HOME

TheInfoList



OR:

Key disclosure laws, also known as mandatory key disclosure, is legislation that requires individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or
digital forensics Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery, investigation, examination and analysis of material found in digital devices, often in relation to mobile devices and comp ...
purposes and use it either as evidence in a court of law or to enforce
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
interests. Similarly, mandatory decryption laws force owners of encrypted data to supply decrypted data to law enforcement. Nations vary widely in the specifics of how they implement key disclosure laws. Some, such as Australia, give law enforcement wide-ranging power to compel assistance in decrypting data from any party. Some, such as Belgium, concerned with
self-incrimination In criminal law, self-incrimination is the act of exposing oneself generally, by making a statement, "to an accusation or charge of crime; to involve oneself or another ersonin a criminal prosecution or the danger thereof". (Self-incrimination ...
, only allow law enforcement to compel assistance from non-suspects. Some require only specific third parties such as telecommunications carriers, certification providers, or maintainers of encryption services to provide assistance with decryption. In all cases, a warrant is generally required.


Theory and countermeasures

Mandatory decryption is technically a weaker requirement than key disclosure, since it is possible in some cryptosystems to prove that a message has been decrypted correctly without revealing the key. For example, using RSA public-key encryption, one can verify given the message (plaintext), the encrypted message (ciphertext), and the public key of the recipient that the message is correct by merely re-encrypting it and comparing the result to the encrypted message. Such a scheme is called ''undeniable'', since once the government has validated the message they cannot deny that it is the correct decrypted message.Desmedt, Yvo and Burmester, Mike and Seberry, Jennifer. Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Florida State University Department of Computer Science 206 Love Building FL 32306-4530 Tallahassee USA. Lecture Notes in Computer Science: Public Key Cryptography, pp.277-286. 2001
(Postscript)(Postscript 2)
/ref> As a countermeasure to key disclosure laws, some personal privacy products such as
BestCrypt BestCrypt, developed bJetico is a commercial disk encryption app available for Windows, Linux, macOS and Android. BestCrypt comes in two editions: BestCrypt Volume Encryption to encrypt entire disk volumes; BestCrypt Container Encryption to ...
,
FreeOTFE FreeOTFE is a discontinued open source computer program for on-the-fly disk encryption (OTFE). On Microsoft Windows, and Windows Mobile (using FreeOTFE4PDA), it can create a virtual drive within a file or partition, to which anything written is ...
, and
TrueCrypt TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file, or encrypt a partition or the whole storage device ( pre-boot authentication). On 28 M ...
have begun incorporating
deniable encryption In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists. The users ...
technology, which enable a single piece of encrypted data to be decrypted in two or more different ways, creating
plausible deniability Plausible deniability is the ability of people, typically senior officials in a formal or informal chain of command, to deny knowledge of or responsibility for any damnable actions committed by members of their organizational hierarchy. They may ...
. Another alternative is
steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
, which hides encrypted data inside of benign data so that it is more difficult to identify in the first place. A problematic aspect of key disclosure is that it leads to a total compromise of all data encrypted using that key in the past or future; time-limited encryption schemes such as those of Desmedt et al. allow decryption only for a limited time period.


Criticism and alternatives

Critics of key disclosure laws view them as compromising
information privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data p ...
, by revealing personal information that may not be pertinent to the crime under investigation, as well as violating the right against
self-incrimination In criminal law, self-incrimination is the act of exposing oneself generally, by making a statement, "to an accusation or charge of crime; to involve oneself or another ersonin a criminal prosecution or the danger thereof". (Self-incrimination ...
and more generally the
right to silence The right to silence is a legal principle which guarantees any individual the right to refuse to answer questions from law enforcement officers or court officials. It is a legal right recognized, explicitly or by convention, in many of the worl ...
, in nations which respect these rights. In some cases, it may be impossible to decrypt the data because the key has been lost, forgotten or revoked, or because the data is actually random data which cannot be effectively distinguished from encrypted data. A proactive alternative to key disclosure law is
key escrow Key escrow (also known as a "fair" cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third pa ...
law, where the government holds in escrow a copy of all cryptographic keys in use, but is only permitted to use them if an appropriate warrant is issued. Key escrow systems face difficult technical issues and are subject to many of the same criticisms as key disclosure law; they avoid some issues like lost keys, while introducing new issues such as the risk of accidental disclosure of large numbers of keys, theft of the keys by hackers or abuse of power by government employees with access to the keys. It would also be nearly impossible to prevent the government from secretly using the key database to aid mass surveillance efforts such as those exposed by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
. The ambiguous term ''key recovery'' is applied to both types of systems.


Legislation by nation

This list shows only nations where laws or cases are known about this topic.


Antigua and Barbuda

The Computer Misuse Bill, 2006, Article 21(5)(c), if enacted, would allow police with a warrant to demand and use decryption keys. Failure to comply may incur "a fine of fifteen thousand ast Caribbeandollars" and/or "imprisonment for two years."


Australia

The Cybercrime Act 2001 No. 161, Items 12 and 28 grant police with a magistrate's order the wide-ranging power to require "a specified person to provide any information or assistance that is reasonable and necessary to allow the officer to "access computer data that is "evidential material"; this is understood to include mandatory decryption. Failing to comply carries a penalty of 6 months' imprisonment.
Electronic Frontiers Australia Electronic Frontiers Australia Inc. (EFA) is a non-profit Australian national non-government organisation representing Internet users concerned with online liberties and rights. It has been vocal on the issue of Internet censorship in Australia ...
calls the provision "alarming" and "contrary to the common law privilege against self-incrimination." The Crimes Act 1914, 3LA(5) "A person commits an offence if the person fails to comply with the order. Penalty for contravention of this subsection: Imprisonment for 2 years."


Belgium

The ''Loi du 28 novembre 2000 relative à la criminalité informatique'' (Law on computer crime of 28 November 2000), Article 9 allows a judge to order the authorities to search the computer systems and telecommunications providers to provide assistance to law enforcement, including mandatory decryption, and to keep their assistance secret; but this action cannot be taken against suspects or their families. Failure to comply is punishable by 6 months to 1 year in jail and/or a fine of 130 to 100,000 euros.


Cambodia

Cambodia promulgated its Law on Electronic Commerce on 2 November 2019, after passage through legislature and receiving consent from the monarch, becoming the last among ASEAN states to adopt a domestic law governing electronic commerce. Article 43 of the statute prohibits any encryption of evidence in the form of data that could lead to an indictment, or any evidence in an electronic system that relates to an offense. This statutory obligation may imply that authorities could order decryption of any data implicated in an investigation. While remaining untested in courts, this obligation actively contradicts an accused person's procedural right against self-incrimination as provided under Article 143 of the Code of Criminal Procedure.


Canada

In Canada key disclosure is covered under the ''
Canadian Charter of Rights and Freedoms The ''Canadian Charter of Rights and Freedoms'' (french: Charte canadienne des droits et libertés), often simply referred to as the ''Charter'' in Canada, is a bill of rights entrenched in the Constitution of Canada, forming the first part o ...
'' section 11(c) which states "any person charged with an offence has the right not to be compelled to be a witness in proceedings against that person in respect of the offence;" and protects the rights of individuals that are both citizens and non-citizens of Canada as long as they are physically present in Canada. In a 2010
Quebec Court of Appeal The Court of Appeal of Quebec (sometimes referred to as Quebec Court of Appeal or QCA) (in French: ''la Cour d'appel du Québec'') is the highest judicial court in Quebec, Canada. It hears cases in Quebec City and Montreal. History The Court w ...
case the court stated that a password compelled from an individual by law enforcement "is inadmissible and that renders the subsequent seizure of the data unreasonable. In short, even had the seizure been preceded by judicial authorization, the law will not allow an order to be joined compelling the respondent to self-incriminate." In a 2019 Ontario court case
R v. Shergill
, the defendant was initially ordered to provide the password to unlock his phone. However, the judge concluded that providing a password would be tantamount to self-incrimination by testifying against oneself. As a result, the defendant was not compelled to provide his password.


Czech Republic

In the Czech Republic there is no law specifying obligation to issue keys or passwords. Law provides protecting against self-incrimination, including lack of penalization for refusing to answer any question which would enable law enforcement agencies to obtain access to potential evidence, which could be used against testifying person.


Finland

The Coercive Measures Act (''Pakkokeinolaki'') 2011/806 section 8 paragraph 23 requires the system owner, its administrator, or a specified person to surrender the necessary "passwords and other such information" in order to provide access to information stored on an information system. The suspect and some other persons specified in section 7 paragraph 3 that cannot otherwise be called as witnesses are exempt from this requirement.


France

(Law #2001-1062 of 15 November 2001 on Community Safety) allows a judge or prosecutor to compel any qualified person to decrypt or surrender keys to make available any information encountered in the course of an investigation. Failure to comply incurs three years of jail time and a fine of €45,000; if the compliance would have prevented or mitigated a crime, the penalty increases to five years of jail time and €75,000.


Germany

The German Code of Criminal Procedure grants a suspect the right to deny cooperation in an investigation that may lead to incriminating information to be revealed about themselves. For private usage is no legal basis that would compel a suspect to hand over any kind of cryptographic key due to this '' nemo tenetur'' principle. There are different laws (tax, crime, etc.) stating that companies must ensure this data is readable by the government. This includes the need to disclose the keys or unencrypted content as and when required.


Iceland

In
Iceland Iceland ( is, Ísland; ) is a Nordic island country in the North Atlantic Ocean and in the Arctic Ocean. Iceland is the most sparsely populated country in Europe. Iceland's capital and largest city is Reykjavík, which (along with its s ...
there is no law specifying obligation to issue keys or passwords.


India

Section 69 of the
Information Technology Act The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. Secon ...
, as amended by the Information Technology (Amendment) Act, 2008, empowers the central and state governments to compel assistance from any "subscriber or intermediary or any person in charge of the computer resource" in decrypting information. Failure to comply is punishable by up to seven years' imprisonment and/or a fine.


Ireland

Section 7(4)(b) of the Criminal Justice (Offences Relating to Information Systems) Act 2017 allows a member of the
Garda Síochána (; meaning "the Guardian(s) of the Peace"), more commonly referred to as the Gardaí (; "Guardians") or "the Guards", is the national police service of Ireland. The service is headed by the Garda Commissioner who is appointed by the Irish Gove ...
or other persons as deemed necessary (via a search warrant issued by a judge of the District Court (Section 7(1))) to demand the disclosure of a password to operate a computer and any decryption keys required to access the information contained therein.
7(4) A member acting under the authority of a search warrant under this section may— (a) operate any computer at the place that is being searched or cause any such computer to be operated by a person accompanying the member for that purpose, and (b) require any person at that place who appears to the member to have lawful access to the information in any such computer— (i) to give to the member any password necessary to operate it and any encryption key or code necessary to unencrypt the information accessible by the computer, immediate data destruction (ii) otherwise to enable the member to examine the information accessible by the computer in a form in which the information is visible and legible, or (iii) to produce the information in a form in which it can be removed and in which it is, or can be made, visible and legible.


New Zealand

New Zealand Customs was seeking power to compel key disclosure. Although New Zealand may not have a key disclosure law, they have since enforced penalties against travelers unwilling to unlock mobile devices when compelled to do so by officials.


Poland

In relatively few known cases in which police or prosecutor requested cryptographic keys from those formally accused and these requests were not fulfilled, no further consequences were imposed on the accused. There's no specific law in this matter, as e.g. in the UK. It is generally assumed that the Polish Criminal Procedure Code (Kodeks Postępowania Karnego Dz.U. 1997 nr 89 poz. 555.) provides means of protecting against self-incrimination, including lack of penalization for refusing to answer any question which would enable law enforcement agencies to obtain access to potential evidence, which could be used against testifying person.


South Africa

Under the RICA Act of 2002, refusal to disclose a cryptographic key in your possession could result in a fine up to ZAR 2 million or up to 10 years' imprisonment. This requires a judge to issue a decryption direction to a person believed to hold the key.


Spain

Spain's Criminal Procedure Law grants suspects rights against self-incrimination, and this would prevent the suspect from being compelled to reveal passwords. However, a judge may order third parties to collaborate with any criminal investigation, including revealing decryption keys, where possible.


Sweden

There are currently no laws that force the disclosure of cryptographic keys. However, there is legislation proposed on the basis that the
Council of Europe The Council of Europe (CoE; french: Conseil de l'Europe, ) is an international organisation founded in the wake of World War II to uphold human rights, democracy and the rule of law in Europe. Founded in 1949, it has 46 member states, with a ...
has already adopted a convention on cyber-crime related to this issue. The proposed legislation would allow police to require an individual to disclose information, such as passwords and cryptographic keys, during searches. The proposal has been introduced to make it easier for police and prosecutors. The proposal has been criticized by the
Swedish Data Protection Authority The Swedish Authority for Privacy Protection ( sv, Integritetsskyddsmyndigheten), formerly the Swedish Data Protection Authority ( sv, Datainspektionen), is a Swedish government agency, organized under the Ministry of Justice, tasked to protec ...
.


Switzerland

In
Switzerland ). Swiss law does not designate a ''capital'' as such, but the federal parliament and government are installed in Bern, while other federal institutions, such as the federal courts, are in other cities (Bellinzona, Lausanne, Luzern, Neuchâtel ...
there is no law specifying obligation to issue keys or passwords.


The Netherlands

Article 125k of the Wetboek van Strafvordering allows investigators with a warrant to access information carriers and networked systems. The same article allows the district attorney and similar officers of the court to order persons who know how to access those systems to share their knowledge in the investigation, including any knowledge of encryption of data on information carriers. However, such an order may not be given to the suspect under investigation.


United Kingdom

The
Regulation of Investigatory Powers Act 2000 The Regulation of Investigatory Powers Act 2000 ( c.23) (RIP or RIPA) is an Act of the Parliament of the United Kingdom, regulating the powers of public bodies to carry out surveillance and investigation, and covering the interception of comm ...
(RIPA), Part III, activated by ministerial order in October 2007, requires persons to decrypt information and/or supply keys to government representatives to decrypt information without a court order. Failure to disclose carries a maximum penalty of two years in jail, or five years in the cases of national security or child indecency. The provision was first used against
animal rights Animal rights is the philosophy according to which many or all sentient animals have moral worth that is independent of their utility for humans, and that their most basic interests—such as avoiding suffering—should be afforded the sam ...
activists in November 2007, and at least three people have been prosecuted and convicted for refusing to surrender their encryption keys, one of whom was sentenced to 13 months' imprisonment. Even politicians responsible for the law have voiced concerns that its broad application may be problematic. (9) of section 49 failed to consider that mere authentication can be used in a way analogous to encryption, making it possible to circumvent the law via chaffing and winnowing. In 2017, schedule 7 of the
Terrorism Act 2000 The Terrorism Act 2000 (c.11) is the first of a number of general Terrorism Acts passed by the Parliament of the United Kingdom. It superseded and repealed the Prevention of Terrorism (Temporary Provisions) Act 1989 and the Northern Ireland (Em ...
was used to charge Muhammad Rabbani with "wilfully obstructing or seeking to frustrate a search examination" after allegedly refusing to disclose passwords. He was later convicted. In 2018, Stephen-Alan Nicholson, the prime suspect in a murder case, was charged with refusing to provide his Facebook password to police.


United States

The
Fifth Amendment to the United States Constitution The Fifth Amendment (Amendment V) to the United States Constitution addresses criminal procedure and other aspects of the Constitution. It was ratified, along with nine other articles, in 1791 as part of the Bill of Rights. The Fifth Amendme ...
protects witnesses from being forced to incriminate themselves, and there is currently no law regarding key disclosure in the United States. However, the federal case ''
In re Boucher ''In re Boucher'' (case citation: No. 2:06-mJ-91, 2009 WL 424718), is a federal criminal case in Vermont, which was the first to directly address the question of whether investigators can compel a suspect to reveal their encryption passphrase or ...
'' may be influential as
case law Case law, also used interchangeably with common law, is law that is based on precedents, that is the judicial decisions from previous cases, rather than law based on constitutions, statutes, or regulations. Case law uses the detailed facts of a le ...
. In this case, a man's laptop was inspected by customs agents and child pornography was discovered. The device was seized and powered-down, at which point
disk encryption Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that ...
technology made the evidence unavailable. The judge held that it was a foregone conclusion that the content exists since it had already been seen by the customs agents, Boucher's encryption password "adds little or nothing to the sum total of the Government's information about the existence and location of files that may contain incriminating information." In another case, a district court judge ordered a Colorado woman to decrypt her laptop so prosecutors can use the files against her in a criminal case: "I conclude that the Fifth Amendment is not implicated by requiring production of the unencrypted contents of the Toshiba Satellite M305 laptop computer," Colorado U.S. District Judge Robert Blackburn ruled on January 23, 2012. In ''Commonwealth v. Gelfgatt'', the court ordered a suspect to decrypt his computer, citing exception to Fifth Amendment can be invoked because "''an act of production does not involve testimonial communication where the facts conveyed already are known to the government...''". However, in ''United States v. Doe'', the
United States Court of Appeals for the Eleventh Circuit The United States Court of Appeals for the Eleventh Circuit (in case citations, 11th Cir.) is a federal court with appellate jurisdiction over the following U.S. district courts: * Middle District of Alabama * Northern District of Alabama * ...
ruled on 24 February 2012 that forcing the decryption of one's laptop violates the Fifth Amendment. The
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, t ...
may also issue
national security letter A national security letter (NSL) is an administrative subpoena issued by the United States government to gather information for national security purposes. NSLs do not require prior approval from a judge. The Stored Communications Act, Fair Credi ...
s that require the disclosure of keys for investigative purposes. One company,
Lavabit Lavabit is an open-source encrypted webmail service, founded in 2004. The service suspended its operations on August 8, 2013 after the U.S. Federal Government ordered it to turn over its Secure Sockets Layer (SSL) private keys, in order to all ...
, chose to shut down rather than surrender its master private keys due to the government wanting to spy on Edward Snowden's emails. Since the summer of 2015, cases have been fought between major tech companies such as Apple over the regulation of encryption with government agencies asking for access to private encrypted information for law enforcement purposes. A technical report was written and published by
MIT Computer Science and Artificial Intelligence Laboratory Computer Science and Artificial Intelligence Laboratory (CSAIL) is a research institute at the Massachusetts Institute of Technology (MIT) formed by the 2003 merger of the Laboratory for Computer Science (LCS) and the Artificial Intelligence Lab ...
, where
Ronald Rivest Ronald Linn Rivest (; born May 6, 1947) is a cryptographer and an Institute Professor at MIT. He is a member of MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Int ...
, an inventor of RSA, and
Harold Abelson Harold Abelson (born April 26, 1947) is the Class of 1922 Professor of Computer Science and Engineering in the Department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology (MIT), a fellow of the Institute ...
, a computer science professor at MIT with others, explain the technical difficulties, including security issues that arise from the regulation of encryption or by making a key available to a third party for purposes of decrypting any possible encrypted information. The report lists scenarios and raises questions for policy makers. It also asks for more technical details if the request for regulating encryption is to be pursued further. In 2019, the
Pennsylvania Supreme Court The Supreme Court of Pennsylvania is the highest court in the Commonwealth of Pennsylvania's Unified Judicial System. It also claims to be the oldest appellate court in the United States, a claim that is disputed by the Massachusetts Supreme Ju ...
, in a ruling that only controls for that state's law, held that a suspect in a child pornography case could not be compelled to reveal his password, despite telling the police "We both know what's on there."


See also

*
Deniable encryption In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists. The users ...
*
FBI–Apple encryption dispute The FBI–Apple encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose data are cryptographically protected. There is much debate over public access ...
*
Secret sharing Secret sharing (also called secret splitting) refers to methods for distributing a secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals combine th ...
* Rubber-hose cryptanalysis *
Crypto Wars Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencie ...


References


Further reading

* Bert-Jaap Koops
Bert-Jaap Koops homepageCrypto Law Survey: Overview per country
Version 26.0. Universiteit van Tilburg. July 2010. * Stephen Mason, gen ed, Electronic Evidence (3rd edn, LexisNexis Butterworths, 2012) Chapter 6 Encrypted data * *{{cite journal , last=Fakhoury , first=Hanni , year=2012 , title=A combination or a key? The Fifth Amendment and privilege against compelled decryption , volume=9 , journal=Digital Evidence and Electronic Signature Law Review , pages=81–87 , url=http://www.deaeslr.org/2012.html
List of legal case studies
!-- URL just has an abstract --> Cryptography law Encryption debate