Cyber and Information Technology
Cyber and Information Technology
Cyber and Information Technology
With the increase in emergence of digital technology to our daily life’s the concern of protections
starts pumping up especially with the illegal breaches used through cyber and information
technology. In this paper, we will cover as much as possible all aspects regarding cyber and
information technology in terms of law, treaties and agreements. We will try to blend the
agreements with real life. Analysing wither in some parts the agreement isn’t effective or not
What’s interesting is that we will have some assumptions and we will live long enough to see
wither in the future our analysis and prediction where in its correct place or not. The protection of
our digital information and systems – is a priority for alignment by both private industry and
governments globally. Our companies work to secure the technology systems that citizens use to
improve their lives and the digital infrastructure our economy depends upon for unprecedented
opportunities and prosperity. It’s extremely important to separately the term cyber technology
and information technology. Information technology is the process of implementing measures
designed to safeguard information using any form of technology and the key difference here, is
that the date your trying to protect could be either on paper or electronic devices. While cyber
security s often explained as the precautions taken to guard against crime that involves the
Internet. We can imagine that the term cyber security derivative from information technology, or
in other words cyber security is a type of information security.
Introduction
Nowadays, Internet and Computer based commerce and communications cut the borders and
therefore is defined as a global issue in which the need of rules governing the behavior of users is
a concern.
Accordingly, ‘cyber space’ with its specific technical characteristic features, does pose new
challenges for international law to stablish a suitable legal framework of cyber laws across
countries.
Theme 2 is freedom of expression and association. In more details, the right to freedom of
thought, conscience and religion, opinion and expression without interference. Also the
right to freedom from censorship and the right to freedom of peaceful assembly are on the
main core.
Theme 3 indicates that everyone has the right to access the knowledge and free
information. All scientific information and social research that is produced by public funds
should be freely available to all.
Theme 4 right to participate in the cultural life of the community and has the right to share
the information and knowledge, to create the content tools and applications on the
internet.
Theme is the right to data protection and personal information for all individual. Also
internet users should have the right to access the tools to use encryption to ensure secure
and private communication. It
Theme 6 the multilateral and democratic Internet governance in which no single
government have a pre-eminent role.
Theme 7: is the right for all internet users to be protected by international human rights,
declarations, law and policy practice. In addition public education should inform people of their
rights when they are using the internet.
Cybercrime
Moving on, this part of the report, discuses a topic that is expected to be the number one
public enemy to our world. It is expected in 2030 by the Interpol that it will be a crime that would
be considered more dangerous than drug abuse or sexual trafficking. They even see this form of
crime as a new tool terrorists would rather use. Costed our world only in 2016, 450 billion dollars.
It is not the war on drugs, not the war on terrorism nor costs dedicated to raise awareness
between nations, it is rather the blooming cybercrime.
It is very vital to first define what is cybercrime. Basically, there is a lot of definitions that
can be attributed to cybercrime. However, the one definition given by the United Nations Office
on Drugs and Crime was that it is an activity done using computers and internet. You in all cases
need to find two key words to be able to classify this or to commit cybercrime, you need to have
be online and you need to have an electronic device, until today without both these terms you
cannot have a cybercrime.
Types
1.HACKING: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed.
2.DENIAL OF SERVICE ATTACKS: s a cyber-attack where the perpetrator seeks to make a
machine or network resource unavailable to its intended users by temporarily or
indefinitely disrupting services of a host connected to the Internet.
3. VIRUS DISSMINITION: Malicious software that attaches itself to other software. (virus,
worms,
4.COMPUTER VANDALISM: A type of virus that destroys all your data on a computer
5. CYBER TERRORISM: This is a type of crime wherein some terrorists use the computer to
plan a terrorist attack
6. SOFTWARE PIRACY: is the unauthorized copying, reproduction, use, or manufacture
of software product
7. PORNOGRAPHY: This is also a type of cybercrime wherein criminals solicit minors via
chat rooms for child pornography
8. INSULT & CYBER STALKING: This is a kind of online harassment wherein the victim is
subjected to a barrage of online messages and emails
History
To be able to go further with cybercrime it is very vital to check its history to be able to
tackle the problem that we have. The first recorded cybercrime took place in 1820, Which is 197
years ago. The first spam email took place in 1976 when it was sent out over the ARPANT, and the
first ever virus was installed on an Apple computer in 1982 when a high school student, Rich
skrenta, developed the EIK Cloner.
It’s vital to know that there 5 regional agreements. You will find that usually countries with
similar domestic laws having these agreements. For example, in the middle east it is punishable by
law to insult religion (Judaism, Christianity or Islam) to be sentenced to prison form 15 years to life
sentence. So, therefore it’s a bit clear why it’s very easy to notice an agreement between these
countries. It’s much easier to have agreements with countries having similar domestic laws. In
Europe, one of the main things the formers of EU focused on, is to have a unique legal system, and
if a countries domestic law differs from European union law, then what the court should follow is
the European union law, since it always prevails (considered superior.)
The one main international treaty (Vienna convention 2011)
Going a step backward the General Assembly resolution 65/230 requested the Commission
on Crime Prevention and Criminal Justice to establish an open-ended intergovernmental expert
group, to conduct a comprehensive study of the problem of cybercrime and responses to it by
Member States, the international community and the private sector, including the exchange of
information on national legislation, best practices, technical assistance and international
cooperation. The first session of the expert group was held in Vienna from 17 to 21 January 2011.
These main topics were further divided into 12 sub-topics.3 Within this Study, these topics are
covered in eight Chapters:
(1) Connectivity and cybercrime;
(2) The global picture;
(3) Legislation and frameworks;
(4) Criminalization;
(5) Law enforcement and investigations;
(6) Electronic evidence and criminal justice;
(7) International cooperation; and
(8) Prevention
Key findings
The key findings of this treaty were:
-the impact of fragmentation at international level and diversity of national cybercrime
laws on international cooperation
-a reliance on traditional means of formal international cooperation in criminal matters
involving cybercrime and electronic evidence for all crimes
-the role of evidence ‘location’
-harmonization of national legal frameworks
-law enforcement and criminal justice capacity
-cybercrime prevention activities
Improvements
Options to strengthen existing and to propose new national and international legal or other
responses to cybercrime include:
-Development of international model provisions
-Development of a multilateral instrument on international cooperation regarding
electronic evidence in criminal matters
- Development of a comprehensive multilateral instrument on cybercrime
-Delivery of enhanced technical assistance for the prevention and combating of cybercrime
in developing countries (Not sufficient forensic tools)
Since that international treaty not one further treaty has been formed. The Vienna treaty might
have been not that effective. To cybercrime victims, this treaty theoretically was a big step. Yet, in
2017 we can say that it wasn’t really applied. One cannot claim that it’s an effective agreement
that is composed of effective bodies like (WTO, TRIPS or Safeguard.)
But why is there no unique legal entity that fights cybercrime such as WTO or Dispute
Settlement Body, especially types such as hacking cyber terrorism and service attacks if we can see
its devastating effects. That if cybercrime is a huge problem to worldwide national security? This
part is a bit debatable
1) Sovereignty
The idea of sovereignty is why some countries does not explicitly want to have an entity
equivalent to the Interpol for cybercrimes. This is not only for cybercrimes, but rather for even
normal crimes (such as human rights and violations.) In the past decades, we have seen a lot of
examples where countries tend to have this sense of sovereignty on its own territory and its own
actions. For example, Russia would never come to the public and give the chance for someone to
ask for its violations in Ukraine, Bosnia or even Syria. Even though we all knows that thousands of
innocent lives have been lost. Yet, unfortunately a lot of countries not only Russia including my
government (Egyptian government) in several occasions refuse to be in a position where an entity
can judge or sue it. In the following paragraph, I will try to elaborate more giving some extra
examples:
I couldn’t find a better example of explaining this. The murder of Giulio Regeni, that took place in
Egypt 25th of January 2016 unfortunately. He is an Italian student that accomplished his phd in
Girton College, Cambridge. He was in Egypt on some exchange program. He disappeared on the
25th of jan 2016. Which for you who don’t know it is the same date where our original revolution
took place. On that day every year, the police try to capture suspected people who might show
any sign of revolutionary activities in a trial to control the country. Last time Guilio regeni was seen
is the metro station stopped by two police men who asked him to go with them for some
questioning. However, the Egyptian government claims that they have set him release and it is
since then he has disappeared. When Italy asked to carry out investigation carried by the Egyptian
government, the Egyptian government welcomed such proposal. However, it was never effective
as the Italian authorities have complained that the Egyptian government isn’t really sharing any
evidence. The point that am trying to make is that in a lot of cases a lot of countries tend to have
this form of sovereignty that no one should investigate on my territory crimes, which in my
opinion shameful, but I am sure that everyone can relate a lot of international cases where you
will find slightly similar circumstances
2)Hidden agenda
China
It is very well known that the government supports a specific police force only in cyber hacks.
Making China one for of the main hotspots for hackers. We know that China would sometimes
want to use her hackers in a potential attack on anyone (as a form of retaliation or as a form of
assault.) Do you think if any cyber-attack was supported by the Chinese government, it would
have been pleased if there was an international entity that handles cyberattack? Or things are
great they way they are currently?
Russia
Around February 2017 in security council. They were trying to discuss how can they solve the war
in Syria. Russia was pro continue its military attacks on ISIS controlled areas, the side effect is that
there are innocent civilians that die due to the air strikes. Qatar at that time had another opinion
and here where it gets more interesting. Qatar ambassador and the Russian one had a word fight,
ended with the Russian ambassador threatening the Qatari one that Russia is willing
To erase Qatar from the map if they think they can ever threaten Russia with sanctions. After 8
month, the Qatari national TV online website was hacked. Releasing statements attacking the
American president, Some middle eastern countries. Qatari officials removed those statements
and apologized. However, one week later 5 middle eastern countries have decided to boycott
Qatar. Which is going viral these days on the internet. United States (Trump in specific) even
though being one of Qatar’s biggest ally have blamed Qatar also. What’s interesting is that United
States experts, have said that they have detected that the location where the national Qatari
online website was hacked from Russian territory, and they concluded that this might have been
supported by the Russian government to harm Qatar’s relations with its allies. Do you think if the
cyber-attack was supported by the Russian government, it would have been pleased if there was
an international entity that handles cyberattack? Or things are great they way they are currently?
United States
The United States for example back in 2010 had several disagreements with the Iranian nuclear
program. Especially in February 2010 tension levels have reached its peaks. The United States
asked Iran to stop its nuclear program, Iran continued ignoring the United States request, the
result was that the United States have launched a virus cyber-attack called Stuxnet slowing the
Iranian Nuclear power plant program by 10 percent and destroyed completely one fifth of Iran's
nuclear centrifuges. Not only that, but it also launched another form of virus attacks in some
Iranian power plants, and to Iran this was like a crisis. The virus had a severe effect on the power
plant. It is vital to clarify that international experts could not have hard evidence to blame the
United States government. Yet, they all agreed that the location of the cyber attackers where in
United States territory. At that time, USA just denied those allegations and didn’t take further
actions. Let’s assume that these cyber-attacks where not supported by the United states
government, why didn’t they then track those cyber attackers and take them to court? I think an
attack that huge could be easily trackable, or did the government want to have a one eye blind on
these actions? Let’s assume that it was backed by the united states government. Do you think USA
would have been pleased if there was an international entity that handles cyberattack? Or things
are great they way they are currently?
In conclusion, in the upcoming years it is inevitable to have an international entity that fights
cybercrimes in the whole world with the emergence of the digital technology especially in types
such as pornography, software piracy. However, it would take a lot of time and effort to have it as
effective as the WTO. It would require a lot of countries to change their perception on
cybercrimes. Taking a step backward our governments should understand that we are all equal
human beings with equal human rights who want to live in peace and fairness. It requires our
governments especially the ones that have relatively high importance compared to others to take
the initiative and start removing the idea of sovereignty, hidden agenda from its plans, and to
rather reach to the security council in resolving their problems, rather than solving it by
themselves, and if they see the united nations as an inefficient entity, then I think they should
start working on making it more efficient for everyone. They must take the initiative because until
this happens we as civilians will keep paying the price.
References
https://us.norton.com/cybercrime-definition
https://www.theregister.co.uk/2017/06/06/russia_cyber_militia_analysis/
http://edition.cnn.com/2017/06/06/politics/russian-hackers-planted-fake-news-qatar-
crisis/index.html
https://www.unodc.org/documents/treaties/organized_crime/EGM_cybercrime_2011/Presentati
ons/Russia_1_Cybercrime_EGMJan2011.pdf
C. Satapathy. "Legal Framework for E-Commerce." Economic and Political Weekly 33, no. 29/30
(1998): 1906-907. http://0-www.jstor.org.library.ada.edu.az/stable/4407004
.
Hamid, Bushra. "Institutional Approach to E-commerce: An Integrated Framework for Pakistan."
The Pakistan Development Review 41, no. 2 (2002): 179-92. http://0-
www.jstor.org.library.ada.edu.az/stable/41260460.
Gregory, John D. "The Proposed UNCITRAL Convention on Electronic Contracts." The Business
Lawyer 59, no. 1 (2003): 313-43. http://0-www.jstor.org.library.ada.edu.az/stable/40688198.
Luca Castellani, “UNCITRAL legal instruments for e-commerce and paperless trade”, Unescap.org,
http://www.unescap.org/sites/default/files/2_UNCITRAL%20texts%20for%20e-
commerce%20and%20paperless%20trade_Luca_1.pdf ( retrieved June 7, 2017)