Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Self Incrimination And Cryptographic Keys, Gregory S. Sergienko
Greg Sergienko
Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]
Standing Under State Search And Seizure Provision: Why The Minnesota Supreme Court Should Have Rejected The Federal Standards And Instead Invoked Greater Protection Under Its Own Constitution In State V. Carter, Rebecca C. Garrett
Maine Law Review
In State v. Carter, the Minnesota Supreme Court considered whether a criminal defendant had “standing” to challenge an alleged search under the Fourth Amendment and Article 1, Section 10 of the Minnesota Constitution. The defendant moved to suppress evidence obtained by a police officer who had peered in the window of an apartment where the defendant was participating in a drug-packaging operation with the apartment's leaseholder. A divided court held that the defendant had a legitimate expectation of privacy in the apartment. Therefore, the defendant had standing to challenge the legality of the police officer's observations pursuant to the Fourth …
Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff
Unlocking The Fifth Amendment: Passwords And Encrypted Devices, Laurent Sacharoff
Sturm College of Law: Faculty Scholarship
Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebooks — that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password?
This Article considers the Fifth Amendment protection against compelled disclosures of passwords — a question that has split and …