Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

UN Comprehensive Study on Cybercrime
By Andy Scott, Michael Murray and Adam Kanopa
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cybercrimes - main problems and analysis - Takato Natsui Professor at Meiji University, Japan Copyright © 2002 Takato Natsui, All Rights Reserved.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
STATE OF CYBER SECURITY IN JAMAICA Hon. Julian Robinson Chairman Joint Select Committee on the Cybercrimes Act January 24, 2013.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Greg and Jamie unit 5 internet crime. INTERNET CRIME Computer crime refers to any crime that involves a computer and a network. The computer may have.
CYBERCRIME: THE U.S. APPROACH Craig J. Blakeley The Middle East Cybercrime Forum Beirut, Lebanon February , 2006.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Computer Legislation The need for computer laws Go to Contents.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
CYBER CRIME.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Models for Cyber-legislation in ESCWA member countries Presented by Jean Akl & Roula Zayat Amman, December 11, 2007.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
By Prof. Dr. PI Yong Wuhan University of China New China Criminal Legislation against Cybercrime in the Common Internet.
The criminalization of hacking tools as a reasonable measure of protection regarding attacks against information systems and computer data By Chatziioannou.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
Workshop on strengthening international legal cooperation among OSCE Member States to combat transnational organized crime (Vienna, 7-9 April 2008) Extradition.
Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:
The Disadvantages of ICT
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
Overview of the Budapest Convention on Cybercrime (2001)
Cybercrime in the election process:
Forensic and Investigative Accounting
Preventing Information Technology Crimes
Challenges and Successes in the Zambian ICT Security Sector
Forensic and Investigative Accounting
Laws Against Computer Hacking
Presentation transcript:

Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University

 Not defined but listed under Cybercrime Law of Oman  Broad definition: any crime committed involving ICT devices (‘target cybercrimes’ and ‘tool cybercrimes’).  Narrow definition: crimes related to the integrity of data and computer system (mainly ‘target cybercrimes’).  Core cybercrimes: a middle way between the broad and narrow definitions: three broad categories. a) crimes against confidentiality, integrity, and availability of computer data or systems, b) computer-related crimes for financial or personal gain or harm, c) computer content-related crimes. Cybercrime: what is it?

 These three broad categories can be further divided into fourteen common cybercrimes as identified by The UN Office on Drugs and Crime (UNODC). They are:  1) Illegal access (hacking); [s. 3 of Cybercrime Law (CL), s. 52 of Electronic Transaction Law (ETL)]  2) illegal interference (aggravated hacking); [ss. 4, 5, 6 of CL, s. 52 ETL]  3) illegal interception; [s.8 of CL, s. 52 of ETL]  4) production, distribution or possession of computer misuse tools; [s.11 of CL]  5) breach of privacy; [s.16 of CL, s. 52 of ETL]

 6) computer-related fraud or forgery; [ss. 12, 13 of CL]  7) computer-related identity offences; [ss. 12, 13 of CL (fraud provisions)]  8) computer-related copyright and trademark offences; [s.26 of CL]  9) SPAM (unsolicited commercial s);  10) computer-related acts causing personal harm; [ss. 12, 13 of CL]  11) computer-related acts involving racism or xenophobia;  12) computer-related production, distribution or possession of child pornography; [s.14 of CL]  13) computer-related solicitation or ‘grooming’ of children; and  14) computer-related acts in support of terrorism offences. [s.20 of CL]

 Cybercrime Law of Oman directly addressed all these crimes except SPAM and offences related to racism and xenophobia. However, SPAM is usually the entry-point for various other crimes such as identity theft, online fraud, spread of virus or malwares etc. Such crimes can be punished under Cybercrime Law of Oman.  As for the racism and xenophobia, this may be punished under section 19 of Cybercrime Law which criminalizes the publication or possession of any material disturbing public order.

 Cybercrime Law of Oman covers some additional offences such as  - publication of materials affecting public order or religious value (s. 19)  - money laundering (s. 21),  - human trafficking (s. 22),  - trafficking in human organs (s.23),  - trafficking in weapons (s. 24)  - trafficking or promoting illegal drugs (s.25),  - trafficking in antiques and work of arts (s. 27)  [Note: most of these activities are also crimes under the Penal Code and other laws]

 Some of the above crimes are addressed exclusively in Cybercrime Law or additionally in other legislation (e.g. intellectual property rights).  With the widespread use of the ICT devices and Internet, any type of crime may have some computer or internet connection. Therefore, such crimes may involve electronic evidence such as , IP logs, SMS, and call logs in the telephone company’s computer.

 Oman has enacted two new pieces of legislation to specifically address computer and Internet related various issues and crimes. They are:  a) Electronic Transactions Law (Royal Decree No. 69/2008) and  b) Cybercrime Law (Royal Decree No. 12/2011)  In addition, provisions from Penal Code (Royal Decree No. 7/74) and laws related intellectual properties (Industrial Property Law and Copyright Law) can also be used to address some cybercrimes. Omani laws to suppress cybercrimes

 Electronic Transactions Law of Oman was enacted in As its name indicates, it is mainly concerned with various issues related to electronic transactions such as the validity of electronic transactions, electronic contracts and contract related issues, electronic signature, electronic evidence, and privacy and data protection in cyberspace.  However, it does address some of the cybercrimes, in particular, the target cybercrimes in its last chapter, Chapter 9. The chapter has only three sections (sections 52 – 54). Electronic Transaction Law of Oman

 The crimes under section 52 are punishable with imprisonment up to two years and/or fine up to RO5,000, while the crimes under section 53 will attract a maximum imprisonment of one year and/or maximum fine of RO1,500.  Section 54 authorizes the court to confiscate the tools used to commit cybercrimes.

 The crimes under sections 52 and 53 include:  hacking and aggravated hacking,  misuse of someone else’s electronic signature,  disclosure of another person’s deciphering key,  interception and decipher of encrypted information,  issuing electronic certificate or providing false information for any illegal purpose,  unauthorized disclosure of confidential data by a person with authorized access to such data, and  refusal to cooperate with IT authority (e.g., refusal to provide the deciphering key to the IT authority).

 In 2011, Oman adopted Cybercrime Law. It has thirty five sections.  Chapter One (sections 1-2): Definitions & General Provisions  - section 1: ‘cybercrime’,  - section 2: applies to any cybercrime which affects an Omani interest  Chapter Two (sections 3 – 10): Violation of safety, confidentiality of data & electronic information and the informational systems.  - hacking and aggravated hacking, illegal obstruction or interception, and cyberattacks Cybercrime Law of Oman

 s.3: simple hacking,  s.4: aggravating hacking of computer data or personal information,  s.5: aggravated hacking of medical report, diagnosis or treatment,  s. 6: hacking confidential information of govt. or a financial institution,  s.7: cyberattack on a website,  s.8: illegal interception or obstruction of data,  s.9: cyberattacks accompanied by modification of or damage to data,  s.10: denial of service attacks.

 Chapter Three (section 11): Misuse of Information Technology tools  - tools (any device, program, or password) to commit cybercrimes  Chapter Four (sections 12 – 13): Forgery & information Fraud  - fraud through ICT or modification of data causing gain or loss to someone  Chapter Five (sections 14 – 27): Content Crimes  - pornography including child pornography (s.14),  - inducement to prostitution (s.15),

 - violation of privacy or causing defamation (s.16), online gambling (s.17)  - online threat (blackmail) or extortion (s. 18)  - publication of materials affecting public order or religious value (s. 19)  - facilitation or promotion of terrorist activities (s. 20),  - money laundering (s. 21), human trafficking (s. 22),  - trafficking in human organs (s.23), trafficking in weapons (s. 24)  - trafficking or promoting illegal drugs (s.25),  - violation of intellectual property (s.26),  - trafficking in antiques and work of arts (s. 27)

 Chapter Six (section 28): Trespass on the Monetary Cards  - fraudulent making or using a credit or debit card  Chapter Seven (sections 29 – 35): Concluding Provisions  - cybercrime by a CEO, a board of directors, or a manager (s.29)  - attempt to commit a cybercrime (s.30), being an accomplice (s.31)  - confiscation of tools or money obtained in a cybercrime, shutting down a website, deportation of a convicted expatriate (s.32)  - exemption from punishment for cooperation (s.33)  - quasi-judicial power for the IT authority in applying these provisions (s.34)  - punishment under this law can be combined with other punishment (s.35)

 All the core cybercrimes are addressed in Cybercrime Law of Oman.  Any gap in the Cybercrime Law can be usually filled with provisions from other laws. Is Omani law on cybercrime adequate?

 Detecting the crimes  - Sophisticated tools to hide criminal activities  - Temporary nature of certain data (real time data collection needed)  Prosecuting the perpetrators of cybercrimes  - Many cybercrimes have a transnational elements.  - Issue of jurisdiction (territorial, active nationality, protective, passive personality and universal) (first three could be used for cybercrimes under Omani law: Penal Code and article 2 of Cybercrime Law)  - Main problem: to bring a cybercriminal from a foreign country to face trial Challenges in suppressing cybercrimes

 International cooperation  - Current scenario: cluster of groups  1. Arab Convention on Combating Information Technology Offences (2010)  2. Council of Europe Convention on Cybercrime (2001)  3. African Union Convention on Cyber Security and Personal Data Protection (2013)  4. Commonwealth of Independent States Agreement on Cooperation in Combating Offences related to Computer Information (2001)  5. Shanghai Cooperation Organization Agreement on Cooperation in the Field of Information Security (2009) How to overcome such challenges?

 - What needed? Broader cooperation through an International Convention not limited to a region or group of states.

 Oman has come a long way to address the problem of cybercrimes.  There is adequate legislation to prosecute almost any cybercrime no matter how we define the word ‘cybercrime’.  Since many cybercrimes are transnational, there is the need for broader cooperation in collecting evidence and prosecuting cybercriminals. Conclusion