COMMUNICATIONS ENCRYPTION AS AN INVESTIGATIVE OBSTACLE

Kompletan rad u pdf formatu

Autor/i: Milana Pisarić, PhD,

Stranice: 61-74
UDK: 343.983.2:004.056.55
DOI: https://doi.org/10.47152/rkkp.60.1.4

Apstrakt: Due to novel technology solutions, primarily peer­to­peer, encryption and service providers located abroad, the ability of the law enforcement agencies to execute legally authorized traditional (even special) investigatory means is becoming increasingly problematic. Communication encryption, particularly end­to­end encryption in smartphone applications hinders law enforcement authorities’ practical ability to wiretap communications, although in a legal position. This phenomenon is globally recognized as “Going Dark” problem. All these challenges have necessitated legislative action. So far two different approaches have been recognized in addressing this problem: mandatory exceptional access and legalized hacking of target. In this paper we explore the viability and implications of both of them, in order to identity the most viable solution for overcoming investigative barrier, i.e. enabling the authorities to conduct surveillance of electronic communications.

Ključne reči: electronic communication, surveillance, encryption, lawful hacking

Reference:
− Administrative Office of the Courts (2020) Wiretap Report 2020, available at: https://www.uscourts.gov/statistics-reports/wiretap-report-2020. − Koops, B.J, Eleni Kosta, E. (2018) Looking for Some Light Through the Lens of “Cryptowar” History: Policy Options for Law Enforcement Authorities Against “Going Dark”. Computer Law & Security Review, 34, pp. 890–900, DOI: 10.1016/j.clsr.2018.06.003 − Liguori, C. (2020) Exploring Lawful Hacking as a Possible Answer to the “Going Dark” Debate. Michigan Technology Law Review, 26 (2), pp. 317-345. − Müller, J., Brinkmann1, M., Poddebniak, D., Schinzel, S., Schwenk, J. (2019) Re: What’s Up Johnny? Covert Content Attacks on Email End-to-End Encryption. 17th International Conference in Applied Cryptography and Network Security (pp.24-42), Bogota: Springer. − Ohm, P. (2017) The Investigative Dynamics of the Use of Malware by Law Enforcement. William & Mary Bill of Rights Journal, 26 (2), pp. 303-335. − Pisarić, M. (2020) Enkripcija kao prepreka otkrivanju i dokazivanju krivičnih dela. Zbornik radova Pravnog fakulteta u Novom Sadu, 54 (3), pp.1079–1100, DOI: 10.5937/zrpfns54-26929 − Pisarić, M. (2021) Enkripcija mobilnog telefona kao prepreka otkrivanju i dokazivanju krivičnih dela – osvrt na uporedna rešenja. Anali Pravnog fakulteta u Beogradu, 69(2), pp. 391-416, DOI: 10.51204/Anali_PFBU_21205A − Pool, R.L.D., Custers, B.H.M. (2017) The Police Hack: Back Legitimacy, Necessity and Privacy Implications of The Next Step in Fighting Cybercrime. European Journal of Crime, Criminal Law and Criminal Justice, 25 (2), pp.123-144, DOI:10.1163/15718174-25022109 − Schuster, S. , Berg, M.v.d, Larrucea, X., Slewe, T., Ide-Kostic, P. (2017). Mass surveillance and technological policy options: Improving security of private communications. Computer Standards & Interfaces, 50, pp.76-82, https://doi.org/10.1016/j.csi.2016.09.011 − Škorvánek, I., Koops, B.J., Newell, B.C., Roberts, A. (2020) “My Computer Is My Castle”: New Privacy Frameworks to Regulate Police Hacking. BYU Law Review, 2019 (4), pp. 997-1082. − UN General Assembly (2016). The right to privacy in the digital age, available at: https://digitallibrary.un.org/record/858023?ln=en. − UN Human Rights Council (2013). Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, A/HRC/23/40, available at: https://undocs.org/A/HRC/23/40