Show simple item record

dc.contributor.authorEllyson, Laura
dc.date.accessioned2022-12-14T15:24:12Z
dc.date.available2022-12-14T15:24:12Z
dc.date.issued2022-12-14
dc.identifier.urihttp://hdl.handle.net/10222/82144
dc.description.abstractEncryption, a method of concealing information from unwanted eyes, has recently become more prevalent in society, following revelations of massive surveillance conducted by governments and the increasing number of attacks on companies holding their customers’ digitized information. Encryption mechanisms have become more sophisticated and widely used by citizens who wish to keep their personal information private and secure. Conversely, criminals have also been using strong encryption mechanisms to hide their wrongdoing, which has made it harder for law enforcement officials to access evidence. This “going dark” phenomenon has impacted both the seizure of “data at rest” (i.e., data that is saved on a device) and the access to “data in transit” (i.e., communication data that is still being transmitted over a network). By examining the technological underpinning of encryption technology and its beneficial impacts on society, this thesis proposes an analytical framework that would allow law enforcement to compel suspects to decrypt their data or devices in specific situations and under strict conditions. This framework is crafted to reflect the unique Canadian experience with the self-incrimination and to harmonize this principle with the protection against unreasonable search and seizure, both found within the Canadian Charter of Rights and Freedoms. Inspiration is drawn from comparable legal systems found within Australia, the United States, and the United Kingdom, while transnational and international considerations are also examined due to the inherent borderless nature of the internet. Essentially, this thesis submits that alternatives to compelled decryption by suspects should be favoured to address the “going dark” problem and that strong encryption should remain available to the public. It is submitted that Parliament should create a strict framework applicable to compelled decryption which would allow law enforcement access to “data at rest” in its decrypted form, when no other alternative exists. It is also submitted that resorting to “lawful hacking” as a method of circumventing encryption applied to “data in transit” should be examined and regulated by Parliament.en_US
dc.language.isoenen_US
dc.subjectCriminal Procedureen_US
dc.subjectEncryptionen_US
dc.subjectCanadian Criminal Lawen_US
dc.subjectPrinciple against self-incriminationen_US
dc.subjectSearch and seizure lawen_US
dc.subjectCriminal investigationsen_US
dc.subjectPrivacyen_US
dc.titleThe Impact of Encryption Technologies on Criminal Investigations in Canada: A Balanced Approach to the “Going Dark” Problem in Light of Self-Incrimination and Privacy Considerationsen_US
dc.date.defence2022-12-06
dc.contributor.departmentFaculty of Lawen_US
dc.contributor.degreeDoctor of Philosophyen_US
dc.contributor.external-examinerSteven Penneyen_US
dc.contributor.graduate-coordinatorElaine Brooks-Craigen_US
dc.contributor.thesis-readerSteve Coughlanen_US
dc.contributor.thesis-readerAdelina Ifteneen_US
dc.contributor.thesis-supervisorRobert Currieen_US
dc.contributor.ethics-approvalNot Applicableen_US
dc.contributor.manuscriptsNoen_US
dc.contributor.copyright-releaseNoen_US
 Find Full text

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record