Convention on Cybercrime

Last updated
Convention on Cybercrime
CET 185
Ratified Convention on Cybercrime.svg
Countries that have ratified the treaty (in red) and countries that have signed but not ratified it (in orange)
Signed23 November 2001
LocationBudapest
Effective1 July 2004
ConditionRatification by 3 Council of Europe States
Signatories50
Parties68
DepositarySecretary General of the Council of Europe
Languages English and French

The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime (cybercrime) by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. [1] [2] It was drawn up by the Council of Europe in Strasbourg, France, with the active participation of the Council of Europe's observer states Canada, Japan, the Philippines, South Africa and the United States.

Contents

The Convention and its Explanatory Report was adopted by the Committee of Ministers of the Council of Europe at its 109th Session on 8 November 2001. It was opened for signature in Budapest, on 23 November 2001 and it entered into force on 1 July 2004. [3] As of April 2023, 68 states have ratified the convention, while a further two states (Ireland and South Africa) have signed the convention but not ratified it. [4]

Since it entered into force, important countries like India have declined to adopt the Convention on the grounds that they did not participate in its drafting. Russia opposes the Convention, stating that adoption would violate Russian sovereignty, and has usually refused to cooperate in law enforcement investigations relating to cybercrime. It is the first multilateral legally binding instrument to regulate cybercrime. [5] Since 2018, India has been reconsidering its stand on the Convention after a surge in cybercrime, though concerns about sharing data with foreign agencies remain. [6]

On 1 March 2006, the Additional Protocol to the Convention on Cybercrime came into force. Those States that have ratified the additional protocol are required to criminalize the dissemination of racist and xenophobic material through computer systems, as well as threats and insults motivated by racism or xenophobia. [7]

The United Nations is developing an alternative treaty on cybercrime. [8]

Objectives

The Convention is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography, hate crimes, and violations of network security. [9] It also contains a series of powers and procedures such as the search of computer networks and lawful interception.

Its main objective, set out in the preamble, is to pursue a common criminal policy aimed at the protection of society against cybercrime, especially by adopting appropriate legislation and fostering.

The Convention aims principally at:

The following offenses are defined by the Convention: illegal access, illegal interception, data interference, system interference, misuse of devices, computer-related forgery, computer-related fraud, offenses related to child pornography, and offenses related to copyright and neighboring rights.

It also sets out such procedural law issues as expedited preservation of stored data, expedited preservation and partial disclosure of traffic data, production order, search and seizure of computer data, real-time collection of traffic data, and interception of content data. In addition, the Convention contains a provision on a specific type of trans-border access to stored computer data which does not require mutual assistance (with consent or where publicly available) and provides for the setting up of a 24/7 network for ensuring speedy assistance among the Signatory Parties. Further, as conditions and safeguards, the Convention requires the provision for adequate protection of human rights and liberties, including rights arising pursuant to obligations under European Convention on Human Rights, International Covenant on Civil and Political Rights, and other applicable international human rights instruments, and shall incorporate the principle of proportionality. [10]

The Convention is the product of four years of work by European and international experts. It has been supplemented by an Additional Protocol making any publication of racist and xenophobic propaganda via computer networks a criminal offense, similar to Criminal Libel laws. Currently, cyber terrorism is also studied in the framework of the Convention.

Accession by the United States

Its ratification by the United States Senate by unanimous consent in August 2006 was both praised and condemned. [11] The United States became the 16th nation to ratify the convention. [12] [13] The Convention entered into force in the United States on 1 January 2007.

Senate Majority Leader Bill Frist said: "While balancing civil liberty and privacy concerns, this treaty encourages the sharing of critical electronic evidence among foreign countries so that law enforcement can more effectively investigate and combat these crimes". [14]

The Electronic Privacy Information Center said:

The Convention includes a list of crimes that each signatory state must transpose into their own law. It requires the criminalization of such activities as hacking (including the production, sale, or distribution of hacking tools) and offenses relating to child pornography, and expands criminal liability for intellectual property violations. It also requires each signatory state to implement certain procedural mechanisms within their laws. For example, law enforcement authorities must be granted the power to compel an Internet service provider to monitor a person's activities online in real time. Finally, the Convention requires signatory states to provide international cooperation to the widest extent possible for investigations and proceedings concerning criminal offenses related to computer systems and data, or for the collection of evidence in electronic form of a criminal offense. Law enforcement agencies will have to assist police from other participating countries to cooperate with their mutual assistance requests. [15]

Although a common legal framework would eliminate jurisdictional hurdles to facilitate the law enforcement of borderless cyber crimes, a complete realization of a common legal framework may not be possible. Transposing Convention provisions into domestic law is difficult especially if it requires the incorporation of substantive expansions that run counter to constitutional principles. For instance, the United States may not be able to criminalize all the offenses relating to child pornography that are stated in the Convention, specifically the ban on virtual child pornography, because of its First Amendment's free speech principles. Under Article 9(2)(c) of the Convention, a ban on child pornography includes any "realistic images representing a minor engaged in sexually explicit conduct". According to the Convention, the United States would have to adopt this ban on virtual child pornography as well, however, the U.S. Supreme Court, in Ashcroft v. Free Speech Coalition , struck down as unconstitutional a provision of the CPPA that prohibited "any visual depiction" that "is, or appears to be, of a minor engaging in sexually explicit conduct". In response to the rejection, the U.S. Congress enacted the PROTECT Act to amend the provision, limiting the ban to any visual depiction "that is, or is indistinguishable from, that of a minor engaging in sexually explicit conduct" (18 U.S.C. § 2252(B)(b)).

Accession by other non–Council of Europe states

The Convention was signed by Canada, Japan, the United States, and South Africa on 23 November 2001, in Budapest. As of April 2023, the non–Council of Europe states that have ratified the treaty are Argentina, Australia, Brazil, Cabo Verde, Canada, Chile, Colombia, Costa Rica, Dominican Republic, Ghana, Israel, Japan, Mauritius, Morocco, Nigeria, Panama, Paraguay, Peru, the Philippines, Senegal, Sri Lanka, Tonga and the United States.

Although Egypt has not signed off on the Convention, Egyptian President el-Sisi's government in 2018 has legislated two major computer-crime related laws. Targeting social networking service such as Facebook and Twitter, the legislation criminalizes fake news and terrorism, setting a flag on accounts which carry more than 5,000 subscribers or followers. The early legislation had been criticized by Amnesty International, thus websites can appeal to the courts within 7 days of blacklisting. [16] [17] [18] [ relevant? ]

In fact India too "was reconsidering its position on becoming a member of the Budapest Convention because of the surge in cyber crime, especially after a push for digital India." [6]

See also

Related Research Articles

<span class="mw-page-title-main">Convention on the Rights of the Child</span> International treaty about the rights of children

The United Nations Convention on the Rights of the Child is an international human rights treaty which sets out the civil, political, economic, social, health and cultural rights of children. The convention defines a child as any human being under the age of eighteen, unless the age of majority is attained earlier under national legislation.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Europol</span> European Union law enforcement agency

Europol, officially the European Union Agency for Law Enforcement Cooperation, is the law enforcement agency of the European Union (EU). Established in 1998, it is based in The Hague, Netherlands, and serves as the central hub for coordinating criminal intelligence and supporting the EU's member states in their efforts to combat various forms of serious and organized crime, as well as terrorism.

The Australian High Tech Crime Centre (AHTCC) are hosted by the Australian Federal Police (AFP) at their headquarters in Canberra. Under the auspices of the AFP, the AHTCC is party to the formal Joint Operating Arrangement established between the AFP, the Australian Security Intelligence Organisation and the Computer Network Vulnerability Team of the Australian Signals Directorate.

Sexual grooming is the action or behavior used to establish an emotional connection with a minor, and sometimes the child's family, to lower the child's inhibitions with the objective of sexual abuse. It can occur in various settings, including online, in person, and through other means of communication. Children who are groomed may experience mental health issues, including "anxiety, depression, post-traumatic stress, and suicidal thoughts."

Lawful interception (LI) refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court orders or other legal authorization to selectively wiretap individual subscribers. Most countries require licensed telecommunications operators to provide their networks with Legal Interception gateways and nodes for the interception of communications. The interfaces of these gateways have been standardized by telecommunication standardization organizations. As with many law enforcement tools, LI systems may be subverted for illicit purposes.

<span class="mw-page-title-main">Human rights in Switzerland</span> Overview of the observance of human rights in Switzerland

Human rights are largely respected in Switzerland, one of Europe's oldest democracies. Switzerland is often at or near the top in international rankings of civil liberties and political rights observance. Switzerland places human rights at the core of the nation's value system, as represented in its Federal Constitution. As described in its FDFA's Foreign Policy Strategy 2016-2019, the promotion of peace, mutual respect, equality and non-discrimination are central to the country's foreign relations.

Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems is an additional protocol to the Council of Europe Convention on Cybercrime. This additional protocol was the subject of negotiations in late 2001 and early 2002. Final text of this protocol was adopted by the Council of Europe Committee of Ministers on 7 November 2002 under the title "Additional Protocol to the Convention on cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems, ("Protocol"). The Protocol opened on 28 January 2003 and entry into force is 1 March 2006. As of July 2017, 29 States have ratified the Protocol and a further 13 have signed the Protocol but have not yet followed with ratification.

Computer crime, or cybercrime in Canada, is an evolving international phenomenon. People and businesses in Canada and other countries may be affected by computer crimes that may, or may not originate within the borders of their country. From a Canadian perspective, 'computer crime' may be considered to be defined by the Council of Europe – Convention on Cybercrime. Canada contributed, and is a signatory, to this international of criminal offences involving the use of computers:

Various groups have taken steps to combat growing commercial sexual exploitation of children and child pornography in the Philippines. In 2016, UNICEF declared that the Philippines is one of the top sources of child pornography.

Child pornography is illegal in most countries, but there is substantial variation in definitions, categories, penalties, and interpretations of laws. Differences include the definition of "child" under the laws, which can vary with the age of sexual consent; the definition of "child pornography" itself, for example on the basis of medium or degree of reality; and which actions are criminal. Laws surrounding fictional child pornography are a major source of variation between jurisdictions; some maintain distinctions in legality between real and fictive pornography depicting minors, while others regulate fictive material under general laws against child pornography.

Child pornography is erotic material that depicts persons under the age of 18. The precise characteristics of what constitutes child pornography varies by criminal jurisdiction.

Cyberstalking and cyberbullying are relatively new phenomena, but that does not mean that crimes committed through the network are not punishable under legislation drafted for that purpose. Although there are often existing laws that prohibit stalking or harassment in a general sense, legislators sometimes believe that such laws are inadequate or do not go far enough, and thus bring forward new legislation to address this perceived shortcoming. In the United States, for example, nearly every state has laws that address cyberstalking, cyberbullying, or both.

Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

There is no commonly agreed single definition of “cybercrime”. It refers to illegal internet-mediated activities that often take place in global electronic networks. Cybercrime is "international" or "transnational" – there are ‘no cyber-borders between countries'. International cybercrimes often challenge the effectiveness of domestic and international law, and law enforcement. Because existing laws in many countries are not tailored to deal with cybercrime, criminals increasingly conduct crimes on the Internet in order to take advantages of the less severe punishments or difficulties of being traced.

<span class="mw-page-title-main">Electronic evidence</span>

Electronic evidence consists of these two sub-forms:

<span class="mw-page-title-main">Cybercrime Prevention Act of 2012</span> Law in the Philippines

The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in the Philippines that was approved on September 12, 2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.

<span class="mw-page-title-main">Magna Carta for Philippine Internet Freedom</span>

The Magna Carta for Philippine Internet Freedom is an internet law bill filed in the Congress of the Philippines. The bill contains provisions promoting civil and political rights and Constitutional guarantees for Philippine internet users, such as freedom of expression, as well as provisions on information and communications technology (ICT) policy, ICT4D, internet governance, e-governance, cybersecurity, cyberwarfare, cyberterrorism, and cybercrime.

Karnika Seth is an Indian lawyer, writer, educator, and policymaker. She specializes in cyber law, intellectual property law, media law, and the protection of women and children. She is one of the co-founders of the law firm Seth Associates and manages its Corporate & Cyber laws practice.

Cybersex trafficking, live streaming sexual abuse, webcam sex tourism/abuse or ICTs -facilitated sexual exploitation is a cybercrime involving sex trafficking and the live streaming of coerced sexual acts and/or rape on webcam or having victims use a digital program with varying kinds of data to output to customers.

References

  1. Convention on Cybercrime, Budapest, 23 November 2001.
  2. Star, Arizona Daily. "All Headlines". Arizona Daily Star. Archived from the original on 2019-12-14. Retrieved 2020-12-18.
  3. Staff. The COE International Convention On Cybercrime Before Its Entry Into Force Archived 2016-09-25 at the Wayback Machine , UNESCO, January–March 2004
  4. "Chart of signatures and ratifications of Treaty 185". CoE Treaty Office.
  5. "Assets" (PDF). April 30, 2016. Archived from the original (PDF) on 2016-04-30.
  6. 1 2 "Home Ministry pitches for Budapest Convention on cyber security". January 18, 2018.
  7. "Frequently asked questions and answers Council of Europe Convention on cybercrime Archived February 9, 2006, at the Wayback Machine ", by the United States Department of Justice
  8. Hakmeh, Joyce; Peters, Allison (2020). "A New UN Cybercrime Treaty? The Way Forward for Supporters of an Open, Free, and Secure Internet". Council on Foreign Relations.
  9. Arias, Martha L., "The European Union Criminalizes Acts of Racism and Xenophobia Committed through Computer Systems Archived 2011-07-22 at the Wayback Machine ", April 20, 2011.
  10. Convention on Cybercrime, Article 15, 1
  11. McCullagh, Declan; Anne Broache (4 August 2006). "Senate Ratifies Controversial Cybercrime Treaty". Cnet.
  12. Anderson, Nate (4 August 2006). ""World's Worst Internet Law" ratified by Senate". Ars Technica.
  13. Kaplan, Dan (4 August 2006). "Senate Ratification of Cybercrime Treaty Praised". SC Magazine.
  14. "Independent News & Media online".
  15. Electronic Privacy Information Center The Council of Europe's Convention on Cybercrime
  16. "Egypt president ratifies law imposing internet controls". www.dailyjournal.net. Archived from the original on 2018-08-18.
  17. "StackPath". www.dailynewsegypt.com. 18 August 2018.
  18. "Egypt president ratifies law imposing internet controls | FOX13". www.fox13memphis.com. Archived from the original on 2018-08-18.

Further reading