Due to the varying nature of offences which can be committed in cyberspace, the Australian framework spans over state and federal legislation and is not limited to one particular legal provision.
For example, similar offences can be found in NSW and Cth provisions.
Who Investigates cyber crime / computer crime in Australia?
The Australian Federal Police
The Federal Police are responsible for investigating and responding to cybercrime of national significance. These are referred to as high tech crime and classified into the following:
– Computer Intrusions: unauthorised access of a computer or network of computers.
– Unauthorised modification of data, including destruction of data.
– Creation and distribution of malicious software (viruses, worms, trojans).
– Distributed denial of service (DDOS) attacks using botnets: the deliberate disruption or impairment of a service or communication using malicious software.
They also are responsible for child protection and investigate crimes associated with online child sex exploitation and travelling child sex offenders.
State and Territory Police
The NSW Police have jurisdiction to investigate and prosecute offences that occur on the cyber sphere. Police are able to investigate a range of matters, from child sexual exploitation to cyber bullying. Within the field of cyber security, they focus on online fraud which includes internet banking, mobile banking, phishing, mule recruitment, shopping and auction site fraud, scams, spam and identity theft. The AFP will have jurisdiction where online fraud affects a government department.
The Australian Crime Commission
The Commission discovers, understands and prioritises cybercrime threat intelligence to enhance response options.
Australian Security Intelligence Organisation
ASIO has strategic intelligence analysts that investigate cyber and telecommunication threats that affect national security.
Who Prosecutes Cyber crime/ computer crimes in Australia?
The Office of the Commonwealth Director of Public Prosecutions commonly prosecute offences within sections 478.1(1), 477.3(1) and 474.17 of the Criminal Code (Cth). They relate to unauthorised access to data, impairment of electronic communication and using carriage service to harass or cause offence. Offences that fall within a state or territory are prosecuted by the corresponding state Director of Public Prosecutions.
Where can the law and offences for cyber crime and computer crime be found?
|Crimes Act 1900 (NSW)||s66EB: Procuring or grooming child under 16 for unlawful sexual activity
s91H: Production, dissemination or possession of child abuse material
s192E: Fraud (including online fraud)
s308C: Unauthorised access, modification or impairment with intent to commit serious indictable offence
|Surveillance Devices Act 2007 (NSW)||s7: Prohibition on installation, use and maintenance of listening devices|
|Crimes (Domestic and Personal Violence) Act 2007 (NSW||s13: Stalking or intimidation with intent to cause fear of physical or mental harm (Bullying)|
|Criminal Code Act 1995 (Cth)
Amended in 2001 by the Cybercrime Act 2001
|134.1: Obtaining property by deception
372.1: Dealing in identification information
372.1A: Dealing in identification information that involves use of a carriage service
372.2: Possession of identification information
474.14: Using a telecommunications network with intention to commit a serious offence
474.15: Using a carriage service to make a threat
474.16: Using a carriage service for a hoax threat
474.17: Using a carriage service to menace, harass or cause offence
474.19: Using a carriage service for child pornography material
474.20: Possessing, controlling, producing, supplying or obtaining child pornography material for use through a carriage service
477.1: Unauthorised access, modification or impairment with intent to commit a serious offence
477.2: Unauthorised modification of data to cause impairment
477.3: Unauthorised impairment of electronic communication
478.1: Unauthorised access to, or modification of, restricted data
478.2: Unauthorised impairment of data held on a computer disk etc.
478.3: Possession or control of data with intent to commit a computer offence
478.4: Producing, supplying or obtaining data with intent to commit a computer offence
How can Nyman Gibson Miralis assist if you are being investigated for Cyber crime / computer crime offences?
The investigation and prosecution of cyber crime is becoming increasingly international with multiple agencies around the world often involved in the process. Individuals and businesses may therefore become the subject of parallel criminal investigations and prosecutions raising complex jurisdictional and procedural issues. By its very nature cyber crime is borderless and therefore the exposure to penalties outside the jurisdiction where an individual or business is physically located is often a real possibility.
Nyman Gibson Miralis have expertise in dealing with complex national and international cyber crime investigations and advising individuals and businesses of defence strategies that take into account the complex and global nature of cyber crime investigation and criminal litigation. Nyman Gibson Miralis remains steadfast in ensuring the upholding of international law principles which focus on the protection of human rights within a transnational landscape.
Our expertise includes dealing with law enforcement requests for information from foreign jurisdictions, challenging potential extradition proceedings as well as advising and appearing in cases where assets have been restrained and confiscated worldwide.
The importance of obtaining expert advice in this complex area is highlighted by the multiple criminal and civil exposures individuals and companies may face globally.
Nyman Gibson Miralis have acted in significant cases of cyber crime / computer crimes globally and work strategically with lawyers around the world to ensure that you have the access to the strategic legal advise and representation.
What we can help with:
- Malware & phishing offences
- Computer hacking
- Computer offences
- Internet Fraud, Online Fraud, Email Fraud
- Bootlegging and tripping
- Bitcoin and Cryptocurrency fraud and seizure
- Spreading viruses, identify theft
- DDOS attacks, Botnet