The cybercriminal risks and threats of body-hacking crimes under the legal framework of Budapest Convention


Опубликован: Σεπ 30, 2025
Ahmet Sami Demirezici
Аннотация

In this Article, the Budapest Convention (The Convention on Cybercrime, Council of Europe, ETS No. 185) is put under legal analysis in the scope of risks and threats of cybercrimes against implantable, prosthetic and medical devices, referred to as “Body-Hacking Crimes” according to the terminology of this research. To analyze the Budapest Convention systematically, the risks and threats of “Body-Hacking Crimes” are brought to light under three sub-headings (Body-Hacking, Elements of Cybercrimes, Crimes & Reservations) as the main subjects of this Article. Under the first sub-heading, the term “Body-Hacking” is defined and explained as regards of its usage in the general and criminological literature to describe a new category of cybercrimes, as classified “Body-Hacking Crimes” in this paper. Under the second sub-heading, the elements of cybercrimes are analyzed in regard to the substantive law and human rights provisions of the Budapest Convention and legal loopholes regarding body-hacking crimes are uncovered in these provisions. Though there are multiple elements of cybercrimes required to be analyzed in specific to body-hacking crimes, only three elements (Intention, Non-Authorization, Computer Systems) are evaluated under the second sub-heading due to the inadequate regulations and definitions of these elements in the Budapest Convention. Under the final and third sub-heading, computer-related crimes and reservations regulated in the Budapest Convention are examined in correlation with the hackable nature of implantable, prosthetic and medical devices. Particularly, bodily integrity crimes are brought into the focus for legal analysis of body-hacking crimes inducing bodily damage in the final part of this article. In this study, the substantive-law-oriented and definitional problems of the Budapest Convention are predominantly investigated, which results in pointing out mostly Articles 1-13 of Budapest Convention. Furthermore, the domestic laws and court verdicts, esp. UK, US, France and Dutch cybercrime laws and supreme court decisions, are referred in this study to provide a legal perspective regarding the development of body-hacking crimes in the national legislations.

Article Details
  • Раздел
  • Original Articles
Скачивания
Данные скачивания пока недоступны.
Библиографические ссылки
Akmazoglu TB, Chandler JA. Mapping the emerging legal landscape for neuroprostheses: Human interests and legal resources. Hevia M (ed) In Developments in Neuroethics and Bioethics Volume 4. Academic Press, 2021: 63-98. https://www.sciencedirect.com/science/article/pii/S2589295921000072?ref=cra_js_challenge&fr=RR-1.
Aubert H. RFID technology for human implant devices. Comptes Rendum Physique 2011, 12: 67-683. https://www.sciencedirect.com/science/article/pii/S1631070511001563.
Browning JG, Tuma S. If Your Heart Skips a Beat, It May Have Been Hacked: Cybersecurity Concerns with Implanted Medical Devices. South Carolina Law Review 2016, 67: 637-677. https://scholarcommons.sc.edu/cgi/viewcontent.cgi?article=4183&context=sclr.
Browns B. A Farewell to Arms (And Legs): The Legal Treatment of Artificial Limbs. Columbia Journal of Law and Social Problems 2013, 47: 69-102. https://jlsp.law.columbia.edu/wp-content/blogs.dir/213/files/2017/03/47-Brown.pdf.
Bublitz C. The body of law: boundaries, extensions, and the human right to physical integrity in the biotechnical age. Law and the Biosciences 2022, 9: 1-26. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9621699/pdf/lsac032.pdf.
Bublitz JC, Merkel R. Crimes Against Minds: On Mental Manipulations, Harms and a Human Right to Mental Self-Determination. Criminal Law and Philosophy 2014, 8: 51-77. https://doi.org/10.1007/s11572-012-9172-y.
Cambridge Dictionary Online. Hacking. https://dictionary.cambridge.org/dictionary/english/hacking.
Chapman FE. Intangible Captivity: The Potential for a New Canadian Criminal Defense of Brainwashing and Its Implications for the Battered Woman. Berkeley Journal of Gender, Law & Justice 2013, 28: 31-76. https://doi.org/10.15779/Z38RR1PM1J.
Claugh J. Principles of Cybercrime 2nd ed. Cambridge University Press, 2015.
Committee for Scientific and Technological Policy. Recommendation of the Council on Responsible Innovation in Neurotechnology. OECD, 2019. https://legalinstruments.oecd.org/en/instruments/OECD-LEGAL-0457.
Council of Europe. Explanatory Report to the Convention on Cybercrime. European Treaty Series 2001, 185. https://rm.coe.int/16800cce5b.
DPP v K [1990] Cr App R 23.
Earnhardt R. .Hacking the Human Body: The Cyber-Bio Convergance. In Harrigan G. (ed) On the Horizon: Security Challenges at the Nexus of State and Non-State Actors and Emerging/Disruptive Technologies. SMA Periodic Publication, 2019: . https://nsiteam.com/social/wp-content/uploads/2019/04/DoD_DHS-On-the-Horizon-White-Paper-_FINAL.pdf.
Emory R. Losing Your Head in the Washer – Why the Brainwashing Defense Can Be a Complete Defense in Criminal Cases. Pace Law Review 2010, 30: 1337-1359. https://doi.org/10.58948/2331-3528.1742.
Erickson J. Hacking: The Art of Exploitation 2nd ed. No Starch Press, 2008.
https://repo.zenk-security.com/Magazine E-book/Hacking- The Art of Exploitation (2nd ed. 2008) - Erickson.pdf.
Fisher v Carrousel Motor Inc., Supreme Court of Texas, 424 S.W.2d 627 (1967).
Gasson MN, Koops BJ. Attacking Human Implants: A New Generation of Cybercrime. Law, Innovation and Technology 2013, 5: 248-277. http://dx.doi.org/10.5235/17579961.5.2.248.
Gerechtshof [Court of Appeal] Amsterdam 21 February 2013, LJN BZ2055 [NL].
Giger JC, Gaspar R. A look into future risks: A psychosocial theoretical framework for investigating the intention to practice body hacking. Human Behaviour and Emerging Technologies 2019, 1: 306-310. https://onlinelibrary.wiley.com/doi/epdf/10.1002/hbe2.176
Hoge Raad [Dutch Supreme Court], March 26, 2013, LJN BY9718.
IBM. What is ethical hacking? https://www.ibm.com/topics/ethical-hacking.
Ienca M, Andorno R. Towards new human rights in the age of neuroscience and neurotechnology. Life Sciences, Society and Policy 2017, 13: 1-27. https://doi.org/10.1186/s40504-017-0050-1.
Ienco M. Common Human Rights Challenges Raised By Different Applications of Neurotechnologies in the Biomedical Fields. Committee on Bioethics of Council of Europe, 2021. https://rm.coe.int/report-final-en/1680a429f3#page51.
Istace T. Protecting the mental realm: What does human rights law bring to the table? Netherlands Quarterly of Human Rights 2023, 41: 179-260. https://doi.org/10.1177/09240519231211823.
Jael M. BODY HACKING AND CONCEPTIONS OF CORPOREALITY. Aletheia: The Arts and Science Academic Journal 2022, 2: 52-61. https://journals.mcmaster.ca/aletheia/issue/view/172/99.
Kolitz D. Could Someone Hack My Microchip Implant? Gizmodo, 2020, https://gizmodo.com/could-someone-hack-my-microchip-implant-1845216410.
Koivuniemi A, Otto K. When “altering brain function” becomes “mind control”. frontiers in SYSTEMS NEUROSCIENCE 2014, 8: 1-6. doi: 10.3389/fnsys.2014.00202
Kostadinov D. Hacking Implantable Medical Devices. INFOSEC INST, 2014. http://resources.infosecinstitute.com/hcking-implantable-medical-devices/.
Ligthart S. Towards a Human Right to Psychological Continuity? Reflections on the Rights to Personal Identity, Self-Determination, and Personal Integrity. European Convention on Human Rights Law Review 2024, 5: 199-229. https://doi.org/10.1163/26663236-bja10092.
Mottle J. Blackberry Offers Insight On Hidden Security Headaches for Patients. Providers, Fierce Heathcare, 2015. https://www.fiercehealthcare.com/mobile/blackberry-offers-insight-hidden-security-headaches-for-patients-providers.
Núñez CC. Cybersecurity in Implantable Medical Devices. Doctoral Thesis, Universidad Carlos III de Madrid, 2017. chrome://external-file/tesis_carmen_camara_nunez_2018.pdf.
Pugh J et al. Brainjacking in deep brain stimulation and autonomy. Ethics and Information Technology 2018, 20: 219-232. https://doi.org/10.1007/s10676-018-9466-4.
Pycroft L et al. Brainjacking: Implant Security Issues in Invasive Neuromodulation. World Neurosurgery 2016, 92: 454-462. http://dx.doi.org/10.1016/j.wneu.2016.05.010.
Quirin T et al. Towards Tracking of Deep Brain Stimulation Electrodes Using an Integrated Magnetometer. Sensors 2021, 21: 1-18. https://doi.org/10.3390/s21082670.
Rauwel G. Body Hackers: Cyber Murders in a Gamer Culture, Kindle: 2015.
Rechtbank [District Court] Zutphen 9 February 2010, LJN BL3094.
State v. Schaffer, 202 Ariz. 592, 48 P.3d 1202 (Ariz. Ct. App. 2002).
The Crown Prosecutive Service (CPS). Offences against the Person, incorporating the Charging Standard. https://www.cps.gov.uk/legal-guidance/offences-against-person-incorporating-charging-standard.
Teunissen M. Mishandeling versus Assault: A comparative Approach. Master’s Thesis, Leiden University, 2017. https://studenttheses.universiteitleiden.nl/access/item:2607954/view.
United Nations Office on Drugs and Crime. Offences against the confidentiality, integrity and availability of computer data and systems. 2019. https://www.unodc.org/e4j/zh/cybercrime/module-2/key-issues/offences-against-the-confidentiality--integrity-and-availability-of-computer-data-and-systems.html.
Warburton ID. The Commandeering of Free Will: Brainwashing as a Legitimate Defense. Capital Defense Journal 2003, 16: 73-97. https://scholarlycommons.law.wlu.edu/wlucdj/vol16/iss1/6.
Wiles K. Your body is your internet – and now it can't be hacked. Purdue University, 2019. https://www.purdue.edu/newsroom/archive/releases/2019/Q1/your-body-has-internet--and-now-it-cant-be-hacked.html.
Williams PAH, Woodward AJ. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Dove Press Medical Devices: Evidence and Research 2015: 305-316. http://dx.doi.org/10.2147/MDER.S50048.
Williams S. Three unsafe technologies that could 'hack our bodies'. SecurityBrief UK, 2023. https://securitybrief.co.uk/story/three-unsafe-technologies-that-could-hack-our-bodies.
Zetter K. It’s Insanely Easy to Hack Hospital Equipment. WIRED, 2014. http://www.wired.com/2014/04/hospital-equipment-vulnerable