pal gov.tutorial6.session9.cybercrime
TRANSCRIPT
1PalGov © 2011 1PalGov © 2011
أكاديمية الحكومة اإللكترونية الفلسطينية
The Palestinian eGovernment Academy
www.egovacademy.ps
Dr. Feras Milhem
Tutorial 6: The Legal Framework of New Technologies
Session9
Cybercrime
2PalGov © 2011 2PalGov © 2011
About
This tutorial is part of the PalGov project, funded by the TEMPUS IV program of the
Commission of the European Communities, grant agreement 511159-TEMPUS-1-
2010-1-PS-TEMPUS-JPHES. The project website: www.egovacademy.ps
University of Trento, Italy
University of Namur, Belgium
Vrije Universiteit Brussel, Belgium
TrueTrust, UK
Birzeit University, Palestine
(Coordinator )
Palestine Polytechnic University, Palestine
Palestine Technical University, PalestineUniversité de Savoie, France
Ministry of Local Government, Palestine
Ministry of Telecom and IT, Palestine
Ministry of Interior, Palestine
Project Consortium:
Coordinator:
Dr. Mustafa Jarrar
Birzeit University, P.O.Box 14- Birzeit, Palestine
Telfax:+972 2 2982935 [email protected]
3PalGov © 2011 3PalGov © 2011
© Copyright Notes
Everyone is encouraged to use this material, or part of it, but should properly
cite the project (logo and website), and the author of that part.
No part of this tutorial may be reproduced or modified in any form or by any
means, without prior written permission from the project, who have the full
copyrights on the material.
Attribution-NonCommercial-ShareAlike
CC-BY-NC-SA
This license lets others remix, tweak, and build upon your work non-
commercially, as long as they credit you and license their new creations
under the identical terms.
4PalGov © 2011 4PalGov © 2011
ILOs
• Introduce legal framework of crimes
committed through the net in Palestine,
.مقدمة عن اإلطار القانون الجرمة األلكترونة ف فلسطن•
Increase the knowledge of the trainee on
the importance of this subject. Orientation
on the type of Cybercrimes.
. زادة المعرفة حول الجرائم األلكترونة وانواعها
Orientations on the international efforts to
overcome crimes of this type.
5PalGov © 2011 5PalGov © 2011
The legal framework of Penal Law
اإلطار القانوني لتشريعات الجزاء
• In the West Bank: The Penal Law of 1960.
1960قانون العقوبات لسنة : في الضفة الغربية•
• In the Gaza Strip: The Penal Law of 1936
. 1936قانون العقوبات لسنة : في قطاع غزة•
BOTH LAWS do not regulate cybercrimes.
كال القانون ال ينظمان جرائم الحاسوب
6PalGov © 2011 6PalGov © 2011
The legal framework of Penal Law
اإلطار القانوني لتشريعات الجزاء
• No other laws provide penalties to crimes
committed online.
ال يوجد إطار قانون آخر يجرم الجرائم التي ترتكب عن الطريق •
.الشبكة االلكترونية
• CONSEQUENCE: Perpetrators escape
legal accountability
7PalGov © 2011 7PalGov © 2011
What is Cybercrime
ما هي الجرائم األلكترونية
Illegal activity committed on the internet.This is a broad term that describes
everything from electronic cracking to
denial of service attacks that cause
electronic commerce sites to lose
money".
كل أشكال السلوك غر المشروع الذى رتكب باستخدام
الحاسب
8PalGov © 2011 8PalGov © 2011
What is Cybercrime
ما هي الجرائم األلكترونية
Some categorized cybercrimes into three Ref. cyberlaws.net:
- Cybercrimes against persons.
child-pornography, harassment. The trafficking, distribution, posting, and dissemination of obscene material.
- Cybercrimes against property.
computer vandalism (destruction of others' property), transmission of harmful programmes.
- Cybercrimes against government.
Terrorism, money laundry
9PalGov © 2011 9PalGov © 2011
Current Threat
التهديدات القائمة
Some categorized cybercrimes into three Ref. cyberlaws.net:
- Cybercrimes against persons.
child-pornography, harassment. The trafficking, distribution, posting, and dissemination of obscene material.
- Cybercrimes against property.
computer vandalism (destruction of others' property), transmission of harmful programmes.
- Cybercrimes against government.
Terrorism, money laundry
10PalGov © 2011 10PalGov © 2011
Current Threat
التهديدات القائمة
- Crackers (Hackers): such as the intent to steal confidential data, acquire free software, or perform malicious destruction of files.
- Internet Fraud (Crimes of Deception), example trick via email
- Skimming is the theft of credit card information by typically dishonest employees
- Phishing: is a way of attempting to acquire information such as usernames, passwords, and credit card details - spam
- Money laundry
- Pornography and Illegal Obscenity
11PalGov © 2011 11PalGov © 2011
Example Penal Law: Estonia
مثال قانون جزاء
- Article 268. Computer Fraud
Acquisition of other’s property or deriving of benefits through introduction of computer programs or data, as well as their modification, deletion, blocking or another kind of interference with the procedure of processing information that influences its results and causes direct property or another damage to a person are punished with fine, arrest or imprisonment within the term from one to six years.
بخصوص األحتال عبر األنترنت -
12PalGov © 2011 12PalGov © 2011
Example Penal Law: Estonia
مثال قانون جزاء
- Article 269. Deletion of computer
information or software
1. Illegal deletion, damage, violation or
blocking of computer information or
software are punished with fine or
arrest
بخصوص تجرم حذف أو إعتداء أو تخرب أو حجب -
معلومات من الكمبوتر أو أحد برامجه
13PalGov © 2011 13PalGov © 2011
Example Penal Law: Estonia
مثال قانون جزاء
- Article 270. Computer sabotage
Introduction of data or programs, their modification, deletion or blocking to create disturbance interferences in the work of computer or telecommunication system are punished with fine, arrest or imprisonment within up to two years.
عاقب كل من أدخل معلومات بشكل غر مشروع أو قام بتعدل أو -حذف أو حجب لخلق اضطراب على عمل جهاز الكمبوتر أو نظام
االتصاالت السلكة والالسلكة باالعتقال أوالغرامة أو السجن مدة تصل .الى عامن
هناك تشدد للعقوبة لمن أحدث خسران للمعلومات أو قام بعمل تخرب -لسجالت الدولة
14PalGov © 2011 14PalGov © 2011
Example Penal Law: Estonia
مثال قانون جزاء
- Article 272. Illegal interruption or blocking
of the computer system connection
تقطع أو إغالق غر شرع للربط عبر نظام الحاسوب-
- Article 273. Obvious spread of computer
viruses
نشر للفروسات عبر الحاسوب-
- Article 274. Transfer of protecting codes
نقل شفرات محمة سواء ف البرامج أو الشبكات-
15PalGov © 2011 15PalGov © 2011
Conventions/treaties
مواثيق إتفاقيات
• No unified position on international
agreement.
• Council of Europe: Convention on
Cybercrime
It is open for other states that the states
of CoE
ال توجد إتفاقة مصادق علها عالما
إتفاقة حول جرائم الحاسوب : مجلس دول أوروبا
االتفاقة مفتوحة أمام دول من خارج مجلس دول أوروبا
16PalGov © 2011 16PalGov © 2011
Budapest: Convention on Cybercrime
OBJECTIVES
• Pursue a common criminal policy
aimed at the protection of society
against cybercrime by adopting
appropriate legislation and fostering
international co-operation.
السع نحو ساسة جزائة موحدة تهدف إلى حماة •
المجتمع من جرائم الحاسوب، وذلك عن طرق تبن
. تشارع مناسبة وعن طرق تعزز التعاون الدول
17PalGov © 2011 17PalGov © 2011
Budapest: Convention on Cybercrime
Called to adopt measures in the national level for:
- Illegal Access
- Illegal interception
- Data interference
- System interference
- Misuse of devices
- Computer related forgery
- Computer related fraud
- Pornography
- Infringements of Copyright
Call to adapt procedural provision
18PalGov © 2011 18PalGov © 2011
Summary
• Palestine laws are silent about Cybercrimes. No protection or punishment policies are available. However, the new draft Penal Law regulates some rules.
ال وجد تجرم ف فلسطن للجرائم المقترفة عبر الشبكة •. األلكترونة
• No international agreements, however, there are regional agreements such as Budapest convention.
ال توجد إتفاقات دولة وإنما أقلمة مثل إتفاقة بودابست •
• E-government in Palestine must be protected.
19PalGov © 2011 19PalGov © 2011
References
• Palestine Penal Law of 1936 .
• The Jordanian Penal Law of 1960.
• Florence de Villenfagne, CRIDS, University of Namur, PowerPoint Presentation on Cybercrimes, 2011.
• Estonian Penal Law http://www.coe.int/t/dlapil/codexter/Source/cyberterrorism/Estonia.pdf
•
• Budapest: Convention on Cybercrime http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/cy-activity-interface-2010/presentations/Ws%203/cyber_octopus_WS_3_alexander_CCC_global_frame.pdf
عبد الفتاح بوم حجازي، التجارة األلكترونة ف القانون العرب النموذج •2006لمكافحة جرائم الكمبوتر واألنترنت، األسكندرة، دار الفكر الجامع،
20PalGov © 2011 20PalGov © 2011
Session End