Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Law
Compelled Production Of Encrypted Data, John E.D. Larkin
Compelled Production Of Encrypted Data, John E.D. Larkin
Vanderbilt Journal of Entertainment & Technology Law
There is a myth that shadowy and powerful government agencies can crack the encryption software that criminals use to protect computers filled with child pornography and stolen credit card numbers. The reality is that cheap or free encryption programs can place protected data beyond law enforcement's reach. If courts seriously mean to protect the victims of Internet crime--all too often children--then Congress must adopt a legal mechanism to remedy the technological deficiency.
To date, police and prosecutors have relied on subpoenas to either compel defendants to produce their password, or to decipher their protected data. This technique has been met …
Hacking For Lulzi: Employing Expert Hackers To Combat Cyber Terrorism, Swathi Padmanabhan
Hacking For Lulzi: Employing Expert Hackers To Combat Cyber Terrorism, Swathi Padmanabhan
Vanderbilt Journal of Entertainment & Technology Law
Because hacking collectives Anonymous and LulzSec have routinely breached supposedly secure computer networks--including Visa, MasterCard, and the Central Intelligence Agency--the threat of cyber terrorism has become more prominent. Many US industries and companies depend on online communication and information storage. If terrorists compromise these capabilities, they could cripple the US economy and perhaps even cause widespread fatalities. Members of Anonymous and LulzSec lack the necessary intent to be prosecuted as cyber terrorists because they hack not to cause fear, but rather to create laughter. Their method of posting all necessary instructions and information regarding intended targets on online message boards …