搜索未知的地方:暗网上的执法管辖权

Ahmed Ghappour
{"title":"搜索未知的地方:暗网上的执法管辖权","authors":"Ahmed Ghappour","doi":"10.2139/SSRN.2742706","DOIUrl":null,"url":null,"abstract":"The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (e.g. in the commission of a crime or in order to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet in order to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers are subject to the remote “searches” and “seizures” that take place. The result may well be the greatest extraterritorial expansion of enforcement jurisdiction in U.S. law enforcement history. This article examines how the use of hacking tools on the dark web profoundly disrupts the legal architecture upon which cross-border criminal investigations rest. The overseas cyber operations that result raise increasingly difficult questions regarding just whom may authorize these activities, where they may be deployed, and whom they may lawfully be executed against. The rules of criminal procedure fail to regulate law enforcement hacking because they allow these critical decisions to be made by rank-and-file investigators, despite potentially disruptive foreign relations implications. This article outlines a regulatory framework that reallocates decision-making to institutional actors best suited to determine U.S. foreign policy, without sacrificing law enforcement’s ability to identify and locate criminal suspects that have taken cover on the dark web.","PeriodicalId":126321,"journal":{"name":"UC Hastings Law Legal Studies Research Paper Series","volume":"114 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web\",\"authors\":\"Ahmed Ghappour\",\"doi\":\"10.2139/SSRN.2742706\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (e.g. in the commission of a crime or in order to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet in order to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers are subject to the remote “searches” and “seizures” that take place. The result may well be the greatest extraterritorial expansion of enforcement jurisdiction in U.S. law enforcement history. This article examines how the use of hacking tools on the dark web profoundly disrupts the legal architecture upon which cross-border criminal investigations rest. The overseas cyber operations that result raise increasingly difficult questions regarding just whom may authorize these activities, where they may be deployed, and whom they may lawfully be executed against. The rules of criminal procedure fail to regulate law enforcement hacking because they allow these critical decisions to be made by rank-and-file investigators, despite potentially disruptive foreign relations implications. This article outlines a regulatory framework that reallocates decision-making to institutional actors best suited to determine U.S. foreign policy, without sacrificing law enforcement’s ability to identify and locate criminal suspects that have taken cover on the dark web.\",\"PeriodicalId\":126321,\"journal\":{\"name\":\"UC Hastings Law Legal Studies Research Paper Series\",\"volume\":\"114 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"UC Hastings Law Legal Studies Research Paper Series\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/SSRN.2742706\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"UC Hastings Law Legal Studies Research Paper Series","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/SSRN.2742706","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23

摘要

执法部门利用黑客工具追捕在暗网上匿名通信的犯罪嫌疑人,这在刑事诉讼程序和国际法之间形成了一个隐现的爆发点。使用暗网的犯罪行为者(例如在犯罪或为了逃避当局)模糊了第三方留下的数字足迹,使现有的监视方法过时。作为回应,执法部门实施了黑客技术,在互联网上部署监视软件,以便直接访问和控制犯罪分子的设备。基础技术的实际现实使得位于国外的计算机不可避免地受到远程“搜索”和“扣押”的影响。其结果很可能是美国执法史上执法管辖权的最大域外扩张。本文探讨了黑客工具在暗网上的使用如何深刻地破坏了跨境刑事调查所依赖的法律架构。由此产生的海外网络行动提出了越来越困难的问题,即谁可以授权这些活动,这些活动可以部署在哪里,以及这些活动可以合法地针对谁。刑事诉讼规则无法规范执法部门的黑客行为,因为它们允许普通调查人员做出这些关键决定,而不顾可能对外交关系造成的破坏性影响。本文概述了一个监管框架,该框架将决策权重新分配给最适合决定美国外交政策的机构参与者,同时不牺牲执法部门识别和定位在暗网上躲藏的犯罪嫌疑人的能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Searching Places Unknown: Law Enforcement Jurisdiction on the Dark Web
The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (e.g. in the commission of a crime or in order to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet in order to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers are subject to the remote “searches” and “seizures” that take place. The result may well be the greatest extraterritorial expansion of enforcement jurisdiction in U.S. law enforcement history. This article examines how the use of hacking tools on the dark web profoundly disrupts the legal architecture upon which cross-border criminal investigations rest. The overseas cyber operations that result raise increasingly difficult questions regarding just whom may authorize these activities, where they may be deployed, and whom they may lawfully be executed against. The rules of criminal procedure fail to regulate law enforcement hacking because they allow these critical decisions to be made by rank-and-file investigators, despite potentially disruptive foreign relations implications. This article outlines a regulatory framework that reallocates decision-making to institutional actors best suited to determine U.S. foreign policy, without sacrificing law enforcement’s ability to identify and locate criminal suspects that have taken cover on the dark web.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信