D3.2 Legal Analysis of the Use of Evidence Material
Total Page:16
File Type:pdf, Size:1020Kb
Ref. Ares(2018)5822033 - 14/11/2018 Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things Grant Agreement: 786698 D3.2 Legal analysis of the use of evidence material Work Package 3: Legal issues: data protection and privacy Document Dissemination Level P Public ☒ CΟ Confidential, only for members of the Consortium (including the Commission Services) ☐ Document Due Date: 31/10/2018 Document Submission Date: 02/11/2018 Co-funded by the Horizon 2020 Framework Programme of the European Union D3.2 Legal analysis of the use of evidence material Document Information Deliverable number: D3.2 Deliverable title: Legal analysis of the use of evidence material Deliverable version: 1.2 Work Package number: 3 Work Package title: Legal issues: data protection and privacy Due Date of delivery: 31.10.2018 Actual date of delivery: 02.11.2018 Dissemination level: PU Editor(s): Olga Gkotsopoulou (VUB) Paul Quinn (VUB) Contributor(s): Liza Charalambous (ADITESS) Dimitris Kavallieros (KEMEA) Xenia Pouli (MTN) Reviewer(s): Emanuele Bellini (MATHEMA) Clément Pavué (SCORECHAIN) Project name: Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things Project Acronym Cyber-Trust Project starting date: 1/5/2018 Project duration: 36 months Rights: Cyber-Trust Consortium Version History Version Date Beneficiary Description 0.01 20.08.2018 VUB DDP and ToC circulated to partners 0.02 27.08.2018 VUB Sections 1 and 2 0.021 04.09.2018 ADITESS Contribution – clarifications integrated in Section 3 0.03 05.09.2018 VUB Sections 3 and 6 0.04 09.09.2018 VUB Section 5 0.05 11.09.2018 VUB Section 4 0.06 13.09.2018 VUB 1st Internal Review 0.1 17.09.2018 VUB Distribution of 1st draft to partners for feedback 0.2 10.10.2018 KEMEA-Hellenic Police Input – Annex A 0.3 15.10.2018 MTN Input – Annex B 0.4 23.10.2018 VUB 2nd Internal Review 1.0 26.10.2018 VUB Submission for final review 1.1 01.11.2018 VUB Final version after review by Scorechain and Mathema 1.2 14.11.2018 VUB Updated version Disclaimer: This Deliverable reflects only the authors' views, and the European Commission is not responsible for any use that may be made of the information it contains. Copyright Cyber-Trust Consortium. All rights reserved. 2 D3.2 Legal analysis of the use of evidence material Acronyms ACRONYM EXPLANATION ACPO Association of Chief Police Officers App./appl. Application CERT Computer Emergency Response Team CJEU Court of Justice of the European Union CoE Council of Europe CSIRT Computer Security Incident Response Team DLT Distributed Ledger Technologies DoS/DDoS Denial of Service/ Distributed Denial of Service DPIA Data Protection Impact Assessment DSP Digital Service Provider ECHR European Convention on Human Rights ECtHR European Court of Human Rights ed. /eds. Edited EDPB European Data Protection Board EDPS European Data Protection Supervisor EEW European Evidence Warrant ENISA European Union Agency for Network and Information Security EU European Union Europol European Law Enforcement Organisation GC Grand Chamber GCC Greek Criminal Code GDPR General Data Protection Regulation ICT Information and Computer Technologies ILOR International Letter of Request Interpol International Police IoT Internet of Things ISO International Standards Organisation ISP Internet Service Provider LEA Law Enforcement Agency MLA Mutual Legal Assistance MoC Memorandum of Cooperation NIS Network and Information Security No. Number OES Operator of Essential Services OJ/OJ L […] Official Journal of the European Communities - Legislation para. Paragraph pp. / p. Pages/page TCP/IP Internet Protocol T-CY Cybercrime Convention Committee TEU Treaty of the European Union TFEU Treaty of the Functioning of the European Union Copyright Cyber-Trust Consortium. All rights reserved. 3 D3.2 Legal analysis of the use of evidence material US/USA United States of America v Versus WP Work Package Copyright Cyber-Trust Consortium. All rights reserved. 4 D3.2 Legal analysis of the use of evidence material 1. Introduction ................................................................................................................................. 10 1.1 Project Overview ............................................................................................................................. 10 1.2 Purpose of the Document ............................................................................................................... 10 1.3 Scope and Intended Audience ......................................................................................................... 10 1.4 Structure of the Document.............................................................................................................. 11 2. Electronic and digital evidence as opposed to conventional evidence ............................................. 12 2.1 Decipherment: electronic v digital evidence ................................................................................... 13 2.1.1 Definition of electronic evidence ............................................................................................ 13 2.1.2 Definition of digital evidence ................................................................................................... 14 2.2 Electronic v conventional evidence: similarities and differences ................................................... 15 2.3 Sources and types of electronic evidence ....................................................................................... 15 2.4 The life cycle of e-evidence and digital forensics: status quo and best practice ............................ 17 2.4.1 Definition of digital forensics ................................................................................................... 17 2.4.2 Status Quo and Best practice .................................................................................................. 17 2.4.2.1 Incident Protocols ................................................................................................................ 18 2.4.2.2 Identification ....................................................................................................................... 18 2.4.2.3 Collection ............................................................................................................................. 19 2.4.2.4 Acquisition ........................................................................................................................... 20 2.4.2.5 Preservation ......................................................................................................................... 20 2.4.2.6 Examination ......................................................................................................................... 21 2.4.2.7 Analysis ................................................................................................................................ 21 2.4.2.8 Reporting ............................................................................................................................. 21 2.4.2.9 Expert witness testimony .................................................................................................... 22 2.4.2.10 After the criminal proceedings ........................................................................................ 22 3. Electronic evidence: the European and international framework ................................................... 23 3.1 European Union ............................................................................................................................... 23 3.1.1 Primary law .............................................................................................................................. 23 3.1.2 Secondary law .......................................................................................................................... 24 3.1.2.1 GDPR and Directive 2016/680 ............................................................................................. 24 3.1.2.2 E-privacy reform .................................................................................................................. 25 3.2 Council of Europe ............................................................................................................................ 26 3.2.1 The European Convention on Human Rights and the case law of the Strasbourg Court ....... 26 3.2.2 The Cybercrime Convention .................................................................................................... 29 3.2.2.1 Jurisdiction ........................................................................................................................... 29 3.2.2.2 Investigative powers ............................................................................................................ 29 3.2.3 The CoE Recommendation 87 (15) .......................................................................................... 36 3.3 Common Principles of handling electronic evidence ...................................................................... 37 3.3.1 The principle of data integrity ................................................................................................. 37 Copyright Cyber-Trust Consortium. All rights reserved. 5 D3.2 Legal analysis of the use of evidence material 3.3.2 The principle of audit trail ....................................................................................................... 38 3.3.3 The principle