‘Prosecuting Cybercrime and Regulating the Web’, at seminar on the current State of Cybercrime and Cyberwar seminar, organised by the MA in Journalism with New Media class, in conjunction with CIT Development Office, Cork Institute of Technology, March 2014
20140314 Belgian Senate Judicial action of police on social mediaLuc Beirens
Presentation given in the Belgian Senate on 14 03 2014.
Comparison of classical police investigation methods with the new cyber investigation methods.
Problems and proposals for better cyber investigations
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago
All presenter slides from the March 2nd CloudCamp
"The Chicago Electronic Crimes Task Force" - Patrick Hogan, Assistant to the Special Agent in Charge at U.S. Secret Service
"Information Security Breach Trends" - Michael Roytman, Data Scientist at Risk I/O @mroytman
"Keeping hardware secure, even after its useful life" - Jim Tarantino, VP Global Sales at MarkITx @jimTarantino
Hosted at TechNexus
Sponsored by Risk I/O and Cohesive Networks
for future events, visit: cloudcampchicago.eventbrite.com
The National Security, IP/Trademark, Human Rights and Data Protection Risks o...Shannon Brandao
To understand the legal risks of contracting with Chinese Tech Champion, Huawei, I have fact-checked the public statements of its founder Ren Zhengfei and other company spokespersons against what has been reported regarding Huawei’s business practices and relationship with the Chinese government by reputable North American, Australian, and European researchers and in US court filings on behalf of major American tech firms.
This presentation explains certain risks that have evolved over the company’s 30+year history. It is meant solely to draw attention to potential violations and conflicts of international laws by framing issues of general concern. However, it cannot and should not substitute for specific legal advice from a qualified practitioner who is competent to provide counsel in the relevant jurisdiction and area(s) of law.
Contact me or comment with questions. The report in pdf can be downloaded here: https://lnkd.in/dtZkgXG (may have to open adobe first, then find & open file for links to work, will send upon request)
This chapter covers:
- Security concerns stemming from the use of computer networks
- Safeguards and precautions that can be taken to reduce the risk of problems related to these security concerns
- Personal safety issues related to the Internet
- Ways to protect against personal safety issues
- Legislation related to network and Internet security
From corporate crimes to murder, computer place a role in nefarious activities either as a target, medium or containing evidence and thus, requiring specialist with a skill in the various technologies and legal knowledge to gather evidence stored digitally.
20140314 Belgian Senate Judicial action of police on social mediaLuc Beirens
Presentation given in the Belgian Senate on 14 03 2014.
Comparison of classical police investigation methods with the new cyber investigation methods.
Problems and proposals for better cyber investigations
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago
All presenter slides from the March 2nd CloudCamp
"The Chicago Electronic Crimes Task Force" - Patrick Hogan, Assistant to the Special Agent in Charge at U.S. Secret Service
"Information Security Breach Trends" - Michael Roytman, Data Scientist at Risk I/O @mroytman
"Keeping hardware secure, even after its useful life" - Jim Tarantino, VP Global Sales at MarkITx @jimTarantino
Hosted at TechNexus
Sponsored by Risk I/O and Cohesive Networks
for future events, visit: cloudcampchicago.eventbrite.com
The National Security, IP/Trademark, Human Rights and Data Protection Risks o...Shannon Brandao
To understand the legal risks of contracting with Chinese Tech Champion, Huawei, I have fact-checked the public statements of its founder Ren Zhengfei and other company spokespersons against what has been reported regarding Huawei’s business practices and relationship with the Chinese government by reputable North American, Australian, and European researchers and in US court filings on behalf of major American tech firms.
This presentation explains certain risks that have evolved over the company’s 30+year history. It is meant solely to draw attention to potential violations and conflicts of international laws by framing issues of general concern. However, it cannot and should not substitute for specific legal advice from a qualified practitioner who is competent to provide counsel in the relevant jurisdiction and area(s) of law.
Contact me or comment with questions. The report in pdf can be downloaded here: https://lnkd.in/dtZkgXG (may have to open adobe first, then find & open file for links to work, will send upon request)
This chapter covers:
- Security concerns stemming from the use of computer networks
- Safeguards and precautions that can be taken to reduce the risk of problems related to these security concerns
- Personal safety issues related to the Internet
- Ways to protect against personal safety issues
- Legislation related to network and Internet security
From corporate crimes to murder, computer place a role in nefarious activities either as a target, medium or containing evidence and thus, requiring specialist with a skill in the various technologies and legal knowledge to gather evidence stored digitally.
The Patriot Act and Cloud Security - Busting the European FUDResilient Systems
In the wake of Edward Snowden's allegations of NSA cyber spying, we are honored to have a former General Counsel of the NSA as one of our panelists. This is sure to be an especially interesting webinar.
European hosting companies have cited the USA Patriot Act of 2001 as the boogieman that would leave information free for plunder by the dark and clandestine US Government. And NSA activity as described by Edward Snowden has provided a convenient, timely, and high profile case study. But are these concerns well founded? Learn more about the Patriot Act, ways other countries combat terrorism, and how these relate to privacy.
Our featured speakers for this timely webinar will be:
-Stewart Baker, Partner, Steptoe & Johnson LLP; Former Assistant Secretary for Policy at the Department of Homeland Security and General Counsel of the NSA
-Michael Vatis, Partner, Steptoe & Johnson LLP
-Gant Redmon, Esq. CIPP/US General Counsel, Co3 Systems
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
APNIC General Counsel Craig Ng discusses legal cooperation to overcome jurisdictional and territorial limits in cybercrime investigations at the 33rd TWNIC IP OPM in Taipei, Taiwan, on 5 December 2019.
This chapter describes how to conduct a digital forensics investigation. It shows the possible relation between information Security Triad and the investigation Triad. the chapter presents how to conduct an interview during investigations, and the disposition to take for adequate recording. The bit-by-bit stream copy process is mentioned. Disposition to take when finalizing the investigation is also discussed.
Mental Health Act 2001 Toolkit Launch 10 Nov 2022Darius Whelan
The School of Law, University College Cork, has developed a Mental Health Act Toolkit in partnership with Mental Health Reform.
When people with mental health difficulties are admitted to mental health units, either on a voluntary or involuntary basis, it is vital that user-friendly, accessible, information is available regarding human rights. Access to this information is essential for people with mental health difficulties, their family members, advocates, supporters and carers. The Mental Health Act 2001 Toolkit is published on Mental Health Reform’s website.
Video of launch: https://youtu.be/cXOfqiMz77A
Toolkit:
https://www.mentalhealthreform.ie/mental-health-act-2001-toolkit/
Funded by the Irish Research Council.
Hunger Strikes in Prison: The Legal Issues Oct 2020Darius Whelan
‘Hunger Strikes in Prison: The Legal Issues’, Conference Paper at conference, "Terence MacSwiney, Cork Men’s Gaol, and the Political Hunger Strike, 1920-2020", School of History, University College Cork, October 2020
Copyright for Digital Learning
Darius Whelan
Irish Universities Association - Enhancing Digital Teaching and Learning in Irish Universities - Online Seminar, June 2020
Link to resources cited:
https://bit.ly/copyright_open_IUADigEd_June2020
Employees and Internet Use - Legal PerspectiveDarius Whelan
E Law Developments: Employees and Internet Use
Southern Law Association event, Cork, September 2019
Darius Whelan, School of Law, UCC
IT Law Clinic
http://www.ucc.ie/law/courses/
E Law Developments: Copyright Law
Southern Law Association event, Cork, September 2019
Darius Whelan, School of Law, UCC
IT Law Clinic
https://www.ucc.ie/en/law/courses/
LLM in Intellectual Property and E Law, University College Cork, IrelandDarius Whelan
LLM in Intellectual Property and E Law, University College Cork
School of Law
https://www.ucc.ie/en/lawsite/ucc-master's-law/
https://www.ucc.ie/en/ckl16/
Human Rights and Mental Health TribunalsDarius Whelan
Irish Association of Social Workers
Learning from each other; Critical Reflections on the intersections between the Mental Health Act 2001 and Human Rights.
Dublin, February 2019
Shari McDaid - The Mental Health Act 2001: Issues from a Coalition PerspectiveDarius Whelan
Dr Shari McDaid - The Mental Health Act 2001: Issues from a Coalition Perspective
Dr Shari McDaid is the Director of Mental Health Reform.
Presented at Mental Health Law Conference 2015 - Centre for Criminal Justice & Human Rights, School of Law, University College Cork and Irish Mental Health Lawyers Association.
25 April 2015
http://www.imhla.ie
#mhlaw2015
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony - Mental Health...Darius Whelan
Dr Liz Brosnan: Voices from the Margin / Psychiatric Hegemony.
Dr Liz Brosnan is a Sociologist and Survivor Activist.
Presented at Mental Health Law Conference 2015 - Centre for Criminal Justice & Human Rights, School of Law, University College Cork and Irish Mental Health Lawyers Association.
25 April 2015
http://www.imhla.ie
#mhlaw2015
Maria Morgan: The Mental Health Act 2001 from a Clinician's PerspectiveDarius Whelan
Dr Maria Morgan, Consultant Psychiatrist
The Mental Health Act 2001 from a Clinician's Perspective
Presented at Mental Health Law Conference 2015 - Centre for Criminal Justice & Human Rights, School of Law, University College Cork and Irish Mental Health Lawyers Association
25 April 2015
http://www.imhla.ie
#mhlaw2015
Anselm Eldergill: The Court of Protection and the Mental Capacity Act: Capaci...Darius Whelan
Judge Anselm Eldergill, Court of Protection
The Court of Protection and the Mental Capacity Act: Capacity to Change?
Presented at Mental Health Law Conference 2015 - Centre for Criminal Justice & Human Rights, School of Law, University College Cork and Irish Mental Health Lawyers Association
25 April 2015
http://www.imhla.ie
#mhlaw2015
Michael Lynn: Capacity and Consent Issues [presented at Mental Health Law Con...Darius Whelan
Capacity and Consent Issues - Mr Michael Lynn, Senior Counsel
Presented at Mental Health Law Conference 2015 - Centre for Criminal Justice & Human Rights, School of Law, University College Cork and Irish Mental Health Lawyers Association
25 April 2015
http://www.imhla.ie
#mhlaw2015
Developing Students' E-Literacy (Teaching and Learning)Darius Whelan
Presentation at University College Cork Digital Day, December 2014
http://www.ucc.ie/en/teachlearn/tel/digitalday2014/
Organised by Vice Presiodent for Teaching and Learning.
Ionad Bairre.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Overview on Edible Vaccine: Pros & Cons with Mechanism
Prosecuting Cybercrime and Regulating the Web
1. Darius Whelan,
Faculty of Law,
UCC
CIT
March 2014
Prosecuting Cybercrime and
Regulating the Web
Current State of Cybercrime and Cyberwar seminar, organised by the MA in
Journalism with New Media class, in conjunction with CIT Development Office, Cork
Institute of Technology, March 2014
2. • Council of Europe Cybercrime
Convention
• Extradition
• Forensic examination of computers
• ‘Trojan Horse’ Defence
• Regulability of the Internet
• Aspects of online defamation law
2
Summary
3. • Cybercrime covers:
– Offences where the computer is
the target of the offence, e.g.
unauthorised access and illegal
tampering with systems
– Traditional offences such as theft,
fraud and forgery, that are
committed by means of
computers
• May involve identity theft, phishing,
Denial of Service attacks, botnets,
malware, possession of child abuse
images / child pornography, etc., etc.
3
5. 5
Cybercrime
Convention
2001
• Negotiated and signed by many
members of Council of Europe + USA,
Canada, Japan, South Africa
• Ratified by 42 states so far, including
UK, Denmark, France, Netherlands,
Norway, USA, Australia, Japan
• Not yet ratified in Ireland
6. 6
Elements of
the
Convention
• List of crimes which each country
must enact into law
• Requires each participating nation to
grant new powers of search and
seizure to its law enforcement
authorities
• Requires law enforcement in every
participating country to assist police
from other participating countries by
cooperating with “mutual assistance
requests” from police in other
participating nations “to the widest
extent possible”
• Optional Protocol on Hate Speech
7. 7
List of Crimes in Convention (1)
• Illegal access
• covers electronic trespass or hacking
• Illegal interception
• electronic invasion of privacy / burglary prohibiting
unauthorised intrusions resulting in the appropriation of
data
• Data Interference
• System Interference
• denial of service attacks and dissemination of viruses and
other malicious codes
8. 8
List of Crimes in Convention (2)
• Misuse of Devices
• production / sale / procurement / importation/
distribution of tools to be used in committing the four
categories above
• Forgery
• Fraud
• Copyright infringement and related offences
• Child Pornography
9. 9
Copyright -
Article 10
• The infringements must occur on a
“commercial scale”.
• How large must the copyright
infringement be to be considered
“commercial”?
• Standard of originality necessary to
establish copyright protection varies
considerably across jurisdictions
10. 10
24/7
Network –
Article 35
• A network of high tech
specialists available 24 hours
per day, seven days per week
for obtaining both technical
and legal advice and
assistance
11. 11
• Brief Mentions of Human Rights:
– Article 15 - the powers and procedures exercised under
Section 2 [procedural Articles] are subject to conditions
and safeguards under domestic laws on human rights and
liberties, the ECHR, the United Nations International
Covenant on Civil and Political Rights and other
applicable international human rights instruments.
– Such safeguards shall incorporate the principle of
proportionality.
– Also: a paragraph relating to the right to the protection
of personal data in the Preamble
12. 12
Commentary
• Appears to be supported by large
corporations, e.g. those concerned
about software copyright violations.
• Severely criticised by human rights
groups, e.g. because it does not
include sufficient privacy or data
protection provisions.
• Also drafts were criticised by the
Parliamentary Assembly of the
Council of Europe and the Art 29
Working Group.
13. 13
• Contrasts with past approach of Council of Europe,
which normally has strong human rights protections
in its documents, e.g.
– European Convention on Human Rights 1950
– Strasbourg Convention on Data Protection 1981.
• Note for example that states are not obliged to pass
laws requiring that computer systems be secure
(which is part of the Data Protection regime.)
• This might help to prevent unauthorised access, and
benefit data protection at the same time.
14. 14
• Framework Decision on Attacks on Information Systems
(2005)
– Was to be implemented by March 2007
– July 2008: Commission noted that Ireland had not yet
implemented FD
– Bill on current list of Bills for drafting:
• Criminal Justice (Cybercrime) Bill – “Publication Expected – Not possible
to indicate at this stage”
17. • Extradition Treaties:
– Normally an activity must be
a crime in both the
requesting and requested
states
17
Dual
Criminality
18. 18
• ‘Love Bug’ virus incident
– Alleged perpetrator (Onel de Guzman) could not
be extradited from Philippines.
– Canadian News Story:
• www.tinyurl.com/LW6560-50
From cbsnews.com
19. 19
• Accused may be extradited when visits another country
– Vladimir Levin case (1994-97)
– Re Levin [1997] UKHL 27; [1997] AC 741
– Attack against Citibank by young Russian
– No extradition treaty
– Visited England for exhibition
– Extradited to USA
– Disks being operated based in USA
From peoples.ru
20. 20
• Julio Cesar Ardita
– 21 year old Argentinian
– 1995 Sniffer re Harvard users
– Accessed Dept of Defense etc.
– Extradition refused to USA – no dual criminality
– But later travelled to USA voluntarily, pleaded guilty to
lesser charge
21. 21
“Invita” case - Vasily Gorshkov & Alexy Ivanov
• Russian hackers - Undercover operation – FBI agents
posed as reps of security firm ‘Invita’ – invited them to
Seattle
• Then they were arrested in Seattle (having recorded
their passwords first using keyloggers.)
• Investigators copied data and preserved it until warrant
obtained.
• Afterwards they informed the Russian authorities.
• Hackers argued the remote cross-border search was
unconstitutional.
• Court held relevant computers not protected (outside
USA, not the property of a U.S. resident)
• No seizure as data remained unaltered.
23. 23
• Digital evidence is intangible
• Also volatile
– When Windows is booted up, this destroys 4 million
characters of evidence
• Defence arguments:
– Accused was not author of evidence in question
– Evidence was tampered with
– Unreliability of computer programs created inaccuracies in
output, e.g. bugs, defective code
25. 25
• May be long delays in forensic examination of computers due
to volume of computers to be examined
• Chain of custody must be maintained
• Risky to allow any access to computer by other witnesses
• Use of standardised forensic practices is advisable, e.g. in UK
guidelines from Association of Police officers
26. 26
• Often three images are made of a hard drive:
– Master copy as evidence
– Copy used for analysis by police
– Copy given to accused
27. 27
Sharon Collins Trial 2008
• Conspiracy to Murder
• E-mail evidence central to trial
Image source - sligotoday.ie
30. • Trojan Horse virus / malware: A virus / malware program which
presents itself as routine, useful, or interesting in order to persuade
victims to install it on their computers. Once installed, it steals or
harms system data in some way.
• Trojan Horse Defence
– Accused claims a virus / Trojan horse infected their PC and this
was what caused evidence of criminal activity to be on the PC
• Some Other Dude Did It Defence
– Accused claims somebody else engaged in the criminal activity
using their PC (e.g. by remotely accessing their PC)
30
31. 31
Aaron Caffrey Case (2003)
• Aaron Caffrey, aged 19, charged re computer attack on
Port of Houston's web-based systems in September 2001.
• Prosecution and defence both agreed attack was
launched from Caffrey's home PC, based in the UK.
• Prosecution claimed it was result of misdirected attack by
Caffrey against fellow chat-room user.
• Caffrey claimed evidence was planted on his machine by
attackers who used an unspecified Trojan horse program
to gain control of his PC and launch the assault.
Image source – bbc.co.uk
32. 32
• Forensic examination of Caffrey's PC found attack tools
but no trace of Trojan infection.
• Case hinged on whether jury accepted defence argument
that Trojan could wipe itself
• Jury decided Caffrey was not guilty of unauthorised
computer modifications
33. • Defendants may raise Trojan Horse defence in all
sorts of cybercrime cases, inc. cases on possession
of child abuse images (child pornography)
• Judge / jury will have to decide whether defence
applies on the facts
• Note related “caching” defence – if child abuse
images found only in browser cache, did defendant
knowingly possess them?
• May depend on his/her level of technical
knowledge
33
36. • Lessig, The Search for a Moose
• http://blip.tv/lessig/the-search-for-a-moose-2131975
37. Art. I, Section 8, clause 8 of U.S. Constitution:
The Congress shall have power … to promote the Progress of
Science and useful Arts, by securing for limited Times to Authors
and Inventors the exclusive Right to their respective Writings and
Discoveries.
38. EU Charter of
Fundamental
Rights
Article 17
Right to property
1. Everyone has the right to own, use, dispose of
and bequeath his or her lawfully acquired
possessions. No one may be deprived of his or
her possessions, except in the public interest and
in the cases and under the conditions provided
for by law, subject to fair compensation being
paid in good time for their loss. The use of
property may be regulated by law in so far as is
necessary for the general interest.
2. Intellectual property shall be protected.
47. 0 Defamation is civil matter, not criminal
0 Criminal libel abolished by Defamation Act 2009
0 ‘Libel tourism’ phenomenon – plaintiffs may seek to
sue in a country where only a small number of readers
viewed the material
47
48. Hosting Defence
0 E-Commerce Directive (Directive 2000/31/EC)
0 S.I. No. 68 of 2003
0 Article 14 (paraphrased):
0 The service provider is not liable for the information, on
condition that:
a) the provider does not have actual knowledge of illegal
activity or information and, as regards claims for damages,
is not aware of facts or circumstances from which the illegal
activity or information is apparent; or
b) the provider, upon obtaining such knowledge or awareness,
acts expeditiously to remove or to disable access to the
information
0 This shall not apply when the recipient of the service is acting
under the authority or the control of the provider
48
49. Betfair Case
0 Mulvaney v Sporting Exchange (2013)
0 Forums/ Chatrooms operated by Betfair
0 Bookmakers alleged libel by forum members
0 Betfair sought to rely on hosting defence
0 Clarke J – Betfair could rely on hosting defence
(preliminary issue)
0 [Gambling exception to Directive did not apply as
forums not directly connected to gambling part of
site]
49
51. 0 Metropolitan International Schools v Designtechnica &
Google (2009)
0 English case suggesting Google not liable for
autocompletes
0 However, facts may vary: in some cases, Google may
be held to be a publisher of the autocomplete results
51
52. 52Image Source – Mark Collier - http://www.theopenalgorithm.com/seoleaks/google-in-irish-court/
54. Darius Whelan – d.whelan@ucc.ie
Twitter: @dariuswirl
LLM in Intellectual Property and E Law programme:
www.ucc.ie/en/law-postgrad/taughtprogrammes/
Creative Commons Ireland:
www.creativecommonsireland.org
54