cybercrimes  (real,  universal,  territorial,  nationality 
(active and passive) principles.  
In  connection  with  the  appearance  of  cloud 
technology  and  unstable  nature  of  electronic 
information, it appeared to be difficult to get them in 
practice. Today, the criminal intelligence units use the 
alternative  methods  to  get  the  required  electronic 
information  in  combating  cybercrimes  (1)  real  time 
connection  to  the  device  using  special  technical 
means, (2) seizure of other device that may store such 
information and its further inspection without consent 
of  the  other  state  in  which  territory  such  data  are 
physically located.  In rare  cases,  as practice  shows, 
the  law  enforcement servants can get  the  electronic 
data  directly  from  the  service  providers  located 
abroad  in  the  framework  of  the  sent  inquiry  for 
assistance.  
One  of  the  ways  for  optimization  of  the 
international  cooperation  in  the  sphere  of  criminal 
intelligence operations on cybercrimes would seem to 
supplement paragraph one, Article 4 of the EIO Law, 
with the following sentence:  
“The common principles and norms of the 
international law and the international treaties of the 
Russian Federation also can constitute the legal basis 
for the criminal intelligence operations. It is not 
allowed to apply the rules of the international treaties 
of the Russian Federation in their interpretation 
contradicting the Constitution of the Russian 
Federation. Such contradiction can be established in 
a manner determined by the federal constitutional 
law”. 
We suppose that the offered version of the article 
of the Russian criminal intelligence is the subject of 
the scholarly discussion.  However, its introduction is 
generally necessary for the purposes of creation of the 
legal basis for efficient activities described.  
REFERENCES 
UN Secretary-General, 2021. Report at the seventy-fourth 
session  of  the  United  Nations  General  Assembly 
entitled  “Countering  the  use  of  information  and 
communications  technologies  for  criminal  purposes”. 
https://www.unodc.org. 
Council  of  Europe,  2001.  Explanatory  Report  to 
Convention on Cybercrime. https://rm.coe.int. 
United  States  District  Court.  In US v. Tsastsin et al. 
Southern District of New York. 2(11). p. 878. 
Constitutional  Court  of  the  Russian  Federation,  1997. 
Rulings №72-О. 
Constitutional  Court  of  the  Russian  Federation,  2006. 
Rulings № 454-О. 
Volevodz, A.G., 2019. Mutual legal assistance in criminal 
cases:  cooperation  with  the  states  of  offshore 
jurisdictions  of  the  Romano-Germanic  legal  family 
(continental law systems). In Russian Investigator. 10. 
pp. 64-68. 
Volevodz,  A.G.,  2016.  Some  aspects  of  investigation 
planning in the international cooperation in the sphere 
of  criminal  procedure.  In Criminal Procedure. 3. pp. 
26-33. 
Klevtsov,  K.K.,  2018.  Pre-trial  procedure  regarding  the 
persons  evading  criminal  responsibility  outside  the 
territory of the Russian Federation. In Yurlitinform. p. 
15. 
Klevtsov, K.K., Kvyk, A.V., 2020. Seizure and review of 
information  stored  in  the  electronic  memory  of 
subscriber devices. In Zakonnost. 12. pp. 59-60. 
Litvishko P.A., 2017. International legal forms of search of 
persons  abroad.  Criminalist’s  Library.  In Scientific 
Journal. 2. pp. 106-116. 
Litvishko, P.A., 2015. Integration of pre-trial investigation 
and  criminal  intelligence  operations:  foreign  and 
international  experience.  Criminalist’s  Library.  In 
Scientific Journal. 3. pp. 309-319. 
Malov,  A.,  2018.  Reception  of  electronic  evidence  from 
foreign  jurisdictions  (in  the  example  of  the  USA).  In 
Zakonnost. 9. pp. 56-60. 
Shumilov,  A.Yu.,  2008.  Criminal  intelligence  operations: 
questions and answers. In Book I: General provisions. 
3. PUBLISHING HOUSE OF SHUMILOVA I.I. p. 40. 
Ambos, K., 2018. International Economic Criminal Law. In 
Crim Law Forum. 29. pp. 499–566. 
Benson, K., Dowsley, R., Shacham, H., 2011. Do you know 
where cloud files are? In: Proceedings of the 3rd ACM 
Workshop on Cloud Computing Security.  CCSW.  11. 
pp. 73-82. 
Bellers, H., 2016. Cybercrime. In HEADline. 33. pp. 24-25. 
Berengaut,  A.,  Lensdorf,  L.,  2019.  The  CLOUD  Act  at 
Home  and  Abroad.  In Computer Law Review 
International. 20. pp. 111-117. 
Curley, M., Stanley, E., 2016. Extraterritorial Jurisdiction, 
Criminal Law and Transnational Crime: Insights from 
the  Application  of  Australia's  Child  Sex  Tourism 
Offences. In Bond Law Review. 28. pp. 169-197. 
Farbiarz, M., 2016. Extraterritorial criminal jurisdiction. In 
Michigan Law Review. 114. pp. 507-558. 
Ferzan,  K.K.,  2020.  The  Reach  of  the  Realm.  Criminal 
Law, Philosophy. 14. pp. 335–345. 
Grant, C., 2018. The Extraterritorial Reach of Tribal Court 
Criminal Jurisdiction. In SSRN Electronic Journal. 10. 
pp. 2139. 
Kaumova, A., 2018. Conflicts of Criminal Jurisdiction of 
States  and  Extradition  Issues.  In Helix.  8.  pp.  4638-
4644.  
Li, X., Qin, Y., 2018. Research on Criminal Jurisdiction of 
Computer cybercrime. In Procedia Computer Science. 
131. pp. 793-799. 
Goldfoot,  J.,  2011.  Compelling  Online  Providers  to 
Produce Evidence Under ECPA. In The United States 
Attorneys Bulletin (Obtaining and Admitting Electronic 
Evidence). 59(6). pp. 35-41.