Legal guidelines for private-public partnership in combating cyber-crime Andrzej Adamski Chair of Criminal Law & Criminal Policy Law Faculty Nicholas Copernicus.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Prof. Alisdair A. Gillespie De Montfort University, UK.
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber crime: a new challenge for law enforcers!
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
Challenges facing law enforcement agencies in the fight against cybercrime.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Boyertown Area School District Acceptable Use Policy.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
INTERNET and CODE OF CONDUCT
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber crime & Security Prepared by : Rughani Zarana.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Toward An Ethical World... Responsible Internet Citizenship: Safety, Security, & Scholarship Rodney J. Petersen Policy Analyst and Security Task Force.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Policy Safe and Supportive Schools The Board of Education is committed to providing a safe, engaging, and supportive school climate: Behaviors that.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
Monitoring Employees on Networks: Unethical or Good Business?
Lee Ellis B.A. (Hons) RFTV (Digital Media) Monday 16 February 2004 DipHE Policing Lecture support New Technology & Crime (Internet Crime)
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Perspectives for an effective European-wide fight against cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics.
Our Club: SUPPORTS Kids Is SAFE for Kids Is FUN for Kids.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
1 Belfast, Horst Forster European Commission Belfast,
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Criminal Prosecutors with Computer Forensics
Seminar On Cyber Crime Submitted To: Submitted By:
Cybercrime in the election process:
Forensic and Investigative Accounting
Forensic and Investigative Accounting
Cybercrime legislation and policies in Africa: Issues for discussion
UNODC and CYBERCRIME October 2009.
Introduction to Digital Forensics
Presentation transcript:

Legal guidelines for private-public partnership in combating cyber-crime Andrzej Adamski Chair of Criminal Law & Criminal Policy Law Faculty Nicholas Copernicus University, Toruń, Poland

Overview Growth of on-line behaviors including anti-social and criminal behaviors, Criminalization as a response, Unparalled trends in cybercrime and its prosecution, Drift to vigilante control of cybercrime, Legal „pros” and „cons” of private- public partnership in combating cybercrime.

Reported network incidents by internet users ( ) Poland, telecom data

Law in the books – 1997 penal code Most of the computer-related infringements that compose „the minimum list” of the 1989 Council of Europe recommendation were criminalized in Poland under the 1997 penal code: unauthorised access computer eavesdropping data interference computer sabotage computer fraud computer forgery unauthorised reproduction of a protected computer program

Law in action a. Prevalence of computer security attacks : telecom data (2002) 30,000 reported incidents against network security: port scanning, attempts of unauthorized access, break-ins, theft of information incl. passwords, destruction and modification of data. –Most reports (60%) from abroad. –Others (40%) 10, ,000 from Poland –baseline: 12, 000 = 100% b. Official reaction against CIA crime: law enforcement data (2002) 400 crimes known to the police rate: 3% 23 cases prosecuted ( ) rate: less than 1 per cent (0,19 %)

Internet-related offences (N=658) prosecuted in Poland ( ) Offences against protection of information Other internet- related offences Offence type No. of cases Offence type No. of cases hacking & computer eavesdropping 11 (auction) fraud 524 (79%) data interference 11 software piracy 31 (4,7%) computer sabotage 1 defamation17 (2,5%) pornography 16 (2,4%) threats 13 (1,9%) others34 (5,1%) Total: 23 (3,4%) Total:635 (96,6%)

Law reform – Cyber-crime Convention new offences: misuse of devices, system interference, possession of child pornography. new procedural measures: search & seizure of computer system/data, preservation of data, production order. will this change much?

Partnership is essential to combating cyber-crime! ( EURIM) PARTNERSHIP between whom? A. NATIONAL LEVEL - police and victims of crime; - internet users, hotlines and the police; - police and ISPs, telecom operators, hotlines. E-crime is an international problem, and requires international cooperation to combat it. B. INTERNATIONAL LEVEL - Law enforcement (24/7 contact points), criminal justice authorities; - ISPs, telecoms, hotlines

Official control of cyber-crime a)reactive mode incident  victim/ third party  reporting to: the police  IAP, ISP, hotline; b) pro-active mode entrapment : bogus web sites, role playing, masquerade; c) peace-keeping mode - patroling the net.

Vigilante models of cyber-crime control Intermediary – passive, contact point, LE collaborative; Admonitory – reactive, warning and reprimand, LE collaborative; Investigatory, pro-active, LE collaborative; Punitive – both pro-active and reactive, stigmatisation, pillory, LE non-collaborative.

Contact point model („hot lines”) -information clearinghouse and referral system between the general public and law enforcement agencies, or other hotlines; -running of database where the illegal/harmful material can be assessed and forwarded to LE; -co-operation with law enforcement authorities based on agreement; -transparent mission and functioning

Contact point model – legal constrains - unclear legal status, - data protection constrains (processing of offender data), - illegal activities (downloading and possession of child pornography), - difficulties in cooperation between law enforcement hotlines and non- law enforcement hotlines, - monitoring of one-to-one communications, - risk of ‘mala fide’ hotlines (Jos Dumortier)

Admonitory model „POLPAK” ABUSE TP TEAM Reporting of on-line incidents to Internet Access Provider Incidents should be reported in the following manner: using an online report form via addressed to: PROCEDURES - response : 1.Logging and classification of the report. 2.Location of source of event (attack): - IP, date; - telephone number; - home or company street address. 3.Dispatch of warning (appropriate to the event). 4.Submission of request to the Police (if the event concerns the resources of TP). 5.Blocking the access to Internet. 6.Blocking the telephone number.

Admonitory model advantages and constrains  persuasion, rather than repression,  approach relatively rational and criminologically sound (youthful nature of much IT abuse);  fair and lawful.  unknown effectiveness;  high costs,  limited applicability.

Investigatory model Private policing by volunteers - provocation & entrapment: „The law is deficient. Police has no legal tools for the efficient prosecution of cyber- paedophiles. Entrapment by the police is not allowed. However, it is not prohibited to ordinary citizens. So..... Let’s do it!”

Investigatory model pros & cons  some general preventive effects.  inexperience may be harming - dealing with child pornography, child sex abusers, or with the victims of child sex abuse, is no place for amateurs (John Carr).  risk of unlawful conduct, Polish penal code: –Article 24. Whoever incites another person to commit a prohibited act, in order to direct criminal proceedings towards such a person, shall be liable as for instigating (...)

volunteers pose as kids in chat rooms, and when an adult engages them in sexual banter, they publish the person's personal data on the site so the group's supporters can harass the adult by phone and . Punitive model

Conclusions Private-public partnership in combating cyber-crime is indispensable, It must be based on internationally recognized normative standards and clear procedures, They are required for the lawful and efficient co-operation of the partners.