And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

Philippine Cybercrime Efforts
International Telecommunication Union Support for Harmonization of the ICT Policies in Sub-Sahara Africa Name of presenter HIPSSA Project.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
UN Comprehensive Study on Cybercrime
By Andy Scott, Michael Murray and Adam Kanopa
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
2 Language of Computer Crime Investigation
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
CLE Conference, October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
CLE Conference, October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cybercrime and the Council of Europe response Strasbourg, October 2007 Alexander Seger Council of Europe, Strasbourg, France Tel
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Regional Conference Intellectual Property Crime Bahrain April 2008.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
CYBER CRIME.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Chapter IV. International Cooperation. 2 2 International Cooperation Mandatory Offences Optional Offences Narrow Dual Criminality Requirements In MLAs.
OPSC Optional protocol on sale of children children prostitution and pornography.
Perspectives for an effective European-wide fight against cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Copyright Grace, Ienash, Nick. Copyright - International  Instruments of copyright  World Intellectual Property Organisation and EU Convention on Cybercrime.
Digital evidence in criminal proceedings: legal considerations Arkadiusz Lach Department of Criminal Procedure Faculty of Law University of Nicolaus Copernicus.
Cje Wojciech Jasiński, Ph.D. Department of Criminal Procedure Faculty of Law, Administration and Economics University of Wrocław Lecture Harmonisation.
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
EU measures combating hate speech ERIO Conference on combating hate speech against Roma and the role of Equality bodies Brussels 16/10/2015 DG JUSTICE.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Computer crimes.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
Workshop on strengthening international legal cooperation among OSCE Member States to combat transnational organized crime (Vienna, 7-9 April 2008) Extradition.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
The StAR Initiative: An Overview EAMJA-KIGALI May 24, 2012
Monitoring and Detecting Online Hate Speech
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Role of Service Providers in Cybercrime Investigations
3rd ANTI-CYBERCRIME FORUM
3rd ANTI-CYBERCRIME FORUM
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
Cybercrime in the election process:
Prosecuting International Intellectual Property Crimes
Cybercrime legislation and policies in Africa: Issues for discussion
Presentation transcript:

and the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems The Budapest Convention on Cybercrime Russell Tyner

The Crown Prosecution Service

Aims Harmonise domestic criminal law Establish the necessary procedural powers for investigation and prosecution Establish a fast and effective regime of international co-operation

The Convention on Cybercrime 85.htm e/cybercrime/T-CY/Default_TCY_en.asp

Safe Havens Legislation Police Capability Co operation with Industry Training for Judges and Prosecutors

Cybercrime The Threat The Public Business Government UK Figures 2013 £48 Billion in online sales 57% of population ordered goods online Card holder not present fraud - £328million Music and Film piracy -£180 million

Types of Crime Definitions Traditional Crime Fraud Extortion Money Laundering Intellectual Property Infringement Content Offence

NOT PROTECTIVELY MARKED Slide 8 New Crimes Hactivism - Political / Idealism State Sponsored - Espionage, Cyberwarfare Cybercrime - Motivated by £££’s

The Internet as Enabler of Crime

Slide 10 INTERNET Worm COMPUTER virus EXPLOIT PACK BANKING TROJAN ROOTKIT BOTNET KEYLOGGER MALWARE NOT PROTECTIVELY MARKED

Geared to stealing online login credentials for banks an estimated 12.7 million computers infected in over 190 countries Mariposa Botnet

Identity Theft

Sources of Information for criminals Social Networking sites Phishing Pharming Use of Botnets

Free Cheese

Phishing

Harm To Individuals Critical Infrastructure Social Economic

The Challenge for Law Enforcement Anonymity – ease of communication Complex investigations International Co operation Mass victimisation -Under reporting Expertise

Perpetrators

Hactivism

The language of IRC EG OIC LOL ROTFL IANAL LART FIIK

Industry

Features of Cybercrime Nature Volume Location

Nature and Volume Digital – investigators expertise Volatile – easily changed – data retention policy Identifying evidential material-Case Presentation Unused material Location

Challenges Legal Instruments Jurisdiction Tracing and locating perpetrators Obtaining evidence Case management Admissibility of evidence Choice of charge Case presentation

Evidence

The Substantive Law provisions of the Convention Art 2 Illegal Access Art 3 Illegal interception Art 4 Data interference Art 5 System interference Art 6 Misuse of devices Art 7 Computer relates forgery Art 8 Computer related fraud Art 9 Child Pornography

Article 2 Illegal Access …access to the whole or any part of a computer system without right

Article 3 Illegal Interception The intentional interception without right by technical means of non public transmissions of computer data

Articles 4 and 5 Data and system interference Damaging or seriously hindering computer data or systems

Articles 4 and 5 Data and system interference

Article 6 Misuse of Devices The Production – Sale – Distribution of devices including computer programs designed or adapted for committing offences established under the Convention.

Articles 7 and 8 Fraud and Forgery Inputting false computer data with the intent that it will be acted upon for legal purposes as authentic or to procure an economic benefit

NOT PROTECTIVELY MARKED Dark Market NOT PROTECTIVELY MARKED

Dark Market Investigation Evidence from Service Providers Subscriber Information IP information E mail addresses E mail providers Billing information Traffic data Content

JiLSi and Devilman

Article 9 Child Pornography Production, Distribution, Possession

Operation Ore

Article 10 Copyright Infringement

The Additional Protocol Aim To supplement the Convention as regards the criminalisation of acts of a racist and xenophobic nature committed through computer systems. Material which advocates, promotes or incites hatred discrimination or violence against any individual or group based on race, colour, descent or national or ethnic origin as well as religion if used as a pretext for any of these factors

Substantive law provisions Article 3 Dissemination of racist and xenophobic material through computer systems Articles 4 and 5 The use of computer systems to threaten or insult persons because of their race, colour,descent or national or ethnic origin Article 6 The use of computer systems to distribute material which denies,grossly minimises, approves or justifies genocide or crimes against humanity

Procedural measures of the Convention Art 16 Expedited preservation of stored computer data Art 17 Expedited preservation and partial disclosure of traffic data Art 18 Production Order Art 19 Search and seizure of stored computer data Art 20 Real time collection of traffic data Art 21 Interception of content

Article 22 Jurisdiction Parties to establish jurisdiction over the substantive offences set out in the Convention. Nationality and Extradition

International Co operation Art 23 General Principles Art 24 Convention as basis of Extradition Art 25 States to apply international instruments to the widest extant possible in the investigation and prosecution of computer related offences Art 26 Allows for parties to exchange information spontaneously without prior request Provide for expedited requests for assistance Art 27 Provides that the Convention may serve as the basis for a request for Mutual Legal Assistance in the absence of any treaty or instrument

International co operation Art 29,30,31,33 and 34  Expedited preservation of stored computer and traffic data  Access to stored computer data  The collection of real time traffic data  Interception of content

International Co operation Art 35 Each party to establish a 24/7 point of contact to assist with the provision of immediate assistance

Conclusion Russell Tyner Crown Prosecution Service Organised Crime Division London +44(0)