found an interesting read while crawling the web....
"ADDRESSING INTERNATIONAL ENFORCEMENT ISSUES RELATED TO CYBER CRIMES AND CYBER TERRORISM: A CONCERN OF THE PHILIPPINE CENTER ON TRANSNATIONAL CRIME
Directorate for Research,
Philippine Center on Transnational Crime
Camp Crame, Quezon City
During the Second Roundtable Discussion of
"Computer Crime: Problems in National and International Law"
U.P. Law Center Institute of International Legal Studies
Information Technology Law program
August 31, 2000
I. Introduction
The rapid growth of technology, and information technology at that, has created a paradox in society, such that we now have to live side by side with the advances that it has wrought into our lives, as well as the dangers that it poses to man and society. To be able to address the current and future issues and concerns of the ever-changing world in information technology requires more than an afterthought. For no matter how remarkable these advancements have become, there also will always be advancements in criminal undertakings and activities that use the very same technology to "advance" their very own peculiar interests.
The rapid growth of technology, and information technology at that, has created a paradox in society, such that we now have to live side by side with the advances that it has wrought into our lives, as well as the dangers that it poses to man and society. To be able to address the current and future issues and concerns of the ever-changing world in information technology requires more than an afterthought. For no matter how remarkable these advancements have become, there also will always be advancements in criminal undertakings and activities that use the very same technology to "advance" their very own peculiar interests.
No nation in this fast-moving technological arena is spared of this afterthought. The efforts being exerted by each and every nation in combating transnational crimes, particularly computer crimes, have become a crux in each of these nations' security and law enforcement agenda. And the Philippines is no different in this regard.
x x x x x x x x x
III. Addressing International Enforcement Issues Related to Cyber Crimes & Cyber Terrorism
Among the pressing concerns of the PCTC, as well as law enforcement agencies in other foreign countries nowadays, is the state of vulnerability in the field of telecommunications and electronic commerce. Our country, as with other countries, have been witnesses to a host of hostile computer-related attacks in the past few years, some rather incongruous, others just as devastating as the Melissa and the Love Bug viruses. But nothing can prepare us to face future attacks against our information infrastructure systems if at this point in time, specific measures are not exerted in order to address this threat.
What is being perceived by most countries, particularly the highly-developed ones, is the emergence of a newer strain of criminal undertaking that defies boundaries and affects every strata of society. This new threat, cyber-terrorism, is yet to be mentioned and expounded in the legal literature of many countries, but its insidious effects are already being felt even at this time. Cyber-terrorism, which is the convergence of terrorism and cyberspace, can ensue even from a "harmless" intrusion, or hacking, to a full-blown debilitation of a certain country's national information infrastructure system. The focus now, particularly in the field of preemptive measures, is to contain the incidence of cyber-criminal activity from blowing over into a terroristic undertaking.
The United States, Russia, the member-states of the European Union, and even Singapore and Australia, have already taken definitive measures in addressing enforcement issues against cyber-crimes and cyber-terrorism. The Philippines must, in this breadth, take also that next step.
During the recent International Computer Crime Conference in Oslo, Norway, whose theme was "The Internet as Scene of the Crime", the consensus among the multinational participants was to address two specific, significant issues in the area of international enforcement. These are the formulation of a multinational convention to prevent and combat cyber crime and cyber terrorism, much like a United Nations Convention on the Combating of Certain Transnational Crimes and the Council of Europe Draft Convention on Computer Crime, and the national security policies regarding the use of digital encryption technologies and cryptography as a means to protect a nation's information infrastructure system.
Already, the Council of Europe has made significant inroads in conceptualizing a convention to address computer crime, and it just awaits the signature of its member-states for it to become the operational guideline of these countries in dealing with the incidence of computer crimes as it affects both national and transnational jurisdictions.
With the operationalization of the ACTC, the Philippines and its ASEAN counterparts can also initiate the same direction being propounded by the Council of Europe and come up with a regional convention to address the incidence of transnational crimes, to include computer crimes. Hopefully, this idea would not be too late as to ensue only after we, or any of the other ASEAN countries, would have to experience another hostile computer-related attack that would make this effort rather meaningless.
There must also be efforts by us, as well as other ASEAN countries, to take into consideration the significance of utilizing cryptography and digital encryption as a national security policy, if only to protect our own information infrastructure systems, as well as detect, monitor, and deny hostile computer attackers of their activities, and lead to their identification and eventual arrest and prosecution. The United States, and other Western nations, have realized the importance of this aspect as a significant portion of their national security agendas, and we, too, should heed the route they are going to.
For now, the Philippines will have to do with the enactment of Republic Act 8792 , also known as the Electronic Commerce Law, but, by itself, the weapons we need to address the foreboding threats of cyber crime and cyber terrorism may not be enough."
full article here.
No comments:
Post a Comment