leidenlawblog

The advent of cross-border remote searches?

The advent of cross-border remote searches?

Our minister of Safety and Justice sent a letter to Parliament with several far reaching proposals, including the possibility to hack computers in foreign countries in order to gather evidence. This can lead to interesting cross-border legal issues.

Last Monday (15 October 2012) our minister of Safety and Justice (under resignation), Opstelten, sent a letter (.pdf) to Parliament proposing several far reaching investigatory powers to fight cybercrime more effectively. Opstelten suggests incorperating the following investigatory methods in our Code of Criminal Procedure:

  • Remote access to computer systems and the placement of ‘technical devices’ (spyware) in computers.
  • Remote searches in computers, regardless of the location of the computer.
  • Disabling the accessibility of illegal files on computers, regardless of the location of computers.

All of these investigatory methods require an in-depth legal analysis. In this blog post I will only briefly discuss the possibility of cross-border remote searches in computers.

Cross-border remote searches

A cross-border remote search is the collection of evidence via the Internet in computers in other countries. More concretely, based on the letter, I can think of three types of cross-border remote searches that can be distinguished: 1. Using the login name and password of a suspect or hacking an account (accessed by a web portal) of a suspect in order to access and gather evidence from Gmail, Hotmail, or other cloud based online services, 2. Hacking in order to gather evidence from botnets, 3. Hacking a suspect’s personal computer in order to gather evidence remotely.

International criminal law issues

The most interesting legal problem of cross-border remote searches is whether such a search violates the international principle of territoriality and sovereignty of the country in which the data is stored. In the Netherlands we used to uphold a ‘server-orientated jurisdiction principle’, which basically meant that data in servers outside the Dutch territory could not be accessed without permission (before or after the infringement on their territory) or a treaty with the affected state.

It is not clear whether our state authorities are willing to completely let go of the principle, because when ‘the location of a server is clear’ traditional legal aid requests must be used (p. 5 of the letter). According to our minister, the location of a server is unclear in the case of services of cloud providers, because the data changes all the time from different servers at different locations. This is true, but in my opinion it is quite clear where and how evidence can be gathered from cloud service providers. I believe that with article 32(B) of the Convention on Cybercrime many states agreed that data can be gathered directly from companies on a voluntarily basis (and under their own conditions). If they don’t cooperate we can use legal aid requests. Many U.S. companies work well with law enforcement authorities and I wonder whether it is necessary to perform online remote searches in these accounts (although it might be necessary under certain circumstances). I guess the real problem is that Dutch law enforcement authorities want to apply Dutch law and collect evidence possibly located in other countries directly in a criminal case, instead of relying on the willingness of businesses or states when gathering evidence outside the Netherlands.

Dorifel-virus

Article 32 of the Convention of Cybercrime does not solve the problem of servers that are (eventually) localized at so-called “bullet proof hosting providers” who do not cooperate with law enforcement authorities’ evidence gathering activities. As we have seen with the Dorifel-virus, this could lead to disastrous consequences (governmental employees working on type writers instead of computers, because computers were infected and unsafe to use). Maybe the time has come for us to no longer accept such situations, and to view the infringement of another state’s territory as a necessary evil in certain circumstances. The proposed investigatory methods may be suitable for a situation such as Dorifel. One must point out however that being able to use hacking as a investigatory method, does not mean the suspect will be successfully prosecuted, because a state may decide not to extradite their own citizen or prosecute him or her themselves.

Rest assured, the discussion about legalizing cross-border remote searches has just started. It will take a long time (maybe years) and require democratic processes before these far reaching investigatory powers will be implemented in our Code of Criminal Procedure.

2 Comments

Jan-Jaap Oerlemans

Good questions. Normally, it requires a formal request to collect the evidence from either the company or the relevant state authorities, but the interesting thing is it that they could do it unilaterally.

I could be wrong, but as I understand it, it seems that just the infringement on the sovereignty of another nation does not affect admissibility of evidence in a case or result in other sanctions under Dutch law.

Using the principle of reciprocity an other state could argue they could hack computers in the Netherlands under their own conditions also. Some countries, I believe the UK, Germany and France already allow hacking as an investigatory method, but they did not explicitly state they could hack across borders. I would not be surprised if they, in practice, hack across border in certain circumstances (and yes, such as in terrorism-cases).

Mair

Very interesting article!

Would remote cross-border searches require cooperation between Dutch law enforcement and law enforcement in the other country (something like an international search warrant?), or would the Dutchies just go it alone? And if they do go it alone, can the judge look into whether the evidence so gathered is admissible based on breaking the international principle of territoriality? Or is it rather like extra-legal 'rendition', so who cares how the evidence/person got there, let's just apply the law now it's there?

Because of it's the second, wouldn't that legitimize the practice of governments hacking other government's computers on suspicion of eg. conspiracy to commit terrorism etc? Seems like a potential carte blanche to me..

Add a comment