Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.



Similar documents
CYBERCRIME AND THE LAW

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

Cyber Crime and Data Retention

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

INTRODUCTION DEVELOPMENT AND PHENOMENA

Technical Questions on Data Retention

SCREENING CHAPTER 24 JUSTICE, FREEDOM AND SECURITY AGENDA ITEM 7A: ORGANISED CRIME

GUIDANCE Implementing Section 176 of the Anti-social Behaviour, Crime and Policing Act 2014: Lowvalue

THE FORTY RECOMMENDATIONS OF THE FINANCIAL ACTION TASK FORCE ON MONEY LAUNDERING

CTC Special Meeting on Communications and IT New York May Thank you very much. I am very pleased to be here to participate in

CRIMINAL JUSTICE RESPONSES TO TRAFFICKING IN PERSONS: ASEAN PRACTITIONER GUIDELINES

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Asset Tracing. PC.DEL/790/12/Rev.1 4 September Seminar Identifying, Restraining and Recovering Stolen Assets in the OSCE Region Session IV

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

How To Get A Computer Hacking Program

CHAPTER 124B COMPUTER MISUSE

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

New Hampshire Cyber Crime Initiative Overview Briefing. NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor

24/7 High Tech Crime Network

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

Law No. 80 for 2002 Promulgating the Anti-Money Laundering Law And its Amendments ١

Cybercrime in Canadian Criminal Law

Computer Forensics Preparation

Modalities for Forensic Review of Computer Related Frauds

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

Credit Card (PCI) Security Incident Response Plan

Crimes (Computer Hacking)

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

Regulation of Investigatory Powers Act 2000

Ten Deadly Sins of Computer Forensics

Expert Group Meeting on the Technical and Legal Obstacles to the Use of Videoconferencing

CYBERSECURITY BILL, 2011

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 February /05 LIMITE COPEN 35 TELECOM 10

2/24/2011. What is Cyber Security? Law Enforcement Perspective. IT professional s Perspective. Managerial Perspective. Netizen s Perspective

COMPUTER USE POLICY. 1.0 Purpose and Summary

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Computer Hacking Forensic Investigator v8

Remote searches in the cloud

Department, Board, Or Commission Author Bill Number

Eurojust. The European Union s Judicial Cooperation Unit

G8 BEST PRACTICES FOR THE ADMINISTRATION OF SEIZED ASSETS

GROUP 2 ISSUES CONCERNING THE INVESTIGATION OF CORPORATE CRIME

ADVANCE UNEDITED VERSION

CRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car?

How To Deal With Social Media At Larks Hill J & I School

Australia s counter-terrorism laws

Report of the Strategic Meeting on Cybercrime

Assise de la Justice Brussels, 21 & 22 November Presentation by Maura McGowan QC Chairman of the Bar Council of England and Wales

Data Breach Management Policy and Procedures for Education and Training Boards

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OFFICIAL. Operational Case for the Retention of Internet Connection Records

Saint Martin s Catholic Academy

COMPUTER MISUSE AND CYBERCRIME ACT

Content Teaching Academy at James Madison University

Online Research and Investigation

Criminal Justice Sector and Rule of Law Working Group

Kingdom of Cambodia Nation Religion King ****** Cybercrime Law. Draft V.1. Unofficial Translation to English

Section 17: Offenses against the Administration of Justice

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Chapter V of the UNCAC on asset recovery. Dimosthenis Chrysikos UNODC, Vienna

Classification scheme Criminal law and criminology (STR)

Information Security

Computer Forensics US-CERT

APPLICATION OF INFORMATION TECHNOLOGY IN COMBATING MONEY LAUNDERING IN UKRAINE: legal

Use of ESF Computing and Network Resources

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Chapter 6: Fundamental Cloud Security

CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY. For additional and updated information, please visit our website at

The Massachusetts Strategic Plan for Cyber Crime

Research Topics in the National Cyber Security Research Agenda

E Safety Policy. 6 th March Annually. 26 th February 2014

Information Technology Cyber Security Policy

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

THE CYBERCRIME BILL, 2015

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity

In an age where so many businesses and systems are reliant on computer systems,

Standard: Information Security Incident Management

financial interests and the establishment of a European Public Prosecutor.

City of Venice Information Technology Usage Policy

So the security measures you put in place should seek to ensure that:

Network Security Policy

Conference of the States Parties to the United Nations Convention against Corruption

HUMAN RESOURCES POLICIES & PROCEDURES

The technical and legal obstacles to the use of videoconferencing

Is There Such a Thing as Internet Privacy?

New York State Office Of Children And Family Services VPN

Information Governance Framework. June 2015

Criminal Justice Courses

PRIVACY BREACH POLICY

Understanding ediscovery and Electronically Stored Information (ESI)

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

INFORMATION SECURITY MANAGEMENT POLICY

Liability of Network Service Providers

Transcription:

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com

Why should we care about CYBER CRIME & CYBER SECURITY?

Clarification of definitions Cyber Crime. Internet Crime. Computer Crime. Hi-tech Crime. Information Technology Crime OVER, ON, THROUGH, WITH computers, mobiles and Internet.

Regulate or not to regulate, is this the question? The ability of the legislations of many states to govern computer activities properly is under question thanks to the rapid development of technology which cause new problems on a speed regular bases. The interaction problems between technicians and lawyers. We should not while legislating for computers - bother by detailed technological issues, But rather a main frame which enables the law to adopt the best technology exists in the field in order to apply its provisions properly.

Computers may be a tool (instrument)/fraud or incidental to an offence, but still significant for law enforcement purposes /saved data or subject (target) to crimes? Types of threats

Classical crimes! 1 A-Computer related crimes: Theft and Fraud. Industrial espionage. Facilitation of prostitution. Forgery. Terrorism.

Classical crimes! 2 B- Content related crimes: The information and the data which are processed by computers are most of the times much more valuable than the hardware itself. Copy rights. Child abuse online. Stalking, Harassment, Hate Speech. Offences against Morality.

Classical crimes! 3 Our existing legal systems can accommodate this type of computer related crime in many cases. It would better that some articles in the penal code be modified in order to make this accommodation process nice and easy for all the interested parties such as law enforcement bodies and judges.

C- Sabotage crimes 1 This type of cyber crimes covers the crimes which affect the security, integrity, confidentiality, reliability and availability of computer systems.

C- Sabotage crimes 2 Unauthorised access to computer systems: Unauthorized access: Unauthorized access with out committing crimes. Unauthorized access with the intention to commit another crime: Copy send. Unauthorized modification. Delete. DOS. Compromise. Improve?

C- Sabotage crimes 3 In this type of crimes, A legislation is needed. For a very simple reason, that they did not exist before, and therefore they are not covered yet by the current laws. Egypt draft law for cyber security.

Procedural laws 1- Substantive and procedural rules 2- How to do? 3- legitimacy and admissibility: Evidence law must allow for the admission of evidence at trial. 4- Prosecutors do not need to be computer forensic experts, Do need to be able to translate technical issues into ordinary language. 5- Search warrants. 6- Content stored at ISPs. 7- Capture source and destination information. 8- Interception of the content of communication.

gathering electronic evidence A- Officers trained in computer forensics Know how to gather evidence without altering it Example: computer in truck of police car Know what to look for Example: encryption passwords B- Officers trained in computer networks How to obtain email and other stored content Example: child pornography servers How to locate a suspect Example: Lowes bombing C- Commitment from the highest levels for ongoing resources D- Centralized forensic facilities - Example: Regional Computer Forensics Laboratories in the U.S. C- Training for first responders

Challenges for procedures and law enforcements! 1 It is very volatile, easily unintentionally altered without obvious trace, and it is highly novel, creating problems not only of explanation but also of forensic testing. Computer forensics is a reasonably well-established subject area, but unlike most forms of forensic science many of its techniques have not been around long enough to have been properly tested by peer-reviewed publication.

Challenges for procedures and law enforcements! 2 Needs not only a law to draw the procedures to be followed in computer crime but also to develop sort of Quality Assurance protocols that are used in more established areas of forensic science.

Challenges for procedures and law enforcements! 3 A simple way of procedural regulation may be an article, Which provides for the search of any premise and seizure of any evidence with a warrant, if there is reasonable cause to believe that an offence under the Act has been committed.

Challenges for procedures and law enforcements! 4 Legitimizing the activities of the various units that investigate and prosecute computer crime. This should cover: new means of scrutinising activity on the internet, use new and advanced techniques to recover data from seized computers and data media, and seek to infer actions and intent on the part of defendants by interpreting the way in which a computer may have been set up and, over a period, used.

Challenges for procedures and law enforcements! 5 Cyber cafes: Situation in Egypt. Example from Italy. WIFI: Coffee shops. Companies. Houses.

Challenges for procedures and law enforcements! 6 Ensure that the police force has the required resources and expertise to handle the investigations. Training for police officers should cover all the related area of forensic issues of computer crime such as searching, seizing, recording, intercepting...etc.

Challenges for procedures and law enforcements! 7 Prosecutors should be trained to carry the proof of electronic evidence to the court and stand strongly behind them. Trained about the limits they should give their warrants within, in a way that assure a flexibility of movement for the police and maintain the basic human rights of the accused. Judges and legislators!

Challenges for procedures and law enforcements! 8 Training between the theory and the practise. Who should design the training? How may the training be conducted? The crucial partnership with the private sector? Investments- tools High expectations of the judiciary?

French agents make the arrest American agents discover attack came from Paris Someone Intrudes into a Bank in Cairo Egyptian investigators discover attack came from computer in Sydney Australian agents discover attack came from Los Angeles

Issues to be covered by Procedural Law - Computer and Internet Investigations (Computer Forensics) - Safeguards - Expedited Preservation and Disclosure of Stored Computer Data (Quick Freeze) - Data Retention - Search and Seizure - Production Order - Real Time Collection of Data - Collection of Traffic Data - Interception of Content Data - Regulation Regarding Encryption Technology - Remote Forensic Software - Authorization Requirement

Issues to be covered with regard to International Cooperation General Principles for International Cooperation Extradition General Principles of Mutual Assistance Procedures Pertaining to Mutual Assistance Requests in the Absence of Applicable International Agreements Mutual Assistance Regarding Provisional Measures Trans-border Access to Stored Computer Data 24/7 Network of Contacts International Cooperation in the Stanford Draft Convention

Issues to be covered with regard to Liability of Internet Providers Liability of Access Provider Liability for Caching Liability of Hosting Provider Exclusion of the Obligation to Monitor Liability for Hyperlinks Liability of Search Engines

Training and developing countries In order to capture and preserve important evidence left by offenders it is essential for law enforcement authorities to have the training and technical expertise to retrieve evidence consistent with domestic and international court requirements. Training must be made available to law enforcement, judicial and prosecutorial officials to help them understand how to conduct forensic analysis of computer hard drives and other devices. This training must be constantly updated to keep up with ever-changing technology and give them hands-on experience. There are many software suites which provide the tools to carry out read only examinations of seized media and training is often included in the purchase price of the suite. Expensive and beyond the reach of developing countries. Training from within the law enforcement and private security industry may be available with proper funding. Many companies in the private sector have the technology and the expertise to assist.

New draft in Qatar The status of cyber space in Qatar. The legal framework. How was the draft prepared. Status of the draft. Issuing law. The law itself.

New phase Delete articles 370 387 of the Penal Code. Compliance in 6 month, renewable. Five Chapters. First chapter: definitions. Cyber crime: any act includes the use of ICT OR NETWORK OR INTERNET in illegal way breaching the law.

Chapter 2 Criminalization: Sabotage. Content. Fraud and forgery. Electronic cards. IPR crimes.

Chapter 3 Procedures: Evidences and investigations. Service providers. Provide as legally requested. Info of subscriber for 1 year. Traffic data, content for 90 days. Government entities.

Chapter 4 International Cooperation. General rules. Mutual legal assistance. Extradition.

Chapter 5 - General rules 1 Other criminalization. Any other crime committed by the Internet, computer networks or IT tools. Breach confidentiality. Gross negligence commit or facilitation of commission. Service provider. Juridical person.

Chapter 5 - General rules 2 Help, support, agree. Attempt. Duplicate, public servant. Confiscation. Benefit for the informer.

Judge Dr. Ehab Elonbaty Cyber Crime expert ehabelsonbaty@hotmail.com