Constitutional Extraterritoriality

Federal law enforcement’s deployment of malware (Network Investigative Technique, or NIT) raises a jurisdictional question central to remote searches of electronic data: Where does the search occur?

Litigation arising from two prominent NIT searches—Operations Pacifier and Torpedo—illustrates the challenge courts confronted in defin­ing the...