Federal law enforcement’s deployment of malware (Network Investigative Technique, or NIT) raises a jurisdictional question central to remote searches of electronic data: Where does the search occur?
Litigation arising from two prominent NIT searches—Operations Pacifier and Torpedo—illustrates the challenge courts confronted in defining the...