Skip to main content
Top

2022 | OriginalPaper | Chapter

Enhancing Cooperation Between South Korea and the EU in the Fight Against Cybercrime

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cybercrime is one of the representative transnational crimes occurring across national jurisdictions and has become an international challenge with the Internet reaching developing countries since 2000. Since an effective response to cybercrime requires an enhanced level of global cooperation, South Korea has achieved a certain level of success through international cooperation. However, there is still a long way to succeed: participation of South Korea to the Convention on Cybercrime has been delayed, and cooperation with the EU has lagged behind compared to progress with the US and other Asian countries. This chapter reviews South Korea’s international cooperation framework on cybercrime and presents four solutions to promote EU-South Korea cooperation: (1) joining the Convention on Cybercrime of the Council of Europe, (2) establishing a working group on joint investigation in cybercrime, (3) implementing cybercrime capacity building projects in developing countries, (4) expanding cooperation on digital forensics technology.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Jonathan Clough, Principles of Cybercrime(Second Edition)(New York: Cambridge University Press, 2015), 8.; UNODC, Comprehensive Study on Cybercrime(Draft) (New York: United Nations, 2013), 55.
 
2
Act on Promotion of Information and Communications Network Utilization and Information, etc. Article 48 (Prohibition on Intrusive Acts, etc. on Information and Communications Network) (2) No one shall mutilate, destroy, alter, or forge an information and communications system, data, program, or similar without a justifiable grounds, nor shall convey or spread a program that is likely to interrupt operation of such system, data, program, or similar (hereinafter referred to as “malicious program”).
 
3
UNODC, Comprehensive Study on Cybercrime(Draft) (New York: United Nations, 2013), 1.
 
4
For a cyber threat overview, see the chapter of Mason Richey.
 
5
Distributed denial-of-service (DDOS) is a type of cybercrime with the aim to prevent a target website from functioning by transmitting multiple connection requests to target servers that exceed the traffic capacity of these servers.
 
6
Lee, Seoung Woon, “A research on the Cyberterrorism response model” (MS diss., Korea University, 2015), 35.
 
7
Kim, Han-kyun et al., Comprehensive Policy for Developing Scientific Criminal Investigation and Forensic Science (III) (Seoul: Korea Institute of Criminology, 2020), 289-291.
 
8
Korean National Police Agency (KNPA), White Paper on Policing (Seoul: KNPA, 2020), 252.
 
9
Gandcrab ransomware is a type of malicious code that encrypts files and demands virtual assets such as Bitcoin. It was discovered in early 2018.
 
10
Clop is the name of the ransomware that uses the .clop extension after encrypting files.
 
11
Lee, Byung-gil, “Investigation of Ransomware distribution cases”, South Korea digital forensic society, a presentation at the summer conference, Session 2(June, 2021): 129-142.
 
12
Kwon, Han-Young, “International Cooperation for the Prevention of Cyber Terrorism and the Suggestion for Korea”, Dong-A Law Review 65(2014): 658-659.; Mutual legal assistance is a form of cooperation between different countries for the purpose of collecting and exchanging information.
 
13
Tor (The Onion Router) is a web browser for anonymity. It anonymizes the web traffic using the Tor network.
 
14
Bitcoin is the first virtual asset. The technology is set out in a white paper by Satoshi Nakamoto in 2008.
 
15
Korean National Police Agency (KNPA), White Paper on Policing (Seoul: KNPA, 2020), 237.
 
16
Korean National Police Agency (KNPA), White Paper on Policing (Seoul: KNPA, 2020), 237.
 
17
Korean National Police Agency (KNPA), “KNPA funds Interpol to address transnational crimes”, KNPA Press release, February 11, 2020; Korean National Police Agency (KNPA), White Paper on Policing (Seoul: KNPA, 2020), 276.
 
18
Ministry of Culture Sports and Tourism (MCST) Press release (10 Dec 2020).
 
19
This Convention is the first international treaty aiming to address legislation related to cybercrime, digital evidence, and international cooperation; Hae-sung Yoon, Ra, Kwang Hyun, “Precedence issues for accession to the Convention on Cybercrime”, Gachon Law Review 12, no. 3(2019): 203.
 
20
Jonathan Greig, “Ukrainian police partner with US, South Korea for raid on Clop ransomware members,” Zdnet, June 15, 2021.
 
21
“Multi-million euro cryptocurrency laundering service Bestmixer.io taken down”, Europol Website (May 22, 2019), accessed December 27, 2020, https://​www.​europol.​europa.​eu/​newsroom/​news/​multi-million-euro-cryptocurrency-laundering-service-bestmixerio-taken-down.
 
22
Digital piracy investigations are carried out by the Special Judicial Police (SJP) of the Ministry of Culture, Sports and Tourism (MCST). The SJP is special investigative authority installed in government departments, specializing in investigating criminal cases in violation of special acts. It undertakes specific functions designated by the Prosecutors’ Office supplementing the responsibilities of the national police.
 
23
Act No.17566, enforcement date December 8, 2020.
 
24
“Convention on Cybercrime (ETS No. 185)”, Council of Europe, accessed July 27, 2021, https://​www.​coe.​int/​en/​web/​conventions/​full-list?​module=​treaty-detail&​treatynum=​185.
 
25
The GCCS Conference was proposed by the UK and was held in London. It is a global multistakeholder meeting to promote international cooperation in cyberspace.
 
26
These points are the author’s summary based on his involvement in the preparation of the Conference on Cyber Space in 2013, and the ROK-US Summit in 2015.
 
27
Cheongwadae, National Security Office, National Cybersecurity Strategy(Seoul: Cheongwadae, 2019), 1-27.
 
28
“Second Additional Protocol to the Convention on Cybercrime on enhanced cooperation and disclosure of electronic evidence by Cybercrime Convention Committee(T-CY)(Ver 12 April 2021)”, Council of Europe, accessed Nov 4, 2021, https://​rm.​coe.​int/​2nd-additional-protocol-budapest-convention-en/​1680a2219c.; Jae Sung Park, “Development of New International Treaties to Combat Cybercrime - Second Additional Protocol to the Budapest Convention and the UN Resolution for a New Cybercrime Treaty -”, The Justice 185(2021.8): 246-284.
 
29
Korean National Police Agency (KNPA), White Paper on Policing (Seoul: KNPA, 2020), 276.
 
30
Haechi, generally known as Haetae, is a lion-like horned creature that often appears in myths as a guardian against fire and disasters. HAECHI refers to an imaginary animal that judges between right and wrong, and good and evil.
 
31
Ministry of Culture, Sports, and Tourism (MCST) press release, December 10, 2020.
 
32
Min Kyung Chung, Jong In Lim, Hun Yeong Kwon, “A Study on North Korea’s Cyber Attacks and Countermeasures”, Journal of Information Technology Services 15, no.1(2016): 70.
 
33
The White House (Office of the Press Secretary), “Joint Fact Sheet: The United States-Republic of Korea Alliance: Shared Values, New Frontiers”, October 16, 2015.
 
34
The White House, “Press Briefing by Press Secretary Sean Spicer and Assistant to the President for Homeland Security and Counterterrorism Tom Bossert”, May 5, 2017, accessed June 29, 2021, https://​www.​presidency.​ucsb.​edu/​documents/​press-briefing-press-secretary-sean-spicer-and-assistant-the-president-for-homeland.
 
35
U.S. District Court for the District of Columbia Indictment(Case: 1:18-cr-00243), 2018.
 
36
“The first ROK-US summit”, The President House of ROK, accessed June 29, 2021, https://​www1.​president.​go.​kr/​articles/​10346.
 
37
Lee, Byung-gil, “Investigation of Ransomware distribution cases”, South Korea digital forensic society, a presentation at the summer conference, Session 2 (June, 2021): 129-142.
 
38
Lee, Seoung Woon, “A research on the Cyberterrorism response model” (MS diss., Korea University, 2015), 35.
 
39
Kim, Han-kyun et al., Comprehensive Policy for Developing Scientific Criminal Investigation and Forensic Science (III) (Seoul: Korea Institute of Criminology, 2020), 289-291.
 
40
European Commission, “The EU Internet Security Strategy in Action: Five steps towards a more secure Europe”, Communication from the Commission to the European Parliament and the Council, COM(2010) 673 final, November 21, 2010.
 
41
“Joint Cybercrime Action Taskforce (J-CAT)”, Europol website, accessed June 29, 2021, https://​www.​europol.​europa.​eu/​activities-services/​services-support/​joint-cybercrime-action-taskforce.
 
42
“Multi-million euro cryptocurrency laundering service Bestmixer.io taken down”, Europol Website (May 22, 2019), accessed December 27, 2020, https://​www.​europol.​europa.​eu/​newsroom/​news/​multi-million-euro-cryptocurrency-laundering-service-bestmixerio-taken-down.
 
43
“Avalanche Network Dismantled in International Cyber Operation”, Europol Website (1 Dec 2016), accessed June 29, 2021, https://​www.​europol.​europa.​eu/​newsroom/​news/​’avalanche’-network-dismantled-in-international-cyber-operation.
 
44
Lee, Chang Soo, “Measures to enhance international cooperation against the transnational cybercrimes and its prerequisites”, New trends in criminal law 21(2009.8): 139.; Hae-sung Yoon, Ra, Kwang Hyun, “Precedence issues for accession to the Convention on Cybercrime”, Gachon Law Review 12, no. 3(2019): 215.; Chung, Tae-Jin, Rhee, Guang-Meen, “A Study on accession by South Korea to the Budapest convention on cybercrime and international cooperation against cybercrime”, The Police Science Journal 14, no. 2(2019): 74.
 
45
Choi, Hyeok-Doo, “The Review of Implementing Legislation for the Adoption of Convention on Cybercrime”, The Journal of Police Policies 32, no. 3(2018): 388.
 
46
Park, Hee Young, et al., A research on the codification of the Convention on Cybercrime (Seoul: Supreme Prosecutors’ Office, 2015), 86.
 
47
Park, Hee Young, et al., A research on the codification of the Convention on Cybercrime (Seoul: Supreme Prosecutors’ Office, 2015), 111.
 
48
One author holds the opinion that Articles 17 and 19 of the Convention can be covered by current Acts (Criminal Procedure Act & Protection of Communications Secrets Act). Choi, Hyeok-Doo, “The Review of Implementing Legislation for the Adoption of Convention on Cybercrime”, The Journal of Police Policies 32, no. 3(2018): 388-395.
 
49
Chung, Tae-Jin, Rhee, Guang-Meen, “A Study on accession by South Korea to the Budapest convention on cybercrime and international cooperation against cybercrime”, The Police Science Journal 14, no. 2(2019): 73.
 
50
A joint investigation happens between countries with jurisdiction over a crime launching investigations in their respective country in accordance with their laws and sharing information with one another. It is an investigation method to overcome the problem of delays and obstacles due to several judicial jurisdictions.
 
51
“Global Action on Cybercrime Extended (GLACY)+”, INTERPOL Website, accessed June 29, 2021, https://​www.​interpol.​int/​Crimes/​Cybercrime/​Cyber-capabilities-development/​Glacy.
 
52
Interpol defines digital forensics as a branch of forensic science that focuses on identifying, acquiring, processing, analysing, and reporting on data stored electronically. See https://​www.​interpol.​int/​en/​How-we-work/​Innovation/​Digital-forensics
 
53
Trend Micro Research, United Nations Interregional Crime and Justice Research Institute (UNICRI), Europol’s European Cybercrime Centre (EC3), “Malicious Uses and Abuses of Artificial Intelligence”, 2020.
 
54
See also the chapter of Tatiana Tropina.
 
55
Song, Young-jin, “Passage of the CLOUD Act and Its Implications for Law Enforcement Access to Extraterritorial Data”, Korean Criminological Review 29, no 2(2018): 163-164.; Hae-sung Yoon, Ra, Kwang Hyun, “Precedence issues for accession to the Convention on Cybercrime”, Gachon Law Review 12, no. 3(2019): 215.; Kim, Jae-Woon, “Review on the Counter-Terrorism Policy about CLOUD Act in U.S.A”, Korean Terrorism Studies Review 11, no 3(2018): 160.
 
56
The United States v. Microsoft Corp., 138 S. Ct. 1186, 200 L. Ed. 2d 610 (2018).
 
57
Jeon, Chi-Hon, “Extra-Territorial Seizure of Digital Evidence in USA”, Theories and Practices of Criminal Procedure 10, no 2(2018): 96-104.; Hae-sung Yoon, Ra, Kwang Hyun, “Recedence issues for accession to the Convention on Cybercrime”, Gachon Law Review 12, no. 3(2019): 214.
 
58
Jennifer Daskal, “Microsoft Ireland, the CLOUD Act, and International Lawmaking 2.0”, Stanford Law Review Online 71(2018): 14.; “Crime(Overseas Production Orders) Act 2019”,
 
59
“Telecommunications Legislation Amendment (International Production Orders) Bill 2020”, Parliament of Australia, access June 29, 2021, https://​www.​aph.​gov.​au/​Parliamentary_​Business/​Bills_​LEGislation/​Bills_​Search_​Results/​Result?​bId=​r6511.
 
Literature
go back to reference Cheongwadae, National Security Office. National Cybersecurity Strategy. Seoul: Cheongwadae, 2019. Cheongwadae, National Security Office. National Cybersecurity Strategy. Seoul: Cheongwadae, 2019.
go back to reference Choi, Hyeok-Doo, “The Review of Implementing Legislation for the Adoption of Convention on Cybercrime”, The Journal of Police Policies 32, no. 3(2018): 388. Choi, Hyeok-Doo, “The Review of Implementing Legislation for the Adoption of Convention on Cybercrime”, The Journal of Police Policies 32, no. 3(2018): 388.
go back to reference Chung, Tae-Jin, Rhee, Guang-Meen, “A Study on accession by South Korea to the Budapest convention on cybercrime and international cooperation against cybercrime”, The Police Science Journal 14, no. 2(2019): 74. Chung, Tae-Jin, Rhee, Guang-Meen, “A Study on accession by South Korea to the Budapest convention on cybercrime and international cooperation against cybercrime”, The Police Science Journal 14, no. 2(2019): 74.
go back to reference European Commission, “The EU Internet Security Strategy in Action: Five steps towards a more secure Europe”, Communication from the Commission to the European Parliament and the Council, COM(2010) 673 final, November 21, 2010. European Commission, “The EU Internet Security Strategy in Action: Five steps towards a more secure Europe”, Communication from the Commission to the European Parliament and the Council, COM(2010) 673 final, November 21, 2010.
go back to reference Kim, Han-kyun et al. Comprehensive Policy for Developing Scientific Criminal Investigation and Forensic Science(III). Seoul: Korea Institute of Criminology, 2020. Kim, Han-kyun et al. Comprehensive Policy for Developing Scientific Criminal Investigation and Forensic Science(III). Seoul: Korea Institute of Criminology, 2020.
go back to reference Kim, Jae-Woon, “Review on the Counter-Terrorism Policy about CLOUD Act in U.S.A”, Korean Terrorism Studies Review 11, no 3 (2018): 160. Kim, Jae-Woon, “Review on the Counter-Terrorism Policy about CLOUD Act in U.S.A”, Korean Terrorism Studies Review 11, no 3 (2018): 160.
go back to reference Hae-sung Yoon, Ra, Kwang Hyun, “Recedence issues for accession to the Convention on Cybercrime”, Gachon Law Review 12, no. 3(2019): 203. Hae-sung Yoon, Ra, Kwang Hyun, “Recedence issues for accession to the Convention on Cybercrime”, Gachon Law Review 12, no. 3(2019): 203.
go back to reference Jae Sung Park, “Development of New International Treaties to Combat Cybercrime - Second Additional Protocol to the Budapest Convention and the UN Resolution for a New Cybercrime Treaty -", The Justice 185(2021.8): 246-284. Jae Sung Park, “Development of New International Treaties to Combat Cybercrime - Second Additional Protocol to the Budapest Convention and the UN Resolution for a New Cybercrime Treaty -", The Justice 185(2021.8): 246-284.
go back to reference Jennifer Daskal, “Microsoft Ireland, the CLOUD Act, and International Lawmaking 2.0”, Stanford Law Review Online 71 (2018): 14. Jennifer Daskal, “Microsoft Ireland, the CLOUD Act, and International Lawmaking 2.0”, Stanford Law Review Online 71 (2018): 14.
go back to reference Jeon, Chi-Hon, “Extra-Territorial Seizure of Digital Evidence in USA”, Theories and Practices of Criminal Procedure 10, no 2 (2018): 96-104. Jeon, Chi-Hon, “Extra-Territorial Seizure of Digital Evidence in USA”, Theories and Practices of Criminal Procedure 10, no 2 (2018): 96-104.
go back to reference Jonathan Clough. Principles of Cybercrime(Second Edition). New York: Cambridge University Press, 2015.CrossRef Jonathan Clough. Principles of Cybercrime(Second Edition). New York: Cambridge University Press, 2015.CrossRef
go back to reference Jonathan Greig. “Ukrainian police partner with US, South Korea for raid on Clop ransomware members.” Zdnet, June 15, 2021. Jonathan Greig. “Ukrainian police partner with US, South Korea for raid on Clop ransomware members.” Zdnet, June 15, 2021.
go back to reference Korean National Police Agency (KNPA). White Paper on Policing. Seoul: KNPA, 2020a. Korean National Police Agency (KNPA). White Paper on Policing. Seoul: KNPA, 2020a.
go back to reference Korean National Police Agency (KNPA). “KNPA funds Interpol to address transnational crimes”. KNPA Press release, February 11, 2020b. Korean National Police Agency (KNPA). “KNPA funds Interpol to address transnational crimes”. KNPA Press release, February 11, 2020b.
go back to reference Kwon, Han-Young, “International Cooperation for the Prevention of Cyber Terrorism and the Suggestion for Korea”, Dong-A Law Review 65(2014): 658-659. Kwon, Han-Young, “International Cooperation for the Prevention of Cyber Terrorism and the Suggestion for Korea”, Dong-A Law Review 65(2014): 658-659.
go back to reference Lee, Byung-gil, “Investigation of Ransomware distribution cases”, South Korea digital forensic society, a presentation at the summer conference, Session 2 (June, 2021): 129-142. Lee, Byung-gil, “Investigation of Ransomware distribution cases”, South Korea digital forensic society, a presentation at the summer conference, Session 2 (June, 2021): 129-142.
go back to reference Lee, Chang Soo, “Measures to enhance international cooperation against the transnational cybercrimes and its prerequisites”, New trends in criminal law 21 (2009.8): 139. Lee, Chang Soo, “Measures to enhance international cooperation against the transnational cybercrimes and its prerequisites”, New trends in criminal law 21 (2009.8): 139.
go back to reference Lee, Seoung Woon. “A research on the Cyberterrorism response model.” MS diss., Korea University, 2015. Lee, Seoung Woon. “A research on the Cyberterrorism response model.” MS diss., Korea University, 2015.
go back to reference Min Kyung Chung, Jong In Lim, Hun Yeong Kwon, “A Study on North Korea’s Cyber Attacks and Countermeasures”, Journal of Information Technology Services 15, no. 1 (2016): 70. Min Kyung Chung, Jong In Lim, Hun Yeong Kwon, “A Study on North Korea’s Cyber Attacks and Countermeasures”, Journal of Information Technology Services 15, no. 1 (2016): 70.
go back to reference Park, Hee Young, et al. A research on the codification of the Convention on Cybercrime. Seoul: Supreme Prosecutors' Office, 2015. Park, Hee Young, et al. A research on the codification of the Convention on Cybercrime. Seoul: Supreme Prosecutors' Office, 2015.
go back to reference Song, Young-jin, “Passage of the CLOUD Act and Its Implications for Law Enforcement Access to Extraterritorial Data”, Korean Criminological Review 29, no 2 (2018): 163-164. Song, Young-jin, “Passage of the CLOUD Act and Its Implications for Law Enforcement Access to Extraterritorial Data”, Korean Criminological Review 29, no 2 (2018): 163-164.
go back to reference The White House (Office of the Press Secretary). “Joint Fact Sheet: The United States-Republic of Korea Alliance: Shared Values, New Frontiers”, October 16, 2015. The White House (Office of the Press Secretary). “Joint Fact Sheet: The United States-Republic of Korea Alliance: Shared Values, New Frontiers”, October 16, 2015.
go back to reference Trend Micro Research, United Nations Interregional Crime and Justice Research Institute (UNICRI), Europol’s European Cybercrime Centre (EC3), “Malicious Uses and Abuses of Artificial Intelligence”, 2020. Trend Micro Research, United Nations Interregional Crime and Justice Research Institute (UNICRI), Europol’s European Cybercrime Centre (EC3), “Malicious Uses and Abuses of Artificial Intelligence”, 2020.
go back to reference UNODC. Comprehensive Study on Cybercrime(Draft). New York: United Nations, 2013. UNODC. Comprehensive Study on Cybercrime(Draft). New York: United Nations, 2013.
Metadata
Title
Enhancing Cooperation Between South Korea and the EU in the Fight Against Cybercrime
Author
Gibum Kim
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-08384-6_10

Premium Partner