SlideShare una empresa de Scribd logo
1 de 64
Descargar para leer sin conexión
MANDATORY KEY DISCLOSURE &
SELF INCRIMINATION IN CANADA
ANNA L. MANLEY
amanley@sampsonmcdougall.com
2
W A R N I N G:
CONTAINS PHILOSOPHY
John LockeJean Jacques Rousseau
SOCIAL CONTRACT
3
Are you a pedophile?
Are you a criminal?
Did you sign a non-disclosure agreement with your client?
Did you guarantee privacy to your client?
Are you a Doctor or Lawyer with a duty to keep client’s
information confidential?
Because…. privacy.
WHY ENCRYPT?
4
SEARCH & SEIZURE
5
Search or seizure
8. Everyone has the right to be secure against
unreasonable search or seizure.
6
Reasonable expectation of privacy.
7
“[I]t is hard to imagine a search more intrusive, extensive,
or invasive of one’s privacy than the search and seizure of
a personal computer.” - Justice Morris Fish
R v Morelli, 2010 SCC 8 at para 3
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
R. v. Cole, 2012 SCC 53, [2012] 3 S.C.R. 34
Employees may have a reasonable –
though limited – expectation of privacy in
their work computer.
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
R. v. Vu, 2013 SCC 60, [2013] 3 S.C.R. 657
Police had warrant to search house - warrant
did not specify computers
Do you need an additional warrant to search a
computer?
Can seize the computer, but require an
additional warrant to search it.
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
R. v. TELUS Communications Co., 2013 SCC
16, [2013]
Text messages carry the same reasonable
expectation of privacy as voice conversations;
therefore, you need a wiretap authorization.
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
R. v. Spencer, 2014 SCC 43, [2014] 2 S.C.R.
212
A person has a reasonable expectation of
privacy in their anonymity online.
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
R. v. Fearon, 2014 SCC 77, [2014] S.C.R.
621
A person has an increased reasonable
expectation of privacy in their cell phone, but
police can search a cell phone incident to
arrest if they follow four rules
8
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
9
Does it matter if you encrypt your data?
10
11
12
Rights and freedoms in Canada
1. The Canadian Charter of Rights and Freedoms
guarantees the rights and freedoms set out in it
subject only to such reasonable limits prescribed by
law as can be demonstrably justified in a free and
democratic society.
13
Exclusion of evidence bringing administration of justice into disrepute
24(2) Where, in proceedings under subsection (1), a
court concludes that evidence was obtained in a
manner that infringed or denied any rights or freedoms
guaranteed by this Charter, the evidence shall be
excluded if it is established that, having regard to all
the circumstances, the admission of it in the
proceedings would bring the administration of justice
into disrepute.
14
SCC
PRIVACY TREND
2012
2013
2014
2015
R. v. Cole
R. v. Vu
R. v. Telus
R. v. Spencer
R. v. Fearon
15
@ BORDER
16
ALAIN PHILIPPON
17
LOWER REASONABLE EXPECTATION OF
PRIVACY.
@ BORDER
18
Canadian Border Services Agency (CBSA)
Powers to search both people and goods coming into the country
(includes files on your digital devices)
Customs Act, RSC 1985, c 1, s 99(1)
Ability to search “any document in any form” – including electronic
documents
Customs Act, RSC 1985, c 1, s 2(1)
Files = “goods” and CBSA has the power to search these documents
R v Leask, 2008 ONCJ 25
R v McDermin, 2008 CanLII 68135 (Ont SCJ)
R v Whittaker (2010), 946 APR 334 (NBPC)
@ BORDER
19
What are they looking for?
Obscenity (Porn or Hate Literature)
Political Opinion
Copyright Infringement
@ BORDER
20
How do they pick me for a search?
• Importing something the CBSA deems to be suspicious
• Travelled to and from “high risk” destinations
• Single man traveling alone
• Demonstrate “an interest in Pornography”
• Associated, or are believed to be associated, with known
importers or exporters of materials the CBSA objects to.
TARGET @ BORDER
21
STANDARD @ BORDER
21
STANDARD @ BORDER
Reasonable & Probable Grounds
21
STANDARD @ BORDER
Reasonable & Probable Grounds
21
STANDARD @ BORDER
Reasonable & Probable Grounds
Reasonable Suspicion
21
STANDARD @ BORDER
Reasonable & Probable Grounds
Reasonable Suspicion
21
SEARCH WITHOUT SUSPICION (HUNCH)
STANDARD @ BORDER
Reasonable & Probable Grounds
Reasonable Suspicion
22
Suspicionless Search (Quick Look)
>> Detailed Search
23
1. Take your stuff - CBSA can detain “goods” including your
electronic device and its contents.
Detentions can last for months
2. Search - Use forensic tools to ensure evidence is not corrupted or
lost (EG - “IC-What-UC”)
They can also copy everything on your electronic device (“Disc
Image”) for later inspection.
Take a Disc Image and run password-cracking software.
NOTE: CBSA has not released information on how information is
“destroyed” after it is searched and found to be legal.
HOW @ BORDER
24
When you are crossing the border, if the
CBSA decides to search your electronic
devices,
there is nothing you can do about it.
@ BORDER
25
You will be asked for username and password.
(CBSA policy states you are not required to give it, unless a Court
orders you to)
@ BORDER
26
Detained >> Right to Remain Silent
Detained >> Lawyer
Detained >> Right to request to be taken to the senior officer on duty for him
or her to confirm whether there are reasonable grounds for the search.
Am I detained?
Questioning or luggage searching by a customs official at a border
crossing is not a “detention”
If you are taken aside and required to submit to extensive searching and
you cannot leave, you have been detained.
A search of your body must be done by a person who is the same sex as
you.
RIGHTS @ BORDER
27
REALITY @ BORDER
BCCLA believes that refusing to provide a password is within your
rights under Canadian law.
NOT tested in Canadian courts (no guarantees)
Refusal >> Treated as suspicious (detailed inspection and detention of
device)
Refusal + Not Canadian >> risk denial of entry into the country
Refusal >> Delay
28
Full Disc Encryption
File Encryption
Digital Steganography
OPTIONS…?
29
SELF-INCRIMINATION
DO I HAVE TO PROVIDE MY ENCRYPTION KEY?
30
31
COMMONWEALTH vs. Leon I. GELFGATT,
SJC-11358. Suffolk. Nov. 5, 2013. - June 25, 2014
Context:
Mortgage Fraud - Accused admitted to existence of
documents but not their contents
UNITED STATES
32
UNITED STATES
Testimonial:
If the response requires a person “to make extensive use
of ‘the contents of his own mind,’” producing those
documents is testimonial.
Fifth Amendment: “no person … shall be compelled in any
criminal case to be a witness against himself”
Generally:
Testimonial >> CANNOT be compelled
Non-Testimonial >> CAN be compelled
33
UNITED STATES
Strongbox keys - NOT testimonial
Safe combinations - Testimonial
A safe key can be compelled, but a safe combination cannot;
A fingerprint that unlocks an iPhone can be compelled, but an
iPhone’s numeric password cannot.
34
COMMONWEALTH vs. Leon I. GELFGATT, SJC-11358. Suffolk.
Nov. 5, 2013. - June 25, 2014
UNITED STATES
Encryption keys are protected by the Fifth Amendment
Unless you already admitted to the existence and/or authenticity
of the encrypted documents.
35
36
Proceedings in criminal and penal matters
11. Any person charged with an offence has the right
(a) to be informed without unreasonable delay of the specific offence;
(b) to be tried within a reasonable time;
(c) not to be compelled to be a witness in proceedings
against that person in respect of the offence;
(d) to be presumed innocent until proven guilty according to law in a fair and public hearing by an independent and impartial tribunal;
(e) not to be denied reasonable bail without just cause;
(f) except in the case of an offence under military law tried before a military tribunal, to the benefit of trial by jury where the maximum
punishment for the offence is imprisonment for five years or a more severe punishment;
(g) not to be found guilty on account of any act or omission unless, at the time of the act or omission, it constituted an offence under
Canadian or international law or was criminal according to the general principles of law recognized by the community of nations;
(h) if finally acquitted of the offence, not to be tried for it again and, if finally found guilty and punished for the offence, not to be tried or
punished for it again; and
(i) if found guilty of the offence and if the punishment for the offence has been varied between the time of commission and the time of
sentencing, to the benefit of the lesser punishment.
37
Life, liberty and security of person
7. Everyone has the right to life, liberty and security of
the person and the right not to be deprived thereof
except in accordance with the principles of
fundamental justice.
38
R. v. Hebert, 1990 CanLII 118 (SCC), [1990] 2 S.C.R. 151 at para.
47
“... the right to silence may be postulated
to reside in the notion that a person
whose liberty is placed in jeopardy by the
criminal process cannot be required to
give evidence against himself or herself,
but rather has the right to choose
whether to speak or to remain silent.”
- Chief Justice Beverley McLachlin
CANADIAN CASES
39
2004
2010
R. v. Meron
R. c. Boudreau-Fontaine
CANADIAN CASES
39
2004
2010
R. v. Meron
R. v. Meron, [2004] P.E.I.J. No. 95
The accused was asked to provide
passwords for encrypted hard drives, but he
refused to cooperate. The case gives no
further details about the context or
consequences.
R. c. Boudreau-Fontaine
CANADIAN CASES
39
2004
2010
R. v. Meron
R. c. Boudreau-Fontaine
CANADIAN CASES
39
2004
2010
R. v. Meron
R. c. Boudreau-Fontaine
R. c. Boudreau-Fontaine, 2010 QCCA 1108
An accused cannot be ordered to produce
their passwords for the benefit of an
investigation against them.
CANADIAN CASES
39
2004
2010
R. v. Meron
R. c. Boudreau-Fontaine
R. C. BOUDREAU-FONTAINE
40
Problems:
1. Quebec Case
2. s.24(2) = Contextual
41
NO.
42
A judge orders you to provide your password or
encryption key to police.
You say “No”
Contempt of a court order + Charter Challenge
43
Not worth it. RIGHTS!
44
WHAT WOULD I DO?
45
QUESTIONS

Más contenido relacionado

La actualidad más candente

Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Cyber Laws -Nudrat Mufti
Cyber Laws -Nudrat MuftiCyber Laws -Nudrat Mufti
Cyber Laws -Nudrat MuftiNUDRAT MUFTI
 
Criminal Law for Civil Attorneys darren-chaker
Criminal Law for Civil Attorneys     darren-chakerCriminal Law for Civil Attorneys     darren-chaker
Criminal Law for Civil Attorneys darren-chakerDarren Chaker
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age - Mark - Fullbright
 
Chapter 10 - The Fifth Amendment: Obtaining Information Legally
Chapter 10 - The Fifth Amendment: Obtaining Information LegallyChapter 10 - The Fifth Amendment: Obtaining Information Legally
Chapter 10 - The Fifth Amendment: Obtaining Information Legallylisajurs
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
Usa vs. arhndt judge says police need a warrant to view files on wireless n...
Usa vs. arhndt   judge says police need a warrant to view files on wireless n...Usa vs. arhndt   judge says police need a warrant to view files on wireless n...
Usa vs. arhndt judge says police need a warrant to view files on wireless n...Umesh Heendeniya
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...Duc Lai Trung Minh
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Servicesblogzilla
 

La actualidad más candente (18)

File000165
File000165File000165
File000165
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cyber Laws -Nudrat Mufti
Cyber Laws -Nudrat MuftiCyber Laws -Nudrat Mufti
Cyber Laws -Nudrat Mufti
 
Criminal Law for Civil Attorneys darren-chaker
Criminal Law for Civil Attorneys     darren-chakerCriminal Law for Civil Attorneys     darren-chaker
Criminal Law for Civil Attorneys darren-chaker
 
The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age The Human Right to Privacy in the Digital Age
The Human Right to Privacy in the Digital Age
 
Chapter 10 - The Fifth Amendment: Obtaining Information Legally
Chapter 10 - The Fifth Amendment: Obtaining Information LegallyChapter 10 - The Fifth Amendment: Obtaining Information Legally
Chapter 10 - The Fifth Amendment: Obtaining Information Legally
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Usa vs. arhndt judge says police need a warrant to view files on wireless n...
Usa vs. arhndt   judge says police need a warrant to view files on wireless n...Usa vs. arhndt   judge says police need a warrant to view files on wireless n...
Usa vs. arhndt judge says police need a warrant to view files on wireless n...
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Twitter contra USA
Twitter contra USATwitter contra USA
Twitter contra USA
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
2009 case law overview
2009 case law overview2009 case law overview
2009 case law overview
 
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
[Privacy and IT Ethics Presentation] Chapter 3: The Forth Amendment and emer...
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 

Similar a Mandatory Key Disclosure in Canada

Confidential Informant Darren Chaker
Confidential Informant Darren ChakerConfidential Informant Darren Chaker
Confidential Informant Darren ChakerDarren Chaker
 
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docxRiley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docxjoellemurphey
 
Chapter 13 Interrogation, Electronic Surveillance, and Other .docx
Chapter 13 Interrogation, Electronic Surveillance, and Other .docxChapter 13 Interrogation, Electronic Surveillance, and Other .docx
Chapter 13 Interrogation, Electronic Surveillance, and Other .docxbartholomeocoombs
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?blogzilla
 
Douglas E. Metzger was convicted in the municipal court of the cit.docx
Douglas E. Metzger was convicted in the municipal court of the cit.docxDouglas E. Metzger was convicted in the municipal court of the cit.docx
Douglas E. Metzger was convicted in the municipal court of the cit.docxmadlynplamondon
 
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIAL
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIALChapter 15 - CRIMINAL PROCEDURE BEFORE TRIAL
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIALLisa Greene
 
Application of presumption of innocence in nigeria
Application of presumption of innocence in nigeriaApplication of presumption of innocence in nigeria
Application of presumption of innocence in nigeriaAlexander Decker
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectiveJason Nathu
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docxdrennanmicah
 
The eight basic consumer rights
The eight basic consumer rightsThe eight basic consumer rights
The eight basic consumer rightsMlshin Lao
 
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
504   Part II Criminal Procedure# 151053   Cust Cengage  .docx504   Part II Criminal Procedure# 151053   Cust Cengage  .docx
504 Part II Criminal Procedure# 151053 Cust Cengage .docxtroutmanboris
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Criminalinvestigationprocess 110608163420-phpapp01
Criminalinvestigationprocess 110608163420-phpapp01Criminalinvestigationprocess 110608163420-phpapp01
Criminalinvestigationprocess 110608163420-phpapp01jg234
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaWendy Knox Everette
 
147Chapter 6 POLICE INVESTIG.docx
147Chapter 6                           POLICE INVESTIG.docx147Chapter 6                           POLICE INVESTIG.docx
147Chapter 6 POLICE INVESTIG.docxnovabroom
 

Similar a Mandatory Key Disclosure in Canada (20)

Confidential Informant Darren Chaker
Confidential Informant Darren ChakerConfidential Informant Darren Chaker
Confidential Informant Darren Chaker
 
Dearborn_Lead_Macro
Dearborn_Lead_MacroDearborn_Lead_Macro
Dearborn_Lead_Macro
 
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docxRiley v. California, 134 S.Ct. 2473 (2014)   134 S.Ct. 2.docx
Riley v. California, 134 S.Ct. 2473 (2014) 134 S.Ct. 2.docx
 
Chapter 13 Interrogation, Electronic Surveillance, and Other .docx
Chapter 13 Interrogation, Electronic Surveillance, and Other .docxChapter 13 Interrogation, Electronic Surveillance, and Other .docx
Chapter 13 Interrogation, Electronic Surveillance, and Other .docx
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
 
Douglas E. Metzger was convicted in the municipal court of the cit.docx
Douglas E. Metzger was convicted in the municipal court of the cit.docxDouglas E. Metzger was convicted in the municipal court of the cit.docx
Douglas E. Metzger was convicted in the municipal court of the cit.docx
 
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIAL
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIALChapter 15 - CRIMINAL PROCEDURE BEFORE TRIAL
Chapter 15 - CRIMINAL PROCEDURE BEFORE TRIAL
 
Application of presumption of innocence in nigeria
Application of presumption of innocence in nigeriaApplication of presumption of innocence in nigeria
Application of presumption of innocence in nigeria
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
 
The eight basic consumer rights
The eight basic consumer rightsThe eight basic consumer rights
The eight basic consumer rights
 
Omnibus motion narcotics_2
Omnibus motion narcotics_2Omnibus motion narcotics_2
Omnibus motion narcotics_2
 
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
504   Part II Criminal Procedure# 151053   Cust Cengage  .docx504   Part II Criminal Procedure# 151053   Cust Cengage  .docx
504 Part II Criminal Procedure# 151053 Cust Cengage .docx
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Criminalinvestigationprocess 110608163420-phpapp01
Criminalinvestigationprocess 110608163420-phpapp01Criminalinvestigationprocess 110608163420-phpapp01
Criminalinvestigationprocess 110608163420-phpapp01
 
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
 
147Chapter 6 POLICE INVESTIG.docx
147Chapter 6                           POLICE INVESTIG.docx147Chapter 6                           POLICE INVESTIG.docx
147Chapter 6 POLICE INVESTIG.docx
 

Último

Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 

Último (20)

Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 

Mandatory Key Disclosure in Canada

  • 1. MANDATORY KEY DISCLOSURE & SELF INCRIMINATION IN CANADA ANNA L. MANLEY amanley@sampsonmcdougall.com
  • 2. 2 W A R N I N G: CONTAINS PHILOSOPHY John LockeJean Jacques Rousseau SOCIAL CONTRACT
  • 3. 3 Are you a pedophile? Are you a criminal? Did you sign a non-disclosure agreement with your client? Did you guarantee privacy to your client? Are you a Doctor or Lawyer with a duty to keep client’s information confidential? Because…. privacy. WHY ENCRYPT?
  • 5. 5 Search or seizure 8. Everyone has the right to be secure against unreasonable search or seizure.
  • 7. 7 “[I]t is hard to imagine a search more intrusive, extensive, or invasive of one’s privacy than the search and seizure of a personal computer.” - Justice Morris Fish R v Morelli, 2010 SCC 8 at para 3
  • 8. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon
  • 9. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon R. v. Cole, 2012 SCC 53, [2012] 3 S.C.R. 34 Employees may have a reasonable – though limited – expectation of privacy in their work computer.
  • 10. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon
  • 11. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon R. v. Vu, 2013 SCC 60, [2013] 3 S.C.R. 657 Police had warrant to search house - warrant did not specify computers Do you need an additional warrant to search a computer? Can seize the computer, but require an additional warrant to search it.
  • 12. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon
  • 13. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon R. v. TELUS Communications Co., 2013 SCC 16, [2013] Text messages carry the same reasonable expectation of privacy as voice conversations; therefore, you need a wiretap authorization.
  • 14. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon
  • 15. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon R. v. Spencer, 2014 SCC 43, [2014] 2 S.C.R. 212 A person has a reasonable expectation of privacy in their anonymity online.
  • 16. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon
  • 17. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon R. v. Fearon, 2014 SCC 77, [2014] S.C.R. 621 A person has an increased reasonable expectation of privacy in their cell phone, but police can search a cell phone incident to arrest if they follow four rules
  • 18. 8 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon
  • 19. 9 Does it matter if you encrypt your data?
  • 20. 10
  • 21. 11
  • 22. 12 Rights and freedoms in Canada 1. The Canadian Charter of Rights and Freedoms guarantees the rights and freedoms set out in it subject only to such reasonable limits prescribed by law as can be demonstrably justified in a free and democratic society.
  • 23. 13 Exclusion of evidence bringing administration of justice into disrepute 24(2) Where, in proceedings under subsection (1), a court concludes that evidence was obtained in a manner that infringed or denied any rights or freedoms guaranteed by this Charter, the evidence shall be excluded if it is established that, having regard to all the circumstances, the admission of it in the proceedings would bring the administration of justice into disrepute.
  • 24. 14 SCC PRIVACY TREND 2012 2013 2014 2015 R. v. Cole R. v. Vu R. v. Telus R. v. Spencer R. v. Fearon
  • 27. 17 LOWER REASONABLE EXPECTATION OF PRIVACY. @ BORDER
  • 28. 18 Canadian Border Services Agency (CBSA) Powers to search both people and goods coming into the country (includes files on your digital devices) Customs Act, RSC 1985, c 1, s 99(1) Ability to search “any document in any form” – including electronic documents Customs Act, RSC 1985, c 1, s 2(1) Files = “goods” and CBSA has the power to search these documents R v Leask, 2008 ONCJ 25 R v McDermin, 2008 CanLII 68135 (Ont SCJ) R v Whittaker (2010), 946 APR 334 (NBPC) @ BORDER
  • 29. 19 What are they looking for? Obscenity (Porn or Hate Literature) Political Opinion Copyright Infringement @ BORDER
  • 30. 20 How do they pick me for a search? • Importing something the CBSA deems to be suspicious • Travelled to and from “high risk” destinations • Single man traveling alone • Demonstrate “an interest in Pornography” • Associated, or are believed to be associated, with known importers or exporters of materials the CBSA objects to. TARGET @ BORDER
  • 32. 21 STANDARD @ BORDER Reasonable & Probable Grounds
  • 33. 21 STANDARD @ BORDER Reasonable & Probable Grounds
  • 34. 21 STANDARD @ BORDER Reasonable & Probable Grounds Reasonable Suspicion
  • 35. 21 STANDARD @ BORDER Reasonable & Probable Grounds Reasonable Suspicion
  • 36. 21 SEARCH WITHOUT SUSPICION (HUNCH) STANDARD @ BORDER Reasonable & Probable Grounds Reasonable Suspicion
  • 37. 22 Suspicionless Search (Quick Look) >> Detailed Search
  • 38. 23 1. Take your stuff - CBSA can detain “goods” including your electronic device and its contents. Detentions can last for months 2. Search - Use forensic tools to ensure evidence is not corrupted or lost (EG - “IC-What-UC”) They can also copy everything on your electronic device (“Disc Image”) for later inspection. Take a Disc Image and run password-cracking software. NOTE: CBSA has not released information on how information is “destroyed” after it is searched and found to be legal. HOW @ BORDER
  • 39. 24 When you are crossing the border, if the CBSA decides to search your electronic devices, there is nothing you can do about it. @ BORDER
  • 40. 25 You will be asked for username and password. (CBSA policy states you are not required to give it, unless a Court orders you to) @ BORDER
  • 41. 26 Detained >> Right to Remain Silent Detained >> Lawyer Detained >> Right to request to be taken to the senior officer on duty for him or her to confirm whether there are reasonable grounds for the search. Am I detained? Questioning or luggage searching by a customs official at a border crossing is not a “detention” If you are taken aside and required to submit to extensive searching and you cannot leave, you have been detained. A search of your body must be done by a person who is the same sex as you. RIGHTS @ BORDER
  • 42. 27 REALITY @ BORDER BCCLA believes that refusing to provide a password is within your rights under Canadian law. NOT tested in Canadian courts (no guarantees) Refusal >> Treated as suspicious (detailed inspection and detention of device) Refusal + Not Canadian >> risk denial of entry into the country Refusal >> Delay
  • 43. 28 Full Disc Encryption File Encryption Digital Steganography OPTIONS…?
  • 44. 29 SELF-INCRIMINATION DO I HAVE TO PROVIDE MY ENCRYPTION KEY?
  • 45. 30
  • 46. 31 COMMONWEALTH vs. Leon I. GELFGATT, SJC-11358. Suffolk. Nov. 5, 2013. - June 25, 2014 Context: Mortgage Fraud - Accused admitted to existence of documents but not their contents UNITED STATES
  • 47. 32 UNITED STATES Testimonial: If the response requires a person “to make extensive use of ‘the contents of his own mind,’” producing those documents is testimonial. Fifth Amendment: “no person … shall be compelled in any criminal case to be a witness against himself” Generally: Testimonial >> CANNOT be compelled Non-Testimonial >> CAN be compelled
  • 48. 33 UNITED STATES Strongbox keys - NOT testimonial Safe combinations - Testimonial A safe key can be compelled, but a safe combination cannot; A fingerprint that unlocks an iPhone can be compelled, but an iPhone’s numeric password cannot.
  • 49. 34 COMMONWEALTH vs. Leon I. GELFGATT, SJC-11358. Suffolk. Nov. 5, 2013. - June 25, 2014 UNITED STATES Encryption keys are protected by the Fifth Amendment Unless you already admitted to the existence and/or authenticity of the encrypted documents.
  • 50. 35
  • 51. 36 Proceedings in criminal and penal matters 11. Any person charged with an offence has the right (a) to be informed without unreasonable delay of the specific offence; (b) to be tried within a reasonable time; (c) not to be compelled to be a witness in proceedings against that person in respect of the offence; (d) to be presumed innocent until proven guilty according to law in a fair and public hearing by an independent and impartial tribunal; (e) not to be denied reasonable bail without just cause; (f) except in the case of an offence under military law tried before a military tribunal, to the benefit of trial by jury where the maximum punishment for the offence is imprisonment for five years or a more severe punishment; (g) not to be found guilty on account of any act or omission unless, at the time of the act or omission, it constituted an offence under Canadian or international law or was criminal according to the general principles of law recognized by the community of nations; (h) if finally acquitted of the offence, not to be tried for it again and, if finally found guilty and punished for the offence, not to be tried or punished for it again; and (i) if found guilty of the offence and if the punishment for the offence has been varied between the time of commission and the time of sentencing, to the benefit of the lesser punishment.
  • 52. 37 Life, liberty and security of person 7. Everyone has the right to life, liberty and security of the person and the right not to be deprived thereof except in accordance with the principles of fundamental justice.
  • 53. 38 R. v. Hebert, 1990 CanLII 118 (SCC), [1990] 2 S.C.R. 151 at para. 47 “... the right to silence may be postulated to reside in the notion that a person whose liberty is placed in jeopardy by the criminal process cannot be required to give evidence against himself or herself, but rather has the right to choose whether to speak or to remain silent.” - Chief Justice Beverley McLachlin
  • 54. CANADIAN CASES 39 2004 2010 R. v. Meron R. c. Boudreau-Fontaine
  • 55. CANADIAN CASES 39 2004 2010 R. v. Meron R. v. Meron, [2004] P.E.I.J. No. 95 The accused was asked to provide passwords for encrypted hard drives, but he refused to cooperate. The case gives no further details about the context or consequences. R. c. Boudreau-Fontaine
  • 56. CANADIAN CASES 39 2004 2010 R. v. Meron R. c. Boudreau-Fontaine
  • 57. CANADIAN CASES 39 2004 2010 R. v. Meron R. c. Boudreau-Fontaine R. c. Boudreau-Fontaine, 2010 QCCA 1108 An accused cannot be ordered to produce their passwords for the benefit of an investigation against them.
  • 58. CANADIAN CASES 39 2004 2010 R. v. Meron R. c. Boudreau-Fontaine
  • 59. R. C. BOUDREAU-FONTAINE 40 Problems: 1. Quebec Case 2. s.24(2) = Contextual
  • 60. 41
  • 61. NO. 42 A judge orders you to provide your password or encryption key to police. You say “No” Contempt of a court order + Charter Challenge
  • 62. 43 Not worth it. RIGHTS!