1 / 18

Legal guidelines for private-public partnership in combating cyber-crime Andrzej Adamski

Legal guidelines for private-public partnership in combating cyber-crime Andrzej Adamski Chair of Criminal Law & Criminal Policy Law Faculty Nicholas Copernicus University, Toruń, Poland aadamski@law.uni.torun .pl. Overview.

caitir
Download Presentation

Legal guidelines for private-public partnership in combating cyber-crime Andrzej Adamski

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Legal guidelines for private-public partnership in combating cyber-crime Andrzej Adamski Chair of Criminal Law & Criminal Policy LawFaculty Nicholas Copernicus University, Toruń, Poland aadamski@law.uni.torun.pl

  2. Overview • Growth of on-line behaviors including anti-social and criminal behaviors, • Criminalization as a response, • Unparalled trends in cybercrime and its prosecution, • Drift to vigilante control of cybercrime, • Legal „pros” and „cons” of private-public partnership in combating cybercrime.

  3. Reported network incidents by internet users (1997-2003) Poland, telecom data

  4. Law in the books – 1997 penal code • Most of the computer-related infringements that compose „the minimum list” of the1989 Council of Europe recommendation were criminalized in Poland under the 1997penal code: • unauthorised access • computer eavesdropping • data interference • computer sabotage • computer fraud • computer forgery • unauthorised reproduction of a protected computer program

  5. Law in action a. Prevalence of computer security attacks : telecom data(2002) • 30,000reported incidents against network security: port scanning, attempts of unauthorized access, break-ins, theft of information incl. passwords, destruction and modification of data. • Most reports (60%) from abroad. • Others (40%) 10,000 - 12,000 from Poland • baseline: 12, 000 = 100% b. Official reaction against CIA crime: law enforcement data (2002) 400crimes known to the police rate: 3% 23cases prosecuted (2001-2002) rate: less than 1 per cent (0,19 %)

  6. Internet-related offences (N=658) prosecuted in Poland (2001-2002)

  7. Law reform – Cyber-crime Convention new offences: misuse of devices, system interference, possession of child pornography. new procedural measures: search & seizure of computer system/data, preservation of data, production order. will this change much?

  8. Partnership is essential to combating cyber-crime!(EURIM) PARTNERSHIP between whom? A. NATIONAL LEVEL -police and victims of crime; -internet users, hotlines and the police; - police and ISPs, telecom operators, hotlines. E-crime is an international problem, and requires international cooperation to combat it. B. INTERNATIONAL LEVEL - Law enforcement (24/7 contact points), criminal justice authorities; - ISPs, telecoms, hotlines

  9. Official control of cyber-crime • reactive mode incident  victim/ third partyreporting to: the policeIAP, ISP, hotline; b)pro-active mode entrapment : bogusweb sites, role playing, masquerade; c)peace-keeping mode - patroling the net.

  10. Vigilante models of cyber-crime control • Intermediary – passive, contact point, LE collaborative; • Admonitory– reactive, warning and reprimand, LE collaborative; • Investigatory, pro-active, LE collaborative; • Punitive– both pro-active and reactive, stigmatisation, pillory, LE non-collaborative.

  11. Contact point model („hot lines”) • information clearinghouse and referral system between the general public and law enforcement agencies, or other hotlines; • running of database where the illegal/harmful materialcan be assessed and forwarded to LE; • co-operation with law enforcement authorities based on agreement; • transparent mission and functioning

  12. Contact point model –legal constrains - unclear legal status, - data protection constrains (processing of offender data), - illegal activities (downloading and possession of child pornography) , - difficulties in cooperation between law enforcement hotlines and non-law enforcement hotlines, - monitoring of one-to-onecommunications, - risk of ‘mala fide’ hotlines(Jos Dumortier)

  13. Admonitorymodel„POLPAK”ABUSE TP TEAM Reporting of on-line incidents to Internet Access Providerhttp://www.tpnet.pl/eng_ver/abuse.php Incidents should be reported in the following manner: • using an online report form • via e-mail addressed to: abuse@telekomunikacja.pl, abuse@tpnet.pl PROCEDURES - response : • Logging and classification of the report. • Location of source of event (attack):- IP, date;- telephone number;- home or company street address. • Dispatch of warning (appropriate to the event). • Submission of request to the Police (if the event concerns the resources of TP). • Blocking the access to Internet. • Blocking the telephone number.

  14. Admonitorymodeladvantages and constrains persuasion, rather than repression, approachrelatively rational and criminologically sound(youthful nature of much IT abuse); fair and lawful.  unknown effectiveness;  high costs,  limited applicability.

  15. Investigatory model Private policing by volunteers -provocation & entrapment: „The law is deficient. Police has no legal tools for the efficient prosecution of cyber-paedophiles. Entrapment by the police is not allowed. However, it is not prohibited to ordinary citizens. So ..... Let’s do it!”

  16. Investigatory modelpros & cons some general preventive effects. inexperience may be harming- dealing with child pornography, child sex abusers, or with the victims of child sex abuse, is no place for amateurs(John Carr). risk of unlawful conduct, Polish penal code: • Article 24. Whoever incites another person to commit a prohibited act, in order to direct criminal proceedings towards such a person, shall be liable as for instigating (...)

  17. Punitive model http://perverted-justice.com/volunteers pose as kids in chat rooms, and when an adult engages them in sexual banter, they publish the person's personal data on the site so the group's supporters can harass the adult by phone and e-mail.

  18. Conclusions • Private-public partnership in combating cyber-crime is indispensable, • It must be based on internationally recognized normative standards and clear procedures, • They are required for the lawful and efficient co-operation of the partners.

More Related