http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion/en/help/swedish-covert-surveillance-data-act
If necessary, system protection may be breached and bypassed, and technical vulnerabilities may be exploited (see section 22). According to the legislative history, this may involve, for example, a law enforcement agency logging into a service using log-in details which it has learned or using more technologically advanced measures.