Volume IX, Issue 1,

Fall 2002


 

 

In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty

 

by D.C. Kennedy[*]

 

 Cite As: D.C. Kennedy, In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty , 9 RICH. J.L. & TECH. 3 (Fall 2002), at http://jolt.richmond.edu/v9i1/article3.html.


I. INTRODUCTION

{1}             Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catchy phrase in the subject line.  Immediately after opening the e-mail’s attachment, your personal computer is severely damaged. Obviously having a bad day, you head to your job as an attorney for a multinational corporation.  By the time you arrive at work, there has been damage to company computers across the globe. The monetary costs of the damage, coupled with the downtime, are astronomical.  The CEO of your company is furious. You hope to diffuse the situation by informing your boss that the person who released the virus has been apprehended.  Unfortunately, soon after explaining the good news of the perpetrator’s capture, you learn that the individual, who admits involvement with the e-mail virus, will not be prosecuted in his home state because that state had no laws on the books outlawing his behavior at the time of the incident.  In fact, none of the states where damage occurred will be able to prosecute because of lack of jurisdiction. The damage is done and the perpetrator is free.

{2}             Although the situation may sound far fetched, this is the basic story of the events surrounding the dissemination of the I LOVE YOU virus.  The perpetrator was allowed to go free because the Philippines did not have appropriate cybercrime laws instituted at the time the virus was released. [1] This high-profile case is a superb introduction to the difficult issues arising from the existence of cyberspace.[2]

{3}             In this "Age of the Internet,"[3] access to information is unprecedented. This access can be positively used to contact friends and businesses around the world or can be negatively used to gain unauthorized access to information or to steal profitable data. With the threat of sinister uses for access comes the need for protection – protection from attacks such as the I LOVE YOU virus[4] and protection from prying eyes.[5]  Even though protection from these threats is hampered because of the international scope of the threat, this same scope assists the cybercriminal. No longer must a criminal be located physically in the proximity of his crime.  Instead, through the same technology that makes the Internet such a popular personal and business instrument, the criminal is able to cause damage regardless of national borders.  The ability of the cybercriminal to cross national borders without effort, coupled with the relative ease of his causing harm, present problems for states that want to crack down on cybercrime. These states must determine effective ways to investigate activity that occurs outside of their national boundaries, including investigations in states that may not outlaw the activity. In addition, the states investigating these crimes must employ individuals with the appropriate technical training who can devote long hours to tracing the electronic trails of cybercriminals.

{4}             In an effort to address the difficulties of investigating cybercriminals, the Council of Europe put forward a cybercrime treaty to harmonize definitions of cybercrime in states that become parties to the treaty.[6]  To assist law enforcement with investigation of these crimes, the treaty provides for procedures to assist law enforcement in the search and seizure of computer data and facilitates cooperative investigations by states affected in specific cybercrime incidents.[7]  The increase in police power that would result from the treaty concerns many privacy advocates.[8]  The basis for this concern is the limited protection available to support privacy of information pertaining to individuals.[9]

{5}             To examine the privacy issues at stake, this paper will first explore the increase in police power granted by the treaty.  The paper will follow this assessment by looking at the concerns raised by the formulation of the treaty itself.  It will then end by exploring the opportunity missed by the treaty drafters to address fundamental privacy concerns.  Part I will analyze the concept of cybercrime in an effort to define the evil that the treaty is intended to address.  As part of this discussion, Part I will examine the new ‘tools’ available to criminals in the Internet Age and, conversely, the new dilemmas that these ‘tools’ create for law enforcement.  Part II will discuss  the recently proposed cybercrime treaty.  It will examine the provisions of the first publicly-released draft, the list of complaints that flooded into the Council of Europe after the release of the draft, and the revisions that resulted from the complaints.  Part III will use two hypotheticals to study the impact of the treaty.  In the hypotheticals, three Southeast Asian states – with privacy protection levels spanning from low to high – will interact with a European state in a cybercrime investigation.  The paper will assert that the interaction that ensues, the very interaction contemplated by the treaty, will have the potential to lower privacy protections for the states involved.  Part IV will explore the concept of privacy at the international level, paying particular attention to the definitions of privacy provided by the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights.  It will compare the traditional international understandings of privacy – privacy of communication, freedom of expression, and criminal procedure protections – with the revolutionary change needed for the concept of privacy in the Internet Age.  Part IV will end by arguing that this new conception of privacy should account for intrusions by governments, businesses, and rogue individuals.  Part V will conclude by arguing that the increase in police power required by the treaty necessitates an offsetting increase in privacy protection for individuals.  It will contend that the treaty should have included a privacy provision that required parties to enact, through domestic legislation, protection of informational privacy from unwanted violations by governments, businesses, or rogue individuals.  In the absence of such a provision, there can only be a hope that governments will adopt such legislation on their own and that reinterpretations of international treaties will include protections for informational privacy.    

II. THE PROBLEM OF CYBERCRIME

A. Cybercrime and the Cybercriminal

{6}             In this Age of the Internet, ‘cybercrime’ has become a household word, but its definition is seldom explained.  Books and articles written on the subject often assume that the reader understands the many facets of cybercrime.  For many, however, computer hacking[10] and computer viruses[11] are the main images conveyed by the term.  While these crimes comprise two important categories of cybercrime, many other crimes can be committed or facilitated utilizing computer networks.  A non-exhaustive list of cybercrimes includes: fraud, forgery, counterfeiting, gambling, transmission of child pornography, transmission of threats, transmission of harassing communications, interception of communications, copyright infringement, and theft of trade secrets.[12] 

{7}             The motivations of those who commit cybercrimes may be as varied as the nature of the cybercrime itself.  Juveniles may be drawn by the prestige of outwitting adults.[13]  Insiders may be seeking retribution for a perceived wrong by a business or a former employer.[14]  Hackers may simply want bragging rights associated with compromising a particular computer system.[15]  Virus writers may be motivated by prestige, as well as by malicious feelings towards others.[16]  Criminal groups functioning on the Internet may seek monetary gain.[17]  Foreign terrorists may seek foreign intelligence.[18]  Even with these various motivators, there is at least one common characteristic of the people who commit cybercrimes.  Yesterday’s street criminal had “street smarts;" today’s cybercriminal has “computer smarts.”  In order to be successful at their craft, cybercriminals need to possess a knowledge of computers that is far superior to the average user’s amateur skills.  This knowledge allows the criminal to mask his criminal activity and to divert the efforts of law enforcement officials.[19]

B. The New Tools of the Cybercriminal

{8}             Technology provides the cybercriminal with a new bag of ‘tools’ that make him more effective at his craft.  In this Internet Age, the ‘tools’ are not physical implements, but instead are advantages for those who commit cybercrime.  The first such ‘tool’ is the ability to hide evidence pertaining to the cybercrime.  The evidence is virtually hidden because of the instantaneous transfer of data through computer systems.[20]  The cybercriminal has the capacity to act at one site in cyberspace and then, taking the evidence of the crime with him, to leave instantaneously.  The second ‘tool’ is the cybercriminal’s ability to hide his identity.  In effect, a skilled cybercriminal is able to attack computer systems leaving few, if any, clues as to his identity.  His identity is further concealed because he can easily commit the cybercrime without being physically present in a jurisdiction.[21]  The third ‘tool’ is the cybercriminal’s ability to increase his cybercriminal activity with minimal effort.  The cybercriminal can ignore international boundaries[22] by simultaneously targeting multiple victims in multiple states.[23]  Ultimately, these ‘tools’ provide the cybercriminal with an international forum for cybercrime in a world where laws criminalizing his behavior are limited to domestic borders. 

C. Challenges for Law Enforcement

{9}             With each of the cybercriminal’s new ‘tools,’ law enforcement officials face new challenges.[24]  The cybercriminal’s first ‘tool,’ his instantaneous ability to hide data in computer systems, creates a host of problems for law enforcement.[25]  In domestic investigations, law enforcement officials may discover that critical data is stored on a networked computer that is located in another state.  Law enforcement must then determine if their domestic court order is sufficient to search the storage facility outside the state’s territory or if mutual assistance must be sought with law enforcement in the other state.[26]  Even in the instance of information stored with ISPs, the procedures that law enforcement need to follow are not uniform from state to state, meaning that the task of obtaining the information may be quite time consuming.[27]  If the evidence is encrypted, there is a question as to whether a witness can be compelled to provide a printout of encrypted data when questioned by law enforcement authorities or interrogated in court.  This situation becomes particularly daunting when an encryption key[28] is held by a second person who is located outside the state’s territory.[29]  All of these inquiries take time and may provide the cybercriminal the time frame needed to further conceal the incriminating data.

{10}         The second ‘tool’ to which law enforcement must respond is the cybercriminal’s ability to hide his identity.  By skillfully using a computer system, the cybercriminal has the ability to mask his identity or remain anonymous.[30]  If the law enforcement cannot identify the cybercriminal by the clues left in cyberspace, it may be extremely difficult to track the criminal.[31]  Because the cybercriminal can commit a crime without being present in a jurisdiction, the cybercrime scene has no physical boundaries[32] and leaves law enforcement with few, if any, physical leads as to the identity of the cybercriminal. Unlike the situation where a criminal’s location can be approximated by the distance that he could possibly have traveled since the crime occurred, cybercriminals have no effective limitation on their distance from the crime scene – even a second after the crime was committed.

{11}         The cybercriminal’s third ‘tool,’ his ability to increase criminal activity by striking multiple victims in multiple states, creates several problems.  Law enforcement must first determine whether domestic criminal laws are applicable to crimes committed by utilizing international data networks.[33]  If the domestic court system makes a determination that the laws are not applicable, an investigation may be inappropriate, as no domestic laws have been violated.  Even if the domestic criminal law applies, jurisdictional issues must still be addressed.[34]  If a perpetrator has committed crimes in more than one state, the home state must make a determination concerning extradition.  In a crime involving multiple victim states, a home state that is willing to extradite the accused must decide on one state to which to send the accused.  Conversely, a home state may be unable to extradite because the laws regarding cybercrimes vary substantially in the two states.[35]  In the case where extradition is not possible, the home state may have the option of prosecuting the accused if jurisdiction can be established by the presence of the accused in the home state.  This solution may not satisfy the victim, as the penalties for the cybercrime may be different in the home state and the victim state.  In addition, the victim may not believe that the same diligence will be used in the prosecution of the accused in the home state as would be used in the victim state.  The possibility also exists that the accused committed no crime according to the laws of the home state; thus, he would face no penalty for his activity.[36] 

{12}         While the term ‘cybercrime’ did not exist twenty years ago, today the number of attacks is increasing and the monetary damage from the crimes is staggering.  Cybercriminals are able to benefit from the use of their new ‘tools,’ while law enforcement is plagued with a host of new cyberproblems.  To even the playing field, law enforcement officials need increased police powers to combat the new ‘tools’ of cybercriminals.

III. TREATY ON CYBERCRIME

A. Draft 19: The First Publicly-Released Version of the Cybercrime Treaty[37]

{13}         Although no treaty is likely to address the full scope of the problems created by cybercriminals’ new ‘tools,’ the treaty drafted by the Council of Europe[38] endeavors to address several of the basic problems.  The Council of Europe first examined the problems associated with the international nature of cybercrimes when it drafted a 1995 paper recommending that states adopt laws regarding cybercrime.[39]  Realizing the need for a legally binding instrument, the Council of Europe began deliberations on the cybercrime treaty in 1997.[40]  The Council invited observers from Canada, Israel, Japan, South Africa, and the United States[41] to take part in the negotiations in the hopes that the resulting treaty would have international impact.[42]  The goal of these discussions was to create a cybercrime treaty which would “harmonize laws against hacking, fraud, computer viruses, child pornography and other Internet crimes”[43] as well as “make criminal investigations and proceedings concerning criminal offences related to computer systems and data more effective and to enable the collection of electronic evidence of a criminal offense.”[44]

{14}         In April 2000, after nearly three years of negotiations, the Council posted to its website the first publicly-released version of the proposed treaty.[45]  The proposed treaty addressed four principal areas: cybercrime, search and seizure, jurisdiction, and international cooperation.[46]  In the area of cybercrime, this draft of the treaty criminalized four categories of crime: access crimes, data crimes, systems crimes, and crimes involving “illegal devices.”[47]  The first category, access crimes, outlawed unauthorized access to data contained in a computer system and access to the computer system itself.[48]  Under this provision of the treaty, it would be possible for a cybercriminal to be convicted of both gaining access to a computer system where desired data was stored and obtaining the desired data.[49]  Data crimes, a second category of crime outlined in the treaty, made illegal the interception of data and interference with data.[50]  The definitions of the two data crimes provided in the draft make it unclear whether data theft,[51] the outright taking or copying for the cybercriminal’s use, was outlawed.  The third category, systems crimes, outlawed actions that intentionally hindered the functionality of a computer system.[52]  A clear example of such a violation is a denial of service attack.[53]  Less clear is whether the dissemination of a computer virus[54] or computer worm[55] would constitute a violation.  The final category of crime, “illegal devices,” made it a crime to produce, sell, or obtain for use any device created or changed to facilitate the commission of any of the crimes enumerated in the treaty.[56]  The illegal device provision raised the question as to how an individual who possessed a device could establish innocence.  The provision was written with the presumption that an individual who possessed a device had the intent to use the device to engage in a cybercrime.  Because the same devices are used by cybercriminals and by those employed to check the security of business systems, the presumed criminal intent was unfounded.[57] 

{15}         The cybercrime articles included in the draft shared several common characteristics.  First, the illegality of each crime was to be executed through the adoption of domestic legislation in each of the signator states.[58]  Second, the definition of each cybercrime was to include the requirements of  “intentionally” and “without right.”[59]  With the foregoing provisions, the treaty provided a framework to outlaw four categories of cybercrimes.

{16}         As the preamble of the proposed cybercrime treaty envisioned that one of the purposes of the instrument was as “an international agreement to regulate trans-border search and seizure,”[60] this draft of the treaty also addressed search and seizure issues.  The proposed treaty empowered law enforcement officials with the authority to search and seize data stored on computer systems, when such actions were taken as part of an investigation of cybercrime.[61]  As part of this search and seizure power, the treaty authorized the officials to retain copies of the data.[62]  Another power granted to law enforcement was the authority to order persons in its territory to produce specific computer data.[63]  In investigations where a lapse of time could lead to a loss of computer-stored evidence, the proposed treaty authorized law enforcement officials to expedite the preservation of stored data and of traffic data.[64]  As to stored data, expediting referred to shortening the time required to obtain a search and seizure warrant or a production order.  With traffic data, the draft authorized law enforcement officials to require that ISPs retain traffic related to a suspect.  In addition, the service provider was required to reveal enough of the traffic so that law enforcement officials could track the path by which the communication was transmitted. 

{17}         As was the case with the categories of cybercrime, the search and seizure articles shared several characteristics.  First, according to the proposed treaty, the provisions were to be implemented through domestic legislation in each of the signatory states.  Second, in an effort to address privacy concerns, each of the articles specifically provided that “the powers and procedures referred to in the present article shall be subject to conditions and safeguards as provided for under national law.”[65]  Third, conspicuously absent from the search and seizure provisions was any mention of a requirement for judicial review for particular applications of the new law enforcement authority.[66]  Without a judicial check on the power granted to law enforcement officials, individuals would have no guaranteed protection against abuses.  As such, the foregoing provisions outlined the search and seizure powers granted under the treaty.

{18}         Jurisdiction was the third area addressed by the treaty.[67]  According to the proposed treaty, jurisdiction was based either on territory or on the nationality of the accused.  The draft skirted the issue of whether the term “territory” applied to the state where the harm occurred or to the state where the perpetrator was located at the time that the cybercrime was committed. Instead of settling this issue, the treaty provided that disputes over jurisdiction should be decided between the states involved.  With the foregoing provisions, the drafters espoused a structure for jurisdictional concerns.

{19}         The fourth and final area addressed by the proposed treaty was international cooperation.[68]  Mutual cooperation for investigation of crimes was expected of states that became parties to the treaty.  The mutual cooperation article was vague as to the procedures that would be necessary to carry out the assisted investigation.  As to extradition, the draft ensured that either an existing instrument or this treaty could be used as the basis for extradition of a cybercriminal.  The foregoing provisions thus provided a skeletal plan for international cooperation.  As outlined in this section, the proposed treaty attempted to address the new 'tools' of cybercriminals by providing law enforcement with new powers to investigate the international nature of cybercrime.  The inadequacies of the proposed treaty, which have been suggested in this section, did not pass unnoticed for long.

B. The Outcry

{20}         Until the public release of the proposed treaty in April 2000, member delegations had worked in virtual secrecy on the negotiations.[69]  The Internet release of the treaty triggered angered outcries from more than 400 e-mailers[70] and garnered the condemnation of a coalition of 29 international cyber-rights organizations, which represented the views of privacy experts, data protection officials, and technical experts.[71]  In a letter to the Council of Europe, the Global Internet Liberty Campaign ("GILC")[72] outlined its concerns with the proposed treaty.[73]  Technical experts complained that the treaty’s broad provision concerning illegal devices[74] would criminalize possession of devises used by security practitioners, educators, and researchers to increase the security of computer systems.[75]  The concern centered on the fact that the devices used to ensure security within a system are the same ones utilized by hackers to gain unauthorized access to computer systems.[76]  Those involved in securing systems worried that the provision of the treaty outlawed possession of such devices without regard to their intended use.[77]  The coalition asserted that procedures for international investigations[78] had been omitted from the proposed treaty, and that such procedures should be agreed upon in order to ensure that a consistently high level of individual rights was maintained.[79]  As to search and seizure,[80] the coalition stated that the treaty lacked any assurance of an independent judicial review in particular instances were the search and seizure powers would be utilized.[81]  The treaty’s provisions pertaining to the preservation of Internet traffic and the review of the content of communications relating to an individual under investigation[82] raised a host of concerns.  For the ISPs, the requirement to preserve communications meant an increase in operating costs. Additional costs incurred by the ISPs would include the personnel hours and the storage space necessary to execute the requests of law enforcement.[83]  For the cyber-rights organizations involved in the coalition, the requirement that traffic and content information be made available to law enforcement raised substantial privacy concerns.  The coalition asserted that the treaty would encourage “inappropriate monitoring of private communications,”[84] which would violate accepted privacy norms.[85]  One of the specific worries was that inappropriate monitoring would lead to persecution of dissidents and minorities.[86]  In summing up their position, the coalition stated that the treaty improperly extended police power while failing to protect privacy of communication, freedom of expression, or criminal procedure protections, all of which are considered rights under the Universal Declaration of Human Rights.[87]

C. Draft 27: The Final Revision to the Treaty[88]

{21}         The criticism stunned the Council of Europe.[89]  Peter Csonka, deputy head of the Council of Europe’s economic crime division,[90] said, “We were surprised by the violence of these comments, . . . . We have learned we have to explain what we mean in plain language because legal terms are sometimes not clear.”[91]  Through a series of drafts, the Council worked to address the issues raised concerning illegal devices, procedural safeguards, and ISP retention of traffic[92] and content data.[93]  The drafters responded to the concern expressed by security personnel that the treaty criminalized the mere use of certain devises by adding a provision, which provided that those who possessed the devises without the intent of committing cybercrimes had not acted illegally.[94]  In an effort to avoid the increased criminalization feared by GILC, the drafters required that two types of intent be established for an individual to be convicted of the crime of misuse of devises.  The first type of intent was a general intent to engage in illegal activity.  Second, the specific intent to use the devise to commit one of four crimes outlined in the treaty – illegal access, illegal interception, data interference, or system interference – had to be established.[95]

{22}         With regards to criminal procedure issues, the drafters inserted an article requiring minimum safeguards to adequately protect human rights and liberties.[96]  The treaty required each state to ensure, through domestic legislation, independent supervision of the treaty power in question, justification of the use of the power, and a limitation on the scope and duration of the power.[97]  The decision as to which treaty powers are sufficiently intrusive to require the safeguards set out in the article was left to the respective states.[98]

{23}         To address the concerns pertaining to ISP retention of Internet traffic and content data, the drafters clarified the requirements by stipulating that the ISPs would only be asked to store specific data related to suspected crimes.[99]  In these provisions, however, the drafters did not limit the time period for which the ISPs would be required to retain traffic and content data concerning alleged crimes.  Although the drafters restricted the scope of the data to be maintained,[100] without a limitation concerning the time period for retention of data, ISPs could still incur significant business costs in adhering to the provisions of the treaty.[101]  In addition, when law enforcement officials engaged service providers to collect data, the requirement that the providers keep confidential the fact that data was being collected[102] put the ISPs at odds with the privacy interests of their customers.[103]

{24}         While three of the revisions made by the drafters addressed specific concerns regarding illegal devices, procedural safeguards, and ISPs’ retention of data, additional modifications to the treaty raised new issues.  The treaty itself unnecessarily created four sets of problems concerning sovereignty, jurisdiction, search and seizure of computer data, and international investigation.  In the arena of sovereignty, both the article concerning search and seizure and the article pertaining to trans-border access to data without consent[104] permit law enforcement officials to cross state boundaries without notifying or gaining permission from the intruded state.[105]  Although some experts argue, “[i]t may be legitimate and important for law enforcement to be allowed to conduct a remote search of computers in a foreign country,”[106] it is unclear why the drafters have allowed these intrusions of sovereignty when the treaty provides for mutual assistance between states and provides for expedited mutual assistance when necessary.

{25}         In the area of jurisdiction, the drafters failed to address the problems raised by the existence of cyberspace.[107]  No state has jurisdiction over cyberspace.[108]  Thus, jurisdiction cannot simply be based on the place where the cybercrime took place.  According to the treaty, jurisdiction was based primarily on territory and secondarily on nationality.[109]  In an instance where more than one state claimed jurisdiction over an alleged offense, the treaty provided for the states involved to decide the “most appropriate jurisdiction for prosecution.”[110]  The “most appropriate jurisdiction” clause will likely be much invoked because of the ambiguity in the meaning of territory-based jurisdiction.  The provision could be interpreted to provide jurisdiction to the state in which the perpetrator was located, as happened in the case of the I LOVE YOU virus where the Philippine government investigated the individual who released the virus from that state.[111]  Unfortunately, this provision could just as easily be interpreted to give jurisdiction to the state in which the damage from the attack occurred.  Alternatively, the provision could be construed to grant jurisdiction in either the host state or the victim state, with place of jurisdiction depending on the particular cybercrime at issue.[112]  The drafters made no attempt to solve this predicament.[113]  It is unclear why the drafters simply did not choose one of the above-mentioned meanings of the term ‘territory.’

{26}         In search and seizure of computer data, the drafters clarified those who are subject to orders that require production of specified computer data for use in law enforcement investigations.[114]  Under the newly crafted provision, any person physically located in the state or any service provider offering services within the state would be required to submit data requested by means of a production order.[115]  According to this language, production could be required from a computer outside the state so long as it belonged to an individual who was physically present in the state or to a service provider that provided services within the state.  A complimentary provision provided for search and seizure of stored computer data.[116]  The draft empowered competent authorities to search and seize computer data within the state.  Reading the two provisions together would allow for data produced from outside the state, pursuant to a production order, to be seized once in the state.

{27}         Generally speaking, the problems created by the treaty are unnecessary.  The treaty is intended to encourage uniform definitions of cybercrime and through such uniformity to enhance the ability of law enforcement to investigate these cybercrimes.  A carefully written treaty with well-defined provisions could have avoided much unnecessary confusion.  The question remains as to whether overall privacy concerns have been adequately addressed by the revisions to the treaty.  In international investigations, the drafters omitted any clear procedures that could have ensured high levels of protection for individual rights.[117]  In an effort to address broad privacy concerns, the “powers and procedures” provision of the articles on expedited preservation of stored computer data, expedited preservation and partial disclosure of traffic data, production orders, search and seizure of stored computer data, real-time collection of traffic data, and interception of content data are all “subject to Article 14 and 15.”[118]  These two articles provide that the powers and procedures are subject to the safeguards provided under domestic law and under applicable international human rights treaties.[119]  Thus, critical to an understanding of the privacy protections afforded by the treaty is knowledge of the safeguards provided by domestic law and by pertinent international human rights treaties.

IV. EXAMPLES OF PRIVACY PROTECTIONS PROVIDED UNDER DOMESTIC LAWS

A. Treaty Expected to Become International Standard

{28}         While the focus of the treaty is to increase police power to allow law enforcement officials to effectively battle the new ‘tools’ of cybercriminals, there is a concern that the increase in police power will not be properly rebalanced with the privacy rights of individuals.[120]  In an attempt to rebalance the scales between police power and privacy, the treaty protects privacy through safeguards provided under domestic laws and under applicable human rights treaties.  Because the first set of safeguards provided under the treaty are those found in domestic laws,[121] the first part of the answer to the question of whether the treaty adequately addresses Internet-Age privacy concerns must be found by examining domestic protections of privacy.

{29}         The key to understanding the privacy protections afforded by current domestic laws is two-fold, meaning that a recognition of the policies enacted in the states is needed as well as a grasp of the impact of each state’s policies when two or more states interact.  The policies adopted by states will first be examined to determine the goals that the state desires to further with its Internet crime control policy in addition to exploring the ability of the government to prosecute the crime and the capacity of the victim to recover for his losses.  The outcomes of interactions between states with differing levels of privacy protection will then be explored.

B. Three Examples of Southeast Asian States with Differing Levels of Privacy Protection

{30}         As it is not possible to examine every state, several states in Southeast Asia have been chosen to illustrate the overall approach to privacy protection afforded by the treaty.[122]  Three Southeast Asian states were selected to illustrate the first prong of the approach, privacy protection afforded by domestic laws.  Southeast Asian states were selected because their history of colonialism, which they subsequently replaced with emerging capitalist economies, represents the experience of many of the states that exist outside of Europe.[123]  Singapore, Thailand, and the Special Administrative Region of Hong Kong have been specifically chosen because each provides an example of a differing level of privacy protection.  For each of these three, Internet crime control policies will be examined.  The second prong of the approach, which examines the outcomes of the interactions between states with differing levels of privacy protection, will be illustrated with two hypothetical interactions between a European state and the three Southeast Asian states.

1. Singapore: An Example of a Low Level of Privacy Protection

{31}         The kind of society that a state supports determines the goals concerning privacy protection that underlie the Internet crime control policy of that state.[124]  Totalitarian states oppose privacy rights while liberal democratic systems support individual privacy rights and freedoms.[125]  These two abstract kinds of societies lie on opposite poles of the political spectrum.[126]  Singapore is known for its near totalitarian regime.  In support of the doctrine that the kind of society determines the level of privacy protection, Singapore has a reputation for aggressively using surveillance for social control.[127]  In its approach to Internet crime control, the goal of the government is to shield its citizens from any undesirable influences.[128]  In an effort to ensure government supervision of Internet usage, all ISPs are government-owned or government-controlled companies.[129]  The Telecommunications Authority of Singapore has extensive authority to monitor any activity considered to be a threat to national security.[130]  The Authority routinely monitors phone conversations and Internet use.[131]

{32}         Singapore has no constitutionally protected right to privacy against government acts.[132]  Although government officials are normally required to obtain court-issued search warrants, exceptions exist to this general warrant rule.  Law enforcement may search without a warrant if they believe the intrusion is necessary to preserve evidence and warrantless searches are permitted in drug-related and organized-crime-related incidents.[133]  Specific to Internet-related crime, the police do not need a warrant to search computers under the Electronic Transactions Act ("ETA").[134]

{33}         Singapore has passed criminal laws that enable the prosecution of perpetrators of Internet crime.  The Computer Misuse Act ("CMA")[135] prohibits unauthorized access to computer data, unauthorized modification of computer data, unauthorized obstruction of the use of computers, and unauthorized disclosure of access codes.[136]  The ETA imposes a duty of confidentiality on individuals who possess data obtained under the act and imposes sanctions for disclosing such data without authorization. [137] 

{34}         As to whether Singapore has jurisdiction over such crimes, the policy of Singapore is to extend the territorial principle[138] in cases where there is some nexus between the territory and the crime.[139]  In particular, the CMA grants to courts jurisdiction over anyone who commits a crime under the act.  Regardless of citizenship, the accused is treated as if he was in Singapore at the time of the incident or as if the computer, the program, or the data was in Singapore at the time of the incident.[140]

{35}         As to recovery of losses by the victim, no general data protection or privacy laws exist in Singapore.[141]  However, in association with criminal prosecution against businesses and rogue individuals, the CMA requires the perpetrator to pay compensation, which the victim can recover through civil debt procedures.[142]  Even in cases where a criminal prosecution was not achieved, the victim can sue the business or rogue individual based on tort law, in an action for breach of confidence.[143]  To be successful, the victim must establish that the data is not trivial, that he had a legitimate expectation of privacy in the data, and that the use of the data was unauthorized.[144] In Singapore, the government can prosecute cybercrime and the victim has a means to recover damages that result from the cybercrime.  As the goal of the Internet crime control policy is social control, Singapore is an example of a low level of privacy protection.

2. Thailand: An Example of a Intermediate Level of Privacy Protection

{36}         On the totalitarian/liberal democracy spectrum, Thailand falls into the middle of the range.  The government’s concerns over national security and public morals drive its privacy policies.[145]   On the privacy-of-communications front, Thailand’s Constitution provides for the protection of privacy.[146]  Specifically, the constitution stipulates a protection of communication. Although the state guarantees privacy by law, in reality privacy is not protected.  Activities such as illegal wiretapping are commonplace in Thailand.[147] As for protection against unreasonable government intrusion, in most instances, law enforcement officers are required to obtain a warrant prior to a search.  A major exception to this protection however allows police to issue warrants; such warrants are not subject to judicial review.[148]

{37}         Thailand is one of the world’s many countries that has no specific legislation on cybercrime.  This means that it would be difficult, if not impossible, to prosecute a perpetrator of cybercrime who was located in Thailand.[149]  Thailand has no specific laws that protect personal information.  This means that currently the victim could not recover for losses.  Realizing the need to “prevent misuse of information and give rights to data owners,” Thailand officials are finalizing a data protection law.[150]  In Thailand, the government has no means to prosecute cybercrime and the victim has no avenue to recover damages that result from the cybercrime. Because the goal of the Internet crime control policy is driven by concerns over morals but does not rise to the level of social control, Thailand is an example of an intermediate level of privacy protection.

3. Hong Kong: An Example of a High Level of Privacy Protection

{38}         On the political spectrum that ranges from totalitarian to liberal democracy, the Special Administrative Region of Hong Kong falls near the liberal democratic end.  Until 1997, Hong Kong was part of the British Commonwealth, mirroring many British traditions including democratically elected government officials and trial by jury.[151]  According to the Basic Law of Hong Kong, the agreement hammered out between Great Britain and China before the 1997 handover to China, Hong Kong’s form of government will remain unchanged until 2047.[152]  Hong Kong remains a party to the International Covenant on Civil and Political Rights; this treaty creates an international obligation for the government to protect privacy.[153]  Although there is some concern that the Chinese government will modify the policy,[154] Hong Kong’s general Internet policy is based on self-regulation and a concern for economic well-being.[155]  As to privacy of communications, the Basic Law of Hong Kong provides for privacy of communications.[156]  The law stipulates that this privacy can only be compromised through means of legal procedures that allow for protection of public security or investigation of criminal activity.[157]  With regard to government intrusion, police are required to obtain court-issued warrants before obtaining evidence.[158]

{39}         In the realm of Internet crime control policy, Hong Kong has enacted the Personal Data Privacy Act ("PDPA") that regulates the collection, use, and security of personal data.[159] The PDPA covers “any data relating directly or indirectly to a living individual” if from the data it is possible to ascertain the individual’s identity and if the data “is in a form in which access of processing is practicable.”[160]  The PDPA applies to any person who directs the collection, processing, or use of personal data.[161]  The PDPA applies to both public and private sectors, although many of the exceptions to the act apply primarily to the public sector.[162]  Under the PDPA, the government can prosecute cybercrime[163] and the victim has the ability to recover damages that result from the cybercrime.[164]  As the goal of Internet crime control is to root out crime without impinging on privacy protections, Hong Kong is an example of a high level of privacy protection.  In Southeast Asia, Hong Kong provides significant protections for individual privacy while Singapore and, to a more limited degree, Thailand support state control to the detriment of individual privacy protections.  As the Internet enables access across borders, there is a concern about how states with differing levels of privacy protections will interact under the cybercrime treaty.

C.  Interactions between Southeast Asian States and a European State

{40}         The critical question to determine in deciding if the cybercrime treaty adequately protects privacy through domestic laws is whether the outcomes from interactions between states enhance or at least maintain the protections currently afforded in the states involved.  In the following two hypotheticals, three Southeast Asian states will be examined in interaction with a European state.[165]  In each hypothetical, the relevant questions to be answered are whether the evidence can be gathered, whether the accused can be prosecuted in the state, and whether the victim can recover damages.  If the outcomes of these interactions enhance or at least maintain the protections currently afforded to privacy in the states involved, then the treaty has successfully increased police power while maintaining guarantees of privacy.

1. Hypothetical One: European Perpetrator and Southeast Asian Victims

{41}         In this first hypothetical, a European perpetrator has instigated a denial-of-service attack[166] affecting computer systems in Singapore, Thailand, and Hong Kong.  All three Southeast Asian states investigate with the aim of prosecuting the perpetrator.  Each state must determine if access to evidence is possible and subsequently if prosecution is possible.  In addition, a determination needs to be made as to whether the victim can recover for his losses.  Because the attack did not commence in Singapore, Thailand, or Hong Kong, under the cybercrime treaty the states can explore avenues to access information that both require[167] and do not require mutual assistance[168] from the European state.  As to those provisions that do not require mutual assistance, the production order provision of the treaty[169] provides that law enforcement may gain access to data that is outside their territory if the person who owns the computer is in their territory or if the ISP concerned provides service in their territory.  In this hypothetical, it is unlikely that the European perpetrator will travel to any of the effected Southeast Asian states.  The provision concerning ISPs,[170] however, may be helpful in certain states.  Singapore substantially restricts those who can operate ISPs in the state’s territory,[171] so it is unlikely that the European perpetrator utilized an ISP from which the Singapore authorities can obtain assistance.  The laws concerning ISPs in Thailand and Hong Kong are not so restrictive, so it is possible that the perpetrator will have utilized an ISP operating both in the victim state and in the European state.  Noting the likely sophistication of the cybercriminal, odds favor the fact that he will have used more than one ISP to instigate the attack.  If this is the case, then the authorities in Thailand and Hong Kong may be able to trace part of the path of the perpetrator, but will likely be frustrated once the perpetrator’s path switches to a second ISP.  Under the trans-border access provision of the treaty,[172] any of the three victim states can access information if it is publicly available on the Internet or if the perpetrator gives consent for the authorities to access the information.  It is unlikely that either of these conditions will be met.

{42}         Because it is unlikely that the above mentioned treaty articles will provide access to critical evidence, Singapore, Thailand, and Hong Kong may utilize the mutual assistance articles of the treaty.[173]  Singapore, Thailand, and Hong Kong will be required to satisfy the conditions provided for by the law of the European state, the state from whom the information is requested.[174]  The laws of the European state require a warrant for search and seizure.  Hong Kong easily meets this standard, as their domestic laws require court-issued warrants.[175]  It is unclear whether Thailand’s normal procedure in search and seizure cases would meet the requirement of the European state. Thailand’s laws require a warrant before the search and seizure is undertaken, but in many cases the police issue the warrant.[176]  Thai officials may be required to secure a warrant from a judge – a process not provided for under their domestic law.  The Singapore situation is also complicated.  Under the ETA,[177] no warrant is required in Internet cases.  Regardless of this domestic law, Singapore officials may be required to secure a warrant from a judge in order to benefit from mutual assistance.

{43}         As to collecting evidence, it is likely that Thailand and Hong Kong could retrieve data from an ISP, but less likely that the ISP used by the European perpetrator would have been one who operated in Singapore – thus decreasing the likelihood that Singapore authorities would obtain useful information from a Singapore-affiliated ISP.  As for mutual assistance, Hong Kong could easily obtain mutual assistance from the European state, while Thailand and Singapore could face potentially irreconcilable complications. 

{44}         If the investigations were successful, each of the victim states would desire to prosecute the European perpetrator.  To do so, the individual state must have a domestic law that outlaws the specific activity in question.  Thus, Thailand could not prosecute until after such time as it adopted cybercrime legislation.  Because Thailand has no laws under which to prosecute, it would have to request that the European state prosecute and argue that jurisdiction was proper for the European state because the perpetrator was physically located there.[178]  In contrast, Hong Kong could prosecute under the PPDA[179] and Singapore could prosecute the perpetrator under the CMA.[180]  To proceed with prosecution, Hong Kong and Singapore would need to establish jurisdiction over the European perpetrator.  Under the cybercrime treaty, jurisdiction is conferred by territory,[181] among other provisions.  Hong Kong would have to argue that this provision refers to the territory where the damage occurred.[182]  Singapore would site the CMA,[183] which clarifies any jurisdictional confusion by stating that jurisdiction extends to anyone who commits a crime under the act.  As to prosecution, Thailand could not prosecute while Hong Kong and Singapore could prosecute, if they could establish jurisdiction.

{45}         Regarding recovery of damages by the victim, the victim could not currently recover in Thailand because the state has no laws concerning recover for damages incurred as a result of Internet crimes. In Hong Kong, the victim has the ability to recover damages under the PDPA.[184]  In Singapore, the victim could recover under the CMA.[185] Thus, the victim in Thailand could not recover for damages while a victim in Hong Kong or Singapore likely could recover.  As is demonstrated by this hypothetical, the outcomes under the treaty would vary greatly based on the domestic laws in the states.

2. Hypothetical Two: Southeast Asian Perpetrators and European Victim

{46}         In the second hypothetical, a European person has been the victim of cybertheft at the hands of three Southeast Asian perpetrators – one from Singapore, one from Thailand, and one from Hong Kong.  The European state wants to investigate with the aim of prosecuting the perpetrator.  First, the European state must determine if access to evidence is possible.  Next, the state must decide if prosecution is viable.  In addition, a determination needs to be made as to whether the victim can recover damages.

{47}         While the European state faces the same basic problems as those faced by the victim states in first hypothetical, the mutual assistance request sheds light on a particularly illuminating result that arises under the treaty.  When requesting mutual assistance, the European state will be required to satisfy the conditions provided for by the law of the state from which it is requesting assistance.[186]  The European state will successful meet the requirements of Hong Kong’s domestic laws because both the European state and Hong Kong require court-issued warrants.[187]  In requesting information from Thailand and Singapore, the European state will encounter a troublesome situation for privacy advocates.  Thailand does not require a court-issued warrant[188] and Singapore requires no search warrant.[189]  Thus, the European state would not be required to procure a search warrant to obtain information from Thailand or Singapore.

{48}         This second hypothetical highlights the problems associated with the treaty utilizing safeguards provided under domestic laws.  As privacy advocates have lamented, the treaty lacks necessary search and seizure procedural safeguards.[190]  By requiring no specified procedures in trans-border search and seizure, the treaty allows the European state to benefit from investigations undertaken without protections that would be required if the search were undertaken in the European state.  The lack of required search and seizure procedures may allow a ‘race to the bottom’ in regards to protection of privacy.  Because the outcome of an interaction between states with differing levels of domestic privacy protection likely decreases the currently provided protection in at least some of the states involved, the treaty has not successfully maintained, much less increased, guarantees of privacy while increasing police power.

V. WHY THE OUTCRY OVER PRIVACY AND WHY IT IS LIKELY TO CONTINUE

A. Current International Concept of Privacy

{49}         Because the treaty affords the protections found in domestic laws as well as the protections found in international treaties, the second set of safeguards examined are provided by relevant human rights treaties.  To appreciate the protections provided by international treaties, one must grasp the meaning of the term privacy and understand the specific aspects of privacy granted protection under international law.  Alan Westin, one of the world’s foremost authorities on privacy, explains privacy as “the voluntary and temporary withdrawal of a person from the general society through physical or psychological means . . .”[191]  In the legal realm, this equates to “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.”[192]  Due to the multi-faceted nature of the legal term, privacy has been divided into four general categories: privacy of association, privacy in making intimate decisions, privacy from unwanted intrusions, and privacy of personal information.[193]  Associational privacy is freedom from interference of relationships with individuals or groups.[194]  Decisional privacy involves freedom from interference in intimate personal decisions.[195]  Privacy from unwanted intrusions relates to physical and electronic invasion.[196]  Privacy of personal information concerns “the rights of individuals to control information about themselves.”[197]

{50}         The current international understanding of privacy encompasses the protections secured in the Universal Declaration of Human Rights ("UDHR") and in the International Covenant on Civil and Political Rights ("ICCPR").[198]  Under the UDHR, privacy of communication, freedom of expression, and criminal procedure protections are secured.[199]  Privacy of communication is protected from arbitrary government interference.[200]  As to freedom of expression, the UDHR protects an individual’s right to hold a belief and to exchange information and ideas through any media.[201]  In the area of criminal procedure protections, the UDHR protects individuals from arbitrary arrest and detention.[202]  The ICCPR clarifies the general guidelines of privacy put forth in the UDHR.[203]  In the ICCPR, communications are protected primarily from divulgence to anyone but the intended recipient and against interruption or interference.[204]  The safeguards only apply to “arbitrary or unlawful” interference.[205]  According to the ICCPR, freedom of expression is protected “regardless of frontiers.”[206]  However, special responsibilities are attached to the rights associated with freedom of expression, meaning that the rights may be restricted under certain circumstances.[207]  Approved justifications for governments to implement laws to restrict freedom of expression include protection of national security or public order and respect for the rights of others.[208]  In the criminal procedure arena, pertinent protections in the ICCPR pertain to lawful arrests, judicial control for criminal procedures concerning arrests, and judicial review of the legality of arrests.[209] This means judicial review ensures privacy protection against unreasonable intrusions by government actors engaged in investigation or arrest activities.  The General Assembly of the United Nations made the provisions of the ICCPR applicable to violations by governments, businesses, and rogue individuals.[210]

{51}            When examined in light of the categories of privacy introduced at the beginning of the section, the international understanding of privacy touches all the categories but does not provide full coverage to the ideas encompassed in the categories.  Both privacy of communication and freedom of expression provide some protection in the area of associational privacy by allowing an individual to maintain secret communications with groups or individuals disfavored by governments.  Decisional privacy is peripherally guarded by freedom of expression because this protection allows an individual to receive or impart information concerning a sensitive decision.  Privacy of communication provides some protection in the area of privacy of personal information by guarding communications from interruption or interference as well as keeping the communications from anyone except the intended recipient.  Criminal procedure protections provide defense from unwanted intrusions and protect personal information by limiting a government’s ability to intrude upon personal information. (See Chart 1.)

B. Privacy Concept in the Internet Age

{52}         In revisions to the treaty, the drafters added a provision that would guard human rights in accordance with currently existing protections provided in international treaties.[211] Those involved with GILC envisioned a “forward-looking” interpretation[212] of these international instruments, arguing the privacy of communication, freedom of expression, and criminal procedure protections extend to cyberspace.[213]  The problem with this “forward-looking” assessment by members of GILC is that the philosophers and diplomats whose ideas shaped the current international standard did not and could not consider the vast privacy concerns associated with the Internet. 

{53}         These privacy concerns center on the collection and possible misuse of data.[214]  The potential opportunities to exploit data are growing exponentially because technological developments are lowering the cost of data collection and surveillance while increasing the quality and quantity of the data.[215]  In this Age of the Internet, consumers are concerned that governments are selling personal information – ranging from driver’s license data, to health records, to tax documents – to make a profit[216] and that e-companies are using consumer preferences for business advantages.  In essence, the all-seeing eye from George Orwell’s 1984 “need not necessarily belong to the government, as many in the private sector find it valuable to conduct various forms of surveillance or to ‘mine’ data collected by others.”[217]  Today’s privacy concerns encompass violations from governments, businesses, and rogue individuals.[218]

{54}              The drafters of this treaty had the opportunity to address this monumental development in the privacy arena by requiring signatory states to adopt new domestic laws guaranteeing privacy rights against governments, businesses, and rogue individuals.  Although the rights would vary from state to state, this could have been a major step in protecting informational privacy,[219] which is as critically important in the Internet Age as the ability to prosecute cybercrimes.

VI. SOLUTIONS FOR BALANCING THE SCALES BETWEEN POLICE POWER AND PRIVACY

{55}         The cybercrime treaty addresses the need to expand police power in an age when one individual in the Philippines unleashed a computer virus[220] that succeeded in creating $8 billion worth of damage to computer systems around the world.[221]  The treaty, however, creates an imbalance in the scales that weigh police power and privacy by introducing new procedural powers for police to search and seize computer data, to investigate cybercrimes outside their state, and to receive mutual assistance in cross-border investigations, without increasing protection for personal privacy.[222]  Although the drafters of the treaty were “mindful of the need to ensure a proper balance between the interests of law enforcement and respect for fundamental human rights,”[223] the treaty largely sidesteps this balancing act by failing to address protection of privacy in the Age of the Internet.

A. The Theoretical Answer

{56}         To understand the missed opportunity to increase privacy protection, it is necessary to examine an Internet-Age concept of privacy – informational privacy.  While the general concept of privacy encompasses associational privacy,[224] decisional privacy,[225] privacy from unwanted intrusions,[226] and privacy of personal information,[227] informational privacy focuses only on the last two of these classifications.  Today’s most talked about privacy violations are those where

{57}         e-mails are obtained by governments and where clickstreams[228] are tracked by businesses.  These are violations related to how information was obtained; in these examples, information was obtained by means of unwanted electronic intrusions.  In most instances, the person whose privacy was violated generated the data that was later captured.  In the government invasion, the person had written the e-mails.  When the business intruded, the person had created a clickstream as he viewed numerous webpages.  These unwanted electronic invasions are one type of violation of a person’s privacy.  Violations related to privacy of personal information are a second type common in the Internet Age; these violations pertain to a person’s ability to control how information about him is used.  In this category, the information may or may not have been generated by the person.  An example of personal information not generated by the individual is a social security number.  The number is assigned by the government, yet is considered to be personal information that helps to verify the identification of the individual.  In this category of privacy, the information may or may not be physically controlled by the individual.  An example of information not held by the person is the record of an individual’s bank account, which is stored on the bank’s computer system.  These foregoing examples sketch an outline of aspects of informational privacy that could have been protected by the treaty.

{58}         Because informational privacy may be violated by governments as well as by businesses and rogue individuals, the concept may be divided into four categories – privacy from unwanted intrusions by governments, privacy of personal information against governments, privacy from unwanted intrusions by businesses and rogue individuals, and privacy of personal information against businesses and rogue individuals.  (See Chart 2.)  For each of these categories, a prominent U.S. legal scholar has written a forward-looking account that provides insight into the concept of informational privacy in the Internet Age.[229]

{59}         Justice Louis Brandeis addressed the issue of privacy from unwanted government intrusion in a U.S. Supreme Court case concerning whether such privacy protection extended to invasions that were not physical in nature.[230]  Arguing in his famous 1928 Olmstead dissent[231] that the protection did indeed extend to non-physical invasions, Brandeis asserted, “It is not . . the rummaging of his drawers that constitutes the offense, but it is the invasion of his indefeasible right of personal security, personal liberty and private property . . .”[232] Brandeis contended that the individual should be protected from any form of unreasonable government intrusion because the privacy protection stemmed from a person’s most basic right, the right to be left alone.[233]  He argued that government violated this fundamental right of privacy with every unjustified intrusion, regardless of the means that might be developed to effectuate the invasion.[234]  In the dissent, Brandeis’ foreshadowed government invasion of e-mail messages by suggesting that, in the future, the government would be able to reproduce personal information in court without removing the papers from the person’s house.[235]  Brandeis’ forward-looking legal thinking laid the groundwork for the assertion that individuals have a right against unreasonable electronic intrusion by government.[236]

{60}         A second category of informational privacy focuses on yet another right against unreasonable government imposition.  Justice William Brennan discussed this second category, privacy of personal information against government, in his dissent in the 1976 U.S. Supreme Court case of United States v. Miller.[237]  The case centered on whether the defendant had a right of privacy in personal information that was not under his physical control; in this case the data had been technologically captured[238] in bank records.[239]  Even though the individual had physically released the information from his control, Brennan argued that the defendant had a reasonable expectation that the data would remain confidential between the bank and him,[240] unless the government provided sufficient documentation to garner a warrant or subpoena.[241]  Brennan warned that the door had been opened for abuse of government power because the Court had affirmed the government’s obtaining the information at issue without first demonstrating to a judicial official the need for such information.[242]  His concern was that unfettered government access to personal information could be used to create a “virtual . . . biography,” which could reveal “many aspects of . . . [a person’s] affairs, opinions, habits, and associations.”[243]  Brennan advocated for a right against unreasonable invasion of personal information by government.

{61}         While forward-looking discussions of the two categories of informational privacy that address government violations arose in U.S. Supreme Court cases, discussions of these categories of informational privacy in relation to violations by businesses and rogue individuals appeared in two preeminent journal articles.  In an influential piece on privacy, William Prosser[244] explained the tort of unwanted intrusion by businesses and rogue individuals.[245] Prosser agreed with Brandeis’ assertion that the invasion need not be physical in nature[246] and outlined a two-part test for violation of the tort.  First, he asserted that there must be prying, meaning that the intrusion must be of a nature that would be offensive to a reasonable person.[247]  The second requirement explained by Prosser was that the information at issue must be entitled to be private, meaning that there be no legal requirement that it be public and that it not be public information.[248]  Prosser’s work advocated for the torts of privacy, particularly the tort of unwanted intrusion by businesses and rogue individuals.

{62}         Louis Brandeis and Samuel Warren wrote the seminal article on the issue of privacy in 1890.[249]  Brandeis and Warren spoke of the right to keep information about oneself out of the public eye.[250]  Although much of the focus was on publicity afforded to the creations of an author,[251] Brandeis and Warren stepped beyond this narrow focus.  The two declared that protection should be afforded to information that concerns the “private life, habits, acts, and relations of an individual.”[252]  Their advocacy was for the protection of privacy of personal information against businesses and rogue individuals.  In their scheme, recovery from businesses and rogue individuals would be provided through tort law.[253]  The outcome of the tort action would be driven by the facts of the specific case[254] and would be balanced against the demands of public welfare and private justice.[255]  As in the case of unwanted invasion by government, Brandeis envisioned privacy of personal information as part of “the more general right of the individual to be let alone.”[256] 

{63}         While Brandeis linked the differing aspects of privacy under the umbrella term of the right “to be let alone,”[257] this section has laid out the aspects of another umbrella term, informational privacy.  In the preceding paragraphs, protection of informational privacy from violation by government has been explored as a right[258] while tort law[259] has been examined as a means to address violations by businesses and rogue individuals.  Unfortunately, the drafters of the treaty simply failed to address any protection of informational privacy.

B. The Practical Balancing Act

{64}         The particular increase in government police power provided for under the treaty will result in the loss of particular types of privacy for all individuals.  Under the treaty, an individual’s expectation of privately storing data in computer systems will be lessened because such data will be available for search and seizure in criminal investigations.[260]  Anonymity of communications will also likely be compromised.  To rebalance the scales between police power and privacy, a guaranteed protection of individual privacy needs to offset the increase in police power.  As additional police power was called for because of the nature of the Internet, an increase in privacy protection is warranted in Internet-related activity to rebalance the police power/privacy scales.  Particularly, the offsetting measure should involve increased informational privacy protection for individuals against unwanted invasion, whether by governments, businesses, or rogue individuals.

{65}         While the ideal solution to the issue of informational privacy would be for all states to adopt domestic legislation that protected individuals from unreasonable invasions by governments, businesses, and rogue individuals, it is impractical to believe that every state would currently adopt such a policy.[261]  The best alternative available would have been for the drafters to have advocated for increased privacy protections in those states that were willing to adopt an informational privacy system while assuring that at least some minimal protections were guaranteed in all states that become parties to the cybercrime treaty.

{66}         In those states that are interested in protecting informational privacy, a system that provides a remedy for invasion would best protect the individual.  While some argue that the content of cyberspace should be regulated,[262] it makes little sense to argue for such a scheme when discussing personal data.  Personal data may be used in as many ways that may benefit the individual as that may harm the individual.  Thus, to require that personal data be removed from cyberspace would create an unmanageable system.  Instead, the individual should be guaranteed the right to pursue legal action against governments, businesses, and rogue individuals when personal information is used in unacceptable ways.[263]  The particulars of this system would be developed through domestic law.

{67}         For those states that are not willing to guarantee this level of informational privacy, the treaty should have, nonetheless, required some level of protection.  Henrik Kaspersen, chairman of the Committee on Experts on Crime in Cyber-Space for the Council of Europe, explained that the drafters did not want to leave privacy out of the treaty but found it impossible to include one international standard for privacy protection.[264]  As such, the goal should not been one world standard but an incremental increase from the level of informational privacy protection currently provided by each state.  This increase in informational privacy would have been an important step in rebalancing the police power and privacy scales of justice.

VII. CONCLUSION

{68}         Today, cyberspace allows for many of the same activities as Main Street.  Individuals can engage in cybershopping, cyberdating, and cyberlearning.  As with Main Street, however, there is also a sinister element at work that is engaged in cybertheft, cyberfraud, and cyberdamage.  To deal with these new cybercrimes, law enforcement officials require increased powers to investigate crimes involving computers systems.  The cybercrime treaty will provide law enforcement with these needed powers.  Such an increase in police power raises concerns about privacy protections.  A treaty provision that ensured an incremental increase in informational privacy would have been an important step in allaying privacy concerns.  As the treaty stands, individuals must rely on domestic laws and international treaties for protection. Without new domestic laws and revitalized interpretations of old international human rights treaties, the provided protections may prove to be paltry.



ENDNOTES

* Ms. Kennedy graduated from Emory University School of Law in December 2001 and is a licensed attorney in Georgia. She has served as the Atlanta bureau chief for The Internet Law Journal and has worked as a research assistant for the Center for Social and Legal Research, a non-profit organization focused on privacy issues.

[1] See CBS News Online, Love Bug Suspect Off the Hook, at http://www.cbsnews.com/stories/2000/08/21/tech/main226472.shtml (Aug. 21, 2000).

[2] See generally Jay Krasovec, Cyberspace: The Final Frontier, for Regulation?, 31 AKRON L. REV. 101, 103 n.1 (1997) (defining cyberspace generically “to encompass the use of electronic communications over computer networks mainly via the Internet”).

[3] Susan Gindin, Lost and Found in Cyberspace: Informational Privacy in the Age of the Internet, 34 SAN DIEGO L. REV. 1153 (1997) (using term from title of Gindin’s article).

[4] See generally James Evans, Cyber-Crime Laws Emerge, but Slowly, IDG.net, available at http://www.cnn.com/2000/TECH/computing/07/05/cyber.laws.idg/ (July 5, 2000) (describing how the "I Love You" virus brought attention to the need for domestic cybercrime laws).

[5] See Gavin Skok, Establishing a Legitimate Expectation of Privacy in Clickstream Data, 6 MICH. TELECOMM. & TECH. L. REV. 61, 61 (1999/2000) (explaining that the “prying eyes” concept refers to those who track individuals’ activities on the Internet).

[6] The draft released was number 19. Crime in Cyberspace: First Draft of International Conventional Released for Public Discussion, at http://conventions.coe.int/Treaty/EN/ (criminalizing illegal access, interception, or interference with computer systems) [hereinafter Convention Draft].

[7] Juliana Gruenwald, Europeans Defining the Long Arm of The Cyberlaw, at http://news.zdnet.co.uk/story/0,,s2081836,00.html (Sept. 25, 2000)(on file with the Richmond Journal of Law & Technology) (noting that the treaty requires states to “provide law enforcement authorities with the ability to conduct computer searches and seize computer data”); see also Convention Draft, supra note 6 (subjecting treaty powers to conditions and safeguards as provided for under national law).

[8] See, e.g., LIBERATING CYBERSPACE: CIVIL LIBERTIES, HUMAN RIGHTS AND THE INTERNET 2 (Liberty ed., 1999) (“Can the requirements of law enforcement be reconciled with individuals’ right to privacy?”).  Note that technological possibilities that would theoretically guarantee complete personal privacy would also likely prevent law enforcement from tracing crimes related to such information.  See Toby Lester, The Reinvention of Privacy, THE ATLANTIC MONTHLY, Mar. 1, 2001, at 27 (detailing a piece of software that would allow the user to conduct business on the Internet in an anonymous way, to the extent that the provider would not have the names of the user to provide if subpoenaed).

[9] See ALAN F. WESTIN, PRIVACY AND FREEDOM 367 (Atheneum 1967) (detailing privacy concerns in the Information Age); see also Lester, supra note 8, at 27 (discussing the forward looking nature of the 1967 privacy book by Westin).  The argument for protection of privacy assumes that individuals have an expectation of privacy concerning personal information, but that this expectation has, for the most part, not been protected by law.  See LIBERATING CYBERSPACE: CIVIL LIBERTIES, HUMAN RIGHTS AND THE INTERNET 6 (Liberty ed., 1999).

[10] The term ‘hacking’ is somewhat confusing because people use the term to refer to different types of activities.  A comprehensive definition of hacking includes numerous aspects of the term.  A hacker is “[a] person who enjoys exploring the details of computers and how to stretch their capabilities.” Sans Institute Resources, NSA Glossary of Terms Used in Security and Intrusion Detection, at http://www.sans.org/newlook/resources/glossary.htm (Apr. 1998).   A hacker is “[a] malicious or inquisitive meddler who tries to discover information by poking around.” Id.  A hacker is “[a] person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn on the minimum necessary.” Id.

[11] A virus is “[a] program or piece of code that is loaded onto [a] computer without [the user’s] knowledge and runs against [the user’s] wishes.” Webopedia, at http://webopedia.internet.com/TERM/v/virus.html (last modified Feb. 5, 2002).

[12] David Goldstone & Betty-Ellen Shave, International Dimensions of Crimes in Cyberspace, 22 FORDHAM INT’L L.J. 1924, 1925 (1999); Skok, supra note 5, at 68 n.23.

[13] In most instances, commentators distinguish juvenile cybercriminals, who are believed to be acting mischievously but not maliciously, from advanced criminals, who are expected to cause serious consequences by their actions. MODEL CODE OF CYBERCRIMES INVESITIGATIVE PROCEDURE Art. 1, § 2(c), at http://cybercrimes.net/MCCIP/art1.htm (2001).

[14] See id.

[15] See id.

[16] See id.

[17] See id.

[18] See id.

[19] See id.

[20] U. Sieber, Computer Crime and Criminal Information Law – New Trends in the International Risk and Information Society, Section E, Criminal Procedural Law, at  http://www.uplink.com.au/lawlibrary/Documents/Docs/Doc122.html (last visited Sept. 17, 2002) (on file with the Richmond Journal of Law & Technology).

[21] Goldstone & Shave, supra note 12, at 1925.

[22] See id.

[23] See id.

[24] See id.

[25] Sieber, supra note 20. 

[26] Goldstone & Shave, supra note 12, at 1937-38.

[27] Id. at 1937.

[28] One of the two forms of encryption is public-key encryption. Public-key encryption is “[a] cryptographic system that uses two keys – a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it. An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the public key.  Webopedia, at http://webopedia.internet.com/TERM/p/public_key_cryptography.html (last modified Oct. 29, 2001).

[29] Interview with Bill Thompson, Internet Privacy and Security Issues Expert for Special Services Group, in Atlanta, Ga. (Sept. 15, 2000); see also Sieber, supra note 20.

[30] The cybercriminal is able to remain anonymous not because the technology does not exist to track him, but because the resources needed to train and fund law enforcement in tracing techniques are generally not adequate.  Interview with Bill Thompson, Internet Privacy and Security Issues Expert for Special Services Group, in Atlanta, Ga. (Sept. 15, 2000). 

[31] Goldstone & Shave, supra note 12, at 1937. see also Nan Hunter, et al., Contemporary Challenges to Privacy Rights, 43 N.Y.L. SCH. L. REV. 195, 198 (1999).

[32] See MODEL CODE OF CYBERCRIMES INVESITIGATIVE PROCEDURE Art. VII, at http://cybercrimes.net/MCCIP/art7.htm (2001) (obtaining evidence - search and seizure).

[33] Seiber, supra note 20.

[34] Goldstone & Shave, supra note 12, at 1938-39.

[35] Id.

[36] “In addition to the formal concerns related to substantive laws and procedural laws, international computer crime investigations are hampered by a variety of operational issues.” Id. at 1939.  These concerns include: “expertise and coordination,” “communication,” and “timeliness.” Id.; see also Cybercrime Part II – Law Enforcement Challenges, 54 MISPHAT CYBERLAW INFORMER, at http://mishpat.net/cyberlaw/archive/cyberlaw54.shtml (last visited Sept. 20, 2001).

[37] In April 2000, the treaty was released to the public via the Website of the Council of Europe. Drafters of the treaty had been working on the project since May 1997.  Reuters, Cybercrime Treaty Gets a Makeover, available at http://news.zdnet.co.uk/story/0,,s2082557,00.html (Nov. 14, 2000).

[38] The Council of Europe is a “41-nation human rights watchdog.” Id.

[39] Gruenwald, supra note 9 (describing reaction to the release of Draft 19).  As noted in Part I of the paper, problems associated with the international nature of the crimes include the cooperation needed between states to adequately investigate such crimes and the hurdles created when the activity is not illegal in one of the states involved. 

[40] Id. 

[41] Evans, supra note 4.

[42] The council included these additional countries because of the high level of Internet activity in each country. Eighty percent of the world's Internet traffic emanates from the states participating in the negotiations. Reuters, Cybercrime Treaty Gets a Makeover, available at http://news.zdnet.co.uk/story/0,,s2082557,00.html (Nov. 14, 2000).

[43] Id.

[44] Preamble, Final Draft Convention on Cyber-crime,  at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[45] Convention Draft, supra note 6. The final draft is available at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[46] In this paper, I have omitted discussion of Offenses Related to Child Pornography (Article 9), Intellectual Property (Article 10), Attempt and Aiding and Abetting (Article 11), and Corporate Liability (Article 12).  Id.

[47] For a definition of “illegal devices,” see infra note 57.  Similar categories are also used in a report compiled by McConnell International concerning the state of cybercrime laws throughout the world.  This report divided cybercrime into the categories of data crimes, network crimes, access crimes, and related crimes. The data crimes category included data interception, data modification, and data theft. Included in the network crimes category were network interference and network sabotage. The access crimes category included unauthorized access and virus dissemination. Included in the related crimes category were aiding and abetting cybercrimes, computer-related forgery, and computer-related fraud. MCCONNELL INT’L, CYBER CRIME… AND PUNISHMENT? ARCHAIC LAWS THREATEN GLOBAL INFORMATION, at http://www.mcconnellinternational.com/services/CyberCrime.htm (Dec. 2000).

[48] Article 2 defined illegal access as “intentional[] . . . access to the whole or any part of a computer system without right.” Convention Draft, supra note 6.

[49] Because the particulars of the offenses are enacted through domestic legislation, the act of breaching the system and the act of obtaining the data might or might not both be illegal in a particular state.

[50] Article 3 defined illegal interception as “intentional[] . . . interception without right, made by technical means, of non-public transmissions of computer data to, from or within a computer system, as well as electromagnetic emissions from a computer system carrying such data.” Article 4 defined data interference as “intentional[] . . . damaging, deletion, deterioration, alteration, or suppression of computer data without right.” Convention Draft, supra note 6.

[51] MCCONNELL INT’L, CYBER CRIME… AND PUNISHMENT? ARCHAIC LAWS THREATEN GLOBAL INFORMATION, at http://www.mcconnellinternational.com/services/CyberCrime.htm (Dec. 2000).

[52] Article 5 defined system interference as “intentional[]…serious hindering without right of the functioning of a computer system by inputting, damaging, deleting, deteriorating, altering or suppressing computer data.” Convention Draft, supra note 46.

[53] A denial of service attack is “a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic.” Webopedia, at http://webopedia.internet.com/TERM/D/DoS_attack.html (last modified Feb. 6, 2002).

[54] A computer virus is “an insidious piece of computer code written to damage systems. Viruses can be hidden in executable program files posted online.” Netdictionary, at  http://www.netdictionary.com/html/v.html (last visited Sept. 20, 2001).

[55] A computer worm is “an insidious and usually illegal computer program that is designed to replicate itself over a network for the purpose of causing harm and/or destruction. While a virus is designed to invade a single computer's hard drive, a worm is designed to invade a network. The most infamous worm was created by Robert Tappan Morris in November 1988; it infiltrated over 6,000 network systems around the globe.” Netdictionary, at http://www.netdictionary.com/html/w.html (last visited Sept. 20, 2001).

[56] Article 6 defined an illegal device as “a device . . . [used] for the purpose of committing any of the offenses established in accordance with Article 2-5.” MCCONNELL, supra note 47.

[57] Brian Krebs, Tech Groups Still Wary of International Cyber-Crime Treaty, at http://www.newsbytes.com/news/00/158848.html (last modified Dec. 1, 2000) (on file with the Richmond Journal of Law & Technology) (covering the continuing concerns of security professionals over the illegal devices provision of the cybercrime treaty even after revisions attempted to address the perceived problem). 

[58] Convention Draft, supra note 6.

[59] “Without right” is not fully defined in Articles 2-6. The draft provided the option for the state to add the requirement of dishonest intent to the criminal definition. Convention Draft, supra note 6.

[60] Convention Draft, supra note 6 (draft number 19).  

[61] Article 14 of draft number 19 “empower[ed] competent authorities to search or similarly access a computer system . . . and computer data stored therein.” In the article, the “competent authorities” were empowered to “seize or similarly secure computer data accessed . . . in view of their possible use in criminal investigations and proceedings.” Convention Draft, supra note 6.

[62] In addition to seizure, Article 14 of draft number 19 authorized “mak[ing] and retain[ing] a copy of those computer data” and “render[ing] inaccessible or remov[ing] those computer data.” Convention Draft, supra note 6.

[63] Article 15 of draft number 19 authorized “competent authorities to order a person in its territory . . . to submit specified computer data under this person’s control.” Convention Draft, supra note 6.

[64] Article 16 of draft number 19 enabled “competent authorities to order . . . the expeditious preservation of data that is stored by means of a computer system, at least where there are grounds to believe that the data . . . is [] particularly vulnerable to loss or modification.” Article 17 of the same draft “ensure[d] the expeditious preservation of [] traffic data [concerning a specific communication], regardless of whether one or more service providers were involved in the transmission of that communication.”  Convention Draft, supra note 6.

[65] Convention Draft, supra note 6.

[66] Margret Johnston, US Companies Find Europe’s Cyber Crime Treaty Too Vague: Americans Fear Individual Countries’ Due-Process Laws Could be Violated, IDG News Service, at http://www.e-businessworld.com/english/crd_treaty_321309.html (Dec. 8, 2000)(on file with the Richmond Journal of Law & Technology) (detailing concerns by US companies that cybercrime treaty has provisions that may cause harm to those with no intention of breaking the law).

[67] Article 19 of draft number 19 provided that a state had jurisdiction “when an offense [was] committed in whole or in part in its territory, or on a ship, an aircraft, or a satellite flying its flag or registered in that Party, or by one of its nationals.” The article stated that it did “not exclude any criminal jurisdiction exercised in accordance with national law.” Convention Draft, supra note 6.

[68] Article 20 in draft 19 provided for the “application of relevant international instruments on international co-operation in criminal matters.”  Article 21 concerned extradition. It stated that the criminal offences established in the treaty “shall be deemed as extraditable offences in any extradition treaty” existing between parties and for parties that do not have an extradition treaty the cybercrime treaty may be considered the basis for extradition. Article 22 provided for mutual assistance. In particular, the article provides for “mutual assistance to the widest extent possible for the purpose of investigations and proceedings concerning criminal offences relating to computer systems and data, or for the collection of electronic evidence of a criminal offence.” Article 27 outlined access to computer data outside one’s territory without the need for mutual assistance. In the case where computer data is publicly available, mutual assistance is not required regardless of the geographic location of the data. A state may also access computer data outside its territory, without the aid of mutual assistance, when it obtained the “voluntary consent of the person who has the lawful authority to permit the [state] access… to that data.” Convention Draft, supra note 6.

[69] The Council has given no explanation for the lack of openness in the first three years of negotiations. Reuters, Cybercrime Treaty Gets a Makeover, at http://news.zdnet.co.uk/story/0,,s2082557,00.html (Nov. 14, 2000); Rick Perera, UPDATE: Human Rights Groups Slam Cyber Crime Pact, at http://www.idg.net/ic_273062_1794_9-10000.html (Oct. 18, 2000). See also Gruenwald, supra note 7. In the GILC letter, the coalition writes, “We also object in very strong terms to the manner under which this proposal was developed. Police agencies and powerful private interests acting outside of the democratic means of accountability have sought to use a closed process to establish rules that will have the effect of binding legislation. We believe this process violates requirements of transparency and is at odds with democratic decisionmaking.” Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000).

[70] Although it is unclear why the author of the article Cybercrime Treaty Gets a Makeover chose to state that the council was "inundated" with over 400 e-mails when there are millions of on-line users, a fair reading of the statement may take into consideration the relative obscurity of the proposal. Few Internet media sources covered the proposal, suggesting that the 400 people who e-mailed were interested enough to find the treaty by partaking of their own searches.  Reuters, Cybercrime Treaty Gets a Makeover, at http://news.zdnet.co.uk/story/0,,s2082557,00.html (Nov. 14, 2000); see also Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000).

[71] Robert Lemos, Coalition Slams Cybercrime Treaty, at http://www.zdnet.com/zdnn/stories/news/0,4586,2642290,00.html (Oct. 18, 2000).

[72] The Global Internet Liberty Campaign is a coalition of 29 international cyber-rights organizations that joined forced to speak out against the proposed treaty. Organizations included in the coalition are the U.S.'s American Civil Liberties Union, Bits of Freedom, U.K.'s Cyber-Rights and Cyber-Liberties, Electronic Frontiers Australia, Russia's Human Rights Network, France's IRIS, Spain's Kriptopolis, and South Africa's LINK Centre.  See Lemos, supra note 71; Rick Perera, Update: Human Rights Groups Slam Cyber Crime Pact, at http://www.idg.net/ic_273062_1794_9-10000.html (Oct. 18, 2000).

[73] Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000). The letter also addresses copyright crimes, but that provision of the treaty is beyond the scope of this paper.

[74] Article 6 of the proposed treaty defined an illegal device as “a device . . . [used] for the purpose of committing any of the offenses established in accordance with Article 2-5.” Convention Draft, supra note 6.

[75] Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000).

[76] Krebs, supra note 57 (covering the continuing concerns of security professionals over the illegal devices provision of the cybercrime treaty even after revisions attempted to address the perceived problem).

[77] Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (last modified Oct. 18, 2000).

[78] Article 20 provided for the “application of relevant international instruments on international co-operation in criminal matters.”  Article 21 concerned extradition. It stated that the criminal offences established in the treaty “shall be deemed as extraditable offences in any extradition treaty” existing between parties and for parties that do not have an extradition treaty the cybercrime treaty may be considered the basis for extradition. Article 22 provided for mutual assistance. In particular, the article provides for “mutual assistance to the widest extent possible for the purpose of investigations and proceedings concerning criminal offences relating to computer systems and data, or for the collection of electronic evidence of a criminal offence.” Article 27 outlined access to computer data outside one’s territory without the need for mutual assistance. In the case where computer data is publicly available, mutual assistance is not required regardless of the geographic location of the data. A state may also access computer data outside its territory, without the aid of mutual assistance, when it obtained the “voluntary consent of the person who has the lawful authority to permit the [state] access . . . to that data.” Convention Draft, supra note 6.

[79] Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000).

[80] Article 14 “empower[ed] competent authorities to search or similarly access a computer system . . . and computer data stored therein.” In the article, the “competent authorities” were empowered to “seize or similarly secure computer data accessed . . . in view of their possible use in criminal investigations and proceedings.” Article 15 authorized “competent authorities to order a person in its territory . . . to submit specified computer data under this person’s control.” Article 16 enabled “competent authorities to order…the expeditious preservation of data that is stored by means of a computer system, at least where there are grounds to believe that the data . . . is [] particularly vulnerable to loss or modification.”  Article 17 “ensure[d] the expeditious preservation of [] traffic data [concerning a specific communication], regardless of whether one or more service providers were involved in the transmission of that communication.” Convention Draft, supra note 6.

[81] Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000).

[82] Article 17 of the proposed treaty “ensure[d] the expeditious preservation of [] traffic data [concerning a specific communication], regardless of whether one or more service providers were involved in the transmission of that communication.” Convention Draft, supra note 6.

[83] Steven Abood, The Draft Convention on Cybercrime: What Every Internet Service Provider Should Know, at http://www.tilj.com/content/webarticle02050101.htm (Feb. 5, 2001).

[84] Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000).

[85] Id. (specifically citing a violation of the Data Protection Directive of the European Union).

[86] Nadine Strossen, Contemporary Challenges to Privacy Rights, 43 N.Y.L. SCH. L. REV. 195, 198 (1999) (pursuing the same line of reasoning).

[87] Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000) (“We believe that the draft treaty is contrary to well established norms for the protection of the individual [and] it improperly extends the police authority of our national government  . . . .”).

[88]A committee on crimes for the Council of Europe signed off . . . on the final draft of a broad treaty that aims to help countries fight cybercrime . . . . [The treaty] reached its 27th draft before being approved  . . . . Robert Lymos, International Cybercrime Treaty Finalized, at http://news.cnet.com/news/0-1003-200-6352408.html?tag=mn_hd (June 22, 2001). 

[89] Reuters, Cybercrime Treaty Gets a Makeover, at  http://news.zdnet.co.uk/story/0,,s2082557,00.html (Nov. 14, 2000).

[90] Id. (stating that the economic crime division of the Council of Europe is overseeing the creation of the treaty).

[91] Id.

[92] “Traffic data” is defined in Article 1(d) as “any computer data relating to a communication by means of a computer system, generated by a computer system that formed a part in the chain of communication, including the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.”  Final Draft Convention on Cybercrime art. 1(d), at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm/ (Nov. 23, 2001).

[93] “Content data” is not defined in the treaty, but is defined in the Explanatory Memorandum as “[t]he message or information being conveyed by the communication (other than the traffic data).” Draft Convention on Cybercrime and Explanatory Memorandum Related Thereto tit. 5, ¶ 209, at http://conventions.coe.int/treaty/EN/projets/FinalCyberRapex.htm (Nov. 8, 2001). 

[94] Surprisingly, the main focus of the treaty, the harmonization of the definitions of cybercrimes, met with little opposition. One exception to this general acceptance of the definitions was the provision on illegal devices. “This article shall not be interpreted as imposing criminal liability where the production, sale, procurement for use . . . is not for the purpose of committing and offense . . . of this Convention, such as for the authorized testing or protection of a computer system.” Final Draft Convention on Cybercrime art. 6, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[95] Draft Convention on Cybercrime and Explanatory Memorandum Related Thereto tit. 1, ¶ 73-76, at http://conventions.coe.int/treaty/EN/projets/FinalCyberRapex.htm (Nov. 8, 2001). 

[96] Article 15 is entitled “Conditions and safeguards.” Final Draft Convention on Cybercrime art. 15, § 1, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).  These minimum safeguards are those to which the state is obliged under applicable international human rights treaties. Most of the states would be bound to those safeguards outlined in the International Covenant on Civil and Political Rights, Draft Convention on Cybercrime and Explanatory Memorandum Related Thereto tit.1, ¶ 145, at http://conventions.coe.int/treaty/EN/projets/FinalCyberRapex.htm (Nov. 8, 2001). 

[97] In particular, the safeguards included “judicial or other independent supervision, grounds justifying application, and limitation on the scope and the duration of such power and procedure.”  Final Draft Convention on Cybercrime art. 15, § 2, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[98] Draft Convention on Cybercrime and Explanatory Memorandum Related Thereto tit. 1, ¶ 147, at http://conventions.coe.int/treaty/EN/projets/FinalCyberRapex.htm (Nov. 8, 2001). 

[99] Two provisions of the treaty provide that ISPs can only be compelled to collect data associated with specific communications.  The two articles are Article 20 -- Real-time Collection of Traffic Data and Article 21 -- Interception of Content Data.  Final Draft Convention on Cybercrime, at  http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).  The memorandum defines “traffic data” as relating to the time, duration, and size of the communication while “content data” refers to the actual text or visuals.  Draft Convention on Cybercrime and Explanatory Memorandum Related Thereto, tit. 5, ¶ 227, at http://conventions.coe.int/treaty/EN/projets/FinalCyberRapex.htm (Nov. 8, 2001). 

[100] “[T]he Convention does not require or authorize the general or indiscriminate surveillance and collection of large amounts of traffic data. It does not authorise the situation of ‘fishing expeditions’ where criminal activities are hopefully sought to be discovered . . . .” Draft Convention on Cybercrime and Explanatory Memorandum Related Thereto, tit. 5, ¶ 219, at http://conventions.coe.int/treaty/EN/projets/FinalCyberRapex.htm (Nov. 8, 2001).   

[101] Business costs would include staff hours to track the data and storage space to keep records. Abood, supra note 83. 

[102] This provision was contained in both Article 20 and Article 21.  Final Draft Convention on Cybercrime, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[103] Recognizing this issue, the drafters required each state to adopt legislation to oblige the service provider to keep confidential the fact that the government was collecting data on the customer.  Id. art. 20, § 2.  According to the drafters, this would relieve the service provider of any contractual or legal obligation to notify the customer of the surveillance activity. Draft Convention on Cybercrime and Explanatory Memorandum Related Thereto tit. 5, ¶ 226, at http://conventions.coe.int/treaty/EN/projets/FinalCyberRapex.htm (Nov. 8, 2001).

[104] As in the original draft, trans-border access to stored computer data was allowed in certain circumstances without the consent of the state where the information was located. Access was permissible when the data was publicly available or when the investigating state obtained consent from a person who has lawful authority to disclose the data. The article pertaining to trans-border access, Article 32, provided, “A Party may, without obtaining the authorization of another Party: a. access publicly available (open source) stored computer data, regardless of where the data is located geographically; or b. access or receive, through a computer system in its territory, stored computer data located in another Party, if the Party obtains the lawful and voluntary consent of the person who has the lawful authority to disclose the data to the Party through that computer system.” Final Draft Convention on Cybercrime, at  http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001) (observing that no precise definition is given for “publicly available” and that directly preceding the quoted words are the words “open source” in parentheses).

[105] Under Article 19, this invasion was authorized if the person who owned the computer was present in the state or if the ISP offered services in the state. Id. As to trans-border access without consent of the intruded state, access was allowed if the data was publicly available or if permission was gained from a person in the state who had legal authority to give such permission.  Id.

[106] David Goldstone & Betty-Ellen Shave, International Dimensions of Crimes in Cybercrime, 22 FORDHAM INT’L L.J. 1924, 1937-38 (1999).

[107] The provision concerning jurisdiction received only minor clarifications that did not address the main problem with the provision. One such minor clarification was that, under the first draft, jurisdiction based on territory could be established in relation to a satellite flying the flag of the state.  Convention Draft, supra note 6. The mention of satellites was dropped from Draft 27 of the treaty.  Final Draft Convention on Cybercrime art. 22, at  http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[108] Interview with Bill Thompson, Internet Privacy and Security Issues Expert for Special Services Group, in Atlanta, Ga. (Sept. 15, 2000).

[109] Under Article 22, jurisdiction over any offence in the treaty may be established if the offence was committed “in its territory, or on board a ship flying its flag, or on board an aircraft registered under the laws of that Party, or by one of its nationals, if the offence is punishable under criminal law where it was committed or if the offence is committed outside the territorial jurisdiction of any State.” Final Draft Convention on Cybercrime, http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[110] "When more than one Party claims jurisdiction over an alleged offence established in accordance with this Convention, the Parties involved shall, where appropriate, consult with a view to determining the most appropriate jurisdiction for prosecution.” Id.

[111] Evans, supra note 4.

[112] Examples involving two cybercrimes may help to clarify. In the instance of a computer virus, it may be easiest to try the perpetrator in the state where the individual was located at the time of the attack for two reasons. First, the law enforcement officials will likely be able to physically detain the individual. Second, because there are likely multiple victims in multiple states, the process of prosecuting will be simplified by occurring in only one state, namely the state where the individual is located. In a case of cybertheft, however, it may be that the drafters intended for the state where the theft occurred to have jurisdiction. Because there may only be one victim, the initial investigation of the cybertheft can easily begin by tracking the accused from the compromised computer in the victim state. This investigation can be accomplished without initially knowing where the perpetrator was located.

[113] Provisions concerning assistance between states changed little from the first publicly-released draft. Article 24 on extradition provided that the offenses in the treaty fulfilled the requirement of extraditable offenses for any existing extradition treaty between states and that the treaty would act as an extradition treaty for any states that lack such a treaty. Article 25, concerning general principles of mutual assistance, stipulated that the provisions on mutual assistance “shall be subject to the conditions provided for by the law of the requested Party or by applicable mutual assistance treaties.” Mutual assistance regarding accessing of stored computer data, discussed in Article 31, provided, “A Party may request another Party to search or similarly access, seize, or similarly secure, and disclose stored data by means of a computer system located with the territory of the requested Party.” Article 33, mutual assistance regarding the real-time collection of traffic data, stipulated that “[t]he Parties shall provide mutual assistance to each other with respect to the real-time collection of traffic data associated with specified communications in its territory transmitted by means of a computer system.” Mutual assistance regarding the interception of content data, Article 34, provided, “The Parties shall provide mutual assistance to each other with respect to the real-time collection or recording of content data of specified communications transmitted by means of a computer system to the extent applicable by their applicable treaties and domestic laws.” Articles 29 and 30 allowed for law enforcement officials to expedite requests for preservation of stored data and disclosure of preserved data.  See Convention Draft, supra note 6.  

[114] In the initial draft, Draft 19, production orders applied to “a person in its territory.” No clarification of “person” or “in the territory” was provided.  Convention Draft, supra note 6.

[115] Article 18, Production Orders, empowers [a state’s] competent authorities to order a person in [the state’s] territory as well as a service provider offering its services in a territory to submit computer data under its possession or control to law enforcement officials. Final Draft Convention on Cyber-crime, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[116] Article 19 empowers competent authorities to search a computer system and to seize a computer system or a computer-data storage medium in a search.  Id.

[117] Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000).

[118] Articles 16, 17, 18, 19, 20, and 21, respectively.  Final Draft Convention on Cyber-crime, at  http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[119] Article 14 calls for each state to establish the “powers and procedures” necessary for “the purpose of specific criminal investigations or proceedings.” Article 15 states that the powers and procedures shall be subject to the conditions and safeguards provided for under the domestic law of each Party concerned, with due regard for the adequate protection of human rights.  It further states that “such conditions and safeguards shall, as appropriate in view of the nature of the power or procedure concerned, inter alia, include judicial or other independent supervision, grounds justifying application, and limitation on the scope and the duration of such power or procedure.”  Final Draft Convention on Cyber-crime, at  http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001). 

[120] See Fletcher N. Baldwin, Jr., Cybercrime: The Dawning of the Age of the Internet, in 1 CYBERCRIME & SECURITY 18 (Alan E. Brill et al. eds., 1998).

[121] Final Draft Convention on Cybercrime art. 15, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[122] Even though the treaty will originally be open only to the 41 members of the Council of Europe and limited non-members, such as Canada, Israel, Japan, South Africa and the United States, there is a belief that the treaty will at some point become global in scope. As such, the hypotheticals examine interactions that include states not initially signatories to the treaty.  See Press Release, Council of Europe, Crime in Cyberspace: First Draft of International Conventional Released for Public Discussion, at http://conventions.coe.int/treaty/en/projets/cyber.htm (Apr. 27, 2000).

[123] Several countries in this region are known as Asian Tigers due to fast growing economies that create vast concentrations of wealth. In addition, this area of the world has a significant population.

[124] See C. Keith Boone, Privacy and Community, 9 SOC. THEORY & PRAC. 1 (1983), reprinted in RICHARD C. TURKINGTON & ANITA L. ALLEN, PRIVACY LAW: CASES AND MATERIALS 16 (West 1999).  “[W]hether or not privacy and community are antagonistic depends on the kind of society in question.”  Id.

[125] “Consider two kinds of societies lying at opposite poles of the political spectrum, as in the cases of a statist totalitarian society and a liberal democracy. Essential to the development of the totalitarian society is the full expansion of the public into the private sphere, such that no society may properly be termed totalitarian until it has ‘simply liquidated the whole sphere of privacy.’

. . .

By contrast, consider a liberal democratic system committed to long-standing political concepts of equal liberty, individual rights and freedoms, and an open, nonrepressive [sic] democratic process. . . . Linked as it is to the moral and material well-being of individuals, liberal social philosophy emphasizes the importance of nourishing individuality and liberty in its citizenry.

. . .

. . . It is apparent, then, that within the normative framework of a liberal democracy, it is the suppression of privacy, not its invigoration, that is antagonistic to community.”  Id. at 16-18.

[126] Id. at 16.

[127] See PRIVACY INT’L, PRIVACY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON SINGAPORE, at http://www.privacyinternational.org/survey/phr2000 (2000).

[128] Baldwin, supra note 120, at 17.  Singapore’s general approach to Internet policy is censorship.  See Steven M. Hanley, International Internet Regulation: A Multinational Approach, 16 J. MARSHALL J. COMPUTER & INFO. L. 997, 1012 (1998); Lewis S. Malakoff, Are You My Mommy, or My Big Brother? Comparing Internet Censorship in Singapore and the United States, 8 PAC. RIM L. & POL'Y J. 423; Joseph C. Rodriguez, A Comparative Study of the Internet Content Regulations in the United States and Singapore: The Invincibility of Cyberporn, 1 ASIAN-PAC. L. & POL'Y J. 9 (2000); Peng Hwa Ang & Berlinda Nadarajan, Censorship and Internet: A Singapore Perspective, at http://www.isoc.org/HMP/PAPER/132/txt/paper.txt (last modified May 4, 1995).

[129] PRIVACY INT’L, PRIVACY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON SINGAPORE, at http://www.privacyinternational.org/survey/phr2000 (2000).

[130] Id.

[131] Id.

[132] Id.

[133] U.S. DEPT. OF STATE, COUNTRY REPORTS ON HUMAN RIGHTS: PRACTICES FOR 1996: SINGAPORE, http://www.privacy.org/pi/reports/hr96_privacy_report.html (Jan. 1997).

[134] Electronics Transactions Act ch. 88, pt. XII, § 53 (Sing.), at http://www.lawnet.com.sg/free/vldb.htm (July 10, 1998); see also PRIVACY INT'L, supra note 129.

[135] Computer Misuse Act ch. 50A, pt. III, § 16 (Sing.), at http://www.lawnet.com.sg/free/vldb.htm (1998); see also PRIVACY INT'L, supra note 129.

[136] Under the CMA, police may access any computer at any time, including data that is encrypted. Anyone refusing to assist the police in a cybercrime investigation may be prosecuted.  The police are authorized to arrest, without warrant, any person who is reasonably expected to have committed an offense under the CMA. Computer Misuse Act ch. 50A, pt. III, § 15(1)(a) (Sing.), at http://www.lawnet.com.sg/free/vldb.htm (1998).

[137] Electronics Transactions Act ch. 88, pt. XII, § 48 (Sing.), at http://www.lawnet.com.sg/free/vldb.htm (July 10, 1998).

[138] “[E]quality of states and non-interference in domestic affairs of a state are the foundations of the international order.  Hence, territoriality was the accepted basis of exercising jurisdiction as it accorded with these organising principles of international law.”  M. Sornarajah, Globalisation and Crime: The Challenges to Jurisdictional Principles, 1999 SING. J.  LEGAL STUD. 409, 411-12 (1999), available at http://www.law.nus.edu.sg/sjls/articles.htm.

[139] Id. at 412.

[140] Computer Misuse Act ch. 50A, pt. III, § 11 (Sing.), at http://www.lawnet.com.sg/free/vldb.htm (1998); see also PRIVACY INT'L, supra note 129.

[141] Ravi Chandran, Privacy in Employment, 2000 SING. J. LEGAL STUD. 263, 265 (2000).

[142] Computer Misuse Act ch. 50A, pt. 3, § 13 (Sing.), at http://www.lawnet.com.sg/free/vldb.htm (1998).  

[143] Chandran, supra note 141, at 265 (examining employee/employer context, but generally applicable to situations that arise in Singapore).

[144] Id. at 265-281 (including a discussion of how the tort applies to e-mail).

[145] THAIL. CONST. § 37 (1997), available at http://www.krisdika.go.th/law/text/lawpub/e11102540/text.htm (last visited Sept. 17, 2002) (stating that persons “shall enjoy the liberty of communication by lawful means” and providing an exception for action taken “by virtue of the law specifically enacted for security of the State or maintaining public order or good morals”); see also PRIVACY INT'L, PRIVACY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON KINGDOM OF THAILAND, at http://www.privacyinternational.org/survey/phr2000 (2000).

[146] Thail. Const. §§ 34, 38 (1997), available at http://www.krisdika.go.th/law/text/lawpub/e11102540/text.htm (last visited Sept. 20, 2001) (Section 34 states that “the right of privacy shall be protected” and section 37 protects freedom of communications.); see also PRIVACY INT'L, PRIVACY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON KINGDOM OF THAILAND, at http://www.privacyinternational.org/survey/phr2000 (2000).

[147] PRIVACY INT'L, PRIVACY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON KINGDOM OF THAILAND, at http://www.privacyinternational.org/survey/phr2000 (2000).

[148] U.S. DEPT. OF STATE, COUNTRY REPORTS ON HUMAN RIGHTS: PRACTICES FOR 1996: SINGAPORE, at http://www.usis.usemb.se/human/1996/eastasia/thailand.html (Jan. 1997) (stating that the issuance of warrants by the police requires prior approval from the Ministry of Interior or the provincial governor).

[149] See Baldwin, supra note 120 (arguing that although it is possible that Thailand has no political agenda concerning Internet crime control, it is more likely that Thailand has yet to perceive such crime as a significant threat because of the low numbers of its citizens that have access to the Internet). 

[150] Karnjana Karnjanatawe, Data Protection Laws Under Discussion, BANGKOK POST, July 4, 2001, available at http://scoop.bangkokpost.co.th/bkkpost/2001/july2001/db040701/040701_database02.html.

[151] U.S. DEPT. OF STATE, COUNTRY REPORTS ON HUMAN RIGHTS: PRACTICES FOR 1996: HONG KONG , at http://www.usis.usemb.se/human/1996/eastasia/hong_kong.html (Jan. 30, 1997) (detailing Hong Kong’s past).

[152] The Basic Law of the Hong Kong Special Administrative Region ch. 1, art. 5 (1990), at http://www.tdctrade.com/blaw/index.htm (The Basic Law is referred to as the “mini constitution” of Hong Kong.)

[153] The Basic Law of the Hong Kong Special Administrative Region ch. 3, art. 39 (1990), at http://www.tdctrade.com/blaw/blaw_ch1.htm (assuring that the International Covenant on Civil and Political Rights shall remain in force even though Hong Kong is now a Special Administrative Region of China); see also United Nations International Covenant on Civil and Political Rights (entered into force Mar. 23, 1976), at http://www.un.org/Depts/Treaty/final/ts2/newfiles/part_boo/iv_boo/iv_4.html (last visited Sept. 11, 2002) (China is not a signator of the treaty.).

[154] See Hanley, supra note 128, at 1012.

Even though China is not considered part of Southeast Asia, the domestic policies of China are included here because of its new governance of Hong Kong, the fourth largest financial center in the world. (Additionally, China is an undeniable force in the geographic region because of its enormous population coupled with its new-found interest in becoming a world economic power.)

Hong Kong democratic activists are concerned that China will be able to circumvent the law. China’s Computer Information and Internet Security Regulations raises concerns as it provides, “These regulations [referring to the act as a whole] should be consulted with regards to the implementation of the security, protection, and management of computer information networks connecting to networks in the Hong Kong Special Administrative Region . . . .” Computer Information Network and Internet Security, Protection and Management Regulations ch. V, art. 24 (1997), at http://www.qis.net/chinalaw/prclaw54.htm (last modified Apr. 7, 1998).

In Chinese law, there is a provision for the secrecy of communication. In practical terms, however, this has little or no impact since the Chinese government has, for centuries, kept meticulous records on its people.  PRIVACY INT'L AND THE ELECTRONIC PRIVACY INFORMATION CENTER, PRIVACY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON CHINA, at http://www.privacyinternational.org/survey/index.html (last visited Sept. 20, 2001).  China’s newly enacted criminal procedure law provides that “when a search is conducted, a search warrant must be shown to the person searched.”  Criminal Procedural Law art. 111 (P.R.C.) (1996), available at http://product.chinawe.com/cgi-bin/lawdetail.pl?LawID=288.   Seizure of the targeted items is proper when the object “may be used to prove a criminal suspect’s guilt or innocence.” Criminal Procedural Law art. 114 (P.R.C.) (1996), available at http://product.chinawe.com/cgi-bin/lawdetail.pl?LawID=288.  

In an effort to modernize the country, China views the adoption of the Internet as “a necessary communication tool for successful economic competition.” Scott Feir, Regulations Restricting Internet Access: Attempted Repair of Rupture in China’s Great Wall Restraining the Free Exchange of Ideas, 6 PAC. RIM. L. & POL'Y J. 361, 361 (1997). While believing that this technology is necessary for economic development, the government is concerned that access to information is a threat to its ability to control the population. Id. In response to the perceived threat, the Chinese government required that a nation-wide firewall be developed – a technology that has limited information entering the country. ISPs must abide by the requirements of the Great Firewall of China. Id. China has also set up a special Internet police force to ensure compliance with its Internet policies. PRIVACY INT'L AND THE ELECTRONIC PRIVACY INFORMATION CENTER, PRIVACY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON CHINA, at http://www.privacyinternational.org/survey/index.html (last visited Sept. 20, 2001). China’s Computer Information Network and Internet Security, Protection and Management Regulations (CINISPMR) require that Internet users register with the State security forces.  Computer Information Network and Internet Security, Protection and Management Regulations arts. 10, 13 (1997), at http://www.qis.net/chinalaw/prclaw54.htm (last modified Apr. 7, 1998).

CINISPMR protects the freedom and privacy of network users from intrusion by individuals, but provides no protection from the activity of the State. The article also requires that those who engage in Internet businesses must assist the State in “discovering” and “properly handling” law violations involving computer activities. Computer Information Network and Internet Security, Protection and Management Regulations arts. 7 (1997), at http://www.qis.net/chinalaw/prclaw54.htm (last modified Apr. 7, 1998).

China’s approach to governance restricts the rights of individuals while strengthening control by the government. The general approach to Internet policy is one of censorship, to limit access to information. See Steven Stanley, International Internet Regulation: A Multinational Approach, 16 J. MARSHALL J. COMPUTER & INFO. L. 997, 1012 (1998).

[155] Office of the Privacy Commissioner for Personal Data, Hong Kong, The Personal Data (Privacy) Ordinance, Slide 4, at http://www.pco.org.hk/misc/hk_apdpf/sld004.htm (Aug. 3, 1995). 

[156] U.S. DEPARTMENT OF STATE, BACKGROUND NOTE: HONG KONG, at http://www.state.gov/r/pa/ei/bgn/2747.htm (Nov. 2001).

[157] Article 30 of the Basic Law provides “the freedom and privacy of communications of Hong Kong residents.” According to the article, these rights may not be infringed “except . . . [by] relevant authorities [who] may inspect communications in accordance with legal procedures to meet the needs of public security or of investigation into criminal offenses.”  The Basic Law of the Hong Kong Special Administrative Region ch. 3, art. 30 (1990), at http://www.tdctrade.com/blaw/blaw_ch3.htm; see also PRIVACY INTERNATONAL AND THE ELECTRONIC PRIVACY INFORMATION CENTER, PRICAVY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON SPECIAL ADMINISTRATIVE REGION OF HONG KONG, at http://www.privacyinternational.org/survey/phr2000/countriesag.html#Heading9  (last visited Sept. 20, 2001) (stating that although Hong Kong generally protects privacy, an exception exists for crime involving organized crime because of Hong Kong’s history and thus stricter measures are used in this area).

[158] Although the Independent Commission Against Corruption, a body created to address historical corruption problems, once had the independent authority to issue search warrants, it must now utilize the court system to obtain such warrants.  U.S. DEPARTMENT OF STATE, COUNTRY REPORTS ON HUMAN RIGHTS PRACTICES FOR 1996: HONG KONG, at http://www.usis.usemb.se/human/1996/eastasia/hong_kong.html (Jan. 30, 1997).

[159] Office of the Privacy Commissioner for Personal Data, Hong Kong, Personal Data Privacy Ordinance, at http://www.pco.org.hk/english/ordinance/ordglance.html (Aug. 3, 1995); see also PRIVACY INTERNATONAL AND THE ELECTRONIC PRIVACY INFORMATION CENTER, PRIVACY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON SPECIAL ADMINISTRATIVE REGION OF HONG KONG, at http://www.privacyinternational.org/survey/phr2000/countriesag.html#Heading9  (last visited Sept. 20, 2001).

[160] Office of the Privacy Commissioner for Personal Data, Hong Kong, Personal Data Privacy Ordinance, at http://www.pco.org.hk/english/ordinance/ordglance.html (Aug. 3, 1995).

[161] Id.

[162] PRIVACY INTERNATONAL AND THE ELECTRONIC PRIVACY INFORMATION CENTER, PRICAVY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON SPECIAL ADMINISTRATIVE REGION OF HONG KONG, at http://www.privacyinternational.org/survey/phr2000/countriesag.html#Heading9  (last visited Sept. 20, 2001).

[163]There are a variety of offences, for example non-compliance with an enforcement notice served by the Privacy Commissioner carries a penalty of a fine at Level 5 (at present $25,001 to $50,000) and imprisonment for 2 years.” Office of the Privacy Commissioner for Personal Data, Hong Kong, Personal Data Privacy Ordinance (Aug. 3, 1995), at http://www.pco.org.hk/english/ordinance/ordglance1.html#offences/ (last visited Sept. 11, 2002); see generally Office of the Privacy Commissioner for Personal Data, Hong Kong, Personal Data Privacy Ordinance, at http://www.pco.org.hk/english/ordinance/section_68.html  (Aug. 3, 1995) (detailing the entire list of offenses).

[164] “An individual who suffers damage, including injured feeling, by reason of a contravention of the Ordinance in relation to his or her personal data may seek compensation from the data user concerned.”  Office of the Privacy Commissioner for Personal Data, Hong Kong, Personal Data Privacy Ordinance, at http://www.pco.org.hk/english/ordinance/ordglance1.html#offences/ (Aug. 3, 1995); see generally Office of the Privacy Commissioner for Personal Data, Hong Kong, Personal Data Privacy Ordinance, at http://www.pco.org.hk/english/ordinance/section_68.html (Aug. 3, 1995). 

[165] Because of the European Union’s comprehensive data protection directive, all European states have a high level of privacy protection, search and seizure by court-issued warrant, and regulation of the cybercrimes listed in the treaty. Although there are distinctions between the European states, for the hypothetical “European state” will be used to refer to an entity that promotes the general policies of any of these states. See Susan E. Gindin, Lost and Found in Cyberspace: Informational Privacy in the Age of the Internet, 34 SAN DIEGO L. REV. 1153, 1182 (1997).

[166] A denial-of-service attack is “a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic.” Webopedia, at http://webopedia.internet.com/TERM/D/DoS_attack.html (last modified Feb. 5, 2002).

[167] Final Draft Convention on Cybercrime arts. 27, 31, 33, 34, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm/ (Nov. 23, 2001). 

[168] Id. art. 32.  

[169] Id. art. 18.  

[170] Id. arts. 20, 21. 

[171] See PRIVACY INT'L, supra note 129.

[172] Final Draft Convention on Cybercrime arts. 20, 21, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm/ (Nov. 23, 2001).  

[173] Id. arts. 25, 31, 33, 34.

[174] Id. art. 25, § 4. 

[175] U.S. DEPARTMENT OF STATE, COUNTRY REPORTS ON HUMAN RIGHTS PRACTICES FOR 1996, at

http://www.privacy.org/pi/reports/hr96_privacy_report.html (Jan. 30, 1997) (Hong Kong).

[176] Id. (Thailand).

[177] See Electronics Transactions Act ch. 88, pt. XII, § 53 (July 10, 1998) (Sing.), at http://www.lawnet.com.sg/free/vldb.htm; PRIVACY INT'L AND THE ELECTRONIC PRIVACY INFORMATION CENTER, PRIVACY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON REPUBLIC OF SINGAPORE, at http://www.privacyinternational.org/survey/phr2000/countriesru.html (last visited Sept. 20, 2001).

[178] Both Hong Kong and Singapore would object to the assertion that the European state had jurisdiction to prosecute. Both would argue for extradition of the perpetrator to their respective state.

[179] Office of the Privacy Commissioner for Personal Data, Hong Kong, Personal Data Privacy Ordinance ch. 486, pt. IX (Aug. 3, 1995), at http://www.pco.org.hk/english/ordinance/section_68.html (last visited Sept. 20, 2001).

[180] Computer Misuse Act ch. 50A (Sing.) (1998), at http://www.lawnet.com.sg/free/vldb.htm; PRIVACY INTERNATONAL AND THE ELECTRONIC PRIVACY INFORMATION CENTER, PRICAVY AND HUMAN RIGHTS 2000: COUNTRY REPORT ON REPUBLIC OF SINGAPORE, at http://www.privacyinternational.org/survey/phr2000/countriesru.html (last visited Sept. 20, 2001).

[181] Final Draft Convention on Cybercrime art. 18, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[182] As stated earlier in the article, one argument regarding jurisdiction proposes that territorial jurisdiction refers to the place where the perpetrator is located. See discussion infra Part II.C; see generally Final Draft Convention on Cybercrime, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[183] See Computer Misuse Act ch. 50A (Sing.) (1998), at http://www.lawnet.com.sg/free/vldb.htm.

[184] Office of the Privacy Commissioner for Personal Data, Hong Kong, Personal Data Privacy Ordinance ch. 486, pt. IX, at http://www.pco.org.hk/english/ordinance/section_68.html (Aug. 3, 1995).

[185] See Computer Misuse Act ch. 50A (Sing.) (1998), at http://www.lawnet.com.sg/free/vldb.htm.

[186] Final Draft Convention on Cybercrime art. 25, § 4, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[187] U.S. DEPARTMENT OF STATE, COUNTRY REPORTS ON HUMAN RIGHTS PRACTICES FOR 1996, at

http://www.privacy.org/pi/reports/hr96_privacy_report.html (Jan. 30, 1997).

[188] Id.

[189] See Computer Misuse Act ch. 50A (Sing.)(1998), at http://www.lawnet.com.sg/free/vldb.htm.

[190] “Requirements for search and seizure of stored computer data lack necessary procedural safeguards to safeguard the rights of the individual and to ensure due process of law. In particular, there is no effort to ensure that an independent judicial review.” Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000).

[191] WESTIN, supra note 9.

[192] Id.

[193] See Fletcher N. Baldwin, Jr., Impact of the Cyberspace on the Right to Privacy, in 3 CYBERCRIME & SECURITY  IIIA1.5 (Alan E. Brill et al. eds., 1998) (combining ideas of Constitutional and common law privacy).

[194] Id. at IIIA.1-6.

[195] Id.

[196] Id. at IIIA.1-5 to IIIA.1-6.  Lessig suggests an alternative categorization of privacy components with three intertwined meanings. One of these meanings seeks to minimize intrusion. The test for a violation of this type of privacy is the burden of the state’s intervention; if the intrusion is minimally burdensome, then the protection against the intrusion should be minimal. A second category of privacy hinges on the concept of dignity.  Under this doctrine, even if the individual did not notice a search, it is nonetheless an invasion of privacy because it is an offense to dignity. The third category views privacy as a way to constrain the power of government to regulate. See LAWRENCE LESSIG, CODE AND OTHER LAWS OF CYBERSPACE 146 (Basic Books, A Member of the Persus Books Group 1999).

[197] Baldwin, supra note 193, at IIIA.1-6.  As to the concept of privacy generally, another explanation is that privacy incorporates “ideas of bodily and social autonomy, of self-determination, and of the ability to create zones of intimacy and exclusion that define and shape our relationships with each other.” Yet another definition of privacy is “‘the right of individuals’ to decide for themselves how much they wish to share with others in terms of thoughts, feelings, and facts of personal life.” SUSAN DRUCKER & GARY GUMPERT, REAL LAW @ VIRTUAL SPACE: REGULATION IN CYBERSPACE 326 (1999).  In all of the conceptions of privacy mentioned in this paper, control over personal information is a component of the understanding of privacy. A. Michael Froomkin, The Death of Privacy?, 52 STAN. L. REV. 1461, 1463 (2000).

[198] Regional treaties are not here included because such treaties do not bind states that are not signatories. Draft Convention on Cybercrime and Explanatory Memorandum Related Thereto ¶ 110, at http://conventions.coe.int/treaty/EN/projets/FinalCyberRapex.htm (Nov. 8, 2001).  

[199] Universal Declaration of Human Rights, U.N. GAOR, 3d Sess., pt. 1 at 71 arts. 12,19, U.N. Doc. A/RES/217 A (III).

[200] Article 12 of the UDHR states “no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence . . . . Everyone has the right to the protection of the law against such interference or attacks.” Id. at art. 12.

[201] Article 19 states, “Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.” Id. at art. 19.

[202] Id. at art. 9.

[203] Fernando Volio, Legal Personality, Privacy, and the Family, in THE INT'L BILL OF RIGHTS : THE COVENANT ON CIVIL AND POLITICAL RIGHTS 190 (Louis Henkin ed., 1981). Article 17 states that “no one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence . . . [and that] [e]veryone has the right to the protection of the law against such interferences or attacks.” International Covenant on Civil and Political Rights, opened for signature Dec. 19, 1966, 6 I.L.M. 360, 373.

[204] Volio, supra note 203, at 197; see HENRY STEINER AND PHILIP ALSTON, INT'L HUMAN RIGHTS IN CONTECT: LAW, POLITICS, AND MORALS 529 (1996).

[205] Volio, supra note 203, at 191. Those involved in drafting the ICCPR discussed “unlawful” as being “itself contrary to human rights” and “arbitrary” as meaning that “even when [the act] is not in violation of positive law [the act] is arbitrary or capricious.” Id.; see STEINER & ALSTON, supra note 204, at 524.

[206] International Covenant on Civil and Political Rights, supra note 203, at 374, art. 19, § 2.

[207] Id. at 374, art. 19, § 3.

[208] Id.

[209] STEINER & ALSTON, supra note 204, at 156.

[210] The ICCPR Committee stated “effective measures have to be taken by States to ensure that information concerning a person’s private life does not reach the hands of persons who are not authorized by law to receive, process and use it . . .” Id. at 529.

[211] Article 15 provides that the powers and procedures granted in the treaty “shall be subject to . . . due regard for the adequate protection of human rights, in particular as provided in applicable international human rights instruments.” Final Draft Convention on Cybercrime art. 15, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[212] Global Internet Liberty Campaign Member Letter on Council of Europe Convention on Cyber-Crime, at http://www.gilc.org/privacy/coe-letter-1000.html (Oct. 18, 2000).

[213] See id. The argument proposed by GILC is that the cybercrime treaty violates the guarantees of privacy of communication and freedom of expression as well as criminal procedure protections in existing international instruments. For this argument to be valid, it must first be established that these protections extend into cyberspace. This has yet to be established on the international scene. The term cyberspace “encompasses the use of electronic communications over computer networks mainly via the Internet.”  Krasovec, supra note 2, at 101 n.1.

[214] See Paul M. Schwartz, Internet Privacy and the State, 32 CONN. L. REV. 815, 819 (2000); see also Gindin, supra note 3, at 1156-58.

[215] Froomkin, supra 197, at 1463.  Access is available because personal data is stored on networked computers, is collected by websites, and is available due to the underlying technical structure of the Internet which allows simultaneous collection and transmission of information. Schwartz, supra note 214, at 820; Gindin, supra note 213, at 1156. In addition, generation of comprehensive records of online behavior is possible. Schwartz, supra note 214, at 818; see Skok, supra note 12, at 61 para. 1.

[216] Andrew Ecclestone, Freedom of Information: An Electronic Window Onto the Government, in LIBERATING CYBERSPACE: CIVIL LIBERTIES, HUMAN RIGHTS AND THE INTERNET 62 (Liberty ed., 1999).

[217] Froomkin, supra note 197, at 1463.

[218] Lawrence Lessig, Cyberspace and Privacy: A New Legal Paradigm? Foreward, 52 STAN. L. REV. 987, 998-99 (2000). The concern of experts is that “traditional legal doctrines appear ill equipped to deal with contemporary [privacy] problems that originate in cyberspace.” Amy E. Wells, Criminal Procedure: The Fourth Amendment Collides with the Problem of Child Pornography and the Internet, 53 OKLA. L. REV. 99, 99 (2000).

[219] See infra part V.A. (definition of this term).  

[220] A computer virus is “an insidious piece of computer code written to damage systems. Viruses can be hidden in executable program files posted online.” Netdictionary, at http://www.netdictionary.com/html/v.html (last visited Sept. 20, 2001).

[221] Evans, supra note 4.

[222] To increase police power in cybercrime investigations without increasing privacy protections “may result in serious disturbances of the complicated balance between the necessary powers of intervention of the [investigating and] prosecuting authorities on the one hand and civil liberties on the other hand.” Sieber, supra note 20.

[223] Preamble, Final Draft Convention on Cybercrime (Nov. 23, 2001), at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm. The drafters of the treaty realized the need to include privacy protections in the treaty. Henrik Kaspersen, chairman of the Committee on Experts on Crime in Cyber-Space for the Council of Europe, said, “We do not want to leave privacy apart from the convention.” COE Cyber Crime Treaty Debated, at http://techlawjournal.com/crime/20001208.asp (Dec. 11, 2000). Even with this realization, the drafters did not adequately address privacy concerns.

[224] Associational privacy is freedom from interference of relationships with individuals or groups. Baldwin, supra note 193, at III A.1-5 to III A.1-6.

[225] Decisional privacy involves freedom from interference in intimate personal decisions. Id. 

[226] Privacy from unwanted intrusions relates to physical and electronic invasion. See id.

[227] Privacy of personal information concerns “the rights of individuals to control information about themselves.” Id. at IIIA.1-6.

[228] A clickstream is “[t]he series of electronic footprints created when a Web user moves about in cyberspace . . . .” Skok, supra note 12, at 61.

[229]  See infra notes 232-60.

[230] Olmstead v. United States, 277 U.S. 438, 471-78 (1928).  The case centered around a conviction based on evidence gathered from a wiretap. Brandeis’ argument was based primarily on the Fourth Amendment of the United States Constitution. In particular, his assertion was based on the provision that states, “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated . . . ” Id. (quoting U.S. CONST. amend. IV.).

[231] Id.

[232] Id. at 474-75. This proposition asserted by Brandeis in 1928 was not adopted by the United States Supreme Court until Mapp v. Ohio.  Mapp v. Ohio, 367 U.S. 643, 659 (1961).

[233] “The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. . . . They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against Government, the right to be let alone – the most comprehensive of rights and the right most valued by civilized men.” Olmstead, 277 U.S. at 478.

[234] “To protect that right [the right to be let alone], every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.” Id.

[235] “Ways may some day be developed by which the Government, without removing papers from secret drawers, can reproduce them in court.” Id. at 474. “Discovery and invention have made it possible for the Government, by means far more effective than stretching upon the rack, to obtain disclosure in court of what is whispered in the closet.” Id. at 473.

[236] See WESTIN, supra note 9, at 370-77.

[237] United States v. Miller, 425 U.S. 435, 447-56 (1976).

[238] The bank maintained most of the records on microfilm. The bank made copies of deposit slips and checks. Id. at 438.

[239] Id. at 441-42.

[240] Id. at 448-49.

[241] Id. at 441.

[242] “To permit a police officer access to these records merely upon his request, without any judicial control as to the relevancy or other traditional requirements of legal process, and to allow the evidence to be used in any subsequent criminal prosecution against a defendant, opens the door to a vast and unlimited range of very real abuses of police power.” Id. at 451.

[243] Id.

[244] Prosser was the former Dean of the University of California School of Law at Berkeley.

[245] Prosser classified four torts: intrusion, public disclosure of private facts, false light in the public eye, and appropriation. William Prosser, Privacy, 48 CAL L. REV. 383, 389-407 (1960).

[246] Id. at 390.

[247] Id. at 391.

[248] Id.

[249] Louis Brandeis & Samuel Warren, The Right to Privacy, 4 HARV. L. REV. 195 (1890). For a discussion of the article, see Baldwin, supra note 193, at III A.1.3 and Prosser, supra note 245, at 383-84.

[250] “In every such case the individual is entitled to decide whether that which is his shall be given to the public.” Brandeis & Warren, supra note 249, at 199. The authors refer to a right not to publish, which is equated with a right to keep certain information from the public. Id. at 212.

[251] “No other has the right to publish his [the author’s] productions in any form, without his consent. This right is wholly independent of the material on which, or the means by which, the thought, sentiment, or emotion is expressed.” Id. at 199. “The principle which protects personal writings and any other productions of the intellect or of the emotions, is the right to privacy . . .” Id. at 213.

[252] Id. at 213, 216.

[253] Id. at 219.

[254] Id. at 215-16.

[255] Id. at 214.

[256] Id. at 205.

[257] Olmstead v. United States, 277 U.S. 438, 478 (1928); Brandeis & Warren, supra note 249, at 205.

[258] “Right” defined as “a legally enforceable claim that another will do or will not do a given act; a recognized and protected interest the violation of which is a wrong.” BLACK'S LAW DICTIONARY 1322 (7th ed. 1999).

[259] “Tort” defined as “a civil wrong for which a remedy may be obtained, usually in the form of damages . . . . “ Id. at 1496.

[260] This will be true regardless of whether the data is physically located within the state where the investigation is taking place. See Final Draft Convention on Cybercrime arts. 26, 31, 33, 34, at http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm (Nov. 23, 2001).

[261] The drafters found it impossible to include one international standard for privacy protection in the treaty. Margret Johnston, US Companies Find Europe’s Cyber Crime Treaty Too Vague: Americans Fear Individual Countries’ Due-process Laws Could Be Violated, IDG News Service, at http://www.e-businessworld.com/english/crd_treaty_321309.html (Dec. 8, 2000) (on file with the Richmond Journal of Law & Technology).

[262] In essence the argument is that it should be a crime for certain information to be on the Internet. A competing theory is that sanctions should only apply to the individual who places the information onto the Internet or who retrieves the information from the Internet.

[263] See Skok, supra note 5, at 82-83; Gindin, supra note 3, at 1182.

[264] Johnston, supra note 66.



Related Browsing

1. http://www.cdt.org/international/Cybercrime/
This site, run by the Center for Democracy and Technology, contains several helpful insights on the various incarnations of the Council of Europe Cybercrime Treaty.

2. http://www.jmls.edu/cyber/index/crime1.html#lawrev
Maintained by the John Marshall Law School, this site compiles a collection of law review articles concerning cybercrime and includes several helpful links.

3. http://www.cybercrime.gov
The United States Department of Justice's Computer Crime and Intellectual Property Division.

4. http://www.cybercrime.gov/s&smanual.html
The United States Department of Justice's new electronic search and seizure manual.

5. http://www.usdoj.gov/criminal/cybercrime/unlawful.htm
The U.S. Department of Justice also maintains a report of the President's group for unlawful content on the Internet.

6. http://www.cybercrime-forum.cec.ev.inf/default
The European Union's cybercrime forum website.

7. http://www.nipc.gov
The National Infrastructure Protection Center issues a biweekly report on cyber vulnerabilities, viruses, and other best practices for information security.

8. http://www.fbi.gov/congress/congress00/cyber021600.htm
The 2000 statement before the Senate Appropriations Committee and several congressional subcommittees on Cybercrime by the Federal Bureau of Investigation.

9. http://www.privacyinternational.org/issues/cybercrime
Features a private organization's analysis of cybercrime issues and includes a myriad of useful links.

10. http://www.digitalcentury.com/encyclo/update/crime.html
Jones International frequently updates their website, "Cybercrime on the Internet."

11. http://directory.google.com/Top/Society/Law/Legal_Information/Computer_and_ Technology_Law/Internet/Internet_Crime/
The Google search engine runs a separate web directory on Internet crime and related legal issues.