Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Standing Under State Search And Seizure Provision: Why The Minnesota Supreme Court Should Have Rejected The Federal Standards And Instead Invoked Greater Protection Under Its Own Constitution In State V. Carter, Rebecca C. Garrett Feb 2018

Standing Under State Search And Seizure Provision: Why The Minnesota Supreme Court Should Have Rejected The Federal Standards And Instead Invoked Greater Protection Under Its Own Constitution In State V. Carter, Rebecca C. Garrett

Maine Law Review

In State v. Carter, the Minnesota Supreme Court considered whether a criminal defendant had “standing” to challenge an alleged search under the Fourth Amendment and Article 1, Section 10 of the Minnesota Constitution. The defendant moved to suppress evidence obtained by a police officer who had peered in the window of an apartment where the defendant was participating in a drug-packaging operation with the apartment's leaseholder. A divided court held that the defendant had a legitimate expectation of privacy in the apartment. Therefore, the defendant had standing to challenge the legality of the police officer's observations pursuant to the Fourth …


Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff Jan 2018

Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff

Sturm College of Law: Faculty Scholarship

Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebooks — that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password?

This Article considers the Fifth Amendment protection against compelled disclosures of passwords — a question that has split and …