Skip to main content

Hacking by Law-Enforcement: Investigating with the Help of Computational Models and AI Methods

  • Chapter
  • First Online:
Artificial Intelligence, Computational Modelling and Criminal Proceedings
  • 881 Accesses

Abstract

This Chapter addresses the shift generated in criminal investigations by the digital turn. In Western legal culture, home and correspondence have traditionally been considered the beacons of privacy, against intrusion by public authorities. For this reason, interference into an individual’s privacy for investigative purposes has been considered legitimate only under specific and strict conditions, often regulated by international bills of rights and domestic constitutions. With the digital turn, the core of an individual’s private life is not necessarily confined to home and correspondence, any longer: personal, sensitive information is now almost always stored on digital devices, that may prove easily vulnerable to external intrusions. In this context, Law Enforcement Agencies are taking advantage of an unprecedented ‘regulation gap’, allowing for an easy and effective interference in people’s lives. Fundamental rights seem to be the basis for filling that gap, developing from an evolutive interpretation of traditional concepts, like home and correspondence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    E.g. police in England and Wales leads the investigation until the final moment of prosecution, while in a certain number of continental legal order, the prosecutor is the master of the criminal investigation and the police almost responds to her guidelines (e.g. Italy, France, Germany, Spain): see Perrodet (2002), p. 434 f.

  2. 2.

    Ashworth and Zedner (2014), p. 49.

  3. 3.

    Bowling et al. (2019), p. 150.

  4. 4.

    The distinction between prevention and repression of crime spread in continental Europe in the second half of nineteenth century. But it was the eighteenth century when Blackstone set the spotlight on ‘preventive justice’ in his Commentaries on the Laws of England (although he recognised preventive value to punishment in itself): “this preventive justice consists in obliging those persons whom there is a probable ground to suspect of future misbehaviour to stipulate with and to give full assurance to the public that such as is apprehended shall not happen” Blackstone (1765), p. 251. About Blackstone’s position see extensively Ashworth and Zedner (2014), p. 29 f.

  5. 5.

    See Ashworth and Zedner (2014), p. 30. In particular, the Italian legal order provides for a specific system of preventive measures, which is quite unique in Europe (see, more extensively, Chap. 6). Measures (freezing assets or limiting personal liberty of movement and liberty itself), are aimed to prevent the perpetration of crimes, depriving the potential perpetrator of her assets or liberty. As the European Court of Human Rights assessed in the case of De Tommaso v. Italy, a vast majority of the European legal orders do not provide for similar measure. Only Austria, Switzerland, France, Russia, UK provide for similar tools (ECtHR, 23.2.2017, De Tommaso v. Italy, §§ 69, 70).

  6. 6.

    As we shall see, this implies a relevant distinction between intelligence gathering and obtaining evidence to be used in trial: Ashworth and Zedner (2014), p. 51.

  7. 7.

    At least in its basic standard of a prior, democratic mandate to the legislative authority, to pass, for the future, laws that are not overly vague, allowing for a discretional, arbitrary and inconsistent application: Ashworth and Zedner (2014), cit., 265.

  8. 8.

    “Smart, effective, and proactive policing is clearly preferable to simply reacting to criminal acts”: Perry et al. (2003). In 2009, the U.S. Department of Justice, National Institute of Justice, held the first predictive policing symposium, gathering researchers and practitioners in the field of policing, to discuss achievements and expectations in the field of the application of predictive algorithm to crime prevention.

  9. 9.

    E.g. Weisburd and Braga (2006), passim; Benbouzid (2018), p. 1 ff.; Manning (2011).

  10. 10.

    Bowling and Iyer (2019), p. 142 define ‘automated policing’ as “policework that has been converted so as to operate automatically”.

  11. 11.

    https://www.predpol.com/.

  12. 12.

    Pease and Andromachi (2014), passim.

  13. 13.

    With regard to the police body-worn video transmission systems, see Bowling and Iyer (2019), p. 140 ff.

  14. 14.

    Wilson (2019), p. 69 ff.

  15. 15.

    Caplan et al. (2017), p. 133 f.;

  16. 16.

    Basile (2019), p. 12.

  17. 17.

    Kaufmann et al. (2019), pp. 674–692, 679.

  18. 18.

    Basile (2019), p. 12.

  19. 19.

    Schweer (2018), p. 4. See also the presentation at https://land-der-ideen.de/en/project/precobs-software-for-predicting-crimes-355.

  20. 20.

    Oswald et al. (2018), p. 223 ff.

  21. 21.

    Parodi and Sellaroli (2019), p. 56.

  22. 22.

    Ashworth and Zedner (2014), p. 47.

  23. 23.

    Kaufmann et al. (2019), p. 689.

  24. 24.

    Ibidem.

  25. 25.

    For an updated overview see Guide on Art. 2—Right to life, edited by the European Court of Human Rights in 2018, p. 28 ff., at https://www.echr.coe.int/Documents/Guide_Art_2_ENG.pdf.

  26. 26.

    Vervaele (2014), p. 116.

  27. 27.

    Ashworth and Zedner (2014), p. 65.

  28. 28.

    Ashworth and Zedner (2014), p. 51.

  29. 29.

    For a definition see Flor and Oh Jang (2012), p. 13 ff.

  30. 30.

    Cadoppi et al. (2019), passim.

  31. 31.

    Bachmaier Winter (2012), passim.

  32. 32.

    See the Council of Europe Budapest Convention, 23.11.2001, at https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures.

  33. 33.

    Floridi (2017), p. 12.

  34. 34.

    Ashworth and Zedner (2014), p. 51.

  35. 35.

    About “sanctity” of the home, see De Hert and Gutwirth (2006), p. 67.

  36. 36.

    E.g. conditions limiting room-bugging and phone-tapping to some listed crimes, or restricting it to specific situations (e.g., a person who is reasonably suspected of committing a crime is present in the house).

  37. 37.

    Many jurisdictions provide for a double guarantee: each interference into private life must be provided by law and authorised by a judicial authority. The judicial intervention is seen as an opacity tool: De Hert and Gutwirth (2006), p. 69.

  38. 38.

    ECtHR, Kroon and others v. the Netherland, § 31. Nevertheless, the States’ duty to protect individuals’ right to private and family life does not merely compel the State to refrain from unlawful intrusion but may imply also positive obligations. Although a long list of positive obligation has been drawn with regard to family life, also the guarantee of private life may urge the States to positively act in order to regulate, e.g., interactions between individuals (ECtHR, Evans v. the UK, § 75).

  39. 39.

    See De Hert and Gutwirth (2006), p. 71. It has been noted that the Court adopted an approach which is almost similar to the one displayed by many national constitutions: see Santolaya (2012), p. 339.

  40. 40.

    Art. 8: (1) Everyone has the right to respect for his private and family life, his home and his correspondence. (2) There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.

  41. 41.

    It is common opinion that, at the time of drafting the ECHR, the blueprint of privacy was a negative concept, that only in the following decades evolved into a positive theorisation: see Pollicino and Bassini (2017), p. 135.

  42. 42.

    ECtHR, Von Hannover v. Germany (n. 2), §95.

  43. 43.

    ECtHR, 16.12.1992, Niemietz v. Germany, § 29.

  44. 44.

    Although the French version of the Convention refers to ‘domicile’, which has a broader sense: ECtHR, Niemietz v. Germany, cit., § 30.

  45. 45.

    Arendt (2017), p. 87.

  46. 46.

    Privacy is not an absolute but relational value...: De Hert and Gutwirth (2006), p. 74.

  47. 47.

    ECtHR, 13.6.1969, Marckx v. Belgium, § 31.

  48. 48.

    For a reconstruction of privacy as a fundamental right, at least in the western society, see De Hert and Gutwirth (2006), p. 63 f.

  49. 49.

    Or, actually, “weakened”, see Claes et al. (2006), p. 1.

  50. 50.

    ECtHR, Siliadin v. France, 26.7.2005; M.C. v. Bulgaria, 4.12.2003, X and Y v. The Nederland, 26.3.1985.

  51. 51.

    Verbruggen (2006), p. 125: as for these exceptions there are no universal accepted standards, the Court’s task to assess what is “necessary in a democratic society” is not easy.

  52. 52.

    De Beer et al. (2010), p. 75 ff.

  53. 53.

    In critical terms, De Hert and Gutwirth (2006), p. 89.

  54. 54.

    De Hert and Gutwirth (2006), p. 90.

  55. 55.

    It has been noted that the State is the first source of threat to privacy: see Claes et al. (2006), p. 2.

  56. 56.

    De Hert and Gutwirth (2006), p. 91: “the transformation of Art. 8 into a source of procedural Rights and procedural conditions takes it away from the job it was designed for... to prohibit unreasonable exercises of power and to create zones of opacity”.

  57. 57.

    For a critical approach to the theory of ECHR ‘autonomous concepts’, see Letsas (2004), p. 279 ff.

  58. 58.

    ECtHR, MC Cann v.UK, Buckley v. UK, Winterstein and others v. France.

  59. 59.

    ECtHR, 24.11.1986, Gillow v. the UK.

  60. 60.

    Nevertheless, the Court always excluded that Art. 8 encompasses the right of each family to have a home for their own alone (ECtHR, 21.11.1995, Velosa Barreto v. Portugal), or the right to keep up a specific walk of life (ECtHR, 25.9.1996, Buckley v. UK), or to affirm one own’s roots in a specific area (ECtHR, 18.12.1996, Loizidou v. Turkey).

  61. 61.

    ECtHR, (National Federation of Sportspersons’ Associations and unions (FNASS) and Others v. France.

  62. 62.

    Buck v. Germany, § 3.1; Niemietz v. Germany, §§ 29-31; Saint-Paul Luxembourg S.A. v. Luxembourg, § 37, Popovi v. Bulgaria, §103, (Steeg v. Germany (dec.); Société Colas Est and Others v. France, § 41; Kent Pharmaceuticals Limited and Others v. the United Kingdom.

  63. 63.

    Niemietz v. Germany, cit., § 30.

  64. 64.

    Harris et al. (2018), p. 319; Pollicino and Bassini (2017), p. 137.

  65. 65.

    Durante (2019), pp. 151 ff.; 282.

  66. 66.

    As to the many different concepts of privacy, Pagallo (2014), p. 225 ss.

  67. 67.

    Leenes and De Conca (2018), p. 282. The concept of ‘informational privacy’ owes to the famous decision of 1983 by the German Constitutional Court (Bundesverfassungsgericht, decision no., 15 December 1983), ruling that, in a democratic society, citizens must enjoy the right to be aware of who knows what about their personal life.

  68. 68.

    Barfield and Pagallo (forthcoming), Chapter V, Issues of Data Protection.

  69. 69.

    See both General Data Protection Regulation, Art. 4 (1); Modernised Convention 108, Art. 2 (a).

  70. 70.

    Sicurella and Scalia (2013), p. 437.

  71. 71.

    Having been drafted in more recent years, the Charter of Fundamental rights of the EU expressly provides for protection of personal data, in art. 8.

  72. 72.

    Sicurella and Scalia (2013), p. 442.

  73. 73.

    In Kokkinakis V. Greece (25.5.1993) the Court criticized, under this viewpoint, the wording of a national law.

  74. 74.

    Foreseeability played an important role in pushing the due process requirements of art. 6, and the effective remedy of art. 13 ECHR, to merge into the framework of art. 8: De Hert and Gutwirth (2006), p. 85.

  75. 75.

    See the case of Kruslin V. France (24.4.1990), in which even an unwritten rule of criminal procedure was deemed to satisfy art. 8 ECHR.

  76. 76.

    For a critical opinion, see De Hert and Gutwirth (2006), p. 87.

  77. 77.

    ECtHR Klass v. GFR, 6.9.1978.

  78. 78.

    De Schutter (2001), p. 142.

  79. 79.

    “Transparency seems to have replaced legitimacy as the core value of data protection”: De Hert and Gutwirth (2006), p. 80.

  80. 80.

    Sicurella and Scalia (2013), p. 443.

  81. 81.

    ECtHR, 4.12.2008, S. and Marper v. the U.K., § 112.

  82. 82.

    In the case of S. and Marper v. the UK, the Court relied on the fact that many Member States had already settled precise time-limits for retention of biometrics data belonging to suspects who were never convicted of an offence: this made the UK lack of specific terms unjustified.

  83. 83.

    S. and Marper v. the U.K., cit., § 112.

  84. 84.

    The Court applied a similar approach in ECtHR, 13.11.2012, M.M. v. UK, establishing a violation of art. 8 ECHR with regard to the length of retention of criminal records data.

  85. 85.

    Pollicino and Bassini (2017), p. 139.

  86. 86.

    ECtHR, 5.5.2011, Editorial Board of Pravoye Delo and Shtekel v. Ukraine, § 63.

  87. 87.

    See, e.g., ECtHR, 3.4.2007, Copland v. UK, a case of an employer monitoring an employee’s communications and internet access, without using for disciplinary or labour purposes.

  88. 88.

    Art. 7 “Everyone has the right to respect for his or her private and family life, home and communications.”

  89. 89.

    And to art. 12 Universal Declaration of Human Rights and art. 17 ICCPR.

  90. 90.

    Some other important pieces of legislation would be adopted later: Directive 2006/24, on 15.3.2006, and Council Framework Decision 2008/977/JHA, on 8.11.2008. More on this in the text and in the next paragraph.

  91. 91.

    Martinico (2017), p. 117.

  92. 92.

    Pollicino and Bassini (2017), p. 143.

  93. 93.

    See e.g. CJEU, 21.9.1989, Hoechst v. Commission, joint C-46/87 and 227/88.

  94. 94.

    See CJEU, 22.1.2002, Roquette Frères, C-94/00, expressly referring to Hoechst.

  95. 95.

    Tribunal EU 14.11.2012, Nexans v. France and Nexans v. Commission, T-135/09.

  96. 96.

    CJEU, 9.11.201, Volker und Markus Schecke and Eifert, joint C-92/09 and 93/09.

  97. 97.

    CJEU, 24.11.2011, Asociación Nacional de Establecimientos Financieros de Credito and Federación de Comercio Electronico y Marketing Directo c. Administracion del Estado, joint C-468/10 and 469/10.

  98. 98.

    CJEU, 8.4.2014, Digital Rights Ireland Ltd., joint C-293/12 and 594/12, § 69.

  99. 99.

    Pollicino and Bassini (2017), p. 153.

  100. 100.

    Pollicino and Bassini (2017), p. 135.

  101. 101.

    Kranenborg (2014), p. 229.

  102. 102.

    CJEU, 6.11.2003, Bodil Lindqvist, C-101/01.

  103. 103.

    CJEU, 8.5.2008, Tietosuojavaltuutettu c. Satakunnan Markkinapörssi Oy and Satamedia Oy, C-73/07.

  104. 104.

    For an updated review, Pagallo and Durante (2019), Ch. 13; Pollicino and Romeo (2016), especially Ch. 4 and 5.

  105. 105.

    Pollicino and Bassini (2017), p. 150. With regard to off line pieces of information, the Italian Supreme Court had theorized the ‘right to be forgotten’ in the 1990s (Corte di Cassazione, sentenza n. 3679/1998): Durante (2019), p. 132.

  106. 106.

    Another very important decision was delivered by the CJEU in the case of Maximilian Schrems (Maximilian Schrems v. Data Protection Commission, C-362/14, joined party: Digital Rights Ireland Ltd.), with regard, however, to personal data processing for national security reasons, rather than for criminal investigation and prosecution purposes. In that decision, the Court out-ruled the Data Protection Commission decision 2000/520, based on art. 25 dir. 95/46. In decision 520, the Commission had adjudicated that personal data collected in the EU could be transferred, stored and used in the US, on the basis of the alleged adequacy of personal data protection offered by the American ‘safe harbour’ principle. The CJEU, based on art. 7, 8, 48 ChFREU declared the Data Protection Commission decision invalid. The same position has been recently confirmed by the CJEU, in the so-called Schrems II decision, 16.7.2020, followed by strong criticism: Pollicino (2020); Bignami (2020).

  107. 107.

    The Framework decision was adopted under the third pillar, before the Lisbon Treaty entered into force. FD were based on unanimity and were binding for MS only in their aims. Under the peculiar third pillar regulation, the CJEU had limited jurisdiction and the rates of implementation by MS were almost very low. In particular, the FD 2008/977/JHA applied only to the exchange of data among LEAs or judicial authorities: it did not apply to personal data collected and processed inside one national legal order.

  108. 108.

    It should be considered whether such situation falls out of the scope of dir. 2016/680 and under the GDPR: in this case, the data subject would have no remedy, but this should be in the possibility of the third person suffering for the negative legal consequence of the fully automated decision.

  109. 109.

    Signorato (2018), p. 97.

  110. 110.

    Klitou (2014), passim.

  111. 111.

    In fact, it will be up to the MS to strike a proper and effective balance between the two concurrent interests: De Hert and Papakstantinou (2016), p. 12.

  112. 112.

    Floridi (2017), p. 9.

  113. 113.

    Floridi (2017), p. 10.

  114. 114.

    Even though ‘hyperhistory’ is a new era in human evolution, it does not transcend completely the spatio-temporal constraints in which the modern society evolved: thus, it is a matter of reframing the concepts of time and space: Floridi (2017), p. 24.

  115. 115.

    Signorato (2018), p. 43.

  116. 116.

    The term is used by Floridi (2017), p. 24.

  117. 117.

    E.g. toilets of public premises: in many jurisdictions, privacy in secluded areas of public place is protected from arbitrary intrusion and the use of intercepted conversions, pictures, videos are prohibited by an exclusionary rule (for an example see Italy, Triggiani 2019, p. 153).

  118. 118.

    Bundesverfassungsgericht, Decision no. 370, 27.2.2008.

  119. 119.

    Flor (2009), p. 697 ss.

  120. 120.

    Picotti (2004), p. 80.

  121. 121.

    Signorato (2018), p. 80.

  122. 122.

    The phenomenon falls under the phenomenon of extimacy (English translation for the French extimité, first used by the French psychoanalyst Jacques Lacan, in late Fifties), a concept having been theorised in opposition to intimacy. For a general overview, see Pavón (2014), p. 661: “extimacy indicates the nondistinction and essential identity between the dual terms of the outside and the deepest inside, the exterior and the most interior of the psyche”.

  123. 123.

    Libe Report, 21.

  124. 124.

    Libe Report, 23.

  125. 125.

    Libe Report, 9.

  126. 126.

    Torre (2017), pp. 12–17; Pittiruti (2017), p. 69 ff.; Signorato (2018), p. 237 ff.

  127. 127.

    Bellovin et al. (2014), espec. p. 22 ff.

  128. 128.

    Hildebrandt (2008), p. 28.

  129. 129.

    Costanzi (2019), 1 ff.

  130. 130.

    Gulotta (2017), p. 118.

  131. 131.

    See Oravec (2010), p. 155.

  132. 132.

    Cfr. https://www.biometricupdate.com/201907/banco-bolivariano-selects-facephi-biometric-digital-onboarding-technology; “The widespread use of CCTV cameras for surveillance and security applications have stirred extensive research interests in video-based face recognition. (…) Automatic face recognition technology is becoming an indispensable tool for modern forensic investigations”;Wei and Li (2017), p. 190.

  133. 133.

    The most important points are: the nasion (root of the nose); glabella (point located above the root of the nose, where the skin is generally free of hair); pronasal (protruding point of the tip of nose); spinal nose (point corresponding to the nasal subset); wingspan (most protruding point of the nose wing); prosthion (upper point of the labial-nose furrow); gonion (lower margin of the jaw branch); gnathion (lower protrusion of the chin); trichion (hairline); vertex (highest point of the head); zygion (most protruding point of the cheekbone). For a general and in-depth analysis see Balossino and Siracusa (2004), passim.

  134. 134.

    See Ministero dell’Interno – Dipartimento di pubblica sicurezza, Capitolato tecnico, Procedura volta alla fornitura della soluzione integrata per il sistema automatico di riconoscimento immagini s.a.r.i. lotto n° 1, available at https://www.poliziadistato.it/statics/06/20160627-ct-sari%2D%2D4-.pdf (20.12.2019).

  135. 135.

    See http://www.interno.gov.it/it/notizie/sistema-automatico-riconoscimento-immagini-futuro-diventa-realta (17/6/2019).

  136. 136.

    Still not in use by the Italian State Police.

  137. 137.

    More specifically, the research can follow three ways: (1) on the basis of the facial image (face-based research) (2) on the basis of anagraphic or descriptive information associated with the images in the recorded people database (anagraphic/descriptive search); (3) on the combined basis of methods 1 and 2 (combined search).

  138. 138.

    For example, see “Amazon scraps secret AI recruiting tool that showed bias against women”, Reuters, October 2018.

  139. 139.

    For a general overview, related to LEAs hacking, see Signorato (2018), p. 263 ff.

  140. 140.

    House of Lords, 23.5.2001, HM the Queen v. Secretary of State for the Home Dept.; UK Supreme Court, 19.6.2013, Bank Mellat v. HM’s Treasury.

References

  • Arendt H (2017) Vita activa. La condizione umana. Bompiani, Milano

    Google Scholar 

  • Ashworth A, Zedner L (2014) Preventive justice. Oxford University Press, Oxford

    Google Scholar 

  • Bachmaier Winter L (ed) (2012) Terrorismo, proceso penal y derechos fundamentales. Marcial Pons, Madrid

    Google Scholar 

  • Balossino N, Siracusa S (2004) L’identificazione basata sul volto: metodi fisionomici e metrici, Security Forum. Edizioni ItasForum, Bergamo

    Google Scholar 

  • Barfield W, Pagallo U (forthcoming) Advanced introduction to the laws of AI, Chapter V, Issues of Data Protection. Elgar, Cheltenham

    Google Scholar 

  • Basile F (2019) Intelligenza artificiale e diritto penale: quattro possibili percorsi di indagine, Available at https://dirittopenaleuomo.org/contributi_dpu/intelligenza-artificiale-e-diritto-penale-quattro-possibili-percorsi-di-indagine/

  • Bellovin SM, Blaze M, Clark C, Landau S (2014) Lawful Hacking: using existing vulnerabilities for wiretapping on the internet. Northwest J Technol Intellect Property 12:1–64

    Google Scholar 

  • Benbouzid B (2018) Values and consequences in predictive machine evaluation. A sociology of predictive policing. Sci Technol Stud 31:1–18

    Google Scholar 

  • Bignami F (2020) Schrems II: the right to privacy and the new Illiberalism. Verfassungsblog, 29.7.2020

    Google Scholar 

  • Blackstone W (1765) Commentaries on the laws of England in four books. 4th book, ch. 18

    Google Scholar 

  • Bowling B, Iyer S (2019) Automated policing: the case of body-worn video. Int J Law Context (2):140–161

    Google Scholar 

  • Bowling B, Reiner R, Sheptycki J (2019) The politics of the police (5e). Oxford University Press, Oxford

    Google Scholar 

  • Cadoppi A, Canestrari S, Manna A, Papa M (eds) (2019) Cybercrime. Utet, Torino

    Google Scholar 

  • Caplan JM, Kennedy LW, Barnum JD, Piza EL (2017) Crime in context: utilizing risk terrain modeling and conjunctive analysis to explore the dynamics of criminogenic behavior setting. J Contemp Crim Justice 33(2):417–431

    Google Scholar 

  • Claes E, Duff A, Gutwirth S (2006) Privacy and the criminal law. Intersentia, Antwerp

    Google Scholar 

  • Costanzi C (2019) Big data e garantismo digitale. Le nuove frontiere della giustizia penale nel XXI secolo, Available at www.lalegislazionepenale.eu, 21.12.2019

  • De Beer D, De Hert P, Gonzalez FG, Gutwirth S (2010) Nouveaux eclairages de la Notion de donné personnelle et application audacieuse du critère de proportionalité. Revue Trimestrielle des Droits de l’Homme:75–107

    Google Scholar 

  • De Hert P, Gutwirth S (2006) Privacy, data protection and law enforcement. Opacity of the individual and transparency of power. In: Cleas E, Duff A, Gutwirth S (eds) Privacy and the criminal law. Intersentia, Antwerp, pp 61–104

    Google Scholar 

  • De Hert P, Papakstantinou V (2016) The new police and criminal justice data protection directive. New J Eur Crim Law 7(1):7–19

    Google Scholar 

  • De Schutter E (2001) La Convention européenne des droits de l’homme à l’épreuve de la lutte contre le terrorisme. Revue Universelle des Droits de l’Homme

    Google Scholar 

  • Durante M (2019) Potere computazionale. L’impatto delle ICT su diritto, società e sapere. Meltemi, Milano

    Google Scholar 

  • Flor R (2009) Brevi riflessioni a margine della sentenza del Bundesverfassungsgericht. Rivista Trimestrale Di Diritto Penale Delleconomia 22:695–716

    Google Scholar 

  • Flor R, Oh Jang J (2012) Introduction. In: Manacorda S, Flor R, Oh Jang J (eds) Cyber-criminality: finding a balance between freedom and security. Ispac, Milano

    Google Scholar 

  • Floridi L (2017) The fourth revolution. Oxford University Press, Oxford

    Google Scholar 

  • Gulotta G (2017) Il volto nell’investigazione e nel processo. Nuova fisiognomica Forense. Giuffrè, Milano

    Google Scholar 

  • Harris D, O’Boyle M, Bates E, Buckley C (2018) Harris, O’Boyle and Warbrick: law of the European convention of human rights, 4th edn. Oxford University Press, Oxford

    Google Scholar 

  • Hildebrandt M (2008) Defining profiling: new type of knowledge? In: Hildebrandt M, Gutwirth S (eds) Profiling the European citizens. Cross-disciplinary perspectives. Springer, Cham

    Google Scholar 

  • Kaufmann M, Egbert S, Leese M (2019) Predictive policing and the politics of patterns. Br J Criminol 59:674–692

    Google Scholar 

  • Klitou D (2014) Privacy-invading technologies and privacy by design. Safeguarding privacy, liberty and security in the 21st century. Springer, Cham

    Google Scholar 

  • Kranenborg HR (2014) Article 8. In: Peers S et al (eds) The EU charter of fundamental rights. A commentary. Hart Publishing, London

    Google Scholar 

  • Leenes R, De Conca S (2018) Artificial intelligence and privacy. AI enters the house though the Cloud. In: Barfield W, Pagallo U (eds) Research handbook on the law of artificial intelligence. Elgar, Cheltenham

    Google Scholar 

  • Letsas G (2004) The truth in autonomous concepts: how to interpret the ECHR. Eur J Int Law 15:279–305

    Google Scholar 

  • Manning PK (2011) The technology of policing: crime mapping, information technology, and the rationality of crime control. NYU Press, New York

    Google Scholar 

  • Martinico G (2017) Art. 7 ChFREU. In: Mastroianni R, Pollicino O, Allegrezza S, Pappalardo F, Razzolini O (eds) Carta dei diritti fondamentali dell’Unione europea. Gifffré, Milano

    Google Scholar 

  • Oravec M (ed) (2010) Face recognition. IntechOpen, Rijeka

    Google Scholar 

  • Oswald M, Grace J, Urwin S, Barnes G (2018) Algorithmic risk assessment policing models: lessons from the Durham HART model and “Experimental” proportionality. Inf Commun Technol Law 27:223–250

    Google Scholar 

  • Pagallo U (2014) Il diritto nell’età dell’informazione. Il riposizionamento tecnologico degli ordinamenti giuridici tra complessità sociale, lotta per il potere e tutela dei diritti. Giappichelli, Torino

    Google Scholar 

  • Pagallo U, Durante M (2019) Human rights and the right to be forgotten. In: Susi M (ed) Human rights, digital society and the law. Routledge, Abingdon

    Google Scholar 

  • Parodi C, Sellaroli V (2019) Sistema penale e intelligenza artificiale: molte speranze e qualche equivoco. Diritto penale contemporaneo (6). Available at www.penalecontemporaneo.it

  • Pavón CP (2014) Estimacy. In: Teo T (ed) Encyclopedia of critical psychology. Springer, New York

    Google Scholar 

  • Pease E, Andromachi T (2014) Using modelling to predict and prevent victimization. Springer, Cham

    Google Scholar 

  • Perrodet A (2002) The public prosecutor. In: Marty MD, Spencer J (eds) European criminal procedures. Cambridge University Press, Cambridge

    Google Scholar 

  • Perry WL, McInnis B, Price CC, Smith SC, Hollywood JS (2003) Predictive policing. The role of crime forecasting in law enforcement operations, Available at www.rand.org

  • Picotti L (2004) Sistematica dei reati informatici, tecniche di formulazione legislativa e beni giuridici tutelati. In: Picotti L (ed) Il diritto penale dell’informatica nell’epoca di Internet. Cedam, Padova

    Google Scholar 

  • Pittiruti M (2017) Digital Evidence e processo penale. Giappichelli, Torino

    Google Scholar 

  • Pollicino O (2020) Diabolical persistence. Verfassungsblog, 25.7.2020

    Google Scholar 

  • Pollicino O, Bassini M (2017) Art. 8 ChFREU. In: Mastroianni R, Pollicino O, Allegrezza S, Pappalardo F, Razzolini O (eds) Carta dei diritti fondamentali dell’Unione europea. Giuffré, Milano, p 132 ff

    Google Scholar 

  • Pollicino O, Romeo G (eds) (2016) The internet and constitutional law. Routledge, Abingdon

    Google Scholar 

  • Santolaya P (2012) The right to a private and family life. In: Loca XG, Santolaya P (eds) Europe of rights: a compendium on the European convention of human rights. Martinus Nijhoff Publishers, Leiden

    Google Scholar 

  • Schweer T (2018) Predictive Policing mit Precobs. In: Institut für Versicherungswirtschaft der Universität St. Gallen (ed) St. Galler Trendmonitor für Risiko- und Finanzmärkte. Produktund Serviceinformationen, vol 40. Universität St. Gallen, St. Gallen, pp 12–14

    Google Scholar 

  • Sicurella R, Scalia V (2013) Data mining and profiling in the area of freedom, security and justice. New J Eur Crim Law 14(4):409–460

    Google Scholar 

  • Signorato S (2018) Le indagini digitali. Profili strutturali di una metamorfosi investigativa. Giappichelli, Torino

    Google Scholar 

  • Torre M (2017) Il captatore informatico. Giuffrè, Milano

    Google Scholar 

  • Triggiani N (2019) Le videoriprese investigative e l’uso dei droni. In: Scalfati A (ed) Le indagini atipiche, 2nd edn. Giappichelli, Torino, pp 161–190

    Google Scholar 

  • Verbruggen G (2006) The glass may be half-full or half-empty, but it is definitely fragile. In: Claes E, Duff A, Gutwirth S (eds) Privacy and the criminal law. Intersentia, Antwerp, pp 121–134

    Google Scholar 

  • Vervaele JEA (2014) Surveillance and criminal investigation: blurring of thresholds and boundaries in the criminal justice system? In: Gutwirth S, Leenes R, De Hert P (eds) Reloading data protection. Springer, Cham

    Google Scholar 

  • Wei X, Li C (2017) Face recognition technologies for evidential evaluation of video traces. In: Tistarelli M, Champod C (eds) Handbook of biometrics for forensic science. Springer, Cham

    Google Scholar 

  • Weisburd D, Braga A (eds) (2006) Police innovation: contrasting perspectives. Cambridge University Press, Cambridge

    Google Scholar 

  • Wilson D (2019) Platform policing and the real-time cop. Surveill Soc 17(1/2):69–75

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Quattrocolo, S. (2020). Hacking by Law-Enforcement: Investigating with the Help of Computational Models and AI Methods. In: Artificial Intelligence, Computational Modelling and Criminal Proceedings. Legal Studies in International, European and Comparative Criminal Law, vol 4. Springer, Cham. https://doi.org/10.1007/978-3-030-52470-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-52470-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-52469-2

  • Online ISBN: 978-3-030-52470-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics