Applicability of Traditional Substantive Criminal Law Concepts to Contemporary Cybercrime Igor Vuletić, Ph.D. assistant professor Department of criminal.

Slides:



Advertisements
Similar presentations
ITU- BDT Arab Regional Workshop on Legal Aspects of Child Online Protection Algiers (Algeria), June 2012 Criminal Law – Concepts and Best Practices.
Advertisements

Conspiracy By Ashley Geeves. What is conspiracy? An agreement between two or more people to do an unlawful act. Most conspiracies are charged as statutory.
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
Chapter 4 Inside Criminal Law
Attempt, Conspiracy, and Solicitation
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Parties to Crime and Vicarious Liability
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
1 Book Cover Here Copyright © 2010, Elsevier Inc. All rights Reserved Chapter 4 Preparatory Activity Offenses Criminal Law Ninth Edition.
CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law.
Cje Karolina Kremens, LL.M., Ph.D. Wojciech Jasiński, Ph.D. Department of Criminal Procedure Faculty of Law, Administration and Economics University of.
Burglary (Cal.)  NATURE OF CONDUCT: enters house, room apartment or other building with intent to commit grand/petit larceny or any felony  AC: (burg.
Chapter 5 Mens Rea.
Identification and Analysis of Cyber Crime (Repository of Cyber Crime and Cyber Laws) Knowledge Based System (KBS) Presentation By : Dr. Priyanka Sharma.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Computer Crime and CyberCrime Why we need Computer Forensics.
Nature of the Criminal Law  A. Foundations of the Criminal Law  B. Sources of the Criminal Law  C. Legal definitions of crime  D. The Nature of Crime.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
+ The Elements of a Crime. + Conviction In order to convict a criminal, the Crown normally needs to prove that two elements existed at the time of the.
Chapter 2 Criminal Liability and the Essence of Crime
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
CYBER CRIME.
Cybersecurity Governance in Ethiopia
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
LESSON 2: Internet, Computer Ethics and Security
Psychlotron.org.uk PSYB3 - Forensic Psychology. psychlotron.org.uk Forensic psychology Defining & measuring crime Offender profiling Theories of criminal.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Digital evidence in criminal proceedings: legal considerations Arkadiusz Lach Department of Criminal Procedure Faculty of Law University of Nicolaus Copernicus.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
IPTS Workshop on Cyber Crime German Developments.
LS507 Understanding Criminal Responsibility Mistake Unit 4 Dr. Christie L. Richardson Kaplan University.
Court Systems and Practices. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. 2.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Zápatí prezentace Selected Problems of the Czech Criminal Law – Introduction Criminal Liability in the Czech criminal law.
Criminal Law Lecture 1 What is Criminal Law? Criminal law is the body of law that relates to crime. It regulates social conduct and proscribes threatening,
Chapter Nine Criminal Practice: Criminal Law and Juvenile Law.
Computer crimes.
Chapter 4 Actus Reus. Introduction—Basic Issues  All crimes are composed of three main elements:  Actus reus (criminal act or omission)  Mens rea (criminal.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Elements of Crime. For an offender to be convicted of a criminal offence, at common law the prosecution usually must prove: –Actus reus –Mens rea –causation.
U.S. JUSTICE Defining & Classifying Crime & Criminals.
The Criminal Mind. ACTUS REUS MENS REA ACT = ACTION A crime includes a criminal act or ‘some form’ of criminal action. MEN = MENTAL = THE MIND In order.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Intro To Criminal Law.
Chapter 4 Criminal Law: Substance and Procedure. Four Broad Categories of the Law Substantive criminal law Procedural criminal law Rules of evidence The.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
PSYB3 - Forensic Psychology. Forensic psychology Defining & measuring crime Offender profiling Theories of criminal behaviour Punishing & treating crime.
Criminal Law for the Criminal Justice Professional Norman M. Garland Third Edition Copyright © 2012 The McGraw-Hill Companies, Inc. All Rights Reserved.
Chapter 17 Computer Crime Hess Introduction Computer crimes are relatively easy to commit and difficult to detect Most computer crimes are not prosecuted.
Cje Class I and II SCOPE OF APPLICATION OF CRIMINAL LAW Criminal Law I
MODUS OPERANDI OF CYBER CRIME
Seminar On Cyber Crime Submitted To: Submitted By:
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Classification of Crimes
Cybercrime in the election process:
Class Name, Instructor Name
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Presentation transcript:

Applicability of Traditional Substantive Criminal Law Concepts to Contemporary Cybercrime Igor Vuletić, Ph.D. assistant professor Department of criminal sciences Faculty of law Osijek

Introduction  The fifth challenge of cybercrime  (non)-material nature of crimes, lack of adequate knowledge and education of lawyers, lack of relevant decisions in practice...  Cybercrime-any crime facilitated or committed using a computer, network, or hardware device (Gordon/Fox)  Conventional crimes in digital form and new crimes

“Ordinary” (convenctional) crimes  Fraud by internet or , forgery of digitally stored data, cyber bullying, cyber pornography, grooming of children, copyright violation etc.  Same purpose, different modus operandi  Offenders are more efficient  Problems: overlap, imprecise duplication, nullum crimen sine lege stricta

New offenses  Hacking, phishing  Determination (definition) of legal interests and drawing limits to the scope of criminalization – important challenges for criminal law!  Principle of equality

Actus reus  Offenses of abstract endangerment, mostly delicta communia  Confusion in special part of criminal law  Immaterial nature of offenses  Problems with determination of right holders

Mens rea  Mostly intentional offenses  Is dolus eventualis sufficient?  Negligence is punishable only exceptionally

Preparatory acts  Delicta preparata and delicta sui generis  Ratio legis – elusive character of cyber crime  What if there is no criminalization of preparatory acts in certain system?  Are sanctions too severe?

Criminalization of possession  Frequently defined as a criminal offens  Problem with child pornography – should mere viewing of pornograph material on the net be considered as “possession”?

Indirect perpetration  Computer viruses distributed through  Indirect perpetrator and direct perpetrator (mistake of facts?)

Responsibility of Internet Service Providers (ISP)  Problems with terminology  To what wxtent may ISP be responsible?  The kind of responsibility under general rules of substantive criminal law?  EU E-Commerce Directive (2000) – privilege for ISP?

Sanctions  Specific sanctions  Problem of disproportion?

Potential conflict of jurisdictions  Sveral possible links  Systems should avoide traditional connection of jurisdiction to territory  Systems should also avoid creating special type of universal jurisdiction

Coclusions  Traditional concept of criminal law cannot be simply transmitted to cybercrimes without further analysis  Many of these concepts require redefinition  Criminal lawyers must specialise in computer and internet technology