Rregulloret e krimit kibernetik: nevojë për një qasje të re ndërkombëtare?

Autorët

  • Natasa Doneva Universiteti “Goce Delčev” i Štip

DOI:

https://doi.org/10.55312/op.v13i2.377

Abstrakti

Krimet kibernetike, terrorizmi kibernetik dhe lufta kibernetike janë pandemia e shekullit 21. Ky problem ekzistonte përpara, por kohët e fundit ato janë shpërndarë me një shpejtësi marramendëse dhe kanë modifikuar pamjen e tyre fillestare, gjë që i bën më të vështirë për t’i ndjekur. Qëllimi i këtij punimi është të tregojë nevojën për një konventë kibernetike të llojit të ri dhe të shpjegojë nevojën për një kuadër ligjor ndërkombëtar më të mirë. Punimi “trajton” si fillim Konventën Evropiane të Krimit Kibernetik dhe përdorimin e saj. Gjithashtu, duke patur në mendje se fusha kibernetike nuk konsiston vetëm në krimet/kudravajtjet kibernetike, por edhe në terrorizmin kibernetik dhe luftrat kibernetike, në pjesën e dytë punimi fokusohet në nevojën e një konvente të re digjitale. Pjesa e fundit përmban një panoramë të shkurtër të legjislacionit maqedonas lidhur me krimin kibernetik,

Fjalët kyçe:

konventat, krimi kibernetik, gjykatat ndërkombëtare, Manuali i Tallinn-it.

Shkarkimet

Download data is not yet available.

References

(1) S. SCHJOLBERG, The History of Cybercrime; Cybercrime Research Institute, Cologne, 2017.

(2) Council of Europe’s Convention on cybercrime, signed in Budapest on 23 November 2001, available at www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_e n.pdf.

(3) Shanghai Cooperation Organisation’s Shanghai Convention on Combating Terrorism, Separatism and Extremism, 15 June 2001, available at www.refworld.org/pdfid/49f5d9f92.pdf.

(4) OECD Policy Guidance on Online Identity Theft, June 2008, www.oecd.org/sti/consumer/40879136.pdf.

(5) Shanghai Cooperation Organisation’s Agreement among the Governments of the SCO Member States on Cooperation in the Field of Ensuring International Information Security, 16 June 2009, available at www.ccdcoe.org/organisations/sco/.

(6) League of Arab States’ Arab Convention on Combating Information Technology Offences, 21 December 2012, available at

www.asianlaws.org/gcld/cyberlawdb/GCC/Arab%20Convention%20on%20Combating%20Information% 20Technology%20Offences.pdf.

(7) Enhancing competitiveness in the Caribbean through the harmonization of ICT Policies, Legislation and Regulatory Procedures, in International Telecommunication Union, available at www.itu.int/en/ITUD/ Projects/ITU-EC-ACP/HIPCAR/Pages/default.aspx.

(8) Directive 2013/40/EU of the European Parliament and of the Council of 12 August 2013, on attacks against information systems and replacing Council Framework Decision 2005/222/JHA, in OJ L 218 of 14 August 2013, pp. 8-14.

(9) Sixth session of the Open-ended intergovernmental expert group to conduct a comprehensive study of the problem of cybercrime, Vienna, 27-29 July 2020, available at www.unodc.org/unodc/en/organizedcrime/ open-ended-intergovernmental-expert-group-to-conduct-a-comprehensive-study-of-the-problemof- cybercrime2020.html.

(10) African Union’s Convention on Cyber Security and Personal Data Protection, 27 June 2014, available at www.au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection.

(11) Commonwealth Secretariat, Report of the Commonwealth Working Group of Experts on Cybercrime, in Commonwealth Law Bulletin, Vol. 40, No. 3, 2014, pp. 502-561, available at www.tandfonline.com/doi/abs/10.1080/03050718.2014.937068. DOI: https://doi.org/10.1080/03050718.2014.937068

(12) See the Budapest Convention and related standards, available at www.coe.int/en/web/cybercrime/thebudapest- convention.

(13) J. GUAY, L. RUDNICK, What the Digital Geneva Convention Means for the Future of Humanitarian Action, in unhrc.org, 25 June 2017, available at www.unhcr.org/innovation/digital-geneva-conventionmean- future-humanitarian-action/.

(14) Access Now, A Digital Rights Approach to the Tech Accord and the Digital Geneva Convention, September 2018.

(15) More about this policy paper in Microsoft, Establishing an International Cyberattack Attribution Organization to Strengthen Trust Online. Microsoft Policy Papers, available at www.query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW67QI.

(16) Geneva Conventions (I, II, III, IV) of 12 August 1949 and Additional Protocols (I, II) of 8 June 1977, available at www.icrc.org/en/doc/war-and-law/treaties-customary-law/geneva-conventions/overviewgeneva- conventions.htm.

(17) Stuxnet is a malicious computer worm (discovered in 2010) but thought to have been in development since at least 2005.

(18) Petya is a family of encrypting malware that was first discovered in 2016.

(19) WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency.

(20) Benjamin B. Ferencz is an American lawyer. He was an investigator of Nazi war crimes after World War II and the chief prosecutor for the United States Army at the Einsatzgruppen Trial.

(21) Stein Schjolberg is a Norwegian judge and international cybercrime expert. In 2007 he was appointed Chairman of the High-Level Experts Group (HLEG) on cybersecurity, which includes more than 100 experts from around the world.

(22) S. SCHJOLBERG, An International Criminal Tribunal for Cyberspace (ICTC). Recommendations for potential new global legal mechanisms against global cyberattacks and other global cybercrimes. A paper for the EastWest Institute (EWI) Cybercrime Legal Working Group, March 2012.

(23) S. SCHJOLBERG, The History of Global Harmonization on Cybercrime Legislation-The Road to Geneva, December 2008.

(24) J. GOLDSMITH, A. LOOMIS; “Defend Forward” and Sovereignty, in Hoover Working Group on National Security, Technology and Law. Aegis Series Paper No. 2102, 29 April 2021.

(25) P. COLIN, Debugging the Tallinn Manual 2.0’s Application of the Due Diligence Principle to Cyber Operations, in Washington International Law Journal, No. 58, 2019, p. 581 ff.

(26) Eric Talboat Jensen was member of both International Groups of experts for Tallin Manual 1.0 & Tallin Manual 2.0.

(27) E.T. JENSEN, The Tallinn Manual 2.0: Highlights and Insights, in Georgetown Journal of International Law, Vol. 48, No. 3, 2017, pp. 735-778.

(28) For more information about this case see Шпион, in akademik.mk, 11 March 2014, available at https://akademik.mk/sudenje/shpion-2/.

(29) Хакирана веб страницата на Претседателот, in mk.tv21.tv, 27 February 2017, available at www.mk.tv21.tv/hakirana-veb-stranitsata-na-pretsedatelot/.

(30) Veles is a city in the central part of North Macedonia.

(31) A. TOMIC, Анализа со Митрески: Сајбер напад од 35 милиони IP адреси е многу скап. Кој е мотивот?, in faktor.mk, 24 July 2020, available at www.faktor.mk/analiza-so-mitreski-sajber-napad-od- 35-milioni-ip-adresi-e-mnogu-skap-koj-e-motivot.

(32) K. OZIMEC, Паднати веб-сајтовите на повеќе македонски медиуми - технички проблем или напад?, in Deutsche Welle, 19 November 2016.

(33) Сајбер нападите во предизборието може да имаат сериозни политички импликации, in focus.mk, 6 February 2020, available at www.fokus.mk/ordanoski-sajber-napadite-vo-predizborietomozhe- da-imaat-seriozni-politichki-implikatsii/.

(34) Закон за ратификација на Конвенцијата за компјутерски криминал; available at www.rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=090000168 02fa41e.

(35) Кривичен законик, available at www.slvesnik.com.mk/Issues/90E0B29D702D49A48DBCC2239374B927.pdf.

(36) Закон за кривична постапка; Службен весник на РМ, бр.150 од 2010, available at www.jorm.gov.mk/wp content/uploads/2016/03/Zakon_za_Krivicna_postapka_150_18112010-2.pdf.

(37) Available at www.mioa.gov.mk/sites/default/files/pbl_files/documents/legislation/Zakon%20za%20elektronskite%20k omunikacii.pdf.

(38) Закон за следење на комуникациите, available at www.mvr.gov.mk/Upload/Documents/Zakon%20za%20sledenje%20na%20komunikaciite.pdf.

(39) Закон за електронска трговија, available at https://www.pravdiko.mk/zakon-za-elektronskatrgovija/.

(40) Закон за електронско управување и електронски услуги, available at www.mioa.gov.mk/sites/default/files/pbl_files/documents/legislation/zakon_za_elektronsko_upravuvanje _i_elektronski_uslugi_0.pdf.

(41) Закон за парнична постапка.

(42) Available at www.mioa.gov.mk/sites/default/files/pbl_files/documents/legislation/zededu.pdf.

(43) Декларација за побезбеден интернет, www.dejure.mk/zakon/deklaracija-za-pobezbeden-internet.

(44) National Cyber Security Strategy, December 2018, available at www.mvr.gov.mk/Upload/Editor_Upload/AP%20v1_13MK.pdf.

(45) See decision to form this Council available at www.dejure.mk/zakon/odluka-za-formiranje-nanacionalen- sovet-za-sajber-bezbednost.

(46) I. UPADHYAY, Cyber Law: A Comprehensive Guide For 2021, in jigsawacademy, 13 September 2020, available at www.jigsawacademy.com/blogs/cyber-security/what-is-cyber-law/.

(47) M. HOLLOWAY, Stuxnet Worm Attack on Iranian Nuclear Facilities, in large.standfor.edu, 16 July 2015, available at www.large.stanford.edu/courses/2015/ph241/holloway1/.

(48) P. PAGANINI, Operation BugDrop – Hackers Siphoned 600GB Taking Control of PC Microphones, in securityaffairs, 21 February 2017, available at www.securityaffairs.co/wordpress/56517/intelligence/operation-bugdrop-ukraine.html.

(49) Global Research & Analysis Team ‒ Kaspersky Lab, “Red October” Diplomatic Cyber Attacks

Investigation, in securelist.com, 14 January 2013, available at www.securelist.com/red-october-diplomaticcyber- attacks-investigation/36740/.

(50) K. GROW, Sony Cancels ‘Interview’ New York Premiere Amid Terror Threats, in RollingStones, 17 December 2014, available at www.rollingstone.com/movies/movie-news/sony-cancels-interview-newyork- premiere-amid-terror-threats-194486/.

(51) D. McNARY, Sony Has ‘No Further Release Plans’ for ‘The Interview’, in variety.com, 17 December 2014, available at www.variety.com/2014/film/news/sony-has-no-further-release-plans-for-the-interview- 1201382167/.

(52) Who are the Guardians of Peace? A New Hacker Group Is on the Loose, in pandasecurity.com, 8 January 2015, available at www.pandasecurity.com/en/mediacenter/news/guardians-peace-new-hackergroup- loose/.

(53) North Korea Berates Obama over The Interview Release, in BBC, 27 December 2014, available at www.bbc.com/news/world-asia-30608179.

(54) E. SHEIN, Incident Of The Week: Shamoon Virus Cripples Hundreds Of Computers, in CyberSecurityHub, 14 December 2018, available at www.cshub.com/attacks/news/incident-of-the-weekshamoon- virus-cripples-hundreds-of-computers.

(55) ‘Phishing email’ the key to hacking of TV5Monde, in thelocal.fr, 14 April 2015, available at www.thelocal.fr/20150414/how-the-french-channel-tv5-was-hacked/.

(56) M. HADJI-JANEV, M. BOGDANOSKI, Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare, 2015. DOI: https://doi.org/10.4018/978-1-4666-8793-6

(57) Europol, Internet Organised Crime Threat Assessment (IOCTA) - Strategic, Policy and Tactical Updates on the Fight Against Cybercrime, available at www.europol.europa.eu/iocta-report.

(58) IOCTA reports, available at www.europol.europa.eu/activities-services/main-reports/internetorganised- crime-threat-assessment#fndtn-tabs-0-bottom-2.

Downloads

Botuar

2022-02-06

Si të citoni

Doneva, N. . (2022). Rregulloret e krimit kibernetik: nevojë për një qasje të re ndërkombëtare?. Optime, 13(2), 167–180. https://doi.org/10.55312/op.v13i2.377

Numri

Seksioni

Articles