Co-operation with Law Enforcement Agencies in South Africa. 19 September 2008

Similar documents
The cost of cybercrime the benefits of cooperation

RESOLUTION 45 (Rev. Hyderabad, 2010)

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Regional Cyber security Forum for Africa and Arab States, Tunis, Tunisia 4 th -5 th June 2009

EU policy on Network and Information Security & Critical Information Infrastructures Protection

1 History of CyberSecurity in the Philippines 2 3

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

Legal Foundation and Enforcement: Promoting Cybersecurity

China and International Governance of Cybercrime

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Cybersecurity for ALL

Promoting Global Cybersecurity

National CIRT - Montenegro. Ministry for Information Society and Telecommunications

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

TO INSPIRE, CONNECT AND EMPOWER TO TURN BACK CRIME

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Thailand Initiatives and Challenges in Cyber Terrorism

Guiding principles on the Global Alliance against child sexual abuse online

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

RESOLUTION 67 (Rev. Buenos Aires, 2017)

INTERNATIONAL TELECOMMUNICATION UNION

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

The role of COP/ITU on international level. Dr Ibrahim Al dabal chair of child on line council working group

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 130 (REV. BUSAN, 2014)

Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference

Cyber Security Strategy

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

ITU-IMPACT Capacity Building for Least Developed & Developed Countries

UNODC tackling cybercrime in support of a safe and secure AP-IS

The Arab ICT Organization

Child Online Protection in Child Pornography Namibia

Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY

Panel 1 National CSIRT Experience

Draft Resolution for Committee Consideration and Recommendation

Criminal Justice System s Intervention to Cybersecurity Threats: Panacea or Pandora's Box?

Project III Public/private cooperation

Towards a more secure Cyber Space for South Africa

A1. Actions which have been undertaken by Governments

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Implementing a National Strategy : the case of the Tunisian CERT

Itu regional workshop


Systemic Analyser in Network Threats

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013

About Issues in Building the National Strategy for Cybersecurity in Vietnam

UNODC/CCPCJ/EG.4/2017/CRP.1

ASEAN s Cyber Confidence Building Measures

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

ITU Model Cybercrime Law: Project Overview

10025/16 MP/mj 1 DG D 2B

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Responding to Cybercrime:

Challenges in Developing National Cyber Security Policy Frameworks

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

ICANN and Russia. Dr. Paul Twomey President and CEO. 10 June International Economic Forum St. Petersburg, Russia

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

PURPOSE STATEMENT FOR THE COLLECTION AND PROCESSING OF WHOIS DATA

The UK s National Cyber Security Strategy

A Global Protocol on Cybersecurity and Cybercrime

An overview of the CERT/CC and CSIRT Community

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis)

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

Co-operation against cybercrime CSIRTs LE private sector

NOTIFICATION TO THE PARTIES

The Internet Governance Forum (IGF) Strasbourg, 1-2 April 2008

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.

DRAFT PROGRAMME. Exchange of views with experts on the fight against Cybercrime

IP CHANGES IN THE THAI COMPUTER CRIME ACT. Cyber crime in Thailand Introduction & Overview

Cybersecurity and Hospitals: A Board Perspective

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

GLOBAL CYBERSECURITY INDEX 2016

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Role of ITU in Building Security & Trust in Cyberspace

Stakeholders Analysis

CONNECT ARAB STATES SUMMIT

EXPERT GROUP MEETING ON CYBERCRIME

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

Data Protection and Cybercrime Challenges

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

CHAPTER 1 CYBER CRIME A CONCEPTUAL AND THEORETICAL FRAMEWORK

MELANI: Information exchange a story of success

Provisional Translation

Transcription:

Co-operation with Law Enforcement Agencies in South Africa 19 September 2008

Agenda About ISPA IMPACT Is cyber-terrorism real? Content and DNS People trafficking Training Is this a bad thing for ISPs? Read my lips no new laws

About ISPA Internet Service Providers Association Largest industry association representing the Internet industry Two officers on the Board of.za DNA Represent largest group of registrars Also has three registries as members Membership by category Large access providers: 12 Medium access providers: 10 Small access providers: approx 110 The majority of ISPA s small members (and also a majority of all members) are classified as SMMEs Honorary members Affiliates and honorary members 12 Include e-schools Network, NetDay, SchoolNet SA, TENET Notable exception Telkom SA Limited For historical reasons will not join

Structure of the Market Previously governed by the 1996 Telecommunications Act ISPs as VANS value added network service providers Telkom under its licence + VANS licence MNOs their licences Now covered by 2005 Electronic Communications Act All former VANS have network and service licences

Change in Market Structure PTT license (eg Telkom) TV Broadcasting License (eg SABC) Sentech Sentech Sentech Sentech (wireless (wireless (wireless (wireless / / Signal) Signal) Signal) Signal) license license license license VAN VAN VAN VAN license license license license (eg (eg (eg (eg ISPs) ISPs) ISPs) ISPs) Content Services Applications Services Network Services Infrastructure Service Under the old licensing framework all activities related to the provision of a particular service are vertically integrated for the provision of that service The new licensing framework promotes vertical separation between infrastructure, network, applications, and content

Mapping the Old to the New Content Services Applications Services Broadcast Licence No licence for other content Electronic Communications Service Licence TV / Radio All other Voice / data (Internet) / fax Network Services Infrastructure Service Electronic Communications Network Service Licence Fixed line / wireless

Participation in IMPACT Government invitation to join IMPACT Invited ISPA Looking to establish a CERT Not yet operational

What is IMPACT The International Multilateral Partnership Against Cyber-Terrorism (IMPACT) is the first global public-private initiative against cyberterrorism. IMPACT is dedicated to bringing together governments, industry leaders and cybersecurity experts to enhance the global community's capacity to prevent, defend and respond to cyberthreats. IMPACT's permanent secretariat is headquartered in Cyberjaya, Malaysia. The foundation of IMPACT is built on four key dynamic pillars, each focused on specific functions that are designed to fulfil the vision of this world's first international multilateral initiative against the real threat of cyber-terrorism. These four pillars are: Centre for Global Response Centre for Policy & International Cooperation Centre for Training & Skills Development Centre for Security Assurance & Research

Why IMPACT

Terrorist Use of the Internet Attacks via internet/ict on critical information infrastructure and other critical infrastructure, systems and legal interests, including loss of life Real or imagined Only one actual example Estonia Dissemination of illegal contents, including threats of terrorist attacks, incitement to or promotion of terrorism, recruitment or training Use of ICT by terrorists for logistical purposes such as internal communication, gathering intelligence, target analyses BUT Cybercrime is very real Techniques and technologies (botnets, scripts, root kits) used for spam, DDoS attacks, hacking etc could be used

People Trafficking Task team on child pornography, trafficking on women and children and related issues Also includes prostitution Supposed to be focussed on under-age prostitution Because of legal uncertainty covers adult prostitution as well ISPA assisting in training and understanding of the Internet and how it works

Child Pornography Film and Publications Board Now a member of In Hope ISPA Assisting Training and awareness Process regarding a protocol in draft

Police We struggle to get Internet related crime investigated and prosecuted ADSL log-in theft Spam Etc Co-operating with training

New laws Existing laws Convention on Cybercrime and the Convention for the Prevention of Terrorism In SA ECT Act (Cyber Crimes) and FICA / PoCA ECT Act critical databases New laws? Show me the money Government to promote through procurement Is this bad for ISPs? Costs More secure networks Fewer exploits Less spam Responses

Conclusions

Questions? Thank you