Click here to load reader
Upload
power-adapter
View
212
Download
0
Embed Size (px)
Citation preview
4/24/2014 The Emergence And The Impact Of Cybercrime International Law Essay
http://www.ukessays.com/essays/law/the-emergence-and-the-impact-of-cybercrime-international-law-essay.php 1/9
ukessays.com
http://www.ukessays.com/essays/law/the-emergence-and-the-impact-of-cybercrime-international-law-essay.php
The Emergence And The Impact Of Cybercrime International
Law Essay
Need help? ☎ 0115 966 7955
INTRODUCTION
The Internet with its unique advantage
of anonymity and speed is like a double
edged sword. While it promotes free
expression and forms a large part of our everyday life, it also provides an asylum for the perpetration of all
types of Cybercrimes.
Every day, new cybercrimes emerge, Phishing, hacking, botnets, ATM hacking, Identity theft, Stock price
manipulation, hacking cars to mention a few. Also we hear terms like Cyber threat, cyber terrorism, cyber
This is made more difficult by the fact that while the internet may be borderless for the cybercriminals, law
enforcement agents must consider the boundaries and the sovereignty of other nations. As a result, the
different legal systems and the disparities in the laws of various nations often present major obstacles to
the fight against cybercrime.
The existence of an International treaty on cybercrime is a fundamental pre-requisite for the combat
against cybercrime. This law should ideally set out the offences and make adequate provisions for
investigations and prosecutions, as well as jurisdiction. The importance of this cybercrime treaty is
illustrated by the “love bug” virus of 2000 which inflicted damage in 20 countries, while the perpetrator a
Philippine, suffered no harm for his actions because there was no cybercrime legislation in place in the
Philippine.
The awareness of the impact of cybercrime has spurred many regional and International initiatives in the
area of cybercrime amongst which has emerged the Council of Europe Convention on Cybercrime
2001(The Convention). The Council of Europe (CE) was convinced of the need to pursue a common
criminal policy with the aim of protecting the society against cybercrime inter alia, by the adoption of an
appropriate legislation and by encouraging International co-operation, hence the Convention on
Cybercrime.
The Convention which came into force in July 2004 currently has 47 signatories including non member
states, out of which 30 countries have ratified the Convention. Considering the need for a global treaty on
Cybercrime, in other to be better positioned against the anonymity, speed, and the transnational or the
borderless nature of the internet, this essay considers how well the Council of Europe’s Convention on
Cybercrime might serve as a model for global legislation in the field of computer crime, considering the
Substantive provisions, the procedural provisions and the provisions relating to International Cooperation.
It analyses the merits and demerits of the convention and its effect on the global fight against cybercrime. It
also considers other factors which affect the effective implementation of the Convention.
THE CONVENTION
The Council of Europe’s Cybercrime Convention is a binding International treaty and a historic milestone in
the fight against cybercrime and has been recognised as the leading treaty in the area of computer crime.
4/24/2014 The Emergence And The Impact Of Cybercrime International Law Essay
http://www.ukessays.com/essays/law/the-emergence-and-the-impact-of-cybercrime-international-law-essay.php 2/9
The Convention though negotiated under the aegis of the Council of Europe, had four non European
countries who participated in the drafting and negotiations and it is open to all countries for signature and
ratification. Many scholars have argued that it is a regional initiative meant for the members of the Council
of Europe, and will always be a European Convention, though other countries may want to use it as a
guideline or reference for the development of their own legislation, by adopting its principles in accordance
with their own legal system and practice. However the participation of the four non European countries;
United States, Canada, Japan and South Africa in the negotiations and drafting portrays the intention for
international implementation of the Convention.
The Convention aims at preventing illegal intrusion into the
works of computer systems. The convention was necessary in
other to dissuade acts against the confidentiality, integrity and
availability of computer systems, networks and data by the
criminalization of such conducts, and the adoption of sufficient
powers to combat such offences, the efficient detection,
investigation and prosecution of such offences and an
effective International co-operation. The drafters took into
cognisance the efforts of other International organisations in
the field of cybercrime and also the existence of similar treaties between the Council of Europe member
states and other states, stressing that the Convention on Cybercrime is intended to supplement these
other Conventions in criminal investigations and proceedings relating to computer systems and data, and
the collection of evidence of criminal offences in electronic data.
In the 1990s when the Convention was negotiated and drafted, it seemed to address the major computer
crimes prevalent in that era. Although the drafters had made the provisions quite broad, possibly to
accommodate issues that might emerge in the future, it is clear that presently (9 years since the
Convention opened for signature) with the rapid growth of the Internet and ICTs, cybercrimes have
expanded much more than the Convention can accommodate in its current state.
THE SUBSTANTIVE CRIMINAL PROVISIONS
The Convention deals with four kinds of cybercrimes; Hacking of computer systems and violations of
network security, Computer related fraud, child pornography and the infringement of Copyright and related
rights. It also makes provisions for sanctions and penalties.
Hacking or Hacktivism has
The Convention could also bring in provisions to criminalise cyber attacks against Information
Infrastructures. ICTs have blurred the lines between cybercrime and cyber terrorism. The Estonian attack is
one of such examples and there is therefore need for the protection of critical Information Infrastructure as
part of society’s protection against cybercrime and cyber terrorism. The provisions of the Council of
Europe Convention on the prevention of terrorism 2005 (especially articles 5-7) come in handy.
The provisions of the Convention are wide and provide a lot of flexibility and discretion for member states
in the drafting of their own laws. It provides the minimum consensus for offences, and parties in adopting
their own measures may exclude “petty or insignificant” misconducts and criminalise other conducts which
they deem relevant. They may also impose other conditions for criminal liability to attach with respect to
specific offenses. This flexibility allows different parties to adapt the provisions in accordance with their own
legal systems as is consistent with most international treaties.
There is however a lack of clarity in the definition of the offences and certain key definitions necessary for
interpreting the provisions are very broad. In the provision for sanctions, parties are to adopt “effective,
proportionate and dissuasive” sanctions. On one hand, this provision may be providing the legal obligation
4/24/2014 The Emergence And The Impact Of Cybercrime International Law Essay
http://www.ukessays.com/essays/law/the-emergence-and-the-impact-of-cybercrime-international-law-essay.php 3/9
for parties to make use of online enforcement tools or adopt other effective measures in symmetry to their
existing criminal law. On the other hand, it may result into conflicting terms, definitions and provisions by
different nations which may lead to an excessively lenient criminal legislation in some states or major
inconsistencies among national regulations. This may have detrimental effects as criminals may direct their
attacks through tolerant legal systems and focus their activities on the most vulnerable victims. In other
words, undermining the essence of the Convention which is, the harmonisation of the elements of the
various offences, in the domestic criminal substantive laws of nations and connected provisions in
cybercrime.
The expectation is not so much the unification or exact
correspondence of national legislation, but rather to tackle
frictions and inconsistencies among national laws. Relativity
on the definitions will most likely reduce the loopholes and
inconsistencies among national legislations and prevent
scenarios whereby a crime cannot be prosecuted because the
perpetrator is resident in a country which does not criminalize
the conduct or criminalises it but as a minor offence. The
Convention should be able to provide the minimum sanction
or penalty for each of the offences to serve as a guideline for parties.
The Convention is not dynamic which has led to lacunae in the provisions and there is a need to update it
to accommodate emerging issues. Issues such as phishing, spam, identity theft, crime in the virtual world
and social networks, amongst others are not covered as nominate crimes, although some may be
subsumed into other categories. Provision should also be made for the criminalization of preparatory acts
prior to the attempt at committing the established offences. The Convention could also bring in provisions
to criminalise cyber attacks against critical Information Infrastructures. ICTs have blurred the lines between
cybercrime and cyber terrorism. The Estonian attack is one of such examples and there is need for the
protection of critical Information Infrastructure as part of society’s protection against cybercrime and cyber
terrorism. The provisions of the Council of Europe Convention on the prevention of terrorism 2005
(especially articles 5-7) come in handy.
Copyright and related Offences
Article 10 of the convention provides for offences relating to the infringement of Copyright and related
rights. The provision criminalises the infringement of copyright and related rights but did not specifically
provide for other intellectual property offences like infringement of trademarks. Critics have argued that
provisions relating to Intellectual property rights should not be included in the Convention as it is already
meaningfully addressed in other Treaties like WIPO and TRIPS. Further, some countries especially in Asia
do not have traditions on Copyright legislation as covered by Art 10 of the Convention and as such
provisions relating to copyright and related rights should not be included in a global protocol as a measure
to be implemented by all parties.
The action by several countries, including the European Union, US, Canada and Japan amongst others in
the negotiation of an Anti-Counterfeiting Trade Agreement (ACTA) also questions the success of the
Copyright provisions of the Convention. ACTA will establish a new legal framework with its own governing
body which countries can sign or join voluntarily. The non European countries that played a major role in
the drafting of the Convention are also playing a major role in the negotiation for ACTA. ACTA will be made
up of three primary components; International cooperation, enforcement practices and legal framework for
the enforcement of intellectual property rights. It aims to provide an international framework which will
improve the enforcement of IP rights.
Since the Convention contains a provision dealing with the infringement of copyright and related rights,
4/24/2014 The Emergence And The Impact Of Cybercrime International Law Essay
http://www.ukessays.com/essays/law/the-emergence-and-the-impact-of-cybercrime-international-law-essay.php 4/9
why the negotiation of a new agreement instead of an amendment of the provisions contained in the
Convention? Bearing in mind that some of the participating states are signatories to the convention. The
answer could be the inadequacy of the provision relating to copyright and related rights, the unsatisfactory
rate of ratification of the Convention by more countries or the realisation that the provisions relating to
copyright should not be part of the Convention or some other political or economic reason.
According to the European Union, they didn’t negotiate ACTA
through any of the existing structures because a free standing
agreement will provide the most flexibility for interested
countries. Considering the ultimate objective of ACTA which is
to improve IPR enforcement in large emerging economies like
China and Russia (who are not signatories to the Cybercrime
Convention), the motive for ACTA may lean towards economic
or political interest.
Be that as it may, article 10 of the convention should be updated to reflect all infringements of IPR.
Whether or not provisions for Copyright and related rights should be part of the Convention depends on
whether Copyright and other related offences can be committed through the use of a computer system and
on the internet.
Child Pornography
Basically all forms of child pornography are criminalised by article 9 of the convention. Some countries like
the US already had laws prohibiting child pornography before the Convention. The convention extended
the prohibitions to electronic transmissions of child pornography thereby making virtual child pornography
unlawful. Arguments against virtual child pornography, has been refuted on the grounds that it will be
difficult to differentiate between those who use real children and computerized images.
Notwithstanding, the Convention gives the parties the discretion to either or not criminalise virtual child
pornography and mere possession. As a result, some countries criminalise mere possession regardless of
intent to distribute while in some countries like Russia, mere possession is not illegal. Furthermore, parties
have the discretion to determine the age of a child which must be between 16 and 18 years.
The developments of ICTs have escalated child pornography and in turn have spurred many international
and regional responses. The issue of child pornography has been an agenda in various International
forums. At a session of the Internet Governance Forum (IGF 2010), child pornography was discussed
extensively and many of the participants representing different countries and regions of the world
applauded the provisions of child pornography contained in the Convention on Cybercrime and advocated
for more countries to become signatories to the Convention for a unified fight against cybercrime.
The substantive criminal provisions of the Convention brought together for the first time the consensus of
criminal conducts on the internet and is replicated (with some few additions in some cases) in almost all
cybercrime laws in the world both national, regional and international. For a Convention to be successful in
achieving its desired goal and encourage ratification by a large number of nations, it is imperative that only
the offences which are prohibited by a general consensus should be included in the Convention. This was
the issue with the "Additional Protocol to the Convention on cybercrime, concerning the criminalisation of
acts of a racist and xenophobic nature committed through computer systems”. It did not form part of the
Convention but was drafted as a separate instrument, because many members including the US objected
to its provisions as contrary to their Fundamental human rights laws.
PROCEDURAL PROVISIONS AND INVESTIGATIVE POWERS
The Convention requires parties to establish the power and the procedures for criminal investigations and
4/24/2014 The Emergence And The Impact Of Cybercrime International Law Essay
http://www.ukessays.com/essays/law/the-emergence-and-the-impact-of-cybercrime-international-law-essay.php 5/9
prosecutions. Such powers should enable Law enforcement
officers with the help of Internet Service Providers (ISP) where
necessary to preserve expeditiously, computer data or traffic
data stored in a computer system to avoid being lost, order
the production of data, search computer systems or its
component for stored data, seize, copy or remove any such
data and record or collect real time transmissions of any
content and data traffic.
The scope of the provisions covers not only the criminal offences established by the Convention, but other
criminal conducts committed using a computer system as well as the “collection of evidence in an electronic
form” in relation to any crime. It follows that the provisions will apply to all criminal activities which use and
benefit from ICTs and as such have a wide application. Due to the speed of ICTs, evidence of cybercrime
consists mainly of digital information which is ephemeral in nature and can be easily altered, lost or
deleted. Therefore swift action in the collection and preservation of digital evidence is very important.
Broadly speaking, the investigative powers envisaged by the convention transcend cybercrimes and will
cover most criminal activities. For instance, in a kidnap investigation, it may be necessary to seize and
analyse the suspect’s computer or mobile phone in order to collect electronic evidence. The collection of
Content and traffic data according to Article 20 and 21 should only be employed for serious crimes and
what constitutes serious crime is at the discretion of the parties.
Critics have challenged these provisions especially the collection of traffic and content data on the basis
that it intercepts personal communications and as such a violation of the right to privacy and
communication. They argue that the procedural provisions of the Convention extend beyond the scope of
the offences, does not make adequate provisions or guarantees for the protection of human rights and
fundamental due process, and gives the parties the power to establish both the conditions for exercising
the powers of investigation and prosecution and the safeguards against them and place no substantial
constraints on the law enforcement agencies which will inevitably lead to violations of rights and
privacy. Even ISPs decried the provisions as placing a burden on them.
Nevertheless the protection of Human rights is guaranteed by article 15, which requires parties to ensure
that these powers of investigation and prosecution are subject to the law protecting human rights and
liberties. This involves both the human rights protection in the domestic laws of the parties, and other
international obligations which the party has undertaken. This means that each party is still bound by its
Human rights laws and obligations even in the investigation of crimes contained in the Convention. Parties
are also mandated to establish a judicial or Independent supervision as a check and lay out the limitations
on the scope and duration of the investigatory powers.
In the face of the criticisms, one might reason that personal
information are being hacked into constantly by criminals for
illegal purposes and it would not be worse to look into these
private communications in other to fight crime. That depends
of course from which perspective it is viewed and the concern
for the likelihood of abuse.
It is important that in the investigation and prosecution of
cybercrimes, the right balance should be struck between the
protection of the fundamental human rights of individuals and the effective prosecution of cybercrimes.
Practically, most of the challenges to the prosecution of cybercrimes come from the area of implementation
of the relevant law, collecting evidence in other nations, understanding technical evidence and issues of
extradition.
4/24/2014 The Emergence And The Impact Of Cybercrime International Law Essay
http://www.ukessays.com/essays/law/the-emergence-and-the-impact-of-cybercrime-international-law-essay.php 6/9
Jurisdiction
By the provisions of Article 22, Parties are to exercise jurisdiction in a particular offence when it is
committed in its territory or by its national or on board a ship or aircraft registered under the party. The
parties should where appropriate in a situation of jurisdictional conflict, where more than a party is claiming
jurisdiction for an offence contained in the convention, hold a consultation to determine which jurisdiction is
the most appropriate to prosecute the matter.
The provision failed to address adequately the resolution of jurisdictional conflict which is of fundamental
importance. Computers and networks are rarely subject to physical and spatial boundaries and together
with the nature of the internet, jurisdictional conflicts will most likely arise frequently. Therefore the method
of possible consultation between interested parties to resolve issues of jurisdiction without any further
guidelines will likely not resolve positive conflicts and may waste a lot of time which is of essence in the
investigation of cybercrimes. The provision provides no guideline or conditions for the resolution of the
conflict. In this regard, the 2005 European Union Framework Decision on attacks against information
systems went a step further to provide for a “mandatory consultation” as opposed to the Conventions
“Consultation where appropriate” and provides three criteria for determining jurisdiction as; the offenders
nationality, the place where the offence was committed and where the offender was apprehended. The
provision on jurisdiction should clearly set out the criteria for the conferment of jurisdiction over an alleged
cyber criminal in cases of jurisdictional conflicts. This will prevent the occurrence of issues of concurrent
jurisdiction and probably double jeopardy and provide specific conditions for the resolution of jurisdictional
conflicts.
Furthermore, “territorial notion” should be expanded to enable the prosecution of crimes irrespective of
whether the conduct occurred either in whole or in part in the prosecuting country’s territory, and also the
recognition of punishments successfully served in other jurisdictions. The admissibility of evidence lawfully
gathered from other countries in relation to International computer crimes should be part of a conclusive
and workable agreement on jurisdiction. This is important especially with cloud computing which allows the
transfer of digital data across national boundaries, where they can be stored on servers in any location
thus preventing access to the law enforcement who tries to collect evidence or investigate criminal
activities.
INTERNATIONAL COOPERATION
International cooperation is at the core of the fight against
cybercrime and is one of the issues challenging its effective
implementation. The transnational effect of cybercrimes, the
speed of the internet and the ever changing nature of ICTs
have made International cooperation very important, because
it aids expeditious actions which are very crucial to the
prosecution of cybercrime.
The scope of International cooperation under the Convention is wide. Generally parties should cooperate
and assist other parties “to the widest extent possible” in the process of investigations and proceedings.
This cooperation can come in two ways, either by extradition or by mutual assistance. Where there is an
issue which needs the international cooperation of parties, the parties involved will be guided by any
Extradition treaty or Mutual agreement which already exists between the parties. For the offences provided
in article 2-11 of the cybercrime convention, such an offence must be punishable by at least a maximum of
one year imprisonment to qualify for extradition under the existing framework. The Convention will only
come into play in cases of Extradition where no other extradition treaty exists between the parties.
Parties may require mutual assistance from other parties in respect of all investigatory and prosecution
4/24/2014 The Emergence And The Impact Of Cybercrime International Law Essay
http://www.ukessays.com/essays/law/the-emergence-and-the-impact-of-cybercrime-international-law-essay.php 7/9
provisions of the convention including the criminal conducts committed using a computer system and the
“collection of evidence in an electronic form” in relation to any crime. As a result, mutual assistance
between parties will apply to both cybercrimes and ordinary crimes, subject to various exceptions. On the
strength of mutual assistance, police can cross national boundaries to access servers in other countries
for data as long as it has the consent of the owner of the network systems.
Russia has been in opposition of this provision after the US police had gained access to the computers of
some Russian men accused of defrauding US banks in 2000. It has refused to sign the Cybercrime
convention saying that its reluctance to sign is based on the fact that it wants to preserve state sovereignty
and monopoly in the exercise of investigative powers based on the strength of its existing domestic laws
and procedures.
The provisions on international cooperation have received the greatest criticism of all the provisions of the
convention; from the scope of its application, to the level of assistance that the parties are required to give.
In the view of the critics, assistance to “the widest extent possible” could be stretched really far, and the
scope of assistance required by the convention involves a wide range of crimes not covered by the
convention, and does not provide adequate guarantees for due process and the protection of human
rights. They argue that the protection of the human right of privacy is fundamental and should not be
sacrificed at the altar of international cooperation. On the other hand, an international treaty requires some
amount of flexibility and a treaty with a strict obligation with regards to guarantees may discourage states
from adopting it and in the case of the Convention will jeopardise its main objective which is international
cooperation.
The lack of the requirement of dual criminality for granting
assistance was also highly criticised. The convention made no
specific provision for dual criminality except in Article 29 Para
3, where it exempted the application of dual criminality for the
expedited preservation of stored computer data. Following
from this, one may assume that other provisions where dual
criminality is not exempted requires dual criminality. Indeed
what the convention has done is to leave the basics of mutual
assistance to established national and international
agreements between the parties. Therefore in each case of mutual assistance, the parties are bound by
the traditional agreement on Mutual assistance between them, and if it requires dual criminality, then dual
criminality will apply.
As stated earlier, International Cooperation is very important to the fight against cybercrime. Its effect can
be in two ways. On one hand, it may deter countries who are very particular about their sovereignty from
becoming a party to the convention as is the case with Russia. On the other hand, it may eventually be the
factor that will motivate many states to ratify and implement the convention. This was the issue raised by
critics when Turkey became a signatory to the convention in November 2010. Turkey has a wider range of
cybercrimes in its law than that covered by the scope of the Convention and has imposed bans on some
internet sites like YouTube and Daily motion. Their signing of the convention was seen by many as a sort of
defence system which will give them access to international information and cooperation.
Another achievement by the Convention is the establishment of a network of national contact points which
will be available on a 24/7 basis for assistance and collection of evidence. The network is open to all
countries and 55 countries have joined so far. Parties are obliged to create such national points and equip
them adequately.
DIPLOMACY ISSUES
4/24/2014 The Emergence And The Impact Of Cybercrime International Law Essay
http://www.ukessays.com/essays/law/the-emergence-and-the-impact-of-cybercrime-international-law-essay.php 8/9
The Convention only becomes effective upon ratification and implementation. The implementation of the
Convention is very important. The Convention is in its 6th year since it came into force in 2004. Currently,
the US is the only non member of the Council of Europe who has ratified the Convention. Despite the
important role which it played during the negotiations and drafting of the Convention, it ratified the
Convention in 2006, five years after signature in 2001.
Within the Council of Europe, some members like Russia and Monaco have not signed the treaty, while
others like the UK, Poland, Austria, and Greece have signed, but have not ratified the convention. On the
global level, the level of implementation is very poor , and most of the countries with the highest number of
internet users have neither signed nor ratified the Convention.
Certain factors like Sovereignty, territoriality, human rights issue, Security, politics, international reputation
and economic issues influence the decision of states in becoming parties to international conventions.
Some authors are of the opinion that these issues play more prominent part in the implementation of the
Convention by member states rather than its legal enforceability. This is buttressed by the poor level of
ratification by countries, especially non European countries. The reason may be that states are reluctant to
sign a law which they were not part of the negotiations.
Generally the effectiveness of the convention may also be
affected by the mechanism of international law which is usually
slow. After the lengthy negotiations and drafting, states need
to ratify and then implement them into national laws . This
process may take some time and this factor needs to be taken
into consideration when judging the effectiveness of the
convention.
Albeit these problems, the Convention is a milestone in the
fight against cybercrime and serve as a model for other legislations in the field of computer crimes
including regional initiatives, national and international legislations. It is the only binding international
treaty on cybercrime and countries are urged to become parties to the convention in other to promote
international cooperation and eliminate the occurrence of safe havens for cybercriminals. A cybercrime
treaty needs to connect every country of the world. Much will not be accomplished when the most likely
countries from which criminals operate are left out.
Critics argue that the convention is a European Initiative meant for European states and have called for a
global treaty on cybercrime negotiated under the umbrella of the United Nations. At the 12th United Nations
Congress in Brazil in April 2010, a proposal for a treaty on global cybercrime was rejected. The EU and the
US strongly supported the idea that no new treaty was needed since the Convention on cybercrime has
been in place for 10 years. They reasoned that a new treaty would involve lengthy negotiations and will
take very long to resolve and is a further waste of time and resources in lengthy negotiations that might
not lead to a definite or a better conclusion. Another consequence of initiating a new negotiation for a
global convention is that it might have the effect of suspending the implementation of legislative reform
already in progress.
CONCLUSION
Cybercrimes pose a lot of challenges in the world today. The solution to the scourge of cybercrimes is an
effective international instrument which will foster international cooperation.
The Council of Europe’s Convention on Cybercrime is the only international treaty with the highest impact
in the area of cybercrime. Its impact is either directly on the signatories or indirectly on the countries who
have modelled their laws on the convention.
4/24/2014 The Emergence And The Impact Of Cybercrime International Law Essay
http://www.ukessays.com/essays/law/the-emergence-and-the-impact-of-cybercrime-international-law-essay.php 9/9
The Convention however needs to be updated to incorporate emerging issues and more countries need to
ratify the convention to make it more effective. Cybercriminals will not wait for nations to assemble and
negotiate a new treaty. There is a need for a binding law in force for the fight against cybercrime.
Therefore every country should be enticed to get involved and become a party to the convention.
While the convention exists, it is wise to hang on it pending the possible negotiation of a new global
cybercrime treaty.
Share This Essay
Did you find this essay useful? Share this essay with your friends and you could win £20 worth of Amazon
vouchers. One winner chosen at random each month.
Request Removal
If you are the original writer of this essay and no longer wish to have the essay published on the UK Essays
website then please click on the link below to request removal:
Request the removal of this essay.
More from UK Essays
Need help with your essay?
We offer a bespoke essay writing service and can produce an essay to your exact requirements, written by
one of our expert academic writing team. Simply click on the button below to order your essay, you will see
an instant price based on your specific needs before the order is processed:
Order an Essay - via our secure order system!