Legal Framework of the Computer Crimes Under the Bulgarian Criminal Law 11 2.1
Total Page:16
File Type:pdf, Size:1020Kb
Criminal Justice 2007 JUSTICE IN THE DIGITAL ERA Analytical Report With the financial support of the Criminal Justice Programme The European Commission - Directorate General Justice, Freedom and Security With the partnership of 1 Project Title Justice in the Digital Era: Strengthening the capacity of magistrates in Bulgaria and Romania to investigate, prosecute and prosecute judgements in cases involving cybercrime Project No. -/6-3(1$%$&Ȳ: -CE-0178633/00-29 Country Republic: of Bulgaria Implemented by Law: and Internet Foundation Address 36-B, Patriarh: Evtimiy Blvd. 1000 Sofia, Bulgaria Telephone +359: 2 981 50 97 Fax +359: 2 981 50 97 Email: [email protected] Contact Person George Dimitrov Report Date: 6 November 2008 Version: v0.2 Authors: Dr. George Dimitrov, President of the Law and Internet Foundation (Bulgaria) Bogdan Petrov, Centre for ICT Law (Bulgaria) Oleksandr Pastukhov, Centre for ICT Law (Bulgaria) Desislava Krusteva, Attorney-at-Law (Bulgaria) Dimitar Markov, Centre for the Study of Democracy (Bulgaria) Bogdan Manolea, APTI Centre (Romania) Dr. Maxim Dobrinoiu (Romania) Andrew Charlesworth, Senior Research Fellow, University of Bristol (United Kingdom) Dario Forte, CFE, CISM, University of Milan (Italy) Start Date: 31 December 2007 End Date: 30 April 2009 Project Period: 16 months 2 TABLE OF CONTENTS TABLE OF CONTENTS 3 I. INTRODUCTION 5 1. THE INTERNET: BACKGROUND, STRUCTURE AND OPPORTUNITIES 5 2. LEGAL ISSUES FOLLOWING THE EMERGENCE OF INTERNET 6 II. ANALYSIS 8 1. CYBERCRIME – NOTION AND HISTORY 8 2. LEGAL FRAMEWORK OF THE COMPUTER CRIMES UNDER THE BULGARIAN CRIMINAL LAW 11 2.1. Establishment and development of the legal framework – historical background ....................... 11 2.2. Basic Terms .......................................................................................................................... 13 2.3. Copying, Using and Accomplishing Access to Computer Data in a Computer System without Right ............................................................................................................................................. 22 2.4. Criminal Violations against Computer Programs or Data...................................................... 34 2.5. Introduction of Computer Viruses and Other Malicious Programmes ...................................... 43 2.6. Distribution of Passwords and Passcodes to Computer Systems or Data .................................. 48 2.8. Computer Fraud ................................................................................................................... 54 2.9. Crimes against Intellectual Property........................................................................................ 57 2.10. Crimes Related to Pornographic Materials............................................................................ 71 2.11. Computer Crimes against the Confidentiality of Correspondence ............................................ 77 2.12. Destruction and Damaging of Foreign Property .................................................................... 81 2.13. False Documenting.............................................................................................................. 83 3. LEGAL PROVISIONS ON CYBERCRIME IN ROMANIA 85 3.1. Introduction........................................................................................................................... 85 3.2. The Romanian Legislation on the New Technologies............................................................... 85 3.3. Cybercrime ............................................................................................................................ 88 3.4. Controversial Aspects. De Lege Ferenda proposals ................................................................. 141 3.5. Conclusions ........................................................................................................................... 149 4. INTERNATIONAL RESPONSES FOR COUNTERACTION TO COMPUTER CRIME 150 4.1. Initiatives of the Organization for Economic Co-operation and Development (OECD)............ 150 4.2. Initiatives of the United Nations (UN).................................................................................. 150 4.3. Initiatives of the Council of Europe (CE)............................................................................... 151 4.4. Initiatives of the European Union.......................................................................................... 153 4.5. Other International Initiatives................................................................................................ 155 5. COPYRIGHT ON THE INTERNET AND ONLINE COPYRIGHT INFRINGEMENT 157 5.1. Copyright Protection for Materials Posted on the Internet......................................................... 157 5.2. Internet Materials and the Specifics of Their Copyright Protection............................................ 162 5.3. Using Works on the Internet ................................................................................................ 175 5.4. Features of the Works Published on the Internet as a Subject of Copyright and Problems of Legal Protection Thereof ......................................................................................................................... 178 5.5. Conclusions........................................................................................................................... 184 6. ONLINE FRAUD 186 6.1. Introduction........................................................................................................................... 186 6.2. International Responses.......................................................................................................... 192 6.3. The UK Approach................................................................................................................ 202 6.4. G8 Principles and Action Plan to Combat High-Tech Crime................................................. 205 3 7. PORNOGRAPHY DISSEMINATION ONLINE 207 7.1. Introduction........................................................................................................................... 207 7.2. International Responses.......................................................................................................... 209 7.3. Application of Anti-Pornography Laws and other Regulatory Strategies to the Online Environment ............................................................................................................................................. 220 7.4. The UK Approach................................................................................................................ 221 7.5. Best Practice.......................................................................................................................... 230 8. MONEY LAUNDERING ONLINE 232 8.1. Introduction........................................................................................................................... 232 8.2. International Responses.......................................................................................................... 240 8.3. Application of AML/CFT to the Online Environment ........................................................ 250 8.4. Best Practice.......................................................................................................................... 251 8.5. Brief Guide to the FATF Forty Recommendations................................................................. 259 8.6. Special Recommendations for Combating the Financing of Terrorism....................................... 261 9. STATE OF THE ART OF CYBER TERRORISM: ATTACKS AND COUNTERMEASURES 263 9.1. Introduction........................................................................................................................... 263 9.2. An Evolving Threat.............................................................................................................. 263 9.3. The Importance of Awareness & Education in Fighting Cyber Terrorism: Getting Beyond the Hype and Hoax .................................................................................................................................... 265 9.4. Parallelizing Cyber and “Tangible” Terrorism: an “Excursus” on the Major Events of the Last 30 Years ........................................................................................................................................... 267 9.5. Current and Future Technical Trends .................................................................................... 270 9.6. The Role of Cyber Investigations in Combating Cyber Crime and Cyber Terrorism.................. 270 9.7. The Importance of a Proactive Solution................................................................................... 273 9.8. Conclusions ........................................................................................................................... 276 10. COMPUTER FORENSICS 277 10.1. Introduction......................................................................................................................... 277 10.2. Considerations on the Relationship between Computer Forensics and Legal Procedures........... 280 10.3. Qualification of the Computer Forensic Operators................................................................. 284 10.4. Budgeting and Technicalities ................................................................................................ 286