Colophon:

Stein Schjolberg

Chief Judge (Ret.)

Norway

biography


Chairman, High-Level Experts Group (HLEG) - 100 experts from around the world (2007-2008) ITU The Global Cybersecurity Agenda


All comments are appreciated, Judge Stein Schjolberg

A book  «Cyberkriminalitet»  (May 2017 norwegian text) Comments: «Godt skrevet og et viktig bidrag på veien videre.» Roar Thon, (NSM):

News Archive 2005 -2015

Video presentations:
Proposal on a Geneva Declaration for Cyberspace 
Proposal on a UN Treaty on combating online child sexual abuse
A Geneva Declaration for Cyberspace (full text - pdf)
-------------------------------------------------------------------------------------------
2017
November
International Conference on Cyberlaw, Cybercrime and Cybersecurity i New Dehli, 16-17. November 2017;
October
A proposal for a United Nations Treaty on combating online child sexual abuse, presented at an UNODC conference in Bangkok, October 17-19.

September
A proposal for A Geneva Declaration for Cyberspace was presented at the 11th Pan-European Conference on International Relations, in Barcelona September 13-16.
The Role of INTERPOL in a Geneva Convention or Declaration for Cyberspace was presented in a Report after the INTERPOL Global Cybercrime Expert Group Meeting, and the INTERPOL World 2017 in Singapore July 5-7. 

August
An article on new risks and threats in cyberspace and the challenges against national societies in Norway. (Norwegian text only)
En kronikk: Et nytt trussel-  og risikobilde i Norge.

May
A new book on Cyberkriminalitet was published in Norway. The text is  norwegian, but all appendixes are in english text: 
1. Council of Europe Convention on Cybercrime (2001); 
2. The Chairmans Report, ITU High-level Experts Group (HLEG) (2008); 
3. The Third Pillar for Cyberspace -  A draft United Nations Treaty on an International Court or Tribunal for Cyberspace (2015) 

April
INTERPOL and Public-Private Partnerships
An INTERPOL-led operation targeting cybercrime across the ASEAN region has included assistance from experts in seven private sector companies - Trend Micro, Kaspersky Lab, Cyber Defense Institute, Booz Allen Hamilton, British Telecom, Fortinet and Palo Alto Networks. They also took part in pre-operational meetings in order to develop actionable information packages.

The new book Cyber-Attacks – Prevention-Reactions: The Role of States and Private Actors
The book aims to conceptualize and present, in a concise manner, the main questions raised in the field of international law regarding the role of the States and private actors in the prevention and the reaction to cyber-attacks.
March
Developing a System of International Rules 
China has released a document titled "International Strategy of Cooperation on Cyberspace", including developing a system of international rules.
Cyberspace needs to be governed by rules and norms of behavior. China is firmly committed to safeguarding cyber security, and opposes to all forms of hacking and regards them illegal criminal activities that should be tackled in accordance with law and relevant international legal instruments. Given that cyber attacks are usually transnational and difficult to attribute, countries should work together to ensure cyber security through constructive consultation and cooperation.

February
The need for a Digital Geneva Convention
Microsoft¨s President and Chief Legal Officer Brad Smith, USA, has made the following proposal:
Just as the Fourth Geneva Convention has long protected civilians in times of war, we now need a Digital Geneva Convention that will commit governments to protecting civilians from nation-state attacks in times of peace.  And just as the Fourth Geneva Convention recognized that the protection of civilians required the active involvement of the Red Cross, protection against nation-state cyberattacks requires the active assistance of technology companies.  The tech sector plays a unique role as the internet’s first responders, and we therefore should commit ourselves to collective action that will make the internet a safer place, affirming a role as a neutral Digital Switzerland that assists customers everywhere and retains the world’s trust.

January
The book: The History of Cybercrime (1976-2016) presents new information from United Nations organizations, INTERPOL and other international organizations, a special chapter on Public-Private Partnerships, information on Internet of Things (IoT), and the problems encryption creates for law enforcements around the world. 

2016
December
The Third U.S. - China High-Level Joint Dialogue on Cybercrime and Related Issues, was held in Washington D.C. Officials from both sides praised the progress made since their first dialogue a year ago.
U.S. officials presented a Joint Summary of Outcomes. The outcomes of the third dialogue are listed.

November
A Geneva Declaration for Cyberspace (live summary - mp4)

October
 A Proposal for a Geneva Convention or Declaration for Cyberspace, by Judge Stein Schjolberg, Norway, and Professor Solange Ghernaouti, Switzerland, was published on VFAC Review, No. 12 (Korean Institute of Criminology, October 2016).  
September
 G20 Leaders Communique from the Hangzhou Summit in China
June
 The Second U.S. - China High-Level Joint Dialogue on Cybercrime and Related Issues, was held in Beijing on June 14. China emphasized the dialogue as the major mechanism for cooperation. It was agreed to hold  the Third dialogue in Washington later this year. 
 U.S. officials presented a Joint Summary of Outcomes that included Hotline Mechanism, Information Sharing, Case Cooperation and Resources, and establishing mechanisms.
May
 The U.S. Supreme Court has amended the Fedeal Rules of Criminal Prosedures, and has adopted new Criminal Rules 4, 41, and 45. Federal judges should be able to issue hacking warrants to FBI and other federal law enforcement for anywhere in the U.S. if the suspect has tried to hide their location. A summons to an organisation under Rule 4(c)(3)(D) may also be served at a place not within a judicial district of the United States. The amendment shall take effect on December 1, 2016.
 The FBI Director James Comey has said he has seen some improvement from China in cooperating on cybercrime. 
April
 A Draft Encryption Bill has been presented in the U.S. Senate by the Senators Richard Burr and Dianne Feinstein. The Draft Bill is titled the «Compliance with Court Orders Act of 2016».  
Cyber norms guiding States behaviour in cyberspace have been presented in a new book «International Cyber Norms: Legal, Policy & Industry Perspectives».
A Russian-American dialogue has agreed to organize a regular review of the the relations in order to resolve the existing difficulties.
The Chinese President Xi Jinping and President Barack Obama had a talk, including cybersecurity, at the Nuclear Security Summit, in Washington DC.

March
The global IT company Apple Inc. is challenged by a Court Order from the U.S. District Court for the Central District of California, and the FBI, on law enforcements access to locked or encrypted mobile device in the investigation of the San Bernardino terrorist attack in December 2, 2015. The Court Order  require Apple to provide ”reasonable technical assistance to assist law enforcement agents in obtaining access to the data on the subject device.” , see
http://www.theguardian.com/technology/2016/feb/25/fbi-director-james-comey-apple-encryption-case-legal-precedent
https://www.fbi.gov/news/pressrel/press-releases/fbi-director-comments-on-san-bernardino-matter

February
An Exceutive Order by President Obama has established a Commission on Enhancing National Cybersecurity.
    The United Nations General Assembly Resolution of December 23, 2015 (A/RES/70/237) on "Developments in the field of information and telecommunications in the context of international security" involves only the behaviour of States, and confirm that cyberwar and cyberwarfare may be considered as regulated by the international laws on war.
    This is also the same approach in the G20 Leaders Communique of November 16, 2015, statement  no 26.
    No global initiatives that includes cybercrime with only criminal intent have been presented.

January
   The World Internet Conference was organized in Wuzhen, China, in December, and the World Economic Forum was organized in Davos, Switzerland, in January.
    As a global observer, I am searching for A Global Dialogue. 
     We all agree that the same rights that people have offline must also be protected online. The question is: should we agree that people must also have the same obligations online as they today have offline, to comply with authorized legal court-orders requests for information?

U.S. Attorney General Loretta Lynch made a statement at World Economic Forum in Davos, that the U.S. government are not asking for a backdoor.  She said that we are asking that «we also preserve what we currently have, which is for companies to respond to law enforcement warrants: court-ordered, court-authorized requests for information».
 Presented by Assistant Attorney General Leslie R. Caldwell, January 25.
A proposal for A Geneva Declaration for Cyberspace. A global framework on cybersecurity and cybercrime, and a contribution for peace, security and justice in cyberspace. 
 United States Congress lawmakers acknowledge that the ultimate goal is a Geneva Convention for Cyberspace.

    As a global observer I agree on the ultimate goal, but consensus for a  binding Convention may be difficult. The excellent purpose of such a global guideline may also be achieved through a non-binding Geneva Declaration for Cyberspace. A global agreement or understanding is needed between all countries. 
2015
December
 India declared at the WSIS+10 Meeting, December 15-16, United Nations General Assembly, that «we should also aim to create a global convention to address issues of cybersecurity and cybercrime.»
 China declared at a conference in China, December 16, an opposition to all categories of cybercrime, including industrial espionage, cyber surveillance, attacks against goverments networks, and that no countries should define acceptable norms of cyber behaviuor.
 China also declared at the conference in China, December 16, that participants have reached a consensus on the importance of legislation in the field of cyber security, and the necessity for a code of conduct with universal standards, in order to prevent and fight cybercrime. 
 Russia declared at the conference in China, December 16, on a greater role for the International Telecommunications Union (ITU).
  The first U.S.- China High-Level Joint Dialogue on Cybercrime and Related Issues was held in Washington DC, on December 1, 2015. The primary objectives of the dialogue were to review the timeliness and quality of responses to requests for information and assistance. They reached agreement on a document establishing guidelines for requesting assistance, and for responding to such requests. Next dialogue will take place in Bejing in June 2016.

 https://www.universitetsforlaget.no/nettbutikk/cyberkriminalitet-uf.htmlArchive.htmlhttp://www.cybercrimelaw.net/documents/2016_Stein_Schjolberg_Video_Message_New_Delhi_November_2016.mp4http://www.cybercrimelaw.net/documents/2017_Stein_Schjolberg_presentation.mp4http://www.cybercrimelaw.net/documents/Article_on_Geneva_Convention_or_Declaration_for_Cyberspace.pdfhttp://cyberlawcybercrime.com/http://cybercrimelaw.net/documents/Treaty_Combating_Online_child_sexual_abuse.pdfhttp://cybercrimelaw.net/documents/Treaty_Combating_Online_child_sexual_abuse.pdfhttp://www.cybercrimelaw.net/documents/EISA_presentation.pdfhttp://www.cybercrimelaw.net/documents/The_Role_of_INTERPOL.pdfhttp://www.cybercrimelaw.net/documents/Kronikk.pdfhttps://www.universitetsforlaget.no/nettbutikk/cyberkriminalitet-uf.htmlhttps://www.interpol.int/News-and-media/News/2017/N2017-051https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2941988https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2941988http://wap.chinadaily.com.cn/2017-03/02/content_28401127.htmhttps://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/#sm.0001rmkab69w1cqcw6n2kw7teha5jhttps://www.amazon.co.uk/History-Cybercrime-1976-2016-German-ebook/dp/B01N7XVFY8/ref=tmm_kin_swatch_0?_encoding=UTF8&qid=1486479506&sr=1-1http://english.gov.cn/state_council/state_councilors/2016/12/08/content_281475510995959.htmhttps://www.dhs.gov/news/2016/12/08/third-us-china-high-level-joint-dialogue-cybercrime-and-related-issueshttp://www.cybercrimelaw.net/documents/Stein_Schjolberg_Video_Message_New_Delhi_November_2016.mp4https://eng.kic.re.kr/brdthm/boardthmList.do?brd_id=BDIDX_88DG8kFqLCEhPR0f556FNc&srch_menu_nix=u23eHZq1&srch_mu_lang=CDIDX00023http://www.g20.org/English/Dynamic/201609/t20160906_3396.htmlhttp://china.org.cn/world/2016-06/15/content_38669343.htmhttp://china.org.cn/world/2016-06/15/content_38669343.htmhttps://www.justice.gov/opa/pr/second-us-china-cybercrime-and-related-issues-high-level-joint-dialoguehttp://www.supremecourt.gov/http://phys.org/news/2016-04-fbi-chief-cyber-cooperation-china.htmlhttp://www.feinstein.senate.gov/public/index.cfm/press-releases?ID=EA927EA1-E098-4E62-8E61-DF55CBAC1649http://www.feinstein.senate.gov/public/index.cfm?a=files.serve&File_id=5B990532-CC7F-427F-9942-559E73EB8BFBhttps://ccdcoe.org/multimedia/international-cyber-norms-legal-policy-industry-perspectives.htmlhttp://vestnikkavkaza.net/news/Moscow-and-Washington-agree-on-preservation-and-intensification-of-bilateral-dialogue.htmlhttp://thehill.com/policy/cybersecurity/274845-obama-talks-cyber-with-chinese-president-xi-jinpinghttps://assets.documentcloud.org/documents/2714001/SB-Shooter-Order-Compelling-Apple-Asst-iPhone.pdfhttp://www.theguardian.com/technology/2016/feb/25/fbi-director-james-comey-apple-encryption-case-legal-precedenthttp://www.theguardian.com/technology/2016/feb/25/fbi-director-james-comey-apple-encryption-case-legal-precedenthttps://www.fbi.gov/news/pressrel/press-releases/fbi-director-comments-on-san-bernardino-matterhttps://www.fbi.gov/news/pressrel/press-releases/fbi-director-comments-on-san-bernardino-matterhttps://www.whitehouse.gov/the-press-office/2016/02/09/executive-order-commission-enhancing-national-cybersecurityhttp://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/70/237&referer=http://www.un.org/en/ga/70/resolutions.shtml&Lang=Ehttp://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/70/237&referer=http://www.un.org/en/ga/70/resolutions.shtml&Lang=Ehttp://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/70/237&referer=http://www.un.org/en/ga/70/resolutions.shtml&Lang=Ehttp://www.mofa.go.jp/files/000111117.pdfhttp://www.mofa.go.jp/files/000111117.pdfhttp://www.ibtimes.com/loretta-lynch-us-not-seeking-backdoor-access-encrypted-communication-wants-silicon-2276297http://www.weforum.orghttp://www.weforum.orghttp://www.justice.gov/opa/speech/assistant-attorney-general-leslie-r-caldwell-delivers-remarks-12th-annual-state-nethttp://www.cybercrimelaw.net/documents/Geneva_Declaration_2016.pdfhttp://thehill.com/policy/cybersecurity/264522-lawmakers-notch-win-in-fight-for-global-cyber-lawshttps://www.pminewyork.org/adminpart/uploadpdf/90722WSIS%20Dec%2015,%202015.pdfhttp://blogs.cfr.org/cyber/2015/12/16/chinas-internet-conference-xi-jinpings-message-to-washington/http://english.cri.cn/12394/2015/12/19/4203s909080.htmhttp://blogs.cfr.org/cyber/2015/12/16/chinas-internet-conference-xi-jinpings-message-to-washington/http://www.justice.gov/opa/pr/first-us-china-high-level-joint-dialogue-cybercrime-and-related-issues-summary-outcomes-0http://www.cybercrimelaw.net/documents/A_Geneva_Declaration_for_Cyberspace-2016.pdfshapeimage_1_link_0shapeimage_1_link_1shapeimage_1_link_2shapeimage_1_link_3shapeimage_1_link_4shapeimage_1_link_5shapeimage_1_link_6shapeimage_1_link_7shapeimage_1_link_8shapeimage_1_link_9shapeimage_1_link_10shapeimage_1_link_11shapeimage_1_link_12shapeimage_1_link_13shapeimage_1_link_14shapeimage_1_link_15shapeimage_1_link_16shapeimage_1_link_17shapeimage_1_link_18shapeimage_1_link_19shapeimage_1_link_20shapeimage_1_link_21shapeimage_1_link_22shapeimage_1_link_23shapeimage_1_link_24shapeimage_1_link_25shapeimage_1_link_26shapeimage_1_link_27shapeimage_1_link_28shapeimage_1_link_29shapeimage_1_link_30shapeimage_1_link_31shapeimage_1_link_32shapeimage_1_link_33shapeimage_1_link_34shapeimage_1_link_35shapeimage_1_link_36shapeimage_1_link_37shapeimage_1_link_38shapeimage_1_link_39shapeimage_1_link_40shapeimage_1_link_41shapeimage_1_link_42shapeimage_1_link_43shapeimage_1_link_44shapeimage_1_link_45shapeimage_1_link_46shapeimage_1_link_47shapeimage_1_link_48shapeimage_1_link_49shapeimage_1_link_50shapeimage_1_link_51shapeimage_1_link_52shapeimage_1_link_53shapeimage_1_link_54

The book "The History of Cybercrime" is now available from

Amazon hardcopy, and


Amazon Kindle edition - eBook



The Chairman’s Blog


40 Years of Research on Cybercrime (1976–2016)

«A global framework on cybersecurity and cybercrime, and a contribution for peace, security and justice in cyberspace.»

The Second Edition of the book "The History of Cybercrime" (1976-2016) wasb published in January 2017.


The content has been updated more than 10%.

Especially new information from UN, ITU, UNODC, INTERPOL, and other international organizations, a new Chapter on Public-Private Partnerships, new information on Internet of Things (IoT) and encryption problems for law enforcements, and much more