Terrorist suspects forced to hand over encryption keys

The police have the power to put you in jail if you don’t hand over encryption keys to the data they want.

Defendants will have to give encryption keys to police even if the data it unlocks incriminates them, a British appeals court has ruled.

An appeals court has heard the case of two defendants who were arrested under the terrorism prevention act. One suspect's homes was searched, revealing computer material which was partially encrypted.

Advertisement - Article continues below

The Regulation of Investigatory Powers Act imposed a legal obligation for them to reveal the full encryption keys and allow access to the encrypted material, the ruling said. However, the suspects appealed, claiming that it was incompatible with the privilege against self-incrimination.

The appeals ruling said that as the encryption key was no different to a physical key, it existed separately from their will and so the self-incrimination defence couldn't be used.

The court said: "The key to the computer equipment is no different to the key of a locked drawer. The contents of the drawer existed independently of the suspect; so did the key to it. The contents might or might not be incriminating; the key was neutral."

It is Part three of the RIPA act which requires people under particular circumstances to supply encryption keys to particular authorities. It has caused controversy as a failure to disclose decrypted data could lead to a penalty of up to two years in jail.

Advertisement
Advertisement - Article continues below

Critics have said that law enforcement could cost businesses by mishandling this data, with some of the provisions complex and even unworkable.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/software/video-conferencing/355410/zoom-50-adds-256-bit-encryption-and-ui-refresh
video conferencing

Zoom 5.0 adds 256-bit encryption to address security concerns

23 Apr 2020
Visit/security/hacking/355382/whatsapps-flaw-shoulder-surfing
hacking

WhatsApp flaw leaves users open to 'shoulder surfing' attacks

21 Apr 2020
Visit/security/cyber-security/355368/microsoft-builds-ai-to-detect-security-flaws-with-99-accuracy
cyber security

Microsoft AI can detect security flaws with 99% accuracy

20 Apr 2020

Most Popular

Visit/operating-systems/microsoft-windows/355812/microsoft-warns-against-installing-windows-10-may-2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
Visit/security/cyber-security/355797/microsoft-bans-trend-micros-rootkit-buster-from-windows-10
cyber security

Microsoft bans Trend Micro driver from Windows 10 for "cheating" hardware tests

27 May 2020
Visit/policy-legislation/data-protection/355835/nhs-yet-to-understand-the-risks-of-holding-test-and-trace
data protection

NHS yet to understand risks of holding Test and Trace data for 20 years

29 May 2020