The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Similar documents
Japan s Cyber Diplomacy

What are the next Steps after the UN GGE?

THE VALUE OF INTERNATIONAL COOPERATION IN CYBERSPACE: LESSONS FROM THE UNGGE PROCESS

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243),

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

ASEAN s Cyber Confidence Building Measures

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

ITU-ACMA Asia Pacific Regulators Roundtable July 2014

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Promoting Global Cybersecurity

Commonwealth Cyber Declaration

Draft Resolution for Committee Consideration and Recommendation

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

China and International Governance of Cybercrime

RESOLUTION 45 (Rev. Hyderabad, 2010)

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

Cybersecurity for ALL

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Cybersecurity & Spam after WSIS: How MAAWG can help

Provisional Translation

An Internet of Governments: How Policymakers Became Interested in Cyber. Maarten Van Horenbeeck, FIRST Klee Aiken, APNIC

Protecting Critical Information Infrastructure in times of increasing cyber conflict

"DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY?

Concept Note: GIDC. Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

G7 Bar Associations and Councils

RESOLUTION 130 (REV. BUSAN, 2014)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

10025/16 MP/mj 1 DG D 2B

RESOLUTION 130 (Rev. Antalya, 2006)

OAS Cybersecurity Capacity Building Efforts

Arms Control Today. The UN Takes a Big Step Forward on Cybersecurity

13967/16 MK/mj 1 DG D 2B

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

Principles for a National Space Industry Policy

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Security and resilience in Information Society: the European approach

JOINT MEDIA STATEMENT

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

ASEAN: One Community, One Destiny.

Joint Declaration by G7 ICT Ministers

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

Donor Countries Security. Date

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

Japan-UK Joint Declaration on Security Cooperation

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Cyber Security Roadmap

IMPORTANT GLOBAL CYBERLAW TRENDS 2017

COUNTER-TERRORISM. Future-oriented policing projects

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

REPUBLIC OF KENYA MINISTRY OF INFORMATION, COMMUNICATIONS AND TECHNOLOGY

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

'Cybersecurity' Threat or Opportunity. Saikat Datta Policy Director Centre for Internet & Society, India

Cyber Security in Europe

INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) Washington, D.C. 9 March 2012 Original: English

International cyber strategy for Norway

The UK s National Cyber Security Strategy

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Cyber Security Strategy

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

Valérie Andrianavaly European Commission DG INFSO-A3

Senator the Hon Stephen Conroy Minister for Broadband, Communications and the Digital Economy. Deputy Leader of the Government in the Senate

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

The Role of International Cooperation in Cyber Security

ASEAN REGIONAL COOPERATION ON DISASTER MANAGEMENT

Post Disaster Needs Assessment Guide and

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

Examining Cooperative Strategies through Cyber Exercises

Statement for the Record

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]

ENISA EU Threat Landscape

Caribbean Private Sector Network meeting 24 August 2017, Ministry of Trade, Port-of-Spain, Trinidad and Tobago

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

INTERNATIONAL TELECOMMUNICATION UNION

Strengthening Disaster Readiness. Moving from capacity to capability

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

National Policy and Guiding Principles

Australian Government Cyber-security Activities in the Pacific

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

EU policy on Network and Information Security & Critical Information Infrastructures Protection

15412/16 RR/dk 1 DGD 1C

Five Country Ministerial 2018 Official Communiqué

Department of Homeland Security Updates

Cyber Security Program

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

UNODC tackling cybercrime in support of a safe and secure AP-IS

ITU Model Cybercrime Law: Project Overview

Transcription:

The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and borderless nature, cyber threats are emerging as a serious challenge to international security. The Republic of Korea has been experiencing a series of cyber attacks including the recent attacks on its nuclear power plant operator in 2014. To respond more effectively to cyber threats, the Republic of Korea came up with comprehensive plans to enhance cyber security posture in March 2015 and also created the post of presidential secretary for cyber security affairs. The Republic of Korea firmly believes that it is important to agree on a set of international norms applied to cyberspace and implement confidence building measures (CBMs) and cyber capacity building measures. In this respect, the Republic of Korea welcomes the results of the 2013 UN GGE report, which recognized the possibility of applying of international law to state behaviors in cyberspace, and expects further discussions on how the agreed principles can be applied to state behavior in cyberspace. Korea hosted the Asia-Pacific Regional Seminar on International Law and State Behavior in Cyberspace in 2014 together with the UNIDIR, providing an opportunity for countries in the region to discuss cyber security related matters. The Korean government has also worked to strengthen bilateral and trilateral cooperation with key countries and is actively participating in regional and international fora on cyber issues, such as ASEAN Regional Forum (ARF) and the UN Information Security GGE. As the host of the Seoul Global Conference on Cyberspace held in 2013, the Republic of Korea closely cooperated with the Netherlands in preparation for the Hague Conference on Cyberspace 2015 and will continue its contribution to the London Process. 1

Ⅰ. General Appreciation of the issues of information security Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and borderless nature, cyber threats are emerging as a serious challenge to international security. Most recently, we are witnessing an alarming development. As shown by recent cases of cyber attacks, including the attack on Sony Pictures Entertainment, attacks have been grown more sophisticated and powerful, posing serious threats to individual, business, national and international security. Even extremist groups are effectively using ICTs to recruit, finance, organize, and incite support for terrorist activities. There is growing concern about the possibility of such group soon acquiring the means to carry out disruptive ICT activities. Against this backdrop, strengthening international cooperation to enhance cyber security across the globe is critical to guarantee global prosperity in the 21st century. The international community can tackle the mounting threats by agreeing on a set of international norms of acceptable state behavior in cyberspace, strengthening law enforcement cooperation and capabilities, and addressing vulnerabilities in cyberspace, among others. The Republic of Korea, as one of the most wired countries in the world, is also facing increasing cyber threats. Since 2009, Korea has been experiencing a series of cyber attacks including massive distributed denial-of-service (DDoS) attacks (2009, 2011) and intrusions on government networks and broadcasting and financial systems (2013). Most recently, there were cyber attacks on Korea s nuclear power plant operator in 2014. To effectively address the threats, while harnessing the unprecedented benefits of cyberspace, Korea has been enhancing international cooperation in this area as well as strengthening its cyber policies, legislations and organizations. 2

Ⅱ. Efforts taken at the national level to strengthen information security and to promote international cooperation in this field Following the cyber attacks on its nuclear power plant operator in 2014, the Korean government came up with comprehensive plans to enhance cyber security posture in March 2015, which is in line with the 'National Cyber Security Comprehensive Countermeasures' adopted in 2013. The measures included establishing organizations exclusively in charge of cyber security affairs under each ministry and local government, fostering experts in the field of cyber security, expanding R&D investments in the field of countering cyber threats, and strengthening the function of National Security Office as the control tower for cyber security. The recently created post of the presidential secretary for cyber security affairs is expected to contribute to enhancing the function of the control tower. Also Korean Supreme Prosecutor s Office created the Scientific Investigation Department and Cyber Investigation Division as a way to strengthen nation s response to cyber crimes. The Republic of Korea has also worked to strengthen bilateral and trilateral cooperation with the key states in the field of cyber security. In addition to existing consultation mechanisms with the United States and Russia, Korea launched Korea-Japan-China trilateral consultation and bilateral consultations with EU, Australia and India in 2014 and 2015. The Republic of Korea is also actively participating in regional and international discussions on cyberspace such as the ASEAN Regional Forum (ARF) and the UN Information Security GGE. In 2014, Korea also hosted an Asia-Pacific Regional Seminar on International Law and State Behavior in Cyberspace together with the UN Institute for Disarmament Research (UNIDIR), providing an opportunity for countries in the region to discuss cyber security related matters. 3

As the host of the Seoul Global Conference on Cyberspace held in 2013, Korea closely cooperated with the Netherlands in preparation for the Hague Conference on Cyberspace 2015 and decided to be a founding member of Global Forum on Cyber Expertise launched at the Hague Global Conference on Cyberspace 2015 based on achievements of the Seoul Global Conference on Cyberspace 2013. Ⅲ. The content of the international concepts aimed at strengthening the security of global information and telecommunication system International efforts to agree on a set of international norms, rules, and principles for responsible State behavior are still at an early stage. In this regard, Korea welcomes the 2013 GGE report (A/68/98), which made the following significant conclusions: International law, in particular the UN Charter, is applicable to cyberspace and is essential to maintaining peace and stability and promoting an open, secure, peaceful and accessible ICT environment. State sovereignty and international norms and principles that flow from sovereignty apply to state conduct of ICT related activities, and to the jurisdiction over ICT infrastructure within the territory. States must meet their international obligations regarding internationally wrongful acts attributable to them. States must not use proxies to commit internationally wrongful acts. States should seek to ensure that their territories are not used by non-state actors for unlawful use of ICTs. Building on this outcome, further deliberations and consultations among States are necessary to agree on how these principles can be applied to state behavior in cyberspace. 4

Additional norms, if needed, can be developed over time. At this point, the UN GGE could first identify the relevant norms and principles in existing international law, especially the UN Charter, which can be applied to cyberspace. Ⅳ. Possible measures that could be taken by the international community to strengthen information security at the global level The development and spread of sophisticated malicious ICT tools may increase the risk of mistaken attribution and unintended escalation. Against this backdrop, given that the international community has yet to agree on a set of norms and principles governing state behavior in cyberspace, it is important to establish measures to build confidence in the meantime, which will increase predictability and reduce misperception, to help reduce the risk of conflict. In this context, Korea greatly appreciates the efforts made at the bilateral and regional levels to agree on a set of measures to build confidence in cyberspace. In particular, bilateral confidence building measures agreed between major cyber countries and regional measures agreed at the ARF and OSCE will help to promote trust and assurance in cyberspace across the world. The GGE can continue to explore ways to build on those measures. In this regard, Korea is of the view that States can pursue the following measures to build confidence in cyberspace. Publish white papers or exchange information on national strategies, laws and organizational structures related to cyber security on a bilateral, regional and multilateral basis. Periodic reporting on States efforts to enhance cyber security by relevant international organizations. 5

Set up bilateral, regional, and multilateral consultations with the purpose of building confidence among the range of stakeholders. Hold meetings, workshops and seminars on specific areas on cyber security, such as incident response, cyber defense, and cybercrime, among relevant stakeholders, including policymakers, Computer Emergency Response Teams (CERT), law enforcement agencies, private sector and civil society. Strengthen cooperative mechanism between relevant agencies of States, especially CERT and law enforcement, to address ICT security incidents in a timely and effective manner. Exchange information on points of contacts for timely response, recovery and mitigation actions in responding to incidents Strengthen mechanisms for cooperation between law enforcement agencies. Conduct periodic tabletop exercises for policymakers and experts to understand how ICT security incidents arise and ways to address them. Pursue exchange of personnel in areas such as incident response and law enforcement. Set up a hot-line between high-level officials to address serious ICT security incidents as well as a protocol on response to prevent escalation. As indicated in previous GGE reports, capacity-building is an important element in ensuring global cooperation on overall cyber security. In this regard, the Korean Government, in cooperation with other international organizations including, but not limited to, the World Bank and Inter-America Development Bank, will set up a Global Cyber security Center for Development (GCCD) in Korea in 2015. The Center will be tasked with promoting cyber 6

security and other information protection in developing nations. All in all, efforts to build capacity in developing countries will pave the way for bridging the digital divide across the globe. /END/ 7