19 May 1998: Add message on UK and US docs
Link to mirror of DoJ docs on G8 high tech crime

19 May 1998


To: ukcrypto@maillist.ox.ac.uk
Subject: G8
Date: Tue, 19 May 1998 10:21:10 +0100
From: Ross Anderson <Ross.Anderson@cl.cam.ac.uk>

Perhaps we should take some note of the recent G8 summit. The communique
says at section 21 (2) <http://birmingham.g8summit.gov.uk/docs/>

We agree to implement rapidly the ten principles and ten point action
plan agreed by our Ministers on High Tech Crime. We call for close 
cooperation with industry to reach agreement on a legal framework for 
obtaining, presenting and preserving electronic data as evidence, while 
maintaining appropriate privacy protection...

Looking for these ten principles, we find a Foreign Office leaflet with
ten principles including <http://birmingham.g8summit.gov.uk/crime/>


`ensuring that evidence and computer data are always accessible and that
transborder searches can take place'

`Making sure everyone investigating a crime can get the information they 
need'

`Setting international standards for retrieving electronic data and making 
sure it is authentic'

This document (`G8/FCO crime leaflet') makes clear that the priorities
include not just `paedophile networks' but also `stolen vehicles'. In
another section, `money laundering' is a priority, as is `smuggling of
illegal immigrants'.

Looking for a source for this, one comes to a Dec 97 meeting of justice 
ministers <http://birmingham.g8summit.gov.uk/prebham/washington.1297.shtml>

`Each country must have in place domestic laws that ensure that...
evidence of high-techn crimes can be preserved and collected in a timely
fashion'

The relevant annex finally contains the unexpurgated text:


PRINCIPLES AND ACTION PLAN TO COMBAT HIGH-TECH CRIME

Statement of Principles

We hereby endorse the following PRINCIPLES, which should be supported by 
all countries:

There must be no safe havens for those who abuse information technologies.

Investigation and prosecution of international high-tech crimes must be 
coordinated among all concerned States, regardless of where harm has 
occurred.

Law enforcement personnel must be trained and equipped to address 
high-tech crimes.

Legal systems must protect the confidentiality, integrity, and 
availability of data and systems from unauthorized impairment and ensure 
that serious abuse is penalized.

Legal systems should permit the preservation of and quick access to 
electronic data, which are often critical to the successful investigation 
of crime.

Mutual assistance regimes must ensure the timely gathering and exchange 
of evidence in cases involving international high-tech crime.

Transborder electronic access by law enforcement to publicly available 
(open source) information does not require authorization from the State 
where the data resides.

Forensic standards for retrieving and authenticating electronic data for 
use in criminal investigations and prosecutions must be developed and 
employed.

To the extent practicable, information and telecommunications systems 
should be designed to help prevent and detect network abuse, and should 
also facilitate the tracing of criminals and the collection of evidence.

Work in this area should be coordinated with the work of other relevant 
international fora to ensure against duplication of efforts.




Action Plan

In support of these PRINCIPLES, we are directing our officials to:

Use our established network of knowledgeable personnel to ensure a timely, 
effective response to transnational high-tech cases and designate a 
point-of-contact who is available on a twenty-four hour basis.

Take appropriate steps to ensure that a sufficient number of trained and 
equipped law enforcement personnel are allocated to the task of combating 
high-tech crime and assisting law enforcement agencies of other States.

Review our legal systems to ensure that they appropriately criminalize 
abuses of telecommunications and computer systems and promote the 
investigation of high-tech crimes.

Consider issues raised by high-tech crimes, where relevant, when 
negotiating mutual assistance agreements or arrangements.

Continue to examine and develop workable solutions regarding: the 
preservation of evidence prior to the execution of a request for mutual 
assistance; transborder searches; and computer searches of data where 
the location of that data is unknown.

Develop expedited procedures for obtaining traffic data from all 
communications carriers in the chain of a communication and to study 
ways to expedite the passing of this data internationally.

Work jointly with industry to ensure that new technologies facilitate 
our effort to combat high-tech crime to preserving and collecting 
critical evidence.

Ensure that we can, in urgent and appropriate cases, accept and respond 
to mutual assistance requests relating to high-tech crime by expedited 
but reliable means of communications, including voice, fax, or e-mail, 
with written confirmation to follow where required.

Encourage internationally-recognized standards-making bodies in the 
fields of telecommunications and information technologies to continue 
providing the public and private sectors with standards for reliable and 
secure telecommunications and data processing technologies.

Develop and employ compatible forensic standards for retrieving and 
authenticating electronic data for use in criminal investigations and 
prosecutions. 


Subject: FYI: Was den G8 zum Internet einfaellt (fwd) To: jya@pipeline.com Date: Tue, 19 May 1998 13:34:59 +0200 (DFT) From: ulf@fitug.de (Ulf Möller) > A pointer to the communique or other G8 reports from this > session would be welcomed. ----- Forwarded message from Patrick Goltzsch ----- To: debate@fitug.de Subject: FYI: Was den G8 zum Internet einfaellt From: Patrick Goltzsch <pat@minerva.hanse.de> Date: 19 May 1998 12:45:05 +0200 Aus: "THE BIRMINGHAM SUMMIT: FINAL COMMUNIQUE" (http://birmingham.g8summit.gov.uk/docs/final.shtml) (ähnlich: http://birmingham.g8summit.gov.uk/docs/crime.shtml) Unter dem Punkt: "Combating drugs and international crime [..] We agree to implement rapidly the ten principles and ten point action plan agreed by our Ministers on high tech crime. We call for close cooperation with industry to reach agreement on a legal framework for obtaining, presenting and preserving electronic data as evidence, while maintaining appropriate privacy protection, and agreements on sharing evidence of those crimes with international partners. This will help us combat a wide range of crime, including abuse of the internet and other new technologies." Hervorgehoben wird hier die "Zusammenarbeit" mit der Industrie, ein Punkt, den schon der Aktionsplan enthielt. Schön finde ich, daß die Privatsphäre angemessen geschützt werden soll. Wenn die URLs sich nicht geändert haben, dürften die angesprochenen Prinzipien und der Aktions-Plan beim US-DoJ zu finden sein: http://www.usdoj.gov/criminal/cybercrime/principles.htm http://www.usdoj.gov/criminal/cybercrime/action.htm Patrick -- weßwegen ich sie in meine Arme schloß, und mehr als 100. Mahl küssete, wodurch sie wieder völlig aufgeräumt wurde. ----- End of forwarded message from Patrick Goltzsch -----