Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Privacy Law
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Journal of Digital Forensics, Security and Law
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …
Unlimited Data Search Plan: Warrantless Border Search Of Mobile Device Data Likely Unconstitutional For Violating The Fundamental Right To Informational Privacy, Atanu Das
St. John's Law Review
(Excerpt)
Part I of this Article discusses a case in which a United States citizen was subject to an unconstitutional warrantless border search of his mobile device data. Part II explains the history and current state of Supreme Court jurisprudence of the border search exception doctrine. Part III explains the way in which Supreme Court jurisprudence finds the right to informational privacy for mobile device data to be a fundamental right. Part IV discusses the reluctance of some legal commentators to find that a governmental intrusion on the right to informational privacy is subject to strict scrutiny. Part V finds …
United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko
United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko
Greg Sergienko
Five years ago, in a contribution to these pages, I suggested that the Supreme Court's oldest precedents and the original intent of the framers of the Constitution precluded the use of evidence produced under a grant of immunity against the producer, even though the material produced included documents that the producer had not been compelled to write. This implied that information concealed with a cryptographic key could not be used in a criminal prosecution against someone from whom the key had been obtained under a grant of immunity. The issue, however, was doubtful given the tendency of the Court to …
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
The Right To Silence As Protecting Mental Control, Dov Fox
The Right To Silence As Protecting Mental Control, Dov Fox
Akron Law Review
This Article examines the idea that individuals have a moral and constitutional right of control over the use of their thoughts vis-à-vis the state. As a point of departure, I consider the prospect of a forensic neuroimaging device that was capable of eliciting recall and recognition from a criminal suspect without the suspect’s having even to answer an interrogator’s question. Reflection on government access to this sort of interrogation technique suggests that the state should be prohibited from either extracting a person’s thoughts without her consent or making use of her compelled thoughts to lay criminal blame upon her. Though …
The Weak Protection Of Strong Encryption: Passwords, Privacy, And Fifth Amendment Privilege, Nathan K. Mcgregor
The Weak Protection Of Strong Encryption: Passwords, Privacy, And Fifth Amendment Privilege, Nathan K. Mcgregor
Vanderbilt Journal of Entertainment & Technology Law
While the constitutional protection afforded private papers has waxed and waned for more than a century, the Supreme Court has greatly restricted the Fifth Amendment privilege against self-incrimination--at least as applied to voluntarily prepared documents. Specifically, where the government knows of the existence and location of subpoenaed documents, the Fifth Amendment guarantee will not justify a failure to produce them, unless the act of production would itself incriminate the defendant. However, the Self-Incrimination Clause still precludes the compelled creation of documents that are both incriminating and testimonial.
The "private papers" doctrine has remained relatively stable for approximately thirty years now, …
Privacy's Problem And The Law Of Criminal Procedure, William J. Stuntz
Privacy's Problem And The Law Of Criminal Procedure, William J. Stuntz
Michigan Law Review
Part I of this article addresses the connection between privacy-based limits on police authority and substantive limits on government power as a general matter. Part II briefly addresses the effects of that connection on Fourth and Fifth Amendment law, both past and present. Part ID suggests that privacy protection has a deeper problem: it tends to obscure more serious harms that attend police misconduct, harms that flow not from information disclosure but from the police use of force. The upshot is that criminal procedure would be better off with less attention to privacy, at least as privacy is defined in …
Response: The Problems With Privacy's Problem, Louis Michael Seidman
Response: The Problems With Privacy's Problem, Louis Michael Seidman
Michigan Law Review
A Response to William J. Stuntz's "Privacy's Problem and the Law of Criminal Procedure"
Reply, William J. Stuntz
Reply, William J. Stuntz
Michigan Law Review
A Reply to Louis Michael Seidman's Response
Selective Service System V. Minnesota Public Interest Research Group, Lewis F. Powell Jr.
Selective Service System V. Minnesota Public Interest Research Group, Lewis F. Powell Jr.
Supreme Court Case Files
No abstract provided.