“The Cyber Security Challenge: What Can be Done

Slides:



Advertisements
Similar presentations
VOLUNTARY PRINCIPLES ON SECURITY & HUMAN RIGHTS. What are the Voluntary Principles? Tripartite, multi-stakeholder initiative Initiated in 2000 by UK Foreign.
Advertisements

Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Financing of OAS Activities Sources of cooperation Cooperation modalities Cooperation actors Specific Funds management models and resources mobilization.
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Philippine Cybercrime Efforts
4 th Meeting of the EC International Dialogue on Bioethics Copenhagen, June 19 th, 2012 Large research and medical databases in clinical and research multi-centred.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
AFRICAN UNION A FRAMEWORK FOR HARMONISED LAND POLICIES IN WEST AFRICA: an LPI – ECOWAS partnership Presentation to the World Bank Conference on Land Land.
Speaker: Tamar Shapatava
Environment and Security Initiative - ENVSEC -. OSCE - early warning, conflict prevention, conflict management and post-conflict rehabilitation UNEP -
RUSSIAN – EU RELATIONS “I count on Russia’s contribution to world peace and understanding. I look forward to continuing our cooperation and building an.
NIS Directive and NIS Platform
THE ROLE OF CIVIL SOCIETY IN ADVANCING THE RESPONSIBILITY TO PROTECT YUYUN WAHYUNINGRUM SENIOR ADVISOR ON ASEAN AND HUMAN RIGHTS, HRWG INDONESIA The Responsibility.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
ICT4Peace Foundation Presentation at Federal Foreign Office, Germany Berlin, 23 April 2015 Dr. Daniel Stauffacher, President, ICT4Peace Foundation
JOINT OECD/IRGC EXPERT WORKSHOP Risk and Crisis Communication: Opportunities and Challenges of Social Media Policy round table Risk and Crisis Communication.
Security Council resolution 1325 Basic Overview
IGF Remote Hub. History of the IGF Created as an outcome of the World Summit on the Information Society (WSIS) Phase I – Geneva, 2003 Phase II – Tunis,
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
Part of a Broader Strategy
Opportunities and Constraints of Environmental Peace Making Lessons Learned Alexander Carius, Adelphi Research The Hague Conference on Environment, Security.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
The Global Centre for Information and Communication Technologies in Parliament 14 June 2006 V Legislative XML Workshop Towards European Standards for Legislative.
World summit on the information society 1 Pierre Gagné International Telecommunication Union March 2004 WSIS Follow-up Building the Information Society:
Prevention and Remediation in Selected Industrial Sectors, June 2005, Ottawa NATO’s Scientific Programme Thomas Strassburger Ottawa, Canada NATO’s.
A National approach to Cyber security/CIIP: Raising awareness.
World summit on the information society 1 WSIS: Internet Governance President of the WSIS Phase II Preparatory Committee Ambassador Janis Karklins April.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Uniting Nations by Learning Together UPR as a process of accountability Regional Governance Week Social Accountability in a Changing Region Cairo,
Global Geospatial Information Management (GGIM) A UN-DESA Initiative in collaboration with Cartographic Section, DFS Stefan Schweinfest UNSD.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Office of Special Projects Issues arising from the Second Review Conference on Safety and Security at Chemical Plants and Relationships with CWC stakeholders.
Cybersecurity Strategy in Japan May 2016 Yasu TANIWAKI Deputy Director-General National center of Incident readiness and Strategy for Cybersecurity (NISC)
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
The Peace-building Partnership. Instrument for Stability  Article 3 – assistance in response to situations of crisis or emerging crisis  Article 4 –
Unclassified MG. L. HOXHA Skopje, 21 st of June 2005 REPUBLIC OF ALBANIA MINISTRY OF DEFENCE GENERAL STAFF OF THE ARMED FORCES.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
1 Office of ASG/CITO Crisis Information Management Strategy UNGIWG-11, Geneva 15 March 2011 A written consent by the UN is required to use the information.
UNGGIM – PRIVATE SECTOR NETWORK. AGENDA > OVERVIEW OF PRIVATE SECTOR >PURPOSE AND VISION OF PRIVATE SECTOR NETWORK > STRUCTURE AND TERMS OF REFERENCE.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
Civil Society Participation and Contribution to the UNCAC Review Process Towards Transparency – TI National Contact Vietnam UNCAC Self Assessment Process:
The International Cooperation Roundtable: The Human Factor Tel Aviv University 26 June 2017 Dr. Daniel Stauffacher, President, ICT4Peace Foundation.
Strengthening Dialogue and Building Trust April 2017
Building Governance for Risk Management
Adedeji Ebo Chief, Security Sector Reform Unit
Institutional Strengthening Support
Cybersecurity in the ECOWAS region
WHAT IS BEHIND GEORGIA’S RAPID CYBERSECURITY DEVELOPMENT
Peacebuilding Priority Plan Heads of Mission
EYV 2011 Alliance Céline Barlet (Project Officer) 1.
Cybersecurity in Belarus a general overview of support areas
Security challenges in the Balkans
8 Building Blocks of National Cyber Strategies
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
The Role of CSOs in the UNCAC and its implementation review mechanism
Promoting Global Cybersecurity
Outline of Presentation
1. Introduction to the Convention 2
Cyber Security Ecosystem of Georgia. Experience and Challenges
Cybersecurity ATD technical
The Role of CSOs in the UNCAC and its implementation review mechanism
Securing free and fair European elections
The European Union response to cyber threats
Institution and Capacity- Building
Strengthening Conflict Prevention: Recommendations for the EU
Public consultation on the Joint EU-Africa Strategy
UNODC and CYBERCRIME October 2009.
Presentation transcript:

“The Cyber Security Challenge: What Can be Done “The Cyber Security Challenge: What Can be Done?” UNOG Executive Briefing 21 March 2014, Palais des Nations, UN Office in Geneva Presentation by Amb. (ret.) Daniel Stauffacher President, ICT4Peace Foundation www.ict4peace.org

The Role of ICTs in Preventing, Responding to and Recovering from Conflict WSIS Tunis 2005 ICT4Peace/UN ICT Task Force (http://bit.ly/1bR0yPI)

The UN World Summit on the Information Society (WSIS) in Tunis 2005 Paragraph 36 of the World Summit on the Information Society (WSIS) Tunis Declaration (2005): “36. We value the potential of ICTs to promote peace and to prevent conflict which, inter alia, negatively affects achieving development goals. ICTs can be used for identifying conflict situations through early-warning systems preventing conflicts, promoting their peaceful resolution, supporting humanitarian action, including protection of civilians in armed conflicts, facilitating peacekeeping missions, and assisting post conflict peace-building and reconstruction.”between peoples, communities and stakeholders involved in crisis management, humanitarian aid and peacebuilding.

See Article by Barbara Weekes et al (2011): “Getting down to Business – Realistic Goals for the Promotion of Peace in the Cyberspace: http://ict4peace.org/getting-down-to-business-realistic-goals-for-the-promotion-of-peace-in-cyber-space/ See list of articles by ICT4Peace on rights and security in the cyberspace: http://ict4peace.org/?p=1076.

ICT4Peace Report on Transparency and Confidence Building Measures (TCBMs)** ** see Report by Camino Kavanagh, Senior Advisor ICT4Peace: http://ict4peace.org/what-next-building-confidence-measures-for-the-cyberspace/ ICT4Peace workshop at ETH Zurich June 2013 with the Support of the Swiss Ministry of Foreign Affairs

The Cybersecurity Challenge Numerous states are pursuing military cyber-capabilities: UNIDIR Cyber Index: 114 national cyber security programs world-wide, 47 have cyber-security programs that give some role to the armed forces. Cyber capabilities are not limited to great military powers. They transcend lines of state-centered warfare: A private cannot usually obtain, train and use weapons of war. In the electronic world they can. The step from common crime to politically motivated acts, even terrorism, is not far.

Cyber Capabilities and traditional security calculus An exclusive, all-out cyber-war has not happened yet, but they have as part of conflicts: 2007 against Estonia, 2008 against Georgia, 2010 against Iran, 2013 against South Korea. In the context of the Syrian war, denial-of-service attacks have been reported. Cyber action can also create real damage in the physical world. The Stuxnet virus resulted in the destruction of equipment; Destruction of a country’ certain critical infrastructure: power, transport, financial sector etc. is feasible. However, Cyber Capabilities do not fit traditional security strategies (deterrence, denial), because: Problem of attribution of an attack Rapidly evolving technology produced and in the hands of the private sector Arms control agreements (so far) unrealistic for cyber capabilities Multiple actors, both state and non-state actors No commonly accepted definition of a cyber weapon so far

“The Cyber Security Challenge: What Can be Done?” The potential cyber conflict scenarios are: (1) all-out cyber-war (unlikely) (2) the limited use of cyber capabilities as part of a larger war effort (partly to-day) (3) an international military crisis escalating from a cyber-action (possible).  These scenarios show that we need: to engage in an international discussion on the norms and principles of responsible state behavior in cyber space, including on the conduct of cyber warfare, and its possible exclusion or mitigation (Tallinn Manual a beginning) In order to establish a universal understanding of the norms and principles of responsible state behavior in cyber space, we need to turn to the United Nations (such as UN GA, UNGGE, WSIS Geneva Action Line 5) To prevent an escalation we need to develop Confidence Building Measures (e.g. Bilateral Agreements, OSCE, ARF, UN GGE) Continue the London – Budapest - Seoul Conferences Process on Cyberspace to create political awareness and reach out to other regions and actors

CBMs: Important Progress at OSCE Important Progress at the OSCE in December 2013: Participating States, approved a first set of voluntary confidence-building measure: Providing their national views on various aspects of national and transnational threats to and in the use of Information and Communication Technologies; Facilitating co-operation among the competent national bodies and exchanging information; Holding consultations in order to reduce the risks of misperception, and of possible emergence of political or military tension or conflict that may stem from the use of Information and Communication Technologies; Sharing information on measures that they have taken to ensure an open, interoperable, secure, and reliable Internet , and on their national organization; strategies; policies and programs; Using the OSCE as a platform for dialogue, exchange of best practices, awareness-raising and information on capacity-building; Nominating contact points; and Providing a list of relevant national terminology. OSCE Participating States have agreed that they will, at the level of designated national experts, meet at least three times each year, to discuss information exchanged and explore appropriate development of CBMs.

WSIS 2003 Geneva Plan of Action Follow-up towards 2015, MDGs and beyond Action Line C5. Building confidence and security in the use of ICTs  12. Confidence and security are among the main pillars of the Information Society. Promote cooperation among the governments at the United Nations and with all stakeholders at other appropriate fora to enhance user confidence, build trust, and protect both data and network integrity; consider existing and potential threats to ICTs; and address other information security and network security issues. Governments, in cooperation with the private sector, should prevent, detect and respond to cyber-crime and misuse of ICTs by: developing guidelines that take into account ongoing efforts in these areas; considering legislation that allows for effective investigation and prosecution of misuse; promoting effective mutual assistance efforts; strengthening institutional support at the international level for preventing, detecting and recovering from such incidents; and encouraging education and raising awareness. Governments, and other stakeholders, should actively promote user education and awareness about online privacy and the means of protecting privacy. Take appropriate action on spam at national and international levels. Encourage the domestic assessment of national law with a view to overcoming any obstacles to the effective use of electronic documents and transactions including electronic means of authentication. Further strengthen the trust and security framework with complementary and mutually reinforcing initiatives in the fields of security in the use of ICTs, with initiatives or guidelines with respect to rights to privacy, data and consumer protection. Share good practices in the field of information security and network security and encourage their use by all parties concerned.

WSIS 2003 Geneva Plan of Action and Follow-up towards 2015, MDGs and beyond Action Line C5. Building confidence and security in the use of ICTs Invite interested countries to set up focal points for real-time incident handling and response, and develop a cooperative network between these focal points for sharing information and technologies on incident response. Encourage further development of secure and reliable applications to facilitate online transactions. Encourage interested countries to contribute actively to the ongoing United Nations activities to build confidence and security in the use of ICTs.

Cybersecurity and Resilient Internet International Processes: Council of Europe, OSCE, UN GGE, London, ARF Example CBMs Lybia Standby force Report on Ict4Peace Workshop and Statement to Seoul Conference Plenary: http://ict4peace.org/seoul-conference-on-cyberspace-2013-statement-on-ict4peace-special-session/

Thank you very much danielstauffacher@ict4peace.org