Computer-Related Offences: I. The Background
Computer-Related Offences: I. The Background
Computer-Related Offences: I. The Background
COMPUTER-RELATED OFFENCES
A presentation at the Octopus Interface 2004 - Conference on the Challenge of
Cybercrime, 15-17 September 2004, Council of Europe, Strasbourg, France.
Stein Schjolberg
Chief judge
Moss tingrett
Norway
E-mail: steins@mosstingrett.no
www.cybercrimelaw.net
www.globalcourts.com
I. THE BACKGROUND
The first initiative on computer crime in Europe was the Council of Europe
The first comprehensive initiative on computer crime in the United States was a
1977. This staff study addressed several problems associated with computer
Senator Ribicoff introduced the Ribikoff Bill later in 1977. This Bill was the
first proposal for Federal computer crime legislation in the U.S. that would
1
12th Conference of Directors of Criminological Research Institutes: Criminological Aspects of Economic
Crime, Strasbourg, 15-18 November 1976, page 225-229.
2
Staff Study of Computer Security in Federal Programs; Committee on Governmental Operations, the 95th
Congress 1 Session, United States Senate, February 1977
2
specifically prohibit misuse of computers. The Bill S. 1766 (95th Congress) was
“Our committee investigation revealed that the Government has been hampered in its ability
to prosecute computer crime. The reason is that our laws, primarily as embodied in title 18,
have not kept current with the rapidly growing and changing computer technology.
Consequently, while prosecutors could, and often did, win convictions in crime by computer
cases, they were forced to base their charges on laws that were written for purposes other than
computer crime. Prosecutors are forced to “shoe horn” their cases into already existing laws,
when it is more appropriate for them to have a statute relating directly to computer abuses.”4
The Bill was not adopted, but this pioneer proposal became the model
legislation in state computer crime legislation in the United States and created
Interpol was the first international organization addressing computer crime and
related crime and the need for changes in the Penal Codes. This committee made
3
Congressional Records, 95th Congress, Vol. 123, No. 111, June 27, 1977
4
Congressional Records, 95th Congress, Vol. 123, No. 111
5
The Third Interpol Symposium on International Fraud, Saint-Cloud, Paris, France, December 11-13, 1979.
6
The First Interpol Training Seminar for Investigators of Computer Crime, Saint-Cloud, Paris, France,
December 7-11, 1981. The keynote speaker at the conference was Donn B. Parker, SRI International, USA, and
the “founder” of the combat against computer crime.
3
follows:7
“ a) the input, alteration, erasure and/or suppression of computer data and/or computer
programs made wilfully with the intent to commit an illegal transfer of funds or of another
thing of value;
b) the input, alteration, erasure and/or suppression of computer data and/or computer
programs made wilfully with the intent to commit a forgery;
for national legislatures with liability for intentional acts only, was presented in
follows:8
a) Computer fraud.
The input, alteration, erasure or suppression of computer data or computer programs, or other
interference with the course of data processing, that influences the result of data processing
thereby causing economic or possessory loss of property of another person with the intent of
procuring an unlawful gain for himself or for another person (alternative draft: with the intent
to unlawfully deprive that person of his property).
b) Computer forgery.
The input, alteration, erasure or suppression of computer data or computer programs, or other
interference with the course of data processing, in a manner or under such conditions, as
prescribed by national law, that it would constitute the offence of forgery if it had been
committed with respect to a traditional object of such an offence.
8th U.N. Congress on the Prevention of Crime and the Treatment of Offenders in
Havana, Cuba, in 1990. The United Nations Manual on the Prevention and
7
Computer-related criminality: Analysis of Legal Politics in the OECD Area (1986)
8
Computer-related crime: Recommendation No. R. (89) 9, see http://cm.coe.int/ta/rec/1989/89r9.htm
9
The resolution was adopted by the General Assembly on December 14, 1990
4
including:
“States should ensure that their laws and practice eliminate safe havens for those who
The last part of this historic presentation is the Wurzburg conferences organized
legislations.
Canada and Mexico. In Asia Japan, Singapore, Korea and Malaysia were the
INSTRUMENTS
10
The resolution was adopted by the General Assembly on December 4, 2000 (A/res/55/63)
11
See Ulrich Sieber (ed): Information Technology Crime – National Legislations and International Initiatives,
Carl Heymanns Verlag KG (1994).
12
The Washington Communique of December 10, 1997
5
in the combat against computer crime. The goal was to ensure that no criminal
At the last Meeting of G-8 Justice and Home Affairs Ministers in Washington
follows:
terrorist and criminal uses of the Internet, all countries must continue to improve laws that
criminalize misuses of computer networks and that allow for faster cooperation on Internet-
related investigations. With the Council of Europe’s Convention on Cybercrime coming into
force on July 1, 2004, we should take steps to encourage the adoption of the legal standards it
Terrorism.14
13
See http://www.usdoj.gov/ag/events/g82004/index.html
14
See http://cisac.stanford.edu
15
See http://europa.eu.int/information_society/topics/telecoms/internet/crime/index_en.htm
6
a historic milestone in the combat against cyber crime, and entered into force on
July 1, 2004.
committed to:
that are consistent with the provisions of international legal instruments, including United
Nations General Assembly Resolution 55/63 (2000) and Convention on Cybercrime (2001),
by October 2003.”
16
See http://conventions.coe.int/treaty/EN/projets/FinalCybercrime.htm
17
See http://www.oas.org/juridico/english/cyber.html
18
See http://www.apectelwg.org
7
Outside Europe, the U.S. Department of Justice has been very active in the
societies has been so fast and enormous, that code of ethics, common sense of
enacted with as much clarity and specificity as possible, and not rely on vague
will be convicted for their explicit acts and not by existing provisions stretched
19
President Jacques Chirac, at the G-8 Meeting in France 2000.
8
analysed through a policy framework that ensures that online conduct is treated
neutral manner that accounts for other important societal interests such as
It will also ease the evidentiary burden for law enforcement and prosecutors, and
The nature of cybercrime and the legal issues are global. Through international
organizations, such as the Council of Europe, efforts has been taken to ensure
the harmonization of provision in the individual countries. Ensuring that the dual
individuals or any person domiciled in that country, whenever the acts are
foreigner present in the country, whenever it does not extradite the person after a
Expert Committees.
two reports. The first report should consist of a proposal for the necessary
amendments in the penal code and the criminal procedural law only for the
Our strategy was therefore using declarations according to art. 40, and
reservations according to art. 42, whenever it was possible. The report was
The answers in Norway and many countries that adopted provisions in the Penal
Code according to the Recommendations of the 1980’s are: Yes, we are covered,
21
http://www.odin.dep.no/jd/norsk/publ/utredninger/NOU/012001-020027/index-dok000-b-n-a.html
10
Forgery and fraud are traditional criminal offences where computer systems
1. Computer-related forgery
Article 7 – Computer-related forgery:
Each Party shall adopt such legislative and other measures as may be necessary to establish as
criminal offences under its domestic law, when committed intentionally and without right, the
input, alteration, deletion, or suppression of computer data, resulting in inauthentic data with
the intent that it be considered or acted upon for legal purposes as if it were authentic,
regardless whether or not the data is directly readable and intelligible. A Party may require an
intent to defraud, or similar dishonest intent, before criminal liability attaches.
computer data.
such data may have the same serious consequences and should be a crime in the
It is the security and reliability of computer data that may have consequences
genuine document.23
Some countries have statutes on forgery including visual readability with the aid
Categories of Internet forgery may include: bogus Websites that falsely present
market prices.
computer templates are illegal. It is also illegal placing a template for making
format, which can be modified, printed, and laminated, with the intent of
Another scam is the electronic price tag alteration, where online retailers are the
victims.
The offence must be committed intentionally and without right. But Article 7
2. Computer-related fraud
Article 8 – Computer-related fraud
Each Party shall adopt such legislative and other measures as may be necessary to establish as
criminal offences under its domestic law, when committed intentionally and without right, the
causing of a loss of property to another by:
a. any input, alteration, deletion or suppression of computer data,
b. any interference with the functioning of a computer system,
with fraudulent or dishonest intent of procuring, without right, an economic benefit for
oneself or for another.
24
Explanatory Report to the Convention on Cybercrime, no. 85
13
enacted.
The traditional elements of committing fraud are still valid on computer fraud in
Cyberspace. They are: (1) by the use of incorrect or incomplete information (2)
computer operations (3) that causes a loss of property or a risk of loss to anyone,
(4) with the intent of procuring an unlawful economic gain for himself
or any interference with the functioning of a computer system. The aim of the
processing with the intention to effect an illegal transfer of property.”26 The act
must cause a loss of property, and in addition to the traditional property e.g.
Internet frauds have become a global issue due to the rapid development of
the Internet. In countries that have updated the fraud provisions based on the
25
The Law Commission, Report No. 186, Criminal Law-Computer Misuse, 1989, England
26
Explanatory Report to the Convention on Cybercrime, no 86
14
regard to the article 8. But perpetrators often design new forms of fraud to
financial projections. It may be credit card fraud, mail fraud or bank fraud.
Companies and individuals are using the Internet to artificially inflate the market
value of stocks by creating demand for less traded low priced stocks.
Unsolicited e-mails, electronic newsletters, message boards and Web sites are
Another typical fraud in Cyberspace is price tag frauds or fraud involving online
retail sales.
But the most common of all frauds in Cyberspace is online auction fraud.
2001 that online auction frauds entails 64% of all Internet frauds that is reported
in the U.S., with an average loss per complaint amounting to USD 776.27
27
See Internet Fraud Complaint Center (IFCC), Internet Auction Fraud, May 2001, http://www.1.ifccfbi.gov
15
According to this report the most popular items on Internet auctions are:
frauds are global scams and victims are from around the world. In the most
typical frauds perpetrators are often using numerous fictitious names and e-mail
addresses, receiving payment but never intended to deliver the purchased goods.
art 8 a and b, and in addition the specific fraudulent or dishonest intent to gain
V. CONCLUSION
ratification process.
Countries that have updated the forgery and fraud provisions based on the
recommendations of the 1980’s may find the existing laws adequate with regard
28
See Paula Selis, Anita Ramasastry and Charles S. Wright: Toward a fraud-free marketplace – best practices for
the online auction industry.
16