Amendment right against self-incrimination to obtain evidence he needed and that he had a legal right to see. The judge rejected this point and repeated her ruling.

Vinson, the defense lawyer, said in an interview this week that he still thought Judge Pfaelzer's ruling from the bench did not give enough weight to the defense's arguments. He said he was worried that the case might create the impression that the government has no obligation to give back encrypted files that it has been unable to decrypt.

"In ten years, when encryption becomes commonplace for people to use in order to protect their files, whether their files contain financial records, conversations with their spouse or a local drug dealer, the government is going to seize the files in a criminal case, and [government lawyers] will be faced with the same situation as they were in the Mitnick case," Vinson said.

Painter, reached by telephone earlier this week, said both sides in the pre-trial legal battle over Mitnick's encrypted files had strong arguments.

He said he agreed with Vinson that similar disputes may arise in the future as more people encrypt files. But he maintained that no precedent had been set, and that the government's responses would be on a case-by-case basis.

"It could be that in future cases, depending on the circumstances, it would be more appropriate to return [encrypted files] under special procedures," Painter said.

Gerald Lynch, a law professor at Columbia University who is an expert in criminal law and a former federal prosecutor, said in an interview that it was a "panic response" on the part of the court and the government to deny Mitnick access to his files.

"If you think about this reasonably, the answer is that if the government does not have a reasonable basis to contend that something really dangerous [is in the encrypted files], and merely does not know what is in the files and can't decode them, then they should hand them over," he said.

Alan B. Davidson, a staff lawyer who follows encryption developments for the Center for Democracy and Technology, a civil liberties group, said he believed the Mitnick encryption dispute is a precursor to a coming battle in Congress.

As part of a compromise announced this fall by the Clinton administration that loosened export restrictions on strong encryption software, the administration has committed to sending a bill to Congress laying out rules for when the government can get access to encryption keys, Davidson said.

"We are anxiously awaiting the administration's new bill, which will open up a huge debate," he said.

CYBER LAW JOURNAL is published weekly, on Fridays. Click here for a list of links to other columns in the series.

---

The views and opinions stated within this web page are those of the author or authors which wrote them and may not reflect the views and opinions of the ISP or account user which hosts the web page. The opinions may or may not be those of the Chairman of The Skeptic Tank.

Return to The Skeptic Tank's main Index page.

E-Mail Fredric L. Rice / The Skeptic Tank