overview
issues
geopolitics
models
jurisdictions
disorder
mercatoria
government
business
liberties
cosmocrats
netizens
services
rights

related
Guides:
Networks
& the GII
Security &
InfoCrime
Digital
Economy

related
Profiles:
ICANN
auDA
ITU
|
law, disorder, policing
and borders
This page looks at law, policing and online crime.
It covers -
Particular
issues such as site defacement and piracy are dealt with
in more detail elsewhere on this site.
cybercrime and crime in cyberspace
Our security guide points
to the range of enforcement bodies, in Australia and overseas,
and to writings about cybercrime.
Reports by the OECD, G8, Council of Europe and individual
government agencies provide a useful starting point for
thinking about national and transborder crime involving
information networks. One of the better examples is the
US Department of Justice's report
on The Electronic Frontier: The Challenge of Unlawful
Conduct Involving the Use of the Internet.
The collection of essays in Cybercrime: Law Enforcement,
Security & Surveillance In The Information Age
(London: Routledge 2000) edited by Douglas Thomas &
Brian Loader and Crime in the Digital Age:
Controlling Telecommunications & Cyberspace Illegalities
(New Brunswick: Transaction 1998) by Peter Grabosky &
Russell Smith are also recommended.
There is a more succinct statement in Grabosky's paper
on Computer Crime: A Criminological Overview. Background
material to the US National Information Infrastructure
Protection Act 1996 (NIIPA)
may also be of interest.
For a discussion of global frameworks see International
Criminal Law (London: Cavendish 2001) by Ilias Bantekas,
Susan Nash & Mark Mackarel and International Criminal
Law (Ardsley: Transnational 1998) by M. Cherif Bassiouni.
Claire De Than's International Criminal Law & Human
Rights (London: Sweet & Maxwell 2001) highlights human
rights issues; there are other pointers in the Human Rights
profile on this site.
For basic agreements and national statutes see International
Criminal Law: A Collection of International & European
Instruments (Boston: Kluwer 2000) edited by Christine
Van den Wyngaert. The UN Convention against Transnational
Organized Crime is here;
the 1988 UN Convention Against Illicit Traffic in Narcotic
Drugs & Psychotropic Substances is here.
responses
As we have suggested throughout this site, there are
essentially three responses to online crime.
The first is to declare that online activity is 'virtual'
and thus victimless, or something that we should all take
in our stride. We find that as unconvincing as proposals
to insert a police presence into every ISP or criminalize
what is licit offline.
The second, more effectively, is to update existing law
- local and international - with new legislation where
necessary and attention to codes of practice and enhanced
community awareness, emphasising responsibilities along
with rights.
The third, as one might expect, is for government agencies
and businesses to grab for a piece of the digital pie,
identifying new revenue opportunities (the proliferation
of flawed content filters is one example) or new areas
for bureaucratic conquest.
We'll be discussing those responses shortly. In the interim
a starting point is the interesting overview in David
Post's 1998 paper
on The "Unsettled Paradox": The Internet,
the State, and the Consent of the Governed. Craig
Rutenberg's 1998 paper
Limiting Self-Help in Article 2B: Enforcing Traditional
Boundaries in Cyberspace examines some remedies and
jurisdictional questions.
The
Commonwealth government's 2000 discussion paper
on computer-related offences as part of the Model Criminal
Code project that seeks to encourage uniform treatment
of offences across Australia's state, territory and national
jurisdictions.
In one of the sillier passages of his 1995 tract Being
Digital, Nicholas Negroponte proclaimed the imminent
death of the nation state, which would evaporate like
a mothball. That is an image offered by Lenin in the 1917
State & Revolution: obviously they just don't
make mothballs the way they used to.
John Perry Barlow's A Declaration of the Independence
of Cyberspace (DIC) simply
declared that cyberspace - and its citizens - had seceded
to a technolibertarian never-never-land:
Cyberspace,
the new home of Mind .... naturally independent of the
tyrannies you seek to impose on us. You have no moral
right to rule us nor do you possess any methods of enforcement
we have true reason to fear.
US
legislators seem to have disagreed with those pundits:
the paper
by Susan Brenner on State Cybercrime Legislation in
the United States of America: A Survey offers a map
of parochial responses.
Surveillance and identification issues are considered
in a more detailed profile
that looks at technologies and at issues such as conspiracy
theory.
policing
David Wall's Crime & the Internet (London:
Routledge 2001) comments that cyberspace is currently
being policed through a multi-tiered governance structure
that is similar to mechanisms offline and increasingly
reflects transnational protocols, agencies and agreements.
His five levels are
internet
users, such as the problematical CyberAngels and Ethical
Hackers Against Porn (EHAP).
In practice we'd suggest that 'policing' at the user
level involves ordinary citizens being responsible for
their activity online (this site includes some suggestions)
and alerting authorities, rather than vigilante groups
internet service providers and content hosts, under
ongoing government pressure in Australia and overseas
to act as agents of government and as surrogates for
user responsibility
'corporate security organisations', a category that
presumably encompasses organisations such as the Business
Software Alliance (BSA)
that are concerned with online piracy of intellectual
property and specialists such as the US Computer Security
Institute (CSI)
state-funded non-public police agencies, such as the
US National Infrastructure Protection Center (NIPC),
the Computer Emergency Response Team (CERT) at Carnegie
Mellon University and presumably entities such as the
Australian Competition & Consumer Commission (ACCC),
the the US Federal Trade Commission (FTC)
and Securities & Exchange Commission and the Australian
Securities & Investment Commission (ASIC)
state-funded public police agencies, such as the Australian
Federal Police, New South Wales state police, US Federal
Bureau of Investigation and Australian Security Intelligence
Organisation - some of which are highlighted here.
We
have highlighted particular activity in the Security &
Infocrime guide on this
site.
rights and responsibilities
Cyberspace & the Law: Your Rights and Duties
in the Online World (Cambridge: MIT Press 1994) by
Edward Cavazos & Gavino Morin is more positive than
Peter Huber's challenging - but to us unconvincing - Law
& Disorder in Cyberspace (Oxford: Oxford Uni
1997).
Edward Valauskas' paper
Lex Networkia: Understanding the Internet Community
claims that the "Internet community" has created
an uppermost layer of social or cyber-etiquette protocol
which "occurs on top of all of the technical standards
and protocols that keep the Internet humming." That's
questioned in High Noon on the Electronic Frontier:
Conceptual Issues In Cyberspace (Cambridge: MIT Press
1996 and here)
and Crypto Anarchy, Cyberstates, and Pirate Utopias
(Cambridge: MIT Press 1999), both edited by Peter
Ludlow.
liability, mediation & redress
The Canadian report
by Michel Racicot, Mark Hayes, Alec Szibbo & Pierre
Trudel on The Cyberspace Is Not A "No-Law"
Land: Internet Content-Related Liability Study offers
a useful introduction to content liability questions.
For an e-commerce perspective we suggest that you consult
the reports and legislation highlighted in our Consumers
guide.
Australia’s National Electronic Authentication Council
(NEAC)
has published two reports - Legal liability and e-transactions
and E-commerce security - that include recommendations
for developing B2B ecommerce.
There's a large literature on the liability of internet
service providers and internet content hosts. A landmark
case in the US is Prodigy;
we'll be adding further pointers in the near future. For
US perspectives see Henry Perritt's paper
on 1995 Computer Crimes & Torts in the Global Information
Infrastructure: Intermediaries & Jurisdiction
and David Post's 1996 paper
on Pooling Intellectual Capital: Thoughts on Anonymity,
Pseudonymity, and Limited Liability in Cyberspace.
property and piracy
For an Australian overview we recommend Electronic
Theft: Unlawful Acquisition in Cyberspace (Cambridge:
Cambridge Uni Press 2001) by Peter Grabosky, Russell Smith
& Gillian Dempsey.
The debate about fair use and appropriation of online
music or other content is explored in our Intellectual
Property guide. Two examples
are Dan Burk's provocative Muddy Rules in Cyberspace
paper
and The New World Trade Organization Agreements: Globalizing
Law Through Services & Intellectual Property (Cambridge:
Cambridge Uni Press 2000), by Australia's Christopher
Arup.
defamation and hatespeech
National and international law about online defamation
- discussed in more detail in a separate profile
- is still evolving. In 1994, in a landmark case, the
Western Australian Supreme Court ruled
that defamation could indeed take place in cyberspace
- whether through electronic mail or publication on a
web site.
That ruling has been matched in other jurisdictions (for
example in Canada, the US,
UK and NZ)
and despite the laments of some infolibertarians seems
to be entrenched in judicial thinking about cyberspace.
As Matthew Collins notes in The Law of Defamation &
the Internet (Oxford: Oxford Uni Press 2001) there's
less agreement about specifics, in particular which jurisdiction
should deal with alleged offences - a concern since the
identification of defamation and penalties vary widely
and litigants thus have an incentive to go 'forum shopping'.
To supplement the Collins study we recommend Russell Weaver's
cogent paper
Defamation Law in Turmoil: The Challenges Presented
by the Internet, Lilian Edwards 1997 paper
Defamation & the Internet: Name Calling in Cyberspace
and Marty Sutcliffe's paper
Defamation on the Internet: Searching for Community,
Identity & Statutory Solutions. For us they are
more convincing than Defamation Havens, a somewhat
utopian analysis
by Brian Martin of Australian cases, or Mike Godwin's
brave 1996 article
Libel Law: Let It Die.
Mark Feldman's 2000 Internet Defamation: A Market-Based
Analysis (PDF)
highlights some philosophical questions.
Practical issues are examined in the brief Internet
Defamation: Pursuing Defendants in Cyberspace article
by Patrick Clendenen & Joseph Lipchitz
and
Tim Arnold-Moore's 1994 paper
Legal Pitfalls in Cyberspace: Defamation on Computer
Networks.
This site also highlights legislation, litigation and
writing regarding hate
sites
offensive content
Questions
of online content regulation are considered in more detail
in the separate Censorship & Free Speech guide.
Although there is now a very large literature on free
speech and censorship, much of it is overly one-sided.
Existing legislation in many jurisdictions (for example
Australia) covers the creation and distribution of child
pornography and other 'extreme' content. From a governance
perspective the key issues are jurisdiction and enforcement:
how to address images or other content that is published
in another country and how to address the exchange of
such content via email and news groups.
As a starting point we recommend Peter Grabosky's 1997
paper
on Child Pornography in the Digital Age. Sex, Laws
& Cyberspace: Freedom & Censorship on the Frontiers
of the Online Revolution (New York: Owl/Holt 1997)
by Jonathan Wallace & Mark Mangan offer a view from
the left, as does Cyber Rights: Defending Free
Speech in the Digital Age (New York: Times 1998),
a memoir by the Electronic Frontier Foundation's Mike
Godwin.
terrorism and sedition
[Under Development]
A discussion of sedition in the online and offline environments
is here.
borders and barriers
Questions about borders,
about passports in the
digital environment and traveller surveillance schemes
such as the United States CAPPS are explored in a supplementary
note.
incidence
We'll shortly be providing pointers to figures on
the incidence of theft of services, information piracy
and forgery, online extortion, digital vandalism, telemarketing
fraud, illegal interception and other offences.
next part (the lex
mercatoria)
|
|