Download presentation
Presentation is loading. Please wait.
1
Cybercrime – the Global Challenge
UNODC Cybercrime – the Global Challenge Standards for the prevention and elimination of cybercrime
2
UNODC Cybercrime Mandates
2009: General Assembly Resolution 64/179 Explore ways and means of addressing cybercrime 2010: General Assembly Resolution 67/189 Comprehensive study on cybercrime 2011: Commission on Crime Prevention and Criminal Justice Resolution 20/7 General Assembly Resolution 65/230 Provide cybercrime technical assistance and training 2011: ECOSOC Resolution 2011/33 Produce a study facilitating the identification, description and evaluation of the effects of new information technologies on the abuse and exploitation of children Assess the needs of States for training in investigation of these offences Design a technical assistance programme to meet those needs 2013: Continued work on the study and strengthened partnerships
3
The Global Challenge Compared to the investigation, prosecution and adjudication of ‘conventional’ crimes (such as homicide or robbery), the involvement of a computer, mobile phone, or computer data in a crime event, presents at least three key challenges: Access to evidence – Evidence of cybercrime exists in electronic form. The lifetime of such evidence varies enormously The physical location of evidence also varies. Relevant evidence may be contained within vast quantities of non-relevant data, and that electronic evidence can be subject to encryption. Handling evidence – Electronic evidence requires careful handling in order to ensure that it meets the necessary standards for use in court. Identifying the perpetrator – The Identification of the perpetrator(s) can represent a significant challenge.
4
UNODC Approach: The Global Programme on Cybercrime
UNODC Global Programme on Cybercrime Objective: to assist developing countries to prevent and combat cybercrime through a global, sustainable and holistic approach
5
Combatting the problem
International and regional instruments National laws and policies International cooperation International law increasingly recognizes that children deserve special protection. States vary considerably in approaches to addressing forms of child abuse and exploitation. While many States criminalize acts such as production of child sexual abuse material, they may differ with respect to elements of the crime and definitions of “child”. Tools and mechanisms for international cooperation include mutual legal assistance treaties, direct law enforcement cooperation, multi-agency partnerships, forums for information-sharing and informal direct law enforcement cooperation.
6
Combatting the problem
Investigation of offences Private sector responses Civil society responses Specific tools can be employed for detection and investigation: digital forensic techniques, automated search, image analysis and image databases, data mining and analytics. Electronic service providers may engage in this respect through varying degrees of self-regulation, including by internet service providers, self-monitoring by travel and tourism companies and the creation of financial coalitions. Parents, guardians, child educators and civil society are a further vital component in combating the problem, including in supporting children in understanding and handling online risks, the “flagging” of certain material online, the creation of telephone hotlines for reporting, and contributions towards education and psycho-social methods of prevention.
7
International Instruments to combating ICT-Facilitated sexual abuse and exploitation of children
United Nations Convention on the Rights of the Child (CRC) The Optional Protocol to the CRC on the Sale of Children, Chilf Prostitution, and Child Pornogrphy United Nations Convention Against Transnational Organized Crime The Protocol to Prevent, Suppress, and Punich Trafficking in persons, Espcially Women and Children Guidelines on Justice in Matters Involving Child Victims and Witnesses of Crime Prevention, invetigation and prosecution of any “serious crime”- includes the the use of ICTs to abuse ir exploit children. Develop training fo combatting crimes through the use of computers… It renders irrelevant the consent of any child victim of the practice of trafficking in persons
8
Regional Instruments to combating ICT-Facilitated sexual abuse and exploitation of children
Council fo Europe Convention on Cybercrime Council of Europe Convention on the Protection of Children against sexual exploitation and sexual abuse African Charter on the rigths and walfare of the Child Aims to provide a common criminal policy. Art.9 deals with offences realted to child pornography. Aims to prevent and combat sexual exploitation and sexual abuse of children… Protect children from all forms of sexual exploitation and sexual abuse
9
Regional Instruments to combating ICT-Facilitated sexual abuse and exploitation of children (Child pornography) Commonwealth Model Law (art.10) 2. EU Dierctive on Child Explotoitation (art.15) 3. ITU/CARICOM/CTU Model Legislative (art.13)} 4. League of Arab States Convention (Art.12) 5.Draft African Union Conventio (art.9)
10
National Law
11
National Law
12
National Law
13
National Law
14
National Law
15
Assessment of the training needs of States
Identification of crimes Lack of dedicated staff trained in all aspects of ICT- Facilitated child abuse and exploitation cases. Less 1% of all polices are specialists in cybercrime. El Salvador have only one forensic examiner -Training for personnes may best take place on a inter-agency basis -The investigation of ICT- F child abus tended to be reactive in nature, rather than proactive. As mentioned, the informal expert group that helped develop the Study also discussed needs of States in training in combatting these offences. One of the greatest needs in the detection of technology-facilitated offences against children was considered to be a lack of dedicated staff trained in all aspects of ICT-facilitated child abuse and exploitation cases. The Cybercrime Study noted that less than one per cent of all police are specialists in cybercrime. Skilled and dedicated personnel, perhaps organized into inter-agency task forces or units, can aid in all aspects of investigation and prosecution of these crimes, including developing expertise on handling digital evidence and conducting image analysis; studying offender profiles; interviewing and assisting child victims and witnesses; developing networks to facilitate cooperation across jurisdictions and borders; elaborating appropriate counter strategies for common defences in judicial proceedings, and learning how to clearly and persuasively present technical evidence to judges and juries. The group also noted that investigations of ICT-facilitated child abuse and exploitation offences tended to be reactive in nature, rather than proactive. One major obstacle in this respect, can be limited possibilities to undertake undercover investigations. The most common methods of such undercover investigations consist of law enforcement agents posing as children, virtually entering chat rooms, setting up websites that purport to display child sexual abuse material, or joining child sexual abuse communities purporting to be a consumer. The most significant obstacle to effective investigative capabilities was considered to be the lack of ability to obtain stored or real-time data on traffic or content, or subscriber information which can become magnified when requests for information and assistance are received from abroad. With regard to victim assistance, the main deficiencies identified were the absence of standard protocols for supporting victims through the investigative process, techniques for interviewing victims, and the collection and preservation of victim-related evidence. It is crucial that society at large is aware of whether conduct — such as cyberbullying or harassment — constitutes a criminal offence and if so, where and how to report it. As the Cybercrime Study noted, cybercrime acts most frequently come to the attention of law enforcement authorities through reports by victims. Finally, the expert group noted that the development of an overarching national law, policy or strategy against ICT-facilitated child abuse and exploitation with clear priorities and targets can greatly contribute to a sustainable, coordinated effort against such offences. -States requiere a clear legal framework taht regulates undercover operations.
16
Assessment of the training needs of States
Investigative capabilities and electronic evidence Lack of ability to obtain stores or real- tiem data on traffic content. In El Salvador the Internet Services Providers only stores datas for maximun of 3 months (they said don not have enough space) -Service providers require due legal process for disclosure of customer data. -Lack basic sufficient material resources, hardware, software and internet. -Specialized training for prosecutors and judges in handling digital evidence is a need. International cooperation As mentioned, the informal expert group that helped develop the Study also discussed needs of States in training in combatting these offences. One of the greatest needs in the detection of technology-facilitated offences against children was considered to be a lack of dedicated staff trained in all aspects of ICT-facilitated child abuse and exploitation cases. The Cybercrime Study noted that less than one per cent of all police are specialists in cybercrime. Skilled and dedicated personnel, perhaps organized into inter-agency task forces or units, can aid in all aspects of investigation and prosecution of these crimes, including developing expertise on handling digital evidence and conducting image analysis; studying offender profiles; interviewing and assisting child victims and witnesses; developing networks to facilitate cooperation across jurisdictions and borders; elaborating appropriate counter strategies for common defences in judicial proceedings, and learning how to clearly and persuasively present technical evidence to judges and juries. The group also noted that investigations of ICT-facilitated child abuse and exploitation offences tended to be reactive in nature, rather than proactive. One major obstacle in this respect, can be limited possibilities to undertake undercover investigations. The most common methods of such undercover investigations consist of law enforcement agents posing as children, virtually entering chat rooms, setting up websites that purport to display child sexual abuse material, or joining child sexual abuse communities purporting to be a consumer. The most significant obstacle to effective investigative capabilities was considered to be the lack of ability to obtain stored or real-time data on traffic or content, or subscriber information which can become magnified when requests for information and assistance are received from abroad. With regard to victim assistance, the main deficiencies identified were the absence of standard protocols for supporting victims through the investigative process, techniques for interviewing victims, and the collection and preservation of victim-related evidence. It is crucial that society at large is aware of whether conduct — such as cyberbullying or harassment — constitutes a criminal offence and if so, where and how to report it. As the Cybercrime Study noted, cybercrime acts most frequently come to the attention of law enforcement authorities through reports by victims. Finally, the expert group noted that the development of an overarching national law, policy or strategy against ICT-facilitated child abuse and exploitation with clear priorities and targets can greatly contribute to a sustainable, coordinated effort against such offences. - Lack of standard operating procedures for requests involving digital evidence - Lack of contacts in requested countries (some use the diplomatic via)
17
Assessment of the training needs of States
Victim assistance and awareness raising Absence of standard protocols for supporting victimis through the investigative process, techniques for interviewing victims and collection and preservation of victim-related evidence -Lack of awarnes among children, families and sociaty in respect of whether–cyberbullying, sexual harassment- constitus a criminal offence or not. -Need to promote awarness Policy and coordination As mentioned, the informal expert group that helped develop the Study also discussed needs of States in training in combatting these offences. One of the greatest needs in the detection of technology-facilitated offences against children was considered to be a lack of dedicated staff trained in all aspects of ICT-facilitated child abuse and exploitation cases. The Cybercrime Study noted that less than one per cent of all police are specialists in cybercrime. Skilled and dedicated personnel, perhaps organized into inter-agency task forces or units, can aid in all aspects of investigation and prosecution of these crimes, including developing expertise on handling digital evidence and conducting image analysis; studying offender profiles; interviewing and assisting child victims and witnesses; developing networks to facilitate cooperation across jurisdictions and borders; elaborating appropriate counter strategies for common defences in judicial proceedings, and learning how to clearly and persuasively present technical evidence to judges and juries. The group also noted that investigations of ICT-facilitated child abuse and exploitation offences tended to be reactive in nature, rather than proactive. One major obstacle in this respect, can be limited possibilities to undertake undercover investigations. The most common methods of such undercover investigations consist of law enforcement agents posing as children, virtually entering chat rooms, setting up websites that purport to display child sexual abuse material, or joining child sexual abuse communities purporting to be a consumer. The most significant obstacle to effective investigative capabilities was considered to be the lack of ability to obtain stored or real-time data on traffic or content, or subscriber information which can become magnified when requests for information and assistance are received from abroad. With regard to victim assistance, the main deficiencies identified were the absence of standard protocols for supporting victims through the investigative process, techniques for interviewing victims, and the collection and preservation of victim-related evidence. It is crucial that society at large is aware of whether conduct — such as cyberbullying or harassment — constitutes a criminal offence and if so, where and how to report it. As the Cybercrime Study noted, cybercrime acts most frequently come to the attention of law enforcement authorities through reports by victims. Finally, the expert group noted that the development of an overarching national law, policy or strategy against ICT-facilitated child abuse and exploitation with clear priorities and targets can greatly contribute to a sustainable, coordinated effort against such offences. -The development of an overarching national law, policy or strategy against ICT-facilitated child abuse and axploitations with clear priorities and targets can greatly contribute to a sustainable, coordinated effort against such offences. -Urgent need for senior officials in the criminal justice field to be aware of such problems and the importance of digital evidence in investigations.
18
UNODC technical assistance programme
to prevent and combat technology-facilitated child abuse and exploitation Law enforcement training International cooperation -Training on specialized methods for investigatin online crimes (types of crimes, offender and victim profile, international image chcking, assistence to victimsl, and rights of the children. -Support the authorities in establishing the necessary structures for the effective operation of police. -Support to strenghthening cooperation with internet service providers. -training on human rights aspects of law enforcement investigations -Support to authorities responsible for preparing and sending and receiving and implemting mutual legal assistance requests Training for prosecutors and judges A training and technical assistance programme on combatting ICT-facilitated child abuse and exploitation offences was developed in order to meet the needs identified, pursuant to Council resolution 2011/33. These activities may leverage those already undertaken by UNODC through the Global Programme on Cybercrime. The programme would provide law enforcement agencies of requesting countries with training on specialized methods for investigating online crimes against children. These would cover a range of relevant issues such as the types of technology-facilitated crimes committed against children; offender and victim profiles and their relevance to the investigation; international image searching and checking; investigation approaches; and providing assistance and protection to victims. In addition to training of officers and investigators, the programme would support law enforcement authorities in establishing the necessary administrative structures for the effective operation of police ICT-facilitated child abuse units. The programme would deliver training for prosecutors and judges on protection considerations where child victims or witnesses are required to testify during the criminal justice process. As well as on means — including informal cooperation means — to secure the expedited preservation of computer data; on the effective preparation of mutual legal assistance requests involving digital evidence; and on the use of UNODC tools, such as the Directory of Competent National Authorities and the MLA Writer Tool, including its new digital evidence module presently under development. Taking into account the extensive range of awareness raising material already available, the programme would develop an awareness-raising toolkit for Member States. The toolkit would include templates for a variety of campaign products such as a public service announcement, a website, a general information brochure, a poster, a child-focused leaflet, web banners and a social media pack. Mechanisms to ensure the sustainability of support may include the accreditation of training courses with national police academies and other relevant institutions, as well as securing standard operating protocols and specialist staffing arrangements within law enforcement authorities in close cooperation with relevant government stakeholders. UNODC stands ready, together with relevant international partners, to begin implementation of a training and technical assistance programme to assist Member States in combating ICT-facilitated child abuse and exploitation offences more effectively. Next steps will involve the development of a full project document, which will be followed by a resource mobilization phase and initial roll-out of activities in selected pilot regions or subregions, according to need and upon Member State request for assistance. The challenges of ICT-facilitated child abuse and exploitation are unlikely to be overcome in the near future. A sustainable response will require commitment from all stakeholders in order to build awareness; allocate sufficient human and technological resources, establish supportive government structures; enable proactive investigations; and train practitioners on gathering, preserving, presenting and delivering judgements based on electronic evidence. Thank you for your attention. -Training for prosecutors and judges on protection considerations where child victims are required to testify
19
UNODC technical assistance programme
to prevent and combat technology-facilitated child abuse and exploitation Awareness raising Sustainability -Public awareness-raising campaigns. Develope an awarness raising toolkit. Mecahnism to ensure the sustainability of support may include the accreditation fo training courses with national police academies and other relevant institutions. A training and technical assistance programme on combatting ICT-facilitated child abuse and exploitation offences was developed in order to meet the needs identified, pursuant to Council resolution 2011/33. These activities may leverage those already undertaken by UNODC through the Global Programme on Cybercrime. The programme would provide law enforcement agencies of requesting countries with training on specialized methods for investigating online crimes against children. These would cover a range of relevant issues such as the types of technology-facilitated crimes committed against children; offender and victim profiles and their relevance to the investigation; international image searching and checking; investigation approaches; and providing assistance and protection to victims. In addition to training of officers and investigators, the programme would support law enforcement authorities in establishing the necessary administrative structures for the effective operation of police ICT-facilitated child abuse units. The programme would deliver training for prosecutors and judges on protection considerations where child victims or witnesses are required to testify during the criminal justice process. As well as on means — including informal cooperation means — to secure the expedited preservation of computer data; on the effective preparation of mutual legal assistance requests involving digital evidence; and on the use of UNODC tools, such as the Directory of Competent National Authorities and the MLA Writer Tool, including its new digital evidence module presently under development. Taking into account the extensive range of awareness raising material already available, the programme would develop an awareness-raising toolkit for Member States. The toolkit would include templates for a variety of campaign products such as a public service announcement, a website, a general information brochure, a poster, a child-focused leaflet, web banners and a social media pack. Mechanisms to ensure the sustainability of support may include the accreditation of training courses with national police academies and other relevant institutions, as well as securing standard operating protocols and specialist staffing arrangements within law enforcement authorities in close cooperation with relevant government stakeholders. UNODC stands ready, together with relevant international partners, to begin implementation of a training and technical assistance programme to assist Member States in combating ICT-facilitated child abuse and exploitation offences more effectively. Next steps will involve the development of a full project document, which will be followed by a resource mobilization phase and initial roll-out of activities in selected pilot regions or subregions, according to need and upon Member State request for assistance. The challenges of ICT-facilitated child abuse and exploitation are unlikely to be overcome in the near future. A sustainable response will require commitment from all stakeholders in order to build awareness; allocate sufficient human and technological resources, establish supportive government structures; enable proactive investigations; and train practitioners on gathering, preserving, presenting and delivering judgements based on electronic evidence. Thank you for your attention.
20
Thank you Bertha Nayelly Loya Officer Research Bertha.loya@unodc.org
+(503)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.