Fact-checked by Grok 2 weeks ago

Convention on Cybercrime

The Convention on Cybercrime (CETS No. 185), commonly known as the Budapest Convention on Cybercrime, is the first binding international treaty to harmonize domestic criminal laws on offenses committed via computer systems and networks, while establishing procedural mechanisms and extradition rules for cross-border investigations and prosecutions of such crimes.
Opened for signature in Budapest, Hungary, on 23 November 2001 by the Council of Europe, the treaty entered into force on 1 July 2004 following ratification by five member states, and it remains open to accession by non-European countries, with over 70 parties as of 2025, including the United States (which signed but has not ratified), Japan, Australia, and South Africa.
Its substantive provisions criminalize core cyber-dependent offenses such as illegal access to computer systems, data interference, system interference, misuse of devices, computer-related forgery and fraud, and child sexual exploitation material, alongside targeted content offenses like those involving racist and xenophobic materials via computer systems under a related 2003 protocol.
Procedurally, it mandates powers for expedited preservation of stored computer data, real-time collection of traffic data, search and seizure of electronic evidence, and mutual legal assistance, with emphasis on 24/7 networks for urgent cooperation; these elements have facilitated thousands of cross-border operations through the Cybercrime Convention Committee (T-CY), which interprets and updates implementation guidelines.
While enabling effective responses to evolving threats like ransomware and online fraud, the convention has drawn criticism from civil liberties advocates for provisions enabling broad surveillance and data sharing that could enable state overreach, suppression of dissent, or inadequate privacy safeguards, as highlighted in early U.S. Senate reservations and analyses from groups like the American Civil Liberties Union, though proponents argue its safeguards—such as dual criminality requirements and human rights compatibility clauses—mitigate misuse when implemented domestically.

Historical Development

Origins and Initial Motivations

The rapid expansion of information and communication technologies in the facilitated the emergence of novel criminal offenses, such as unauthorized access to computer systems and data interference, while enabling traditional crimes like through digital means. These developments threatened the , , and of computer systems and data, often transcending national borders due to the interconnected nature of global networks, rendering unilateral domestic responses inadequate. In response, the Council of Europe's European Committee on Crime Problems (CDPC) recommended in November 1996 the establishment of an expert committee to address computer-related crime, marking the initial institutional push toward a coordinated international framework. Work formally commenced in April 1997 with the creation of the Committee of Experts on Crime in Cyber-space (PC-CY), tasked with drafting a convention to harmonize substantive , procedural investigative powers, and mechanisms for international cooperation. The primary motivations included deterring cyber-dependent offenses—such as and distribution—and cyber-enabled crimes, including computer-related and child material dissemination, which evaded prosecution due to jurisdictional gaps and inconsistent national laws. Negotiators emphasized the volatility of , necessitating expedited tools for preservation and cross-border access to combat perpetrators who exploited technological anonymity and rapid data flows. To ensure broad applicability, the process incorporated input from non-European observers, including the , , , and , recognizing that effective countermeasures required global alignment rather than regional isolation. This inclusive approach stemmed from the recognition that cybercrime's economic and societal harms—evident in proliferating viruses and online fraud—demanded a pioneering to supplement existing and mutual assistance pacts, prioritizing practical efficacy over ideological constraints. The resulting instrument, adopted by the Council of Europe's Committee of Ministers on November 8, 2001, reflected a pragmatic on safeguarding against evolving digital threats.

Negotiation and Adoption Process

The negotiation process for the Convention on Cybercrime originated from concerns over the inadequacy of existing legal frameworks to address emerging computer-related offenses, prompting the European Committee on Crime Problems (CDPC) of the to establish a specialized body in November 1996. This led to the formation of the Committee of Experts on Crime in (PC-CY), which commenced work in April 1997 with a mandate to draft a binding international instrument harmonizing substantive criminal laws, procedural powers, and mechanisms for international cooperation. Initial targeted completion by December 1998, but extensions to June 2000 accommodated iterative consultations and revisions to refine definitions of offenses such as illegal access, data interference, and system interference, while balancing investigative needs with safeguards against abuse. Negotiations involved representatives from all Council of Europe member states at the time, alongside observers from non-member countries including , , , and the , as well as international organizations such as the , , the , and the Organisation for Economic Co-operation and Development. This inclusive approach, spanning over 30 participating entities, facilitated cross-jurisdictional alignment on core provisions, with emphasis on , mutual legal assistance, and real-time collection to counter the borderless nature of cyber threats. Debates focused on scope—excluding content-related crimes like from the main text to maintain consensus—while incorporating procedural tools like of computer data, reflecting empirical of rising incidents such as and in the late . Following finalization in 2001, the Committee of Ministers of the adopted the Convention on November 8, 2001, marking it as the first dedicated to . It opened for signature on November 23, 2001, in , —selected for its central European location and symbolic role in hosting the event—allowing immediate accession by non-Council members under Article 37, which requires compatibility with the Convention's principles. The process underscored a pragmatic, evidence-driven effort to create enforceable standards amid technological evolution, without deference to ideological pressures, prioritizing operational efficacy for .

Entry into Force and Early Implementation

The Convention on Cybercrime entered into force on 1 July 2004, following the deposit of instruments of , , or approval by five states, including at least three member states of the , as stipulated in Article 74. This threshold was met after ratifications by (30 July 2002), (8 October 2002), (1 February 2004), (28 June 2003), and (22 April 2004), enabling the treaty's operationalization among initial parties. At that time, the treaty had been signed by 30 member states and four non-members, but only these five had completed domestic processes, reflecting deliberate legislative efforts to criminalize offenses such as illegal to computer systems and . Early implementation emphasized domestic legal reforms to align national laws with the convention's substantive requirements, including the of core cyber offenses and the expansion of procedural powers for search, , and collection. Parties initiated mutual legal assistance mechanisms under Articles 27–31, facilitating cross-border investigations into s, though initial was limited by disparities in technological and investigative capacities among the small number of parties—growing to just 16 by the end of 2005. The 's framework supported early casework, such as joint operations against international networks, but reports from the period highlighted implementation gaps, including inconsistent definitions of "computer system" and reluctance in some states to grant expedited preservation orders due to concerns. In 2006, the Committee of Ministers of the established the Cybercrime Convention Committee (T-CY) to oversee , monitor , and promote capacity-building through technical assistance and best-practice exchanges. This body conducted initial assessments, revealing that while European parties advanced legislative updates—such as the European Union's alignment via directives on attacks against information systems—non-European accessions, like that of the in 2006, introduced broader jurisdictional reach but also tested the convention's universality amid debates. By mid-2007, over 20 parties had ratified, enabling the first multilateral evaluations of and evidence-sharing efficacy, though empirical data from T-CY plenaries indicated slower progress in developing regions due to resource constraints rather than ideological resistance. These early phases underscored the convention's causal role in standardizing responses to evolving threats like botnets, predating widespread recognition of state-sponsored cyber operations.

Substantive Criminalization Requirements

The substantive criminalization requirements of the Convention on Cybercrime, set forth in Title 1, Chapter II, obligate Parties to incorporate into domestic law penalties for specific offenses involving the unauthorized use or interference with computer systems and data. These provisions establish minimum standards for nine principal offenses across four categories, supplemented by rules on ancillary liability, corporate responsibility, and sanctions, to address threats to confidentiality, integrity, availability, property, and public morals posed by cyber-dependent conduct. The requirements emphasize intentional acts performed "without right," a term interpreted to exclude authorized activities such as legitimate security testing or access to publicly available data, while allowing Parties flexibility through optional qualifiers like dishonest intent or limitations to connected systems. Offenses against , , and (Articles 2–6) focus on core intrusions. Article 2 requires criminalization of intentional to a computer —or any part thereof—without right, with Parties permitted to condition on breaching measures, intent to obtain , dishonest intent, or applicability only to systems linked to others. Article 3 mandates punishment for intentional , without right, of non-public transmissions of computer within or between systems, using means; optional elements include dishonest intent or restriction to connected systems. Under Article 4, Parties must penalize intentional unauthorized damage, deletion, deterioration, alteration, or suppression of computer , though a reservation permits requiring serious harm. Article 5 targets intentional serious hindering of a computer 's functionality without right, through input, , or damage to causing impairment. Article 6 addresses tools of by requiring sanctions for intentional production, sale, procurement for use, importation/exportation, distribution, or possession of devices—including computer programs or passwords—designed or adapted primarily for committing offenses under Articles 2–5; reservations allow exclusion of certain non-password acts, and may hinge on possessing multiple items. Computer-related offenses (Articles 7–8) extend traditional crimes to digital contexts. Article 7 obligates of intentional input, alteration, deletion, or suppression of computer without right, resulting in inauthentic intended for legal recognition or use; Parties may add a requirement of to defraud. Article 8 requires punishment for intentional unauthorized manipulation or that causes—in whole or part—wrongful economic loss or intended economic gain for the offender or a , with fraudulent . These provisions target acts analogous to and but adapted to computer-mediated execution, preserving the Convention's technology-neutral approach to protect property interests without over-criminalizing minor errors. Content-related offenses (Articles 9–10) address harms amplified by digital dissemination. Article 9 compels comprehensive criminalization of offenses via computer systems, including intentional production, offering, distribution, transmission, procurement, possession, or access of material depicting sexually explicit conduct involving children under 18 (or at least 16). Reservations are permitted for possession or procurement alone, or for depictions of lawful sexual activities with 16–18-year-olds lacking exploitation, reflecting efforts to balance with varying national age-of-consent laws. Article 10 mandates penalties for willful infringement of or on a commercial scale through computer systems, consistent with Parties' international obligations; a reservation allows non-applicability or limitation to cases lacking effective civil remedies. Ancillary provisions (Articles 11–13) ensure robust enforcement. Article 11 requires criminalization of intentional and aiding or abetting offenses under Articles 3–5 and 7–9, with a option for attempt. Article 12 imposes on legal persons for offenses committed for their benefit by persons in or under their due to inadequate controls, punishable by effective, proportionate, and dissuasive non-criminal or criminal sanctions such as fines or prohibitions. Article 13 stipulates that all offenses in Articles 2–11 warrant effective, proportionate, and dissuasive sanctions, including deprivation of liberty raising serious penalties under national law, to deter misconduct while accommodating domestic sentencing norms. These elements promote harmonization without mandating identical penalties, allowing Parties to exclude acts and adapt to constitutional frameworks.

Procedural and Investigative Powers

The procedural and investigative powers in the Convention on Cybercrime, detailed in Articles 16 to 21 of the treaty, compel parties to enact domestic laws granting authorities effective tools to gather electronic evidence for offences covered by the convention, while incorporating safeguards against abuse. These provisions apply to investigations of serious crimes under 2 (illegal ), 3 (data interference), 4 (system interference), 5 (misuse of devices), and content-related offences in s 6 to 11, ensuring measures are proportionate, necessary, and subject to judicial or independent oversight as per 15. 14 specifies that procedural powers extend to any offence committed by means of a computer system where the accused or victim is in the party's territory, or the offence involves its computer systems, broadening applicability beyond purely cyber-specific crimes. Article 16 requires parties to enable expedited preservation of stored computer data, permitting authorities to order non-content data (such as logs or records) from service providers to be retained for up to 90 days, preventing deletion during ongoing investigations; this measure targets volatile and must be authorized by competent authorities without prior notice to suspects in urgent cases. Article 17 empowers production orders for subscriber information and traffic data, allowing compelled disclosure from service providers of data identifying users or communication routing, applicable when linked to serious cyber offences; parties must ensure such orders respect data minimization principles and protections. Under Article 18, parties must authorize of stored computer data, including hardware, software, and copies thereof, with provisions for remote searches across borders if consented to by the data holder or under mutual legal assistance; this facilitates access to encrypted or distributed data but requires warrants or equivalent judicial approval to balance investigative needs with property rights. A 2024 assessment of 74 parties found widespread implementation of Article 18, though variations exist in handling cloud-stored data and cross-jurisdictional seizures, highlighting its role in combating and data breaches. Article 19 mandates real-time collection of traffic data, enabling authorities to compel service providers to gather non-content routing information (e.g., addresses, timestamps) during live communications for tracking suspects in dynamic cyber threats like botnets; this power is restricted to serious offences and demands strict oversight to mitigate overreach. addresses interception of content data, requiring legal frameworks for wiretaps or equivalent real-time capture of communications content in computer systems, aligned with parties' existing interception for comparable traditional crimes; it explicitly excludes and ties applicability to offences punishable by at least four years' in domestic . Article 21 stipulates that investigative authorities exercise these powers equivalently to those for non-cyber offences of similar gravity, ensuring no lesser standards for digital investigations while adapting to technological realities like encrypted traffic. These powers emphasize expediency and technical adaptability, with parties required to furnish investigators with specialist expertise and tools; however, reports note challenges in harmonizing safeguards across jurisdictions, particularly for held by foreign providers. The provisions have supported over mutual legal assistance requests annually among parties as of , demonstrating practical utility in cross-border cases despite criticisms from advocates regarding potential expansions beyond enumerated offences.

Jurisdiction and International Cooperation Mechanisms

Article 22 mandates that each establish jurisdiction over the offenses criminalized in Articles 2–11 when such offenses are committed within its territory, on board a ship flying its flag or an registered under its laws, or by one of its nationals if the act is punishable under the law of the place of commission or is not subject to any State's . Parties must also assert if the offender is present in their territory and extradition to a requesting Party has not been effected, typically due to nationality-based refusal. This provision allows Parties to exercise broader under domestic law and encourages consultation among Parties with concurrent claims to determine the most appropriate for prosecution, aiming to avoid conflicts while ensuring accountability for cross-border cyber offenses. Chapter III of the Convention establishes a comprehensive framework for international cooperation, requiring Parties to afford one another the widest measure of mutual assistance in investigations and proceedings related to cybercrime offenses and the collection of electronic evidence (Article 23). Extradition is facilitated for offenses under Articles 2–11 punishable by deprivation of liberty of at least one year, with the Convention serving as the legal basis in the absence of bilateral treaties, subject to standard grounds for refusal such as dual criminality unless waived (Article 24). Mutual legal assistance (MLA) under Article 25 extends to procedural measures like searches, seizures, and disclosure of data, with provisions for expedited requests and limited refusal grounds, including national security or ongoing investigations, to enable rapid response to the ephemeral nature of digital evidence. Specific mechanisms enhance operational efficiency: Article 26 permits spontaneous sharing of relevant information to aid foreign investigations, while Article 35 requires designation of 24/7 points of contact for immediate assistance in urgent cases. Provisional measures include expedited preservation of stored computer data for at least 60 days (Article 29) and expedited disclosure of preserved data to identify service providers (Article 30), bypassing dual criminality requirements for these actions to preserve evidence before deletion. Further tools encompass mutual assistance for searching and seizing stored data (Article 31), transborder access to publicly available data without formal request (Article 32), collection of data (Article 33), and interception of data where domestic permits (Article 34). These provisions apply irrespective of the location of the offense or data, promoting seamless cross-border collaboration while respecting sovereignty and safeguards.

Protocols and Amendments

Additional Protocol on Xenophobia and Racism

The Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems (ETS No. 189), extends the principal treaty by mandating parties to criminalize intentional dissemination of specified hateful content via digital means. Adopted by the Council of Europe's Committee of Ministers on 28 November 2002, it opened for signature on 28 January 2003 in and entered into force on 1 March 2006, following ratification by five states as required under Article 10. The protocol's stated purpose is to harmonize domestic criminal laws against online racism and xenophobia while bolstering cross-border cooperation in detection, investigation, and prosecution, building on the Convention's frameworks for procedural powers and mutual assistance. Article 1 defines racist and xenophobic material as written material, images, or other representations of ideas or theories that advocate, promote, or incite , , or toward individuals or groups based on , color, descent, national or ethnic origin, or when the latter serves as pretext for such factors. Central offenses include, under Article 2, the intentional public distribution or availability of this material through computer systems; Article 3, threats of violent acts motivated by these biases; Article 4, public insults on equivalent grounds; and Article 5, dissemination of content denying, grossly minimizing, approving, or justifying or (e.g., ) when aimed at stirring or . Article 6 penalizes aiding or abetting these acts, with sanctions calibrated to match gravity under domestic law. To accommodate variations in free expression protections, parties may reserve application of Articles 2, 4, or 5, or impose additional intent requirements (e.g., exposure to hatred or lack of effective remedies), ensuring alignment with constitutional standards while pursuing non-criminal alternatives for milder cases. The protocol applies only to acts post-entry into force for each party and excludes content solely for private use or non-public research/education, though these exemptions demand narrow construction to avoid undermining core prohibitions. As of 2023, 38 states have ratified it, with 47 signatories, predominantly members; non-European parties to the main convention, such as the , have refrained, citing irreconcilability with First Amendment safeguards against punishing non-inciteful offensive speech. Implementation has encountered hurdles, including inconsistent national thresholds for "" and "," jurisdictional gaps in or foreign-hosted content, and reliance on voluntary absent adoption. A 2023 Council of Europe study highlighted good practices like specialized training for prosecutors but noted persistent challenges in evidence preservation across borders, with limited of significant reductions in online hate incidents attributable to the protocol. Critics, including legal scholars, contend its provisions foster a selective of prohibited hatred—focusing on / while permitting analogous biases against other groups—and risk enabling state overreach against controversial opinions, as seen in reservations by states wary of chilling historical inquiry or political critique under Article 5. Such concerns underscore tensions between combating verifiable harms like targeted online and preserving robust debate, particularly where enforcement data shows uneven application influenced by prevailing institutional priorities.

Second Additional Protocol on Enhanced Cooperation and E-Evidence

The Second Additional Protocol to the Convention on Cybercrime, formally titled the Second Additional Protocol on Enhanced Co-operation and Disclosure of Electronic Evidence, was adopted by the Committee of Ministers of the on 17 November 2021 and opened for signature on 12 May 2022 in . Limited to Parties to the original Budapest Convention, the Protocol seeks to address gaps in cross-border access to electronic evidence by establishing streamlined procedures for cooperation amid the jurisdictional challenges of globally operating service providers and the time-sensitive nature of digital investigations. It entered into force on a provisional basis for ratifying states following individual s, but requires five instruments of ratification, acceptance, or approval for full effect among all Parties; as of July 2025, it had garnered 51 signatures but only two ratifications. The Protocol's core provisions focus on direct cooperation mechanisms to expedite e-evidence disclosure. Under Chapter III, competent authorities may issue direct requests to service providers in other Parties for compulsory production of subscriber information and traffic data, bypassing traditional mutual legal assistance channels for non-content data when domestic law permits and safeguards are met. Article 8 mandates Parties to adopt measures enabling service providers under their to comply with foreign preservation or production orders for electronic evidence, provided the requesting authority demonstrates necessity, proportionality, and compliance with standards. Chapter IV enhances mutual assistance by facilitating emergency procedures under Article 10, allowing rapid requests for data preservation or disclosure in cases of imminent serious harm, with responses required within 96 hours or as specified. Additional tools include support for joint investigation teams, video conferencing for , and real-time traffic data collection, all aimed at harmonizing investigative powers without mandating new criminalizations. Safeguards are emphasized throughout to mitigate risks to privacy and . Requests must specify the offense, legal basis, and data sought, with Parties required to refuse execution if it violates jus cogens norms, double criminality applies, or are endangered; data minimization and deletion post-use are also mandated where feasible. Chapter VI promotes technical assistance and capacity-building, including information-sharing on service provider contacts and best practices for e-evidence handling. The signed the on 12 May 2022 to bolster access against cyber threats, while Canada's signature on 20 June 2023 underscored its potential for aiding prosecutions of cyber-related crimes. However, implementation hinges on reconciling divergent national data protection regimes, with the authorizing member states to ratify in its interest via a decision on 14 2023.

Ratification and Global Adoption

Signatories and Ratification Status

As of October 26, 2025, 81 states are parties to the Convention on Cybercrime, having either ratified it as signatories or acceded following invitations extended by the Council of Europe's Committee of Ministers to non-member states. The convention, opened for signature on November 23, 2001, requires five ratifications for entry into force, which occurred on July 1, 2004, after deposits by (October 2003), (October 2003), (April 2002), (December 2003), and (May 2004). For each subsequent party, the convention enters into force three months after the deposit of the instrument of , acceptance, approval, or accession. Of the 83 states that have signed the convention, two— and —have not yet ratified it. signed on February 14, 2002, but legislative hurdles, including alignment with EU data protection standards, have delayed ratification despite repeated government commitments as recently as October 2025. signed on November 23, 2001, but has not proceeded to ratification, citing domestic legal reforms needed for implementation. Parties encompass all 46 member states except and any laggards among observers, supplemented by 35 non-European accessions demonstrating the convention's extraterritorial appeal. Key non-European parties include the (ratified September 29, 2006; entry into force January 1, 2007), which became the 16th party and emphasized its role in harmonizing electronic evidence procedures; (ratified February 2010); (ratified 2013); (ratified 2015); and (ratified 2019). African parties number 11, including (2022) and (2012), while Latin American adherents total seven, such as (2013) and (2021). This distribution underscores the convention's function as a framework for cross-border cooperation beyond , with accessions requiring demonstration of commitment to core principles like substantive criminalization and procedural safeguards.
RegionNumber of PartiesNotable Examples
Europe (CoE members)44, , (all ratified by 2006–2010)
Americas10, , , (accession 2018)
Asia-Pacific12, , (ratified 2011)
Africa11, (ratified 2020), (signed only)
Middle East4 (ratified 2009), (as observer-aligned)
The table aggregates parties by primary geographic affiliation, excluding overlaps; totals reflect accessions invited post-2004 to address global cyber threats. Ratification rates accelerated after 2010, driven by rising cyber incidents and capacity-building programs under the Council of Europe's Cybercrime Convention Committee (T-CY), with over 70% of parties joining since 2010. Non-ratification by signatories like highlights tensions between international obligations and national privacy laws, though both maintain in T-CY for operational cooperation.

Accession by Non-European States

The Convention on Cybercrime (ETS No. 185), also known as the Convention, permits accession by non-member states of the , including non-European states, upon invitation from the Committee's of Ministers. Invitations are issued following consultations, such as those at the Octopus Conferences, and remain valid for five years, allowing the invited state to deposit its with the Secretary General. The Convention enters into force for the acceding state on the first day of the month following the expiration of a three-month period after deposit. This mechanism has enabled participation by non-European states, extending the 's framework for harmonized criminalization, procedural powers, and international cooperation beyond to combat cyber threats originating from or affecting global jurisdictions. Non-European states initially invited to participate in the Convention's elaboration—, , , and the —were permitted to sign in 2001 and ratify subsequently. deposited its instrument of on 3 July 2012, with entry into force on 1 November 2012. deposited its on 8 December 2014, entering into force on 1 April 2015. The and signed but have not ratified as of October 2025. Subsequent invitations have led to accessions by additional non-European states, broadening the treaty's applicability to diverse regions including , , the , and :
StateAccession/Ratification DateEntry into Force Date
30 November 2012 (accession)1 March 2013
9 May 2016 (accession)1 September 2016
15 September 2016 (accession)1 January 2017
18 December 2017 (accession)1 April 2018
5 June 2018 (accession)1 October 2018
26 April 2019 (accession)1 August 2019
5 December 2022 (accession)1 April 2023
21 June 2023 (accession)1 October 2023
22 February 2024 (accession)1 June 2024
28 August 2025 (accession)1 December 2025
These accessions, totaling over a dozen non-European parties by late 2025, have strengthened multilateral efforts against by integrating jurisdictions with significant digital infrastructure and varying legal traditions, though participation remains selective due to domestic sovereignty concerns and alignment with national laws. For instance, Australia's accession facilitated enhanced data-sharing protocols with partners, while Senegal's entry marked the first state to join post-initial phase, aiding investigations into region-specific threats like financial fraud networks.

Challenges to Universal Adoption

Despite achieving 78 parties as of May 2025, the Budapest Convention has not attained universal adoption, with significant non-participation from major global powers including , , and . This gap stems partly from perceptions of the treaty as a product of , particularly , institutions, lacking broad input from non-European states during its 2001 drafting. Countries in the Global South have criticized its Eurocentric framework, arguing it inadequately addresses diverse national legal traditions and capacities for implementation. Russia and China have explicitly opposed ratification, viewing the convention's provisions on cross-border data access and investigative cooperation as threats to national sovereignty over domestic cyberspace governance. Russian officials have contended that the treaty undermines state control by facilitating foreign investigations into internal matters, potentially exposing state-sponsored activities or dissenting communications. Similarly, China has resisted on grounds that it prioritizes liberal norms over territorial sovereignty, preferring frameworks that emphasize state authority in regulating information flows. These positions reflect broader geopolitical divides, where authoritarian-leaning states prioritize instruments enabling domestic surveillance without equivalent international scrutiny. The convention's jurisdictional mechanisms, which allow for extraterritorial pursuit of cyber offenses and mutual legal assistance without dual criminality in all cases, exacerbate adoption barriers for states wary of ceding control over sensitive data or political speech prosecutions. Non-ratifiers argue these elements could compel cooperation in suppressing activities deemed legitimate domestically, such as online dissent, while bypassing bilateral treaties or exemptions. Emerging alternatives, notably the United Nations Convention against Cybercrime adopted on December 24, 2024, further challenge universal uptake by offering a multilateral venue perceived as more inclusive and sovereignty-respecting by holdout states. and allies have framed the UN treaty as a corrective to the Budapest Convention's limitations, potentially drawing additional non-parties away despite the latter's established mechanisms for cooperation. This competition underscores how institutional legitimacy and alignment with state-centric norms influence ratification decisions over the treaty's substantive efficacy.

Practical Impact and Effectiveness

Facilitated Cross-Border Investigations

The Convention on establishes a 24/7 network of designated points of contact among Parties to ensure rapid assistance in cybercrime investigations, enabling immediate communication for tasks such as providing technical advice, preserving stored data, and locating suspects or victims across borders. This network, operational since the Convention's in 2004, facilitates urgent requests without the delays of formal diplomatic channels, with over 80 countries participating as of 2024. Key procedural innovations include expedited preservation of stored computer data under Article 29, allowing a Party to request another to preserve specified data for a minimum of 60 days pending a mutual assistance request, bypassing requirements for dual criminality and enabling evidence retention in time-sensitive cases like data deletion threats. Article 30 extends this to expedited partial disclosure of preserved traffic data, such as to identify communication routes, further accelerating investigative leads. These measures address the volatility of electronic evidence, where traditional mutual legal assistance processes—often taking weeks or months—risk data loss. Article 32 permits direct trans-border access to stored computer by law enforcement when the is publicly available or obtained with lawful , eliminating the need for formal mutual assistance requests in such scenarios and thus streamlining access to stored abroad. For non-public , Articles 31 and 33 mandate mutual assistance in accessing stored or collecting real-time traffic , with provisions for expedited action if the is at risk of being altered or deleted. These tools have supported investigations into offenses like illegal access and interference by allowing Parties to respond swiftly to cross-jurisdictional threats. Joint investigations are enabled through Article 19's framework for coordinated operations, supplemented by general mutual assistance principles in Article 25, which encourage the use of modern communication like for urgent requests and limit refusals to cases involving , , or fundamental legal principles. Spontaneous sharing of relevant information under Article 35 further aids proactive cross-border efforts, as clarified in T-CY Guidance Note #14, without requiring formal requests. Collectively, these provisions have processed thousands of operational exchanges via the 24/7 network annually, enhancing efficiency against transnational cyber threats.

Capacity Building and Technical Assistance

The Cybercrime Convention Committee (T-CY), established under the Convention on Cybercrime, promotes and facilitates capacity building activities to aid states in implementing the treaty's provisions on substantive , procedural powers, and international cooperation. These efforts, coordinated primarily by the Council of Europe's Cybercrime Programme Office (C-PROC) in , —operational since October 2014—focus on strengthening systems through targeted technical assistance. Such programs prioritize states requesting accession to the Convention or those identified by parties as needing support, enabling alignment of domestic laws and practices with treaty standards. Technical assistance encompasses training for officers, prosecutors, and judges on investigating cyber-dependent offenses, handling electronic evidence, and conducting mutual legal assistance; advisory support for legislative reforms; and development of operational guidelines and standards. From 2014 to 2024, C-PROC delivered over 2,400 activities across more than 140 countries, including workshops, needs assessments, and information-sharing platforms. For instance, between 2020 and September 2021 alone, over 500 such events were conducted globally, emphasizing practical skills for cross-border data access and preservation as outlined in Articles 18–21 and 29–31 of the . Key initiatives include the Octopus Project, funded by voluntary contributions from states parties and observers, which directly bolsters Convention implementation through region-specific interventions. Regional capacity hubs have been established via projects like GLACY (launched ) and its successor GLACY+, turning beneficiary countries into training centers: as a West African hub since 2016; the — the first Latin American party, ratifying in —as a center for ; for the South Pacific since 2016; and as a South Asian focal point following extensive professional training programs. These hubs provide ongoing assistance, reducing reliance on external expertise and fostering sustainable local capabilities. Empirical outcomes demonstrate expanded treaty adherence and legal , with states possessing cybercrime legislation compatible with the rising from 70 in 2013 to 132 by 2025, alongside growth in parties from 41 to 78 as of April 2025. Funding for these programs derives from extrabudgetary sources, including partnerships, ensuring scalability but highlighting dependence on donor commitments for broader reach. By addressing technical gaps in and , these efforts enhance states' ability to prosecute offenses like illegal access (Article 2) and data interference (Article 4), though effectiveness varies by recipient countries' institutional readiness and political will.

Empirical Outcomes in Combating Cyber Threats

The Budapest Convention has facilitated cross-border cooperation leading to tangible investigative and prosecutorial outcomes in select jurisdictions. In , the Directorate for Investigating and Terrorism (DIICOT) processed 144 incoming requests and issued 39 outgoing requests for data preservation in 2019, enabling evidence collection for cyber-related offenses. Similarly, handled 50 outgoing mutual legal assistance requests and 20 incoming ones in the same year, supporting investigations into illegal access and data interference. Specific case resolutions demonstrate prosecutorial success enabled by the Convention's frameworks. In the GozNym operation, coordinated under the Convention's and evidence-sharing provisions, Georgian authorities convicted the network leader to seven years imprisonment and an associate to five years in 2019, disrupting a global banking scheme affecting over 41,000 victims across 80 countries. In , the "Armageddon" case resulted in a conviction for distribution and via online platforms, with the sentenced to time, leveraging harmonized definitions of computer-related offenses. Extraditions have also occurred, such as Italy's transfer of an Afghan national to in June 2013 for cyber-enabled crimes, aided by 24/7 network assistance protocols. Post-accession impacts in non-European states include heightened enforcement capacity. , after acceding in 2018, investigated over 7,000 cybercrime cases from 2014 to 2019, with 6,342 involving ; 94 led to prosecutions, and two groups were dismantled through enhanced international data exchanges. In , 110 investigations into high-tech crimes were initiated in 2019, many advancing to prosecutions, alongside 115 reported incidents by regional authorities. These outcomes reflect improved procedural alignment but lack comprehensive global metrics linking mechanisms directly to reductions in cyber threat prevalence, as overall incidents have risen amid evolving tactics.

Criticisms and Limitations

Concerns Over Privacy and Civil Liberties

Critics of the Convention on Cybercrime, including the American Civil Liberties Union (ACLU), have highlighted the absence of explicit privacy protections in its procedural provisions, particularly Articles 16 through 22, which empower law enforcement to compel real-time collection of traffic data, content data interception, and system searches without mandatory judicial oversight or reimbursement to service providers for compliance costs. These measures, adopted in the 2001 treaty, are argued to enable indiscriminate monitoring of online activities, potentially conflicting with constitutional safeguards like the U.S. Fourth Amendment by mandating invasive tools such as network surveillance software without balancing civil liberties requirements. The ACLU further contends that the lack of a dual criminality requirement in mutual assistance provisions (Articles 23-35) could compel cooperation in investigations of conduct legal in the requested state, exposing individuals to foreign surveillance standards misaligned with domestic protections. The Second Additional Protocol to the Convention, adopted on May 12, 2022, and focused on enhanced cooperation and disclosure of electronic evidence, amplifies these issues by establishing direct channels for authorities to request subscriber information and traffic data from service providers abroad, bypassing traditional mutual legal assistance treaties (MLATs). Article 7 of the Protocol mandates such direct cooperation for non-content data, while Article 8 extends it optionally to content data, with safeguards like judicial authorization left to the discretion of individual states rather than enforced uniformly. The (EFF) criticizes this framework for treating subscriber data as non-private despite and Court of Justice of the EU rulings affirming its sensitivity, thereby threatening online anonymity essential for journalists, activists, and dissidents. Article 14 of the provides optional protections for , including proportionality assessments and notifications to affected individuals, but these can be overridden through bilateral or multilateral agreements, such as those under the or U.S. , undermining consistent standards across signatories. Organizations like the European Digital Rights (EDRi) argue that the 's emphasis on expedited access compensates for expansion at the expense of , with limited input during drafting exacerbating risks of abuse in jurisdictions with weaker rule-of-law traditions. As of October 2023, while 22 countries had signed the , ratification lags due in part to these unresolved tensions between investigative efficiency and privacy, with the warning of fragmented data protection across borders.

Inadequacies Against State-Sponsored Cyber Operations

The Convention on Cybercrime, adopted in 2001, primarily harmonizes domestic laws to criminalize individual acts such as unauthorized access to computer systems and data interference, while emphasizing mutual legal assistance for investigations among ratifying states. However, it exhibits significant inadequacies in addressing state-sponsored cyber operations, which often manifest as advanced persistent threats (APTs) involving sustained, resource-intensive intrusions for or disruption, typically orchestrated by government-affiliated actors rather than independent criminals. These operations evade the convention's framework because they are frequently classified under as sovereign acts—such as gathering or —rather than prosecutable crimes attributable to identifiable individuals. A core limitation stems from the convention's reliance on cooperative mechanisms like and evidence sharing, which presuppose goodwill among parties and fail against non-ratifying or adversarial states. Major perpetrators of state-sponsored cyber activities, including and , have explicitly rejected the convention; withdrew its observer status in , citing sovereignty concerns, while has never acceded, viewing it as incompatible with its data localization policies. As a result, requests for assistance in probing APTs linked to entities like 's GRU (e.g., the 2020 SolarWinds compromise affecting over 18,000 organizations) or 's APT41 group often yield no cooperation, rendering the treaty ineffective for cross-border attribution or prosecution in interstate contexts. Furthermore, the convention lacks provisions tailored to the scale and impunity of state operations, such as mandatory reporting of state-directed APTs or sanctions for harboring operatives. Empirical data underscores this gap: despite over 70 ratifications by 2025, state-sponsored incidents have escalated, with U.S. intelligence attributing 80% of detected cyber espionage to nation-states between 2015 and 2020, yet few led to Budapest-facilitated convictions due to jurisdictional hurdles and the difficulty in piercing state deniability. The treaty's criminalization of tools like malware inadvertently constrains defensive countermeasures by private entities or allies, as active responses risk violating its prohibitions on unauthorized access, without carve-outs for retaliating against confirmed state aggressors. Critics, including cybersecurity analysts, argue that the convention's Eurocentric origins and focus on non-state threats undervalue geopolitical realities, where powerful states exploit attribution challenges and proxy actors to conduct operations below the threshold of armed conflict. This has prompted calls for supplementary frameworks, such as the on cyber warfare, to address state accountability outside criminal paradigms, highlighting the Budapest Convention's structural misalignment with causal drivers of nation-state cyber aggression.

Geopolitical and Sovereignty Issues

has consistently opposed the Budapest Convention, arguing that its provisions on cross-border data access and mutual legal assistance violate state sovereignty by enabling foreign authorities to obtain information from domestic service providers without sufficient national oversight. The treaty's Article 18, which permits expedited preservation of stored computer data and disclosure of traffic data upon foreign request, has been cited by officials as imposing extraterritorial obligations that undermine control over national information infrastructure. This stance led to withhold ratification despite its membership until its expulsion in March 2022, and it has routinely declined cooperation requests under the convention's framework. Geopolitically, the convention is perceived by non-signatories such as and as a Western-dominated instrument that advances liberal norms on cooperation while sidelining authoritarian preferences for strict protections and . initiated a UN process in to draft an alternative global , framing the Budapest Convention as insufficiently universal and biased toward European and North American interests, which has heightened tensions in multilateral cyber policy forums. , similarly non-party, has echoed these concerns, prioritizing domestic cybersecurity laws like the 2017 Cybersecurity Law that mandate data residency within its borders to preserve over digital assets. These divisions manifest in limited interoperability for transnational investigations involving non-signatories, as states like often reject Budapest-based mutual assistance treaties in favor of bilateral arrangements on their terms. The resulting fragmentation risks , where signatory nations—numbering 69 parties and 13 signatories without as of 2023—cooperate effectively among themselves but face barriers against threats originating from oppositional jurisdictions. Critics from non-Western perspectives attribute this to the convention's origins in the , viewing it as an extension of geopolitical alignments that prioritize transatlantic integration over equitable global standards.

Relation to Emerging Frameworks

Comparison with the 2024 UN Convention Against Cybercrime

The Convention on Cybercrime, opened for signature on November 23, 2001, and entered into force on July 1, 2004, establishes harmonized definitions for core cyber-dependent offenses such as illegal access to computer s (Article 2), and (Articles 4-5), and computer-related and (Articles 7-8), alongside procedural powers for collection and cooperation mechanisms like mutual legal assistance (Articles 27-31) and (Article 24). In contrast, the United Nations Convention against Cybercrime, adopted by the UN on December 24, 2024, builds on similar foundations but expands scope to include select cyber-enabled offenses, such as , , and drug smuggling facilitated through information and communication technologies, while retaining criminalization of cyber-dependent acts like and distribution (Articles 6-16). This broader remit in the UN treaty aims to address crimes where digital tools enable traditional offenses, though it has drawn criticism for vagueness in terms like "" that could enable overreach without the Budapest Convention's explicit intent requirements. Both instruments mandate procedural tools including data preservation (Budapest Article 16; UN Article 25), real-time interception (Budapest Article 21; UN Article 30), and search/seizure of digital evidence (Budapest Article 19; UN Article 28), facilitating cross-border investigations through expedited mutual assistance and joint operations. However, the UN Convention introduces stronger emphasis on and technical assistance for developing states (Articles 42-46), targeting gaps in the Global South where legislation remains underdeveloped, whereas the Budapest Convention relies on its Second Additional Protocol () for enhanced electronic evidence sharing among its 69 contracting states but lacks equivalent universal development mandates. International cooperation under the UN treaty also incorporates asset recovery and freezing aligned with the UN Convention against (Articles 35-37), potentially complementing but not supplanting the Budapest framework's established extradite-or-prosecute provisions. Human rights safeguards represent a point of divergence in robustness and enforcement: the Budapest Convention's Article 15 requires all powers to respect the , , and like and fair trial, bolstered by two decades of interpretive practice among predominantly democratic parties. The UN Convention includes general protections (Articles 6, 24(4), and 40(2)) affirming compatibility and non-discrimination, yet critics, including civil society groups, contend these are minimally worded and susceptible to circumvention in authoritarian contexts, lacking the Budapest Convention's granular linkages. The has assessed the UN treaty as a "narrow instrument" largely consistent with the Convention, drawing core concepts from it while incorporating UN anti-corruption and standards, but it stops short of the Budapest framework's comprehensive scope and proven safeguards. Geopolitically, the Convention's origins and accession by non-European states like the and foster trust-based cooperation among 69 parties, whereas the UN Convention, negotiated amid input from and and adopted after U.S. initial reservations, seeks universality to include non-parties to but risks fragmentation if major powers like the U.S. withhold due to free speech and misuse concerns. Overall, the UN complements the Convention by extending reach to underrepresented regions without rendering the latter obsolete, though its effectiveness hinges on and implementation amid debates over potential protocols expanding content controls.

Influence on National and Regional Laws

The Budapest Convention on Cybercrime, adopted in 2001, has served as a primary model for harmonizing domestic legislation on cyber-related offenses, with parties required to criminalize acts such as illegal access to computer systems, data interference, system interference, misuse of devices, computer-related forgery, fraud, and child pornography production and distribution. By June 2021, 124 states—representing 64% of United Nations member states—had enacted substantive criminal law provisions fully or partially compliant with the convention's standards, often adopting its definitions and penalties as guidelines even without formal ratification. This alignment extends to procedural powers, with 48% of states implementing similar investigative tools like search and seizure of computer data and real-time collection of traffic data. Specific national adoptions illustrate direct modeling on the . Sri Lanka's Computer Crimes Act of 2007 was largely based on its provisions, leading to accession as a party in and enabling prosecutions for offenses like unauthorized access and data damage. Similarly, the enacted Law 53-07 in 2007 to criminalize convention-listed offenses such as system interference and , facilitating its 2013 . Tonga's Computer Crimes Act of 2003 incorporated equivalent prohibitions on illegal access and , supporting its 2017 as a party. In , Senegal's 2017 followed legislative updates mirroring the convention's core crimes, while Nigeria's recent accession in 2023 built on prior laws influenced by its framework. Regionally, the convention has shaped supranational frameworks, particularly in . The European Union's Directive 2013/40/ on attacks against information systems draws from its substantive and procedural requirements, mandating member states to criminalize illegal access, data and system interference with minimum penalties aligned to the convention's thresholds. In the , Pacific Island countries have engaged in "legal transplant" processes, reforming laws by incorporating the convention's standards into domestic codes, often with technical assistance. Globally, non-party states like those in have used it as a checklist for drafting bills, with Brazil's 2023 accession reflecting years of partial implementation in areas like electronic evidence handling. These influences promote consistency in addressing cross-border threats, though implementation varies due to sovereignty and capacity differences.

References

  1. [1]
    About the Convention - Cybercrime - The Council of Europe
    The Budapest Convention is more than a legal document; it is a framework that permits hundreds of practitioners from Parties to share experience and create ...
  2. [2]
    Key facts - Cybercrime - The Council of Europe
    The Convention provides for (i) the criminalisation of conduct – ranging from illegal access, data and systems interference to computer-related fraud and child ...
  3. [3]
    Text - Treaty Document 108-11 - Council of Europe Convention on ...
    The Cybercrime Convention is the first multilateral treaty to address specifically the problem of computer-related crime and electronic evidence gathering.
  4. [4]
    [PDF] Council of Europe - Convention on Cybercrime (ETS No. 185)
    A Party may require that the offence be committed with dishonest intent, or in relation to a computer system that is connected to another computer system. Page ...
  5. [5]
    Seven Reasons the US Should Reject the International Cybercrime ...
    Dec 18, 2003 · The International Cybercrime Convention: What It Is · Reason #1: The treaty lacks privacy and civil liberties protections · Reason #2: The treaty ...
  6. [6]
    [PDF] Explanatory Report to the Convention on Cybercrime (ETS No. 185)
    I. The Convention and its Explanatory Report have been adopted by the Committee of Ministers of the Council of Europe at its 109th Session (8 November 2001) ...
  7. [7]
    [PDF] The Council of Europe Convention on Cybercrime
    The Convention states as its goal the “protection of society against cybercrime” by “providing for the criminalisation of such conduct . . . and the adoption of ...
  8. [8]
    Ex. Rept. 109-6 - COUNCIL OF EUROPE CONVENTION ON ...
    On November 23, 2001, the Convention was opened for signature to all COE member states and the four observer states that participated in the negotiations, and ...
  9. [9]
    Milestones - Cybercrime - The Council of Europe
    Milestones: 20 years of action · START HERE · 23 November 2001. Convention opens for signature · 28 January 2003. 1st Additional Protocol on the criminalisation of ...
  10. [10]
    [PDF] CETS 185 - Convention on Cybercrime - https: //rm. coe. int
    Convention on Cybercrime. Budapest, 23.XI.2001. Preamble. The member States of the Council of Europe and the other States signatory hereto,. Considering that ...
  11. [11]
    Chart of signatures and ratifications of Treaty 185
    Title. Convention on Cybercrime (ETS No. 185). Reference. ETS No. 185. Opening of the treaty. Budapest 23/11/2001 - Treaty open for signature by the member ...
  12. [12]
    Cybercrime Convention Committee - The Council of Europe
    On 28 August 2025, New Zealand acceded to the Convention on Cybercrime (ETS 185). With New Zealand's accession, 81 States are now Parties, two have signed it ...
  13. [13]
    New report on search and seizure of stored computer data in 74 ...
    Dec 19, 2024 · The report assesses how the 74 Parties to the Budapest Convention are implementing Article 19, which outlines the procedures for the search and ...Missing: summary | Show results with:summary
  14. [14]
    [PDF] The Budapest Convention on Cybercrime: benefits and impact in ...
    Jul 13, 2020 · The Budapest Convention requires States to ensure that the offences against and by means of computers of Articles 2 to 12 are criminalised in ...
  15. [15]
    [PDF] CETS 185 - Convention on Cybercrime - https: //rm. coe. int
    Each Party shall adopt such measures as may be necessary to establish jurisdiction over the offences referred to in Article 24, paragraph 1, of this Convention, ...
  16. [16]
    International Cooperation against Cybercrime - The Council of Europe
    Chapter III of the Convention on Cybercrime provides a legal framework for international cooperation with general and specific measures.
  17. [17]
    [PDF] CETS 189 - Additional Protocol to the Convention on Cybercrime ...
    The purpose of this Protocol is to supplement, as between the Parties to the Protocol, the provisions of the Convention on Cybercrime, opened for signature in ...
  18. [18]
    First Additional Protocol - Cybercrime - The Council of Europe
    First Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer ...
  19. [19]
    [PDF] REGULATING CYBER RACISM IN THE UNITED STATES
    Moreover, the defense of a constitutional right to free speech essentially excludes cyber racism from the jurisdictions of cybercrime and hate crime. Although ...
  20. [20]
    Countering online xenophobia and racism: new study underlines ...
    Dec 1, 2023 · The study underlines the relevance of this Protocol given increasing hate speech and hate crime online; documents goods practices by Parties to this Protocol ...Missing: criticisms | Show results with:criticisms
  21. [21]
    Legislating against Internet race hate - Taylor & Francis Online
    This paper argues that on a number of grounds the Protocol does not stand up to the test of effectiveness.
  22. [22]
    Problems of implementation of the additional protocol ... - R Discovery
    Jul 8, 2025 · The article analyzes the problems of implementing the Additional Protocol to the Convention on Cybercrime, which concerns the ...
  23. [23]
    Second Additional Protocol - Cybercrime - www.coe.int
    ### Summary of Second Additional Protocol to the Cybercrime Convention (CETS No. 224)
  24. [24]
    WIPO Lex, Treaties, Second Additional Protocol to the Convention ...
    Second Additional Protocol to the Convention on Cybercrime on enhanced Co-operation and Disclosure of Electronic Evidence (Not yet in force) · Protocol (1 Text).
  25. [25]
    Article 8 of the Second Additional Protocol to the Convention on ...
    Sep 27, 2024 · The Protocol was opened for signature by the Parties to the Budapest Convention in May 2022. An important provision of the Protocol aimed at ...Missing: adoption date
  26. [26]
    Article 10 of the Second Additional Protocol to the Convention on ...
    Oct 18, 2024 · The Protocol was opened for signature by the Parties to the Budapest Convention in May 2022. An important provision of the Second Protocol aimed ...
  27. [27]
    United States Signs Protocol to Strengthen International Law ...
    May 12, 2022 · The Second Additional Protocol to the Budapest Convention will accelerate cooperation among parties to protect our citizens from cybercrime and hold criminals ...<|separator|>
  28. [28]
    Second Additional Protocol on Cybercrime
    Feb 21, 2024 · On June 20, 2023, the Government of Canada signed the Council of Europe's Second Additional Protocol to the Convention on Cybercrime on enhanced ...
  29. [29]
    Decision - 2023/436 - EN - EUR-Lex - European Union
    Council Decision (EU) 2023/436 of 14 February 2023 authorising Member States to ratify, in the interest of the European Union, the Second Additional Protocol ...
  30. [30]
    Parties/Observers to the Budapest Convention and Observer ...
    Parties to the Convention on Cybercrime · San Marino · Senegal · Serbia · Slovakia · Slovenia · Spain · Sri Lanka · Switzerland ...
  31. [31]
    UNTC
    Convention on cybercrime. Participant(s). Submitter. Council of Europe. Places/dates of conclusion. Place, Date. Budapest ... Ratification, 20/06/2002, 01/07/2004.
  32. [32]
    From Budapest to Hanoi: Comparing the COE and UN Cybercrime ...
    May 8, 2025 · There are now 78 parties to the Budapest Convention. But major countries, including China, India, and Russia, have not joined the Budapest ...
  33. [33]
    The UN cybercrime convention: a victory for state sovereignty
    Aug 16, 2024 · Agreed under the purview of the Council of Europe in 2001, it facilitates cooperation between law enforcement agencies on cybercrime issues for ...
  34. [34]
    UN Cybercrime Convention | Black Hat MEA
    Also, the Budapest Convention faced criticism for being Eurocentric and not inclusive in its drafting process, particularly from countries in the Global South.
  35. [35]
    Confusion & Contradiction in the UN 'Cybercrime' Convention
    Dec 9, 2024 · Critics of the Draft Convention have observed that it lacks specific safeguards for basic human rights and includes broad language that is ripe ...
  36. [36]
    Russian Motivations Against Cybercrime “Hanoi Convention”
    Oct 7, 2025 · The actual reasons for not joining the Budapest Convention were rather that (a) the majority of States that had joined this treaty did not ...Missing: ratified | Show results with:ratified<|separator|>
  37. [37]
    Full article: Back to the territorial state: China and Russia's use of UN ...
    The application of this 'liberal cyber order' has been resisted by Russia and China who seek a greater role for the territorial state in cyberspace governance.
  38. [38]
  39. [39]
    The new UN Cybercrime Convention: aims and pitfalls - SMEX
    Nov 28, 2024 · Critics argued that it allows for excessive surveillance and data sharing between countries without sufficient safeguards for personal privacy.
  40. [40]
    The UN Cybercrime Treaty Has a Cybersecurity Problem In It
    Oct 17, 2022 · While the Budapest Convention has been the subject of controversy over the years, including concerns that it undermines individual privacy ...
  41. [41]
    Five reasons why the new Cybercrime Convention matters
    The UN's 193 Member States adopted a historic, legally binding agreement on cybercrime on 24 December 2024, capping five years of negotiations.Missing: non- | Show results with:non-
  42. [42]
    Russia and China Cheer UN Cybercrime Convention - CEPA
    Aug 21, 2024 · Worst of all, they used the convention to legitimize their ideas of mass surveillance.
  43. [43]
  44. [44]
    24/7 Network established under the Convention on Cybercrime
    The Network of 24/7 is a tool for expedited international cooperation on cybercrime and electronic evidence which is very much used for operational cooperation.Missing: cross- border
  45. [45]
    [PDF] 2024 Meeting of the 24/7 Network of Contact Points of the Budapest ...
    Oct 18, 2024 · The role of the 24/7 Network and the Budapest Convention is pivotal in assisting countries to tackle cybercrime, providing technical assistance ...
  46. [46]
    [PDF] CETS 185 - Explanatory Report to the Convention on Cybercrime
    The Convention aims principally at (1) harmonising the domestic criminal substantive law elements of offences and connected provisions in the area of cyber- ...
  47. [47]
    [PDF] Cybercrime Convention Committee (T-CY) - https: //rm. coe. int
    The T-CY will furthermore encourage capacity building activities to support implementation of the. Budapest Convention and its Protocol as well as follow up to ...
  48. [48]
    Worldwide Capacity Building - Cybercrime - The Council of Europe
    Supporting countries worldwide in the strengthening of their criminal justice capacities to respond to the challenges posed by cybercrime.Missing: 185 technical
  49. [49]
    Achievements - Cybercrime - The Council of Europe
    The Budapest Convention provides for international cooperation mechanisms accessible to all Parties. The achievements of the Budapest Convention with regards to ...
  50. [50]
  51. [51]
    Global Law Enforcement Convention Weakens Privacy & Human ...
    Jun 8, 2021 · If countries sign the Protocol as it stands and in its entirety, it will reshape how state police access digital data from Internet companies ...
  52. [52]
    New Cybercrime Protocol will undermine our privacy to compensate ...
    Apr 13, 2022 · This new international agreement raises serious concerns as its shortcomings promise to undermine the safeguards to our fundamental rights.
  53. [53]
    [PDF] Statement 02/2021 on new draft provisions of the second additional ...
    Feb 2, 2021 · Access to personal data across jurisdictions has already been addressed in the past by EU data protection authorities in various positions and ...
  54. [54]
    When is Cyber Defense a Crime? Evaluating Active Cyber Defense ...
    The Budapest Convention is the only binding international law defining which actions are permissible in cyberspace and which are not. It is imperfect, and ...
  55. [55]
    [PDF] The Complexities of International Cybercrime and Security
    Mar 1, 2022 · 75 The Budapest Convention failed to expand or explain the substantive criminal law such as "illegal access, data interference, and system ...
  56. [56]
    Cyber Espionage and International Law
    However, the Convention does not specifically address cyber espionage, given that it predates the digital age and the complex cyberspace challenges that have ...Missing: gaps APTs
  57. [57]
    Emerging Trends in Cybersecurity: A Holistic View on Current ...
    Advanced persistent threats (APTs) involve unauthorized users gaining prolonged undetected access to systems. In 2015, Chinese hackers executed a large-scale ...
  58. [58]
    The false promise of cyber conventions: Why the West is losing and ...
    Sep 15, 2023 · To safeguard accountability and liberal values in cyberspace, the U.S. and Europe must refocus and strengthen their cyber diplomacy efforts.
  59. [59]
    The hypocrisy of Russia's push for a new global cybercrime treaty
    Mar 7, 2022 · Despite being a member of the Council of Europe, Russia never joined the Budapest Convention, claiming the treaty violates principles of state ...
  60. [60]
    Is Anyone Happy With the UN Cybercrime Convention? - Lawfare
    Dec 2, 2024 · Russia has refused to join the Budapest Convention, alleging that the authorization of cross-border investigations could threaten its ...
  61. [61]
    The First Global Treaty against Cybercrime: from Geopolitical ...
    Jan 1, 2025 · The Russian Federation took a strong stance against the expansive extraterritorial reach of the treaty, especially the introduction of any ...
  62. [62]
    United Nations Convention against Cybercrime - unodc
    United Nations Convention against Cybercrime;. Strengthening International Cooperation for Combating Certain Crimes Committed by Means of Information and ...<|separator|>
  63. [63]
    The “Budapest” Convention on Cybercrime and the draft United ...
    Aug 27, 2024 · The draft UN treaty represents a narrow criminal justice treaty that seems broadly consistent with the Budapest Convention on Cybercrime (BC).
  64. [64]
    More and more countries acceding to Budapest Convention - Portal
    Dec 15, 2023 · There are now 69 state parties from around the world, with Brazil, Nigeria and Cameroon the most recent to join, with a further 23 states that ...
  65. [65]
    International cooperation against cybercrime
    Jul 16, 2025 · The Convention allows its parties to refuse international cooperation requests if these requests are contrary to human rights or fundamental ...
  66. [66]
    Diffusion of the Budapest Convention on cybercrime and the ...
    It appears that PICs have reformed and developed their cybercrime legislation by the process of 'legal transplant', in which international and foreign legal ...