BitDepthFeatured

Professional perspectives on new cybercrime laws

3 Mins read

Above: Photo by agsandrew/DepositPhotos

BitDepth#1446 for February 19, 2024

A spirited discussion of last week’s column on LinkedIn offered wider perspectives on the cybercrime laws which the Attorney General promises for later in 2024.

Kwesi Prescod, principal consultant for Prescod Associates noted that an ethical hacker would not be affected by the cybercrime act because that person would be acting with authorisation.

Kevon Swift, a digital policy expert, specialising in digital trust issues at the Latin American and Caribbean Internet Addresses Registry (LACNIC) went further, dismissing the concern as “nonsensical.”

“Cybercrime law squarely addresses unlawful conduct, which is defined and sanctioned according to international standards,” he said.

“Authorisation, based on a decision by a duly competent court is prescribed under the amended version of the Interception of Communications Act, 2020.”

Swift noted that there was an issue with clause six, which criminalised, “A person who, intentionally and without lawful excuse or justification, remains logged into a computer in a computer system or part of a computer system or continues to use a computer system.”

He noted that “[It] need not even be considered a law as automatic sign out is a prominent feature by design for secured computers. But unless we modernise the descriptions of unlawful behaviours in 2017 cybercrime bill, we will be sifting water with a colander.”

On the question of crafting legislation that’s flexible enough to evolve meaningfully in a changing environment, Prescod noted that, “The Digital Transformation Plan still isn’t published. The consultation hasn’t put a green paper out yet. This is the first time in 20 years that Trinidad and Tobago doesn’t have a published plan. That failure alone is an indictment of sorts.”

“The over-regulation narrative is hogwash. Enactment of existing laws such as Data Protection only requires the hiring of staff – without which the Digital ID thrust could be subject to Judicial attention – or Electronic Transactions, which only needs the establishment of certain administrative frameworks to recognise operations for legal grounding.”

“In the latter instance, the courts themselves have adopted the model proposed and forged ahead to become the most digitally transformed agency in the public sector.”

One commenter suggested that a consolidation of cybersecurity roles in the public service would follow its planned restructuring, strengthening the digital national security profile by centralising the function within government.

Prescod did not agree.
“The restructuring of the public service has been ongoing for 30 years, since Gordon Draper,” he argued.

Photo by Evegnly Shkolenko/DepositPhotos

“The reevaluation of public sector positions still isn’t done. The Service Commission is still hiring “typist/stenographers” when no one actually does stenography.”

“We are behind again, and talking while we become more uncompetitive,” argues Prescod.

“We pioneered the need for these frameworks in the Caribbean in 2008 then stalled. Jamaica and Barbados have functioning Data Commissioners. The OECS countries have digital IDs deployed for multiple government services and updated their telecoms laws to regulate the digital economy. Grenada has laws recognising NFTs.”

“In TT, we’re talking in circles, achieving nothing, without even a published plan. We’re seeking to undermine existing private sector endeavours – inconsistent with longstanding macro economic policy – instead of focusing on a role (laws and market structure) in areas where the private sector has failed to act.”

“One point we keep missing in national conversations is that the overwhelming majority of cybercrimes are transnational and would therefore require international cooperation, rooted in harmonised law, to facilitate investigations, evidence collection and eventually prosecutions,” said Kevon Swift.

“The proposed articles are not unique, nor are they expected to operate only locally or in a vacuum. If unlawful behaviours are not adequately criminalised locally, there is no basis on which law enforcement can work with foreign counterparts, or internet intermediaries (email, social media, cloud services providers), so no justice can be delivered.”

“Evidence transfer, for volatile evidence such as digital evidence, requires dual criminality to be established (harmonised/equivalent substantive provisions) with a minimum penalty of one year’s imprisonment in order for expedited assistance to occur outside traditional Mutual Legal Assistance Treaties, which can take 11 months or more to deliver results.”

“But there are a lot of informal cooperation activities, particularly involving threat monitoring and analysis, which can occur outside these laws. Local ethical hackers would need to bolster their affiliations with trust communities, such as [regional] CSIRT associations and even global ones such as FIRST.”

“At LACNIC events, we host the Latin American and Caribbean version of the FIRST conference and we’ve been fortunate enough to have actors such as TTCSIRT participate there. For things like penetration testing, a client’s authorisation is still key. Anything outside of that, especially probing secured computer systems, is globally accepted as an offence.”

Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Jamaica’s digital transformation journey

Jamaica’s digital transformation journey

"Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan."
Read More
How USB-C failed us

How USB-C failed us

USB-C cables shipped with smartphones were often cheap and delivered power, but limited or no data transfer at all.
Read More
How AI summaries will break knowledge

How AI summaries will break knowledge

Google has been indexing the collective wisdom of the open internet for the last two-and-a-half decades.
Read More
Drifting to data-driven decisions

Drifting to data-driven decisions

"Many organizations are collecting data, but few are converting it into action."
Read More
What .POST means for secure communications

What .POST means for secure communications

Posts are not just offering digital postal services, they are offering digital services across multiple sectors.
Read More
Samsung launches new Z series Flip, Fold

Samsung launches new Z series Flip, Fold

A foldable phone looks like a standard smartphone when shut and usually has a functional screen on its face.
Read More
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?
Jamaica’s digital transformation journey Jamaica’s digital transformation journey
How USB-C failed us How USB-C failed us
How AI summaries will break knowledge How AI summaries will break knowledge
Drifting to data-driven decisions Drifting to data-driven decisions
What .POST means for secure communications What .POST means for secure communications
Samsung launches new Z series Flip, Fold Samsung launches new Z series Flip,...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
Opinion

How technology Is reinventing traditional industries in the 21st century

7 Mins read
Above: AI generated image by tongpatong321/123rf.com The way we make, buy, heal, and bank has been transformed by technological breakthroughs….
BitDepthFeatured

Jamaica's digital transformation journey

3 Mins read
“Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan.”
Opinion

How technology is changing business and industry

7 Mins read
Traditional industries are transforming through digital tools that streamline processes and drive new services
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
BitDepthFeatured

The issues arising from new cybercrime laws

0
Share your perspective in the comments!x
()
x