SlideShare a Scribd company logo
1 of 60
1
DEVELOPING A LEGALDEVELOPING A LEGAL
FRAMEWORKTO COMBATFRAMEWORKTO COMBAT
CYBERCRIMECYBERCRIME
Providing Law Enforcement with the Legal ToolsProviding Law Enforcement with the Legal Tools
to Prevent, Investigate, and Prosecute Cybercrimeto Prevent, Investigate, and Prosecute Cybercrime
Marcelo Gomes FreireMarcelo Gomes Freire
2
OverviewOverview
I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety
II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority
III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications
IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network
VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a
Computer NetworkComputer Network
VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic
EvidenceEvidence
3
OverviewOverview
I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety
II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority
III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications
IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network
VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a
Computer NetworkComputer Network
VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic
EvidenceEvidence
4
Balancing Privacy & Public SafetyBalancing Privacy & Public Safety
Privacy is a basic human rightPrivacy is a basic human right
ā€œā€œNo one shall be subjected to arbitraryNo one shall be subjected to arbitrary
interference with his privacy, family, homeinterference with his privacy, family, home
or correspondence...ā€or correspondence...ā€
-- Art. XII, Universal Declaration of Human Rights-- Art. XII, Universal Declaration of Human Rights
Promotes free thought, free expression, andPromotes free thought, free expression, and
free association, building blocks of democracyfree association, building blocks of democracy
Supports competitive businesses and markets,Supports competitive businesses and markets,
cornerstone of a robust economycornerstone of a robust economy
5
Balancing Privacy & Public SafetyBalancing Privacy & Public Safety
Privacy of computer networks is important:Privacy of computer networks is important:
Individuals, businesses, and governments increasinglyIndividuals, businesses, and governments increasingly
use computers to communicateuse computers to communicate
Sensitive personal information and business records areSensitive personal information and business records are
stored in electronic formstored in electronic form
Privacy of computer networks is importantPrivacy of computer networks is important
for human rights, individual freedoms, andfor human rights, individual freedoms, and
economic efficiencyeconomic efficiency
6
Balancing Privacy & Public SafetyBalancing Privacy & Public Safety
Threats to online privacy:Threats to online privacy:
IndustryIndustry
Gathering marketing informationGathering marketing information
GovernmentGovernment
Investigating crime, espionage, or terrorismInvestigating crime, espionage, or terrorism
Misusing legal investigative authoritiesMisusing legal investigative authorities
CriminalsCriminals
Stealing government or business secrets or financialStealing government or business secrets or financial
informationinformation
Obtaining private information from individualsā€™ computersObtaining private information from individualsā€™ computers
7
Balancing Privacy & Public SafetyBalancing Privacy & Public Safety
Need to investigate all kinds of crimes thatNeed to investigate all kinds of crimes that
involve computer networksinvolve computer networks
E.g.: communications of terrorists or drug dealersE.g.: communications of terrorists or drug dealers
Need to investigate attempts to damageNeed to investigate attempts to damage
computer networkscomputer networks
E.g.: ā€œI love youā€ virusE.g.: ā€œI love youā€ virus
Need to investigate invasions of privacyNeed to investigate invasions of privacy
E.g.: hackers working for organized crime stealingE.g.: hackers working for organized crime stealing
credit card numberscredit card numbers
8
OverviewOverview
I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety
II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority
III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications
IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network
VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a
Computer NetworkComputer Network
VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic
EvidenceEvidence
9
Limited Law Enforcement AuthorityLimited Law Enforcement Authority
Striking the Balance:Striking the Balance:
Government investigative authority subject toGovernment investigative authority subject to
appropriate limits and controls in the form ofappropriate limits and controls in the form of
procedural laws will increase privacy and publicprocedural laws will increase privacy and public
safety, but . . .safety, but . . .
Uncontrolled government authority mayUncontrolled government authority may
diminish privacy and hinder economicdiminish privacy and hinder economic
development.development.
10
Intrusiveness
of the
Investigative
Power
Safeguards to Prevent Governmental Abuse
Limited Law Enforcement AuthorityLimited Law Enforcement Authority
11
Limited Law Enforcement AuthorityLimited Law Enforcement Authority
Ways to limit law enforcement authorities:Ways to limit law enforcement authorities:
Define specific predicate crimes/classes of crimeDefine specific predicate crimes/classes of crime
Require law enforcement to demonstrate factualRequire law enforcement to demonstrate factual
basis to independent judicial officerbasis to independent judicial officer
Limit the breadth and scope, the location, or theLimit the breadth and scope, the location, or the
durationduration
Offer only as ā€œlast resortā€Offer only as ā€œlast resortā€
Prior approval or subsequent review by seniorPrior approval or subsequent review by senior
official or politically accountable bodyofficial or politically accountable body
12
Limited Law Enforcement AuthorityLimited Law Enforcement Authority
Penalizing abuse:Penalizing abuse:
Administrative discipline of officer involvedAdministrative discipline of officer involved
Inability to use evidence in prosecutionInability to use evidence in prosecution
(ā€œsuppressionā€)(ā€œsuppressionā€)
Civil liability for officer involvedCivil liability for officer involved
Criminal sanction of officer involvedCriminal sanction of officer involved
13
Limited Law Enforcement AuthorityLimited Law Enforcement Authority
Limiting Economic Burdens on Third PartyLimiting Economic Burdens on Third Party
Service Providers:Service Providers:
Should laws require providers to have certainShould laws require providers to have certain
technical capabilities?technical capabilities?
Who is responsible for costs of collecting dataWho is responsible for costs of collecting data
for law enforcement?for law enforcement?
14
OtherPolicy ConsiderationsOtherPolicy Considerations
Each country should approach this complex balancingEach country should approach this complex balancing
question, taking into consideration:question, taking into consideration:
The scope of its crime and terrorism problem;The scope of its crime and terrorism problem;
Its existing legal structures;Its existing legal structures;
Its historical methods of protecting human rights; and,Its historical methods of protecting human rights; and,
the need to assist foreign governments.the need to assist foreign governments.
Each country should decide the ā€œmeansā€ forEach country should decide the ā€œmeansā€ for
obtainingobtaining electronic evidence within its existing legalelectronic evidence within its existing legal
framework (e.g., constitutions, statutes, courtframework (e.g., constitutions, statutes, court
decisions, rules of procedure)decisions, rules of procedure)
15
OverviewOverview
I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety
II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority
III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications
IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network
VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a
Computer NetworkComputer Network
VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic
EvidenceEvidence
16
Information Obtained fromComputerNetworksInformation Obtained fromComputerNetworks
in Cybercrime Investigationsin Cybercrime Investigations
ContentContent Non-ContentNon-Content
Real-TimeReal-Time
CommunicationsCommunications
11 22
Information StoredInformation Stored
on a Computeron a Computer
NetworkNetwork
33 44
17
ContentContent Non-ContentNon-Content
Real-TimeReal-Time
CommunicationsCommunications
11 22
Information StoredInformation Stored
on a Computeron a Computer
NetworkNetwork
33 44
Information Obtained fromComputerNetworksInformation Obtained fromComputerNetworks
in Cybercrime Investigationsin Cybercrime Investigations
18
Intercepting Electronic Communications onIntercepting Electronic Communications on
ComputerNetworksComputerNetworks
Obtaining the content of a communication as theObtaining the content of a communication as the
communication occurscommunication occurs
Similar to intercepting whatā€™s being said in a phoneSimilar to intercepting whatā€™s being said in a phone
conversationconversation
E.g.: collect the content of e-mail passing between twoE.g.: collect the content of e-mail passing between two
terrorists or drug dealersterrorists or drug dealers
E.g.: collect the commands sent by a hacker to a victimE.g.: collect the commands sent by a hacker to a victim
computer to steal corporate informationcomputer to steal corporate information
19
Intercepting Electronic Communications onIntercepting Electronic Communications on
ComputerNetworksComputerNetworks
Many countries use the same (or very similar) rules asMany countries use the same (or very similar) rules as
phone wiretapsphone wiretaps
Authority should include the ability to compel providersAuthority should include the ability to compel providers
to assist law enforcement officialsto assist law enforcement officials
Sometimes does not require law enforcement expertiseSometimes does not require law enforcement expertise
May depend on particular technology and infrastructureMay depend on particular technology and infrastructure
Art. 21, Council of Europe Convention on CybercrimeArt. 21, Council of Europe Convention on Cybercrime
20
Intercepting Electronic Communications onIntercepting Electronic Communications on
ComputerNetworksComputerNetworks
Law enforcement needs this authority because:Law enforcement needs this authority because:
Criminals and terrorists increasingly use electronicCriminals and terrorists increasingly use electronic
communications to plan and execute crimescommunications to plan and execute crimes
Many crimes are committed mostly (or entirely) usingMany crimes are committed mostly (or entirely) using
computer networkscomputer networks
Distribution of child pornography, internet fraud, hackingDistribution of child pornography, internet fraud, hacking
Communications may not be storedCommunications may not be stored
21
Intercepting Electronic Communications onIntercepting Electronic Communications on
ComputerNetworksComputerNetworks
This authority should be limited because:This authority should be limited because:
Interception of communications can be a grave invasionInterception of communications can be a grave invasion
of privacyof privacy
Can allow access to the most private thoughts, harmingCan allow access to the most private thoughts, harming
freedoms of speech and associationfreedoms of speech and association
Fear of overly intrusive interception may stifleFear of overly intrusive interception may stifle
competitive markets, economic development, andcompetitive markets, economic development, and
foreign investmentforeign investment
22
Examples of Limitations on InterceptionExamples of Limitations on Interception
Authorities ā€“ AustraliaAuthorities ā€“ Australia
Independent judicial reviewIndependent judicial review
Facts in support of anFacts in support of an
application showing thatapplication showing that
intercepted communicationsintercepted communications
would ā€œbe likely to assistā€ inwould ā€œbe likely to assistā€ in
an investigationan investigation
Investigation of a seriousInvestigation of a serious
crime (generally 7+ yearscrime (generally 7+ years
maximum incarceration)maximum incarceration)
90 day maximum (renewable)90 day maximum (renewable)
Information interceptedInformation intercepted
unlawfully cannot be used asunlawfully cannot be used as
evidence in courtevidence in court
Intercepted information hasIntercepted information has
certain disclosure restrictionscertain disclosure restrictions
and destruction after purpose isand destruction after purpose is
completecomplete
Judge must balance surroundingJudge must balance surrounding
circumstances:circumstances:
Whether other investigativeWhether other investigative
techniques would not be justtechniques would not be just
as effectiveas effective
The value of the informationThe value of the information
Gravity of the conductGravity of the conduct
The privacy invasionThe privacy invasion
23
Examples of Limitations on InterceptionExamples of Limitations on Interception
Authorities ā€“ the United StatesAuthorities ā€“ the United States
30 day time limit (plus30 day time limit (plus
extensions)extensions)
ā€œā€œProbable causeā€ to believe aProbable causeā€ to believe a
crime is being committedcrime is being committed andand
that the facility is being usedthat the facility is being used
in furtherance of that crimein furtherance of that crime
All other options have beenAll other options have been
tried or are unlikely totried or are unlikely to
succeedsucceed
Independent judicial reviewIndependent judicial review
Report to intercepted partiesReport to intercepted parties
(at conclusion of case)(at conclusion of case)
Inability to use evidence inInability to use evidence in
court if violate the lawcourt if violate the law
Administrative investigationAdministrative investigation
of misuse of the law requiredof misuse of the law required
Civil and criminal sanctionsCivil and criminal sanctions
for violationsfor violations
Approval by high-levelApproval by high-level
officialofficial
Minimize collection of non-Minimize collection of non-
criminal communicationscriminal communications
Limitations on disclosure ofLimitations on disclosure of
intercepted communicationsintercepted communications
24
Possible Exceptions to the RulePossible Exceptions to the Rule
Might not require legal process if:Might not require legal process if:
The communication is publicly accessibleThe communication is publicly accessible
E.g.: public ā€œchatā€ roomsE.g.: public ā€œchatā€ rooms
Party/all parties to the communication consentParty/all parties to the communication consent
Actual consent (CI), bannerActual consent (CI), banner
Emergency involving risk of deathEmergency involving risk of death
No reason to believe communication is privateNo reason to believe communication is private
Hackers communication with target computerHackers communication with target computer
25
Intercepting Electronic Communications:Intercepting Electronic Communications:
OtherConsiderationsOtherConsiderations
Limits on ISPā€™s interceptionLimits on ISPā€™s interception
Possible exceptions for consent, interceptions necessaryPossible exceptions for consent, interceptions necessary
to run or secure a networkto run or secure a network
Voluntary disclosure of intercepted communicationVoluntary disclosure of intercepted communication
Only if legal interception (i.e. subject to exception)Only if legal interception (i.e. subject to exception)
26
OverviewOverview
I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety
II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority
III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications
IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network
VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a
Computer NetworkComputer Network
VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic
EvidenceEvidence
27
Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
ContentContent Non-ContentNon-Content
Real-TimeReal-Time
CommunicationsCommunications
11 22
Stored InformationStored Information
on a Networkon a Network 33 44
28
Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
Interception of non-content informationInterception of non-content information
Similar to phone number called to/fromSimilar to phone number called to/from
E.g.: ā€œToā€ and ā€œFromā€ on an e-mailE.g.: ā€œToā€ and ā€œFromā€ on an e-mail
E.g.: Source and destination IP address in a packet headerE.g.: Source and destination IP address in a packet header
Less intrusive than intercepting content, so lessLess intrusive than intercepting content, so less
restrictions on law enforcement userestrictions on law enforcement use
Art. 20, Council of Europe Convention on CybercrimeArt. 20, Council of Europe Convention on Cybercrime
29
Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
Law enforcement needs this authority because:Law enforcement needs this authority because:
Criminals and terrorists increasingly use electronicCriminals and terrorists increasingly use electronic
communications to plan and execute serious crimescommunications to plan and execute serious crimes
Helps locate suspects, identify members of conspiracyHelps locate suspects, identify members of conspiracy
Useful tool to assist foreign investigations where aUseful tool to assist foreign investigations where a
country is used only as a ā€œpass-thoughā€country is used only as a ā€œpass-thoughā€
Provides a less intrusive and therefore less restrictedProvides a less intrusive and therefore less restricted
alternative to content interceptionalternative to content interception
30
Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
This authority should be limited because:This authority should be limited because:
Although less intrusive than content interception, stillAlthough less intrusive than content interception, still
implicates privacyimplicates privacy
Individuals donā€™t expect government to keep track of whoIndividuals donā€™t expect government to keep track of who
theyā€™re calling, even if government does not listen to whattheyā€™re calling, even if government does not listen to what
theyā€™re sayingtheyā€™re saying
To/From information may be revealing (e.g., repeated e-To/From information may be revealing (e.g., repeated e-
mails to a psychiatrist; receiving information from a militantmails to a psychiatrist; receiving information from a militant
organization)organization)
31
Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
Sample Laws ā€“ United KingdomSample Laws ā€“ United Kingdom
Information must be ā€œnecessaryā€ for theInformation must be ā€œnecessaryā€ for the
investigation of crime, protection of nationalinvestigation of crime, protection of national
security, public health, other specified purposessecurity, public health, other specified purposes
Approval by a designated high-level governmentApproval by a designated high-level government
official, but no independent judicial reviewofficial, but no independent judicial review
Collection must be ā€œproportionate to what isCollection must be ā€œproportionate to what is
sought to be achievedā€sought to be achievedā€
30 day time limit30 day time limit
32
Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
Sample Laws ā€“ United StatesSample Laws ā€“ United States
Information collected must be ā€œrelevantā€ to anInformation collected must be ā€œrelevantā€ to an
ongoing criminal investigationongoing criminal investigation
Can only be applied for by an attorney for theCan only be applied for by an attorney for the
government (not a police officer)government (not a police officer)
Limited to 60 days (plus extensions)Limited to 60 days (plus extensions)
Disciplinary, civil, and criminal penalties forDisciplinary, civil, and criminal penalties for
misusemisuse
33
Possible Exceptions to the RulePossible Exceptions to the Rule
Might not require legal process if:Might not require legal process if:
Party/all parties to the communication consentParty/all parties to the communication consent
E.g.: witness cooperating with the governmentE.g.: witness cooperating with the government
allows officers to determine where conspiratorsā€™ e-allows officers to determine where conspiratorsā€™ e-
mail is sent frommail is sent from
No reason to believe communication is privateNo reason to believe communication is private
Hackers communication with target computerHackers communication with target computer
Interception is by provider of computing serviceInterception is by provider of computing service
in order to run the system or provide securityin order to run the system or provide security
34
OverviewOverview
I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety
II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority
III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications
IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network
VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a
Computer NetworkComputer Network
VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic
EvidenceEvidence
35
Obtaining Content InformationObtaining Content Information
Stored on a ComputerNetworkStored on a ComputerNetwork
ContentContent Non-ContentNon-Content
Real-TimeReal-Time
CommunicationsCommunications
11 22
Information StoredInformation Stored
on a Computeron a Computer
NetworkNetwork
33 44
36
Obtaining the Content of StoredObtaining the Content of Stored
Information on ComputerNetworksInformation on ComputerNetworks
Information stored on the system of a third-partyInformation stored on the system of a third-party
providerprovider
Computer network not owned by the target of anComputer network not owned by the target of an
investigationinvestigation
E.g.: e-mail sent to an individual that is stored by anE.g.: e-mail sent to an individual that is stored by an
Internet service providerInternet service provider
E.g.: calendar kept on a remote serviceE.g.: calendar kept on a remote service
37
Obtaining the Content of StoredObtaining the Content of Stored
Information on ComputerNetworksInformation on ComputerNetworks
Laws may be similar to those for searching or seizingLaws may be similar to those for searching or seizing
computers in the possession of the target of ancomputers in the possession of the target of an
investigationinvestigation
But because the information is held by a neutral thirdBut because the information is held by a neutral third
party, physical coerciveness of regular search proceduresparty, physical coerciveness of regular search procedures
may not be necessarymay not be necessary
Also, because the data is not in the immediate control (e.g.Also, because the data is not in the immediate control (e.g.
home) of the individual, he or she may have less of ahome) of the individual, he or she may have less of a
privacy interest in itprivacy interest in it
Art. 18, Council of Europe Convention on CybercrimeArt. 18, Council of Europe Convention on Cybercrime
38
Obtaining the Content of StoredObtaining the Content of Stored
Information on ComputerNetworksInformation on ComputerNetworks
Law enforcement needs this authority because:Law enforcement needs this authority because:
Without it, serious crimes will go unpunished andWithout it, serious crimes will go unpunished and
undeterredundeterred
Just as law enforcement has needed coercive power toJust as law enforcement has needed coercive power to
gather evidence in ā€œreal worldā€ contexts, so it must begather evidence in ā€œreal worldā€ contexts, so it must be
able to do so in online contextsable to do so in online contexts
For the many crimes committed over the Internet,For the many crimes committed over the Internet,
stored information is the ā€œcrime sceneā€stored information is the ā€œcrime sceneā€
39
Obtaining the Content of StoredObtaining the Content of Stored
Information on ComputerNetworksInformation on ComputerNetworks
This authority should be limited because:This authority should be limited because:
As our countries enter the ā€œInformation Age,ā€As our countries enter the ā€œInformation Age,ā€
more and more of the most sensitive data is beingmore and more of the most sensitive data is being
stored on computersstored on computers
Businesses are increasingly using computer networks toBusinesses are increasingly using computer networks to
store datastore data
Individuals are increasingly storing information andIndividuals are increasingly storing information and
communications remotely on third-party networkscommunications remotely on third-party networks
40
Obtaining Stored ContentObtaining Stored Content
Sample Laws ā€“ United StatesSample Laws ā€“ United States
To compel disclosure of most kinds of e-mail:To compel disclosure of most kinds of e-mail:
ā€œā€œProbable causeā€ to believe it contains evidence of aProbable causeā€ to believe it contains evidence of a
crime (same standard as to search a package or a house)crime (same standard as to search a package or a house)
Review of evidence by an independent judgeReview of evidence by an independent judge
Administrative sanctions against officers who abuse theAdministrative sanctions against officers who abuse the
authorityauthority
Civil suit against the government for misuseCivil suit against the government for misuse
Disclosure restrictionsDisclosure restrictions
41
Obtaining Stored ContentObtaining Stored Content
Do some categories of data deserve extra protection?Do some categories of data deserve extra protection?
Greater expectation that data will remain privateGreater expectation that data will remain private
Has the user any choice about whether theHas the user any choice about whether the
information is stored on the network?information is stored on the network?
Example of graduated system of requirements ā€“ UnitedExample of graduated system of requirements ā€“ United
StatesStates
Unopened e-mail requires a search warrant based uponUnopened e-mail requires a search warrant based upon
ā€œprobable causeā€ā€œprobable causeā€
E-mail accessed by the user and other information the userE-mail accessed by the user and other information the user
chooses to store on a remote server requires a court orderchooses to store on a remote server requires a court order
with only a showing of ā€œrelevanceā€with only a showing of ā€œrelevanceā€
42
Obtaining Stored ContentObtaining Stored Content
Consider allowing voluntary disclosure to lawConsider allowing voluntary disclosure to law
enforcement under some circumstances:enforcement under some circumstances:
Unrestricted disclosure by 3Unrestricted disclosure by 3rdrd
-party providers may-party providers may
infringe upon privacy and have economic impact,infringe upon privacy and have economic impact,
but disclosure may be justifiedbut disclosure may be justified
To protect public health or safetyTo protect public health or safety
To allow the provider to protect its property (e.g., byTo allow the provider to protect its property (e.g., by
reporting unauthorized use)reporting unauthorized use)
43
OverviewOverview
I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety
II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority
III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications
IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network
VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a
Computer NetworkComputer Network
VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic
EvidenceEvidence
44
Obtaining Non-Content InformationObtaining Non-Content Information
Stored on a ComputerNetworkStored on a ComputerNetwork
ContentContent Non-ContentNon-Content
Real-TimeReal-Time
CommunicationsCommunications
11 22
Information StoredInformation Stored
on a Computeron a Computer
NetworkNetwork
33 44
45
Obtaining Non-Content Information Stored onObtaining Non-Content Information Stored on
a ComputerNetworka ComputerNetwork
Computers create logs showing whereComputers create logs showing where
communications came from and where they wentcommunications came from and where they went
Generally less sensitive than contentGenerally less sensitive than content
E.g.: a list of all of the e-mail addresses to whichE.g.: a list of all of the e-mail addresses to which
a user sent e-maila user sent e-mail
E.g.: a log showing the phone numbers by whichE.g.: a log showing the phone numbers by which
a user accessed an Internet service providera user accessed an Internet service provider
46
Obtaining Non-Content Information Stored onObtaining Non-Content Information Stored on
a ComputerNetworka ComputerNetwork
Law enforcement needs this authority because:Law enforcement needs this authority because:
ļ® Logs showing what occurred on a network mayLogs showing what occurred on a network may
be the best evidence of a computer crime; maybe the best evidence of a computer crime; may
identify the suspect or reveal criminal conductidentify the suspect or reveal criminal conduct
This authority should be limited because:This authority should be limited because:
ļ® Although less sensitive than content, theseAlthough less sensitive than content, these
records still contain private informationrecords still contain private information
47
Obtaining Stored Non-Content InformationObtaining Stored Non-Content Information
Laws Can Distinguish Between Kinds of RecordsLaws Can Distinguish Between Kinds of Records::
Subscriber information generally less sensitiveSubscriber information generally less sensitive
Name, street address, user nameName, street address, user name
Might include method of payment, i.e., credit card orMight include method of payment, i.e., credit card or
bank account (important because ISPs may not checkbank account (important because ISPs may not check
usersā€™ identities)usersā€™ identities)
Logs showing with whom a user hasLogs showing with whom a user has
communicated generally more sensitivecommunicated generally more sensitive
48
Obtaining Stored Non-Content InformationObtaining Stored Non-Content Information
Examples of Different StandardsExamples of Different Standards
Art. 18, Council of Europe Convention on Cybercrime:Art. 18, Council of Europe Convention on Cybercrime:
Treats ā€œSubscriber Informationā€ differently from other dataTreats ā€œSubscriber Informationā€ differently from other data
ļ® United States:United States:
ļ® Basic subscriber records require a mere showing ofBasic subscriber records require a mere showing of
ā€œrelevanceā€ to a criminal investigation without prior review byā€œrelevanceā€ to a criminal investigation without prior review by
a court (subpoena)a court (subpoena)
ļ® E-mail logs require a prior finding of ā€œspecific and articulableE-mail logs require a prior finding of ā€œspecific and articulable
factsā€ that would justify disclosure of the recordsfactsā€ that would justify disclosure of the records
49
Preservation of EvidencePreservation of Evidence
Problem: many stored records last only for weeks orProblem: many stored records last only for weeks or
daysdays
Obtaining legal process is often slowObtaining legal process is often slow
Investigators may not even know the significance of evidenceInvestigators may not even know the significance of evidence
until weeks or days after the commission of a crimeuntil weeks or days after the commission of a crime
Critical tool: request by law enforcement to preserveCritical tool: request by law enforcement to preserve
evidence (content or non-content)evidence (content or non-content)
Request does not compel the disclosure of the records,Request does not compel the disclosure of the records,
but freezes them pending legal processbut freezes them pending legal process
50
Preservation of EvidencePreservation of Evidence
Must be very fast (not require prior judicialMust be very fast (not require prior judicial
approval or even written process)approval or even written process)
Few privacy concerns because no disclosureFew privacy concerns because no disclosure
occursoccurs
COE Convention: does not require dualCOE Convention: does not require dual
criminality because of need to preserve datacriminality because of need to preserve data
quickly (disclosure, however, requires dualquickly (disclosure, however, requires dual
criminality)criminality)
51
Preservation of EvidencePreservation of Evidence
Sample Laws ā€“ United StatesSample Laws ā€“ United States
A provider of ā€¦ communication services,A provider of ā€¦ communication services,
upon the request of a government entity, shallupon the request of a government entity, shall
take all necessary steps to preserve records ortake all necessary steps to preserve records or
other evidence in its possession pending theother evidence in its possession pending the
issuance of a court order or other process.ā€issuance of a court order or other process.ā€
ļ® Lasts for 90 days and can be renewedLasts for 90 days and can be renewed
52
OverviewOverview
I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety
II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority
III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications
IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time
V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network
VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a
Computer NetworkComputer Network
VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic
EvidenceEvidence
53
Compelling Disclosure of Electronic EvidenceCompelling Disclosure of Electronic Evidence
in the Possession of the Targetin the Possession of the Target
Generally rules that pertain to search of a home orGenerally rules that pertain to search of a home or
office applyoffice apply
Have to assure that the law is broad enough to coverHave to assure that the law is broad enough to cover
collection of intangible data and not just physical itemscollection of intangible data and not just physical items
Compare:Compare:
E.g.: Computer used to store child pornography or otherE.g.: Computer used to store child pornography or other
evidenceevidence
E.g.: Computer used to break into bank to steal accountE.g.: Computer used to break into bank to steal account
information or move funds from one account to anotherinformation or move funds from one account to another
54
Seizing ComputerHardwareSeizing ComputerHardware
Council of Europe Convention, Article 19Council of Europe Convention, Article 19
Often investigators need to seize the computerOften investigators need to seize the computer
itselfitself
Easy to apply traditional rules for objectsEasy to apply traditional rules for objects
Not clear why a computer should get greater orNot clear why a computer should get greater or
lesser protection than a filing cabinetlesser protection than a filing cabinet
55
Searches and Seizures of Stored DataSearches and Seizures of Stored Data
and Intangible Evidenceand Intangible Evidence
Investigators could simply copy computer filesInvestigators could simply copy computer files
after entering an individualā€™s homeafter entering an individualā€™s home
Data stored at home can be extremely sensitive (e.g.,Data stored at home can be extremely sensitive (e.g.,
a diary, a will)a diary, a will)
Recommendation: treat data as a ā€œthingā€ to beRecommendation: treat data as a ā€œthingā€ to be
seized, even if only a copy is madeseized, even if only a copy is made
But: ā€œimagingā€ a drive should be a permissibleBut: ā€œimagingā€ a drive should be a permissible
search techniquesearch technique
Technical considerations, e.g., OSTechnical considerations, e.g., OS
Slack space and deleted filesSlack space and deleted files
56
Considerations forSearches and SeizuresConsiderations forSearches and Seizures
of Intangible Evidenceof Intangible Evidence
Applying the traditional rules provides balanceApplying the traditional rules provides balance
and certaintyand certainty
Unwise not to protect that data from over-intrusiveUnwise not to protect that data from over-intrusive
governmental searchesgovernmental searches
Also unwise not to give law enforcement the powerAlso unwise not to give law enforcement the power
to obtain that evidenceto obtain that evidence
Easier for investigators to learnEasier for investigators to learn
Use existing exceptions as wellUse existing exceptions as well
E.g.: consent, emergency circumstancesE.g.: consent, emergency circumstances
57
Considerations forSearches andConsiderations forSearches and
Seizures of Intangible EvidenceSeizures of Intangible Evidence
Why computer searches are different:Why computer searches are different:
Computers hold huge amounts of dataComputers hold huge amounts of data
10 gigabyte drive = 5 million pages10 gigabyte drive = 5 million pages
Requires expertise and tools, e.g. deleted files,Requires expertise and tools, e.g. deleted files,
familiarity with Operating Systemfamiliarity with Operating System
Information can be stored remotelyInformation can be stored remotely
Computers are multi-functional ā€“ interminglingComputers are multi-functional ā€“ intermingling
of innocent and privileged informationof innocent and privileged information
58
ConclusionConclusion
Countries must have laws that allow lawCountries must have laws that allow law
enforcement to compel disclosure of evidence ofenforcement to compel disclosure of evidence of
crimecrime
These powers in part enhance privacy by deterringThese powers in part enhance privacy by deterring
criminal invasions of privacycriminal invasions of privacy
Overly intrusive powers can harm the privacy ofOverly intrusive powers can harm the privacy of
citizens and chill economic developmentcitizens and chill economic development
Law makers must consider many factors whenLaw makers must consider many factors when
deciding what is appropriate for themdeciding what is appropriate for them
Models from other jurisdictions can assist countriesModels from other jurisdictions can assist countries
in designing appropriate lawsin designing appropriate laws
59
Questions?Questions?
60
Todd M. HinnenTodd M. Hinnen
Department of JusticeDepartment of Justice
Computer Crime & Intellectual PropertyComputer Crime & Intellectual Property
SectionSection
Phone: (202) 305-7747Phone: (202) 305-7747
E-mail: todd.m.hinnen@usdoj.govE-mail: todd.m.hinnen@usdoj.gov

More Related Content

What's hot

White House IP Enforcement Coordinator Requests Comments on Development of St...
White House IP Enforcement Coordinator Requests Comments on Development of St...White House IP Enforcement Coordinator Requests Comments on Development of St...
White House IP Enforcement Coordinator Requests Comments on Development of St...Patton Boggs LLP
Ā 
Acordo Comercial EUA e China
Acordo Comercial EUA e ChinaAcordo Comercial EUA e China
Acordo Comercial EUA e ChinaFƔbio Santos
Ā 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010kapil_arora
Ā 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
Ā 
Safeguarding Client Info and File Retention
Safeguarding Client Info and File RetentionSafeguarding Client Info and File Retention
Safeguarding Client Info and File RetentionDowney Law Group LLC
Ā 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
Ā 
Men Sta Ana III - PWYP Montreal Conference 2009
Men Sta Ana III - PWYP Montreal Conference 2009Men Sta Ana III - PWYP Montreal Conference 2009
Men Sta Ana III - PWYP Montreal Conference 2009Publish What You Pay
Ā 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinetAlex Taremwa
Ā 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315Colin Zick
Ā 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
Ā 
Legislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallLegislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallInternet Law Center
Ā 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
Ā 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Ā 
Understanding fatca icatt 07-01-15
Understanding fatca   icatt 07-01-15Understanding fatca   icatt 07-01-15
Understanding fatca icatt 07-01-15Derren Joseph
Ā 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
Ā 
Regulatory compliance 2018
Regulatory compliance 2018Regulatory compliance 2018
Regulatory compliance 2018ProColombia
Ā 
Law firm data privacy by dave cunningham
Law firm data privacy by dave cunninghamLaw firm data privacy by dave cunningham
Law firm data privacy by dave cunninghamDavid Cunningham
Ā 
Ten Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IITen Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IIRyan K. Hew
Ā 

What's hot (20)

White House IP Enforcement Coordinator Requests Comments on Development of St...
White House IP Enforcement Coordinator Requests Comments on Development of St...White House IP Enforcement Coordinator Requests Comments on Development of St...
White House IP Enforcement Coordinator Requests Comments on Development of St...
Ā 
OTN Special Update - SOPA Put on Hold (2012-02-20)
OTN Special Update - SOPA Put on Hold (2012-02-20)OTN Special Update - SOPA Put on Hold (2012-02-20)
OTN Special Update - SOPA Put on Hold (2012-02-20)
Ā 
Acordo Comercial EUA e China
Acordo Comercial EUA e ChinaAcordo Comercial EUA e China
Acordo Comercial EUA e China
Ā 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010
Ā 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Ā 
Safeguarding Client Info and File Retention
Safeguarding Client Info and File RetentionSafeguarding Client Info and File Retention
Safeguarding Client Info and File Retention
Ā 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
Ā 
Men Sta Ana III - PWYP Montreal Conference 2009
Men Sta Ana III - PWYP Montreal Conference 2009Men Sta Ana III - PWYP Montreal Conference 2009
Men Sta Ana III - PWYP Montreal Conference 2009
Ā 
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
2010-06 analysis of laws inconsistent with human rights in uganda_hurinet
Ā 
C Zick Foley Hoag FEI presentation 111315
C  Zick Foley Hoag FEI presentation 111315C  Zick Foley Hoag FEI presentation 111315
C Zick Foley Hoag FEI presentation 111315
Ā 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
Ā 
Legislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallLegislative Update - TIP Monthly Call
Legislative Update - TIP Monthly Call
Ā 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
Ā 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
Ā 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Ā 
Understanding fatca icatt 07-01-15
Understanding fatca   icatt 07-01-15Understanding fatca   icatt 07-01-15
Understanding fatca icatt 07-01-15
Ā 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
Ā 
Regulatory compliance 2018
Regulatory compliance 2018Regulatory compliance 2018
Regulatory compliance 2018
Ā 
Law firm data privacy by dave cunningham
Law firm data privacy by dave cunninghamLaw firm data privacy by dave cunningham
Law firm data privacy by dave cunningham
Ā 
Ten Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part IITen Laws Internet Businesses Should Consider Part II
Ten Laws Internet Businesses Should Consider Part II
Ā 

Similar to Developing a Legal Framework to Combat Cybercrime

Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
Ā 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )Megan Espinoza
Ā 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in governmentJacqueline Fick
Ā 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
Ā 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareNationalUnderwriter
Ā 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Lance Michalson
Ā 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
Ā 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoJoel A. GĆ³mez TreviƱo
Ā 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
Ā 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
Ā 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
Ā 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventBarry Schuman
Ā 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agendanationalconsumersleague
Ā 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential informationAltacit Global
Ā 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
Ā 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? Abraham Vergis
Ā 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...Timothy Holborn
Ā 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data BreachShawn Tuma
Ā 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmineEvelyne Oreskovich
Ā 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
Ā 

Similar to Developing a Legal Framework to Combat Cybercrime (20)

Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
Ā 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
Ā 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in government
Ā 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
Ā 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
Ā 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
Ā 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
Ā 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
Ā 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Ā 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
Ā 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
Ā 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Ā 
National Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy AgendaNational Consumers League's 2015 Cybersecurity Policy Agenda
National Consumers League's 2015 Cybersecurity Policy Agenda
Ā 
Trade secrets vs. confidential information
Trade secrets vs. confidential informationTrade secrets vs. confidential information
Trade secrets vs. confidential information
Ā 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
Ā 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
Ā 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
Ā 
Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
Ā 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
Ā 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
Ā 

More from Marcelo Gomes Freire

More from Marcelo Gomes Freire (20)

Aircraft Airworthiness
Aircraft AirworthinessAircraft Airworthiness
Aircraft Airworthiness
Ā 
Child Rights Toolkit
Child Rights ToolkitChild Rights Toolkit
Child Rights Toolkit
Ā 
Marijuana in Uruguay and beyond
Marijuana in Uruguay and beyondMarijuana in Uruguay and beyond
Marijuana in Uruguay and beyond
Ā 
Immigration
ImmigrationImmigration
Immigration
Ā 
Decriminalization of Drugs in Portugal
Decriminalization of Drugs in PortugalDecriminalization of Drugs in Portugal
Decriminalization of Drugs in Portugal
Ā 
Civil law codes
Civil law codesCivil law codes
Civil law codes
Ā 
American Airlines
American AirlinesAmerican Airlines
American Airlines
Ā 
Experience and Implication
Experience and ImplicationExperience and Implication
Experience and Implication
Ā 
South Koreaā€™s Foreign Relations
South Koreaā€™s Foreign RelationsSouth Koreaā€™s Foreign Relations
South Koreaā€™s Foreign Relations
Ā 
Cuba under Castro
Cuba under Castro Cuba under Castro
Cuba under Castro
Ā 
Latin American Governments
Latin American GovernmentsLatin American Governments
Latin American Governments
Ā 
Cuban revolution
Cuban revolution Cuban revolution
Cuban revolution
Ā 
Thailand: an overview
Thailand: an overviewThailand: an overview
Thailand: an overview
Ā 
SWOT Analysis: Thailand
SWOT Analysis: ThailandSWOT Analysis: Thailand
SWOT Analysis: Thailand
Ā 
Business Law
Business LawBusiness Law
Business Law
Ā 
The Chicago Convention
The Chicago ConventionThe Chicago Convention
The Chicago Convention
Ā 
To Privatize or Not to Privatize, that is the Question
To Privatize or Not to Privatize, that is the QuestionTo Privatize or Not to Privatize, that is the Question
To Privatize or Not to Privatize, that is the Question
Ā 
7th ESPI Autumn Conference
7th ESPI Autumn Conference7th ESPI Autumn Conference
7th ESPI Autumn Conference
Ā 
Get on the Fast-Track
Get on the Fast-TrackGet on the Fast-Track
Get on the Fast-Track
Ā 
Work on development from a human rights perspective
Work on development from a human rights perspective Work on development from a human rights perspective
Work on development from a human rights perspective
Ā 

Recently uploaded

定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€Fs
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
Ā 
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts servicesonalikaur4
Ā 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
Ā 
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Roomishabajaj13
Ā 
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
Ā 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
Ā 
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Delivery
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on DeliveryCall Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Delivery
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Deliverybabeytanya
Ā 
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataVIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€Fs
Ā 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
Ā 
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
Ā 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
Ā 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
Ā 

Recently uploaded (20)

定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
Ā 
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts serviceChennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Chennai Call Girls Porur Phone šŸ† 8250192130 šŸ‘… celebrity escorts service
Ā 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
Ā 
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake šŸ‘‰ 8250192130 Available With Room
Ā 
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
Ā 
young call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Serviceyoung call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Service
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
Ā 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
Ā 
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Delivery
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on DeliveryCall Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Delivery
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Delivery
Ā 
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataVIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
Ā 
Hot Sexy call girls in Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in  Rk Puram šŸ” 9953056974 šŸ” Delhi escort ServiceHot Sexy call girls in  Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
Ā 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
Ā 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Ā 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
Ā 

Developing a Legal Framework to Combat Cybercrime

  • 1. 1 DEVELOPING A LEGALDEVELOPING A LEGAL FRAMEWORKTO COMBATFRAMEWORKTO COMBAT CYBERCRIMECYBERCRIME Providing Law Enforcement with the Legal ToolsProviding Law Enforcement with the Legal Tools to Prevent, Investigate, and Prosecute Cybercrimeto Prevent, Investigate, and Prosecute Cybercrime Marcelo Gomes FreireMarcelo Gomes Freire
  • 2. 2 OverviewOverview I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a Computer NetworkComputer Network VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic EvidenceEvidence
  • 3. 3 OverviewOverview I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a Computer NetworkComputer Network VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic EvidenceEvidence
  • 4. 4 Balancing Privacy & Public SafetyBalancing Privacy & Public Safety Privacy is a basic human rightPrivacy is a basic human right ā€œā€œNo one shall be subjected to arbitraryNo one shall be subjected to arbitrary interference with his privacy, family, homeinterference with his privacy, family, home or correspondence...ā€or correspondence...ā€ -- Art. XII, Universal Declaration of Human Rights-- Art. XII, Universal Declaration of Human Rights Promotes free thought, free expression, andPromotes free thought, free expression, and free association, building blocks of democracyfree association, building blocks of democracy Supports competitive businesses and markets,Supports competitive businesses and markets, cornerstone of a robust economycornerstone of a robust economy
  • 5. 5 Balancing Privacy & Public SafetyBalancing Privacy & Public Safety Privacy of computer networks is important:Privacy of computer networks is important: Individuals, businesses, and governments increasinglyIndividuals, businesses, and governments increasingly use computers to communicateuse computers to communicate Sensitive personal information and business records areSensitive personal information and business records are stored in electronic formstored in electronic form Privacy of computer networks is importantPrivacy of computer networks is important for human rights, individual freedoms, andfor human rights, individual freedoms, and economic efficiencyeconomic efficiency
  • 6. 6 Balancing Privacy & Public SafetyBalancing Privacy & Public Safety Threats to online privacy:Threats to online privacy: IndustryIndustry Gathering marketing informationGathering marketing information GovernmentGovernment Investigating crime, espionage, or terrorismInvestigating crime, espionage, or terrorism Misusing legal investigative authoritiesMisusing legal investigative authorities CriminalsCriminals Stealing government or business secrets or financialStealing government or business secrets or financial informationinformation Obtaining private information from individualsā€™ computersObtaining private information from individualsā€™ computers
  • 7. 7 Balancing Privacy & Public SafetyBalancing Privacy & Public Safety Need to investigate all kinds of crimes thatNeed to investigate all kinds of crimes that involve computer networksinvolve computer networks E.g.: communications of terrorists or drug dealersE.g.: communications of terrorists or drug dealers Need to investigate attempts to damageNeed to investigate attempts to damage computer networkscomputer networks E.g.: ā€œI love youā€ virusE.g.: ā€œI love youā€ virus Need to investigate invasions of privacyNeed to investigate invasions of privacy E.g.: hackers working for organized crime stealingE.g.: hackers working for organized crime stealing credit card numberscredit card numbers
  • 8. 8 OverviewOverview I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a Computer NetworkComputer Network VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic EvidenceEvidence
  • 9. 9 Limited Law Enforcement AuthorityLimited Law Enforcement Authority Striking the Balance:Striking the Balance: Government investigative authority subject toGovernment investigative authority subject to appropriate limits and controls in the form ofappropriate limits and controls in the form of procedural laws will increase privacy and publicprocedural laws will increase privacy and public safety, but . . .safety, but . . . Uncontrolled government authority mayUncontrolled government authority may diminish privacy and hinder economicdiminish privacy and hinder economic development.development.
  • 10. 10 Intrusiveness of the Investigative Power Safeguards to Prevent Governmental Abuse Limited Law Enforcement AuthorityLimited Law Enforcement Authority
  • 11. 11 Limited Law Enforcement AuthorityLimited Law Enforcement Authority Ways to limit law enforcement authorities:Ways to limit law enforcement authorities: Define specific predicate crimes/classes of crimeDefine specific predicate crimes/classes of crime Require law enforcement to demonstrate factualRequire law enforcement to demonstrate factual basis to independent judicial officerbasis to independent judicial officer Limit the breadth and scope, the location, or theLimit the breadth and scope, the location, or the durationduration Offer only as ā€œlast resortā€Offer only as ā€œlast resortā€ Prior approval or subsequent review by seniorPrior approval or subsequent review by senior official or politically accountable bodyofficial or politically accountable body
  • 12. 12 Limited Law Enforcement AuthorityLimited Law Enforcement Authority Penalizing abuse:Penalizing abuse: Administrative discipline of officer involvedAdministrative discipline of officer involved Inability to use evidence in prosecutionInability to use evidence in prosecution (ā€œsuppressionā€)(ā€œsuppressionā€) Civil liability for officer involvedCivil liability for officer involved Criminal sanction of officer involvedCriminal sanction of officer involved
  • 13. 13 Limited Law Enforcement AuthorityLimited Law Enforcement Authority Limiting Economic Burdens on Third PartyLimiting Economic Burdens on Third Party Service Providers:Service Providers: Should laws require providers to have certainShould laws require providers to have certain technical capabilities?technical capabilities? Who is responsible for costs of collecting dataWho is responsible for costs of collecting data for law enforcement?for law enforcement?
  • 14. 14 OtherPolicy ConsiderationsOtherPolicy Considerations Each country should approach this complex balancingEach country should approach this complex balancing question, taking into consideration:question, taking into consideration: The scope of its crime and terrorism problem;The scope of its crime and terrorism problem; Its existing legal structures;Its existing legal structures; Its historical methods of protecting human rights; and,Its historical methods of protecting human rights; and, the need to assist foreign governments.the need to assist foreign governments. Each country should decide the ā€œmeansā€ forEach country should decide the ā€œmeansā€ for obtainingobtaining electronic evidence within its existing legalelectronic evidence within its existing legal framework (e.g., constitutions, statutes, courtframework (e.g., constitutions, statutes, court decisions, rules of procedure)decisions, rules of procedure)
  • 15. 15 OverviewOverview I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a Computer NetworkComputer Network VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic EvidenceEvidence
  • 16. 16 Information Obtained fromComputerNetworksInformation Obtained fromComputerNetworks in Cybercrime Investigationsin Cybercrime Investigations ContentContent Non-ContentNon-Content Real-TimeReal-Time CommunicationsCommunications 11 22 Information StoredInformation Stored on a Computeron a Computer NetworkNetwork 33 44
  • 17. 17 ContentContent Non-ContentNon-Content Real-TimeReal-Time CommunicationsCommunications 11 22 Information StoredInformation Stored on a Computeron a Computer NetworkNetwork 33 44 Information Obtained fromComputerNetworksInformation Obtained fromComputerNetworks in Cybercrime Investigationsin Cybercrime Investigations
  • 18. 18 Intercepting Electronic Communications onIntercepting Electronic Communications on ComputerNetworksComputerNetworks Obtaining the content of a communication as theObtaining the content of a communication as the communication occurscommunication occurs Similar to intercepting whatā€™s being said in a phoneSimilar to intercepting whatā€™s being said in a phone conversationconversation E.g.: collect the content of e-mail passing between twoE.g.: collect the content of e-mail passing between two terrorists or drug dealersterrorists or drug dealers E.g.: collect the commands sent by a hacker to a victimE.g.: collect the commands sent by a hacker to a victim computer to steal corporate informationcomputer to steal corporate information
  • 19. 19 Intercepting Electronic Communications onIntercepting Electronic Communications on ComputerNetworksComputerNetworks Many countries use the same (or very similar) rules asMany countries use the same (or very similar) rules as phone wiretapsphone wiretaps Authority should include the ability to compel providersAuthority should include the ability to compel providers to assist law enforcement officialsto assist law enforcement officials Sometimes does not require law enforcement expertiseSometimes does not require law enforcement expertise May depend on particular technology and infrastructureMay depend on particular technology and infrastructure Art. 21, Council of Europe Convention on CybercrimeArt. 21, Council of Europe Convention on Cybercrime
  • 20. 20 Intercepting Electronic Communications onIntercepting Electronic Communications on ComputerNetworksComputerNetworks Law enforcement needs this authority because:Law enforcement needs this authority because: Criminals and terrorists increasingly use electronicCriminals and terrorists increasingly use electronic communications to plan and execute crimescommunications to plan and execute crimes Many crimes are committed mostly (or entirely) usingMany crimes are committed mostly (or entirely) using computer networkscomputer networks Distribution of child pornography, internet fraud, hackingDistribution of child pornography, internet fraud, hacking Communications may not be storedCommunications may not be stored
  • 21. 21 Intercepting Electronic Communications onIntercepting Electronic Communications on ComputerNetworksComputerNetworks This authority should be limited because:This authority should be limited because: Interception of communications can be a grave invasionInterception of communications can be a grave invasion of privacyof privacy Can allow access to the most private thoughts, harmingCan allow access to the most private thoughts, harming freedoms of speech and associationfreedoms of speech and association Fear of overly intrusive interception may stifleFear of overly intrusive interception may stifle competitive markets, economic development, andcompetitive markets, economic development, and foreign investmentforeign investment
  • 22. 22 Examples of Limitations on InterceptionExamples of Limitations on Interception Authorities ā€“ AustraliaAuthorities ā€“ Australia Independent judicial reviewIndependent judicial review Facts in support of anFacts in support of an application showing thatapplication showing that intercepted communicationsintercepted communications would ā€œbe likely to assistā€ inwould ā€œbe likely to assistā€ in an investigationan investigation Investigation of a seriousInvestigation of a serious crime (generally 7+ yearscrime (generally 7+ years maximum incarceration)maximum incarceration) 90 day maximum (renewable)90 day maximum (renewable) Information interceptedInformation intercepted unlawfully cannot be used asunlawfully cannot be used as evidence in courtevidence in court Intercepted information hasIntercepted information has certain disclosure restrictionscertain disclosure restrictions and destruction after purpose isand destruction after purpose is completecomplete Judge must balance surroundingJudge must balance surrounding circumstances:circumstances: Whether other investigativeWhether other investigative techniques would not be justtechniques would not be just as effectiveas effective The value of the informationThe value of the information Gravity of the conductGravity of the conduct The privacy invasionThe privacy invasion
  • 23. 23 Examples of Limitations on InterceptionExamples of Limitations on Interception Authorities ā€“ the United StatesAuthorities ā€“ the United States 30 day time limit (plus30 day time limit (plus extensions)extensions) ā€œā€œProbable causeā€ to believe aProbable causeā€ to believe a crime is being committedcrime is being committed andand that the facility is being usedthat the facility is being used in furtherance of that crimein furtherance of that crime All other options have beenAll other options have been tried or are unlikely totried or are unlikely to succeedsucceed Independent judicial reviewIndependent judicial review Report to intercepted partiesReport to intercepted parties (at conclusion of case)(at conclusion of case) Inability to use evidence inInability to use evidence in court if violate the lawcourt if violate the law Administrative investigationAdministrative investigation of misuse of the law requiredof misuse of the law required Civil and criminal sanctionsCivil and criminal sanctions for violationsfor violations Approval by high-levelApproval by high-level officialofficial Minimize collection of non-Minimize collection of non- criminal communicationscriminal communications Limitations on disclosure ofLimitations on disclosure of intercepted communicationsintercepted communications
  • 24. 24 Possible Exceptions to the RulePossible Exceptions to the Rule Might not require legal process if:Might not require legal process if: The communication is publicly accessibleThe communication is publicly accessible E.g.: public ā€œchatā€ roomsE.g.: public ā€œchatā€ rooms Party/all parties to the communication consentParty/all parties to the communication consent Actual consent (CI), bannerActual consent (CI), banner Emergency involving risk of deathEmergency involving risk of death No reason to believe communication is privateNo reason to believe communication is private Hackers communication with target computerHackers communication with target computer
  • 25. 25 Intercepting Electronic Communications:Intercepting Electronic Communications: OtherConsiderationsOtherConsiderations Limits on ISPā€™s interceptionLimits on ISPā€™s interception Possible exceptions for consent, interceptions necessaryPossible exceptions for consent, interceptions necessary to run or secure a networkto run or secure a network Voluntary disclosure of intercepted communicationVoluntary disclosure of intercepted communication Only if legal interception (i.e. subject to exception)Only if legal interception (i.e. subject to exception)
  • 26. 26 OverviewOverview I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a Computer NetworkComputer Network VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic EvidenceEvidence
  • 27. 27 Collecting Traffic Data Real TimeCollecting Traffic Data Real Time ContentContent Non-ContentNon-Content Real-TimeReal-Time CommunicationsCommunications 11 22 Stored InformationStored Information on a Networkon a Network 33 44
  • 28. 28 Collecting Traffic Data Real TimeCollecting Traffic Data Real Time Interception of non-content informationInterception of non-content information Similar to phone number called to/fromSimilar to phone number called to/from E.g.: ā€œToā€ and ā€œFromā€ on an e-mailE.g.: ā€œToā€ and ā€œFromā€ on an e-mail E.g.: Source and destination IP address in a packet headerE.g.: Source and destination IP address in a packet header Less intrusive than intercepting content, so lessLess intrusive than intercepting content, so less restrictions on law enforcement userestrictions on law enforcement use Art. 20, Council of Europe Convention on CybercrimeArt. 20, Council of Europe Convention on Cybercrime
  • 29. 29 Collecting Traffic Data Real TimeCollecting Traffic Data Real Time Law enforcement needs this authority because:Law enforcement needs this authority because: Criminals and terrorists increasingly use electronicCriminals and terrorists increasingly use electronic communications to plan and execute serious crimescommunications to plan and execute serious crimes Helps locate suspects, identify members of conspiracyHelps locate suspects, identify members of conspiracy Useful tool to assist foreign investigations where aUseful tool to assist foreign investigations where a country is used only as a ā€œpass-thoughā€country is used only as a ā€œpass-thoughā€ Provides a less intrusive and therefore less restrictedProvides a less intrusive and therefore less restricted alternative to content interceptionalternative to content interception
  • 30. 30 Collecting Traffic Data Real TimeCollecting Traffic Data Real Time This authority should be limited because:This authority should be limited because: Although less intrusive than content interception, stillAlthough less intrusive than content interception, still implicates privacyimplicates privacy Individuals donā€™t expect government to keep track of whoIndividuals donā€™t expect government to keep track of who theyā€™re calling, even if government does not listen to whattheyā€™re calling, even if government does not listen to what theyā€™re sayingtheyā€™re saying To/From information may be revealing (e.g., repeated e-To/From information may be revealing (e.g., repeated e- mails to a psychiatrist; receiving information from a militantmails to a psychiatrist; receiving information from a militant organization)organization)
  • 31. 31 Collecting Traffic Data Real TimeCollecting Traffic Data Real Time Sample Laws ā€“ United KingdomSample Laws ā€“ United Kingdom Information must be ā€œnecessaryā€ for theInformation must be ā€œnecessaryā€ for the investigation of crime, protection of nationalinvestigation of crime, protection of national security, public health, other specified purposessecurity, public health, other specified purposes Approval by a designated high-level governmentApproval by a designated high-level government official, but no independent judicial reviewofficial, but no independent judicial review Collection must be ā€œproportionate to what isCollection must be ā€œproportionate to what is sought to be achievedā€sought to be achievedā€ 30 day time limit30 day time limit
  • 32. 32 Collecting Traffic Data Real TimeCollecting Traffic Data Real Time Sample Laws ā€“ United StatesSample Laws ā€“ United States Information collected must be ā€œrelevantā€ to anInformation collected must be ā€œrelevantā€ to an ongoing criminal investigationongoing criminal investigation Can only be applied for by an attorney for theCan only be applied for by an attorney for the government (not a police officer)government (not a police officer) Limited to 60 days (plus extensions)Limited to 60 days (plus extensions) Disciplinary, civil, and criminal penalties forDisciplinary, civil, and criminal penalties for misusemisuse
  • 33. 33 Possible Exceptions to the RulePossible Exceptions to the Rule Might not require legal process if:Might not require legal process if: Party/all parties to the communication consentParty/all parties to the communication consent E.g.: witness cooperating with the governmentE.g.: witness cooperating with the government allows officers to determine where conspiratorsā€™ e-allows officers to determine where conspiratorsā€™ e- mail is sent frommail is sent from No reason to believe communication is privateNo reason to believe communication is private Hackers communication with target computerHackers communication with target computer Interception is by provider of computing serviceInterception is by provider of computing service in order to run the system or provide securityin order to run the system or provide security
  • 34. 34 OverviewOverview I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a Computer NetworkComputer Network VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic EvidenceEvidence
  • 35. 35 Obtaining Content InformationObtaining Content Information Stored on a ComputerNetworkStored on a ComputerNetwork ContentContent Non-ContentNon-Content Real-TimeReal-Time CommunicationsCommunications 11 22 Information StoredInformation Stored on a Computeron a Computer NetworkNetwork 33 44
  • 36. 36 Obtaining the Content of StoredObtaining the Content of Stored Information on ComputerNetworksInformation on ComputerNetworks Information stored on the system of a third-partyInformation stored on the system of a third-party providerprovider Computer network not owned by the target of anComputer network not owned by the target of an investigationinvestigation E.g.: e-mail sent to an individual that is stored by anE.g.: e-mail sent to an individual that is stored by an Internet service providerInternet service provider E.g.: calendar kept on a remote serviceE.g.: calendar kept on a remote service
  • 37. 37 Obtaining the Content of StoredObtaining the Content of Stored Information on ComputerNetworksInformation on ComputerNetworks Laws may be similar to those for searching or seizingLaws may be similar to those for searching or seizing computers in the possession of the target of ancomputers in the possession of the target of an investigationinvestigation But because the information is held by a neutral thirdBut because the information is held by a neutral third party, physical coerciveness of regular search proceduresparty, physical coerciveness of regular search procedures may not be necessarymay not be necessary Also, because the data is not in the immediate control (e.g.Also, because the data is not in the immediate control (e.g. home) of the individual, he or she may have less of ahome) of the individual, he or she may have less of a privacy interest in itprivacy interest in it Art. 18, Council of Europe Convention on CybercrimeArt. 18, Council of Europe Convention on Cybercrime
  • 38. 38 Obtaining the Content of StoredObtaining the Content of Stored Information on ComputerNetworksInformation on ComputerNetworks Law enforcement needs this authority because:Law enforcement needs this authority because: Without it, serious crimes will go unpunished andWithout it, serious crimes will go unpunished and undeterredundeterred Just as law enforcement has needed coercive power toJust as law enforcement has needed coercive power to gather evidence in ā€œreal worldā€ contexts, so it must begather evidence in ā€œreal worldā€ contexts, so it must be able to do so in online contextsable to do so in online contexts For the many crimes committed over the Internet,For the many crimes committed over the Internet, stored information is the ā€œcrime sceneā€stored information is the ā€œcrime sceneā€
  • 39. 39 Obtaining the Content of StoredObtaining the Content of Stored Information on ComputerNetworksInformation on ComputerNetworks This authority should be limited because:This authority should be limited because: As our countries enter the ā€œInformation Age,ā€As our countries enter the ā€œInformation Age,ā€ more and more of the most sensitive data is beingmore and more of the most sensitive data is being stored on computersstored on computers Businesses are increasingly using computer networks toBusinesses are increasingly using computer networks to store datastore data Individuals are increasingly storing information andIndividuals are increasingly storing information and communications remotely on third-party networkscommunications remotely on third-party networks
  • 40. 40 Obtaining Stored ContentObtaining Stored Content Sample Laws ā€“ United StatesSample Laws ā€“ United States To compel disclosure of most kinds of e-mail:To compel disclosure of most kinds of e-mail: ā€œā€œProbable causeā€ to believe it contains evidence of aProbable causeā€ to believe it contains evidence of a crime (same standard as to search a package or a house)crime (same standard as to search a package or a house) Review of evidence by an independent judgeReview of evidence by an independent judge Administrative sanctions against officers who abuse theAdministrative sanctions against officers who abuse the authorityauthority Civil suit against the government for misuseCivil suit against the government for misuse Disclosure restrictionsDisclosure restrictions
  • 41. 41 Obtaining Stored ContentObtaining Stored Content Do some categories of data deserve extra protection?Do some categories of data deserve extra protection? Greater expectation that data will remain privateGreater expectation that data will remain private Has the user any choice about whether theHas the user any choice about whether the information is stored on the network?information is stored on the network? Example of graduated system of requirements ā€“ UnitedExample of graduated system of requirements ā€“ United StatesStates Unopened e-mail requires a search warrant based uponUnopened e-mail requires a search warrant based upon ā€œprobable causeā€ā€œprobable causeā€ E-mail accessed by the user and other information the userE-mail accessed by the user and other information the user chooses to store on a remote server requires a court orderchooses to store on a remote server requires a court order with only a showing of ā€œrelevanceā€with only a showing of ā€œrelevanceā€
  • 42. 42 Obtaining Stored ContentObtaining Stored Content Consider allowing voluntary disclosure to lawConsider allowing voluntary disclosure to law enforcement under some circumstances:enforcement under some circumstances: Unrestricted disclosure by 3Unrestricted disclosure by 3rdrd -party providers may-party providers may infringe upon privacy and have economic impact,infringe upon privacy and have economic impact, but disclosure may be justifiedbut disclosure may be justified To protect public health or safetyTo protect public health or safety To allow the provider to protect its property (e.g., byTo allow the provider to protect its property (e.g., by reporting unauthorized use)reporting unauthorized use)
  • 43. 43 OverviewOverview I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a Computer NetworkComputer Network VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic EvidenceEvidence
  • 44. 44 Obtaining Non-Content InformationObtaining Non-Content Information Stored on a ComputerNetworkStored on a ComputerNetwork ContentContent Non-ContentNon-Content Real-TimeReal-Time CommunicationsCommunications 11 22 Information StoredInformation Stored on a Computeron a Computer NetworkNetwork 33 44
  • 45. 45 Obtaining Non-Content Information Stored onObtaining Non-Content Information Stored on a ComputerNetworka ComputerNetwork Computers create logs showing whereComputers create logs showing where communications came from and where they wentcommunications came from and where they went Generally less sensitive than contentGenerally less sensitive than content E.g.: a list of all of the e-mail addresses to whichE.g.: a list of all of the e-mail addresses to which a user sent e-maila user sent e-mail E.g.: a log showing the phone numbers by whichE.g.: a log showing the phone numbers by which a user accessed an Internet service providera user accessed an Internet service provider
  • 46. 46 Obtaining Non-Content Information Stored onObtaining Non-Content Information Stored on a ComputerNetworka ComputerNetwork Law enforcement needs this authority because:Law enforcement needs this authority because: ļ® Logs showing what occurred on a network mayLogs showing what occurred on a network may be the best evidence of a computer crime; maybe the best evidence of a computer crime; may identify the suspect or reveal criminal conductidentify the suspect or reveal criminal conduct This authority should be limited because:This authority should be limited because: ļ® Although less sensitive than content, theseAlthough less sensitive than content, these records still contain private informationrecords still contain private information
  • 47. 47 Obtaining Stored Non-Content InformationObtaining Stored Non-Content Information Laws Can Distinguish Between Kinds of RecordsLaws Can Distinguish Between Kinds of Records:: Subscriber information generally less sensitiveSubscriber information generally less sensitive Name, street address, user nameName, street address, user name Might include method of payment, i.e., credit card orMight include method of payment, i.e., credit card or bank account (important because ISPs may not checkbank account (important because ISPs may not check usersā€™ identities)usersā€™ identities) Logs showing with whom a user hasLogs showing with whom a user has communicated generally more sensitivecommunicated generally more sensitive
  • 48. 48 Obtaining Stored Non-Content InformationObtaining Stored Non-Content Information Examples of Different StandardsExamples of Different Standards Art. 18, Council of Europe Convention on Cybercrime:Art. 18, Council of Europe Convention on Cybercrime: Treats ā€œSubscriber Informationā€ differently from other dataTreats ā€œSubscriber Informationā€ differently from other data ļ® United States:United States: ļ® Basic subscriber records require a mere showing ofBasic subscriber records require a mere showing of ā€œrelevanceā€ to a criminal investigation without prior review byā€œrelevanceā€ to a criminal investigation without prior review by a court (subpoena)a court (subpoena) ļ® E-mail logs require a prior finding of ā€œspecific and articulableE-mail logs require a prior finding of ā€œspecific and articulable factsā€ that would justify disclosure of the recordsfactsā€ that would justify disclosure of the records
  • 49. 49 Preservation of EvidencePreservation of Evidence Problem: many stored records last only for weeks orProblem: many stored records last only for weeks or daysdays Obtaining legal process is often slowObtaining legal process is often slow Investigators may not even know the significance of evidenceInvestigators may not even know the significance of evidence until weeks or days after the commission of a crimeuntil weeks or days after the commission of a crime Critical tool: request by law enforcement to preserveCritical tool: request by law enforcement to preserve evidence (content or non-content)evidence (content or non-content) Request does not compel the disclosure of the records,Request does not compel the disclosure of the records, but freezes them pending legal processbut freezes them pending legal process
  • 50. 50 Preservation of EvidencePreservation of Evidence Must be very fast (not require prior judicialMust be very fast (not require prior judicial approval or even written process)approval or even written process) Few privacy concerns because no disclosureFew privacy concerns because no disclosure occursoccurs COE Convention: does not require dualCOE Convention: does not require dual criminality because of need to preserve datacriminality because of need to preserve data quickly (disclosure, however, requires dualquickly (disclosure, however, requires dual criminality)criminality)
  • 51. 51 Preservation of EvidencePreservation of Evidence Sample Laws ā€“ United StatesSample Laws ā€“ United States A provider of ā€¦ communication services,A provider of ā€¦ communication services, upon the request of a government entity, shallupon the request of a government entity, shall take all necessary steps to preserve records ortake all necessary steps to preserve records or other evidence in its possession pending theother evidence in its possession pending the issuance of a court order or other process.ā€issuance of a court order or other process.ā€ ļ® Lasts for 90 days and can be renewedLasts for 90 days and can be renewed
  • 52. 52 OverviewOverview I.I. Balancing Privacy and Public SafetyBalancing Privacy and Public Safety II.II. Limits on Law Enforcement Investigative AuthorityLimits on Law Enforcement Investigative Authority III.III. Intercepting Electronic CommunicationsIntercepting Electronic Communications IV.IV. Collecting Traffic Data Real TimeCollecting Traffic Data Real Time V.V. Obtaining Content Stored on a Computer NetworkObtaining Content Stored on a Computer Network VI.VI. Obtaining Non-Content Information Stored on aObtaining Non-Content Information Stored on a Computer NetworkComputer Network VII.VII. Compelling the Target to Disclose ElectronicCompelling the Target to Disclose Electronic EvidenceEvidence
  • 53. 53 Compelling Disclosure of Electronic EvidenceCompelling Disclosure of Electronic Evidence in the Possession of the Targetin the Possession of the Target Generally rules that pertain to search of a home orGenerally rules that pertain to search of a home or office applyoffice apply Have to assure that the law is broad enough to coverHave to assure that the law is broad enough to cover collection of intangible data and not just physical itemscollection of intangible data and not just physical items Compare:Compare: E.g.: Computer used to store child pornography or otherE.g.: Computer used to store child pornography or other evidenceevidence E.g.: Computer used to break into bank to steal accountE.g.: Computer used to break into bank to steal account information or move funds from one account to anotherinformation or move funds from one account to another
  • 54. 54 Seizing ComputerHardwareSeizing ComputerHardware Council of Europe Convention, Article 19Council of Europe Convention, Article 19 Often investigators need to seize the computerOften investigators need to seize the computer itselfitself Easy to apply traditional rules for objectsEasy to apply traditional rules for objects Not clear why a computer should get greater orNot clear why a computer should get greater or lesser protection than a filing cabinetlesser protection than a filing cabinet
  • 55. 55 Searches and Seizures of Stored DataSearches and Seizures of Stored Data and Intangible Evidenceand Intangible Evidence Investigators could simply copy computer filesInvestigators could simply copy computer files after entering an individualā€™s homeafter entering an individualā€™s home Data stored at home can be extremely sensitive (e.g.,Data stored at home can be extremely sensitive (e.g., a diary, a will)a diary, a will) Recommendation: treat data as a ā€œthingā€ to beRecommendation: treat data as a ā€œthingā€ to be seized, even if only a copy is madeseized, even if only a copy is made But: ā€œimagingā€ a drive should be a permissibleBut: ā€œimagingā€ a drive should be a permissible search techniquesearch technique Technical considerations, e.g., OSTechnical considerations, e.g., OS Slack space and deleted filesSlack space and deleted files
  • 56. 56 Considerations forSearches and SeizuresConsiderations forSearches and Seizures of Intangible Evidenceof Intangible Evidence Applying the traditional rules provides balanceApplying the traditional rules provides balance and certaintyand certainty Unwise not to protect that data from over-intrusiveUnwise not to protect that data from over-intrusive governmental searchesgovernmental searches Also unwise not to give law enforcement the powerAlso unwise not to give law enforcement the power to obtain that evidenceto obtain that evidence Easier for investigators to learnEasier for investigators to learn Use existing exceptions as wellUse existing exceptions as well E.g.: consent, emergency circumstancesE.g.: consent, emergency circumstances
  • 57. 57 Considerations forSearches andConsiderations forSearches and Seizures of Intangible EvidenceSeizures of Intangible Evidence Why computer searches are different:Why computer searches are different: Computers hold huge amounts of dataComputers hold huge amounts of data 10 gigabyte drive = 5 million pages10 gigabyte drive = 5 million pages Requires expertise and tools, e.g. deleted files,Requires expertise and tools, e.g. deleted files, familiarity with Operating Systemfamiliarity with Operating System Information can be stored remotelyInformation can be stored remotely Computers are multi-functional ā€“ interminglingComputers are multi-functional ā€“ intermingling of innocent and privileged informationof innocent and privileged information
  • 58. 58 ConclusionConclusion Countries must have laws that allow lawCountries must have laws that allow law enforcement to compel disclosure of evidence ofenforcement to compel disclosure of evidence of crimecrime These powers in part enhance privacy by deterringThese powers in part enhance privacy by deterring criminal invasions of privacycriminal invasions of privacy Overly intrusive powers can harm the privacy ofOverly intrusive powers can harm the privacy of citizens and chill economic developmentcitizens and chill economic development Law makers must consider many factors whenLaw makers must consider many factors when deciding what is appropriate for themdeciding what is appropriate for them Models from other jurisdictions can assist countriesModels from other jurisdictions can assist countries in designing appropriate lawsin designing appropriate laws
  • 60. 60 Todd M. HinnenTodd M. Hinnen Department of JusticeDepartment of Justice Computer Crime & Intellectual PropertyComputer Crime & Intellectual Property SectionSection Phone: (202) 305-7747Phone: (202) 305-7747 E-mail: todd.m.hinnen@usdoj.govE-mail: todd.m.hinnen@usdoj.gov

Editor's Notes

  1. Because intercepting an e-mail as its sent across the Internet is very similar to intercepting a phone call as it crosses the telephone wires, many countries use the procedural laws applicable to intercepting phone calls or at least use such laws as a model. Just as a telephone company will often be able to assist law enforcement with a telephone wiretap, an ISP will often be able to provide intercepted electronic communications to law enforcement. In fact, because different ISPs have different network architectures, they may be uniquely qualified to intercept communications. Article 21 of the Council of Europeā€™s Convention on Cybercrime requires each state that signs the convention to adopt procedural laws that vest law enforcement with the authority to intercept the content of communications traveling through computer networks.
  2. We are now going to discuss the legal tools law enforcement needs to effectively combat cybercrime. We begin with the ability to intercept communications as they occur.