首页 | 本学科首页   官方微博 | 高级检索  
     检索      

美国加密数据的强制性披露
引用本文:熊志海,周国平.美国加密数据的强制性披露[J].时代法学,2013,11(1):106-111.
作者姓名:熊志海  周国平
作者单位:重庆邮电大学法学院,重庆,400065
摘    要:随着加密技术的发展,犯罪分子为了达到反取证目的,通常会给自己的电子设备加密。在美国,执法机构要搜查加密设备,将面临来自宪法第四修正案和技术限制两方面的挑战。为应对这些挑战,通常执法机构会通过传票强制被告披露密码或提交解密数据,但这又引出了宪法第五修正案的特权问题。要同时解决宪法第四与第五修正案的问题,最好的办法是将传唤解密数据与限制数据提交范围相结合。然而,一旦被告拒绝传唤,拒不提交解密数据,就有可能导致控诉失败。因此,有必要实施额外的法律机制,以弥补这一法律缺陷。

关 键 词:加密数据  密码  解密  修正案  搜查  自证其罪

Compelled Production of Encrypted Data in the USA
XIONG Zhi-hai , ZHOU Guo-ping.Compelled Production of Encrypted Data in the USA[J].Presentday Law Science,2013,11(1):106-111.
Authors:XIONG Zhi-hai  ZHOU Guo-ping
Institution:(Chongqing University of Posts and Telecommunications Law School,Chongqing 400065,China)
Abstract:With the development of encryption technology, in order to achieve the purpose of anti-forensics, the criminals usually encrypt their electronic device. In the United States, the government will face challenges from the Fourth Amendment and technical constraints to search the encryption devices. To meet these challenges, the law enforcement agencies usually would compel defendants to produce their password, or to decipher their protected data. It does, however, raise the Fifth Amendment concerns. To solve the problems of the fourth and the fifth amendment, the best way is to couple a subpoena for the deciphered data with a warrant that specifies what and how to search. However, once the defendant refused to comply with the summon to produce the incriminating data, it may lead to prosecution of failure. Therefore, it is necessary to implement additional legal mechanisms to compensate for this defect.
Keywords:encrypted data  password  decryption  amendment  search  self-incrimination
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号