Cybercrime and e-evidence: challenges and solutions.

Similar documents

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

The cost of cybercrime the benefits of cooperation

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

LEGAL SOLUTION CYBERCRIME LEGAL SOLUTION LEGAL SOLUTION NATIONAL, REGIONAL, INTERNATIONAL

ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

ITU Model Cybercrime Law: Project Overview

National Communications Authority

International Cooperation in Cybercrime Investigations

Capacity building projects and the Cybercrime Programme Office of the Council of Europe (C-PROC)

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.

International conference on Judicial Cooperation in Cybercrime Matters OUTLINE

10007/16 MP/mj 1 DG D 2B

Cyber Security Development. Ghana in Perspective

Comprehensive Study on Cybercrime

Data Preservation Checklists

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

T-CY Guidance Note #8 Obtaining subscriber information for an IP address used in a specific communication within a criminal investigation

ECOWAS Cyber security Agenda

Overview on the Project achievements

New Legal instruments for Cross-border Crime Investigation in EU

Project III

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul

UNODC. International Cooperation and Assistance in Cybercrime Matters

Role of 24/7 points of contact regarding MLA requests for computer data/e-evidence, Cooperation with competent authorities

Consumer Rights in the Digital Age

Regional Workshop on Cybercrime, Tbilisi, Georgia 13 May 2010

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

Legal Foundation and Enforcement: Promoting Cybersecurity

- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to

Framework for Cybersecurity in Nigeria

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

ECONOMIC ASPECTS OF CYBERCRIME

China and International Governance of Cybercrime

A Multi-Stakeholder Approach in the Fight Against Cybercrime

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

G8 Lyon-Roma Group High Tech Crime Subgroup

Garry Mukelabai Communications Authority Zambia

Criminal Justice Statistics on Cybercrime & Electronic Evidence

CYBERCRIME RESPONDERS TRAININGS

UNODC tackling cybercrime in support of a safe and secure AP-IS

European Investigation Order: Frequently Asked Questions

HARMONIZING NATIONAL LEGAL APPROACHES ON CYBERCRIME

Republic of Mauritius CYBERCRIME STRATEGY Page

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

ASEAN s Cyber Confidence Building Measures

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

Criminal Justice System s Intervention to Cybersecurity Threats: Panacea or Pandora's Box?

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

UNCTAD FINAL REPORT. Harmonizing cyber legislation in the ECOWAS region UNATED NATIONS CONFERENCE ON TRADE AND DEVELOPMENT

10025/16 MP/mj 1 DG D 2B

UNODC/CCPCJ/EG.4/2017/4

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES

Thailand Initiatives and Challenges in Cyber Terrorism

Octopus Conference 2016 Cooperation against Cybercrime

Regional Cyber Security and Cyber Crime Best Practices Workshop November 28-30, 2011 Bogotá, Colombia

National Strategy for Combating Organized Crime

"Cybersecurity in Europe and the EU- Russia Co-operation"

Cooperation against Cybercrime in 2012

EXPERT GROUP MEETING ON CYBERCRIME

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Commonwealth Cyber Declaration

Specialised cybercrime units. - Good practice study -

Promoting Global Cybersecurity

Cybersecurity & Spam after WSIS: How MAAWG can help

Digital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James

'Cybersecurity' Threat or Opportunity. Saikat Datta Policy Director Centre for Internet & Society, India

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

OCTOPUS CONFERENCE COOPERATION AGAINST CYBERCRIME Workshop 1: Policies, activities and initiatives on cybercrime of international organisations

Economic and Social Council

Potential new global legal mechanisms on combatting cybercrime and global cyberattacks

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor

LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

14965/17 MK/ec 1 DG D 2B

PROJECT RESULTS Summary

Act Pacific Islands Law Officers Network Cybercrime Workshop

In the Balkans, UNODC is part of the consortium with GIZ and the Center for International Legal Cooperation of the Netherlands who will implement the

Delegations will find in Annex a joint paper by Europol and Eurojust on "Common challenges in combating cybercrime".

12711/17 GG/ec 1 DGD2B

Police Technical Approach to Cyber Threats

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

Project III Public/private cooperation

TEXTS ADOPTED. European Parliament resolution of 3 October 2017 on the fight against cybercrime (2017/2068(INI))

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

The commission communication "towards a general policy on the fight against cyber crime"

DETERMINANTS OF SOUTH AFRICA S FOREIGN POLICY STRATEGY IN CYBER SPACE LAURENCE CAROMBA, MONASH SOUTH AFRICA

COMPUTER CRIME LAW PROFESSOR KERR

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

10496/18 MC/sl 1 DGD 2

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

A Global Protocol on Cybersecurity and Cybercrime

Present Situation of Cyber Terrorism in China and Its Legal Countermeasures

Development of a renewed European Union Internal Security Strategy. Justice and Home affairs Council meeting Brussels, 4 December 2014

Transcription:

Cybercrime@Octopus Ministry of Communications Workshop on Cybercrime and Cybersecurity for selected Members of Parliament (KAIPTC, Accra, Ghana, 25 October 2018) Cybercrime and e-evidence: challenges and solutions Alexander Seger Council of Europe alexander.seger@coe.int www.coe.int/cybercrime

2 www.coe.int/cybercrime 2 Cybercrime and e-evidence: threats and challenges Cybercrime and other offences involving evidence on computer systems (e-evidence): WHO DID IT? No data, no evidence, no justice Billions of users and devices Trillions of attacks Millions of offences Is there any type of crime without e-evidence? Investigations %? Convictions %?

Cybercrime and e-evidence: threats and challenges Where is the crime? Where is the data, where is the evidence? Who has the evidence? Where is the boundary for LEA powers? Transnational nature of cybercrime and e-evidence Crime and jurisdiction in cyberspace 3 www.coe.int/cybercrime 3

4 www.coe.int/cybercrime 4 Cybercrime and e-evidence: threats and challenges Life in cyberspace, rights in cyberspace Core political, economic and security interests in cyberspace How to reconcile security and fundamental rights?

5 www.coe.int/cybercrime 5 Legal framework, institutional capacities and cooperation Differentiate data needed Subscriber information Traffic data Content data Towards solutions Legal framework Substantive criminal law Specific procedural powers to obtain data Safeguards + data protection regime Cooperation at all levels Training for ALL criminal justice officials Interagency cooperation Cooperation with service providers (domestic, multi-national) International cooperation Budapest Convention on Cybercrime Additional solutions on access to evidence in the cloud Protocol to Budapest Convention

Legal framework, institutional capacities and cooperation What international benchmarks? Budapest Convention on Cybercrime Criminalising conduct Illegal access Illegal interception Data interference System interference Misuse of devices Fraud and forgery Child pornography IPR-offences + Procedural tools + Expedited preservation Search and seizure Production orders Interception of computer data Limited by safeguards Harmonisation International cooperation Extradition MLA Spontaneous information Expedited preservation MLA for accessing computer data MLA for interception 24/7 points of contact 6 www.coe.int/cybercrime 6

Reach of the Budapest Convention Parties: Cabo Verde Mauritius Morocco Senegal Signatory / invited to accede: 140+ Indicative map only o Ghana o Nigeria o South Africa o Tunisia Ratified/acceded: 61 Signed: 4 Invited to accede: 6 = 71 Other States with laws/draft laws largely in line with Budapest Convention = 20+ Further States drawing on Budapest Convention for legislation = 50+

8 www.coe.int/cybercrime 8 Cybercrime and e-evidence: Towards a Protocol to the Budapest Convention A. Provisions for more efficient MLA Emergency MLA Joint investigations Video conferencing Language of requests Etc. Terms of reference approved in June 2017. Negotiations: Sep 2017 Dec 2019. B. Provisions for direct cooperation with providers in other jurisdictions C. Framework and safeguards for existing practices of extending searches transborder D. Safeguards/data protection

9 www.coe.int/cybercrime 9 Legal framework, institutional capacities and cooperation Question: Ghana about to become a Party to the Budapest Convention How to permit Ghana to engage in intensive international cooperation on cybercrime and electronic evidence with currently 61 other Parties?