Countering Terrorist Use of the Internet – a perspective from the United Nations (Lomonosov Moscow State University) 11 November 2010.

Slides:



Advertisements
Similar presentations
Thematic Discussion on Human Rights & Resolution 1373 Counter-Terrorism Committee Executive Directorate (CTED) United Nations New York, 7 October 2010.
Advertisements

Armand Racine Consultant Chemicals Branch
Secretariat for External Relations: Speaking With One Voice September 15, 2009.
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
UN Comprehensive Study on Cybercrime
UNODC & the Global Response to Cybercrime
GLOBAL FORUM V ON FIGHTING CORRUPTION AND SAFEGUARDING INTEGRITY Fulfilling our commitments: Effective action against corruption Sandton Convention Centre,
HIV in Europe Stockholm, 3.November 2009 Communication on combating HIV/AIDS in the EU and the neighbourhood - strategy and second action plan ( )
International Country Cooperation and Coordination in Implementing the Palermo Protocol Ruby Marks Chief Director: Gender Department of International Relations.
THE REGIONAL ANTICORRUPTION INITIATIVE (RAI) FRAMEWORK FOR REGIONAL COOPERATION AND SHARING BEST PRACTICES IN FIGHTING CORRUPTION IN SEE Pravets, May 21-22,
Panel themes of the International Conference “Europe against Counterfeit Medicines” G.N. Gildeeva, Deputy head of the Department of Registration of Medicines.
INTOSAI Compliance Audit Guidelines (ISSAI )
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Strategies to prevent and respond to violence against children who are in contact with the justice system APJJC Second Meeting “Towards child-friendly.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Facilitating the Provision of Technical Assistance to Member States Counter-Terrorism Committee Executive Directorate (CTED) United Nations 21 July 2010.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
COMMISSION FOR PERSONAL DATA PROTECTION 14 TH Meeting, CEEDPA may, Kyiv LEGAL FRAMEWORK FOR DATA PROTECTION, COMPETENCES AND PRIORITIES OF THE COMMISSION.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
INTERVICT International Victimology Institute Tilburg Legal developments in the field of violence against women in Western Europe Renée Römkens UNODC-UNDAW.
7 March 2013 Counter-terrorism Committee Executive Directorate Facilitating the Provision of Technical Assistance to Member States.
1 11 Combatting Trafficking in Persons (CTiP) Regional Support Office – The Bali Process 27 September 2013.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
What is the role of the UN in times of conflict?
1 UNODC and CYBERCRIME December Cybersecurity   Constitutes the protection against all forms of cyber incidents by strengthening the safety.
World summit on the information society 1 Pierre Gagné International Telecommunication Union March 2004 WSIS Follow-up Building the Information Society:
Enforcement Networks Workshop for Central and Eastern Europe countries on the prosecution of illegal traffic of hazardous and other wastes under the Basel.
Harnessing a multi-stakeholder platform for improved land governance in Malawi Ivy Luhanga – Principal Secretary, Paul Jere – Land Governance Consultant,
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
EU Funding opportunities : Rights, Equality and Citizenship Programme Justice Programme Jose Ortega European Commission DG Justice.
Ministerul Mediului si Gospodaririi Apelor Session 6 - Enhancing National GEF Coordination, Communication and Outreach Developing the National Capacity.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Engagement and Cooperation on IAEA Safeguards – Additional Protocol: VERTIC Initiative and Methods 23 October 2014 IAEA Symposium on International Safeguards.
RECOMMENDATIONS FOR THE INSTITUTIONALIZATION OF THE ACTIVITIES OF THE REMJA WORKING GROUP ON MUTUAL LEGAL ASSISTANCE IN CRIMINAL MATTERS AND EXTRADITION.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
SADC and the Fight Against Terrorism
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
 Organized crime has increased considerably while having a negative effect on the State and population.  The operation mode of organized crime is complex.
Security and Facilitation International Trade Supply Chain Security and Facilitation International Trade Supply Chain Ray Mc Donagh Deputy Director World.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Reporting on internal control in the light of the results of the survey of the Subcommittee on Internal Control Standards Maria Sieklucka Senior Public.
Human Trafficking: Global Trends and Responses
TEN-T Executive Agency and Project Management Anna LIVIERATOU-TOLL TEN-T Executive Agency Senior Programme and Policy Coordinator European Economic and.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Workshop on the organization of National Statistical Systems and user-producer relations for countries in South Asia National Statistical Systems – the.
The MESICIC Experience & Civil Society Participation.
“DEVELOPMENT OF A NATIONAL ICT POLICY ICT Policy in the ECTEL Member States Mr. Donnie Defreitas MSc, (Hav.), ECTEL Caribbean Internet Forum Bay Gardens.
Translating the United Nations Convention against Corruption into Action From Doha to Marrakesh and beyond... Oslo Governance Forum – 4 October 2011 Jo.
Office of Special Projects Issues arising from the Second Review Conference on Safety and Security at Chemical Plants and Relationships with CWC stakeholders.
Human Trafficking in Bosnia and Herzegovina SAMIR RIZVO State Coordinator for Combating Trafficking in Human Beings and Illegal Migration.
UN Convention against Corruption: Asset Recovery and StAR Prime Ministry Inspection Board Ankara, Turkey February 2009.
Trafficking flows Breakdown of trafficking flows by geographical reach,
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
15 October, 2012 Belgrade Human Trafficking and Migrant Smuggling Section (HTMSS) Trafficking in Persons.
Kingdom of Cambodia 1 Anti-Corruption Mechanism In Cambodia Presenter: Mr. Try Sothearith Dean of Business Faculty of Business and Economics, Western University,
Strengthening Dialogue and Building Trust April 2017
Cyber Security and Georgia. New Challenges
Mirjana Boshnjak Skopje, 20 to 22 September 2017
Almaty, Kazakhstan 27 September, 2016
Charlotte McClain-Nhlapo Senior Operations Officer The World Bank
Forth International Forum
Hate crime statistics: gaps, progress and challenges ahead
Combating Cybercrime: Tools and Capacity Building for Emerging Economies WSIS 2015, Geneva Jinyong Chung May 25, 2015.
Combatting Trafficking in Persons (CTiP)
1. Introduction to the Convention 2
Conditions Conducive to the Spread of Terrorism
Millennium Development Goals (MDGs)
UNCAC Chapter II Overview Prevention of Corruption under the United Nations Convention against Corruption 8-10 April 2019 Addis Ababa.
UNODC and CYBERCRIME October 2009.
Presentation transcript:

Countering Terrorist Use of the Internet – a perspective from the United Nations (Lomonosov Moscow State University) 11 November 2010

Focus of this presentation: I.Brief Introduction of the UN Global Counter- Terrorism Strategy and the role of the UN Counter-Terrorism Implementation Task Force (CTITF) II.The CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes – work to date III.Upcoming project: developing effective counter- narratives

I.1 UN Global Counter-Terrorism Strategy Adopted by all 192 Member States in September 2006 First ever comprehensive framework for tackling the problem of terrorism at the global level Ownership of the Strategy broader than in traditional CT- discussions Scope and substance of the Strategy are unique.

I.2 UN Global Counter-Terrorism Strategy The Strategy broadens the scope of efforts by addressing the issue via four equally important pillars: I. Addressing the conditions conducive to the spread of terrorism II. Preventing and combating terrorism III. Building state capacity to prevent and combat terrorism and strengthening to role of the UN system in this regard IV.Ensuring respect for human rights for all and the rule of law as the fundamental basis of the fight against terrorism

I.3 UN Global Counter-Terrorism Strategy Mandate for Countering the Use of the Internet for Terrorist Purposes: Pillar 2, Para 12: Member States pledge “to work with the United Nations with due regard confidentiality, respect for human rights and in compliance with other obligations under international law, to explore means to: – a) t o coordinate efforts at the international and regional level to counter terrorism in all its forms and manifestations on the Internet; – b) use the Internet as a tool for countering the spread of terrorism“

I. 4 Counter-Terrorism Implementation Task Force (CTITF) and the CTITF Office The CTITF was established by the Secretary-General in 2005 to ensure coordination and coherence in the counter-terrorism efforts of the UN system. It consists of 30 entities of the UN system and INTERPOL working under their respective mandates. The CTITF Office serves as a single point-of-entry for MS on UN counter-terrorism programming, coordinates CTITF projects, raises awareness about the UN Strategy, and supports the 30 entities in their CT-related work.

II.1 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes no operational information, but aim is to raise MS- awareness of the threats/challenges as well as identify good practice co-chaired by 1267 AQ/Taliban MT and CTITF Office published report in 2009 providing a framework on which challenges governments have to consider Three-phase project: 2010: legal & technical aspects, and in 2011: counter-narratives

II.2 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Legal Response - three key trends: some countries apply existing cybercrime legislation to terrorist use of the Internet; some countries apply existing counter-terrorism legislation to Internet-related acts; some countries have enacted specific legislation on terrorist use of the Internet.

II.3 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Challenges Criminalization of available tools/publication of critical information Identity of suspects Automation/scale of activities

II.4 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Legal Responses: Internet related attacks illegal content (recruitment/propaganda material) communication financing of terrorism

II.5 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Legal Aspects - Conclusions problem not static, legal responses will have to be reviewed and adapted over time global initiatives/harmonization will likely have most impact importance of implementing regional instruments (i.e. CoE) & UN-TOC

II.6 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Technical Aspects WG brought together range of ICT experts, including from Member States, academia, and the private sector technology developments represent both a challenge and a valuable tool in global counter-terrorism efforts terrorist websites/chat-rooms (monitor vs. shut-down) role of social networking sites role of data encryption, steganography

II.6 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Technical Aspects the volume problem human rights/privacy concerns technology is no panacea in the fight against terrorism

III.1 CTITF Working Group on Countering the Use of the Internet for Terrorist Purposes Next steps: developing counter-narratives third project phase will look at ways of active use of the internet to counter-terrorism understanding the terrorist narrative/recruitment & radicalization process developing effective counter-narratives identifying credible messengers (role of victims and ex- terrorists)

For more information please contact: CTITF-Office Jan Neutze Department of Political Affairs United Nations Tel: Fax: Web: