100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Extended Lecture Notes on Regulating Cybercrime CA$7.63   Add to cart

Other

Extended Lecture Notes on Regulating Cybercrime

 47 views  6 purchases
  • Course
  • Institution

This document entails extensive lecture notes on the ‘Regulating Cybercrime’ course offered at the University of Groningen. It includes all the relevant content and materials from lectures, including information discussed in the Q&A, in order to succeed in the final examination.

Preview 4 out of 103  pages

  • March 24, 2023
  • 103
  • 2022/2023
  • Other
  • Unknown
avatar-seller
Regulating Cybercrime: Lecture Notes
Week 1: Cybercrimes

Lecture 1. 1 - Cybercrimes (1)
Outline
● Practical introduction to the course
● Introduction to cybercrime
○ What is cybercrime?
○ International character of cybercrime
○ Challenges in domestic substantial cybercrime law
● Substantive criminal law
○ Hacking

Literature
Principles of Cybercrime (J. Cough)
- Not necessary to know all legislation/cases referred to in book; merely use as
background information
- Most important to know differences existing between regulation of cybercrimes
and implementation of Convention on Cybercrime (necessary differences
between national law will be discussed during lectures)

What is cybercrime?
There are different views on its definition; however, there are some common
distinctions:
1. Offenses against computer/data systems
a. Where computer is target of criminal activity
i. Example: hacking
2. Existing offenses where computer is a tool used to commit offenses
a. Example: stalking
3. Offenses where computer is an incidental aspect of criminal activity
a. Provides for digital evidence; but fact that there is digital evidence does
not necessarily make it a cybercrime
i. Example: emails and other communications by offenders

Legal focus
● Convention on Cybercrime (CoC) (Budapest Convention)
○ Art. 1-9
○ Explanatory Report
○ Additional Protocol and Xenophobia and Racism
● Other international and supranational legal instruments

, ○ Example(s):
■ Directive 2013/40/EU on attacks against information systems
■ Council of Europe Convention on the protection of children against
sexual exploitation and sexual abuse (Lanzarote Convention)
● Examples of national cybercrime law

Challenges of cybercrime
1. Scale
a. Amount of people with Internet access is enormous; provides large pool
of potential offenders + victims
2. Accessibility
a. Technology is (almost) everywhere and (increasingly) easy to use;
accessible to both offenders + victims
i. Whilst some cybercrimes go beyond skills of an individual, there is
information available on how to execute criminal activity
1. Ex. Buying hacking program through dark web
3. Anonymity
a. Problem for all crimes but enhanced in cybercrime; criminals always find
ways to stay anonymous; more opportunities to do this in cybercrime
4. Portability and transferability
5. Global reach (international/cross-border character of cybercrime)
a. Either crime is committed in multiple countries or offenders collaborating
live in multiple countries or offenders commit crimes in another country
other than their habitual residences
i. This makes investigation difficult and demands cooperation for
which rules are needed
6. Absence of capable guardians (among which are effective substantive criminal
law)
a. Perceived risk of detection and prosecution
b. Effective regulation is a challenge faced by law enforcement

Global reach (international character of cybercrime)
Criminal law has a predominantly national approach
- National prosecution is based on:
- National jurisdiction rules
- Usually restricted to territorial jurisdiction in which offense is
committed
- National criminal offenses
- (Partly) national investigations

But cybercrime often has international aspects

,>Solution: rules on international cooperation are needed
● Gathering of information and evidence
● Extradition
● Transfer of proceedings and/or sentences

How can international cooperation be obtained?
>Treaties and other international legal instruments that entail:
- Obligations to establish criminal offenses
- Obligations on substantive law to prevent safe havens + encourage
possibility for mutual legal assistance (due to principle of double
criminality; activity must be criminal in the involved jurisdictions)
- Obligations to create powers to investigate
- Can prevent that crimes cannot be investigated due to lack of powers
- Ex. If country B needs country A for investigations, need
procedural rules in both to effectively do this
- Obligations to create jurisdiction
- Can prevent negative or positive jurisdiction conflicts
- Preventing situations in which either no country has jurisdiction or
several countries have jurisdiction
- Obligations regarding international cooperations
- Can make sure help will be effectuated

Convention on Cybercrime
CoC was the first binding international instrument addressing issues of cybercrime
adopted by Council of Europe on 23 November 2001, Budapest
- Intended to apply globally, not just to Members of Council of Europe; so it is
open to non-Member States
- Total number of ratifications: 68

CoC entails several obligations:
● Obligations to establish criminal offenses
● Obligations to create jurisdiction
● Obligations to create investigative powers
● Obligations regarding international cooperation

Approach of CoC

, >Through the harmonization of substantive (criminalizing conduct) and procedural law
(procedural tools) international cooperation is attained

Categorisation of offenses in CoC
1. Offences against confidentiality, integrity and availability of computer data and
systems (cybercrimes in narrow sense) (chapter 2, section 1, title 1)
a. Illegal accessing a computer system
b. Illegal interception of data
c. Data interference
d. Computer system interference
e. Misuse of devices
2. Computer-related or computer-assisted offenses (chapter 2, section 1, title 2)
a. Fraud
b. Forgery
3. Content-related offenses (chapter 2 section 1, title 3)
a. Child pornography
4. Offenses related to intellectual property rights and similar rights (chapter 2,
section 1, title 4)

Challenges in domestic substantive criminal law
The changing legislative environment: new crime —> new law?
● Prior to specific cybercrime laws using existing (or traditional) offenses were
used to prosecute cybercrimes
○ Unauthorized access as trespass
○ Impairment of data as criminal damage
But, applying existing laws cannot always be done successfully

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller annkathrindix03. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$7.63. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$7.63  6x  sold
  • (0)
  Add to cart