While the constitutional protection afforded private papers has waxed and waned for more than a century, the Supreme Court has greatly restricted the Fifth Amendment privilege against self-incrimination--at least as applied to voluntarily prepared documents. Specifically, where the government knows of the existence and location of subpoenaed documents, the Fifth Amendment guarantee will not justify a failure to produce them, unless the act of production would itself incriminate the defendant. However, the Self-Incrimination Clause still precludes the compelled creation of documents that are both incriminating and testimonial. The private papers doctrine has remained relatively stable for approximately thirty years now, even though most do...
Advances in technology in the past decade have blurred the line between individuals’ privacy rights ...
This Essay considers whether the government can force a person to decrypt his computer. The only cou...
In an effort to protect the enormous volume of sensitive and valuable data that travels across the I...
The Fifth Amendment commands that no person shall be compelled in any criminal case to be a witness...
Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebo...
Individuals use encryption to safeguard many valid and legal applications but also to hide illegal a...
The information security community has devoted substantial effort to the design, development, and un...
Military-grade cryptography has been widely available at no cost for personal and commercial use sin...
Technological developments change the way we perform tasks by creating more efficient solutions to o...
There is a myth that shadowy and powerful government agencies can crack the encryption software that...
Each year, law enforcement seizes thousands of electronic devices—smartphones, laptops, and notebook...
Courts across the United States have applied Fifth Amendment protections to passcodes, as long as th...
This symposium article, the first of two on regulation of government\u27s efforts to obtain paper an...
During its last term, the Supreme Court decided two cases involving the production of documents and ...
Five years ago, in a contribution to these pages, I suggested that the Supreme Court\u27s oldest pre...
Advances in technology in the past decade have blurred the line between individuals’ privacy rights ...
This Essay considers whether the government can force a person to decrypt his computer. The only cou...
In an effort to protect the enormous volume of sensitive and valuable data that travels across the I...
The Fifth Amendment commands that no person shall be compelled in any criminal case to be a witness...
Each year, law enforcement seizes thousands of electronic devices — smartphones, laptops, and notebo...
Individuals use encryption to safeguard many valid and legal applications but also to hide illegal a...
The information security community has devoted substantial effort to the design, development, and un...
Military-grade cryptography has been widely available at no cost for personal and commercial use sin...
Technological developments change the way we perform tasks by creating more efficient solutions to o...
There is a myth that shadowy and powerful government agencies can crack the encryption software that...
Each year, law enforcement seizes thousands of electronic devices—smartphones, laptops, and notebook...
Courts across the United States have applied Fifth Amendment protections to passcodes, as long as th...
This symposium article, the first of two on regulation of government\u27s efforts to obtain paper an...
During its last term, the Supreme Court decided two cases involving the production of documents and ...
Five years ago, in a contribution to these pages, I suggested that the Supreme Court\u27s oldest pre...
Advances in technology in the past decade have blurred the line between individuals’ privacy rights ...
This Essay considers whether the government can force a person to decrypt his computer. The only cou...
In an effort to protect the enormous volume of sensitive and valuable data that travels across the I...