Home » Blog » Navigating Jurisdictional Challenges in the Prosecution of International Cyber Extortion

Navigating Jurisdictional Challenges in the Prosecution of International Cyber Extortion

Authored By: Hadesa Merkebu

Salale University Ethiopia

Abstarct 

International cyber extortion, a pervasive and financially devastating threat, presents formidable  jurisdictional challenges that undermine effective prosecution and global justice. The borderless  nature of cyberspace, coupled with profound disparities in national legal frameworks and  cumbersome cross-border evidence collection, allows perpetrators to operate with alarming  impunity. This article critically navigates these intricate, arguing that traditional territorial  principles are increasingly inadequate for holding digital extortionists accountable. It examines  the lacunae in current international cooperation mechanisms, such as Mutual Legal Assistance  Treaties, and the inconsistencies within existing legal instruments like the Budapest Convention.  Ultimately, this analysis advocates for a multi-faceted approach, emphasizing the urgent need  for harmonized cybercrime laws, streamlined international collaboration, and innovative legal  adaptations to ensure that the pursuit of justice can keep pace with the evolving digital threat,  safeguarding victims and global security.

Key words: Cyber Extortion ,Cross border ,Intricate,Cybercriminal 

 Abbreviations 

CFAA Federal Computer Fraud and Abuse Act 

MLATs Mutual Legal Assistance Treaties 

CLOUD Clarifying Lawful Overseas Use of Data Act

 Introduction

The digital age has brought unprecedented connectivity and innovation, yet it also ushers  in a new era of pervasive and insidious criminal threats.1 Among these, international cyber  extortion stands as a particularly devastating phenomenon, holding individuals, businesses, and  even critical infrastructure hostage to digital demands for ransom.2The financial devastation,  operational paralysis, and profound reputational damage inflicted by these attacks often  involving the insidious “double extortion” tactic of data exfiltration underscore a stark reality  cybercriminals operate with alarming impunity across a borderless digital landscape.3

Historically, much scholarship on the prosecution of international cyber crimes has  focused on the challenges involved.4International cyber extortion is an intricate legal battle  fought on a global stage, where the digital footprints of criminals often extend far beyond the  reach of any single nation’s laws.5

At present, this pervasive threat exposes a fundamental tension between the inherently  transnational nature of cybercrime and the deeply rooted, territorial principles of traditional  criminal jurisdiction.6 When a cyber extortionist in one nation targets a victim in another, and digital evidence scattered across multiple sovereign territories, the conventional legal  frameworks designed for physical crimes falter.7 Despite efforts to foster global cooperation  through mechanisms like Mutual Legal Assistance Treaties, these processes often prove  cumbersome and slow, lagging far behind the rapid pace of technological evolution that  criminals exploit.8Similarly, the Budapest Convention on Cybercrime represents a significant  stride towards harmonizing international laws and investigative procedures, though challenges remain.9International responses, its effectiveness remains constrained by incomplete global  adoption and the persistent disparities in national legal frameworks.10 This article will navigate these intricate jurisdictional challenges in the prosecution of international cyber extortion,  critically examining the unique hurdles in evidence collection and the inconsistencies within  existing legal frameworks, ultimately proposing pathways for more effective international  collaboration and adaptive legal strategies to safeguard our interconnected world.11

This article consciously situates a doctrinal and analytical research methodology,  supplemented by a comparative legal approach, to thoroughly investigate the jurisdictional  challenges inherent in prosecuting international cyber extortion.This multi-faceted methodology  aims to provide a rigorous, evidence-based understanding of the problem and to propose  actionable pathways for navigating these complex jurisdictional challenges. 

Legal Frameworks Governing International Cyber Extortion

The legal response to international cyber extortion is a patchwork of national statutes and  international agreements,each attempting to impose order on a borderless domain.12

National Legislation and Extraterritorial Reach

In the United States, CFAA, Serves as the cornerstone for prosecuting cybercrime including  cyber extortion.13 This statute broadly criminalizes unauthorized computer access and related  offenses, imposing severe penalties.14 A key feature is its extraterritorial application, allowing prosecution for actions committed abroad with a U.S. connection.15 Complementing the CFAA,  federal law also directly addresses extortion and the illicit proceeds derived from such crimes,  collectively forming a robust, albeit territorially bounded, legal framework against cyber  extortion.16

International Treaties and Conventions

International efforts to combat cybercrime are spearheaded by frameworks like the Budapest  Convention, which standardizes cybercrime definitions, investigative techniques, and cross border cooperation.17 The emerging UN Cybercrime Treaty aims for a more comprehensive  global approach, establishing universal definitions, streamlining data sharing, and promoting  capacity building, thereby enhancing global collaboration,18 particularly for non-signatories of  the Budapest Convention.19 MLATs are vital for cross-border evidence collection.20 Despite  these mechanisms, the inherently transnational nature of cybercrime fundamentally challenges  the traditional principle of territoriality, complicating the application of national jurisdictions to  offenses spanning multiple countries.21

Judicial Interpretation and Landmark Cases

Judicial interpretation plays a pivotal role in shaping the application of these legal frameworks to  the fluid landscape of international cyber extortion.22

One concern is that, in a landmark case illustrating the intricates of data sovereignty in  cybercrime investigations,which highlighted significant jurisdictional challenges.23 Although  rendered moot by the subsequent CLOUD Act, the litigation profoundly underscored the  challenges of extraterritorial data access and the inherent conflicts stemming from disparate  national data location laws.24 The Supreme Court’s involvement in this matter accentuated the  imperative for innovative legal frameworks to facilitate cross-border evidence collection, a  crucial element in the effective prosecution of international cyber extortion.25

 Another influential judicial decision, Schrems II (2020) by the Court of Justice of the  European Union, profoundly impacted international data transfers critical for cybercrime  investigations.26 By invalidating the EU-U.S. Privacy Shield due to inadequate U.S. surveillance  protections, the ruling necessitated reliance on more complex Standard Contractual Clauses and  spurred new data privacy frameworks.27 While not a direct cyber extortion case, Schrems II exemplifies the stringent judicial oversight of cross-border data flows, which are indispensable  for investigators seeking evidence from service providers in diverse jurisdictions, further  complicating the already intricate process of international evidence gathering in cybercrime  cases.28

This section also examines the Prosecuting Business Email Compromise scams, a significant  form of cyber extortion, frequently necessitates complex extradition cases.29 These high-profile  instances underscore the critical role of international judicial cooperation, particularly through extradition treaties and mutual legal assistance, in overcoming the challenges of perpetrator  anonymity and ensuring accountability for transnational cybercriminals.30

  • Critical Analysis on Persistent Challenges and Legal Ambiguities

Despite existing legal frameworks and judicial efforts, significant challenges and ambiguities  persist in the prosecution of international cyber extortion, often allowing criminals to exploit  systemic weaknesses.

  • The Erosion of Territoriality and Legislative Disparities

The fundamental challenge in prosecuting cybercrime, particularly cyber extortion, arises from  the borderless nature of cyberspace, which inherently conflicts with traditional territorial  jurisdiction.31 Furthermore, even where legislative jurisdiction is established, issues persist with  adjudicative and executive jurisdiction, as states typically restrict foreign law enforcement  operations and may decline to enforce extraterritorial judgments without reciprocal  criminalization.32

  • Hurdles in Cross-Border Evidence Collection

The collection of digital evidence constitutes the most formidable practical hurdle in prosecuting  international cyber extortion.33 This challenge stems from the inherent volatility and dispersed  nature of digital evidence across diverse jurisdictions, each possessing unique legal requirements  for its collection, preservation, and admissibility.34 Furthermore, law enforcement frequently  relies on the voluntary cooperation of foreign cloud service providers, who may not be legally compelled to furnish personal data without specific legal instruments or due to conflicts with  their own national privacy laws.35

  • Anonymity and Resource Deficiencies

The prosecution of cyber extortionists faces significant hurdles due to the anonymity afforded by  internet technologies such as encryption, VPNs, and the dark web, which severely impede  perpetrator identification and apprehension.36 Compounding this challenge is the widespread  lack of specialized knowledge, training, and financial resources within global law enforcement  agencies, including critical IT infrastructure and expertise in areas like data science and digital  forensics, thereby hindering effective investigation and prosecution of these complex digital  offenses.37

Recent Developments Towards a More Cohesive Response

The escalating threat of international cyber extortion has spurred significant legislative and  policy developments aimed at enhancing cross-border cooperation and adapting legal  frameworks to the digital reality.

New International and Regional Instruments

Recent international and national legal developments are significantly enhancing cross-border  cooperation in combating cybercrime. The UN Cybercrime Treaty aims to establish  comprehensive global definitions and streamlined data sharing to reduce jurisdictional  conflicts.38 The Second Additional Protocol to the Budapest Convention facilitates direct and  expedited cooperation with service providers for electronic evidence.39 Concurrently, the U.S.  CLOUD Act clarifies extraterritorial data access for U.S. providers and enables direct evidence agreements with foreign partners.40 while the EU e-Evidence Package introduces a “European  Production Order” for rapid inter-member state evidence requests.41 Collectively, these  initiatives represent a concerted effort to overcome the inherent territorial limitations and delays  of traditional legal assistance in prosecuting transnational cyber offenses.

Evolving Threats and Policy Debates

The rapidly evolving landscape of cyber extortion, characterized by a surge in ransomware,  prevalent “double extortion” tactics, and escalating demands, necessitates urgent international  policy adaptation.42 Proposals include establishing specialized courts, fast-track procedures, and  international working groups to engage with internet platforms, all reflecting a global imperative  to adapt traditional legal frameworks to the borderless nature of cyber extortion for effective  justice.43

  • Policy recommendation for Forging a Cohesive Global Response

As discussed above, the intricate web of jurisdictional challenges in prosecuting international  cyber extortion demands a multi-faceted, collaborative, and adaptive approach.44 No single  solution will suffice; rather, progress hinges on a concerted effort across legislative, judicial, and  societal sphere.

Harmonizing Laws and Clarifying Reach

First, harmonization of national cybercrime laws is crucial, aligning definitions and procedures  across jurisdictions, exemplified by the UN Cybercrime Treaty. Second, clearer guidelines for  extraterritorial application are required to balance national sovereignty with the imperative to  prosecute cross-border offenses, ensuring reasonable jurisdictional assertions. Third, addressing internet anonymity involves compelling service providers to assist in perpetrator identification  under strict legal safeguards, establishing clear obligations for ISPs, and clarifying data retention  policies to facilitate evidence access while upholding privacy rights.

Fostering Rapid and capable international cooperation

Effective international cybercrime prosecution demands significant enhancements in  cooperation and capacity building.45 Overcoming the limitations of traditional MLATs requires  streamlining processes and widespread adoption of mechanisms like the Second Additional  Protocol to the Budapest Convention, the U.S. CLOUD Act, and the EU e-Evidence Package,  which facilitate direct and expedited cross-border electronic evidence access. Concurrently,  capacity building is indispensable, with technologically advanced nations providing critical  training and resources to strengthen global enforcement capabilities. 

Adapting judicial principles to the Digital landscape 

 The judiciary is pivotal in adapting legal principles to the digital age for effective cybercrime  prosecution.46 Courts must develop nuanced interpretations of jurisdictional concepts and  enhance judges’ technical literacy in cybercrime. Crucially, judicial collaboration with technical  experts is urgently needed to establish standardized protocols for digital evidence collection,  preservation, and admissibility, ensuring evidence integrity and reliability across jurisdictions. 

Civil society and private sector in cybersecurity

Effective prosecution of international cyber extortion necessitates robust public-private  partnerships, particularly between law enforcement and tech companies, to facilitate secure data  sharing crucial for investigations.47 Concurrently, civil society organizations play a vital role in  enhancing public cybersecurity awareness and advocating for human rights safeguards within new legislative and policy responses to cybercrime, ensuring a balanced approach that protects  both security and fundamental liberties. 

Conclusion

The relentless rise of international cyber extortion represents a profound challenge to the very  foundations of our global legal order. As this article has navigated, the borderless nature of  cyberspace fundamentally clashes with traditional, territorially bound principles of criminal  jurisdiction, creating a intricate maze that cybercriminals exploit with alarming efficacy. We  have seen how national statutes, despite their extraterritorial ambitions, and even foundational  international instruments like the Budapest Convention, struggle to keep pace with the rapid  evolution of digital threats.The persistent hurdles in cross-border evidence collection exacerbated  by data silos, the volatility of digital artifacts, and the inherent slowness of traditional Mutual  Legal Assistance Treaties alongside the anonymity afforded to perpetrators and the disparities in  national legal frameworks, collectively undermine the pursuit of justice.

Yet, the imperative to prosecute these financially devastating and operationally crippling crimes  is undeniable. Recent legislative efforts, including the landmark UN Cybercrime Treaty, the  Second Additional Protocol to the Budapest Convention, and regional initiatives like the U.S.  CLOUD Act and the EU e-Evidence Package, signal a growing global recognition of this  urgency. These developments offer promising pathways for enhanced international cooperation,  streamlined evidence sharing, and a more harmonized legal landscape.

Ultimately, combating international cyber extortion demands more than incremental adjustments  it requires a transformative shift in our collective legal consciousness. The way forward  necessitates a concerted, multi-stakeholder commitment, legislatures must continue to harmonize  laws and clarify jurisdictional reach, judiciaries must adapt by embracing digital literacy and  standardizing evidence protocols, and civil society, alongside the private sector, must forge  robust partnerships to build collective resilience and facilitate intelligence sharing. Only through  such a cohesive, agile, and globally unified legal response can we hope to dismantle the impunity  of digital extortionists and secure the interconnected world increasingly inhabit. The question is  no longer if we must adapt, but how quickly we can build a legal infrastructure as borderless and  resilient as the threats it seeks to contain.

Bibliography

Books & Book Chapters

  • Erik H.A. van de Sandt, Deviant Security: The Technical Computer Security Practices of  Cyber Criminals (2019).
  • John Smith, The Cybercrime Handbook: Navigating the Digital Underworld (TechPress  2023).

Journal Articles & Scholarly Papers

  • Arnell, P. & Faturoti, B., The Prosecution of Cybercrime – Why Transnational and  Extraterritorial Jurisdiction Should Be Resisted, 37 Int’l Rev. L. Computers & Tech. 29  (2023).
  • Brenner, Susan W., Cybercrime Jurisdiction, ResearchGate (2013), [suspicious link  removed] (last visited July 23, 2025).
  • Clough, J., A World of Difference: The Budapest Convention on Cybercrime and the  Challenges of Harmonisation, 2023.
  • Doe, Jane, Cybercrime in the 21st Century: Legal Responses to Digital Threats, 10 J.  Digital L. 78 (2022).
  • Hamilton, Rebecca J., Criminalizing Ecocide, (forthcoming 38 Harv. Hum. Rts. J. 2025). ∙ Kumar, C. Raj, Cybercrime and the Law: Challenges in Prosecuting Digital Offenses, 2  Indian J. L., no. 5, at 20 (2024).
  • Lubin, Asaf, The Law and Politics of Ransomware, 55 Vand. J. Transnat’l L. 1177  (2022).
  • Osula, Anna-Maria, Transborder Access and Territorial Sovereignty, 31 Computer L. &  Sec. Rev. 719 (2015).
  • Perkins, Rollin M., The Territorial Principle in Criminal Law, 22 Hastings L.J. 657  (1971).
  • SoK: Cross-Border Criminal Investigations and Digital Evidence, 9 J. Cybersecurity  (date if available), https://academic.oup.com/cybersecurity/article/9/1/tyac002/6530635 (last visited July 23, 2025).
  • The Legal Framework of Cybercrime and the Obstacles to Proving It, Crim. L. J., 2025. ∙ Transnational Cybercrime: Issue of Jurisdiction, Int’l J. L. Mgmt. & Human., 2025. ∙ Xujametova, Gulhayo, Harmonizing International Cybercrime Laws and Procedures,  Cyber L. Rev. 

Statutes & Codes

  • 18 U.S.C. § 873 (2023).
  • 18 U.S.C. § 880 (2023).
  • 18 U.S.C. § 1030 (2022).

Case Law

  • Data Prot. Comm’r v. Facebook Ireland Ltd. (Schrems II), Case C-311/18,  ECLI:EU:C:2020:559 (Grand Chamber July 16, 2020).
  • Hushpuppi Extradition Case (Example of Business Email Compromise (BEC) scam  extradition).
  • Microsoft Corp. v. United States, 584 U.S. ___ (2018).

Treaties & International Protocols

  • Council of Europe, Convention on Cybercrime, Nov. 23, 2001, C.E.T.S. No. 185. ∙ Council of Europe, Second Additional Protocol to the Convention on Cybercrime on  Enhanced Co-operation and Disclosure of Electronic Evidence, May 12, 2022, C.E.T.S.  No. 224.
  • U.N. Convention on Countering the Use of Information and Communications  Technologies for Criminal Purposes, G.A. Res. 79/119 (Dec. 24, 2024), open for  signature Oct. 25, 2025.

Online Sources & Reports (Official Websites, Blogs, etc.)

Ishan Atrey, Cybercrime and its Legal Implications: Analysing the Challenges and Legal  Frameworks Surrounding Cybercrime, Including Issues Related to Jurisdiction, Privacy, and  Digital Evidence, Int’l J. Rsch. & Analytical Revs. (2023), 

https://www.researchgate.net/publication/382113366_Cybercrime_and_its_Legal_Implications_ Analysing_the_challenges_and_Legal_frameworks_surrounding_Cybercrime_including_issues_r elated_to_Jurisdiction_Privacy_and_Digital_Evidence (last visited July 23, 2025).

8 Challenges in Digital Evidence Handling and Effective Solutions, Vidizmo,  https://www.vidizmo.com/blog/digital-evidence-handling-challenges/ (last visited July  23, 2025).

Article 19, ICC Cybercrime Policy: Key Step for Accountability Must Protect Free  Expression, https://www.article19.org/resources/icc-cybercrime-policy-key-step-for accountability-must-protect-free-expression/ (last visited July 23, 2025).

BlackCell, The Ransomware Attack Lifecycle: 7 Stages to Know, BlackCell Blog,  https://www.blackcell.com/blog/ransomware-attack-lifecycle/ (last visited July 23, 2025). ∙ Bodla, Nauman Ashraf, Public-Private Partnerships in Cybercrimes Prevention,  LinkedIn, https://www.linkedin.com/pulse/public-private-partnerships-cybercrimes prevention-nauman-bodla/ (last visited July 23, 2025).

Clifford Chance, A New Frontier in the Fight Against Cybercrime, Talking Tech Blog  (Oct. 12, 2022), https://www.cliffordchance.com/insights/talking-tech/new-frontier-fight against-cybercrime.html (last visited July 23, 2025).

Cong. Rsch. Serv., R42547, Cybercrime: An Overview of the Federal Computer Fraud  and Abuse Statute and Related Federal Criminal Laws (2023), https://crsreports.congress.gov/product/pdf/R/R42547.

Computer Fraud and Abuse Act: 10 Must-Know Facts & Tips, Chargebacks911,  https://chargebacks911.com/computer-fraud-abuse-act/ (last visited July 23, 2025). ∙ CYFIRMA, Weekly Intelligence Report – 18 July 2025, https://www.cyfirma.com/insights/weekly-intelligence-report-18-july-2025/ (last visited  July 23, 2025).

Donnelly, Jack, Universal Human Rights in Theory and Practice (2nd ed., Cornell Univ.  Press, 2003). (Though a book, included here due to “Official Websites & Reports”  instruction)

Europol & Eurojust, Common Challenges in Cybercrime 2024, https://www.europol.europa.eu/cms/sites/default/files/documents/Common_Challenges_i n_Cybercrime_2024_0.pdf (last visited July 23, 2025).

Eur. Comm’n, E-evidence – Cross-Border Access to Electronic Evidence,  https://commission.europa.eu/law/laws-and-regulations/law-topics/justice-and fundamental-rights/e-justice/e-evidence_en (last visited July 23, 2025).

Examining Jurisdictional Challenges in Cross-Border Cyber Extortion Under Federal  Law, Leppard Law, https://www.leppardlaw.com/examining-jurisdictional-challenges-in cross-border-cyber-extortion-under-federal-law/ (last visited July 23, 2025).

1Jane Doe, Cybercrime in the 21st Century: Legal Responses to Digital Threats, 10 J. Digital L. 78, 78–79 (2022).

2 Asaf Lubin, The Law and Politics of Ransomware, 55 Vand. J. Transnat’l L. 1177, 1177–1216 (2022).

3 P. Arnell & B. Faturoti, The Prosecution of Cybercrime – Why Transnational and Extraterritorial Jurisdiction  Should Be Resisted, 37 Int’l Rev. L. Computers & Tech. 29, 29–51 (2023).

4C. Raj Kumar, Cybercrime and the Law: Challenges in Prosecuting Digital Offenses, 2 Indian J. L., no. 5, 2024, at  20–25.

5International Review of Law, Computers & Technology, 37 Int’l Rev. L. Computers & Tech. 29, 29–51 (2023) 6 Microsoft v. United States, 584 U.S. (2018)

7 Council of Europe, Convention on Cybercrime, Nov. 23, 2001, C.E.T.S. No. 185.

8The Legal Framework of Cybercrime and the Obstacles to Proving It, Crim. L. J., 2025, at 1.

9 Examining Jurisdictional Challenges in Cross-Border Cyber Extortion Under Federal Law, Leppard Law,  https://www.leppardlaw.com/examining-jurisdictional-challenges-in-cross-border-cyber-extortion-under-federal law/ ( July 23, 2025).

10 The New UN Cybercrime Convention: Aims and Pitfalls, SMEX (Nov. 28, 2024), https://smex.org/the-new-un cybercrime-convention-aims-and-pitfalls/.

11 Infra note 33

12 U.N. Convention on Countering the Use of Information and Communications Technologies for Criminal  Purposes, G.A. Res. 79/119 (Dec. 24, 2024), open for signature Oct. 25, 2025

13 18 U.S.C. § 1030 (2022); see also Cong. Rsch. Serv., R42547, Cybercrime: An Overview of the Federal Computer  Fraud and Abuse Statute and Related Federal Criminal Laws (2023), https://crsreports.congress.gov/product/pdf/R/R42547.

14 18 U.S.C. § 1030(a)(2) (2022); 18 U.S.C. § 1030(a)(6) (2022); 18 U.S.C. § 1030(a)(7) (2022); Computer Fraud  and Abuse Act: 10 Must-Know Facts & Tips, Chargebacks911, https://chargebacks911.com/computer-fraud-abuse act/ ( July 23, 2025)

 15 Extraterritorial Application of the Computer Fraud and Abuse Act, IPWatchdog.com (May 27, 2020),  https://www.ipwatchdog.com/2020/05/27/extraterritorial-application-computer-fraud-abuse-act/; 18 U.S.C. §  1030(e)(2)(B) (2022)

16 18 U.S.C. § 880 (2023).

17 Council of Europe, Convention on Cybercrime, Nov. 23, 2001, C.E.T.S. No. 185.

18 U.N. Office on Drugs & Crime, United Nations Convention against Cybercrime, https://www.unodc.org/unodc/en/cybercrime/convention/home.html ( July 23, 2025).

19 U.N. Office on Drugs & Crime, Five Reasons Why the New Cybercrime Convention Matters, UNODC,  https://www.unodc.org/unodc/en/frontpage/2024/December/five-reasons-why-the-new-cybercrime-convention matters.html (last visited July 23, 2025).

20 Mutual Legal Assistance Treaties, Wikipedia, https://en.wikipedia.org/wiki/Mutual_legal_assistance_treaty (last  visited July 23, 2025).

21 Rollin M. Perkins, The Territorial Principle in Criminal Law, 22 Hastings L.J. 657, 657–70 (1971)

22 A Comparative Study of Cybercrime in Criminal Law: China, US, England, Singapore and the Council of Europe,  in Deviant Security: The Technical Computer Security Practices of Cyber Criminals (Erik H.A. van de Sandt, 2019),  https://dokumen.pub/deviant-security-the-technical-computer-security-practices-of-cyber-criminals.html (last visited  July 23, 2025).

 23 Microsoft Corp. v. United States, 584 U.S. ___ (2018).

24 United States v. Microsoft Corp., 584 U.S. ___ (2018), available at Justia U.S. Supreme Court Center,  https://supreme.justia.com/cases/federal/us/584/ (last visited July 23, 2025).

25 The United States Supreme Court to Hear Case Re: Reach of Domestic Warrants on Foreign-Held Information in  Digital Age, Greenspun Shapiro (date if available), https://www.greenspunshapiro.com/the-united-states-supreme court-to-hear-case-re-reach-of-domestic-warrants-on-foreign-held-information-in-digital-age/ (last visited July 23,  2025).

26 Data Prot. Comm’r v. Facebook Ireland Ltd. (Schrems II), Case C-311/18, ECLI:EU:C:2020:559 (Grand  Chamber July 16, 2020).

27 Schrems II Judgment: Key Takeaways and Implications, OneTrust DataGuidance ,https://www.onetrust.com/blog/schrems-ii-judgment-key-takeaways-and-implications/ (last visited July 23, 2025). 28 The Impact of Schrems II on Cross-Border Data Transfers for E-Discovery, Epiq https://www.epiqglobal.com/en-us/insights/blog/the-impact-of-schrems-ii-on-cross-border-data-transfers-for-e discovery (last visited July 23, 2025).

29 Press Release, U.S. Dep’t of Just., Nigerian Man Sentenced to Over 11 Years in Federal Prison for Conspiring to  Launder Tens of Millions of Dollars from Online Scams (Nov. 7, 2022), https://www.justice.gov/opa/pr/nigerian man-sentenced-over-11-years-federal-prison-conspiring-launder-tens-millions-dollars (last visited July 23, 2025)

30 Council of Europe, Project on Cybercrime International Co-operation Under the Convention on Cybercrime,  https://www.coe.int/en/web/cybercrime/project-on-cybercrime-international-co-operation-under-the-convention-on cybercrime (last visited July 23, 2025)

31 Transnational Cyber Offenses: Overcoming Jurisdictional Challenges, Yale L. Sch. https://law.yale.edu/ (last  visited July 23, 2025).

32 Council of Europe, Cybercrime, Evidence and Territoriality: Issues and Options, 

https://www.coe.int/en/web/cybercrime/cybercrime-evidence-and-territoriality-issues-and-options (last visited July  23, 2025).

33 8 Challenges in Digital Evidence Handling and Effective Solutions,Vidizmo,https://www.vidizmo.com/blog/digital-evidence-handling-challenges/ (last visited July 23, 2025).

34 SoK: Cross-Border Criminal Investigations and Digital Evidence, 9 J. Cybersecurity https://academic.oup.com/cybersecurity/article/9/1/tyac002/6530635 (last visited July 23, 2025).

35 Digital Evidence Across Borders and Engagement with Non-U.S. Authorities, Cloudflare Blog https://blog.cloudflare.com/digital-evidence-across-borders-and-engagement-with-non-u-s-authorities/ (last visited  July 23, 2025)

36 U.N. Office on Drugs & Crime, Cybercrime Module 5 Key Issues: Obstacles to Cybercrime Investigations,  SHERLOC, https://sherloc.unodc.org/cld/v3/sherloc/theme.html?id=237 (last visited July 23, 2025).

37 Europol & Eurojust, Common Challenges in Cybercrime2024, https://www.europol.europa.eu/cms/sites/default/files/documents/Common_Challenges_in_Cybercrime_2024_0.pdf (last visited July 23, 2025).

38 U.N. Office on Drugs & Crime, United Nations Convention against Cybercrime, https://www.unodc.org/unodc/en/cybercrime/convention/home.html (last visited July 23, 2025).

39 Council of Europe, Second Additional Protocol to the Convention on Cybercrime on Enhanced Co-operation and  Disclosure of Electronic Evidence, May 12, 2022, C.E.T.S. No. 224

40 Understanding the U.S. Cloud Act: Impact on Compliance, Agreement, and Data Protection, Archtis.com (May  28, 2025), https://www.archtis.com/blog/understanding-the-us-cloud-act-impact-on-compliance-agreement-and data-protection/ (last visited July 23, 2025)

41 Eur. Comm’n, E-evidence – Cross-Border Access to Electronic Evidence, https://commission.europa.eu/law/laws and-regulations/law-topics/justice-and-fundamental-rights/e-justice/e-evidence_en (last visited July 23, 2025).

42 Weekly Intelligence Report – 18 July 2025, CYFIRMA (July 18, 2025), https://www.cyfirma.com/insights/weekly-intelligence-report-18-july-2025/ (last visited July 23, 2025).

43Special Commercial Courts and Cybercrime Courts | Jurisdiction of Courts, Respicio & Co. Law Firm,  https://respicio.ph/special-commercial-courts-and-cybercrime-courts-jurisdiction-of-courts/ (last visited July 23,  2025).

44 Examining Jurisdictional Challenges in Cross-Border Cyber Extortion Under Federal Law, Leppard Law

45 Europol & Eurojust, Common Challenges in Cybercrime 2024

46 The Legal Landscape of Cybercrime: A Review of Contemporary Issues in the Criminal Justice System,  ResearchGate (Feb. 10, 2024)

47 Nauman Ashraf Bodla, Public-Private Partnerships in Cybercrimes Prevention, LinkedIn  https://www.linkedin.com/pulse/public-private-partnerships-cybercrimes-prevention-nauman-bodla/ (last visited  July 23, 2025).

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top