The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods

Since at least the beginning of the Cold War, the US government has grappled with the difficulty of introducing deciphered encrypted information in litigation without exposing sensitive sources and methods. This Article describes a method for cutting that Gordian knot. Encryption has been used since...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Texas law review 2010-06, Vol.88 (7), p.1767
1. Verfasser: Patterson, Nicholas J
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 7
container_start_page 1767
container_title Texas law review
container_volume 88
creator Patterson, Nicholas J
description Since at least the beginning of the Cold War, the US government has grappled with the difficulty of introducing deciphered encrypted information in litigation without exposing sensitive sources and methods. This Article describes a method for cutting that Gordian knot. Encryption has been used since ancient times by militaries, spies, and others to communicate information covertly. As encryption technology has evolved in complexity and decreased in expense with the advent of computer encryption, it has created new opportunities for foreign powers, foreign and corporate spies, terrorist groups, and criminals. This Article articulates a "Key Theory" method for introducing evidence derived from encrypted information while protecting the US government's sources and methods. This Article articulates a theory to introduce evidence derived from encrypted information where the government has made the judgment to reveal that it can decrypt that information. The Key Theory can be used both to protect national security and promote a more efficient litigation process.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_722409251</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2092291441</sourcerecordid><originalsourceid>FETCH-LOGICAL-p182t-d4136731e4d3f8229b1bebc0fdfe92ff5d27770508c96c145390c68edeb6570a3</originalsourceid><addsrcrecordid>eNotTltLwzAYDaJgnf6H4HshSZOm8W3M27CisIm-jTb5smbMpGsyof_e4nw6nHM4lzOUUcVZXgn5dY4yQjjJOaf0El3FuCOECKlEhg7rDvALjHjCMIx3eH5MHfjkdJOc3-J70MPYJzB46W0Yvic1eOw8rl1y2xP77Nwe8PsQEui_0Ap8nOwfwKtwHDRE3HiDXyF1wcRrdGGbfYSbf5yhj8eH9eI5r9-elot5nfe0Yik3nBalLChwU9iKMdXSFlpNrLGgmLXCMCklEaTSqtSUi0IRXVZgoC2FJE0xQ7en3n4IhyPEtNlNZ_w0uZGMcaKYoMUvhp5YeA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>722409251</pqid></control><display><type>article</type><title>The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods</title><source>Business Source Complete</source><creator>Patterson, Nicholas J</creator><creatorcontrib>Patterson, Nicholas J</creatorcontrib><description>Since at least the beginning of the Cold War, the US government has grappled with the difficulty of introducing deciphered encrypted information in litigation without exposing sensitive sources and methods. This Article describes a method for cutting that Gordian knot. Encryption has been used since ancient times by militaries, spies, and others to communicate information covertly. As encryption technology has evolved in complexity and decreased in expense with the advent of computer encryption, it has created new opportunities for foreign powers, foreign and corporate spies, terrorist groups, and criminals. This Article articulates a "Key Theory" method for introducing evidence derived from encrypted information while protecting the US government's sources and methods. This Article articulates a theory to introduce evidence derived from encrypted information where the government has made the judgment to reveal that it can decrypt that information. The Key Theory can be used both to protect national security and promote a more efficient litigation process.</description><identifier>ISSN: 0040-4411</identifier><identifier>EISSN: 1942-857X</identifier><identifier>CODEN: TXLRA2</identifier><language>eng</language><publisher>Austin: University of Texas, Austin, School of Law Publications, Inc</publisher><subject>Criminal investigations ; Cryptography ; Data encryption ; Espionage ; Evidence ; Federal Rules of Evidence ; Law ; Litigation ; National security ; Theory</subject><ispartof>Texas law review, 2010-06, Vol.88 (7), p.1767</ispartof><rights>Copyright University of Texas, Austin, School of Law Publications, Inc. Jun 2010</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Patterson, Nicholas J</creatorcontrib><title>The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods</title><title>Texas law review</title><description>Since at least the beginning of the Cold War, the US government has grappled with the difficulty of introducing deciphered encrypted information in litigation without exposing sensitive sources and methods. This Article describes a method for cutting that Gordian knot. Encryption has been used since ancient times by militaries, spies, and others to communicate information covertly. As encryption technology has evolved in complexity and decreased in expense with the advent of computer encryption, it has created new opportunities for foreign powers, foreign and corporate spies, terrorist groups, and criminals. This Article articulates a "Key Theory" method for introducing evidence derived from encrypted information while protecting the US government's sources and methods. This Article articulates a theory to introduce evidence derived from encrypted information where the government has made the judgment to reveal that it can decrypt that information. The Key Theory can be used both to protect national security and promote a more efficient litigation process.</description><subject>Criminal investigations</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Espionage</subject><subject>Evidence</subject><subject>Federal Rules of Evidence</subject><subject>Law</subject><subject>Litigation</subject><subject>National security</subject><subject>Theory</subject><issn>0040-4411</issn><issn>1942-857X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNotTltLwzAYDaJgnf6H4HshSZOm8W3M27CisIm-jTb5smbMpGsyof_e4nw6nHM4lzOUUcVZXgn5dY4yQjjJOaf0El3FuCOECKlEhg7rDvALjHjCMIx3eH5MHfjkdJOc3-J70MPYJzB46W0Yvic1eOw8rl1y2xP77Nwe8PsQEui_0Ap8nOwfwKtwHDRE3HiDXyF1wcRrdGGbfYSbf5yhj8eH9eI5r9-elot5nfe0Yik3nBalLChwU9iKMdXSFlpNrLGgmLXCMCklEaTSqtSUi0IRXVZgoC2FJE0xQ7en3n4IhyPEtNlNZ_w0uZGMcaKYoMUvhp5YeA</recordid><startdate>20100601</startdate><enddate>20100601</enddate><creator>Patterson, Nicholas J</creator><general>University of Texas, Austin, School of Law Publications, Inc</general><scope>0U~</scope><scope>1-H</scope><scope>3V.</scope><scope>4T-</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AO</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L.0</scope><scope>M0C</scope><scope>M2O</scope><scope>MBDVC</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20100601</creationdate><title>The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods</title><author>Patterson, Nicholas J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p182t-d4136731e4d3f8229b1bebc0fdfe92ff5d27770508c96c145390c68edeb6570a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Criminal investigations</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Espionage</topic><topic>Evidence</topic><topic>Federal Rules of Evidence</topic><topic>Law</topic><topic>Litigation</topic><topic>National security</topic><topic>Theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Patterson, Nicholas J</creatorcontrib><collection>Global News &amp; ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>ABI-INFORM Complete</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>ABI/INFORM Global</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Texas law review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Patterson, Nicholas J</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods</atitle><jtitle>Texas law review</jtitle><date>2010-06-01</date><risdate>2010</risdate><volume>88</volume><issue>7</issue><spage>1767</spage><pages>1767-</pages><issn>0040-4411</issn><eissn>1942-857X</eissn><coden>TXLRA2</coden><abstract>Since at least the beginning of the Cold War, the US government has grappled with the difficulty of introducing deciphered encrypted information in litigation without exposing sensitive sources and methods. This Article describes a method for cutting that Gordian knot. Encryption has been used since ancient times by militaries, spies, and others to communicate information covertly. As encryption technology has evolved in complexity and decreased in expense with the advent of computer encryption, it has created new opportunities for foreign powers, foreign and corporate spies, terrorist groups, and criminals. This Article articulates a "Key Theory" method for introducing evidence derived from encrypted information while protecting the US government's sources and methods. This Article articulates a theory to introduce evidence derived from encrypted information where the government has made the judgment to reveal that it can decrypt that information. The Key Theory can be used both to protect national security and promote a more efficient litigation process.</abstract><cop>Austin</cop><pub>University of Texas, Austin, School of Law Publications, Inc</pub></addata></record>
fulltext fulltext
identifier ISSN: 0040-4411
ispartof Texas law review, 2010-06, Vol.88 (7), p.1767
issn 0040-4411
1942-857X
language eng
recordid cdi_proquest_journals_722409251
source Business Source Complete
subjects Criminal investigations
Cryptography
Data encryption
Espionage
Evidence
Federal Rules of Evidence
Law
Litigation
National security
Theory
title The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T08%3A29%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Key%20Theory:%20Authenticating%20Decrypted%20Information%20in%20Litigation%20While%20Protecting%20Sensitive%20Sources%20and%20Methods&rft.jtitle=Texas%20law%20review&rft.au=Patterson,%20Nicholas%20J&rft.date=2010-06-01&rft.volume=88&rft.issue=7&rft.spage=1767&rft.pages=1767-&rft.issn=0040-4411&rft.eissn=1942-857X&rft.coden=TXLRA2&rft_id=info:doi/&rft_dat=%3Cproquest%3E2092291441%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=722409251&rft_id=info:pmid/&rfr_iscdi=true