<\/span><\/h3>\nCommunication from the Commission to the European Parliament, the Council and the Committee of the Regions: Towards a general policy on the fight against cyber crime (COM(2007) 267 final of 22.5.2007)<\/p>\n
SUMMARY<\/p>\n
WHAT DOES THE COMMUNICATION DO?<\/p>\n
It sought to present a general policy to better coordinate the fight against cybercrime.<\/p>\n
KEY POINTS<\/p>\n
Objective and actions<\/p>\n
This was to strengthen the fight against cybercrime at national, European and international levels by:<\/p>\n
1.Improved operational law enforcement cooperation by strengthening and clarifying responsibilities between Europol, Eurojust and other structures.<\/p>\n
2.Coordinated and interlinked training programmes for EU countries\u2019 law enforcement and judicial authorities involving Europol, Eurojust, the European Police College and the European Judicial Training Network.<\/p>\n
3.Better political cooperation and coordination between EU countries by creating a permanent EU contact point for information exchange and an EU cybercrime training platform.<\/p>\n
4.Political and legal cooperation withnon-EU countries via the Council of Europe\u2019s 2001 Convention on cybercrime (and its Additional Protocol), the G8 Lyon-Roma High-Tech Crime Group and Interpol-administered projects.<\/p>\n
5.Improved public-private sector dialogue to create mutual confidence and share relevant information.<\/p>\n
6.Standardising EU countries\u2019 legislation and definitions in the area of cybercrime.<\/p>\n
7.Developing measures\/indicators of the extent of cybercrime.<\/p>\n
8.Raising awareness of the dangers and costs of cybercrime.<\/p>\n
9.EU research programmes, such as under the Internal Security Fund – Police.<\/p>\n
ACHIEVEMENTS<\/p>\n
These include:<\/p>\n
a directive on combating the sexual exploitation of children online and child pornography;
\nthe EU\u2019s Cybersecurity Strategy (2013);
\nthe establishment of the European Cybercrime Centre (2013);
\na directive on attacks against information systems (2013).
\nFor more information see the European Commission’s web pages on cybercrime.<\/p>\n
BACKGROUND<\/p>\n
Article 68 of the Treaty of the Functioning of the European Union, which came into force in 2009, formally recognised the European Council’s pre-eminent role in lawmaking in the area of home affairs. This allows action against cybercrime to be complemented by EU laws and more wide-ranging initiatives.<\/p>\n
KEY TERM<\/p>\n
Cybercrimes: criminal acts committed using electronic communications networks and information systems or against such networks and systems.<\/p>\n
It may be broken down into 3 forms:<\/p>\n
traditional forms of criminal activity, but using the internet to commit crimes (like fraud or forgery). These range from identity theft to \u2018phishing\u2019 (where online criminals set up a fake banking website to trick customers into giving them their password or data so as to steal their money). The internet has also transformed international trade in drugs, arms and endangered species;
\npublication of illegal content, such as material inciting terrorism, violence, racism, xenophobia or child sexual abuse;
\ncrime unique to electronic networks, new and often wide-ranging and large-scale crimes, unknown in the pre-internet age. Here, criminals attack information systems, sometimes threatening critical information infrastructures of the state and thus directly its citizens. These attacks can be via \u2018botnets\u2019 (an acronym of \u2018robot networks\u2019) where criminals distribute \u2018malware\u2019 (malicious software) that, when downloaded, turns a user’s computer into a \u2018bot\u2019. A network of such infected computers is then used to commit crimes without their users knowing.
\nRELATED ACTS<\/p>\n
Joint communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions – Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace (JOIN (2013) 1 final of 7 February 2013).<\/p>\n\n
\n <\/div>\n\n","protected":false},"excerpt":{"rendered":"
Information Systems Offences 2013 Directive introduces new rules harmonising criminalisation and penalisation of a number of offences directed against information systems.\u00a0 The rules include outlawing the use of so-called botnets, which are malicious software designed to take remote control of a network of computers. The types of criminal offence covered by the Directive include attacks […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[123],"tags":[],"_links":{"self":[{"href":"https:\/\/legalblog.ie\/wp-json\/wp\/v2\/posts\/12501"}],"collection":[{"href":"https:\/\/legalblog.ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/legalblog.ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/legalblog.ie\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/legalblog.ie\/wp-json\/wp\/v2\/comments?post=12501"}],"version-history":[{"count":5,"href":"https:\/\/legalblog.ie\/wp-json\/wp\/v2\/posts\/12501\/revisions"}],"predecessor-version":[{"id":18641,"href":"https:\/\/legalblog.ie\/wp-json\/wp\/v2\/posts\/12501\/revisions\/18641"}],"wp:attachment":[{"href":"https:\/\/legalblog.ie\/wp-json\/wp\/v2\/media?parent=12501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/legalblog.ie\/wp-json\/wp\/v2\/categories?post=12501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/legalblog.ie\/wp-json\/wp\/v2\/tags?post=12501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}