Académique Documents
Professionnel Documents
Culture Documents
ICTU1020561 - NGALE NGAKO EMMANUELLE CYNTHIA
ICTU1020563 - DZENE SIMO LESLEY NORA
Question 1: The enormity of cyberspace is stretching the boundaries of the possibility of attacks
worldwide. How is international law intersecting with national law in this realm? Are the relevant
laws among member states to the Cybercrime Convention essentially the same or does each
country gets to tailor those rules? Finally, what is universal jurisdiction and what are its potential
benefits and pitfalls?
Due to the continuous expansion of cyberspace, national laws are being created in various
countries. A great example of that comes out of the Council of Europe’s Cybercrime
Convention. The Council of Europe has some 40-plus countries, plus a number of observer
countries, that got together and basically made a big list of bad things that can happen on or
through the Internet. Then, the countries said they were going to take the list of bad things
and turn it into national law in each country that will prohibit the bad things, provide
punishments for violation of these rules that meet that society’s traditions and standards, as
well as respecting certain important societal interests.
Each country takes this list from the convention and passes its own laws to enforce with
national law what the countries have agreed is a list of bad things. All countries include the
same aspects, but apply it nationally. There will be some differences from country to country
because each country will apply their own rules in a slightly different way. This respects
national sovereignty, but also allows for international cooperation.
One of the biggest things that it changes, though, is that it sets up a mechanism for the
countries to pass their own rules that would allow for the exchange of information between
countries more easily than would have happened without the convention. For instance, one
country can ask another country for information about an intrusion and if the providing
country has passed a law saying they can collect the data by a court order from their own
companies, then they could get the data and turn it over to the requesting country.
In other words the term “universal jurisdiction” refers to the idea that a national court may
prosecute individuals for serious crimes against international law such as crimes against
humanity, war crimes, genocide, and torture based on the principle that such crimes harm
the international community or international order itself, which individual States may act to
protect.
● Universal jurisdiction can play a crucial role in the international legal system and in
the pursuit of international justice. It ensures that those who have committed the
most heinous offences such as war crimes, crimes against humanity, genocide,
torture and many others are not safe anywhere and can find a harbor nowhere. The
objective is to guarantee the apprehension and prosecution of those who have
committed “offences against all mankind”.
● It poses a burden to the home state by both civil and criminal trials that are instituted
on the basis of universal jurisdiction. This burden can be measured in terms of the
financial and legal resources that are used up on these high-profile trials and which
therefore postpone, or hinder the realization of local justice in lower-profile matters.
● Universal jurisdiction, by its very nature, violates sovereign equality of states by
allowing one state to judge the actions of the officials of another state. The principle
therefore disregards one of the precepts of modern international law.
● Also, it allows the possibility, if remote, of judicial chaos arising out of the
implementation of universal jurisdiction. If many courts, in various countries, where
to pursue the principle of universal jurisdiction, the result would not be justice, but
disarray.
● In addition, having one’s courts judge the officials of another state may significantly
impede one’s involvement in international peace initiatives.
● To add to, hand-picking those cases that are to be subjected to universal jurisdiction
status can be both sanctimonious and disingenuous.
Question 2: What crimes did Henry commit? What do you think happened to Henry? What
issues do you believe authorities may have had in the investigation, search & seizure,
collection of evidence, prosecution and sentencing of the case?
● Cyberstalking (Online harassment): This is the use of the Internet or other electronic
means to stalk or harass an individual, group, or organization. This was performed by
Henry when he sent a bomb threat to the school using his computer. Also, when he
arranged with his associates to place a bomb threat to a school in massachusetts and
when he threatened the telephone service provider.
● Cyber terrorism: It refers to the use of the Internet to conduct violent acts that result
in, or threaten, loss of life or significant bodily harm, in order to achieve political or
ideological gains through threat or intimidation. This was performed by Henry when
he sent a bomb threat to the school using his computer and when he arranged with
his associates to place a bomb threat to a school in massachusetts.
● Phishing: This is a fraudulent attempt to obtain sensitive information such as
usernames, passwords and credit card details by disguising oneself as a trustworthy
entity in an electronic communication. Phishing occurs when Henry set up accounts
for an associate allowing him to look at the identity information of numerous
individuals. Again, it occurs when he gained access to the internal computer system
of a major telephone service provider that allowed him to lookup account information
of the company’s customers.
● Computer Hacking: This refers to the practice of modifying or altering computer
software and hardware to accomplish a goal that is considered to be outside of the
creator's original objective. Computer hacking was performed by Henry when he used
a program he had installed on a computer of one of the ISP’s employees to log into
the computer system of the ISP. To add to, when he gained access to the internal
computer system of a major telephone service provider.
● Denial of Service (DoS) Attack: DoS attack is an attack meant to shut down a
machine or network, making it inaccessible to its intended users by flooding it with
traffic.Henry launched a DOS attack that successfully shut down a significant portion
of the telephone service provider operations
● Internet time thefts: Internet time theft. It refers to the theft in a manner where the
unauthorized person uses internet hours paid by another person. This occurred when
Henry used his access to the telephone company’s computer system to set-up
numerous telephone accounts for himself and his friends, without having to pay for
the accounts.
● Identity theft and invasion of privacy: Identity theft is the deliberate use of someone
else's identity, usually as a method to gain a financial advantage or obtain credit and
other benefits in the other person's name and perhaps to the other person's
disadvantage or loss. On the other hand, Invasion of privacy is the unjustifiable
intrusion into the personal life of another without consent. Both were performed by
Henry when he used the telephone computer systems to discover key information
about an individual who had an account with the telephone service. Again, he
accessed the information stored on the individual’s mobile phone and posted the
information on the internet.
According to the cybersecurity laws of the United States, the following will happen to henry
all depending on the various crimes he committed:
● Hacking
1. Gaining unauthorised access to national security information leads to
imprisonment for up to 10 years.
2. Obtaining information leads to imprisonment for up to 1 year
3. Obtaining information from government computers lead to imprisonment for
up to 1 year
4. Finally accessing information to defraud leads to imprisonment for up to 5
years
● DOS Attack
● Phishing
What issues do you believe authorities may have had in the investigation, search & seizure,
collection of evidence, prosecution and sentencing of the case?
When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain
sense, they are like regular police detectives on TV. They have to search computer systems
to find ways an intruder might have come in. They look for evidence an attacker left of entry,
like an electronic footprint in the dirt. And they try to determine what might have been
copied or taken.
Resources
https://ijrcenter.org/cases-before-national-courts/domestic-exercise-of-universal-jurisdiction/
http://jcpa.org/wp-content/uploads/2009/08/universal-jurisdiction.pdf
https://en.wikipedia.org/wiki/Universal_jurisdiction
https://en.wikipedia.org/wiki/Cyberstalking
https://en.wikipedia.org/wiki/Cyberterrorism
https://en.wikipedia.org/wiki/Phishing
https://privacyrights.org/topics/personal
http://www.nsci-va.org/CyberPro/NSCI%20-%20Cyber%20Pro%20Newsletter-Vol%202%20Edit%2012
https://en.wikipedia.org/wiki/Cybercrime
https://cyber.laws.com/hacking
https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos
https://en.wikipedia.org/wiki/Security_hacker
https://injury.findlaw.com/torts-and-personal-injuries/what-is-invasion-of-privacy-.html
https://en.wikipedia.org/wiki/Identity_theft
https://www.lexology.com/library/detail.aspx?g=4af6c044-dc77-4b1a-9288-986395eff8d1