Similar documents
Cybercrime and e-evidence: challenges and solutions.

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

The cost of cybercrime the benefits of cooperation

LEGAL SOLUTION CYBERCRIME LEGAL SOLUTION LEGAL SOLUTION NATIONAL, REGIONAL, INTERNATIONAL

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

UNODC. International Cooperation and Assistance in Cybercrime Matters

G8 Lyon-Roma Group High Tech Crime Subgroup

Comprehensive Study on Cybercrime

New Legal instruments for Cross-border Crime Investigation in EU

10007/16 MP/mj 1 DG D 2B

ITU Model Cybercrime Law: Project Overview

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

International conference on Judicial Cooperation in Cybercrime Matters OUTLINE

ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013

Regional Workshop on Cybercrime, Tbilisi, Georgia 13 May 2010

Project III

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.

International Cooperation in Cybercrime Investigations

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

T-CY Guidance Note #8 Obtaining subscriber information for an IP address used in a specific communication within a criminal investigation

Consumer Rights in the Digital Age

Legal Foundation and Enforcement: Promoting Cybersecurity

Framework for Cybersecurity in Nigeria

National Communications Authority

Overview on the Project achievements

A Multi-Stakeholder Approach in the Fight Against Cybercrime

GAC PRINCIPLES REGARDING gtld WHOIS SERVICES. Presented by the Governmental Advisory Committee March 28, 2007

Capacity building projects and the Cybercrime Programme Office of the Council of Europe (C-PROC)

LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

OAS Cybersecurity Capacity Building Efforts

Draft Resolution for Committee Consideration and Recommendation

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

UNODC/CCPCJ/EG.4/2017/4

China and International Governance of Cybercrime

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

Data Protection and Cybercrime Challenges

ECOWAS Cyber security Agenda

Cyber Security Development. Ghana in Perspective

The commission communication "towards a general policy on the fight against cyber crime"

Project III Public/private cooperation

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Data Preservation Checklists

Thailand Initiatives and Challenges in Cyber Terrorism

HLG Briefly. HLG was established on March 6, 2015 during the 46 th Session of the UN Statistical Commission

Coordinated implementation of the Basel, Rotterdam and Stockholm Conventions

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

Cybersecurity & Spam after WSIS: How MAAWG can help

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

Legal, Ethical, and Professional Issues in Information Security

Role of 24/7 points of contact regarding MLA requests for computer data/e-evidence, Cooperation with competent authorities

EXPERT GROUP MEETING ON CYBERCRIME

Economic and Social Council

ENISA s Position on the NIS Directive

Promoting Global Cybersecurity

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Cross Border Information Flows and Digital Trade Principles The Aspen IDEA Project 11/1/2011

Criminal Justice System s Intervention to Cybersecurity Threats: Panacea or Pandora's Box?

Lao PDR Practice for Information Security

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

FAO s Initiatives to fight Illegal, Unreported and Unregulated Fishing

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES

Child Online Protection in Child Pornography Namibia

- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Cybercrime Criminal Law Definitions and Concepts

( ) Page: 1/6 TECHNICAL COOPERATION ACTIVITIES: INFORMATION FROM OTHER INTERGOVERNMENTAL ORGANIZATIONS WORLD CUSTOMS ORGANIZATION (WCO) Addendum

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Octopus Conference 2016 Cooperation against Cybercrime

Developments in the field of information and

Co-operation with Law Enforcement Agencies in South Africa. 19 September 2008

Commonwealth Cyber Declaration

Guiding principles on the Global Alliance against child sexual abuse online

Garry Mukelabai Communications Authority Zambia

RESOLUTION 130 (REV. BUSAN, 2014)

FINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION

Telecommunication Regulatory Reform and the WTO Process

Scope of the Member State mechanism

Illicit Goods and Global Health Programme

Cybersecurity for ALL

RESOLUTION 45 (Rev. Hyderabad, 2010)

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM

OCTOPUS CONFERENCE COOPERATION AGAINST CYBERCRIME Workshop 1: Policies, activities and initiatives on cybercrime of international organisations

Policy recommendations. Technology fraud and online exploitation

10025/16 MP/mj 1 DG D 2B

EU data security and privacy trends

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

IAEA Perspective: The Framework for the Security of Radioactive Material and Associated Facilities

European Investigation Order: Frequently Asked Questions

'Cybersecurity' Threat or Opportunity. Saikat Datta Policy Director Centre for Internet & Society, India

ECONOMIC ASPECTS OF CYBERCRIME

HARMONIZING NATIONAL LEGAL APPROACHES ON CYBERCRIME

Activity A.1 Agenda Item 16

10496/18 MC/sl 1 DGD 2

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor

Requirements on new data protection regulations and current changing needs from the view of the EDPS

Permanent Missions Briefing Vienna International Center 16 January 2015

Transcription:

African Forum on Cybercrime, Addis Ababa, 16 18 October 2018 Workshop 4: Current status of cybercrime legislation in Africa and international standards Cybercrime legislation in Africa and the Budapest Convention: An overview Alexander Seger Council of Europe alexander.seger@coe.int www.coe.int/cybercrime

Cybercrime legislation in Africa: Issues for discussion Legislation on cybercrime AND electronic evidence: what is needed? Making attacks against and by means of computers a criminal offence What substantive criminal law? Empowering law enforcement authorities to secure electronic evidence in relation to any crime What procedural law powers? What safeguards? Enabling international cooperation What is needed in terms of harmonisation/ compatibility of domestic legislation with international standards? Domestic legislation on cybercrime and e-evidence: What international benchmarks? Budapest Convention on Cybercrime what relevance, what benefits for Africa? Legislation on cybercrime and e-evidence in Africa: what is the state of play? What is the current situation? Examples of good practice? How to move ahead with domestic reforms of legislation?

Cooperation on Cybercrime: The approach of the Council of Europe 1 Common standards: Budapest Convention on Cybercrime and relates standards 2 Follow up and assessments: Cybercrime Convention Committee (T-CY) Protecting you and your rights in cyberspace 3 Capacity building: C-PROC Technical cooperation programmes 3 3

Legislation on cybercrime AND electronic evidence What international benchmarks? Budapest Convention on Cybercrime Criminalising conduct Illegal access Illegal interception Data interference System interference Misuse of devices Fraud and forgery Child pornography IPR-offences + Procedural tools + Expedited preservation Search and seizure Production orders Interception of computer data Limited by safeguards Harmonisation International cooperation Extradition MLA Spontaneous information Expedited preservation MLA for accessing computer data MLA for interception 24/7 points of contact

5 www.coe.int/cybercrime 5 Budapest Convention on Cybercrime as a guideline Substantive criminal law Article Budapest Convention Domestic provisions Art. 1 Definitions? Art. 2 Illegal access? Art. 3 Illegal interception? Art. 4 Data interference? Art. 5 System interference? Art. 6 Misuse of devices? Art. 7 Computer-related forgery? Art. 8 Computer-related fraud? Art. 9 Child pornography? Art. 10 IPR offences? Art. 11 Attempt, aiding, abetting? Art. 12 Corporate liability?

6 www.coe.int/cybercrime 6 Budapest Convention on Cybercrime as a guideline Procedural powers Article Budapest Convention Domestic provisions Art. 15 Conditions and safeguards? Art. 16 Expedited preservation? Art. 17 Expedited preservation and partial disclosure of traffic data Art 18 Production orders? Art. 19 Search and seizure? Art. 20 Real-time collection traffic data? Art. 21 Interception of content data??

7 www.coe.int/cybercrime 7 Budapest Convention on Cybercrime: evolving Budapest Convention: technology neutral Guidance Notes Notion of computer systems Botnets DDOS attacks Critical information infrastructure attacks Malware Spam Identity theft / phishing in relation to fraud Terrorism Transborder access to data (Article 32) Production orders for subscriber information (Article 18)

8 www.coe.int/cybercrime 8 Budapest Convention on Cybercrime: evolving Protocol on Xenophobia and Racism committed via Computer Systems In preparation: 2 nd Additional Protocol on Enhanced International Cooperation and Access to evidence in the Cloud A. Provisions for more efficient MLA B. Provisions for direct cooperation with providers in other jurisdictions C. Framework and safeguards for existing practices of extending searches transborder D. Safeguards/data protection

How to accede to the Budapest Convention Treaty open for accession by any State (article 37) Phase 1: If a country has legislation in place or advanced draft: Letter from Government to CoE expressing interest in accession Consultations (CoE/Parties) in view of decision to invite Invitation to accede Phase 2: Domestic procedure (e.g. decision by national Parliament) Deposit the instrument of accession at the Council of Europe Acceded: Argentina, Australia, Cabo Verde, Chile, Costa Rica, Dominican Republic, Mauritius, Morocco, Panama, Philippines, Senegal, Tonga Invited: Colombia, Ghana, Mexico, Nigeria, Paraguay, Peru 9

Benefits of joining Budapest Convention Trusted and efficient cooperation with other Parties Participation in the Cybercrime Convention Committee (T-CY) Participation in future standard setting (Guidance Notes, Protocols and other additions to Budapest Convention) Enhanced trust by private sector Technical assistance and capacity building Cost : Commitment to cooperate Disadvantages? 10 www.coe.int/cybercrime 10

Reach of the Budapest Convention Parties: Cabo Verde Mauritius Morocco Senegal Signatory / invited to accede: 140+ Indicative map only o Ghana o Nigeria o South Africa o Tunisia Ratified/acceded: 61 Signed: 4 Invited to accede: 6 = 71 Other States with laws/draft laws largely in line with Budapest Convention = 20+ Further States drawing on Budapest Convention for legislation = 50+

Legislation on cybercrime AND electronic evidence: Progress 2013 2018 re substantive criminal law By January 2013 www.coe.int/cybercrime States Largely in place Partially in place Not in place or no information All Africa 54 6 11% 18 33% 30 56% All Americas 35 10 29% 12 34% 13 37% All Asia 42 13 31% 17 40% 12 29% All Europe 48 38 79% 8 17% 2 4% All Oceania 14 3 21% 6 43% 5 36% All 193 70 36% 61 32% 62 32% By January 2018 States Largely in place Partially in place Not in place or no information All Africa 54 14 26% 21 39% 19 35% All Americas 35 14 40% 15 43% 6 17% All Asia 42 17 40% 18 43% 7 17% All Europe 48 44 92% 4 8% 0 0% All Oceania 14 5 36% 6 43% 3 21% All 193 94 49% 64 33% 35 18%

Substantive criminal law on cybercrime: developments 2013-2018 Good practices available in Africa Concern: Laws on cybercrime used to prosecute speech The protection of national security and public order is a legitimate ground for restricting freedom of expression where that restriction is prescribed by law necessary in a democratic society proportionate Broad, vaguely defined provisions do not meet these requirements use of computers with intent to compromise the independence of the state or its unity, integrity, safety or any of its high economic, political, social, military or security interests or subscribe, participate, negotiate, promote, contract or deal with an enemy in any way in order to destabilise security and public order or expose the country to danger use of computers to create chaos in order to weaken the trust of the electronic system of the state or provoke or promote armed disobedience, provoke religious or sectarian strife, disturb public order, or harm the reputation of the country creation of sites with a view to disseminating ideas contrary to public order or morality Problematic trend Discredits legitimate action on cybercrime violates fundamental rights 13 www.coe.int/cybercrime 13

Legislation on cybercrime AND electronic evidence: Progress 2013 2018 re procedural powers Specific procedural powers In January 2013 In January 2018 States Largely in place Largely in place All Africa 54 5 9% 10 19% All Americas 35 5 14% 9 26% All Asia 42 8 19% 13 31% All Europe 48 31 65% 39 81% All Oceania 14 1 7% 3 21% All 193 50 26% 74 38% Some good practices available in Africa Increasing data protection regulations in Africa Data Protection Convention 108 Cabo Verde, Mauritius, Morocco, Senegal + support to Kenya and Nigeria Often reliance on general powers Problem of safeguards www.coe.int/cybercrime Often reliance on general powers Problem of safeguards

Legislation on cybercrime AND electronic evidence: CONCLUSIONS Criminalising attacks against and by means of computers: Good progress in Africa Some concerns over vague, broadly defined provisions Procedural powers to secure electronic evidence: Some progress in Africa Specific, well-defined powers with conditions and safeguards needed Progress in terms of data protection regulations Data protection Convention 108/+ available for Africa Budapest Convention on Cybercrime is relevant for Africa: Used as guideline in an increasing number of countries of Africa Some countries have joined or are joining to benefit from membership Legislation must be backed up by capacity building www.coe.int/cybercrime

www.coe.int/cybercrime