Black Hat 2000 – Amsterdam Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer Stisa Granick Attorney at Law 368 Hayes.
Download
Report
Transcript Black Hat 2000 – Amsterdam Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer Stisa Granick Attorney at Law 368 Hayes.
Black Hat 2000 – Amsterdam
Legal & Political Issues in International Computer Crime Investigation & Prosecution
Jennifer Stisa Granick
Attorney at Law
368 Hayes Street
San Francisco, CA 94102
USA
415-283-4805
[email protected]
Internet Crime is International Crime
The Internet is an international medium
The Internet connects far-flung offenders with far-flung victims
Perpetrator and victim can be in same country, but evidence is
located in other country or countries
International Investigation: Poses Procedural Difficulties
Reliance on local investigators: Training issues
Cooperation: between governments and with LE agencies
Quick access to evidence or suspects
Resources available for investigation
International Investigation: Poses Procedural Difficulties
Record keeping/Collection and Preservation of data
Real time data interception and auditing
Trans-border searches
Sovereignty
Privacy
Notice to foreign government, to suspect
Jurisdiction and extradition
The Law Right Now
Mutual Legal Assistance Treaties (MLATs)
Letters rogatory
The future: multilateral agreements and compacts
International Investigation: Substantive Issues
Do countries agree on what is a “cyber crime”?
Access
Tampering
Sabotage
Use
Fraud
Espionage
Privacy violation
Damage/theft
Intellectual property violations
Child pornography
International Investigation: Benefits of Consensus
No country is a “safe haven” for criminals
Consensus is a basis for cooperation to solve and prosecute crime
Consensus Can Be Bad
No “laboratory” to learn what approach furthers network security
Substantive agreement without greater agreement on human rights,
due process, etc. can result in injustice
Currently Proposed Legal and Political Solutions
Private Sector
Promote Cyber-ethics
Sysops manage private networks in a secure fashion
Vendors put out secure products
Multilateral Agreements
Council of Europe: Cyber Crime Convention:
conventions.coe.int/treaty/EN/projets/projets.htm
Group of Eight
Council of Europe’s Draft Cybercrime Treaty Provisions
Treaty Addresses:
definition of offenses
jurisdiction
international cooperation
search and seizure
Encourages signatories to pass domestic laws in accordance with
the convention’s principles and definitions
Coordinated criminalization of:
“hacking” and “hacking tools”
child pornography
copyright infringing materials
COE Cybercrime Treaty : Procedural Provisions
Search and seizure by local authorities
Requires preservation and production of digital evidence
Interception of data/ real time communications
Requires the assistance and cooperation of sysops and ISPs
COE Cybercrime Treaty : Procedural Provisions
International assistance for
Preserving evidence
Locating suspects
Trans-border searches
Traditional mutual legal assistance and extradition
G-8’s 24/7 proposal
COE Cybercrime Treaty : Controversial provisions
Article 6 – Illegal Devices:
Makes it a crime to create, download, or post any computer program that
is “designed or adapted [primarily]” to gain access to a computer
system without permission, or to delete or alter data.
Article 9 – Child Pornography:
Internationalizes a U.S. law that makes it a crime to possess digital
images that "appear" to be child pornography
Article 16 – Preservation of Traffic Data:
International Working Group on Data Protection in Telecommunications
(Group of EU Privacy Commissioners) criticized requiring preservation
of traffic data.
COE Cybercrime Treaty : Controversial provisions
Article 14 –Search and Seizure & Article 15 – Production Order:
Requires subject to process data under his/her control and yield the
information necessary to the authorities
Requires person with knowledge to seize and secure data for
investigators
? Encryption Keys
? U.S. Constitution, Amendment 5, Self-Incrimination
Article 21 – Extradition:
Provides for extradition for enumerated offenses
Group of Eight : Recent Activity
Main accomplishment : 24/7 network
Main Dispute: Whether to create an international LE organization
for cybercrimes. Supported by U.S., disapproved by France
Principles agreed on:
ensuring the protection of individuals freedoms and private life,
preserving governments' ability to fight high tech crime,
facilitating appropriate training for all involved,
defining a clear and transparent framework for addressing cybercriminality,
ensuring free and fair activities, the sound development of industry, and
supporting effective industry initiated voluntary codes of conduct and
standards,
assessing effectiveness and consequences.
International Aspects of Cybercrime: Conclusion
International cooperation is the trend
Consensus is being crafted, but cautionary voices are being
ignored
Ramifications of decisions made now are far reaching
The benefits of consensus will only outweigh the detriments if we
are more careful
Black Hat 2000 – Amsterdam
Legal & Political Issues in International Computer Crime Investigation & Prosecution
Jennifer Stisa Granick
Attorney at Law
368 Hayes Street
San Francisco, CA 94102
USA
415-283-4805
[email protected]