Library

Full texts. AI and human readable.

Position Papers & Whitepapers

The Right to Encrypt: Owner-Controlled Vehicle Data

Position paper. The policy argument for why vehicle owners should hold encryption keys to data produced by property they own.

Rootz Corp, May 2026 | ~5 pages

Read (Markdown) →

Vehicle Data Sovereignty: A Cryptographic Architecture

Technical white paper. Full architecture: key hierarchy, threat model, ownership transfer, regulatory compatibility, economic case.

Rootz Corp, May 2026 | ~35 pages

Read (Markdown) →

FreightProof: Cryptographic Evidence of Carrier Vetting

The commercial proof point. How cryptographic attestation solves the post-Montgomery liability gap for freight dispatch.

Rootz Corp, May 2026 | ~15 pages

Read (Markdown) →

MCU Encryption Module Specification

Technical specification for the ~290-line firmware addition that enables owner-controlled telematics encryption + firmware attestation recording.

R2E, May 2026 | ~8 pages

Read (Markdown) →

Court Cases — Full Texts

Montgomery v. Caribe Transport II, LLC

608 U.S. ___ (2026). Supreme Court, 9-0. Freight brokers owe "ordinary care" in carrier selection. The decision that created the commercial demand for cryptographic vetting evidence.

Decided May 14, 2026 | Opinion by Barrett, J.

Analysis →

In re Consumer Vehicle Driving Data Tracking (MDL 3115)

Northern District of Georgia. 16 million class members. Federal Wiretap Act claims against GM/OnStar for data collection and sale to LexisNexis/Verisk.

Filed 2024 | Active — fact discovery through late 2026

Case Summary →

Alliance for Automotive Innovation v. Campbell

First Circuit. OEM trade group challenging Massachusetts Question 1 (2020) telematics data access law. If MA prevails, it becomes the template.

On appeal | District court ruled for MA (2024)

Case Summary →

Carpenter v. United States

585 U.S. 296 (2018). Cell-site location data requires a warrant. Foundation for the argument that vehicle telematics data has heightened Fourth Amendment protection.

Decided June 22, 2018 | Opinion by Roberts, C.J.

Constitutional Analysis →

Legislation — Full Texts

Auto Data Privacy and Autonomy Act

H.R. 6734 (House) / S.3494 (Senate). 119th Congress. Burlison (R-MO) / Lee (R-UT). Prohibits OEM data access/sale without written consent.

Gap: Consent-based, not encryption-based.

Full Text (Congress.gov) →

Connected Vehicle National Security Review Act

S.2040. 119th Congress. Gives BIS broader power to block high-risk vehicle technology transactions.

Gap: Foreign adversary focused only.

Full Text (Congress.gov) →

Massachusetts Chapter 93J (2012) — Right to Repair

The original. Section 2(f) exempted all telematics. The gap that required Question 1 (2020) and now requires the Right to Encrypt.

Full Text + Analysis →

Massachusetts Question 1 (2020) — Right to Access

75% voter approval. Requires standardized open data platform for telematics. The second act. Still doesn't address encryption or disclosure control.

Full Text + Analysis →

BIS Connected Vehicle Rule (March 2025)

Commerce Department final rule banning Chinese/Russian connected vehicle components. Identifies exact threat but fixes only half.

Full Text (Federal Register) →

Model Legislation: Vehicle Data Sovereignty Act

Proposed model state legislation for the Right to Encrypt. Six sections. Designed to be introduced in any state legislature or as a federal bill.

Full Text →

Research & References

Senate Investigation: OEMs Sharing Data Without Warrants

Wyden/Markey investigation (2024). Eight major automakers share location data with law enforcement on a subpoena alone.

Senate Press Release →

FTC: Cars & Consumer Data

FTC policy statement on unlawful collection and use of connected vehicle consumer data (May 2024).

FTC Statement →

Biometric Identification via Driving Behavior (IEEE, 2004)

Driving behavior patterns uniquely identify individuals with 85-95% accuracy. Vehicle telemetry is biometric data.

IEEE Paper →

FCC Cyber Trust Mark — NIST IoT Baseline

NISTIR 8259A requirements for IoT device security. Connected vehicles are IoT devices that fail this baseline.

FCC Program →