{"id":8566,"date":"2023-04-13T15:32:52","date_gmt":"2023-04-13T13:32:52","guid":{"rendered":"https:\/\/eulawenforcement.com\/?p=8566"},"modified":"2023-07-16T12:19:47","modified_gmt":"2023-07-16T10:19:47","slug":"hacking-for-justice-how-europol-walks-the-tightrope-between-fighting-crime-and-protecting-fundamental-rights-draft","status":"publish","type":"post","link":"https:\/\/eulawenforcement.com\/?p=8566","title":{"rendered":"Hacking for Justice: How Europol Walks the Tightrope Between Fighting Crime and Protecting Fundamental Rights"},"content":{"rendered":"\n<p>By An Nhien, Iman, Liudmila, Timothy and Alice<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8656\" src=\"https:\/\/eulawenforcement.com\/wp-content\/uploads\/2023\/04\/Picture1-1.png\" alt=\"\" width=\"602\" height=\"401\" srcset=\"https:\/\/eulawenforcement.com\/wp-content\/uploads\/2023\/04\/Picture1-1.png 602w, https:\/\/eulawenforcement.com\/wp-content\/uploads\/2023\/04\/Picture1-1-300x200.png 300w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.teacherspayteachers.com\/Product\/National-Security-vs-Privacy-2412022?st=bf90f1535a8ad42fb8b89d36931e4b9d\">National Security vs. Privacy<\/a><\/p>\n<p>By An Nhien, Iman, Liudmila, Timothy and Alice<\/p>\n<p>In the ever-evolving battle against serious and organized crime, law enforcement agencies (LEAs) are turning to a new weapon: <a href=\"https:\/\/www.brookings.edu\/research\/lawful-hacking-and-the-case-for-a-strategic-approach-to-going-dark\/\">lawful hacking<\/a>. But as the supporting role of using hacking techniques by the and other agencies becomes more prevalent, questions are being raised about the impact on fundamental rights, particularly the right to privacy. With events like the high-profile <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/dismantling-of-encrypted-network-sends-shockwaves-through-organised-crime-groups-across-europe\">EncroChat<\/a> case and <a href=\"https:\/\/curia.europa.eu\/jcms\/upload\/docs\/application\/pdf\/2020-10\/cp200123en.pdf\">a landmark decision<\/a> of the Court of Justice of the European Union (\u2018CJEU\u2019), the legality and implications of hacking techniques in general, and the supporting role of Europol in facilitating lawful hacking in particular, are under intense scrutiny. Join us as we delve into the legal limbo and decode the delicate balance between privacy and public safety in the realm of facilitating lawful hacking by Europol.<\/p>\n<p><strong><u>What is Lawful Hacking?<\/u><\/strong><\/p>\n<p>There is no singular definition at the EU level. Similar terms such as \u201clawful hacking\u201d, <a href=\"https:\/\/www.newamerica.org\/cybersecurity-initiative\/policy-papers\/brief-history-law-enforcement-hacking-united-states\/\">\u201claw enforcement hacking\u201d<\/a>, <a href=\"https:\/\/www.stiftung-nv.de\/sites\/default\/files\/government_hacking_akt.feb_.pdf\">\u201cgovernment hacking\u201d<\/a>, or <a href=\"https:\/\/www.lawfaremedia.org\/article\/judicial-framework-evaluating-network-investigative-techniques\">\u201cnetwork investigative techniques\u201d<\/a> are often used interchangeably. However, Liguori argued that <a href=\"https:\/\/repository.law.umich.edu\/cgi\/viewcontent.cgi?article=1019&amp;context=mtlr\">\u201clawful hacking\u201d<\/a> could be the most appropriate term as it broadly implies both the technical means of this investigative method and the lawful nature of the activity. Hence, he defines <a href=\"https:\/\/repository.law.umich.edu\/cgi\/viewcontent.cgi?article=1019&amp;context=mtlr\">\u201clawful hacking\u201d<\/a> as the use of hacking techniques by LEAs to gain access to computer systems and networks for the purpose of investigating criminal activity. Simply put, LEAs would exploit the vulnerabilities of software, hardware, or firmware, to gain access to technical devices and then extract data and evidence from such devices. For instance, LEAs can conduct a forensic examination of seized smartphones after using algorithms to find the password of such smartphones.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8657\" src=\"https:\/\/eulawenforcement.com\/wp-content\/uploads\/2023\/04\/Picture2-1.png\" alt=\"\" width=\"848\" height=\"661\" srcset=\"https:\/\/eulawenforcement.com\/wp-content\/uploads\/2023\/04\/Picture2-1.png 848w, https:\/\/eulawenforcement.com\/wp-content\/uploads\/2023\/04\/Picture2-1-300x234.png 300w, https:\/\/eulawenforcement.com\/wp-content\/uploads\/2023\/04\/Picture2-1-768x599.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/p>\n<p>Europol has declared the need to use lawful hacking due to the strong encryption on electronic devices that undermines the investigation and prosecution of organized crimes as the data is <a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-position-papers-and-opinions\/on-lawful-criminal-investigation-that-respects-21st-century-data-protection\/@@download\/file\/2016-05-25_On_lawful_criminal_investigation_respecting_21st_century_data_protection-Joint_Europol-ENISA_statement.pdf\">unavailable or unidentifiable<\/a>. The use of encryption has increased the number of serious crimes, which has been identified by <a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-position-papers-and-opinions\/on-lawful-criminal-investigation-that-respects-21st-century-data-protection\/@@download\/file\/2016-05-25_On_lawful_criminal_investigation_respecting_21st_century_data_protection-Joint_Europol-ENISA_statement.pdf\">Europol as a threat to public order and safety<\/a>, the efficiency of the criminal justice system, and the rule of law. On the contrary, the use of lawful hacking itself can also pose risks to the protection of fundamental rights. Indeed, the application of this method can, for instance, potentially interfere with individuals\u2019 privacy if LEAs excessively access personal data without sufficient valid reasons or legitimate aims. As such, LEAs\u2019 use of lawful hacking has become a contentious issue in the European Union (EU), raising questions about the balance between LEAs\u2019 needs and individual privacy rights. The landmark is a stark example of the potential impact of lawful hacking by Europol and national LEAs on fundamental rights, particularly the right to privacy. Keep reading as we uncover the ramifications of lawful hacking, considering the EncroChat case.<\/p>\n<p><strong><u>EncroChat\u2019s Downfall: Privacy at Stake.<\/u><\/strong><\/p>\n<p>In the world of encrypted communication networks, <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/dismantling-of-encrypted-network-sends-shockwaves-through-organised-crime-groups-across-europe\">EncroChat <\/a>was the king of security \u2013 until its downfall. <a href=\"https:\/\/www.nytimes.com\/2020\/07\/02\/world\/europe\/encrypted-network-arrests-europe.html\">EncroChat<\/a>, an encrypted communication network advertised as a secure means of communication with complete anonymity, was dismantled by a <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/dismantling-of-encrypted-network-sends-shockwaves-through-organised-crime-groups-across-europe\">French-Dutch joint investigation team<\/a> in July 2020. Specifically, in the Encrochat case, LEAs hacked into a secure messaging platform that has been believed to be exploited by criminals, gaining access to private conversations and gathering evidence and leading to the arrest of several suspects across Europe. While the investigative method of lawful hacking helped in capturing criminals, does it also negatively impact the privacy of other normal users like us?<\/p>\n<p>Article 8 of the European Convention on Human Rights (ECHR) guarantees our privacy rights. However, the EncroChat operation involved the development and distribution of malware disguised as an update, raising questions about the legality of the evidence obtained and the right to privacy. The lack of transparency in the methods used has caused uproar in legal circles, with debates about the potential <a href=\"https:\/\/law.stackexchange.com\/questions\/60817\/was-the-encrochat-hack-legal-if-not-is-there-a-legal-mechanism-which-could-all\">misuse of lawful hacking<\/a>. This means that while LEAs might have legitimate aims when they broke into the EncroChat system, they should do this very carefully because of the <a href=\"https:\/\/www.vice.com\/en\/article\/7k9z7x\/encrochat-hack-illegal-defense-nca\">complex legal issues<\/a> that arise alongside them, especially those related to privacy protection. In short, before deciding to apply or assisting the lawful hacking application, LEAs must take into account whether and to what extent this method can interfere with the individual\u2019s privacy.<\/p>\n<p><strong><u>Legal Limbo: Hacking Techniques Challenged by European Parliament and CJEU.<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/www.europarl.europa.eu\/RegData\/etudes\/STUD\/2017\/583137\/IPOL_STU(2017)583137_EN.pdf\">In a report<\/a> published by the European Parliament\u2019s Committee on Civil Liberties, Justice and Home Affairs (LIBE) in 2017, even before the EncroChat case, concerns about the legality of lawful hacking activities conducted or supported by LEAs were raised. According to the report, there is a risk that the use of hacking techniques may infringe on fundamental rights. These concerns have been further amplified by the CJEU\u2019s decision in the case of Accordingly, the CJEU ruled that the UK\u2019s regime for public authorities\u2019 retention and access to communications data, including LEAs, was inconsistent with EU law. The Court held that communications data\u2019s retention on a general and indiscriminate basis, without any differentiation, limitation, or exception for the objective of fighting crime, was impermissible.<\/p>\n<p><strong><u>Privacy vs. Public Safety: Decoding Lawful Hacking by Europol<\/u><\/strong><\/p>\n<p>Although there are concerns about the possible violation of privacy rights by lawful hacking, it should be noted that this right is <a href=\"https:\/\/home-affairs.ec.europa.eu\/networks\/european-migration-network-emn\/emn-asylum-and-migration-glossary\/glossary\/fundamental-rights_en\">not absolute<\/a> as it can be restricted under certain circumstances. Simply put, your privacy is only respected if it does <a href=\"https:\/\/www.echr.coe.int\/documents\/guide_art_8_eng.pdf\">not hamper<\/a> the protection of the fundamental rights of other individuals or, on a larger scale, the interests of public safety\/national security. If your privacy affects the latter, it is justified for you to <em>\u201ccompromise\u201d<\/em> your interests for that of public security when you are legally requested, for instance, to provide access to your personal information by LEAs. It is, therefore, <a href=\"https:\/\/www.cambridge.org\/core\/journals\/cambridge-yearbook-of-european-legal-studies\/article\/abs\/balancing-fundamental-rights-in-eu-law\/128F2C5BBB10EB7CA45A59C91EBA8BD7\">a matter of balancing<\/a> different (and perhaps opposing) fundamental rights and interests of different parties involved. Concerning the use of lawful hacking for investigation purposes, <a href=\"https:\/\/heinonline.org\/HOL\/Page?handle=hein.journals\/utrecht1&amp;div=6&amp;g_sent=1&amp;casa_token=WHUgN-vcdQ0AAAAA:mJ2-NH1vSu6k-Bsrir4NlWKwB2VMKrI-iVo9YBY2MLFZmG9gX3zQpyCqIubVos9oRo2-DTZS&amp;collection=journals\">one of the most important tasks of LEAs<\/a> is to balance individuals\u2019 right to privacy and national security, public safety and\/or other individuals\u2019 fundamental rights. To do this, Europol must refer to the <a href=\"https:\/\/www.europarl.europa.eu\/charter\/pdf\/text_en.pdf\">Charter of Fundamental Rights of the EU<\/a> (The Charter) and the <a href=\"https:\/\/www.echr.coe.int\/documents\/convention_eng.pdf\">ECHR <\/a>since these legal documents protect and balance fundamental rights within the EU.<\/p>\n<p>For instance, <a href=\"https:\/\/www.echr.coe.int\/documents\/guide_art_8_eng.pdf\">Article 8(2)<\/a> ECHR states that a public authority cannot restrict privacy right unless it adheres to the law and is necessary to protect national security\/public safety, etc. This interpretation was confirmed by the Court in <a href=\"https:\/\/hudoc.echr.coe.int\/app\/conversion\/pdf?library=ECHR&amp;id=001-73570&amp;filename=MALONE%20v.%20THE%20UNITED%20KINGDOM.pdf\">Malone v. UK,<\/a> ruling that a method allowing communications interception to support investigations by LEAs was essential if it met conditions provided by Article 8(2). Three main conditions for a lawful interception by LEAs include:<\/p>\n<ol>\n<li>such interference\/interception is provided by the law;<\/li>\n<li>it is necessary and proportionate, and<\/li>\n<li>it aims to pursue legitimate aims such as the protection of public safety or national security or the prevention of crime\/disorder<\/li>\n<\/ol>\n<p>Since lawful hacking is one example of lawful interception, it is also subjected to these requirements. As long as the three conditions are met, the role of Europol in supporting lawful hacking does not violate the right to privacy enshrined in the ECHR and the Charter. Europol, in <a href=\"https:\/\/www.eurojust.europa.eu\/sites\/default\/files\/Documents\/pdf\/joint_ep_ej_third_report_of_the_observatory_function_on_encryption_en.pdf\">the joint Eurojust-Europol annual report on encryption in 2021<\/a>, emphasizes it would follow such requirements by stating that their technologies must be accompanied by suitable protections, such as standards of necessity and proportionality to ensure the admissibility of collected electronic evidence in court.\u00a0So, don\u2019t worry whenever the LEAs are hacking your devices because they will respect and protect your privacy while doing so.<\/p>\n<p>\u00a0<img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-8658\" src=\"https:\/\/eulawenforcement.com\/wp-content\/uploads\/2023\/04\/Picture3-688x520.jpg\" alt=\"\" width=\"326\" height=\"246\" srcset=\"https:\/\/eulawenforcement.com\/wp-content\/uploads\/2023\/04\/Picture3-688x520.jpg 688w, https:\/\/eulawenforcement.com\/wp-content\/uploads\/2023\/04\/Picture3-300x227.jpg 300w\" sizes=\"auto, (max-width: 326px) 85vw, 326px\" \/><\/p>\n<p><a href=\"http:\/\/thetartan.org\/2016\/3\/21\/scitech\/puggywas\">Safety and privacy<\/a><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>By An Nhien, Iman, Liudmila, Timothy and Alice National Security vs. Privacy By An Nhien, Iman, Liudmila, Timothy and Alice In the ever-evolving battle against serious and organized crime, law enforcement agencies (LEAs) are turning to a new weapon: lawful hacking. But as the supporting role of using hacking techniques by the and other agencies &hellip; <a href=\"https:\/\/eulawenforcement.com\/?p=8566\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Hacking for Justice: How Europol Walks the Tightrope Between Fighting Crime and Protecting Fundamental Rights&#8221;<\/span><\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":94,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8566","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/posts\/8566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8566"}],"version-history":[{"count":3,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/posts\/8566\/revisions"}],"predecessor-version":[{"id":8660,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/posts\/8566\/revisions\/8660"}],"wp:attachment":[{"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}