Wednesday, February 27, 2013

Ohio Revised Code 2921.29 Failure to disclose personal information.


2921.29 Failure to disclose personal information.

(A) No person who is in a public place shall refuse to disclose the person’s name, address, or date of birth, when requested by a law enforcement officer who reasonably suspects either of the following:
(1) The person is committing, has committed, or is about to commit a criminal offense.
(2) The person witnessed any of the following:
(a) An offense of violence that would constitute a felony under the laws of this state;
(b) A felony offense that causes or results in, or creates a substantial risk of, serious physical harm to another person or to property;
(c) Any attempt or conspiracy to commit, or complicity in committing, any offense identified in division (A)(2)(a) or (b) of this section;
(d) Any conduct reasonably indicating that any offense identified in division (A)(2)(a) or (b) of this section or any attempt, conspiracy, or complicity described in division (A)(2)(c) of this section has been, is being, or is about to be committed.
(B) Whoever violates this section is guilty of failure to disclose one’s personal information, a misdemeanor of the fourth degree.
(C) Nothing in this section requires a person to answer any questions beyond that person’s name, address, or date of birth. Nothing in this section authorizes a law enforcement officer to arrest a person for not providing any information beyond that person’s name, address, or date of birth or for refusing to describe the offense observed.
(D) It is not a violation of this section to refuse to answer a question that would reveal a person’s age or date of birth if age is an element of the crime that the person is suspected of committing.
Effective Date: 04-14-2006


Key disclosure law

From Wikipedia, the free encyclopedia
Key disclosure laws, also known as mandatory key disclosure, is legislation that require individuals to surrendercryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensicspurposes and use it either as evidence in a court of law or to enforce national security interests. Similarly, mandatory decryption laws force owners of encrypted data to supply decrypted data to law enforcement.
Nations vary widely in the specifics of how they implement key disclosure laws. Some, such as Australia, give law enforcement wide-ranging power to compel assistance in decrypting data from any party. Some, such as Belgium, concerned with self-incrimination, only allow law enforcement to compel assistance from non-suspects. Some require only specific third parties such as telecommunications carriers, certification providers, or maintainers of encryption services to provide assistance with decryption. In all cases, a warrant is generally required.

Theory and countermeasures

Mandatory decryption is technically a weaker requirement than key disclosure, since it is possible in some cryptosystems to prove that a message has been decrypted correctly without revealing the key. For example, using RSA public-key encryption, one can verify given the message (plaintext), the encrypted message (ciphertext), and the public key of the recipient that the message is correct by merely re-encrypting it and comparing the result to the encrypted message. Such a scheme is called undeniable, since once the government has validated the message they cannot deny that it is the correct decrypted message.[1]
As a countermeasure to key disclosure laws, some personal privacy products such as BestCryptFreeOTFE, andTrueCrypt have begun incorporating deniable encryption technology, which enable a single piece of encrypted data to be decrypted in two or more different ways, creating plausible deniability.[2][3] Another alternative is steganography, which hides encrypted data inside of benign data so that it is more difficult to identify in the first place.
A problematic aspect of key disclosure is that it leads to a total compromise of all data encrypted using that key in the past or future; time-limited encryption schemes such as those of Desmedt et al.[1] allow decryption only for a limited time period.

No comments: