Diplo Internet Governance Community

Stay networked. Get informed. Broadcast your projects.



For discussion on cyber crime news, research, policy and other initiatives

Members: 90
Latest Activity: Jan 14, 2017

Request for Comments: CIGF Commonwealth Cybercrime Initiative

The CIGF has specifically asked if the Diplo Security and Cybercrime discussion groups would comment on their initiative. Please review this, and the two files I will paste below. This is a chance for you to have input to ongoing Security and Cybercrime global policy. Please let us know what you think! Will it work? Is it missing something? Does it address the issues that are important to you and your country?  - Ginger


The CIGF is proposing a Commonwealth Cybercrime Initiative for CHOGM endorsement in October 2011. The initiative is based upon the premise that a holistic global approach to combat Cybercrime is required in order to harmonise legal frameworks and avoid ‘gaps’ or ‘safe havens’ for cybercriminals to operate in.  


The Initiative aims to address the urgent need to assist developing countries in the Commonwealth and beyond, to build their institutional capacities especially with respect to policy, legislation and regulation thus, making their jurisdictions more secure by denying safe havens to cyber criminals, and enabling them to become effective partners in the globally coordinated effort to combat cybercrime.


The Commonwealth Model Law on Computer and Computer Related Crime provides a foundation and an ‘off-the-shelf’ tool through which to leverage the unique advantage of the Commonwealth’s shared legal traditions for the adoption and implementation of harmonised legal regimes, thereby enabling international cooperation between our nations and the global community for effectively combating cyber crime.  The Model Law and the Commonwealth thus, provide an amenable platform from which to transition countries towards updating and harmonising their legal regimes along the lines of the Convention to bring them closer towards and in time preparing them for the adoption of and accession to the Convention on Cybercrime.

The Initiative thus, aims to assist developing countries to build their institutional and legislative capacity in fighting cybercrime through the sharing of expertise and best practice from existent resources and treaties through:


•                                    A minimum foundation and threshold with respect to common definitions and offences

•                                    Harmonised domestic criminal laws

•                                    The establishment of necessary procedural powers for investigation and prosecution

•                                    The establishments of Legal Frameworks that will, inter alia, enable international cooperation beyond simply Government to Government or LEAs to LEAs and also enable such cooperation between private sector (e.g. Banks, Telcos, ISPs) and also the technical community (e.g. ccTLDs, APWG, RISG, CERTS) both amongst themselves and with Government, Regulators and/or LEA.  Examples include industry/sector CERTs, Hotlines, LEA-ISP Cooperation Guidelines etc.

•                                    The establishment of a fast and effective regime of international co-operation for investigation and prosecution of cybercrime between Law Enforcement Agencies. This will facilitate greater certainty with respect to prosecutions of cybercrime both at a domestic and international level, in particular immediate cross-border multilateral cooperation at an operational and investigative level and also at the prosecutorial level.


Discussion Forum

One Web Day 1 Reply

Started by Eleanor Adwoa Forbea Afful. Last reply by christine agbenaza Sep 23, 2011.

Commonwealth IGF Cybercrime Initiative - Request for comments 13 Replies

Started by Virginia (Ginger) Paque. Last reply by Virginia (Ginger) Paque Aug 26, 2011.

HADOPI - The 3 strikes law 1 Reply

Started by Ricardo Patara. Last reply by Eleanor Adwoa Forbea Afful Jul 27, 2011.

Comment Wall


You need to be a member of Cybercrime to add comments!

Comment by Sahr F Gborie on July 22, 2010 at 10:49pm
Cybercrime in poor African countries, imagine it effects.
Comment by Sahr F Gborie on July 22, 2010 at 3:27pm
Am happy to be part of this group. Cyber crime is something we should fight at all level.
Comment by Marsha Guthrie on July 9, 2010 at 6:50am
Below is an interesting post from one of my group members.

The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
Comment by Ljubisa Gavrilovic on June 2, 2010 at 4:16am
Looking online for best seats for a popular event you want to attend? Then, failing to find one that is not at a premium price? No wander, bots already have bought them as soon as they are available, then they are resold at a higher price... Crime or not? (Was it a crime In Real Life once upon a time?)

Hacking Ticketmaster
Comment by CRAVO, VANESSA on April 8, 2010 at 12:25pm
Cybercrime Convention - Argentina and Portugal

Cybercrime lawmakers call for worldwide implementation of the Cybercrime Convention
Directorate of Communication – Cybercrime lawmakers call for worldwide implementation of the Budapest Convention

Press release – 254(2010)
Cybercrime lawmakers call for worldwide implementation of the Budapest Convention

Strasbourg, 25.03.2010 – At its 5th annual conference on cybercrime, the Council of Europe called for a worldwide implementation of its Convention on Cybercrime to sustain legislative reforms already underway in many countries and a global capacity-building initiative to combat web-based crimes and enhance trust in information and communication technologies.

Participants underlined the need to make the best possible use of existing tools, instruments, good practices and initiatives. They recommended that a global action plan be launched by the Council of Europe and the United Nations to get a clearer picture of criminal justice capacities and urgent needs, mobilise resources, provide support and assess progress made.

‘The UN Crime Congress in April 2010 will be an opportunity to reinforce our global response to the global threat of cybercrime and cyberterrorism. I think we will have the best chance to succeed if we unite around one international instrument which already exists – namely the Council of Europe Cybercrime Convention,’ said Council of Europe Deputy Secretary General Maud de Boer-Buquicchio, speaking at the opening of the conference.

Countries worldwide have been turning to the Budapest Convention since its adoption in 2001. During the conference, Portugal announced the ratification of the Convention and Argentina has made a request for accession.

The conference also highlighted the need to further establish dynamic partnerships between the public and private sectors and their shared responsibility in ensuring security and protecting human rights on the Internet. In this context, the conference proposed the establishment of a contact list for enhanced co-operation between law enforcement and industry.

Last but not least, participants called on ICANN (Internet Corporation for Assigned Names and Numbers) to strengthen its oversight role of the Internet domain name registration process in order to allow both the protection of private data of individual registrants (in particular in the WHOIS database) as well as the opportunity for law enforcement to use the database to fight cybercrime and cyberterrorism.

The Council of Europe will continue to address the issue of ‘cloud computing’ and intends to ensure that globally trusted privacy and data protection standards and policies are put in place, and that both its Cybercrime Convention and its Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data are applied more widely and efficiently. A human rights and privacy dimension should be brought in the discussions of next year’s conference on cybercrime.

Held in Strasbourg from 23 to 25 March, the conference brought together 300 cybercrime experts from some 60 countries, the private sector and international organisations to also discuss ways of combating online child pornography, mapping networks and initiatives as well as training for judges and prosecutors.

The conclusions of the conference will be made available at: www.coe.int/cybercrime.
Comment by Bijoy Mitra on October 1, 2009 at 8:52am
Dear All ,
I am delighted to be part of this group. It is interesting to share our knowledge and experience on cyber crime and then to discuss in order to achieve our harmonized view in forthcoming Sharm meeting of IGF.Warm Regard and Greetings_Bijoy Mitra
Comment by Ljubisa Gavrilovic on September 30, 2009 at 11:54am
Cyber Crime or Cyber Security - identity theft is officially crime in many countries. But what with digital identity theft?

While internet was anonymous it was taken lightly with a frown. Now that we have ID internet where our digital representation is becoming a part of our real identity we are facing new challenges.

What if your facebook account has been re-captured by someone else? What if your twiteer account is used by someone else. Learn about new technology and its problems - it is fresh case of digital identity theft.

Joy Bryant Impersonator Stalks Hip Hop Legends Mary J. Blige and Estelle on Twitter

Contributor Lauren Goodman caught up with the actress backstage at Isaac Mizrahi. Bryant asked if she could snap a picture of her recently published blingy wrist brace. It was surely a disorienting reversal, having her photo snapped by a celeb; so she asked the natural question, "Are you going to Tweet this?" Bryant took a deep sigh, replied in the negative, and shared this previously unpublished saga about the social networking platform.

What happened?

JB: I had to shut down an imposter on Twitter. The imposter was reaching out to celebrities, like Mary J. Blige, pretending to be me, trying to get their contact info…

What? Rewind.

JB: A friend of mine was with the singer Estelle when she gets a tweet from "me"—her Tweet name was iamjoybryant. "Hey, great to see you the other night. Sorry we didn't get to hang out. Send me your phone number, love to get together." So, Estelle says to my friend, "Aren't you friends with Joy Bryant? I have never met her in my life, and she just sent me this." So, he called me.


JB: Yes, and I started to get all these other calls, that iamjoybryant was contacting other famous people, saying we hung out, trying to get their info.

So, all these famous people thought you were a spazz…and crazy?

JB: Yeah. It was a nightmare. And they make it really hard to shut someone down on Twitter. Like almost impossible.

So what did you do?

JB: Some friends of mine, who know the owners, or people who run Twitter, got involved and contacted them. My lawyer and I had to fill-out all this paperwork, saying that I was really me, and then, I had to start a Twitter account in my name.

To block the name Joy Bryant from future imposters?

JB: Exactly. But it's a bummer because I never wanted to be on Twitter.

So who was this imposter?

JB: I have no idea.

So that's the story. Omg! What will stop these celeb-impostering Twits? The popular celebrity platform offers unprecedented access to A-list stars—Ashton, Demi, Chris Martin, not Joy Bryant, however—whom sometimes, just want to network with each other. But how do famous people (and mere mortals) protect themselves from fauxs? Especially their faux-selves?

We smell legal battles, galore."

Original article avaliable for members of social network "A Small World" http://asmallworld.net
Comment by Rudi Vansnick on August 20, 2009 at 9:22am
Having been in the e-Crime panel during the 34th ICANN meetings in Mexico, I'm pleased to participate in this group. In Belgium, we are running an Internet Ombudsman for 4 years now and we discovered the growth of criminality on the web. One of the aspects I'm now working on in Belgium is the deployment of a new law prohibiting illegal online gambling in Belgium. The law has been voted recently, we now start writing the procedures for execution.
Hope we will have the opportunity to discuss several aspects of eCrime in this group very soon, even aside the IGF.
Comment by Hountomey Jean-Robert on July 16, 2009 at 1:35am
so happy to discover this group
Comment by AMINOU NDALA on July 9, 2009 at 12:56pm
Dear All

I am happy to be part of this group. It will be interesting to learn and share experiences with you.

Members (90)




Follow us

Website and downloads

Visit Diplo's IG website, www.diplomacy.edu/ig for info on programmes, events, and resources.

The full text of the book An Introduction to Internet Governance (6th edition) is available here. The translated versions in Serbian/BCS, French, Spanish, Arabic, Russian, Chinese, and Portuguese are also available for download.


Karlene Francis (Jamaica)
Ivar Hartmann
Elona Taka (Albania)
Fahd Batayneh (Jordan)
Edward Muthiga (Kenya)
Nnenna Nwakanma (Côte d'Ivoire)
Xu Jing (China)
Gao Mosweu (Botswana)
Jamil Goheer (Pakistan)
Virginia (Ginger) Paque (Venezuela)
Tim Davies (UK)
Charity Gamboa-Embley (Philippines)
Rafik Dammak (Tunisia)
Jean-Yves Gatete (Burundi)
Guilherme Almeida (Brazil)
Magaly Pazello (Brazil)
Sergio Alves Júnior (Brazil)
Adela Danciu (Romania)
Simona Popa (Romania)
Marina Sokolova (Belarus)
Andreana Stankova (Bulgaria)
Vedran Djordjevic (Canada)
Maria Morozova (Ukraine)
David Kavanagh (Ireland)
Nino Gobronidze (Georgia)
Sorina Teleanu (Romania)
Cosmin Neagu (Romania)
Maja Rakovic (Serbia)
Elma Demir (Bosnia and Herzegovina)
Tatiana Chirev (Moldova)
Maja Lubarda (Slovenia)
Babatope Soremi (Nigeria)
Marilia Maciel (Brazil)
Raquel Gatto (Brazil)
Andrés Piazza (Argentina)
Nevena Ruzic (Serbia)
Deirdre Williams (St. Lucia)
Maureen Hilyard (Cook Islands)
Monica Abalo (Argentina)
Emmanuel Edet (Nigeria)
Mwende Njiraini (Kenya)
Marsha Guthrie (Jamaica)
Kassim M. AL-Hassani (Iraq)
Marília Maciel (Brazil)
Alfonso Avila (Mexico)
Pascal Bekono (Cameroon)

© 2020   Created by Community Owner.   Powered by

Badges  |  Report an Issue  |  Terms of Service