Cybersecurity & Spam after WSIS: How MAAWG can help

Similar documents
Promoting Global Cybersecurity

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 45 (Rev. Hyderabad, 2010)

RESOLUTION 130 (REV. BUSAN, 2014)

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Internet Governance and the World Summit on the Information Society (WSIS)

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Cybersecurity for ALL

COUNTERING COUNTERING SPAM IN A DIGITAL WORLD

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection

Countering Spam. ITU-T Study Group 17 Geneva, Switzerland 11 October 2005

RESOLUTION 67 (Rev. Buenos Aires, 2017)

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

RESOLUTION 140 (REV. BUSAN, 2014)

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

World Summit on the Information Society (WSIS) and the Digital Divide

Related to the Internet

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

INTERNATIONAL TELECOMMUNICATION UNION

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/65/433)]

GENERAL ASSEMBLY RESOLUTION A/RES/67/195. Information and communications technologies for development

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]

Draft Resolution for Committee Consideration and Recommendation

Australian Government Cyber-security Activities in the Pacific

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

The Internet Governance Forum (IGF) Strasbourg, 1-2 April 2008

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Commonwealth Cyber Declaration

Security and resilience in Information Society: the European approach

WSIS Forum Open Consultation Process

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

Internet Governance: Today and Tomorrow

KENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Joint Declaration by G7 ICT Ministers

Global Cybersecurity Agenda

The Global Multistakeholder Forum for Dialogue on Internet Governance Issues

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

Global cybersecurity and international standards

Cybersecurity Capacity ITU Preetam Maloor Strategy & Policy Advisor 3 March 2015

Forum. Ningbo, China 25 February

TUNIS AGENDA FOR THE INFORMATION SOCIETY INTRODUCTION

Internet Governance in April April 2016

Overview of ITU-D D Activities Related to Cybersecurity and Critical Information Infrastructure Protection

A1. Actions which have been undertaken by Governments

Regional Workshop for CIS on Conformance and Interoperability. ITU C&I Programme Pillars 3 and 4. Moscow, Russian Federation, August 2014

ITU Survey on Anti-Spam Legislation Worldwide

Internet Governance The Global Agenda. Peter Major Special adviser Permanent Mission of Hungary to the UN, Geneva

Introduction to the work of ITU and its telecom policy research

ITU Telecommunication Development Sector Cybersecurity/CIIP Initiatives. Telecommunication

Internet Governance for Operators

21ST OSCE ECONOMIC AND ENVIRONMENTAL FORUM

ASEAN s Cyber Confidence Building Measures

ITU Model Cybercrime Law: Project Overview

Module 4: ICT Trends for Government Leaders

10025/16 MP/mj 1 DG D 2B

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

RESOLUTION 47 (Rev. Buenos Aires, 2017)

ITU Regional Forum on Consumer Information, Protection and Rights for Africa 2017 Cotonou, BENIN March 2017

WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Hammamet, 25 October 3 November 2016

WSIS Action Lines Roadmaps C2, C5, C6

OUTCOME DOCUMENT OF THE INTERNATIONAL CONFERENCE ON CYBERLAW, CYBERCRIME & CYBERSECURITY

Internet Governance. Mr. Samiran Gupta Head of India, ICANN

KOBE REPORT draft Report of Session 5.4, Thematic Cluster 5. Telecommunications Saves Lives: role of information and communication technologies

EU policy on Network and Information Security & Critical Information Infrastructures Protection

ITU, UNESCO. Comments submitted jointly by ITU and UNESCO on chapters one and four of the operational part of the Tunis Final Documents

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]

10007/16 MP/mj 1 DG D 2B

G8 Lyon-Roma Group High Tech Crime Subgroup

The Arab ICT Organization

The World Summit on the Information Society (WSIS) History and Future

Background Note on Possible arrangements for a Technology Facilitation Mechanism and other science, technology and innovation issues

Departamento de Asia y Pacífico

PRESENTATION TO WORKING GROUP 3 ON DEVELOPMENT MANAGEMENT & CITIZEN ENGAGEMENT

The cost of cybercrime the benefits of cooperation

Garry Mukelabai Communications Authority Zambia

ITU Forum Bridging the ICT standardization & development gap

THE PANEL OF THE UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT 6-8 November 2006 Paris, France

THE UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT 14 TH SESSION May 2011 Geneva. Contribution by ITU

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3

ICT Policy Perspective for APEC. Ministry of Internal Affairs and Communications March 2015

[Chapter One: Implementation Mechanism

CSTD Working Group on improvements to the IGF Summary of the 3 rd meeting

ITU-IMPACT Capacity Building for Least Developed & Developed Countries

Resolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)]

Scope of the Member State mechanism

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

RESOLUTION ADOPTED BY THE GENERAL ASSEMBLY. [on the report of the Second Committee (A/54/588/Add.2)]

Asia-Pacific Telecommunity Administrations ASIA-PACIFIC COMMON PROPOALS FOR THE WORK OF THE CONFERENCE

Transcription:

Cybersecurity & Spam after WSIS: How MAAWG can help MAAWG Brussels Meeting 27-29 June 2006 Robert Shaw Deputy Head ITU Strategy and Policy Unit International Telecommunication Union 28 June 2006 1

Setting the Context In the 21st century, nations have growing dependency on information and communications systems (ICTs) that span the globe; Rapid growth on ICTs and dependencies led to shift in perception of cybersecurity threats in mid-1990s; Linkage of cybersecurity & critical information infrastructure protection (CIIP); A number of countries began assessment of threats, vulnerabilities and explored mechanisms to redress them; With national consideration and realization that solutions cannot be just at national levels, move to international political agenda; 28 June 2006 2

World Summit on the Information Society (WSIS) WSIS proposed by Tunisia at ITU Plenipotentiary Conference in 1998 Adopted as UN Summit in 2001 First Phase, Geneva, 10-12 December 2003 11 000 participants, of which 41 Heads of State/Govt Adopted Geneva Declaration and Plan of Action Second Phase, Tunis, 16-18 November 2005 25 000 participants, of which 47 Heads of State/Govt Adopted Tunis Commitment and Agenda for Information Society Internet Governance and Financing of ICT4D At WSIS, Building confidence and security in the use of ICTs emerged as one of the key principles for building an inclusive Information Society 28 June 2006 3

International Cooperation Agenda Council of Europe Convention on Cybercrime (1997-2001) UN Resolutions 57/239 (2002) and 58/199 (2004): Creation of a global culture of cybersecurity and the protection of critical information infrastructure; ITU Plenipotentiary Resolution 130 (2002): Strengthening the role of ITU in information and communication network security; WSIS Phase I (2003) Chapter 5 in Declaration of Principles and Plan of Action: Building confidence and security in the use of ICTs; WSIS Thematic Meeting on Countering Spam (2004); ITU WTSA Resolution 50 (2004): Cybersecurity; WSIS Thematic Meeting on Cybersecurity (2005); 28 June 2006 4

International Cooperation Agenda WSIS Phase II (2005): Tunis Commitment (para 15, 24) and Tunis Agenda: Part C on Internet Governance (see paras 39-47, 57-58, 68); WTDC Resolution 45: (Doha, 2006): Mechanisms for enhancing cooperation on cybersecurity, including combating spam Meeting on Aug 31-Sept 1 2006 consideration of instrument, e.g., MoU on cybersecurity/spam cooperation? ITU Plenipotentiary Conference November 2006 (Antalya, Turkey) 28 June 2006 5

WSIS on Spam From WSIS Phase II: Tunis Agenda 41. We resolve to deal effectively with the significant and growing problem posed by spam. We take note of current multilateral, multi-stakeholder frameworks for regional and international cooperation on spam, for example, the APEC Anti-Spam Strategy, the London Action Plan, the Seoul Melbourne Anti- Spam Memorandum of Understanding and the relevant activities of OECD and ITU. We call upon all stakeholders, to adopt a multi-pronged approach to counter spam that includes, inter alia, consumer and business education; appropriate legislation, law enforcement authorities and tools; the continued development of technical and self-regulatory measures; best practices; and international cooperation. 28 June 2006 6

Post WSIS Activities Related to Cybersecurity and Spam 11 Action Lines for follow-up of WSIS with intergovernmental organizations acting as facilitators for partnerships and cooperation ITU is facilitator for WSIS Action Line C5: Building confidence and security in the use of ICTs Geneva: first C5 meeting held 15-16 May 2006 In conjunction with 17 May World Telecommunication Day theme of Promoting Global Cybersecurity Hong Kong: Dec 8 2006 meeting on spam (possibly linked with C5 activities) 28 June 2006 7

Key Challenges Defining key themes Identifying relevant actors Engaging across siloed communities who normally don t talk with each other Creating platform for multistakeholder collaboration and partnerships Likely first deliverables Development of a cybersecurity/ciip roadmap/toolkit for national policy makers Capacity building on harmonization of cybercrime legislation, i.e., COE Convention on Cybercrime, enforcement Assisting developing economies with implementation of watch, warning and incident response capabilities 28 June 2006 8

ITU Cybersecurity Gateway attempts to Identify themes, actors, topics www.itu.int/cybersecurity/ 28 June 2006 9

Internet Governance Forum (IGF) See www.intgovforum.org First meeting in Athens, Greece: 30 Oct 2 Nov 2006 (2007: Brazil, 2008: India) Annual information-sharing event with development focus: not decision-making forum Security will be one plenary topic (~ 3 hours): Building trust in an online environment; Protecting users from spam, phishing, and viruses. OECD, ITU likely to organize workshops in Athens on spam and cybersecurity respectively 28 June 2006 10

How MAAWG can help Statistical studies are great help to policy makers (encouragement!) Cross participation on activities WSIS C5 Follow-up date coordination and joint initiatives e.g., MAAWG send representative to Dec 8 2006 meeting in Hong Kong (others: APCAUCE, OECD, APEC-TEL, ISC (China), ACMA, LAP, OFTA, tbd ) 28 June 2006 11

How MAAWG can help cont d Consider perspective of developing economies 28 June 2006 12

How MAAWG can help cont d Suggest best practice materials which might be of particular interest to developing economies Deliver tutorials to developing economies (or provide related tutorial materials) high political pressure to do something proactive for developing economies Other? 28 June 2006 13

Thank you International Telecommunication Union Building the Information Society 28 June 2006 14

Extra Materials 28 June 2006 15

Shift in Internet Demographics: Internet Users by Region 2001-2004 2001: Number of Internet Users by Region Estimated 500 Million Users 2004: Distribution of Internet Users by Region Estimated 875 Million Users Asia-Pacific 32% Americas 38% Asia-Pacific 37% Americas 31% Africa 1% Europe 29% Africa 3% Europe 29% Asia-Pacific has overtaken Americas as largest percentage of regional Internet users with much more potential for growth

Additional Cybersecurity/Spam excerpts from WSIS Texts see www.itu.int/wsis/ 28 June 2006 17

Critical Information Infrastructure Protection From WSIS Phase II: Tunis Commitment 15. We further recognize the need to effectively confront challenges and threats resulting from the use of ICTs for purposes that are inconsistent with objectives of maintaining international stability and security and may adversely affect the integrity of the infrastructure within States, to the detriment of their security. It is necessary to prevent the abuse of information resources and technologies for criminal and terrorist purposes, while respecting human rights. 28 June 2006 18

Promotion of Global Culture of Cybersecurity From WSIS Phase II: Tunis Agenda 39. We seek to build confidence and security in the use of ICTs by strengthening the trust framework. We reaffirm the necessity to further promote, develop and implement in cooperation with all stakeholders a global culture of cybersecurity, as outlined in UNGA Resolution 57/239 and other relevant regional frameworks. This culture requires national action and increased international cooperation to strengthen security while enhancing the protection of personal information, privacy and data. Continued development of the culture of cybersecurity should enhance access and trade and must take into account the level of social and economic development of each country and respect the development-oriented aspects of the Information Society. 28 June 2006 19

Harmonizing national legal approaches, international legal coordination & enforcement From WSIS Phase II: Tunis Agenda 40. We underline the importance of the prosecution of cybercrime, including cybercrime committed in one jurisdiction, but having effects in another. We further underline the necessity of effective and efficient tools and actions, at national and international levels, to promote international cooperation among, inter alia, law enforcement agencies on cybercrime. We call upon governments in cooperation with other stakeholders to develop necessary legislation for the investigation and prosecution of cybercrime, noting existing frameworks, for example, UNGA Resolutions 55/63 and 56/121 on Combatting the criminal misuse of information technologies and regional initiatives including, but not limited to, the Council of Europe s Convention on Cybercrime. 28 June 2006 20

Developing watch, warning and incident response capabilities From WSIS Phase I: Plan of Action C5 h) Invite interested countries to set up focal points for real-time incident handling and response, and develop a cooperative network between these focal points for sharing information and technologies on incident response. 28 June 2006 21

Information sharing of national approaches, good practices and guidelines From WSIS Phase II: Tunis Agenda 45. We underline the importance of the security, continuity and stability of the Internet, and the need to protect the Internet and other ICT networks from threats and vulnerabilities. We affirm the need for a common understanding of the issues of Internet security, and for further cooperation to facilitate outreach, the collection and dissemination of securityrelated information and exchange of good practice among all stakeholders on measures to combat security threats, at national and international levels. 28 June 2006 22

Privacy, data and consumer protection From WSIS Phase II: Tunis Agenda 46. We call upon all stakeholders to ensure respect for privacy and the protection of personal information and data, whether via adoption of legislation, the implementation of collaborative frameworks, best practices and selfregulatory and technological measures by business and users. We encourage all stakeholders, in particular governments, to reaffirm the right of individuals to access information according to Geneva Declaration of Principles and other mutually agreed relevant international instruments, and to coordinate internationally as appropriate. 28 June 2006 23