SlideShare a Scribd company logo
1 of 17
Download to read offline
COMBATING CYBER CRIME:
THE LEGAL (& PRACTICAL)
     CHALLENGES

                  Craig J. Blakeley




                    www.AllianceLawGroup.com
Cyber Crime
• What is it?

• Why should we care?

• Are existing penal laws adequate to deal with it?
  (Is there something unique or different about
  cyber crime that requires new laws to specifically
  address these issues?)

• What is the importance of international cooperation
  in addressing cyber crime?

• What preventative actions can be taken?
                                            www.AllianceLawGroup.com
Cyber Crime: What is it?
• Use of a computer/Internet to do something
  that would be a crime in any case.

  Analogy: Murder is the taking of a human life without
  justification whether done with a rock, a sword, a gun
 electricity, poison, etc. The crime is defined in terms of
 the end result -- not how that result was brought about.

   • Fraud (credit card or identity theft)
   • Child Pornography
   • Intellectual Property Violations



                                               www.AllianceLawGroup.com
Cyber Crime: What is it?
• Use of a computer/Internet to do something
  that we want to prohibit (i.e., make criminal)
  but which action (crime) would not be possible
  without a computer/Internet.

 Analogy: Drunk driving would not be a crime
 (i.e., would not be possible) without an automobile.

   • Computer viruses
   • Spam
   • Hacking
   • Denial of Service Attacks


                                              www.AllianceLawGroup.com
Cyber Crime: Why Should We Care?
• Pervasive Nature and Growing Importance
  of the Internet and Computers

• Economic Importance of Computers & the
  Internet (Information & Communications
  Technology -- “ICT”)

• Potential Economic or Other Costs (e.g.,
  e-government & e-commerce)




                                             www.AllianceLawGroup.com
Are Existing Penal Laws Adequate?
 • Some Are; Some Are Not

 • Credit Card Fraud (for example): Existing Laws
   generally OK. A fraudulent transaction
   does not lose its fraudulent (i.e., criminal)
   nature just because it takes place online rather
   than through a paper transaction.

 • Hacking, Denial of Service Attacks, etc. Existing
   Laws probably are insufficient. There is not a
   physical entry or taking. And even if laws
   could be interpreted to cover such activity
   (a dubious proposition), the deterrence
   effect of a law of uncertain application would
   be very low.                                   www.AllianceLawGroup.com
But There Are Other Problems


• Proof; evidence

   •Where the criminal conduct is digital, so is
    the evidence. As a result, there are associated
    problems of finding the evidence (it can be more
    easily hidden, changed or destroyed) and
    presenting the evidence (what is an acceptable
    physical version of a piece of digital evidence --
    sort of a reverse e-signature/e-contract problem).



                                               www.AllianceLawGroup.com
But There Are Other Problems


• Location; Jurisdiction

   • The Internet makes it possible for a cyber criminal
       • to be located anywhere in the world
       • to hide his or her location
   • Even where the location can be determined,
     it may be difficult or impossible for the
     country which was victimized to get
     jurisdiction of the criminal



                                               www.AllianceLawGroup.com
How to Deal With the Problem


• Specific Laws to Cover New Crimes

   • E.g., U.S. Computer Fraud & Abuse Act prohibits
     unauthorized access to computer or computer
     networks which causes damage in a 1-year period
     of $5,000 or more; prohibits transmission of viruses
     and other intentionally destructive code; both civil &
     criminal penalties are provided.




                                               www.AllianceLawGroup.com
How to Deal With the Problem
• Broad Jurisdictional Provisions
    • E.g., Virginia: Virginia Computer Crimes Act

          Broad jurisdictional provision. Law
          defines using a computer or computer
          network within Virginia as conferring
          jurisdiction in Virginia. Given that the
          bulk of U.S. (and perhaps the world’s)
          Internet traffic passes through Virginia,
          this gives Virginia broad authority. Both
          criminal and civil actions may be brought
          under the law, including by individual
          recipients.

                                               www.AllianceLawGroup.com
How to Deal With the Problem
• Broad Jurisdictional Provisions (cont.)
    • E.g., Australia: THE SPAM ACT OF 2003

              Prohibits the sending of commercial
              e-mail to recipients without their
              consent. Requires that the e-mail contain
              accurate information about the sender &
              a functional way for the recipients to
              unsubscribe. Use of electronic address
              harvesting software or lists which have
              been generated using such software is
              prohibited for the purpose of generating
              unsolicited e-mail messages. Applies
              to e-mail sent from Australia &
              to e-mails sent to an address
                                                www.AllianceLawGroup.com
How to Deal With the Problem
• International Agreements & Cooperation -- Essential
  Due to the Worldwide Nature of the Internet

   • E.g, Council of Europe Convention on Cybercrime
       • Requires Members and other signatory states to
          adopt legislative and other measures necessary to
          establish as a criminal offense:
           • accessing a computer system without right;
           • intercepting without right non-public
             transmissions to or from a computer system
           • damaging, deletion, etc. of computer data without
             right
           • serious hindering without right of
             the functioning of a computer system
             by inputting, damaging, deleting, etc.
             computer data                          www.AllianceLawGroup.com
How to Deal With the Problem
• International Agreements & Cooperation -- Essential
  Due to the Worldwide Nature of the Internet

   • E.g, Council of Europe Convention on Cybercrime (cont.)

          • producing, selling, importing, etc. devices
            that make it possible to conduct one of the
            activities otherwise prohibited by the law
          • the input, alteration or deletion without right
            of computer data resulting in inauthentic data
            with the intent that it be acted upon for legal
            purposes as if it were authentic (i.e., forgery)
            transmissions to or from a computer system

                                                     www.AllianceLawGroup.com
How to Deal With the Problem
• International Agreements & Cooperation -- Essential
  Due to the Worldwide Nature of the Internet

   • E.g, Council of Europe Convention on Cybercrime (cont.)

          • the causing of loss of property to another by
            input, alteration, deletion, etc. of
            computer data or interference with
            computer system with fraudulent or
            dishonest intent of producing without
            right economic benefit for oneself of
            another


                                                   www.AllianceLawGroup.com
How to Deal With the Problem
• International Agreements & Cooperation -- Essential
  Due to the Worldwide Nature of the Internet

   • E.g, Interpol Regional Working Parties on
     Information Technology Crime

          • Computer Crime Manual -- best practices
             guide for investigators
          • Computer Crimes Training Courses for
             investigators and enforcement authorities
          • Rapid Information Exchange System to
            quick notification of computer crimes
            to appropriate in various countries

                                                   www.AllianceLawGroup.com
How to Deal With the Problem
• Other Practical Steps

• Governmental & Private Sector
   • Security Policies (not common in the Middle
     East -- Daily Star, Oct. 7, 2004)
   • Software and Hardware Defenses
     (e.g., antispam, antivirus software,
      firewalls)




                                                   www.AllianceLawGroup.com
Next Steps in Lebanon
• Legal Advisory Committee of Ecomleb (advising
  Ministry of Economy & Trade) at work on
  recommendations, which will include measure
  on data privacy, security, etc.

• Cyber crime can remove or destroy substantial amounts of
  economic value from the Internet, thus increasing costs,
  consuming resources, discouraging new investment, or
  causing a loss of confidence in the Internet. Thus it’s
  important to move forward on such things as the initiatives
  at the Ministry of Economy & Trade.



                                                   www.AllianceLawGroup.com

More Related Content

What's hot

Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
Mr Shipp
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Cengage Learning
 
The problem of online piracy
The problem of online piracyThe problem of online piracy
The problem of online piracy
Kyle Taksar
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
Tgarmon34
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
 

What's hot (19)

Net nutrality
Net nutralityNet nutrality
Net nutrality
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management Canadian Copyright Law, Technology and Cultural Management
Canadian Copyright Law, Technology and Cultural Management
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
Digital law
Digital lawDigital law
Digital law
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Net Neutrality 03
Net Neutrality 03Net Neutrality 03
Net Neutrality 03
 
The problem of online piracy
The problem of online piracyThe problem of online piracy
The problem of online piracy
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 

Viewers also liked

Paypal Platform: Evolving for simplicity and reach - IBM Silicon Valley Lab
Paypal Platform: Evolving for simplicity and reach - IBM Silicon Valley LabPaypal Platform: Evolving for simplicity and reach - IBM Silicon Valley Lab
Paypal Platform: Evolving for simplicity and reach - IBM Silicon Valley Lab
Deepak Nadig
 
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
North Texas Chapter of the ISSA
 

Viewers also liked (10)

User behavior analysis and relevance extraction modelling
User behavior analysis and relevance extraction modellingUser behavior analysis and relevance extraction modelling
User behavior analysis and relevance extraction modelling
 
Integrating Behavior User Studies with Log Analysis
Integrating Behavior User Studies with Log AnalysisIntegrating Behavior User Studies with Log Analysis
Integrating Behavior User Studies with Log Analysis
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Paypal Platform: Evolving for simplicity and reach - IBM Silicon Valley Lab
Paypal Platform: Evolving for simplicity and reach - IBM Silicon Valley LabPaypal Platform: Evolving for simplicity and reach - IBM Silicon Valley Lab
Paypal Platform: Evolving for simplicity and reach - IBM Silicon Valley Lab
 
Gov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior AnalyticsGov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior Analytics
 
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & MitigationNTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
 
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdANTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
 
Team Titan Financial Reforms
Team Titan Financial ReformsTeam Titan Financial Reforms
Team Titan Financial Reforms
 
Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016
Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016
Unsupervised Clickstream Clustering for User Behavior Analysis CHI2016
 
Jisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in SecurityJisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in Security
 

Similar to Cybercrime

Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
Chande Kasita
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
Syed Bokhari
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
Syed Bokhari
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 

Similar to Cybercrime (20)

Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Cyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).pptCyberlaw for Company Secretaries (1).ppt
Cyberlaw for Company Secretaries (1).ppt
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
E-Commerce: Challenges and Issues
E-Commerce: Challenges and IssuesE-Commerce: Challenges and Issues
E-Commerce: Challenges and Issues
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Cybercrime

  • 1. COMBATING CYBER CRIME: THE LEGAL (& PRACTICAL) CHALLENGES Craig J. Blakeley www.AllianceLawGroup.com
  • 2. Cyber Crime • What is it? • Why should we care? • Are existing penal laws adequate to deal with it? (Is there something unique or different about cyber crime that requires new laws to specifically address these issues?) • What is the importance of international cooperation in addressing cyber crime? • What preventative actions can be taken? www.AllianceLawGroup.com
  • 3. Cyber Crime: What is it? • Use of a computer/Internet to do something that would be a crime in any case. Analogy: Murder is the taking of a human life without justification whether done with a rock, a sword, a gun electricity, poison, etc. The crime is defined in terms of the end result -- not how that result was brought about. • Fraud (credit card or identity theft) • Child Pornography • Intellectual Property Violations www.AllianceLawGroup.com
  • 4. Cyber Crime: What is it? • Use of a computer/Internet to do something that we want to prohibit (i.e., make criminal) but which action (crime) would not be possible without a computer/Internet. Analogy: Drunk driving would not be a crime (i.e., would not be possible) without an automobile. • Computer viruses • Spam • Hacking • Denial of Service Attacks www.AllianceLawGroup.com
  • 5. Cyber Crime: Why Should We Care? • Pervasive Nature and Growing Importance of the Internet and Computers • Economic Importance of Computers & the Internet (Information & Communications Technology -- “ICT”) • Potential Economic or Other Costs (e.g., e-government & e-commerce) www.AllianceLawGroup.com
  • 6. Are Existing Penal Laws Adequate? • Some Are; Some Are Not • Credit Card Fraud (for example): Existing Laws generally OK. A fraudulent transaction does not lose its fraudulent (i.e., criminal) nature just because it takes place online rather than through a paper transaction. • Hacking, Denial of Service Attacks, etc. Existing Laws probably are insufficient. There is not a physical entry or taking. And even if laws could be interpreted to cover such activity (a dubious proposition), the deterrence effect of a law of uncertain application would be very low. www.AllianceLawGroup.com
  • 7. But There Are Other Problems • Proof; evidence •Where the criminal conduct is digital, so is the evidence. As a result, there are associated problems of finding the evidence (it can be more easily hidden, changed or destroyed) and presenting the evidence (what is an acceptable physical version of a piece of digital evidence -- sort of a reverse e-signature/e-contract problem). www.AllianceLawGroup.com
  • 8. But There Are Other Problems • Location; Jurisdiction • The Internet makes it possible for a cyber criminal • to be located anywhere in the world • to hide his or her location • Even where the location can be determined, it may be difficult or impossible for the country which was victimized to get jurisdiction of the criminal www.AllianceLawGroup.com
  • 9. How to Deal With the Problem • Specific Laws to Cover New Crimes • E.g., U.S. Computer Fraud & Abuse Act prohibits unauthorized access to computer or computer networks which causes damage in a 1-year period of $5,000 or more; prohibits transmission of viruses and other intentionally destructive code; both civil & criminal penalties are provided. www.AllianceLawGroup.com
  • 10. How to Deal With the Problem • Broad Jurisdictional Provisions • E.g., Virginia: Virginia Computer Crimes Act Broad jurisdictional provision. Law defines using a computer or computer network within Virginia as conferring jurisdiction in Virginia. Given that the bulk of U.S. (and perhaps the world’s) Internet traffic passes through Virginia, this gives Virginia broad authority. Both criminal and civil actions may be brought under the law, including by individual recipients. www.AllianceLawGroup.com
  • 11. How to Deal With the Problem • Broad Jurisdictional Provisions (cont.) • E.g., Australia: THE SPAM ACT OF 2003 Prohibits the sending of commercial e-mail to recipients without their consent. Requires that the e-mail contain accurate information about the sender & a functional way for the recipients to unsubscribe. Use of electronic address harvesting software or lists which have been generated using such software is prohibited for the purpose of generating unsolicited e-mail messages. Applies to e-mail sent from Australia & to e-mails sent to an address www.AllianceLawGroup.com
  • 12. How to Deal With the Problem • International Agreements & Cooperation -- Essential Due to the Worldwide Nature of the Internet • E.g, Council of Europe Convention on Cybercrime • Requires Members and other signatory states to adopt legislative and other measures necessary to establish as a criminal offense: • accessing a computer system without right; • intercepting without right non-public transmissions to or from a computer system • damaging, deletion, etc. of computer data without right • serious hindering without right of the functioning of a computer system by inputting, damaging, deleting, etc. computer data www.AllianceLawGroup.com
  • 13. How to Deal With the Problem • International Agreements & Cooperation -- Essential Due to the Worldwide Nature of the Internet • E.g, Council of Europe Convention on Cybercrime (cont.) • producing, selling, importing, etc. devices that make it possible to conduct one of the activities otherwise prohibited by the law • the input, alteration or deletion without right of computer data resulting in inauthentic data with the intent that it be acted upon for legal purposes as if it were authentic (i.e., forgery) transmissions to or from a computer system www.AllianceLawGroup.com
  • 14. How to Deal With the Problem • International Agreements & Cooperation -- Essential Due to the Worldwide Nature of the Internet • E.g, Council of Europe Convention on Cybercrime (cont.) • the causing of loss of property to another by input, alteration, deletion, etc. of computer data or interference with computer system with fraudulent or dishonest intent of producing without right economic benefit for oneself of another www.AllianceLawGroup.com
  • 15. How to Deal With the Problem • International Agreements & Cooperation -- Essential Due to the Worldwide Nature of the Internet • E.g, Interpol Regional Working Parties on Information Technology Crime • Computer Crime Manual -- best practices guide for investigators • Computer Crimes Training Courses for investigators and enforcement authorities • Rapid Information Exchange System to quick notification of computer crimes to appropriate in various countries www.AllianceLawGroup.com
  • 16. How to Deal With the Problem • Other Practical Steps • Governmental & Private Sector • Security Policies (not common in the Middle East -- Daily Star, Oct. 7, 2004) • Software and Hardware Defenses (e.g., antispam, antivirus software, firewalls) www.AllianceLawGroup.com
  • 17. Next Steps in Lebanon • Legal Advisory Committee of Ecomleb (advising Ministry of Economy & Trade) at work on recommendations, which will include measure on data privacy, security, etc. • Cyber crime can remove or destroy substantial amounts of economic value from the Internet, thus increasing costs, consuming resources, discouraging new investment, or causing a loss of confidence in the Internet. Thus it’s important to move forward on such things as the initiatives at the Ministry of Economy & Trade. www.AllianceLawGroup.com