1 / 10

CYBERCRIME

CYBERCRIME. Nigel, Lochie, Anika and Martin. International Cybercrime Law.

kasie
Download Presentation

CYBERCRIME

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYBERCRIME Nigel, Lochie, Anika and Martin

  2. International Cybercrime Law • As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law to restrict criminals from continually committing The most significant international law relating to cybercrime is the European Union’s Convention on Cybercrime. • The Cybercrime Convention has been signed by most of the members of the EU and some non-members including Japan, South Africa and the United States.

  3. Article 2: “Illegal Access” - requires parties to establish criminal offences for unauthorized access. • Article 3: “Illegal Interception” – requires parties to prohibit the intereception of transmissions from non-public (e.g. within the pc). • Article 4: “Data Interference” - requires parties to establish criminal offences for "the damaging, deleting, deterioration, alteration or suppression of computer data". • Article 5: “System Interference” - requires parties to prohibit, as criminal offences, the serious hindering of another person's computer system by "inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data." • Article 6: Requires parties to criminalise "the production, sale, procurement for use, import, distribution or making available" of illegal software programs or software intentionally created to cause harm or perform illegal activities.

  4. US v Robert Tappan Morris • Robert Tappan Morris developed a software ‘worm’ • Wanted to demonstrate certain security flaws in Unix • Wanted to demonstrate technological potential of computer worms • Intentions were not criminal but the worm he created unintentionally causes damage to the computer it is installed into • Led to $100,000s to internet server operators, and computers everywhere had to shut down to get rid of the worm. • Only crime Robert Tappan Morris was charged for was obtaining unauthorized access, and not for causing damage.

  5. Australian Cybercrime Law • The Commonwealth's Cybercrime Act 2001 offers the most comprehensive regulation of computer and internet related offences.

  6. Unlawful access and computer trespass •  The commonwealth act provides that a person who intentionally and without authority obtains access to commonwealth data is guilty of an offence. Section 76B (2). • Data includes : • Security, defence or international relations of Australia; • Confidential sources of info relating to enforcement of Australian crime law • Enforcement of Australian law • Protection of public safety • Personal affairs of any person • Trade secrets • Records of financial institution • Commercial information

  7. Damaging data and impeding access to computers • IT is also an offence if a person alters information stored on a computer or to impede access to a computer. • New South Wales Crimes Act states that a person who intentionally and without authority destroys, erases or alters data stored, inserts data or interferes with is liable to imprisonment or a fine or both (Sections 308C and 308D) • The Commonwealth Act s 76C says that a person is guilty of an offence if they • intentionally and without authority destroys, erase or alters data stored in or inserts data into a commonwealth computer • Interfere or obstruct lawful use of a commonwealth computer • Impede of prevent access to or impair the usefulness or effectiveness of the commonwealth computer

  8. Theft of Data • If there can or can not be theft of computer data remains unsettled. • An intruder into a computer system who dishonestly appropriates information is likely to be charged with unauthorised access or computer trespass rather theft

  9. Computer Fraud • In the offline environment it generally involves deception though the use of a tangible object such as a created document • In cyberspace it may be committed through the use of digital technology • Section 477.1 of the Commonwealth Criminal Code provides that a person who without authorisation accesses or modifies data held in a computer or impairs communications to and from a computer with intent to commit a serious offence is guilty of an offence and is punishable with up to 10 years depending on the offence.

  10. Offences Against Children • The internet and other communication technologies poses new risks for children becoming the victims of crimes with offences such as child pornography and ‘child grooming’ • Child grooming is a process that begins with sexual predators taking interest in a child and making them feel special with the intent of forming a bond to get personal details, procuring the recipient to engage in or submit to sexual activity with the offender or another person. • Offenders can seek out victims through chat rooms, instant messaging, emails and mobile phones. • In NSW the Crimes Act 1900 had changes made to it in 2007 introducing penalties for these offences

More Related