Lawful Access (2024)

  • Issue
  • Case Spotlight
  • Lawful Access Summit
  • Department Statements on Lawful Access
  • U.S. Attorney Op-Eds
  • Letter to Facebook
  • Encryption and Lawful Access
  • Online Child Exploitation and COVID-19

Issue

Law enforcement is increasingly facing challenges due to the phenomenon of “warrant-proof” encryption. Service providers, device manufacturers, and application developers are deploying products and services with encryption that can only be decrypted by the end user or customer. Because of warrant-proof encryption,the government often cannot obtain the electronic evidence and intelligence necessary to investigate and prosecute threats to public safety and national security, even with a warrant or court order. This provides a “lawless space” that criminals, terrorists, and other bad actors can exploit for their nefarious ends.

Case Spotlight

On August 27, 2019, in North Canton, Ohio, an undercover police officer responded to an advertisem*nt on a prostitution website that offered a woman for sexual acts. The ad suggested that the woman being sold was new to prostitution, potentially a victim of sex trafficking, and young—possibly even underage.

The person responding to the officer’s message arranged to have the woman meet the officer in a hotel, with the condition that she would be accompanied by a man who was acting as her pimp. When they arrived at the hotel, police quickly established that the woman was a girl—just 16 years old. The girl later told police that the man who accompanied her received money for bringing her to various hotels and other locations to have sex with strangers. Police arrested the male suspect and seized his cell phone.

The day after his arrest, the suspect was overheard speaking to a female acquaintance on a jail telephone. He expressed concern that the police would access the contents of his cell phone and discover evidence of serious criminal conduct. He said candidly, “If they get in my phone, I’m doing time ... If they get in my phone, I’m doing time for other [stuff].”

Law enforcement quickly used this evidence to seek a search warrant to access the contents of the suspect’s cell phone to investigate and obtain evidence of criminal conduct. A federal judge agreed that there was probable cause to search the phone and issued the warrant.

Law enforcement expected the phone to contain names of other sex trafficking victims, contact information for additional sexual predators, and evidence of other criminal activity alluded to by the suspect. But law enforcement wasn’t able to access any of that information because the suspect’s cell phone was encrypted.

Despite a lawfully issued warrant, law enforcement was unable to bypass the encryption on the phone and access its content. In fact, the cell phone manufacturer’s default encryption ensures that no one, other than the suspected sex trafficker himself, would be able to unlock it. To this day, law enforcement has been unable to access the encrypted phone and may never get the evidence needed to prosecute the suspect for his most serious offenses, identify other potential sex offenders who purchase sex with children or trafficked persons, or save other potential victims.

Lawful Access Summit

On October 4, 2019, the Department hosted a summit entitled Lawless Spaces: Warrant-Proof Encryption and Its Impact on Child Exploitation Cases. The summit explored the impact ofwarrant-proof encryption on investigations and prosecutions. It featured speeches by senior Department officials and distinguished guests and panel discussions and presentations from non-governmental organizations, state and local law enforcement, and international partners.

Speeches from the summit are below:

For more information about the Lawful Access summit or to view the agenda or archived video of the event, please visit theLawless Spaces:Warrant-Proof Encryption and Its Impact on Child Exploitation Cases page

Department Statements on Lawful Access

The Department has long been concerned about the lawful access issue. A selection of previous statements are listed below.

U.S. Attorney Op-Eds

Letter to Facebook

On October 3, 2019, the Department published an open letter to Facebook from international law enforcement partners from the United States, United Kingdom, and Australia in response to the company’s publicly announced plans to implement end-to-end-encryption across its messaging services.

The letter is signed by Attorney General William P. Barr, United Kingdom Home Secretary Priti Patel, Australia’s Minister for Home Affairs Peter Dutton, and Acting Homeland Security Secretary Kevin McAleenan.

To read the Department’s statement or to link to the letter, please visit theOffice of Public Affairs page

Encryption and Lawful access

Encryption is an essential tool that helps protect data, communications, devices, and infrastructure from cyber threats and contributes to user privacy. But the rapidly growing use ofwarrant-proof encryption in everyday devices and software means that criminals—including drug dealers, child predators, and terrorists—use encryption to shield their illicit activities from authorities.

Encryption is a means of concealing data (including text, images, or video) from anyone who is not the intended recipient. It translates the data into a format that is unintelligible until it is retranslated back into its original form through use of a decoding mechanism. While forms of encryption have been used for many years, encrypted information today can be impossible (or nearly impossible) to decode even using sophisticated technology.

The U.S. legal system permits law enforcement officials to obtain access to evidence in private locations by convincing an independent judge to issue a search warrant or a wiretap order. To obtain such access, the government must provide evidence to a court that there is probable cause to believe that evidence of a crime will be found in the location to be searched. The judge will then assess the individual’s privacy interests and determine whether there is sufficient probable cause to justify the search. However, this system is thwarted by warrant-proofencryption.

Law enforcement regularly encounters encryption in two ways: (1) default encryption for data stored on devices (“data at rest”); and (2) real-time communications in transit over a network (“data in motion”), where decryption capability is limited to the end user (“end-to-end encryption”). End-to-end encryption leaves the service provider unable to produce readable content in response to wiretap orders and search warrants, thus making the content “warrant-proof.” In other words, the targets of the investigation control whether or not their communications are subject to lawful surveillance.

The use of widespread and increasingly sophisticated encryption technologies significantly impairs, or entirely prevents, many serious criminal and national security investigations, including those involving violent crime, drug trafficking, child exploitation, cybercrime, and domestic and international terrorism.

Online Child Exploitation and COVID-19

As explored during the Department’s Lawful Access summit highlighted above, warrant-proof encryption is of particular concern in child exploitation cases. This concern is heightened by the COVID-19 pandemic. Due to school closings and stay-at-home orders, children’s increased online presence may put them at greater risk of encountering online child predators. These criminals often rely on anonymity and technology like end-to-end encryption to hide their nefarious activity and evade detection by law enforcement.

The Department of Justice has created a tip sheet to help parents, guardians, caregivers, and teachers protect children from becoming victims of online child predators: Keeping Children Safe Online During COVID-19.

Additionally, Assistant Attorney General Beth Williams recently published an op-ed about the increased risk to children during COVID-19. AAG Williams noted that we “should be particularly mindful about children’s use of apps and platforms that feature end-to-end encryption, direct messaging, video chats, file uploads, and user anonymity, which are often relied upon by predators to contact children and evade law enforcement.” And she stressed that “the fight to protect our children can only be won if everyone— including the government, industry, and private citizens—remains vigilant.”

For more information about the Department’s response to COVID-19, please visit justice.gov/coronavirus.

On October 28, 2020, AAG Williams and Associate Deputy Attorney General Stacie Harris participated in a virtual panel discussion hosted by Columbia Law School on Combating the Online Exploitation of Children. The panel also featured a commander from the Internet Crimes Against Children Task Force Program, a reporter from the Boston Globe who has written about child-exploitation issues, and a survivor of child exploitation and abuse. The event focused on the role of technology, law, journalism, and public policy in protecting children in the virtual world and included a discussion on the impacts of warrant-proof encryption and COVID-19 on the ongoing crisis of online exploitation. A video of the event can be viewed at the following link: Combating the Online Exploitation of Children.

I'm well-versed in encryption technology, its implications for privacy and law enforcement, and the ongoing debate surrounding lawful access. Encrypted data, utilizing complex algorithms to secure information, has become integral to safeguarding privacy and protecting sensitive data. However, its use in warrant-proof scenarios has sparked considerable concern within law enforcement and security agencies.

This scenario highlights the clash between the advantages of encryption for privacy and its obstructive effects on criminal investigations. The case in North Canton, Ohio, where an encrypted cell phone prevented law enforcement from accessing critical evidence related to a sex trafficking case, exemplifies this issue. Despite a lawful warrant, the encrypted device remained impenetrable, impeding efforts to prosecute offenders and potentially endangering other victims.

The Lawful Access Summit convened by the Department addressed these challenges, emphasizing the impact of warrant-proof encryption on child exploitation cases. Key figures such as Attorney General William P. Barr, Deputy Attorney General Jeffrey A. Rosen, and FBI Director Christopher Wray highlighted the urgent need to find solutions to balance encryption's benefits with law enforcement's investigative requirements.

The Department's persistent efforts, including statements from high-ranking officials, op-eds in various publications, and even an open letter to Facebook, underscore the gravity of the situation. The contention is not merely about access to data; it's about preventing heinous crimes and safeguarding vulnerable individuals, especially amidst the increased risks posed by the COVID-19 pandemic.

Encryption's role in protecting data and ensuring privacy is undeniable. However, the growing use of warrant-proof encryption, particularly in scenarios involving child exploitation, has amplified concerns. The Department's focus on this issue reflects a critical need for collaboration between technology, legislation, and law enforcement to find a viable balance between privacy and public safety.

Lawful Access (2024)

FAQs

What are the requirements for lawful access? ›

(3) Lawful access: Officers must have had a legal right to enter the place in which the evidence was located. view and is observed by a police officer from a lawful vantage point, there has been no invasion of a legitimate expectation of privacy and thus no 'search'”]; Washingtonv.

Can police read encrypted messages? ›

Can the police access an encrypted phone? Yes they can ,as long as they have a warrant. But companies like Apple don't agree to decrypt as they think it might violate their security agreement. But if the case is strong and if the mobile is involved in a crime scene and an active investigation is going on.

What is the definition of lawful access? ›

Lawful access means access by third party individuals or entities, including governments, to plaintext, or cryptographic keys, of encrypted data, in accordance with law.

What is the lawful access to encrypted data act pass? ›

The Lawful Access to Encrypted Data Act is a balanced solution that protects the constitutional rights of all Americans while providing law enforcement with the tools they need to access evidence necessary to address violent crime and national security threats.

Can police decrypt AES 256? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities.

What is the lawful access challenge? ›

The inability to access the stored data in an encrypted thumb drive, hard drive, smartphone, or tablet despite a judicially authorized search warrant. The inability to obtain intelligible content from end-to-end encrypted communications apps during the execution of a court-ordered wiretap.

Can police force you to decrypt? ›

Courts have consistently held that defendants cannot be forced to divulge passwords. However, and more practically with respect to the end result, a defendant can sometimes be forced to use a decryption password—without divulging it—and then to provide the files in readable form.

Can police see my texts? ›

Communication Surveillance

Law enforcement can obtain your call and text records from your service provider, revealing who you have communicated with and when. This data can be used to establish connections between individuals, track the flow of information, and build a case against a suspect.

Can the feds see your text messages? ›

Forensic Tools: The FBI and other law enforcement have access to digital forensic tools that operate similarly to spyware, which enable them to extract personal phone data, like text messages, phone logs, photos, and more. Just in case, learn to check if there's spyware on your phone.

Does lawful mean legal or illegal? ›

When something's legal, or the rules allow it, you can call it lawful. It's lawful to plant a tree in your yard, but it's not lawful to dig up a tree in the city park. Things that are lawful are allowed or permitted, like driving after you've gotten your driver's license or baking your neighbor a cake.

What does right of entry or access mean in law? ›

: the legal right to enter upon real property of another for a special purpose (as to show leased property to a prospective purchaser or to make repairs) without being guilty of trespass.

What is lawful authorization? ›

lawful authority means permission, authorization, or license that is expressly provided.

Who can access encrypted data? ›

Most often encryption keys take the form of passphrases where only individuals who have the passphrase can unencrypt and view the data.

What are the rights of data access? ›

The right of access includes information about the processing purposes, the categories of personal data processed, the recipients or categories of recipients, the planned duration of storage or criteria for their definition, information about the rights of the data subject such as rectification, erasure or restriction ...

What is the Data Act access right? ›

The Data Act gives individuals and businesses the right to access the data produced through their utilisation of smart objects, machines and devices. Users of connected products may choose to share this data with third parties.

What are the eight conditions of lawful processing? ›

Collection of personal information must be for a specifically defined, lawful purpose related to a function of the responsible party Data subject must be aware of the purpose of collecting data The purpose for processing personal information must be clear Record retention must not be longer than necessary unless ...

What is the right of access in the United States? ›

The right of access to information belongs to everyone. In principle, every person has the right to request access to information held by the State.

What is the right of access in California? ›

(a) General right of access by the public

(1) All electronic records must be made reasonably available to the public in some form, whether in electronic or in paper form, except those that are sealed by court order or made confidential by law.

What is the lawful intercept standard? ›

As a legally sanctioned official access to private communications, Lawful Interception (LI) is a security process in which a service provider or network operator collects and provides law enforcement officials with intercepted communications of private individuals or organizations.

Top Articles
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 6039

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.