PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES

The adoption, in 2001, in Budapest, of the Council of Europe Convention on Cybercrime brought an important step forward in the prevention and combatting cyber-related crimes, through the creation of a special indictment (art. 6) against the production, sale, procurement for use, import, distributi...

Full description

Saved in:
Bibliographic Details
Main Author: Maxim DOBRINOIU
Format: Article
Language:English
Published: Nicolae Titulescu University Publishing House 2024-05-01
Series:Challenges of the Knowledge Society
Subjects:
Online Access:http://cks.univnt.ro/download/cks_2024_articles%252F1_CKS_2024_CRIMINAL_LAW%252FCKS_2024_CRIMINAL_LAW_004.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841561339446689792
author Maxim DOBRINOIU
author_facet Maxim DOBRINOIU
author_sort Maxim DOBRINOIU
collection DOAJ
description The adoption, in 2001, in Budapest, of the Council of Europe Convention on Cybercrime brought an important step forward in the prevention and combatting cyber-related crimes, through the creation of a special indictment (art. 6) against the production, sale, procurement for use, import, distribution, import or making available of devices, computer programs, passwords or any other such data with the scope to further illegal access to a computer system, interception without right of a computer data transmission, an illegal data interference or an illegal system interference, offences comprised in the art. 2 to 5 of the Convention. Although the offence in art. 6 represents the „mean-crime” in relation with the further commission of the above mentioned crimes against the confidentiality, integrity and availability of computer data and systems („purpose-crimes”), the nowadays Cybercrime phenomenon shows that the misuse of the devices and computer programs actually exceeds the legal boundaries of art. 2 to 5, and (technically) impacts much of the other forms of cyber-related or cyber-enabled offences, especially in the FinTech area, electronic payment, blockchain, cryptocurrency etc. Taking into consideration the proliferation of illegal activities against personal information, confidential data or access credentials, especially the commercialization, especially in Dark Web, of codes, passwords, hacking tools, malware and other present or future cutting-edge system interference technologies, thus posing a great danger to the whole cyber-ecosystem, an improvement of art. 6, and of all the correspondent (related) articles in the special laws or the criminal codes adopted by the signatory countries, would contribute to the creation of an extensive and much comprehensive legal tool in the prevention and efficiently combating cybercrimes.
format Article
id doaj-art-69611adf75c645208236f4eacde16753
institution Kabale University
issn 2068-7796
language English
publishDate 2024-05-01
publisher Nicolae Titulescu University Publishing House
record_format Article
series Challenges of the Knowledge Society
spelling doaj-art-69611adf75c645208236f4eacde167532025-01-03T01:47:07ZengNicolae Titulescu University Publishing HouseChallenges of the Knowledge Society2068-77962024-05-011712131PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMESMaxim DOBRINOIU0Associate Professor, Faculty of Law, „Nicolae Titulescu” University of BucharestThe adoption, in 2001, in Budapest, of the Council of Europe Convention on Cybercrime brought an important step forward in the prevention and combatting cyber-related crimes, through the creation of a special indictment (art. 6) against the production, sale, procurement for use, import, distribution, import or making available of devices, computer programs, passwords or any other such data with the scope to further illegal access to a computer system, interception without right of a computer data transmission, an illegal data interference or an illegal system interference, offences comprised in the art. 2 to 5 of the Convention. Although the offence in art. 6 represents the „mean-crime” in relation with the further commission of the above mentioned crimes against the confidentiality, integrity and availability of computer data and systems („purpose-crimes”), the nowadays Cybercrime phenomenon shows that the misuse of the devices and computer programs actually exceeds the legal boundaries of art. 2 to 5, and (technically) impacts much of the other forms of cyber-related or cyber-enabled offences, especially in the FinTech area, electronic payment, blockchain, cryptocurrency etc. Taking into consideration the proliferation of illegal activities against personal information, confidential data or access credentials, especially the commercialization, especially in Dark Web, of codes, passwords, hacking tools, malware and other present or future cutting-edge system interference technologies, thus posing a great danger to the whole cyber-ecosystem, an improvement of art. 6, and of all the correspondent (related) articles in the special laws or the criminal codes adopted by the signatory countries, would contribute to the creation of an extensive and much comprehensive legal tool in the prevention and efficiently combating cybercrimes.http://cks.univnt.ro/download/cks_2024_articles%252F1_CKS_2024_CRIMINAL_LAW%252FCKS_2024_CRIMINAL_LAW_004.pdfcriminal liabilitymisuse of devicescyber-dependent crimescyber-enabled crimescoe convention on cybercrimeillegal operations with devices and software
spellingShingle Maxim DOBRINOIU
PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
Challenges of the Knowledge Society
criminal liability
misuse of devices
cyber-dependent crimes
cyber-enabled crimes
coe convention on cybercrime
illegal operations with devices and software
title PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
title_full PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
title_fullStr PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
title_full_unstemmed PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
title_short PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
title_sort proposals for a broader approach of misuse of devices and programs provision in combating cyber dependent and cyber enabled crimes
topic criminal liability
misuse of devices
cyber-dependent crimes
cyber-enabled crimes
coe convention on cybercrime
illegal operations with devices and software
url http://cks.univnt.ro/download/cks_2024_articles%252F1_CKS_2024_CRIMINAL_LAW%252FCKS_2024_CRIMINAL_LAW_004.pdf
work_keys_str_mv AT maximdobrinoiu proposalsforabroaderapproachofmisuseofdevicesandprogramsprovisionincombatingcyberdependentandcyberenabledcrimes