Preview of Member Only Content
For full access: or Become a Member
Arguing for Suppression of 'Hash' Evidence
By Marcia Hofmann
If the government seizes a computer during one criminal investigation, can it go ahead and search for evidence of a completely different crime?
Because Fourth Amendment jurisprudence has evolved around traditional notions of physical property and common law trespass, its application to new technologies has been an ongoing challenge for the courts.1 It is well-settled that people generally have a reasonable expectation of privacy in their personal computers,2 but forensic examinations — a key component of many police investigations — raise some difficult questions. One common forensic technique is the use of a cryptographic hash to verify or analyze digital evidence taken from a computer. This article examines whether the Fourth Amendment applies to hashing, and suggests ways to argue that evidence should be suppressed if the government uses a hash to search a client’s computer without a warrant.
What’s a Hash?
A hash value is created when a computer program analyzes digital information an
Want to read more?
The Champion archive is reserved for NACDL members.
NACDL members, please login to read the rest of this article.
Not a member? Join now.
Or click here to see an overview of NACDL Member benefits.
See what NACDL members say about us.
To read the current issue of The Champion in its entirety, click here.
- Media inquiries: Contact NACDL's Director of Public Affairs & Communications Ivan J. Dominguez at 202-465-7662 or firstname.lastname@example.org
- Academic Requests: Full articles of The Champion Magazine are available for academic and research purposes in the WestLaw and LexisNexis databases.