-
1
-
-
67849100827
-
-
Council of the European Union, Council Conclusions on a ConcertedWork Strategy and Prac- tical Measures Against Cybercrime, 2987th Justice and Home Affairs Council meeting, 27-28 November, available at
-
Council of the European Union, 'Council Conclusions on a ConcertedWork Strategy and Prac- tical Measures Against Cybercrime', 2987th Justice and Home Affairs Council meeting, 27-28 November 2008, available at http://www.ue2008.fr/webdav/site/PFUE/shared/import/ 1127_JAI/ Conclusions/JHA_Council_conclusions_Cybercrime_EN.pdf
-
(2008)
-
-
-
3
-
-
67849116523
-
-
D. Leppard, 'Police Set to Step up Hacking of Home PCs', Timesonline 4 January 2009, available at http://www.timesonline.co.uk/tol/news/politics/article5439604.ece
-
D. Leppard, 'Police Set to Step up Hacking of Home PCs', Timesonline 4 January 2009, available at http://www.timesonline.co.uk/tol/news/politics/article5439604.ece
-
-
-
-
5
-
-
67849108086
-
Die "Online-Durchsuchung" - Technischer Hintergrund des verdeckten hoheitlichen Zugriffs auf Computersysteme
-
U. Buermeyer, 'Die "Online-Durchsuchung" - Technischer Hintergrund des verdeckten hoheitlichen Zugriffs auf Computersysteme', Onlinezeitschrft für Höshstrichterliche Rechtsprechung zum Strafrecht 4 (2007): 154.
-
(2007)
Onlinezeitschrft für Höshstrichterliche Rechtsprechung zum Strafrecht
, vol.4
, pp. 154
-
-
Buermeyer, U.1
-
7
-
-
67849109614
-
Ermächtigungsgrundlage für die "Onlinedurchsuchung"?
-
G. Hornung, 'Ermächtigungsgrundlage für die "Onlinedurchsuchung"?', Datenschutz und Datensicherheit 31 (2007): 575-580.
-
(2007)
Datenschutz und Datensicherheit
, vol.31
, pp. 575-580
-
-
Hornung, G.1
-
8
-
-
67849106206
-
-
BGH, NJW 2007, 930
-
BGH, NJW 2007, 930.
-
-
-
-
10
-
-
67849098906
-
-
BVerfG, see note 2
-
BVerfG, see note 2.
-
-
-
-
12
-
-
67849132224
-
New Powers for Police to Hack your PC
-
5 January 2009, available at
-
N. Morris, 'New Powers for Police to Hack your PC', The Independent 5 January 2009, available at http://www.independent.co.uk/news/uk/home-news/ new-powers-for-police-to-hack-your-pc-1225802.html
-
The Independent
-
-
Morris, N.1
-
14
-
-
67849118419
-
-
BVerfG, NJW 2006, 976
-
BVerfG, NJW 2006, 976
-
-
-
-
16
-
-
67849116521
-
-
BGH, NStZ 2003, 670
-
BGH, NStZ 2003, 670.
-
-
-
-
18
-
-
67849096982
-
-
BGH, see note 7
-
BGH, see note 7.
-
-
-
-
19
-
-
67849098905
-
-
The interception of email traffic data could be subsumed under this article if it is a live intercep- tion; hence a dataflow exists between the suspect and the recipient. Due to their design however, RFS tools are most likely to search emails stored on the computer of the suspect. Also, a live interception of email traffic is technically still very difficult, if not impossible (G. Hornung, Ein neues Grundrecht, Computer und Recht 5 2008, 299
-
The interception of email traffic data could be subsumed under this article if it is a live intercep- tion; hence a dataflow exists between the suspect and the recipient. Due to their design however, RFS tools are most likely to search emails stored on the computer of the suspect. Also, a live interception of email traffic is technically still very difficult, if not impossible (G. Hornung, 'Ein neues Grundrecht', Computer und Recht 5 (2008): 299).
-
-
-
-
20
-
-
67849132225
-
-
BGH, see note 7
-
BGH, see note 7.
-
-
-
-
21
-
-
67849093930
-
The Taming of the Sleuth-Problems and Potential of Autonomous Agents in Crime Investigation and Prosecution
-
B. Schafer, 'The Taming of the Sleuth-Problems and Potential of Autonomous Agents in Crime Investigation and Prosecution', International Review of Law, Computers & Technology 20, nos. 1&2 (2006): 63.
-
(2006)
International Review of Law, Computers & Technology
, vol.20
, Issue.1-2
, pp. 63
-
-
Schafer, B.1
-
22
-
-
67849092097
-
-
See for example in
-
See for example in Germany, BVerfG, NJW 1990, 563.
-
, vol.1990
, Issue.563
-
-
Germany, B.1
NJW2
-
23
-
-
67849086519
-
-
BVerfG, see note 2
-
BVerfG, see note 2.
-
-
-
-
24
-
-
67849118418
-
-
German case law in the area developed subtle distinctions between a non-negotiable core of privacy and an 'outer layer' or privacy interest that can be balanced against other rights
-
German case law in the area developed subtle distinctions between a non-negotiable core of privacy and an 'outer layer' or privacy interest that can be balanced against other rights.
-
-
-
-
25
-
-
67849134850
-
-
BVerfG, see note 2
-
BVerfG, see note 2.
-
-
-
-
27
-
-
67849126478
-
-
A serious crime is defined as any offence attracting a jail sentence of three years or more
-
A serious crime is defined as any offence attracting a jail sentence of three years or more.
-
-
-
-
28
-
-
67849132978
-
-
See for example the case where a family was put under surveillance for 'suspected fraudulent school place applications' under provisions of RIPA, BBC, 'Council admits spying on family', April 2008, available at http://news.bbc.co.uk/1/hi/england/dorset/7341179.stm
-
See for example the case where a family was put under surveillance for 'suspected fraudulent school place applications' under provisions of RIPA, BBC, 'Council admits spying on family', April 2008, available at http://news.bbc.co.uk/1/hi/england/dorset/7341179.stm
-
-
-
-
30
-
-
67849132977
-
Confluence of Digital Evidence and the Law: On the Forensic Soundness of Live-Remote Digital Evidence Collection
-
E.E.Kenneally, 'Confluence of Digital Evidence and the Law: On the Forensic Soundness of Live-Remote Digital Evidence Collection', UCLA Journal of Law and Technology 9, no. 2 (2005): 3.
-
(2005)
UCLA Journal of Law and Technology
, vol.9
, Issue.2
, pp. 3
-
-
Kenneally, E.E.1
-
32
-
-
33745174196
-
Improving Evidence Acquisition from Live Network Sources
-
B.J. Nikkel, 'Improving Evidence Acquisition from Live Network Sources', Digital Investi-gation 3 (2006): 89.
-
(2006)
Digital Investi-gation
, vol.3
, pp. 89
-
-
Nikkel, B.J.1
-
33
-
-
10644254384
-
Tool Review - Remote Forensic Preservation and Examination Tools
-
E. Casey and A. Stanley, 'Tool Review - Remote Forensic Preservation and Examination Tools', Digital Examination 1 (2004): 284.
-
(2004)
Digital Examination
, vol.1
, pp. 284
-
-
Casey, E.1
Stanley, A.2
-
34
-
-
67849096981
-
UK Computer Misuse Act - The Trojan Virus Defence Regina v Aaron Caffrey, Southwark Crown Court, 17 October 2003
-
E. George, 'UK Computer Misuse Act - The Trojan Virus Defence Regina v Aaron Caffrey, Southwark Crown Court, 17 October 2003', Digital Investigation 1, no. 2 (2004): 89.
-
(2004)
Digital Investigation
, vol.1
, Issue.2
, pp. 89
-
-
George, E.1
-
35
-
-
67849108091
-
Big Browser Manning the Thin Blue Line - Computational Legal Theory Meets Law Enforcement
-
For the purpose of this article the focus will be on the crossing of borders between nation states. For a detailed analysis of the problem of borders in relation to the use of RFS tools see
-
For the purpose of this article the focus will be on the crossing of borders between nation states. For a detailed analysis of the problem of borders in relation to the use of RFS tools see W. Abel and B. Schafer, 'Big Browser Manning the Thin Blue Line - Computational Legal Theory Meets Law Enforcement', Problema 2 (2008): 51.
-
(2008)
Problema
, vol.2
, pp. 51
-
-
Abel, W.1
Schafer, B.2
|