The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods
Since at least the beginning of the Cold War, the US government has grappled with the difficulty of introducing deciphered encrypted information in litigation without exposing sensitive sources and methods. This Article describes a method for cutting that Gordian knot. Encryption has been used since...
Gespeichert in:
Veröffentlicht in: | Texas law review 2010-06, Vol.88 (7), p.1767 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 7 |
container_start_page | 1767 |
container_title | Texas law review |
container_volume | 88 |
creator | Patterson, Nicholas J |
description | Since at least the beginning of the Cold War, the US government has grappled with the difficulty of introducing deciphered encrypted information in litigation without exposing sensitive sources and methods. This Article describes a method for cutting that Gordian knot. Encryption has been used since ancient times by militaries, spies, and others to communicate information covertly. As encryption technology has evolved in complexity and decreased in expense with the advent of computer encryption, it has created new opportunities for foreign powers, foreign and corporate spies, terrorist groups, and criminals. This Article articulates a "Key Theory" method for introducing evidence derived from encrypted information while protecting the US government's sources and methods. This Article articulates a theory to introduce evidence derived from encrypted information where the government has made the judgment to reveal that it can decrypt that information. The Key Theory can be used both to protect national security and promote a more efficient litigation process. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_722409251</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2092291441</sourcerecordid><originalsourceid>FETCH-LOGICAL-p182t-d4136731e4d3f8229b1bebc0fdfe92ff5d27770508c96c145390c68edeb6570a3</originalsourceid><addsrcrecordid>eNotTltLwzAYDaJgnf6H4HshSZOm8W3M27CisIm-jTb5smbMpGsyof_e4nw6nHM4lzOUUcVZXgn5dY4yQjjJOaf0El3FuCOECKlEhg7rDvALjHjCMIx3eH5MHfjkdJOc3-J70MPYJzB46W0Yvic1eOw8rl1y2xP77Nwe8PsQEui_0Ap8nOwfwKtwHDRE3HiDXyF1wcRrdGGbfYSbf5yhj8eH9eI5r9-elot5nfe0Yik3nBalLChwU9iKMdXSFlpNrLGgmLXCMCklEaTSqtSUi0IRXVZgoC2FJE0xQ7en3n4IhyPEtNlNZ_w0uZGMcaKYoMUvhp5YeA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>722409251</pqid></control><display><type>article</type><title>The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods</title><source>Business Source Complete</source><creator>Patterson, Nicholas J</creator><creatorcontrib>Patterson, Nicholas J</creatorcontrib><description>Since at least the beginning of the Cold War, the US government has grappled with the difficulty of introducing deciphered encrypted information in litigation without exposing sensitive sources and methods. This Article describes a method for cutting that Gordian knot. Encryption has been used since ancient times by militaries, spies, and others to communicate information covertly. As encryption technology has evolved in complexity and decreased in expense with the advent of computer encryption, it has created new opportunities for foreign powers, foreign and corporate spies, terrorist groups, and criminals. This Article articulates a "Key Theory" method for introducing evidence derived from encrypted information while protecting the US government's sources and methods. This Article articulates a theory to introduce evidence derived from encrypted information where the government has made the judgment to reveal that it can decrypt that information. The Key Theory can be used both to protect national security and promote a more efficient litigation process.</description><identifier>ISSN: 0040-4411</identifier><identifier>EISSN: 1942-857X</identifier><identifier>CODEN: TXLRA2</identifier><language>eng</language><publisher>Austin: University of Texas, Austin, School of Law Publications, Inc</publisher><subject>Criminal investigations ; Cryptography ; Data encryption ; Espionage ; Evidence ; Federal Rules of Evidence ; Law ; Litigation ; National security ; Theory</subject><ispartof>Texas law review, 2010-06, Vol.88 (7), p.1767</ispartof><rights>Copyright University of Texas, Austin, School of Law Publications, Inc. Jun 2010</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Patterson, Nicholas J</creatorcontrib><title>The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods</title><title>Texas law review</title><description>Since at least the beginning of the Cold War, the US government has grappled with the difficulty of introducing deciphered encrypted information in litigation without exposing sensitive sources and methods. This Article describes a method for cutting that Gordian knot. Encryption has been used since ancient times by militaries, spies, and others to communicate information covertly. As encryption technology has evolved in complexity and decreased in expense with the advent of computer encryption, it has created new opportunities for foreign powers, foreign and corporate spies, terrorist groups, and criminals. This Article articulates a "Key Theory" method for introducing evidence derived from encrypted information while protecting the US government's sources and methods. This Article articulates a theory to introduce evidence derived from encrypted information where the government has made the judgment to reveal that it can decrypt that information. The Key Theory can be used both to protect national security and promote a more efficient litigation process.</description><subject>Criminal investigations</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Espionage</subject><subject>Evidence</subject><subject>Federal Rules of Evidence</subject><subject>Law</subject><subject>Litigation</subject><subject>National security</subject><subject>Theory</subject><issn>0040-4411</issn><issn>1942-857X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNotTltLwzAYDaJgnf6H4HshSZOm8W3M27CisIm-jTb5smbMpGsyof_e4nw6nHM4lzOUUcVZXgn5dY4yQjjJOaf0El3FuCOECKlEhg7rDvALjHjCMIx3eH5MHfjkdJOc3-J70MPYJzB46W0Yvic1eOw8rl1y2xP77Nwe8PsQEui_0Ap8nOwfwKtwHDRE3HiDXyF1wcRrdGGbfYSbf5yhj8eH9eI5r9-elot5nfe0Yik3nBalLChwU9iKMdXSFlpNrLGgmLXCMCklEaTSqtSUi0IRXVZgoC2FJE0xQ7en3n4IhyPEtNlNZ_w0uZGMcaKYoMUvhp5YeA</recordid><startdate>20100601</startdate><enddate>20100601</enddate><creator>Patterson, Nicholas J</creator><general>University of Texas, Austin, School of Law Publications, Inc</general><scope>0U~</scope><scope>1-H</scope><scope>3V.</scope><scope>4T-</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AO</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L.0</scope><scope>M0C</scope><scope>M2O</scope><scope>MBDVC</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20100601</creationdate><title>The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods</title><author>Patterson, Nicholas J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p182t-d4136731e4d3f8229b1bebc0fdfe92ff5d27770508c96c145390c68edeb6570a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Criminal investigations</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Espionage</topic><topic>Evidence</topic><topic>Federal Rules of Evidence</topic><topic>Law</topic><topic>Litigation</topic><topic>National security</topic><topic>Theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Patterson, Nicholas J</creatorcontrib><collection>Global News & ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>ABI-INFORM Complete</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>ABI/INFORM Global</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Texas law review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Patterson, Nicholas J</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods</atitle><jtitle>Texas law review</jtitle><date>2010-06-01</date><risdate>2010</risdate><volume>88</volume><issue>7</issue><spage>1767</spage><pages>1767-</pages><issn>0040-4411</issn><eissn>1942-857X</eissn><coden>TXLRA2</coden><abstract>Since at least the beginning of the Cold War, the US government has grappled with the difficulty of introducing deciphered encrypted information in litigation without exposing sensitive sources and methods. This Article describes a method for cutting that Gordian knot. Encryption has been used since ancient times by militaries, spies, and others to communicate information covertly. As encryption technology has evolved in complexity and decreased in expense with the advent of computer encryption, it has created new opportunities for foreign powers, foreign and corporate spies, terrorist groups, and criminals. This Article articulates a "Key Theory" method for introducing evidence derived from encrypted information while protecting the US government's sources and methods. This Article articulates a theory to introduce evidence derived from encrypted information where the government has made the judgment to reveal that it can decrypt that information. The Key Theory can be used both to protect national security and promote a more efficient litigation process.</abstract><cop>Austin</cop><pub>University of Texas, Austin, School of Law Publications, Inc</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0040-4411 |
ispartof | Texas law review, 2010-06, Vol.88 (7), p.1767 |
issn | 0040-4411 1942-857X |
language | eng |
recordid | cdi_proquest_journals_722409251 |
source | Business Source Complete |
subjects | Criminal investigations Cryptography Data encryption Espionage Evidence Federal Rules of Evidence Law Litigation National security Theory |
title | The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T08%3A29%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Key%20Theory:%20Authenticating%20Decrypted%20Information%20in%20Litigation%20While%20Protecting%20Sensitive%20Sources%20and%20Methods&rft.jtitle=Texas%20law%20review&rft.au=Patterson,%20Nicholas%20J&rft.date=2010-06-01&rft.volume=88&rft.issue=7&rft.spage=1767&rft.pages=1767-&rft.issn=0040-4411&rft.eissn=1942-857X&rft.coden=TXLRA2&rft_id=info:doi/&rft_dat=%3Cproquest%3E2092291441%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=722409251&rft_id=info:pmid/&rfr_iscdi=true |