The Fourth Amendment in Cyberspace: Can Encryption Create a Reasonable Expectation of Privacy?

33 Pages Posted: 4 Sep 2006 Last revised: 26 Apr 2017

Date Written: 2001

Abstract

Does encrypting Internet communications create a reasonable expectation of privacy in their contents, triggering Fourth Amendment protection? At first blush, it seems that the answer must be yes: A reasonable person would surely expect that encrypted communications will remain private. In this paper, Professor Kerr explains why this intuitive answer is entirely wrong: Encrypting communications cannot create a reasonable expectation of privacy. The reason is that the Fourth Amendment regulates access, not understanding: no matter how unlikely it is that the government will successfully decrypt ciphertext, the Fourth Amendment offers no protection if it succeeds. As a result, the government does not need a search warrant to decrypt encrypted communications. This surprising result is consistent with Fourth Amendment caselaw: it matches how courts have resolved cases involving the reassembly of shredded documents, recovery of deleted files, and the translation of foreign languages. The Fourth Amendment may regulate government access to ciphertext, but it does not regulate government efforts to translate ciphertext into plaintext.

Keywords: Fourth Amendment, ciphertext, encryption, plaintext, reasonable expectation of privacy

JEL Classification: K14, K39, K42

Suggested Citation

Kerr, Orin S., The Fourth Amendment in Cyberspace: Can Encryption Create a Reasonable Expectation of Privacy? (2001). 33 Connecticut Law Review 503 (2001), Available at SSRN: https://ssrn.com/abstract=927973

Orin S. Kerr (Contact Author)

Stanford Law School ( email )

559 Nathan Abbott Way
Stanford, CA 94305-8610
United States

Do you have a job opening that you would like to promote on SSRN?

Paper statistics

Downloads
1,615
Abstract Views
10,572
Rank
23,932
PlumX Metrics