-Caveat Lector-

Cyber-crime justifies world government
By Thomas C Greene in Washington
Posted: 31/05/2001 at 03:06 GMT


The Council of Europe, enthused by considerable American guidance and
support, has issued a proposed final draft for an international cybercrime
treaty to harmonize statutes related to electronic criminal activity,
cross-border police cooperation, and judicial policy throughout Europe and
North America, more or less along lines preferred by the United States.

Organized gangsters, terrorists and sexually-exploited children loom large
in the document, as they always do when the natural rights of innocent
adults are to be sacrificed to law-enforcement expedience.

We're accustomed to that much; what's special about this item is the
banana-republic-style contempt it exhibits towards accepted standards of
political accountability, legislative procedure and state sovereignty.

A number of crimes have got to be made both uniform and reciprocal among all
signatory countries for the scheme to work properly; thus national
legislatures will have to be made compliant.

Or, as the document puts it, signatories shall cooperate "on the basis of
uniform or reciprocal legislation and domestic laws to the widest extent
possible."

Legislative Blackmail
Call us naive, but we always imagined that legislative bodies were meant,
ideally, anyway, to be independent of national bureaucracies and responsive
to the will of the people.

The COE dispels this quaint myth. "Each Party shall adopt such legislative
and other measures as may be necessary to establish as criminal offences
under its domestic law...." a shopping list of naughty on-line behavior, the
document announces coolly.

Just like that, national and state legislatures will be expected to bring
their laws in line with approved 'international' standards; but by what
mechanism, the document's authors don't quite say.

Perhaps a combination of back-channel horse trading, political blackmail and
PR sound-bite brutality, if not an outright administrative decree, is
presumed.

The list of items the COE insists must be made illegal includes unauthorized
access to a computer system; the interception of private communications (by
players other than by Big Brother, naturally); damaging, deleting or
altering computer data; producing, distributing or possessing child
pornography; and data forgery.

Signatories will be graciously permitted to require that actual harm be
demonstrated in order for sketchy computer activity to be made criminal, or
not as they see fit.

As for kiddie porn, signatories have the option of not criminalizing mere
possession, and of adjusting the definition of a minor to somewhere between
eighteen and sixteen years of age, but no lower.

Of course, the legal age of consent in some jurisdictions is as low as
fourteen. We've often wondered how it is that an individual can be old
enough to consent to engage in sexual activity but not old enough to consent
to be photographed whilst going about it. It's another of life's mysteries,
apparently.

Snooping Sanctified
Now for the scary part. The COE decrees that all signatories rig their
legislative agenda to empower law-enforcement bodies to monitor, intercept,
search and seize computer data and packet traffic pretty much according to
their convenience.

When the Feds suspect that a crime may have been committed, or may be
imminent, they should be allowed to order the storage and preservation of
any data or packet traffic until they make up their minds whether or not
they have enough evidence to proceed with a criminal case.

Parties to the new scheme "shall adopt such legislative and other measures
as may be necessary to oblige [anyone in control of computer data] to
preserve and maintain the integrity of that computer data for a period of
time as long as necessary, up to a maximum of 90 days, to enable the
competent authorities to seek its disclosure."

And of course the data custodians -- an ISP, say, or a network
administrator -- must keep their mouths shut under penalty of criminal
liability.

"Each Party shall adopt such legislative or other measures as may be
necessary to oblige the custodian or other person who is to preserve the
computer data to keep confidential the undertaking of such procedures,"
we're told.

It appears that the treaty would also do an end-run around the normal
practice of obtaining a warrant before snooping.

"Each Party shall adopt such legislative and other measures as may be
necessary to empower its competent authorities to order: a person in its
territory to submit specified computer data in that person's possession or
control, which is stored in a computer system or a computer-data storage
medium; and a service provider offering its services in the territory of the
Party to submit subscriber information relating to such services in that
service provider's possession or control."

'Subscriber information' can involve "the subscriber's identity, postal or
geographic address, telephone and other access number, billing and payment
information, available on the basis of the service agreement or
arrangement," the document says.

A further assault on civil rights comes from granting an automatic extension
of search authorizations which encompass systems in some way connected to
the target system, even when the secondary system is in another
jurisdiction.

And taking a page out of the dreaded UK Regulation of Investigatory Powers
(RIP) Act, the COE reckons it would be swell if law enforcement could compel
people to cough up their encryption keys on demand when they want to do some
in-depth investigating.

"Each Party shall adopt such legislative and other measures as may be
necessary to empower its competent authorities to order any person who has
knowledge about the functioning of the computer system or measures applied
to protect the computer data therein to provide, as is reasonable, the
necessary information," the document says.

The treaty even offers guidance to parties where a request for data or
access to data is made across jurisdictions but no mutual agreement is in
force. The treaty itself, the COE says, can be used in lieu of other
arrangements.

"When there is no mutual assistance treaty or arrangement on the basis of
uniform or reciprocal legislation in force between the requesting and the
requested Parties, the provisions of this article shall apply."

States' Rights
The COE and its American advisors quite cavalierly make a mockery of state
sovereignty.

Using the US federal system as an example, the treaty authors observe that
"in the United States....federal criminal legislation generally regulates
conduct based on its effects on interstate or foreign commerce, while
matters of minimal or purely local concern are traditionally regulated by
the constituent states."

Fortunately, these piddling state concerns needn't cause the slightest
inconvenience to federal overlords.

"This approach to federalism....recognizes that the constituent states would
continue to regulate conduct that has only minor impact or is purely local
in character," the authors say contemptuously.

For the really important stuff, which means everything the Feds happen to
care about, there's a convenient mechanism to exert jurisdiction according
to the treaty, "since the use of the Internet provides the effect on
interstate or foreign commerce necessary to invoke federal law."

So nuts to your local, provincial or state government. Merely accessing the
Internet suddenly opens you up to 'conduct regulation', as the treaty so
quaintly puts it, by a distant, multinational body of high-minded overseers
far beyond the reach of any known political mechanism of accountability.

The document overall reads like some perverse decree drafted by that mighty
triumvirate of paranoid fantasy, the Council on Foreign Relations, the
Bilderberg Group and the Trilateral Commission in some world-domination
free-for-all.

We've always prided ourselves on our resistance to irrational fears; but
after reading the COE's latest offering, we have to wonder if there might be
something to those world-government rumors after all. ®

<A HREF="http://www.ctrl.org/";>www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html";>Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/";>ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to