Dutch bill seeks to give law enforcement hacking powers

Dutch law enforcement should be allowed to break into computers outside the Netherlands when necessary, the draft bill said

The Dutch government today presented a draft bill that aims to give law enforcement the power to hack into computer systems -- including those located in foreign countires -- to do research, gather and copy evidence or block access to certain data.

Law enforcement should be allowed to block access to child pornography, read emails that contain information exchanged between criminals and also be able to place taps on communication, according to a draft bill published Thursday and signed by Ivo Opstelten, the Minister of Security and Justice. Government agents should also be able to engage in activities such as turning on a suspect's phone GPS to track their location, the bill said.

Opstelten announced last October he was planning to craft this bill.

Encryption of electronic data is increasingly becoming a problem for the police if they want to place taps, the draft reads. Services like Gmail and Twitter use standard encryption and many other services like Facebook and Hotmail provide encryption as an option while some smartphones automatically encrypt communication, it said. Moreover, services like Skype, WhatsApp and VPN-services can easily be encrypted.

Right now, the law enforcement agencies do not have the ability to adequately cope with encryption during criminal investigations, and this needs to change, according to the bill.

Another problem is tackling distributed denial-of-service (DDoS) attacks that recently have been used to cripple the online services of Dutch banks and DigiD, an identity management platform used by Dutch government agencies. Criminals can use botnets paralyze vital parts of society and law enforcement needs better measures to deal with them, the bill's authors argued.

To disable a botnet it is necessary to access the command and control servers that control the botnet which can be located in a foreign country, according to the bill. The new investigative powers would also allow law enforcement to infiltrate computers or servers located in foreign countries if the location of those computers cannot be determined.

The bill also aims to force suspects who possess child pornography and suspects who are linked to terrorism activities to decrypt files on their computers. Ignoring such a decryption demand can lead to a maximum penalty of three years imprisonment.

Fencing of stolen data would also become punishable in order to prevent the misuse of stolen data that is published on the Internet after a hack or burglary. Publishing stolen data could land offenders in prison for a maximum of one year.

The bill foresees strict safeguards for the use of the new powers such as a the approval of a judge, the certification of software used and keeping logs of the investigation data.

The draft bill immediately drew criticism.

"It is important that the government wants to combat cybercrime but this proposal is rushed: it is unnecessary and creates new security risks for citizens," said Simone Halink of Dutch digital rights organization Bits of Freedom in a blog post on Thursday. The proposal ignores alternatives, she said, adding that the police already has the power to fight online crime but lacks knowledge and manpower to do so efficiently. A better solution would be to increase police manpower instead of increasing their digital investigation powers, she added.

Moreover, the pending Dutch legislation could set an example for other governments which could start an arms race between hacking governments, she said. Governments should be closing security holes, and not leave them open, she said.

Bits of Freedom called on Dutch citizens to reach out to the government and asked the government to reconsider the bill.

At the moment the draft bill is in the consultation phase, meaning parties involved such as the police and other law enforcement as well as citizens and advisory bodies will be able to comment on it, ministry spokesman Wiebe Alkema said. Following that, the bill will be sent to sent to the Council of Ministers after which it will be sent to the Dutch Council of State, an advisory body on legislation. The bill will probably be send to the House of Representatives by the end of the year, he said.

Loek is Amsterdam Correspondent and covers online privacy, intellectual property, open-source and online payment issues for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to loek_essers@idg.com

Join the CSO newsletter!

Error: Please check your email address.

Tags Simone Halinklegislationgovernmentdata protectionprivacycybercrimeIvo OpsteltenDetection / preventionintrusionsecuritydata breachlegalForensicsencryption

More about FacebookHotmailIDGSkype

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Loek Essers

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts