Technological advancements Essay
Essay Topic: Essay, Technological,
Paper type: Technology,
Words: 5132 | Published: 12.31.19 | Views: 596 | Download now
Scientific advancements in computer science have made it possible for a larger range of lawbreaker activities especially with the fresh and progressive means of on-line communications. Cybercrime is defined by the Council of Europe’s Cybercrime Treaty as legal conduct against data to infringement of copyright laws. Other experts have got provided larger definitions of cybercrime to feature cyber-stalking, fraud and kid pornography.
Symantec provides a even more concise description and describes cybercrime in the following conditions: “…any crime that is committed using a laptop or network, or components device. ” Along with the introduction and progression of cybercrimes jurisdictional and investigative issues have complicated the detection and control of this new class of legal activity. The topic that follows is targeted on the ongoing problems with solving cross-border cybercrimes plus the international attempts made to date to stifle those issues. By and large the discussion focuses on just how those hard work is beneficial to police agents and what can be done to improve upon the latest international initiatives.
While multinational cooperation definitely seems to be the most productive way of fighting cybercrime, a joint effort by simply national government authorities to definitely investigate and prosecute cybercrime is necessary if multinational assistance is going to function effectively. Legal Complexities regarding cybercrime Within an article released in the Ny Times upon January twenty-seven, 2003 it was revealed that in a survey of 500 corporations, conducted by Federal Bureau of Research and the Computer Security Group the previous 12 months computer scam cost losses in excess of US$4 million and theft of company details cost loss in excess of US$6 million.
According to Nir Kshetri of Bryan College of Business and Economics, these losses reflect the tenacity of cybercriminals plus the ease with which they are acceptable to operate. Kshetri goes on to make clear that while cybercrime involves essentially the same perform, the lack of comity of nations which lends itself to distinct legal implications for that carry out permits the success of cybercrime. Hence the most obvious trouble respect of cybercrime is its multi-national dimensions.
Patricia Bellia, Helper Professor at Notre Deesse University known that police agencies have to overcome difficult challenges inside their pursuit of web criminals co-existing in several jurisdictions. These problems are fairly “common in internet crime. ” Professor Suzan Brenner provides an excellent sort of the problems surrounding the investigation and prosecution of cybercrime in her synopsis of a cybercrime referred to as the “love bug”. The love insect was the term given to your computer virus that surfaced sometime in May of 2000 and spread rapidly on an international level. It was calculated to destroy many different types of files and within the opening hours it had damaged more than 279, 000 computer systems worldwide.
His passion bug got infected the computers of large companies such as House of Lords, Dow Chemical Firm and Ford Motor Firm. Once it turned out determined the love bug had originated in the Thailand, law enforcement officials via both the United States and the Korea set about looking up the person or perhaps persons responsible for the creation and deployment of the like bug. In the onset, there have been legal issues of big proportions. To start with the Thailand were sorely lacking in meanings of and provisions in respect of cybercrimes.
In addition, it was challenging to justify reasons for the issuing of the search bring about for a believe on the basis of some undefined cybercrime. Making issues worse the Philippine regulation had not certain crime capable of signing up to conduct encompassing the breaking into of a computer or pertaining to deploying a virus and/or using a computer for the purpose of assigning the offence of robbery. In order to compensate for the deficiency in Philippine law the prosecutor recharged the think with robbery and fraudulence under mastercard legislation since there was simply no specific prevalent law or statutory offence reflective with the actual cyber misconduct.
Ultimately the Doj withdrew the truth claiming that: “…the visa or mastercard law [did] not apply to computer cracking and that investigators did not present adequate proof to support the theft demand. ” Resulting from this frenzy the Israel enacted legal guidelines defining specific cybercrimes and penalties for offenders. Brenner maintains that the love bug case determines with affordable clarity the difficulties for law enforcement in respect of the investigation and prosecution of cybercrimes. Brenner identified several key regions of concern. They can be: 1 . A legislative inability in determining and making provision for cyber certain criminal conduct.
2 . An absence of international treaty agreements in respect of cybercrimes. several. Difficulties discovering the country with jurisdiction over the cybercrime issue. 4. Problems identifying the number of persons and the specific criminal activity committed plus the breadth from the resulting damage.
International Cooperation The Council of Europe Cybercrime Meeting 2001 The Council of Europe Cybercrime Convention 2001 is the 1st international treaty of its kind. It can be specifically designed to manage and control criminal activity via the internet and also computer sites on a global level.
In a summary of its Cybercrime Convention the Council of Europe talks about its purpose as follows: “Its main target, set out inside the preamble, is usually to pursue a common criminal coverage aimed at the protection of society against cybercrime, especially by implementing appropriate legal guidelines and cultivating international co-operation. ” In 1997 the European Council organized a committee of experts expecting to to design and draft a Cybercrime Conference specifically for the purpose of controlling lawbreaker conduct on the net. Non member states for the European Community such as The japanese, the United States, Canada and S. africa also contributed to this business.
Several drafts were accomplished and the final version received approval through the European Authorities on Criminal offense Problems in 2001 and was printed. By Nov 2001 the Convention was open intended for ratification by Member States and third parties such as Asia, the United States, Canada, Mexico, S. africa and the Vatican. On September 3rd last year the United States ratified the Tradition 2001. The Parliamentary Assemblage to the Western Council suggested the addition of a protocol on the control and regulation of printed racism on the net by criminalizing such activities.
The recommendation came out in Opinion No . 226 (2001) and specifically delivers as follows: “Finally, the Assembly advises immediately drawing up a protocol to the fresh convention within the title “Broadening the range of the tradition to include fresh forms of offence”, with the reason for defining and criminalising the dissemination of racist promozione, abusive storage of hateful messages, utilization of the Internet to get trafficking in human beings, and the obstruction with the functioning of computer systems simply by spamming (sending junk e-mail). ” The protocol on racism was available for validations in January of the year 2003 and while twenty five member says signed this only a small number of members ratified it. The ratifying says are Cyprus, Albania, Italy, Slovenia, Denmark and the previous Yugoslav Republic of Miscuglio.
The process became joining in March 2006. The Council of Europe Cybercrime Convention 2001 has as the primary goal the harmonizing of cybercrime substantive and procedural regulations on a global level. Especially, Section one particular requires that members towards the Council of Europe Cybercrime Convention 2001 implement home legislation that criminalizes an extensive range of improper and deliberate computer related activities.
These activities are entitled “Offences against the privacy, integrity and availability of pc data and systems” because “illegal access”, “illegal interception”, “data interference”, “system interference” and “misuse of devices”. Title two of The Authorities of European countries Cybercrime Convention 2001 procedes make provision from the implementation simply by member says of home-based laws criminalizing “computer-related offences” such as “computer-related forgery” and “computer-related scams. ” Title 3 with the Council of Europe Cybercrime Convention 2001 requires that member states criminalize the publication of kid pornographic material via a computer. It additional dictates one common definition of child pornography.
Subject 4, Content 10 makes provision pertaining to harmonizing of criminal offences relating to copyright infringement and Title five, Article 10 requires that member says make provision for criminalizing complicity in all cybercrime activities. Content 12 of Title a few establishes a cohesive means of enforcing business liability in respect of cybercrime on an international level among its member declares. Article 13 of the Council of The european union Cybercrime Tradition 2001requires that member declares establish natural sanctions in regards to the felony offences created by home legislative provision.
Article 13(1) and (2) provide as follows: “1 Every single Party shall adopt this kind of legislative and other measures since may be important to ensure that the criminal accidents established in accordance with Articles two through 14 are punishable by powerful, proportionate and dissuasive calamite, which include deprival of freedom. 2 Each Party shall ensure that legal persons kept liable relative to Article doze shall be controlled by effective, proportionate and dissuasive criminal or perhaps noncriminal sanctions or measures, including economic sanctions. ” Section a couple of, Title 1 of the Council of Europe Cybercrime Convention 2001 makes provision for prevalent procedural laws among affiliate states.
Document 14 claims simply that: “Each Get together shall adopt such legislative and other actions as might be necessary to create the forces and types of procedures provided for with this section with regards to specific lawbreaker investigations or perhaps proceedings. ” Title several of Section 2 requires that affiliate states generate common provisions for production orders of your “computer system or a computer-data storage medium”. Title four, Article nineteen makes identical provisions in respect of search and seizure techniques. These certain provisions are necessary for cross-border considerations because they permit authorities in every single person state to obtain consistent search and seizure laws and will facilitate and eliminate jurisdictional complications.
A cybercrime offence committed in one member express will be the exact same as an offence committed in another member state. It can therefore help to make little big difference which member state assumes jurisdiction above the matter.
Document 25 of Title three or more, Chapter III provides perhaps the most enlightening provision by simply stating that: “The Celebrations shall afford one another common assistance to the widest level possible for the purpose of investigations or perhaps proceedings concerning criminal accidents related to computer systems and info, or to get the collection of evidence in electronic sort of a criminal offence. ” Although many countries did not indorse the Council of Europe Cybercrime Convention 2001 they did take steps to bring their countries laws in respect of cybercrime into harmony with the Council of The european countries Cybercrime Convention 2001. For example the Parliament of Australia enacted the Cybercrime Take action 2001 that has been assented to on August 1st, 2001.
Author Jody Westby clarifies that with or without the Council of Europe Cybercrime Convention, many nations taken care of immediately the popular potential of cybercrime following the September, 11th terror episodes on US soil. The response was going to introduce or modify existing criminal legal guidelines and unique codes so as to permit jurisdiction by one land over an additional in circumstances where it absolutely was necessary to prosecute a party or parties of 1 nation who also committed a crime against a pc in another region. The Authorities of Europe Cybercrime Meeting is the only international treaty in place right now.
It is stimulating that developing countries which have not ratified the Meeting have at least legislated laws like Convention since one of the biggest difficulties to the criminal prosecution and research of cybercrime arises away of conflicting laws in the nations afflicted with misconduct over the internet. Even when the two victim as well as the offender start out of the same jurisdiction evidence may exist in another jurisdiction. Moreover the offence lamented of may encompass a number of jurisdictions, say for example a “telemarketing fraud. ” The challenges and difficulties with the dynamics of cybercrime happen to be endless and resolving problems will depend on the co-operation with the countries afflicted.
In the soul of the Council of The european countries Cybercrime Conference, harmony of laws and mutual assistance goals is the only genuine means of managing and removing cybercrime throughout the world. As Westby maintains, virtually any resolution initial requires co-operation between nationwide borders at the investigative method all the way to the prosecutorial procedure. This might entail an initial consensus as to which in turn jurisdiction is always to have the business lead charge within the matter. Although none of the options will be remotely possible without some international treaty such as the Authorities of The european union Cybercrime Tradition.
Mark M. Richard, Counselor for Justice Affairs to the US Quest to Eu in an addresses to the EU’s meeting within the 29th Document at Brussels on April 14, june 2006 made the following observation: “With the the positive effect of marketing and sales communications networks, community safety is increasingly dependent on effective police cooperation throughout borders. ” As there is not any conceivable way to draft and apply a single codified law able of app in every region without reducing the sovereignty of nations, the Council of Europe Cybercrime Convention is definitely perhaps the best method of accomplishing goals worked out to close the gap between your conflicting laws and regulations of different nations around the world. The Un On December, 4, 2k the Usa Nations’ General Assembly approved resolution 55/63 which provides as follows: “(a) Claims should ensure that their regulations and practice eliminate secure havens for those who criminally misuse information systems. (b) Police force cooperation in the investigation and prosecution of international instances of criminal misuse info technologies should be coordinated among all concerned Claims; (c) Details should be exchanged between States regarding the conditions that they deal with in combating the lawbreaker misuse details technologies; (d) Legal devices should protect the privacy, integrity, and availability of data and computers from not authorized impairment and be sure that felony abuse is penalized. ” At the eleventh UN Workshop on Crime Prevention and Criminal Rights held in Bangkok from April 18th to April 25th, 2005, Minister plenipotentiary Henning Wegener emphasized that the global character of cybercrime required more than mere intercontinental co-operation over a voluntary basis for the successful control over cybercrime.
This individual maintained it turned out necessary to create a single worldwide code rendering for obligatory compliance on the part of all ESTE member declares. He anxious that it was imperative that anti-cybercrime laws work in a “global culture of cyber security. ” Inspite of the ongoing talks and the recommendations put forth by the United Nations you will find no homogeneous codes controlling anti-cyber criminal offense laws with an international level. The best instrument thus far is found in the Council of Europe Cybercrime Convention which in turn sets out guidelines for harmonizing anti-cybercrime laws and regulations among affiliate states.
The corporation of American Says At a gathering in Peru in 1999 the corporation of American States recommended a group of professionals on the concern of cybercrime be set up. In 2002 the selection of experts had been established at a meeting in Trinidad and Tobago and so they were given the next instructions: “To consider the preparation of pertinent inter-American legal instruments and unit legislation when it comes to strengthening hemispheric cooperation in combating cybercrime, considering specifications relating to privateness, the protection of information, step-by-step aspects, and crime elimination. ” The experts met with the Ministers of Justice in the Organization of yankee States in Washington Deb.
C. in April of 2003 and recommended the following: “That Member States evaluate the advisability of implementing the guidelines of the Authorities of The european union Convention in Cybercrime (2001), and consider the possibility of acceding to that conference. ” Due to this recommendation the Organization of yankee States underneath the auspice from the European Authorities and The country met in Madrid in 2005 while using Group of Government Experts on Cybercrime. At this meeting it absolutely was acknowledged which the Council of Europe Meeting on Cybercrime was the simply international treaty on anti-cybercrime measures and stated that they can: “Strongly motivate States to consider associated with becoming Parties to this Tradition in order to make utilization of effective and compatible regulations and equipment to fight cybercrime, in domestic level and on part of foreign cooperation…” Three meetings implemented the Madrid meeting including a final meeting held in 2006 and essentially concluded that member states with the Organization of yankee States will adapt the Council of Europe Meeting on Cybercrime, Moreover, they can be required to succumb to the UN Resolution fifty five.
63/2000 specifically in respect of information sharing amongst nations. The Asia Pacific Economic Co-operation Like the Firm of American Says, the Asia Pacific Financial Cooperation met in 2002 for the express reason for engaging in a campaign to get the enactment of anti-crime laws that had been consistent with the UN’s Resolution 55/63/2000 mandate as well as the guidelines established by the The european union Convention upon Cybercrime.
A number of meetings used and by Nov 2005 the corporation of American Says made a final commitment which usually reads in part as follows: “Encourage all economies to study the Convention on Cybercrime (2001) and endeavour to enact a comprehensive pair of laws relating to cybersecurity and cybercrime that are consistent with intercontinental legal tools, including United Nations General Assembly Resolution 55/63 (2000) and the Convention upon Cybercrime (2001). ” The Association of Southeast Hard anodized cookware Nations The Association of Southeast Oriental Nations create a Ministerial Meeting upon Transnational Criminal offenses and in an argument made by that Ministerial group in Bangkok on January 8, 2005 cybercrime was acknowledged together with a need to come together on some common ground with a view to controlling and managing it. Previously in 2003 a treaty with China and tiawan and the Connection of Southeast Asian Countries entitled “A Plan of Action to Implement the Joint Declaration on ASEAN-China Strategic Partnership for Peacefulness and Prosperity” was authorized in Bali, Indonesia.
The ASEAN-China treaty pledged the following: “Formulate supportive and emergency response types of procedures for reasons of maintaining and boosting cybersecurity, and preventing and combating cybercrime. ” In July 06\, the Association of Southeast Asian Nations around the world Regional Forum noted that anti-cybercrime laws needed immediate attention because of a rapidly growing global anxiety about terrorism and cyber disorders in general. Consequently member states were advised to put into practice anti-cyber laws consistent with existing “international instruments” and they were also required to conform the suggestions set forth in the UN’s Image resolution 55/63/2000.
Interpol Interpol has become actively struggling all levels of information technology criminal offense including cybercrime for a number of years by simply organizing sets of experts in the field called “regional working parties. ” The regional working parties incorporate computer criminal offenses unit experts and are deployed in the Unites states, Europe, Asia and Africa. The Western Working Party branch of Interpol was formed in 1990 and consists of representatives from several European claims. The get together meets 3 x a year and reviews info on information technology and related criminal offenses.
There are several projects under this party which might be ongoing among them are current and potential criminal activity and the opportinity for investigating and detecting these crimes. Interpol also uses the information collected for the purpose of planning effective manuals on examinative techniques. The African Local Working Get together is currently headed by a member of the Southern region African Authorities Services’ Cybercrime Unit. The chairman is assisted by a representative via Kenya and a representative via Tanzania and a technical advisor from the University of South Africa.
They have generally consented to work strongly with other Interpol groups in the sharing of information and the investigation of cybercrime. Regional Working Parties inside the remaining areas are commonly similar to these found in The african continent and European countries with a single goal of enhancing cross-border co-operation among law enforcement officials. Advice As it is the Europe Convention on Cybercrime 2001 is the only foreign treaty available on anti-cybercrime laws. Supporters in favor of the convention argue that it is an successful means of prevention since it clearly sends concept to cybercriminals that they tend not to enjoy impunity. They also argue that the meeting significantly improved the number of countries in which offenders can be detected and charged.
It is certainly the case that while a large number of countries have not adapted the convention they may have implemented countrywide laws a lot like it and so it is fair to state that international co-operation has had the consequence of improving anti-cyber crime regulations globally. However , it goes without saying that if there is gonna be optimum cooperation even more nations will have to indorse either directly or indirectly the substantive and procedural legal guidelines established in the conference.
It appears that all those states signing up for the tradition are not in and of themselves problem declares since: “Hackers frequently path cyber problems through websites in Yemen or North Korea, not of which happen to be part of the tradition. ” The simplest way to combat cybercrime on an foreign level with a view to capturing offenders in non convention or no complying nations around the world is by the passage associated with an international rules that binds all full sovereign coin nations. In order to maintain community trust and confidence in that powerful tool it would be required to limit this international instrument to severe cybercrimes such as acts of terrorism that could have the potential pertaining to prosecution within the International Legal Court.
In order for treaties like the Europe Convention on Cybercrime 2001work at an optimal degree of effectiveness the private sector should become involved. As Jody Westby remarks: “When private and general public sectors talk about and put together information relating to such offences, they can every better learn how to respond and mitigate their impact. ” This method of information sharing is known as a means of broadening security actions. Moreover, private organizations is going to serve as a deterrent theory once cybercriminals are aware that they will be at risk of being exposed by private members and public authorities.
Westby clarifies that: “Neither government neither the personal sector can address these problems standing alone. Government authorities cannot fix the sophisticated and multilayered problem of cyber reliability and essential infrastructure protection without the assistance of private companies. ” Private organizations perform play a vital role in the recognition and stifling of cybercrime activity. They do this by providing network security equipment by presenting and marketing firewall mechanisms, password requirements and virus protection. In addition they provide tools for the detection of probably intrusive perform by cybercriminals.
By using these types of monitoring products private agencies and person users have the advantage of heightening security. The difficulty with non-public sector and individual monitoring is that there is certainly very little efforts to report these secureness breaches to the authorities. For the exclusive sector to assist public adjustment reporting these types of suspicious secureness breaches can necessarily have to be reported.
This is when information showing will obtain its optimum goal of detecting, examining and prosecuting cybercriminals. Richard Stiennon, Key Research Analyst at Harvest’s IT stated in Network World suggests that the individual can play a part in controlling cybercrime as well. This individual notes that we now have far too many individuals subscribing to false messages and “tricky WEB ADDRESS obfuscation, and elaborately crafted Web sites. ” If the person used more caution this type of cybercrime probably would not be while successful and thus would taper off.
Stiennon submits that individual caution is going a long way offered private agencies improve and increase efforts and financing to study and research powerful means of protecting data and computers resistant to the risk of cybercrime contamination. This type of effort might assist the consumer by enhancing means by which usually tricky electronic digital messages and web pages can be identified. In addition to encouraging non-public sector engagement by way of information sharing and self protecting awareness the harmonizing of national laws and regulations as prompted by the Un and the Western european Convention are the most effective means of controlling and handling cybercrimes by using an international level.
It might certainly not be feasible to obtain the assistance of all countries but it can serve to notify cybercriminals which the chances of avoiding detection and prosecution happen to be growing slimmer. The effectiveness of vast scale intercontinental cooperation was manifested in the recent arrest of a Ukrainian national in Turkey who had been suspected of your cybercrime in regards to an American business. Maksym Yastremskiy, a Ukrainian national was suspected of theft of customer data from TJX, a ALL OF US retailer.
David Dunn reviews that: “The TJX breach compromised the consumer records of 45. several million people, and is believed to have happened through the hacking of wide open wireless routers at subsidiaries of the company. ” This specific case implies that the net is widening under the protections of co-operation among authorities on an intercontinental level. In another case, the united states Department of Justice reported success within a joint analysis between China and US law enforcement specialists in both countries. Within an operation knows as “summer solstice” which usually commenced in 2005 ended in the arrest of in least makes persons and “the search of multiple businesses and residential locations” in China.
In the United States, the FBI performed at least 24 search and seizure warrants. Summer time solstice was described by FBI while an operation which: “…encompasses multiple investigations currently being conducted by FBI in Los Angeles plus the MPS, Economical Crime Exploration Department (ECID), in which criminal organizations accountable for manufacturing and distributing counterfeit software have been completely identified in both Shanghai and Shenzhen; as had been distributors positioned in the United States. ” The facts expose that one of the groups was an organization performing as Mother Ke Pei, a Shanghai based company was distributing counterfeit Ms software to US clients. In 2003 Ma Ke Pei was indicted in New York for this conduct and fled the jurisdiction.
Ma Ke Pei later materialized in China where the counterfeit sales continued on a worldwide level. When the Chinese Ministry of Open public Security commenced investigations they will received data and assistance from the US F. As a result of this kind of cooperative investigation the fake material was seized as well as the suspects arrested notwithstanding the global implications and jurisdictional disparities. Margaret Killerby, Head of Department of Crime of Problems, DGI, Council of Europe pointed out the put together efforts essential for the control and dangerous cybercrime as a way of improving the current global efforts.
Her suggestions indicate global participation beginning with the person and finishing with govt involvement and cooperation in any way levels. Killerby notes that prevention is the most suitable but can not be successful without some ways of promoting specific awareness of the scope and means of cybercrime. In other words an educated individual is definitely an informed individual. Together with the requisite knowledge, individuals ought to be encouraged to work better with law enforcement officials.
The coming collectively of patients, service providers, police force and the two public and private sector to fight the normal cybercriminals will simply serve to foster a deterrent principle. The net Corporation pertaining to Assigned Titles and Numbers (ICANN) which will coordinates global internet connections can simply go up to now with the id of on the net criminal perform. In an effort to heighten security stakeholders of ICANN meet every year. However , with users co-operation, ICANN can function more effectively to supply security and anti-cybercrime plans. Quite naturally ensuring bare minimum standards of law on an international level together with countrywide cooperation may be the only approach that will work to contain cybercrime.
The knowledge that you have very few secure havens in a legal and social perception is an ideal method of detecting, checking out and prosecuting cybercrime. Since it is, the European Convention 2001 provides the best instrument to achieving legal harmony on an international level. All that is left is made for national government authorities to educate the general public and motivate individual and private sector engagement. Conclusion In an age of technology the risk of cybercrime is improved with the boost of the positive effect.
Cybercrime is a criminal activity that crosses borders. The only effective method of addressing the brand new age concern is to put into practice treaties built to harmonize regulations on an intercontinental level. This is just what the Western european Convention about Cybercrime endeavors to do. Whilst it compromises several measure of sovereignty and individual privacy, these kinds of losses happen to be offset by the huge financial losses incurred on vast scale levels as a result of cybercrime. Cybercriminals function primarily because they have secure havens from where to escape legal responsibility.
It therefore makes sense that a legal framework intended for the harmonizing of anti-cybercrime laws is the foremost method for the reduction and control of cybercrime on a global level. Additionally, coordinated efforts such as all those manifested in the joint exploration between Chinese language and American officials would not have been conceivable if both equally sides of the boundary did not have got similar regulations which both equally define the substantive and procedural laws and regulations for the investigation and prosecution of suspected cybercrime. The concept the summer solstice joint procedure sends is the fact neither China nor the usa of America would provide a secure haven pertaining to the Ma Ke Pei organization.
A message like this over a broader level would certainly function to prevent cybercrime actions both nearby and internationally. Perhaps it is time for the United Nations to change Res/55/63 to be able to bring it based on the Euro Convention of 2001. The UN’s quality does no more than encourage affiliate states to consider certain advice.
In order to be effective the UN should placed clear recommendations for the enactment of procedural and substantive anti-cybercrime laws in as much fine detail as the European Conference of 2001. Moreover it ought to be mandatory for a lot of Member States to ratify the new and improved quality. This kind of capturing resolution has the ability to encapsulated difficulty states that are not members with the European Authorities and have simply no duty a subscription to the convention. Functions Cited Web Resources Akdeniz, Yaman, Dr . (2006) A great Advocacy Guide For Non Governmental Businesses: The Council of Europe’s Cyber-crime Tradition 2001. http://www. shadowmonkey. net/images/stori