LEGAL SOLUTION CYBERCRIME LEGAL SOLUTION LEGAL SOLUTION NATIONAL, REGIONAL, INTERNATIONAL

Similar documents

Cybercrime and e-evidence: challenges and solutions.

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

ITU Model Cybercrime Law: Project Overview

Comprehensive Study on Cybercrime

Regional Workshop on Cybercrime, Tbilisi, Georgia 13 May 2010

ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013

10007/16 MP/mj 1 DG D 2B

THE REGULATORY ENVIRONMENT IN EUROPE

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Data Preservation Checklists

UNODC. International Cooperation and Assistance in Cybercrime Matters

Project III

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

T-CY Guidance Note #8 Obtaining subscriber information for an IP address used in a specific communication within a criminal investigation

Motorola Mobility Binding Corporate Rules (BCRs)

Report on the Hungarian Crime Prevention Activity and the Role of the Regional Crime Prevention Academy BUDAPEST

G8 Lyon-Roma Group High Tech Crime Subgroup

International Cooperation in Cybercrime Investigations

RESOLUTION 45 (Rev. Hyderabad, 2010)

GLOBAL CYBERSECURITY INDEX 2016

ITU Global Cybersecurity Index

Combating Pharmacrime AGENDA

Overview on the Project achievements

ECONOMIC ASPECTS OF CYBERCRIME

10025/16 MP/mj 1 DG D 2B

National Communications Authority

Friedrich Smaxwil CEN President. CEN European Committee for Standardization

Europol The Police Intelligence Agency of the European Union

International conference on Judicial Cooperation in Cybercrime Matters OUTLINE

PRIVACY NOTICE WHO WILL PROCESS YOUR PERSONAL INFORMATION? WHY IS YOUR PERSONAL INFORMATION REQUIRED?

Role of 24/7 points of contact regarding MLA requests for computer data/e-evidence, Cooperation with competent authorities

The commission communication "towards a general policy on the fight against cyber crime"

ITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania

CONCURRENT SESSIONS Wednesday 8:30 10:30 KEMPINSKI HOTEL CORVINUS Erzsébet tér 7-8, Budapest V.

Mapping of the CVD models in Europe

ENISA s Position on the NIS Directive

Data Protection System of Georgia. Nina Sarishvili Head of International Relations Department

Draft Resolution for Committee Consideration and Recommendation

Council of the European Union Brussels, 13 June 2017 (OR. en)

Global cybersecurity and international standards

China and International Governance of Cybercrime

A Global Protocol on Cybersecurity and Cybercrime

Commonwealth Cyber Declaration

Data Protection. Guidance Notes

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul

New Legal instruments for Cross-border Crime Investigation in EU

Digital Signatures Act 1

UNODC/CCPCJ/EG.4/2017/4

EU Cybersecurity Certification Framework

From The European Library to The European Digital Library. Jill Cousins Inforum, Prague, May 2007

Electricity Market Development in the Energy Community. Janez Kopač, Energy Community Secretariat 1 st SEERC Power Conference Portorož, 7 June 2016

UNODC tackling cybercrime in support of a safe and secure AP-IS

Cybersecurity. Quality. security LED-Modul. basis. Comments by the electrical industry on the EU Cybersecurity Act. manufacturer s declaration

European Investigation Order: Frequently Asked Questions

esignature Infrastructure Marketing Model

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

European Investigation Order

'Cybersecurity' Threat or Opportunity. Saikat Datta Policy Director Centre for Internet & Society, India

PERSONAL DATA POLICY Bouygues.com

13268/16 EB/dk 1 DGD 1C

WORKSHOP ON ALL WEEE FLOWS 14/02/17 Alberto Canni Ferrari ERP Italy Country General Manager

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud

HARMONIZING NATIONAL LEGAL APPROACHES ON CYBERCRIME

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Council of the European Union Brussels, 23 November 2016 (OR. en)

Act Pacific Islands Law Officers Network Cybercrime Workshop

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES

This report was prepared by the Information Commissioner s Office, United Kingdom (hereafter UK ICO ).

NIS Country Reports Overview Document

З А К О Н О ПОТВРЂИВАЊУ КОНВЕНЦИЈE САВЕТА ЕВРОПЕ О ЗАШТИТИ ДЕЦЕ ОД СЕКСУАЛНОГ ИСКОРИШЋАВАЊА И СЕКСУАЛНОГ ЗЛОСТАВЉАЊА

European Transport Policy: ITS in action ITS Action Plan Directive 2010/40/EU

ANNEX A.1 TECHNICAL SPECIFICATIONS OPEN CALL FOR TENDERS

SLAWOMIR PICHOR. Deputy Head of EUBAM

Guiding principles on the Global Alliance against child sexual abuse online

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

Project III Public/private cooperation

ACCREDITATION WITHIN EURASIAN ECONOMIC UNION: WAYS TO ALIGN WITH EU ACCREDITATION SYSTEM TATYANA NIKOLAEVA

Directive on security of network and information systems (NIS): State of Play

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.

Internet copy. EasyGo security policy. Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement

Global Cybersecurity Agenda

ehaction Joint Action to Support the ehealth Network

Electricity Market Integration 2.0 in Central and South East Europe Potential benefits: markets and institutions

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION STAFF WORKING PAPER

COMPUTER CRIME LAW PROFESSOR KERR

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (REV. BUSAN, 2014)

INSPIRE status report

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

Potential new global legal mechanisms on combatting cybercrime and global cyberattacks

Garry Mukelabai Communications Authority Zambia

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

The cost of cybercrime the benefits of cooperation

PUBLIC COUNCIL OF THE EUROPEAN UNION. Brussels, 26 May /03 LIMITE SIRIS 47 CATS 34 ASIM 31 COMIX 330

Requirements on new data protection regulations and current changing needs from the view of the EDPS

ECOWAS Cyber security Agenda

Global Project on Cybercrime European Union Cybercrime Task Force. Strasbourg, November 21-23, 2011

Transcription:

CYBERCRIME LEGAL SOLUTION NATIONAL, REGIONAL AND INTERNATIONAL SOULTIONS IN THE FIGHT AGAINST CYBERCRIME WITH A FOCUS ON THE BUDAPEST CONVENTION ON CYBERCRIME Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection Cap Verde 28. November 2008 Dr. Marco Gercke Lecturer for Criminal Law / Cybercrime, Faculty of Law, Cologne University Computer Fraud Religious Offences CYBERCRIME Page: 1 CYBERCRIME Page: 2 LEGAL SOLUTION LEGAL SOLUTION Computer Fraud Religious Offences International Solution CYBERCRIME Page: 3 CYBERCRIME Page: 4

LEGAL SOLUTION INTERNATIONAL SOLUTION Art. 37 - Accession to the Convention Fill existing gaps Currently the Council of Europe Convention on Cybercrime is the only International Agreement that covers all relevant areas of Cybercrime Legislation (Substantive Criminal Law, Procedural Law, International Cooperation) Intention: Harmonisation of selected aspects of Cybercrime legislation After the entry into force of this Convention, the Committee of Ministers of the Council of Europe, after consulting with and obtaining the unanimous consent of the Contracting States to the Convention, may invite any State which is not a member of the Council and which has not participated in its elaboration to accede to this Convention. The decision shall be taken by the majority provided for in Article 20.d. of the Statute of the Council of Europe and by the unanimous vote of the representatives of the Contracting States entitled to sit on the Committee of Ministers. Open for non-members International Solution CYBERCRIME Page: 5 CYBERCRIME Page: 6 SIGNATURES UNTIL 2007 DETAILS ABOUT SIGNATURES ITU HLEG GLOBAL CYBERSECURITY AGENDA 43 States signed the Convention 185 ( Convention on Cybercrime ) until March 2006, among them are 4 Non-Members. Details are available unter www.coe.int ITU set up a multi-stakeholder group of experts to further develop the the GCA Invited Elaboration of strategies for the development of a model Cybercrime legislation that is globally applicable and interoperable with existing national and regional legislative measures Invited CYBERCRIME Page: 7 CYBERCRIME Page: 8

LEGAL SOLUTION REGIONAL SOLUTION EU COUNTRIES A number of regional initiatives Picture removed in print version Examples for current developments are the European Union, Gulf Cooperation Council (GCC) Advantage: Often comparable legal systems Regional agreements can supplement international agreements Regional Solution CYBERCRIME Page: 9 CYBERCRIME Page: 10 LEGAL SOLUTION REGIONAL & NATIONAL EU COUNTRIES National Solution Can regional an national solutions work? Picture removed in print version One argument against regional and national solutions is the fact that the internet does not know any boarders and boundaries and therefore international solutions are necessary International dimension requires harmonisation to effectively fight Cybercrime It does not necessary exclude additional regional and national approaches CYBERCRIME Page: 11 CYBERCRIME Page: 12

REGIONAL & NATIONAL Geo-tracking enables to keep geographic borders in times of the Internet It enables to exclude users with certain IP addresses from services The fact that the possibility to circumvent virtual or real border exists does not mean that there are no borders BORDER Picture removed in print version CONVENTION ON CYBERCRIME The need for a harmonisation CYBERCRIME Page: 13 CYBERCRIME Page: 14 NEED FOR HARMONISATION CURRENT SITUATION 1. Technical aspect: Investigations depend on international cooperation of investigation authorities 2. Legal aspect: Principle of National Sovereignty limits the possibilities of transnational investigations without international cooperation Legal Aspect Country with proper legislation Countries without proper legislation CYBERCRIME Page: 15 CYBERCRIME Page: 16

CURRENT SITUATION Legal Aspect Cooperation possible REASON FOR THE DIFFICULTIES 1. Need of adequate provisions in the national law Substantive Criminal Law and Procedural Law provisions are in most cases an essential requirement for national investigation (no crime - no investigation) Substantive Criminal Law and Procedural Law provisions are in most cases an essential requirement for international cooperation (dual criminality) Cooperation impossible CYBERCRIME Page: 17 CYBERCRIME Page: 18 INTERNATIONAL UNIFICATION AIM OF THE CONVENTION Attempts for improve the Fight against Cybercrime a number of International Organisation such as OECD G8 UN European Union Council of Europe (CoE) Legal Aspect Set of minimum standards Until now the CoE Convention on Cybercrime is the only international legal framework with a broad approach CYBERCRIME Page: 19 CYBERCRIME Page: 20

STRUCTURE Notice SUBSTANTIVE CRIMINAL LAW Art. 2 - Illegal Access Section 1: Substantive criminal law Section 2: Procedural law Section 3: Jurisdiction International cooperation Additional protocol (xenophobic material) Not covered: Responsibility of Internet Providers French and Arabic translation of the Convention and it s Explanation are available at www.coe.int - Treaty Office - Convention 185 Art. 1 Definition Art. 2 Illegal Access Art. 3 Illegal Interception Art. 4 Data Interference Art. 5 System Interference Art. 6 Misuse of Devices Art. 7 Computer-related Forgery Art. 8 Computer-related Fraud Art. 9 Offences related to Child Pornography Art. 10 Offences related to Copyright Violations Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the access to the whole or any part of a computer system without right. CYBERCRIME Page: 21 CYBERCRIME Page: 22 SUBSTANTIVE CRIMINAL LAW Art. 11 - Attempt, aiding and abetting PROCEDURAL LAW Art. 16 - Expedited preservation Art. 11 Attempt, aiding, abetting Art. 12 Corporate Liability Art. 13 Sanction an measures Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, aiding or abetting the commission of any of the offences established in accordance with Articles 2 through 10 of the present Convention with intent that such offence be committed. Art. 14 Scope Art. 15 Conditions, Safeguards Art. 16 Expedited Preservation Art. 17 Expedited Disclosure Art. 18 Production Order Art. 19 Search and Seizure Art. 20 Real time Collection of Traffic Data Art. 21 Real time Interception of Content Data Art. 22 Jurisdiction Each Party shall adopt such legislative and other measures as may be necessary to enable its competent authorities to order or similarly obtain the expeditious preservation of specified computer data, including traffic data, that has been stored by means of a computer system, in particular where there are grounds to believe that the computer data is particularly vulnerable to loss or modification. CYBERCRIME Page: 23 CYBERCRIME Page: 24

INTERNATIONAL COOPERATION Art. 23 General principle Art. 24 Extradition Art. 25 General principle related to mutual assistance Art. 26 Spontaneous Information Art. 27 Absence of International Agreements Art. 28 Confidentiality and limitations of use Art. 29 Expedited preservation Art. 30 Expedited disclosure Art. 31 Access to stored computer data Art. 32 Trans-border access to stored computer data INTERNATIONAL COOPERATION Art. 33 Real-time collection of traffic data Art. 34 Interception of content data CYBERCRIME Page: 25 CYBERCRIME Page: 26 24/7 NETWORK Art. 35 24/7 Network Art. 35-24/7 Each Party shall designate a point of contact available on a twenty-four hour, seven- day-aweek basis, in order to ensure the provision of immediate assistance for the purpose of investigations or proceedings concerning criminal offences related to computer systems and data, or for the collection of evidence in electronic form of a criminal offence. [...] NATURE (LEGAL)! International Agreement! Needs to be ratified an implemented to come into effect! Binding only on a political level! Various spaces for interpretation and restrictions CYBERCRIME Page: 27 CYBERCRIME Page: 28

SIGNATURES UNTIL 2007 DETAILS ABOUT SIGNATURES OPEN FOR NON-MEMBERS Art. 37 - Accession to the Convention Invited 43 States signed the Convention 185 ( Convention on Cybercrime ) until March 2006, among them are 4 Non-Members. Details are available unter www.coe.int 4 Non-Members were involved in the drafting of the convention and signed the convention Convention is open for any non member Costa Rica and Mexico were recently invited to access the Convention After the entry into force of this Convention, the Committee of Ministers of the Council of Europe, after consulting with and obtaining the unanimous consent of the Contracting States to the Convention, may invite any State which is not a member of the Council and which has not participated in its elaboration to accede to this Convention. The decision shall be taken by the majority provided for in Article 20.d. of the Statute of the Council of Europe and by the unanimous vote of the representatives of the Contracting States entitled to sit on the Committee of Ministers. Invited CYBERCRIME Page: 29 CYBERCRIME Page: 30 RATIFICATION RATIFICATION Denmark Island Netherl. Norway Slovenia France Croatia Hungary US Bosnia/HG Albania Armenia Latvia Estonia Finland Lithuania Romania Ukraine Cyprus Bulgaria Macedonia CYBERCRIME Page: 31 CYBERCRIME Page: 32

RATIFICATION Norway COUNCIL OF EUROPE Netherl. Council of Europe is not on only providing the framework Croatia Hungary Macedonia Slovenia Romania Cyprus Denmark Armenia US France Ukraine Finland Latvia Assistance with regard to the evaluation of the status of the current legislation Training / Workshops Assistance within the implementation process Albania Estonia Lithuania Bulgaria Bosnia/HG 2002 2003 2004 2005 2006 Island 2007 Signatory states participate in the Cybercrime Committee that further develops the Convention CYBERCRIME Page: 33 CYBERCRIME Page: 34 CONTACT THANK YOU FOR YOUR ATTENTION Dr. Marco Gercke Niehler Str. 35 D-50733 Cologne www.cybercrime.de CYBERCRIME Page: 35