AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.

Slides:



Advertisements
Similar presentations
Presentation by May Ikeora 6th June 2013
Advertisements

11 COUNTER-TERRORISM COMMITTEE CTED PRESENTATION ON MUTUAL LEGAL ASSISTANCE TO MEMBER STATES presentation by CTED GENERAL LEGAL ISSUES GROUP, INCLUDING.
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Philippine Cybercrime Efforts
International Telecommunication Union Support for Harmonization of the ICT Policies in Sub-Sahara Africa Name of presenter HIPSSA Project.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.
UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
1 Trade facilitation: Benefits and Capacity Building for Customs UNECE International Forum on Trade Facilitation, May 2003 Kunio Mikuriya Deputy.
State of play and activities in 2014 March 2014
NEW EXISTING TOOLS FOR ENHANCING INTERNATIONAL JUDICIAL COOPERATION WITHIN THE EUROPEAN UNION Towards a new generation of mutual legal assistance mechanisms.
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
Child Abuse and Criminal Law Prof. Dr. Henrik Kaspersen Council of Europe Zagreb, October 27-28, 2011.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
CLE Conference, October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
CLE Conference, October 2002 CoE’s Cyber Crime Convention Content and background Prof. Dr. Henrik W.K. Kaspersen Vrije Universiteit Amsterdam The.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
The Council of Europe Convention on Cybercrime: status quo and future challenges Cristina Schulman Council of Europe Strasbourg, France Tel
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
Bratislava October 2007 PAR - AC CoP Meeting Anti Corruption Regional Programme Regional Programme.
International Cooperation in Criminal Matters Extradition and Mutual Legal Assistance in Transnational Investigations.
Cybercrime and the Council of Europe response Strasbourg, October 2007 Alexander Seger Council of Europe, Strasbourg, France Tel
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Heba Shams (World Bank) & Nadim Kyriakos –Saad (IMF) World Bank
Regional Conference Intellectual Property Crime Bahrain April 2008.
CROSS BORDER INFORMATION SHARING DRAFT FRAMEWORK 6 th Annual Conference of the African Dialogue on Consumer Protection September 2014 Crossroads.
GLOBAL FORUM V ON FIGHTING CORRUPTION AND SAFEGUARDING INTEGRITY INTER-RELATIONSHIP AMONG THE VARIOUS FRAMEWORKS.
Cybersecurity Governance in Ethiopia
VICTIMS’ RIGHTS New EU Directive establishing minimum standards on the rights, support and protection of victims of crime 20 September 2012 CABVIS Conference.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
Mediation in the application of the 1980 Convention Regional Conference on the 1980 Hague Convention on the Civil Aspects of International Child Abduction.
Cooperation against terrorism, corruption and organised crime C o u n c i l o f E u r o p e 1 Denis Bribosia (Counter-terrorism Task Force)
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
EU Funding opportunities : Rights, Equality and Citizenship Programme Justice Programme Jose Ortega European Commission DG Justice.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
OPSC Optional protocol on sale of children children prostitution and pornography.
Addressing fraudulent manipulation of sport results : the UNODC perspective Dimosthenis Chrysikos UNODC/DTA/CEB/CSS.
“FIGHT AGAINST CORRUPTION – Integrative feedback of domestic and international activities” Ohrid, Macedonia, 15 October 2010.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Fighting eCrime Agencies and other involved parties Investigative and procedural powers affecting computers.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Human Trafficking: Global Trends and Responses
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
ITU- BDT Arab Regional Workshop on “Legal Aspects of Child Online Protection” Algiers (Algeria), June 2012 Investigation, Enforcement and Prosecution.
E-evidence and access to data in the cloud Issues and options under consideration by the Cloud Evidence Group of the Cybercrime.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Strengthening national capacities to prevent and combat cybercrime: UNODC Global Programme on Cybercrime Tania Banuelos Crime Prevention and Criminal Justice.
Workshop on strengthening international legal cooperation among OSCE Member States to combat transnational organized crime (Vienna, 7-9 April 2008) Extradition.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
The Challenge of Effective Judicial Cooperation
Attribution & the globalization of criminal evidence
3rd ANTI-CYBERCRIME FORUM
3rd ANTI-CYBERCRIME FORUM
U.S. Department of Justice
Overview of the Budapest Convention on Cybercrime (2001)
Cybercrime in the election process:
Cybercrime legislation and policies in Africa: Issues for discussion
UNODC and CYBERCRIME October 2009.
Presentation transcript:

AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM

A Global Problem What is cybercrime? How does it affect us ? The solution

Impacts Cybercrime (hacking, spoofing, DDOS, ID Theft)Cybercrime (hacking, spoofing, DDOS, ID Theft) Cyber-terrorismCyber-terrorism Fraud and money launderingFraud and money laundering Drug/human/firearm; crossborder(s)Drug/human/firearm; crossborder(s) HomicideHomicide BlackmailBlackmail

Definition of Cybercrime Cybercrime & Cyber Security

Definition of Cybercrime  Offences against the confidentiality, integrity and availability of computer data and systems  Computer-related offences  Content-related offences Offences related to intellectual property rights and similar rights

The Way it Was vs. How it is Now The Way it Was Nearly all crimes were local Evidence never far from the crime scene How it is Now Crimes committed remotely International element added to any crime Specialised Procedures & Forensics Evidence across borders How to get Legal Assist across borders

Only Way International Cooperation (Laws, Treaty)

The Solution – The Cybercrime Convention Defines key terms Provides an overview of substantive offences Describes procedural requirements

AIMS Harmonise domestic criminal law Establish the necessary procedural powers for investigation and prosecution Establish a fast and effective regime of international co-operation

Cybercrime Convention Only multilateral treaty for cybercrime Already implemented in many countries Others taking into consideration to become Party Used as Model Law Tools for LEA [investigate & evidence collection] Flexible mechanisms to avoid conflicts with national legislations and proceedings [sovereignty – options] Set a global trend for better cybercrime laws Global standard

Cybercrime Convention Enable & Facilitate International Cooperation by: Harmonise substantive cyber crime law; Harmonise procedural law - investigative powers [evidence collection]; International Cooperation in Fighting Cyber Crime.

Substantive Criminal Law The convention seeks to establish common minimum standards of relevant offences Prevent criminals operating from jurisdiction with lower standards Facilitate international co-operation

Structure/Framework

Definitions & Substantive provisions: Illegal access Illegal Interception Data Interference System Interference Misuse of Devices Computer Forgery & Fraud Child Pornography Intellectual Property Rights Aiding Abetting Corporate Liability

Procedural Provisions Powers Procedures Collection of Evidence Conditions & Safeguards Expedited preservation: –stored computer data –and partial disclosure of traffic data

Procedural Provisions Production Order (specified data / subscriber info) Search & Seizure of stored computer data Real Time Collection of Traffic Data Interception of Content Data Jurisdiction

International Cooperation Default Extradition Legal Mutual Assistance Spontaneous Information Confidentiality and limitation on use Expedited preservation of stored computer data Expedited disclosure of preserved traffic data Mutual assistance regarding –accessing of stored computer data –access to real-time collection of traffic data –interception of content data 24/7 Network

Followed? Ratifications Model Laws: –Commonwealth Model Law –BSA Model Law Model Law for Regional frameworks Model Law itself / Best Practice Basis for Bilateral Cooperation UK RATIFICATION – 25 May 2011

2011 OCTOPUS Interface Conference (21-23 November 2011)

Results of the Octopus Conference Need to: Implementation of the Cybercrime Convention on Cybercrime worldwide Strengthen legislation and its implementation Train law enforcement, prosecutors and judges Establish high –tech crime and other specialist units Make international cooperation more efficient Improve public/private cooperation, and multi- stakeholder cooperation Enhance the protection of children

Global Project on Cybercrime Output 1: Legislation & policies Strengthen legislation (Nigeria, Uganda, Argentina, Vietnam, India, Pakistan, Sri Lanka, Bangladesh, Mauritius etc) Promote ratifications/accession to Cybercrime Convention Promote Cybercrime Convention as global instrument Initiate global review of legislation

Plans Output 2: International Cooperation Strengthen effectiveness of MLA Study Implications of cloud computing on law enforcement

Plans Output 3: Investigation: LEA – ISP Cooperation Country specific workshops and support Output 4: Training Judges and prosecutors India, Egypt, Portugal, Pakistan, Sri Lanka, Bangladesh, Mauritius Global Prosecutors E-Crime Network (GPEN)

Five reasons for becoming a partner 1.Common objectives 2.Cost effective participation in a global capacity building effort 3.Public – private cooperation 4.Up to date information on development worldwide 5.Reputational benefits and visibility

2011 OCTOPUS Interface Conference (21-23 November 2011)

KEY Commonwealth Model Law

For Further Information Contact Contact : Alexander Seger Tel:

Questions? Zahid Jamil