- Journal Archives
- Volume 18
- Volume 17
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
The JETLaw editorial staff is excited about Volume 14! Below is a sneak preview from an Issue 2 article written by John Larkin. John Larkin received a J.D. from Villanova School of Law in 2009 and currently practices in the Appeals Division of the Montgomery County District Attorney’s Office in Pennsylvania.
COMPELLED PRODUCTION OF ENCRYPTED DATA:
Through the Lens of the Hurst Case.
The myth is that shadowy and powerful government agencies can crack the encryption software that criminals use to protect computers filled with child-pornography and stolen credit-card numbers. The reality is that cheap or free encryption programs place protected data beyond law enforcement’s reach. If courts seriously mean to protect the victims of Internet-crime – all too often children – then a legal mechanism must be adopted to supply the technological deficiency.
To date, police and prosecutors have relied on subpoenas to compel defendants to produce their password, or to decipher their protected data. This technique has met with indifferent success. The better solution is to couple a subpoena for the deciphered data with a warrant that specifies what and how to search. If the defendant refuses to produce the deciphered data, he can be held in contempt.
Some defendants, however, will prefer contempt to compliance, where handing-over protected data means the certainty of a lengthy prison sentence. This suggests that an additional legal mechanism is required to allow fact-finders to look into protected data. This article proposes a missing-evidence instruction as a surrogate for actual inspection, where defendants refuse to comply with court orders to produce deciphered data. In other words, this article argues that, if a warrant, a subpoena, and contempt cannot induce a defendant to decrypt his data, courts should issue an instruction that the fact-finder may presume the missing data to be incriminating.
Recent Blog Posts
- Former Cardinals Executive Pleads Guilty to Hacking, But Will the Cardinals Pay the Price?
- Making a Murder – Technology in Forensic Evidence Questioned
- Is “smart gun” technology the future of gun safety?
- Why High-Profile Athletes’ Defamation Lawsuits Against Al Jazeera Are Nothing More Than a Hail Mary
- Executives of a Chinese Online Video-Sharing Service Provider Stood Trial for Internet Pornography
- The Rise of ‘Swatting’
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution