{"id":480,"date":"2003-11-19T00:00:00","date_gmt":"2003-11-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/19\/bush-pushes-for-cybercrime-treaty\/"},"modified":"2021-12-30T11:37:26","modified_gmt":"2021-12-30T11:37:26","slug":"bush-pushes-for-cybercrime-treaty","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/19\/bush-pushes-for-cybercrime-treaty\/","title":{"rendered":"Bush pushes for cybercrime treaty"},"content":{"rendered":"<p>President Bush has asked the U.S. Senate to ratify the first international cybercrime treaty.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a letter to the Senate on Monday, Bush called the Council of Europe&#8217;s controversial treaty &#8220;an effective tool in the global effort to combat computer-related crime&#8221; and &#8220;the only multilateral treaty to address the problems of computer-related crime and electronic evidence gathering.&#8221;<\/p>\n<p>Even though the United States is a nonvoting member of the Council of Europe, it has pressed hard for the cybercrime treaty as a way to establish international criminal standards related to copyright infringement, online fraud, child pornography and network intrusions.<\/p>\n<p>The U.S. Department of Justice says the treaty will eliminate &#8220;procedural and jurisdictional obstacles that can delay or endanger international investigations.&#8221;<\/p>\n<p>Civil libertarians have objected to the treaty ever since it became public in early 2000, arguing that it would endanger privacy rights and grant too much power to government investigators.<\/p>\n<p>&#8220;It would require nations that participate in the treaty to adopt all sorts of intrusive surveillance measures and cooperate with other nations, even when the act that&#8217;s being investigated is not a crime in their home country.&#8221;<\/p>\n<p>So far, according to the Council of Europe, only three countries&#8211;Albania, Croatia and Estonia&#8211;have ratified the treaty.<\/p>\n<p>The treaty requires each participating nation to ban the distribution of software that is designed for the &#8220;purpose of committing&#8221; certain computer crimes, requires Internet providers to ensure &#8220;expeditious preservation of traffic data&#8221; upon request, and permits real-time wiretapping of Internet service providers.<\/p>\n<p>An addition to the Council of Europe&#8217;s cybercrime treaty would ban &#8220;hate speech&#8221; from the Internet, a common prohibition in European nations that violates the U.S. Constitution&#8217;s First Amendment.<\/p>\n<p>The Justice Department said last year that it does not support the optional addition but still endorses the underlying treaty.<\/p>\n<p>More info: [url=http:\/\/news.com.com\/2100-1028_3-5108854.html?tag=nefd_top]http:\/\/news.com.com\/2100-1028_3-5108854.html?tag=nefd_top[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-480","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=480"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/480\/revisions"}],"predecessor-version":[{"id":2967,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/480\/revisions\/2967"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}