Workshop Report by ACCP Ghana 18 – 21 March

advertisement
1
AFRICAN CENTRE FOR CYBERLAW AND CYBERCRIME PREVENTION
(ACCP)
WORKSHOP REPORT ON CYBERCRIME LEGISLATION IN WEST AFRICA
DATE:
11th April 2014
ORGANISATION:
ACCP
EVENT:
COE / UNCTAD / ECOWAS / ISS / ACCP –
Workshop on the harmonization of cyber legislation in
ECOWAS Accra (Ghana), 18-21 March 2014
Executive summary ( Mr Patrick Mwaita, National Coordinator, ACCP )
Cybercrime has continued to compromise the growth potentials of the Africa
region. It is a relatively new trend of crime, highly volatile and massive in
dysfunctional impact. The scourge of online criminality has followed the growing
use and application of information /communication technologies which have
recorded an unprecedented level, invariably overwhelming traditional means of
crime control.
The purpose of the workshop was to support countries of the ECOWAS region in
their collective effort aimed at discussing the challenges cybercrime poses to
their development. Governments and institutions are showing greater resolve to
commit resources in the search for empirical and action-oriented remedial
interventions to address the problem of cybercrime. Assurances of support from
the Government of Ghana as a focal point to galvanise all authorities in the
region to fight cybercrime were given by the Minister for Communications in his
statement to the participants at the opening ceremony. As expected, the visible
challenges brought by cybercrime operations overwhelm the individual capacities
of African countries to make any meaningful intervention on their own.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
2
Accordingly, Africa has to seek technical capacity to facilitate a concerted
approach to the difficulties of cybercrime, particularly drawing lessons from better
endowed regions where practices, policies and legislation have brought
significant success in similar situations. In response to this need, the Council of
Europe has agreed to offer funding support and through this improve technical
capacity of relevant crime prevention and criminal justice personnel and
institutions to kickstart and maintain the push against cybercrime. Support in this
respect has manifested in capacity-building programmes aimed at training and
increasing awareness and encouraging dialogue about the problem of
cybercrime (starting with Southern Africa and Eastern Africa in 2013).
Due to its constantly increasing sophistication in the nature, cybercrime
continues to pose a defiant challenge to governments’ efforts for stability,
development and security. This calls for intensified attention including drawing in
several remedial strategies from a variety of stakeholders to provide additional
support in this regard. Furthermore, the extraterrestrial nature of commission of
cybercrime brings with it unique challenges to law enforcement, jurisdictional
concerns and criminal justice management. Following from these observations
this workshop was divided into two tracks which were mutually reinforcing to
address pertinent issues expressed in the needs assessment of African
countries; notably, harmonization of cyber legislation on one hand and
strengthening responses to cybercrime including appropriate criminal justice
responses consistent with the Budapest Convention on the other.
The cyberlaw harmonization track was supported by the United Nations
Conference on Trade and Development (UNCTAD), while the cybercrime track
was supported the Council of Europe in cooperation with the African Centre for
Cyberlaw and Cybercrime Prevention (ACCP), United Nations African Institute
for the Prevention of Crime and the Treatment of Offenders (UNAFRI), the
Institute for Security Studies (ISS). The input by various organisations mirrored
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
3
the multi-pronged and concerted approach required to give an effective response
to the challenges of cyber insecurity. The choice of facilitators and participants to
the workshop reflected the need by the countries of ECOWAS region to sustain
the impact and benefit of technical skill updates derived from this workshop in
their countries by tapping into the available capacities from identified sources.
It was observed that life is getting increasingly electronic, with virtually every
aspect of day-to-day routines conducted with the aid of electronic appliances.
The increasing use of internet and other ICT developments in Africa, for
legitimate purposes, but also for commission of crime (online) were testimony to
this advancement.
Consequently, the need to integrate telecommunication
service providers as major stakeholders in resolving e-crime was emphasised,
principally for the unprecedented level of traffic and content data in their custody.
Accordingly, it was stressed that special initiatives in legislation; expedited
preservation of data were of essence in meeting the necessity to act with the
necessary promptness to ‘capture’ electronic evidence from the service providers
without being lost or interfered with for effective management of e-crime. Other
concerns raised included the need for preserving privacy in the wake of
increasing online intrusions, observing the rights of internet users, including
cybercriminals
in
emerging
litigations
and
protection
of
children
from
pornography and the general population from xenophobic material and other
forms of abuse.
Participants came from middle level functional categories with ability to influence
necessary legislative and policy review/development in their countries pursuant
to the recommendations/proposals from the workshop. Their domain at home
focused on routine operations as well as supportive policy development and
legislative authorities of government departments and national assemblies. The
workshop content on both tracks gave participants opportunity to critically
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
4
examine a variety of relevant regional and international instruments including the
Budapest Convention.
The strengths and opportunities in these were acknowledged as a basis to give
momentum to the national frameworks for cybersecurity. The countries
represented included, Cape Verde, Cote d’Ivoire, The Gambia, Ghana, Guinea
Bissau, Liberia, Nigeria, Sierra Leone. All the participants invited to the workshop
attended, with many others offering to sponsor their participation from alternative
sources, an indication of the desire for technical capacity by the countries in
Africa.
They met and interfaced, exchanging experiences with each other and acquired
knowledge from a set of purposed facilitators from whom best practices and skill
updates were solicited. Using a diversity of techniques, ranging from lectures,
discussions (groups), tutorials and demonstrations, the facilitators aroused free
exchange of views and sharing of experiences, including critical analyses of
situations and circumstances which give rise to cyber insecurity. Focusing on
Africa, it was noted that the region was disproportionately affected by cyber
frauds given its low level of technical capacity.
This was seen to be a sure source of uncontrolled loss of value and resources.
Considering that there is an increasing call for electronic transactions following
the growth of ICT developments (e-commerce, e-signature, e-governance),
which Africa has to embrace, the region’s vulnerability was expected to continue
rising. It is against this background that the workshop scored a fundamental
breakthrough in meeting the needs of Africa for knowledge and capacity building
through training and emphasis on regional and international collaboration as
avenues for skill development to cause necessary intervention.
It was noted that each country was at various stages of enacting effective
legislations and the Budapest Convention offered a unique opportunity to guide
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
5
and inform this process, providing inroads for further technical support in
adoption of relevant provisions and continued exposure to skill updates as well
as offering a bedrock of cross references to steer national roadmaps of planned
activities for cybersecurity. Appropriate care and attention was taken in adopting
relevant provisions from the convention and tailoring them to situations as they
obtain in their respective countries.
The workshop received added thrust from the prospects of strengthened capacity
that came with the launch of the collaboration between the Government of Ghana
and the Commonwealth Cybercrime Initiative expected to promote home-grown
measures to provide a basis for practical cyber security policies. In their resolve
to consolidate the gains attained from this dual training the participants made a
number of vital recommendations as given herewith:
•
Increase the opportunities for training sessions in all the regions and
include more personnel and introduce other modules to target
enforcement of legislation
•
Improve awareness raising and sensitization of stakeholders, especially
the judiciary
•
Disseminate the information derived from the workshop.
•
Consolidate the benefits derivable from international and regional
cooperation,
by
promoting
collaboration
within
institutions
and
governments
•
Improve criminal justice responses to cyber threats by offering specialised
training and strengthening research to identify emerging challenges
1. Welcome address by Prof. Alhas Maicibi, Secretary General (ACCP):
Professor Maicibi welcomed participants to the workshop in Accra, Ghana and
paid tribute to the Government of Ghana and the National team led by Mr Albert
Antwi-Bosiakako for hosting the workshop in Accra at the Kofi Annan
International Peacekeeping Training Centre (KAIPTC). Professor Maicibi then
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
6
acknowledged the collaborative links between the Council of Europe and the
African Centre for Cyberlaw and Cybercrime Prevention (ACCP) which started in
Vienna, February 2013 at the occasion of the Inter-governmental Expert Group
Meeting where the crippling impact of cybercrime to development was discussed.
He gave special thanks to the Council of Europe for funding the Cybercrime track
of the workshop and the United Nations Conference on Trade and Development
(UNCTAD) for funding the cyberlaw harmonization track. He also recognized the
participation and importance of the roles played by the United Nations African
Institute for the Prevention of Crime and the Treatment of Offenders (UNAFRI)
and the Institute for Security Studies (ISS). He conveyed apologies from the
Directors of ACCP, Dr Mohammed Chawki and Mr John Kisembo who could not
attend the workshop due to other pressing obligations.
Setting out the mandate of the ACCP as an organisation that coordinates the
fight against the impact of cybercrime on African countries, he urged participants
to utilize the Centre as a resource for acquiring necessary skills and knowledge
exchange with experts in Africa and other regions of the world. That way, there
is enhanced capacity building in Africa to promote the useful attributes of
technological developments. Professor Maicibi decried the fact that the same
technological advancements that aim to make communication faster, increase
productivity, and enhance innovations store data easily, had been hijacked by
criminal groups for illicit activities. These activities have caused considerable
economic malaise to the global economies, with Africa suffering significantly. He
therefore called upon the participants to be the core of West Africa’s resource
team and crucial task force to disseminate information, strategies and good
practices acquired from the workshop to the rest of Africa to the benefit of
increased cyber security.
Finally, he asked participants to be the ambassadors of their respective countries
in this fight against cyber-crime, while emphasizing that they were trainers in their
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
7
own right for this purpose – since the workshop was a ‘Train the trainers’
function. He assured them of the support of the ACCP and related partner
agencies in the fight against cybecrime. Prof Maicibi, assisted by Dr Maureen
Owor chaired all the sessions of the cybercrime track of the workshop.
2. The Council of Europe Convention on Cybercrime and the Additional
Protocol concerning the criminalisation of acts of a racist and xenophobic
nature committed through computer systems by Barrister Russell Tyner:
Mr Russell Tyner represented Dr Alexander Seger and the Council of Europe at
the opening formalities of the workshop. He urged member states of the
Economic Community of West African States to collaborate and harmonize their
legislation and practices that would facilitate an effective onslaught on
cybercrimes by catering for extra territorial offences.
Cybercrime was prevalent in a number of day to day activities which were now
increasingly evident on-line. These included internet frauds, child pornography,
internet hacking and breaking into people’s computers, which activities neither
acknowledged nor respected physical boundaries. He stressed that it was
through effective legislation in the sub-region that perpetrators of these illicit online activities could be made to face justice, particularly in view of the fact that the
internet was increasingly becoming a tool for vital activities such as electronic
banking, e-commerce,and online communication.
He expressed concern that criminals were now exploiting the internet to the
detriment of the public, adding that if such cybercrimes were allowed to continue
unabated, it would erode the public confidence in online commercial activities
such as trading, e-banking and e-commerce, which would have serious
consequences on the economies of many countries. He cautioned that because
of their sensitivities to electronic controls, some industries such as civil aviation
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
8
were more vulnerable to cyber attacks and urged law enforcers to take
appropriate care in this respect.
Mr Tyner, who is also a Crown Prosecutor in the United Kingdom, Organised
Crime Division offered his services to meet any requests for professional
assistance in prosecuting cybercrimes in ECOWAS region – a direct reference to
the calls for technical support which was conspicuously inadequate in the region.
Mr Tyner said appealed to countries in the sub-region to put in place proactive
measures to detect cybercrimes and also to train their law enforcement officers
and other criminal justice personnel on how to identify cybercrimes, utilizing
specialized skills and expertise as tools to gather forensic evidence and properly
present them to court for adjudication.
He also tasked the law enforcement officers with extraordinary expedience when
fighting cybercrime. He added that they should be prepared with matching
strategies for expeditious gathering of relevant data from communications service
providers such as the mobile companies, google search, yahoo and hotmail in
the nick of time before such information were lost from their system or
manipulated for destruction of evidence.
Due to the visible threats of possible intrusion, he cautioned that the internet was
not a safe tool for storing vital information and passionately cautioned the youth
against putting certain vital information about themselves such as videos and
photographs on the internet, since once placed on the internet such information
could not easily be retrieved or withdrawn.
Aims of the Convention
•
A guideline for legislation leading to the harmonisation of domestic legislation
•
Establish the necessary procedural powers for investigation and prosecution
•
Establish a fast and effective regime of international co operation
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
9
•
That Human rights are protected
•
Flexibility so that it can be implemented nationally
Cybercrime is international. Perpetrators can situate themselves anywhere in
the world. Thus one of the principal aims of the BCC is to reduce the number of
safe havens. To avoid becoming a safe haven a country needs -
1.
Legislation – both substantive and procedural - criminalise cyber activity that
may otherwise not fall within the scope of existing criminal law –including
issues of jurisdiction - provide sufficient power for investigators to obtain
access to evidence – enable requests for MLA and extradition
2. Police capability –a sufficient number of officers who understand the technical
issues and have the ability to undertake enquires which will involve the
examination of computers and obtaining access to communications data
3. Co-operation with Industry – a close working relationship with communication
service providers in your county ideally pursuant to a voluntary code or MOU
to allow you to obtain access to data held by service providers is vital
4.
Training Judges and Prosecutors –must have some basic understanding to
ensure that they understand the evidence , are able to identify potential
sources of evidence , assist in MLA requests , assess evidential admissibility
and manage cases
Cybercrime causes real harm, either to individual victims of fraud, children who
have suffered bullying or who have been abused to feed the market for child
abuse images, or to financial institutions and governments seeking to expand
and develop e commerce.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
10
The investigation and prosecution of cybercrime can be challenging. This is due
to a number of factors:
•
the nature of digital material – it needs to be extracted and interpreted and
presented in court in a manner that ensures its evidential integrity- it is
volatile it is easily changed – it may only be in existence for a short time;
•
The volume of material – investigators need to identify the evidential
material. In the UK the prosecutor is also obliged to identify material that
may assist the defendant or undermine the prosecution case as part of the
fair trial process;
•
The location of material – not only is it stored within digital devices it may
be located in another jurisdiction or in the hands of an innocent third party;
•
Investigators lack expertise;
•
Prosecutors and judges may fail to understand the nature of the material;
•
Domestic legislation may not ‘fit ‘cyber crime- there may be issues relating
to jurisdiction;
•
Industry - co operation may be lacking;
•
Perpetrators may be located overseas- mutual legal assistance may not
be available -extradition may not be available.
Having focused on the negative it is useful to remember that much cybercrime is
committed overtly providing a wealth of evidence to prove that a crime has been
committed, the issue then is one of proving that the defendant was responsible.
Stored material can provide vital evidence as can evidence from service
providers. The online environment also offers opportunities for police officers to
covertly infiltrate online criminal groups.
The Convention
•
defines key terms
•
defines the common minimum standards of relevant offences
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
11
•
provides the necessary procedural measures required in the investigation
of cybercrime
•
operates as an instrument of international co-operation both in terms of
mutual legal assistance and extradition
The Additional Protocol to the Convention and the additional protocol to
the Convention on Cybercrime, concerning the criminalisation of acts of a
racist and xenophobic nature committed through computer systems
Article 3 – Dissemination of racist and xenophobic material through computer
systems distributing, or otherwise making available, racist and
xenophobic material to the public through a computer system.
Article 4 – Racist and xenophobic motivated threat, through a computer system,
with the commission of a serious criminal offence as defined under
its domestic law, (i) persons for the reason that they belong to a
group, distinguished by race, colour, descent or national or ethnic
origin, as well as religion, if used as a pretext for any of these
factors, or (ii) a group of persons which is distinguished by any of
these characteristics.]
Article 5 –
Racist and xenophobic motivated insult insulting publicly, through
a computer system, (i) persons for the reason that they belong to
a group distinguished by race, colour, descent or national or ethnic
origin, as well as religion, if used as a pretext for any of these
factors; or (ii) a group of persons which is distinguished by any of
these characteristics.
Article 6 –
Denial, gross minimisation, approval or justification of genocide or
crimes against humanity distributing or otherwise making available,
through a computer system to the public, material which denies,
grossly minimises, approves or justifies acts constituting genocide
or crimes against humanity, as defined by international law
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
12
3. Substantive Law in the Budapest Convention ( Mr Sizwe Snail Ka Mtuze)
The presentation began with discussing and making the participant understand
the substantial law provisions on offences against the confidentiality, integrity and
availability of computer data and systems (e.g. illegal access , illegal interfering ,
data interference, misuse of devices etc.), computer-related offences (computer
related fraud and computer related forgery), content-related offences (such as
pornography and child pornography) and ancillary liability and sanctions. The
section was concluded with recap on the model provisions in the form of a
lessons learned slide shortly capturing the substantive law provisions of the
Budapest Convention.
Cybercrime involves both traditional crime facilitated by the internet and new
crime, crime where the internet the tool or the target or both. Examples include
the use of botnets to acquire financial data and the use of Distributed Denial of
Service attacks in support of an ideology.
The substantive law provisions of the Convention:
Art 2 Illegal Access
… the intentional access without right of any part of a computer system
Art 3 Illegal interception
.. the intentional interception without right by technical means of non public
transmissions of computer data to from or within a computer system
Articles 4 and 5 Data Interference and system interference –
.. damaging deleting –deterioration – alteration – suppression of computer data
..the serious hindering of the functioning of a computer system by the inputting –
transmitting- damaging deleting –deterioration – alteration – suppression of
computer data
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
13
Article 6 Misuse of devices
.. the production – sale- procurement for use- import- distribution or the making
available of a device ( including a computer program ) a computer password –
access code or data by which the whole or part of a computer system is capable
of being accessed – with the intent that it be used for the purpose of committing
one of the offences established under the convention
Article 7 Computer related forgery and Article 8 Computer related fraud
Forgery: ... the input – alteration – deletion – suppression of computer data
resulting in inauthentic data with the intent that it be considered or acted upon for
legal purposes as if it were authentic
Fraud : .. causing loss of property to another by the input – alteration – deletion –
suppression of computer data or by interfering with the functioning of a computer
system
Article 9 Child Pornography: .. the production – for distribution of CP - offering or
making available – distributing or transmitting - through computer systems
Possession in a computer system or on a computer data storage system
Article 10 Copyright infringement: Copyright infringement is one of the most
widespread of offences on the internet – include software – films – books – music
Additional inputs were made by Dr Seger on some guidance notes and additional
protocols that discuss and explain certain newer offenses which could previously
not be categorised with certainty in the Budapest convention.
The presentation then went on further to discuss briefly the South African
Common Law on Cyber crime before the coming into law of the Electronic
Communication Transaction Act, Act 25 of 2002. This was followed by a
comprehensive examination of the South African Law cybercrime substantive law
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
14
provisions in the context of the ECT and how South Africa has substantially
complied with the substantial law provisions of the Budapest Convention save for
some exception (which were also discussed in detail) as dictated by domestic
law already in force at the time of bringing into the Law of the ECT.
As per the initial brief from the COE a study was made on the Ghanaian
Electronic Transactions Act, 2008, Act 772 with regards to its substantial
compliance with the Budapest convention and additional provisions introduced in
its domestic laws with regards to the substantive law in the fight against Cyber
Crime.
4. African Approaches to Cyber Crime ( Mr Sizwe Snail Ka Mtuze)
African Approaches to Cyber Crime were discussed by giving a brief overview on
the regional initiatives on the African Continent such as the EAC 1 and EAC 2
( East African Community) , ECOWAS , SADC Model Law and reference was
also made to the COMESA Model Law and their compliance with the Budapest
Convention were also examined.
The pitfalls and some of the interesting new provisions in the Draft African Union
Cyber Crime Convention and its compliance with the Budapest Convention were
also examined and critically discussed. It was however agreed that the
Convention drew much from the Budapest Convention and that its main focus is
more on the harmonization of African Cyber Crime laws and cross boarder cooperation.
Another comparative study was made with the Tanzanian Cyber Crime Bill
(2013) with reference to its adherence to the proposed provisions relating to
substantive law and procedural law as contained in the Budapest Convention.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
15
The contentious aspect of Jurisdiction and Extradition as contained in the
Tanzanian Cyber Crime Bill were also examined which seemed to show a slight
deviation from the Budapest Convention when it came to Service provider
liability. The provision dealing with a forensic tool was discussed and its origin
from the German law acknowledged.
5. Procedural Law in the Budapest Convention (Dr Maureen Owor and Mr
Sizwe Snail Ka Mtuze )
The aim of the session was to discuss the procedural law in the Budapest
Convention and develop a check list on investigative powers, procedural tools,
electronic evidence and the conditions and safeguards using the Budapest
Convention as a guide. The justification for using the Convention for guidance
was the fact that the legislation and draft law on cybercrime in the West African
region incorporated aspects of the Budapest Convention. Examples include
Nigeria’s Executive bill on Cybercrime (referred to as the Nigeria Cybercrime Bill
2013 that has gone through the first reading and is pending scrutiny by
committees of the Nigerian National Assembly like that on the Judiciary, Human
Rights and Legal Matters. The laws of Benin, for instance, also have provisions
on expedited preservation of data and search and seizure that incorporate some
provisions of the Budapest Convention. The session was facilitated by Dr.
Maureen Owor and Mr. Sizwe Snail Mtuze.
Dr Owor began by establishing a link between Session 3 on substantive criminal
law and Session 4 on procedural law under the Budapest Convention. Next was
an overview of the scope of powers and procedures under Article 14 that is to
say criminal offences established under Articles 2 to 11; other criminal offences
committed by means of a computer system and the collection of electronic
evidence.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
16
Electronic evidence
Participants explored the nature of electronic evidence and its possible sources
like computer systems, computer data, traffic data, Internet data, subscriber data
and other electronic devices. The next area for discussion was the threats to
electronic evidence at the investigation and trial stage. These threats included
the discovery of electronic evidence, possible defences like the Trojan horse, and
the evidential rules relating to establishing the relevance, admissibility, reliability,
and evidential weight of electronic evidence in court; as well as any exclusionary
rules like the hearsay rule of evidence. A final point of discussion was the
restrictive approach sometimes adopted by judges towards the admissibility of
electronic evidence.
The Procedural Provisions of the Budapest Convention on Cybercrime
The next part of the discussion led by Mr Snail Mtuze noted that one of the
principal attractions of cybercrime is the apparent anonymity when a user
connects to the internet. To use the internet to communicate involves reliance on
the infrastructure of a service provider. Service providers, subject to data
protection law, require formal legal process to obtain such data and thus need to
establish a necessary threshold of suspicion. Data retention periods vary, so it is
important that the provider has the ability to preserve data pending a legal order.
Mr Mtuze then examined the procedural provisions in the Budapest Convention
as summarised below.
Art 16 Expedited preservation of stored computer data
A freezing order allowing data to be preserved without the need for formal legal
process pending court order or other mechanism requiring its production.
Art 17 Expedited preservation and partial disclosure of traffic data
This is a useful provision. It recognises that a number of service providers may
be involved in the transmission of communications and provides that where more
than one provider is involved sufficient traffic data is disclosed in advance of the
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
17
receipt of any formal court order etc. to allow for the identification of those other
providers thus allowing preservation and or court orders to be served.
Art 18 Production Order
Provides for a computer data including subscriber information to be produced.
Envisages court order or other legal process.
Art 19 Search and seizure of stored computer data
Aims to establish an instrument that enables investigators to search computer
systems as efficiently as they are able to perform traditional search procedures.
It allows them to copy data rather than seize the hardware on which the data is
located. Some suspects may store data at an off site location i.e. on an internet
server - This article also seeks to extend the powers of search to data that is not
stored physically at the location at which the search takes place. It is noteworthy
that the Budapest Convention limits this power to data off site but within the
same jurisdiction – however this may be too limited – cloud storage systems for
instance may be located anywhere in the world and indeed the provider
themselves may not know where the computer holding the physical data is
actually situated.
Article 20 Real time collection of traffic data
Power for authorities to collect or record and compel a provider to collect and
record traffic data in real time which is useful depending on the data retention
policy of the CSP.
Article 21 Interception of content data
Generally there is a high threshold that has to be met in order to obtain such
data give the intrusive nature of this provision
Article 22 Jurisdiction
Parties to establish jurisdiction over the substantive offences set out in the
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
18
convention and in particular to establish jurisdiction over those offences in cases
where an alleged offender is present it its territory and it does not extradite him to
another party solely on the basis of nationally.
Art 23 General principles of international co operation
This Article states the general principal that countries will provide each other with
assistance to the widest extent possible
Article 25 General principles relating to mutual assistance
Permits urgent requests to be made by fax or e-mail.
Article 26 Spontaneous Information
Allows countries to provide information to another state without a prior request it
may be that the other country is unaware that this information exists and, by the
time they are likely to do the data may have been lost
Article 27 Absence of international agreements
A very important and valuable Article - In the absence of an Mutual Legal
Assistance (MLA) treaty or other instrument the Convention may form the basis
of a request for MLA.
Article 24 Extradition
This is a very important and valuable article – it provides that the treaty may
operate as the basis for a request for extradition in respect of the offences set out
in the convention in the absence of a treaty between the parties.
Article 29 – 34
Provides for the availability by way of a MLA of:
 The expedited preservation of stored data

Expedited disclosure of preserved traffic data

Accessing stored data i.e the search and seizure of data the request may
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
19
include a request to expedite the seizure

Trans border access to stored data – this is in interesting provision –
firstly allows cross border access to open source data without the need for
authorization of the party within whose jurisdiction the data is held ,
secondly where data is in one jurisdiction but accessible from another it
may be accessed without authority if the person with lawful authority to
disclosure the data consents

Real time collection of traffic data

Interception of content
Article 35 provides for the creation of a 24/7 network to provide for urgent
assistance in investigations – extremely valuable in cybercrime investigations.
Generally the 24/7 contact will be based with the Police Cybercrime or Hi Tech
crime unit. They will know how to preserve and obtain evidence within their own
jurisdictions and how to do so quickly – they can also help in locating suspects
The participants explored the use of a ‘stand-alone’ legislation or amendment to
existing laws on criminal procedure and evidence, as an alternative method of
regulating the collection of electronic evidence and the preservation and
production of evidence. These options were preferable to the use of an omnibus
piece of legislation that covered all aspects of cyber law including the substantive
and procedural provisions on cyber crime such as that contained in the Budapest
Convention.
Conditions and safeguards
Drawing on the Preamble to the Convention, Dr. Owor discussed the
justifications for having conditions and safeguards in Article 15, namely to
balance the sometimes intrusive powers of law enforcement agencies with
respect for human rights including the right to the protection of personal data.
This balance was achieved by setting out principles and requirements for states
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
20
to meet their positive obligation to protect rights and civil liberties within rule of
law and human rights framework. The need for explicit provisions on judicial or
independent oversight, the safeguard of proportionality and the opportunities for
judicial review or review by an independent body of the use of procedural tools
and powers was underscored.
Additionally, the grounds that justified the
application, limitation and the duration of investigatory powers or procedural tools
had to be specified. The ways in which the powers and procedures may impact
upon the rights, responsibilities and legitimate interests of third parties was also
examined. Although the lack of awareness of cybercrime legislation among
citizens and big companies like MTN was an area of concern, what is most
worrying to participants was the lack of knowledge among the legal profession,
law enforcement agencies and the judiciary.
Three important questions on the adequacy of human rights frameworks and the
interplay between domestic and pluralistic systems were then investigated. Does
the national legislative framework provide equal protection of the law? What is
the effect of criminalising intentional access of computer containing information
on security matters on the right to free speech and the right to information? Is it
possible to ‘Africanise’ cybercrime legislation? These questions were set against
a backdrop of the diverse African cultures in West Africa and the fact that the
most vulnerable victims of cybercrime are poor people in the peri urban or rural
areas whose first ‘responder’ may be a customary court like the Afikpo (Ehugbo)
of Nigeria, a juju priest, or spiritual leader.
The participants considered the question of how a state could reconcile
normative conflicts between cybercrime law and customary investigation and
adjudication procedures. Using the example of the Community Impact Statement
in Form B to the First Schedule to The Constitution (Sentencing Guidelines for
Courts of Judicature) (Practice) Directions, 2013 of Uganda, Dr. Owor
demonstrated how a court could engage with rural communities through the
admittance of a “written or oral account of the general harm suffered by members
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
21
of a community as a result of the offence.” Such subordinate legislation could
help reconcile these diametrically opposed ‘pluralistic’ systems.
Checklist on procedural powers, electronic evidence, conditions and
safeguards
This checklist on procedural powers and tools, electronic evidence, conditions
and safeguards was developed by participants working in groups. The groups did
not restrict themselves to the Budapest Convention as a benchmark. Instead
they drew from a range of regional initiatives like the ECOWAS Directive CIDIR.
1/08/11 of 2011, and the Draft African Union Convention on the Establishment of
a Credible Legal Framework for Cyber Security in Africa or the Draft African
Union Convention on the Confidence and Security in Cyberspace (version 2012);
as well as constitutional and statutory arrangements at the domestic level to
develop their checklists.
1. Scope of procedural powers: Participants noted the wide scope of
procedural powers within the Ghana Electronic Transactions Act 2008
under Section 142 which grants extra territorial jurisdiction. However,
they pointed to the challenge of applying these powers extra
territorially. Similar comments were made regarding Nigeria cybercrime
Bill (Clause 33).
2. Procedural tools: The groups appreciated the wide powers granted
under the procedural tools such as the power to order the production,
disclosure and preservation of data under Sections 100-104 of the
Ghana Electronic Transactions Act 2008. Investigation agencies like
the Economic and Organised Crime Unit and Financial Intelligence
Unit in Ghana have in addition been given powers of the High Court to
obtain information from corporate bodies and institutions without
having to file cases in court. Nonetheless, law enforcement agencies
were still faced with the challenge of expediting preservation of data
without a court order as S.100 ETA states that a service provider is not
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
22
obliged to preserve evidence in the absence of a court order. The
participants also observed that the provisions in the ECOWAS
Directive 2011 on non-disruption of business have not yet been tested.
3. Electronic evidence: the laws of countries like Ghana allowed the
admissibility of electronic evidence and set clear parameters on the
criteria for assessing the weight of electronic evidence (Section 7 of
Ghana’s ETA). However, due to the lack of a computer forensics
laboratory it was difficult for investigators to collect electronic evidence.
Furthermore, as the Ghanaian participants pointed out, collection of
evidence was sometimes hampered by the telecom service providers
like MTN who refused to comply with court orders to provide transcripts
of text messages. Even where the evidence was adduced, the courts
sometimes gave little weight to electronic evidence, due in part to a
lack of knowledge on the part of judges about the intangible nature of
electronic evidence. Elsewhere, Nigeria in 2011 reformed its Evidence
Act Cap 112 but similar challenges with this approach exist. For
instance, the discretion to admit the evidence remains with the judge.
4. Conditions and Safeguards: the groups considered in detail the
following conditions and safeguards:
-
Judicial oversight: participants were of the view that the judicial
oversight through court orders in the different countries was adequate
and that the laws set stringent conditions that law enforcement
agencies had to satisfy in order that their requests to use procedural
powers and tools were granted. Conditions for the grant of requests
were found for examples in the Ghana Electronic Transactions Act, the
Ghana Evidence Decree of 1975 (NRCD 323) and the Security and
Intelligence Agencies Act (Act 526) of 1996 of Ghana. Using Ghana
as a case in point, the members explained that police officers have to
give brief information such as the type of data required and the period
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
23
to be covered, in order to enable the court exercise its discretion in
granting requests.
-
Rights of parties: participants observed that adequate protection of
rights and freedoms existed in the constitutional arrangements of West
African states. The Constitution of Ghana 1992 for instance, has a
comprehensive bill of rights, and further under Article 33, the courts
were obliged to protect these rights. However, one group was
concerned that the law may be used more to protect the state’s
interests and less to protect the right to privacy in Article 18(2). This
was more so because privacy is subject to qualifications which include
public safety. Such law included Section 133 (2)(d) Ghana ETA that
prohibits the unauthorised access or excess of authorized access to a
computer containing information on national security of Ghana.
-
Participants also noted the lack of provisions in the ECOWAS Directive
2011 on the rights, responsibilities and interests of third parties.
-
Equal treatment: participants observed that the constitutions of the
different states guaranteed equal protection to all people. For instance,
the Nigerian Cybercrime Bill 2013 was drafted in gender neutral
language and covered every type of gender. Likewise the ECOWAS
Directive 2011 guaranteed equal protection regardless of gender
-
Reconciling pluralist systems: participants noted that reconciling the
state procedures with indigenous systems was possible perhaps at the
sentencing stage, but only in relation to the sanction. For instance,
Clause 32 of the Nigeria Cybercrime Bill enabled a court to make an
ancillary order of compensation or restitution to the victim. Likewise,
Section 138 Ghana ETA empowered a court to grant an order for
compensation.
Franco-phone West Africa (Niger):
The group’s point of emphasis was that in contrast to the common law
(adversarial) system where a judge had no investigatory powers, under the Code
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
24
Civil system in Franco-phone Africa, the investigative judge had broad powers to
order production of documents, search and seizure or the closure of an
investigation.
In 2006, Niger set up a project on the legal framework for ICT. The project
spearheaded the drafting of laws to regulate the use of ICT and bring Niger
within the Information Society. The laws included: a draft law on electronic
transactions; a draft law on the protection of personal data; a draft law on
cybercrime and a draft decree on the creation of a police center to deal with
cases of cybercrime. These drafts are being studied by the General Secretariat
of the Government which will in turn submit them to the National Assembly. For
now the Bill of Rights and the existing criminal law was used to punish
cybercrime. The mode of redress was to compensate the victim.
Recommendations:
1.
Implement public awareness about cybercrime through translation of laws
into local languages.
2.
Create specialised cybercrime units to operationalize procedural powers
and facilitate discovery and storage of electronic evidence.
3.
Develop training programmes for lawyers, law enforcement bodies and the
judiciary on the procedural powers and conditions and safeguards.
4.
Develop mechanisms for mutual legal assistance to facilitate extra
territorial investigations.
6. Training strategies and tools for law enforcement agencies, prosecutors
and judges (Dr Maureen Owor)
This session explored the features of training strategies and training tools before
moving on to develop a check list of points to consider as part of a training
strategy and training tools for the participating states. The rationale for
developing localised training content was the shared common legal tradition
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
25
among states in the region (common law and code civil) including a common
official language (English and French) and a common regional framework on
cybercrime like ECOWAS Directive 2011. The elements of a training strategy
included a critical assessment of the institution’s operating environment to
appreciate the influential internal and external factors (forward planning) and to
facilitate a common understanding of ways of dealing with the problem (training
needs). The strategy had to be adaptable and flexible to suit the intuition’s needs.
There was also need to use an appropriate learning technique like Kolb’s
experiential learning technique where participants have the opportunity to acquire
and apply knowledge and skills using diverse methods such as reflexive studies,
role plays, site visits and simulation exercises, within a setting that is relevant to
them.
The next part of the session examined how to put a training strategy into
operation using training tools. The example used was training modules that set
out clear training objectives and learning outcomes, adopt a relevant mode of
learning, give feedback to participants and allow them to evaluate the learning
activities. Training materials considered included laws, case law, regulations,
policies, ethical and professional regulations, and research studies on the
enforcement of cybercrime legislation and the socio- cultural (political, economic,
etc.) factors that influence its implementation. Participants were divided by Dr.
Owor into groups based on their professions, from which they drafted checklists
for developing training strategies and training tools (modules for training). The
results of each group are set out here.
Checklists for developing training strategies and training tools (modules
for training)
1. The Judicial Service of Ghana:
The group comprised judges of the High Court of Ghana and the Judicial Service
of Ghana. In the assessment of the judiciary’s operating environment, the group
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
26
identified several internal and external factors that affect their work. Internal
factors were the state of the infrastructure (building and ICT facilities); the quality
of support staff (human resource) and unplanned training sessions, the pitiable
quality of court room equipment especially the court recorders and transcribing
machines for fast track courts and air conditioning due in part to a poor
maintenance culture. The inadequate funding in the form of imprest was also
considered. Two external factors were the small size of the budgetary allocation:
sometimes the judiciary received only 30% of funds requested which made it
difficult to implement a training policy. The political will of the executive (of lack of
it) was a second external factor.
As part of their training strategy to help plan ahead, the group considered the
recruitment of trainers from experts in the relevant field of cybercrime to train
judicial officials and support staff. An in-service training divided into a basic
course for early career staff and an advanced course for established staff was
deemed most appropriate with computer literacy or knowledge of ICT as a
course prerequisite. The duration of the training would not exceed 3 days and
would take place during term time given the heavy workload of judicial officials.
For support staff, the training would take place during the legal vacation at the
proposed venue of the Judicial training institute. On the question of funding for
training, the group decided that funds should be sourced both internally and
externally.
Turning to the training tools, the participants decided on New Trends in
Cybercrime as the course title for their training module. The training objectives
were to equip trainees with tools/knowledge to determine emerging cybercrime
matters. Within this module there were two topics: Understanding cybercrime and
Electronic evidence. The intended learning outcomes were to enable participants
appreciate the collection, storage and use of electronic evidence; and the
admissibility of electronic evidence. The preferred mode of learning was through
sharing of experience and case studies using reference material like legislation,
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
27
textbooks and lecture notes. The group proposed the use of questionnaires for
feedback on the course.
2. The Police:
The police officers, who were drawn largely from the criminal investigation
department, cited two main internal factors that affected their operating
environment, namely the lack of skills development or capacity building and
inadequate infrastructure. External factors were the emerging and every
changing trend in cybercrime around the globe. Based on these factors, the
group decided that every investigator should receive training conducted by
experts with requisite skills. This in-service training would have no course prerequisites and would last no more than one week, preferably in June or the
middle of the year. The group proposed that the Police Training School was a
good venue for training but equally the courses could be held elsewhere; say in
another country. It was envisaged that training funds would be sourced both
internally and externally.
In developing their training tools, the group decided on Cybercrime Investigation
and Digital Forensic Training as a suitable course title. The training objectives
were to keep abreast with current trends in cybercrime, investigation techniques
and adducing admissible evidence. In this context, the proposed topics were:
money laundering, identity theft, hacking, fraud, forgery, email tracking and laws
on cybercrime. The intended learning outcomes were to increase knowledge on
investigating cybercrime and related offences, and tracking criminals; knowledge
on the production of admissible evidence in court; and the competency in
conducting training of trainers’ courses. The group preferred a practical mode of
learning that included pictographic materials and the assessment by examination
and simulation exercises. Other learning materials included documents on
cybercrime, lecture notes and slides from the training session.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
28
3. Prosecutors:
The prosecutors came from the Attorney General’s office in the Ministry of
Justice of Ghana and the Computer Crime Prosecution Unit, from the Federal
Ministry of Justice of Nigeria. The group evaluated their operating environment
and considered the internal factors that affected training programmes namely:
time to hold training, availability of trainees at any one point in time, and the
quality of resource persons. The external factor was the availability of knowledge
exchange programmes both internally and abroad.
For the prosecutor’s training strategy, the group considered the selection of
trainers (experts) from within and outside the country. Trainees would be
recruited from all levels of prosecutors and would have a basic knowledge of ICT
applications as a pre requisite for the course. It was determined that trainees
would have some formal training (for example, a degree and/or a post graduate
qualification in legal practice) and then attend an advanced course during inservice training. The duration of this advanced course would be 5 days held once
every quarter (periodically) at a venue away from the work environment. The
funding would come from both internal and external sources that ought to include
government and other stake holders like telecommunications service providers.
The group developed their draft training tools (module) with the two course titles:
The Use of Electronic Evidence in Cybercrime Prosecution and Strategies in
Court Room Presentation. The objectives were to familiarise prosecutors with
current trends in the collection, preservation and presentation of electronic
evidence in computer related evidence. Two proposed topics were: the
presentation of electronic evidence in court, and the preservation of electronic
evidence in court. It was hoped that at the end of the training, trainees would
have gained knowledge on the presentation of electronic evidence, the handling
of electronic evidence and detection of authentic electronic evidence. The course
would be taught though seminars and training workshops; while assessment and
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
29
feedback would be through group work and presentations. The starting points
included materials on the Council of Europe website and books.
4. Policy and regulatory bodies:
Group 4 comprised representatives of the legislature, ministry of justice, ministry
of information and communication, national regulatory bodies and leading
telecom companies. The group identified a lack of expertise and a failure to keep
up with new trends of cybercrime as two internal factors that influence their
training environment. Interference from political bodies and the dynamic nature of
the industry were the external influencing factors.
The group as part of their training strategy set the criteria for selection of trainers
who were experts on the subject matter both at the local and international level.
Trainees would be recruited at various levels in the institution depending on the
nature of training required. Training would begin with formal training, followed by
in-service training at both a basic and advanced level. Trainees would also be
able to take part in continuous professional development, where required. For
that matter, course pre requisites would depend on the requirements of the
various training institutions. The duration and timing of the training would depend
on the training needs of each department. The cost, effectiveness, number of
trainees and the type of training would determine the venue for training, but the
group recommended that the venue should be away from the work place for
maximum concentration. The internal budgetary allocation and external
sponsorship were considered as possible sources of training funds.
The course title selected by the group was Policy and Regulatory frameworks for
cybercrime. Training objective was described as combating cybercrime and
creating awareness and three topics were identified: the review of current
legislation on cyber or related matters, developing a legal framework and best
practices on combating cybercrime. The intended learning outcomes were to
increase the capacity to combat cybercrime; develop an understanding of
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
30
cybercrime and related issues and promote the rule of law. A recommended
mode of leaning was a blend of different approaches dependent on the outcomes
of the department’s needs assessment survey. Still, the group thought that
sharing of experiences and group work were appropriate modes of learning;
further that questionnaires and surveys could be used to give feedback.
Suggested reference materials included books, online materials, magazines,
journals and legislation like the ETA.
5. Cote d’Ivoire and Niger:
Group 5 included officials from the Ministries of Justice and some Magistrates
from Cote d’Ivoire and Niger. The group identified internal factors that impacted
on their work setting namely, a lack of political will, a limited use of the internet
and electronic transactions, non-adherence to the Budapest Convention, and an
unwillingness on the part of prosecutors to take up cybercrime cases in contrast
to law enforcement agencies who were very engaged in investigating cybercrime
but lacked the technical knowledge.
External factors included the lack of
knowledge of cybercrime across the region despite the fact that countries like
Cote d’Ivoire had a range of laws that could be used to deal with cybercrime. The
participants pointed out that although the Budapest Convention was used as a
benchmark to scrutinize legislation, no African states participated in its drafting.
In developing a training strategy, the group decided that trainers at the local and
international level should have competence, knowledge and also share
experiences. The trainees should be selected largely from the law enforcement
agencies, and should have practical experience of work in the field of cybercrime.
The training modules would be part of existing training modules and the training
could be conducted in-house. The group was emphatic that funding for training
must be at the domestic level, primarily the responsibility of the state. Regarding
the objective of the training, the view was that training should aim to harmonise
procedures and rules on cybercrime.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
31
Recommendations from group discussions:
1. Institutional review of the internal and external factors that influence the
work environment and specifically training programmes should be done
periodically.
2. Resource constraints that affect training programmes should be
addressed by the Executive or responsible department.
3. Training strategies should be developed as part of the institutional
planning process. The strategies should fit within government policy,
regulatory and legal framework, but should also be flexible to
accommodate best practice, human rights and rule of law concerns.
4. Training tools should be reflect an institution’s training needs and where
necessary, the practice in the different disciplines.
7. African Regional Perspectives to Cybercrime (Mr. Uchenna Jerome Orji)
The presentation began by providing a brief overview of the concepts of
“cybersecurity” and “cybercrime”, while also highlighting the critical components
of cybersecurity governance. Approaches to the development of cybercrime laws
and the essence of regional responses to cybercrime were also discussed. The
presentation then gave a historical overview of the development of cybercrime
initiatives by the Africa Union and analyzed the cybercrime provisions of the Draft
African Union Convention for the Establishment of a Credible Legal Framework
for Cybersecurity in Africa (AU Draft Convention). One of the highlighted defects
of the Draft Convention is the absence of adequate mechanisms for mutual legal
assistance and extradition. Thus, it was shown that the Draft AU Convention
does not create a mechanism for Member States that do not have mutual
assistance treaties between themselves to use the Convention as a legal basis
for rendering international assistance especially with respect to extradition and
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
32
other issues requiring cross-border cooperation in the enforcement of cybercrime
laws.
The presentation then went further to provide an overview of the development of
cybercrime initiatives by other regional bodies in Africa namely: the Common
Market for Eastern and Southern Africa (COMESA), the Economic Community of
West African States (ECOWAS), the East African Community (EAC), and the
Southern African Development Community (SADC). The COMESA Model
Cybercrime Law (2011) was analyzed and it was shown that it met all the
standards of the Convention on Cybercrime with elaborate provisions for
international cooperation. It was also shown that the COMESA Law goes further
to include provisions on consumer protection and the liability of service providers
which were not contained in the Convention on Cybercrime. However, many
COMESA Member States including Djibouti, Eritrea, Libya, Sudan, Comoros,
Madagascar, Burundi, Malawi, Rwanda, Swaziland, Democratic Republic of
Congo, and South Sudan were yet to enact cybercrime laws, although there are
some ongoing efforts to develop laws in some of the countries.
The presentation also analyzed the SADC Model Law. It pointed out that the
SADC Model Law falls short of some of the standards under the Convention on
Cybercrime as it failed to establish provisions for international cooperation,
mutual assistance and extradition. It also showed that many SADC States such
as Angola, Democratic Republic of Congo, Lesotho, Malawi, Mozambique,
Swaziland and Tanzania have not enacted cybercrime laws, although there are
some ongoing efforts to develop cybercrime laws.
The 2008 Draft Legal Framework for Cyberlaws in the East African Community
and the ECOWAS Directive on Fighting Cybercrime (2011) were briefly
discussed. (A detailed analysis of the ECOWAS Directive on Fighting Cybercrime
was later done during the session titled “ECOWAS Approach to Cybercrime”
(March 20, 2014). The presentation ended with several proposals to strengthen
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
33
cybercrime responses in the African region. Some of the proposals include the
following:
(1) The AU should consider the establishment of a model law within the
framework of the Draft Convention on Cybersecurity to provide an
effective guide for regional harmonization and also facilitate the timely
establishment cybercrime laws in Member States.
(2) The Draft AU Convention should include provisions for Member States
that do not have mutual assistance treaties between themselves to use
the Convention as a legal basis for rendering such assistance as seen
under the Convention on Cybercrime.
(3) The AU should establish a regional extradition treaty to enhance the
extradition of cybercrime perpetrators within Africa.
(4) The establishment of cybercrime laws by states in the African region
should give cognizance to mechanisms for judicial review or the
independent review of law enforcement activities and the protection of
fundamental rights.
(5) There is need to develop a system for cooperation between national law
enforcement agencies of African states through the establishment of
national 24/7 points of contacts and national CERTs that will coordinate
with a regional 24/7 point of contact and CERT or network security agency
under the auspices of the AU.
(6) African states should prioritize cybersecurity on their national security
agenda through measures such as increased government funding of
cybersecurity initiatives.
(7) To effectively enhance international cooperation and harmonization,
cybercrime laws in African states should address the minimum standards
recognized under international legislation models on cybersecurity such as
the Convention on Cybercrime.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
34
(8) There is need for capacity building in legislative institutions as this may
also help in addressing issues of unnecessary legislative delays that has
hindered the timely passage of cybercrime laws in many African countries.
(9) Building capacities in regulatory institutions and “bridging the digital divide
in cybercrime law enforcement capacity” by providing technical support to
African states that are making viable efforts to promote cybersecurity.
(10) Building capacities in the judiciary including the training of Judges and
prosecutors on the handling of electronic evidence and other related
issues in the judicial enforcement of cybercrime law.
(11) Building capacities for end-user education by encouraging institutions
such as universities, NGO’s, and other stake holders to create user
awareness on cybersecurity.
(12) Encouraging African research and development initiatives in the areas
of cybersecurity and cybercrime control.
(13) There is need for African states to provide adequate on information on
cybercrime control initiatives even when they are still being developed.
There was an inquiry as to whether the Convention on Cybercrime or the Draft
AU Convention or the ECOWAS Directive should be used as the basis for the
drafting of cybercrime laws in African states?
In response it was noted that
African states are sovereign states who are entitled to draft their cybercrime laws
on the basis on any framework they deem might confer them with more benefits
for international cooperation. It was also noted that the AU Draft Convention
already requires Member States of the AU (when developing their cybercrime
laws) to take into account the language used in international cybercrime
legislations such as the Convention on Cybercrime and the Commonwealth
Model Law where necessary.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
35
8. ECOWAS Approach to Cybercrime (Mr. Uchenna Jerome Orji)
The presentation commenced by rendering an overview of the development of
cybercrime control initiatives by the Economic Community of West African States
(ECOWAS) and then went on to analyze the provisions of the
ECOWAS
Directive C/DIR.1/08/11 on Fighting Cybercrime. It was shown that the Directive
conformed to most of the standards of the Convention on Cybercrime by
adapting substantive provisions criminalizing acts such as illegal (fraudulent)
access to computer systems, illegal remaining in a computer system, illegal input
of data into a computer system, illegal interception of computer data, illegal
modification of data, computer data forgery, misuse of devices, child
pornography, and the use of a computer system to commit Xenophobic offences.
However, it was shown that article 6 of the Directive which criminalizes the act of
interfering with the operation of a computer system does not explicitly limit the
criminalization of interference with a computer system to instances where such
acts were intentionally carried out “without right” as seen under article 5 of the
Convention on Cybercrime. Hence, it was submitted that the implementation of
the article 6 of the Directive in its present form may be problematic for IT
professionals testing products and for persons who may have interfered with the
functioning of a computer system with lawful intentions. It was also shown that
article 27 of the Directive which provides for corporate criminal liabilities exempts
State, local authorities and Public establishments from liability. Hence, it was
submitted that such exclusion of liability may permit the arbitral exercise of state
powers such as the searching and interception of electronic data resulting in the
violation of the human rights to privacy. As such, it was advised that it may be
necessary for States to be careful while implementing the Directive by limiting the
liabilities of State institutions to situations where acts that could have given rise to
liability for cybercrime offences were judicially authorized or carried out on the
basis of criminal law provisions or in the interests of national security. The
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
36
presentation also showed that the Directive fails to create safeguards to ensure
that procedural instruments for do not violate fundamental human rights.
The presentation briefly discussed the ECOWAS Convention on Mutual
Assistance in Criminal Matters (A/P1/7/92) and the ECOWAS Convention on
Extradition (A/P1/94) which could be used by Member States to render mutual
assistance on cybercrime issues. It was shown that despite the existence of
article 35 (1) of the ECOWAS Directive on Cybercrime which mandated Member
States to adopt the measures in order to comply with the Directive not later than
1st January 2014, that many of the Member ECOWAS States such as Burkina
Faso, Cape Verde, Guinea, Guinea-Bissau, Liberia, Mali, Nigeria, and Togo have
not enacted cybercrime laws, although, there are some ongoing initiatives to
develop such laws in some of the states. The presentation also submitted that “in
the absence of an effective mechanism to ensure that Member States timely
comply with their obligations to under the Directive, the assurance of timely
regional harmonization and even cross border cooperation within the ECOWAS
may be uncertain to a great extent”.
The presentation also gave a brief overview of the development of cybercrime
laws in Liberia, Sierra Leone and Senegal and then provided a comprehensive
analysis of the cybercrime laws (including draft laws) of ECOWAS Member
States namely: Gambia, Nigeria and Ghana. In the case of Gambia it was shown
that its cybercrime law fell short of some of the standards in the Council of
Europe Convention on Cybercrime as it failed to provide for copyright offences,
xenophobic offences, criminal liabilities of corporate offenders, procedural
mechanisms for the investigation and prosecution of cybercrime offences, and
mechanisms for the rendition of mutual assistance and international cooperation.
In the case of Nigeria, it was shown that the Nigerian Cybercrime Bill 2013 met
most of the standards of the Convention on Cybercrime and also added some
other provisions that were not established under the Convention. However, the
Bill appeared not to provide adequate procedural safeguards for the protection of
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
37
fundamental human rights. It also failed to explicitly provide for judicial review
and independent supervision mechanisms to regulate the powers of law
enforcement agencies in the investigation and prosecution of cybercrime. The
Bill also failed to establish provisions for copyright offences and the liabilities of
service providers for cybercrimes committed through the use of their networks or
facilities.
Special focus on Ghana’s Cybercrime Law
The presentation focused more on Ghana’s Cybercrime Law contained in the
Electronic Transactions Act (2008). It showed that Ghana’s cybercrime law met
most of the standards under the substantive criminal and procedural law
provisions of the Convention on Cybercrime and that the law further added
several provisions that were not explicitly established under the Convention such
as cyber theft, cyber appropriation, charlatanic advertisements, spamming and
the intentional dissemination of viruses to disrupt the function of a computer.
However, the Act fails to establish criminal liabilities for corporate offenders. It
also fails to establish explicit provisions to govern international cooperation, the
rendition of mutual assistance, and the extradition of offenders. The presentation
suggested that the absence of mechanisms for international cooperation, mutual
assistance, and the extradition of offenders under Ghana’s Cybercrime law can
be remedied to some extent if Ghana accedes to the Convention on Cybercrime.
Through this process, Ghana would be able to leverage the Convention as a
legal instrument for rendering or receiving cooperation from countries that are
parties to the Convention.
The presentation then went on to highlight the absence of information on the
development of cybercrime laws in Burkina Faso, Cape Verde, Guinea, GuineaBissau, Mali, and Togo. At this point, Dr. Seger, pointed out that Côte d’Ivoire,
and Benin have adopted substantive Cybercrime laws.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
38
Challenges to cybercrime control initiatives in the ECOWAS were also discussed.
These include: the absence of mechanisms to compel ECOWAS Member States
to implement the Directive on Cybercrime; the absence of regional mechanisms
for the coordination of cybercrime initiatives; very slow legislative responses at
the national levels; poor regulatory awareness; lack of information on national
cybercrime initiatives; lack of expertise; weak law enforcement capacity; poor
judicial awareness; poor funding of cybersecurity initiatives; under reporting by
both corporate bodies and individuals; lack of end-user awareness; and poor
socio-economic conditions.
The presentation ended with several proposals to strengthen cybercrime
responses in the ECOWAS region. Some of the proposals include the following:
(1) The ECOWAS Commission may have to consider the option of incentives
and sanctions for Member States that implement or fail to implement the
Directive on Cybercrime in their national laws.
(2) There is need to establish rules for cross – border cooperation and
technical
assistance
on
cybercrime
issues
under
the
ECOWAS
Convention on Mutual Assistance in Criminal Matters (A/P1/7/92).
(3) The Commission should establish a regional Office to effectively
coordinate regional cybercrime responses and also assist Member States
in the development of their national cybercrime regimes in order to
enhance the effective harmonization cybercrime laws.
(4) The Commission should establish a data base of national and
intergovernmental cybercrime initiatives in the ECOWAS region.
(5) The Commission may consider the option of encouraging Member States
to accede to the Convention on Cybercrime in order to leverage the
Convention as a legal instrument for rendering or obtaining cross border
cooperation from other State parties to the Convention.
(6) The Commission should promote research and development activities in
the area cybercrime control.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
39
(7) Member States of the ECOWAS should also develop rules on the handling
of digital evidence.
(8) There is need for capacity building in legislative institutions to enhance the
timely passage of cyber laws.
(9) There is need for capacity building in regulatory and law enforcement
institutions and the judiciary.
(10) The Council of Europe may consider the development a policy of cyber
diplomacy for the ECOWAS region and also consider the option of
incentives such as technical assistance and capacity building measures to
States that accede to the Convention on Cybercrime.
(11) The Council of Europe may also consider working with the ECOWAS
Commission to develop programmes to strengthen cybersecurity in the
region.
Issues were raised as to whether there were any regional follow-up mechanisms
for monitoring the implementation of the ECOWAS Directive on Cybercrime. In
response, it was noted that there appeared to be none in the circumstance. It
was also pointed out that the ECOWAS also lacked mechanisms to sanction its
Member States that had failed to implement the ECOWAS Directive on
Cybercrime after its deadline of 1st January, 2014. Other comments were also
entertained from participants.
9. Future plans for ACCP
1. Encourage the ECOWAS Commission to develop follow-up mechanisms
for monitoring the implementation of the ECOWAS Directive on
Cybercrime.
2. Organise a two day follow up event in 6 (six) month time to assess how
the participating states have implemented what was learnt in Accra,
Ghana.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
40
3. Develop proposals for additional workshops to be hosted in the Arab
Maghreb region and Central African region.
Acknowledgments: ACCP thanks the Council of Europe (Cybercrime OE, the
Government of Ghana and the United Nations Conference on Trade and
Development (UNCTAD) for its generous support in hosting the workshop.
Report compiled by: Prof Maicibi Alhas, Dr John Kissembo , Dr Mohamed
Chawki, Jemima Njeri, Barrister Russel Tyner, Mr Patrick Mwaita , Mr Albert
Antwi-Bosiakako, Dr Maureen Owor, Attorney Sizwe Lindelo Snail ka Mtuze and
Barrister Uchenna Jerome Orji.
African Center for Cyberlaw and Cybercrime Prevention (ACCP)
P.O Box 10590, Kampala, Uganda.
Tel. +2566 414 221 119
Fax +256 312 263 797
Web site http://cybercrime-fr.org/index.pl/accp
Download