[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Contempt of Court
Phil Karn writes:
> At 02:13 PM 6/17/93 PDT, Mike Axelrod 422-0929 wrote:
Who's this Axelrod guy? I'm Godwin.
> >If the key itself had embedded testimony that was incriminating, then it is
> >possible one could invoke the 5th amendment to avoid disclosure of the key.
> >But, I suppose a court could do an end run around that by giving limited
> >use immunity for the incriminating content of the key. Comments?
> >
> >Mike.
I think Phil thinks we're one and the same. See below.
> What I've never been able to understand about Mike's claim is why the
> "fruit of the poisoned tree" principle would not apply to an encryption
> key. As I understand it, this principle bars the use of any evidence
> that was gathered as a direct or indirect result of inadmissable
> evidence (like a warrantless search).
Untrue. "Poisonous tree" doctrine applies to illegally obtained
evidence, not to "inadmissible evidence" (a very different category,
logically).
> Mike, back at the Hackers' Conference you mentioned a Supreme Court
> decision that said in passing that one could not compel a defendant to
> reveal the combination to a lock, but that it wasn't a binding precedent
> because it didn't relate to the case at hand. (I forget the legal term
> you used).
"Dicta."
I'm sure Phil is referring to me, not to Axelrod, here.
> Could you find and post an excerpt of this particular
> decision?
I've been trying to find this case, but haven't found it.
--Mike