Perspectives for an effective European-wide fight against cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.

Slides:



Advertisements
Similar presentations
UN Comprehensive Study on Cybercrime
Advertisements

UNODC & the Global Response to Cybercrime
Cybercrime Conference Jakarta 19/20 March 2003 Joe McNamee European Perspective.
NEW EXISTING TOOLS FOR ENHANCING INTERNATIONAL JUDICIAL COOPERATION WITHIN THE EUROPEAN UNION Towards a new generation of mutual legal assistance mechanisms.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Jurisdictional issues and international co-operation in combating cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial.
Challenges facing law enforcement agencies in the fight against cybercrime.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
Mandatory Retention of Traffic Data: What is next? Prof. Dr. Henrik W.K.Kaspersen Computer/Law Institute Vrije Universiteit Amsterdam- The Netherlands.
Europol’s tailor-made data protection framework
MEDIA LAW Copenhagen University SESSION 10 Dirk VOORHOOF Ghent University (->contact)
Privacy and security: Is Europe going banana? Jean-Marc Van Gyseghem Head of Unit « Liberties in the information society » CRID – University.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
Douwe Korff professor of international law London Metropolitan University Asser Round Table On The Stockholm.
Workshop 24 Input by ILGA-Europe (policy and coalition opportunities) Joël Le Déroff – Senior Policy & Programmes Officer – 19 October.
EU Criminal Law Introduction, Lisbon Treaty. EU criminal legislation EU cannot adopt a general EU criminal code EU cannot adopt a general EU criminal.
Data Protection and Cybercrime The dilemma of Internet Service Providers CEENET Workshop 22 September 2002 Joe McNamee Regulatory Affairs Manager, EuroISPA.
ICTS and VIOLENCE AGAINST CHILDREN: MINIMISING RISKS AND RELEASING POTENTIAL EXPERT CONSULTATION Costa Rica, 9-10 June 2014 Renato Leite Monteiro Council.
Prosecuting Human Trafficking Mikko Sipilä District Prosecutor Special Prosecutor on Narcotics Offences and Organized Crime The Prosecutor’s.
Felicity Gerry QC USING TECHNOLOGY AND LAW TO COMBAT HUMAN TRAFFICKING.
The challenges of cloud-derived evidence Professor Ian Walden Centre for Commercial Law Studies, Queen Mary, University of London.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
The European influence on privacy law and practice Nigel Waters, Pacific Privacy Consulting International Dimension of E-commerce and Cyberspace Regulation.
Data Protection Compliance Professor Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
Fight against terrorism. EU institutional/legal framework A bit of history 1957: European Communities are born.
The acquis Council Framework Decision of 19 July 2002 on combating trafficking in human beings (2002/629/JHA). Council Directive 2004/81/EC of 24 April.
2002 Symantec Corporation, All Rights Reserved The EU Regulations and IT security An industry perspective Ilias Chantzos, Government Relations EMEA Terena.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Cje Wojciech Jasiński, Ph.D. Department of Criminal Procedure Faculty of Law, Administration and Economics University of Wrocław Lecture Harmonisation.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
DG Information Society The EU and Data Retention Data Retention Meeting London, 14 May 2003 Philippe GERARD, DG Information Society The positions.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Principle of availability: investigation of crime vs. data protection Julio Pérez Gil University of Burgos. Spain.
The EU Fight against Environmental Crime – Directive 2008/99 Helge Elisabeth Zeitler DG Justice, Criminal Law.
Protecting Privacy and Freedom of Communication in the Fight against Cybercrime Southeast Europe Cybersecurity Conference Sofia, Bulgaria 8-9 September.
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
CRIMINAL LAW OF THE EUROPEAN UNION 1 April 2015 THE LISBON TREATY AND CRIMINAL LAW Dr. sc. Zoran Burić Department of Criminal Procedural Law University.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
European Data Protection Supervisor CRIM, EP, 17 September 12 Cybercrime and Data protection Hielke HIJMANS Head of Unit Policy & Consultations.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
The EU legal framework to combat Cybercrime Brussels, 3-4 April 2012 Milena Petkova General Secretariat of the Council of the European Union.
EU Data Retention Directive Team 5 March 21 st, 2006 Jeff Barger Jin Qiu Hunang Tim Schultz Tim Reiner.
Content regulation. n The ideal of the informed consumer v. anonymity of the Internet n Different consumer protection standards & different cultural expectations.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
European Data Protection Supervisor TAIEX Seminar - Belgrade 9 February 2009 Principles of data protection and international legal framework Alfonso Scirocco.
RSCNI 20 th May 2005 Frank Glen Operations Manager.
Cybercrime prevention and criminal investigation from a RoL perspective - To what extent should criminalization be used as a means to improve cybersecurity?
Child Sexual Exploitation and Abuse
Prepared by the Cybercrime Programme Office of the Council of Europe
Role of Service Providers in Cybercrime Investigations
European case studies relating to the administrative approach
Overview of the Budapest Convention on Cybercrime (2001)
Cybercrime in the election process:
Securing free and fair European elections
Women’s Access to Justice: A Guide for Legal Practitioners
Cybercrime legislation and policies in Africa: Issues for discussion
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Perspectives for an effective European-wide fight against cybercrime Anne Flanagan Institute for Computer and Communications Law Centre for Commercial Law Studies, Queen Mary, University of London

Introductory Remarks l Transnational crime –Substantive & procedural harmonisation l EU: ‘First Pillar’, ‘Third Pillar’ & the Lisbon Treaty l Sanction & remedies l Policing cyberspace –Public & private law enforcement l The role of intermediary service providers –Council of Europe Guidelines for Co-operation (2008) –Controlling content & monitoring communications l Safeguarding rights

Sanction and remedy l Sentencing –statutory minimums, judicial discretion l Cyber Security Enhancement Act of 2002 –‘aggravating circumstances’ l e.g. EU Framework Decision, art. 7 l Restraint orders –Collard [2004] EWCA Crim 1664 l “..prohibited from owning, using, possessing or having any access to any personal computer, laptop computer or any other equipment capable of downloading any material from the Internet…” l Compensation –Civil enforcement, e.g. 18 U.S.C. § 1030(g)

Policing cyberspace l Public law enforcement –Industrial-scale & organised crime l e.g. US Landslide investigations & the UK 7000 –Local, national & international policing structures l e.g. reporting crimes –International co-operation l e.g. –‘Operation PIN’ –community policing in cyberspace: ‘simply another public place’

Policing cyberspace –Interaction with private sector l Exchanging information –e.g. Single Points of Contact (SPOCs) –Prosecution expertise l And judicial training –Pro-active intervention? l To ‘attack’ online resources

Policing cyberspace l Private law enforcement –private prosecutions l e.g. Federation Against Software Theft (FAST) –investigative & reporting functions l e.g. Computer Emergency Response Team (CERT) l e.g. Internet Watch Foundation –vigilantes l e.g. US v Jarrett 338 F.3d 339 (Va., 2003) –an ‘unholy alliance’?

Protected data l Biggest challenge for computer forensics in the 21 st Century –Access & conversion protections l Obtaining access –Requirement to provide in intelligible form –Requirement to hand over ‘key’ l “any key, code, password, algorithm or other data” l Failure to disclose in ‘a national security case’: 5 years l Self-incrimination? –S and A [2008] EWCA Crim 2177

Criminals and actors l Perpetrator –a criminal type? –motivation, opportunity & skill l From ‘script-kiddies’ to ‘überhackers’ l Inchoate offences –Attempt, conspiracy & incitement l Demanding supply l Misuse of devices, e.g. Convention, art. 6 l Intermediaries –communications service provider l limitations on liability

Intermediary liability l Service providers as gatekeepers –User-generated content l indecent or obscene, encouragement of terrorism…… l Electronic commerce Directive (00/31/EC) –‘mere conduit’, ‘caching’ & ‘hosting’ l ‘actual knowledge’ l Duties to report? –Monitoring and action l LVMH v Google (2009) l Commission review –Content aggregation, search engines, linking

Controlling illegal content l Notice and take-down (in jurisdiction) –Terrorism Act 2006, s. 3 ‘internet activity’ l Liability for endorsement l Blocking access (out jurisdiction) –e.g. Internet Watch Foundation l database of URLs for child sexual abuse images l Voluntary, but with threat of mandation l International reach, e.g. Google & Yahoo! l Web-based traffic, but not P2P & other services –Problem of collateral interference l e.g. Wikipedia & Scorpions ‘Virgin Killers’

Monitoring communications l Interception of content –For law enforcement purposes l e.g. Airline bombers, Madrid bombers –For commercial purposes l Phorm & behavioural targeted advertising l Accessing communications data –Attributes: Traffic, usage, location & subscriber data l e.g. 21/7 bombers (?) – from London to Italy –Data retention: 6-24 months (Directive 06/24/EC) l Google agreement with EU

Safeguarding Rights l European Convention on Human Rights –Fair trial (art. 6), privacy (art. 8) & freedom of expression (art. 10) l ‘chilling effect’ l Derogations –In accordance with the law l Legal certainty –Applicable interest l i.e. national security –Necessity and proportionality

Concluding remarks