High tech laws needed for high tech crimes: Cyber stalking, Louse

advertisement
High tech laws needed for high tech crimes:
Cyber Stalking
Louise Fairbairn FORTE FAMILY LAWYERS and James Milsom BRIMBANK MELTON
COMMUNITY LEGAL CENTRE
Tips for practitioners
1. Be aware of the difficulties in identifying cyberstalking.
2. If you are concerned that one of your clients has
been a victim of cyberstalking refer them to
someone who specializes in this area (if you do
not).
3. Help educate people about this complex area of
law.
4. Be aware of your personal online presence.
The face of today’s criminal offender is drastically
different from that of 20 years ago. Today, criminal
offences can be committed from the other side of the
planet … without leaving home. In 1943, IBM’s CEO
Thomas Watson said “there is a world market for maybe
five computers”.1 Computers take so many different
forms today, whether as phones, tablets, laptops, desktop
computers or others entirely, meaning new and unique
cyber crimes constantly await invention.2
It seems there is no limitation on what crimes can be
committed. Legislating against potential future crimes is
almost impossible and creates the first problem with
policing cybercrime. Legislators must take an open
ended approach, leaving open the possibility of capturing future crimes. In Victoria, cyber stalking is defined
in s 21A(2) of the Crimes Act 1958 (Vic) as:3
(ba) publishing on the Internet or by an e-mail or other
electronic communication to any person a statement or other materialt
(i) relating to the victim or any other person; or
(ii) purporting to relate to, or to originate from, the
victim or any other person.
(bb) causing an unauthorised computer function (within
the meaning of subd (6) of Div 3) in a computer
owned or used by the victim or any other person.
(bc) tracing the victim’s or any other person’s use of
theInternetorofe-mailorotherelectroniccommunications.
222
This legislation is limited such that it is powerless to
combat the ever expanding nature of cyber stalking. The
anonymity and plausible deniability common to crimes
committed over the internet mean that threats and
physical danger that go hand in hand with real world
harassment will increase as access to the Internet becomes
more common.4
What is cyber stalking?
A person who commits an illegal act using a computer with an ulterior motive is known as a cyber
criminal.5 One of the fastest growing cyber crimes is
referred to as cyber stalking. This involves either an
individual or a group of individuals using digital media
in a way that causes others to suffer emotional distress.6
Repeated harassment over the internet over a period of
time results in cyber stalking.7
There are various mediums through which cyber
stalking can be carried out. These include chat rooms,
email, blogs, and social networking tools like Facebook
and Twitter.8 This is a serious crime and can lead to
other criminal acts including physical violence, identity
theft,9 forgery and criminal intimidation,10 as well as
potential civil wrongs.
Cyber bullying
A growing concern among younger internet users is
the emergence of cyber bullying. This is a form of cyber
stalking and involves the interaction of two young
people using the internet, cellphones, or any type of
digital technology. Cyber bullying involves specific or
general harassment as well as humiliation and embarrassment.11
One reason cyber bullying has grown in prevalence
so quickly is that individuals will often say things online
that they would not say in person, hiding behind their
online social persona. This is often then passed off as
playful banter rather than treated as a crime. This type of
harassment can have very harmful effects, much like it’s
internet law bulletin
December 2014
in person form, on younger generations. The true long
term psychological effects cannot be fully understood
because social media is still very much in its infancy.
Effects, such as emotional distress and withdrawal from
social network sites12 or even withdrawal from day to
day life itself, are very common.13 In the most extreme
cases cyber bullying can lead to severe emotional
distress brought about by the online aggression and
result in victims taking their own lives.14 Cyber stalking
must be treated as a serious offence and those engaging
in this form of harassment should face serious penalties
including potential imprisonment.15
The growth of cyber stalking
Social media has revolutionised the way people share
experiences with each other. One only has to travel on
public transport to observe passengers madly checking
Facebook status updates or Tweeting their last quirky
thought. Each of these individual social profiles represents an avenue for harassment to occur.16 Although the
growth of cyber stalking has been fast and aggressive,
the reaction by legislature and courts has been painstakingly slow. By the same token, government sponsored
educational campaigns targeting cyber stalking have not
been a priority.
Today, most Australians have a very different understanding of what constitutes a punishable offence when
it comes to cyber crime. Otherwise protective parents
might be lax in acting on these impulses due to a poor
understanding of the potential for harm to be done to
their children online. Cyber criminals have new tools at
their disposal every day and as a consequence are
becoming more adaptive than ever before.17
It is pivotal that the Australian government invests in
an advertising campaign to educate the general public on
what should be reported. Most importantly, an accessible
avenue to report cyber crime should be the main
message of any public education campaign. This may
make it easier for cyber stalking and bullying to be
identified and ceased at an early stage. While there have
been laws passed that specifically define cyber stalking,18 this is not enough to combat this dynamic crime.
Marketing as a form of cyber stalking
Cyber stalking is not just limited to individuals and
groups of individuals. Social media has become an
extremely important tool for businesses to expand their
reach. It is truly a global problem with India being the
front-running country for the generation of “spam”.19
This can take the form of a simple email and has evolved
into more serious crimes such as computer hacking.20
internet law bulletin
December 2014
Today almost half of Australians feel uncomfortable
with being targeted by online companies.21 Individuals
can be left being pigeon holed into a category that does
not reflect their true self.
Difficulties with legislating against cyber
stalking
Before attempting to recommend the appropriate
reforms and responses to cyber-crime, it is first important to identify the difficulties and restrictions needing to
be addressed. The rapid development in technology and
consequential rise in cyber crime has caught both
legislators and the general public unaware of how to
respond. Possibly the biggest limitation with cyber
crimes and more specifically cyber stalking is that the
general public is unaware of the various resources and
services available for law enforcement. Especially with
respect to the tyrannical distance between offenders and
victims in many instances, this leads to a significant
amount of unreported cyber-crimes.
When cyber stalking occurs a common response is
for victims to try to deal with this internally, perhaps
feeling a sense of embarrassment or shame. As with
numerous other offences, where reporting rates are low
it is difficult to accurately calculate the prevalence of
offending. Additionally, social media often blurs cultural
and geographic boundaries, and therefore it is difficult
— and quite subjective — to discern where to draw the
line between benign teasing and cyber harassment.22
The internet provides a playground for users to be
anonymous, creating plausible deniability for their actions.
When a crime is actually reported it is difficult to locate
the suspect, given the global reach of the internet. This
leads to significant global issues. Investigations are very
time consuming and often searches are fruitless due to
the ability of offenders to obscure their origins. Effectively, this ends the investigations or at least significantly restricts them. Correspondence with large online
companies such as Google, Hotmail, Yahoo, Twitter and
Facebook is also quite time consuming with no guarantee of locating a suspect given the anonymous nature of
internet use.23
Keeping up with technological advances and the
changing social habits of Australians has formed a
theme of this article. The government has no choice but
to pass legislation in a broad manner, opening offences
to interpretation to enable the ongoing utility of the law.
This deliberately lax regulation forms yet another challenge when policing cyber stalking. As a result, privacy
of information is often easily breached due to insufficient or overly ambiguous rules and regulations.24 At
this stage there has been no legal procedure formulated
to collect, analyse or present evidence in court.25
223
Finally as has been alluded to throughout the article,
there is inadequate training and funding dedicated to
cyber crime. Training to enable the policing of online
activity is cumbersome and has not yet formed a major
priority for the Australian government.
Recommendations to improve the fight
against cyber stalking
For change to a occur there needs to be a commitment
across a number of bodies including the general public,
information technology experts, courts, politicians, social
organisations and international support from other countries. Creating awareness among lawyers, police, the
judiciary and users can play a key role in the security of
information and most importantly identifying offenders.
As a first step, focus groups should be formed to
understand the cause as well as the solution. These
groups could play a key role in how to frame new
legislation and ultimately how to enforce the law. This
may result in a new legislative regime that captures all of
the aspects of cyber crime that has emerged, and it needs
to have the flexibility to allow for advancing technology.
Social networks form a very important part in the
fight against cyber-crime. Organizations such as Facebook
have been pro-active in preventing harassment in social
media and need to continue to lead the charge. Social
media organisations as well as network protectors have
an obligation to continue to develop tools to make it
easier to prevent cyber stalking, bullying and other
forms of cyber crime.26 As software becomes available
this should be publicised and circulated by the Government to enable accessibility to end users. Education is
the key to addressing this issue.
Conclusion
There is a dire need for evolving a code of ethics on
cyber space. Informing the Australian public is important so that Australians know how to report, what to
report and where to go if they feel they are being subject
to cyber stalking, bullying or another form of cybercrime.
Educating the public is the first step to stopping the
fast evolution of this crime and overcoming the shortfalls in difficulties with legislating. Since the cyber
world has no boundaries, it is a herculean task to frame
laws which can cover each and every aspect but education is the first and most important step.
It is also of the utmost importance that any new
legislative or enforcement regime be composed in a
manner that does not interfere with rights afforded to
citizens under the various charters to which Australia is
signatory. The right to privacy, for example, is of great
significance and, while it causes some difficulty in
224
addressing cyber crimes, it must not be eroded or set
aside simply to enable the prosecution of the few
offenders exploiting it.
What can you do? As individuals we might feel
helpless in this fight against cyberstalking, however we
can help by educating people around us about this
difficult and dynamic problem. Be aware that this may
be a problem faced by some of your clients. It is
important to be able to identify this at an early stage so
that you can assist you client in relation to this and refer
them onto someone with expertise in this area. Lastly,
ensure that your conduct online adheres to all codes of
ethics you are subjected to. Ensure that nothing you are
posting online in your private capacity could be misinterpreted or interpreted as cyber bullying or cyber
stalking.
Louise Fairbairn
Associate
Forte Family Lawyers
www.fortefamilylawyers.com.au
James Milsom
Deputy Managing Lawyer
Brimbank Melton Community Legal Centre
www.communitywest.org.au
Footnotes
1.
2.
3.
4.
5.
6.
Remark attributed to TJ Watson (Chairman of the Board of
International Business Machines) circa 1943.
Professor W Anderson, “Cyber Stalking (Cyber Bullying) —
Proof and Punishment” Missouri State University, 2010.
Crimes Act 1958 (Vic) No. 6231/1958: Pt 1 — Offences,
s 21A(2).
See eg, M Slater and C Bryden, “I can see you: harassment and
stalking on the Internet” Information & Communications
Technology Law Vol 18, No 2, June 2009, 99-122.
Above, n 4.
P Bocij (2004) Cyberstalking: Harassment in the Internet age
8.
and how to protect your family. Westport, CT: Praeger.
T Laer, “The Means to Justify the End: Combating Cyber
Harassment in Social Media”, J Bus Ethics (2014) 123:85-98.
Above, n 2.
9.
Above, n 2.
10.
R Chouhan, “Cyber Crimes: Evolution, Detection and Future
Challenges” Journal of Information Technology (2014), pp
7.
48–55.
11.
Above, n 2.
12.
J Avery (2010) Gender bender brand hijacks and consumer
revolt: The Porsche Cayenne story. In J Avery, S Beatty, M B
internet law bulletin
December 2014
13.
14.
15.
16.
17.
Holbrook, R V Kozinets, & B Mittal (Eds), Consumer behavior: Human pursuit of happiness in the world of goods (pp
645–9). Cincinnati, OH: Open Mentis.
Above, n 7.
I Parker “The story of a suicide: A gay freshman and the online
world” The New Yorker, 6 February 2012.
Above, n 14.
D M Boyd & N B Ellison (2007). Social network sites:
Definition, history, and scholarship. Journal of Computer —
Mediated Communication, 13(1), pp 210–30.
Above, n 10.
internet law bulletin
December 2014
18.
Above, n 3.
19.
Above, n 10, p 50.
20.
Above, n 10.
21.
A Hayes, Cyber “stalking”? Bandt.com.au, 29 March 2013.
22.
Above, n 13, p 95.
23.
Above, n 10, p 53.
24.
Above, n 10, p 49.
25.
Above, n 10, p 53.
26.
DK Citron (2009) Law’s expressive value in combating cyber
gender harassment. Michigan Law Review, 108(3), pp 373–415.
225
Download