THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE

Complete work in pdf

Author/s: Milana Pisarić, PhD,

Pages: 51-66
UDK: 343.14:004.056.53
DOI: https://doi.org/10.47152/rkkp.61.1.3

Abstract: Since certain trends in information technologies significantly hinder criminal investigation, there is an evident need for the creation of an appropriate criminal procedure mechanism to overcome these obstacles. One of the options is to enable the law enforcement agencies to use hacking techniques in order to gain access to protected computer systems, networks and data, even remotely, in order to identify suspects, to monitor their activities and communications, and to collect evidence. In this paper the author is considering the possibilities, advantages and risks of using hacking techniques for the purposes of criminal proceedings. After pointing out the risks of malware use by the competent authorities, the normative framework for overcoming those risks was considered through regulating the authorized access to a protected computer system or network, as a special investigative action, so the data obtained through such actions could be used as evidence in the court of law.

Keywords: criminal procedure, electronic evidence, encryption, lawful hacking

References:
− Abelson, H., Anderson, R., Bellovin, S., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P., Rivest, R., Schiller, J., Schneier, B., Specter, M. & Weitzner D. (2015) Keys under Doormats: Mandating insecurity by requiring government access to all data and communications, Cambridge. − Access Now. (2016) A human rights response to government hacking. − Anstis, S. (2021) Government procurement law and hacking technology: The role of public contracting in regulating an invisible market. Computer Law & Security Review, 41(1), pp. 1-16. https://doi.org/10.1016/j.clsr.2021.105536 − Application and Affidavit for Search and Seizure Warrant, In the Matter of the Search of the computers that access “Websites 1-23”. − Application and Affidavit for Search Warrant, In the Matter of the Search of Any Computer Accessing Electronic Message(s) Directed to Administrator(s) of MySpace Account “Timberlinebombinfo” and Opening Messages Delivered to That Account by the Government. − Application and Affidavit for Search Warrant, In the Matter of the Search of Computers that Access upf45jv3bziuctml.onion, No. 1:15-SW-89. − Application for a Search Warrant, In re Search of Computs. that Access the Website «Bulletin Board A» Located at http://jkpos24pl2r3urlw.onion, No. 8:12MJ3 56 (D. Neb. Nov. 16, 2012). − Application for a Search Warrant, In re Search of Computs. that Access the Website «Hidden Service A» Which Is Located at oqm66m6lyt6vxk7k.onion, No. 8:12MJ360 (D. Neb. Nov. 19, 2012). − Bellovin, S., Blaze, M., Clark, S. & Landau, S. (2014) Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet. Northwestern Journal of Technology and Intellectual Property, 12(1), pp. 1-64. − Carrell, N. (2002) Spying on the Mob: United States v. Scarfo - A Constitutional Analysis. Journal of Law, Technology & Policy, 1, pp. 193-214. − Curran, К., Breslin, P., McLaughlin, K. &Tracey G. (2007) Hacking and Eavesdropping. In: Cyber Warfare and Cyber Terrorism. New York, pp. 307-317. − Hartzog, N. (2002) The “Magic Lantern” Revealed: A Report of the FBI’s New “Key Logging” Trojan and Analysis of Its Possible Treatment in a Dynamic Legal Landscape. Journal of Information Technology & Privacy Law, 20 (2), pp. 287-320. − Kerr, O., Schneier, B. (2018) Encryption Workarounds. Georgetown Law Journal, 106(4), pp. 989–1019. − Mayer, J. (2018) Government Hacking. The Yale Law Journal, 127(3), pp. 570-662. − Pell, S. (2016) You Can’t Always Get What You Want: How Will Law Enforcement Get What It Needs in a Post-CALEA, Cybersecurity-Centric Encryption Era?.North Carolina Journal of Law & Technology, 17(4), pp. 599 -609. − Pisarić, M. (2016) Cross-Border Access to Data as a Way to Collect Electronic Evidence. In: Kolarić, D. (ed). International scientific conference “Archibald Reiss Days” thematic conference proceedings of international significance (3, pp. 513-520). Belgrade: Academy of Criminalistic and Police Studies. − Pisarić, M. (2022) Communications Encryption as an Investigative Obstacle. Journal of Criminology and Criminal Law, 60 (1), pp. 61-75. https://doi.org/10.47152/rkkp.60.1.4 − Pisarić, M. (2019) Eletronski dokazi u krivičnom postupku. Novi Sad: Pravni fakultet u Novom Sadu. − Pisarić, M. (2020) Enkripcija kao prepreka otkrivanju i dokazivanju krivičnih dela. Zbornik radova pravnog fakulteta u Novom Sadu, 54(3), pp. 1079-1100. 10.5937/zrpfns54-26929 − Pisarić, M. (2021) Enkripcija mobilnog telefona kao prepreka otkrivanju i dokazivanju krivičnih dela – osvrt na uporedna rešenja. Anali Pravnog fakulteta u Beogradu, 69(2), pp. 391-416. 10.51204/Anali_PFBU_21205A − Response & Request to Strike Defendant’s Request for Daubert Motion, U.S. v. Cottom, No. 8:13-cr-00108-JFB-TDT, at 5 (D. Neb. June 29, 2015). − UN General Assembly (2016). Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression. A/71/373. − UN High Commissioner for Human Rights (2014). The right to privacy in the digital age: Report of the Office of the United Nations High Commissioner for Human Rights. A/HRC/27/37. − UN Human Rights Council (2013). Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression. A/HRC/23/4.