CSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE OCTOBER 2010

Similar documents
Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

Achieving Global Cyber Security Through Collaboration

Cyber Security Roadmap

COMMISSION RECOMMENDATION. of on Coordinated Response to Large Scale Cybersecurity Incidents and Crises

Itu regional workshop

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

CEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence

Draft Resolution for Committee Consideration and Recommendation

ENISA EU Threat Landscape

CSIRT capacity building Andrea Dufkova CSIRT-relations, COD1 NLO meeting Athens June 8. European Union Agency for Network and Information Security

Comprehensive Study on Cybercrime

Critical Information Infrastructure Protection Law

Joint ICTP-IAEA School of Nuclear Energy Management November 2012

European Directives and reglements for Information security

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

China and International Governance of Cybercrime

G8 Lyon-Roma Group High Tech Crime Subgroup

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

Promoting Global Cybersecurity

Committee on Foreign Affairs. on space capabilities for European security and defence (2015/2276(INI))

ITU Model Cybercrime Law: Project Overview

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

Cybersecurity & Digital Privacy in the Energy sector

Society, the economy and the state depend on information and communications technology (ICT).

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

NATO MultiNational Smart Defence Project on Cyber Defence Education & Training (Project 1.36)

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework

10025/16 MP/mj 1 DG D 2B

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

COUNTER-TERRORISM. Future-oriented policing projects

PROJECT RESULTS Summary

Hybrid Cyber Warfare, dual risks?

Enhancing Cooperative Energy Security. NATO Energy Security Centre of Excellence

The Interim Report on the Revision of the Guidelines for U.S.-Japan Defense Cooperation

MALAYSIA S APPROACH IN CAPACITY BUILDING. Dr Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 24 March 2017

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 68/243),

10007/16 MP/mj 1 DG D 2B

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

13967/16 MK/mj 1 DG D 2B

ASEAN s Cyber Confidence Building Measures

Data Leak Protection legal framework and managing the challenges of a security breach

'Cybersecurity' Threat or Opportunity. Saikat Datta Policy Director Centre for Internet & Society, India

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

Directive on security of network and information systems (NIS): State of Play

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

"DIGITAL GENEVA CONVENTION" IN TIMES OF CYBER (IN)SECURITY?

ITU. The New Global Challenges in Cybersecurity 30 October 2017 Bucharest, Romania

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

The commission communication "towards a general policy on the fight against cyber crime"

INDEPENDENT COMMUNICATIONS AUTHORITY OF SOUTH AFRICA(ICASA) CYBERSECURITY PRESENTATION AT SAIGF. 28 th November 2018

NATO MultiNational Smart Defence Project on Cyber Defence Education & Training (Project 1.36)

G7 Bar Associations and Councils

Fact Sheet. Moving Towards Tallinn: Drafting the Shape of Cyber Warfare. Introduction. Ashley S. Boyle. September 2012

International Criminal Police Organisation INTERPOL s CBRNE Terrorism Prevention Programme

National Communications Authority

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Cybersecurity Strategy of the Republic of Cyprus

15412/16 RR/dk 1 DGD 1C

Nuclear security in France : role of cooperation to enhance security culture

Data Preservation Checklists

Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference

Critical Infrastructure Protection & Resilience Europe / Asia. Conference Discussion Reviews

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

2CENTRE A collaborative model for capacity building against cybercrime. Cormac Callanan 2CENTRE Industry Liaison

Strengthening NATO Cyber Defense Under U.S. Leadership

Combating Pharmacrime AGENDA

UNODC tackling cybercrime in support of a safe and secure AP-IS

New Legal instruments for Cross-border Crime Investigation in EU

Potential new global legal mechanisms on combatting cybercrime and global cyberattacks

3.4 The EU as a partner in cyber diplomacy and defence

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Provisional Translation

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to

LEGAL SOLUTION CYBERCRIME LEGAL SOLUTION LEGAL SOLUTION NATIONAL, REGIONAL, INTERNATIONAL

ENISA & Cybersecurity. Steve Purser Head of Technical Competence Department December 2012

Emergency Management Response and Recovery. Mark Merritt, President September 2011

Development of a renewed European Union Internal Security Strategy. Justice and Home affairs Council meeting Brussels, 4 December 2014

Examining Cooperative Strategies through Cyber Exercises

NIS Country Reports Overview Document

Cyber Intel within European Cybercrime Center Ops

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

Developing and Implementing Data Protection Law: Malaysia and Beyond

A Multi-Stakeholder Approach in the Fight Against Cybercrime

Australian Government Cyber-security Activities in the Pacific

Resilience at JRC. Naouma Kourti. Dep. Head of Unit. Technology Innovation in security Security, Space and Migration Directorate

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

10496/18 MC/sl 1 DGD 2

Protecting Critical Information Infrastructure in times of increasing cyber conflict

Delegations will find in an Annex a non-paper of the Presidency.

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Internet Governance and the World Summit on the Information Society (WSIS)

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Cyber Security in Europe

15670/14 EB/hm 1 DG D 1 C

CYBER SECURITY LAW, ITS REGULATION AND RELEVANCE FOR OUTER SPACE

The Critical Importance of CIIP to Cybersecurity

Virtual Currencies and The Commonwealth. 1 June 2016

Transcription:

PROFESSOR ABU BAKAR MUNIR FACULTY OF LAW UNIVERSITY OF MALAYA & ASSOCIATE PROFESSOR SITI HAJAR MOHD YASIN FACULTY OF LAW UNIVERSITI TEKNOLOGI MARA CSM-ACE 2010 KUALA LUMPUR CONVENTION CENTRE 26-27 OCTOBER 2010

Cyber Crime Cyber Terrorism Cyber War

Cybercrime Cybercrime Convention Council of Europe Framework Decision 2005/222/JHA Computer Crimes Legislation

Cyber terrorism International Criminal Laws UN Conventions on Terrorism UN International Convention for the Suppression of Terrorist Bombings International Convention for the Suppression of Acts of Nuclear Terrorism International Convention for the Suppression of Unlawful Acts Against Safety of Civil Aviation

cont European Convention on the Suppression of Terrorism E.U Framework Decision on Combating Terrorism (2002/475/JHA) E.U Data Retention Directive Countries Anti-Terrorism Legislation Countries Criminal Law

How about Cyberwar? Is there any Legal and Policy Instrument?

Is Cyber War Real? The next world war could happen in cyberspace and that would be a catastrophe there is no such thing as a superpower. ITU (2009) Not only will cyber war be a force in future warfare, it may also turn out to be the great equalizer for nations. United Nations Institute of Research and Training (UNITAR)

cont The overall international security landscape has become more complex and unpredictable over the longer term we cannot rule out a possible re-emergence of a major stateled threat to the United Kingdom. That could come about through or other forms of threat, which render distance irrelevant, for example state-sponsored cyber-attack. 2008 UK Cabinet Office Report In summary, our warfare methods must adapt to the needs of information warfare Former Chinese General

When would a cyber attack amount to a cyber war? Can a cyber war be regarded as a war? Can the laws of war be applied to cyber war?

Questions arise out of attacks on Estonia Does the attack warrant a reaction from NATO? (North Atlantic Treaty Organization) Can Article 5 of NATO be invoked? Article 5 An assault on one allied country obligates alliance to attack the aggressor. How about the United Nations?

Challenges to the International Law The types of damage are different from the kind of physical damage caused by the traditional warfare. Sovereignty of states is disrupted by the ability of technology to cross borders without hindrances. Harder to define the targets of cyber war as either military or civilian.

US Current Thinking Preemptive cyber strike? Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions/preemptive strikes. We have to have offensive capabilities, to, in real time, shoot down somebody trying to attack us. General Keith Alexander Pentagon Cyber Command (July 2010)

Would this be done without violating international law or other countries sovereignty?

Lessons from Cyber- Storm ll Cyber Storm I : February 2006 Cyber Storm II : March 2008, US + 4 countries (Australia, Canada, N.Z & UK) Cyber Storm III : September 2010, US +12 countries Cybersecurity exercises involving several departments of the US Govt and foreign countries like Australia, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden, Switzerland and the UK. The report is not out yet

Findings of Cyber Storm II Effective response is enhanced by routinely reviewing and testing the Standard Operation Procedures (SOPs), Incidents Response Plans and/or crisis management arrangements. Non- crisis interaction among key stakeholders enhances effective crisis response during an incident. Crisis communication procedures, predicated on accurate and appropriate points of contact, must be formalized within contingency planning.

cont Cyber crisis require a tailored response that takes into account multiple interdependencies. Developing internal reporting and external notification thresholds assists in effective incident response by creating better situated awareness.

The Way Forward The United Nations systems should have the leading role in inter-governmental activities for the functioning and protection of cyberspace. Cybercrime, cyberterrorism and cyber war activities should be dealt with by the competent organ by the UN systems under the international law. Nationally and internationally, an educational framework for promoting awareness should be developed for the public.

cont International law enforcement organization, such as the Interpol and Europol, should assume a stronger role in the international promotion of cyber crime issue. International cooperation in the areas of legal aspects, technical measures, organizational structures and capacity building is very crucial.