19 May 1998: Add message on UK and US docs
Link to mirror of DoJ docs on G8 high tech crime
19 May 1998
To: firstname.lastname@example.org Subject: G8 Date: Tue, 19 May 1998 10:21:10 +0100 From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk> Perhaps we should take some note of the recent G8 summit. The communique says at section 21 (2) <http://birmingham.g8summit.gov.uk/docs/> We agree to implement rapidly the ten principles and ten point action plan agreed by our Ministers on High Tech Crime. We call for close cooperation with industry to reach agreement on a legal framework for obtaining, presenting and preserving electronic data as evidence, while maintaining appropriate privacy protection... Looking for these ten principles, we find a Foreign Office leaflet with ten principles including <http://birmingham.g8summit.gov.uk/crime/> `ensuring that evidence and computer data are always accessible and that transborder searches can take place' `Making sure everyone investigating a crime can get the information they need' `Setting international standards for retrieving electronic data and making sure it is authentic' This document (`G8/FCO crime leaflet') makes clear that the priorities include not just `paedophile networks' but also `stolen vehicles'. In another section, `money laundering' is a priority, as is `smuggling of illegal immigrants'. Looking for a source for this, one comes to a Dec 97 meeting of justice ministers <http://birmingham.g8summit.gov.uk/prebham/washington.1297.shtml> `Each country must have in place domestic laws that ensure that... evidence of high-techn crimes can be preserved and collected in a timely fashion' The relevant annex finally contains the unexpurgated text: PRINCIPLES AND ACTION PLAN TO COMBAT HIGH-TECH CRIME Statement of Principles We hereby endorse the following PRINCIPLES, which should be supported by all countries: There must be no safe havens for those who abuse information technologies. Investigation and prosecution of international high-tech crimes must be coordinated among all concerned States, regardless of where harm has occurred. Law enforcement personnel must be trained and equipped to address high-tech crimes. Legal systems must protect the confidentiality, integrity, and availability of data and systems from unauthorized impairment and ensure that serious abuse is penalized. Legal systems should permit the preservation of and quick access to electronic data, which are often critical to the successful investigation of crime. Mutual assistance regimes must ensure the timely gathering and exchange of evidence in cases involving international high-tech crime. Transborder electronic access by law enforcement to publicly available (open source) information does not require authorization from the State where the data resides. Forensic standards for retrieving and authenticating electronic data for use in criminal investigations and prosecutions must be developed and employed. To the extent practicable, information and telecommunications systems should be designed to help prevent and detect network abuse, and should also facilitate the tracing of criminals and the collection of evidence. Work in this area should be coordinated with the work of other relevant international fora to ensure against duplication of efforts. Action Plan In support of these PRINCIPLES, we are directing our officials to: Use our established network of knowledgeable personnel to ensure a timely, effective response to transnational high-tech cases and designate a point-of-contact who is available on a twenty-four hour basis. Take appropriate steps to ensure that a sufficient number of trained and equipped law enforcement personnel are allocated to the task of combating high-tech crime and assisting law enforcement agencies of other States. Review our legal systems to ensure that they appropriately criminalize abuses of telecommunications and computer systems and promote the investigation of high-tech crimes. Consider issues raised by high-tech crimes, where relevant, when negotiating mutual assistance agreements or arrangements. Continue to examine and develop workable solutions regarding: the preservation of evidence prior to the execution of a request for mutual assistance; transborder searches; and computer searches of data where the location of that data is unknown. Develop expedited procedures for obtaining traffic data from all communications carriers in the chain of a communication and to study ways to expedite the passing of this data internationally. Work jointly with industry to ensure that new technologies facilitate our effort to combat high-tech crime to preserving and collecting critical evidence. Ensure that we can, in urgent and appropriate cases, accept and respond to mutual assistance requests relating to high-tech crime by expedited but reliable means of communications, including voice, fax, or e-mail, with written confirmation to follow where required. Encourage internationally-recognized standards-making bodies in the fields of telecommunications and information technologies to continue providing the public and private sectors with standards for reliable and secure telecommunications and data processing technologies. Develop and employ compatible forensic standards for retrieving and authenticating electronic data for use in criminal investigations and prosecutions.
Subject: FYI: Was den G8 zum Internet einfaellt (fwd) To: email@example.com Date: Tue, 19 May 1998 13:34:59 +0200 (DFT) From: firstname.lastname@example.org (Ulf Möller) > A pointer to the communique or other G8 reports from this > session would be welcomed. ----- Forwarded message from Patrick Goltzsch ----- To: email@example.com Subject: FYI: Was den G8 zum Internet einfaellt From: Patrick Goltzsch <firstname.lastname@example.org> Date: 19 May 1998 12:45:05 +0200 Aus: "THE BIRMINGHAM SUMMIT: FINAL COMMUNIQUE" (http://birmingham.g8summit.gov.uk/docs/final.shtml) (ähnlich: http://birmingham.g8summit.gov.uk/docs/crime.shtml) Unter dem Punkt: "Combating drugs and international crime [..] We agree to implement rapidly the ten principles and ten point action plan agreed by our Ministers on high tech crime. We call for close cooperation with industry to reach agreement on a legal framework for obtaining, presenting and preserving electronic data as evidence, while maintaining appropriate privacy protection, and agreements on sharing evidence of those crimes with international partners. This will help us combat a wide range of crime, including abuse of the internet and other new technologies." Hervorgehoben wird hier die "Zusammenarbeit" mit der Industrie, ein Punkt, den schon der Aktionsplan enthielt. Schön finde ich, daß die Privatsphäre angemessen geschützt werden soll. Wenn die URLs sich nicht geändert haben, dürften die angesprochenen Prinzipien und der Aktions-Plan beim US-DoJ zu finden sein: http://www.usdoj.gov/criminal/cybercrime/principles.htm http://www.usdoj.gov/criminal/cybercrime/action.htm Patrick -- weßwegen ich sie in meine Arme schloß, und mehr als 100. Mahl küssete, wodurch sie wieder völlig aufgeräumt wurde. ----- End of forwarded message from Patrick Goltzsch -----