In addition to the technical difficulty to trace back criminals in cyberspace, efforts to pin down the location where a cybercriminal engaged in a prohibited conduct and thereby identify the state which can claim and exercise its subjective territorial jurisdiction also encounter legal obstacles.
The issue at stake
Unlike offences which are committed offline, there is no crime scene in cyberspace, at least not in the traditional sense, where it is possible to find material evidence, like DNA or fingerprints, or interview witnesses to attempt determining where exactly the criminal act was performed.Footnote 33 To quote Smit, ‘[c]ybercrime offences are committed without any climbing over fences, balaclavas or angry dogs and property owners. There is only somewhere in the world a computer, which is controlled by a particular person’.Footnote 34 In this context, the law enforcement authorities which are trying to pinpoint the physical origin of a cybercrime can only rely upon available computer data, in particular metadata, i.e. subscriber information and traffic data. These data can indeed be very useful to geolocate cybercriminals. The Convention on Cybercrime defines them as follows:
-
‘the term “subscriber information” means any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which can be established:
-
a.
the type of communication service used, the technical provisions taken thereto and the period of service;
-
b.
the subscriber’s identity, postal or geographic address, telephone and other access number, billing and payment information, available on the basis of the service agreement or arrangement;
-
c.
any other information on the site of the installation of communication equipment, available on the basis of the service agreement or arrangement’.Footnote 35
-
‘traffic data’ means any computer data relating to a communication by means of a computer system, generated by a computer system that formed a part in the chain of communication, indicating the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.Footnote 36
However, the problem lies in the fact that metadata are very often held by service providers outside the territory of the investigating law enforcement agency and therefore outside its jurisdiction and that, as detailed below, traditional cooperation mechanisms – direct transborder access and mutual legal assistance – are unfit to access and secure data stored in foreign jurisdictions in an effective and timely manner. To this must be added the fact that computer data are increasingly stored ‘in the cloud’Footnote 37 where the location of the data may be very difficult to determine at any point in timeFootnote 38 and that such cooperation mechanisms cannot be used in these circumstances.
Three main factors explain the international dimension of metadata, in particular in relation to cybercrimes. First, the ubiquitous architecture of the internet itself allows technology companies significant flexibility as to the geographical location where they may store the data which are in their possession or control. Second, data are by nature extremely volatile and can therefore be easily moved from one jurisdiction to another just with a few mouse clicks. Third, considering that cybercrimes are inherently transnational,Footnote 39 metadata related to these crimes are necessarily spread around several jurisdictions as well. As highlighted by the European Commission (Commission), ‘no crime is as borderless as cybercrime’.Footnote 40 Very early observed,Footnote 41 this distinctive feature is notably reflected in the Comprehensive Study on Cybercrime conducted by the United Nations Office on Drugs and Crime (UNODC) in 2013.Footnote 42 Countries responding to the Study questionnaire indeed reported regional averages of between 30 and 70 per cent of cybercrime acts that involve a transnational dimension and more than half of countries reported that between 50 and 100 per cent of cybercrime acts encountered by the police involve a transnational element.Footnote 43
Direct transborder access
First, in order to obtain metadata held abroad, law enforcement authorities may consider to remotely access the foreign servers where the sought-after data are located directly from their home state. However, self-service is not permitted. Such a transborder online search amounts to an extraterritorial exercise of enforcement jurisidiction and therefore requires, from the point of view of international law,Footnote 44 the consent of the territorial state.Footnote 45 The fact that the law enforcement officer carrying out the investigative measure is not physically located on foreign soil is completely irrelevant. Indeed, as recalled by Sieber and Neubert, ‘[e]ver since the famous Trail Smelter Arbitration, it has been an accepted principle in international law that acts attributable to a state that are conducted from the territory of one state but that take effect within the territory of another state infringe the sovereignty of the affected state’.Footnote 46
Consent from the state where the data are physically located can be obtained in two different ways. Yet, these two options very often prove unsatisfactory.
Firstly, consent can be obtained on a case-by-case basis. However, in addition to the potentially very high number of jurisdictions to get in touch with, the problem is that the legal process to obtain consent is usually time-consuming, which is incompatible with the volatile nature of data.Footnote 47
Secondly, consent can be granted in advance by virtue of a treaty provision, such as Article 40 of the Arab Convention on Combating Information Technology OffencesFootnote 48 or Article 32(b) of the Convention on Cybercrime.Footnote 49 The issue here is not time-related but is that these provisions have strong limitations. Let’s take the example of Article 32(b) of the Convention on Cybercrime which represents a minimum consensus as the drafters of the Convention ‘ultimately determined that it was not yet possible to prepare a comprehensive, legally binding regime regulating this area’.Footnote 50 Article 32(b) provides that states parties can ‘access or receive, through a computer system in its territory, stored computer data located in another Party’.Footnote 51 Therefore, this provision does not apply if the metadata are held on the territory of a non-state party or ‘somewhere online’, in the cloud. This is a serious shortcoming as more than 130 states are not parties to the Convention on CybercrimeFootnote 52 and the use of cloud computing is growing. Moreover, Article 32(b) permits transborder access only ‘if the Party obtains the lawful and voluntary consent of the person who has the lawful authority to disclose the data to the Party through that computer system.’ Yet, the question as to ‘who’ is the person who is ‘lawfully authorized’ to disclose the data may vary depending on the circumstances, laws and regulations applicable. For example, it may be a physical individual person, providing access to his email account or other data that he stored abroad, or it could be a service provider. Service providers will, however, unlikely be able to consent validly and voluntarily to disclosure of their users’ data under Article 32(b). As noted by the Cybercrime Convention Committee (T-CY), ‘[n]ormally, service providers will indeed only be holders of such data; they will not control or own the data, and they will, therefore, not be in a position validly to consent’.Footnote 53 In the same vein, it is very unlikely that the person who stored the data abroad consents to disclosure, especially if he/she is subject to a criminal investigation (pursuant to the nemo tenetur se ipsum accusare principle).
Mutual legal assistance
In addition to direct transborder access, one could think of mutual legal assistance (MLA) as an option to access and secure metadata held abroad in view of identifying the state of origin of a cybercrime. However, although the MLA process remains the primary channel for obtaining digital evidence abroad,Footnote 54 it is largely inefficient. Numerous authors,Footnote 55 but also states,Footnote 56 denounce this state of affairs.
First of all, mutual legal assistance is such a cumbersome and slow process that it does not fit the time-critical need of cyber-investigations. Response time to requests of 6 to 24 months appear to be the norm for parties to the Cybercrime Convention.Footnote 57 According to the 2013 President’s Review Group on Intelligence and Communications Technologies, MLA requests submitted to the United States (US) take an average of approximately 10 months to complete.Footnote 58 This legal scheme cannot compete in an environment where data can be deleted or moved across borders so easily and so quickly, often without human intervention.
Second of all, the admissibility of MLA requests is traditionally subject to the dual criminality principle. Yet, with respect to cybercrimes, the problem is that the definition and scope of cybercrimes may vary considerably from one state to another, which may then result in a refusal of the MLA request. According to a recent survey conducted by the Commission, Member States have actually identified the lack of dual criminality as one of the main grounds for rejecting a MLA request.Footnote 59
Third of all, the question of the language of international requests for mutual assistance is also considered a major problem by most states. According to the T-CY, the main problems in this respect are the delays caused by translations; the cost of translations; the limited quality of translations, including unclear terminology, [and] limited foreign language skills of practitioners’.Footnote 60
Last but not least, the MLA process may simply not be an option if there is no available MLA treatyFootnote 61 or when the physical location of the sought-after metadata is unknown or uncertain because it is stored in the cloud. Footnote 62 Indeed, ‘if investigators do not know where the data are stored, they cannot file an application for mutual legal assistance because they do not know which country to file it with’.Footnote 63 Yet, as noted above, more and more data are migrating into the cloud.