{"id":207,"date":"2018-04-27T15:56:38","date_gmt":"2018-04-27T19:56:38","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/?page_id=207"},"modified":"2025-05-12T11:14:30","modified_gmt":"2025-05-12T15:14:30","slug":"encryption-workarounds","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/in-print\/volume-106\/volume-106-issue-4-april-2018\/encryption-workarounds\/","title":{"rendered":"Encryption Workarounds"},"content":{"rendered":"<p>The widespread use of encryption has triggered a new step in many\u00a0criminal investigations: The encryption workaround. We define an encryption\u00a0workaround as any lawful government effort to reveal unencrypted\u00a0plaintext of a target\u2019s data that has been concealed by encryption. This\u00a0Article provides an overview of encryption workarounds. It begins with\u00a0a taxonomy of the different ways investigators might try to bypass\u00a0encryption schemes. We classify six kinds of workarounds: find the key,\u00a0guess the key, compel the key, exploit a flaw in the encryption software,\u00a0access plaintext while the device is in use, and locate another plaintext\u00a0copy. For each approach, we consider the practical, technological, and\u00a0legal hurdles raised by its use.<\/p>\n<p>The remainder of this Article develops lessons about encryption\u00a0workarounds and the broader public debate about encryption in criminal\u00a0investigations. First, encryption workarounds are inherently probabilistic.\u00a0None work every time, and none can be categorically ruled out every\u00a0time. Second, the different resources required for different workarounds\u00a0will have significant distributional effects on law enforcement. Some\u00a0techniques are inexpensive and can be used often by many law enforcement\u00a0agencies; some are sophisticated or expensive and likely to be used\u00a0rarely and only by a few. Third, the scope of legal authority to compel\u00a0third-party assistance will be a continuing challenge. And fourth, the law\u00a0governing encryption workarounds remains uncertain and underdeveloped.\u00a0Whether encryption will be a game changer or a speed bump\u00a0depends on both technological change and the resolution of important\u00a0legal questions that currently remain unanswered.<\/p>\n<p><a href=\"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-content\/uploads\/sites\/26\/2018\/07\/Encryption-Workarounds.pdf\">Keep Reading Encryption Workarounds<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The widespread use of encryption has triggered a new step in many\u00a0criminal investigations: The encryption workaround. We define an encryption\u00a0workaround as any lawful government effort to reveal unencrypted\u00a0plaintext of a [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"parent":202,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"abstract.php","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-207","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/comments?post=207"}],"version-history":[{"count":1,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/207\/revisions"}],"predecessor-version":[{"id":23752,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/207\/revisions\/23752"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/202"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/media?parent=207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}