In an attempt to strengthen the position of the police to fight cybercrime, the Dutch government proposed new legislation giving police agencies new investigative powers on the Internet. This proposed legislation is controversial as it allows police agencies to hack into computers and install spyware. This paper examines the background and contents of the proposed legislation and tries to answer the question to what extent these new investigative powers may result in infringements of the right to privacy and other fundamental rights of citizens, and whether these infringements are justified. The framework for this evaluation, mainly based on the European Convention on Human Rights, focuses on the legitimacy and necessity of the proposed i...
The use of new technologies has become widespread in the last decade, giving rise to various risks a...
Through a consideration of the use of mobile devices by the police and the public, this chapter expl...
The internet is a key source of information, communication and propaganda in the context of terroris...
In an attempt to strengthen the position of the police to fight cybercrime, the Dutch government p...
Strengthening enforcement of cybercrime law is not a simple question of more legislation. Botnet inv...
Worldwide child pornography networks that are dismantled by the police, hacks that disrupt entire bu...
In this Article, we conduct a comparative legal analysis of criminal procedure rules in the United S...
The natural consequence of development of Information Society is that investigators should be able t...
This article examines two contrasting approaches to the governance of police investigations for ensu...
This Working Paper is based on two research reports that were the outcome of the research carried ou...
As a result of society’s increasing digitisation, the police have ever more opportunities to collect...
Abstract The primary goal of this paper is to raise awareness regarding legal loopholes and enabling...
The opportunities afforded by the global information space give rise to the potential for the commis...
Surveillance is becoming ubiquitous in our society. We can also see the emergence of "smart" surveil...
Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catch...
The use of new technologies has become widespread in the last decade, giving rise to various risks a...
Through a consideration of the use of mobile devices by the police and the public, this chapter expl...
The internet is a key source of information, communication and propaganda in the context of terroris...
In an attempt to strengthen the position of the police to fight cybercrime, the Dutch government p...
Strengthening enforcement of cybercrime law is not a simple question of more legislation. Botnet inv...
Worldwide child pornography networks that are dismantled by the police, hacks that disrupt entire bu...
In this Article, we conduct a comparative legal analysis of criminal procedure rules in the United S...
The natural consequence of development of Information Society is that investigators should be able t...
This article examines two contrasting approaches to the governance of police investigations for ensu...
This Working Paper is based on two research reports that were the outcome of the research carried ou...
As a result of society’s increasing digitisation, the police have ever more opportunities to collect...
Abstract The primary goal of this paper is to raise awareness regarding legal loopholes and enabling...
The opportunities afforded by the global information space give rise to the potential for the commis...
Surveillance is becoming ubiquitous in our society. We can also see the emergence of "smart" surveil...
Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catch...
The use of new technologies has become widespread in the last decade, giving rise to various risks a...
Through a consideration of the use of mobile devices by the police and the public, this chapter expl...
The internet is a key source of information, communication and propaganda in the context of terroris...