{"id":240,"date":"2013-09-09T00:00:00","date_gmt":"2013-09-09T00:00:00","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/"},"modified":"2024-06-23T23:08:39","modified_gmt":"2024-06-23T23:08:39","slug":"advances-in-technology-and-protection-of-the-rights-of-the-accused","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/","title":{"rendered":"Advances in Technology and Protection of the Rights of the Accused"},"content":{"rendered":"<p>When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag. This is especially true in the case where suspects are asked to disclose passwords or decryption keys. \u00a0The Fifth Amendment to the U.S. Constitution provides that no person \u201cbe compelled in any criminal case to be a witness against himself.\u201d There have been two key conflicting Supreme Court rulings that have bearing on the <b>Fifth Amendment<\/b> issue.<a title=\"\" href=\"#_ftn1\">[1]<\/a> \u00a0The 1966 Miranda v. Arizona ruling resulted in the reading of \u201cMiranda\u201d rights by law enforcement officials on the \u201cright to remain silent.\u201d A recent case heard by the Supreme Court (Salinas v. Texas) concluded that silence alone was insufficient to invoke the <b>Fifth Amendment<\/b> privilege.<\/p>\n<p>The state courts appear to be really divided on how to interpret <b>Fifth Amendment<\/b> issues with respect to non-disclosure of : 1) encryption keys, and 2) account passwords.\u00a0 I\u2019ll summarize three separate state cases in chronological order from Delaware, Colorado, and Wisconsin below.<\/p>\n<p><span style=\"text-decoration: underline;\">Late 2011 \u2013 Delaware Case<\/span><\/p>\n<p>In <i>Gore v. Long and BHA Group<\/i> (Del. Ch. Dec. 28, 2011) (Parsons, V.C.) an employee \u201cLong\u201d was terminated after which he went to work for BHA Group. Gore asserted civil claims that Long had unauthorized access to company\u2019s electronic documents. Long turned over company Blackberry upon termination but apparently had copies of some company documents on his personal smart phone and also retained some storage devices.\u00a0 Long could also face criminal penalties under certain provisions of Delaware law; therefore, he said that he would invoke the <b>Fifth Amendment<\/b> if asked questions involving potentially incriminating information.<\/p>\n<p>During the trial Long did invoke the <b>Fifth Amendment<\/b> but Gore argued that Long had waived this right when he answered certain questions regarding the sequence of events. The judge (Vice Chancellor Parsons) used a \u201c<b><i>totality of the circumstances<\/i><\/b>\u201d test on the issue and upheld Long\u2019s invocation of the <b>Fifth Amendment<\/b> by ordering the striking of certain portions of Long\u2019s testimony. Although this case does not deal with encryption, the use of this test establishes an important legal precedent.<\/p>\n<p><span style=\"text-decoration: underline;\">Early 2012 \u2013 Colorado Case<\/span><\/p>\n<p>In <i>U.S. v. Fricosu<\/i> a court ordered Ramona Fricosu to provide an unencrypted version of her laptop to the court in a mortgage fraud case defrauding banks of an estimated $900,000 (<a title=\"Legal Editor, 2012, May #645\" href=\"#_ENREF_2\">Legal Editor, 2012, May<\/a>). She had earlier claimed <b>Fifth Amendment<\/b> privilege in the case. Judge Robert Blackburn ruling for the U.S. District Court for the District of Colorado issued the order. Her laptop had been seized during a search in 2010; however, investigators had not been able to use it because it was encrypted using PGP Desktop (<a title=\"Lee, 2012, January 24 #643\" href=\"#_ENREF_1\">Lee, 2012, January 24<\/a>). The judge cited a child pornography case in Vermont in making his decision (Grand Jury Subpoena to Boucher).<\/p>\n<p><span style=\"text-decoration: underline;\">April 2013 \u2013 Wisconsin Case<\/span><\/p>\n<p>In a Wisconsin case involving child pornography alleged to have been collected by Jeffery Feldman the court ruled to protect the accused\u2019s <b>Fifth Amendment<\/b> rights.\u00a0 FBI agents traced the material to home of this software developer with a Fortune 500 company and, with a search warrant, seized his computer and \u201cmore than a dozen external hard drives with nearly 20 terabytes of storage capacity\u201d (<a title=\"Vielmetti, 2013, April 25 #644\" href=\"#_ENREF_3\">Vielmetti, 2013, April 25<\/a>). All of the material was encrypted.\u00a0 Feldman invoked the <b>Fifth Amendment<\/b> when asked to decrypt the contents and he was held in contempt of court.\u00a0 Upon appeal, this decision was reversed.<\/p>\n<p><b>Key Issues:<\/b><\/p>\n<p>For purposes of debate, I will take the position that courts need to provide law enforcement authorities with more direction on what can, and cannot be done with respect to compelling witnesses and\/or suspects in providing decryption keys. In researching this topic I can across both the <b><i>totality of the circumstances test<\/i><\/b> and a principal that is being advanced called the \u201c<b><i>foregone conclusion argument<\/i><\/b>.\u201d It is my belief that a totality of the circumstances argument could be made in criminal cases where there is other evidence suggesting that information on an encrypted hard drive would substantiate a working hypothesis.\u00a0 Extending this logic even farther, law enforcement officials and prosecuting attorneys could also benefit by leveraging other evidence to make a foregone conclusion argument to a judge.\u00a0 Here, the case could be made that other evidence that points to the guilt of the accused <em><strong>and<\/strong><\/em> any unencrypted information from the digital evidence would only substantiate this case.<\/p>\n<p>Of course, this strategy assumes that the law enforcement officials actually <b><i>have<\/i><\/b> additional evidence.<\/p>\n<p><b>References:<\/b><\/p>\n<p>Lee, T. (2012, January 24). Judge: Fifth Amendment doesn&#8217;t protect encrypted hard drives. <i>ArsTechnica<\/i>. <a href=\"http:\/\/arstechnica.com\/tech-policy\/2012\/01\/judge-fifth-amendment-doesnt-protect-encrypted-hard-drives\/\">http:\/\/arstechnica.com\/tech-policy\/2012\/01\/judge-fifth-amendment-doesnt-protect-encrypted-hard-drives\/<\/a><\/p>\n<p>Legal Editor. (2012, May). Courts rule for, against hard drive encryption. <i>Information Management, Vol. 26, Num. 3<\/i>. <\/p>\n<p>Vielmetti, B. (2013, April 25). West Allis encryption case delves into Fifth Amendment case: Porn investigation has unusual twist. <i>Milwaukee, Wisconsin &#8211; Journal Sentinel<\/i>. <\/p>\n<div>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<div>\n<p><a title=\"\" href=\"#_ftnref1\">[1]<\/a> Miranda v. Arizona, 384 U.S. 436 (1966) (<a href=\"http:\/\/www.law.cornell.edu\/supct\/html\/historics\/USSC_CR_0384_0436_ZS.html\">http:\/\/www.law.cornell.edu\/supct\/html\/historics\/USSC_CR_0384_0436_ZS.html<\/a>) and Salinas v. Texas, No. 12-246 (<a href=\"http:\/\/www.supremecourt.gov\/opinions\/12pdf\/12-246_7l48.pdf\">http:\/\/www.supremecourt.gov\/opinions\/12pdf\/12-246_7l48.pdf<\/a>).<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.  <\/p>\n","protected":false},"author":2,"featured_media":241,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[101,27],"tags":[241,242,243,244,245,246,247,248,249,250,251],"class_list":["post-240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-law","category-policy","tag-account-passwords","tag-criminal-case","tag-encryption-keys","tag-fifth-amendment-issue","tag-fifth-amendment-privilege","tag-law-enforcement-officials","tag-miranda-rights","tag-rights-of-the-accused","tag-storage-devices","tag-supreme-court-rulings","tag-u-s-constitution"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Advances in Technology and Protection of the Rights of the Accused - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2013-09-09T00:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-23T23:08:39+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Advances in Technology and Protection of the Rights of the Accused - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#blogposting\",\"name\":\"Advances in Technology and Protection of the Rights of the Accused - CTIN\",\"headline\":\"Advances in Technology and Protection of the Rights of the Accused\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2013\\\/09\\\/iStock_000001836238XSmall.jpg\",\"width\":425,\"height\":282},\"datePublished\":\"2013-09-09T00:00:00+00:00\",\"dateModified\":\"2024-06-23T23:08:39+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#webpage\"},\"articleSection\":\"Law, Policy, account passwords, criminal case, encryption keys, fifth amendment issue, fifth amendment privilege, law enforcement officials, miranda rights, rights of the accused, storage devices, supreme court rulings, u s constitution\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"position\":4,\"name\":\"Policy\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#listItem\",\"name\":\"Advances in Technology and Protection of the Rights of the Accused\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#listItem\",\"position\":5,\"name\":\"Advances in Technology and Protection of the Rights of the Accused\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/policy\\\/#listItem\",\"name\":\"Policy\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/\",\"name\":\"Advances in Technology and Protection of the Rights of the Accused - CTIN\",\"description\":\"When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2013\\\/09\\\/iStock_000001836238XSmall.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#mainImage\",\"width\":425,\"height\":282},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2013\\\/09\\\/09\\\/advances-in-technology-and-protection-of-the-rights-of-the-accused\\\/#mainImage\"},\"datePublished\":\"2013-09-09T00:00:00+00:00\",\"dateModified\":\"2024-06-23T23:08:39+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Advances in Technology and Protection of the Rights of the Accused - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Advances in Technology and Protection of the Rights of the Accused - CTIN","description":"When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#blogposting","name":"Advances in Technology and Protection of the Rights of the Accused - CTIN","headline":"Advances in Technology and Protection of the Rights of the Accused","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2013\/09\/iStock_000001836238XSmall.jpg","width":425,"height":282},"datePublished":"2013-09-09T00:00:00+00:00","dateModified":"2024-06-23T23:08:39+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#webpage"},"articleSection":"Law, Policy, account passwords, criminal case, encryption keys, fifth amendment issue, fifth amendment privilege, law enforcement officials, miranda rights, rights of the accused, storage devices, supreme court rulings, u s constitution"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","position":3,"name":"CyberSecurity","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","position":4,"name":"Policy","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#listItem","name":"Advances in Technology and Protection of the Rights of the Accused"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#listItem","position":5,"name":"Advances in Technology and Protection of the Rights of the Accused","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/#listItem","name":"Policy"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/","name":"Advances in Technology and Protection of the Rights of the Accused - CTIN","description":"When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2013\/09\/iStock_000001836238XSmall.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#mainImage","width":425,"height":282},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/#mainImage"},"datePublished":"2013-09-09T00:00:00+00:00","dateModified":"2024-06-23T23:08:39+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Advances in Technology and Protection of the Rights of the Accused - CTIN","og:description":"When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2013-09-09T00:00:00+00:00","article:modified_time":"2024-06-23T23:08:39+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Advances in Technology and Protection of the Rights of the Accused - CTIN","twitter:description":"When looking at recent case law and Supreme Court rulings on how advances in technology affect the rights of the accused it appears to be a mixed bag.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"240","title":null,"description":null,"keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:18:57","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2021-08-07 21:53:22","updated":"2025-08-25 22:18:57"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/\" title=\"CyberSecurity\">CyberSecurity<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/\" title=\"Policy\">Policy<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tAdvances in Technology and Protection of the Rights of the Accused\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"CyberSecurity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/"},{"label":"Policy","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/policy\/"},{"label":"Advances in Technology and Protection of the Rights of the Accused","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2013\/09\/09\/advances-in-technology-and-protection-of-the-rights-of-the-accused\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=240"}],"version-history":[{"count":4,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/240\/revisions"}],"predecessor-version":[{"id":4440,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/240\/revisions\/4440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/241"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}