Local cybercrime legislation, for the most part, attempts to stem and discourage malicious activities that originate or utilize information technology within national boundaries. However, a broader interpretation and method of enforcement is required when it comes to crimes that transcend national boundaries. The relative sense of anonymity and the challenges in identifying perpetrators through their use of proxy servers and virtual private networks make the Internet an appealing area for criminals to thrive (Golubev, 2005). From a judicial perspective, jurisdiction limitations in enforcement and prosecution add another dimension to the problem.
Not all local laws are meant to protect the citizens at large. As Edward’s post on the comparison of laws between Saudi Arabia and the United Arab Emirates show, local cybercrime laws can be interpreted as being self-serving for the government – when vague criteria such as “public morals” and “religious values” are used in legislation.
The Convention on Cybercrime is an attempt to harmonize national efforts in combating cybercrime by “recognizing the need for cooperation between States and private industry” (Council of Europe, 2001). Canada became a signatory in 2001. It ratified the treaty in July this year and it actually comes into force on the day of this writing – the 1st of November 2015 (Council of Europe, 2015).
With the lack of an internationally unanimous definition of cybercrime, the treaty serves to provide some guidance as to what it constitutes and provide a set of procedures as to how they can be handled. For example, Chapter 1 Article 1 provides a set of definitions. Chapter II provides a set of guidelines as to what measures can be taken at a national level for different types of crimes. This form of guidance assists national law makers to identify their arcs and provides a strawman for them to fill out. Chapter III then goes on to provide guidance on international cooperation.
Reading the different perspectives on cybercrime in this week’s post, it is clear that such a treaty is what is required to synchronize efforts in combatting crime. However, its effectiveness is still under debate and the topic for another discussion.
References
Council of Europe. (2001, Nov 23). Convention on Cybercrime. Retrieved from Council of Europe: https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=0900001680081561
Council of Europe. (2015, November 1). Chart of signatures and ratifications of Treaty 185. Retrieved from Council of Europe: http://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures?p_auth=FdBumPhL
Golubev, V. (2005, April 16). International cooperation in fighting cybercrime. Retrieved from Computer Crime Research Centre: www.crime-research.org/articles/Golubev0405
The Landing is a social site for Athabasca University staff, students and invited guests. It is a space where they can share, communicate and connect with anyone or everyone.
Unless you are logged in, you will only be able to see the fraction of posts on the site that have been made public. Right now you are not logged in.
If you have an Athabasca University login ID, use your standard username and password to access this site.
We welcome comments on public posts from members of the public. Please note, however, that all comments made on public posts must be moderated by their owners before they become visible on the site. The owner of the post (and no one else) has to do that.
If you want the full range of features and you have a login ID, log in using the links at the top of the page or at https://landing.athabascau.ca/login (logins are secure and encrypted)
Posts made here are the responsibility of their owners and may not reflect the views of Athabasca University.