Described herein are methods and devices for forensic access control of an electronic device, including encryption and decryption of access keys of an electronic device. Two pairs of asymmetric key pairs (AKP) are created, e.g., created by more than one organization. An encrypted access key is configured to be decrypted by another organization possessing the private key of the first AKP and the private key of the second AKP. In some embodiments, the private key of the second AKP is encrypted. The encrypted private key of the second AKP is configured to be decrypted using the private key of the first AKP. The encrypted access key may be decrypted using the decrypted private key of the second AKP.