Mohamed chawki



Download 373.67 Kb.
Page1/7
Date09.06.2017
Size373.67 Kb.
#20141
  1   2   3   4   5   6   7


A Critical Look at the Regulation of Cybercrime

A Comparative Analysis with Suggestions for Legal Policy
__________________________________________


Mohamed CHAWKI *

* LL.B (1998), BA (1998), LL.M (2000), DU (2003). Member of the Council of State (Conseil d’Etat). Member of several NGOs. Phd Researcher at the School of Law, University of Lyon III, France.



mohamed_chawki@hotmail.com

Instantaneous global communications have given us a window on the world through which can be seen both the wonder of it all and the things that make us wonder about it all”


John Naisbitt (Global Paradox: 1994)

Abstract:
Cybercrime cut across territorial borders, creating a new realm of illegal human activity and undermining the feasibility--and legitimacy--of applying laws based on geographic boundaries. Territorially-based law-making and law-enforcing authorities find cybercrime deeply threatening. It has subjected the nation-State to unprecedented challenges with regard to its efficacy, sovereignty and functions. However, established territorial authorities may yet learn to defer to the self-regulatory efforts of Cyberspace participants who care most deeply about this new digital trade in ideas, information, and services. Separated from doctrine tied to territorial jurisdictions, new legislations will emerge, in a variety of online spaces, to deal with a wide range of new phenomena that have no clear parallel in the real world. Accordingly, this article seeks to address and analyse the following issues: Firstly, it examines how cybercrime is being addressed at the national and international levels.

Secondly, it reviews the state of the existing legislative and regulatory framework and their efficiency in combating this form of cross-border organised crime, taking the European Union

as a case study. Finally, the article will conclude by discussing the steps nations should take in their battle against this crime.

Table of Contents
Introduction


I. The Rise of Crime in Cyberspace
A. A Study of the Phenomenon.

B. The Scope of the Phenomenon.

C. Cyberspace Misuse and Abuse.
II. Legislative Approaches

A. National and Regional Strategies.

B. The International Dimension.

C. Additional Strategies to Fight Cybercrime: Suggestions for Legal Policy.


Conclusion

Introduction:

Cybercrime is a major concern for the global community.1 The introduction, growth, and utilisation of information and communication technologies have been accompanied by an increase in criminal activities.2 With respect to cyberspace,3 the Internet is increasingly used as a tool and medium by transnational organised crime.4 Cybercrime is an obvious form of international crime that has been affected by the global revolution in ICTs.5 As a resent study noted, cybercrimes differ from terrestrial crimes in four ways: “They are easy to learn how to commit; they require few resources relative to the potential damage caused; they can be committed in a jurisdiction without being physically present in it; and they are often not clearly illegal.” 6 On such a basis, the new forms of cybercrime present new challenges to lawmakers, law enforcement agencies, and international institutions.7 This necessitates the existence of an effective supra-national as well as domestic mechanisms that monitor the utilisation of ICTs for criminal activities in cyberspace.8



I. The Rise of Crime in Cyberspace
The term “cyberspace” was coined by the science fiction author William Gibson in his 1984 novel Nuromancer, to describe the environment within which computer hackers operate.9 In this novel, the activity of hacking- securing unauthorized access to the contents of computer systems- is couched in very physical terms. 10 The image is of the hacker overcoming physical security barriers to penetrate into the heart of computer systems and make changes to the physical structure thereby modifying the operation of the system.11 When departing, the hacker might even remove and take away elements of the system. 12

Cyberspace radically undermines the relationship between legally significant (online) phenomena and physical location.13 The rise of the global computer network is destroying the link between geographical location and: (1) the power of local governments to assert control over online behaviour; (2) the effects of online behaviour on individuals or things; (3) the legitimacy of the efforts of a local sovereign to enforce rules applicable to global phenomena; and (4) the ability of physical location to give notice of which sets of rules apply.14

Faced with their inability to control the flow of electrons across physical borders,15 some legislators strive to inject their boundaries into electronic mediums through filtering mechanisms and the establishment of electronic barriers. 16 Others have been quick to assert the right to regulate all online trade insofar as it might adversely impact local citizens. For example The Attorney General of Minnesota, has asserted the right to regulate gambling that occurs on a foreign web page that was accessed and ‘brought into’ the state by a local resident. 17 Also, the New Jersey securities regulatory agency has similarly asserted the right to shut down any offending Web page accessible from within the state.18

On such a basis this section examines the distinct phenomenon of “cybercrime”. Compare it with traditional crime and review the reports that have been conducted on its incidence and the damage it inflicts.


1.1 A Study of the Phenomenon

1.1.1 Understanding the Concept of Cybercrime

Generally speaking, computers play four roles in crimes: They serve as objects, subjects, tools, and symbols.19 Computers are the objects of crime when they are sabotaged or stolen. There are numerous cases of computers being shot, blown up, burned, beaten with blunt instruments, kicked, crushed and contaminated.20 The damage may be international, as in the case of an irate taxpayer who shot a computer four times through the window of the local tax office. 21 Or unintentional, as in the case of a couple who engaged in sexual intercourse while sitting on computer sabotage destroys information, or at least makes it unavailable.22 Computers play the role of subjects when they are the environment in which technologies commit crimes. Computer virus attacks fall into this category. When automated crimes take place, computers will be the subjects of attacks. The third role of computers in crime is as tools-enabling criminals to produce false information or plan and control crimes.23 Finally, computers are also used as symbols to deceive victims. In a $ 50 million securities-investment fraud case in Florida, a stock broken deceived his victims by falsely claiming that he possessed a giant computer and secret software to engage in high-profit arbitrage. In reality, the man had only a desktop computer that he used to print false investment statements. He deceived new investors by paying false profits to early investors with money invested by the new ones. 24

In the United States, police departments are establishing computer crimes units, and cybercrime makes up a large proportion of the offences investigated by these units. The National Cybercrime training Partnership (NCTP) encompasses local, state, and federal law enforcement agencies in the United States.25 The International Association of Chiefs of Police (IACP) hosts an annual Law Enforcement Information Management training conference that focuses on IT security and cybercrime. 26 The European Union has created a body called the forum on Cybercrime, and a number of European states have signed the Council of Europe’s Convention on Cybercrime treaty, which seeks to standardize European laws concerning cybercrime. From this perspective, each organization and the authors of each piece of legislation have their own ideas of what cybercrime is-and isn’t. These definitions may vary a little or a lot. To effectively discuss cybercrime in this part, however, we need a working definition. Toward that end, we start with a board, general definition and then define specific one.

When speaking about cybercrime, we usually speak about two major categories of offences: In one, a computer connected to a network is the target of the offence; this is the case of attacks on network confidentiality, integrity and/ or availability.27 The other category consists of traditional offences- such as theft, fraud, and forgery- which are committed with the assistance of/or by means of computers connected to a network, computer networks and related information and communications technology.28 Cybercrime ranges from computer fraud, theft and forgery- to infringements of privacy, the propagation of harmful content, the falsification of prostitution, and organized crime. 29 In many instances, specific pieces of legislation contain definitions of terms. However legislators don’t always do a good job of defining terms. 30 Sometimes they don’t define them at all, leaving it up to law enforcement agencies to guess, until the courts ultimately make a decision. 31 One of the biggest criticisms to the definition of computer crime conducted by the U.S Department of Justice (DOJ) is of its overly broad concept. The (DOJ) defines computer crime as ‘any violation of criminal law that involved the knowledge of computer technology for its perpetration, investigation, or prosecution’. 32 Under this definition, virtually any crime could be classified as a computer crime, simply because a detective searched a computer data base as part of conducting an investigation.

One of the factors that make a hard-and-fast definition of cybercrime difficult is the jurisdictional dilemma.33 Laws in different jurisdictions define terms differently, and it is important for law enforcement officers who investigate crimes, as well as network administrators who want to become involved in prosecuting cybercrime that are committed against networks, to become familiar with the applicable laws. 34

Also, one of the major problems with adequately defining cybercrime is the lack of concrete statistical data on these offences. In fact, reporting crimes is voluntary.35 This means that the figures are almost certainly much lower than the actual occurrence of networked-related crime. 36

In many cases, crimes that legislators would call cybercrimes are just the ‘same old stuff’, except that a computer network is somehow involved. The computer network gives criminals a new way to commit the same old crimes.37 Existing statutes that prohibit these acts can be applied to people who use a computer to commit them as well as to those who commit them without the use of a computer or network.38

In other cases, the crime is unique and came into existence with the advent of the network. Hacking into computer systems is an example; while it might be linked to breaking and entering a home or business building, the elements that comprise unauthorized computer access and physical breaking and entering are different.

Most U.S states have pertaining to computer crime. These statutes are generally enforced by state and local police and might contain their own definitions of terms. Texas Penal Code’s Computer Crime section, defines only one offence - Breach of Computer Security- as ‘(a) A person commits an offence if the person knowingly accesses a computer, computer network, or computer system without the effective consent of the owner’.39

California Penal Code, on the other hand, defines a list of eight acts that constitute computer crime, including altering, damaging, deleting, or otherwise using computer data to execute a scheme to defraud, deceiving, extorting, or wrongfully controlling or obtaining money, property, or data using computer services without permission, disrupting computer services, assisting another in unlawfully accessing a computer, or introducing contaminates into a system or network. 40 Thus, the definition of cybercrime under state law differs, depending on the state. Perhaps we should look to international organizations to provide a standard definition of cybercrime.

At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, in a workshop devoted to the issues of crimes related to computer networks, cybercrime was broken into two categories and defined thus: 41
‘(a) Cybercrime in a narrow sense: Any illegal behaviour directed by means of electronic operations that targets the security of computers systems and the data processed by them.
(b) Cybercrime in a border sense: Any illegal behaviour committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or disturbing information by means of a computer system or network’.
These definitions, although not completely definitive, do give us a good starting point-on that has some international recognition and agreement – for determining just what we mean by term cybercrime. Cybercrime, by these definitions, involves computers and networks. In cybercrime, the “cyber” component usually refers to perpetrating qualitatively new offences enabled by information technology or integrating cyberspace into more traditional activities.42 Having defined the concept of cybercrime, it becomes necessary to compare it with traditional crime. This involves examination of its characteristics, what makes it vulnerable to being manipulates and reviews the reports that have been conducted on its incidence and the damage it inflicts.
1.1.2 Terrestrial Crime versus Cybercrime

The act of defining crime is often, but not always, a step toward controlling it. That is, the ostensible purpose of defining illegal behaviours as criminals is to make them liable to public prosecution and punishment.43 Historically, ‘crime’ was addressed at the local, community level of government. 44 Crime was a small-scale, consisting of illegal acts committed by some persons that were directed against one victim. The ‘crimes’, which were consistent across societies; fell into routinized, clearly-defined categories that reflected the basic categories of anti-social motivations: Crime was a murder, it was robbery, crime was rape. 45

Crime was also personal, if the victim and the offender did not know each other; they were likely to share community ties that put offences into a manageable, knowable context.46 This principle did not only facilitate the process of apprehending offenders – who stood a good chance of being identified by the victim or by reputation – but also gave citizens at least the illusion of security, the conceit that they could avoid being victimized if they avoided some activities or certain associations.47 Law enforcement officers, dealt with this type of crime because its parochial character meant investigations were limited in scope and because the incidence of crime stood in relatively modest proportion the size of the local populace. Lax enforcement’s effectiveness in this regard contributed to a popular perception that social order was being maintained and that crime did not go unpunished. 48

The development in ICTs in urbanization and in geographical mobility under minded this model to some extent. However, it persisted functioned effectively for the most part. Legislators quickly adapted to the fact that ICTs could be used to commit fraud and to harass others. Because, they modified their substantive criminal law to encompass these activities, the old model still functions effectively for traditional real world crime.

Unlike this traditional crime, cybercrime is global crime. 49 As a European Report explains:

[c]omputer-related crimes are committed across cyber space and don’t stop at the conventional state-borders. They can be perpetrated from anywhere and against any computer user in the world.’

Some cybercrimes- stalking, say-tend, so far, at least, to be small-scale, single-offender/ single victim crimes, but the world’s experience with cybercrime is still in its infancy and yet large-scale offences targeting multiple, geographically dispersed victims are already being committed.50

In order to understand the sea change ICTs introduces into criminal activity, it is important to consider a hypothetical: One can analogize a denial of service attack to using the telephone to shut down a supermarket business, by calling the business’ telephone number repeatedly, persistently without remorse. Thereby preventing any other callers from getting through to place their orders. On such a base, the vector of cyberspace lets someone carry out an attack such as this easily and with very little risk of apprehension, so easy, in fact, that a 13 year-old hacker used a denial of service attack to shut down a computer company. 51 In addition to the increased scale of criminal activity the cybercrime offers, it also has a tendency to evade traditional offence categories. While some of its categories consists of using ICTs to commit traditional crimes, it also manifests itself as new varieties of activity that cannot be prosecuted using traditional offence categories. 52

The dissemination of the “Love Bug” virus illustrates this. Virus experts quickly traced this virus to the Philippines. Using Information supplied by an Internet service provider, agents from the Philippines’ National Bureau of Investigation and from the FBI identified individuals suspected of creating and disseminating the ‘Love Bug’.53 However, they ran into problems with their investigation: The Philippines had no ICTs laws, so creating and disseminating a virus was not a crime.54 Therefore, the law enforcement officers had no hard time convincing a magistrate to issue a warrant to search the suspects’ apartment.55 Later on the suspected author of the virus could not be prosecuted under the repertoire of offences defined by the Philippines criminal code. 56

On such a basis cybercrime’s ability to morph into new and different forms of antisocial activity that evade the reach of existing penal law creates challenges for legislations around the world. 57 Criminals58 have the ability of exploiting gaps in their won country’s penal law in order to victimize their fellow citizens with impunity. 59 Also, cybercriminals can exploit gaps in penal laws of other countries in order to victimize the citizens of those, and other, nations; as the ‘Love Bug’ episode demonstrated, cybercrime is global crime.60


1.2 The Scope of the Phenomenon

Knowing how much crime is committed might help us decide on how much to spend on security. Estimates by security experts of annual losses from computer crime range from $ 555 million to more than $ 13 billion,61 but there are actually no valid statistics on the losses from this type of crime, because no one knows how many cases go unreported.62 Even when the victims of computer crimes are aware of the crimes, they are usually relocated to report their losses- especially if those losses can be easily hidden.63 Victims can lose more from reporting crimes than they lose from the crimes themselves. Embarrassment, key staff diverted to prepare evidence and testify, legal fees, increased insurance premiums, and exposure of vulnerabilities and security failures can all result from reporting computer crime incidents. 64

However, the results of national surveys bear out the picture that cybercrime is consistently and dramatically on the increase.65 One of the famous cited national surveys for the United States is the ‘Computer Crime and Security Survey’ conducted by the Computer Security Institute 66 with the participation of the San Francisco branch of the Federal Bureau of Investigation’s Computer Intrusion Squad. 67 The CSI/FBI survey which has been conducted in 2004 – reports the results questionnaire administrated to 494 computer security practitioners in U.S corporations government agencies, financial institutions, medical institutions and universities. One area the survey explores is security breaches; the questionnaire asks the respondents if they have experienced breaches of information security in the last year. 68 The percentage of the respondents answering that their organization experienced unauthorized use of computer systems in the last 12 month declined to 53 percent, the smallest percentage since this question first appeared in the survey in 1999. Moreover, the percentage of respondents answering that there was no unauthorized use of their organization’s computer systems increased to 35 percent as the respondents not knowing if such unauthorized use occurred dropped to a low of 11 percent.

The year 2004 showed the lowest percentage (12 percent) of respondents estimating that organization experienced more than ten computer security incidents during the past year. The survey provides a visual demonstration that attacks of computer systems or misuse of these systems has been slowly, but fairly steadily decreasing over many years in nearly all categories. In fact, there has been a dramatic drop in reports of system penetrations, insider abuse and theft of proprietary information.

Data from other countries reveal similar trends. According to a November 2000 report from the United Kingdom:69

‘Cybercrime accounted for half of all fraud committed in the UK in the first six months of this year, according to a legal expert. Steven Philippsohn, senior litigation partner at law firm Philippsohn, Crawfords, Berwald, said this figure would rise as it becomes easier for criminals to break online security. Speaking at the Compsec computer security conference in London last week, he said: The internet is a criminal’s charter. There is an increasing number of targets and despite what people say, buying online is not the same as giving your credit card to someone in a restaurant. In that scenario, maybe 10 people will see your credit card details. The minute you put those details on to a website and that site is hacked, the information can be accessed by millions if not billions around the world. Philippsohn said it is cheap for fraudsters to set up an online scam. They don’t need premises, and they can set up a website claiming anything they like and give a very good impression of what can be an absolute scam. He said there has been a 56 per cent increase in hacking in the UK over the past 12 months, with most hackers seeking financial gain, for example by using their hack to demand money, or for political reasons such as posting messages for a certain cause on a company’s website’.

In Japan and china, studies showed high increases in cybercrime.70 From its part, the Australian version of the CSI/FBI survey 2004 found that: ‘more respondants organizations experienced electronic attacks that harmed the confidentiality integrity or availability of network data or systems (49% in 2004 compared to 42% in 2003)’.71 It also remarked that: ‘Most of these attacks were again sourced externally (88%) compared to internally ( only 36%) , but fewer respondents experienced external attacks compared to 2003 ( 91%)’ . 72 The survey showed that: ‘Infections from viruses, worms or Trojans were the most common form of electronic attack reported by respondants for the third consecutive year. They were the greatest cause of financial losses and accounted for 45% of total losses for 2004. 73 In fact, the value of these surveys is perhaps more anecdotal than scientific.74 As almost everyone concedes, it is difficult to gather accurate cybercrime statistics. 75 On such a basis PARKER states: “In reality, we have no valid statistics on cybercrime frequency or size of loss. Even if there were valid statistics on cybercrime, beyond helping with actuarial insurance rate structures and legislation, they would be of little use to a particular organization for its own risk assement. Each organization’s circumstances differ significantly from the average incident represented in the statistics. Unfortunately, the limited surveys that are conducted on cybercrime are often conducted by individuals who are unfamiliar with cybercrime. Each survey respondent has a different definition of cybercrime and may be unaware of what actually happened, how it happened, or what the actual losses were. In addition, many victims do everything they can to avoid revealing their actual losses.76

Confirming this, KABAY states that’s ‘a commonly-held view within the information security community is that only one-tenth or so of all the crimes committed against and using computer systems are detected’. 77 He also declares that:

[E]ven if attacks are detected, it seems that few are reported in a way that allows systematic data collection.  This belief is based in part on the unquantified experience of information security professionals who have conducted interviews of their clients; it turns out that only about ten percent of the attacks against computer systems revealed in such interviews were ever reported to any kind of authority or to the public.  The Department of Defence studies mentioned above were consistent with this belief; of the few penetrations detected, only a fraction of one percent were reported to appropriate authorities.78

Most experts believe that common forms of computer related crime are significantly underreported because ‘victims may not realize that they have been victimized, may not realize that the conduct involved in a crime, or may decide not to complain for reasons of embarrassment or corporate credibility’.79 Other reasons for the under-reporting of cybercrime are that ‘Further problems arise with the mass victimization caused by offences such as virus propagation, because the number of victims are simply too large to identify and count, and because such programs can continue creating new victims long after the offenders have been caught and punished’. 80 Finally, a factor complicating the gathering and comparison of national crime statistics will be the fact that transnational computer related crimes are, by definition committed in or have effects in at least two States risking multiple reporting or no reporting at all. 81 Thus, much of the information we have on cybercrimes is the product of studies and surveys addressed to individuals working in information security. 82 On such a basis the obvious problem that survey results include only the respondents of people who agreed to participate.83  Before basing critical decisions on survey information, it is important to find out what the response rate was; although there are no absolutes, in general we aim to trust survey results more when the response rate is high.84  However, response rates for telephone surveys are often less than 10%; response rates for mail and e-mail surveys can be less than 1%.85  It is not easy to make any case for random sampling under such circumstances, and all results from such low-response-rate surveys should be viewed as indicating the range of problems or experiences of the respondents rather than as indicators of population statistics. 86

As to the problems noted above, a research firm estimated in 2001 that ‘Cybercrime today is focused on corporate espionage and financial gain. There are no guns or violence and the perpetrator is nowhere near the scene: in fact, most of the time they aren’t even in the same country! Gartner Group is already predicting that the financial damage caused by cybercrime will increase by between 1000 and 10,000 per cent by 2004’.87 Also, at a Berlin conference of 100 Internet experts from the G8 group of industrialized nations in October 2000, J. FISCHER German Foreign Minister declared that cybercrime losses have reached 100 billion German marks for the eight major countries including the U.S. 88

As to the effects of cybercrime, it is, at the very least, safe to agree with the position the European Commission took in launching a cybercrime initiative: 89 While conceding that ‘ there is a little doubt that these offences constitute a threat to industry investment and assets, and to safety and confidence in the information society’. 90 The Commission states ‘it is necessary that substantive law in the area of high tech crime is approximated’. 91 European leaders called during the special EU-summit in Tampere (1999) for common definitions, incriminations and sanctions in the area of high tech crime’.


Download 373.67 Kb.

Share with your friends:
  1   2   3   4   5   6   7




The database is protected by copyright ©ua.originaldll.com 2024
send message

    Main page