Skip to main content
Article
Law enforcement access to evidence via direct contact with cloud providers – identifying the contours of a solution
Computer Law & Security Review
  • Dan Svantesson, Bond University
  • Lodewijk van Zwieten, Public Prosecutor Specialised in Cybercrime, The Netherlands
Date of this Version
8-18-2016
Document Type
Journal Article
Grant Number
Australian Research Council Future Fellowship project number FT120100583
Publication Details

Citation only

Svantesson, D. J. B., & van Zwieten, L. (2016, in press). Law enforcement access to evidence via direct contact with cloud providers – identifying the contours of a solution. Computer Law & Security Review.

Access the journal

Copyright © 2016 Dan Jerker B Svantesson & Lodewijk van Zwieten.

Published by Elsevier Ltd.

Disciplines
Abstract
Effective criminal investigation depends on reliable access to evidence. With the extensive use of cloud computing in various forms, electronic evidence of criminal activity may no longer be found with criminals or their associates themselves. Rather, the evidence resides with cloud providers, oftentimes on servers outside of the territory of the investigating law enforcement authorities (LEAs). Thus, even in otherwise completely domestic criminal investigations of crime committed domestically against a domestic victim, relevant electronic evidence may be stored in a cloud arrangement in another country. Obtaining the evidence in those situations may be difficult. In this article, we identify 16 variables and a number of fundamental and non-fundamental constraints that must be taken into account by anyone setting out to construct a framework facilitating appropriate LEA access to evidence via direct contact with cloud providers, while safeguarding the rights and interest of individuals, as well as the rights and interest of the provider, and those of other States.
Citation Information
Dan Svantesson and Lodewijk van Zwieten. "Law enforcement access to evidence via direct contact with cloud providers – identifying the contours of a solution" Computer Law & Security Review (2016) ISSN: 2212-473X
Available at: http://works.bepress.com/dan_svantesson/99/