in The Cambridge Edition of the Works of Immanuel Kant : Practical Philosophy
[1996]
Why the Plain View Doctrine Should not Apply to Digital Evidence
31[2007]
When ‘ Miranda ’ Violations Lead to Passwords
[2016]
When the Cure for the Fourth Amendment is Worse than the Disease
1[1994]
Verwertbarkeit von Beweismitteln bei grenzüberschreitender Strafverfolgung
564[2016]
Unlocking the Fifth Amendment : Passwords and Encrypted Devices
203[2018]
United States Ratification of the Hague Convention on the Taking of Evidence Abroad
104[1973]
Two Models of the Fourth Amendment
1468[1985]
Trust in the Clouds ,
513[2012]
Transnationaler Zugriff auf Computerdaten ,
[2011]
Transborder Access and Jurisdiction : What are the Options ?
[2012]
Transatlantic Data Privacy Law
115[2017]
Torts ( 4th ed
[1971]
The Tallinn Manual 2.0 : Highlights and Insights
735[2017]
The Supreme ’ s Primary Purpose Test : A Roadblock to the National Law Enforcement Database
1[2004]
The Substantive Origins of Criminal Procedure , 105 Yale Law Journal 393
[1995]
The Search Warrant , the Magistrate , and Judicial Review
[1987]
The Right and the Reasonable
949[1985]
The Problem of Perspective in Internet Law
357[2003]
The Privilege Against Cellphone Incrimination
73[2019]
The Presumption against Extraterritoriality in Two Steps
45[2016]
The Metaphor is the Key : Cryptography , the Clipper Chip and the Constitution
709[1995]
The History and Development of the Fourth Amendment to the United States Constitution
25[1937]
The Hague Convention of 18 March 1970 on the Taking of Evidence Abroad in Civil or Commercial Matters.
The Fourth Amendment and the Global Internet
285[2015]
The Fourth Amendment and New Technologies : Constitutional Myths and the Case for Caution
[2004]
The Face-Off Between Data Privacy and Discovery : Why U.S. Courts Should Respect EU Data Privacy Law When Considering the Production of Protected Information
[2018]
The Court 's Two Model Approach to the Fourth Amendment : Carpe Diem
429 ([1993]
The Complexity of the Fourth Amendment : A Historical Review , 77 Boston University Law Review 925
[1997]
The Clipper Chip Proposal : Deciphering the Unfounded Fears That Are Wrongfully Derailing Its Implementation
475 ([1996]
The Clipper Chip : Cryptography Technology and the Constitution – The Government ’ s Answer to Encription “ Chips ” away at Constitutional Rights
263[1995]
Telekommunikationsüberwachung in grenzüberschreitenden Strafverfahren nach Inkrafttreten des EU-Rechtshilfeübereinkommens ,
657 .[2006]
Tallinn manual 2.0 on the international law applicable to cyber operations
2d ed[2017]
Tallinn Manual on International Law Applicable to Cyber Warfare (Michael N. Schmitt ed., 2013).
Swire, Peter & Kenesa Ahmad, Encryption and Globalization, 13 Columbia Science & Technology Law Review 416, 433 (2012).
416 , 433[2012]
Susan W. & Barbara A. Frederiksen , Computer Searches and Seizures : Some Unresolved Issues
39[2002]
Subpoenas and Privacy
[2005]
Straftaten und Strafverfolgung im Internet ,
[2012]
Strafprozessordnung
61 . Aufl[2018]
Stakeholders in Reform of the Global System for Mutual Legal Assistance
[2017]
Social Justice in the Liberal State
[1980]
Searching and SeizingComputers and Obtaining Electronic Evidence inCriminal Investigation ( 3d ed
[2009]
Searching Places Unknown : Law Enforcement Jurisdiction on the Dark Web
1075[2017]
Searches and Seizures ofComputers andComputer Data
75[1994]
Searches and Seizures in a Digital World , 119 Harvard Law Review 531
[2005]
Search Warrants in an Era of Digital Evidence
85[2005]
San Bernardino Attacks, Washington Post (2016. 2. 17.).
2 . 17[2016]
Rome Statute of the International Criminal Court.
Restatement ( Third ) of the Foreign Relations Law of the United States
[1987]
Report of the United States Delegation to Eleventh Session of Hague Conference on Private International Law, 8 International Legal Materials 785 (1969).
Remotely Accessing an IP Address Inside a TargetComputer Is a Search
Volokh Conspiracy (10 . 7[2016]
Regulatory Arbitrage . 89 Texas Law Review 227
[2010]
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation), 2016 O.J. (L 119) 1 (EU).
Punishment and Responsibility : Essays in the Philosophy of Law
[1968]
Principles of Public International Law ( 4th ed
[1990]
Political Liberalism
Expanded Ed[2005]
Nita A. , Incriminating Thoughts
[2012]
New Directions in Cryptography
[1976]
NSA Files : Decoded
[2013]
Mutual Legal Assistance in an Era of Globalized Communications , 71 N.Y.U
[2016]
Male Captus Bene Detentus ?
[2010]
Local Policing after Terror , 111 Yale Law Journal 2137
[2002]
Lest We Walk Into the Well : Guarding the Keys-Encrypting the Constitution : To Speak , Search , & Seize in Cyberspace
227[1998]
Legal Access to the Global Cloud , 118 Columbia Law Review 1681
[2018]
Law and Economics
6th ed[2012]
King & Orin S. Kerr
Criminal Procedure ( 5th ed[2009]
Kerr, Orin S., Fourth Amendment Seizures of Computer Data, 119 Yale Law Journal 700 (2010).
700[2010]
Kerr, Orin S., Encryption Workarounds, 106 Georgetown Law Journal 989 (2018).
[2018]
Kerr, Orin S., Computer Crime Law (2d ed. 2009).
[2009]
Justification Defenses and Just Conviction
[1998]
Jamie Nowak & Sumera Khan , The Potential Impact of Article 48 of the General Data Protection Regulation on Cross Border Discovery from the United States
575[2016]
It Came from Planet Clipper : The Battle Over Cryptographic Key “ Escrow
15 ([1996]
International Law ( 6th ed
[2008]
International Comity in American Law
[2017]
Implicit Bargains , Government Power , and the Fourth Amendment
[1992]
How Both the EU and the U.S. Are “ Stricter ” than Each Other for the Privacy of Government Requests for Information
[2017]
Government-Sponsored Abduction of Foreign Criminals Abroad : Reflections on United States v. Caro-Quintero and the Inadequacy of the Ker-Frisbie Doctrine
[1991]
Government Hacking to Light the Dark Web : What Risks to International Relations and International Law
58[2017]
From Real-Time Intercepts to Stored Records : Why Encryption Drives the Government to Seek Access to the Cloud ,
[2017]
Fourth Amendment Limitations on the Execution of Computer Searches Conducted Pursuant to a Warrant
841[2005]
Fourth Amendment First Principles , 107 Harvard Law Review 107
[1994]
Executing Warrants for Digital Evidence : The Case for Use Restrictions on Nonresponsive Data
1[2015]
Ex Ante Regulation of Computer Search and Seizure
1241[2010]
Elements of the Philosophy of Right ( Allen W. Wood ed. , H.B . Nisbet trans.
[1991]
Electronic Privacy Information Center, Cryptography Policy, available at: http://epic.org/crypto
http : //epic.org/crypto
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, 1995 O.J. (L 281) 31–50.
Digital Evidence and the New Criminal Procedure , 105 Columbia Law Review 279
[2005]
Die neue Microsoft Cloud in Deutschland mit Datentreuhand als Schutzschild gegen NSA & Co. ?
98[2016]
Die Online-Durchsuchung – staatliches “ Hacken ” oder zuläsige Ermittlungsmaßnahme ,
121 .[2005]
Der grundrechtliche Schutz gespeicherter E-Mails beim Provider und ihre weltweite strafprozessuale Überwachung ,
96 , 101[2009]
Defending Cyberproperty , 79 N.Y.U
2164[2004]
Declining to State a Name in Consideration of the Fifth Amendment 's Self-Incrimination Clause and Law Enforcement Databases after Hiibel
779 ([2006]
Datentreuhandermodelle—Sicherheit vor Herausgabeverlangen US-amerikanischer Behorden und Gerichte ?
165[2017]
Data Residency Requirements Creeping into German Law
15 PVLR 529[2016]
Cybercrime ’ s Scope : Interpreting Access and Authorization in Computer Misuse Statutes , 78 N.Y.U
1596[2003]
Cyber Crime and Digital Evidence
[2011]
Counter-Revolution in Constitutional Criminal Procedure ? Two Audiences , Two Answers
94[1996]
Convention on Cybercrime
Compelled Decryption and the Privilege Against Self-Incrimination
767[2019]
Compelled Decryption and the Fifth Amendment : Exploring the Technical Boundaries ,
169 ([2018]
Code : Version 2.0
[2006]
Caitlin T. , Streaming the International Silver Platter Doctrine : Coordinating Transnational Law Enforcement in the Age of Global Terrorism and Technology
[2010]
Bruteforce Password Cracking Software Tries 8 Million Times Per Second
[2013]
Apple Vows to Resist FBI Demand to Crack iPhone Linked to
Anupam & Uyen P. Le , Data Nationalism
[2015]
Anmerkung zu BVerfG , Beschluss vom 16.6.2009 – 2 BvR 902/06 ,
680[2009]
Anarchy , State and Utopia .
[1974]
An Introduction to the Principles of Morals and Legislation ( 1789 )
Against data exceptionalism
[2016]
Abelson, Hal, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whiteld Die, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jerey I. Schiller & Bruce Schneier, The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption (1997).
[1997]
A Warning About Tallinn 2.0 Whatever It Says
[2017]
A User ’ s Guide to the Stored Communications Act , And A Legislator ’ s Guide to Amending It
1208[2004]
A Revised Approach to the Fifth Amendment and Obtaining Passcodes ,
[2015]
A Comity of Errors : The Rise , Fall , and Return of International Comity in Transnational Discovery
157[2016]
27 . Kapital , in : Wabnitz/Janovsky ( Hrsg )Handbuch des Wirtschafts- und Steuerstrafrechts
4 . Aufl[2014]
.. Semicommon Property Rights and Scattering in the Open Fields
131[2000]
.. Forcible Abduction Made Fashionable : United States v. Alvarez-Machain 's Extension of the Ker-Frisbie Doctrine