You are currently viewing a new version of our website. To view the old version click .
Information
  • Article
  • Open Access

22 April 2021

Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal

and
1
Department of Applied Informatics, University of Macedonia, 54636 Thessaloniki, Greece
2
Prosecutor of the Court of First Instance, 41222 Larissa, Greece
*
Author to whom correspondence should be addressed.

Abstract

Fighting crime in cyberspace requires law enforcement authorities to immerse in a digital ocean of vast amount of information and also to acquire and objectify the evidence of criminal activity. Handling digital evidence is a complex and multifaceted process as they can provide critical evidentiary information in an unquestionable and irrefutable way. When digital evidence resides in a cloud storage environment the criminal investigation is faced with unprecedented contemporary legal challenges. In this paper, the authors identify three main legal challenges that arise from the current cloud-based technological landscape, i.e., territoriality (the loss of location), possession (the cloud content ownership) and confiscation procedure (user authentication/data preservation issues). On the onset of the identified challenges, the existing American, European and International legal frameworks are thoroughly evaluated. Finally, the authors discuss and endorse the Power of Disposal, a newly formed legal notion and a multidisciplinary solution with a global effect as a result of collaboration between technical, organizational and legal perspectives as an effective first step to mitigate the identified legal challenges.

1. Introduction

Daily life is increasingly moving to the “virtual world”, a non-tangible dimension that has the distinct characteristic to be easily accessible to everyone. Nearly every piece of information available is digitized and things move from paper to the so-called “immaterial world” (a conception that basically is not true, since digital information is stored in tangible mediums). One of the most fascinating technological developments of the last decade is the opportunity given to people to safely store vast amount of information in remote places that can be accessed on-demand from every corner of the earth. These interconnected “storing places” comprise the “cloud”, where all the data-information is stored and waits to be re-called by its users. This paper attempts to chart the basic problems that arise in situations where the aforementioned technological capability of remote-cloud storage of digital information gets criminally abused. The aim of the paper is to provide a comprehensive approach to the practical and also legal issues that arise when a perpetrator of a criminal act “hides in the cloud” some electronic data that are essential to the criminal procedure. These data need to be obtained by law enforcement authorities in a systematic manner to fully and thoroughly investigate the case against the perpetrator. This work does not touch on cloud-stored publicly available (open source) data, since this kind of data is easily accessible to anyone around the globe. The challenging cases are the situations where law enforcement authorities try to spot, identify and acquire electronic data-digital evidence that is stored remotely and the person-of-interest does not necessarily facilitate their work.
Section 2 of this paper provides a brief discussion of the technological aspects of the matter at hand: the authors point out the specific features of electronic data/evidence. They log the distinct characteristics that set them apart from the rest of the evidence in a penal procedure and register the way the law enforcement authorities handle them with conventional methods, while trying to equally balance the suspect’s rights to privacy and due procedure and the need of a sovereign state to protect its citizens. The authors also present in a brief manner the architecture of “the cloud” and how it actually works, specifically the model of Software as a Service (SaaS). The refined area of Cloud Storage sets the stage for the recitation of the central practical problems that arise when a person decides to actually make use of “the cloud” with ill and malicious intent. Section 3 pinpoints the main practical and legal barriers that need to be overcome when law enforcement authorities try to cope with a technologically aware criminal, Section 4 showcases a specific legal case of the Greek Judicial System that puts the presented challenges in practical scope and Section 5 records the different international approaches to the actual acquisition of the data in question. In the last three sections, criticism is exercised to the corresponding legal theories and the road to new concepts is paved through concrete proposals. Finally, in Section 6, the authors discuss and put forward a newly formed legal notion by proposing the power of disposal as a multidisciplinary solution with a global effect as a result of collaboration between technical, organizational and legal perspectives.

2. Background

Fighting cybercrime i.e., crime in cyberspace [1] requires law enforcement authorities to immerse in a digital ocean of vast amount of information and try not only to acquire but also to objectify the evidence of criminal activity. Every piece of significant electronic data in criminal procedure is considered evidence that needs to be handled with certain scientific procedures for it to maintain its probative value. As long as each evident object is admissible, authentic, reliable and complete [2], a judge can assess it safely in order to reach his final conclusion and judicial rule. After all, in accordance with article 177 of the Greek Code of Criminal Procedure (Greek Law 4620/2019), the essence of criminal proceedings is having judicially available unshakable evidence that lead to fact-based judgments. Therefore, it is of the outmost importance that all of the electronic evidence acquired meet some standards aptly named “Rules of Evidence”, which is a body of procedural rules and legal principles governing the use of evidence in legal proceedings. These rules establish the methods by which evidentiary information may be presented and determine what evidence must or must not be considered by a judge or a jury in reaching his or its decision [3,4]. However, when data moves to a cloud-storage environment, the aforementioned forensic tactics, which take for granted the engagement with a material object at hand’s reach, are no longer relevant and new legal challenges appear. Law enforcement authorities need new ways of efficiently investigating online criminal incidents while balancing a suspect’s right to privacy and due procedure.

2.1. The Nature and Challenges of Digital Evidence

According to article 1 Section 3.1.1 of the Budapest Convention on Cybercrime (European Treaty Series No. 185) [5] digital/computer data is the representation of facts, information or concepts in a form that an information/computer system can process (e.g., photo, video, sound, text). According to the National Standard ISO/IEC 27037:2012 [6], which provides guidelines for specific activities (identification, collection, acquisition and preservation in a way that strengthens their evidential value) in handling digital evidence, the latter are identified as information or data, stored or transmitted in binary form, which may be relied on as evidence and act as an extremely important tool for solving cybercrimes [7]. Digital evidence are by nature extremely fragile and durable at the same time. Their content and location can be easily and swiftly altered and at the same time if they remain at the exact same state and position in which they are confiscated, they can provide critical evidentiary information in an unquestionable and irrefutable way. Moreover, destroying digital evidence requires a consistent effort and usually a hands-on approach to the physical medium that contains them, since information systems that carry the data have integrity assurance mechanisms through redundancy and fault tolerance.
Data redundancy is a condition created within a data storage technology in which the same piece of data is held in two separate places. Sometimes, this can occur by accident, but usually it is done deliberately for backup and recovery purposes [8]. Fault tolerance is a concept particularly important to data storage infrastructure and refers to the ability of a computer system or storage subsystem to suffer failures in component hardware or software parts and yet continue to function without a service interruption and most importantly without losing data or compromising safety [9].
According to SANS Institute for information security training and security certification [10], five rules must be followed when confiscating digital or electronic evidence and each rule corresponds to a counterpart property that evidence must have to be considered valid:
Admissibility: Digital Evidence must be collected through a legally acceptable and allowed procedure, so they can be admitted in front of court.
Authenticity: Digital Evidence must be tied positively and relate to the incident under investigation in a relevant way.
Completion: Digital Evidence must be able to uncover every aspect of the incident under investigation, thus functioning both inculpatory and exculpatory.
Reliability: Digital Evidence must be collected and analyzed in a way that confirms the evidence’s authenticity and veracity. The applicable procedure must create a uniqueness and singularity that makes that specific piece of evidence morphologically and technologically recognizable and distinct from any other similar digital object.
Believability: Digital Evidence must be presented in front of a court in a clear, understandable and believable manner.
In 2007, the Association of Chief Police Officers (ACPO) in the United Kingdom agreed to a good practice guide in investigating cybercrimes, which even to this day is considered universally as one of the fundamental codes of conduct and practice for practitioners working in the field of digital forensics, which in reality is a legal procedure that collects, analyzes and presents the facts of a cybercrime scene in correlation with a certain suspect of criminal activity in cyberspace [11]. According to ACPO [12], every law enforcement personnel who may deal with digital evidence needs to abide by the following four principles:
  • No action taken should change data which may subsequently be relied upon in court. This way the integrity of the collected digital evidence is guaranteed. This applies especially to at the time of collection non-working electronic devices, since powering-on a digital gadget gives the operational system the opportunity to read and write and therefore alter a significant amount of data and metadata, even before the user begins to use the electronic device in question.
  • If it is necessary to access original data, this must be done by a person, who is competent to do so and is also able to give evidence explaining the relevance and the implications of his actions. This applies especially to at the time of collection working electronic devices, since powering-off a digital gadget gives the operational system the opportunity to modify a significant amount of data and metadata and is also possible that some information is lost or even destroyed if the files are encrypted and set as auto-destructive.
  • An audit trail or other record of all processes applied to digital evidence should be created and preserved forming a continuous and unbroken “chain of custody” [13]. An independent third party should be able to examine those processes and achieve the same result. All digital evidence must meet the universally acknowledged criteria of auditability, repeatability, reproducibility and justifiability.
  • A specific person who is leading the investigation has overall responsibility for ensuring the application of these principles and generally the law as well.

2.2. The Emergence of Cloud Storage

In 1963, Joseph Licklider envisioned everyone on the globe to be interconnected and accessing programs and data at any site from anywhere, as part of an Intergalactic Computer Network [14]. His idea eventually evolved into the platform that the Internet as we know it today is based on. The next evolutionary step of interconnected devices came in the 1990s in the form of cloud computing as an informatics’ model that enables ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [15]. The resources present in the cloud can be self-served infinitely and on-demand by users, who, instead of setting up their own physical infrastructure, can use the resources as a service and thus shift and outsource the workload and consequently reduce the pressuring demand for more and better hardware and software, which is handled by other networks of powerful and readily available computers that form “the cloud”. The Cloud is delivered to any internet enabled device and the only thing that is required in order to be able to access it is a simple web browser [16].
The Cloud technology is widely and publicly offered in three versatile models (Software, Platform and Infrastructure as a Service—respectively Saas, PaaS and IaaS), with SaaS being the most frequently used among household users, who essentially use the provider’s applications running on a cloud infrastructure. The applications run and store their data online and are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email) or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
Spawned from Cloud Computing and arguably as an interconnected service of it, comes “Cloud Storage”, a model of computer data storage in which the digital data is stored in logical pools. The physical storage spans multiple servers (sometimes in multiple locations) and the physical environment is typically owned and managed by a hosting company. These Cloud Storage Providers are responsible for keeping the data available and accessible and the physical environment protected and running. The main difference between the two aforementioned concepts is that Cloud Storage focuses on data storage, whereas Cloud Computing is all about remote processing of data [17].

2.3. Digital Evidence in the Cloud: Cloud Forensics

As previously discussed, handling digital evidence is a complex and multifaceted process. There are certain parameters to be taken into consideration for the electronic data at hand to become decisive components of a logical judicial rule. When this data moves from the presently material world to a cloud storage environment, the latter becomes criminally interesting and the focus shifts to a new area, whose investigation calls for a need to meet new technological and legal challenges. Cloud Storage is a widely and often freely offered online service that opens new doors of action to evildoers. Cloud Forensics brings forth the necessity of blending various technical, organizational and legal perspectives to effectively answer the need of combating new forms of criminal behavior. On the next sections, the authors focus on the legal aspects of Cloud Forensics and try to approach the main issues that arise through a comprehensive presentation of problems spotted and an analysis of accordingly established solutions.

4. Judicial Opinions on Cloud Forensics from Greek Court Cases

In practice, many legal professionals, whose expertise stems from a completely different academic background, are hesitant and find it difficult to fully grasp the technological aspects and features of cloud storage and as a result they attempt to meet the aforementioned legal challenges using legal doctrines of a former era. Based on the habits of the cloud-users and how they take advantage of this decentralized service while using laptops and other smart mobile devices, some judges in Greek Courts of Law argued that storing and moving files through the cloud’s different servers is actually a form of communication and thus if a law enforcement authority wants to gain access to a cloud stored and penally interesting file, it has to utilize a special and procedurally very strict legislation that allows for the removal of the constitutionally enshrined communications’ privacy (Law 2225/1994). This perspective is founded upon the assumption that a user’s cloud-stored data is not accessible to other users who store their data on the same server and by creating a personal account with a cloud storage provider, each user in reality agrees to an exclusive use of a specific volume of storage space that only they can access, after their identity has been electronically verified through their unique username and secret password.
The aforementioned judicial opinion found that this procedure of accessing cloud-stored data that are in no physical proximity with the user, actually constitutes a form of electronic “communication” with the cloud platform, through which the user comes in contact with his data and as the latter are part of a kind of communication, it is protected as such, regardless of their actual whereabouts [33]. Specifically, according to Ruling 613/2016 of the Misdemeanor Council of Athens (GR) [34] “Cloud Storage is not just a place to safely maintain digital data, but is mainly used for large files’ transfer between electronic devices. On the grounds of having to create an account and use an appropriate password in order to access the storage service provided by the company who actually owns the server, it is doubtful that cloud storage, whose technological facilities will most likely reside in another country, can be contemplated as an actual part of a specific electronic device”. The majority of the judges chose to approach the matter of Cloud Storage as a service that is provided to the end-user, through which the latter accesses the data in question and has the opportunity to either view them online or to download them on their electronic device. If downloading occurs then we move to the area of crystal clear “possession”. However, when the user simply “communicates” with the server and consequently views online and comes in contact with the illegal content only for a brief period of time, one cannot set it as “possession” but rather as penally indifferent “view”.
However, on the same matter and as a part of the same ruling, one of the judges of the aforementioned three-member Council found that using Cloud Storage is not a form of secret “communication” that needs to be constitutionally protected but rather it must be considered as using an added hardware element on the user’s main device. Being on the same page with the Prosecutor of the Greek Supreme Court [35] the third judge found that law enforcement authorities do not need to employ special legislation for the removal of the constitutionally protected communications’ privacy of the wanted file and are legally allowed to gain immediate access to Cloud Storage, acting as if the data in question is stored in an external hard drive or any other handy device. According to his opinion, “by using a cloud storage service, a user has the ability to store, access and process data, that can be found in remote locations and servers, namely “in the cloud”. Considering the end-user, who through the use of an identification process (username and password) accesses the server that hosts his data, can, regardless the location of the server, manage (view, present, modify, transfer, copy, delete) his digital files at will, one can contend that since storing digital data in the cloud is the exact thing as if data were stored on a physically accessible medium. Cloud should be considered and legally treated as a virtual and remote external storage medium, that actually is an extension of the every digital device that has access to it”.
The minority judge found that the crucial element on which the criminal responsibility is founded is that of the willful and knowingly access to the files in question through personal and positive act. Even if the end-user does not download the file in his computer and only views it online, he is liable for accessing it on his own free will. The automatic technological procedure of the file/image being written on RAM or Web Cache is indifferent and the decisive factor is that of the personal action of the user to make contact with a readily available file. Ultimately, the minority judge’s conclusion seems to be much more in accordance with the way the Cloud works and resonates with the at first oxymoron notion that Cloud Storage is a tangible storage device that is virtually an extension of the locally handy electronic device of the end-user.

6. Discussion—The Power of Disposal

Abuse of the Internet and more specifically of the Cloud Storage Service for cyber-dependent and cyber-enabled crimes cannot be tolerated, since it may proliferate the probability of the states moving towards questionable choices in an attempt to sufficiently control the medium [49]. Cloud Storage puts into a new perspective the age-old notions of ownership and identification/authentication of digital evidence and how these technological procedures and terms are legally defined. Legal practitioners need to elevate their expertise and come to a thorough understanding of the specific technology, to be able to properly and efficiently address the newly arisen problems. The unaware and indifferent to the specific content Cloud Storage Provider is in charge only of maintaining and transferring electronic data of the end-user, who is the actual “owner” and controller of them. The identification process used for accessing the not-in-a-specifically-and-fixed-allocated-space stored data in question (unique username and secret password) combined with the according metadata and log files prove in an irrefutable way the actual identity of the penally liable person.
Cloud Storage’s main characteristic, though, that seems to make today’s legal doctrines obsolete is the loss of location of the data. Data are left in the cloud, in a non-territorial fixed state and the challenges posed by that condition urge for an alternate scope to the problem at hand beyond the classic principal of territoriality. The notion that, where digital evidence is concerned, location should play a significant matter is becoming rapidly outdated [50]. This new technological “elephant in the room” is present and we cannot simply ignore it and keep trying to evaluate, assess and confront novel situations, using laws and ways of thinking that originate from a different era [51]. While a raid on a company with the purpose of disclosing and confiscating needed paper documents would be a viable possibility, a raid on a data center (provided that the digital evidence in question is indeed gathered in total on a single data center and not scattered around multiple regions) would not bring similar (if any) results, unless disproportionally significant forces are used in order to find the necessary data, potentially including heavy decrypting capacities, if that was possible at all.
A proposed modern and in another form already existing criterium that could be used as a legal connecting factor between the data in question and a specific person of interest can be found in the so-called power of disposal, i.e., the ability of a specific person to obtain sole or collaborative access and hold the right to alter, delete, suppress, render unusable or even exclude others from access and usage of that certain data. The power of disposal is completely detached from the parameter of physical location of digital evidence and overcomes the already identified implications of legally defining the actual ownership of data. After all, the right of directly accessing user-generated data without any interference of third parties (private or governmental) is already recognized as a legally protected interest in articles 2 (Illegal Access) and 4 (Data Interference) of the Budapest Convention on Cybercrime [43]. The power of disposal is actually a new tenet that blends and successfully addresses the issues that cloud storage raises concerning ownership, authentication and territoriality of digital evidence.
The notion of the power of disposal reinforces the existing legal toolboxes that are used to regulate and, if needed, thoroughly investigate the cloud storage medium. One could argue that the power of disposal can be acknowledged as the inexplicitly theoretical cornerstone of the USA CLOUD Act, which cements the ability of law enforcement authorities to reach out to data stored in the cloud, regardless of their physical whereabouts. Moreover, the power of disposal fortifies the proposed European Preservation and Production Orders and at the same time brings the USA and the International/European legal frameworks closer to dealing with the challenges posed by cloud storage uniformly. Digital evidence found in cloud storage environment can be transborderly accessed and, through the identification sequence, attached to the specific person who controls them. “Cloud Storage is a practice that requires International policy setting. Multinational co-operation and development of globally agreed legal doctrines are necessary steps towards finding solutions to the contemporary technology legal challenges”.
It must be pointed out that, despite being bold steps in a demanding field, European Preservation and Production Orders raise serious issues concerning the general fundamental rights of liberty and security as well as specific fundamental rights of the people and of the private entities or companies involved: the rights of the individual whose data is accessed, include the right to protection of personal data, the right to respect of private and family life, home and communications, the right to freedom of expression and assembly, the right to an effective remedy and to a fair trial, the presumption of innocence and the right of defense and last but not least the horizontal application of the principles of legality and proportionality of criminal offences and penalties. At the same time the rights of the service provider include the right to freely conduct a business and the right to an effective remedy. All these globally renowned and applied rights must be efficiently safeguarded, since competing with criminals of the digital era cannot act as a Trojan Horse for affecting and undermining anyone’s rights (criminal or law-abiding), nor can any democratic state sacrifice its principles and ultimately its soul, upon which it is founded, in the fight against cybercrime.

7. Conclusions

This paper provided a brief overview of the basic practical and legal problems that law enforcement authorities face when they investigate “cloud-based” criminal incidents. The main contribution of this work is that, by collecting several viewpoints and theories from different legal systems, it brings to light the basic spectrum of practical and legal issues that need to be met while venturing “into the cloud” and argues that the only effective way to deal with the cloud is an international scope of understanding and collaboration. The ever-evolving cloud technology is the basis for the latest offshoot in digital forensics aptly called “cloud forensics”, which calls for multidisciplinary solutions as a result of collaboration between technical, organizational and legal perspectives. As “the cloud” becomes more prevalent, case law should develop around how cloud-based evidence is handled. Law enforcement authorities are currently moving in a legally grey area, applying national doctrines in an international matter, since no single state can declare that the entire “cyberspace” is at its disposal. The authors acknowledge the urgency for effective mitigation of cloud-based cybercrimes by considering that the prefix “cyber” actually means “connected” and after man has conquered air, land, ocean and space, perhaps cyberspace truly is “the final frontier” that needs to be jointly explored and globally regulated.

Author Contributions

Conceptualization, C.K. and K.V.; Investigation, C.K.; Methodology, K.V.; Resources, C.K.; Writing—original draft, C.K.; Writing—review & editing, K.V. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Techopedia. What Is Cyberspace?—Definition from Techopedia. Available online: http://www.techopedia.com/definition/2493/cyberspace (accessed on 28 March 2021).
  2. Richter, J.; Kuntze, N.; Rudolph, C. Securing Digital Evidence. In Proceedings of the 5th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2010), Oakland, CA, USA, 20 May 2010; Endicott-Popovsky, B., Lee, W., Eds.; Institute of Electrical and Electronics Engineers: Piscataway, NJ, USA, 2010; pp. 119–130. [Google Scholar] [CrossRef]
  3. U.S. Government Publishing Office. Federal Rules of Evidence. Available online: https://www.uscourts.gov/sites/default/files/evidence-rules-procedure-dec2017_0.pdf (accessed on 30 March 2021).
  4. Montrose, J.L. Basic concepts of the law of evidence. Law Q. Rev. 1954, 70, 527–555. [Google Scholar]
  5. Council of Europe. Convention on Cybercrime. Available online: https://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680081561 (accessed on 30 March 2021).
  6. International Organization for Standardization. Information Technology—Security Techniques—Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence. Available online: https://www.iso.org/standard/44381.html (accessed on 28 March 2021).
  7. Lone, A.H.; Mir, R.N. Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer. Digit. Investig. 2019, 28, 44–55. [Google Scholar] [CrossRef]
  8. Talend. What Is Data Redundancy? Available online: https://www.talend.com/resources/what-is-data-redundancy/ (accessed on 30 March 2021).
  9. Varanasi, P. Understanding Fault Tolerance in Cloud Computing and Its Significance. Available online: https://www.cloudcodes.com/blog/fault-tolerance-in-cloud-computing.html (accessed on 30 March 2021).
  10. Braid, M. Collecting Electronic Evidence After a System Compromise, Global Information Assurance Certification Paper for SANS Institute. Available online: https://www.giac.org/paper/gsec/659/collecting-electronic-evidence-system-compromise/101519 (accessed on 28 March 2021).
  11. Li, M.; Lal, C.; Conti, M.; Hua, D. LEChain: A blockchain-based lawful evidence management scheme for digital forensics. J. Future Gener. Comput. Syst. 2020, 115, 406–420. [Google Scholar] [CrossRef]
  12. ACPO Good Practice Guide for Digital Evidence. 2012. Available online: https://www.digital-detective.net/digital-forensics-documents/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf (accessed on 28 March 2021).
  13. Ryder, K.; SANS Institute, Information Security Reading Room. Computer Forensics—We’ve Had an Incident, Who Do We Get to Investigate? 2002. Available online: https://www.sans.org/reading-room/whitepapers/incident/computer-forensics-weve-incident-investigate-652 (accessed on 28 March 2021).
  14. Licklider, J.C.R. Memorandum for Members and Affiliates of the Intergalactic Computer Network. 1963. Available online: https://www.kurzweilai.net/memorandum-for-members-and-affiliates-of-the-intergalactic-computer-network (accessed on 28 March 2021).
  15. National Institute of Standards and Technology of United States Department of Commerce. The NIST Definition of Cloud Computing. Special Publication 800-145. Available online: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf (accessed on 28 March 2021).
  16. Kaur, R.; Kaur, A. A review paper on evolution of cloud computing, its approaches and comparison with grid computing. Int. J. Comput. Sci. Inf. Technol. 2014, 5, 6060–6063. [Google Scholar]
  17. Subashini, S.; Kavitha, V. Difference between Cloud Storage and Cloud Computing. J. Netw. Comput. Appl. 2010, 34, pp. 1–11.
  18. European Commission. Recommendation for a Council Decision. Authorising the Opening of Negotiations in View of an Agreement between the European Union and the United States of America on Cross-Border Access to Electronic Evidence for Judicial Cooperation in Criminal Matters. 2019. Available online: https://ec.europa.eu/info/sites/info/files/recommendation_council_decision_eu_us_e-evidence.pdf (accessed on 28 March 2021).
  19. Microsoft. Azure Storage Redundancy. Available online: https://docs.microsoft.com/en-us/azure/storage/common/storage-redundancy (accessed on 30 March 2021).
  20. Boas, G. Public International Law: Contemporary Principle and Perspectives; Edward Elgar Publishing: Cheltenham, UK, 2012. [Google Scholar]
  21. Kshetri, N. Pattern of global cyber war and crime: A conceptual framework. J. Int. Manag. 2005, 11, 541–562. [Google Scholar] [CrossRef]
  22. Adams, J. Virtual defense. Foreign Aff. 2001, 80, 98. [Google Scholar] [CrossRef]
  23. Rogers, A. From peer-to-peer networks to cloud computing: How technology is redefining child pornography laws. John’s Law Rev. 2013, 87, 1–39. Available online: https://scholarship.law.stjohns.edu/cgi/viewcontent.cgi?article=6662&context=lawreview (accessed on 28 March 2021). [CrossRef]
  24. Chima, R. Cloud Security—Who Owns the Data? Available online: https://www.bbconsult.co.uk/blog/cloud-security-who-owns-the-data (accessed on 30 March 2021).
  25. Caiapha-Gbady, M. Online Insults of Minors, Criminal Chronicles, P. N. Sakkoulas 2012, 3, 161. [Google Scholar]
  26. Andreadis-Papadimitriou, P. The pornography of minors in the era of the cloud computing, Thoughts on the occasion of Greek Law 4267/2014, Criminal Justice. Nomiki Vivliothiki 2015, 5, 454. [Google Scholar]
  27. Mixed Jury Court of Katerini (GR). Ruling 19-22/2009, Criminal Justice. Nomiki Vivliothiki 2010, 10, 1125. [Google Scholar]
  28. Marin, G. Possession of child pornography: Should you be convicted when the computer cache does the saving for you? Fla. Law Rev. 2008, 60, 1–31. Available online: http://www.floridalawreview.com/wp-content/uploads/2010/01/Marin_BOOK.pdf (accessed on 28 March 2021).
  29. Burmas, G. Efforts to conceptually define the possession of electronic data in child pornography cases, Criminal Justice. Nomiki Vivliothiki 2009, 3, 322. [Google Scholar]
  30. Directive 2011/93/EU of the European Parliament and of the Council of 13 December 2011 on Combating the Sexual Abuse and Sexual Exploitation of Children and Child Pornography. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32011L0093 (accessed on 28 March 2021).
  31. Orton, I.; Alva, A.; Endicott-Popovsky, B. Legal process and requirements for cloud forensic investigations, information resources managing association (USA). In Cloud Technology: Concepts, Methodologies, Tools and Applications; IGI Global: Hershey, PA, USA, 2014; p. 332. [Google Scholar]
  32. Clough, J. A world of difference: The Budapest convention on cybercrime and the challenges of harmonization. Monash Univ. Law Rev. 2014, 40, 1–39. Available online: https://www.monash.edu/__data/assets/pdf_file/0019/232525/clough.pdf (accessed on 28 March 2021).
  33. Kousouni-Pantazopoulou, A. Legal Dimensions of Cloud Computing, Media and Communications Law. Nomiki Vivliothiki 2012, 2, 177. [Google Scholar]
  34. Athens Council for Criminal Procedure in Misdemeanor Cases. Ruling 613/2016 Criminal Justice. Nomiki Vivliothiki 2016, 5, 424. [Google Scholar]
  35. Opinion of the Prosecutor of the Supreme Court (GR) 6/4.7.2008 Criminal Justice 2009, p. 185. Available online: https://eisap.gr/%ce%b3%ce%bd%cf%89%ce%bc%ce%bf%ce%b4%cf%8c%cf%84%ce%b7%cf%83%ce%b7-06-2008/ (accessed on 19 April 2021).
  36. Baum, S. In re Grand Jury Proceedings (Bank of Nova Scotia). NYLS J. Intern. Comp. Law 1984, 5, 2. [Google Scholar]
  37. Brennan Center for Justice. The “Microsoft Ireland” Case (Amicus Brief) [Update]. Available online: https://www.brennancenter.org/our-work/court-cases/microsoft-ireland-case-amicus-brief-update (accessed on 30 March 2021).
  38. GovTrack, S. 512 (114th): Law Enforcement Access to Data Stored Abroad Act. Available online: https://www.govtrack.us/congress/bills/114/s512/text (accessed on 30 March 2021).
  39. Watney, M. Law enforcement access to evidence stored abroad in the cloud. In Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS, Munich, Germany, 7–8 July 2016. [Google Scholar]
  40. Thomas, F.; Brier, J. Defining the limits of governmental access to personal data stored in the cloud: An analysis and critique of Microsoft Ireland. J. Inf. Policy 2017, 7, 327–371. [Google Scholar]
  41. The Harvard Law Review Association. Microsoft corp. v. United States. Harvard Law Rev. 2016, 130, 769–776. [Google Scholar]
  42. U.S. Government Publishing Office. One Hundred Fifteenth Congress of the United States of America. Available online: https://www.govinfo.gov/content/pkg/BILLS-115hr1625enr/html/BILLS-115hr1625enr.htm (accessed on 28 March 2021).
  43. Sachowski, J. Digital Forensics and Investigations, People, Process, and Technologies to Defend the Enterprise; CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
  44. Council of Europe. Principals on Transborder Access to Stored Computer Data. Available online: https://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/Documents/Points%20of%20Contact/24%208%20Principles%20on%20Transborder%20Access%20to%20Stored%20Computer%20Data_en.pdf (accessed on 28 March 2021).
  45. Transborder Access and Jurisdiction: What Are the Options? Report of the Transborder Group (ad-hoc sub-Group on Jurisdiction and Transborder Access to Data). Adopted on 6 December 2012 by the Cybercrime Convention Committee (T-CY) of the Council of Europe. Available online: https://rm.coe.int/16802e79e8 (accessed on 28 March 2021).
  46. Directive 2014/41/EU/3-4-2014 of the European Parliament and the Council of Europe on the European Investigation Order in Criminal Matters. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32014L0041 (accessed on 28 March 2021).
  47. Farmakidis, E.V. European production order and european data preservation order. The adaptation of judicial cooperation procedures in criminal cases in the digital age, Criminal Justice. Nomiki Vivliothiki 2021, 1, 28. [Google Scholar]
  48. Proposal for a Regulation of the European Parliament and of the European Council on European Production and Preservation Orders for Electronic Evidence in Criminal Matters. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=COM%3A2018%3A225%3AFIN (accessed on 28 March 2021).
  49. Daskal, J. The un-territoriality of data. Yale Law J. 2015, 326, 390. [Google Scholar]
  50. Orin, S.; Foreword, K. Accounting for technological change. Harvard J. Law Public Policy 2013, 403, 403. [Google Scholar]
  51. Spoenle, J. Project on Cybercrime from The Economic Crime Division of the Council of Europe. Discussion Paper. Cloud Computing and Cybercrime Investigations: Territoriality vs. the Power of Disposal? 2010. Available online: https://rm.coe.int/16802fa3df (accessed on 28 March 2021).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.