overview
perspectives
frameworks
agencies
CII
desktops
criminals
messaging
vandalism
fraud
authentication
anonymity
pseudonymity
malware
crypto
geolocation
economics
insurance
kids
s-business
appraisal
self-help
forensics

related
Guides:
Governance
Information
Economy
Consumers
& Trust
Privacy

related
Profiles:
Identity
Theft
Forgery &
Forensics
Surveillance
|
frameworks
This page highlights Australian and international online
security and information crime frameworks. It also identifies
key government, business and academic bodies.
It covers -
introduction
[under development]
OECD policy frameworks
[under development]
the CyberCrime Convention
In
April 2001 the Council of Europe released a draft
CyberCrime Convention (C3),
aimed at harmonising laws across the 41 Council states
and open to other countries such as Australia and Japan.
The Convention was signed in Budapest by several EU states,
Canada, South Africa and the US in November 2001. Japan
has indicated its intention to sign the Convention; Australia
is likely to follow.
The Convention has three major features:
1 It includes a list of crimes that each member
country must include in its statutes. It requires criminalization
of offenses such as hacking, the production, sale or
distribution of hacking tools, and child pornography.
It also features what in some jurisdictions is an expansion
of criminal liability for intellectual property violations
(Articles 2-11).
2 It requires each participating nation to grant
new powers of search and seizure to its law enforcement
authorities, including the power to require an ISP to
preserve a citizen's internet usage records or other
data, and the power to monitor a citizen's online activities
in real time (Articles 16-22).
3 It requires law enforcement in every participating
country to assist police from other participating countries
by cooperating with 'mutual assistance requests' from
police in other participating nations 'to the widest
extent possible' (Articles 23-35).
It
has been widely criticised as draconian. The TreatyWatch
advocacy group, for example, claims that the treaty should
be rejected because it lacks meaningful privacy or civil
liberties protection, is far too broad , lacks a 'dual
criminality' requirement for cooperation with the police
of other nations, protection for political activities
is too weak, threatens to further unbalance intellectual
property law, would give police invasive new surveillance
powers, contains an overly broad criminalization of hacking
tools and was drafted in a closed and secretive manner.
However it has gained some support from the G8 (ie the
major financial/industrial powers) following advice from
the Subcommittee on High Tech Crime (SCHTC)
and the 1997 Carnegie Group report
on Misuse of International Data Networks, reflected
in the 2000 Ministerial Conference
on Combating Transnational Organised Crime.
G8 ministers issued the usual resounding statements: "the
ability to locate and identify Internet criminals through
different systems is critical to deterring, investigating,
and prosecuting crime that has an electronic component,"
recommending the creation of "faster or novel solutions
should be developed and that government and industry must
work together to achieve them."
Participants agreed to the following elements for any
solution: ensuring the protection of individuals freedoms
and private life; preserving governments' ability to fight
high tech crime; facilitating appropriate training for
all involved; defining a clear and transparent framework
for addressing cybercriminality; ensuring free and fair
activities, the sound development of industry; and supporting
effective industry initiated voluntary codes of conduct
and standards; and assessing effectiveness and consequences.
A side Protocol to the Convention, covering online Hate
sites and vilification, is being developed.
the Australian regime
[under development]
global agencies
[under development]
Australian and New Zealand government bodies
Within Australia numerous bodies grapple with technology,
commercial and government policy issues. Among those worthy
of notice are the AIC, GPKA, ISRC and CLC. The web has
been a marvellous opportunity for federal and state/territory
bureaucrats to issue papers, develop guidelines and otherwise
roll digital logs.
The Government Public Key Authority (GPKA)
deals with government aspects of PKA. The Commonwealth's
Project
Gatekeeper, with the same name as the very bad computer
in a recent Hollywood dot com exploitation flick,
resulted from the 1998 National Authentication Authority
Discussion Paper
and the Strategy for an Australian National Electronic
Authentication Framework, the detailed report
by the National Public Key Infrastructure Working Party.
The Commonwealth Department of Communications, Information
Technology & the Arts (DCITA)
- which embraces the National Office for the Information
Economy (NOIE)
- concerns itself with 'policy' questions, leaving much
of the legislation and the mundane enforcement (bureaucrats
are nothing if not conscious of status) to the Attorney-General's
(A-G's)
Department and specialist bodies such as the Australian
Broadcasting Authority (ABA)
and Australian Federal Police.
The latter, understandably, have a strong ethos of digital
'stranger danger' - give us more money, more cars, more
computers to catch the villains (tho their success hitherto
is uncertain, to say the least).
The Department of Industry, Science & Resources (DISR),
a wet patch in a dry climate, somewhat ineffectively spruiks
the local encryption hardware/software industry.
The
Australian Taxation Office (ATO),
the Privacy
Commissioner and Australian Customs Service (ACS)
are among other significant government agencies squabbling
over bits of the digital pie. Comments on their
role and operation appear in the Taxation
and Privacy
guides on this site.
Australia’s National Electronic Authentication Council
(NEAC)
has released two reports - Legal liability and e-transactions
and E-commerce security - that include recommendations
for developing B2B ecommerce.
other governments
In the US the events of 11 September 2001 spawned a range
of new security bodies, complicating an already complicated
map. A starting point is the National Infrastructure Protection
Center (NIPC)
and its Critical Infrastructure Assurance Office (CIAO),
established
in 1998 but apparently to be superseded by the Homeland
Security Office. In October 2001 NIPC released a view
(PDF)
of threats to the national information infrastructure
from 'hacktivism'.
In early 2000 the cybercrime
unit in the US Department of Justice released a useful
report
on The Electronic Frontier: The Challenge of Unlawful
Conduct Involving the Use of the Internet.
Like its 1997 report
on The Availability of Bombmaking Information,
the Frontier document provides a perspective on
online v offline behaviour and enforcement. The Justice
Department has also released a report
on Cyberstalking: A New Challenge for Law Enforcement
and Industry.
In the UK the Internet Crime Forum (ICF)
serves as a bridge between ISP industry and law enforcement
agencies.
In the US the events of 11 September 2001 spawned
a range of new security bodies, complicating an already
complicated map. A starting point is the National Infrastructure
Protection Center (NIPC)
and its Critical Infrastructure Assurance Office (CIAO),
established
in 1998 but apparently to be superseded by the Homeland
Security Office. In October 2001 NIPC released a view
(PDF)
of threats to the national information infrastructure
from 'hacktivism'.
In early 2000 the cybercrime
unit in the US Department of Justice released a useful
report
on The Electronic Frontier: The Challenge of Unlawful
Conduct Involving the Use of the Internet.
Like its 1997 report
on The Availability of Bombmaking Information,
the Frontier document provides a perspective on
online v offline behaviour and enforcement. The Justice
Department has also released a report
on Cyberstalking: A New Challenge for Law Enforcement
and Industry.
In the UK the Internet Crime Forum (ICF)
serves as a bridge between ISP industry and law enforcement
agencies.
industry
[under development]
The Australian IT&T
Security Forum is an industry body that brings together
major suppliers of information technology & telecommunications
security products and applications.
academic and professional bodies
The Information Security Research Centre (ISRC)
at Queensland University of Technology conducts research
into cryptology, smart cards and other fields. It also
provides training courses for government and business.
The Australian Institute of Criminology (AIC) has
sponsored a number of conferences on internet crime and
security.
The Communications Law Centre (CLC),
as the name suggests, is concerned with the Internet and
other communications law. It's a non-government body affiliated
with the University of NSW.
Infowar
has a discussion forum and media service about infowar
and security concerns, albeit with little critical evaluation.
The Institute for the Advanced Study of Information Warfare
(IASIW)
includes an exhaustive online bibliography. The Electronic
Privacy Information Center offers a smaller collection
of Critical Infrastructure Protection
Resources.
The Federation of American Scientists has an excellent
collection
of links on infowar, security and hacking.
US information warfare analyst Dorothy Denning's
site at Georgetown Uni has a large collection of papers
and links.
The Forum on Risks to the Public in Computers &
Related Systems (RISKS),
under the auspices of the Association for Computing Machinery
(ACM), has a wealth of information about dangers.
standards
The OECD's 1992 Guidelines For The Security of
Information Systems (GSIS),
aimed at raising awareness and underpinning a policy framework.
In Australia the guidelines have been reflected in Australian/New
Zealand Standard AS/NZS 4444.1:1999 on Code of Practice
For Security Management and AS/NZS 4444.2:2000 on
Specifications For Security Management Systems issued
by Standards Australia (SA).
The Australian Communications Electronic Security Instructions
33 (ACSI33)
issued by the spooks at the Defence Signals Directorate
(DSD)
is aimed at the federal bureaucracy but is of general
interest.
next page (crypto)
|
|