Regulating Cybercrime Flashcards
anonymity online?
the use of proxy servers, encryption technology, and anonymous email accounts facilitates the ability to conceal one’s identity online.
What is cybercrime?
ybercrime refers to crimes committed through the use of computers, computer networks, or other forms of information and communication technology (ICT).
What are the two main categories of cybercrime?
Cyber-dependent crimes, which can only be committed through the use of technology
Cyber-enabled crimes are traditional crimes that have been increased in scale or reach by using technology.
What are some challenges in regulating cybercrime?
The networked nature of communication makes tracing difficult
Data may be stored in jurisdictions with lax regulation
Effective regulation requires a mix of legal, architectural, social norms, and market-based approaches to address cybercrime.
What is cyberterrorism?
Cyberterrorism can broadly be divided into two categories: situations where technology is used to facilitate the activities of terrorists and the use of computer network tools to harm or shut down critical national infrastructures.
What are some challenges in collecting statistical data on cybercrime?
There is a lack of consensus on the definition of cybercrime which affects its inclusion in official crime statistics
Some crimes facilitated by technology are not distinguished from offline crimes in the statistics
Under-reporting of cybercrime incidents
Lack of expertise and resources among law enforcement agencies
Problems with data collection methods can all contribute to the difficulty in collecting accurate data.
What is the distinction between an internal and external perspective in online offending?
The internal perspective is the perception of the user inside the virtual world
The external perspective is the view of the outsider observing the computer in the physical world
Criminal law is based on physical conduct and requires the physical act and mental state of the defendant
Online offending is reduced to physical conduct, as the harm and conduct leading to it occur in the real world.
what is Lax regulation?
Definition: Regulations that are not strict or rigorous.
Criminal sanctions for online conduct generally fall into three categories
offenses against the person,
offenses against property, and
offenses against public order.
Offenses against the person, such as virtual rape, can only be prosecuted if they fall under threat, harassment or stalking statutes.
Offenses against property may be offenses relating to unauthorized access and modification of data, while offenses against public order may include hate speech or incitement to violence.
what is malware?
Malware refers to malicious software, including viruses, worms, Trojans, bots, and spyware. It is often used to gather personal information for fraud or to discover vulnerabilities to exploit. Malware is commonly disseminated through infected storage devices or via the internet through executable files or deceptive advertisements.
What is a virus?
A virus is a malicious software that infects another program and replicates itself.
Requires activation of its host to be triggered.
Can cause significant damage to computer networks, and can result in data loss or theft.
What is a worm?
A self-replicating malicious software that propagates independently.
Similar to a virus but does not need to infect another program.
Can cause significant damage to computer networks, and can result in data loss or theft.
Can breach a system and propagate independently without triggering its host.
virus vs. worm
Primary difference: viruses require activation of their host, while worms can propagate independently after breaching a system.
Both can cause significant damage to computer networks and result in data loss or theft.
Both are types of malicious software.
What are Trojans?
Trojans are malicious programs that appear to be harmless but contain a hidden function. These programs can be delivered through software, email attachments, or websites, and can be used to install a back door, allowing a hacker to gain remote access to a computer. Some Trojans are designed specifically for financial attacks, such as Man-In-The-Browser attacks during online banking sessions.
In some cases, the presence of Trojans may be used as a defense, as the defendant claims that their computer was infected with malware of which they were unaware.
Bots
Bots are programs that infect a computer and allow remote control. They can be part of a “botnet”, a group of infected computers that can carry out coordinated tasks, such as spamming, DDoS attacks, malware distribution, click-fraud, and identity theft.
spyware
Spyware: a type of software that monitors a computer user’s activities and can collect personal and financial information without the user’s knowledge; can range from adware to more malicious programs designed for covert surveillance
DoS attack
DoS (Denial of Service) attack: a malicious effort to overload a network, server, website or computer, and cause it to crash, thus denying access to legitimate users.
DDoS attack
DDoS (Distributed Denial of Service) attack: the most sophisticated form of DoS attack, involving enlisting other computers to attack the target.
Challenges of cybercrime
Scale: Enormous scale due to the large pool of potential offenders and victims.
Accessibility: Technology is almost everywhere, making it accessible for both offenders and victims.
Anonymity: Criminals try to stay anonymous, and this possibility increases in cybercrime, making it hard to find a person behind a cybercrime attack.
Portability and Transferability
Global Reach: Cybercrime often has an international character, making it difficult to assess the case.
Absence of Capable Guardians: There is a lack of effective substantive criminal law, which has to do with prosecution.
types of cybercrime
Individual Cyber Crimes: Targeting individuals.
Organizational Cyber Crimes: Targeting organizations.
Property Cybercrimes: Targeting property such as credit cards or intellectual property rights.
Society Cybercrimes.
Article 6 Convention on cybercrime :
Art 6 CoC deals with the misuse of devices
Tools and programs are criminalised in art 6 CoC, however under 1(a) and 2 manuals on how to misuse devices could also be included through interpretation
It is up to national law to decide whether it falls or not.
Computer related forgery
Article 7 CoC
input, alteration, deletion, or suppression of computer data, resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless of whether or not the data is directly readable and intelligible. A Party may require an intent to defraud, or similar dishonest intent before criminal liability attaches.
explanation:
It does not have to be tangible, and it does not have to be directly readable and intelligible.
Art 225 DPC -> general forgery
Falsification of digital documents falls under this provision (dutch case law)
Art 232 DPC -> forgery of payment cards
Used for cases of skimming, not like the one above bc in 225 the requirements is ‘readable’ and cards contain codes with no meaning so are they readable? For this art this doesn’t matter bc it is specific to payment cards
Skimming is collecting data from a magnetic strip of a card and copying it in another card.
Article 8 CoC -> computer-related fraud
There has to be a loss of property
Explanatory report: “The term “loss of property”, being a broad notion, includes loss of money, tangible and intangibles with an economic value”.
Art. 326 DPC -> deception
A person who, with the intent of obtaining an unlawful gain, induces a person, by assuming a false name or a false capacity, by artful tricks, or by a tissue of lies, to surrender any property, provide a service, make available data, …
“Induce a person”: need a person to be deceived? No (according to case law)
Case law – computer-related fraud: A student put a keylogger in the computer of a teacher. The student typed their usernames and passwords, and the suspect could use their usernames and passwords. He used this information to order things online, all kinds of stuff, expensive but small. He ordered stuff and let it be sent to an address and when the delivery happened, he used a … to pick up the object. Then, he resold all the items. The police in the end found out who it was and got convicted.
Runescape case- theft of a virtual object
Theft: taking away a good or property belonging to someone else (art. 310 DPC)
Data is not considered to be a good/property under Dutch law.
Defendant argued that a virtual objects is not a good. However, Supreme Court decided that they are. Why?
Reasoning Supreme Court in Runescape case
* 3.3.2. … An intangible object may be considered a good provided it is an object that by its nature can be removed from the de facto control of another person.
- 3.6.1. The assertion that the objects are not goods because they consist of ‘bits and bytes’ is untenable. The virtual nature of these objects does not in itself preclude their being considered goods within the meaning of art. 310 of the Criminal Code (= theft). The Appeal Court’s ruling on this matter is thoroughly reasoned and is in no way incorrect in its interpretation of the law. The Supreme Court bases this conclusion in part on the fact that the appeal court established that “for the victim, the defendant and his co- accused, the possessions they collect in the game hold genuine value, which can be taken away from them” and that “this concerns items of value accumulated over the course of the game, which were obtained – or can be obtained – through time and effort” and that the victim had “exclusive de facto control” over the objects within the game environment and lost control of those objects through the actions of the defendant and the co-accused.
Difference between data and virtual object + the fact that they represent real value/money + remove the possession from one person.
Intangible object may be considered a good considering that it was removed from one person.
Why is it important to have a document (like CoC) that establishes which activities are criminal?
Because: to be able to prosecute these crimes, keeping in mind the international dimension of cybercrime. Legal certainty, also bc not all traditional provisions that apply to crime also apply to cybercrime. Because u cannot be punished unless the activity has been declared illegal (nulla poena principle).
to prevent dual criminality.
In CoC we are mainly looking at preservation, access/ collection and storage out of the steps
Digital leads that can be used when investigating
Digital leads:
(1) IP Addresses - IP addresses often do not specifically identify the device that an individual utilises, but they do provide law enforcement officials with a clue about the particular network that a person uses for his internet connection.
(2) Online Handles - a name an individual uses to interact with other individuals on the Internet
Online handles are a digital lead for three reasons. They:
(1) can allow law enforcement officials to gather publicly available information about an internet user,
(2) can direct law enforcement officials to an online service provider that may hold information about an internet user, and
(3) can enable law enforcement officials to interact (undercover) with the individual.
methods of investigation
Manual gathering of online information
Automated gathering of publicly available online information
Observation of the online behaviour of an individual
Examination of data that is on the servers/computers systems of others
Online undercover investigative methods
digital evidence
Digital evidence- any info of probative value that is either stored or transmitted in a digital form
Digital evidence can be extracted from a great variety of sources (eg storage media, computing devices, network communications, cloud…)
Can a phone be used in trial as evidence?
Information generated, stored or transmitted using electronic devices that may be relied upon in court. To guarantee that the evidence is accepted in court, it is necessary to obtain the information following very well-defined processes using specialised personnel and operating within an adequate legal framework
Procedural tools in CoC
- Expedited preservation
– of stored data
– of traffic data - Production order
- Search and Seizure
- of stored data
- of real-time
- interception
what is traffic data?
Definition of traffic data can be found in art 1(d) “traffic data” means any computer data relating to a communication by means of a computer system, generated by a computer system that formed a part in the chain of communication, indicating the communication’s origin, destination, route, time, date, size, duration, or type of underlying service
Who would preserve the traffic data? - ISPs
article 16- expedited preservation of comp data
Makes sure this data is not deleted
Right has a maximum of 90 days
If u need to keep info longer than u need to prove…
The first thing LE do is ask for data and preserve it
Computer data definition
“computer data” means any representation of facts, information or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function; - article 1(b) CoC
article 17 CoC
Article 17 - expedited preservation of partial disclosure of traffic data
Some measures of disclosure
a, ensure that such expeditious preservation of traffic data is available regardless of whether one or more service providers were involved in the transmission of that communication; and
b, ensure the expeditious disclosure to the Party’s competent authority, or a person designated by that authority, of a sufficient amount of traffic data to enable the Party to identify the service providers and the path through which the communication was transmitted.
Eg who has communicated with u, when, but not the actual content of the messages
Art 16 is about preserving data, in particular traffic data
Preservation of data in art 16 -> max 90 days but can be extended
Art 17: also about preservation and partial disclosure of traffic data
Starts releasing some of the stored data
Creates laws for partial disclosure of this data
Eg see is SP were involved, so we could ask for preservation orders of that data as well
What is the second additional protocol about?
What is the second additional protocol about?
Among other things, subscriber info and traffic data
Art 7 protocol 2: parties can make laws that can provide that a competent authority asks directly for subscriber info
We’re trying to create direct lines: directly from LE in one country to an SP in another
Data retention directive
The legal basis used was for market regulation, thus there was no law enforcement for the legal basis
This directive obliges the data to be retained so the police could access even previous data
There were no safeguards in this directive
Is this against fundamental rights?
This was the question in digital rights Ireland
The court said that the directive goes against the right to private life and data protection
As there were no limits or safeguards this resulted in mass collection of data
The directive was then revoked but some states as they have already implemented these laws still have that level of data retention.
article 18 -> production order
Gives us the definition of subscriber information, and the way for states to access it.
what if the service provider is in another country tho?
A SP offering its services has to submit subscriber info relating to such services in the SP Possession or control
Why do we have to stop at subscriber data?
The countries negotiating were also thinking about their national laws
If art 18 allowed to order the SP to submit all the info that they had we would have difficulties of getting any data from eg Meta, bc in the US u need a probable cause, so if there were no this we would get no data
Art 16 and 17 do not give us access to the data; they only preserve it!
Recap:
If the service provider is within the same country the national law applies, easy to ask for submission for any specified data
Difficulty when its in another country; bc difference in national laws
Some countries have a really high threshold, eg the USA
So art 18 helps- can release subscriber data
The police asking still have to abide by the national laws of that country, but the laws around subscriber data are less tight
Subscriber info we still have to abide by the rules of that country, mutual legal assistance procedure (takes time)
Mutual Legal Assistance Procedure
Mutual legal assistance procedure:
A court or judicial authority wants info from another country
From that, the request is transferred to the central authority of the country that we want the data from
Then it goes to another court, to check if it abides by their legal rules
If yes, the police collect that data from the SP
Goes back to the court
then back to the central authority
Then goes to the country asking
This takes cca 6 months
Second Additional Protocol
Second additional protocol
To not change the main text of CoC, new additions to the convention have been put in a protocol (racist and xenophobic content, and making the process of mutual legal assistance procedure faster).
Need 5 rectifications for the second protocol
Can the EU sign and ratify this?
Not a member of the council of europe, so it cannot rectify the second protocol
But all the MS can do so
What is the second additional protocol about?
Among other things, subscriber info and traffic data
Art 7 protocol 2: parties can make laws that can provide that a competent authority asks directly for subscriber info
Were trying to create direct lines: directly from LE in one country to a SP in another