Feeds

Judge: Breath test firm must hand over source code

Electronic kit told to walk the line

Choosing a cloud hosting partner with confidence

An Arizona Judge has approved requests to allow the examination of the software in a new generation of machines that examine blood alcohol levels of motorists.

Pima County Superior Court Judge Deborah Bernini ordered CMI, the manufacturer, to hand over the source code of the Intoxilyzer 8000 to representatives of defence lawyers in a joint lawsuit involving 20 drink drive suspects.

Lawyers for the group argue that access to the software behind the device is necessary in order to establish whether breath tests made using the devices are reliable or not. Only some police forces in the state use breath tests while others use blood tests. Attorneys for the defendants successfully argued that suspects have the right to cross-examine their accusers, in this case electronic devices.

CMI maintains that its source code is a trade secret. Meanwhile prosecutors in the Arizona drink driving cases reckon that there are other ways to determine if the device is reliable, arguing the request is a defence ploy designed to get their clients off the hook. Judge Bernini rejected these arguments and ordered CMI to hand over its secret source code to James Nesci, the lead lawyer for the defendants.

The Arizona ruling increases pressure on CMI but it's by no means sure that the firm will comply. Rejection of the request would place defence lawyers in a strong position to get breath-test results against 170 defendants, both in the cases under consideration by Judge Bernini and other cases going through the system, thrown out of court.

The Intoxilyzer 8000 entered service last year and is well liked by squad car cops because of its light weight and general convenience. The kit can be powered from a car's cigarette lighter output. The previous generation of devices - the Intoxilyzer 5000 - was far bulkier, taking up half the back seat and needing a separate energy supply.

Allegedly inconsistent, odd or inexplicable results involving the Intoxilyzer 8000 have led to legal action in six states (Florida, Louisiana, Massachusetts, Minnesota, Tennessee and New Jersey as well as Arizona). A Florida judge also ordered CMI to hand over the source code running the controversial devices but the firm has refused to comply, earning it $1.2m in fines as a result. ®

Internet Security Threat Report 2014

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
Inside the EYE of the TORnado: From Navy spooks to Silk Road
It's hard enough to peel the onion, are you hard enough to eat the core?
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?