230 likes | 482 Views
Computer Crime. Dr Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University of London Baker & McKenzie. Introductory Remarks. Definitions misuse, abuse and criminal behaviour computer-related, content-related & computer integrity
E N D
Computer Crime Dr Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University of London Baker & McKenzie
Introductory Remarks • Definitions • misuse, abuse and criminal behaviour • computer-related, content-related & computer integrity • Policy objectives • business cost, individual distrust & societal risk • critical national infrastructure • International harmonisation • Computer and Computer Related Crime Model Law • Council of Europe Cybercrime Convention (2001) • 44 Member countries + US, Japan, South Africa, Canada
Crime Problems • Under-reporting • reputational risk • e.g. Citibank case • lack of awareness • Law enforcement concerns • Investigation and prosecution • Statistical recording • International nature • Forensic and evidential challenges
Definitions • ‘Computer data’ and ‘computer system’ • programs and devices • ‘Service provider’ • provision of communication services, including storage • ‘Traffic data’ • communications attributes: origin, destination, route, time, date, size, duration & type
Accessing Data • Article 5, Illegal access (stored data) • ‘without lawful excuse or justification’ • problem of authorisation • e.g. employees • Article 8, Illegal interception (in transmission) • non-public transmissions • electromagnetic emissions • further issues • What constitutes ‘interception’? • Scope: public and private networks?
Interference • With data (article 6) • intentionally or recklessly • without lawful excuse or justification • acts: e.g. destroys or alters, access to, use of • temporary or permanent effect • With computer systems (article 7) • hinder • cutting electricity supply • causing electromagnetic interference • corrupting the system, altering data
Illegal Devices • Produces, sells, procures for use, imports, exports, distributes…. • designed or adapted for purpose of committing offence • ‘a computer password, access code or similar data’ • Possession • with intent to commit offence • court may infer intent based on number of items possessed • Defence? • e.g. authorised testing, research
Child Pornography • Supply and possession • differential sanctions? • e.g. UK: 10 yrs / 5 yrs • corporate v individuals • defence • e.g. research • Age • e.g. Council of Europe 16-18 yrs • Scope, including ‘realistic images’
Jurisdiction • Territorial jurisdiction (art. 4(a)-(b)) • act or omission • where the actus reus completed • e.g. UK: Computer Misuse Act 1990, s. 4-9 • “at least one significant link” • the accused, the computer or the unauthorised modification • Extra-territorial jurisdiction • outside any jurisdiction (art. 4(c)) • ‘active personality’ principle: the offender is a national of the territory (art. 4(d))
Search and Seizure • Judicial warrant to enter place • including ‘computer data storage medium’ • Assistance to police (article 13) • remote data: ‘…any computer data available to…’ • issue of sovereignty • protected data: ‘intelligible output’ • e.g. encryption key • failure to assist is an offence
Seized Data • Provide list of seized data/data rendered inaccessible • ‘person in control of the computer system’ • Provide copy • unless a criminal offence • prejudice investigation or proceedings
Stored Data • Article 16, Disclosure of stored traffic data • to person or ex parte application for court order • to identify service provider • communication route • Article 17, Preservation of data • risk of loss • 7 days (CoE: 90 days) • issue of data retention
Data in Transmission • Article 18, Interception of electronic communications • judicial warrant • service provider assistance • obligation to maintain an Internet capability • Article 19, Interception of traffic data • law enforcement request for collection • Distinguishing content data from traffic data • e.g. Uniform Resource Locator (URL) • http://www.google.com/search?hl=en&q=big+bottom+aliens&btnG=Google+Search