• No results found

Cover Page The handle https://openaccess.leidenuniv.nl/handle/1887/44879

N/A
N/A
Protected

Academic year: 2021

Share "Cover Page The handle https://openaccess.leidenuniv.nl/handle/1887/44879"

Copied!
2
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

Cover Page

The handle https://openaccess.leidenuniv.nl/handle/1887/44879 holds various files of this Leiden University dissertation

Author: Oerlemans, Jan-Jaap

Title: Investigating cybercrime

Issue Date: 2017-01-10

(2)

MI 275

Cybercrime investigations require the use of novel investigative methods to successfully gather evidence. This study examines the evidence-gathering activities of law enforcement officials that take place by (1) the gathering of publicly available online information, (2) the issuing of data production orders to online service providers, (3) the use of online undercover investigative methods, and (4) performing hacking as an investigative method.

The legal basis of these investigative methods is also examined. The author concludes that the legal basis in Dutch law is ambiguous for many of the identified digital investigative methods. However, a clear legal basis for investi gative methods that indicates the scope of investigative methods and the manner in which they are applied must be available. It helps prevent arbitrary application of power by governmental authorities and is therefore essential for protecting the rule of law. The author examines how a foreseeable legal framework for the identified investigative methods can be created that meets the requirements that are derived from the right to privacy in art. 8 ECHR.

The borderless nature of the Internet is also taken into account. The ques- tion is addressed to which extent digital investigative methods can be applied unilaterally, i.e., without authorisation of the State involved and without a treaty basis, across State borders. The analysis results in a list of recommen- dations to improve the regulations for digital investigative methods on both the domestic level and the international level. The leading idea is that also in the digital domain evidence-gathering activities by law enforcement officials are bound by law.

This is a volume in the series of the Meijers Research Institute and Graduate School of the Leiden Law School. This study is part of the Law School’s research programme ‘Effective Protection of Fundamental Rights in a pluralist world’.

J.J. Oerlemans

J.J. OERLEMANS

Investigating Cybercrime

rug 27 mm

E.M.

MEIJERS INSTITUUT

INSTITUUT VOOR RECHTSWETENSCHAPPELIJK

ONDERZOEK

E.M.

MEIJERS INSTITUUT

INSTITUUT VOOR RECHTSWETENSCHAPPELIJK

ONDERZOEK

Investigating Cybercrime

Referenties

GERELATEERDE DOCUMENTEN

Negative and positive obligations can further be relevant in the context of another treaty concept invoked by the ECtHR, namely extraterritorial obligations. Based on

However, the privacy interference that takes place when the investiga- tive methods discussed above are applied can generally be placed at the low end of the scale of gravity

The Dutch legal framework for the manual gathering of publicly available online information is not considered foreseeable, due to its ambiguity with regard to how data

Nevertheless, the Dutch legal framework for data production orders cannot be considered foreseeable for data production orders that are issued to online service providers with

However, Dutch law enforcement officials were able to contact a mod- erator of the online drug-trading forum. In doing so, they presumably used the special investigative power

Nevertheless, a 2012 letter of the Minister of Security and Justice (following several news articles about Dutch law enforcement authorities’ practical use of remote

90 The practice of issuing cross-border unilateral data production orders to online service providers becomes especially problematic in terms of both State sovereignty and

The gathering of pub- licly available online information, the issuing of data production orders to online service providers, and the application of online undercover investiga-