{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:46:26Z","timestamp":1773931586418,"version":"3.50.1"},"reference-count":143,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T00:00:00Z","timestamp":1688515200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T00:00:00Z","timestamp":1688515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001799","name":"Murdoch University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001799","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Over the past decade, the Five Eyes Intelligence community has argued cryptosystems with end-to-end encryption (E2EE) are disrupting the acquisition and analysis of digital evidence. They have labelled this phenomenon the \u2018problem of going dark\u2019. Consequently, several jurisdictions have passed \u2018responsible encryption\u2019 laws that limit access to E2EE. Based upon a rhetorical analysis (Cunningham in\u00a0Understanding rhetoric: a guide to critical reading and argumentation,\u00a0BrownWalker Press,\u00a0Boca Raton, 2018) of official statements about \u2018going dark\u2019, it is argued there is a need for a domain-specific principle of <jats:italic>cryptographic justice<\/jats:italic> to reorient the debate away from competing technocratic claims about the necessity, proportionality, and accountability of digital surveillance programs. This article therefore specifies a principle of cryptographic justice by adapting more general norms of information justice to decision-making about encryption law and policy. The resulting principle is that encryption laws and policies should be designed to empower the comparatively powerless to protect themselves from domination (i.e., morally arbitrary forms of surveillance). It is argued this principle can reorient decision-making about encryption law and policy towards consideration of how cryptography impacts systems-level power dynamics within information societies.<\/jats:p>","DOI":"10.1007\/s10676-023-09707-9","type":"journal-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T09:02:32Z","timestamp":1688547752000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Specifying a principle of cryptographic justice as a response to the problem of going dark"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6835-0363","authenticated-orcid":false,"given":"Michael","family":"Wilson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,5]]},"reference":[{"issue":"10","key":"9707_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2814825","volume":"58","author":"H Abelson","year":"2015","unstructured":"Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., \u201cWhit,\u201d Gilmore, J., Green, M., Landau, S., Neumann, P. G., Rivest, R. L., Schiller, J. I., Schneier, B., Specter, M. A., & Weitzner, D. J. (2015). Keys under doormats. Communications of the ACM, 58(10), 24\u201326. https:\/\/doi.org\/10.1145\/2814825.","journal-title":"Communications of the ACM"},{"issue":"3","key":"9707_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1177\/1037969X20923073","volume":"45","author":"L Adam","year":"2020","unstructured":"Adam, L., & Barns, G. (2020). Digital strip searches in Australia: A threat to the privilege against self-incrimination. Alternative Law Journal, 45(3), 222\u2013227. https:\/\/doi.org\/10.1177\/1037969X20923073.","journal-title":"Alternative Law Journal"},{"key":"9707_CR3","unstructured":"American Civil Liberties Union (2015). Encryption is not a problem to be solved, but a crucial tool for freedom and security.\u00a0\u00a0https:\/\/www.aclu.org\/blog\/free-future\/aclu-un-encryption-not-problem-be-solved-crucial-tool-freedom-and-security."},{"key":"9707_CR4","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198712527.001.0001","volume-title":"Preventive justice","author":"A Ashworth","year":"2014","unstructured":"Ashworth, A., & Zedner, L. (2014). Preventive justice. Oxford University Press."},{"key":"9707_CR5","unstructured":"Australian Department of Home Affairs (2018). Submission to Parliamentary Inquiry into the Telecommunicatons and Other legislation (Assistance and Access) Bill 2018.\u00a0\u00a0https:\/\/www.aph.gov.au\/Parliamentary_Business\/Committees\/Joint\/Intelligence_and_Security\/TelcoAmendmentBill2018\/Submissions"},{"issue":"4","key":"9707_CR6","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1111\/j.1533-8525.2011.01219.x","volume":"52","author":"D Barnard-Wills","year":"2011","unstructured":"Barnard-Wills, D. (2011). UK news media discourses of surveillance. The Sociological Quarterly, 52(4), 548\u2013567. https:\/\/doi.org\/10.1111\/j.1533-8525.2011.01219.x.","journal-title":"The Sociological Quarterly"},{"key":"9707_CR7","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v22i2.7006","author":"M Bay","year":"2017","unstructured":"Bay, M. (2017). The ethics of unbreakable encryption: Rawlsian privacy and the San Bernardino iPhone. First Monday. https:\/\/doi.org\/10.5210\/fm.v22i2.7006.","journal-title":"First Monday"},{"issue":"5","key":"9707_CR8","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1136\/jme.29.5.269","volume":"29","author":"TL Beauchamp","year":"2003","unstructured":"Beauchamp, T. L. (2003). Methods and principles in biomedical ethics. Journal of Medical Ethics, 29(5), 269\u2013274.","journal-title":"Journal of Medical Ethics"},{"key":"9707_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/1-4020-2127-5_3","volume-title":"Handbook of Bioethics: Taking Stock of the Field from a Philosophical Perspective","author":"TL Beauchamp","year":"2004","unstructured":"Beauchamp, T. L., & DeGrazia, D. (2004). Principles and Principlism. In G. Khushf (Ed.), Handbook of Bioethics: Taking Stock of the Field from a Philosophical Perspective (pp. 55\u201374). Springer. https:\/\/doi.org\/10.1007\/1-4020-2127-5_3"},{"issue":"1","key":"9707_CR10","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s11948-015-9633-5","volume":"22","author":"J Beever","year":"2016","unstructured":"Beever, J., & Brightman, A. O. (2016). Reflexive principlism as an Effective Approach for developing ethical reasoning in Engineering. Science and Engineering Ethics, 22(1), 275\u2013291. https:\/\/doi.org\/10.1007\/s11948-015-9633-5.","journal-title":"Science and Engineering Ethics"},{"issue":"2","key":"9707_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1080\/24701475.2020.1731249","volume":"5","author":"E Beltramini","year":"2021","unstructured":"Beltramini, E. (2021). Against technocratic authoritarianism. A short intellectual history of the cypherpunk movement. Internet Histories, 5(2), 101\u2013118. https:\/\/doi.org\/10.1080\/24701475.2020.1731249.","journal-title":"Internet Histories"},{"key":"9707_CR12","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-662-49301-4_17","volume-title":"The New Codebreakers","author":"DJ Bernstein","year":"2016","unstructured":"Bernstein, D. J., Lange, T., & Niederhagen, R. (2016). Dual EC: A Standardized Back Door. In P. Y. A. Ryan, D. Naccache, & J.-J. Quisquater (Eds.), The New Codebreakers (pp. 256\u2013281). Springer. https:\/\/doi.org\/10.1007\/978-3-662-49301-4_17"},{"key":"9707_CR13","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/BFb0024447","volume-title":"Crytography and Coding","author":"S Blake-Wilson","year":"1997","unstructured":"Blake-Wilson, S., Johnson, D., & Menezes, A. (1997). Key agreement protocols and their security analysis. In M. Darnell (Ed.), Crytography and Coding (1355 vol., pp. 30\u201345). Berlin Heidelberg: Springer. https:\/\/doi.org\/10.1007\/BFb0024447."},{"key":"9707_CR14","unstructured":"Bloustein, E. J. (1964). Privacy as an aspect of human dignity: An answer to Dean Prosser. New York University Law Review, 39, 962\u20131007.\u00a0\u00a0https:\/\/heinonline.org\/HOL\/P?h=hein.journals\/nylr39&i=974"},{"issue":"11","key":"9707_CR15","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1016\/j.telpol.2005.06.010","volume":"29","author":"S Bronitt","year":"2005","unstructured":"Bronitt, S., & Stellios, J. (2005). Telecommunications interception in Australia: Recent trends and regulatory prospects. Telecommunications Policy, 29(11), 875\u2013888. https:\/\/doi.org\/10.1016\/j.telpol.2005.06.010.","journal-title":"Telecommunications Policy"},{"issue":"1","key":"9707_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10676-009-9181-2","volume":"11","author":"MP Butcher","year":"2009","unstructured":"Butcher, M. P. (2009). At the foundations of information justice. Ethics and Information Technology, 11(1), 57\u201369. https:\/\/doi.org\/10.1007\/s10676-009-9181-2.","journal-title":"Ethics and Information Technology"},{"key":"9707_CR17","unstructured":"Caproni, V. (2011). Statement Before the House Judiciary Committee, Subcommittee on Crime, Terrorism, and Homeland Security.\u00a0\u00a0https:\/\/archives.fbi.gov\/archives\/news\/testimony\/going-dark-lawful-electronic-surveillance-in-the-face-of-new-technologies."},{"key":"9707_CR18","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v12i8.1999","author":"RF Carey","year":"2007","unstructured":"Carey, R. F., & Burkell, J. (2007). Revisiting the Four Horsemen of the Infopocalypse: Representations of anonymity and the Internet in Canadian newspapers. First Monday. https:\/\/doi.org\/10.5210\/fm.v12i8.1999","journal-title":"First Monday"},{"issue":"3","key":"9707_CR19","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1080\/18335330.2018.1506149","volume":"13","author":"P Carroll","year":"2018","unstructured":"Carroll, P., & Windle, J. (2018). Cyber as an enabler of terrorism financing, now and in the future. Journal of Policing Intelligence and Counter Terrorism, 13(3), 285\u2013300. https:\/\/doi.org\/10.1080\/18335330.2018.1506149.","journal-title":"Journal of Policing Intelligence and Counter Terrorism"},{"issue":"10","key":"9707_CR20","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1030\u20131044. https:\/\/doi.org\/10.1145\/4372.4373.","journal-title":"Communications of the ACM"},{"key":"9707_CR21","unstructured":"CISA (2014). SSL 3.0 Protocol Vulnerability and POODLE Attack.\u00a0https:\/\/us-cert.cisa.gov\/ncas\/alerts\/TA14-290A."},{"key":"9707_CR22","volume-title":"Folk devils and moral panics","author":"S Cohen","year":"2002","unstructured":"Cohen, S. (2002). Folk devils and moral panics (3rd ed.). Routledge.","edition":"3"},{"issue":"8","key":"9707_CR23","doi-asserted-by":"publisher","first-page":"2691","DOI":"10.2307\/797231","volume":"106","author":"JP Collins","year":"1997","unstructured":"Collins, J. P. (1997). Speaking in Code. The Yale Law Journal, 106(8), 2691\u20132696. https:\/\/doi.org\/10.2307\/797231.","journal-title":"The Yale Law Journal"},{"key":"9707_CR24","unstructured":"Comey, J. B. (2014). Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?\u00a0https:\/\/www.fbi.gov\/news\/speeches\/going-dark-are-technology-privacy-and-public-safety-on-a-collision-course"},{"key":"9707_CR25","unstructured":"Communications Assistance for Law Enforcement Act 1994 (US)."},{"key":"9707_CR26","unstructured":"Compliance with Court Orders Bill 2016 (US)."},{"key":"9707_CR27","unstructured":"Comprehensive Counter-Terrorism Bill 1991 (US)."},{"key":"9707_CR28","unstructured":"Cunningham, E. M. (2018). Understanding rhetoric: A guide to critical reading and argumentation. BrownWalker Press."},{"issue":"2","key":"9707_CR29","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1111\/j.1467-8330.2012.01009.x","volume":"45","author":"G Curran","year":"2013","unstructured":"Curran, G., & Gibson, M. (2013). WikiLeaks, anarchism and technologies of dissent. Antipode, 45(2), 294\u2013314. https:\/\/doi.org\/10.1111\/j.1467-8330.2012.01009.x.","journal-title":"Antipode"},{"key":"9707_CR30","volume-title":"The design of Rijndael, AES - the advanced encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., & Rijmen, V. (2002). The design of Rijndael, AES - the advanced encryption Standard. Springer."},{"issue":"1","key":"9707_CR31","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1177\/0004865813497732","volume":"47","author":"YM Daly","year":"2014","unstructured":"Daly, Y. M. (2014). The right to silence: Inferences and interference. Australian & New Zealand Journal of Criminology, 47(1), 59\u201380. https:\/\/doi.org\/10.1177\/0004865813497732.","journal-title":"Australian & New Zealand Journal of Criminology"},{"issue":"2","key":"9707_CR32","doi-asserted-by":"publisher","first-page":"205395171667967","DOI":"10.1177\/2053951716679678","volume":"3","author":"L Dencik","year":"2016","unstructured":"Dencik, L., Hintz, A., & Cable, J. (2016). Towards data justice? The ambiguity of anti-surveillance resistance in political activism. Big Data & Society, 3(2), 2053951716679678. https:\/\/doi.org\/10.1177\/2053951716679678.","journal-title":"Big Data & Society"},{"key":"9707_CR33","unstructured":"Department of Justice (2021). FBI\u2019s encrypted phone platform infiltrated hundreds of criminal syndicates; result is massive worldwide takedown.\u00a0\u00a0https:\/\/www.justice.gov\/usao-sdca\/pr\/fbi-s-encrypted-phone-platform-infiltrated-hundreds-criminal-syndicates-result-massive."},{"issue":"6","key":"9707_CR34","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W Diffie","year":"1977","unstructured":"Diffie, W., & Hellman, M. E. (1977). Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption. Standard Computer, 10(6), 74\u201384. https:\/\/doi.org\/10.1109\/C-M.1977.217750","journal-title":"Standard Computer"},{"issue":"11","key":"9707_CR35","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1016\/j.drugpo.2015.01.008","volume":"26","author":"DS Dolliver","year":"2015","unstructured":"Dolliver, D. S. (2015). Evaluating drug trafficking on the Tor network: Silk Road 2, the sequel. International Journal of Drug Policy, 26(11), 1113\u20131123. https:\/\/doi.org\/10.1016\/j.drugpo.2015.01.008.","journal-title":"International Journal of Drug Policy"},{"key":"9707_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90443-6","volume-title":"History of cryptography and cryptanalysis: Codes, ciphers and their algorithms","author":"JF Dooley","year":"2018","unstructured":"Dooley, J. F. (2018). History of cryptography and cryptanalysis: Codes, ciphers and their algorithms. Springer."},{"key":"9707_CR37","first-page":"131","volume":"2","author":"NBM Dulay","year":"2019","unstructured":"Dulay, N. B. M. (2019). The right to speak in code: A balancing of State Interest and the right to encrypted Speech. University of Asia and the Pacific Law Journal, 2, 131\u2013164.","journal-title":"University of Asia and the Pacific Law Journal"},{"key":"9707_CR38","unstructured":"Electronic Frontier Foundation (1998). About the Electronic frontier foundation\u2019s \u2018DES Cracker\u2019 Machine.\u00a0\u00a0https:\/\/web.archive.org\/web\/20170507231657\/https:\/\/w2.eff.org\/Privacy\/Crypto\/Crypto_misc\/DESCracker\/HTML\/19980716_eff_des_faq.html"},{"key":"9707_CR39","unstructured":"Electronic Frontier Foundation (2021). On Global Encryption Day, Let\u2019s Stand Up for Privacy and Security. https:\/\/www.eff.org\/deeplinks\/2021\/10\/global-encryption-day-lets-stand-privacy-and-security"},{"key":"9707_CR40","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-319-45982-0_22","volume-title":"Internet Science","author":"K Ermoshina","year":"2016","unstructured":"Ermoshina, K., Musiani, F., & Halpin, H. (2016). End-to-End Encrypted Messaging Protocols: An Overview. 9934 Vol. In F. Bagnoli, A. Satsiou, I. Stavrakakis, P. Nesi, G. Pacini, Y. Welp, T. Tiropanis, & D. DiFranzo (Eds.), Internet Science (pp. 244\u2013254). Cham: Springer. https:\/\/doi.org\/10.1007\/978-3-319-45982-0_22"},{"key":"9707_CR41","unstructured":"Express VPN. (2021). The VPN that just works. https:\/\/www.expressvpn.com\/"},{"key":"9707_CR42","volume-title":"Cryptography engineering: Design principles and practical applications","author":"N Ferguson","year":"2010","unstructured":"Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography engineering: Design principles and practical applications. Indianapolis, IN: Wiley."},{"key":"9707_CR43","unstructured":"Five Country Ministerial Communique (2018). Security coordination: Five country ministerial 2018.\u00a0\u00a0https:\/\/www.homeaffairs.gov.au\/about-us\/our-portfolios\/national-security\/security-coordination\/five-country-ministerial-2018"},{"key":"9707_CR44","doi-asserted-by":"publisher","first-page":"102382","DOI":"10.1016\/j.cose.2021.102382","volume":"109","author":"P Formosa","year":"2021","unstructured":"Formosa, P., Wilson, M., & Richards, D. (2021). A principlist framework for cybersecurity ethics. Computers & Security, 109, 102382. https:\/\/doi.org\/10.1016\/j.cose.2021.102382.","journal-title":"Computers & Security"},{"issue":"4","key":"9707_CR45","first-page":"621","volume":"72","author":"D Gray","year":"2019","unstructured":"Gray, D. (2019). A right to Go Dark. SMU Law Review, 72(4), 621\u2013668.","journal-title":"SMU Law Review"},{"issue":"6","key":"9707_CR46","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1016\/j.chb.2013.07.031","volume":"29","author":"C Guitton","year":"2013","unstructured":"Guitton, C. (2013). A review of the available content on Tor hidden services: The case against further development. Computers in Human Behavior, 29(6), 2805\u20132815. https:\/\/doi.org\/10.1016\/j.chb.2013.07.031.","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"9707_CR47","doi-asserted-by":"publisher","first-page":"45","DOI":"10.5958\/2321-581X.2020.00008.2","volume":"11","author":"A Guru","year":"2020","unstructured":"Guru, A., & Ambhikar, A. (2020). A study of Cryptography to protect data from cyber-crimes. Research Journal of Engineering and Technology, 11(2), 45\u201348. https:\/\/doi.org\/10.5958\/2321-581X.2020.00008.2.","journal-title":"Research Journal of Engineering and Technology"},{"key":"9707_CR48","unstructured":"Hartel, P., & van Wegberg, R. (2021). Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases. ArXiv:2104.06444 [Cs]. http:\/\/arxiv.org\/abs\/2104.06444."},{"issue":"7","key":"9707_CR49","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1080\/1369118X.2019.1599039","volume":"22","author":"R Heeks","year":"2019","unstructured":"Heeks, R., & Shekhar, S. (2019). Datafication, development and marginalised urban communities: An applied data justice framework. Information Communication & Society, 22(7), 992\u20131011. https:\/\/doi.org\/10.1080\/1369118X.2019.1599039.","journal-title":"Information Communication & Society"},{"key":"9707_CR50","unstructured":"Hern, A. (2023). WhatsApp and Signal unite against online safety bill amid privacy concerns. The Guardian.\u00a0\u00a0https:\/\/www.theguardian.com\/technology\/2023\/apr\/18\/whatsapp-signal-unite-against-online-safety-bill-privacy-messaging-apps-safety-security-uk."},{"issue":"12","key":"9707_CR51","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1353-4858(10)70006-4","volume":"2009","author":"S Heron","year":"2009","unstructured":"Heron, S. (2009). Advanced Encryption Standard (AES). Network Security, 2009(12), 8\u201312. https:\/\/doi.org\/10.1016\/S1353-4858(10)70006-4","journal-title":"Network Security"},{"key":"9707_CR52","doi-asserted-by":"publisher","first-page":"105526","DOI":"10.1016\/j.clsr.2020.105526","volume":"40","author":"EC Hewson","year":"2021","unstructured":"Hewson, E. C., & Harrison, P. S. (2021). Talking in the dark: Rules to facilitate open debate about lawful access to strongly encrypted information. Computer Law & Security Review, 40, 105526. https:\/\/doi.org\/10.1016\/j.clsr.2020.105526.","journal-title":"Computer Law & Security Review"},{"key":"9707_CR53","doi-asserted-by":"crossref","unstructured":"Hochstrasser, D. (2021). Encryption and the Privilege Against Self-Incrimination: What Happens When a Suspect Refuses to Divulge a Password (SSRN Scholarly Paper ID 3921454). Social Science Research Network. https:\/\/papers.ssrn.com\/abstract=3921454.","DOI":"10.53637\/OLRX1009"},{"issue":"2","key":"9707_CR54","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1108\/JFC-09-2013-0055","volume":"22","author":"RE Holtfreter","year":"2015","unstructured":"Holtfreter, R. E., & Harrington, A. (2015). Data breach trends in the United States. Journal of Financial Crime, 22(2), 242\u2013260. https:\/\/doi.org\/10.1108\/JFC-09-2013-0055.","journal-title":"Journal of Financial Crime"},{"issue":"3","key":"9707_CR55","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1093\/bjc\/azu106","volume":"55","author":"A Hutchings","year":"2015","unstructured":"Hutchings, A., & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596\u2013614. https:\/\/doi.org\/10.1093\/bjc\/azu106. Table\u00a01.","journal-title":"British Journal of Criminology"},{"key":"9707_CR56","unstructured":"Investigatory Powers Act 2016 (UK)."},{"issue":"2","key":"9707_CR57","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1080\/23251042.2019.1624246","volume":"5","author":"K Jalbert","year":"2019","unstructured":"Jalbert, K., Shields, D., Kelso, M., & Rubright, S. (2019). The power to plan: Mineral rights leasing, data justice, and proactive zoning in Allegheny County, Pennsylvania. Environmental Sociology, 5(2), 164\u2013176. https:\/\/doi.org\/10.1080\/23251042.2019.1624246.","journal-title":"Environmental Sociology"},{"issue":"2","key":"9707_CR58","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1177\/1461444816639976","volume":"20","author":"E Jardine","year":"2018","unstructured":"Jardine, E. (2018). Tor, what is it good for? Political repression and the use of online anonymity granting technologies. New Media & Society, 20(2), 435\u2013452. https:\/\/doi.org\/10.1177\/1461444816639976.","journal-title":"New Media & Society"},{"key":"9707_CR59","doi-asserted-by":"publisher","DOI":"10.1007\/s12103-021-09656-3","author":"E Jardine","year":"2021","unstructured":"Jardine, E. (2021). Policing the cybercrime script of darknet drug markets: Methods of effective law enforcement intervention. American Journal of Criminal Justice. https:\/\/doi.org\/10.1007\/s12103-021-09656-3.","journal-title":"American Journal of Criminal Justice"},{"key":"9707_CR60","doi-asserted-by":"publisher","DOI":"10.1201\/9781003123675","volume-title":"Crypto Wars: The fight for privacy in the Digital Age: A political history of digital encryption","author":"C Jarvis","year":"2020","unstructured":"Jarvis, C. (2020). Crypto Wars: The fight for privacy in the Digital Age: A political history of digital encryption. CRC Press."},{"key":"9707_CR61","doi-asserted-by":"publisher","DOI":"10.1080\/24701475.2021.1935547","author":"C Jarvis","year":"2021","unstructured":"Jarvis, C. (2021). Cypherpunk ideology: Objectives, profiles, and influences (1992\u20131998). Internet Histories. https:\/\/doi.org\/10.1080\/24701475.2021.1935547","journal-title":"Internet Histories"},{"key":"9707_CR62","doi-asserted-by":"publisher","unstructured":"Jayasinghe, D., Ragel, R., Ambrose, J. A., Ignjatovic, A., & Parameswaran, S. (2014). Advanced modes in AES: Are they safe from power analysis based side channel attacks? 2014 IEEE 32nd International Conference on Computer Design (ICCD)\u00a0(pp. 173\u2013180). https:\/\/doi.org\/10.1109\/ICCD.2014.6974678.","DOI":"10.1109\/ICCD.2014.6974678"},{"issue":"4","key":"9707_CR63","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s10676-014-9351-8","volume":"16","author":"JA Johnson","year":"2014","unstructured":"Johnson, J. A. (2014). From open data to information justice. Ethics and Information Technology, 16(4), 263\u2013274. https:\/\/doi.org\/10.1007\/s10676-014-9351-8.","journal-title":"Ethics and Information Technology"},{"key":"9707_CR64","doi-asserted-by":"crossref","unstructured":"Jordan, T. (2015). Information politics: Liberation and exploitation in the digital society. Pluto Press.","DOI":"10.2307\/j.ctt183p2xf"},{"key":"9707_CR65","volume-title":"The codebreakers: The comprehensive history of secret communication from ancient times to the internet","author":"D Kahn","year":"1996","unstructured":"Kahn, D. (1996). The codebreakers: The comprehensive history of secret communication from ancient times to the internet (2nd ed.). Scribner.","edition":"2"},{"issue":"4","key":"9707_CR66","first-page":"767","volume":"97","author":"OS Kerr","year":"2019","unstructured":"Kerr, O. S. (2019). Compelled decryption and the privilege against self-incrimination essays. Texas Law Review, 97(4), 767\u2013800.","journal-title":"Texas Law Review"},{"issue":"4","key":"9707_CR67","first-page":"989","volume":"106","author":"OS Kerr","year":"2017","unstructured":"Kerr, O. S., & Schneier, B. (2017). Encryption Workarounds. Georgetown Law Journal, 106(4), 989\u20131020.","journal-title":"Georgetown Law Journal"},{"issue":"3","key":"9707_CR68","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1080\/13569317.2019.1633100","volume":"24","author":"R Kinna","year":"2019","unstructured":"Kinna, R., & Prichard, A. (2019). Anarchism and non-domination. Journal of Political Ideologies, 24(3), 221\u2013240. https:\/\/doi.org\/10.1080\/13569317.2019.1633100.","journal-title":"Journal of Political Ideologies"},{"issue":"4","key":"9707_CR69","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1016\/j.clsr.2018.06.003","volume":"34","author":"BJ Koops","year":"2018","unstructured":"Koops, B. J., & Kosta, E. (2018). Looking for some light through the lens of \u201ccryptowar\u201d history: Policy options for law enforcement authorities against \u201cgoing dark. Computer Law & Security Review, 34(4), 890\u2013900. https:\/\/doi.org\/10.1016\/j.clsr.2018.06.003.","journal-title":"Computer Law & Security Review"},{"key":"9707_CR70","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.drugpo.2019.03.011","volume":"73","author":"M Kowalski","year":"2019","unstructured":"Kowalski, M., Hooker, C., & Barratt, M. J. (2019). Should we smoke it for you as well? An ethnographic analysis of a drug cryptomarket environment. International Journal of Drug Policy, 73, 245\u2013254. https:\/\/doi.org\/10.1016\/j.drugpo.2019.03.011.","journal-title":"International Journal of Drug Policy"},{"key":"9707_CR71","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.jisa.2014.09.005","volume":"22","author":"K Krombholz","year":"2015","unstructured":"Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113\u2013122. https:\/\/doi.org\/10.1016\/j.jisa.2014.09.005.","journal-title":"Journal of Information Security and Applications"},{"key":"9707_CR72","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/11593447_30","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2005","author":"C Kudla","year":"2005","unstructured":"Kudla, C., & Paterson, K. G. (2005). Modular security proofs for key agreement protocols. In B. Roy (Ed.), Advances in Cryptology\u2014ASIACRYPT 2005 (3788 vol., pp. 549\u2013565). Berlin Heidelberg: Springer. https:\/\/doi.org\/10.1007\/11593447_30."},{"issue":"1\u20132","key":"9707_CR73","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/00028533.2017.1420545","volume":"54","author":"I Lauer","year":"2018","unstructured":"Lauer, I., & Lauer, T. (2018). Undoing encryption: The argumentative function of metonyms. Argumentation and Advocacy, 54(1\u20132), 53\u201371. https:\/\/doi.org\/10.1080\/00028533.2017.1420545.","journal-title":"Argumentation and Advocacy"},{"key":"9707_CR74","unstructured":"Lawful Access to Encrypted Data Bill 2020 (US)."},{"issue":"6","key":"9707_CR75","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MSP.2009.165","volume":"7","author":"N Lawson","year":"2009","unstructured":"Lawson, N. (2009). Side-Channel attacks on Cryptographic Software. IEEE Security Privacy, 7(6), 65\u201368. https:\/\/doi.org\/10.1109\/MSP.2009.165.","journal-title":"IEEE Security Privacy"},{"key":"9707_CR76","volume-title":"Crypto: How the code rebels beat the government\u2014Saving privacy in the digital age","author":"S Levy","year":"2001","unstructured":"Levy, S. (2001). Crypto: How the code rebels beat the government\u2014Saving privacy in the digital age. Penguin."},{"issue":"12","key":"9707_CR77","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1016\/j.comcom.2013.04.009","volume":"36","author":"B Li","year":"2013","unstructured":"Li, B., Erdin, E., Gunes, M. H., Bebis, G., & Shipley, T. (2013). An overview of anonymity technology usage. Computer Communications, 36(12), 1269\u20131283. https:\/\/doi.org\/10.1016\/j.comcom.2013.04.009.","journal-title":"Computer Communications"},{"key":"9707_CR78","volume-title":"The Information Society: Issues and illusions","author":"D Lyon","year":"2013","unstructured":"Lyon, D. (2013). The Information Society: Issues and illusions. Wiley."},{"key":"9707_CR79","volume-title":"The ethics of surveillance: An introduction","author":"K Macnish","year":"2018","unstructured":"Macnish, K. (2018). The ethics of surveillance: An introduction. Routledge."},{"key":"9707_CR80","doi-asserted-by":"publisher","DOI":"10.1525\/gp.2020.12991","author":"M Mann","year":"2020","unstructured":"Mann, M. (2020). Technological Politics of Automated Welfare Surveillance: Social (and data) justice through critical qualitative Inquiry. Global Perspectives. https:\/\/doi.org\/10.1525\/gp.2020.12991","journal-title":"Global Perspectives"},{"issue":"4","key":"9707_CR81","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1177\/1748048518757141","volume":"80","author":"M Mann","year":"2018","unstructured":"Mann, M., Daly, A., Wilson, M., & Suzor, N. (2018). The limits of (digital) constitutionalism: Exploring the privacy-security (im)balance in Australia. International Communication Gazette, 80(4), 369\u2013384. https:\/\/doi.org\/10.1177\/1748048518757141.","journal-title":"International Communication Gazette"},{"issue":"1","key":"9707_CR82","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1080\/09627251.2014.984541","volume":"98","author":"MH Maras","year":"2014","unstructured":"Maras, M. H. (2014). Inside darknet: The takedown of Silk Road. Criminal Justice Matters, 98(1), 22\u201323. https:\/\/doi.org\/10.1080\/09627251.2014.984541.","journal-title":"Criminal Justice Matters"},{"key":"9707_CR83","doi-asserted-by":"crossref","unstructured":"Marthews, A., & Tucker, C. (2015). Government surveillance and internet search behavior.\u00a0\u00a0http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2412564\u00a0","DOI":"10.2139\/ssrn.2412564"},{"issue":"3","key":"9707_CR84","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1177\/1748895813505234","volume":"14","author":"J Martin","year":"2014","unstructured":"Martin, J. (2014). Lost on the Silk Road: Online drug distribution and the cryptomarket. Criminology & Criminal Justice, 14(3), 351\u2013367. https:\/\/doi.org\/10.1177\/1748895813505234.","journal-title":"Criminology & Criminal Justice"},{"key":"9707_CR85","volume-title":"Cryptography: The key to digital security, how it works, and why it matters","author":"K Martin","year":"2020","unstructured":"Martin, K. (2020). Cryptography: The key to digital security, how it works, and why it matters. W.W. Norton & Company."},{"issue":"3","key":"9707_CR86","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1215\/08992363-2010-004","volume":"22","author":"J Masco","year":"2010","unstructured":"Masco, J. (2010). Sensitive but Unclassified\u201d: Secrecy and the Counterterrorist State. Public Culture, 22(3), 433\u2013463. https:\/\/doi.org\/10.1215\/08992363-2010-004.","journal-title":"Public Culture"},{"issue":"4","key":"9707_CR87","first-page":"501","volume":"43","author":"JE McAdow","year":"1966","unstructured":"McAdow, J. E. (1966). Self-Incrimination: Testimonial vs. non-testimonial evidence. Denver Law Journal, 43(4), 501\u2013510.","journal-title":"Denver Law Journal"},{"key":"9707_CR88","unstructured":"Menn, J. (2013). Exclusive: Secret contract tied NSA and security industry pioneer.\u00a0\u00a0https:\/\/www.reuters.com\/article\/us-usa-security-rsa-idUSBRE9BJ1C220131220"},{"key":"9707_CR89","unstructured":"Meta (2023). About.\u00a0\u00a0https:\/\/www.whatsapp.com\/about."},{"issue":"1","key":"9707_CR90","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1177\/0162243919900965","volume":"46","author":"B Miller","year":"2021","unstructured":"Miller, B. (2021). Is Technology Value-Neutral? Science Technology & Human Values, 46(1), 53\u201380. https:\/\/doi.org\/10.1177\/0162243919900965.","journal-title":"Science Technology & Human Values"},{"issue":"1","key":"9707_CR91","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1080\/00396338.2016.1142085","volume":"58","author":"D Moore","year":"2016","unstructured":"Moore, D., & Rid, T. (2016). Cryptopolitik and the Darknet. Survival, 58(1), 7\u201338. https:\/\/doi.org\/10.1080\/00396338.2016.1142085.","journal-title":"Survival"},{"issue":"2","key":"9707_CR92","first-page":"481","volume":"10","author":"BC Newell","year":"2014","unstructured":"Newell, B. C. (2014). The massive metadata machine: Liberty, power, and secret mass surveillance in the U.S. and Europe. Journal of Law and Policy for the Information Society, 10(2), 481\u2013522.","journal-title":"Journal of Law and Policy for the Information Society"},{"key":"9707_CR93","volume-title":"Anarchy, state, and utopia","author":"R Nozick","year":"1974","unstructured":"Nozick, R. (1974). Anarchy, state, and utopia. Basic Books."},{"issue":"3","key":"9707_CR94","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1080\/13600834.2014.970376","volume":"23","author":"M O\u2019Brien","year":"2014","unstructured":"O\u2019Brien, M. (2014). The internet, child pornography and cloud computing: The dark side of the web? Information & Communications Technology Law, 23(3), 238\u2013255. https:\/\/doi.org\/10.1080\/13600834.2014.970376.","journal-title":"Information & Communications Technology Law"},{"key":"9707_CR95","unstructured":"Office of Public Affairs (2020). Virtual Five Country Ministerial Meeting\u2014Joint Communiqu\u00e9.\u00a0\u00a0https:\/\/www.justice.gov\/opa\/pr\/virtual-five-country-ministerial-meeting-joint-communiqu."},{"issue":"2","key":"9707_CR96","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1017\/cls.2022.9","volume":"37","author":"M Ogasawara","year":"2022","unstructured":"Ogasawara, M. (2022). Legalizing illegal mass surveillance: A transnational perspective on Canada\u2019s legislative response to the expansion of security intelligence. Canadian Journal of Law and Society \/ Revue Canadienne Droit et Soci\u00e9t\u00e9, 37(2), 317\u2013338. https:\/\/doi.org\/10.1017\/cls.2022.9.","journal-title":"Canadian Journal of Law and Society \/ Revue Canadienne Droit et Soci\u00e9t\u00e9"},{"issue":"4","key":"9707_CR97","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1207\/S15326926CLP0804_03","volume":"8","author":"V Pednekar-Magal","year":"2003","unstructured":"Pednekar-Magal, V., & Shields, P. (2003). The State and Telecom Surveillance Policy: The Clipper Chip Initiative. Communication Law and Policy, 8(4), 429\u2013464. https:\/\/doi.org\/10.1207\/S15326926CLP0804_03.","journal-title":"Communication Law and Policy"},{"issue":"1","key":"9707_CR98","doi-asserted-by":"publisher","first-page":"117","DOI":"10.15779\/Z38SS13","volume":"31","author":"JW Penney","year":"2015","unstructured":"Penney, J. W. (2015). Chilling effects: Online surveillance and Wikipedia use. Berkeley Technology Law Journal, 31(1), 117\u2013161. https:\/\/doi.org\/10.15779\/Z38SS13.","journal-title":"Berkeley Technology Law Journal"},{"issue":"3","key":"9707_CR99","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1177\/1461444813504276","volume":"17","author":"J Petersen","year":"2015","unstructured":"Petersen, J. (2015). Is code speech? Law and the expressivity of machine language. New Media & Society, 17(3), 415\u2013431. https:\/\/doi.org\/10.1177\/1461444813504276.","journal-title":"New Media & Society"},{"issue":"4","key":"9707_CR100","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1086\/660694","volume":"121","author":"P Pettit","year":"2011","unstructured":"Pettit, P. (2011). The instability of freedom as non-interference: The case of Isaiah Berlin. Ethics, 121(4), 693\u2013716.","journal-title":"Ethics"},{"issue":"4","key":"9707_CR101","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.diin.2014.08.001","volume":"11","author":"A Phelps","year":"2014","unstructured":"Phelps, A., & Watt, A. (2014). I shop online \u2013 recreationally! Internet anonymity and Silk Road enabling drug use in Australia. Digital Investigation, 11(4), 261\u2013272. https:\/\/doi.org\/10.1016\/j.diin.2014.08.001.","journal-title":"Digital Investigation"},{"key":"9707_CR102","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-94-007-7914-3_6","volume-title":"The Moral Status of Technical Artefacts","author":"JC Pitt","year":"2014","unstructured":"Pitt, J. C. (2014). \u201cGuns Don\u2019t Kill, People Kill\u201d; Values in and\/or Around Technologies. In P. Kroes & P.-P. Verbeek (Eds.), The Moral Status of Technical Artefacts (pp. 89\u2013101). Springer. https:\/\/doi.org\/10.1007\/978-94-007-7914-3_6"},{"key":"9707_CR103","volume-title":"The morality of Freedom","author":"J Raz","year":"1986","unstructured":"Raz, J. (1986). The morality of Freedom. Clarendon."},{"key":"9707_CR104","unstructured":"Rodenstein, R. (2017). Deputy Attorney General Rod J. Rosenstein Delivers Remarks on Encryption at the United States Naval Academy.\u00a0\u00a0https:\/\/www.justice.gov\/opa\/speech\/deputy-attorney-general-rod-j-rosenstein-delivers-remarks-encryption-united-states-naval"},{"key":"9707_CR105","unstructured":"Rogaway, P. (2015). The Moral Character of Cryptographic Work.\u00a0\u00a0https:\/\/web.cs.ucdavis.edu\/~rogaway\/papers\/moral-fn.pdf"},{"issue":"5","key":"9707_CR106","first-page":"1181","volume":"9","author":"AZ Rozenshtein","year":"2018","unstructured":"Rozenshtein, A. Z. (2018). Wicked Crypto Women, Law, Society, & Technology Symposium. UC Irvine Law Review, 9(5), 1181\u20131216.","journal-title":"UC Irvine Law Review"},{"issue":"3","key":"9707_CR107","first-page":"1165","volume":"4","author":"JM Ryan","year":"1996","unstructured":"Ryan, J. M. (1996). Freedom to speak unintelligibly: The First Amendment Implications of Government-Controlled encryption. William & Mary Bill of Rights Journal, 4(3), 1165\u20131222.","journal-title":"William & Mary Bill of Rights Journal"},{"key":"9707_CR108","volume-title":"Handbook of internet crime","author":"B Sandywell","year":"2011","unstructured":"Sandywell, B. (2011). On the globalisation of crime: The internet and new criminality. In Y. Jewkes & M. Yar (Eds.), Handbook of internet crime. Willan Publishing."},{"issue":"1","key":"9707_CR109","first-page":"263","volume":"21","author":"K Scheurer","year":"1995","unstructured":"Scheurer, K. (1995). The Clipper Chip: Cryptography Technology and the Constitution - the Government\u2019s answer to Encription chips away at constitutional rights note. Rutgers Computer & Technology Law Journal, 21(1), 263\u2013292.","journal-title":"Rutgers Computer & Technology Law Journal"},{"key":"9707_CR110","unstructured":"Schneier, B. (2019). Scaring people into supporting backdoors.\u00a0\u00a0https:\/\/www.schneier.com\/blog\/archives\/2019\/12\/scaring_people_.html"},{"key":"9707_CR111","doi-asserted-by":"publisher","unstructured":"\u0160epec, M. (2020). Revenge pornography or non-consensual dissemination of sexually explicit material as a sexual offence or as a privacy violation offence. https:\/\/doi.org\/10.5281\/ZENODO.3707562.","DOI":"10.5281\/ZENODO.3707562"},{"issue":"1","key":"9707_CR112","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/17405900802559977","volume":"6","author":"MA Simone","year":"2009","unstructured":"Simone, M. A. (2009). Give me liberty and give me surveillance: A case study of the US government\u2019s discourse of surveillance. Critical Discourse Studies, 6(1), 1\u201314. https:\/\/doi.org\/10.1080\/17405900802559977","journal-title":"Critical Discourse Studies"},{"key":"9707_CR113","volume-title":"The code book: The science of secrecy from ancient Egypt to quantum crypgtography","author":"S Singh","year":"1999","unstructured":"Singh, S. (1999). The code book: The science of secrecy from ancient Egypt to quantum crypgtography. Anchor Books."},{"issue":"4","key":"9707_CR114","first-page":"2001","volume":"49","author":"N Soares","year":"2012","unstructured":"Soares, N. (2012). The right to remain encrypted: The self-incrimination doctrine in the Digital Age note. American Criminal Law Review, 49(4), 2001\u20132020.","journal-title":"American Criminal Law Review"},{"issue":"6","key":"9707_CR115","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1177\/1461444820902682","volume":"23","author":"M Sourbati","year":"2021","unstructured":"Sourbati, M., & Behrendt, F. (2021). Smart mobility, age and data justice. New Media & Society, 23(6), 1398\u20131414. https:\/\/doi.org\/10.1177\/1461444820902682.","journal-title":"New Media & Society"},{"key":"9707_CR116","doi-asserted-by":"publisher","unstructured":"Spitters, M., Verbruggen, S., & Van Staalduinen, M. (2014). Towards a Comprehensive Insight into the Thematic Organization of the Tor Hidden Services. 2014 IEEE Joint Intelligence and Security Informatics Conference (pp.\u00a0220\u2013223). https:\/\/doi.org\/10.1109\/JISIC.2014.40.","DOI":"10.1109\/JISIC.2014.40"},{"key":"9707_CR117","volume-title":"Cryptography and network security: Principles and practices","author":"W Stallings","year":"2017","unstructured":"Stallings, W. (2017). Cryptography and network security: Principles and practices (7th ed.). Pearson Education.","edition":"7"},{"key":"9707_CR118","doi-asserted-by":"crossref","unstructured":"Standaert, F. X. (2010). Introduction to Side-Channel Attacks.\u00a0\u00a0https:\/\/perso.uclouvain.be\/fstandae\/PUBLIS\/42.pdf.","DOI":"10.1007\/978-0-387-71829-3_2"},{"issue":"3","key":"9707_CR119","first-page":"29","volume":"41","author":"KF Steinmetz","year":"2015","unstructured":"Steinmetz, K. F., & Gerber, J. (2015). It doesn\u2019t have to be this way: Hacker perspectives on privacy. Social Justice, 41(3), 29\u201351.","journal-title":"Social Justice"},{"key":"9707_CR120","doi-asserted-by":"publisher","DOI":"10.14763\/2017.1.454","author":"N Suzor","year":"2017","unstructured":"Suzor, N., Pappalardo, K., & McIntosh, N. (2017). The passage of Australia\u2019s data retention regime: National security, human rights, and media scrutiny. Internet Policy Review. https:\/\/doi.org\/10.14763\/2017.1.454","journal-title":"Internet Policy Review"},{"key":"9707_CR121","unstructured":"Swire, P., & Ahmad, K. (2012). \u2018Going Dark\u2019 Versus a \u2018Golden Age for Surveillance.\u2019 Centre for Democracy and Technology.\u00a0\u00a0https:\/\/cdt.org\/insights\/%E2%80%98going-dark%E2%80%99-versus-a-%E2%80%98golden-age-for-surveillance%E2%80%99\/"},{"key":"9707_CR122","doi-asserted-by":"publisher","DOI":"10.11157\/medianz-vol14iss2id97","author":"S Taffel","year":"2015","unstructured":"Taffel, S. (2015). We have never been Open: Activism and cryptography in Surveillance Societies. MEDIANZ: Media Studies Journal of Aotearoa New Zealand. https:\/\/doi.org\/10.11157\/medianz-vol14iss2id97","journal-title":"MEDIANZ: Media Studies Journal of Aotearoa New Zealand"},{"issue":"2","key":"9707_CR123","doi-asserted-by":"publisher","first-page":"205395171773633","DOI":"10.1177\/2053951717736335","volume":"4","author":"L Taylor","year":"2017","unstructured":"Taylor, L. (2017). What is data justice? The case for connecting digital rights and freedoms globally. Big Data & Society, 4(2), 2053951717736335. https:\/\/doi.org\/10.1177\/2053951717736335","journal-title":"Big Data & Society"},{"key":"9707_CR124","unstructured":"Telecommunications Act 1997 (Austl)"},{"key":"9707_CR125","unstructured":"Telecommunications (interception and security) Act 2013 (NZ)."},{"key":"9707_CR126","unstructured":"Telegram (2021). Telegram: A new era of messaging.\u00a0\u00a0https:\/\/telegram.org\/"},{"key":"9707_CR127","unstructured":"Tor Project (2021). About: History.\u00a0\u00a0https:\/\/www.torproject.org\/about\/history\/"},{"issue":"6","key":"9707_CR128","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MIC.2014.126","volume":"18","author":"S Turner","year":"2014","unstructured":"Turner, S. (2014). Transport Layer Security. IEEE Internet Computing, 18(6), 60\u201363. https:\/\/doi.org\/10.1109\/MIC.2014.126.","journal-title":"IEEE Internet Computing"},{"issue":"8","key":"9707_CR129","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1177\/1079063220981063","volume":"33","author":"M van der Bruggen","year":"2021","unstructured":"van der Bruggen, M., & Blokland, A. (2021). A crime script analysis of child sexual Exploitation Material Fora on the Darkweb. Sexual Abuse, 33(8), 950\u2013974. https:\/\/doi.org\/10.1177\/1079063220981063.","journal-title":"Sexual Abuse"},{"issue":"Annual Review I","key":"9707_CR130","first-page":"531","volume":"32","author":"DT Vandenberg","year":"2017","unstructured":"Vandenberg, D. T. (2017). Encryption served three ways: Disruptiveness as the key to exceptional access privacy\/cyber security. Berkeley Technology Law Journal, 32(Annual Review Issue), 531\u2013562.","journal-title":"Berkeley Technology Law Journal"},{"key":"9707_CR131","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R von Solms","year":"2013","unstructured":"von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97\u2013102. https:\/\/doi.org\/10.1016\/j.cose.2013.04.004.","journal-title":"Computers & Security"},{"issue":"4","key":"9707_CR132","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1016\/j.clsr.2018.05.013","volume":"34","author":"I Walden","year":"2018","unstructured":"Walden, I. (2018). The Sky is falling!\u2019 \u2013 responses to the \u2018Going dark\u2019 problem. Computer Law & Security Review, 34(4), 901\u2013907. https:\/\/doi.org\/10.1016\/j.clsr.2018.05.013.","journal-title":"Computer Law & Security Review"},{"issue":"3","key":"9707_CR133","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1086\/293094","volume":"99","author":"J Waldron","year":"1989","unstructured":"Waldron, J. (1989). Rights in conflict. Ethics, 99(3), 503\u2013519.","journal-title":"Ethics"},{"issue":"2","key":"9707_CR134","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1111\/1467-9760.00174","volume":"11","author":"J Waldron","year":"2003","unstructured":"Waldron, J. (2003). Security and Liberty: The image of balance. Journal of Political Philosophy, 11(2), 191\u2013210. https:\/\/doi.org\/10.1111\/1467-9760.00174","journal-title":"Journal of Political Philosophy"},{"key":"9707_CR135","doi-asserted-by":"crossref","unstructured":"Warren, S. D., & Brandeis, L. (1890). The right to privacy. The Harvard Law Review, 4\/5, 193\u2013220. Retrieved from https:\/\/www.cs.cornell.edu\/~shmat\/courses\/cs5436\/warren-brandeis.pdf","DOI":"10.2307\/1321160"},{"issue":"3","key":"9707_CR136","first-page":"967","volume":"122","author":"M Weidman","year":"2017","unstructured":"Weidman, M. (2017). Jurisdiction, the internet, and the good faith exception: Controversy over the Government\u2019s Use of Network Investigative Techniques comments. Dickinson Law Review, 122(3), 967\u2013996.","journal-title":"Dickinson Law Review"},{"issue":"3","key":"9707_CR137","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1080\/1057610X.2015.1119546","volume":"39","author":"G Weimann","year":"2016","unstructured":"Weimann, G. (2016). Going Dark: Terrorism on the Dark web. Studies in Conflict & Terrorism, 39(3), 195\u2013206. https:\/\/doi.org\/10.1080\/1057610X.2015.1119546.","journal-title":"Studies in Conflict & Terrorism"},{"key":"9707_CR138","unstructured":"White House.\u00a0(1994). Statement of the Press Secretary. Retrieved November 19, 2021 from https:\/\/archive.epic.org\/crypto\/clipper\/white_house_statement_2_94.html."},{"key":"9707_CR139","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.2307\/4135723","volume":"113","author":"JQ Whitman","year":"2004","unstructured":"Whitman, J. Q. (2004). The two Western cultures of privacy: Dignity versus liberty. Yale Law Journal, 113, 1151\u20131221.","journal-title":"Yale Law Journal"},{"key":"9707_CR140","unstructured":"Wray, C. (2017). The FBI and the IACP: Bound Together by Partnership, Friendship, and Commitment.\u00a0\u00a0https:\/\/www.fbi.gov\/news\/speeches\/the-fbi-and-the-iacp-bound-together-by-partnership-friendship-and-commitment"},{"issue":"1","key":"9707_CR141","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/2542503","volume":"57","author":"CS Yoo","year":"2014","unstructured":"Yoo, C. S. (2014). Toward a closer integration of law and computer science. Communications of the ACM, 57(1), 33\u201335. https:\/\/doi.org\/10.1145\/2542503.","journal-title":"Communications of the ACM"},{"issue":"2","key":"9707_CR142","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1177\/1362480607075851","volume":"11","author":"L Zedner","year":"2007","unstructured":"Zedner, L. (2007). Pre-crime and post-criminology? Theoretical Criminology, 11(2), 261\u2013281. https:\/\/doi.org\/10.1177\/1362480607075851.","journal-title":"Theoretical Criminology"},{"key":"9707_CR143","volume-title":"PGP Source Code and Internals","author":"P Zimmerman","year":"1994","unstructured":"Zimmerman, P. (1994). PGP Source Code and Internals. MIT Press."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-023-09707-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-023-09707-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-023-09707-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T03:35:34Z","timestamp":1695180934000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-023-09707-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,5]]},"references-count":143,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["9707"],"URL":"https:\/\/doi.org\/10.1007\/s10676-023-09707-9","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,5]]},"assertion":[{"value":"5 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"36"}}