{"id":741,"date":"2019-08-05T11:34:59","date_gmt":"2019-08-05T15:34:59","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/104-online\/the-micro-hornbook-on-the-fifth-amendment-and-encryption\/"},"modified":"2025-05-12T11:14:14","modified_gmt":"2025-05-12T15:14:14","slug":"the-micro-hornbook-on-the-fifth-amendment-and-encryption","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/submit\/glj-online\/104-online\/the-micro-hornbook-on-the-fifth-amendment-and-encryption\/","title":{"rendered":"The Micro-Hornbook on the Fifth Amendment and Encryption"},"content":{"rendered":"<p>The DOJ calls encryption a \u201czone of lawlessness.\u201d Others call it an \u201c[e]scape from [t]yranny.\u201d Opinions on encryption clearly diverge. But this micro-hornbook isn\u2019t about opinions. It\u2019s about the law\u2014on what happens when the government has the right to search digital data (perhaps through a search warrant), but can\u2019t because the data is password protected and encrypted. Can the government, without violating the Fifth Amendment, force a phone\u2019s owner to (a) produce the phone\u2019s password or (b) produce the decrypted phone (i.e., force her first to enter the password and then to produce the phone)? The first question\u2019s answer is easy; the second\u2019s answer is hard; and this micro-hornbook sketches the answers for both.<\/p>\n<p>Continue reading<em> The Micro-Hornbook on the Fifth Amendment and Encryption\u00a0<\/em>on <a href=\"https:\/\/heinonline.org\/HOL\/P?h=hein.journals\/gljon105&amp;i=168&amp;a=Z2VvcmdldG93bi5lZHU\">HeinOnline<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The DOJ calls encryption a \u201czone of lawlessness.\u201d Others call it an \u201c[e]scape from [t]yranny.\u201d Opinions on encryption clearly diverge. But this micro-hornbook isn\u2019t about opinions. It\u2019s about the law\u2014on [&hellip;]<\/p>\n","protected":false},"author":627,"featured_media":0,"parent":730,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"abstract.php","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-741","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/users\/627"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/comments?post=741"}],"version-history":[{"count":3,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/741\/revisions"}],"predecessor-version":[{"id":944,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/741\/revisions\/944"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/730"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/media?parent=741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}