Recent Trends in Cross-Border Data Access by Law Enforcement Agencies
暂无分享,去创建一个
[1] Christos Karagiannis. Digital evidence “hidden in the Cloud”: Is “possession” still a relevant notion? , 2023, ERA Forum.
[2] T. Schneider,et al. Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies , 2022, IACR Cryptol. ePrint Arch..
[3] Marcin Rojszczak. e‐Evidence Cooperation in Criminal Matters from an EU Perspective , 2022, The Modern Law Review.
[4] S. Perepolkin. Legal Status of European Union Agency for Law Enforcement Cooperation (Europol) , 2022, Analytical and Comparative Jurisprudence.
[5] N. Annappa. The State’s access to data and internet intermediary response – an assessment of India’s attempt to reallocate the legal framework to ensure national security , 2022, International Review of Law, Computers & Technology.
[6] A. Solanas,et al. SoK: Cross-border Criminal Investigations and Digital Evidence , 2022, J. Cybersecur..
[7] M. Murphy. ASSESSING THE IMPLICATIONS OF SCHREMS II FOR EU–US DATA FLOW , 2021, International and Comparative Law Quarterly.
[8] Piotr Lewulis. Collecting Digital Evidence from Online Sources: Deficiencies in Current Polish Criminal Law , 2021, Criminal Law Forum.
[9] Filip Radoniewicz. Cyberspace, Cybercrime, Cyberterrorism , 2021, Cybersecurity in Poland.
[10] Anke Sophia Obendiek,et al. What Are We Actually Talking About? Conceptualizing Data as a Governable Object in Overlapping Jurisdictions , 2021, International Studies Quarterly.
[11] Mohammad Masdari,et al. Data replication schemes in cloud computing: a survey , 2021, Cluster Computing.
[12] Jukka Ruohonen,et al. The Treachery of Images in the Digital Sovereignty Debate , 2020, Minds and Machines.
[13] Halefom H. Abraha,et al. Law enforcement access to electronic evidence across borders: mapping policy approaches and emerging reform initiatives , 2020, Int. J. Law Inf. Technol..
[14] Fabien Terpan,et al. EU–US negotiations on law enforcement access to data: divergences, challenges and EU law procedures and options , 2020, International Data Privacy Law.
[15] Stefan Braum. ‘Rechtsstaat’ and European criminal law – From the end of sovereignty , 2020 .
[16] F. Fabbrini,et al. Competing Jurisdictions: Data Privacy Across the Borders , 2020, Palgrave Studies in Digital Business & Enabling Technologies.
[17] Abraham L. Newman,et al. Domestic courts, transnational law, and international order , 2020 .
[18] Hannes Ebert. Hacked IT superpower: how India secures its cyberspace as a rising digital democracy , 2020 .
[19] Halefom H. Abraha. Regulating law enforcement access to electronic evidence across borders: the United States approach , 2020, Information & Communications Technology Law.
[20] Stanisław Tosza. All evidence is equal, but electronic evidence is more equal than any other: The relationship between the European Investigation Order and the European Production Order , 2020 .
[21] Dagna Knytel. Evidence Gathering in the European Union: The Transposition of Directive 2014/41/EU into French and German Legislation , 2020, European Criminal Law Review.
[22] Raphael Bossong. Policy networks for European internal security governance: toward a more systematic empirical and normative assessment , 2020, Journal of Transatlantic Studies.
[23] Jessica Shurson,et al. Data protection and law enforcement access to digital evidence: resolving the reciprocal conflicts between EU and US law , 2020, Int. J. Law Inf. Technol..
[24] Adám Molnár,et al. Governing Liberty Through Accountability: Surveillance Reporting as Technologies of Governmentality , 2020 .
[25] K. Hardy,et al. Digital surveillance and access to encrypted communications in Australia , 2020 .
[26] H. Aden. Information sharing, secrecy and trust among law enforcement and secret service institutions in the European Union , 2018, Secrecy in European Politics.
[27] B. Rowe. Transnational state-sponsored cyber economic espionage: a legal quagmire , 2020, Security Journal.
[28] Steven D. Brown. Hacking for evidence: the risks and rewards of deploying malware in pursuit of justice , 2020, ERA Forum.
[29] B. Blažič,et al. Removing the barriers in cross-border crime investigation by gathering e-evidence in an interconnected society , 2019, Information & Communications Technology Law.
[30] D. Svantesson,et al. Re-thinking the categorisation of data in the context of law enforcement cross-border access to evidence , 2020, International Review of Law, Computers & Technology.
[31] Jukka Ruohonen. An Acid Test for Europeanization: Public Cyber Security Procurement in the European Union , 2019, European Journal for Security Research.
[32] Halefom H. Abraha. How compatible is the US ‘CLOUD Act’ with cloud computing? A brief analysis , 2019, International Data Privacy Law.
[33] Lawrence Siry. Cloudy days ahead: Cross-border evidence collection and its impact on the rights of EU citizens , 2019, New Journal of European Criminal Law.
[34] T. Christakis. Transfer of EU Personal Data to U.S. Law Enforcement Authorities After the CLOUD Act: Is There a Conflict with the GDPR? , 2019 .
[35] Matthew Robert Shillito. Untangling the ‘Dark Web’: an emerging technological challenge for the criminal law , 2019, Information & Communications Technology Law.
[36] P. De Hert,et al. A leading role for the EU in drafting criminal law powers? Use of the Council of Europe for policy laundering , 2019, New Journal of European Criminal Law.
[37] Jukka Ruohonen,et al. Updating the Wassenaar debate once again: Surveillance, intrusion software, and ambiguity , 2019, Journal of Information Technology & Politics.
[38] Shoshana Zuboff. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power , 2019 .
[39] Christopher Parsons. The (In)effectiveness of Voluntarily Produced Transparency Reports , 2019 .
[40] Marwa Y. Y. Elbesiky. The Role of Mutual Legal Assistance on Collection of Evidence in Cases of the Recovering Asset Smuggled Abroad , 2018, Arab Journal of Forensic Sciences & Forensic Medicine.
[41] Yashar Abed,et al. The Challenges of Institutional Distance: Data Privacy Issues in Cloud Computing , 2018, Science, Technology and Society.
[42] J. Maillart. The limits of subjective territorial jurisdiction in the context of cybercrime , 2018, ERA Forum.
[43] P. De Hert,et al. Legal arguments used in courts regarding territoriality and cross-border production orders , 2018, New Journal of European Criminal Law.
[44] Abraham L. Newman,et al. Divulging data: Domestic determinants of international information sharing , 2017, The Review of International Organizations.
[45] T. Holt. Regulating Cybercrime through Law Enforcement and Industry Mechanisms , 2018, The ANNALS of the American Academy of Political and Social Science.
[46] Eleni Kosta,et al. Looking for some light through the lens of "cryptowar" history: Policy options for law enforcement authorities against "going dark" , 2018, Comput. Law Secur. Rev..
[47] D. Fennelly. Data retention: the life, death and afterlife of a directive , 2018, ERA Forum.
[48] Thomas. Renard. EU cyber partnerships: assessing the EU strategic partnerships with third countries in the cyber domain , 2018 .
[49] G. Christou. The challenges of cybercrime governance in the European Union , 2018 .
[50] Catherine Jasserand,et al. Law enforcement access to personal data originally collected by private parties: Missing data subjects' safeguards in directive 2016/680? , 2017, Comput. Law Secur. Rev..
[51] Lyria Bennett Moses,et al. Open Secrets: Balancing Operational Secrecy and Transparency in the Collection and Use of Data by National Security and Law Enforcement Agencies , 2017 .
[52] T. Scassa. Law Enforcement in the Age of Big Data and Surveillance Intermediaries: Transparency Challenges , 2017 .
[53] Martyna Kusak. Common EU Minimum Standards for Enhancing Mutual Admissibility of Evidence Gathered in Criminal Matters , 2017 .
[54] John Selby,et al. Data localization laws: trade barriers or legitimate responses to cybersecurity risks, or both? , 2017, Int. J. Law Inf. Technol..
[55] M. de Goede,et al. Secrecy and security in transatlantic terrorism finance tracking , 2017 .
[56] Raphael Bossong,et al. A typology of cybersecurity and public-private partnerships in the context of the EU , 2016, Crime, Law and Social Change.
[57] Patryk Pawlak,et al. Politics of cybersecurity capacity building: conundrum and opportunity , 2017 .
[58] Sara Conti,et al. Electronic Evidence Semantic Structure: Exchanging Evidence Across Europe in a Coherent and Consistent Way , 2015, AICOL.
[59] Jennifer Daskal,et al. Law Enforcement Access to Data across Borders: The Evolving Security and Rights Issues , 2016 .
[60] Damir Kahvedzic. Cybercrime investigations of mobile phone devices and the cloud in the light of EU safe harbour rulings , 2016 .
[61] Nhien-An Le-Khac,et al. The End of Effective Law Enforcement in the Cloud? - To Encrypt, or Not to Encrypt , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).
[62] Dan Jerker B. Svantesson,et al. Law enforcement access to evidence via direct contact with cloud providers - identifying the contours of a solution , 2016, Comput. Law Secur. Rev..
[63] Matt Blaze,et al. Insecure Surveillance: Technical Issues with Remote Computer Searches , 2016, Computer.
[64] Peter P. Swire,et al. How Both the Eu and the U.S. Are "Stricter" Than Each Other for the Privacy of Government Requests for Information , 2016 .
[65] E. Guild,et al. Access to Electronic Data by Third-Country Law Enforcement Authorities, Challenges to EU Rule of Law and Fundamental Rights. Center for European Policy Studies, 2015 , 2016 .
[66] Nicolás Guarda. Governing the ungovernable: international relations, transnational cybercrime law, and the post-Westphalian regulatory state , 2015 .
[67] Daniel Trottier,et al. Open source intelligence, social media and law enforcement: Visions, constraints and critiques , 2015 .
[68] Gail Kent,et al. International Law Enforcement Access to User Data: A Survival Guide and Call for Action , 2015 .
[69] C. Murphy. Transnational counter-terrorism law: law, power and legitimacy in the ‘wars on terror’ , 2015 .
[70] Marek Martyniszyn. Inter-agency evidence sharing in competition law enforcement , 2015 .
[71] Sudha N. Setty. Surveillance, Secrecy, and the Search for Meaningful Accountability , 2014 .
[72] Enrico Pelino,et al. Law Enforcement Agencies' activities in the cloud environment: a European legal perspective , 2013 .
[73] Austen L. Parrish. Domestic Responses to Transnational Crime: The Limits of National Law , 2012 .
[74] Bruce Schneier,et al. A Taxonomy of Social Networking Data , 2010, IEEE Security & Privacy.
[75] C. Harfield. A review essay on Models of Mutual Legal Assistance: Political Perspectives on International Law Enforcement Cooperation Treaties , 2003 .
[76] F. Pocar. New Challenges for International Rules Against Cyber-Crime , 2002 .
[77] R. Currie. Human Rights and International Mutual Legal Assistance: Resolving the Tension , 2000 .