Responding internationally

International cybercrime — attacks on mission-critical government or private

computers from across national boundaries — is an increasing threat. Can

governments respond?

Self-protection through strong secur-ity tools and practices remains

the principal defense. Ultimately, however, governments must address the

investigation of cybercrimes and the prosecution of criminals. Most countries

recognize the need to update their laws to fight crimes committed in cyberspace.

But countries today mostly are in the same boat that the Philippines was

in after the "love bug" struck in May — they have no effective legal tools

to prosecute cybercriminals. As with many issues, it often takes a crisis

to precipitate action. In June, the Philippines outlawed most computer crimes

as part of a comprehensive e-commerce statute.

To prosecute crimes across national borders, an act must be a crime

in both jurisdictions. Thus, though local legal traditions must be respected,

nations must define cybercrimes similarly. One approach to encourage such

harmony is to develop a model law that can be adapted to local conditions.

Such an effort is underway in the Council of Europe (COE).

The COE, Europe's oldest political organization, has created model laws

and treaties covering human rights, education and the environment. Its Draft

Convention on Cyber Crime was crafted by law enforcement officials from

Europe, the United States and Japan.

The convention will address a range of cybercrimes, including illegal

access, illegal interception, data interference, system interference, computer-related

forgery, computer-related fraud, and the aiding and abetting of these crimes.

It also tackles investigational matters related to jurisdiction, extradition,

the interception of communications, and the production and preservation

of data. And it sets minimum standards for penalties.

As with most cybersecurity initiatives, the COE's framework is controversial.

The computer industry argues that it had little meaningful input in the

draft convention. The COE accepts comments on its draft, then releases a

revision. The latest version is at

Industry believes requiring service providers to monitor communications

and provide assistance to investigators would be burdensome and costly.

It also objects to a provision criminalizing the use of hacking programs,

which may have been designed for legitimate security testing purposes.

The Global Internet Liberty Campaign ( has joined the opposition,

objecting to a lack of procedural safeguards and due process to protect

individuals' rights. It believes ensuing national laws might place restrictions

on privacy, anonymity and encryption.

The council wants to finish its work by the end of the year, after which

member nations and others could sign on to the convention and implement

the provisions in their own laws. In the meantime, government and industry

should engage the COE process at all levels to ensure a workable outcome.

McConnell, former chief of information policy and technology at the Office

of Management and Budget, is president of McConnell International LLC (www.

The Fed 100

Read the profiles of all this year's winners.


  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group