Милана Писарић
10.51204/Anali_PFBU_21205A
Рачунарски подаци са доказним потенцијалом налазе се у све већем броју извора, међу којима су од посебног значаја паметни мобилни телефони. Када надлежни органи, за потребе откривања и доказивања кривичних дела, прикупљају из овог уређаја податке, потенцијалне електронске доказе, сусрећу се са више нормативних и практичних изазова, а један од отежавајућих фактора је енкрипција целог интерног складишта података. Неретко они имају одговарајуће овлашћење за остваривање приступа садржају мобилног телефона, али им недостају техничке могућности да, без поседовања кључа за декрипцију, остваре приступ и прикупе податке у читљивом облику. Иако се функција енкрипције не може и не сме занемарити у савременом дигиталном окружењу, она има опструктивно дејство на кривичну истрагу. Међутим, ову препреку надлежни органи могу превазићи применом других одговарајућих мера и радњи. У раду аутор анализира тактике и технике, односно мере и радње за остваривање приступа садржају мобилног телефона заштићеног енкрипцијом и разматра правне основе за њихову примену.
- Abelson, Harold, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael Specter, Daniel J. Weitzner. 2015. Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications. Cambridge. https://doi.org/10.1093/cybsec/tyv009
- Arora, Mohit. 2012. How Secure Is AES Against Brute Force Attacks? EE Times. July 5. http://www.eetimes.com/document.asp, последњи приступ 14. јула 2020.
- Bellovin, Steven, Matt Blaze, Sandy Clark, Susan Landau. 1/2014, Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet. Northwestern Journal of Technology and Intellectual Property 12: 1–64. https://doi.org/10.2139/ssrn.2312107
- Biryukov, Alex, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir. 2009. Key Recovery Attacks of Practical Complexity on AES Variants with up to 10 Rounds. 299–319. u Advances in Cryptology – EUROCRYPT 2010, ed. Henri Gilbert. Berlin, Heidelberg: Springer. https://doi.org/10.1007/978-3-642-13190-5_15
- Bošnjak, Leon, Boštjan Brumen. 1/2018. Rejecting the Death of Passwords: Advice for the Future. Computer Science and Information Systems 16: 313–332. https://doi.org/10.2298/CSIS180328016B
- Casey, Eoghan, Geoff Fellows, Matthew Geiger, Gerasimos Stellatos. 2/2011.The growing impact of full disk encryption on digital forensics. Digital Investigation 8: 129–134. https://doi.org/10.1016/j.diin.2011.09.005
- Gill, Lex, Tamir Israel, Christopher Parsons. 2018. Citizen Lab and the Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic: Shining a Light on the Encryption Debate: a Canadian Field Guide. Toronto.
- Gomes, Lee. 4/2018. Quantum computing: Both here and not here. IEEE Spectrum: 42–47. https://doi.org/10.1109/MSPEC.2018.8322045
- Hennessey, Susan. 2016. Lawful hacking and the case for a strategic approach to Going Dark. Brookings. October 7. https://www.brookings.edu/research/lawful-hacking-and-the-case-for-a-strategic-approach-to-going-dark/, последњи приступ 16. јула 2020.
- Jonathan, Katz, Yehuda Lindell. 2015. Introduction to modern cryptography, 2nd Edition. London.
- Kerr, Orin, Bruce Schneier. 4/2018. Encryption Workarounds. Georgetown Law Journal 106: 989–1019.
- Kerr, Orin. 4/2019. Compelled Decryption and the Privilege Against Self-Incrimination. Texas Law Review 97: 767–799.
- Koops, Bert-Jaaps. 2010. Commanding decryption and the privilege against self-incrimination. 431–445. New trends in criminal investigation and evidence: Volume II, eds. C. M. Breur, M. M. Kommer, J. F. Nijboer, J. M. Reijntjes. Antwerpen-Groningen-Oxford: Intersentia.
- Lemus, Efren. 2/2017. When Fingerprints Are Key: Reinstating Privacy to the Privilege Against Self-Incrimination in Light of Fingerprint Encryption in Smartphones. SMU Law Review 70: 533–561.
- Pisarić, Milana. 2015. Challenges of Recovering and Analyzing Volatile Data. Thematic Conference Proceedings of International Significance Archibald Reiss Days 3: 241–245. https://doi.org/10.5937/zrpfns54-26929
- Pisarić, Milana. 2019. Elektronski dokazi u krivičnom postupku. Novi Sad.
- Pisarić, Milana. 3/2020. Enkripcija kao prepreka otkrivanju i dokazivanju krivičnih dela. Zbornik radova Pravnog fakulteta u Novom Sadu 54: 1079–1100.
- Pisarić, Milana. 2020. Encryption as a challenge for European law enforcement agencies. Thematic Conference Proceedings of International Significance Archibald Reiss Days 10: 611–619.
- Pfefferkorn, Riana. 5/2017. Everything Radiates: Does the Fourth Amendment Regulate Side-Channel Cryptanalysis?. Connecticut Law Review 49: 1393–1452.
- Schneier, Bruce. 2015. History of the First Crypto War. Schneier Blog. https://www.schneier.com/blog/archives/2015/06/history_of_the_.html, последњи приступ 14. јула 2020.
- Swire, Peter, Kenesa Ahmad. 1/2012. Encryption and Globalization. Columbia Science and Technology Law Review 13: 416–481.
- Terzian, Dan. 4/2015. Forced Decryption as Equilibrium— why it’s Constitutional and how Riley Matters. Northwestern University Law Review 109: 1131–1140.
- Wareham, Jason. 3/2017. Cracking the Code: The Enigma of the Selfincrimination Clause and Compulsory Decryption of Encrypted Media. Georgetown Law Technology Review 1: 247–268.
- Winkler, Andrew. 2/2013. Password Protection and Self-Incrimination: Applying the Fifth Amendment Privilege in the Technological Era. Rutgers Computers and Technology Law Journal 39: 194–215.
ОСТАЛИ ИЗВОРИ
- Apple, Inc. 2020a. Using USB accessories with iOS 11.4.1 and later. April 15. https://support.apple.com/en-us/HT208857, последњи приступ 31. маја 2021.
- Apple, Inc. 2020b. Apple Platform Security. https://support.apple.com/guide/security/passcodes-sec20230a10d/web, последњи приступ 31. маја 2021.
- Apple, Inc. 2020c. iCloud security overview. https://support.apple.com/en-us/HT202303#:~:text=Data%20security,end%2Dto%2Dend%20encryption, последњи приступ 31. маја 2021.
- Apple, Inc. 2020d. Legal Process Guidelines Government & Law Enforcement outside the United States. https://www.apple.com/legal/privacy/law-enforcement-guidelines-outside-us.pdf, последњи приступ 31. маја 2021.
- Apple, Inc. 2020e. Legal Process Guidelines: U. S. Law Enforcement. https://www.apple.com/legal/privacy/law-enforcement-guidelines-us.pdf, последњи приступ 31. маја 2021.
- Bright, Peter. 2014. Stealing Encryption Keys Through the Power of Touch. Ars Technica. August 21. http://arstechnica.com/security/
2014/08/stealing-encryption-keys-through-the-power-of-touch/, последњи приступ 31. маја 2021. - Council of the European Union. 2020. Resolution on Encryption – Security through encryption and security despite encryption. 24 November 2020. https://data.consilium.europa.eu/doc/document/ST-13084–2020-REV-1/en/pdf, последњи приступ 31. маја 2021.
- Eurojust. 2019. Cybercrime Judicial Monitor – Issue 5. https://www.eurojust.europa.eu/sites/default/files/Publications/Reports/2019–12_CJM-5_EN.pdf, последњи приступ 31. маја 2021.
- Eurojust. 2018. Cybercrime Judicial Monitor – Issue 4. https://www.eurojust.europa.eu/sites/default/files/Publications/Reports/2018–12_CJM-4_EN.pdf, последњи приступ 31. маја 2021.
- Eurojust. 2017. Cybercrime Judicial Monitor – Issue 3. https://www.eurojust.europa.eu/sites/default/files/Publications/Reports/2017–12_CJM-3_EN.pdf, последњи приступ 31. маја 2021.
- Eurojust. 2016. Cybercrime Judicial Monitor – Issue 2. https://www.eurojust.europa.eu/sites/default/files/Publications/Reports/2016–11_CJM-2_EN.pdf, последњи приступ 31. маја 2021.
- Five Country Ministerial. 2018. Statement of Principles on Access to Evidence and Encryption. https://www.homeaffairs.gov.au/about-us/our-portfolios/national-security/security-coordination/five-country-ministerial-2018, последњи приступ 31. маја 2021.
- Google. 2021. Transparency Report Help Center, Request for User Information. https://support.google.com/transparencyreport/answer/7381458?
hl=en, последњи приступ 31. маја 2021. - Manhattan District Attorney’s Office. 2015. Report on Smartphone encryption and Public safety. New York. https://www.manhattanda.org/wp-content/themes/dany/files/11.18.15%20Report%20on%20Smartphone%20Encryption%20and%20Public%20Safety.pdf, последњи приступ 31. маја 2021.
- Manhattan District Attorney’s Office. 2016. Report on Smartphone encryption and Public safety, An update to the November 2015 Report. New York. https://www.manhattanda.org/wp-content/themes/dany/files/Report%20on%20Smartphone%20Encryption%20and%20Public%20Safety:%20An%20Update.pdf, последњи приступ 31. маја 2021.
- Manhattan District Attorney’s Office. 2017. Third Report on Smartphone encryption and Public safety. New York. https://www.manhattanda.org/wp-content/themes/dany/files/2017%20Report%20of%20the%20Manhattan%20District%20Attorney%27s%20Office%20on%20Smartphone%20Encryption.pdf, последњи приступ 31. маја 2021.
- Manhattan District Attorney’s Office. 2018. Report on Smartphone encryption and Public safety, An update to the November 2017 Report. New York. https://www.manhattanda.org/wp-content/uploads/2018/11/2018-Report-of-the-Manhattan-District-Attorney27s-Office-on-Smartphone-En….pdf, последњи приступ 31. маја 2021.
- Manhattan District Attorney’s Office. 2019. Report on Smartphone encryption and Public safety, An update to the November 2018 Report. New York. https://www.manhattanda.org/wp-content/uploads/2019
/10/2019-Report-on-Smartphone-Encryption-and-Public-Safety.pdf, последњи приступ 31. маја 2021. - Mullin, Joe. 2015. Sunk: How Ross Ulbricht ended up in prison for life. Ars Technica. May 29. https://arstechnica.com/tech-policy/2015/05/sunk-how-ross-ulbricht-ended-up-in-prison-for-life/, последњи приступ 31. маја 2021.
- National Cyber Security Center. 2019. Most hacked passwords revealed as UK cyber survey exposes gaps in online security. April 21. https://www.ncsc.gov.uk/news/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security, последњи приступ 31. маја 2021.
- National Institute of Standards and Technology. 2006. Glossary of Key Information Security Terms. April 25. https://www.govinfo.gov/content/pkg/GOVPUB-C13-b1ff2496095efdbb0a71d72f6b607595/pdf/GOVPUB-C13-b1ff2496095efdbb0a71d72f6b607595.pdf, последњи приступ 31. маја 2021.
- National Institute of Standards and Technology. 2019. Test Result for Mobile Device Acqusition Tool: UFED InField Kiosk v7.5.0.875. September 27. https://www.dhs.gov/sites/default/files/publications/testresultsnistmobiledeviceacquisitiontool-ufedinfieldkiosk_v7.5.0.875.pdf, последњи приступ 31. маја 2021.
- Office of the United Nations High Commissioner for Human Rights. 2018. Report of the United Nations High Commissioner for Human Rights: The Right to Privacy in the Digital Age, https://documents-dds-ny.un.org/doc/UNDOC/GEN/G18/239/58/PDF/G1823958.pdf?OpenElement, последњи приступ 31. маја 2021.
Затворено за коментаре