Skip to main content
Log in

Electronic evidence: dealing with encrypted data and understanding software, logic and proof

  • Article
  • Published:
ERA Forum Aims and scope

Abstract

This article considers two topics that are directly related to digital evidence: (i) encrypted data and (ii) software, logic and proof: understanding more than the output of electronic evidence. Both topics are of significance in legal proceedings, especially criminal proceedings. In relation to encrypted data, this article briefly considers how such data is treated in Canada, England & Wales and the United States of America. Respecting the topic of software, logic and proof: understanding more than the output of electronic evidence, the aim is to illustrate why it is necessary to understand the nature of the technology and why it is necessary to enquire into causation in respect of evidence in digital format.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 2007 WL 4246473 (D.Vt.).

  2. In re Grand Jury Subpoena to Sebastien Boucher, 2009 WL 424718 (D.Vt.).

  3. The Boucher case was not cited in an identical argument before Borman, DJ in United States of America v. Kirschner, 2010 WL 1257355 (E.D. Mich.), who decided that the subpoena requiring the defendant to give up the password must be quashed, on the basis that the request would incriminate him. For more discussion and reference to other articles, see Colarusso [1]; Fakhoury [2]; for the position in Slovenia, see Šepec [6].

  4. 2008 CANLII 27481 (ON SC).

  5. [2008] WLR (D) 313, [2008] EWCA Crim 2177.

  6. [2008] EWCA Crim 2177, [2008] WLR (D) 313 at 21.

  7. 2007 WL 4246473 (D. Vermont Nov. 29, 2007).

  8. In the 2008–2009 Annual Report by the Chief Commissioner of the Office of Surveillance Commissioners, The Rt. Hon. Sir Christopher Rose indicated at 4.11 that ‘During the period of this report, NTAC approved 26 applications for the service of a notice under s.49 of RIPA Part III. Of these 17 went on to obtain permission from a Judge. No permissions were refused and 15 Notices were served. Eleven individuals failed to comply resulting in seven charges and two convictions. The types of crime under investigation were: counter terrorism, child indecency and domestic extremism.’

  9. United States Court of Appeals for the Eleventh Circuit No 00-14592 July 17, 2002 before Anderson and Marcus, Circuit Judges, and Middlebrooks, District Judge available in electronic format at http://laws.lp.findlaw.com/11th/0014592opn.html.

  10. For a more detailed discussion, see Mason [3], 4.01; 10.66–10.82.

  11. Willassen [7], 210.

  12. KL HC Com. Div. D-22NCC439-2011, discussed in detail in Radhakrishna [5].

  13. United States District Court for the District of Columbia No 00-2325 (ESH) 26 March 2003.

  14. State of Connecticut v Julie Amero (Docket number CR-04-93292; Superior Court, New London Judicial District at Norwich, GA 21; 3, 4 and 5 January 2007); for a detailed analysis of this case, see Mason [4], xxxvi–lxxv.

  15. (1983) 76 Cr App R 23, [1982] Crim LR 667, CA.

  16. (1979) 21 S.A.S.R. 569.

  17. [1980] 2 NZLR 124.

  18. (1993) 70 A Crim R 133; also cited as Rook v Maynard (1993) 126 ALR 150.

  19. [2009] EWCA Civ 46.

  20. [2009] EWCA Civ 46 at 5.

  21. [2009] EWCA Civ 46 at 21.

  22. [2009] EWCA Civ 46 at 51.

  23. The Crypto Law Survey is maintained by Professor Bert-Jaap Koops: http://cryptolaw.org.

References

  1. Colarusso, D.: Heads in the clouds, a coming storm—the interplay of cloud computing, encryption, and the fifth amendment’s protection against self-incrimination. Boston Univ. School Law J. Sci. Technol. Law 17(1) (2011)

  2. Fakhoury, H.: A combination or a key? The fifth amendment and privilege against compelled decryption. Dig. Evid. Electron. Signat. Law Rev. 9, 81–87 (2012)

    Google Scholar 

  3. Mason, S. (gen. ed.): Electronic Evidence, 3rd edn. LexisNexis Butterworths, London (2012)

    Google Scholar 

  4. Mason, S. (gen. ed.): International Electronic Evidence. British Institute of International and Comparative Law, London (2008)

    Google Scholar 

  5. Radhakrishna, G.: E-mail evidence and the hearsay rule—commentary on a recent Malaysian case. Dig. Evid. Electron. Signat. Law Rev. 10, 107–114 (2013)

    Google Scholar 

  6. Šepec, M.: Digital data encryption—aspects of criminal law and dilemmas in Slovenia. Dig. Evid. Electron. Signat. Law Rev. 10, 147–154 (2013)

    Google Scholar 

  7. Willassen, S.Y.: Line based hash analysis of source code infringement. Dig. Evid. Electron. Signat. Law Rev. 6, 210–213 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stephen Mason.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mason, S. Electronic evidence: dealing with encrypted data and understanding software, logic and proof. ERA Forum 15, 25–36 (2014). https://doi.org/10.1007/s12027-013-0332-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12027-013-0332-x

Keywords

Navigation