Abstract
This paper analyses—with special attention to its common provisions, its safeguards of technology-related investigation measures and its guiding principles—the Spanish legal reform of the Criminal Procedure Code (hereinafter, LECrim) of 2015, which updated the domestic framework with a new and modern regulation of technology-related investigative measures, in order to comply with the requirements of the Cybercrime Convention, the ECHR case law and other EU legal instruments, and to help the Law Enforcement Agencies on gathering digital evidence.
Similar content being viewed by others
Notes
See Sinrod/Reilly [12].
Regarding the Council of Europe, see the Recommendations No R (89) 9 on computer-related crime, No R (95) 13 concerning problems of criminal procedural law connected with information technology, and Rec(2005) 10 on ‘special investigation techniques’ in relation to serious crimes including acts of terrorism. Regarding the European Union, see, among others, the widely recognised study by Ulrich Sieber Legal Aspects of Computer-Related Crime in the Information Society—COMCRIME; the Communication e-Europe 2002, COM (2000) 890 final; the Communication Towards a general policy on the fight against cyber crime, COM (2007) 267 final; the Council’s strategy to reinforce the fight against cybercrime (2008); the Communication An area of freedom, security and justice serving the citizen, COM (2009) 262 final; the Stockholm Programme and the Action Plan Implementing the Stockholm Programme, COM (2010) 171 final.
In their judgments of 30th July 1998 (Valenzuela Contreras v. Spain) and 18th February 2003 (Prado Bugallo v. Spain), the European Court of Human Rights held unanimously that the Spanish regulation of wiretapping violated Article 8 of the Convention because it established insufficient safeguards to avoid abuses of power such as a definition of the categories of people liable to have their telephones tapped by judicial order, the nature of the offences which may give rise to such an order, a limit on the duration of telephone tapping, the procedure for drawing up the summary reports containing intercepted conversations, the precautions to be taken in order to communicate the recordings intact and in their entirety for possible inspection by the judge and by the defence and the circumstances in which recordings may or must be erased or the tapes destroyed, in particular where an accused has been discharged by an investigating judge or acquitted by a court.
Vaciago/Ramalho [14], p. 93.
See ECtHR, Huvig v. France, no. 11105/84, 24.4.1990, § 33: “Tapping and other forms of interception of telephone conversations represent a serious interference with private life and correspondence and must accordingly be based on a ”law” that is particularly precise. It is essential to have clear, detailed rules on the subject, especially as the technology available for use is continually becoming more sophisticated.”
See the SSTS of 27 June 2002, 25 July and 25 September 2003.
See Castro/Torres-Dulce [3].
Adesco [1].
Osula [10].
See the Explanatory Report, at paras. 193-195. Available at: http://conventions.coe.int/Treaty/en/Reports/Html/185.htm.
Council of Europe Cybercrime Convention Committee (T-CY) [5].
Koops/Goodwin [9], p. 55.
Spoenle [13].
Conings [4].
See Schwerha [11].
References
Adesco, A.: The demise of anonymity: a constitutional challenge to the convention on cybercrime. Loyola Los Angel. Entertain. Law Rev. 23, 90 (2002)
Bañuls Gómez, F.: Las intervenciones telefónicas a la luz de la jurisprudencia más reciente (2007). Available at http://noticias.juridicas.com
Castro, G., Torres-Dulce, E.: Garrigues commentary. Litigation and Arbitration, 8-2015. Available at http://www.garrigues.com/en_GB/new/organic-law-132015-amending-criminal-procedure-law-strengthen-procedural-guarantees-and-regulate
Conings, C.: Locating criminal investigative measures in a virtual environment. Where do searches take place in cyberspace’. B-CCENTRE Legal Research report 43-72 (2015). Available at https://lirias.kuleuven.be/handle/123456789/492870
Council of Europe Cybercrime Convention Committee (T-CY): (Draft) Elements of an additional protocol to the Budapest convention on cybercrime regarding transborder access to data (April 9, 2013). Available at http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/TCY%202013/T-CY%282013%2914transb_elements_protocol_V2.pdf
Gercke, M.: Understanding Cybercrime, 1st edn. UIT, Ginebra (2009)
Goldschmith, J.: The internet and the legitimacy of remote cross-border searches. University of Chicago Legal Forum. Available at http://papers.ssrn.com/abstract=285732
Hernández Guerrero, F.: La intervención de las comunicaciones electrónicas’. 3 Estudios Jurídicos. Ministerio Fiscal 350 et 391 (2001)
Koops, B-J., Goodwin, M.: Cyberspace, the cloud, and cross-border criminal investigation. the limits and possibilities of international law. Tilburg Institute for Law, Technology, and Society CTLD—Center for Transboundary Legal Development, December 2014. Tilburg Law School research paper No. 5/2016. Available at SSRN: https://ssrn.com/abstract=2698263
Osula, A-M.: Accessing extraterritorially located data: options for states. NATO Cooperative Cyber Defence Centre for Excellence, Tallinn (2015). Available at https://ccdcoe.org/sites/default/files/multimedia/pdf/Accessing%20extraterritorially%20located%20data%20options%20for%20States_Anna-Maria_Osula.pdf
Schwerha, J.: Law enforcement challenges in cross-border acquisition of electronic evidence from cloud computing providers. January 2010. Available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=09000016802fa3dc
Sinrod, E.J., Reilly, W.P.: Cyber-crimes: a practical approach to the application of federal computer crime laws. Santa Clara Comput. High Technol. Law J. 16, 179 (2000)
Spoenle, J.: Cloud computing and cybercrime investigations: territoriality vs. the power of disposal? Council of Europe, Strasbourg (2010). Available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=09000016802fa3df
Vaciago, G., Ramalho, D.S.: Online searches and online surveillance: the use of trojans and other types of malware as means of obtaining evidence in criminal proceedings. Dig. Evid. Electron. Signat. Law Rev. 13, 93 (2016)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ortiz-Pradillo, J.C. The new regulation of technology-related investigative measures in Spain. ERA Forum 18, 425–435 (2017). https://doi.org/10.1007/s12027-017-0484-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12027-017-0484-1