Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.

Slides:



Advertisements
Similar presentations
Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Advertisements

Module N° 4 – ICAO SSP framework
Licensing Export Control in China --Experiences and Challenges Wang Daxue Department of Arms Control and Disarmament Ministry of Foreign Affairs, China.
Philippine Cybercrime Efforts
SECURITY STRATEGIES OF THE REGION Witek Nowosielski.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
43rd Plenary Meeting of the European Judicial Network
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
UK Office for Security & Counter Terrorism Future threats and the potential role of the CBRN Action plan in supporting the BTWC Dr Catherine Terry International.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Non-governmental Actors in the Compliance with and Monitoring of Multilateral Environmental Decisions.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
 Road Safety the European Union Policy Carla Hess European Commission, Directorate General for Mobility & Transport Road.
China and space security National Defense University, PLA, China National Defense University, PLA, China Zhong Jing.
Legal Framework on Information Security Ministry of Trade, Tourism and Telecommunication Nebojša Vasiljević.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
REPUBLIC OF KAZAKHSTAN’S NATIONAL POLICIES AND LEGISLATION: REVIEW FOR COMPLIANCE WITH COMMITMENTS MADE ON UN SECURITY COUNCIL RESOLUTIONS ON WOMEN, PEACE.
Report on the current legal structure and resources available to the environmental protection agencies and inspectorates in Croatia 1st BERCEN Exchange.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Peculiarities of the institution of National Rapporteur on trafficking in persons in the Republic of Belarus : role, functions and legislative regulation.
International Multilateral Organizations Plan: 1. Features of international intergovernmental organizations 2. The objectives of the IMO 3. Functions of.
World summit on the information society 1 Pierre Gagné International Telecommunication Union March 2004 WSIS Follow-up Building the Information Society:
08 October 2015 M. Ammar Mehdi Introduction to Human Resource Management & SSG-16 Actions 4 th Steering Committee on Competence of Human.
Information Sharing Challenges, Trends and Opportunities
Prevention and Remediation in Selected Industrial Sectors, June 2005, Ottawa NATO’s Scientific Programme Thomas Strassburger Ottawa, Canada NATO’s.
A.ABDULLAEV, Director of the Public Fund for Support and Development of Print Media and Information Agencies of Uzbekistan.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
EU responses to international terrorism. Definition of terrorism Schmit & Jongman: ‘an anxiety-inspiring method of repeated violent action, employed by.
Situating International Humanitarian Law (IHL) ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
A National approach to Cyber security/CIIP: Raising awareness.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
1 Building the Privacy culture, starts with the youngsters and their education 20 th and 21 st June 2013 Zagreb, Croatia.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Fight against terrorism. EU institutional/legal framework A bit of history 1957: European Communities are born.
Center of Excellence PEACE OPERATIONS ROLE OF THE MILITARY IN UN OPERATIONS IN UN OPERATIONS Col (Ret) Peter Leentjes Center of Excellence in Disaster.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
UNCLASSIFIED As of W Mar 08 Mr. Scott A. Weidie, J722 1 Multinational Planning Augmentation Team (MPAT) 04 March 2008 Governments and Crises: Roles.
PRESENTATION TO SELECT COMMITTEE ON SECURITY AND CONSTITUTIONAL DEVELOPMENT  CONSIDERATION BY PARLIAMENT OF PROCLAMATIONS IN TERMS OF SECTION 26 OF THE.
SEARCH SEARCH, The National Consortium for Justice Information and Statistics
Center of Excellence PEACE OPERATIONS ROLE OF THE MILITARY IN UN OPERATIONS IN UN OPERATIONS Col (Retd) Mike Morrison.
Countering Terrorist Use of the Internet – a perspective from the United Nations (Lomonosov Moscow State University) 11 November 2010.
Office of Special Projects Issues arising from the Second Review Conference on Safety and Security at Chemical Plants and Relationships with CWC stakeholders.
The Commonwealth Cybercrime Initiative David Tait, Cybercrime Policy Analyst.
 ROAD SAFETY: the European Union Policy European Commission, Directorate General for Mobility & Transport «Road Safety.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
IAEA International Atomic Energy Agency IAEA Safety Standards and Public Exposure to Radon Trevor Boal Radiation Protection Unit - NSRW.
Introduction to the UN human rights system UN TRAINING FOR TRANS ACTIVISTS SEPTEMBER 2015.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
TAIEX INTERNAL MARKET WEEK IN BUDAPEST November 2004 Co-operation of Customs Administrations Presentation by: Sandro Le Noci – Italian Customs.
Export licensing of dual-use and military goods in the Russian Federation.
A project implemented by BAFA This project is funded by the EU This project is funded by the German Federal Foreign Office Legal and Regulatory Bases for.
Maritime Security as an Integral Part of an
The Tripartite Working Arrangement (TWA) of EFCA, EMSA and Frontex
1- Introduction ii-. Part ONE : foreign and security policy.
Equality and Human Rights Exchange Network
POLITICAL ENVIRONMENT OF BUSINESS
Peculiarities of the institution of National Rapporteur on trafficking in persons in the Republic of Belarus : role, functions and legislative regulation.
The Reserve Officers and Noncommissioned Officers Union in nature is a national, patriotic, professional, independent and non-party organization. It is.
Business sector engagement and Consumer Awareness October 3rd, 2017
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
Cybersecurity in Belarus a general overview of support areas
Analysis of the Guiding Principles on Business and Human Rights in comparison with the Russian legislation Alexander Ermolenko Partner, PhD in Law.
Secretariat for Legal Affairs
8 Building Blocks of National Cyber Strategies
Forth International Forum
Peculiarities of the institution of National Rapporteur on trafficking in persons in the Republic of Belarus : role, functions and legislative regulation.
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov

The relevance of the issue Creation confidence building measures in the information sphere has become a major priority for the foreign policy of many states Confidence Building Measures2

The aims of Confidence-building measures in information sphere Creating the environment of mutual understanding between nations, which reduces the risk of a surprise attack on the key national information infrastructure facilities or a violent armed conflict triggered by the use of special information and communications technologies (the so-called 'information weapon') to achieve political ends and also to interfere with the internal affairs of other nations Confidence Building Measures3

Confidence-building measures A set of measures on informing the Contracting States on matters of common interest in connection with actual or potential concerns arising in the field of international relations Confidence Building Measures4

The main threats to international information security the use of information and communication technologies as tools of warfare and intelligence for political purposes; the use of information and communication technologies for the planning and organization of terrorist activities, as well as the preparation and commission of terrorist acts; the use of information and communication technologies as tools for the implementation of crime in the information sphere; the use of the global information infrastructure for the implementation of acts of sabotage, including the actions of individuals, groups and organizations (including criminal) offering and performing intermediary functions in the implementation of a subversive network activities on behalf of other persons. (The report of the Secretary-General of the United Nations General Assembly session, 65) Confidence Building Measures5

Danger of the threats These threats have the most significant influence in shaping the foreign policy component of States ' concerns related to national and international information security. (UN A/65/201) Confidence Building Measures6

Confidence-building measures in the information sphere A set of measures on informing the Contracting States: strategies for the use of information and communication technologies to assist the force in opposing States in peace and war, the prevention and resolution of crises in the area of information infrastructure, combating cybercrime and cyberterrorism, use of resources by States for the dissemination of national culture and political preferences in foreign countries Confidence Building Measures7

1. The ability to disrupt on political grounds the stable operation of the Internet which is the de-facto basis of the global information infrastructure It is reasonable that confidence building measures in this area should be built towards searching and developing efficient ways of involving interested nations to perform Internet control functions Confidence Building Measures8

The directions of Confidence-building measures It is apparent that not all Internet control functions are equally important sustaining the stable operation of the global information infrastructure. If we assume that the main network operation controls are handled by Internet providers, then regarding the implementation of confidence building measures it would be possible to start discussing the issues of: Developing the international regulatory environment of Internet services; Determining quality standards for those services Confidence Building Measures9

2. The ability to include latent malicious functions in information and communications technologies The setting up forums to discuss the possibility of establishing of the following measures both: setting special safety standards for information and communications technology products, introducing a system of voluntary certification to meet the above standards, establishing an international judicial body to review claims of certified product non- compliance with applicable requirements and setting out certain liability for offenders Confidence Building Measures10

3. The escalating risk of the 'information arms' race and associated methods of employing information weapons The adoption international legal instruments, emerging norms of international humanitarian law, international security law and law of war as they apply to the use of the 'information weapon' in interstate conflicts; establishing both the 'hot' line between authorized representatives of states to discuss suspicions and misunderstandings and at the UN Security Council an intergovernmental agency tasked with conducting joint investigations on employment of information and communications technologies to disrupt the operation of key national information infrastructure Confidence Building Measures11

4. The potential access for terrorist organizations and individual terrorist to prototyped 'information weapons' and methods of employing such weapons towards political ends The exchange of information on aspirations of terrorist organizations and individual terrorists to gain access to prototyped information weapons and methods of employing such weapons Confidence Building Measures12

5. The increasing the social danger of information criminality in the face of considerable efforts exerted by law enforcement services The discussing the issues of the adopting under the UN auspices a general purpose international treaty laying out mutually beneficial mechanisms of information crime fighting, drawing more benefits from existing international treaties regulating this area, as well as, enhancing the potential of competent government authorities and international organizations, for instance, Interpol, to fight computer crime Confidence Building Measures13

6. The using by some states of information agencies, social networks and other information and communications technologies to undermine social stability in foreign states, to give international support to decision to use military force for the changing of other state policy lines The establishment of a forum to discuss ways to reduce this concern Confidence Building Measures14

The proposals 1. To discuss the appropriateness of the those or others measures of confidence-building measures in the field of information. 2. To prepare and publish a booklet outlining the views of the members of the Consortium Confidence Building Measures15

Thank you for your attention Confidence Building Measures16