Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries

66 Pages Posted: 15 Feb 2018 Last revised: 9 Mar 2019

See all articles by Aloni Cohen

Aloni Cohen

Boston University - Hariri Institute for Computing, School of Law

Sunoo Park

Massachusetts Institute of Technology (MIT)

Date Written: February 4, 2018

Abstract

This Article examines how the legality of governmentally compelled decryption can be surprisingly sensitive to technological nuances. It overviews the reasoning behind a collection of cases that have shaped the doctrine to date on compelled decryption and the Fifth Amendment, and categorizes past cases into four archetypal patterns. Building upon this, the Article examines the sensitivity of the doctrine to technological change by means of “technological hypotheticals:” that is, by identifying assumptions implicit in courts’ analyses to date regarding the nature of the encryption technology involved, and considering the potential impact of realistic variant technologies (such as special types of encryption) that could challenge those assumptions. Next, the Article revisits the doctrine and the ongoing challenge faced by courts of reaching robust decisions whose underlying reasoning will remain unequivocal and relevant in the face of future technological developments. Towards addressing this challenge, some specific analytical approaches and technical considerations are distilled. Then, inspired by the importance of the concept of existence in Fifth Amendment doctrine as influentially set forth in Fisher v. United States, discusses the nature of existence of encrypted data and passwords as distinct from that of more tangible objects, accentuating some challenges of applying precedent set in the physical domain to digital information. The Article concludes with a brief reflection on the long-term desirability of technological sensitivity as found in compelled decryption cases.

Keywords: encryption, Fifth Amendment, self-incrimination, testimony, passwords

Suggested Citation

Cohen, Aloni and Park, Sunoo, Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries (February 4, 2018). Harvard Journal of Law & Technology, Vol. 32, Fall 2018, Available at SSRN: https://ssrn.com/abstract=3117984 or http://dx.doi.org/10.2139/ssrn.3117984

Aloni Cohen

Boston University - Hariri Institute for Computing, School of Law ( email )

765 Commonwealth Avenue
Boston, MA 02215
United States

Sunoo Park (Contact Author)

Massachusetts Institute of Technology (MIT) ( email )

77 Massachusetts Avenue
50 Memorial Drive
Cambridge, MA 02139-4307
United States

Do you have a job opening that you would like to promote on SSRN?

Paper statistics

Downloads
386
Abstract Views
1,697
rank
100,278
PlumX Metrics