Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: November 25, 2024 Mon

Time: 9:08 pm

Results for cloud computing

4 results found

Author: Wormeli, Paul

Title: Mitigating Risks in the Application of Cloud Computing in Law Enforcement

Summary: This report comes at an opportune time as the law enforcement community is undergoing a major transformation. Traditionally, communication within law enforcement was often linear and hierarchical. Today, communication happens in real time across jurisdictional boundaries. Because of improved communication and real-time information, the law enforcement community can plan where to place resources ahead of time, instead of only reacting to events after they have occurred. One potential key to this is the advent of cloud computing. Cloud computing can be a cost-effective way to enable improved communication. Cloud computing also provides a potential for cost-savings for law enforcement, since law enforcement organi­zations don’t have to use their tight budgets to build their own information technology infrastructure. According to Steve Ambrosini, executive director of IJIS, there has been a constant search for “emerging and disruptive technology that might posi­tively affect the productivity and efficiency of justice and public safety agencies, and promote better information-sharing in sup­port of their missions.” Ambrosini continues, “Cloud computing has been one of the technologies with potential, but executives in justice and public safety have some general skepticism for concepts embedded in this powerful new infrastructure.” Based on a survey of leaders in the law enforcement community about cloud computing, Wormeli gained an increased under­standing of their major issues, which include concerns about reliability and availability, performance requirements, cost of migration, and the recovery of data. In response to these con­cerns, Wormeli explains how the law enforcement community can effectively respond. The report concludes with six recom­mendations on how law enforcement organizations can success­fully implement a move to cloud computing.

Details: Washington, DC: IBM Center for The Business of Government, 2012. 45p.

Source: Internet Resource: Accessed November 29, 2012 at: http://www.businessofgovernment.org/sites/default/files/Mitigating%20Risks%20in%20the%20Application%20of%20Cloud%20Computing%20in%20Law%20Enforcement_1.pdf

Year: 2012

Country: United States

URL: http://www.businessofgovernment.org/sites/default/files/Mitigating%20Risks%20in%20the%20Application%20of%20Cloud%20Computing%20in%20Law%20Enforcement_1.pdf

Shelf Number: 127039

Keywords:
Cloud Computing
Computer Crime
Computer Security

Author: Poullet, Yves

Title: Cloud Computing and Its Implications on Data Protection

Summary: 1. The Council of Europe requested the CRID to prepare a preliminary report identifying the main privacy issues related to cloud computing and the questions to be addressed in the future, in particular in the light of Council of Europe data protection standards. As set by the contract, the work is to identify and underline the main cloud computing privacy issues. This first draft is definitively to be further elaborated and to be completed. It does not aim at giving answers which would have to be elaborated in the context of another mandate. 2. This report is structured as follows. It starts with a brief technical introduction illustrating the variety of services covered by the concept of “Cloud computing”. As defined by NIST1, “cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” 3. Cloud computing services include a large diversity of services going from those offered at the benefit of individuals as the services offered by social networks to those proposed at the benefit of companies in sharing a common software or by using shared information infrastructures. To establish a typology of cloud computing services is quite important since legal problems raised by each kind of computer services might be different to a certain extent. The second point is dedicated to the analysis of the adequacy of the CoE Convention 108 (referred hereinafter as ETS 108) definitions with the cloud computing reality. In particular, the status of the actors involved into the operations will be analyzed. Thereinafter, our report analyses the duties of the persons subscribing to the cloud computing services or offering these services. The crucial question of the security is then addressed. Finally, the report envisages the delicate questions of transborder data flows and international private law, which are inherent to most of the cloud computing services.

Details: Strasbourg: Council of Europe, 2010. 28p.

Source: Internet Resource: Discussion Paper: Accessed August 5, 2013 at: http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079_reps_IF10_yvespoullet1b.pdf

Year: 2010

Country: Europe

URL: http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079_reps_IF10_yvespoullet1b.pdf

Shelf Number: 129533

Keywords:
Cloud Computing
Computer Crimes
Computer Security
Internet Crimes

Author: Tehan, Rita

Title: Cybersecurity: Authoritative Reports and Resources, by Topic

Summary: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: - Policy overview - National Strategy for Trusted Identities in Cyberspace (NSTIC) - Cloud computing and the Federal Risk and Authorization Management Program (FedRAMP) - Critical infrastructure - Cybercrime, data breaches, and data security - National security, cyber espionage, and cyberwar (including Stuxnet) - International efforts - Education/training/workforce - Research and development (R&D) In addition, the report lists selected cybersecurity-related websites for congressional and government agencies; news; international organizations; and other organizations, associations, and institutions.

Details: Washington, DC: Congressional Research Services, 2015. 129p.

Source: Internet Resource: R42507: Accessed April 1, 2015 at: http://fas.org/sgp/crs/misc/R42507.pdf

Year: 2015

Country: United States

URL: http://fas.org/sgp/crs/misc/R42507.pdf

Shelf Number: 135117

Keywords:
Cloud Computing
Cybercrimes
Cybersecurity
Internet Crimes

Author: Koops, Bert-Jaap

Title: Cyberspace, the cloud, and cross-border criminal investigation. Cyberspace, the cloud, and cross-border criminal investigation

Summary: With the rise of cloud computing (using scalable computing resources as a service via the Internet), computer data are increasingly stored remotely - 'in the cloud' - instead of on users' devices. Due to the distributed, dynamic, and redundant nature of cloud storage, a particular file can often be stored in multiple places simultaneously, while it may not be stored in any single place in its entirety. For speed-optimisation reasons, data may be stored in the server park closest to the user's normal location. Cloud computing can involve multiple providers in different layered constellations and data can be encrypted. The cloud thus has significant implications for criminal investigation, particularly in cases where digital evidence is sought. Local search and seizure by the police will yield less and less evidence as users use cloud services such as webmail and remote data storage. This reinforces existing challenges of cyber-investigation, which not only requires swift evidence-gathering due to the vulnerability of data loss, but also powers to gain access to data remotely. One particular challenge in cyber-investigation is that such remote evidence-gathering powers will quickly extend beyond national borders. Under the rules of international law, states must then resort to traditional procedures of mutual legal assistance. This is, broadly speaking, a challenging process in cyber-investigations. In addition to organisational limitations, such as lack of capacity or priority-setting, and some legal limitations, such as double criminality, mutual assistance procedures are viewed by those conducting on-line investigations as cumbersome or ineffective for seeking digital evidence. Despite efforts to streamline and facilitate mutual legal assistance in cyber-investigation, the procedures remain inadequate in situations in which there is a need for expeditious data gathering, or where (cyber)criminals move data around with high frequency, and also where the location of the data cannot, or only through time-consuming efforts, be identified, which may often be the case in cloud computing situations. Where mutual legal assistance procedures do not work sufficiently, the question arises whether and under what conditions cross-border investigations are allowed, which is relevant not only for cybercrimes but for all crimes where perpetrators communicate via email or smartphone apps or use cloud storage services. Although a number of efforts have been aimed at trying to move forward in the field of cross-border cyber-investigation, these efforts have not yet resulted in any tangible improvement. A key reason for this is that territorially-based national sovereignty forms the basis of the international order and as a result, international law is strict in prohibiting investigative activities on foreign territory without the consent of the state concerned. The situation is thus one of stalemate: cyber-investigation officials wish to move forward in cross-border investigation but cannot do so because of the current limitations of international law and because the specific challenges of cyber-investigation have so far not induced states to create new international rules in this area that put strict interpretations of sovereignty aside. It is against this background of a 21st-century cloud computing paradigm meeting with 20th-century-based procedures for mutual legal assistance in criminal matters that the central problem of this study takes shape. This report aims to advance the debate on cross-border cyber-investigation by combining the fields of cyber-investigation and international law. The central question addressed in this study is what limits and what possibilities exist within international law for cross-border cyber-investigations by law enforcement authorities. The focus is on cloud storage services, but the analysis applies more generally to Internet investigations, in particular in the form of remote searches and the contacting of foreign service providers to request data. In particular, the report focuses on questions of the legality of cross-border access to data under international law in terms of the core principles of territorial integrity and non-interference in domestic affairs rather than on questions of human rights. The research for this report is based on desk research of international and supranational law and policy and academic literature in the fields of cyber-investigation and of international law, and on an international expert meeting with twenty experts in criminal law, cybercrime, Internet, and international law.

Details: Tilburg, NETH: TILT - Tilburg Institute for Law, Technology and Society, 2014. 101p.

Source: Internet Resource: Accessed April 20, 2015 at: http://english.wodc.nl/onderzoeksdatabase/2326-de-gevolgen-van-cloudcomputing-voor-de-opsporing-en-vervolging.aspx?cp=45&cs=6796

Year: 2014

Country: International

URL: http://english.wodc.nl/onderzoeksdatabase/2326-de-gevolgen-van-cloudcomputing-voor-de-opsporing-en-vervolging.aspx?cp=45&cs=6796

Shelf Number: 135266

Keywords:
Cloud Computing
Computer Crimes
Cybercrime
Internet Crimes
Police Investigations