26
International Cooperation International Cooperation in in Combating Cyber Combating Cyber- -Crime Crime Donald K. Piragoff Donald K. Piragoff Department of Justice, Canada Department of Justice, Canada June 23, 2003 June 23, 2003

Combat Cyber Crime

  • Upload
    kikipol

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 1/26

International CooperationInternational Cooperation

ininCombating CyberCombating Cyber--CrimeCrime

Donald K. PiragoffDonald K. Piragoff

Department of Justice, CanadaDepartment of Justice, Canada

June 23, 2003June 23, 2003

Page 2: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 2/26

2

International NatureInternational Nature Access/mobility of data fundamental to Access/mobility of data fundamental toeconomic systemseconomic systems

Borders byBorders by--passedpassedExploitation by criminals & terroristsExploitation by criminals & terrorists

data hidden abroaddata hidden abroad

hackers and viruses abroadhackers and viruses abroad

economic criminals abroadeconomic criminals abroad

illegal content abroadillegal content abroad

communicate to plancommunicate to plan

Cont¶d 

Page 3: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 3/26

3

International NatureInternational NatureMinimal risk of detection andMinimal risk of detection and

apprehensionapprehension

Different national lawsDifferent national laws

Crime is borderless but enforcement isCrime is borderless but enforcement is

constrained by bordersconstrained by borders

International cooperation is essentialInternational cooperation is essential

Page 4: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 4/26

4

Harmonization of National LawsH

armonization of National LawsCommon framework requiredCommon framework required

But , no universal consensus of:But , no universal consensus of:

types of ´computer crimeµtypes of ´computer crimeµ

set of procedural powersset of procedural powers

specifics of definition or scopespecifics of definition or scope

Cont¶d 

Page 5: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 5/26

5

Harmonization of National LawsH

armonization of National LawsLack of harmonization creates problems:Lack of harmonization creates problems:

no common understanding of problem and howno common understanding of problem and how

to respondto respond

sovereignty (e.g., transsovereignty (e.g., trans--border search)border search)

dual criminalitydual criminality

treaties may not include necessarytreaties may not include necessaryinvestigative powersinvestigative powers

Cont¶d 

Page 6: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 6/26

6

Harmonization of National LawsH

armonization of National LawsNo truly international foraNo truly international fora

Problems regarding internationalProblems regarding international

cooperation intercooperation inter--related withrelated with

harmonization of substantive & proceduralharmonization of substantive & procedural

lawlaw

Page 7: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 7/26

7

InterInter--relation withrelation with

procedural lawprocedural lawInternational investigative powers areInternational investigative powers arecoextensive with domestic powers:coextensive with domestic powers:

search or production of datasearch or production of data preservation of stored datapreservation of stored data

collection of traffic datacollection of traffic data

interception of communicationsinterception of communications

Obtain evidence and traceObtain evidence and tracecommunicationscommunications

Page 8: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 8/26

8

Legal Framework forLegal Framework for

International CooperationInternational CooperationMutual legal assistanceMutual legal assistance

scope of cooperationscope of cooperation

mechanics of cooperationmechanics of cooperation general obligationsgeneral obligations

specific investigative powersspecific investigative powers

ExtraditionExtradition dual criminalitydual criminality

nationalitynationality

Page 9: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 9/26

9

Mutual Legal Assistance:Mutual Legal Assistance:

Scope of cooperationScope of cooperationScope of offencesScope of offences

crimes against access, integrity & availabilitycrimes against access, integrity & availability

crimes committed by means of computerscrimes committed by means of computers

 ²  ² facilitate communication crimesfacilitate communication crimes

 ²  ² facilitate communication to plan crimesfacilitate communication to plan crimes

collect electronic evidence of any crimecollect electronic evidence of any crimeTypes of investigative powersTypes of investigative powers

approximate domestic powersapproximate domestic powers

Cont¶d 

Page 10: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 10/26

10

Mutual Legal Assistance:Mutual Legal Assistance:

Mechanics of cooperationMechanics of cooperation

Conventions are generally independent ofConventions are generally independent of

bilateral or other treatiesbilateral or other treaties

Council of Europe ConventionCouncil of Europe Convention -- hybridhybrid

convention serves as basisconvention serves as basis

existing treaties take precedenceexisting treaties take precedence

convention supplements or applies in absenceconvention supplements or applies in absenceof other treatiesof other treaties

Page 11: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 11/26

11

Mutual Legal Assistance:Mutual Legal Assistance:

General obligationsGeneral obligations

 Afford MLA to widest extent possible Afford MLA to widest extent possible

MLA subject to law of requested state orMLA subject to law of requested state or

applicable treatiesapplicable treaties

If no preIf no pre--existing arrangement, supplementexisting arrangement, supplement

 with new provisions with new provisions

Page 12: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 12/26

12

Mutual Legal Assistance:Mutual Legal Assistance:

Specific powersSpecific powers

Employ both traditional and newEmploy both traditional and newinvestigative powersinvestigative powers

Preservation of stored dataPreservation of stored data

 volatility of data, inherent delays, increased volatility of data, inherent delays, increasedthreat of lossthreat of loss

provisional measure to secure availabilityprovisional measure to secure availability ²  ² rapidrapid

 ²  ² protects privacyprotects privacy

 ²  ² safeguards (e.g., intent to make MLA request; time limits)safeguards (e.g., intent to make MLA request; time limits)

Cont¶d 

Page 13: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 13/26

13

Mutual Legal Assistance:Mutual Legal Assistance:

Specific powersSpecific powers

Dual criminalityDual criminality modern trend to eliminate or restrictmodern trend to eliminate or restrict

preservation less intrusivepreservation less intrusive  verification counter verification counter--productive to quick provisionalproductive to quick provisional

measuremeasure

early stagesearly stages -- extent of criminality unknownextent of criminality unknown

Council of Europe compromiseCouncil of Europe compromise may refuse to preserve if reasons to believe that atmay refuse to preserve if reasons to believe that at

time of disclosure dual criminality can not be mettime of disclosure dual criminality can not be met

Cont¶d 

Page 14: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 14/26

14

Mutual Legal Assistance:Mutual Legal Assistance:

Specific powersSpecific powers

Expedited preservation and disclosure ofExpedited preservation and disclosure ofpreserved traffic datapreserved traffic data

essential to trace communicationsessential to trace communications

traffic data reveals source, path and destination of atraffic data reveals source, path and destination of aspecific communicationspecific communication

multiple service providersmultiple service providers

 ²  ² preservation at each service providerpreservation at each service provider ²  ² disclosure of sufficient amount of data to identify next servicedisclosure of sufficient amount of data to identify next service

provider and pathprovider and path

crosscross--border and MLA border and MLA 

Cont¶d 

Page 15: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 15/26

15

Mutual Legal Assistance:Mutual Legal Assistance:

Specific powersSpecific powers

Search, access and disclosureSearch, access and disclosure apply to electronic dataapply to electronic data

system searchessystem searches avoids transavoids trans--border searchborder search

RealReal--time collection of traffic datatime collection of traffic data historical tracing may not be possiblehistorical tracing may not be possible

crime may require immediate tracingcrime may require immediate tracing crosscross--border and MLA border and MLA 

Council of EuropeCouncil of Europe -- reservationreservation

Cont¶d 

Page 16: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 16/26

16

Mutual Legal Assistance:Mutual Legal Assistance:

Specific powersSpecific powers

Interception of content dataInterception of content data

content may be illegal or afford evidence ofcontent may be illegal or afford evidence of

crimecrime

privacy issuesprivacy issues

Council of EuropeCouncil of Europe

 ²  ² only to extent permitted by Parties· laws andonly to extent permitted by Parties· laws andtreatiestreaties

 ²  ² convention not provide independent basisconvention not provide independent basis

Cont¶d 

Page 17: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 17/26

17

Mutual Legal Assistance:Mutual Legal Assistance:

Specific powersSpecific powers

SafeguardsSafeguards

subject to law of requested statesubject to law of requested state

safeguards in definition of powerssafeguards in definition of powersCouncil of EuropeCouncil of Europe

subject to national safeguards, which must:subject to national safeguards, which must: ²  ² protect human rights under applicable conventions betweenprotect human rights under applicable conventions between

PartiesParties

 ²  ² provide proportionality, judicial or other supervision,provide proportionality, judicial or other supervision, justifying grounds, limitations on scope and duration justifying grounds, limitations on scope and duration

consider impact on third partiesconsider impact on third parties

Page 18: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 18/26

18

ExtraditionExtradition

Dual criminality and harmonization of lawDual criminality and harmonization of law

Council of EuropeCouncil of Europe

convention may serve as basisconvention may serve as basis

precedence given to existing treatiesprecedence given to existing treaties

refusal on grounds of nationalityrefusal on grounds of nationality

 ²  ² obligation to investigate and prosecuteobligation to investigate and prosecute

Page 19: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 19/26

19

G8G8

Washington, D.C., 1997:Washington, D.C., 1997:

Principles and Action Plan to Combat HighPrinciples and Action Plan to Combat High--techtech

CrimeCrime

Moscow, Russia, 1999:Moscow, Russia, 1999:

Principles on Transborder Access to StoredPrinciples on Transborder Access to Stored

Computer DataComputer Data

Page 20: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 20/26

20

G8G8

Mont Tremblant, Canada, 2002:Mont Tremblant, Canada, 2002:

Recommendations for Tracing NetworkedRecommendations for Tracing Networked

Communications Across National Borders inCommunications Across National Borders inTerrorist and Criminal InvestigationsTerrorist and Criminal Investigations

Prinicples on the Availability of Data EssentialPrinicples on the Availability of Data Essential

to Protecting Public Safetyto Protecting Public Safety

G8 Statement on Data Protection RegimesG8 Statement on Data Protection Regimes

Data Preservation ChecklistsData Preservation Checklists

Page 21: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 21/26

21

CommonwealthCommonwealth

Model Law on Computer Related Crime,Model Law on Computer Related Crime,

20022002

Guide to assistGuide to assist

Influenced by text of Council of EuropeInfluenced by text of Council of Europe

ConventionConvention

Common framework with Council of EuropeCommon framework with Council of Europe

Page 22: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 22/26

22

2424--7 Network 7 Network 

Need for coordinated law enforcementNeed for coordinated law enforcement

contactscontacts

G8G8

Council of EuropeCouncil of Europe

Page 23: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 23/26

23

InterInter--American Conventions American Conventions

Consider extent to which ConventionsConsider extent to which Conventions

require amendment or protocol to:require amendment or protocol to:

incorporate new investigative techniquesincorporate new investigative techniques

supplement existing bilateral treatiessupplement existing bilateral treaties

provide additional safeguardsprovide additional safeguards

24/7 Network 24/7 Network 

Page 24: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 24/26

24

RecommendationsRecommendations

 Agree to common concepts of crime Agree to common concepts of crime

 Agree to common list of investigative Agree to common list of investigative

powerspowers

Investigative powers should:Investigative powers should: apply not only to computerapply not only to computer--related crime but torelated crime but to

collection of evidence of any crimecollection of evidence of any crime balance powers with privacy and human rightsbalance powers with privacy and human rights

provide ability to trace communicationsprovide ability to trace communications

be available for MLA be available for MLA 

Cont¶d 

Page 25: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 25/26

25

RecommendationsRecommendations

 Afford cooperation to widest extent Afford cooperation to widest extent

Ensure extradition relations preventEnsure extradition relations prevent

computer crime havenscomputer crime havens

Page 26: Combat Cyber Crime

8/8/2019 Combat Cyber Crime

http://slidepdf.com/reader/full/combat-cyber-crime 26/26

26

ConclusionConclusion

Improving international cooperationImproving international cooperation

requires:requires:

harmonization of substantive lawharmonization of substantive law

common set of investigative powerscommon set of investigative powers

application of investigative powers to MLA application of investigative powers to MLA 

arrangementsarrangements adequate and flexible MLA and extraditionadequate and flexible MLA and extradition

arrangementsarrangements