Les téléphones cryptés et leurs impacts sur le système de justice

Auteurs-es

  • Mélanie Théorêt Université de Montréal image/svg+xml
  • David Décary-Hétu Université de Montréal
  • Cloé Gobeil Université de Montréal image/svg+xml

DOI :

https://doi.org/10.26034/la.cfs.2024.4624

Mots-clés :

téléphone mobile, téléphone crypté, surveillance, application de la loi, téléphone fantôme, preuves, décisions judiciaires, nouvelles technologies, confidentialité, sécurité des communications, chiffrement

Résumé

Les téléphones portables sont devenus essentiels dans la vie quotidienne, permettant de rester en contact avec amis, proches et collègues. Cependant, ils représentent une menace pour les délinquants, car ils peuvent être utilisés pour les localiser et surveiller leurs communications. Les forces de l'ordre tirent parti de ces dispositifs pour obtenir des preuves et effectuer des arrestations. En réponse à cette menace, les délinquants se sont tournés vers des alternatives telles que les téléphones fantômes, cryptés ou PGP, qui offrent un matériel dépourvu de fonctionnalités de suivi et de surveillance. Ces appareils offrent des services de messagerie cryptée et des fonctions de sécurité avancées. Le Canada joue un rôle central dans l'économie souterraine de ces téléphones, avec certains de ses principaux distributeurs opérant dans le pays. L'article examine l’état actuel des connaissances sur les téléphones cryptés en se basant sur des décisions judiciaires, des rapports d'actualité et des articles scientifiques, ainsi que sur les entreprises qui font la promotion de ces dispositifs. L'objectif de cette étude est ainsi de mettre en lumière les dernières technologies utilisées pour contrer l'utilisation de téléphones cryptés par les criminels.

Références

Barker, S. (2021). Decrypted: Phantom Secure takedown a ‘significant blow’ against Australia’s organised crime networks Journal of the Australian of Policing Inc. 13 (1), p. 13

Berthelet, P. (2018). Aperçus de la lutte contre la cybercriminalité dans l’Union européenne. Revue de science criminelle et de droit pénal comparé, 1, 59-74. https://doi.org/10.3917/rsc.1801.0059

Boustead, A. E. (2020). The tools at hand: surveillance innovations and the shifting role of federal law enforcement in drug control. Ohio State Journal of Criminal Law, 18(1), 1-24.

Boyer, J. (2001). 16. Commerce et technique au secours du narcotrafic. Dans : J. Boyer, La guerre perdue contre la drogue (pp. 296-315). Paris: La Découverte. https://www.cairn.info/la-guerreperdue- contre-la-drogue--9782707132864-page-296.htm?contenu=resume

Cents, R., et Le-Khac, N.-A. (2020). Towards a New Approach to Identify WhatsApp Messages. 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 10.1109/TrustCom50675.2020.00259

Cherry, P. (2017, 24 mars). Charges to Be Stayed in Major Montreal Mafia Bust Project Clemenza. Montreal Gazette. https://montrealgazette.com/news/local-news/charges-to-bestayed-in-major-montreal-mafia-bust-project-clemenza/

Christie, J. (2019). “Going Dark” – The Challenge Facing Law Enforcement in the 21st Century. Economic Crime Forensics Capstones. 45. https://digitalcommons.lasalle.edu/ecf_capstones/45

Cour d’Amsterdam (2018). Jugement No. 13/997097-16, April 19, 2018. https://nl.vlex.com/vid/uitspraak-n-13-997097-764733873

Cox, J. (2017). Dutch Cops Say They’ve Decrypted PGP Messages On Seized Server. En ligne: https://www.vice.com/en/article/3dyaqk/dutch-cops-say-theyve-decrypted-pgpmessages-on-seized-server

Cox, J. (2019, 22 octobre). Inside the Phone Company Secretly Run By Drug Traffickers.Vice. https://www.vice.com/en/article/wjwbmm/inside-the-phone company-secretly-run-bydrug-traffickers

Denning, D.E. et Baugh, W.E. (1999). HIDING CRIMES IN CYBERSPACE. Information, Communication & Society, 2, 251-276. https://www.semanticscholar.org/paper/HIDINGCRIMES-IN-CYBERSPACE-Denning-Baugh/829b07977c7999572515701fa5d4af197e71df7e

Department of Justice (2019, 28 mai). Chief Executive of Communications Company Sentenced to Prison for Providing Encryption Services and Devices to Criminal Organizations. https://www.justice.gov/usao-sdca/pr/chief-executivecommunications-company-sentenced-prison-providingencryption-services

Diffie, W. et Landau, S. (2010). Privacy on the Line - The Politics of Wiretapping and Encryption. The MIT Press.

Ellyson, L. (2018). Fouilles, saisies et perquisitions de données informatiques : Attente raisonnable de vie privée et infonuagique [mémoire de maîtrise, Université de Montréal]. Papyrus. https://papyrus.bib.umontreal.ca/xmlui/bitstream/handle/1866/22849/Ellyson_Laura_2018_memoire.pdf

Eurojust (2020, 2 juin). Dismantling of an encrypted network sends shockwaves through organised crime groups across Europe. https://www.eurojust.europa.eu/dismantling-encryptednetwork-sendsshockwaves-through-organised-crimegroups-across-europ

Eurojust (2021, 10 mars). New major interventions to block encrypted communications of criminal networks. https://www.eurojust. europa.eu/news/new-major-interventions-block-encryptedcommunications-criminal-networks

Eymard, O. (2018). Questions de cryptologie. Délibérée, 3, 60-63. https://doi.org/10.3917/delib.003.0060

Finklea, K. (2016). Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations, Congressional Research Service. https://nsarchive.gwu.edu/sites/default/files/documents/3996851/CongressionalResearch-Service-Encryption-and.pdf

Forte, D. (2009). Do encrypted disks spell the end of forensics? Computer Fraud and Security, 2009, 18–20.

Graham, R. (2016). How Terrorists Use Encryption. CTC Sentinel. Vol 9 (6), pp. 20-25. https://ctc.westpoint.edu/wp-content/uploads/2016/06/CTC

Guarda,N. D. (2014). Digital encryption and the freedom of self incrimination: implications for the future of canadian criminal investigations and prosecutions. Criminal Law Quarterly, 61(1), 119-142. https://heinonline.org/HOL/Page?handle=hein.journals/clwqrty61&id=125&collection=journals&index=8

Harkin, D. et Molnar, A. (2022). Exploring the social implications of buying and selling cyber security. Crime Law Soc Change. https://doi.org/10.1007/s10611-022-

Hill-Smith, M. (2019). Smartphone Encryption: Legal Framework for Law Enforcement to Survive the «Going Dark» Phenomenon. Auckland University Law Review, 25, 173-198. https://heinonline.org/HOL/Page?handle=hein.journals/auck25&collection=journals&id=173&startid=&endid=198

Hughes, D. M. (2002). The use of new communications and information technologies for sexual exploitation of women and children. Hastings Women’s Law Journal, 13(1), 127 146. https://www.researchgate.net/publication/265199999_The_Use_of_New_Communications_and_Information_Technologies_for_Sexual_Exploitation_of_Women_and_Children

Ilbiz, E. et Kaunert, C. (2021): Europol and cybercrime: Europol’s sharing decryption platform, Journal of Contemporary European Studies, DOI:10.1080/14782804.2021.1995707

Keenan, B. (2019). State access to encrypted data in the United Kingdom: The ‘transparent’ approach, Sage Journals. 49(3-4). 223-244. https://doi.org/10.1177%2F1473779519892641

Khandelwal, S. (2016, 1 décembre). Rule 41—FBI Gets Expanded Power to Hack Any Computer in the World, Hacker News. https://thehackernews.com/2016/11/fbi-rule-41-hacking.html

Lichtblau, E. et Benner, K. (2016, 17 février). Apple Fights Order to Unlock San Bernardino Gunman’s iPhone. The New York Times. https://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-san-bernardino.html

Manhattan District Attorney’s Office (2015, novembre). Report of the Manhattan disctrict attorney’s office on smartphone encryption and public safety. https://www.manhattanda.org/wp-content/themes/dany/files/11.18.15%20Report%20on%20Smartphone%20Encryption%20and%20Public%20Safety.pdf

Miller, S. et Bossomaier, T. (2021). Privacy, Encryption and Counter-Terrorism. Counter-Terrorism, Ethics and Technology, 139-154. https://doi.org/10.1007/978-3-030-90221-6_9

Murray, D. (2021a). Criminals targeted for encrypted phones. Journal of the Australian of Policing Inc. 13 (1), p. 9.

Murray, D. (2021b). Trouble on line for criminals using encrypted phones. Journal of the Australian of Policing Inc. 13 (1), p. 10-11 New South Wales Crime Commission. (2021). Annual Report 2020-21. https://www.crimecommission.nsw.gov.au/files/nsw-crimecommission-

Ontario Superior Court of Justice (2016). Mutual Legal Assistance in Criminal Matters Act(Re), 2016 ONSC 5699 (CanLII). https://www.canlii.org/en/on/onsc/doc/2016/2016onsc

O’Rourke, C. (2020). Is this the end for “encro” phones? Computer Fraud & Security, 2020(11), 8–10. doi:10.1016/s1361-3723(20)30118-4

Parikh, D., Shani, H., Dave, S., Patel, P. (2017) Organized CyberCrime and the State of User Privacy. IJIRST || National Conference on Latest Trends in Networking and Cyber Security.

Penney, S. et Gibbs, D. (2017). Law Enforcement Access to Encrypted Data: Legislative Responses and the Charter. McGill Law Journal / Revue de droit de McGill, 63(2), 201–245. https://doi.org/10.7202/1058192ar

Pisaric, M. (2021a). Encrypted mobile phones. Archibald Reiss Days, 11(1). http://eskup.kpu.edu.rs/dar/article/view/293/191

Pisaric, M. (2021b). Mobile phone encryption as an obstacle in criminal investigation – review of comparative solutions. Annals of the Faculty of Law in Belgrade, LXIX (2), 415-442

Public Safety Canada, National Security Technology Division. (2008). Solicitor General’s Enforcement Standards for Lawful Interception of Telecommunications - Compliance Table. https://cippic.ca/uploads/ATI-SGES_Annotated-2008.pdf

R. c. Boudreau-Fontaine, 2010 QCCA 1108

R. c. Boyer, 2015 QCCQ 11693

R. c. Duff, 2010 ONCJ 493

R. c. Edison, 2017 NBBR 102

R. c. Mirarchi, 2015 QCCS 6628

R. c. Sonne, 2012 ONSC 584

R. c. Wilson, 2014 BCSC 663

Regnery, M. (2020). The dark phones (Encrochat) — Criminals are building their own communication system. En ligne: https://xperylab.medium.com/the-dark-phones-encrochatcriminals-are-building-their-own-communication-system-474f3aeef759

Schneier, B., Seidel, K. et Vijayakumar, S. (2016). A Worldwide Survey of Encryption Products. The Berkman Center for Internet & Society Research Publication Series. Harvard University. https://cyber.law.harvard.edu/publications/2016/encryption_survey

Severson, D. (2016, 14 mars). Taking Stock of the Snoopers’ Charter: The U.K.’s Investigatory Powers Bill, Lawfare. https://www.lawfareblog.com/taking-stock-snoopers-charter-uksinvestigatory-powers

Scroxton, A. (2020). Cops take out encrypted comms to disrupt organised crime. Australia’s organised crime networks Journal of the Australian of Policing Inc. 13 (1), p. 27.

SKY ECC Technologies. (2021). SKY ECC platform remains secure and no authorized Sky ECC device has been hacked. En ligne: https://www.globenewswire.com/newsrelease/2021/03/10/2190026/0/en/SKY-ECC-platformremains-secure-and-no-authorized-Sky-ECC-device-hasbeen-hacked.html

Taylor, S. B. (2017). Can You Keep a Secret: Some Wish to Ban Encryption Technology for Fears of Data Going Dark. Science and Technology Law Review, 19(2).https://scholar.smu.edu/scitech/vol19/iss2/6

Terzian, D. (2016). The Micro-Hornbook on the Fifth Amendment and Encryption Georgetown Law Journal. https://ssrn.com/abstract=2725525

Touzin, C., Cameron, D. & Renaud, D. (2015). “Trahi par son BlackBerry, le caïd Raynald Desjardins plaide coupable”. En ligne : https://www.lapresse.ca/actualites/justice-et-affairescriminelles/proces/201507/06/01-4883499-trahi-par-sonblackberry-le-caid-raynald-desjardins-plaide-coupable.php.

US District Court, Southern District California (2021, 17 mai). Application for a warrant by a telephone or other reliable electronic means in Case No. ’21 MJ01948. https://storage.courtlistener.com/recap/gov.uscourts.casd.707623/gov.uscourts.casd.707623.1.0.pdf

Vincze, E., A. (2016) Challenges in digital forensics, Police Practice and Research, 17:2, 183-194, DOI: 10.1080/15614263.2015.1128163

Weinstein, J., M. (2015) Privacy vs. Public Safety: Prosecuting and Defending Criminal Cases in the Post-Snowden Era, American Criminal Law Review, 52(4), 748-49. https://law-journalsbooks. vlex.com/vid/privacy-vs-public-safety-636937737

West, L. et Forcese, C. (2019). Twisted Into Knots: Canada’s Challenges in Lawful Access to Encrypted Communications. Common Law World Review, 49(3-4), 182–198. http://dx.doi. org/10.2139/ssrn.3443533

Woods, A., K. (2017). Encryption Substitutes, Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper No. 1705. https://lawfareblog.com/encryption-substitutes

Zagaris, B., & Plachta, M. (2020). Transnational organized crime. International Enforcement Law Reporter, 36(7), 248-255.

Téléchargements

Publié-e

18.06.2024

Comment citer

Théorêt, M., Décary-Hétu, D., & Gobeil, C. (2024). Les téléphones cryptés et leurs impacts sur le système de justice. Criminologie, Forensique Et Sécurité, 2(1). https://doi.org/10.26034/la.cfs.2024.4624

Numéro

Rubrique

Articles réguliers

Catégories

Articles les plus lus du,de la,des même-s auteur-e-s