16-year-old girl who took nude selfie photos faces adult sex charges

Well said. Thanks.

1 Like

Its hard to be properly secure if you don’t have root access.

1 Like

I never use LOL because it is generally wrong, but this: LOL

Er, is that why the Japanese do this?

Yeah. I think that’s where it was. It was really sad and unnecessary.

1 Like

It’s not antidotes it is results from a system where rights have been most severely minimised - namely school.

In school the administrators are in charge, they are allowed to search, they are allowed to question they have the fewest safe guards in place of any state investigator. They don’t have to get a warrant, they don’t think they have to give kids Miranda warnings even when they are asking kids questions and have law enforcement in with them. They believe their burden of proof is profoundly lower than the state’s burden outside school. They work towards “the safety of the school” and this can be radically different than respecting the rights of a child.

A lot of things like the drug war and zero tolerance got us here along with some epic bad behavior by children.

Be glad you don’t have kids it’s kinda hard to send them away into this or face a discipline process where the burden of proof has been inverted and you have to prove innocence in a system that respects you so little they don’t bother to show you any evidence.

4 Likes

I remember that… it was a fucked up situation.

And that’s why the encrypted photo/photosharing app suggested above should be designed with deniability features. Behave as a standard photo app, but allow unlocking with a hidden sequence to show the extended image set. Be a good enough photo app to warrant standalone use, perhaps allow duress code (an intentionally weak unlock that will be likely to be found at bruteforcing attempt) to behave like unlocked. Possibly allow several levels of unlocks, to make it impossible to prove you gave them all (you cannot win then, so you can as well keep the last one for yourself).

School admins rarely have access to cutting-edge forensics, which gives you quite a lot of space to play in.

1 Like

Good Comment! I work with paroled sex offenders providing treatment to prevent relapse.and the rate of recidivism is pretty low. The damage done to young people by being on the registry is disgusting. All too frequently an underage kid will be involved in some sexual activity and a prosecutor will wait until the kid turns 18 then charge them as an adult. The damage to the kids lives is incredible. It is also beyond tragic to listen to some of these young guy tell about the medical attention they needed after being raped in prison. We are not handling this well as a society. No one was prepared for the opportunities for nonsense that the internet and other electronic media has presented. One researcher states that within three clicks on any computer he can find child porn… God spare you if you get caught in that swamp. We’re ready to jail our kids but not a bit of effort is spent to warn them of how easy it is to wander into the swamp.

5 Likes

Case in national news exactly as you describe from Ohio in 2013, I think?

Utter nonsense and poppycock, my defiling sir! Thour befouleth the internets with thy rude interdictions; thy lascivious and entrancing words - thou art a witch! A witch, heareth me all?! Let us hangeth him, or drowneth him, that he might confess and relieveth this conjoined population of his evil God-hating words - for they art the work of the Devil himself - transmitted by a witch!

1 Like

Um, no. It’s because of some lame censorship laws handed to them by the occupation forces, and never updated.

1 Like

Sheriff’s Office lawyer Ronnie Mitchell and Cumberland County District Attorney Billy West wouldn’t say whether they think it’s good public policy to use this law to arrest and prosecute consensually sexting teens. They say it’s their agencies’ job to enforce the law as written.

I might sort of buy that from the Sheriff’s Dept. (because of course I assume they never ever let any speeders, jaywalkers, fellow cops, family members, etc. off with a warning,) but that DA is totally full of shit. Prosecutorial discretion is a thing.

He sure isn’t worthy of his name.

6 Likes

First I was all

Then I was like:

1 Like

Yeah, I’ve always thought we needed to make the distinction between “victimless” and “predatory” offenses. As far as I’m concerned, public nudity shouldn’t even be an issue, and a 22 year old with a 17 year old girlfriend is a stupid kid, not a criminal.

Meanwhile, we have actual rapists and actual child molesters serving half their sentence and out on parole because the prisons are overcrowded with nonviolent drug offenders.

Our priorities are fucked.

6 Likes

Those kind of photo apps already exist - a quick hunt through the App Store will turn a few options with real and dummy passwords leading to different libraries etc. Not sure sharing apps like snapchat include those options yet. The problem though is that any act of giving the dummy passwords could lead to increased penalties - in the case of any Federal agent, for instance, up to five years in jail for lying. Sure, school administrators aren’t Feds but they have heir own big sticks (npi) to threaten with. No, the only solution is education, both about crypto and about 5th amendment rights; always lock up everything tight, and never give your passwords to anyone, even when threatened with legal action.

For such cases, possibly use a duress code that behaves exactly like the normal password, but securely destroys the data that should be hidden. (Possibly having them encrypted in advance, and then just delete the files[1]. And, first operation, forget the crypto key.) Possibly also send a wireless request to the other app with a request to also destroy the data. Then revert the code from its duress function to a regular access code, so subsequent functionality analysis will not tell you it is not a real code.

It should be possible to design the thing to be hard to forensics, so you can see that there was something but you cannot find out what.

And, worst case, five years for lying won’t get you to any for-life sex offender register. And it is even ethically right because those lying scheming bastards don’t deserve truth.

[1] Overwriting won’t help on flash filesystems. There are too many copies of bits and pieces floating around the block device because of wear leveling. A well-encrypted file can be indistinguishable from random data and from each other, revealing only at most that there was something there. The decryption key is the crucial part to erase securely. There has to be a destructible part that increases entropy to non-bruteforceable level, while keeping the complexity for the user at manageable level. Also to not allow retracting of the destroy-data-and-protect-others decision under the pressure from the prosecutor or another kind of rubberhose-grade persuasion.

All of these things are complicated and uneasy in practice. I think, I’d rather just set up a PAN centered around something like a smart watch and as soon as my phone or whatever other gear gets out of range for a few hours it starts wiping itself.

Good idea in principle but prone to false positives. If the smart watch fails, or even just won’t get charged, the scheme misfires.

Needs a lot more thinking…

1 Like

This topic was automatically closed after 5 days. New replies are no longer allowed.