TY - GEN
T1 - Law enforcement access to password protected and/or encrypted mobile data
AU - Watney, Murdoch
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/12/14
Y1 - 2016/12/14
N2 - The use of mobile phones in the commission of crime and terrorism pose serious investigative challenges to law enforcement agencies across the world. The discussion deals primarily with the extent a mobile phone service provider and/or or messaging applications provider and/or manufacturer must assist a law enforcement agency in gaining access to mobile data, specifically where the data is encrypted and/or password protected. It should be established whether a mobile phone service and/or applications provider and/or manufacturer must design security and/or privacy measures in such a way that law enforcement may gain access to the encrypted data. It may be argued that national security interests regarding the investigation of serious crimes such as kidnapping, child pornography, corruption and terrorism outweigh user privacy and user security. Terrorism affects all countries globally and in many instances result in the indiscriminate killing of a large number of people as illustrated by the Paris November 2015, the US December 2015, Abidjan, Ivory Coast, Brussels and Pakistan March 2016 killings: Although a law enforcement agency is pressurized to gather as much as possible evidence to investigate such heinous acts and prevent future attacks, the mobile phone evidence must be gathered within a legal framework that provides checks and balances to prevent the development of a police state resulting in the erosion or elimination of human rights. It is necessary to debate whether banning encryption and/or compelling a provider to have the technology to decrypt encrypted mobile communications or override password protected mobile data would serve as an investigative solution in the interest of national security or whether it would ultimately result in weakening user security and privacy to such an extent that all users around the world would be vulnerable to unlawful intrusions.
AB - The use of mobile phones in the commission of crime and terrorism pose serious investigative challenges to law enforcement agencies across the world. The discussion deals primarily with the extent a mobile phone service provider and/or or messaging applications provider and/or manufacturer must assist a law enforcement agency in gaining access to mobile data, specifically where the data is encrypted and/or password protected. It should be established whether a mobile phone service and/or applications provider and/or manufacturer must design security and/or privacy measures in such a way that law enforcement may gain access to the encrypted data. It may be argued that national security interests regarding the investigation of serious crimes such as kidnapping, child pornography, corruption and terrorism outweigh user privacy and user security. Terrorism affects all countries globally and in many instances result in the indiscriminate killing of a large number of people as illustrated by the Paris November 2015, the US December 2015, Abidjan, Ivory Coast, Brussels and Pakistan March 2016 killings: Although a law enforcement agency is pressurized to gather as much as possible evidence to investigate such heinous acts and prevent future attacks, the mobile phone evidence must be gathered within a legal framework that provides checks and balances to prevent the development of a police state resulting in the erosion or elimination of human rights. It is necessary to debate whether banning encryption and/or compelling a provider to have the technology to decrypt encrypted mobile communications or override password protected mobile data would serve as an investigative solution in the interest of national security or whether it would ultimately result in weakening user security and privacy to such an extent that all users around the world would be vulnerable to unlawful intrusions.
KW - Access to mobile data
KW - Encrypted mobile data
KW - Law
KW - Law enforcement
KW - Mobile phone intermediary
KW - Passcode procted mobile data
UR - http://www.scopus.com/inward/record.url?scp=85015299389&partnerID=8YFLogxK
U2 - 10.1109/ARES.2016.23
DO - 10.1109/ARES.2016.23
M3 - Conference contribution
AN - SCOPUS:85015299389
T3 - Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016
SP - 399
EP - 405
BT - Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 11th International Conference on Availability, Reliability and Security, ARES 2016
Y2 - 31 August 2016 through 2 September 2016
ER -