Professional Documents
Culture Documents
The Introduction To Cybercrime Security
The Introduction To Cybercrime Security
Cyber Crime.
Prepared by
©2013
1
COPYRIGHT
This Paperwork is copyright material protected under the Berne Convention; the Tanzania
Copyright and Neighbouring Act of 1999, and other international and national enactments, in
behalf, on intellectual property. It may not be reproduced by any means, in full or in part, except
for short extracts in fair dealing, for research or private study, criticism scholarly review or
disclosure with an acknowledgement, without permission of the Dean, Faculty of Law, on behalf
of both the author and the Tumaini University, Iringa University College.
2
Security, Prevention and Detection of Cyber Crimes
Introduction.
In our daily life, economic activities, and national security highly depend on stability, safely, and
resilient cyberspace. A network brings communications and transports, power to our homes, run
However it is through the same cyber networks which intrude and attack our privacy, economy,
social life in a way which is harmful. Some scholars have interestingly argued that, “in the
Internet nobody knows you are a dog”.2 This raises some legal issues and concerns.3
This paper presents important issues on the Security, Prevention, and Detection of Cyber Crime.
In Part I, the attempt here is simply to familiarize the reader with a careful understanding of the
Cyber Crimes. The author will trace back the meaning, history, and types of Cyber Crimes
In Part II, one has to know the concept of Cyber Security; this will include meaning, background,
Part III will explain on Cyber Prevention and Detection the same will include meaning and
1
United Nations 199, see also social learning theory and moral disengagement analysis of criminal computer
behaviour: an exploratory study by Marcus, K. R. 2001.
2
Christopher Reed, Internet Law; Text and Materials, 2000 at page 119.
3
Adam J. Mambi, ICT LAW BOOK, a Source Book for Information and Communication Technologies and Cyber
Law in Tanzania and East Africa Community, 2010, page 96.
3
And Part IV, Personal Assessment basically in Tanzanian Laws.
4
COPYRIGHT
This Paperwork is copyright material protected under the Berne Convention; the Tanzania
Copyright and Neighbouring Act of 1999, and other international and national enactments, in
behalf, on intellectual property. It may not be reproduced by any means, in full or in part, except
for short extracts in fair dealing, for research or private study, criticism scholarly review or
disclosure with an acknowledgement, without permission of the Dean, Faculty of Law, on behalf
of both the author and the Tumaini University, Iringa University College.
5
PART I: CYBER CRIMES.
1.0 Introduction.
“Ever since men began to modify their lives by using technology they have found
Roger Revelle4
There has been confusion on the criteria used to determine the definition of the term Cyber
Crimes or computer crimes.5Some argued that, it is any crime that involves the use of computer;
However, some have criticized the categorization of cyber crime. Don Gotternbarn argued that,
there is nothing special on the crimes that happen to involve computers. Is it possible for a crime
being categorized in accordance to a tool, equipment, mechanism or means through which it was
committed? If that's so, how many categories of crime would be there? How about the crime
committed through using a television, automobiles, scalpel, scissors, and other tools, can we
categorize each of them as individual crimes?7 Gotternbarn concludes that crimes involving
4
Vakul Sharma, Information Technology-Law and Practice, 3rd Edition (New Delhi: Universal Law Publishing
Co.Pvt. Ltd., 2011), p.30.
5
Herman T. Tavani, Ethics and Technology, Ethical Issues in an Age of Information and Communication
Technology, 2nd Edition, John Wiley & Sons, Inc, 2007, United States of America, p.202.
6
Ibid.
7
Ibid.
6
1.1.1 Criticism of Gotternbarn Concept of Cyber Crime.
In arguing against Gotternbarn, it is true that, we may not categorize other crimes in accordance
to tools, equipment, mechanism or means through which they were committed. However, due to
the nature and features of Cyber Crimes8 which differentiate, the traditional universe and the
cyber universe, led the traditional universe tremble like an earthquake, makes crimes difficult to
control than they were before, this initiates the concept of these crimes being necessary
Forester and Morrison argued that, cyber crime is a criminal act in which a computer is used as a
principal tool. In that matter, the theft of computer hardware device, would not qualify as
computer crime.9
Is it true by using a computer as the principal tool to commit a crime will amount to the
computer or cyber crime? For instance in taxable transactions, in the case of data entry, can’t a
person commit fraud by just filling the wrong data into hardcopy version of tax forms which are
Roy Girasa (2002) argued that, cyber crime is a generic term covering the multiplicity of crimes
found in penal codes or in legislation having the use of computers as a centre component. To him
8
Ubiquity, global reach, universal standards, information richness, interactivity, information density,
personalization/customization, and social technology. As a result of these features, it achieves unprecedented reach,
and makes available vast amounts of information, of varying degrees of quality. Internet users cannot be regarded as
a homogenous group.
9
Herman T. Tavani, Ethics and Technology, Ethical Issues in an Age of Information and Communication
Technology, 2nd Edition, John Wiley & Sons, Inc, 2007, United States of America, p.203.
10
Ibid.
7
cyber crime is a crime as long as the penal codes and any other legislation clearly stipulate it as
involving not only the use of computers but the use of computers as the centre component.11
At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders,
in a workshop devoted to the issues of crimes related to computer networks, cyber crime was
1. Cybercrime in a narrow sense (computer crime): Any illegal behaviour directed by means
of electronic operations that targets the security of computer systems and the data processed
by them.13
by means of, or in relation to, a computer system or network, including such crimes as
or network.14
Even though this definition is not completely definitive, however it gives us a good starting
point, for determining just what cyber crime means, by incorporating computer crime and
11
Roy J. Girasa, Cyber law: National and International Perspectives, (2002)
12
Talwant Singh, District & Sessions Judge, Cyber Law & Information Technology, Delhi-India.
13
Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders, Vienna, A/CONF.
187/10, 10-17 April 2000, page no 4.
14
Ibid.
8
Computer crime has two elements, computer and crime. Therefore, it involves a crime in a
The relationship could involve the direct usage of a computer by the criminal as one of the first
famous computer criminals did.16However the relationship can be also be indirect, the criminal
can not only use a computer to commit his crime but can also use someone to make changes in a
computer system, by manipulating a key computer user.17Thus one being the exploitation of
weaknesses in the technical IT infrastructure18, the other being exploitation of trust in social
15
Magnin, C.J. The 2001 Council of Europe Convention on Cyber Crime: An Efficient Tool to Fight Crime in
Cyber-space?
16
Ibid.
17
Ibid.
18
As Morris did in United States v. Morris (1991), the accused invade the security system through a worm (Morris
Worm) so as to measure the weakness of MIT which in turn prevented the use of federal interest computers, thereby
causing loss. Morris was found guilty by the United States District Court for the Northern District of New York of
violating 18 U.S.C. 1030(a)(5)(A), sentenced to three years of probation, 400 hours of community service, a fine of
$10,050, and the cost of his supervision.
19
See S v Douvenga case no 111/150/2003, dated 2003/08/19 Northern Transvaal Regional Division 93 Cr App R
25, 02 Dec 2003, the accused used the trust and position entrusted by her company to sent more than 30,000 client
address to her fiance at an opposition company, was sentenced to a fine of R1000.00 or 3 months in prison.
20
9th Global Fraud Survey: Fraud risk in emerging markets. This survey was conducted in 2006 on behalf of Ernst &
Young‘s Fraud Investigation & Dispute Services Practice.
9
1.2 Origin of Cyber Crime.
It is believed the first recorded cyber crime took place in the year 1820.21This can be true with
the fact that, computer did exist since 3500 BC in India, China and Japan.22The modern
Banks and other financial institutions were amongst the first large scale computer users in the
24
private sector, for automate payroll and accounting functions. Therefore, fraud in a computer
scheme emerged. One of the first cases cited as an instance of the computer fraud involved
equity-funding Corporation in the US, fraud was simple.25The frauds succeed because the
auditors and regulators accepted computer printouts as definitive evidence of policies and did not
ask original documentation. When the fraud was discovered, some 64,000 out of 97,000 policies
allegedly issued by the company proved to be false, almost 1 Billion pounds estimated to be the
loss.26
21
See page 3 on the report, Cyber crime…… And punishment? Archaic Laws Threaten Global Information, a report
prepared by McConnell International, 2000.
22
A computer named, ‘Abacus.’
23
See page 3 on the report, Cyber crime…… And punishment? Archaic Laws Threaten Global Information, a report
prepared by McConnell International, 2000.
24
Lloyd, I.J. Information Technology Law at Pg. 201.
25
Ibid.
26
The case has been widely reported. A useful account is to be found in Norman, Chapman and Hall Computer
Insecurity, 1983 at Pg. 199.
10
Therefore as the technological advance, the number of cyber crime cases increased. There is no
reliable and precise statistics of the losses the victims gain as the fact that victims do not detect
Several individuals were engaged in the fight against computer crime from the early
development. The founder and father of the knowledge of computer crimes are by many
observers considered to be Donn B. Parker, USA. He was involved in the research of computer
He served as a Senior Computer Security Consultant at the SRI International (Stanford Research
Institute), and was the main author of the first basic federal manual for law enforcement in the
USA: “Computer Crime – Criminal Justice Resource Manual” (1979). This manual became soon
In a traditional means, a term crime covers a broad range of offences. It is from this broad range,
international instrument which tried to categorize types of cyber crime is the Council of Europe
27
Standler, R.B. Computer Crime at Pg.1.
28
Stein Schjolberg CJ, the History of Global Harmonization on Cyber Crime Legislation-The Road to Geneva,
December 2008.
29
See http://en.wikipedia.org/wiki/MoU/
30
See an overview of his archives, www.cybercrimelaw.net. His first book on the subject was: “Computer Crime”
(1976).
31
Gordon/Ford, On the Definition and Classification of Cyber Crime, Journal in Computer Virology, Vol.2, No. 1,
2006, page 13-20.
11
Convention on Cyber Crime, European Treaty Series - No. 185, Budapest, and 23.XI. 2001. 32The
1. Offences against the confidentiality, integrity and availability of computer data and
systems, such as illegal access, illegal interception, data interference, system interference,
related rights.37
Even though this typology of cyber crime is not wholly consistent, as the fourth category does
not focus on the object of legal protection but on the method, which in turn brings about overlap
32
Sofaer, Toward an International Convention on Cyber in Seymour/Goodman, The Transnational Dimension of
Cyber Crime and Terror, page 225, available at: http://media.hoover.org/document/0817999825_221.pdf
33
The same typology is used by the ITU Global Cyber Security Agenda/High-Level Experts Group, Global Strategic
Report, 2008, at http://www.itu.int/osg/csd/cybersecurity/gca/global_strategic_report/index.html.
34
See Article 2,3,4,5 and 6 of the Council of Europe Convention on Cyber Crime, European Treaty Series - No. 185,
Budapest, and 23.XI. 2001.
35
Ibid, Article 7 and 8.
36
Ibid, Article 9.
37
As provided by Article 10 of the Council of Europe Convention on Cyber Crime, European Treaty Series - No.
185, Budapest, and 23.XI. 2001
12
between categories. Nonetheless, the categories serve as a useful basis for discussing the
38
The ITU Publication, Understanding Cyber Crime: A Guide for Developing Countries, page , 2009, at:
http://www.itu.int/ITU-D/cyb/cybeersecurity/legislation.html.
13
PART II: THE CONCEPT OF CYBER SECURITY IN CYBER CRIMES
2.0 Introduction.
“There are terrible people who, instead of solving a problem, bungle it and make it
more difficult for all who come after. Who ever can’t hit the nail on the head should,
–Friedrich Nietzsche
In the old days people used to hide their faces, draw their guns and rob the local bank or stage-
coach. Currently the way crimes are conducted become more technological creative. For
instance, we have gone from in-person robberies to nameless and faceless crimes involving
computers. A crime such as spamming, passing on computer viruses, harassment, cyber stalking,
While these issues do not carry potential monetary loss, they are just as harmful in the possibility
of losing files, information and access to your computer. This is why Cyber Security is needed.41
Cyber security means protecting information, equipment, devices, computer, computer resources,
communication device and information stored therein from unauthorized access, use, disclosure
39
Friedrich Nietzsche, Seventy-Five Aphorisms from Five Volumes, The Wanderer and His Shadow, No. 326,
reprinted in Basic Writings of Nietzsche 165–66 (Walter Kaufmann trans., First Modern Library ed. 1968) (1880).
40
http://dealnews.com/pages/articles/guide-computer-crime-prevention
41
Ibid.
14
By this definition, one would argue that, cyber security involves following aspects:
1. Confidentiality;45
2. Integrity;46
3. Availability.47
1. A set of activities and other measures, technical and non-technical, intended to protect
42
Section 2 (1) nb of the India Information Technology Act of 2000.
43
Vakul Sharma, Information Technology-Law and Practice, 3rd Edition (New Delhi: Universal Law Publishing
Co.Pvt. Ltd., 2011), p. 18.
44
Herman T. Tavani, Ethics and Technology, Ethical Issues in an Age of Information and Communication
Technology, 2nd Edition, John Wiley & Sons, Inc, 2007, United States of America,p.169.
45
Protecting against unauthorized disclosure of information to the third parties.
46
Protecting against unauthorized modification of data and files.
47
Preventing unauthorized withholding of information from those who need it when they need it.
48
Fischer, Eric A. (2005): Creating a National Framework for Cyber security: An Analysis of Issues and Options,
February 22, CRS Report for Congress, Order Code RL32777.
Wikipedia: http://en.wikipedia.org/wiki/Security [last accessed on 3 Feb 2013].
15
computers, computer networks, related hardware and device software, and the information
they contain and communicate, including software and data, as well as other elements of
2. The degree of protection resulting from the application of these activities and measures;
3. The associated field of professional endeavour, including research and analysis, aimed at
Sometimes when defining computer security, issues involving cyber security overlap with
concerns pertaining cyber crime, and sometimes privacy. However, not all cyber crimes amount
to infringement of cyber security. For instance, soliciting sex with young children, traffic drugs
through internet, download copyrighted music and others, do not infringe cyber security.49
As against many people believe, that cyber security began in 1990s, viruses and worms have been part of
the background noise of cyberspace since its earliest days. For instance in the 1986 movie War Games, a
young teenager hacks his way into the computer that handles command and control for the US nuclear
arsenal and The famous Cuckoo’s Egg incident in the mid-1980s raised awareness that foreign spies had
Cyber security gain momentum in the 1990s where by science and technology advanced. Access
devices have multiplied and diversified to include a variety of portable and wireless accesses.51
49
Herman T. Tavani, Ethics and Technology, Ethical Issues in an Age of Information and Communication
Technology, 2nd Edition, John Wiley & Sons, Inc, 2007, United States of America,p.170.
50
Stoll, Cliff (1990): The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage (New York:
Pocket Books).
51
Ibid.
16
On November 2, 1988, the computers acted strangely. They started to slow down, because they
were running a malicious code that demanded processor time and that spread itself to other
computers. The purpose of such software was to transmit a copy to the machines and run in parallel
The software was traced back to 23 year old Cornell University graduate student Robert Tappan
Morris. When questioned about the motive for his actions, Morris said 'he wanted to count how
many machines were connected to the Internet'. His explanation was verified with his code, but it
The numbers are telling:54 According to statistics, there were 21’000 reported virus incidents in
2000. Three years later, the number was more than six times higher.55At 2002, the worldwide
damage done by worms and viruses was estimated at US$45 billion; August 2003 alone saw the
costs of almost the same magnitude. Thus creating a Cyber Security was inevitable.56
52
Jonathan Zittrain, 'The Future of the Internet', Penguin Books, 2008.
53
Ibid.
54
Clarke, Richard and Lee Zeichner (2004): Beyond the Moat: New Strategies for Cyber security, in: Bank Systems
& Technology, January 27. URL: http://www.banktech.com/showArticle.jhtml?articleID=17501355
55
Security Statistics – Virus Statistics. URL: http://www.securitystats.com/virusstats.html
56
Dunn, Myriam (2004): Cyber-Threats and Countermeasures: Towards an Analytical Framework for Explaining
Threat Politics in the Information Age. Conference paper, SGIR Fifth Pan-European IR Conference, The Hague,
10 September. URL
http://www.sgir.org/conference2004/papers/Dunn%20-%20Cyber-Threats%20and%20countermeasures.pdf
17
2.3 Aspects or Types of Cyber Security.
There are several types of computer securities that are completely based on protecting from
different types of viruses, worms and Trojans. In some authors,57 they called them aspects of
This is a common type of computer security which deals with securing the networks, that is from
privately owned computer networks58 to the internet itself against different types of viruses and
also many other forms of threats to keep the working of computer networking smoothly. Having
set the right kind of network security assures the stable working of computer network.59
As the data are available only for authorized users, it is possible for hackers pretend to be one, by
providing the correct user name and password, thus computer network security can be
disrupted.60
Another important form of the computer security is the data security. It is defined as the type of
security that is used to protect the important data present on different drives of the computer
from different types of threats through different types of software/hardware solutions such as
57
Herman T. Tavani, Ethics and Technology, Ethical Issues in an Age of Information and Communication
Technology, 2nd Edition, John Wiley & Sons, Inc, 2007, United States of America, p.171-174.
58
such as IANs and WANs
59
http://www.wifinotes.com/security/computer-security-introduction.html
60
Through denial of services, Trojan horse, Viruses and Worms.
18
Antivirus and firewalls.61 That data can either reside in one or more computer storage devices or
It mainly concerns about malicious programs that can disrupt and sometimes destroy the
computer systems. These malicious programs can be viruses such as Love Bug, rabbits, Logic
Bomb, Trojan horse and worms such as Morris Worm and, bugs.63If offenders succeed in
preventing computer systems from operating smoothly, this can result in great financial losses
for victims.64
Computer security is important because it can provide the opportunity for the users to protect
their important information present on the network and also in the system (right to privacy).65
It also helps in defending the computer system against different types of destructive technologies
and protects the PC from damage (viruses, worms, bugs and bacteria).
61
Ibid.
62
Herman T. Tavani, Ethics and Technology, Ethical Issues in an Age of Information and Communication
Technology, 2nd Edition, John Wiley & Sons, Inc, 2007, United States of America, p.171-172.
63
Ibid p. 172-173.
64
Campbell, Gordon, Loeb, Zhou, “The Economic Cost of Publicly Announced Information Security Breaches:
Empirical Evidence from the Stock Market”, Journal of Computer Security, Vol.11, pg 431-448.
65
http://www.wifinotes.com/security/computer-security-introduction.html
19
It also helps in monitoring the network and protects it also from different threats. So, we should
use computer security solution on some level to protect our data from different type of sniffing
stolen problem.
In general, Computer Security is vital for protecting the confidentiality, integrity, and availability
of computer systems, resources, and data. Without confidentiality, trade secrets or personally
identifying information can be lost. Without integrity, we cannot be sure that the data we have is
the same data that was initially sent (i.e., Altered data). Without availability, we may be denied
access to computing resources (i.e., A virus that disables your keyboard and mouse).66
66
http://wiki.answers.com/Q/What_is_the_importance_of_computer_security
20
PART III: THE CONCEPT OF CYBER PREVENTION AND DETECTION.
3.0 Introduction.
“Given the ever changing nature of technology, it is virtually impossible for police in
most parts of the world to keep up with criminals in their constant efforts to exploit
work closely with other elements of the criminal justice system, the public at large,
Self protection is not sufficient enough to make cyberspace a safe place to conduct business. As
cyber crime increasingly breaches national borders, nations perceived as havens run the risk of
having their electronic messages blocked by the network. There has to be something to either
removing, or preventing the occurrence of cyber attacks, in either, computer systems both
hardware and software systems, networks and data, or any other electronic devices capable of
67
Stein Schjolberg and Solange Ghernaouti-Helie, A Global Treaty on Cyber Security and Cyber Crime, second
edition, AaiT Oslo, 2011, p.57.
68
Marc Goodman is the Seniour Advisor to INTERPOLs Steering Committee on Information Technology Crime,
and chair the organizations working group on Next Generation Cyber Threats.
69
McConnell International, Cyber Crime and Punishment? Archaic Laws Threaten Global Information, December
2000, Washington DC, p.1.
21
being a computer (capable of performing logical arithmetic and memory functions) from such
attacks.
Cyber Detection systems, it detects an irregularity and misbehaviour activities of the Netizen. It
can scan a network for people that are on the network but who should not be there or are doing
things that they should not be doing, for example trying a lot of passwords to gain access to the
network.70
To best defend yourself and to defeat your enemies, you must first understand them: who they are,
how they operate, and why.71 We all know that computers, networks, software applications and
the Internet have introduced opportunities to the world that no one thought possible. However, as
is true with any technology, these same opportunities also carry risks.72
The history of Cyber Prevention and Detection is not different from Cyber Security as explained
in Part II. This is simply because one among the methodology of cyber prevention and detection is
cyber security. They both exist due to the development of science and technology which at the end
70
Mikko Hypponen: Fighting viruses, defending the net". TED.
71
Mr. XYZ, Awareness and Prevention of Cyber Crime, 2012, at http://www.scribd.com/doc/89505129/Awareness-
and-Prevention-of-Cyber-Crime.
72
Ibid.
73
See page 10 of this Paper.
22
3.3 Cyber Prevention and Detection Methodologies.
The best methodology for fighting against cybercrime is through education, enforcement of laws
and highly developed security services. Technical expertise in online security is necessary, which
can ensure that people of all the ages including children, teenagers, students, parents and the
But there are some precautions you can take to help guard you and your family against cyber
crime.
That is to provide security counter measures which act as an action, device, procedure,
Rolf Oppliger (1997) argued that, firewall is a blockade between the internal privately owned
network such as intranet that is believed to be secured and an external network, such as internet
which is not assumed to be secured. It does not only help to secure system from unauthorized
access but also prevent an authorized communication with the network.76They give alert and
controls all traffic enters and leaves the internal network. Firewalls can provide some protection
74
http://www.crimepreventiontips.org/self-defense-methods/cybercrime-part-3.html
75
Herman T. Tavani, Ethics and Technology, Ethical Issues in an Age of Information and Communication
Technology, 2nd Edition, John Wiley & Sons, Inc, 2007, United States of America, p.183.
76
Ibid.
23
3.3.1.2 Antivirus Software.
Antivirus software consists of computer programs77 that attempt to identify, detect, thwart and
eliminate computer viruses and other malicious software (malware). This began fifty years ago
with the computer science pioneer and mathematician John Von Neumann.78They scan the
computer affected files, and either recover, repair, stored or delete them if necessary. They alert
whenever there is a possible intrusion of virus and worms, and perform an action as programmed
by the owner of the computer. They are running effectively when updated.79
This ensured the confidentiality, integrity of data transmitted through e-mails, for instance Pretty
Good Privacy (PGP). They employ a technique known as data encryption which can also be
ordinary text, into cipher text. The party received it, uses a key to transform it back to the
Raising awareness with the public may reduce the number of crimes in the information age. The
stakeholders such as hardware and software manufacturers, service providers, government and
other non-governmental organizations may perform a task of informing the public on the security,
77
Examples of Antivirus are, Norton, Avast, Avira, Kaspersky, AVG, Commodo, Viper, Rising, Eset etc.
78
Lee Garber and Richard Raucci (2001)
79
Herman T. Tavani, Ethics and Technology, Ethical Issues in an Age of Information and Communication
Technology, 2nd Edition, John Wiley & Sons, Inc, 2007, United States of America,p.184.
80
Ibid, p.185.
24
and other relevant risks that may occur during the use such a mode of transaction. They must
By looking at how to prevent cyber attacks, the technology itself must be improved. Pfleeger and
Rue (2008) once said, “To provide a more realistic picture of the nature and number of cyber
incidents, researchers have to conduct several surveys in the last few years to capture information
For instance, in 2002 the annual Australia Computer Crime and Security used information
provided by Australia’s Federal, State, and Territorial Law Enforcement Agencies to solicit data
from large organization about computer network attacks and misuse trends in Australia. The UK
has done the same, under the UK Department of Trade and Industry.83
Prevention of cyber crimes went further to the legal aspects. As the result that, there is no any
other stronger measure than law to prevent cyber crimes, several countries and international
81
Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders, Vienna, A/CONF.
187/10, 10-17 April 2000, page 14.
82
Brett Pladna, The Lack of Attention in the Prevention of Cyber Crime and How to Improve It, ICTN6883,East
Carolina University, 2005, p.16.
83
Ibid.
25
3.4.1 At the National Level.
3.4.1.1 USA.
Cyber Security Enhancement Act of 2009 (S.773). Intended to improve cyber security within the
federal government and throughout the public and private sectors. To this end, the act establishes
research and development (R&D) requirements for federal agencies and promotes public-private
partnerships (PPPs).84The Act provides the National Institute for Science and Technology for
Cyber Intelligence Sharing and Protection Act of 2011 (CISPA). Is proposed United States
federal law that would allow for the sharing of Web data between the government and
technology companies. Authors of the bill state that it will help the government to contend with
3.4.1.2 Philippines.
Cyber Crime Prevention Act of 2012 officially recorded as Republic Act No. 10175. Previously
Philippines had Electronic Commerce Act of 200087, the Act did not extensively curter the need
for combating cyber crimes.88 The Act has universal jurisdiction, criminalizes several types of
offences, including illegal access (hacking), data interference, device misuse, cybersquatting,
84
http://whatis.techtarget.com/definition/cybersecurity
85
Ibid.
86
Ibid.
87
Electronic Commerce Act of 2000 (Republic Act No. 8792.
88
Arnold, Wayne (22 August 2000). "Technology; Philippines to Drop Charges on E-Mail Virus". The New York
Times. Retrieved 3 October 2012.
26
computer-related offences such as computer fraud, content-related offences such as cybersex and
spam, and other offences. It reaffirms existing laws against child pornography, an offence under
India is also one among the countries which strongly combat cyber crimes through Information
3.4.2.1 The Council of Europe Convention on Cyber Crime, European Treaty Series - No. 185,
90
Budapest, and 23.XI. 2001. It is said to be the highest legal instrument covering the aspect of
Offences against the confidentiality, integrity and availability of computer data and systems,
such as illegal access, illegal interception, data interference, system interference, and misuse of
rights. To the greatest extent, it has solved a number of problems brought by cyber revolution.
89
Sy, Marvin (23 September 2012). “‘give Cybercrime Prevention Act a chance'". The Philippine Star.
90
Sofaer, Toward an International Convention on Cyber in Seymour/Goodman, The Transnational Dimension of
Cyber Crime and Terror, page 225, available at: http://media.hoover.org/document/0817999825_221.pdf
91
View Article 7 and 8 of the Council of Europe Convention on Cyber Crime, European Treaty Series - No. 185,
Budapest, and 23.XI. 2001.
92
Article 9 of the Council of Europe Convention on Cyber Crime, European Treaty Series - No. 185, Budapest, and
23.XI. 2001.
27
3.4.3 At International Level.
United Nations through several congresses have managed to create some principles relating to
prevention of cyber crimes. Prominent Congresses are The Tenth United Nations Congress on
the Prevention of Crime and the Treatment of Offenders, Vienna, A/CONF. 187/10, 10-17 April
2000, and the 11th UN Congress on Crime Prevention and Criminal Justice in Bangkok, Thailand
2005. The Declaration was adopted that highlighted the need for harmonization in the fight
In 1985 the Council of Europe (CoE) appointed the Expert Committee to discuss the legal
aspects of computer crimes.95Their Recommendation was adopted under the terms of Article
15.b of the Statute of the Council of Europe by recognizing the new challenges of cybercrimes,
The Council of Europe introduced a new convention with 23 signatory state members at first
instance.96 Apart from the criminalization of the sexual abuse of children (Art. 18) the
93
“Declaration Synergies and Responses: Strategic Alliances in Crime Prevention and Criminal Justice”,
at:http://www.unodc.org/pdf/crime/congress11/BangkokDeclaration.pdf.
94
Based in Strasbourg and founded in 1949, representing 47 member states in the European region. It is not a part of
European Union but separate organization.
95
United Nations Conference on Trade and Development, Information Economy Report 2005,
UNCTAD/STE/ECB/2005/1, 2005, Chapter 6, page 233, available at:
http://www.unctad.org/en/doc/sdteecb20051ch6_en.pdf.
96
Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse, CETS
No.201.
28
Convention contains a provision dealing with the exchange of child pornography (Art. 20) and
29
PART IV: PERSONAL ASSESSMENT.
4.0 Introduction.
“Our world is different; cyberspace offered the opportunity to create a new social
order, free from the entrenched power imbalances evident in the physical world”.
“We are forming our own social contract”, the global social space that is beyond the
crimes. In addition to being used as a tool to perpetrate crimes (e.g., Computer intrusion,
stalking, harassment, and fraud), computer can contain evidence related to any crime, including
It is no longer sufficient to have a few experts familiar with evidence stored on and transmitted
using computers. Any investigation can involve computer or networks and everyone involved in a
criminal investigation or prosecution can benefit from knowledge of the associated technical,
97
(Barlow, 1996).
98
Eoghan Casey, Digital Evidence and Computer, Forensic Science, Computer and the Internet, Academic Press,
2000.
30
“The next Pearl Harbor we confront could very well be a cyber attack that cripples
our power systems, our grid, our security systems, our financial systems, our
governmental systems,”
The statements above made by various prominent authors and leaders, tries to show how
cyberspace is unsafe and create a new world. They contend that, it can be useful for some aspects
(like evidential facts) if well managed. There is no rightful management of cyberspace than the
rightful laws which can help the court to interpret it at the rightful place.
Does Tanzania have rightful laws which can help the court to interpret it at the right place?
Tanzania does not have specific legislations dealing with cyber security, prevention or detection
of cyber crimes. Currently the laws which are in place were made before cyber security was an
issue. While cyber crimes pose a significant threat to the development of electronic transactions
Tanzanian Laws do not recognize criminal activities on the internet. For example illegal
intrusion into a computer system cannot be prosecuted with the current legislations which require
physical presence.
The internet does not recognize administrative borders and hence making the internet an
attractive option for people with criminal intents. Tanzania needs to join the world in enacting
99
http://www.its3.us.com/index.php/about-us/why-cyber-security
31
cyber laws which will protect the country and its people against criminal activities on the
internet.
Because,
“There can be no peace without justice, no justice without law and no meaning law
without a Court to decide what is just and lawful under any given circumstances”.
Benjamin B. Ferenez100
“We get the Government we deserve. When we improve, the Government is also
bound to improve”101
It is the duty of the government of the United Republic of Tanzania to ensure that its laws cope
with the development of science and technology, and fully participate in the legislative
enactment (for example in Kenya they have the Electronic Transactions Bill of 2007 which is
supported by USAID, E-legislation Policy Development Initiative for the East African
100
Stein Schjolberg and Solange Ghernaouti-Helie, A Global Treaty on Cyber Security and Cyber Crime, second
edition, AaiT Oslo, 2011, p.66.
101
Vakul Sharma, Information Technology-Law and Practice, 3rd Edition (New Delhi: Universal Law Publishing
Co.Pvt. Ltd., 2011), page 46.
32
BIBLIOGRAPHY.
Statutes.
International Laws
The Council of Europe Convention on Cyber Crime, European Treaty Series - No. 185, Budapest,
The Council of Europe Convention on the Protection of Children against Sexual Exploitation and
Case Laws
93 Cr App R 25
Text Books
33
Adam J. Mambi, ICT LAW BOOK, a Source Book for Information and Communication
Technologies and Cyber Law in Tanzania and East Africa Community, 2010.
Eoghan Casey, Digital Evidence and Computer, Forensic Science, Computer and the Internet,
Herman T. Tavani, Ethics and Technology, Ethical Issues in an Age of Information and
Communication Technology, 2nd Edition, John Wiley & Sons, Inc, 2007, United States of
America.
Cliff, the Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage (New York:
Stein Schjolberg and Solange Ghernaouti-Helie, A Global Treaty on Cyber Security and Cyber
Vakul Sharma, Information Technology-Law and Practice, 3rd Edition (New Delhi: Universal
34
9th Global Fraud Survey: Fraud risk in emerging markets. This survey was conducted in 2006 on
behalf of Ernst & Young‘s Fraud Investigation & Dispute Services Practice.
Arnold, Wayne (22 August 2000). "Technology; Philippines to Drop Charges on E-Mail Virus".
Brett Pladna, The Lack of Attention in the Prevention of Cyber Crime and How to Improve It,
Campbell, Gordon, Loeb, Zhou, “The Economic Cost of Publicly Announced Information
Security Breaches: Empirical Evidence from the Stock Market”, Journal of Computer Security,
Vol.11.
Clarke, Richard and Lee Zeichner: Beyond the Moat: New Strategies for Cyber security, in:
Explaining Threat Politics in the Information Age. Conference paper, SGIR Fifth Pan-European
Fischer, Eric A. (2005): Creating a National Framework for Cyber security: An Analysis of
Issues and Options, February 22, CRS Report for Congress, Order Code RL32777.
ITU Global Cyber Security Agenda/High-Level Experts Group, Global Strategic Report, 2008
ITU Publication, Understanding Cyber Crime: A Guide for Developing Countries, 2009.
35
Marcus, K. R, social learning theory and moral disengagement analysis of criminal computer
Magnin, C.J. The 2001 Council of Europe Convention on Cyber Crime: An Efficient Tool to
McConnell International, Cyber Crime and Punishment? Archaic Laws Threaten Global
Stein Schjolberg CJ, the History of Global Harmonization on Cyber Crime Legislation-The Road
Talwant Singh, District & Sessions Judge, Cyber Law & Information Technology, Delhi-India.
Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders,
United Nations Conference on Trade and Development, Information Economy Report 2005,
UNCTAD/STE/ECB/2005/1, 2005,
Internet Sources
http://en.wikipedia.org/wiki/MoU/
http://en.wikipedia.org/wiki/Security.
http://dealnews.com/pages/articles/guide-computer-crime-prevention.
36
http://media.hoover.org/document/0817999825_221.pdf
http://www.banktech.com/showArticle.jhtml?articleID=17501355
http://www.cybercrimelaw.net
http://www.itu.int/ITU-D/cyb/cybeersecurity/legislation.html.
http://www.unctad.org/en/doc/sdteecb20051ch6_en.pdf.
Author’s Particulars:
Occupation: Student (LL.B Degree Holder (2012) and LL. M-ICT LAW Candidate (2013)
37