Modern crime tend to be shifting to cyber space as information technologies evolve it offer tools to remotely and anonymously carry out criminal activities (Brenner, 2012). According to (Ablon & Libicki, 2015) 2014 was the year of cybercrimes going viral as many giant retailers got hacked and stolen financial and personal data was available on the hacker market. Various technological tools, communication channels and social networks are utilized for cybercrimes. As technology advances, more services transition into online world, more devices get connected to the internet as part of Internet of Things the more it attracts the criminals into digital world (Ablon & Libicki, 2015). The increase in cybercrimes trigger the response on government level to enact laws and regulations to prevent cybercrimes from occurring and punishing the criminals after the criminal activities are carried out.
Commonwealth of Independent States (CIS) consists of former Soviet Union countries and on June 1, 2001 representatives have signed a collaboration agreement to fight crimes related to computer information. While each of those countries has some kind of law to fight cybercrimes, the collaboration is needed to uniformly apply across these countries. The collaboration agreement clarified the terminology and specifies the area of focus:
Unauthorized access to computer information that is protected by the law, and if the actions caused damage, blocking, modification or copying of information, damaged IT equipment or systems or networks
Creation, use or spread of malicious software
Misuse of IT equipment or IT networks by person who has lawful access that caused the damaged, destroyed, blocked or modified the lawfully protected IT information
Illegal use of software, database that are not their intellectual property or caused a significant damage
In the above collaboration agreement important areas of the Information Technologies are protected by the law. Agreement tried to cover the IT intellectual property, access to computer information and misuse of IT equipment. However the last one referred to a damage cause by someone who already has an access to the system or network. The law missed to cover the IT technology as a tool to commit a crime by someone outside of organization who does not have legal access to the system or network. Yet, it tried to cover it under use of malicious software.
Ablon, L., & Libicki, M. (2015). Hackers' Bazaar: The Markets for Cybercrime Tools and Stolen Data. Defense Counsel Journal, 82(2), 143-152.
Brenner, S. W. (2012). Cybercrime and the law [electronic resource] : challenges, issues, and outcomes. Boston : Northeastern University Press, c2012.
Collaboration Agreement of members of CIS in fight against crimes related computer information. (n.d.). Retrieved 11 11, 2015, from Acting Committee for CIS: http://www.cis.minsk.by/page.php?id=866
The Landing is a social site for Athabasca University staff, students and invited guests. It is a space where they can share, communicate and connect with anyone or everyone.
Unless you are logged in, you will only be able to see the fraction of posts on the site that have been made public. Right now you are not logged in.
If you have an Athabasca University login ID, use your standard username and password to access this site.
We welcome comments on public posts from members of the public. Please note, however, that all comments made on public posts must be moderated by their owners before they become visible on the site. The owner of the post (and no one else) has to do that.
If you want the full range of features and you have a login ID, log in using the links at the top of the page or at https://landing.athabascau.ca/login (logins are secure and encrypted)
Posts made here are the responsibility of their owners and may not reflect the views of Athabasca University.