HEMLIG DATAAVLÄSNING Möjligheter och begränsningar för Polismyndigheten

Detta är en Kandidat-uppsats från Institutionen för tillämpad informationsteknologi

Sammanfattning: Government hacking is increasing across the world and in Sweden, on April 1, 2020, the “Act on Secret Data Interception” was introduced. The law has given law enforcement agencies such as the Police Authority access to use tools to read data before it is encrypted by secretly installing software or hardware in, for example, a computer, mobile phone or tablet. Secret data reading can be applied when the sentence exceeds prison for two years and only when other secret coercive measures have been shown to be ineffective. The purpose of the study is to investigate the possibilities and limitations that arise when using secret data reading within the police department. Since the law has not been applied to any great extent at the time of the study, the focus of the investigation has been on examining the possibilities and limitations that IT-forensics, with their experience, believe can arise from the use of Secret data reading. The theory that has been used is technological affordances that intend to describe the interaction between an actor and an object in their environment. In the study, technological affordances were used in an organizational context, with several actors involved. The study focuses on the artifact Secret data reading, the use of which has not been documented and which is additionally laid with confidentiality. For this reason, the specific orientation of the theory has been modified to adopt a more comprehensive and mapping perspective. An explorative approach with a qualitative perspective has been used to investigate the issue. The data collection was conducted through semi-structured interviews, document analysis and a podcast. The analysis of the data collected resulted in three themes related to opportunities and challenges. The first two are about how a lack of skills and resources limits the use of secret data reading while bypassing encryption is the major enabling effect.

  HÄR KAN DU HÄMTA UPPSATSEN I FULLTEXT. (följ länken till nästa sida)