Professional Documents
Culture Documents
10 Eur Jon Crim Poly RSCH 27
10 Eur Jon Crim Poly RSCH 27
Citations:
Please note: citations are provided as a general guideline. Users should consult their preferred
citation format's style manual for proper citation formatting.
-- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and
Conditions of the license agreement available at
https://heinonline.org/HOL/License
-- The search text of this PDF is generated from uncorrected OCR text.
-- To obtain permission to use this article beyond the scope of your license, please use:
Copyright Information
FAUSTO POCAR
*Fausto Pocar is professor of International Law at the University of Milan (Italy) and
Vice President of the International Criminal Tribunal for the former Yugoslavia, The Hague
(The Netherlands). The substance of this article reflects a paper submitted by the author
to the International Conference on Crime and Technology: New Frontiersfor Legislation,
Law Enforcement and Research, held in Courmayeur (Italy) on 28-30 November 2003.
1
The National Hi-Tech Crime Unit (NHTCU) is part of the United Kingdom's National
Hi-Tech Crime Strategy (NHTCS), founded in April 2002, based in London, whose role
is defined as follows: supporting and leading activity against serious and organized hi-tech
crime of a national and transnational nature; responding with an investigative capability
to all threats to and attacks upon the critical national infrastructure; undertaking strategic
threat assessments; developing intelligence; supporting and coordinating law enforcement
operations; offering 'best advice' to other law enforcement agencies, business, industry and
the IT world.
2Commission of the European Union, Proposal for a Council Framework Decision on
Attacks against Information Systems, in Official Journalof European Communities, C 203
E, 27 August 2002, pp. 109-113.
3
lbidem.
INTERNATIONAL RULES AGAINST CYBER-CRIME 29
9
As to cyber-criminality see, for example, the resolutions and recommendations
adopted at the meeting of the International Association for Criminal Law held on
28 October 2002 (resolutions and recommendations are available at http://www.penal.
org).
10
The Convention was signed in Budapest on 23 November 2001.
11 Council of the European Union, Council Decision of 29 May 2000 to Combat Child
Pornography on the Internet, in Official Journal of the European Communities, L 138, 9
June 2000, pp. 1-4.
12Commission of the European Union, Proposal for a Regulation of the European Par-
liament and of the Council Establishing the European Network and Information Security
Agency, 11 February 2003, COM (2003) 63 final.
13
Council of the European Union, Council Recommendation of 25 June 2001 on Contact
Points Maintaining a 24-Hour Service for Combating High-Tech Crime, in Official Journal
of European Communities, C 187, 3 July 2001, pp. 5-6.
INTERNATIONAL RULES AGAINST CYBER-CRIME 31
Cyber Crime held in the Council of Europe1 4 and in the Joint Position
of 29 March 1999 defined by the Council on the basis of Article K.3 of
the Treaty on European Union, on the proposed United Nations Conven-
tion againstOrganisedCrime.1 5 The European Commission has also been
active in the debate with its Communication on Creating a Safer Informa-
tion Society by Improving the Security of Information Infrastructuresand
Combating Computer related-Crime.16
In the European context, it should also be noted that the EU mem-
ber states have ratified the EUROPOL Convention,17 which provides for
a framework of police cooperation against organized crimes, thus also in-
volving cyber-criminality.
In light of the foregoing indications, it appears that the list of interna-
tional legal instruments dealing with cyber-crime is rather long. However,
it is far from exhaustive for the purposes of covering all aspects of the
subject matter concerned. Moreover, it should be noted that, apart from
EU legislation, not one of the mentioned legally binding international in-
struments is yet in force. In general terms, existing international rules have
been structured along two different though compatible routes. On the one
hand, they provide for the duty of contracting states to implement interna-
tionally agreed norms within their own borders, with a view to bringing
the legal system of contracting states closer both as to the substance and
the practice of criminal law. On the other hand, these rules establish pro-
cedures for relevant international relations, aimed at providing such forms
of cooperation between national judicial authorities as may interact with
each other both swiftly and efficiently. 18
14
Council of the European Union, Common Position of 27 May 1999 adopted by the
Council on the basis of Article 34 of the Treaty on European Union, on Negotiations Relating
to the Draft Convention on Cyber Crime held in the Council of Europe, in Official Journal
of the European Communities, L 142, 5 June 1999, pp. 1-2.
15
Council of the European Union, Joint Position of 29 March 1999 defined by the Council
on the basis of Article K.3 of the Treaty on European Union, on the proposed United Nations
Convention against Organised Crime, in Official Journalof the European Communities, L
87, 31 March 1999, pp. 1-2.
16 Commission of the European Union, Communication from the Commission to the
Council, the European Parliament, the Economic and Social Committee and the Com-
mittee of the Regions on 'Creating a Safer Information Society by Improving the Secu-
rity of Information Infrastructures and Combating Computer-related Crime', 26 January
2001.
17 Council of the European, Council Act of 26 July 1995 drawing up the Convention
based on Article K.3 of the Treaty on European Union, on the establishment of a European
Police Office (Europol Convention), in Official Journal of the European Communities, C
316, 27 November 1995, p. 1.
18 In a similar vein, as regards international legal efforts on combating corruption, see
Parisi and Rinoldi (2004).
32 FAUSTO POCAR
Among the various issues that may arise from existing international legisla-
tion on cyber-crime and efforts aimed at establishing new legal instruments,
two appear to be especially sensitive: the definition of cyber-crimes and
the sanctions to be applied to perpetrators.
The first issue concerns an aspect which may at first sight appear to
be of a purely terminological nature, i.e., the definition of the activities
included in the expression 'cyber-crime'. It is, however, a very substantive
issue, both because it deals with the problem of identifying the elements of
cyber-crime, which is a central prerequisite for criminal prosecution, and
because of its impact on the effectiveness of international cooperation in
the field. The problems that arise in this context may be summarized as
follows.
First, the terms 'cyber-crime', 'computer crime', 'computer-related
crime' and 'high-tech(nology) crime' are often used interchangeably, with-
out an appreciation of different substantive grounds. However, these terms
cover different crimes. By way of example, Europol assumed that 'high
technology crime' consists of the use of information and telecommuni-
cations technology to commit or further a criminal act, against a person,
property, organization or the network computer system. 'Cyber-crime' (and
its sub-categories) is the criminal use of any computer network or system
on the Internet; attacks or abuse against the systems and networks for crim-
inal purposes; crimes and abuse from either existing criminals using new
technology; or new crimes that have developed with the growth of the
Internet.
Secondly, this terminological confusion exists in addition to diverg-
ing international praxis and domestic laws: different views exist on what
constitutes crime involving the Internet in some way. In other words, na-
tional legal orders have different approaches to this phenomenon (Podgor
2002).
A common aspect is represented by the noyau dur of six kinds of be-
haviours, viz., intellectual property theft or software piracy, hacking and
virus attacks, organized on-line paedophilia, denial of service attacks, ex-
tortion, and fraud. As one can see, some of these crimes may also be
perpetrated outside the Internet. And indeed, almost any crime that can be
committed in the real world can also be perpetrated in the virtual one; but
it is beyond doubt that some crimes have been revitalized as a result of the
electronic environment.
This situation entails the need for clarification at the legal level, based on
a consideration of distinct factual situations: a computer may be the 'object'
of the crime (because it is targeted), the 'subject' (as it is the physical site
of the crime), or the 'source' (as viruses and worms start from it).
INTERNATIONAL RULES AGAINST CYBER-CRIME 33
19
Arts 2-13.
20
Arts 3-7.
21 Following the teaching of the Court of Justice of the European Communities in the
so-called 'mais case' (judgement 21 September 1989, case no. 68/88).
34 FAUSTO POCAR
22
The Convention came into force internationally on 15 February 1999.
23
Council of the European Union, Framework Decision of 13 June 2002 on the European
Arrest Warrant and the Surrender Procedures between Member States, in Official Journal
of the European Communities, L 190, 18 July 2002, pp. 1-20.
INTERNATIONAL RULES AGAINST CYBER-CRIME 35
In any event, and apart from this scenario, it has to be stressed that
almost all different forms of mutual cooperation presuppose the respect
of the dual criminality criterion. But, in turn, the application of the latter
requires a harmonized approach to the definition of the crimes involved.
An efficient cooperation in the implementation of the principle aut dedere
aut judicare is therefore strictly linked to successful efforts in bringing
domestic legislations on cyber-crime closer.
24
Commission of the European Union, Proposal for a Council Framework Decision on
the European Evidence Warrant for Obtaining Objects, Documents and Data for Use in
Proceedings in Criminal Matters, 14 November 2003, COM (2003) 688 final.
36 FAUSTO POCAR
25
As of the Tokyo Convention on Offences and Certain Other Acts Committed on Board
Aircraft, 1963, which was followed by the Hague Convention for the Suppression of Un-
lawful Seizure of Aircraft, 1970, and by the Montreal Convention for the Suppression of
Unlawful Acts against the Safety of Civil Aviation, 1971. For a consideration of these and
other conventions that adopt the principle of universal jurisdiction, see e.g. Shaw (1997:
470ff).
INTERNATIONAL RULES AGAINST CYBER-CRIME 37
approach for the resolution of jurisdictional issues in this area, which merits
careful consideration.
It appears, on the contrary, that international courts and tribunals would
hardly have a role to play in this field, unless specific cyber-crimes re-
sult in serious violations of human rights, which would be regarded as
crimes against humanity. Only such a case would justify the intervention
of international jurisdiction to try cases which would not be brought be-
fore domestic courts, due to the inability or the unwillingness of states to
do so.
REFERENCES
Alliance for Global Business, A Global Action Plan for Electronic Commerce, 2nd ed.,
October, 1999.
Clarberg, B., Cyber Crime, Paper presented at the conference on InternationalCooperation
on Trans-NationalCrime, The Hague, 9-10 October 2003 (unpublished).
Council of Europe, Convention on Cyber-Crime. Budapest, 23 November 2001a.
Council of Europe, Convention on Cyber-Crime, Explanatory Report. 8 November 2001b.
Council of Europe, Additional Protocolto the Convention on Cyber-Crime Concerningthe
Criminalisationof Acts ofa Racist andXenophobic Nature Committed throughComputer
Systems. Strasbourg, 28 January 2003.
Jennings, R. and A. Watts (Eds), Oppenheim's International Law, 9th ed., London:
Longman, 1992.
National Hi-Tech Crime Unit, OperationalProtocolbetween the National Hi-Tech Crime
Unit and Partieswithin the Strategic Stakeholders, May 2002.
OECD, Convention on Combating Bribery of Foreign Officials in InternationalBusiness
Transactions. 21 November 1997.
OECD, OECD Guidelinesfor the Security of Information Systems and Networks. Towards
a Culture of Security. Paris: OECD, 2002.
Parisi, N. and D. Rinoldi, Recent Evolutions in the Fight against Corruption in the Interna-
tional Trade Law, Le droit des affaires internationales,p. 1, 2004.
Podgor, E.S., International computer fraud: A paradigm for limiting national jurisdiction,
U.C. Davis Law Review, p. 35, 2002.
Shaw, M., InternationalLaw, 4th ed., New York: Cambridge University Press, 1997.
UN Economic and Social Council, Official Records of the Economic and Social Council,
2001, Supplement No. 10 (E/2001/30/Rev.1), 2001.
UN Economic and Social Council, Effective Measures to Prevent and Control Computer-
Related Crime. Report of the Secretary-General,29 January 2002.
University of Milan
Largo Richini 1
20122 Milano
Italy
E-mail:fausto.pocar@unimi.it