Skip to main content

The Online Environment as a Challenge for Privacy and the Suppression of Crime

  • Chapter
  • First Online:
Handling and Exchanging Electronic Evidence Across Europe

Part of the book series: Law, Governance and Technology Series ((LGTS,volume 39))

Abstract

Anonymity and encryption offered by the Internet represent huge resources for cybercriminals: ransomware and spyware are just two examples of cyber threats that in the past years caused serious damage, not only via desktop computers, but via mobile devices as well.

By its own nature, cybercrime has an outreach which goes well beyond national level. This leads to great difficulties in detecting it, and raises questions over how Law Enforcement can effectively fight it without violating any fundamental rights, including rights on data protection. Europol is the most controlled agency in the world of Law Enforcement and manages to provide high standards of internal and external accountability, as demonstrated by the supervision activity of the DPO, EDPS, and the growing control by the EU Parliament via the JPSG. Europol is a clear example that enhancing both Freedom and Security is possible in the fight against serious and organised crime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See http://fortune.com/2016/07/11/data-oil-brainstorm-tech, last accessed on 20/03/2017.

  2. 2.

    Europol’s Serious and Organised Crime Threat Assessment 2017, p. 30, https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment-2017, last accessed on 21/03/17.

  3. 3.

    Europol’s Internet Organised Crime Threat Assessment 2016, p. 11, https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2016, last accessed 20/03/2017.

  4. 4.

    “The anonymisation techniques used in parts of the Internet, known as Darknets, allow users to communicate freely without the risk of being traced. These are perfectly legitimate tools for citizens to protect their privacy. However, the features of these privacy networks are also of primary interest to criminals that abuse such anonymity on a massive scale for illicit online trade in drugs, weapons, stolen goods, forged IDs and child sexual exploitation” Europol’s Internet Organised Crime Threat Assessment 2014, p. 9, https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2014, last accessed 20/03/2017.

  5. 5.

    Europol’s Internet Organised Crime Threat Assessment 2016, p. 7, https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2016, last accessed 20/03/2017.

  6. 6.

    http://preev.com/btc/eur, last accessed 20/03/2017.

  7. 7.

    http://www.dailymail.co.uk/news/article-3452178/Los-Angeles-hospital-paid-17-000-ransom-hackers-regain-control-computers.html, last accessed 20/03/2017.

  8. 8.

    https://www.nomoreransom.org/ransomware-qa.html, last accessed 20/03/2017.

  9. 9.

    https://www.europol.europa.eu/newsroom/news/no-more-ransom-new-partners-new-decryption-tools-new-languages-to-better-fight-ransomware, last accessed on 21/03/2017.

  10. 10.

    http://dictionary.cambridge.org/dictionary/english/spyware, last accessed on 21/03/2017.

  11. 11.

    http://www.bbc.com/news/world-us-canada-23123964, last accessed on 21/03/2017.

  12. 12.

    http://www.dailymail.co.uk/sciencetech/article-3189613/Millions-Android-phones-risk-software-installed-handset-makers-Certifi-gate-flaw-let-hackers-listen-conversations-steal-data.html, last accessed on 22/03/2017.

  13. 13.

    Europol’s Internet Organised Crime Threat Assessment 2016, p. 8, https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2016, last accessed on 21/03/2017.

  14. 14.

    https://www.europol.europa.eu/events/privacy-in-digital-age-of-encryption-anonymity-online, last accessed on 21/03/2017.

  15. 15.

    https://www.enisa.europa.eu/publications/enisa-position-papers-and-opinions/on-lawful-criminal-investigation-that-respects-21st-century-data-protection, last accessed 20/03/2017.

  16. 16.

    https://www.cnet.com/news/apple-versus-the-fbi-why-the-lowest-priced-iphone-has-the-us-in-a-tizzy-faq, last accessed 20/03/2017.

  17. 17.

    Regulation (EU) 2016/794 of the European Parliament and of the Council of 11 May 2016 on the European Union Agency for Law Enforcement Cooperation (Europol) and replacing and repealing Council Decisions 2009/371/JHA, 2009/934/JHA, 2009/935/JHA, 2009/936/JHA and 2009/968/JHA (ER).

  18. 18.

    See Chapter VI of the Europol Regulation.

  19. 19.

    Article 41 ER.

  20. 20.

    Fijnaut, quoted as per Groenleer (2009), p. 282.

  21. 21.

    http://www.europoljsb.europa.eu/about.aspx, last accessed 21/03/2017.

  22. 22.

    Article 43(3)(f) ER.

  23. 23.

    https://secure.edps.europa.eu/EDPSWEB/edps/EDPS, last accessed 21/03/2017.

  24. 24.

    Articles 51(1) and (2) ER.

  25. 25.

    Article 51(2)(a) ER.

  26. 26.

    Article 51(2)(b) ER.

  27. 27.

    Article 51(3) and (4) ER.

  28. 28.

    Article 52 ER.

References

  • Drewer D, Ellermann J (2012) Europol’s data protection framework as an asset in the fight against cybercrime, 2012. ERA Forum 13:381–395. https://doi.org/10.1007/s12027-012-0268-6

  • Groenleer M (2009) The autonomy of European union agencies. A comparative study of institutional development. Eburon Academic Publishers, Delft, p 282

    Google Scholar 

  • Holt TJ, Bossler AM, Seigfried-Spellar KC (2015) Cybercrime and digital forensics: an introduction, Routledge, p 500

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Drewer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Drewer, D., Ellermann, J. (2018). The Online Environment as a Challenge for Privacy and the Suppression of Crime. In: Biasiotti, M., Mifsud Bonnici, J., Cannataci, J., Turchi, F. (eds) Handling and Exchanging Electronic Evidence Across Europe. Law, Governance and Technology Series, vol 39. Springer, Cham. https://doi.org/10.1007/978-3-319-74872-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74872-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74871-9

  • Online ISBN: 978-3-319-74872-6

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics