Cybercrime in the election process:

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

ITU – EC HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, 2nd Workshop on Lesotho National Transposition of SADC Cybersecurity.
International Telecommunication Union Support for Harmonization of the ICT Policies in Sub-Sahara Africa Name of presenter HIPSSA Project.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.
UN Comprehensive Study on Cybercrime
State of play and activities in 2014 March 2014
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
Legal Solutions to Disputes Related to Election Results Report presented by the Election Commission of Bhutan.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
CLE Conference, October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
CLE Conference, October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Legal guidelines for private-public partnership in combating cyber-crime Andrzej Adamski Chair of Criminal Law & Criminal Policy Law Faculty Nicholas Copernicus.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Whistleblower Protection Institution Overview of Georgian Legislation and international experience Maia Dvalishvili Deputy Head, Civil Service Bureau of.
International Cooperation in Criminal Matters Extradition and Mutual Legal Assistance in Transnational Investigations.
Criminalising child pornography and sexual abuse on the internet
Cybercrime and the Council of Europe response Strasbourg, October 2007 Alexander Seger Council of Europe, Strasbourg, France Tel
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Regional Conference Intellectual Property Crime Bahrain April 2008.
EPAS activities Match-fixing Presented by Stanislas Frossard.
Cybersecurity Governance in Ethiopia
Cooperation against terrorism, corruption and organised crime C o u n c i l o f E u r o p e 1 Denis Bribosia (Counter-terrorism Task Force)
Electoral Justice in Kosovo. Legal Framework Primary Kosovo Constitution Law on General Elections Law on Local Elections Criminal Code Law on the Courts.
Lecture 11: Law and Ethics
MODULE II: THE INSTRUMENTS OF JUDICIAL COOPERATION IN CRIMINAL MATTERS IN THE CONTEXT OF THE COUNCIL OF EUROPE.- TOPIC 4 THE 1959 CONVENTION ON MUTUAL.
The acquis Council Framework Decision of 19 July 2002 on combating trafficking in human beings (2002/629/JHA). Council Directive 2004/81/EC of 24 April.
Perspectives for an effective European-wide fight against cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
The ISTANBUL CONVENTION A tool to end female genital mutilation Raluca Popa, Gender Equality Unit Presentation at END FGM European Network General Assembly.
The EU legal framework to combat Cybercrime Brussels, 3-4 April 2012 Milena Petkova General Secretariat of the Council of the European Union.
E-evidence and access to data in the cloud Issues and options under consideration by the Cloud Evidence Group of the Cybercrime.
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Development of IT has changed our – societies – commerce – lifestyle (communication, working, shopping) This creates considerable legal problems in many.
Ethical and legal aspects of organ donation; the Santiago Convention
Capacity building and International Cooperation on Cybercrime:
ASEAN v Transnational Crime and Terrorism…..an Introduction
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
J. Michael Daniel Former White House Coordinator of Cybersecurity during President Barak Obama “ Cyber is one of those issues where it doesn't behave according.
Prepared by the Cybercrime Programme Office of the Council of Europe
Role of Service Providers in Cybercrime Investigations
3rd ANTI-CYBERCRIME FORUM
3rd ANTI-CYBERCRIME FORUM
Purposes of the Convention
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
Forensic and Investigative Accounting
Prosecuting International Intellectual Property Crimes
Securing free and fair European elections
Data Protection in Law Enforcement Area Chapter 9a of the draft law
Cybercrime legislation and policies in Africa: Issues for discussion
Introduction to Digital Forensics
Presentation transcript:

www.coe.int/cybercrime Cybercrime in the election process: 15th European Conference of Electoral Management Bodies “Security in Elections”, Oslo, Norway, 19-20 April 2018 Cybercrime in the election process: the role of the Budapest Convention Alexander Seger Executive Secretary Cybercrime Convention Committee Council of Europe Strasbourg, France alexander.seger@coe.int www.coe.int/cybercrime

Cybercrime in the election process: threats Elections rely on computer systems at all stages. Types of interference: Attacks against the confidentiality, integrity and availability of election computers and data Compromising voter databases or registration systems (e.g. hacking systems, deleting, changing, adding data) Tampering with voting machines to manipulate results Interference with the function of systems on election day (e.g. distributed denial of service attacks) Illegal access to computers to steal, modify, disseminate sensitive data (e.g. related to election campaigns) for information operations Information operations with violations of rules to ensure free, fair and clean elections Data protection rules Rules on political finances Rules on media coverage of electoral campaigns Rules on broadcasting and political advertising 2

+ + Budapest Convention on Cybercrime: scope International cooperation Criminalising conduct Illegal access Illegal interception Data interference System interference Misuse of devices Fraud and forgery Child pornography IPR-offences Procedural tools Expedited preservation Production orders Search and seizure Interception Limited by safeguards (article 15) International cooperation Extradition MLA Spontaneous information Expedited preservation MLA for accessing computer data MLA for interception 24/7 points of contact Procedural powers and international cooperation for ANY CRIME entailing evidence on a computer system! Note: work on Protocol to Budapest Convention underway www.coe.int/cybercrime 3

140+ Budapest Convention: Reach Budapest Convention Indicative map only Budapest Convention Ratified/acceded: 57 Other States with laws/draft laws largely in line with Budapest Convention = 20+ Signed: 4 Further States drawing on Budapest Convention for legislation = 50+ Invited to accede: 10 = 71

Cybercrime and other offences in the election process: the role of the Budapest Convention Attacks against the confidentiality, integrity and availability of election computers and data Compromising voter databases or registration systems Tampering with voting machines to manipulate results Interference with the function of systems Illegal access to computers to steal, modify, disseminate sensitive data for information operations Budapest Convention Substantive criminal law provisions Article 2 Illegal access Article 3 Illegal interception Article 4 Data interference Article 5 System interference Article 6 Misuse of devices Article 7 Forgery Article 8 Fraud Article 11 Attempt, aiding, abetting Procedural powers and international cooperation to secure electronic evidence and prosecute offenders Articles 16, 17, 29 and 30 for data preservation Article 18 Production orders Article 19 Search and seizure Etc. (incl. cooperation with service providers Information operations with violations of rules to ensure free, fair and clean elections Data protection rules Rules on political finances Rules on media coverage of electoral campaigns Rules on broadcasting and political advertising

Cybercrime and other offences in the election process: the role of the Budapest Convention Conclusions Interference with elections involves cybercrime and/or electronic evidence Institutions responsible for elections need to understand risks and measures to be taken Invest in cybersecurity measures to protect systems used for elections and election campaigns Prosecute cybercrime related to elections (chapter I Budapest Convention) Secure electronic evidence and cooperate to identify and prosecute offenders (chapters II and III Budapest Convention) Apply procedural powers to secure evidence Interagency cooperation (involve specialised cybercrime and computer forensic units in investigations) International cooperation to secure evidence in other jurisdictions Cooperation with service providers (see work on Protocol to Budapest C.) 6