Cyberspace Law materials - Crime 1. Introduction ...................................................................................................... 1 1.1. 2. Cybercrime in Australia 2 Unlawful Access and Computer Trespass ...................................................... 3 2.1. Case study: US v Robert Tappan Morris 5 3. Modifying Data and Impairment of electronic communication .................. 6 4. Theft of Data ..................................................................................................... 7 5. Computer Fraud ............................................................................................... 7 6. Cyber-Stalking and Harassment ..................................................................... 8 6.1. 6.2. Case Study: DPP v Sutcliffe Case Study: State of California v Dellapenta 9 10 7. Possession of child pornography ................................................................... 10 8. Cybercrime Act 2001 (Cth) and State Legislation ...................................... 11 9. International Cybercrime Treaty ................................................................. 12 1. Introduction As society becomes ever more reliant on computers and the Internet, cyberspace crime becomes increasingly prevalent. The ‘2002 Australian Crime and Computer Survey’ revealed that 67% of organisations surveyed experienced an electronic attack, twice the level experienced in 1999, and higher than the US, with 35 % of these companies experiencing six or more attacks. Yet despite the frequent occurrence of cyberspace crime there is a reluctance to report offences, 61% of respondents choose not to take any legal action. (http://www.auscert.org.au/download.html?f=11) So what type of crimes are being committed? Federal Agent Mark Walters of the Australian Federal Police reported that in 9 months in 2001 the AFP received 320 ecrime referrals.(http://www.austlii.edu.au/au/other/CyberLRes/2001/31/) Of these: 54% were in relation to online child pornography and paedophilia, 16% involved hacking, and denial of service attacks, reports of Internet viruses, Trojans and worms accounted for 8% of referrals. Cybercrime 1 06 - Cyberspace Law materials - Crime Page 2 threats, harassment and stalking over the Internet (8%) and fraud (6%). For a paper looking at cybercrime from both an International and Australian perspective read Australian Institute of Criminology’s paper Computer Crime (http://www.aic.gov.au/conferences/fraud/smith.pdf). While slightly out of date in terms of recently released policy and statistics it still serves as a good overview on cybercrime and the need for regulation. 1.1. Cybercrime in Australia Under the Australian system of Government, all Australian States and Territories have a general power to enact criminal laws to operate within their own borders. The Commonwealth is limited to enacting criminal laws which fall within one of its heads of constitutional power. The Commonwealth’s constitutional power to enact laws with respect to "telephonic, telegraphic and other like services" (s 51(v) of the Constitution) is of particular relevance in the context of cyberspace crime. Split between State and Federal Laws In many areas, including cyberspace crime, Commonwealth and State and Territory offences exist and operate side by side. See Commonwealth Constitution s51 (try ComLaw) for the heads of power for Cth law - anything outside of these 35 is state material. State The State and Territory offences applying generally to wrongful conduct within that jurisdiction Federal The Commonwealth offences targeting particular aspects (for example, offences involving computers owned or leased by the Commonwealth, and offences involving a telecommunications carriage service). In addition to this the Commonwealth’s Cybercrime Act 2001 offers more comprehensive regulation of computer and Internet related offences. The Cybercrime Act replaced previous section 76 of the Crimes Act 1914 (Cth) that dealt with computer offences . The Act amended the Criminal Code Act 1995 (Cth) with general offences concerning unauthorised access, modification and impairment of data (see part 10.7 of the Code: http://www.austlii.edu.au/au/legis/cth/consol_act/cca1995115/sch1.html ) File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime Page 3 Following the lead of their federal counterparts, many states have updated, or are in the process of updating the law in this area. Subsequent to the Cybercrime Act 2001 numerous legislative initiatives have been made, including: 2. Crimes Legislation Amendment (Telecommunications Offences and Other Measures) Act (No. 2) 2004. (http://www.comlaw.gov.au/ComLaw/Management.nsf/lookupindexpage sbyid/IP200613231?OpenDocument) Criminal Code Amendment (Suicide Related Material Offences) Act 2005 (Cth) (http://www.comlaw.gov.au/ComLaw/Legislation/Act1.nsf/all/search/30 4ACF9E0F446FFDCA257038001821BF) Security Legislation Amendment (Terrorism) Act 2002 (Cth): (http://www.comlaw.gov.au/ComLaw/Legislation/ActCompilation1.nsf/ all/search/BF11D64CD73A126FCA256F7100572137). Unlawful Access and Computer Trespass "Hacker" and "cracker" are terms which are used to describe people who intentionally seek to access computer systems or networks with dishonest intentions. A cracker may access a system with destructive or malicious intentions, such as to alter data or to spread a virus, whereas a hacker is generally motivated by curiosity. (Akindemowo, Olujoke (1999) ‘Computer Crime, Telecommunications and Internet Abuse’, Chapter 5 Information Technology Law in Australia, Law Book Company) Hackers and crackers may be criminally liable if they access, or access and continue to examine ‘restricted data’. (see Division 477 and 478 Criminal Code 1995 (Cth) (http://www.austlii.edu.au/au/legis/cth/consol_act/cca1995115/sch1.html )) . Cracking may also involve damage to data and fraud. The Commonwealth, the States and the ACT have enacted laws in relation to computer trespass and the unauthorised access of data (try AustLII): s478.1, 477.1 Criminal Code 1995 (Cth). s 9A Summary Offences Act 1966 (Vic) ss 308C – 308H Crimes Act 1900 (NSW) s 44 Summary Offences Act 1953 (SA) s 135J Crimes Act 1900 (ACT) s 440A Criminal Code Act 1913 (WA) File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime Page 4 s 408D Criminal Code 1899 (Qld) s 257D Criminal Code Act 1924 (Tas)). Commonwealth data Most of the relevant provisions in the Commonwealth code relate specifically to Commonwealth data, that is, data which is stored in a Commonwealth computer or data which is stored on behalf of the Commonwealth in a computer that is not a Commonwealth computer (see s476.1 Criminal Code 1995 (Cth)).For example, the Commonwealth Act provides that a person who intentionally and without authority obtains access to restricted Commonwealth data is guilty of an offence (s478.1 ) The relevant Victorian Act states that a person must not gain access to, or enter, a computer system or part of a computer system without lawful authority to do so (Summary Offences Act 1966 (Vic), section 9A). In New South Wales a person who among other things causes unauthorised access to or modification of restricted data held in a computer is guilty of an offence (s 308H Crimes Act 1900 (NSW)). Prior to the Cybercrime Act 2001 the Crimes Act 1914 had separate offences which dealt with the unauthorised access of particularly sensitive data; Including data relating to the ‘security, defence or international relations of Australia’, and ‘the personal information of any person’. The new Criminal Code doesn’t have such special offences relating to access to particular data. Rather, it includes several new serious offences with penalties of up to 10 years imprisonment. Including: Unauthorised access, modification or impairment with intent to commit a serious offence (section 477.1) a serious offence includes both Commonwealth and State and Territory crimes with maximum penalty’s of 5 years imprisonment. Unauthorised impairment of electronic communication (section 477.3) This section was included in an attempt to halt the growing rise of ‘denial of service attacks’, where a particular service provider is forced offline by repetitive and constant legal accesses.The Criminal Code extends unauthorised access crimes beyond instances were unauthorised access has been acquired over data stored on Commonwealth (or Commonwealth leased) computer systems. It is a crime to access, modify or impair any ‘restricted data’ via a carriage service (as defined in s7 Telecommunications Act 1997(Cth) as being ‘a service for carrying communications by means of guided and/or unguided electromagnetic energy.’). The broad definition of ‘carriage service’ means crimes can be proven with unauthorised access of both private and public data. It is a requirement under the Criminal Code to make out the unauthorised access offence (478.1) that the data accessed is restricted data. Restricted data is defined (in section 477.1 (3)) as data: File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime Page 5 (a) held in a computer; and (b) to which access is restricted by an access control system associated with a function of the computer. Further Reading: For a ‘A Brief History of Computer Hacking’ read http://www.chiroweb.com/columnist/devitt/ For an example of someone being convicted of hacking read ‘Aussie hacker gets two year sentence’ (http://www.zdnet.com.au/newstech/security/story/0,2000024985,20261598-1,00.htm) (R v Boden [2002] QCA 164) 2.1. Case study: US v Robert Tappan Morris US v Robert Tappan Morris 1991 928 F2d 504 (United States Court of Appeals for the Second Circuit) Morris intended his worm to be benign, not to interfere with normal processing on computers, but merely to demonstrate conclusively the security flaws in Unix (and the technological potential of computer worms). The problem which he did not anticipate was that if the worm duplicated itself numerous times on one computer it could bog it down. Therefore, the worm would 'ask' the computer if it was already there and if so not duplicate itself. However, Morris set the program so that it would still duplicate itself once every 7 'yes's, just in case system controllers were trying to stop it by causing computers to respond with false 'yes's. The problem was that the 1/7 ratio still caused the bogging down that Morris was trying to avoid! This led to $100,000s costs to internet server operators while computers everywhere on the Internet had to be shut down in order to get rid of it. Newman J held: — The requirement of intention only applied to obtaining unauthorised access, not to causing damage (ie strict liability for damage flowing from unauthorised access - M's benign intentions were irrelevant). [See later concerning Australian provisions re damage] — The US Act was not only aimed at 'hackers'. Those with some authorised access to Federal computers can be liable if they exceed it to gain access to other 'federal interest' computers. Here, there were two reasons why M exceeded his authority: (a) he had authority to use SendMail and Finger to communicate with other federal computers, but 'he did not use either of those features in a way related to their intended function. He did not send or read mail nor discover information about other users; instead he found holes in both File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime Page 6 programs ...'; and (b) 'the worm was designed to spread to other computers at which he had no account and no authority, express or implied, to unleash the worm program' (including by guessing passwords). (http://www.austlii.edu.au/au/other/crime/Morris.html) 3. Modifying Data and Impairment of electronic communication A variety of Commonwealth, State and Territory laws exist which make it an offence for a person to alter or impair information stored on a computer, or to impede access to a computer (s 9A Summary Offences Act 1966 (Vic); ss 308C – 308E Crimes Act 1900 (NSW); s 44 Summary Offences Act 1953 (SA); s 135K Crimes Act 1900 (ACT); s 257C Criminal Code 1924 (Tas)). For example, the New South Wales Crimes Act provides that a person who intentionally and without authority or lawful excuse destroys, erases or alters data stored, or inserts data into a computer, or interferes with, or interrupts or obstructs the lawful use of a computer is liable to imprisonment or a fine, or both (ss 308C and 308D). The Commonwealth access offences (478.1 and 477.1 Criminal Code 1995) can also be made out where the data has been ‘modified’. Modification is defined as (in section 476.1 Criminal Code): a) the alteration or removal of the data; or b) An addition to the data. Before the Cybercrime Act 2001, offences in the Crimes Act 1914 (Cth) bundled together unauthorised modification/deletion of data and impairment of access to computers. However, now, in the Criminal Code several unique offences exist relating to impairment of electronic communication. Firstly, section 477.2 outlines that unauthorised modification of data to cause impairment is a serious offence (max penalty 10 years imprisonment). The accused merely needs to be reckless as to whether their modification will impair: - access to that or any other data held in the computer, or - the reliability, security or operation, of any such data. Secondly, unauthorised impairment of electronic communication (s477.3) is also a serious offence. An accused is guilty if they caused unauthorised impairment of communications to or from a computer, and they intended to do so. File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime Page 7 The Criminal Code also includes a new, minor offence (2 years imprisonment) of ‘Unauthorised impairment of data held on a computer disk’ (s478.2). The difference between the effect of this section and section 477.3/477.2 is it doesn’t apply where impairment of communications over a carriage service has occurred, rather only applying where impairment has been made to data stored on a commonwealth computer disk. However, since almost all computers are networked over carriage services and most electronic communications are conducted over carriage services it is difficult (though not impossible) to imagine situations where prosecutions would be made under the less serious 478.2, rather than the more severe 477.3/477.2. 4. Theft of Data The question of whether there can be theft of computer data remains unsettled. An intruder into a computer system who dishonestly appropriates information is likely to be charged with unauthorised access or computer trespass, rather than theft. Criminal Code Amendment (Theft, Fraud, Bribery and Related Offences) Act 2000 (Cth) (http://scaletext.law.gov.au/html/comact/10/6251/top.htm) provides that a person is guilty of theft if they dishonestly appropriate property belonging to another with the intention of permanently depriving that person of the property, and the property belongs to a Commonwealth entity (s 131.1 Criminal Code (Cth)). Property is defined by the Code to include "intangible property". It remains to be seen whether computer data will fall within this definition. Internetnews.com’s article (http://www.internetnews.com/busnews/article.php/1474961) highlights just how significant the problem of ‘stolen’ data can be. 5. Computer Fraud Fraud in the off-line environment generally involves deception through the use of a tangible object, such as a created document. In cyberspace, however, fraud may be committed through the use of digital technology without the need for any such object. Section 477.1 of the Criminal Code 1995 (Cth) allows for prosecutions to be made where computers are used in attempts to commit serious criminal offences, for example: fraud. If unauthorised access, modification or impairment of data occurs with intent to commit a serious offence (one that an individual may receive a 5 year imprisonment from) the individual commits a serious offence in accessing, modifying or impairing that data. And is liable for the penalty that would be granted should the serious criminal offence (fraud) have been committed (maximum 10 year’s imprisonment). Laws dealing specifically with computer fraud have also been established under State legislation. Victorian File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime Page 8 (See also Part 1 Div 2 Crimes Act 1958 (Vic); Part 4 Div 1 Subdiv 7 Crimes Act 1900 (NSW); s 184 Criminal Law Consolidation Act 1935 (SA); Part 4 Crimes Act 1900 (ACT); Part 6 Criminal Code Act 1913 (WA); Part 6 Div 1 Criminal Code (Qld); Part 7 Criminal Code 1983 (NT), in relation to fraud generally). The Tasmanian Criminal Code, for example, states that a person who, uses a computer with intent to defraud, is guilty of the crime of computer-related fraud (s 257B). Victoria’s Crimes (Property Damage and Computer Offences) Bill http://www.dms.dpc.vic.gov.au/domino/Web_Notes/LDMS/PubPDocs_Arch.nsf/5da74 42d8f61e92bca256de50013d008/43de6d1c492085dfca2570d8001ba393!OpenDocumen t) is currently (as at late March 2003) before the Legislative Assembly, having already been certified by the Lower House. The Bill implements the recommendations of the January 2001 Model Criminal Code report: Damages and Computer Offences. The Bill is expected to pass through the Legislative Assembly given that the Government possesses a clear majority. For an article on computer fraud in NSW and law enforcement read Computer fraud on the rise: experts (http://www.smh.com.au/articles/2002/06/04/1022982692576.html) Australian Institute of Criminology’s paper Confronting Fraud in the Digital Age (http://www.aic.gov.au/conferences/fraud/smith.pdf) looks at types of computer fraud, how it is perpetrated and methods of regulation. 6. Cyber-Stalking and Harassment Stalking is commonly defined as the act of frequently giving unwanted attention to a person with the intention of intimidating them or causing them to fear for their safety or the safety of others. Cyber-stalking is comparable to traditional stalking in that it involves persistent behaviours that instil fear in the victim, however it is executed though the use of technologies such as email, the Internet, chat rooms, instant messaging, bulletin boards, web-based discussion forums, IRC, and/or usenet groups. So far Victoria is the only state that has specifically legislated against cyber-stalking with its Crimes (Stalking and Family Violence) Bill (http://www.dms.dpc.vic.gov.au/domino/Web_Notes/LDMS/PubPDocs_Arch.nsf/ee665 e366dcb6cb0ca256da400837f6b/F5D53F48603C0982CA2570D70018CECD/$FILE/55 1026exi1.pdf) that was introduced to parliament on the 25th of March 2003. It imposes a maximum sentence of 10 years imprisonment for cyberstalking. Types of conduct that will amount to stalking include: Sending obscene, or harassing e-mails; Posting false information or doctored images of people on the Internet; and Assuming the identity of another person. File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime Page 9 The key features of the Bill is include that it removes the essential requirement from current stalking law that the victim is aware that they are being stalked by the defendant, and once in operation the law will have extra-territorial effect. Currently under Victorian legislation a ‘course of conduct’ that is considered stalking is sending electronic messages (s 21A Crimes Act 1958 (Vic) and s 359B Criminal Code Act 1899) In other states cyber-stalking is covered by stalking legislation generally. For example, it is an offence for a person to knowingly or recklessly use a carriage service supplied by a carrier to menace or harass another person or to use a carriage service supplied by a carrier in such a way as would be regarded by reasonable persons as being, in all the circumstances, offensive (s 85ZE Crimes Act 1914 (Cth)). (Note: this provision does not apply to Internet content which is regulated under the Broadcasting Service Act 1992 (Cth), and other offences of specific application such as those governing pornography). Any conduct which could reasonably be likely to arouse an apprehension of fear in the victim is an offence (See s 21A(2)(b) Crimes Act 1958 (Vic); s 562AB Crimes Act 1900 (NSW); s 19AA Criminal Law Consolidation Act 1935 (SA); s 34A Crimes Act 1900 (ACT); s 359A Criminal Code 1995 (Qld); s 338D Criminal Code 1913 (WA); s 192 Criminal Code 1924 (Tas); s 189 Criminal Code 1983 (NT)). Accordingly, sending email or posting messages on interactive Internet forums such as bulletin boards or chat rooms may constitute stalking. An intervention order is the most common remedy for stalking. Breach of an intervention order may result in imprisonment. For a detailed look at cyber-stalking read the Australian Institute of Criminology Trends and Issues Paper No. 166 ‘Cyberstalking’ (www.aic.gov.au/publications/tandi/ti166.pdf) 6.1. Case Study: DPP v Sutcliffe Apart from being an example of cyberstalking, DPP v Sutcliffe [2001] VSC 43 (http://www.austlii.edu.au/au/cases/vic/VSC/2001/43.html) also highlights the problem cross-jurisdictional issues that often arise when the Internet and other like technologies are involved and how cyberstalking often occurs in conjunction with more traditional forms of stalking. Brian Andrew Sutcliffe was charged under s 21A of the Crimes Act 1958 (Vic) with stalking Canadian actress Sara Ballingal (formerly on the television programs Degrassi Junior High and Degrassi High), accused of sending the actress threatening phone calls, letters and emails over a period of six years. While Sutcliffe was charged in Victoria, the state from which he perpetrated the crime, the effects of it were felt in Canada where the victim resides. Who then has jurisdiction? The magistrate from when the case was initially heard, found she could not hear the case because the effect of the crime was felt in Canada, not Victoria. File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime Page 10 “I'm not convinced that this court has jurisdiction to proceed with this charge of stalking. It is an essential element of the offence that any course of conduct engaged in, by the defendant, actually did have the effect of arousing apprehension or fear in the victim for her personal safety. This can only have occurred in Canada…[and] I find that nothing to displace the presumption that a penal statute will be taken not to have extra-territorial operation.” Para 16 DPP v Sutcliffe [2001] VSC 43 However on appeal to the Supreme Court of Victoria, Gillard J found that Magistrate Wakeling was wrong in deciding that s 21A did not have extraterritorial application. He found that “to so confine the legislation [to Victoria only] would be to stultify it or make it unworkable in respect to certain conduct which was clearly stalking” (at para 91) and ordered “that the charge be remitted to the Magistrates' Court” (at para 104). Sutcliffe lodged an appeal against the Supreme Court decision, although on the 7th of April 2003 Mr Sutcliffe was refused leave to appeal to the NSW Court of Appeal. 6.2. Case Study: State of California v Dellapenta In State v Dellapenta (Los Angeles Superior Court 1999) 50 year-old, Gary Dellapenta plead guilty to one count of stalking and three counts of soliciting sexual assault to a 28 year-old woman who rejected his romantic advances. In various Internet chat rooms and bulletin boards Dellapenta impersonated the victim posting her name, address and telephone number claiming that she fantasies about being sexually assaulted. On at least six occasions, sometimes in the middle of the night, men knocked on her door saying that they wanted to rape her. She posted a note on her apartment door saying that the Internet postings were fake only later to find further online postings saying to disregard that notice and that it was all part of her fantasy. The victim was never actually sexually assaulted but was in a considerable amount of fear for her safety. The case marks the first time California’s cyberstalking law (California Penal Code s 646.9) was invoked. http://www.wired.com/news/politics/0,1283,17504,00.html 7. Possession of child pornography Possession of child pornography cached on a personal computer as a result of an Internet browsing session may constitute an offence under State laws. For example, in NSW, a person who has in his or her possession any child abuse material is guilty of an offence which carries a maximum penalty of $11,000 or imprisonment for 2 years or both (s 91H Crimes Act 1900 (NSW)). File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime Page 11 Child pornography is material (includes any form of recording from which a visual image, including a computer generated image, can be produced) that is refused classification or would, if classified, be refused classification by the Office of Film and Literature Classification Board on the basis that it describes or depicts, in a way that is likely to cause offence to a reasonable adult, a person (whether or not engaged in sexual activity) who is a child under 16 or who looks like a child under 16. Property in a person’s custody or knowingly in the custody of another person is considered to be possession (s 7 Crimes Act 1900 (NSW)). Child pornography is also prohibited on the Internet (and prohibited from being broadcast generally) under the Broadcasting Services (Online Services) Amendment Act 1999 (Cth) which changes the 1992 BSA . (http://corrigan.austlii.edu.au/au/legis/cth/consol_act/bsa1992214/) Child Pornography, the Internet and offending (http://www.isuma.net/v02n02/taylor/taylor_e.shtml) adopts a rather psychological perspective in looking at child pornography on the Internet. 8. Cybercrime Act 2001 (Cth) and State Legislation The Cybercrime Act 2001 (Cth) (http://www.austlii.edu.au/au/legis/cth/consol_act/ca2001112/index.html) and the mirror State legislation criminalise harmful technology assisted activities, such as producing a destructive virus, hacking and cracking. It also imposes heavy penalties on offenders and increases police powers of investigation. Many of the Act’s provisions are modelled on the Council of Europe Draft Convention on Cybercrime 2001 (the finalised version of which is the International Cybercrime Treaty, see below). In NSW the Crimes Amendment (Computer Offences) Act 2001 (http://www.austlii.edu.au/au/legis/nsw/consol_act/caoa2001330/index.html#s3) was enacted which replicated the provisions of the Commonwealth legislation. Certain sections also have extra-territorial application, recognising the fact that the effect of many computer crimes are not felt in the same state or even country from which they originate (s 308C(3) and s 308F(2)(b)). Discussion and Criticism of Commonwealth/State Acts: For an article criticising the Commonwealth Act see: http://www.smh.com.au/articles/2002/11/25/1038173686523.html Another good page containing information on the Cybercrime Act is Electronic Frontiers Australia’s: http://www.efa.org.au/Issues/Security. It also includes a link to a detailed analysis of the Act. File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime 9. Page 12 International Cybercrime Treaty The Council of Europe released the International Cybercrime Treaty (http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm [Detailed reading is not required, though you may wish to refer to specific parts in reaction to comments and concerns raised below]). It was officially released on 23 November 2001 and is “the first international treaty to address criminal law and procedural aspects of various types of offending behaviour directed against computer systems, networks or data as well as other similar abuses.”: A CoE Press Release "Crime in Cyberspace - First Draft of International Convention Released for Public Discussion", 27 April 2000, http://www.privacyinternational.org/issues/cybercrime/coe/cyber.htm, summarised the Convention (in its first release) as follows: The draft provides, among others, for the co-ordinated criminalisation of computer hacking and hacking devices, illegal interception of data and interference with computer systems, computer-related fraud and forgery. It also prohibits on-line child pornography, including the possession of such material after downloading, as well the reproduction and distribution of copyright protected material. The draft Convention will not only define offences but will also address questions related to the liability of individual and corporate offenders and determine minimum standards for the applicable penalties. The draft text also deals with law enforcement issues: future Parties will be obliged to empower their national authorities to carry out computer searches and seize computer data, require data-subjects to produce data under their control, preserve or obtain the expeditious preservation of vulnerable data by data-subjects. The interception of data transmitted through networks, including telecommunication networks, is also under discussion. These computer-specific investigative measures will also imply co-operation by telecom operators and Internet Service Providers, whose assistance is vital to identify computer criminals and secure evidence of their misdeeds. As computer crimes are often international in their nature, national measures need to be supplemented by international co-operation. The draft treaty therefore requires future Parties to provide each other various forms of assistance, for example by preserving evidence and locating online suspects. The text also deals with certain aspects of trans-border computer searches. Traditional forms of mutual assistance and extradition would also be available under the draft Convention and a network of 24 hours/ day, 7 days/week available national contact points would be set up to speed up international investigations. For a CoE press release on the completed treaty see http://www.privacyinternational.org/issues/cybercrime/coe/cdpc-approval-601.html. many drafts the Treaty remains substantially unaltered. File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 Despite the 06 - Cyberspace Law materials - Crime Page 13 Some of the many points of the treaty which should be noted include: A4 'Data Interference' and A5 'System Interference' intended to deal with 'denial of service' attacks through the concept of 'suppression' of data, which is interpreted to include actions which 'render inaccessible' data by preventing someone accessing it. The production, sale etc of 'devices' (including programs) 'designed or adapted primarily' for committing computer crimes, with intent that they be so used, is required to be criminalised (A6). Efforts are made to stop this provision extending to cover those 'hacking' tools which are legitimately used for testing the security of systems (A6(2), and the intent elements of the offence), but this remains a very controversial inclusion. Title 3 'Content-related offences' establishes international criminal sanctions in relation to distribution of child pornography through computer systems (A9) It requires laws compelling service providers to maintain real-time usage logs in relation to particular communications (A20), and intercept data (A21). It requires States to 'establish jurisdiction' over offences covered by the Convention which are committed by its nationals in other countries, which are covered under the criminal law of the country where committed (A23). (For example, if an Australian, in Australia, commits an offence which breaches a computer crime law of the People's Republic of China). There are extensive provisions in Chapter III 'International Cooperation' concerning: Extradition (Title 2): All offences covered by the Convention are automatically included under existing extradition treaties by State parties (A25.2), and the Convention itself is the legal basis for extradition in the absence of a treaty (A25.3); Sharing of information and other forms of 'mutual assistance' to identify computer criminals and secure evidence of their misdeeds. The treaty came into force on the 1st of July 2005, after five members of the council ratified it (Croatia, Albania, Estonia, Hungary and Lithuania). See: http://news.zdnet.co.uk/itmanagement/0,1000000308,39149470,00.htm Center for Democracy and Technology Cybercrime (http://www.cdt.org/international/cybercrime) page contains links to many resources concerning the Convention including much critical comment. Global Internet Policy Initiative’s report Trust And Security In Cyberspace: The Legal And Policy Framework for Addressing Cybercrime (http://www.gipiproject.org/cybercrime/020800cybercrime.pdf) is a good paper on international cybercrime law with a focus in the International Cybercrime Treaty (particularly chapters 3 and 4) The Treaty has received much criticism; primarily that it does not sufficiently protect civil liberties. For a look at some of the shortcomings of the Treaty read: File: D:\106751476.doc Revision: 8 Date: 3 March, 2016 06 - Cyberspace Law materials - Crime Page 14 TreatyWatch’s Eight Reasons the International Cybercrime Treaty Should be Rejected (http://www.treatywatch.org/TreatyProblems.html); Cnet news article International cybercrime treaty finalized (http://news.com.com/21021001-268894.html) The Computerworld article Controversial cybercrime treaty ready for signatures (http://www.computerworld.com/securitytopics/security/story/0,10801,65521,00.html) In 2011 the Australian Parliament started to deal with legislation that would change our law to comply with the Convention, and thus later allow us to ratify it. See the Cyberspace Law and Policy Centre’s invited submissions in writing and Hansard in late 2011 http://www.aph.gov.au/house/committee/jscc/cybercrime_bill/subs/sub20.pdf the Cybercrime Legislation Amendment Bill 2011, the joint committee’s o inquiry page, o submissions list, and submissions o later report (acknowledged submissions, recommended no action to fix flaws identified), the revised bill (if one is ever made) and related coverage for examples of law creation in action! File: D:\106751476.doc Revision: 8 Date: 3 March, 2016