首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Talking in the dark: Rules to facilitate open debate about lawful access to strongly encrypted information
Institution:1. Laidlaw Foundation Scholar, York Law School, University of York, UK;2. Assistant Professor in Law, York Law School, University of York, UK;1. Faculty of Law & Criminology, Vrije Universiteit Brussel (LSTS), Pleinlaan 2, 1050 Brussels, Belgium;2. Tilburg University (TILT), the Netherlands;1. School of Law, King''s College London, United Kingdom;2. Research Associate, School of Law, King''s College London;1. Faculty of Law and St Edmund Hall, University of Oxford, United Kingdom;2. Faculty of Law and Pembroke College, University of Oxford, United Kingdom;3. Department of Education, University of Oxford, United Kingdom;1. University of Lodz, Kopcinskiego 8/12, 90-232 Lodz, Poland;2. University of Zurich, Bahnhofstrasse 70/ P.O. Box, Zürich CH 8021, Switzerland
Abstract:Strong encryption can prevent anybody from accessing user data, including the technology companies responsible for its implementation. As strong encryption technology has become increasingly prevalent, law enforcement agencies have sought legislation to secure continued lawful access to the data affected. Following analysis of the encryption debates in the United States and the United Kingdom, this article will propose three rules that governments should follow to facilitate open debate and prevent the implementation of unsafe lawful access solutions. Firstly, we will provide context on current encryption policy. Secondly, it will be shown that continuous open debate must be facilitated in order to prevent the implementation of unsafe lawful access solutions. Finally, it will be argued that governments should be held to three rules when engaging in debate about lawful access: legislation governing lawful access must state clearly on its face whether decryption can be mandated; the encryption debate must not be oversimplified or reduced to emotive examples in order to secure public support for unsafe solutions; and safeguards on warrants must not be conflated with safeguards on lawful access mechanisms in order to suggest that solutions are safer than is actually the case.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号