透過您的圖書館登入
IP:3.139.83.7
  • 期刊

刑事偵查程序中加密檔案的解密

The Decryption of Encrypted Files in Criminal Procedure

摘要


電腦在現代生活中扮演著不可或缺的角色,大量的資訊也因而以數位的型態交換,或儲存於各式的載體中。是以,如何確保檔案的安全,確保檔案不被他人所接觸,就有其實際需求。檔案的加密技術的普遍使用,也就應運而生。不過,犯罪份子也同時使用了此一技術,隱匿犯罪事證,大大地增加偵查上的困難。在討論及分析後可以知道,可能性理論無法完整地解釋隱私的意涵,不能因為技術上難以破解,就認為人們加密後的檔案可以主張隱私權。再者,加密後的檔案無法類比為上鎖的容器,因為人們並不是看不到加密後檔案的內容,只是無法了解其意思而已。相比較之下,檔案的加密更類似於翻譯以外國語言進行的交談,使用警犬嗅聞,或是拼湊軋碎的文件。從結論上來說,我們認為人們不會僅僅因為將檔案加密而當然能夠就其內容主張合理隱私期待。在合法取得加密檔案後,檔案的解密沒有令狀程序的適用,執法官員可以逕自破解,不需要事先獲有法官的授權。

關鍵字

隱私 加密 解密 破解 合理隱私期待 搜索 令狀原則

並列摘要


Computers have become an integral and essential part of our daily lives. A huge amount of digital data is exchanged among devices and stored in various storage types. With this increased reliance on technology comes the growing concern for data security and privacy. In this digital age, where personal and sensitive information is constantly being transmitted and stored, it becomes imperative to protect this data from unauthorized access. One way to achieve this is through the use of encryption technology. Encryption is the process of converting plain text into a code to prevent unauthorized access. This technology is widely used to secure data, but unfortunately, it can also be exploited by criminals to hide illegal activities and information. This makes it even more challenging for law enforcement agencies to carry out criminal investigations. While encryption provides a certain level of security, it does not automatically grant individuals privacy rights. In fact, the use of probability theory is not a suitable explanation for privacy. Encrypted files should not be equated with locked containers such as rooms or suitcases. The contents of encrypted files may be visible, but their meaning may not be understandable. Decrypting encrypted files is similar to interpreting a conversation in a foreign language or searching bags with sniffer dogs. Moreover, encrypting files does not provide absolute privacy protection. Law enforcement agencies are allowed to decrypt encrypted files that have been legally obtained, without obtaining a warrant in advance. In conclusion, while encryption technology is an effective tool for securing data, it does not provide complete privacy protection. It is important for individuals to be aware of the limitations and to adopt a multi-layered approach to data security and privacy. This may include using encryption technology, implementing strong passwords, and regularly updating software to stay ahead of potential security threats.

參考文獻


李榮耕(2015),〈科技定位監控與犯罪偵查:兼論美國近年 GPS 追蹤法制及實務之發展〉,《臺大法學論叢》,44 卷 3 期,頁 871-969。https://doi.org/10.6199/NTULJ.2015.44.03.04
Brady, S. (1997). Keeping Secrets in Cyberspace: Establishing Fourth Amendment Protection for Internet Communication. Harvard Law Review, 110(7), 1591-1608. https://doi.org/10.2307/1342181
Froomkin, A. M. (1995). The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution, The University of Pennsylvania Law Review, 143(3), 709-897. https://doi.org/10.2307/3312529
Kerr, O. S., & Schneier, B. (2018). Encryption Workarounds. Georgetown Law Journal, 106, 989-1019. https://dx.doi.org/10.2139/ssrn.2938033
Post, R. (2000). Encryption Source Code and the First Amendment. Berkeley Technology Law Journal, 15(2), 713-723. https://doi.org/10.2139/ssrn.238191

延伸閱讀