Mutual Legal Assistance in Cybercrimes

Document Type : Original Article

Authors

1 Ph.D. Student in Law, Faculty of Humanities and Law, Islamic Azad University, Isfahan (Khurasgan) Branch, Isfahan, Iran.

2 Associate Professor, Faculty of Humanities and Law, Islamic Azad University, Isfahan (Khurasgan) Branch, Isfahan, Iran.

Abstract

Prosecuting cybercrimes requires access to data related to criminal cyber activities. While wanted computer data which is in fact evidence of crime may be loaded on a system or a server in territory of other state. In this situation prosecutors’ access to them may cause the violation of that state’s sovereignty. Unless this is done through international cooperation with that state. Cooperation in this area is often done through mutual legal assistance. Legal assistance is a traditional and a known method of international cooperation in criminal matters. But the characteristics of cyber space and computer data affect legal assistance in cybercrimes. This essay is trying to clear the different dimensions of these effects and who they work. The characteristics of cyber space and compute data have made the usage of legal assistance important in fighting cybercrimes and also have caused the initiation of new forms of legal assistance. In addition, these characteristics have caused some problems in mutual legal assistance.

Keywords


فهرست منابع

الف. منابع فارسی
رضوی‌فرد، بهزاد. «محدودیت‌ها و راهبردهای صلاحیت در جرایم سایبری». مجله حقوقی دادگستری 98 (1396): 102-83.
شهبازی، آرامش. «بایسته‌های حقوقی همکاری بین‌المللی در مبارزه با جرایم سایبری». مقالۀ ارائه‌شده در همایش جنبه‌های حقوقی فناوری اطلاعات و ارتباطات ایران، تهران، 5 و 6 اسفند 1396.
عقیقی، نگار. صلاحیت در فضای مجازی از منظر حقوق بین‌الملل. تهران: مؤسسۀ مطالعات و پژوهشهای حقوقی شهر دانش، 1396.
مؤذن‌زادگان، حسنعلی. «دادرسی الکترونیکی در رویارویی با جرایم رایانه‌ای». مجله حقوقی دادگستری 100 (1396): 196-169.
میرمحمدصادقی، حسین. «راهکارهای مقابله با جرم کلاهبرداری رایانه‎ای در حقوق کیفری ایران». دیدگاه‌های حقوقی 43-42 (1386): 126-101.
ب. منابع خارجی
Angers, Lucie. “Combating Cyber-Crime: National Legislation as a Pre-Requisite to International Cooperation.” In Crime and Technology: New Frontiers for Regulations, Law Enforcement and Research, edited by Ernesto U. Savona. 39-54. Springer: New York, 2004.
Bell, R. E. “The Prosecution of Computer Crime.” Journal of Financial Crime 9 (2002): 308-325.
Chander, Anupam, and Uyên P. Lê. “Data Nationalism.” Emory Law Journal 64 (2015): 682-713.
Council of Europe Cybercrime Convention Committee. “Trans-Border Access and Jurisdiction: What Are the Options?” 2012. https://rm.coe.int/16802e79e8 (Accessed November 10, 2018).
Council of Europe. “Explanatory Report to the Council of Europe Convention.” 2001. https://rm.coe.int/16800cce5b (Accessed November 10, 2018).
Council of Europe. “International Co-operation under the Convention on Cybercrime.” 2009. https://rm.coe.int/1680304352 (Accessed November 10, 2018).
Council of Europe. “T-CY Assessment REPORT: The Mutual Legal Assistance Provisions of the Budapest Convention on Cybercrime.” 2014. https://rm.coe.int/16802e726c (Accessed November 10, 2018).
de Carvalho, Elcio Ricardo, Mirza Abdullahel Baqui, Rita Chun-fa Lam, Yoichi Omura, Hiroyuki Ito, Gilbert Caasi Sosa, Napoleon Bonaparte, Jesus Rodriguez Almeida, Yunsik Jang, Shintaro Naito, Ryuji Tatsuya, Tetsuya Sugano, Tetsuya Sugano, Koji Yamada, Haruhiko Higuchi. “Challenges and Best Practices in Cybercrime Investigation.” 2008. http://www.unafei.or.jp/english/pdf/RS_No79/No79_15RC_Group2.pdf (Accessed November 10, 2018).
Directive 2014/41/EU of the European Parliament and of the Council of 3 April 2014 regarding the European Investigation Order in Criminal Matters.
Gabuardi, Carlos A. “Institutional Framework for International Judicial Cooperation: Opportunities and Challenges for North America.” Mexican Law Review I (2009): 155-176.
Hooper, Christopher. “Cloud Computing and Its Implications for Cybercrime Investigations in Australia.” Computer Law & Security Review 29 (2013): 152-163.
Kettle, M., and O. Bowcott. “Computer Crime: The Age of Digital Sleuth.” The Guardian, December 12, 1997.
Lee-Makiyama, Hosuk. “A Multilateral Legal Assistance Protocol: Preventing Fragmentation and Re-dearterialisation of Internet.” 2013. http://www.ecipe.org/app/uploads/2014/12/PB9.pdf (Accessed November 10, 2018).
Leviathan Security Group. “Quantifying the Cost of Forced Localization.” 2015. https://static1.squarespace.com/static/556340ece4b0869396f21099/t/559dad76e4b0899d97726a8b/1436396918881/Quantifying™he+Cost+of+Forced+Localization.pdf (Accessed November 10, 2018), 13-14.
Lovells, Hogan, and Client Alert. “Marco Civil da Internet: Brazil’s New Internet Law Could Broadly Impact Online Companies’ Privacy and Data Handling Practices.” 2014. http://ehoganlovells.com/cv/92a5426dc5d9947a6ef3abd4eb988b549ae2472b (Accessed November 10, 2018).
Malby, Steven, Robyn Mace, Anika Holterhof, Cameron Brown, Stefan Kascherus and Eva Ignatuschtschenko. Comprehensive Study on Cyber-Crime. Vienna: UNODC, 2013.
Putnam, Tonya L., and David D. Elliott. “International Responses to Cyber Crime.” In International Dimension of Cyber Crime and Terrorism, edited by Abraham D. Sofaer and Seymour E. Goodman, 36-67. Stanford: Hoover Institution, 2001.
Stoll, Clifford, & John. W. D. Connolly. “The Cuckoo’s Egg: Tracking a Spy through the Maze of Computer Espionage.” Physics Today 43 (1990): 75-76.
Sussmann, Micheal A. “The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium.” Duke Journal of Computer & International Law 9 (1998): 451-489.
Swire, Peter, and Justin D. Hemmings. “Mutual Legal Assistance in an Era of Globalized Communications: The Analogy to the Visa Waiver Program.” New York Annual Survey of American Law 71 (2017): 687-800.
Swire, Peter. “From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud.” International Data Privacy Law 2 (2012): 200-206.
U.S. President’s Review Group. “Liberty and Security in a Changing World: Report and Recommendations of the on Intelligence and Communications Technologies.” 2013. http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf (Accessed November 5, 2018).
UN General Assembly Resolution A/RES/55/63, Combating the Criminal Misuse of Information Technologies, 22 January, 2001.
United Nation Office on Drugs and Crime (UNODC). Comprehensive Study on Cybercrime. New York: United Nations, 2013.
Vodafone . “Respecting Our Customers’ Rights to Privacy and Freedom of Expression Is One of Our Highest Priorities.” Accessed November 10, 2018. http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html.
Westmoreland, Kate, and Gail Kent. “International Law Enforcement Access to User Data: A Survival Guide and Call for Action.” Canadian Journal of Law and Technology 13 (2015): 225-254.
Wolf, Christopher. “An Analysis of Service Provider Transparency Reports on Government Request for Data.” 2013. https://www.hldataprotection.com/files/2013/08/Hogan-Lovells-White-Papers-Analysis-of-Transparency-Reports.pdf (Accessed November 10, 2018).
Woods, Andrew K. “Data beyond Borders: Mutual Legal Assistance in the Internet Era.” 2015. https://uknowledge.uky.edu/cgi/viewcontent.cgi?article=1517&context=law_facpub (Accessed November, 2018).