Remote searches in the cloud

Similar documents
CHAPTER 124B COMPUTER MISUSE

Crimes (Computer Hacking)

A BILL for AN ACT. Serial 270 Volatile Substance Abuse Prevention Bill 2004 Ms Scrymgour

(b) Why do you believe that those documents relate to a matter relevant to the investigation?

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Federal Act on Combating Money Laundering and Terrorist Financing in the Financial Sector 1

COMMISSION RECOMMENDATION. of XXX. on the right to legal aid for suspects or accused persons in criminal proceedings

Interception of Communications Code of Practice. Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000

Online Research and Investigation

Criminal Justice (Scotland) Bill [AS INTRODUCED]

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT

ALLERDALE BOROUGH COUNCIL SECTION. FOOD HYGIENE POLICY & PROCEDURES

Protection of Freedoms Bill

3. In Baker v. Campbell (1983) 153 CLR 52 the question posed in the case stated was:-

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

Council Tax Reduction Anti-Fraud Policy

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION

COMPUTER MISUSE AND CYBERCRIME ACT

Committee on Civil Liberties, Justice and Home Affairs - The Secretariat - Background Note on

ACT. [Long title substituted by s. 27 (1) of Act 33 of 2004.]

Naime Ahmeti A DEFENDANT RIGHTS OF THE DEFENDANT IN CRIMINAL PROCEEDINGS

ACPO Good Practice Guide ACPO Good Practice Guide March 2012

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION

4.2 The Scope Order is made under the power in s 4(2)(e) of the Act.

Hessisches Ministerium der Justiz, für Integration und Europa. Folie # 1

Telecommunications (Interception and Access) Act Annual Report

Accessing electronically stored evidence of child exploitation material offences

TAIWAN. Edgar Y. CHEN. Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN

Regulation of Investigatory Powers Act 2000

PROCEDURE Street Bail. Number: E 0205 Date Published: 13 July 2011

Liquor Control (Supply and Consumption) Bill

Court Record Access Policy

(Legislative acts) DIRECTIVES

Australia s counter-terrorism laws

THE REGULATION OF INTERCEPTION OF COMMUNICATIONS BILL, 2007 ARRANGEMENT OF CLAUSES. PART I - PRELIMINARY

The Credit Reporting Act

Federal Criminal Court

Computer Crimes Act An Act to provide for offences relating to the misuse of computers.

Police community support officer powers

Global Alliance against Child Sexual Abuse Online Report of Republic of Serbia

LAW ON MUTUAL ASSISTANCE IN CRIMINAL MATTERS

Searching, screening and confiscation. Advice for headteachers, school staff and governing bodies

This chapter will focus on your right to a lawyer, the different ways to get a lawyer, and what you should expect from your lawyer.

From: Head of Prison Administration Department, Legislation and International Relations Research Office, Ministry of Justice

NOTICE OF THE POWERS TO SEARCH PREMISES AND OF THE RIGHTS OF OCCUPIERS UNDER SECTION 194 OF THE ENTERPRISE ACT 2002 ( THE ACT )

journalists assistance to foreign in connection with major events in Denmark

REPLIES TO THE QUESTIONNAIRE ON PROTECTION OF WITNESSES AND PENTITI IN RELATION TO ACTS OF TERRORISM POLAND

What Victims of Crime Should Know About

MARINE MAMMAL PROTECTION [CH.244A 1 CHAPTER 244A MARINE MAMMAL PROTECTION ARRANGEMENT OF SECTIONS

Act on Background Checks

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI ST. JOSEPH DIVISION. v. Case No : ,03,05/08-CR-W-SOW

Report of the Strategic Meeting on Cybercrime

Digital Evidence meets the Charter: Peer-to-Peer (P2P) File-Sharing Networks

Queensland DRUG REHABILITATION (COURT DIVERSION) ACT 2000

ESSENTIAL ACCIDENT & FATALITY STRATEGY

SELF-REGULATION RULES OF THE ASSOCIATION ROMANDE DES INTERMÉDIAIRES FINANCIERS (ARIF)

Defendants charged with serious violent and sexual offences (including murder)

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA. (as amended by Federal Law of No.266-FZ) Chapter 1.

Mental Health Act Brief guide to the Act

THE COMPUTER MISUSE AND CYBERCRIME ACT I assent ARRANGEMENT OF SECTIONS

SOUTH AFRICAN POLICE SERVICE ACT 68 OF 1995

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue

Justice and Other Information Disclosure Bill 2008

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME

Police Officers who Commit Domestic Violence-Related Criminal Offences 1

have to appear before the Youth Justice Court *, or

SUMMARY OF KEY SECTIONS OF THE USA PATRIOT ACT OF 2001 By Richard Horowitz, Esq.

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

CZECH REPUBLIC. Richard BACEK. Siemens, s.r.o. Phone: richard.bacek@siemens.com

COMPUTER FORENSIC EXAMINER~E SAFETY HIGH TECH CRIME UNIT CRIME & JUSTICE COMMAND

Canadian Nuclear Security Law. Stanley D. Berger Partner, Fogler, Rubinoff LLP Jacques Lavoie, Canadian Nuclear Safety Commission May 1, 2014

Casino, Liquor and Gaming Control Authority Act 2007 No 91

Avoid the 5 Biggest Criminal Defense Pitfalls Presented by: The Volk & McElroy Law Firm

Guide to compensation claims against the police

NATIONAL STRATEGIC INTELLIGENCE ACT 39 OF 1994

TOP SECRET STRAP2 UK EYES ONLY

The Electronic Transactions Law Chapter I Title and Definition

An Bille um Cheartas Coiriúil (Cionta a bhaineann le Córais Faisnéise), 2016 Criminal Justice (Offences Relating to Information Systems) Bill 2016

Brief Overview of the Family Violence Protection Act 2008

DUI (Driving Under the Influence)

PRIVACY BREACH MANAGEMENT POLICY

Five Myths Regarding Privacy and Law Enforcement Access to Personal Information in the European Union and the United States

New South Wales. 1 Name of Act 2 Commencement 3 Definitions 4 Who is a witness?

In Re Boucher United States District Court for the District of Vermont 2007 WL (Nov. 29, 2009)

technical factsheet 176

London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY

CYBERSECURITY BILL, 2011

Transcription:

Remote searches in the cloud A comparative perspective Charlotte Conings & Ruben Roex

Setting the scene

Elements considered

Access to the cloud Network search (art. 88ter CCP) What? Expanding initial search in information system Special access of person entitled to use initial system Interesting data can be seized, deleted, access blocked

Access to the cloud Network search (art. 88ter CCP) On whose authority? Investigating judge

Access to the cloud Network search (art. 88ter CCP) Conditions? Lawful initial search Necessary to reveal truth Other measures disproportionate OR Risk losing evidence

Access to the cloud Network search (art. 125j CCP) What? Expanding initial search Right to access by person using initially searched place Interesting data can be seized, deleted, access blocked

Access to the cloud Network search (art. 125j CCP) On whose authority? Depending upon initial search (Police Public Prosecutor Examining Magistrate)

Access to the cloud Network search (art. 125j CCP) Conditions? Lawful initial search Reasons to believe relevant data will be found Necessary to reveal truth

Access to the cloud Powers of search and seizure (s. 20 PACE) What? Extension of powers of seizure to computerised information Any information stored in electronic form can be taken away Interesting data can be seized in an intelligible form

Access to the cloud Powers of search and seizure (s. 20 PACE) On whose authority? Depending on the context of search & seizure Warrant: Justice of the Peace After arrest: senior police officer

Access to the cloud Powers of search and seizure (s. 20 PACE) Conditions? Lawful authority to search and seize Accessibility from premises

Access across borders Principle: International cooperation (+ art. 32 CC) Exception: Unilateral search (pragmatic) Unintended search abroad/competent state unknown/need to secure evidence Data can only be copied Notification authorities of state concerned (if reasonably identifiable)

Access across borders Currently Principle: Network search limited to Dutch territory International cooperation (+ art. 32 CC) Exception: Acting in good faith

Access across borders Future Principle: International cooperation (+art. 32 CC) Exception: Unilateral search Securing evidence and blocking access to data Concerned state unknown Concerned state known if necessary

Access across borders Principle: International cooperation (+ art. 32 CC) Exception: Unilateral search Passive observer Location data unknown

Order to decrypt Order to provide information (art. 88quater, 1 CCP) Who? What? Persons with special knowledge IT-system or service to secure or encrypt data Functioning IT-system Possibilities to obtain access Refusing to cooperate = offence

Order to decrypt Order to act (art. 88quater, 2 CCP) Who? Any qualified person, except suspect & certain family members What? Operate IT-system Search, make available, copy, render inaccessible, remove relevant data Refusing to cooperate = offence

Order to decrypt Currently (art. 125k CCP) Who? Persons with special knowledge security measures Except suspect, certain family members, holders of professional secrecy What? Provide information or access

Order to decrypt Future (proposed art. 125k, 4 CCP) Who? Suspect of terrorism or offences concerning child pornography by profession or custom On whose authority? Public Prosecutor with authorisation of examining magistrate Refusing to cooperate = offence

Order to decrypt Notices requiring disclosure (ss. 49-53 RIPA) Who? Authorised personnel (e.g. police officers with a valid seizure warrant under) Order can be given to anyone who has the key (exceptions in corporate settings) What? The key(s) or the decrypted information itself (exceptions in section 51 RIPA) Refusing to cooperate = offence

Searching secretly Network search (art. 88ter CCP) Provision is unclear + Duty to inform Doctrine: discussion going on Preparatory documents: Hacking by government as new, secret investigating measure is prohibited

Searching secretly Sneak and peek (art. 46quinquies & 89ter CCP) Evolutionary interpretation Not used in practice Clear, detailed legal base as required by ECHR?

Searching secretly Currently No specific provision Evolutionary interpretation sneak and peek?

Searching secretly Future (proposed art. 125ja CCP) Secretly accessing using technical tool Suspect of criminal act possibly entailing pre-trial detention + serious breach of legal order Order Public Prosecutor + authorisation Examining Magistrate Max. 4 weeks (renewable)

Searching secretly Not possible using powers of search and seizure Only possible under special powers granted by RIPA (interception and surveillance)

Overview Yes Yes Yes? Yes Today: no Future: yes Today: No Future: Yes Today: No Future: yes Yes Yes Yes No

Thank you Email: contact@b-ccentre.be