Lecture 8 - Cybercrime Flashcards
What is a Crime?
Nullum crimen sine lege: no crime without law
- Act, activity, behaviour prohibited by law
- Punished with penalties and sanctions
- Defined mostly in the national law of sovereign states (except international crimes)
What is Substansive and Procedural law?
What is Substantive and Procedural law?
Substantive law: what crime is
Procedural law: how to investigate crime
What are the three types of crime
Three types of Cybercrime:
- New types of crime – CYBER DEPENDENT CRIME
o Crimes that didn’t exist before computers and networks
- Migration of traditional crime online -CYBER ENABLED CRIME
o Computers and networks used to facilitate commission of traditional crimes
- Any crimes that leaves digital traces -INVESTIGATION FRAMEWORK
o Digital investigations and digital evidence, access to data
How to define cybercrime?
3 Perspectives
- Substantive criminal law ( nullum crimen sine lege):
o definition of specific “cyber” crimes should be very precise
- Crime investigation and digital evidence
o definition of cybercrime should be sufficiently broad:
to apply procedural frameworks developed to fight cybercrime to other criminal investigations in cyberspace
to guarantee protection human rights in digital investigations
- UNAC United Nations Convention against Corruption
o No definition? Not an issue
What is the relation between internet and crime
- Crime is not new
- Global information and communication networks (target and tool): unique opportunities to commit crimes
- Opportunities for crime in cyberspace = unique challenges for crime prevention, detection, and investigation
What are the opportunities for crime in cyberspace?
- Number of users and interconnected devices
o “When everything is connected, everyone is vulnerable” Marc Goodman. 2015. Future Crimes. P. 13 - International dimension
o Fragmented across the globe - Missing mechanisms of control
o Fragmented across the globe - Automation and innovation
- Availability of tools and information
o Deepfakes –
o Password-guessing tools
o Malware written by Large Language Models
o Large Language Models facilitating spear phishing campaigns
o AI models for crime: FraudGPT, WormGPT.
What is the economical model of cybercrime?
- Profit-driven
- Commodities: data/information and resources
- Services: “outsourcing” crime
- Automation of attacks and operations
How do criminals Mimicking legitimate businesses
- Darknet markets
o Crimeware (cyber and services)
o Drugs
o Stolen identities
o Forged documents
o Weapons
o Other illegal goods - CaaS/C2C
o Criminal 2 Criminal and Crime as a Service
o subscriptions, “customer” support, trials, money back guarantee
What is the I love you virus?
Casestudy: I love you virus:
- Created in Philippines, spread around the world within few hours- 45 million users- 20+ countries- Damage: $2-10 billion
- Who did it?
o Traced to Philippines (Onel de Guzman)
- What to do?
o Philippines: no law on hacking or distribution of viruses
o Charges: theft and credit card fraud (dropped)
o Double criminality: no extradition
What are safe havens?
Safe havens: countries with no cybercrime legislation/weak cybercrime laws
What elements do you consider when harmonizing cybercrime legislation?
- Substantive law
a. What is cybercrime
i. Reaching consensus: what types of crimes? What is crime? “cybercrime”?
ii. How specific “cyber” crimes should be?
iii. “Technology neutral” laws? - Procedural law
a. Instruments for investigation - Mutual legal assistance
a. How to transfer evidence cross-border - Jurisdiction
a. Whose laws apply? - Old laws / new laws?
a. Updating laws or creating new laws?
What are approaches to conceptualising cybercrime: what is criminalized?
- Ideological differences between countries
- Cybersecurity: illegal content vs techno-centric approach
- Different views on internet and cybersecurity/information security:
o Open, free, secure internet
o Expansion of state power and control - Result: “Morality” crimes, expansion of the “speech”crimes, conceptualising cybercrime as content crimes
Sketch the cybercrime legislation harmonization timeline.
- 1986 OECD
o List of acts - 2001 Council of Europe
o Council of Europe’s Convention on Cybercrime (Budapest convention)
Criminalisation (Substantive criminal law: list of crimes) - (1) CIA* offences: illegal access, illegal interception, data and system interference, misuse of devices
- (2) Computer-related offences: forgery and fraud
- (3) Child pornography
- (4) Infringements of copyright and related rights
Investigation (Procedural law) - Preservation and partial disclosure of data, search and seizure, production order, interception of content data and real-time collection of traffic data
Cooperation - Facilitating cross-border mutual legal assistance
Jurisdiction - Some provisions on jurisdiction
- 2001-2014
o Patchwork of different frameworks
Arab league, African Union, Shanghai Cooperation Organisation and others - 2019 United Nations
o General Assembly resolution
ITU (International Telecommunications Union) - Cybercrime guide for developing countries (2009-2015)
- Toolkit for cybercrime legislation (2010 – 2012)
UNODC (United nations office on drugs and crime) - Open ended intergovernmental expert groups (GA Resolution 65/230, 210)
- Comprehensive study on cybercrime 2013
Russian-Chinese proposal, Dec 2019 - Resolution on cybercrime: Russian-led, Chinese-backed
- Adopted by 79 votes to 60 with 33 abstentions
UN Cybercrime treaty: controversies - Crime control as an instrument for oppression and greater control over the internet
- What is cybercrime?
- Safeguards in criminal investigations
- Legitimising oppressive practices
- Ambitious timeline
What are the challenges of digital evidence?
- Challenges
o Vulnerability of digital evidence
o Encryption
o How to prove the link between a criminal and a mediating device
o Procedural law: adoption of special instruments (interception of content data, quick preservation, production orders) + digital forensics
o Seamlessness and intrusiveness: how to protect privacy and other fundamental rights
What is the transborder component of cybercrime legislation
- Transborder component
o Many “domestic” cases in physical world when only evidence is abroad
o Harmonisation of substantive criminal law cannot guarantee mutual legal assistance in criminal procedure
o How to obtain data quickly