References
- https://www.wsj.com/articles/trump-administration-considers-far-reaching-steps-for-extreme-vetting-1491303602 (last visited April 24, 2017).
- http://www.independent.co.uk/life-style/gadgetsand-tech/news/donald-trump-immigration-check-phones-social-media-facebook-twitter-logins-a7668111.html (last visited April 24, 2017).
- http://www.nydailynews.com/news/politics/extreme-vetting-dig-social-accounts-financial-info-article-1.3018978 (last visited April 24, 2017).
- Eoghan Casey et al., "The Growing Impact of Full Disk Encryption on Digital Forensics", DIGITAL INVESTIGATIONS Vol.8, pp. 129-134, Nov 2011. https://doi.org/10.1016/j.diin.2011.09.005
- Dario Forte, "Do Encrypted Disks Spell the End of Forensics?", COMPUTER FRAUD & SECURITY, No.2, pp. 18-19, Feb 2009.
- Erica Fruiterman, "Upgrading the Fifth Amendment: New Standards for Protecting Encryption Passwords", TEMP. L. REV., Vol.85, pp. 655-689, Mar 2013.
- SYMANTEC, "Internet Security Tehreat Report, SYMANTEC, Vol.22, Apr 2017.
- TrueCrypt, CNET, http://download.cnet.com/TrueCrypt/3000-2092_4-10527243.html (last visited April 24, 2017).
- John Leyden, "Brazilian Banker's Crypto Baffles FBI (http://www.theregister.co.uk/2010/06/28/brazil_ banker_crypto_lock_out).", REGISTER, June 28, 2010,
- Sarah Wilson, " Compelling Passwords from Third Parties: Why the Fourth and Fifth Amendments Do Not Adequately Protect Individuals when Third Parties are Forced to Hand Over Passwords, Berkeley Technology Law Journal, Vol.30, pp. 1-39, Spring 2014.
- United States Constitution, Amendment V.
- Nicholas Soares, "The Right to Remain Encrypted: The Self-Incrimination Doctrine in the Digital Age", American Criminal Law Review, Vol.49, pp. 2001-2019, Fall 2012.
- United States v. Hubbell, 530 U.S. 27, 34-36 (2000).
- United States v. Fisher, 425 U.S. 391, 411 (1976).
- Vivek Mohan & John Villasenor, "Decrypting the Fifth Amendment: The Limits of Self-Incrimination in the Digital Era", Journal of Constitutional Law, Vol.15, pp. 11-28, 2012.
- Andrew J. Ungberg, "Protecting Privacy Through a Responsible Decryption Policy", HARVARD J.L. & TECH, Vol.22, pp. 537-558 Spring 2009.
- United States v. Doe, 465 U.S. 605-617 (1984).
- Kastigar v. United States, 406 U.S. 441, 455 (1972)
- United States v. Hubbell, 167 F.3d 553, 555-556 (D.C. Cir. 1999).
- David Colarusso, "Heads in the Cloud, a Coming Storm the Interplay of Cloud Computing, Encryption, and the Fifth Amendment's Protection against Self-incrimination", B.U. J. SCI. & TECH. L., Vol.17, pp. 69-102, Nov 2011.
- Constitution of the Republic of KOREA, Article 12
- Criminal Procedure Act of the Republic of KOREA, Article 244, Article 283
- Regulation on Criminal Procedure of the Republic of KOREA, Article 127
- Sang-Un Lee, Myeong-Bok Choi, Integer Factorization for Decryption, The Journal of The Institute of Internet, Broadcasting and Communication, VOL.13, No. 6, pp. 221-218, Dec 2013 https://doi.org/10.7236/JIIBC.2013.13.6.221
- Yang-Ho Lee, Seung-Jung Shin, A Study on Efficient Encryption for Message Communication between Devices, The Journal of The Institute of Internet, Broadcasting and Communication, VOL.14, No. 5, pp. 19-26, Oct 2014 https://doi.org/10.7236/JIIBC.2014.14.5.19