Abstract The increasing sophistication of malicious cyber activities and the associated challenges with addressing these threats continue to underline the urgency of effective investigative measures for law enforcement authorities. This is especially relevant in investigations where the necessary data to be obtained are stored in a foreign jurisdiction, and access to that data may require additional legal authority. Given that traditional mutual legal assistance treaties are not entirely suitable for the volatile nature of electronic evidence, options for remotely accessing transborder data have been proposed both by nations and international organisations. Despite having been discussed by scholars and policy-makers for almost two decades, the legitimacy of such transborder access has not been readily accepted. In this context, interpretations that pertain both to the scope of jurisdiction to enforce and the principle of territorial sovereignty are particularly fragmented. This article compares the different approaches proposed in academic literature with developments in State practice and international organisations. The article concludes that transborder access can be generally seen as an extraterritorial application of jurisdiction to enforce and therefore, in order to avoid breaching the other State's sovereignty, such investigative activities should have explicit legal grounds.
[1]
Ian Walden.
Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent
,
2011
.
[2]
T. Gill.
Non-intervention in the cyber context
,
2013
.
[3]
S. Wilske,et al.
International Jurisdiction in Cyberspace: Which States May Regulate the Internet?
,
1997
.
[4]
Keir Giles,et al.
Russia's public stance on cyberspace issues
,
2012,
2012 4th International Conference on Cyber Conflict (CYCON 2012).
[5]
Mireille Hildebrandt,et al.
Extraterritorial jurisdiction to enforce in cyberspace?: Bodin, Schmitt, Grotius in cyberspace
,
2013
.
[6]
Orin S. Kerr.
Searches and Seizures in a Digital World
,
2005
.
[8]
Wolff Heintschel von Heinegg.
Legal implications of territorial sovereignty in cyberspace
,
2012,
2012 4th International Conference on Cyber Conflict (CYCON 2012).
[9]
Micheál O'Floinn.
It wasn't all white light before Prism: Law enforcement practices in gathering data abroad, and proposals for further transnational access at the Council of Europe
,
2013,
Comput. Law Secur. Rev..