Cybersecurity. Topic Background

Similar documents
Draft Resolution for Committee Consideration and Recommendation

Promoting Global Cybersecurity

G7 Bar Associations and Councils

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Tracy Hackshaw, Chair, Internet Society Trinidad & Tobago Chapter 2 October 2018 Commonwealth ICT Forum 2018 Port of Spain, Trinidad & Tobago

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

RESOLUTION 130 (Rev. Antalya, 2006)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

PROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK

Japan s Cyber Diplomacy

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

DETERMINANTS OF SOUTH AFRICA S FOREIGN POLICY STRATEGY IN CYBER SPACE LAURENCE CAROMBA, MONASH SOUTH AFRICA

6056/17 MK/ec 1 DG D 2B

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Itu regional workshop

Commonwealth Cyber Declaration

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

RESOLUTION 130 (REV. BUSAN, 2014)

Cyber Security Roadmap

Cybersecurity for ALL

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Global cybersecurity and international standards

European Directives and reglements for Information security

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Spam after WSIS: How MAAWG can help

15412/16 RR/dk 1 DGD 1C

RESOLUTION 45 (Rev. Hyderabad, 2010)

Cyber Security Strategy

In the wrong hands it s an open invitation

Program 1. THE USE OF CYBER ACTIVE DEFENSE BY THE PRIVATE SECTOR

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

Caribbean Cyber Security: Not Only Government s Responsibility

RESOLUTION 67 (Rev. Buenos Aires, 2017)

Cyber Security Program

Cyber Attacks & Breaches It s not if, it s When

GLOBAL CYBERSECURITY INDEX 2016

Garry Mukelabai Communications Authority Zambia

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Good afternoon. I am pleased to join you at the National Security Conference today.

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

International Nonproliferation Export Control Program (INECP) Government Outreach for Enterprise Compliance

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

SI Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

BY FIKRET PASHAYEV, SENIOR ADVISER OF THE TASIM SECRETARIAT AT HIGH-LEVEL REGIONAL ROUNDTABLE ON TELECOMMUNICATIONS CONNECTIVITY IN CENTRAL ASIA

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

National Communications Authority

Horizon 2020 Security

EXPERT GROUP MEETING ON CYBERCRIME

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Statement for the Record

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release September 23, 2014 EXECUTIVE ORDER

Systemic Analyser in Network Threats

Developments in the field of information and

19-20 September 2018 The Trans Resort Kuta, Bali - Indonesia

10025/16 MP/mj 1 DG D 2B

"Cybersecurity in Europe and the EU- Russia Co-operation"

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Legal and Regulatory Developments for Privacy and Security

International cyber strategy for Norway

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

About Issues in Building the National Strategy for Cybersecurity in Vietnam

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Collaboration on Cybersecurity program between California University and Shippensburg University

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Alejandro Mayorkas arrived at DHS focused on immigration, but found himself handling cybersecurity issues.

Strategy for information security in Sweden

MYTH vs. REALITY The Revised Cybersecurity Act of 2012, S. 3414

Media Kit. California Cybersecurity Institute

Vademecum of Speakers

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

"DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY?

Cybersecurity for the Electric Grid

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

The commission communication "towards a general policy on the fight against cyber crime"

China and International Governance of Cybercrime

13174/15 AT/tl 1 DGE 2B

5-6 SILICON VALLEY World Cyberspace Cooperation Summit IV NOVEMBER. World Cyberspace Cooperation EXECUTIVE!SUMMARY!

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

Way to new challenges

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.

Managing the Cybersecurity Threat

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Transcription:

Cybersecurity Topic Background The growth of the Internet has allowed nations, organizations, and people to connect in ways previously unimagined. This new interconnectivity has allowed for collaboration, partnerships, and growth to reach unprecedented levels and has permitted the world to become a much smaller place. However, along with the benefits of the Internet, there are many new dangers created by this technology. The very nature of the Internet allows for individuals to hack information systems to steal information, cripple the delivery of services, and commit fraud. These cybercrimes are difficult to fight against, so it takes an international effort to combat them. This issue has come to the forefront in recent months after it came to light that the Chinese government was responsible for a series of hacks against American government offices and businesses. In 2015, the United States Office of Personnel Management was hacked, resulting in over 20 million government employees sensitive information being leaked to members of the Chinese government. In recent years, numerous hacks against American businesses have also been identified. The objective of these hacks has been to steal industrial secrets. This has angered American businesses because they have spent millions of dollars to develop new technologies and now Chinese businesses can have them for free. Sometimes cyberattacks can have more tangible effects. In 2009, the US and Israel launched the Stuxnet virus against Iranian nuclear enrichment facilities and were able to destroy roughly a fifth of all of their centrifuges by making them spin out of control. 1 In 2007, Russian sympathizers targeted Estonia after Estonians expressed the wish to remove a Soviet statue from the capital, Tallinn. Several prominent government websites were hacked, and essential government services were disrupted. 2 In December 2013. credit and debit card information was stolen from over 40 million shoppers at Target stores over the holiday season. After it was announced, people avoided shopping 1 Stuxnet was Far More Dangerous. Business Insider. http://www.businessinsider.com/stuxnetwas-far- more-dangerous-than-previous-thought-2013-11 2 Denial-of-Service. International Affairs Review. http://www.iar-gwu.org/node/65

at Target and the company lost 46% of its profits, on top of being forced to pay over $10 million in damages to affected shoppers. 3 Some analysts warn this is only the beginning. As the Internet and Internet-linked technology become more widespread, the potential danger of cybercrimes increases. If nothing is done to combat this scourge, almost nothing can be considered safe. Smartphones could provide hackers with a wealth of financial and other private information from its users. Stock markets could be manipulated to wipe out entire economies overnight. Power plants and water treatment facilities could be switched off, leaving people without basic necessities. Clearly this is an issue that needs to be addressed, and the only way to address it is through international dialogue and cooperation. Past Actions The UN General Assembly, Economic and Social Council, and Security Council often stress the importance of cybersecurity and regularly call on member nations to combat cybercrimes. These organs usually refer responsibilities to the International Telecommunications Union (ITU), a UN agency based in Geneva that is responsible for coordinating efforts on these issues. They study cyber activity and set standards to which various governments are supposed to adhere to. 4 The difficulty with such organizations is these standards are often non-binding, and there are not enough mechanisms to force countries to play by the rules. A major difficulty in combating cybercrimes is the sheer amount of data that needs to be monitored in order to catch cybercriminals. Several NGOs have stepped up efforts to monitor cyber activities and on reporting on cybersecurity issues. The International Association of Cybercrime Prevention provides information and training about cybercrime prevention. It is also an interdisciplinary research organization bringing together experts, professionals, and individuals involved with the misuse of Information Communications Technology. 5 The Cyber Peace Foundation is another NGO that is also involved with raising awareness, counseling, education, training and to reach out to the citizens, the governments, law enforcement agencies (LEAs), private enterprises, 3 Stuxnet was Far More Dangerous. Business Insider. http://www.businessinsider.com/stuxnetwas-far- more-dangerous-than-previous-thought-2013-11 4 About ITU. International Telecommunications Union. http://www.itu.int/en/about/pages/default.aspx 5 About Us. International Association of Cybercrime Prevention. http://www.cybercrimeen.org/about- us-cyber-crimes

NGOs working in cyber crimes and cyber security, universities, cyber security experts and bug bounty hunters; to provide a common platform on a global level. 6 There is also hope that bilateral agreements can help solve these issues. In September 2015, Chinese President Xi Jinping and American President Barack Obama met and discussed issues related to cybersecurity and came to a tentative agreement. Prior to President Xi s visit to Washington, Obama administration officials had warned that Chinese companies that had benefited from stolen information might be sanctioned by the US government, and their products might not be able to be sold on international markets. In their meetings, they discussed steps each government should take to curb cyber-spying and they agreed to stop allowing their governments to commit economic espionage on each other s native companies. Possible Solutions It is important for delegates to keep the following in mind when brainstorming solutions to cybersecurity threats: 1. What measures can be taken to improve the monitoring of cyberspace? 2. How can international actors be held accountable when they are found to have taken part in cybercrimes? 3. What steps can be taken to ensure a free, but safe Internet? One of the major problems with guaranteeing cybersecurity is the sheer amount of data that makes up cyberspace and, coincidentally, the difficulty in monitoring it all. The United States has been better able to monitor cyberspace than many other nations, but this has created some difficulties within the international system. Some nations have viewed America as the greatest protector of cyberspace while others view it as its greatest threat. Increasingly, individuals have become more worried about privacy issues and leaks of government information from Edward Snowden have only increased this worry. Also, since most of the servers that contain the Internet reside within the United States, there is concern that the US has an unfair monopoly in cyberspace ownership. Increasingly, it has been argued that the Internet needs to be governed by an international agency which is responsible to answering to the international system as a whole and not individual parties. The makeup of such a body is still being debated. 6 About Us. Cyber Peace Corps. http://www.cyberpeacefoundation.org/aboutus.html

Another major problem with guaranteeing cybersecurity is the issue concerning how to hold nations and international actors accountable for their actions. Nations like Russia and China believe cyberspace should be controlled locally by various national governments and should promote national policy agendas. In the West, people generally support a free Internet, but in authoritarian countries like Russia and China, leaders feel threatened by a free Internet and wish to control it directly. Coincidentally, this has sparked debate around the world about how much freedom individuals are willing to give up in order to maintain security online. Originally, the Internet was a completely free place where individuals could express themselves and feel free to come up with applications never thought of before. As the technology has become more widespread and available, dangers have arisen. There is a large debate concerning how much freedom should be allowed in cyberspace. If governments took more control over cyberspace, they could most assuredly be more effective in improving cybersecurity, but there is a risk they would also decrease the level of freedom permissible on the Internet. This debate is especially pertinent in the European Union where individuals are asking where to draw the line between security and freedom of expression. There are many challenges to creating an international framework for cybersecurity. Though the challenges are great, the potential danger of not doing anything is far greater. The problems posed by cybercrime are serious, but they are solvable. It is hoped the international community can put aside their differences and create a free and open Internet that is safe from cybercrime. Further Research The UN and Cybersecurity Information on International Telecommunications Union Information on Cyber Peace Foundation The Cyber Security Forum Initiative

Questions 1. What was the name of the virus the United States and Israel launched against Iran? 2. What store was targeted in December 2013 to obtain users credit/debit card information? 3. What was the name of the office which was targeted by the Chinese government in 2015 to steal federal employees information? 4. Who met in September 2015 to work out disagreements concerning cybersecurity? 5. Which country is often thought of as the greatest protector of and greatest threat to cybersecurity? Answers 1. Stuxnet 2. Target 3. The Office of Personnel Management 4. Chinese President Xi Jinping and American President Barack Obama 5. United States of America