Computers, Privacy & the Constitution

View   r5  >  r4  >  r3  >  r2  >  r1
TheodoreSmithFirstPaper 5 - 05 Jan 2010 - Main.IanSullivan
Line: 1 to 1
Changed:
<
<
META TOPICPARENT name="FirstPaper"
>
>
META TOPICPARENT name="OldPapers"
 

Digital Metaphor and the 5th Amendment

-- TheodoreSmith - 31 May 2009


TheodoreSmithFirstPaper 4 - 01 Jun 2009 - Main.TheodoreSmith
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Changed:
<
<

Identity and the 5th Amendment

>
>

Digital Metaphor and the 5th Amendment

 
Changed:
<
<
-- TheodoreSmith - 09 Mar 2009
>
>
-- TheodoreSmith - 31 May 2009
 

Table of Contents

Line: 11 to 11
 
Deleted:
<
<

Introduction

The same set of challenges we have seen in the 4th Amendment – the fixation on physical metaphor and “place-y-ness” – extend to the self-incrimination provisions of the 5th Amendment. The ongoing appeal in the case of In Re Boucher (1) provides us with an excellent opportunity to examine these issues: how the changing boundaries of personal identity in a paradigm of easily transferred and stored information have outpaced the slow shifts of constitutional law.

In Re Boucher

The facts of In Re Boucher are straightforward. Border agents found several files suggestive of child pornography on the “Z” drive of Boucher’s laptop. Boucher was arrested and his laptop seized; however, when law enforcement agents later restarted the computer, the Z drive was found to be encrypted and inaccessible barring the application of a password. Boucher was subpoenaed for the password to the drive, but moved to quash on 5th Amendment grounds. Although his motion was initially granted by the Magistrate Judge hearing the issue, the motion was denied on appeal to the Vermont District Court.

Notes

1 : In re Boucher, Slip Copy, 2009 WL 424718, *3 (D.Vt. 2009).


 
Changed:
<
<
The Supreme Court has held that the 5th Amendment protects only “compelled testimonial communication.”(2) The actual documents sought in cases such as Boucher rarely fall within this definition: they are often non-testimonial (i.e. evidence of child pornography), and nearly always non-compelled (created freely by the defendant). Insofar as the substance of the information sought is therefore typically not within the scope of immunity, courts have focused their 5th amendment analysis on “whether the act of producing [the information] would constitute compelled testimonial communication ... regardless of ‘the contents or nature of the thing demanded.’ ”(3)

Notes

2 : Fisher v. United States, 425 U.S. 391, 409 (1976)

3 : In re Grand Jury Subpoena Duces Tecum Dated Oct. 29, 1992 (United States v. Doe), 1 F.3d 87, 93 (2d Cir. 1993).


>
>

Introduction

 
Changed:
<
<
An act of production on subpoena is by definition compelled; the scope of immunity is therefore governed by the degree to which the act is testimonial. Courts have found an act of production to be testimonial “in two situations: (1) ‘if the existence and location of the subpoenaed [documents] are unknown to the government’; or (2) where production would ‘implicitly authenticate’ the documents.” ”(4)

Notes

4 : Id. (quoting United States v. Fox, 721 F.2d 32, 36 (2d Cir. 1983))


>
>
Although ontological questions in law are by no means limited to issues surrounding technology, the ephemeral nature of digital information presents the courts with a unique challenge. The ongoing appeal in the case of In Re Boucher (5) provides an excellent opportunity to examine the potentially conflicting metaphors used by the judiciary in addressing electronic data and the law.
 
Added:
>
>

In Re Boucher

 
Changed:
<
<

A Physical Metaphor

>
>
The facts of In Re Boucher are straightforward. Border agents found several files suggestive of child pornography on Boucher’s laptop. Boucher was arrested and his laptop seized; however, when law enforcement agents later restarted the computer, the hard drive was found to be encrypted and inaccessible barring the application of a password. Boucher was subpoenaed for the password to the drive, but moved to quash on 5th Amendment grounds. Although initially granted by a Magistrate, this motion was denied on appeal to the Vermont District Court.
 
Changed:
<
<
For the purposes of this essay we will focus on the first of the situations mentioned above. This first category of cases is meant to cover “fishing expeditions” – where the government serves a broad subpoena on the defendant in the hopes of uncovering incriminating evidence. The resulting act of production is testimonial, insofar as the assembly and identification of the documents required “extensive use of ‘the contents of [the defendant’s] own mind’” (6)

Notes

6 : U.S. v. Hubbell, 530 U.S. 27, 43 (2000).


>
>
The Supreme Court has held that the 5th Amendment protects only “compelled testimonial communication.”(7) Insofar as the actual documents at issue in most cases are non-testimonial, courts have focused their analysis on “whether the act of producing [the information] would constitute compelled testimonial communication ... regardless of ‘the contents or nature of the thing demanded.’ ”(8) Courts have found an act of production to be testimonial “in two situations: (1) ‘if the existence and location of the subpoenaed [documents] are unknown to the government’; or (2) where production would ‘implicitly authenticate’ the documents.”(9)
 
Changed:
<
<
The District Court in Boucher found that this burden of showing knowledge of the existence and location of the documents had been met: a border agent had “viewed the contents of some of the Z drive's files,” and the Government could demonstrate the existence and location of the drive itself. Although the Court did not disagree with the Magistrate’s finding that the government had “not viewed most of the files on the Z drive, and therefore [did] not know whether most of the files on the Z drive contain[ed] incriminating material,” it found this immaterial under the facts of the case. (10)

Notes

10 : In re Boucher, Slip Copy, 2009 WL 424718, *3 (D.Vt. 2009).


>
>

The “Document” Approach

 
Changed:
<
<
The District Court appeared to justify its holding by framing the drive itself as the evidence to be revealed, rather than the documents within the drive. Understood thus, the drive was like a calendar that contained incriminating entries. The government did not have to know the “content” of each entry, but rather only that the calendar existed and contained potentially incriminating information. Similarly, knowledge of the existence of the drive, and that some of the contents “may consist of … child pornography,” was enough to meet the existence and location requirement with the “reasonabl[e] particularity” required.(11)

Notes

11 : Id.


>
>
For the purposes of this essay we will focus on the first of the situations mentioned above. This first category of cases is meant to cover “fishing expeditions” – where the government serves a broad subpoena on the defendant in the hopes of uncovering incriminating evidence. The resulting act of production is testimonial, insofar as the assembly and identification of the documents requires “extensive use of ‘the contents of [the defendant’s] own mind’” (12)
 
Added:
>
>
The District Court in Boucher found that the government’s burden of showing knowledge of the existence and location of the documents had been met: a border agent had “viewed the contents of some of the … drive's files,” and the Government could demonstrate the existence and location of the drive itself. Although the Court agreed with the assertion that the government had “not viewed most of the files on the … drive, and therefore [did] not know whether most of the files on the … drive contain[ed] incriminating material,” it found this immaterial under the facts of the case. (13)
 
Changed:
<
<

The Star Chamber’s Not the Thing

>
>
The District Court appeared to justify its holding by framing the drive itself as the evidence to be revealed, rather than the electronic files within the drive. Understood thus, the drive was a single document that contained incriminating entries. The government did not have to know the “content” of each entry, but rather only that the ‘document’ existed and contained incriminating information. Knowledge of the existence of the drive, and that some of the contents “[might] consist of … child pornography,” was enough to meet the existence and location requirement with the “reasonabl[e] particularity” required.(14)
 
Changed:
<
<
Both the District Court and the Magistrate Judge struggled to find an appropriate physical analog through which to understand the abstraction of computer storage. Although one may argue that the metaphor chosen by the District Court was inapt, the mere existence of the metaphorical problem illustrates a second, more deeply seated problem with the 5th Amendment’s scope in the digital age.
>
>

Warring Metaphors

 
Changed:
<
<
As we have seen within the context of the 4th Amendment, a focus on the idiom of physical location causes problems when we then attempt to apply its ambit to information. The 5th amendment was written in the historical context of the abuses of the Star Chamber(15): to prevent a court from compelling oral statements from the accused. Although it covers written as well as oral testimony, the historical focus of the amendment was on transitory expressions. With the development of modern information technology, this focus on transitory and compelled testimony has became less important– where an incriminating comment or thought was once fleeting, it now has a potentially unlimited life in digital form; where an incriminating fact was once noted mentally, it is now far more likely that it will have a digital analog. Limiting the 5th Amendment to its historical boundaries creates a situation in which one is protected from self incrimination, but where the privilege does not extend outside the boundaries of ones own mind – it becomes impossible, or at least impractical, to create an external manifestation of identity shielded from the law in the same way as ones internal identity.

Notes

15 : Doe v. U.S., 487 U.S. 201, 212 (1988)


>
>
Although the “document” metaphor may appear reasonable within the facts of Boucher, it presents a number of difficult questions when applied more broadly. If each computer file is, metaphorically, merely an entry in a master document, it is not at all clear what status each of these “entries” has within the context of the Fifth Amendment. Using the document metaphor, a court may require a defendant to produce an unencrypted hard-drive with only limited knowledge of the contents – forcing the defendant to take an incriminating “document” out of a safe. If the drive is merely a document, however, orders directed at individual computer files become problematic: an order to decrypt a piece of data becomes conceptually similar to a order to aid in the interpretation of an incriminating entry on a log or calendar; a request to give the location of a hidden file appears equivalent to a request to show what parts of a document are pertinent to an investigation. If the court is metaphorically consistent, it begins to lose the ability to treat individual files as documents for production.
 
Added:
>
>
A court may preserve the ability to treat computer files as individual documents by relying on an alternate metaphor – a paradigm where the hard-drive represents a filing cabinet, and the files represent documents within. This metaphor allows the court to demand access to each file as they would a physical document: files separately encrypted or hidden become appropriate targets for production. The drawback to this metaphor, from the court’s perspective, is that it limits the ability to demand access to an entire drive. Just as the reasonable particularity requirement blocks a request for all documents within a safe based on knowledge of a single incriminating paper, a court such as Boucher would be limited to requests for files of which it had specific knowledge.
 

Conclusion

Changed:
<
<
It is possible that a refusal to review the 5th Amendment in light of advances in information technology is a reasonable and measured approach – the mind, after all, is inherently private and closely linked with the dignity of the individual, while stored information has verifiable existence and is perceptible to others. Viewed from an evidentiary perspective, it may make sense to have some limitations on the former, while allowing free use of the latter. If, however, we choose to interpret the spirit of the 5th Amendment more generally, as encompassing the right to build an zone of identity where the individual is never forced to choose between the “cruel trilemma of self-accusation, perjury or contempt”(16), we may need to reexamine where the boundaries of this identity should fall.


  • I think this argument is very well mounted. I'm not sure that it's convincing. You need to go very far from one case, which doesn't seem to be part of any larger constellation, to the existence of a constitutional conundrum requiring a "rethinking" project. Basic rules of prudential reasoning that lawyers expect to apply in other contexts are not suspended in the presence of computers. And indeed, it seems more likely that Boucher is correctly decided on narrow facts that uncommonly arise rather than that the self-incrimination clause has failed. Plainly if you show a document to an investigator and then before his eyes drop it into a safe, you will have a tough time arguing that being required to produce the safe's combination is compulsory testimony as to control and possession, when all the investigator wants is the content of the document, being in possession of more than sufficient evidence of your control and possession already. You speak sometimes in the piece as though the issue were whether a man has a right to keep that document private. All parties are agreed that he does not: a search warrant can issue for almost any document. All that's at stake is whether being forced to give access (which the execution of any search warrant necessarily entails) is sometimes also a compulsory testimonial act.

Notes

16 : Id.


>
>
It is very unlikely that the judiciary will be troubled enough by these issues to develop a consistent doctrine governing the ontology of electronic documents. As in Boucher, it is far more probable that each court will simply seize on a metaphor that is expedient in the circumstances of the case: treating the hard-drive as a document when requiring production of an unencrypted drive and treating a computer file as a document when requiring production of a specific piece of digital information. Although this ad hoc approach to electronic data does simplify the issues involved for a non-technical court, it has the potential to substantially erode defendants’ Fifth Amendment protections. Insofar as the metaphor is allowed to shift from case to case, the government gains the ability to perform exactly the kind of “fishing expedition” currently barred by constitutional doctrine, without sacrificing specificity: a defendant may be required to produce an entire hard drive based on the government’s knowledge of a single piece of information, even while being forced to locate and produce individual instances of incriminating digital files.
 

 
<--/commentPlugin-->
\ No newline at end of file

TheodoreSmithFirstPaper 3 - 18 Apr 2009 - Main.EbenMoglen
Line: 1 to 1
Changed:
<
<
META TOPICPARENT name="WebPreferences"
>
>
META TOPICPARENT name="FirstPaper"
 

Identity and the 5th Amendment

-- TheodoreSmith - 09 Mar 2009

Line: 46 to 46
 
Added:
>
>
  • I think this argument is very well mounted. I'm not sure that it's convincing. You need to go very far from one case, which doesn't seem to be part of any larger constellation, to the existence of a constitutional conundrum requiring a "rethinking" project. Basic rules of prudential reasoning that lawyers expect to apply in other contexts are not suspended in the presence of computers. And indeed, it seems more likely that Boucher is correctly decided on narrow facts that uncommonly arise rather than that the self-incrimination clause has failed. Plainly if you show a document to an investigator and then before his eyes drop it into a safe, you will have a tough time arguing that being required to produce the safe's combination is compulsory testimony as to control and possession, when all the investigator wants is the content of the document, being in possession of more than sufficient evidence of your control and possession already. You speak sometimes in the piece as though the issue were whether a man has a right to keep that document private. All parties are agreed that he does not: a search warrant can issue for almost any document. All that's at stake is whether being forced to give access (which the execution of any search warrant necessarily entails) is sometimes also a compulsory testimonial act.
 

 
<--/commentPlugin-->

TheodoreSmithFirstPaper 2 - 10 Mar 2009 - Main.TheodoreSmith
Line: 1 to 1
 
META TOPICPARENT name="WebPreferences"

Identity and the 5th Amendment

Line: 17 to 17
 

In Re Boucher

Changed:
<
<
The facts of In Re Boucher are straightforward. Boucher’s laptop was searched upon entry into the United States. The border agents found several files on the “Z” drive that appeared to be child pornography. The agents arrested Boucher and seized the laptop. When law enforcement agents later restarted the computer, the Z drive was found to be encrypted and inaccessible barring the application of a password. Boucher was subpoenaed for the password to the drive, but moved to quash on 5th Amendment grounds. Although his motion was initially granted by the Magistrate Judge hearing the issue, the motion was denied on appeal to the Vermont District Court.
>
>
The facts of In Re Boucher are straightforward. Border agents found several files suggestive of child pornography on the “Z” drive of Boucher’s laptop. Boucher was arrested and his laptop seized; however, when law enforcement agents later restarted the computer, the Z drive was found to be encrypted and inaccessible barring the application of a password. Boucher was subpoenaed for the password to the drive, but moved to quash on 5th Amendment grounds. Although his motion was initially granted by the Magistrate Judge hearing the issue, the motion was denied on appeal to the Vermont District Court.
 The Supreme Court has held that the 5th Amendment protects only “compelled testimonial communication.”(17) The actual documents sought in cases such as Boucher rarely fall within this definition: they are often non-testimonial (i.e. evidence of child pornography), and nearly always non-compelled (created freely by the defendant). Insofar as the substance of the information sought is therefore typically not within the scope of immunity, courts have focused their 5th amendment analysis on “whether the act of producing [the information] would constitute compelled testimonial communication ... regardless of ‘the contents or nature of the thing demanded.’ ”(18)
Line: 30 to 30
 The District Court in Boucher found that this burden of showing knowledge of the existence and location of the documents had been met: a border agent had “viewed the contents of some of the Z drive's files,” and the Government could demonstrate the existence and location of the drive itself. Although the Court did not disagree with the Magistrate’s finding that the government had “not viewed most of the files on the Z drive, and therefore [did] not know whether most of the files on the Z drive contain[ed] incriminating material,” it found this immaterial under the facts of the case. (19)
Changed:
<
<
The District Court appeared to justify its holding by framing the drive itself as the evidence to be revealed, rather than the documents within the drive. Understood thus, the drive was like a calendar that contained incriminating entries. The government did not have to know the “content” of each entry, but rather only that the calendar existed and contained potentially incriminating information. Similarly, knowledge the existence of the drive, and that some of the contents “may consist of … child pornography,” was enough to meet the existence and location requirement with the “reasonably particularity” required.(20)
>
>
The District Court appeared to justify its holding by framing the drive itself as the evidence to be revealed, rather than the documents within the drive. Understood thus, the drive was like a calendar that contained incriminating entries. The government did not have to know the “content” of each entry, but rather only that the calendar existed and contained potentially incriminating information. Similarly, knowledge of the existence of the drive, and that some of the contents “may consist of … child pornography,” was enough to meet the existence and location requirement with the “reasonabl[e] particularity” required.(21)
 

The Star Chamber’s Not the Thing

Both the District Court and the Magistrate Judge struggled to find an appropriate physical analog through which to understand the abstraction of computer storage. Although one may argue that the metaphor chosen by the District Court was inapt, the mere existence of the metaphorical problem illustrates a second, more deeply seated problem with the 5th Amendment’s scope in the digital age.

Changed:
<
<
As we have seen within the context of the 4th Amendment, a focus on the idiom of physical location causes problems when we then attempt to apply its ambit to information. The 5th amendment was written in the historical context of the abuses of the Star Chamber(22): to prevent a court from compelling oral statements from the accused. Although it covers written as well as oral testimony, the historical focus of the amendment was on transitory expressions. With the development of modern information technology, this focus on transitory and compelled testimony has became less important– where an incriminating comment or thought was once fleeting, it now has a potentially unlimited life in digital form; where an incriminating fact was once noted mentally, it is now far more likely that it will have a digital analog. Limiting the 5th Amendment to its historical boundaries creates a situation in which one is protected from self incrimination, but this privilege does not extend outside the boundaries of ones own mind – it becomes impossible, or at least impractical, to create an extension of ones identity shielded from the law in the same way as ones internal identity.
>
>
As we have seen within the context of the 4th Amendment, a focus on the idiom of physical location causes problems when we then attempt to apply its ambit to information. The 5th amendment was written in the historical context of the abuses of the Star Chamber(23): to prevent a court from compelling oral statements from the accused. Although it covers written as well as oral testimony, the historical focus of the amendment was on transitory expressions. With the development of modern information technology, this focus on transitory and compelled testimony has became less important– where an incriminating comment or thought was once fleeting, it now has a potentially unlimited life in digital form; where an incriminating fact was once noted mentally, it is now far more likely that it will have a digital analog. Limiting the 5th Amendment to its historical boundaries creates a situation in which one is protected from self incrimination, but where the privilege does not extend outside the boundaries of ones own mind – it becomes impossible, or at least impractical, to create an external manifestation of identity shielded from the law in the same way as ones internal identity.
 

Conclusion

Changed:
<
<
It is possible that a refusal to review the 5th Amendment in light of advances in information technology is a reasonable and measured approach – the mind, after all, is inherently private and closely linked with the dignity of the individual, while stored information has verifiable existence and is perceptible to others. Viewed from an evidentiary perspective, it may make sense to have some limitations on the former, while allowing free use of the latter. If, however, we interpret the spirit of the 5th Amendment more generally, as encompassing the right to build an zone of identity where the individual is never forced to choose between the “cruel trilemma of self-accusation, perjury or contempt”(24), we may need to decide where the boundaries of this identity should fall.
>
>
It is possible that a refusal to review the 5th Amendment in light of advances in information technology is a reasonable and measured approach – the mind, after all, is inherently private and closely linked with the dignity of the individual, while stored information has verifiable existence and is perceptible to others. Viewed from an evidentiary perspective, it may make sense to have some limitations on the former, while allowing free use of the latter. If, however, we choose to interpret the spirit of the 5th Amendment more generally, as encompassing the right to build an zone of identity where the individual is never forced to choose between the “cruel trilemma of self-accusation, perjury or contempt”(25), we may need to reexamine where the boundaries of this identity should fall.
 

TheodoreSmithFirstPaper 1 - 09 Mar 2009 - Main.TheodoreSmith
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="WebPreferences"

Identity and the 5th Amendment

-- TheodoreSmith - 09 Mar 2009

Table of Contents


Introduction

The same set of challenges we have seen in the 4th Amendment – the fixation on physical metaphor and “place-y-ness” – extend to the self-incrimination provisions of the 5th Amendment. The ongoing appeal in the case of In Re Boucher (26) provides us with an excellent opportunity to examine these issues: how the changing boundaries of personal identity in a paradigm of easily transferred and stored information have outpaced the slow shifts of constitutional law.

In Re Boucher

The facts of In Re Boucher are straightforward. Boucher’s laptop was searched upon entry into the United States. The border agents found several files on the “Z” drive that appeared to be child pornography. The agents arrested Boucher and seized the laptop. When law enforcement agents later restarted the computer, the Z drive was found to be encrypted and inaccessible barring the application of a password. Boucher was subpoenaed for the password to the drive, but moved to quash on 5th Amendment grounds. Although his motion was initially granted by the Magistrate Judge hearing the issue, the motion was denied on appeal to the Vermont District Court.

The Supreme Court has held that the 5th Amendment protects only “compelled testimonial communication.”(27) The actual documents sought in cases such as Boucher rarely fall within this definition: they are often non-testimonial (i.e. evidence of child pornography), and nearly always non-compelled (created freely by the defendant). Insofar as the substance of the information sought is therefore typically not within the scope of immunity, courts have focused their 5th amendment analysis on “whether the act of producing [the information] would constitute compelled testimonial communication ... regardless of ‘the contents or nature of the thing demanded.’ ”(28)

An act of production on subpoena is by definition compelled; the scope of immunity is therefore governed by the degree to which the act is testimonial. Courts have found an act of production to be testimonial “in two situations: (1) ‘if the existence and location of the subpoenaed [documents] are unknown to the government’; or (2) where production would ‘implicitly authenticate’ the documents.” ”(29)

A Physical Metaphor

For the purposes of this essay we will focus on the first of the situations mentioned above. This first category of cases is meant to cover “fishing expeditions” – where the government serves a broad subpoena on the defendant in the hopes of uncovering incriminating evidence. The resulting act of production is testimonial, insofar as the assembly and identification of the documents required “extensive use of ‘the contents of [the defendant’s] own mind’” (30)

The District Court in Boucher found that this burden of showing knowledge of the existence and location of the documents had been met: a border agent had “viewed the contents of some of the Z drive's files,” and the Government could demonstrate the existence and location of the drive itself. Although the Court did not disagree with the Magistrate’s finding that the government had “not viewed most of the files on the Z drive, and therefore [did] not know whether most of the files on the Z drive contain[ed] incriminating material,” it found this immaterial under the facts of the case. (31)

The District Court appeared to justify its holding by framing the drive itself as the evidence to be revealed, rather than the documents within the drive. Understood thus, the drive was like a calendar that contained incriminating entries. The government did not have to know the “content” of each entry, but rather only that the calendar existed and contained potentially incriminating information. Similarly, knowledge the existence of the drive, and that some of the contents “may consist of … child pornography,” was enough to meet the existence and location requirement with the “reasonably particularity” required.(32)

The Star Chamber’s Not the Thing

Both the District Court and the Magistrate Judge struggled to find an appropriate physical analog through which to understand the abstraction of computer storage. Although one may argue that the metaphor chosen by the District Court was inapt, the mere existence of the metaphorical problem illustrates a second, more deeply seated problem with the 5th Amendment’s scope in the digital age.

As we have seen within the context of the 4th Amendment, a focus on the idiom of physical location causes problems when we then attempt to apply its ambit to information. The 5th amendment was written in the historical context of the abuses of the Star Chamber(33): to prevent a court from compelling oral statements from the accused. Although it covers written as well as oral testimony, the historical focus of the amendment was on transitory expressions. With the development of modern information technology, this focus on transitory and compelled testimony has became less important– where an incriminating comment or thought was once fleeting, it now has a potentially unlimited life in digital form; where an incriminating fact was once noted mentally, it is now far more likely that it will have a digital analog. Limiting the 5th Amendment to its historical boundaries creates a situation in which one is protected from self incrimination, but this privilege does not extend outside the boundaries of ones own mind – it becomes impossible, or at least impractical, to create an extension of ones identity shielded from the law in the same way as ones internal identity.

Conclusion

It is possible that a refusal to review the 5th Amendment in light of advances in information technology is a reasonable and measured approach – the mind, after all, is inherently private and closely linked with the dignity of the individual, while stored information has verifiable existence and is perceptible to others. Viewed from an evidentiary perspective, it may make sense to have some limitations on the former, while allowing free use of the latter. If, however, we interpret the spirit of the 5th Amendment more generally, as encompassing the right to build an zone of identity where the individual is never forced to choose between the “cruel trilemma of self-accusation, perjury or contempt”(34), we may need to decide where the boundaries of this identity should fall.


 
<--/commentPlugin-->

Revision 5r5 - 05 Jan 2010 - 22:31:18 - IanSullivan
Revision 4r4 - 01 Jun 2009 - 05:42:47 - TheodoreSmith
Revision 3r3 - 18 Apr 2009 - 00:48:24 - EbenMoglen
Revision 2r2 - 10 Mar 2009 - 15:09:30 - TheodoreSmith
Revision 1r1 - 09 Mar 2009 - 06:34:42 - TheodoreSmith
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM