Crime over the Internet

Download Report

Transcript Crime over the Internet

Perspectives for an effective
European-wide fight against
cybercrime
Anne Flanagan
Institute for Computer and Communications Law
Centre for Commercial Law Studies, Queen Mary, University of London
Introductory Remarks

Transnational crime
– Substantive & procedural harmonisation



EU: ‘First Pillar’, ‘Third Pillar’ & the Lisbon Treaty
Sanction & remedies
Policing cyberspace
– Public & private law enforcement

The role of intermediary service providers
– Council of Europe Guidelines for Co-operation (2008)
– Controlling content & monitoring communications

Safeguarding rights
Sanction and remedy

Sentencing
– statutory minimums, judicial discretion

Cyber Security Enhancement Act of 2002
– ‘aggravating circumstances’


e.g. EU Framework Decision, art. 7
Restraint orders
– Collard [2004] EWCA Crim 1664


“..prohibited from owning, using, possessing or having any access to any personal
computer, laptop computer or any other equipment capable of downloading any
material from the Internet…”
Compensation
– Civil enforcement, e.g. 18 U.S.C. § 1030(g)
Policing cyberspace

Public law enforcement
– Industrial-scale & organised crime

e.g. US Landslide investigations & the UK 7000
– Local, national & international policing structures

e.g. reporting crimes
– International co-operation

e.g. www.virtualglobaltaskforce.com
– ‘Operation PIN’
– community policing in cyberspace: ‘simply another public
place’
Policing cyberspace
– Interaction with private sector

Exchanging information
– e.g. Single Points of Contact (SPOCs)
– Prosecution expertise

And judicial training
– Pro-active intervention?

To ‘attack’ online resources
Policing cyberspace

Private law enforcement
– private prosecutions

e.g. Federation Against Software Theft (FAST)
– investigative & reporting functions


e.g. Computer Emergency Response Team (CERT)
e.g. Internet Watch Foundation
– vigilantes

e.g. US v Jarrett 338 F.3d 339 (Va., 2003)
– an ‘unholy alliance’?
Protected data


Biggest challenge for computer forensics in the
21st Century
– Access & conversion protections
Obtaining access
– Requirement to provide in intelligible form
– Requirement to hand over ‘key’



“any key, code, password, algorithm or other data”
Failure to disclose in ‘a national security case’: 5 years
Self-incrimination?
– S and A [2008] EWCA Crim 2177
Criminals and actors

Perpetrator
– a criminal type?
– motivation, opportunity & skill


From ‘script-kiddies’ to ‘überhackers’
Inchoate offences
– Attempt, conspiracy & incitement



Demanding supply
Misuse of devices, e.g. Convention, art. 6
Intermediaries
– communications service provider

limitations on liability
Intermediary liability

Service providers as gatekeepers
– User-generated content


indecent or obscene, encouragement of terrorism……
Electronic commerce Directive (00/31/EC)
– ‘mere conduit’, ‘caching’ & ‘hosting’


‘actual knowledge’
Duties to report?
– Monitoring and action


LVMH v Google (2009)
Commission review
– Content aggregation, search engines, linking
Controlling illegal content

Notice and take-down (in jurisdiction)
– Terrorism Act 2006, s. 3 ‘internet activity’


Liability for endorsement
Blocking access (out jurisdiction)
– e.g. Internet Watch Foundation




database of URLs for child sexual abuse images
Voluntary, but with threat of mandation
International reach, e.g. Google & Yahoo!
Web-based traffic, but not P2P & other services
– Problem of collateral interference

e.g. Wikipedia & Scorpions ‘Virgin Killers’
Monitoring communications

Interception of content
– For law enforcement purposes

e.g. Airline bombers, Madrid bombers
– For commercial purposes


Phorm & behavioural targeted advertising
Accessing communications data
– Attributes: Traffic, usage, location & subscriber data

e.g. 21/7 bombers (?) – from London to Italy
– Data retention: 6-24 months (Directive 06/24/EC)

Google agreement with EU
Safeguarding Rights

European Convention on Human Rights
– Fair trial (art. 6), privacy (art. 8) & freedom of
expression (art. 10)


‘chilling effect’
Derogations
– In accordance with the law

Legal certainty
– Applicable interest

i.e. national security
– Necessity and proportionality
Concluding remarks