Responding internationally

International cybercrime attacks on missioncritical government or private computers from across national boundaries is an increasing threat. Can governments respond?

International cybercrime — attacks on mission-critical government or private

computers from across national boundaries — is an increasing threat. Can

governments respond?

Self-protection through strong secur-ity tools and practices remains

the principal defense. Ultimately, however, governments must address the

investigation of cybercrimes and the prosecution of criminals. Most countries

recognize the need to update their laws to fight crimes committed in cyberspace.

But countries today mostly are in the same boat that the Philippines was

in after the "love bug" struck in May — they have no effective legal tools

to prosecute cybercriminals. As with many issues, it often takes a crisis

to precipitate action. In June, the Philippines outlawed most computer crimes

as part of a comprehensive e-commerce statute.

To prosecute crimes across national borders, an act must be a crime

in both jurisdictions. Thus, though local legal traditions must be respected,

nations must define cybercrimes similarly. One approach to encourage such

harmony is to develop a model law that can be adapted to local conditions.

Such an effort is underway in the Council of Europe (COE).

The COE, Europe's oldest political organization, has created model laws

and treaties covering human rights, education and the environment. Its Draft

Convention on Cyber Crime was crafted by law enforcement officials from

Europe, the United States and Japan.

The convention will address a range of cybercrimes, including illegal

access, illegal interception, data interference, system interference, computer-related

forgery, computer-related fraud, and the aiding and abetting of these crimes.

It also tackles investigational matters related to jurisdiction, extradition,

the interception of communications, and the production and preservation

of data. And it sets minimum standards for penalties.

As with most cybersecurity initiatives, the COE's framework is controversial.

The computer industry argues that it had little meaningful input in the

draft convention. The COE accepts comments on its draft, then releases a

revision. The latest version is at www.coe.int.

Industry believes requiring service providers to monitor communications

and provide assistance to investigators would be burdensome and costly.

It also objects to a provision criminalizing the use of hacking programs,

which may have been designed for legitimate security testing purposes.

The Global Internet Liberty Campaign (www.gilc.org) has joined the opposition,

objecting to a lack of procedural safeguards and due process to protect

individuals' rights. It believes ensuing national laws might place restrictions

on privacy, anonymity and encryption.

The council wants to finish its work by the end of the year, after which

member nations and others could sign on to the convention and implement

the provisions in their own laws. In the meantime, government and industry

should engage the COE process at all levels to ensure a workable outcome.

McConnell, former chief of information policy and technology at the Office

of Management and Budget, is president of McConnell International LLC (www.

mcconnellinternational.com).

NEXT STORY: ERP Version 2.0