Presentation is loading. Please wait.

Presentation is loading. Please wait.

Development of IT has changed our – societies – commerce – lifestyle (communication, working, shopping) This creates considerable legal problems in many.

Similar presentations


Presentation on theme: "Development of IT has changed our – societies – commerce – lifestyle (communication, working, shopping) This creates considerable legal problems in many."— Presentation transcript:

1

2 Development of IT has changed our – societies – commerce – lifestyle (communication, working, shopping) This creates considerable legal problems in many areas Its more important than ever to legislate on computer or cyber crime

3

4

5 Definitions Computer crimes Cyber Crimes Electronic crimes Characteristics traditional & new criminal activities transnational Problems unreported lack of training

6 Computer as Target Using a Computer to attack victim computers Attacks on the confidentiality, integrity or availability of information or systems Computer as Tool Fraud Gambling Pornography Piracy Harassment Computer as Accomplice Personal information (diaries, downloaded e- mails) Contraband (porn) Stolen Information (trade secrets, credit cards) Key evidence unknown to suspect!!!

7 Insider threats (employees) Hackers (teenage thrill-seekers to sophisticated criminals) Hactivists (overloads e-mail servers or hack web sites to send political message) Virus writers Criminal groups (attack systems & steal password for financial gain) Sensitive intrusions (sensitive information is obtained via computer intrusions) Information warfare (alternative to military attacks) Terrorists (who have potential to disrupt government systems with computer attacks) Cyber Warfare (attack by sovereigns --- Crime or Declaration of war) Hackers (teenage thrill-seekers to sophisticated criminals)

8 governing law jurisdiction forum conveniens enforcement of judgments Transnational Crime determining the locus delicti Trans-border investigation jurisdictional conflicts extradition forum convenes

9 An American Journalist Sued in Australia Files a Petition Seeking Help By ANITA RAMASASTRY I will argue that the U.N. is not the right forum to resolve these key questions. A few years ago, Australian mining magnate Joe Gutnick sued American reporter Bill Alpert for defamation in Australia. Now, in an unprecedented move, Alpert has taken his case to the U.N. - filing a petition with the Human Rights Committee. The case itself) and the disposition of the petition, are likely to be landmarks in the law regarding international jurisdiction with respect to Internet publications. Alpert claims in his petition that a decision by Australia 1 s High Court, forcing him to face suit there, denied him the right of free speech. For this reason, he argues, it breached Article 19 of the United Nations 1 International Covenant on Civil and Political Rights (ICCPR).

10 An American Journalist Sued in Australia Files a Petition Seeking Help By ANITA RAMASASTRY (Continued) In this instance, the nation in which the case is tried is likely to make a significant different to the outcome. Defamation laws in Australia are stricter than in the US, where the First Amendment generally permits comments such as those made in the article. And if Australian defamation law applies) Internet publication may have to be tailored to the country whose laws are most restrictive - a blow to free speech. The issue the case raises is of crucial importance: Will words that appear on the Internet be subject to defamation (and perhaps other) suits wherever they may be read - that is, in any of the world 1 s 3C 0-plus jurisdictions? And if not, where can suits be brought, and not brought? What is the dividing line?

11 Can we adapt existing law to cyberspace? Do we need new legislation? Problem comes when very idea of jurisdiction, based on geographic boundaries, is difficult to apply to Internet which does not recognize geographical distinctions What are options other than legislation? International/regional treaties International convention Development by system operators and Internet users of "rules" for behavior on Internet? Options available to individuals to regulate their conduct on a private basis - through contracts, private associations, custom etc.

12 1977 First comprehensive proposal for computer crime legislation was introduced in US Congress by Senator Ribikoff in 1977 1983 Recommendations of expert committee of OECD in Paris in 1983 to ensure legislation for certain categories of computer crime 1986 OECD ‘Computer-Related Crime’ Report 1986 1989 Council of Europe Recommendation R(89) 9 on computer misuse 1990-92 Discussed at 13th Congress of International Academy of Comparative Law in Montreal in 1990, at UN’s 8th Criminal Congress in Havana 1990, and at a Conference in Wurzburg, Germany in 1992

13 1995 Council of Europe Recommendation R(95) 13 (“problems of procedural law connected with information technology”) 1995-2000 Interpol organized its International Conference on Computer Crime in 1995, 1996, 1998, and 4th Conference was held in 2000 2001Convention on Cyber-Crime 2001 2007 ITU launched the Global Cybersecurity Agenda (GCA) in May 2007 by the Secretary General 2008 ITU's High Level Experts Group delivered Report with recommendations, including on cybercrime legislation, in August 2008 2011 ITU in 2011 published a book: Understanding Cybercrime: Phenomena, Challenges and Legal Responses, by Professor Marco Gercke, Germany

14  30 states sign Convention at opening ceremony at Budapest, on 23.XI.2001  First international treaty on cyber crimes, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security  Contains a series of powers and procedures such as search of computer networks and interception  Main objective is to pursue a common criminal policy aimed at protection of society against cyber-crime, especially by adopting appropriate legislation and fostering international co- operation  Convention is product of four years of work by experts of Council of Europe, United States, Canada, Japan and other countries which are not members of the Organization

15 to deter actions directed against confidentiality integrity availability of computer systems networks data misuse of such systems, networks and data to combat such criminal offences, by facilitating detection, investigation Search & seizure prosecution of such criminal offences

16 Attempt and aiding or abetting Corporate liability Criminal access Criminal data access Cyber stalking Cyber Terrorism Data damageDefamationForgeryForgeryFraud Malicious code Misuse of devices Misuse of encryption ObscenityPhising Spamming System damage Traditional crime Unauthorized access to code Unauthorized interception Waging cyber war DefamationData damage

17 Investigations by Investigation Officer Power of Investigation Officer to access computer and data Expedited preservation of evidence Real-time collection of traffic data Trans-border access International co- operation Territorial scope of offences

18 Promote Cyber-computer ethics Convince Government for Legislation Prepare investigation kit & instructions Establish Computer Forensic Lab Center of Excellence on Information Security Training of IOs, lawyers, judges Basic information to computer users


Download ppt "Development of IT has changed our – societies – commerce – lifestyle (communication, working, shopping) This creates considerable legal problems in many."

Similar presentations


Ads by Google